traefik-certmanager/traefik-certmanager.yaml

64 lines
1.5 KiB
YAML
Raw Normal View History

2022-10-09 23:18:29 +02:00
apiVersion: v1
kind: ServiceAccount
metadata:
name: traefik-certmanager
namespace: traefik
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: traefik-certmanager
rules:
- apiGroups: ["traefik.containo.us"]
resources: ["ingressroutes"]
2023-11-22 06:33:00 +01:00
verbs: ["watch", "patch"]
- apiGroups: ["traefik.io"]
resources: ["ingressroutes"]
verbs: ["watch", "patch"]
2022-10-09 23:18:29 +02:00
- apiGroups: ["cert-manager.io"]
resources: ["certificates"]
verbs: ["get", "create", "delete"]
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1
metadata:
name: traefik-certmanager
subjects:
- kind: ServiceAccount
name: traefik-certmanager
namespace: traefik
roleRef:
kind: ClusterRole
name: traefik-certmanager
apiGroup: rbac.authorization.k8s.io
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: traefik-certmanager
namespace: traefik
spec:
replicas: 1
selector:
matchLabels:
app.kubernetes.io/name: traefik-certmanager
template:
metadata:
labels:
app.kubernetes.io/name: traefik-certmanager
spec:
serviceAccount: traefik-certmanager
containers:
- name: traefik-certmanager
2024-12-22 18:17:37 +01:00
image: git.ar21.de/yolokube/traefik-certmanager
2022-10-09 23:18:29 +02:00
imagePullPolicy: Always
env:
- name: ISSUER_NAME
value: letsencrypt
- name: ISSUER_KIND
value: ClusterIssuer
- name: CERT_CLEANUP
value: "false"
2023-11-22 06:33:00 +01:00
- name: PATCH_SECRETNAME
value: "true"