values.yml 3.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596
  1. additionalArguments:
  2. # Configure your CertificateResolver here...
  3. #
  4. # HTTP Challenge
  5. # ---
  6. # Generic Example:
  7. # - --certificatesresolvers.generic.acme.email=your-email@example.com
  8. # - --certificatesresolvers.generic.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
  9. # - --certificatesresolvers.generic.acme.httpChallenge.entryPoint=web
  10. # - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
  11. #
  12. # Prod / Staging Example:
  13. # - --certificatesresolvers.staging.acme.email=your-email@example.com
  14. # - --certificatesresolvers.staging.acme.caServer=https://acme-staging-v02.api.letsencrypt.org/directory
  15. # - --certificatesresolvers.staging.acme.httpChallenge.entryPoint=web
  16. # - --certificatesresolvers.staging.acme.storage=/ssl-certs/acme-staging.json
  17. # - --certificatesresolvers.production.acme.email=your-email@example.com
  18. # - --certificatesresolvers.production.acme.caServer=https://acme-v02.api.letsencrypt.org/directory
  19. # - --certificatesresolvers.production.acme.httpChallenge.entryPoint=web
  20. # - --certificatesresolvers.production.acme.storage=/ssl-certs/acme-production.json
  21. #
  22. # DNS Challenge
  23. # ---
  24. # Cloudflare Example:
  25. # - --certificatesresolvers.cloudflare.acme.dnschallenge.provider=cloudflare
  26. # - --certificatesresolvers.cloudflare.acme.email=your-email@example.com
  27. # - --certificatesresolvers.cloudflare.acme.dnschallenge.resolvers=1.1.1.1
  28. # - --certificatesresolvers.cloudflare.acme.storage=/ssl-certs/acme-cloudflare.json
  29. #
  30. # Generic (replace with your DNS provider):
  31. # - --certificatesresolvers.generic.acme.dnschallenge.provider=generic
  32. # - --certificatesresolvers.generic.acme.email=your-email@example.com
  33. # - --certificatesresolvers.generic.acme.storage=/ssl-certs/acme-generic.json
  34. logs:
  35. # Configure log settings here...
  36. general:
  37. level: ERROR
  38. ports:
  39. # Configure your entrypoints here...
  40. web:
  41. # (optional) Permanent Redirect to HTTPS
  42. # redirectTo: websecure
  43. websecure:
  44. tls:
  45. enabled: true
  46. # (optional) Set a Default CertResolver
  47. # certResolver: cloudflare
  48. env:
  49. # Set your environment variables here...
  50. #
  51. # DNS Challenge Credentials
  52. # ---
  53. # Cloudflare Example:
  54. # - name: CF_API_EMAIL
  55. # valueFrom:
  56. # secretKeyRef:
  57. # key: email
  58. # name: cloudflare-credentials
  59. # - name: CF_API_KEY
  60. # valueFrom:
  61. # secretKeyRef:
  62. # key: apiKey
  63. # name: cloudflare-credentials
  64. # Disable Dashboard
  65. ingressRoute:
  66. dashboard:
  67. enabled: false
  68. # Persistent Storage
  69. persistence:
  70. enabled: true
  71. name: ssl-certs
  72. size: 1Gi
  73. path: /ssl-certs
  74. deployment:
  75. initContainers:
  76. # The "volume-permissions" init container is required if you run into permission issues.
  77. # Related issue: https://github.com/containous/traefik/issues/6972
  78. - name: volume-permissions
  79. image: busybox:1.31.1
  80. command: ["sh", "-c", "chmod -Rv 600 /ssl-certs/*"]
  81. volumeMounts:
  82. - name: ssl-certs
  83. mountPath: /ssl-certs
  84. # Set Traefik as your default Ingress Controller, according to Kubernetes 1.19+ changes.
  85. ingressClass:
  86. enabled: true
  87. isDefaultClass: true