2022-10-09 23:18:29 +02:00
|
|
|
apiVersion: v1
|
|
|
|
kind: ServiceAccount
|
|
|
|
metadata:
|
|
|
|
name: traefik-certmanager
|
|
|
|
namespace: traefik
|
|
|
|
---
|
|
|
|
kind: ClusterRole
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: traefik-certmanager
|
|
|
|
rules:
|
|
|
|
- apiGroups: ["traefik.containo.us"]
|
|
|
|
resources: ["ingressroutes"]
|
2023-11-22 06:33:00 +01:00
|
|
|
verbs: ["watch", "patch"]
|
|
|
|
- apiGroups: ["traefik.io"]
|
|
|
|
resources: ["ingressroutes"]
|
|
|
|
verbs: ["watch", "patch"]
|
2022-10-09 23:18:29 +02:00
|
|
|
- apiGroups: ["cert-manager.io"]
|
|
|
|
resources: ["certificates"]
|
|
|
|
verbs: ["get", "create", "delete"]
|
|
|
|
---
|
|
|
|
kind: ClusterRoleBinding
|
|
|
|
apiVersion: rbac.authorization.k8s.io/v1
|
|
|
|
metadata:
|
|
|
|
name: traefik-certmanager
|
|
|
|
subjects:
|
|
|
|
- kind: ServiceAccount
|
|
|
|
name: traefik-certmanager
|
|
|
|
namespace: traefik
|
|
|
|
roleRef:
|
|
|
|
kind: ClusterRole
|
|
|
|
name: traefik-certmanager
|
|
|
|
apiGroup: rbac.authorization.k8s.io
|
|
|
|
---
|
|
|
|
apiVersion: apps/v1
|
|
|
|
kind: Deployment
|
|
|
|
metadata:
|
|
|
|
name: traefik-certmanager
|
|
|
|
namespace: traefik
|
|
|
|
spec:
|
|
|
|
replicas: 1
|
|
|
|
selector:
|
|
|
|
matchLabels:
|
|
|
|
app.kubernetes.io/name: traefik-certmanager
|
|
|
|
template:
|
|
|
|
metadata:
|
|
|
|
labels:
|
|
|
|
app.kubernetes.io/name: traefik-certmanager
|
|
|
|
spec:
|
|
|
|
serviceAccount: traefik-certmanager
|
|
|
|
containers:
|
|
|
|
- name: traefik-certmanager
|
2024-12-22 18:17:37 +01:00
|
|
|
image: git.ar21.de/yolokube/traefik-certmanager
|
2022-10-09 23:18:29 +02:00
|
|
|
imagePullPolicy: Always
|
|
|
|
env:
|
|
|
|
- name: ISSUER_NAME
|
|
|
|
value: letsencrypt
|
|
|
|
- name: ISSUER_KIND
|
|
|
|
value: ClusterIssuer
|
|
|
|
- name: CERT_CLEANUP
|
|
|
|
value: "false"
|
2023-11-22 06:33:00 +01:00
|
|
|
- name: PATCH_SECRETNAME
|
|
|
|
value: "true"
|