@@ -27,31 +27,45 @@ certManager:
2727 # cert-manager serverAccount name (default: cert-manager)
2828 serviceAccountName : cert-manager
2929
30+ # One or more issuers to create
3031issuers :
32+
3133 # Name of this issuer
3234 - name : le-prod
35+
3336 # When true this issuer is created.
3437 # This is disabled by default
3538 create : false
39+
3640 # Type of issuer. Can either be ClusterIssuer or Issuer.
3741 # If issuer is specified, the namespace is required.
3842 # See for more information https://cert-manager.io/docs/concepts/issuer/
3943 kind : ClusterIssuer
44+
4045 # If kind is issuer, then indicate the namespace in which this
4146 # issuer should be deployed into.
4247 namespace : default
48+
4349 # Follow CNAME records or not. 2 options:
4450 # - None (default): Don't follow CNAME records
4551 # - Follow: Follow CNAME records
4652 # See https://cert-manager.io/docs/configuration/acme/dns01/#delegated-domains-for-dns01 for more information
4753 cnameStrategy : None
54+
4855 # The acme server url. For Let's encrypt, you have 2 options:
4956 # - for production (default): https://acme-v02.api.letsencrypt.org/directory
5057 # - for staging: https://acme-staging-v02.api.letsencrypt.org/directory
5158 acmeServerUrl : https://acme-v02.api.letsencrypt.org/directory
59+
5260 # email to use when registrering your account with Let's encrypt.
536154- # define the eab (external account binding) key using secretRef.
62+
63+ # If the ACME server supports profiles, you can specify the profile name here.
64+ # For more details, see https://cert-manager.io/docs/configuration/acme/#acme-certificate-profiles
65+ # Available as of Cert Manager 1.18.0
66+ # profile: classic # classic, tlsserver, shortlived
67+
68+ # Define the eab (external account binding) key using secretRef.
5569 # This is optional and only required if you want to use.
5670 # See https://cert-manager.io/docs/configuration/acme/#external-account-bindings for more information
5771 # externalAccountBinding:
@@ -63,20 +77,24 @@ issuers:
6377 # name: <secret-name>
6478 # # The key name in the secret above that holds the actual eab hmac key value
6579 # key: keySecret
80+
6681 # The endpoint name of the OVH API. It must be one of the following:
6782 # ovh-eu, ovh-ca, kimsufi-eu, kimsufi-ca, soyoustart-eu, soyoustart-ca, runabove-ca
6883 # See https://docs.certifytheweb.com/docs/dns/providers/ovh/ for more information
6984 ovhEndpointName : ovh-eu
85+
7086 # Authentication method (possible values: application or oauth2)
7187 ovhAuthenticationMethod : application
7288 # define how the webhook should authenticate with the OVH API.
7389 # Either set your credentials and the chart will create the necessary secret for you.
7490 # Or provide the details of a secret already containing the OVH credentials.
7591 # ovhAuthentication:
92+
7693 # # the OVH OAuth 2 client ID. Leave empty if you are using an existing secret.
7794 # oauth2ClientID: ''
7895 # # the OVH OAuth 2 client secret. Leave empty if you are using an existing secret.
7996 # oauth2ClientSecret: ''
97+
8098 # # the OVH application key. Leave emtpy if you are using an existing secret.
8199 # applicationKey: ''
82100 # # the OVH application secret. Leave emtpy if you are using an existing secret.
@@ -88,30 +106,36 @@ issuers:
88106 # in the same namespace as this deployment. If 'kind' is an Issuer,
89107 # then the secret needs to be present in the same namespace as the Issuer.
90108 # ovhAuthenticationRef:
109+
91110 # # The secret reference to an existing OVH OAuth 2 client ID.
92111 # oauth2ClientIDRef:
112+
93113 # # Name of the Kubernetes secret containing the OVH OAuth 2 client ID
94114 # name: ovh-credentials
95115 # # The key name in the secret above that holds the actual OVH OAuth 2 client IDvalue
96116 # key: oauth2ClientID
117+
97118 # # The secret reference to an existing OVH Auth 2 client secret.
98119 # oauth2ClientSecretRef:
99120 # # Name of the Kubernetes secret containing the OVH Auth 2 client secret
100121 # name: ovh-credentials
101122 # # The key name in the secret above that holds the actual OVH Auth 2 client secret value
102123 # key: oauth2ClientSecret
124+
103125 # # The secret reference to an existing OVH application key.
104126 # applicationKeyRef:
105127 # # Name of the Kubernetes secret containing the OVH Application Key
106128 # name: ovh-credentials
107129 # # The key name in the secret above that holds the actual OVH application key value
108130 # key: applicationKey
131+
109132 # # The secret reference to an existing OVH application secret.
110133 # applicationSecretRef:
111134 # # Name of the Kubernetes secret containing the OVH Application Secret
112135 # name: ovh-credentials
113136 # # The key name in the secret above that holds the actual OVH application secret value
114137 # key: applicationSecret
138+
115139 # # The secret reference to an existing OVH consumer key
116140 # applicationConsumerKeyRef:
117141 # # Name of the Kubernetes secret containing the OVH consumer Key
@@ -121,28 +145,41 @@ issuers:
121145
122146 # Name of this issuer
123147 - name : le-staging
148+
124149 # When true this issuer is created.
125150 # This is disabled by default
126151 create : false
152+
127153 # Type of issuer. Can either be ClusterIssuer or Issuer.
128154 # If issuer is specified, the the namespace is required.
129155 # See for more information https://cert-manager.io/docs/concepts/issuer/
130156 kind : ClusterIssuer
157+
131158 # If kind is issuer, then indicate the namespace in which this
132159 # issuer should be deployed into.
133160 namespace : default
161+
134162 # Follow CNAME records or not. 2 options:
135163 # - None (default): Don't follow CNAME records
136164 # - Follow: Follow CNAME records
137165 # See https://cert-manager.io/docs/configuration/acme/dns01/#delegated-domains-for-dns01 for more information
138166 cnameStrategy : None
167+
139168 # The acme server url. For Let's encrypt, you have 2 options:
140169 # - for production (default): https://acme-v02.api.letsencrypt.org/directory
141170 # - for staging: https://acme-staging-v02.api.letsencrypt.org/directory
142171 acmeServerUrl : https://acme-staging-v02.api.letsencrypt.org/directory
172+
143173 # email to use when registering your account with Let's encrypt.
144174145- # define the eab (external account binding) key using secretRef.
175+
176+ # If the ACME server supports profiles, you can specify the profile name here.
177+ # For more details, see https://cert-manager.io/docs/configuration/acme/#acme-certificate-profiles
178+ # Run the command `curl -fsSL https://acme-v02.api.letsencrypt.org/directory` and inpsect the object `profiles`.
179+ # Available as of Cert Manager 1.18.0
180+ # profile: classic # classic, tlsserver, shortlived
181+
182+ # Define the eab (external account binding) key using secretRef.
146183 # This is optional and only required if you want to use.
147184 # See https://cert-manager.io/docs/configuration/acme/#external-account-bindings for more information
148185 # externalAccountBinding:
@@ -154,20 +191,25 @@ issuers:
154191 # name: <secret-name>
155192 # # The key name in the secret above that holds the actual eab hmac key value
156193 # key: keySecret
194+
157195 # The endpoint name of the OVH API. It must be one of the following:
158196 # ovh-eu, ovh-ca, kimsufi-eu, kimsufi-ca, soyoustart-eu, soyoustart-ca, runabove-ca
159197 # See https://docs.certifytheweb.com/docs/dns/providers/ovh/ for more information
160198 ovhEndpointName : ovh-eu
199+
161200 # Authentication method (possible values: application or oauth2)
162201 ovhAuthenticationMethod : application
202+
163203 # define how the webhook should authenticate with the OVH API.
164204 # Either set your credentials and the chart will create the necessary secret for you.
165205 # Or provide the details of a secret already containing the OVH credentials.
166206 # ovhAuthentication:
207+
167208 # # the OVH OAuth 2 client ID. Leave empty if you are using an existing secret.
168209 # oauth2ClientID: ''
169210 # # the OVH OAuth 2 client secret. Leave empty if you are using an existing secret.
170211 # oauth2ClientSecret: ''
212+
171213 # # the OVH application key. Leave emtpy if you are using an existing secret.
172214 # applicationKey: ''
173215 # # the OVH application secret. Leave emtpy if you are using an existing secret.
@@ -179,30 +221,35 @@ issuers:
179221 # in the same namespace as this deployment. If 'kind' is an Issuer,
180222 # then the secret needs to be present in the same namespace as the Issuer.
181223 # ovhAuthenticationRef:
224+
182225 # # The secret reference to an existing OVH OAuth 2 client ID.
183226 # oauth2ClientIDRef:
184227 # # Name of the Kubernetes secret containing the OVH OAuth 2 client ID
185228 # name: ovh-credentials
186229 # # The key name in the secret above that holds the actual OVH OAuth 2 client IDvalue
187230 # key: oauth2ClientID
231+
188232 # # The secret reference to an existing OVH Auth 2 client secret.
189233 # oauth2ClientSecretRef:
190234 # # Name of the Kubernetes secret containing the OVH Auth 2 client secret
191235 # name: ovh-credentials
192236 # # The key name in the secret above that holds the actual OVH Auth 2 client secret value
193237 # key: oauth2ClientSecret
238+
194239 # # The secret reference to an existing OVH application key.
195240 # applicationKeyRef:
196241 # # Name of the Kubernetes secret containing the OVH Application Key
197242 # name: ovh-credentials
198243 # # The key name in the secret above that holds the actual OVH application key value
199244 # key: applicationKey
245+
200246 # # The secret reference to an existing OVH application secret.
201247 # applicationSecretRef:
202248 # # Name of the Kubernetes secret containing the OVH Application Secret
203249 # name: ovh-credentials
204250 # # The key name in the secret above that holds the actual OVH application secret value
205251 # key: applicationSecret
252+
206253 # # The secret reference to an existing OVH consumer key
207254 # applicationConsumerKeyRef:
208255 # # Name of the Kubernetes secret containing the OVH consumer Key
0 commit comments