81 lines
1.8 KiB
YAML
81 lines
1.8 KiB
YAML
{{- define "cert-manager-values" }}
|
|
|
|
localCA:
|
|
enabled: true
|
|
|
|
cert-manager:
|
|
{{- if not .Values.global.highAvailable }}
|
|
strategy:
|
|
type: Recreate
|
|
{{- end }}
|
|
|
|
{{- if eq .Values.global.platform "aws" }}
|
|
# map everything to the control-plane
|
|
nodeSelector:
|
|
node-role.kubernetes.io/control-plane: ""
|
|
tolerations:
|
|
- key: node-role.kubernetes.io/control-plane
|
|
effect: NoSchedule
|
|
|
|
webhook:
|
|
tolerations:
|
|
- key: node-role.kubernetes.io/control-plane
|
|
effect: NoSchedule
|
|
nodeSelector:
|
|
node-role.kubernetes.io/control-plane: ""
|
|
|
|
cainjector:
|
|
tolerations:
|
|
- key: node-role.kubernetes.io/control-plane
|
|
effect: NoSchedule
|
|
nodeSelector:
|
|
node-role.kubernetes.io/control-plane: ""
|
|
|
|
{{ with index .Values "cert-manager" "IamArn" }}
|
|
extraEnv:
|
|
- name: AWS_ROLE_ARN
|
|
value: "{{ . }}"
|
|
- name: AWS_WEB_IDENTITY_TOKEN_FILE
|
|
value: "/var/run/secrets/sts.amazonaws.com/serviceaccount/token"
|
|
- name: AWS_STS_REGIONAL_ENDPOINTS
|
|
value: regional
|
|
|
|
volumes:
|
|
- name: aws-token
|
|
projected:
|
|
sources:
|
|
- serviceAccountToken:
|
|
path: token
|
|
expirationSeconds: 86400
|
|
audience: "sts.amazonaws.com"
|
|
|
|
volumeMounts:
|
|
- name: aws-token
|
|
mountPath: "/var/run/secrets/sts.amazonaws.com/serviceaccount/"
|
|
readOnly: true
|
|
{{- end }}
|
|
|
|
{{- end }}
|
|
|
|
{{- if eq .Values.global.platform "gke" }}
|
|
serviceAccount:
|
|
annotations:
|
|
iam.gke.io/gcp-service-account: "dns01-solver@{{ .Values.global.gcp.projectId }}.iam.gserviceaccount.com"
|
|
{{- end }}
|
|
|
|
prometheus:
|
|
servicemonitor:
|
|
enabled: {{ $.Values.metrics.enabled }}
|
|
|
|
{{- with index .Values "cert-manager" "clusterIssuer" }}
|
|
clusterIssuer:
|
|
{{- . | toYaml | nindent 2 }}
|
|
{{- end }}
|
|
|
|
{{- end }}
|
|
|
|
{{- define "cert-manager-argo" }}
|
|
{{- end }}
|
|
|
|
{{ include "kubezero-app.app" . }}
|