Argo/apps/templates/cert-manager.yaml
Simen Røstvik 111c1e493f rm
2023-02-07 09:23:50 +01:00

79 lines
1.9 KiB
YAML

apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: cert-manager
namespace: argo-cd
finalizers:
- resources-finalizer.argocd.argoproj.io
spec:
destination:
server: https://kubernetes.default.svc
namespace: cert-manager
project: default
source:
chart: cert-manager
helm:
values: |
prometheus:
enabled: false
extraArgs:
- --enable-certificate-owner-ref=true
repoURL: https://charts.jetstack.io
targetRevision: 1.10.1
syncPolicy:
automated:
prune: true
selfHeal: true
# ---
# apiVersion: cert-manager.io/v1
# kind: ClusterIssuer
# metadata:
# name: roxedus.com-cloudflare
# namespace: cert-manager
# spec:
# acme:
# server: https://acme-v02.api.letsencrypt.org/directory
# privateKeySecretRef:
# name: cloudflare-issuer-account-key
# solvers:
# - dns01:
# cloudflare:
# apiTokenSecretRef:
# name: cloudflare-api-token-secret
# key: CLOUDFLARE_API_KEY
# selector:
# dnsNames:
# - 'roxedus.com'
# - '*.roxedus.com'
# ---
# apiVersion: networking.k8s.io/v1
# kind: Ingress
# metadata:
# annotations:
# # add an annotation indicating the issuer to use.
# cert-manager.io/acme-challenge-type: dns01
# cert-manager.io/cluster-issuer: roxedus.com-cloudflare
# name: myingress
# namespace: default
# spec:
# ingressClassName: traefik
# rules:
# - host: test.roxedus.com
# http:
# paths:
# - pathType: Prefix
# path: /
# backend:
# service:
# name: searxng
# port:
# number: 8080
# tls: # < placing a host in the TLS config will determine what ends up in the cert's subjectAltNames
# - hosts:
# - test.roxedus.com
# secretName: test-roxedus-com-cert # < cert-manager will store the created certificate in this secret.