Без опису

123456789101112131415161718192021222324252627282930313233343536373839404142434445
  1. apiVersion: cert-manager.io/v1
  2. kind: ClusterIssuer
  3. metadata:
  4. name: letsencrypt-staging
  5. namespace: cert-manager
  6. spec:
  7. acme:
  8. email: "admin@kaisers.info" # replace this
  9. privateKeySecretRef:
  10. name: "staging-issuer-account-key"
  11. server: "https://acme-staging-v02.api.letsencrypt.org/directory"
  12. solvers:
  13. - dns01:
  14. webhook:
  15. # This group needs to be configured when installing the helm package, otherwise the webhook won't have permission to create an ACME challenge for this API group.
  16. groupName: acme.kaisers.info
  17. solverName: hetzner
  18. config:
  19. secretName: hetzner-secret
  20. zoneName: kaisers.info # (Optional): When not provided the Zone will searched in Hetzner API by recursion on full domain name
  21. apiUrl: https://dns.hetzner.com/api/v1
  22. ---
  23. apiVersion: cert-manager.io/v1
  24. kind: ClusterIssuer
  25. metadata:
  26. name: letsencrypt-prod
  27. namespace: cert-manager
  28. spec:
  29. acme:
  30. email: "admin@kaisers.info" # replace this
  31. privateKeySecretRef:
  32. name: "prod-issuer-account-key"
  33. server: "https://acme-v02.api.letsencrypt.org/directory"
  34. solvers:
  35. - http01:
  36. ingress:
  37. class: "traefik"
  38. ingressTemplate:
  39. metadata:
  40. annotations:
  41. kubernetes.io/ingress.class: "traefik"
  42. traefik.ingress.kubernetes.io/router.tls: "true"
  43. traefik.ingress.kubernetes.io/frontend-entry-points: "https"
  44. traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
  45. #traefik.ingress.kubernetes.io/redirect-entry-point: "https"