-
Notifications
You must be signed in to change notification settings - Fork 269
/
values.yaml
68 lines (61 loc) · 1.79 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
---
# Default values for cert-manager configs for Openshift APIServer, IngressController and custom routes
namespace: cert-manager
# Setup Issuer and ClusterIssuer custom resources for route53 and rfc2136 resources
issuer:
dns:
enabled: true
provider: route53
acme:
emailAddress: [email protected]
selectorZones:
- subdomain.example.com
env: staging
issuerKind: ClusterIssuer
# AWS credentials scoped to route53 only
# See https://cert-manager.io/docs/configuration/acme/dns01/route53/#set-up-an-iam-role
aws:
accessKeyId: ''
secretAccessKey: ''
region: us-east-1
# rfc2136 credentials for named nsupdate ClusterIssuer
# rfc2136:
# dnsNameServer: ''
# tsigKeyAlgorithm: ''
# tsigKeyName: ''
# Add multiple certificates, including APIServer and IngressController and custom certificates
certificates:
apiServer:
name: api-letsencrypt-cert
namespace: openshift-config
issuerRef: letsencrypt-staging
issuerKind: ClusterIssuer
dnsNames:
- api.example.com
ingressController:
name: ingress-letsencrypt-cert
namespace: openshift-ingress
issuerRef: letsencrypt-staging
issuerKind: ClusterIssuer
dnsNames:
- '*.apps.example.com'
# custom:
# name: custom
# namespace: custom
# issuerRef: letsencrypt-staging
# issuerKind: ClusterIssuer
# dnsNames:
# - custom.example.com
# Enable along with apiServer and ingressController certificates for automated Openshift SSL certificates
# The Let's Encrypt CA is available at https://letsencrypt.org/certs/lets-encrypt-x3-cross-signed.pem.txt
cluster:
apiServer:
enabled: false
name: api.example.com
tlsSecret: api-letsencrypt-cert
ingressController:
enabled: false
caBundle: |
-----BEGIN CERTIFICATE-----
<data>
-----END CERTIFICATE-----