initial migration
This commit is contained in:
		
							
								
								
									
										54
									
								
								unused/cert-manager/cluster-issuer.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										54
									
								
								unused/cert-manager/cluster-issuer.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,54 @@ | ||||
| # apiVersion: v1 | ||||
| # kind: Secret | ||||
| # metadata: | ||||
| #   name: cloudflare-api-token-secret | ||||
| #   namespace: cert-manager | ||||
| # type: Opaque | ||||
| # stringData: | ||||
| #   api-token:  | ||||
|  | ||||
|  | ||||
| # --- | ||||
|  | ||||
| apiVersion: cert-manager.io/v1 | ||||
| kind: ClusterIssuer | ||||
| metadata: | ||||
|   name: cloudflare-letsencrypt-staging | ||||
| spec: | ||||
|   acme: | ||||
|     email: me@moll.re | ||||
|     server: https://acme-staging-v02.api.letsencrypt.org/directory | ||||
|     privateKeySecretRef: | ||||
|       # Secret resource that will be used to store the account's private key. | ||||
|       name: cloudflare-letsencrypt-issuer-account-key | ||||
|     solvers: | ||||
|     - dns01: | ||||
|         cloudflare: | ||||
|           email: mollator2@gmail.com | ||||
|           apiTokenSecretRef: | ||||
|             # Name of the secret created on the other resource | ||||
|             name: cloudflare-api-token-secret | ||||
|             key: api-token | ||||
|  | ||||
| --- | ||||
|  | ||||
| apiVersion: cert-manager.io/v1 | ||||
| kind: ClusterIssuer | ||||
| metadata: | ||||
|   name: cloudflare-letsencrypt-prod | ||||
| spec: | ||||
|   acme: | ||||
|     email: me@moll.re | ||||
|     server: https://acme-v02.api.letsencrypt.org/directory | ||||
|     privateKeySecretRef: | ||||
|       # Secret resource that will be used to store the account's private key. | ||||
|       name: cloudflare-letsencrypt-issuer-account-key | ||||
|     solvers: | ||||
|     - dns01: | ||||
|         cloudflare: | ||||
|           email: mollator2@gmail.com | ||||
|           apiTokenSecretRef: | ||||
|             # Name of the secret created on the other resource | ||||
|             name: cloudflare-api-token-secret | ||||
|             key: api-token | ||||
|  | ||||
							
								
								
									
										494
									
								
								unused/cert-manager/values.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										494
									
								
								unused/cert-manager/values.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,494 @@ | ||||
| # Default values for cert-manager. | ||||
| # This is a YAML-formatted file. | ||||
| # Declare variables to be passed into your templates. | ||||
| global: | ||||
|   ## Reference to one or more secrets to be used when pulling images | ||||
|   ## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ | ||||
|   ## | ||||
|   imagePullSecrets: [] | ||||
|   # - name: "image-pull-secret" | ||||
|  | ||||
|   # Optional priority class to be used for the cert-manager pods | ||||
|   priorityClassName: "" | ||||
|   rbac: | ||||
|     create: true | ||||
|  | ||||
|   podSecurityPolicy: | ||||
|     enabled: false | ||||
|     useAppArmor: true | ||||
|  | ||||
|   # Set the verbosity of cert-manager. Range of 0 - 6 with 6 being the most verbose. | ||||
|   logLevel: 2 | ||||
|  | ||||
|   leaderElection: | ||||
|     # Override the namespace used to store the ConfigMap for leader election | ||||
|     namespace: "kube-system" | ||||
|  | ||||
|     # The duration that non-leader candidates will wait after observing a | ||||
|     # leadership renewal until attempting to acquire leadership of a led but | ||||
|     # unrenewed leader slot. This is effectively the maximum duration that a | ||||
|     # leader can be stopped before it is replaced by another candidate. | ||||
|     # leaseDuration: 60s | ||||
|  | ||||
|     # The interval between attempts by the acting master to renew a leadership | ||||
|     # slot before it stops leading. This must be less than or equal to the | ||||
|     # lease duration. | ||||
|     # renewDeadline: 40s | ||||
|  | ||||
|     # The duration the clients should wait between attempting acquisition and | ||||
|     # renewal of a leadership. | ||||
|     # retryPeriod: 15s | ||||
|  | ||||
| installCRDs: false | ||||
|  | ||||
| replicaCount: 1 | ||||
|  | ||||
| strategy: {} | ||||
|   # type: RollingUpdate | ||||
|   # rollingUpdate: | ||||
|   #   maxSurge: 0 | ||||
|   #   maxUnavailable: 1 | ||||
|  | ||||
| # Comma separated list of feature gates that should be enabled on the | ||||
| # controller pod. | ||||
| featureGates: "" | ||||
|  | ||||
| image: | ||||
|   repository: quay.io/jetstack/cert-manager-controller | ||||
|   # You can manage a registry with | ||||
|   # registry: quay.io | ||||
|   # repository: jetstack/cert-manager-controller | ||||
|  | ||||
|   # Override the image tag to deploy by setting this variable. | ||||
|   # If no value is set, the chart's appVersion will be used. | ||||
|   # tag: canary | ||||
|  | ||||
|   # Setting a digest will override any tag | ||||
|   # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20 | ||||
|   pullPolicy: IfNotPresent | ||||
|  | ||||
| # Override the namespace used to store DNS provider credentials etc. for ClusterIssuer | ||||
| # resources. By default, the same namespace as cert-manager is deployed within is | ||||
| # used. This namespace will not be automatically created by the Helm chart. | ||||
| clusterResourceNamespace: "" | ||||
|  | ||||
| serviceAccount: | ||||
|   # Specifies whether a service account should be created | ||||
|   create: true | ||||
|   # The name of the service account to use. | ||||
|   # If not set and create is true, a name is generated using the fullname template | ||||
|   # name: "" | ||||
|   # Optional additional annotations to add to the controller's ServiceAccount | ||||
|   # annotations: {} | ||||
|   # Automount API credentials for a Service Account. | ||||
|   automountServiceAccountToken: true | ||||
|  | ||||
| # Optional additional arguments | ||||
| extraArgs: [] | ||||
|   # Use this flag to set a namespace that cert-manager will use to store | ||||
|   # supporting resources required for each ClusterIssuer (default is kube-system) | ||||
|   # - --cluster-resource-namespace=kube-system | ||||
|   # When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted | ||||
|   # - --enable-certificate-owner-ref=true | ||||
|   # Use this flag to enabled or disable arbitrary controllers, for example, disable the CertificiateRequests approver | ||||
|   # - --controllers=*,-certificaterequests-approver | ||||
|  | ||||
| extraEnv: [] | ||||
| # - name: SOME_VAR | ||||
| #   value: 'some value' | ||||
|  | ||||
| resources: {} | ||||
|   # requests: | ||||
|   #   cpu: 10m | ||||
|   #   memory: 32Mi | ||||
|  | ||||
| # Pod Security Context | ||||
| # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ | ||||
| securityContext: | ||||
|   runAsNonRoot: true | ||||
| # legacy securityContext parameter format: if enabled is set to true, only fsGroup and runAsUser are supported | ||||
| # securityContext: | ||||
| #   enabled: false | ||||
| #   fsGroup: 1001 | ||||
| #   runAsUser: 1001 | ||||
| # to support additional securityContext parameters, omit the `enabled` parameter and simply specify the parameters | ||||
| # you want to set, e.g. | ||||
| # securityContext: | ||||
| #   fsGroup: 1000 | ||||
| #   runAsUser: 1000 | ||||
| #   runAsNonRoot: true | ||||
|  | ||||
| # Container Security Context to be set on the controller component container | ||||
| # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ | ||||
| containerSecurityContext: {} | ||||
|   # capabilities: | ||||
|   #   drop: | ||||
|   #   - ALL | ||||
|   # readOnlyRootFilesystem: true | ||||
|   # runAsNonRoot: true | ||||
|  | ||||
|  | ||||
| volumes: [] | ||||
|  | ||||
| volumeMounts: [] | ||||
|  | ||||
| # Optional additional annotations to add to the controller Deployment | ||||
| # deploymentAnnotations: {} | ||||
|  | ||||
| # Optional additional annotations to add to the controller Pods | ||||
| # podAnnotations: {} | ||||
|  | ||||
| podLabels: {} | ||||
|  | ||||
| # Optional additional labels to add to the controller Service | ||||
| # serviceLabels: {} | ||||
|  | ||||
| # Optional additional annotations to add to the controller service | ||||
| # serviceAnnotations: {} | ||||
|  | ||||
| # Optional DNS settings, useful if you have a public and private DNS zone for | ||||
| # the same domain on Route 53. What follows is an example of ensuring | ||||
| # cert-manager can access an ingress or DNS TXT records at all times. | ||||
| # NOTE: This requires Kubernetes 1.10 or `CustomPodDNS` feature gate enabled for | ||||
| # the cluster to work. | ||||
| # podDnsPolicy: "None" | ||||
| # podDnsConfig: | ||||
| #   nameservers: | ||||
| #     - "1.1.1.1" | ||||
| #     - "8.8.8.8" | ||||
|  | ||||
| nodeSelector: {} | ||||
|  | ||||
| ingressShim: {} | ||||
|   # defaultIssuerName: "" | ||||
|   # defaultIssuerKind: "" | ||||
|   # defaultIssuerGroup: "" | ||||
|  | ||||
| prometheus: | ||||
|   enabled: true | ||||
|   servicemonitor: | ||||
|     enabled: false | ||||
|     prometheusInstance: default | ||||
|     targetPort: 9402 | ||||
|     path: /metrics | ||||
|     interval: 60s | ||||
|     scrapeTimeout: 30s | ||||
|     labels: {} | ||||
|  | ||||
| # Use these variables to configure the HTTP_PROXY environment variables | ||||
| # http_proxy: "http://proxy:8080" | ||||
| # https_proxy: "https://proxy:8080" | ||||
| # no_proxy: 127.0.0.1,localhost | ||||
|  | ||||
| # expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#affinity-v1-core | ||||
| # for example: | ||||
| #   affinity: | ||||
| #     nodeAffinity: | ||||
| #      requiredDuringSchedulingIgnoredDuringExecution: | ||||
| #        nodeSelectorTerms: | ||||
| #        - matchExpressions: | ||||
| #          - key: foo.bar.com/role | ||||
| #            operator: In | ||||
| #            values: | ||||
| #            - master | ||||
| affinity: {} | ||||
|  | ||||
| # expects input structure as per specification https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.11/#toleration-v1-core | ||||
| # for example: | ||||
| #   tolerations: | ||||
| #   - key: foo.bar.com/role | ||||
| #     operator: Equal | ||||
| #     value: master | ||||
| #     effect: NoSchedule | ||||
| tolerations: [] | ||||
|  | ||||
| webhook: | ||||
|   replicaCount: 1 | ||||
|   timeoutSeconds: 10 | ||||
|  | ||||
|   strategy: {} | ||||
|     # type: RollingUpdate | ||||
|     # rollingUpdate: | ||||
|     #   maxSurge: 0 | ||||
|     #   maxUnavailable: 1 | ||||
|  | ||||
|   # Pod Security Context to be set on the webhook component Pod | ||||
|   # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ | ||||
|   securityContext: | ||||
|     runAsNonRoot: true | ||||
|  | ||||
|   # Container Security Context to be set on the webhook component container | ||||
|   # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ | ||||
|   containerSecurityContext: {} | ||||
|     # capabilities: | ||||
|     #   drop: | ||||
|     #   - ALL | ||||
|     # readOnlyRootFilesystem: true | ||||
|     # runAsNonRoot: true | ||||
|  | ||||
|   # Optional additional annotations to add to the webhook Deployment | ||||
|   # deploymentAnnotations: {} | ||||
|  | ||||
|   # Optional additional annotations to add to the webhook Pods | ||||
|   # podAnnotations: {} | ||||
|  | ||||
|   # Optional additional annotations to add to the webhook MutatingWebhookConfiguration | ||||
|   # mutatingWebhookConfigurationAnnotations: {} | ||||
|  | ||||
|   # Optional additional annotations to add to the webhook ValidatingWebhookConfiguration | ||||
|   # validatingWebhookConfigurationAnnotations: {} | ||||
|  | ||||
|   # Optional additional annotations to add to the webhook service | ||||
|   # serviceAnnotations: {} | ||||
|  | ||||
|   # Optional additional arguments for webhook | ||||
|   extraArgs: [] | ||||
|  | ||||
|   resources: {} | ||||
|     # requests: | ||||
|     #   cpu: 10m | ||||
|     #   memory: 32Mi | ||||
|  | ||||
|   ## Liveness and readiness probe values | ||||
|   ## Ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes | ||||
|   ## | ||||
|   livenessProbe: | ||||
|     failureThreshold: 3 | ||||
|     initialDelaySeconds: 60 | ||||
|     periodSeconds: 10 | ||||
|     successThreshold: 1 | ||||
|     timeoutSeconds: 1 | ||||
|   readinessProbe: | ||||
|     failureThreshold: 3 | ||||
|     initialDelaySeconds: 5 | ||||
|     periodSeconds: 5 | ||||
|     successThreshold: 1 | ||||
|     timeoutSeconds: 1 | ||||
|  | ||||
|   nodeSelector: {} | ||||
|  | ||||
|   affinity: {} | ||||
|  | ||||
|   tolerations: [] | ||||
|  | ||||
|   # Optional additional labels to add to the Webhook Pods | ||||
|   podLabels: {} | ||||
|  | ||||
|   # Optional additional labels to add to the Webhook Service | ||||
|   serviceLabels: {} | ||||
|  | ||||
|   image: | ||||
|     repository: quay.io/jetstack/cert-manager-webhook | ||||
|     # You can manage a registry with | ||||
|     # registry: quay.io | ||||
|     # repository: jetstack/cert-manager-webhook | ||||
|  | ||||
|     # Override the image tag to deploy by setting this variable. | ||||
|     # If no value is set, the chart's appVersion will be used. | ||||
|     # tag: canary | ||||
|  | ||||
|     # Setting a digest will override any tag | ||||
|     # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20 | ||||
|  | ||||
|     pullPolicy: IfNotPresent | ||||
|  | ||||
|   serviceAccount: | ||||
|     # Specifies whether a service account should be created | ||||
|     create: true | ||||
|     # The name of the service account to use. | ||||
|     # If not set and create is true, a name is generated using the fullname template | ||||
|     # name: "" | ||||
|     # Optional additional annotations to add to the controller's ServiceAccount | ||||
|     # annotations: {} | ||||
|     # Automount API credentials for a Service Account. | ||||
|     automountServiceAccountToken: true | ||||
|  | ||||
|   # The port that the webhook should listen on for requests. | ||||
|   # In GKE private clusters, by default kubernetes apiservers are allowed to | ||||
|   # talk to the cluster nodes only on 443 and 10250. so configuring | ||||
|   # securePort: 10250, will work out of the box without needing to add firewall | ||||
|   # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000 | ||||
|   securePort: 10250 | ||||
|  | ||||
|   # Specifies if the webhook should be started in hostNetwork mode. | ||||
|   # | ||||
|   # Required for use in some managed kubernetes clusters (such as AWS EKS) with custom | ||||
|   # CNI (such as calico), because control-plane managed by AWS cannot communicate | ||||
|   # with pods' IP CIDR and admission webhooks are not working | ||||
|   # | ||||
|   # Since the default port for the webhook conflicts with kubelet on the host | ||||
|   # network, `webhook.securePort` should be changed to an available port if | ||||
|   # running in hostNetwork mode. | ||||
|   hostNetwork: false | ||||
|  | ||||
|   # Specifies how the service should be handled. Useful if you want to expose the | ||||
|   # webhook to outside of the cluster. In some cases, the control plane cannot | ||||
|   # reach internal services. | ||||
|   serviceType: ClusterIP | ||||
|   # loadBalancerIP: | ||||
|  | ||||
|   # Overrides the mutating webhook and validating webhook so they reach the webhook | ||||
|   # service using the `url` field instead of a service. | ||||
|   url: {} | ||||
|     # host: | ||||
|  | ||||
| cainjector: | ||||
|   enabled: true | ||||
|   replicaCount: 1 | ||||
|  | ||||
|   strategy: {} | ||||
|     # type: RollingUpdate | ||||
|     # rollingUpdate: | ||||
|     #   maxSurge: 0 | ||||
|     #   maxUnavailable: 1 | ||||
|  | ||||
|   # Pod Security Context to be set on the cainjector component Pod | ||||
|   # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ | ||||
|   securityContext: | ||||
|     runAsNonRoot: true | ||||
|  | ||||
|   # Container Security Context to be set on the cainjector component container | ||||
|   # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ | ||||
|   containerSecurityContext: {} | ||||
|     # capabilities: | ||||
|     #   drop: | ||||
|     #   - ALL | ||||
|     # readOnlyRootFilesystem: true | ||||
|     # runAsNonRoot: true | ||||
|  | ||||
|  | ||||
|   # Optional additional annotations to add to the cainjector Deployment | ||||
|   # deploymentAnnotations: {} | ||||
|  | ||||
|   # Optional additional annotations to add to the cainjector Pods | ||||
|   # podAnnotations: {} | ||||
|  | ||||
|   # Optional additional arguments for cainjector | ||||
|   extraArgs: [] | ||||
|  | ||||
|   resources: {} | ||||
|     # requests: | ||||
|     #   cpu: 10m | ||||
|     #   memory: 32Mi | ||||
|  | ||||
|   nodeSelector: {} | ||||
|  | ||||
|   affinity: {} | ||||
|  | ||||
|   tolerations: [] | ||||
|  | ||||
|   # Optional additional labels to add to the CA Injector Pods | ||||
|   podLabels: {} | ||||
|  | ||||
|   image: | ||||
|     repository: quay.io/jetstack/cert-manager-cainjector | ||||
|     # You can manage a registry with | ||||
|     # registry: quay.io | ||||
|     # repository: jetstack/cert-manager-cainjector | ||||
|  | ||||
|     # Override the image tag to deploy by setting this variable. | ||||
|     # If no value is set, the chart's appVersion will be used. | ||||
|     # tag: canary | ||||
|  | ||||
|     # Setting a digest will override any tag | ||||
|     # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20 | ||||
|  | ||||
|     pullPolicy: IfNotPresent | ||||
|  | ||||
|   serviceAccount: | ||||
|     # Specifies whether a service account should be created | ||||
|     create: true | ||||
|     # The name of the service account to use. | ||||
|     # If not set and create is true, a name is generated using the fullname template | ||||
|     # name: "" | ||||
|     # Optional additional annotations to add to the controller's ServiceAccount | ||||
|     # annotations: {} | ||||
|     # Automount API credentials for a Service Account. | ||||
|     automountServiceAccountToken: true | ||||
|  | ||||
| # This startupapicheck is a Helm post-install hook that waits for the webhook | ||||
| # endpoints to become available. | ||||
| # The check is implemented using a Kubernetes Job- if you are injecting mesh | ||||
| # sidecar proxies into cert-manager pods, you probably want to ensure that they | ||||
| # are not injected into this Job's pod. Otherwise the installation may time out | ||||
| # due to the Job never being completed because the sidecar proxy does not exit. | ||||
| # See https://github.com/jetstack/cert-manager/pull/4414 for context. | ||||
| startupapicheck: | ||||
|   enabled: true | ||||
|  | ||||
|   # Pod Security Context to be set on the startupapicheck component Pod | ||||
|   # ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ | ||||
|   securityContext: | ||||
|     runAsNonRoot: true | ||||
|  | ||||
|   # Timeout for 'kubectl check api' command | ||||
|   timeout: 1m | ||||
|  | ||||
|   # Job backoffLimit | ||||
|   backoffLimit: 4 | ||||
|  | ||||
|   # Optional additional annotations to add to the startupapicheck Job | ||||
|   jobAnnotations: | ||||
|     helm.sh/hook: post-install | ||||
|     helm.sh/hook-weight: "1" | ||||
|     helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded | ||||
|  | ||||
|   # Optional additional annotations to add to the startupapicheck Pods | ||||
|   # podAnnotations: {} | ||||
|  | ||||
|   # Optional additional arguments for startupapicheck | ||||
|   extraArgs: [] | ||||
|  | ||||
|   resources: {} | ||||
|     # requests: | ||||
|     #   cpu: 10m | ||||
|     #   memory: 32Mi | ||||
|  | ||||
|   nodeSelector: {} | ||||
|  | ||||
|   affinity: {} | ||||
|  | ||||
|   tolerations: [] | ||||
|  | ||||
|   # Optional additional labels to add to the startupapicheck Pods | ||||
|   podLabels: {} | ||||
|  | ||||
|   image: | ||||
|     repository: quay.io/jetstack/cert-manager-ctl | ||||
|     # You can manage a registry with | ||||
|     # registry: quay.io | ||||
|     # repository: jetstack/cert-manager-ctl | ||||
|  | ||||
|     # Override the image tag to deploy by setting this variable. | ||||
|     # If no value is set, the chart's appVersion will be used. | ||||
|     # tag: canary | ||||
|  | ||||
|     # Setting a digest will override any tag | ||||
|     # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20 | ||||
|  | ||||
|     pullPolicy: IfNotPresent | ||||
|  | ||||
|   rbac: | ||||
|     # annotations for the startup API Check job RBAC and PSP resources | ||||
|     annotations: | ||||
|       helm.sh/hook: post-install | ||||
|       helm.sh/hook-weight: "-5" | ||||
|       helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded | ||||
|  | ||||
|   serviceAccount: | ||||
|     # Specifies whether a service account should be created | ||||
|     create: true | ||||
|  | ||||
|     # The name of the service account to use. | ||||
|     # If not set and create is true, a name is generated using the fullname template | ||||
|     # name: "" | ||||
|  | ||||
|     # Optional additional annotations to add to the Job's ServiceAccount | ||||
|     annotations: | ||||
|       helm.sh/hook: post-install | ||||
|       helm.sh/hook-weight: "-5" | ||||
|       helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded | ||||
|  | ||||
|     # Automount API credentials for a Service Account. | ||||
|     automountServiceAccountToken: true | ||||
|  | ||||
		Reference in New Issue
	
	Block a user