|
|
@@ -1,97 +1,54 @@
|
|
|
-additionalArguments:
|
|
|
-# Configure your CertificateResolver here...
|
|
|
-#
|
|
|
-# HTTP Challenge
|
|
|
+# Traefik Helm Chart Values Template
|
|
|
# ---
|
|
|
-# Generic Example:
|
|
|
-# - --certificatesresolvers.generic.acme.email=your-email@example.com
|
|
|
-# - --certificatesresolvers.generic.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
|
|
|
-# - --certificatesresolvers.generic.acme.httpChallenge.entryPoint=web
|
|
|
-# - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
|
|
|
-#
|
|
|
-# Prod / Staging Example:
|
|
|
-# - --certificatesresolvers.staging.acme.email=your-email@example.com
|
|
|
-# - --certificatesresolvers.staging.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory
|
|
|
-# - --certificatesresolvers.staging.acme.httpChallenge.entryPoint=web
|
|
|
-# - --certificatesresolvers.staging.acme.storage=/ssl-certs/acme-staging.json
|
|
|
-# - --certificatesresolvers.production.acme.email=your-email@example.com
|
|
|
-# - --certificatesresolvers.production.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
|
|
|
-# - --certificatesresolvers.production.acme.httpChallenge.entryPoint=web
|
|
|
-# - --certificatesresolvers.production.acme.storage=/ssl-certs/acme-production.json
|
|
|
-#
|
|
|
-# DNS Challenge
|
|
|
-# ---
|
|
|
-# Cloudflare Example:
|
|
|
-# - --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare
|
|
|
-# - --certificatesresolvers.cloudflare.acme.email=your-email@example.com
|
|
|
-# - --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1
|
|
|
-# - --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json
|
|
|
-#
|
|
|
-# Generic (replace with your DNS provider):
|
|
|
-# - --certificatesresolvers.generic.acme.dnschallenge.provider=generic
|
|
|
-# - --certificatesresolvers.generic.acme.email=your-email@example.com
|
|
|
-# - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
|
|
|
-
|
|
|
-logs:
|
|
|
-# Configure log settings here...
|
|
|
- general:
|
|
|
- level: ERROR
|
|
|
-
|
|
|
+image:
|
|
|
+ repository: traefik
|
|
|
+ version: v3.1.4
|
|
|
+ pullPolicy: IfNotPresent
|
|
|
+
|
|
|
+# (Optional) Log settings
|
|
|
+# logs:
|
|
|
+# general:
|
|
|
+# level: ERROR
|
|
|
+# access:
|
|
|
+# enabled: false
|
|
|
+
|
|
|
+# (Optional) Change number of replicas
|
|
|
+# deployment:
|
|
|
+# replicas: 1
|
|
|
+
|
|
|
+# (Optional) Enable Prometheus Metrics, requires metrics port to be exposed!
|
|
|
+# metrics:
|
|
|
+# prometheus:
|
|
|
+# entryPoint: metrics
|
|
|
+
|
|
|
+# Configure EntryPoints
|
|
|
ports:
|
|
|
-# Configure your entrypoints here...
|
|
|
web:
|
|
|
- # (optional) Permanent Redirect to HTTPS
|
|
|
- # redirectTo:
|
|
|
+ # StandardHTTP
|
|
|
+ port: 8000
|
|
|
+ exposed: true
|
|
|
+ exposedPort: 80
|
|
|
+ # (Optional) Redirect HTTP to HTTPs by default
|
|
|
+ # redirectTo:
|
|
|
# port: websecure
|
|
|
websecure:
|
|
|
+ # Standard HTTPS
|
|
|
+ port: 8443
|
|
|
+ exposed: true
|
|
|
+ exposedPort: 443
|
|
|
tls:
|
|
|
enabled: true
|
|
|
- # (optional) Set a Default CertResolver
|
|
|
- # certResolver: cloudflare
|
|
|
-
|
|
|
-
|
|
|
-env:
|
|
|
-# Set your environment variables here...
|
|
|
-#
|
|
|
-# DNS Challenge Credentials
|
|
|
-# ---
|
|
|
-# Cloudflare Example:
|
|
|
-# - name: CF_API_EMAIL
|
|
|
-# valueFrom:
|
|
|
-# secretKeyRef:
|
|
|
-# key: email
|
|
|
-# name: cloudflare-credentials
|
|
|
-# - name: CF_API_KEY
|
|
|
-# valueFrom:
|
|
|
-# secretKeyRef:
|
|
|
-# key: apiKey
|
|
|
-# name: cloudflare-credentials
|
|
|
-
|
|
|
-# Disable Dashboard
|
|
|
-ingressRoute:
|
|
|
- dashboard:
|
|
|
- enabled: false
|
|
|
-
|
|
|
-# Persistent Storage
|
|
|
-persistence:
|
|
|
- enabled: true
|
|
|
- name: ssl-certs
|
|
|
- size: 1Gi
|
|
|
- path: /ssl-certs
|
|
|
-
|
|
|
-deployment:
|
|
|
- initContainers:
|
|
|
- # The "volume-permissions" init container is required if you run into permission issues.
|
|
|
- # Related issue: https://github.com/containous/traefik/issues/6972
|
|
|
- - name: volume-permissions
|
|
|
- image: busybox:1.37.0
|
|
|
- command: ["sh", "-c", "chmod -Rv 600 /ssl-certs/*"]
|
|
|
- volumeMounts:
|
|
|
- - name: ssl-certs
|
|
|
- mountPath: /ssl-certs
|
|
|
-
|
|
|
-# Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes.
|
|
|
+ # (Optional) Enable HTTP3
|
|
|
+ # http3:
|
|
|
+ # enabled: false
|
|
|
+ # (Optional) When enabled Prometheus Metrics will be exposed on this port
|
|
|
+ # metrics:
|
|
|
+ # Prometheus Metrics
|
|
|
+ # port: 9100
|
|
|
+ # exposed: false
|
|
|
+ # exposedPort: 9100
|
|
|
+
|
|
|
+# Create a default IngressClass
|
|
|
ingressClass:
|
|
|
enabled: true
|
|
|
isDefaultClass: true
|
|
|
-
|