basic: create and use letsencrypt staging issuer

This commit is contained in:
xeruf 2022-07-01 21:54:48 +01:00
parent 5a47fc8ba2
commit 3809e6778e
4 changed files with 21 additions and 2 deletions

View File

@ -10,6 +10,7 @@ data:
enabled: true enabled: true
annotations: annotations:
kubernetes.io/tls-acme: "true" kubernetes.io/tls-acme: "true"
certmanager.k8s.io/cluster-issuer: letsencrypt-issuer-staging
hosts: hosts:
- host: "dev.${domain}" - host: "dev.${domain}"
paths: paths:
@ -19,7 +20,6 @@ data:
- secretName: gitea-tls - secretName: gitea-tls
hosts: hosts:
- "dev.${domain}" - "dev.${domain}"
- "tempdev.${domain}"
gitea: gitea:
oauth: oauth:
- name: Stackspin - name: Stackspin

View File

@ -29,6 +29,7 @@ data:
primary: false primary: false
annotations: annotations:
kubernetes.io/tls-acme: "true" kubernetes.io/tls-acme: "true"
certmanager.k8s.io/cluster-issuer: letsencrypt-issuer-staging
hosts: hosts:
- host: "do.${domain}" - host: "do.${domain}"
paths: paths:
@ -38,7 +39,6 @@ data:
- secretName: vikunja - secretName: vikunja
hosts: hosts:
- "do.${domain}" - "do.${domain}"
- "tempdo.${domain}"
additionalContainers: additionalContainers:
api: api:
image: vikunja/api:0.18.1 image: vikunja/api:0.18.1

View File

@ -10,6 +10,7 @@ data:
enabled: true enabled: true
annotations: annotations:
kubernetes.io/tls-acme: "true" kubernetes.io/tls-acme: "true"
certmanager.k8s.io/cluster-issuer: letsencrypt-issuer-staging
hostname: "people.${domain}" hostname: "people.${domain}"
tls: true tls: true
# - secretName: suitecrm-tls # - secretName: suitecrm-tls

View File

@ -0,0 +1,18 @@
---
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: letsencrypt-issuer-staging
spec:
acme:
email: ${admin_email}
# overwrite this to "https://acme-staging-v02.api.letsencrypt.org/directory" for staging
server: "https://acme-staging-v02.api.letsencrypt.org/directory"
privateKeySecretRef:
# Secret resource used to store the account's private key.
name: letsencrypt-account-key
# Enable the HTTP01 challenge mechanism for this Issuer
solvers:
- http01:
ingress:
class: nginx