blob: 35ec9766a2bd6c935761155e5d838dfcbe28926c [file] [log] [blame]
Giorgi Lekveishvilid1234c12023-06-19 10:37:06 +04001# Default values for cert-manager.
2# This is a YAML-formatted file.
3# Declare variables to be passed into your templates.
4global:
5 # Reference to one or more secrets to be used when pulling images
6 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
7 imagePullSecrets: []
8 # - name: "image-pull-secret"
9
10 # Labels to apply to all resources
11 # Please note that this does not add labels to the resources created dynamically by the controllers.
12 # For these resources, you have to add the labels in the template in the cert-manager custom resource:
13 # eg. podTemplate/ ingressTemplate in ACMEChallengeSolverHTTP01Ingress
14 # ref: https://cert-manager.io/docs/reference/api-docs/#acme.cert-manager.io/v1.ACMEChallengeSolverHTTP01Ingress
15 # eg. secretTemplate in CertificateSpec
16 # ref: https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
17 commonLabels: {}
18 # team_name: dev
19
20 # Optional priority class to be used for the cert-manager pods
21 priorityClassName: ""
22 rbac:
23 create: true
24 # Aggregate ClusterRoles to Kubernetes default user-facing roles. Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
25 aggregateClusterRoles: true
26
27 podSecurityPolicy:
28 enabled: false
29 useAppArmor: true
30
31 # Set the verbosity of cert-manager. Range of 0 - 6 with 6 being the most verbose.
32 logLevel: 2
33
34 leaderElection:
35 # Override the namespace used for the leader election lease
36 namespace: "kube-system"
37
38 # The duration that non-leader candidates will wait after observing a
39 # leadership renewal until attempting to acquire leadership of a led but
40 # unrenewed leader slot. This is effectively the maximum duration that a
41 # leader can be stopped before it is replaced by another candidate.
42 # leaseDuration: 60s
43
44 # The interval between attempts by the acting master to renew a leadership
45 # slot before it stops leading. This must be less than or equal to the
46 # lease duration.
47 # renewDeadline: 40s
48
49 # The duration the clients should wait between attempting acquisition and
50 # renewal of a leadership.
51 # retryPeriod: 15s
52
53installCRDs: false
54
55replicaCount: 1
56
57strategy: {}
58 # type: RollingUpdate
59 # rollingUpdate:
60 # maxSurge: 0
61 # maxUnavailable: 1
62
63# Comma separated list of feature gates that should be enabled on the
64# controller pod & webhook pod.
65featureGates: ""
66
67# The maximum number of challenges that can be scheduled as 'processing' at once
68maxConcurrentChallenges: 60
69
70image:
71 repository: quay.io/jetstack/cert-manager-controller
72 # You can manage a registry with
73 # registry: quay.io
74 # repository: jetstack/cert-manager-controller
75
76 # Override the image tag to deploy by setting this variable.
77 # If no value is set, the chart's appVersion will be used.
78 # tag: canary
79
80 # Setting a digest will override any tag
81 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
82 pullPolicy: IfNotPresent
83
84# Override the namespace used to store DNS provider credentials etc. for ClusterIssuer
85# resources. By default, the same namespace as cert-manager is deployed within is
86# used. This namespace will not be automatically created by the Helm chart.
87clusterResourceNamespace: ""
88
89# This namespace allows you to define where the services will be installed into
90# if not set then they will use the namespace of the release
91# This is helpful when installing cert manager as a chart dependency (sub chart)
92namespace: ""
93
94serviceAccount:
95 # Specifies whether a service account should be created
96 create: true
97 # The name of the service account to use.
98 # If not set and create is true, a name is generated using the fullname template
99 # name: ""
100 # Optional additional annotations to add to the controller's ServiceAccount
101 # annotations: {}
102 # Automount API credentials for a Service Account.
103 # Optional additional labels to add to the controller's ServiceAccount
104 # labels: {}
105 automountServiceAccountToken: true
106
107# Automounting API credentials for a particular pod
108# automountServiceAccountToken: true
109
110# Additional command line flags to pass to cert-manager controller binary.
111# To see all available flags run docker run quay.io/jetstack/cert-manager-controller:<version> --help
112extraArgs: []
113 # When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted
114 # - --enable-certificate-owner-ref=true
115 # Use this flag to enable or disable arbitrary controllers, for example, disable the CertificiateRequests approver
116 # - --controllers=*,-certificaterequests-approver
117
118extraEnv: []
119# - name: SOME_VAR
120# value: 'some value'
121
122resources: {}
123 # requests:
124 # cpu: 10m
125 # memory: 32Mi
126
127# Pod Security Context
128# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
129securityContext:
130 runAsNonRoot: true
131 seccompProfile:
132 type: RuntimeDefault
133
134# Container Security Context to be set on the controller component container
135# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
136containerSecurityContext:
137 allowPrivilegeEscalation: false
138 capabilities:
139 drop:
140 - ALL
141 # readOnlyRootFilesystem: true
142 # runAsNonRoot: true
143
144
145volumes: []
146
147volumeMounts: []
148
149# Optional additional annotations to add to the controller Deployment
150# deploymentAnnotations: {}
151
152# Optional additional annotations to add to the controller Pods
153# podAnnotations: {}
154
155podLabels: {}
156
157# Optional annotations to add to the controller Service
158# serviceAnnotations: {}
159
160# Optional additional labels to add to the controller Service
161# serviceLabels: {}
162
163# Optional DNS settings, useful if you have a public and private DNS zone for
164# the same domain on Route 53. What follows is an example of ensuring
165# cert-manager can access an ingress or DNS TXT records at all times.
166# NOTE: This requires Kubernetes 1.10 or `CustomPodDNS` feature gate enabled for
167# the cluster to work.
168# podDnsPolicy: "None"
169# podDnsConfig:
170# nameservers:
171# - "1.1.1.1"
172# - "8.8.8.8"
173
174nodeSelector:
175 kubernetes.io/os: linux
176
177ingressShim: {}
178 # defaultIssuerName: ""
179 # defaultIssuerKind: ""
180 # defaultIssuerGroup: ""
181
182prometheus:
183 enabled: true
184 servicemonitor:
185 enabled: false
186 prometheusInstance: default
187 targetPort: 9402
188 path: /metrics
189 interval: 60s
190 scrapeTimeout: 30s
191 labels: {}
192 annotations: {}
193 honorLabels: false
194
195# Use these variables to configure the HTTP_PROXY environment variables
196# http_proxy: "http://proxy:8080"
197# https_proxy: "https://proxy:8080"
198# no_proxy: 127.0.0.1,localhost
199
200# expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#affinity-v1-core
201# for example:
202# affinity:
203# nodeAffinity:
204# requiredDuringSchedulingIgnoredDuringExecution:
205# nodeSelectorTerms:
206# - matchExpressions:
207# - key: foo.bar.com/role
208# operator: In
209# values:
210# - master
211affinity: {}
212
213# expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#toleration-v1-core
214# for example:
215# tolerations:
216# - key: foo.bar.com/role
217# operator: Equal
218# value: master
219# effect: NoSchedule
220tolerations: []
221
222# expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.24/#topologyspreadconstraint-v1-core
223# for example:
224# topologySpreadConstraints:
225# - maxSkew: 2
226# topologyKey: topology.kubernetes.io/zone
227# whenUnsatisfiable: ScheduleAnyway
228# labelSelector:
229# matchLabels:
230# app.kubernetes.io/instance: cert-manager
231# app.kubernetes.io/component: controller
232topologySpreadConstraints: []
233
234webhook:
235 replicaCount: 1
236 timeoutSeconds: 10
237
238 # Used to configure options for the webhook pod.
239 # This allows setting options that'd usually be provided via flags.
240 # An APIVersion and Kind must be specified in your values.yaml file.
241 # Flags will override options that are set here.
242 config:
243 # apiVersion: webhook.config.cert-manager.io/v1alpha1
244 # kind: WebhookConfiguration
245
246 # The port that the webhook should listen on for requests.
247 # In GKE private clusters, by default kubernetes apiservers are allowed to
248 # talk to the cluster nodes only on 443 and 10250. so configuring
249 # securePort: 10250, will work out of the box without needing to add firewall
250 # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000.
251 # This should be uncommented and set as a default by the chart once we graduate
252 # the apiVersion of WebhookConfiguration past v1alpha1.
253 # securePort: 10250
254
255 strategy: {}
256 # type: RollingUpdate
257 # rollingUpdate:
258 # maxSurge: 0
259 # maxUnavailable: 1
260
261 # Pod Security Context to be set on the webhook component Pod
262 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
263 securityContext:
264 runAsNonRoot: true
265 seccompProfile:
266 type: RuntimeDefault
267
268 # Container Security Context to be set on the webhook component container
269 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
270 containerSecurityContext:
271 allowPrivilegeEscalation: false
272 capabilities:
273 drop:
274 - ALL
275 # readOnlyRootFilesystem: true
276 # runAsNonRoot: true
277
278 # Optional additional annotations to add to the webhook Deployment
279 # deploymentAnnotations: {}
280
281 # Optional additional annotations to add to the webhook Pods
282 # podAnnotations: {}
283
284 # Optional additional annotations to add to the webhook Service
285 # serviceAnnotations: {}
286
287 # Optional additional annotations to add to the webhook MutatingWebhookConfiguration
288 # mutatingWebhookConfigurationAnnotations: {}
289
290 # Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
291 # validatingWebhookConfigurationAnnotations: {}
292
293 # Additional command line flags to pass to cert-manager webhook binary.
294 # To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:<version> --help
295 extraArgs: []
296 # Path to a file containing a WebhookConfiguration object used to configure the webhook
297 # - --config=<path-to-config-file>
298
299 resources: {}
300 # requests:
301 # cpu: 10m
302 # memory: 32Mi
303
304 ## Liveness and readiness probe values
305 ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
306 ##
307 livenessProbe:
308 failureThreshold: 3
309 initialDelaySeconds: 60
310 periodSeconds: 10
311 successThreshold: 1
312 timeoutSeconds: 1
313 readinessProbe:
314 failureThreshold: 3
315 initialDelaySeconds: 5
316 periodSeconds: 5
317 successThreshold: 1
318 timeoutSeconds: 1
319
320 nodeSelector:
321 kubernetes.io/os: linux
322
323 affinity: {}
324
325 tolerations: []
326
327 topologySpreadConstraints: []
328
329 # Optional additional labels to add to the Webhook Pods
330 podLabels: {}
331
332 # Optional additional labels to add to the Webhook Service
333 serviceLabels: {}
334
335 image:
336 repository: quay.io/jetstack/cert-manager-webhook
337 # You can manage a registry with
338 # registry: quay.io
339 # repository: jetstack/cert-manager-webhook
340
341 # Override the image tag to deploy by setting this variable.
342 # If no value is set, the chart's appVersion will be used.
343 # tag: canary
344
345 # Setting a digest will override any tag
346 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
347
348 pullPolicy: IfNotPresent
349
350 serviceAccount:
351 # Specifies whether a service account should be created
352 create: true
353 # The name of the service account to use.
354 # If not set and create is true, a name is generated using the fullname template
355 # name: ""
356 # Optional additional annotations to add to the controller's ServiceAccount
357 # annotations: {}
358 # Optional additional labels to add to the webhook's ServiceAccount
359 # labels: {}
360 # Automount API credentials for a Service Account.
361 automountServiceAccountToken: true
362
363 # Automounting API credentials for a particular pod
364 # automountServiceAccountToken: true
365
366 # The port that the webhook should listen on for requests.
367 # In GKE private clusters, by default kubernetes apiservers are allowed to
368 # talk to the cluster nodes only on 443 and 10250. so configuring
369 # securePort: 10250, will work out of the box without needing to add firewall
370 # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
371 securePort: 10250
372
373 # Specifies if the webhook should be started in hostNetwork mode.
374 #
375 # Required for use in some managed kubernetes clusters (such as AWS EKS) with custom
376 # CNI (such as calico), because control-plane managed by AWS cannot communicate
377 # with pods' IP CIDR and admission webhooks are not working
378 #
379 # Since the default port for the webhook conflicts with kubelet on the host
380 # network, `webhook.securePort` should be changed to an available port if
381 # running in hostNetwork mode.
382 hostNetwork: false
383
384 # Specifies how the service should be handled. Useful if you want to expose the
385 # webhook to outside of the cluster. In some cases, the control plane cannot
386 # reach internal services.
387 serviceType: ClusterIP
388 # loadBalancerIP:
389
390 # Overrides the mutating webhook and validating webhook so they reach the webhook
391 # service using the `url` field instead of a service.
392 url: {}
393 # host:
394
395 # Enables default network policies for webhooks.
396 networkPolicy:
397 enabled: false
398 ingress:
399 - from:
400 - ipBlock:
401 cidr: 0.0.0.0/0
402 egress:
403 - ports:
404 - port: 80
405 protocol: TCP
406 - port: 443
407 protocol: TCP
408 - port: 53
409 protocol: TCP
410 - port: 53
411 protocol: UDP
412 to:
413 - ipBlock:
414 cidr: 0.0.0.0/0
415
416cainjector:
417 enabled: true
418 replicaCount: 1
419
420 strategy: {}
421 # type: RollingUpdate
422 # rollingUpdate:
423 # maxSurge: 0
424 # maxUnavailable: 1
425
426 # Pod Security Context to be set on the cainjector component Pod
427 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
428 securityContext:
429 runAsNonRoot: true
430 seccompProfile:
431 type: RuntimeDefault
432
433 # Container Security Context to be set on the cainjector component container
434 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
435 containerSecurityContext:
436 allowPrivilegeEscalation: false
437 capabilities:
438 drop:
439 - ALL
440 # readOnlyRootFilesystem: true
441 # runAsNonRoot: true
442
443
444 # Optional additional annotations to add to the cainjector Deployment
445 # deploymentAnnotations: {}
446
447 # Optional additional annotations to add to the cainjector Pods
448 # podAnnotations: {}
449
450 # Additional command line flags to pass to cert-manager cainjector binary.
451 # To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:<version> --help
452 extraArgs: []
453 # Enable profiling for cainjector
454 # - --enable-profiling=true
455
456 resources: {}
457 # requests:
458 # cpu: 10m
459 # memory: 32Mi
460
461 nodeSelector:
462 kubernetes.io/os: linux
463
464 affinity: {}
465
466 tolerations: []
467
468 topologySpreadConstraints: []
469
470 # Optional additional labels to add to the CA Injector Pods
471 podLabels: {}
472
473 image:
474 repository: quay.io/jetstack/cert-manager-cainjector
475 # You can manage a registry with
476 # registry: quay.io
477 # repository: jetstack/cert-manager-cainjector
478
479 # Override the image tag to deploy by setting this variable.
480 # If no value is set, the chart's appVersion will be used.
481 # tag: canary
482
483 # Setting a digest will override any tag
484 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
485
486 pullPolicy: IfNotPresent
487
488 serviceAccount:
489 # Specifies whether a service account should be created
490 create: true
491 # The name of the service account to use.
492 # If not set and create is true, a name is generated using the fullname template
493 # name: ""
494 # Optional additional annotations to add to the controller's ServiceAccount
495 # annotations: {}
496 # Automount API credentials for a Service Account.
497 # Optional additional labels to add to the cainjector's ServiceAccount
498 # labels: {}
499 automountServiceAccountToken: true
500
501 # Automounting API credentials for a particular pod
502 # automountServiceAccountToken: true
503
504acmesolver:
505 image:
506 repository: quay.io/jetstack/cert-manager-acmesolver
507 # You can manage a registry with
508 # registry: quay.io
509 # repository: jetstack/cert-manager-acmesolver
510
511 # Override the image tag to deploy by setting this variable.
512 # If no value is set, the chart's appVersion will be used.
513 # tag: canary
514
515 # Setting a digest will override any tag
516 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
517
518# This startupapicheck is a Helm post-install hook that waits for the webhook
519# endpoints to become available.
520# The check is implemented using a Kubernetes Job- if you are injecting mesh
521# sidecar proxies into cert-manager pods, you probably want to ensure that they
522# are not injected into this Job's pod. Otherwise the installation may time out
523# due to the Job never being completed because the sidecar proxy does not exit.
524# See https://github.com/cert-manager/cert-manager/pull/4414 for context.
525startupapicheck:
526 enabled: true
527
528 # Pod Security Context to be set on the startupapicheck component Pod
529 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
530 securityContext:
531 runAsNonRoot: true
532 seccompProfile:
533 type: RuntimeDefault
534
535 # Container Security Context to be set on the controller component container
536 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
537 containerSecurityContext:
538 allowPrivilegeEscalation: false
539 capabilities:
540 drop:
541 - ALL
542 # readOnlyRootFilesystem: true
543 # runAsNonRoot: true
544
545 # Timeout for 'kubectl check api' command
546 timeout: 1m
547
548 # Job backoffLimit
549 backoffLimit: 4
550
551 # Optional additional annotations to add to the startupapicheck Job
552 jobAnnotations:
553 helm.sh/hook: post-install
554 helm.sh/hook-weight: "1"
555 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
556
557 # Optional additional annotations to add to the startupapicheck Pods
558 # podAnnotations: {}
559
560 # Additional command line flags to pass to startupapicheck binary.
561 # To see all available flags run docker run quay.io/jetstack/cert-manager-ctl:<version> --help
562 extraArgs: []
563
564 resources: {}
565 # requests:
566 # cpu: 10m
567 # memory: 32Mi
568
569 nodeSelector:
570 kubernetes.io/os: linux
571
572 affinity: {}
573
574 tolerations: []
575
576 # Optional additional labels to add to the startupapicheck Pods
577 podLabels: {}
578
579 image:
580 repository: quay.io/jetstack/cert-manager-ctl
581 # You can manage a registry with
582 # registry: quay.io
583 # repository: jetstack/cert-manager-ctl
584
585 # Override the image tag to deploy by setting this variable.
586 # If no value is set, the chart's appVersion will be used.
587 # tag: canary
588
589 # Setting a digest will override any tag
590 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
591
592 pullPolicy: IfNotPresent
593
594 rbac:
595 # annotations for the startup API Check job RBAC and PSP resources
596 annotations:
597 helm.sh/hook: post-install
598 helm.sh/hook-weight: "-5"
599 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
600
601 serviceAccount:
602 # Specifies whether a service account should be created
603 create: true
604
605 # The name of the service account to use.
606 # If not set and create is true, a name is generated using the fullname template
607 # name: ""
608
609 # Optional additional annotations to add to the Job's ServiceAccount
610 annotations:
611 helm.sh/hook: post-install
612 helm.sh/hook-weight: "-5"
613 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
614
615 # Automount API credentials for a Service Account.
616 automountServiceAccountToken: true
617
618 # Optional additional labels to add to the startupapicheck's ServiceAccount
619 # labels: {}