Skip to content

Commit bcdf36c

Browse files
committed
🎉 add support for profiles
🌿 improve readability of `values.yaml`
1 parent 23fd601 commit bcdf36c

File tree

2 files changed

+52
-2
lines changed

2 files changed

+52
-2
lines changed

charts/cert-manager-webhook-ovh/templates/issuer.yaml

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,9 @@ spec:
2121
{{- if .email }}
2222
email: {{ .email | quote }}
2323
{{- end }}
24+
{{- if .profile }}
25+
profile: {{ .profile | quote }}
26+
{{- end }}
2427
{{- if .externalAccountBinding }}
2528
externalAccountBinding:
2629
keyID: {{ .externalAccountBinding.keyID | quote }}

charts/cert-manager-webhook-ovh/values.yaml

Lines changed: 49 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -27,31 +27,45 @@ certManager:
2727
# cert-manager serverAccount name (default: cert-manager)
2828
serviceAccountName: cert-manager
2929

30+
# One or more issuers to create
3031
issuers:
32+
3133
# Name of this issuer
3234
- name: le-prod
35+
3336
# When true this issuer is created.
3437
# This is disabled by default
3538
create: false
39+
3640
# Type of issuer. Can either be ClusterIssuer or Issuer.
3741
# If issuer is specified, the namespace is required.
3842
# See for more information https://cert-manager.io/docs/concepts/issuer/
3943
kind: ClusterIssuer
44+
4045
# If kind is issuer, then indicate the namespace in which this
4146
# issuer should be deployed into.
4247
namespace: default
48+
4349
# Follow CNAME records or not. 2 options:
4450
# - None (default): Don't follow CNAME records
4551
# - Follow: Follow CNAME records
4652
# See https://cert-manager.io/docs/configuration/acme/dns01/#delegated-domains-for-dns01 for more information
4753
cnameStrategy: None
54+
4855
# The acme server url. For Let's encrypt, you have 2 options:
4956
# - for production (default): https://acme-v02.api.letsencrypt.org/directory
5057
# - for staging: https://acme-staging-v02.api.letsencrypt.org/directory
5158
acmeServerUrl: https://acme-v02.api.letsencrypt.org/directory
59+
5260
# email to use when registrering your account with Let's encrypt.
5361
54-
# define the eab (external account binding) key using secretRef.
62+
63+
# If the ACME server supports profiles, you can specify the profile name here.
64+
# For more details, see https://cert-manager.io/docs/configuration/acme/#acme-certificate-profiles
65+
# Available as of Cert Manager 1.18.0
66+
# profile: classic # classic, tlsserver, shortlived
67+
68+
# Define the eab (external account binding) key using secretRef.
5569
# This is optional and only required if you want to use.
5670
# See https://cert-manager.io/docs/configuration/acme/#external-account-bindings for more information
5771
# externalAccountBinding:
@@ -63,20 +77,24 @@ issuers:
6377
# name: <secret-name>
6478
# # The key name in the secret above that holds the actual eab hmac key value
6579
# key: keySecret
80+
6681
# The endpoint name of the OVH API. It must be one of the following:
6782
# ovh-eu, ovh-ca, kimsufi-eu, kimsufi-ca, soyoustart-eu, soyoustart-ca, runabove-ca
6883
# See https://docs.certifytheweb.com/docs/dns/providers/ovh/ for more information
6984
ovhEndpointName: ovh-eu
85+
7086
# Authentication method (possible values: application or oauth2)
7187
ovhAuthenticationMethod: application
7288
# define how the webhook should authenticate with the OVH API.
7389
# Either set your credentials and the chart will create the necessary secret for you.
7490
# Or provide the details of a secret already containing the OVH credentials.
7591
# ovhAuthentication:
92+
7693
# # the OVH OAuth 2 client ID. Leave empty if you are using an existing secret.
7794
# oauth2ClientID: ''
7895
# # the OVH OAuth 2 client secret. Leave empty if you are using an existing secret.
7996
# oauth2ClientSecret: ''
97+
8098
# # the OVH application key. Leave emtpy if you are using an existing secret.
8199
# applicationKey: ''
82100
# # the OVH application secret. Leave emtpy if you are using an existing secret.
@@ -88,30 +106,36 @@ issuers:
88106
# in the same namespace as this deployment. If 'kind' is an Issuer,
89107
# then the secret needs to be present in the same namespace as the Issuer.
90108
# ovhAuthenticationRef:
109+
91110
# # The secret reference to an existing OVH OAuth 2 client ID.
92111
# oauth2ClientIDRef:
112+
93113
# # Name of the Kubernetes secret containing the OVH OAuth 2 client ID
94114
# name: ovh-credentials
95115
# # The key name in the secret above that holds the actual OVH OAuth 2 client IDvalue
96116
# key: oauth2ClientID
117+
97118
# # The secret reference to an existing OVH Auth 2 client secret.
98119
# oauth2ClientSecretRef:
99120
# # Name of the Kubernetes secret containing the OVH Auth 2 client secret
100121
# name: ovh-credentials
101122
# # The key name in the secret above that holds the actual OVH Auth 2 client secret value
102123
# key: oauth2ClientSecret
124+
103125
# # The secret reference to an existing OVH application key.
104126
# applicationKeyRef:
105127
# # Name of the Kubernetes secret containing the OVH Application Key
106128
# name: ovh-credentials
107129
# # The key name in the secret above that holds the actual OVH application key value
108130
# key: applicationKey
131+
109132
# # The secret reference to an existing OVH application secret.
110133
# applicationSecretRef:
111134
# # Name of the Kubernetes secret containing the OVH Application Secret
112135
# name: ovh-credentials
113136
# # The key name in the secret above that holds the actual OVH application secret value
114137
# key: applicationSecret
138+
115139
# # The secret reference to an existing OVH consumer key
116140
# applicationConsumerKeyRef:
117141
# # Name of the Kubernetes secret containing the OVH consumer Key
@@ -121,28 +145,41 @@ issuers:
121145

122146
# Name of this issuer
123147
- name: le-staging
148+
124149
# When true this issuer is created.
125150
# This is disabled by default
126151
create: false
152+
127153
# Type of issuer. Can either be ClusterIssuer or Issuer.
128154
# If issuer is specified, the the namespace is required.
129155
# See for more information https://cert-manager.io/docs/concepts/issuer/
130156
kind: ClusterIssuer
157+
131158
# If kind is issuer, then indicate the namespace in which this
132159
# issuer should be deployed into.
133160
namespace: default
161+
134162
# Follow CNAME records or not. 2 options:
135163
# - None (default): Don't follow CNAME records
136164
# - Follow: Follow CNAME records
137165
# See https://cert-manager.io/docs/configuration/acme/dns01/#delegated-domains-for-dns01 for more information
138166
cnameStrategy: None
167+
139168
# The acme server url. For Let's encrypt, you have 2 options:
140169
# - for production (default): https://acme-v02.api.letsencrypt.org/directory
141170
# - for staging: https://acme-staging-v02.api.letsencrypt.org/directory
142171
acmeServerUrl: https://acme-staging-v02.api.letsencrypt.org/directory
172+
143173
# email to use when registering your account with Let's encrypt.
144174
145-
# define the eab (external account binding) key using secretRef.
175+
176+
# If the ACME server supports profiles, you can specify the profile name here.
177+
# For more details, see https://cert-manager.io/docs/configuration/acme/#acme-certificate-profiles
178+
# Run the command `curl -fsSL https://acme-v02.api.letsencrypt.org/directory` and inpsect the object `profiles`.
179+
# Available as of Cert Manager 1.18.0
180+
# profile: classic # classic, tlsserver, shortlived
181+
182+
# Define the eab (external account binding) key using secretRef.
146183
# This is optional and only required if you want to use.
147184
# See https://cert-manager.io/docs/configuration/acme/#external-account-bindings for more information
148185
# externalAccountBinding:
@@ -154,20 +191,25 @@ issuers:
154191
# name: <secret-name>
155192
# # The key name in the secret above that holds the actual eab hmac key value
156193
# key: keySecret
194+
157195
# The endpoint name of the OVH API. It must be one of the following:
158196
# ovh-eu, ovh-ca, kimsufi-eu, kimsufi-ca, soyoustart-eu, soyoustart-ca, runabove-ca
159197
# See https://docs.certifytheweb.com/docs/dns/providers/ovh/ for more information
160198
ovhEndpointName: ovh-eu
199+
161200
# Authentication method (possible values: application or oauth2)
162201
ovhAuthenticationMethod: application
202+
163203
# define how the webhook should authenticate with the OVH API.
164204
# Either set your credentials and the chart will create the necessary secret for you.
165205
# Or provide the details of a secret already containing the OVH credentials.
166206
# ovhAuthentication:
207+
167208
# # the OVH OAuth 2 client ID. Leave empty if you are using an existing secret.
168209
# oauth2ClientID: ''
169210
# # the OVH OAuth 2 client secret. Leave empty if you are using an existing secret.
170211
# oauth2ClientSecret: ''
212+
171213
# # the OVH application key. Leave emtpy if you are using an existing secret.
172214
# applicationKey: ''
173215
# # the OVH application secret. Leave emtpy if you are using an existing secret.
@@ -179,30 +221,35 @@ issuers:
179221
# in the same namespace as this deployment. If 'kind' is an Issuer,
180222
# then the secret needs to be present in the same namespace as the Issuer.
181223
# ovhAuthenticationRef:
224+
182225
# # The secret reference to an existing OVH OAuth 2 client ID.
183226
# oauth2ClientIDRef:
184227
# # Name of the Kubernetes secret containing the OVH OAuth 2 client ID
185228
# name: ovh-credentials
186229
# # The key name in the secret above that holds the actual OVH OAuth 2 client IDvalue
187230
# key: oauth2ClientID
231+
188232
# # The secret reference to an existing OVH Auth 2 client secret.
189233
# oauth2ClientSecretRef:
190234
# # Name of the Kubernetes secret containing the OVH Auth 2 client secret
191235
# name: ovh-credentials
192236
# # The key name in the secret above that holds the actual OVH Auth 2 client secret value
193237
# key: oauth2ClientSecret
238+
194239
# # The secret reference to an existing OVH application key.
195240
# applicationKeyRef:
196241
# # Name of the Kubernetes secret containing the OVH Application Key
197242
# name: ovh-credentials
198243
# # The key name in the secret above that holds the actual OVH application key value
199244
# key: applicationKey
245+
200246
# # The secret reference to an existing OVH application secret.
201247
# applicationSecretRef:
202248
# # Name of the Kubernetes secret containing the OVH Application Secret
203249
# name: ovh-credentials
204250
# # The key name in the secret above that holds the actual OVH application secret value
205251
# key: applicationSecret
252+
206253
# # The secret reference to an existing OVH consumer key
207254
# applicationConsumerKeyRef:
208255
# # Name of the Kubernetes secret containing the OVH consumer Key

0 commit comments

Comments
 (0)