values.yml 3.1 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697
  1. additionalArguments:
  2. # Configure your CertificateResolver here...
  3. #
  4. # HTTP Challenge
  5. # ---
  6. # Generic Example:
  7. # - --certificatesresolvers.generic.acme.email=your-email@example.com
  8. # - --certificatesresolvers.generic.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
  9. # - --certificatesresolvers.generic.acme.httpChallenge.entryPoint=web
  10. # - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
  11. #
  12. # Prod / Staging Example:
  13. # - --certificatesresolvers.staging.acme.email=your-email@example.com
  14. # - --certificatesresolvers.staging.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory
  15. # - --certificatesresolvers.staging.acme.httpChallenge.entryPoint=web
  16. # - --certificatesresolvers.staging.acme.storage=/ssl-certs/acme-staging.json
  17. # - --certificatesresolvers.production.acme.email=your-email@example.com
  18. # - --certificatesresolvers.production.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
  19. # - --certificatesresolvers.production.acme.httpChallenge.entryPoint=web
  20. # - --certificatesresolvers.production.acme.storage=/ssl-certs/acme-production.json
  21. #
  22. # DNS Challenge
  23. # ---
  24. # Cloudflare Example:
  25. # - --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare
  26. # - --certificatesresolvers.cloudflare.acme.email=your-email@example.com
  27. # - --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1
  28. # - --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json
  29. #
  30. # Generic (replace with your DNS provider):
  31. # - --certificatesresolvers.generic.acme.dnschallenge.provider=generic
  32. # - --certificatesresolvers.generic.acme.email=your-email@example.com
  33. # - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
  34. logs:
  35. # Configure log settings here...
  36. general:
  37. level: ERROR
  38. ports:
  39. # Configure your entrypoints here...
  40. web:
  41. # (optional) Permanent Redirect to HTTPS
  42. # redirectTo:
  43. # port: websecure
  44. websecure:
  45. tls:
  46. enabled: true
  47. # (optional) Set a Default CertResolver
  48. # certResolver: cloudflare
  49. env:
  50. # Set your environment variables here...
  51. #
  52. # DNS Challenge Credentials
  53. # ---
  54. # Cloudflare Example:
  55. # - name: CF_API_EMAIL
  56. # valueFrom:
  57. # secretKeyRef:
  58. # key: email
  59. # name: cloudflare-credentials
  60. # - name: CF_API_KEY
  61. # valueFrom:
  62. # secretKeyRef:
  63. # key: apiKey
  64. # name: cloudflare-credentials
  65. # Disable Dashboard
  66. ingressRoute:
  67. dashboard:
  68. enabled: false
  69. # Persistent Storage
  70. persistence:
  71. enabled: true
  72. name: ssl-certs
  73. size: 1Gi
  74. path: /ssl-certs
  75. deployment:
  76. initContainers:
  77. # The "volume-permissions" init container is required if you run into permission issues.
  78. # Related issue: https://github.com/containous/traefik/issues/6972
  79. - name: volume-permissions
  80. image: busybox:1.36.1
  81. command: ["sh", "-c", "chmod -Rv 600 /ssl-certs/*"]
  82. volumeMounts:
  83. - name: ssl-certs
  84. mountPath: /ssl-certs
  85. # Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes.
  86. ingressClass:
  87. enabled: true
  88. isDefaultClass: true