|
| 1 | +apiVersion: data.packaging.carvel.dev/v1alpha1 |
| 2 | +kind: Package |
| 3 | +metadata: |
| 4 | + creationTimestamp: null |
| 5 | + name: cert-manager.packages.kadras.io.1.17.2 |
| 6 | +spec: |
| 7 | + licenses: |
| 8 | + - Apache 2.0 |
| 9 | + refName: cert-manager.packages.kadras.io |
| 10 | + releaseNotes: https://github.com/kadras-io/package-for-cert-manager/releases |
| 11 | + releasedAt: "2025-05-30T19:24:22Z" |
| 12 | + template: |
| 13 | + spec: |
| 14 | + deploy: |
| 15 | + - kapp: {} |
| 16 | + fetch: |
| 17 | + - imgpkgBundle: |
| 18 | + image: ghcr.io/kadras-io/package-for-cert-manager@sha256:95a278e351c04d81ea080013372a10e7e17bc99d739527ac27bcedf286710b33 |
| 19 | + template: |
| 20 | + - ytt: |
| 21 | + paths: |
| 22 | + - config |
| 23 | + - kbld: |
| 24 | + paths: |
| 25 | + - '-' |
| 26 | + - .imgpkg/images.yml |
| 27 | + valuesSchema: |
| 28 | + openAPIv3: |
| 29 | + additionalProperties: false |
| 30 | + properties: |
| 31 | + cainjector: |
| 32 | + additionalProperties: false |
| 33 | + description: Settings for the cainjector controller. |
| 34 | + properties: |
| 35 | + loglevel: |
| 36 | + default: 2 |
| 37 | + description: Number of the log level verbosity. |
| 38 | + maximum: 5 |
| 39 | + minimum: 1 |
| 40 | + type: integer |
| 41 | + replicas: |
| 42 | + default: 1 |
| 43 | + description: The number of replicas. In order to enable high availability, |
| 44 | + 2 replicas are recommended. |
| 45 | + minimum: 1 |
| 46 | + type: integer |
| 47 | + type: object |
| 48 | + controller: |
| 49 | + additionalProperties: false |
| 50 | + description: Settings for the cert-manager controller. |
| 51 | + properties: |
| 52 | + dns01: |
| 53 | + additionalProperties: false |
| 54 | + description: Configures the behaviour of the ACME DNS01 challenge solver. |
| 55 | + properties: |
| 56 | + recursive_nameservers: |
| 57 | + default: [] |
| 58 | + description: Each nameserver can be either the IP address and port |
| 59 | + of a standard recursive DNS server, or the endpoint to an RFC |
| 60 | + 8484 DNS over HTTPS endpoint. |
| 61 | + items: |
| 62 | + default: "" |
| 63 | + type: string |
| 64 | + type: array |
| 65 | + recursive_nameservers_only: |
| 66 | + default: false |
| 67 | + description: When true, cert-manager will only ever query the configured |
| 68 | + DNS resolvers to perform the ACME DNS01 self check. This is useful |
| 69 | + in DNS constrained environments, where access to authoritative |
| 70 | + nameservers is restricted. Enabling this option could cause the |
| 71 | + DNS01 self check to take longer due to caching performed by the |
| 72 | + recursive nameservers. |
| 73 | + type: boolean |
| 74 | + type: object |
| 75 | + loglevel: |
| 76 | + default: 2 |
| 77 | + description: Number of the log level verbosity. |
| 78 | + maximum: 5 |
| 79 | + minimum: 1 |
| 80 | + type: integer |
| 81 | + replicas: |
| 82 | + default: 1 |
| 83 | + description: The number of replicas. In order to enable high availability, |
| 84 | + 2 replicas are recommended. |
| 85 | + minimum: 1 |
| 86 | + type: integer |
| 87 | + type: object |
| 88 | + leader_election: |
| 89 | + additionalProperties: false |
| 90 | + description: Leader election configuration for the cert-manager and cert-manager-cainjector |
| 91 | + Deployments. |
| 92 | + properties: |
| 93 | + namespace: |
| 94 | + default: kube-system |
| 95 | + description: 'Namespace used to perform leader election. The default |
| 96 | + namespace needs changing in environments like GKE. More information: |
| 97 | + https://cert-manager.io/docs/installation/compatibility.' |
| 98 | + minLength: 1 |
| 99 | + type: string |
| 100 | + type: object |
| 101 | + letsencrypt: |
| 102 | + additionalProperties: false |
| 103 | + description: Settings for Let's Encrypt. |
| 104 | + properties: |
| 105 | + challenge: |
| 106 | + additionalProperties: false |
| 107 | + properties: |
| 108 | + dns_provider: |
| 109 | + default: digital_ocean |
| 110 | + description: 'The DNS provider to use for the ACME dns01 challenge. |
| 111 | + Valid options: `cloudflare`, `digital_ocean`.' |
| 112 | + enum: |
| 113 | + - cloudflare |
| 114 | + - digital_ocean |
| 115 | + type: string |
| 116 | + secret: |
| 117 | + additionalProperties: false |
| 118 | + properties: |
| 119 | + key: |
| 120 | + default: "" |
| 121 | + description: The key within the Secret that contains the credentials |
| 122 | + needed for the dns01 challenge. |
| 123 | + type: string |
| 124 | + name: |
| 125 | + default: "" |
| 126 | + description: Name of the Secret containing the credentials needed |
| 127 | + for the dns01 challenge. |
| 128 | + type: string |
| 129 | + namespace: |
| 130 | + default: kadras-system |
| 131 | + description: Namespace containing the Secret with the credentials |
| 132 | + needed for the dns01 challenge. |
| 133 | + type: string |
| 134 | + type: object |
| 135 | + type: |
| 136 | + default: http01 |
| 137 | + description: 'The type of challenge used by the ACME CA Server. |
| 138 | + Valid options: `http01`, `dns01`.' |
| 139 | + enum: |
| 140 | + - http01 |
| 141 | + - dns01 |
| 142 | + type: string |
| 143 | + type: object |
| 144 | + email: |
| 145 | + default: "" |
| 146 | + description: The email address that Let's Encrypt will use to send info |
| 147 | + on expiring certificates or other issues. |
| 148 | + type: string |
| 149 | + include: |
| 150 | + default: false |
| 151 | + description: Whether to include a ClusterIssuer for Let's Encrypt. |
| 152 | + type: boolean |
| 153 | + production: |
| 154 | + default: false |
| 155 | + description: Whether to use Let's Encrypt staging (recommended for non-production |
| 156 | + environments) or production. |
| 157 | + type: boolean |
| 158 | + type: object |
| 159 | + namespace: |
| 160 | + default: cert-manager |
| 161 | + description: The namespace in which to deploy cert-manager. |
| 162 | + minLength: 1 |
| 163 | + type: string |
| 164 | + policies: |
| 165 | + additionalProperties: false |
| 166 | + description: Settings for the Kyverno policies. |
| 167 | + properties: |
| 168 | + include: |
| 169 | + default: false |
| 170 | + description: Whether to include the out-of-the-box Kyverno policies |
| 171 | + to validate and secure the package installation. |
| 172 | + type: boolean |
| 173 | + type: object |
| 174 | + private_pki: |
| 175 | + additionalProperties: false |
| 176 | + description: Settings for the built-in, private PKI |
| 177 | + properties: |
| 178 | + include: |
| 179 | + default: true |
| 180 | + description: Whether to include a ClusterIssuer for a private PKI. |
| 181 | + type: boolean |
| 182 | + type: object |
| 183 | + proxy: |
| 184 | + additionalProperties: false |
| 185 | + description: Settings for the corporate proxy. |
| 186 | + properties: |
| 187 | + http_proxy: |
| 188 | + default: "" |
| 189 | + description: The HTTP proxy to use for network traffic. |
| 190 | + type: string |
| 191 | + https_proxy: |
| 192 | + default: "" |
| 193 | + description: The HTTPS proxy to use for network traffic. |
| 194 | + type: string |
| 195 | + no_proxy: |
| 196 | + default: "" |
| 197 | + description: A comma-separated list of hostnames, IP addresses, or IP |
| 198 | + ranges in CIDR format that should not use the proxy. |
| 199 | + type: string |
| 200 | + type: object |
| 201 | + webhook: |
| 202 | + additionalProperties: false |
| 203 | + description: Settings for the cert-manager webhook. |
| 204 | + properties: |
| 205 | + host_network: |
| 206 | + default: false |
| 207 | + description: 'Whether to run the webhook in the host network so that |
| 208 | + it can be reached by the cert-manager controller in environments like |
| 209 | + AWS EKS. More information: https://cert-manager.io/docs/installation/compatibility.' |
| 210 | + type: boolean |
| 211 | + loglevel: |
| 212 | + default: 2 |
| 213 | + description: Number of the log level verbosity. |
| 214 | + maximum: 5 |
| 215 | + minimum: 1 |
| 216 | + type: integer |
| 217 | + replicas: |
| 218 | + default: 1 |
| 219 | + description: The number of replicas. In order to enable high availability, |
| 220 | + at least 3 replicas are recommended. |
| 221 | + minimum: 1 |
| 222 | + type: integer |
| 223 | + secure_port: |
| 224 | + default: 6443 |
| 225 | + description: 'The port where the webhook is exposed. The default port |
| 226 | + needs changing in environments like AWS EKS and AWS Fargate. More |
| 227 | + information: https://cert-manager.io/docs/installation/compatibility.' |
| 228 | + type: integer |
| 229 | + type: object |
| 230 | + type: object |
| 231 | + version: 1.17.2 |
0 commit comments