blob: 2603de02d9132f973ad3f52fc54848a689fdbca0 [file] [log] [blame]
Mohammed Naser9ad0d462023-01-15 20:36:37 -05001# Default values for cert-manager.
2# This is a YAML-formatted file.
3# Declare variables to be passed into your templates.
4global:
5 ## Reference to one or more secrets to be used when pulling images
6 ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
7 ##
8 imagePullSecrets: []
9 # - name: "image-pull-secret"
10
11 # Optional priority class to be used for the cert-manager pods
12 priorityClassName: ""
13 rbac:
14 create: true
15
16 podSecurityPolicy:
17 enabled: false
18 useAppArmor: true
19
20 # Set the verbosity of cert-manager. Range of 0 - 6 with 6 being the most verbose.
21 logLevel: 2
22
23 leaderElection:
24 # Override the namespace used to store the ConfigMap for leader election
25 namespace: "kube-system"
26
27 # The duration that non-leader candidates will wait after observing a
28 # leadership renewal until attempting to acquire leadership of a led but
29 # unrenewed leader slot. This is effectively the maximum duration that a
30 # leader can be stopped before it is replaced by another candidate.
31 # leaseDuration: 60s
32
33 # The interval between attempts by the acting master to renew a leadership
34 # slot before it stops leading. This must be less than or equal to the
35 # lease duration.
36 # renewDeadline: 40s
37
38 # The duration the clients should wait between attempting acquisition and
39 # renewal of a leadership.
40 # retryPeriod: 15s
41
42installCRDs: false
43
44replicaCount: 1
45
46strategy: {}
47 # type: RollingUpdate
48 # rollingUpdate:
49 # maxSurge: 0
50 # maxUnavailable: 1
51
52# Comma separated list of feature gates that should be enabled on the
53# controller pod.
54featureGates: ""
55
56image:
57 repository: quay.io/jetstack/cert-manager-controller
58 # You can manage a registry with
59 # registry: quay.io
60 # repository: jetstack/cert-manager-controller
61
62 # Override the image tag to deploy by setting this variable.
63 # If no value is set, the chart's appVersion will be used.
64 # tag: canary
65
66 # Setting a digest will override any tag
67 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
68 pullPolicy: IfNotPresent
69
70# Override the namespace used to store DNS provider credentials etc. for ClusterIssuer
71# resources. By default, the same namespace as cert-manager is deployed within is
72# used. This namespace will not be automatically created by the Helm chart.
73clusterResourceNamespace: ""
74
75serviceAccount:
76 # Specifies whether a service account should be created
77 create: true
78 # The name of the service account to use.
79 # If not set and create is true, a name is generated using the fullname template
80 # name: ""
81 # Optional additional annotations to add to the controller's ServiceAccount
82 # annotations: {}
83 # Automount API credentials for a Service Account.
84 automountServiceAccountToken: true
85
86# Additional command line flags to pass to cert-manager controller binary.
87# To see all available flags run docker run quay.io/jetstack/cert-manager-controller:<version> --help
88extraArgs: []
89 # When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted
90 # - --enable-certificate-owner-ref=true
91 # Use this flag to enabled or disable arbitrary controllers, for example, disable the CertificiateRequests approver
92 # - --controllers=*,-certificaterequests-approver
93
94extraEnv: []
95# - name: SOME_VAR
96# value: 'some value'
97
98resources: {}
99 # requests:
100 # cpu: 10m
101 # memory: 32Mi
102
103# Pod Security Context
104# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
105securityContext:
106 runAsNonRoot: true
107# legacy securityContext parameter format: if enabled is set to true, only fsGroup and runAsUser are supported
108# securityContext:
109# enabled: false
110# fsGroup: 1001
111# runAsUser: 1001
112# to support additional securityContext parameters, omit the `enabled` parameter and simply specify the parameters
113# you want to set, e.g.
114# securityContext:
115# fsGroup: 1000
116# runAsUser: 1000
117# runAsNonRoot: true
118
119# Container Security Context to be set on the controller component container
120# ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
121containerSecurityContext: {}
122 # capabilities:
123 # drop:
124 # - ALL
125 # readOnlyRootFilesystem: true
126 # runAsNonRoot: true
127
128
129volumes: []
130
131volumeMounts: []
132
133# Optional additional annotations to add to the controller Deployment
134# deploymentAnnotations: {}
135
136# Optional additional annotations to add to the controller Pods
137# podAnnotations: {}
138
139podLabels: {}
140
141# Optional annotations to add to the controller Service
142# serviceAnnotations: {}
143
144# Optional additional labels to add to the controller Service
145# serviceLabels: {}
146
147# Optional DNS settings, useful if you have a public and private DNS zone for
148# the same domain on Route 53. What follows is an example of ensuring
149# cert-manager can access an ingress or DNS TXT records at all times.
150# NOTE: This requires Kubernetes 1.10 or `CustomPodDNS` feature gate enabled for
151# the cluster to work.
152# podDnsPolicy: "None"
153# podDnsConfig:
154# nameservers:
155# - "1.1.1.1"
156# - "8.8.8.8"
157
158nodeSelector: {}
159
160ingressShim: {}
161 # defaultIssuerName: ""
162 # defaultIssuerKind: ""
163 # defaultIssuerGroup: ""
164
165prometheus:
166 enabled: true
167 servicemonitor:
168 enabled: false
169 prometheusInstance: default
170 targetPort: 9402
171 path: /metrics
172 interval: 60s
173 scrapeTimeout: 30s
174 labels: {}
175 honorLabels: false
176
177# Use these variables to configure the HTTP_PROXY environment variables
178# http_proxy: "http://proxy:8080"
179# https_proxy: "https://proxy:8080"
180# no_proxy: 127.0.0.1,localhost
181
182# expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#affinity-v1-core
183# for example:
184# affinity:
185# nodeAffinity:
186# requiredDuringSchedulingIgnoredDuringExecution:
187# nodeSelectorTerms:
188# - matchExpressions:
189# - key: foo.bar.com/role
190# operator: In
191# values:
192# - master
193affinity: {}
194
195# expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#toleration-v1-core
196# for example:
197# tolerations:
198# - key: foo.bar.com/role
199# operator: Equal
200# value: master
201# effect: NoSchedule
202tolerations: []
203
204webhook:
205 replicaCount: 1
206 timeoutSeconds: 10
207
208 # Used to configure options for the webhook pod.
209 # This allows setting options that'd usually be provided via flags.
210 # An APIVersion and Kind must be specified in your values.yaml file.
211 # Flags will override options that are set here.
212 config:
213 # apiVersion: webhook.config.cert-manager.io/v1alpha1
214 # kind: WebhookConfiguration
215
216 # The port that the webhook should listen on for requests.
217 # In GKE private clusters, by default kubernetes apiservers are allowed to
218 # talk to the cluster nodes only on 443 and 10250. so configuring
219 # securePort: 10250, will work out of the box without needing to add firewall
220 # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000.
221 # This should be uncommented and set as a default by the chart once we graduate
222 # the apiVersion of WebhookConfiguration past v1alpha1.
223 # securePort: 10250
224
225 strategy: {}
226 # type: RollingUpdate
227 # rollingUpdate:
228 # maxSurge: 0
229 # maxUnavailable: 1
230
231 # Pod Security Context to be set on the webhook component Pod
232 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
233 securityContext:
234 runAsNonRoot: true
235
236 # Container Security Context to be set on the webhook component container
237 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
238 containerSecurityContext: {}
239 # capabilities:
240 # drop:
241 # - ALL
242 # readOnlyRootFilesystem: true
243 # runAsNonRoot: true
244
245 # Optional additional annotations to add to the webhook Deployment
246 # deploymentAnnotations: {}
247
248 # Optional additional annotations to add to the webhook Pods
249 # podAnnotations: {}
250
251 # Optional additional annotations to add to the webhook Service
252 # serviceAnnotations: {}
253
254 # Optional additional annotations to add to the webhook MutatingWebhookConfiguration
255 # mutatingWebhookConfigurationAnnotations: {}
256
257 # Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
258 # validatingWebhookConfigurationAnnotations: {}
259
260 # Additional command line flags to pass to cert-manager webhook binary.
261 # To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:<version> --help
262 extraArgs: []
263 # Path to a file containing a WebhookConfiguration object used to configure the webhook
264 # - --config=<path-to-config-file>
265
266 resources: {}
267 # requests:
268 # cpu: 10m
269 # memory: 32Mi
270
271 ## Liveness and readiness probe values
272 ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
273 ##
274 livenessProbe:
275 failureThreshold: 3
276 initialDelaySeconds: 60
277 periodSeconds: 10
278 successThreshold: 1
279 timeoutSeconds: 1
280 readinessProbe:
281 failureThreshold: 3
282 initialDelaySeconds: 5
283 periodSeconds: 5
284 successThreshold: 1
285 timeoutSeconds: 1
286
287 nodeSelector: {}
288
289 affinity: {}
290
291 tolerations: []
292
293 # Optional additional labels to add to the Webhook Pods
294 podLabels: {}
295
296 # Optional additional labels to add to the Webhook Service
297 serviceLabels: {}
298
299 image:
300 repository: quay.io/jetstack/cert-manager-webhook
301 # You can manage a registry with
302 # registry: quay.io
303 # repository: jetstack/cert-manager-webhook
304
305 # Override the image tag to deploy by setting this variable.
306 # If no value is set, the chart's appVersion will be used.
307 # tag: canary
308
309 # Setting a digest will override any tag
310 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
311
312 pullPolicy: IfNotPresent
313
314 serviceAccount:
315 # Specifies whether a service account should be created
316 create: true
317 # The name of the service account to use.
318 # If not set and create is true, a name is generated using the fullname template
319 # name: ""
320 # Optional additional annotations to add to the controller's ServiceAccount
321 # annotations: {}
322 # Automount API credentials for a Service Account.
323 automountServiceAccountToken: true
324
325 # The port that the webhook should listen on for requests.
326 # In GKE private clusters, by default kubernetes apiservers are allowed to
327 # talk to the cluster nodes only on 443 and 10250. so configuring
328 # securePort: 10250, will work out of the box without needing to add firewall
329 # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
330 securePort: 10250
331
332 # Specifies if the webhook should be started in hostNetwork mode.
333 #
334 # Required for use in some managed kubernetes clusters (such as AWS EKS) with custom
335 # CNI (such as calico), because control-plane managed by AWS cannot communicate
336 # with pods' IP CIDR and admission webhooks are not working
337 #
338 # Since the default port for the webhook conflicts with kubelet on the host
339 # network, `webhook.securePort` should be changed to an available port if
340 # running in hostNetwork mode.
341 hostNetwork: false
342
343 # Specifies how the service should be handled. Useful if you want to expose the
344 # webhook to outside of the cluster. In some cases, the control plane cannot
345 # reach internal services.
346 serviceType: ClusterIP
347 # loadBalancerIP:
348
349 # Overrides the mutating webhook and validating webhook so they reach the webhook
350 # service using the `url` field instead of a service.
351 url: {}
352 # host:
353
354cainjector:
355 enabled: true
356 replicaCount: 1
357
358 strategy: {}
359 # type: RollingUpdate
360 # rollingUpdate:
361 # maxSurge: 0
362 # maxUnavailable: 1
363
364 # Pod Security Context to be set on the cainjector component Pod
365 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
366 securityContext:
367 runAsNonRoot: true
368
369 # Container Security Context to be set on the cainjector component container
370 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
371 containerSecurityContext: {}
372 # capabilities:
373 # drop:
374 # - ALL
375 # readOnlyRootFilesystem: true
376 # runAsNonRoot: true
377
378
379 # Optional additional annotations to add to the cainjector Deployment
380 # deploymentAnnotations: {}
381
382 # Optional additional annotations to add to the cainjector Pods
383 # podAnnotations: {}
384
385 # Additional command line flags to pass to cert-manager cainjector binary.
386 # To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:<version> --help
387 extraArgs: []
388 # Enable profiling for cainjector
389 # - --enable-profiling=true
390
391 resources: {}
392 # requests:
393 # cpu: 10m
394 # memory: 32Mi
395
396 nodeSelector: {}
397
398 affinity: {}
399
400 tolerations: []
401
402 # Optional additional labels to add to the CA Injector Pods
403 podLabels: {}
404
405 image:
406 repository: quay.io/jetstack/cert-manager-cainjector
407 # You can manage a registry with
408 # registry: quay.io
409 # repository: jetstack/cert-manager-cainjector
410
411 # Override the image tag to deploy by setting this variable.
412 # If no value is set, the chart's appVersion will be used.
413 # tag: canary
414
415 # Setting a digest will override any tag
416 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
417
418 pullPolicy: IfNotPresent
419
420 serviceAccount:
421 # Specifies whether a service account should be created
422 create: true
423 # The name of the service account to use.
424 # If not set and create is true, a name is generated using the fullname template
425 # name: ""
426 # Optional additional annotations to add to the controller's ServiceAccount
427 # annotations: {}
428 # Automount API credentials for a Service Account.
429 automountServiceAccountToken: true
430
431# This startupapicheck is a Helm post-install hook that waits for the webhook
432# endpoints to become available.
433# The check is implemented using a Kubernetes Job- if you are injecting mesh
434# sidecar proxies into cert-manager pods, you probably want to ensure that they
435# are not injected into this Job's pod. Otherwise the installation may time out
436# due to the Job never being completed because the sidecar proxy does not exit.
437# See https://github.com/jetstack/cert-manager/pull/4414 for context.
438startupapicheck:
439 enabled: true
440
441 # Pod Security Context to be set on the startupapicheck component Pod
442 # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
443 securityContext:
444 runAsNonRoot: true
445
446 # Timeout for 'kubectl check api' command
447 timeout: 1m
448
449 # Job backoffLimit
450 backoffLimit: 4
451
452 # Optional additional annotations to add to the startupapicheck Job
453 jobAnnotations:
454 helm.sh/hook: post-install
455 helm.sh/hook-weight: "1"
456 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
457
458 # Optional additional annotations to add to the startupapicheck Pods
459 # podAnnotations: {}
460
461 # Additional command line flags to pass to startupapicheck binary.
462 # To see all available flags run docker run quay.io/jetstack/cert-manager-ctl:<version> --help
463 extraArgs: []
464
465 resources: {}
466 # requests:
467 # cpu: 10m
468 # memory: 32Mi
469
470 nodeSelector: {}
471
472 affinity: {}
473
474 tolerations: []
475
476 # Optional additional labels to add to the startupapicheck Pods
477 podLabels: {}
478
479 image:
480 repository: quay.io/jetstack/cert-manager-ctl
481 # You can manage a registry with
482 # registry: quay.io
483 # repository: jetstack/cert-manager-ctl
484
485 # Override the image tag to deploy by setting this variable.
486 # If no value is set, the chart's appVersion will be used.
487 # tag: canary
488
489 # Setting a digest will override any tag
490 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
491
492 pullPolicy: IfNotPresent
493
494 rbac:
495 # annotations for the startup API Check job RBAC and PSP resources
496 annotations:
497 helm.sh/hook: post-install
498 helm.sh/hook-weight: "-5"
499 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
500
501 serviceAccount:
502 # Specifies whether a service account should be created
503 create: true
504
505 # The name of the service account to use.
506 # If not set and create is true, a name is generated using the fullname template
507 # name: ""
508
509 # Optional additional annotations to add to the Job's ServiceAccount
510 annotations:
511 helm.sh/hook: post-install
512 helm.sh/hook-weight: "-5"
513 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
514
515 # Automount API credentials for a Service Account.
516 automountServiceAccountToken: true