From e0c66d478a3db6637f8cbc5030508f7d3659ed1c Mon Sep 17 00:00:00 2001
From: Adam Talbot
-
Reference to one or more secrets to be used when pulling images
-
-
-Labels to apply to all resources
-
-eg. podTemplate/ ingressTemplate in ACMEChallengeSolverHTTP01Ingress
-
-
+```
eg. secretTemplate in CertificateSpec
-
+```yaml
+undefined
+```
-Optional priority class to be used for the cert-manager pods
+
+Create required ClusterRoles and ClusterRoleBindings for cert-manager
-Create RBAC rules
+
+```yaml
+false
+```
-Aggregate ClusterRoles to Kubernetes default user-facing roles. ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
+
-
Set the verbosity of cert-manager. Range of 0 - 6 with 6 being the most verbose.
-
-
Override the namespace used for the leader election lease
-
-
The duration that non-leader candidates will wait after observing a leadership renewal until attempting to acquire leadership of a led but unrenewed leader slot. This is effectively the maximum duration that a leader can be stopped before it is replaced by another candidate.
-
-
The interval between attempts by the acting master to renew a leadership slot before it stops leading. This must be less than or equal to the lease duration.
-
-
The duration the clients should wait between attempting acquisition and renewal of a leadership.
-
-
-Install the CRDs
-
-
-
-Number of replicas to run of the cert-manager controller
-
-
-
-Update strategy to use, for example:
-
-
+
-
-maxUnavailable can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%)
-
-
-
Comma separated list of feature gates that should be enabled on the controller pod.
-
-
The maximum number of challenges that can be scheduled as 'processing' at once
-
-
-Registry to pull the image from
-
-
-
-Image name, this can be the full image including registry or the short name excluding the registry. The registy can also be set in the `registry` property
+The container image for the cert-manager controller
-
-
Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
-
-
Setting a digest will override any tag
-
-
-Image pull policy, see https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy
-
-
-
Override the namespace used to store DNS provider credentials etc. for ClusterIssuer resources. By default, the same namespace as cert-manager is deployed within is used. This namespace will not be automatically created by the Helm chart.
-
-
This namespace allows you to define where the services will be installed into if not set then they will use the namespace of the release. This is helpful when installing cert manager as a chart dependency (sub chart)
-
-
Specifies whether a service account should be created
-
-
-The name of the service account to use.
-
Optional additional annotations to add to the controller's ServiceAccount
-
-
-Automount API credentials for a Service Account.
-
-Service account token wil be automatically mounted in Pods
-
-
+When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted
+
+
+
+Deployment update strategy for the cert-manager webhook deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+
+
+For example:
+
+
+
+Pod Security Context to be set on the webhook component Pod
+
+
+
+Container Security Context to be set on the webhook component container
+
+
+
+Enable or disable the PodDisruptionBudget resource
+
+
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+
+Optional additional annotations to add to the webhook Deployment
+
+
+
+Optional additional annotations to add to the webhook Pods
+
+
+
+Optional additional annotations to add to the webhook Service
+
+
+
+Optional additional annotations to add to the webhook MutatingWebhookConfiguration
+
+
+
+Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
+
+
+
+Additional command line flags to pass to cert-manager webhook binary. To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:
+
+Comma separated list of feature gates that should be enabled on the webhook pod.
+
+
+
+Resources to provide to the cert-manager webhook pod
+
+
+
+For example:
+
+
+
+
+
+
+
+Liveness probe values
+
+
+
+
+
+
+
+Readiness probe values
+
+
+
+
+
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+
+
+For example:
+
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+
+
+For example:
+
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+
+
+For example:
+
+
+
+Optional additional labels to add to the Webhook Pods
+
+
+
+Optional additional labels to add to the Webhook Service
+
+
+
+The container registry to pull the webhook image from
+
+
+
+The container image for the cert-manager webhook
+
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+Setting a digest will override any tag
+
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+
+Specifies whether a service account should be created
+
+
+
+The name of the service account to use.
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+Optional additional labels to add to the webhook's ServiceAccount
+
+
+
+Automount API credentials for a Service Account.
+
+
+
+Automounting API credentials for a particular pod
+
+
+
+The port that the webhook should listen on for requests. In GKE private clusters, by default kubernetes apiservers are allowed to talk to the cluster nodes only on 443 and 10250. so configuring securePort: 10250, will work out of the box without needing to add firewall rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
+
+
+
+Specifies if the webhook should be started in hostNetwork mode.
+
+
+
+Required for use in some managed kubernetes clusters (such as AWS EKS) with custom. CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working
+
+
+
+Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
+
+
+
+Specifies how the service should be handled. Useful if you want to expose the webhook to outside of the cluster. In some cases, the control plane cannot reach internal services.
+
+
+
+Specify the load balancer IP for the created service
+
+
+
+Overrides the mutating webhook and validating webhook so they reach the webhook service using the `url` field instead of a service.
+
+
+
+Create network policies for the webhooks
+
+
+
+Ingress rule for the webhook network policy, by default will allow all inbound traffic
+
+
+
+Egress rule for the webhook network policy, by default will allow all outbound traffic traffic to ports 80 and 443, as well as DNS ports
+
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+
+Create the CA Injector deployment
+
+
+
+Number of replicas of the cert-manager cainjector to run.
+
+
+
+The default is 1, but in production you should set this to 2 or 3 to provide high availability.
+
+
+
+If `replicas > 1` you should also consider setting cainjector.podDisruptionBudget.enabled=true.
+
+
+
+Note: cert-manager uses leader election to ensure that there can only be a single instance active at a time.
+
+
+
+Used to configure options for the cainjector pod.
+
+For example:
+
+
+
+Deployment update strategy for the cert-manager cainjector deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+
+
+For example:
+
+
+
+Pod Security Context to be set on the cainjector component Pod
+
+
+
+Container Security Context to be set on the cainjector component container
+
+
+
+Enable or disable the PodDisruptionBudget resource
+
+
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+
+Optional additional annotations to add to the cainjector Deployment
+
+
+
+Optional additional annotations to add to the cainjector Pods
+
+
+
+Additional command line flags to pass to cert-manager cainjector binary. To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:
+
+Comma separated list of feature gates that should be enabled on the cainjector pod.
+
+
+
+Resources to provide to the cert-manager cainjector pod
+
+
+
+For example:
+
+
+
+
+
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+
+
+For example:
+
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+
+
+For example:
+
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+
+
+For example:
+
+
+
+Optional additional labels to add to the CA Injector Pods
+
+
+
+The container registry to pull the cainjector image from
+
+
+
+The container image for the cert-manager cainjector
+
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+Setting a digest will override any tag
+
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+
+Specifies whether a service account should be created
+
+
+
+The name of the service account to use.
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+Optional additional labels to add to the cainjector's ServiceAccount
+
+
+
+Automount API credentials for a Service Account.
+
+
+
+Automounting API credentials for a particular pod
+
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+
+The container registry to pull the acmesolver image from
+
+
+
+The container image for the cert-manager acmesolver
+
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+Setting a digest will override any tag
+
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+
+This startupapicheck is a Helm post-install hook that waits for the webhook endpoints to become available. The check is implemented using a Kubernetes Job - if you are injecting mesh sidecar proxies into cert-manager pods, you probably want to ensure that they are not injected into this Job's pod. Otherwise the installation may time out due to the Job never being completed because the sidecar proxy does not exit. See https://github.com/cert-manager/cert-manager/pull/4414 for context.
+
+
+
+Enables the startup api check
+
+
+
+Pod Security Context to be set on the startupapicheck component Pod
+
+
+
+Container Security Context to be set on the controller component container
+
+
+
+Timeout for 'kubectl check api' command
+
+
+
+Job backoffLimit
+
+
+
+Optional additional annotations to add to the startupapicheck Job
+
+
+
+Resources to provide to the cert-manager controller pod
+
+
+
+For example:
+
+
+
+
+
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+
+
+For example:
+
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+
+
+For example:
+
+
+
+Optional additional labels to add to the startupapicheck Pods
+
+
+
+The container registry to pull the startupapicheck image from
+
+
+
+The container image for the cert-manager startupapicheck
+
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+Setting a digest will override any tag
+
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+
+annotations for the startup API Check job RBAC and PSP resources
+
+
+
+Automounting API credentials for a particular pod
+
+
+
+Specifies whether a service account should be created
+
+
+
+The name of the service account to use.
+
+Optional additional annotations to add to the Job's ServiceAccount
+
+
+
+Automount API credentials for a Service Account.
+
+
+
+Optional additional labels to add to the startupapicheck's ServiceAccount
+
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+
+Deployment update strategy for the cert-manager webhook deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+
+
+For example:
+
+
+
+Pod Security Context to be set on the webhook component Pod
+
+
+
+Container Security Context to be set on the webhook component container
+
+
+
+Enable or disable the PodDisruptionBudget resource
+
+
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+
+Optional additional annotations to add to the webhook Deployment
+
+
+
+Optional additional annotations to add to the webhook Pods
+
+
+
+Optional additional annotations to add to the webhook Service
+
+
+
+Optional additional annotations to add to the webhook MutatingWebhookConfiguration
+
+
+
+Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
+
+
+
+Additional command line flags to pass to cert-manager webhook binary. To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:
+
+Comma separated list of feature gates that should be enabled on the webhook pod.
+
+
+
+Resources to provide to the cert-manager webhook pod
+
+
+
+For example:
+
+
+
+
+
+
+
+Liveness probe values
+
+
+
+
+
+
+
+Readiness probe values
+
+
+
+
+
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+
+
+For example:
+
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+
+
+For example:
+
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+
+
+For example:
+
+
+
+Optional additional labels to add to the Webhook Pods
+
+
+
+Optional additional labels to add to the Webhook Service
+
+
+
+The container registry to pull the webhook image from
+
+
+
+The container image for the cert-manager webhook
+
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+Setting a digest will override any tag
+
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+
+Specifies whether a service account should be created
+
+
+
+The name of the service account to use.
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+Optional additional labels to add to the webhook's ServiceAccount
+
+
+
+Automount API credentials for a Service Account.
+
+
Automounting API credentials for a particular pod
@@ -661,7 +13506,496 @@ Automounting API credentials for a particular pod
+
+The port that the webhook should listen on for requests. In GKE private clusters, by default kubernetes apiservers are allowed to talk to the cluster nodes only on 443 and 10250. so configuring securePort: 10250, will work out of the box without needing to add firewall rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
+
+
+
+Specifies if the webhook should be started in hostNetwork mode.
+
+
+
+Required for use in some managed kubernetes clusters (such as AWS EKS) with custom. CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working
+
+
+
+Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
+
+
+
+Specifies how the service should be handled. Useful if you want to expose the webhook to outside of the cluster. In some cases, the control plane cannot reach internal services.
+
+
+
+Specify the load balancer IP for the created service
+
+
+
+Overrides the mutating webhook and validating webhook so they reach the webhook service using the `url` field instead of a service.
+
+
+
+Create network policies for the webhooks
+
+
+
+Ingress rule for the webhook network policy, by default will allow all inbound traffic
+
+
+
+Egress rule for the webhook network policy, by default will allow all outbound traffic traffic to ports 80 and 443, as well as DNS ports
+
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+
+Create the CA Injector deployment
+
+
+
+Number of replicas of the cert-manager cainjector to run.
+
+
+
+The default is 1, but in production you should set this to 2 or 3 to provide high availability.
+
+
+
+If `replicas > 1` you should also consider setting cainjector.podDisruptionBudget.enabled=true.
+
+
+
+Note: cert-manager uses leader election to ensure that there can only be a single instance active at a time.
+
+
+
+Used to configure options for the cainjector pod.
+
+For example:
+
+
+
+Deployment update strategy for the cert-manager cainjector deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+
+
+For example:
+
+
+
+Pod Security Context to be set on the cainjector component Pod
+
+
+
+Container Security Context to be set on the cainjector component container
+
+
+
+Enable or disable the PodDisruptionBudget resource
+
+
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
-When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
-Used to configure options for the controller pod.
+
+Optional additional annotations to add to the cainjector Pods
+
+
+
+Additional command line flags to pass to cert-manager cainjector binary. To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:
+
+Comma separated list of feature gates that should be enabled on the cainjector pod.
+
+
+
+Resources to provide to the cert-manager cainjector pod
@@ -708,27 +14124,19 @@ For example:
+
+
+
+
-Comma separated string with host and port of the recursive nameservers cert-manager should query
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
-Forces cert-manager to only use the recursive nameservers for verification. Enabling this option could cause the DNS01 self check to take longer due to caching performed by the recursive nameservers
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+
+
+For example:
-Additional command line flags to pass to cert-manager controller binary. To see all available flags run docker run quay.io/jetstack/cert-manager-controller:
+
+For example:
-Additional environment variables
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+
-Resources the controller will be given
+Optional additional labels to add to the CA Injector Pods
-Pod Security Context
+The container registry to pull the cainjector image from
+
+The container image for the cert-manager cainjector
+
+
-Container Security Context to be set on the controller component container
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+Setting a digest will override any tag
+
+
-Volumes to mount to the controller pod
+Kubernetes imagePullPolicy on Deployment.
-Volumes specified in `volumes` to mount to the controller container
+Specifies whether a service account should be created
-Optional additional annotations to add to the controller Deployment
+The name of the service account to use.
-Optional additional annotations to add to the controller Pods
+Optional additional annotations to add to the controller's ServiceAccount
-Optional additional labels to add to the controller Pods
+Optional additional labels to add to the cainjector's ServiceAccount
-Optional annotations to add to the controller Service
+Automount API credentials for a Service Account.
-Optional additional labels to add to the controller Service
+Automounting API credentials for a particular pod
-DNS policy to use within the controller pod
+Additional volumes to add to the cert-manager controller pod.
-Optional DNS settings, useful if you have a public and private DNS zone for the same domain on Route 53. What follows is an example of ensuring cert-manager can access an ingress or DNS TXT records at all times. NOTE: This requires Kubernetes 1.10 or `CustomPodDNS` feature gate enabled for the cluster to work.
+Additional volume mounts to add to the cert-manager controller container.
-Node selector to limit the nodes the controller can schedule on
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
-Optional default issuer to use for ingress resources
+The container registry to pull the acmesolver image from
-Optional default issuer kind to use for ingress resources
+The container image for the cert-manager acmesolver
-Optional default issuer group to use for ingress resources
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+Setting a digest will override any tag
+
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
-Default
-
global.imagePullSecrets
-
+```yaml
ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
-
+```
+
+For example:
+
+```yaml
+imagePullSecrets:
+ - name: "image-pull-secret"
+```
array
-
-
[]
+```yaml
+[]
+```
-
global.commonLabels
-
-Please note that this does not add labels to the resources created dynamically by the controllers. For these resources, you have to add the labels in the template in the cert-manager custom resource:
-
-
+```yaml
ref: https://cert-manager.io/docs/reference/api-docs/#acme.cert-manager.io/v1.ACMEChallengeSolverHTTP01Ingress
-
-
-
+```yaml
ref: https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec
-
+```
object
-
-
{}
+```yaml
+{}
+```
+
+global.revisionHistoryLimit
+
- global.priorityClassName
+The number of old ReplicaSets to retain to allow rollback (If not set, default Kubernetes value is set to 10)
+
+
+
+number
-
+
+
global.priorityClassName
+
-
+Optional priority class to be used for the cert-manager pods
string
-
-
""
+```yaml
+""
+```
-
+global.rbac.create
-
+bool
+
-
+```yaml
+true
+```
-bool
+
+
global.rbac.aggregateClusterRoles
-
+true
+Aggregate ClusterRoles to Kubernetes default user-facing roles. Ref: https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles
bool
+
+
+```yaml
+true
+```
+
+
+global.podSecurityPolicy.enabled
+
- global.rbac.aggregateClusterRoles
+Create PodSecurityPolicy for cert-manager
+
+NOTE: PodSecurityPolicy was deprecated in Kubernetes 1.21 and removed in 1.25
+
+
+bool
-
+
+
global.podSecurityPolicy.useAppArmor
+
-
+Configure the PodSecurityPolicy to use AppArmor
bool
-
-
true
+```yaml
+true
+```
-
global.logLevel
-
number
-
-
2
+```yaml
+2
+```
-
global.leaderElection.namespace
-
string
-
-
kube-system
+```yaml
+kube-system
+```
-
global.leaderElection.leaseDuration
-
string
-
-
undefined
+```yaml
+undefined
+```
-
global.leaderElection.renewDeadline
-
string
-
-
undefined
+```yaml
+undefined
+```
-
global.leaderElection.retryPeriod
-
string
-
-
undefined
+```yaml
+undefined
+```
-
@@ -272,388 +277,13228 @@ Install the CRDs
installCRDs
-
bool
-
-
false
+```yaml
+false
+```
Default
-
replicaCount
-
number
-
-
1
+```yaml
+1
+```
-
strategy
-
-type: RollingUpdate
-rollingUpdate:
- maxSurge: 0
- maxUnavailable: 1
-
+```yaml
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+```
object
-
-
{}
+```yaml
+{}
+```
+
+podDisruptionBudget.enabled
+
- podDisruptionBudget.minAvailable
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+```yaml
+false
+```
-
+
+
podDisruptionBudget.minAvailable
+
-minAvailable can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%)
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
-
number
-
-
undefined
+```yaml
+undefined
+```
-
podDisruptionBudget.maxUnavailable
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
-
number
-
-
undefined
+```yaml
+undefined
+```
-
featureGates
-
string
-
-
""
+```yaml
+""
+```
-
maxConcurrentChallenges
-
number
-
-
60
+```yaml
+60
+```
-
image.registry
-
string
-
-
undefined
+```yaml
+undefined
+```
-
image.repository
-
string
-
-
quay.io/jetstack/cert-manager-controller
+```yaml
+quay.io/jetstack/cert-manager-controller
+```
-
image.tag
-
string
-
-
undefined
+```yaml
+undefined
+```
-
image.digest
-
string
-
-
undefined
+```yaml
+undefined
+```
-
image.pullPolicy
-
string
-
-
IfNotPresent
+```yaml
+IfNotPresent
+```
-
clusterResourceNamespace
-
string
-
-
""
+```yaml
+""
+```
-
namespace
-
string
-
-
""
+```yaml
+""
+```
-
serviceAccount.create
-
bool
-
-
true
+```yaml
+true
+```
-
serviceAccount.name
-
+The name of the service account to use.
If not set and create is true, a name is generated using the fullname template
-string
-
-
undefined
+```yaml
+undefined
+```
-
serviceAccount.annotations
-
object
-
-
undefined
+```yaml
+undefined
+```
-
serviceAccount.labels
-
Optional additional labels to add to the controller's ServiceAccount
-object
-
-
undefined
+```yaml
+undefined
+```
-
serviceAccount.automountServiceAccountToken
-
bool
-
-
true
+```yaml
+true
+```
-
-
+automountServiceAccountToken
+enableCertificateOwnerRef
-
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+config
+
+
+Used to configure options for the controller pod.
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+For example:
+
+```yaml
+config:
+ apiVersion: controller.config.cert-manager.io/v1alpha1
+ kind: ControllerConfiguration
+ logging:
+ verbosity: 2
+ format: text
+ leaderElectionConfig:
+ namespace: kube-system
+ kubernetesAPIQPS: 9000
+ kubernetesAPIBurst: 9000
+ numberOfConcurrentWorkers: 200
+ featureGates:
+ AdditionalCertificateOutputFormats: true
+ DisallowInsecureCSRUsageDefinition: true
+ ExperimentalCertificateSigningRequestControllers: true
+ ExperimentalGatewayAPISupport: true
+ LiteralCertificateSubject: true
+ SecretsFilteredCaching: true
+ ServerSideApply: true
+ StableCertificateRequestName: true
+ UseCertificateRequestBasicConstraints: true
+ ValidateCAA: true
+ metricsTLSConfig:
+ dynamic:
+ secretNamespace: "cert-manager"
+ secretName: "cert-manager-metrics-ca"
+ dnsNames:
+ - cert-manager-metrics
+ - cert-manager-metrics.cert-manager
+ - cert-manager-metrics.cert-manager.svc
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+dns01RecursiveNameservers
+
+
+Comma separated string with host and port of the recursive nameservers cert-manager should query
+
+
+string
+
+
+```yaml
+""
+```
+
+
+
+
+dns01RecursiveNameserversOnly
+
+
+Forces cert-manager to only use the recursive nameservers for verification. Enabling this option could cause the DNS01 self check to take longer due to caching performed by the recursive nameservers
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+extraArgs
+
+
+Additional command line flags to pass to cert-manager controller binary. To see all available flags run docker run quay.io/jetstack/cert-manager-controller:
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+extraEnv
+
+
+Additional environment variables to pass to cert-manager controller binary.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+resources
+
+
+Resources to provide to the cert-manager controller pod
+
+For example:
+
+```yaml
+requests:
+ cpu: 10m
+ memory: 32Mi
+```
+
+
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+securityContext
+
+
+Pod Security Context
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+```yaml
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+```
+
+
+
+
+containerSecurityContext
+
+
+Container Security Context to be set on the controller component container
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+```yaml
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+```
+
+
+
+
+volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+deploymentAnnotations
+
+
+Optional additional annotations to add to the controller Deployment
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+podAnnotations
+
+
+Optional additional annotations to add to the controller Pods
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+podLabels
+
+
+Optional additional labels to add to the controller Pods
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+serviceAnnotations
+
+
+Optional annotations to add to the controller Service
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+serviceLabels
+
+
+Optional additional labels to add to the controller Service
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+podDnsPolicy
+
+
+Pod DNS policy
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy
+```
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+podDnsConfig
+
+
+Pod DNS config, podDnsConfig field is optional and it can work with any podDnsPolicy settings. However, when a Pod's dnsPolicy is set to "None", the dnsConfig field has to be specified.
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-dns-config
+```
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+```yaml
+kubernetes.io/os: linux
+```
+
+
+
+
+ingressShim.defaultIssuerName
+
+
+Optional default issuer to use for ingress resources
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+ingressShim.defaultIssuerKind
+
+
+Optional default issuer kind to use for ingress resources
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+ingressShim.defaultIssuerGroup
+
+
+Optional default issuer group to use for ingress resources
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+```yaml
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+```yaml
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+```
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+topologySpreadConstraints
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+```yaml
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+```
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+livenessProbe
+
+
+LivenessProbe settings for the controller container of the controller Pod.
+
+Enabled by default, because we want to enable the clock-skew liveness probe that restarts the controller in case of a skew between the system clock and the monotonic clock. LivenessProbe durations and thresholds are based on those used for the Kubernetes controller-manager. See: https://github.com/kubernetes/kubernetes/blob/806b30170c61a38fedd54cc9ede4cd6275a1ad3b/cmd/kubeadm/app/util/staticpod/utils.go#L241-L245
+
+
+
+object
+
+
+```yaml
+enabled: true
+failureThreshold: 8
+initialDelaySeconds: 10
+periodSeconds: 10
+successThreshold: 1
+timeoutSeconds: 15
+```
+
+
+
+
+enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+prometheus.enabled
+
+
+Enable prometheus monitoring for the cert-manager controller, to use with. Prometheus Operator either `prometheus.servicemonitor.enabled` or
+`prometheus.podmonitor.enabled` can be used to create a ServiceMonitor/PodMonitor
+resource
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+prometheus.servicemonitor.enabled
+
+
+Create a ServiceMonitor to add cert-manager to Prometheus
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+prometheus.servicemonitor.prometheusInstance
+
+
+Specifies the `prometheus` label on the created ServiceMonitor, this is used when different Prometheus instances have label selectors matching different ServiceMonitors.
+
+
+string
+
+
+```yaml
+default
+```
+
+
+
+
+prometheus.servicemonitor.targetPort
+
+
+The target port to set on the ServiceMonitor, should match the port that cert-manager controller is listening on for metrics
+
+
+number
+
+
+```yaml
+9402
+```
+
+
+
+
+prometheus.servicemonitor.path
+
+
+The path to scrape for metrics
+
+
+string
+
+
+```yaml
+/metrics
+```
+
+
+
+
+prometheus.servicemonitor.interval
+
+
+The interval to scrape metrics
+
+
+string
+
+
+```yaml
+60s
+```
+
+
+
+
+prometheus.servicemonitor.scrapeTimeout
+
+
+The timeout before a metrics scrape fails
+
+
+string
+
+
+```yaml
+30s
+```
+
+
+
+
+prometheus.servicemonitor.labels
+
+
+Additional labels to add to the ServiceMonitor
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+prometheus.servicemonitor.annotations
+
+
+Additional annotations to add to the ServiceMonitor
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+prometheus.servicemonitor.honorLabels
+
+
+Keep labels from scraped data, overriding server-side labels.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+prometheus.servicemonitor.endpointAdditionalProperties
+
+
+EndpointAdditionalProperties allows setting additional properties on the endpoint such as relabelings, metricRelabelings etc.
+
+For example:
+
+```yaml
+endpointAdditionalProperties:
+ relabelings:
+ - action: replace
+ sourceLabels:
+ - __meta_kubernetes_pod_node_name
+ targetLabel: instance
+```
+
+
+
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+prometheus.podmonitor.enabled
+
+
+Create a PodMonitor to add cert-manager to Prometheus
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+prometheus.podmonitor.prometheusInstance
+
+
+Specifies the `prometheus` label on the created PodMonitor, this is used when different Prometheus instances have label selectors matching different PodMonitor.
+
+
+string
+
+
+```yaml
+default
+```
+
+
+
+
+prometheus.podmonitor.path
+
+
+The path to scrape for metrics
+
+
+string
+
+
+```yaml
+/metrics
+```
+
+
+
+
+prometheus.podmonitor.interval
+
+
+The interval to scrape metrics
+
+
+string
+
+
+```yaml
+60s
+```
+
+
+
+
+prometheus.podmonitor.scrapeTimeout
+
+
+The timeout before a metrics scrape fails
+
+
+string
+
+
+```yaml
+30s
+```
+
+
+
+
+prometheus.podmonitor.labels
+
+
+Additional labels to add to the PodMonitor
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+prometheus.podmonitor.annotations
+
+
+Additional annotations to add to the PodMonitor
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+prometheus.podmonitor.honorLabels
+
+
+Keep labels from scraped data, overriding server-side labels.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+
+
+### Webhook
+
+
+prometheus.podmonitor.endpointAdditionalProperties
+
+
+EndpointAdditionalProperties allows setting additional properties on the endpoint such as relabelings, metricRelabelings etc.
+
+For example:
+
+```yaml
+endpointAdditionalProperties:
+ relabelings:
+ - action: replace
+ sourceLabels:
+ - __meta_kubernetes_pod_node_name
+ targetLabel: instance
+```
+
+
+
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+
+### CA Injector
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+webhook.replicaCount
+
+
+Number of replicas of the cert-manager webhook to run.
+
+The default is 1, but in production you should set this to 2 or 3 to provide high availability.
+
+If `replicas > 1` you should also consider setting webhook.podDisruptionBudget.enabled=true.
+
+
+number
+
+
+```yaml
+1
+```
+
+
+
+
+webhook.timeoutSeconds
+
+
+Seconds the API server should wait for the webhook to respond before treating the call as a failure.
+Value must be between 1 and 30 seconds. See:
+https://kubernetes.io/docs/reference/kubernetes-api/extend-resources/validating-webhook-configuration-v1/
+
+We set the default to the maximum value of 30 seconds. Here's why: Users sometimes report that the connection between the K8S API server and the cert-manager webhook server times out. If *this* timeout is reached, the error message will be "context deadline exceeded", which doesn't help the user diagnose what phase of the HTTPS connection timed out. For example, it could be during DNS resolution, TCP connection, TLS negotiation, HTTP negotiation, or slow HTTP response from the webhook server. So by setting this timeout to its maximum value the underlying timeout error message has more chance of being returned to the end user.
+
+
+number
+
+
+```yaml
+30
+```
+
+
+
+
+webhook.config
+
+
+Used to configure options for the webhook pod.
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+For example:
+
+```yaml
+apiVersion: webhook.config.cert-manager.io/v1alpha1
+kind: WebhookConfiguration
+# The port that the webhook should listen on for requests.
+# In GKE private clusters, by default kubernetes apiservers are allowed to
+# talk to the cluster nodes only on 443 and 10250. so configuring
+# securePort: 10250, will work out of the box without needing to add firewall
+# rules or requiring NET_BIND_SERVICE capabilities to bind port numbers < 1000.
+# This should be uncommented and set as a default by the chart once we graduate
+# the apiVersion of WebhookConfiguration past v1alpha1.
+securePort: 10250
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+webhook.strategy
+
+
+Deployment update strategy for the cert-manager webhook deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+For example:
+
+```yaml
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+webhook.securityContext
+
+
+Pod Security Context to be set on the webhook component Pod
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+```yaml
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+```
+
+
+
+
+webhook.containerSecurityContext
+
+
+Container Security Context to be set on the webhook component container
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+```yaml
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+```
+
+
+
+
+webhook.podDisruptionBudget.enabled
+
+
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+webhook.podDisruptionBudget.minAvailable
+
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
+
+
+
+number
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.podDisruptionBudget.maxUnavailable
+
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
+
+
+
+number
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.deploymentAnnotations
+
+
+Optional additional annotations to add to the webhook Deployment
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.podAnnotations
+
+
+Optional additional annotations to add to the webhook Pods
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.serviceAnnotations
+
+
+Optional additional annotations to add to the webhook Service
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.mutatingWebhookConfigurationAnnotations
+
+
+Optional additional annotations to add to the webhook MutatingWebhookConfiguration
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.validatingWebhookConfigurationAnnotations
+
+
+Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.extraArgs
+
+
+Additional command line flags to pass to cert-manager webhook binary. To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+webhook.featureGates
+
+
+Comma separated list of feature gates that should be enabled on the webhook pod.
+
+
+string
+
+
+```yaml
+""
+```
+
+
+
+
+webhook.resources
+
+
+Resources to provide to the cert-manager webhook pod
+
+For example:
+
+```yaml
+requests:
+ cpu: 10m
+ memory: 32Mi
+```
+
+
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+webhook.livenessProbe
+
+
+Liveness probe values
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+```
+
+
+
+
+
+object
+
+
+```yaml
+failureThreshold: 3
+initialDelaySeconds: 60
+periodSeconds: 10
+successThreshold: 1
+timeoutSeconds: 1
+```
+
+
+
+
+webhook.readinessProbe
+
+
+Readiness probe values
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+```
+
+
+
+
+
+object
+
+
+```yaml
+failureThreshold: 3
+initialDelaySeconds: 5
+periodSeconds: 5
+successThreshold: 1
+timeoutSeconds: 1
+```
+
+
+
+
+webhook.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+```yaml
+kubernetes.io/os: linux
+```
+
+
+
+
+webhook.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+```yaml
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+webhook.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+```yaml
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+```
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+webhook.topologySpreadConstraints
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+```yaml
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+```
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+webhook.podLabels
+
+
+Optional additional labels to add to the Webhook Pods
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+webhook.serviceLabels
+
+
+Optional additional labels to add to the Webhook Service
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+webhook.image.registry
+
+
+The container registry to pull the webhook image from
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.image.repository
+
+
+The container image for the cert-manager webhook
+
+
+
+string
+
+
+```yaml
+quay.io/jetstack/cert-manager-webhook
+```
+
+
+
+
+webhook.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+```yaml
+IfNotPresent
+```
+
+
+
+
+webhook.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+webhook.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.serviceAccount.annotations
+
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.serviceAccount.labels
+
+
+Optional additional labels to add to the webhook's ServiceAccount
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+webhook.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.securePort
+
+
+The port that the webhook should listen on for requests. In GKE private clusters, by default kubernetes apiservers are allowed to talk to the cluster nodes only on 443 and 10250. so configuring securePort: 10250, will work out of the box without needing to add firewall rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
+
+
+number
+
+
+```yaml
+10250
+```
+
+
+
+
+webhook.hostNetwork
+
+
+Specifies if the webhook should be started in hostNetwork mode.
+
+Required for use in some managed kubernetes clusters (such as AWS EKS) with custom. CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working
+
+Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+webhook.serviceType
+
+
+Specifies how the service should be handled. Useful if you want to expose the webhook to outside of the cluster. In some cases, the control plane cannot reach internal services.
+
+
+string
+
+
+```yaml
+ClusterIP
+```
+
+
+
+
+webhook.loadBalancerIP
+
+
+Specify the load balancer IP for the created service
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+webhook.url
+
+
+Overrides the mutating webhook and validating webhook so they reach the webhook service using the `url` field instead of a service.
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+webhook.networkPolicy.enabled
+
+
+Create network policies for the webhooks
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+webhook.networkPolicy.ingress
+
+
+Ingress rule for the webhook network policy, by default will allow all inbound traffic
+
+
+
+array
+
+
+```yaml
+- from:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+```
+
+
+
+
+webhook.networkPolicy.egress
+
+
+Egress rule for the webhook network policy, by default will allow all outbound traffic traffic to ports 80 and 443, as well as DNS ports
+
+
+
+array
+
+
+```yaml
+- ports:
+ - port: 80
+ protocol: TCP
+ - port: 443
+ protocol: TCP
+ - port: 53
+ protocol: TCP
+ - port: 53
+ protocol: UDP
+ - port: 6443
+ protocol: TCP
+ to:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+```
+
+
+
+
+webhook.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+webhook.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+webhook.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+
+### ACME Solver
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+cainjector.enabled
+
+
+Create the CA Injector deployment
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+cainjector.replicaCount
+
+
+Number of replicas of the cert-manager cainjector to run.
+
+The default is 1, but in production you should set this to 2 or 3 to provide high availability.
+
+If `replicas > 1` you should also consider setting cainjector.podDisruptionBudget.enabled=true.
+
+Note: cert-manager uses leader election to ensure that there can only be a single instance active at a time.
+
+
+number
+
+
+```yaml
+1
+```
+
+
+
+
+cainjector.config
+
+
+Used to configure options for the cainjector pod.
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+For example:
+
+```yaml
+apiVersion: cainjector.config.cert-manager.io/v1alpha1
+kind: CAInjectorConfiguration
+logging:
+ verbosity: 2
+ format: text
+leaderElectionConfig:
+ namespace: kube-system
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+cainjector.strategy
+
+
+Deployment update strategy for the cert-manager cainjector deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+For example:
+
+```yaml
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+cainjector.securityContext
+
+
+Pod Security Context to be set on the cainjector component Pod
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+```yaml
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+```
+
+
+
+
+cainjector.containerSecurityContext
+
+
+Container Security Context to be set on the cainjector component container
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+```yaml
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+```
+
+
+
+
+cainjector.podDisruptionBudget.enabled
+
+
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+cainjector.podDisruptionBudget.minAvailable
+
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
+
+
+
+number
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.podDisruptionBudget.maxUnavailable
+
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
+
+
+
+number
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.deploymentAnnotations
+
+
+Optional additional annotations to add to the cainjector Deployment
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.podAnnotations
+
+
+Optional additional annotations to add to the cainjector Pods
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.extraArgs
+
+
+Additional command line flags to pass to cert-manager cainjector binary. To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+cainjector.featureGates
+
+
+Comma separated list of feature gates that should be enabled on the cainjector pod.
+
+
+string
+
+
+```yaml
+""
+```
+
+
+
+
+cainjector.resources
+
+
+Resources to provide to the cert-manager cainjector pod
+
+For example:
+
+```yaml
+requests:
+ cpu: 10m
+ memory: 32Mi
+```
+
+
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+cainjector.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+```yaml
+kubernetes.io/os: linux
+```
+
+
+
+
+cainjector.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+```yaml
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+cainjector.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+```yaml
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+```
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+cainjector.topologySpreadConstraints
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+```yaml
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+```
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+cainjector.podLabels
+
+
+Optional additional labels to add to the CA Injector Pods
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+cainjector.image.registry
+
+
+The container registry to pull the cainjector image from
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.image.repository
+
+
+The container image for the cert-manager cainjector
+
+
+
+string
+
+
+```yaml
+quay.io/jetstack/cert-manager-controller
+```
+
+
+
+
+cainjector.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+```yaml
+IfNotPresent
+```
+
+
+
+
+cainjector.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+cainjector.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.serviceAccount.annotations
+
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.serviceAccount.labels
+
+
+Optional additional labels to add to the cainjector's ServiceAccount
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+cainjector.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+```yaml
+undefined
+```
+
+
+
+
+cainjector.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+cainjector.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+cainjector.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+
+
+
+### Startup API Check
+
+
+This startupapicheck is a Helm post-install hook that waits for the webhook endpoints to become available. The check is implemented using a Kubernetes Job - if you are injecting mesh sidecar proxies into cert-manager pods, you probably want to ensure that they are not injected into this Job's pod. Otherwise the installation may time out due to the Job never being completed because the sidecar proxy does not exit. See https://github.com/cert-manager/cert-manager/pull/4414 for context.
+
+
+
+Property
+Description
+Type
+Default
+
+
+acmesolver.image.registry
+
+
+The container registry to pull the acmesolver image from
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+acmesolver.image.repository
+
+
+The container image for the cert-manager acmesolver
+
+
+
+string
+
+
+```yaml
+quay.io/jetstack/cert-manager-acmesolver
+```
+
+
+
+
+acmesolver.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+acmesolver.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+acmesolver.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+```yaml
+IfNotPresent
+```
+
+
+
+
+
+# The port that the webhook should listen on for requests.
+# In GKE private clusters, by default kubernetes apiservers are allowed to
+# talk to the cluster nodes only on 443 and 10250. so configuring
+# securePort: 10250, will work out of the box without needing to add firewall
+# rules or requiring NET_BIND_SERVICE capabilities to bind port numbers < 1000.
+# This should be uncommented and set as a default by the chart once we graduate
+# the apiVersion of WebhookConfiguration past v1alpha1.
+securePort: 10250
+```
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+startupapicheck.enabled
+
+
+Enables the startup api check
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+startupapicheck.securityContext
+
+
+Pod Security Context to be set on the startupapicheck component Pod
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+```yaml
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+```
+
+
+
+
+startupapicheck.containerSecurityContext
+
+
+Container Security Context to be set on the controller component container
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+```yaml
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+```
+
+
+
+
+startupapicheck.timeout
+
+
+Timeout for 'kubectl check api' command
+
+
+string
+
+
+```yaml
+1m
+```
+
+
+
+
+startupapicheck.backoffLimit
+
+
+Job backoffLimit
+
+
+number
+
+
+```yaml
+4
+```
+
+
+
+
+startupapicheck.jobAnnotations
+
+
+Optional additional annotations to add to the startupapicheck Job
+
+
+
+object
+
+
+```yaml
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "1"
+```
+
+
+
+
+startupapicheck.extraArgs[0]
+
+
+
+string
+
+
+```yaml
+-v
+```
+
+
+
+
+startupapicheck.resources
+
+
+Resources to provide to the cert-manager controller pod
+
+For example:
+
+```yaml
+requests:
+ cpu: 10m
+ memory: 32Mi
+```
+
+
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+startupapicheck.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+```yaml
+kubernetes.io/os: linux
+```
+
+
+
+
+startupapicheck.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+```yaml
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+```
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+startupapicheck.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+```yaml
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+```
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+startupapicheck.podLabels
+
+
+Optional additional labels to add to the startupapicheck Pods
+
+
+object
+
+
+```yaml
+{}
+```
+
+
+
+
+startupapicheck.image.registry
+
+
+The container registry to pull the startupapicheck image from
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+startupapicheck.image.repository
+
+
+The container image for the cert-manager startupapicheck
+
+
+
+string
+
+
+```yaml
+quay.io/jetstack/cert-manager-startupapicheck
+```
+
+
+
+
+startupapicheck.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+startupapicheck.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+startupapicheck.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+```yaml
+IfNotPresent
+```
+
+
+
+
+startupapicheck.rbac.annotations
+
+
+annotations for the startup API Check job RBAC and PSP resources
+
+
+
+object
+
+
+```yaml
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+```
+
+
+
+
+startupapicheck.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+```yaml
+undefined
+```
+
+
+
+
+startupapicheck.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+startupapicheck.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+```yaml
+undefined
+```
+
+
+
+
+startupapicheck.serviceAccount.annotations
+
+
+Optional additional annotations to add to the Job's ServiceAccount
+
+
+
+object
+
+
+```yaml
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+```
+
+
+
+
+startupapicheck.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+
+bool
+
+
+```yaml
+true
+```
+
+
+
+
+startupapicheck.serviceAccount.labels
+
+
+Optional additional labels to add to the startupapicheck's ServiceAccount
+
+
+
+object
+
+
+```yaml
+undefined
+```
+
+
+
+
+startupapicheck.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+startupapicheck.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+```yaml
+[]
+```
+
+
+
+
+startupapicheck.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+```yaml
+false
+```
+
+
+object
+
+
+
+
+
+{}
+
+
+
+
+webhook.strategy
+
+
+Deployment update strategy for the cert-manager webhook deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+For example:
+
+```yaml
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.securityContext
+
+
+Pod Security Context to be set on the webhook component Pod
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+webhook.containerSecurityContext
+
+
+Container Security Context to be set on the webhook component container
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+webhook.podDisruptionBudget.enabled
+
+
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.podDisruptionBudget.minAvailable
+
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.podDisruptionBudget.maxUnavailable
+
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.deploymentAnnotations
+
+
+Optional additional annotations to add to the webhook Deployment
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.podAnnotations
+
+
+Optional additional annotations to add to the webhook Pods
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAnnotations
+
+
+Optional additional annotations to add to the webhook Service
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.mutatingWebhookConfigurationAnnotations
+
+
+Optional additional annotations to add to the webhook MutatingWebhookConfiguration
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.validatingWebhookConfigurationAnnotations
+
+
+Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.extraArgs
+
+
+Additional command line flags to pass to cert-manager webhook binary. To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:
+array
+
+
+
+
+[]
+
+
+
+
+webhook.featureGates
+
+
+Comma separated list of feature gates that should be enabled on the webhook pod.
+
+
+string
+
+
+
+
+""
+
+
+
+
+webhook.resources
+
+
+Resources to provide to the cert-manager webhook pod
+
+For example:
+
+```yaml
+requests:
+ cpu: 10m
+ memory: 32Mi
+```
+
+
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.livenessProbe
+
+
+Liveness probe values
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+```
+
+
+
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 60
+periodSeconds: 10
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.readinessProbe
+
+
+Readiness probe values
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+```
+
+
+
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 5
+periodSeconds: 5
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+webhook.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+```yaml
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+```yaml
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+```
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.topologySpreadConstraints
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+```yaml
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+```
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.podLabels
+
+
+Optional additional labels to add to the Webhook Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.serviceLabels
+
+
+Optional additional labels to add to the Webhook Service
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.image.registry
+
+
+The container registry to pull the webhook image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.repository
+
+
+The container image for the cert-manager webhook
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-webhook
+
+
+
+
+webhook.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+webhook.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.annotations
+
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.labels
+
+
+Optional additional labels to add to the webhook's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+webhook.securePort
+
+
+The port that the webhook should listen on for requests. In GKE private clusters, by default kubernetes apiservers are allowed to talk to the cluster nodes only on 443 and 10250. so configuring securePort: 10250, will work out of the box without needing to add firewall rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
+
+
+number
+
+
+
+
+10250
+
+
+
+
+webhook.hostNetwork
+
+
+Specifies if the webhook should be started in hostNetwork mode.
+
+Required for use in some managed kubernetes clusters (such as AWS EKS) with custom. CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working
+
+Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.serviceType
+
+
+Specifies how the service should be handled. Useful if you want to expose the webhook to outside of the cluster. In some cases, the control plane cannot reach internal services.
+
+
+string
+
+
+
+
+ClusterIP
+
+
+
+
+webhook.loadBalancerIP
+
+
+Specify the load balancer IP for the created service
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.url
+
+
+Overrides the mutating webhook and validating webhook so they reach the webhook service using the `url` field instead of a service.
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.networkPolicy.enabled
+
+
+Create network policies for the webhooks
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.networkPolicy.ingress
+
+
+Ingress rule for the webhook network policy, by default will allow all inbound traffic
+
+
+
+array
+
+
+
+
+- from:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.networkPolicy.egress
+
+
+Egress rule for the webhook network policy, by default will allow all outbound traffic traffic to ports 80 and 443, as well as DNS ports
+
+
+
+array
+
+
+
+
+- ports:
+ - port: 80
+ protocol: TCP
+ - port: 443
+ protocol: TCP
+ - port: 53
+ protocol: TCP
+ - port: 53
+ protocol: UDP
+ - port: 6443
+ protocol: TCP
+ to:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+
+
+### CA Injector
+
+
+webhook.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### ACME Solver
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+cainjector.enabled
+
+
+Create the CA Injector deployment
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.replicaCount
+
+
+Number of replicas of the cert-manager cainjector to run.
+
+The default is 1, but in production you should set this to 2 or 3 to provide high availability.
+
+If `replicas > 1` you should also consider setting cainjector.podDisruptionBudget.enabled=true.
+
+Note: cert-manager uses leader election to ensure that there can only be a single instance active at a time.
+
+
+number
+
+
+
+
+1
+
+
+
+
+cainjector.config
+
+
+Used to configure options for the cainjector pod.
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+For example:
+
+```yaml
+apiVersion: cainjector.config.cert-manager.io/v1alpha1
+kind: CAInjectorConfiguration
+logging:
+ verbosity: 2
+ format: text
+leaderElectionConfig:
+ namespace: kube-system
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.strategy
+
+
+Deployment update strategy for the cert-manager cainjector deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+For example:
+
+```yaml
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.securityContext
+
+
+Pod Security Context to be set on the cainjector component Pod
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+cainjector.containerSecurityContext
+
+
+Container Security Context to be set on the cainjector component container
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+cainjector.podDisruptionBudget.enabled
+
+
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+cainjector.podDisruptionBudget.minAvailable
+
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+cainjector.podDisruptionBudget.maxUnavailable
+
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+cainjector.deploymentAnnotations
+
+
+Optional additional annotations to add to the cainjector Deployment
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.podAnnotations
+
+
+Optional additional annotations to add to the cainjector Pods
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.extraArgs
+
+
+Additional command line flags to pass to cert-manager cainjector binary. To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.featureGates
+
+
+Comma separated list of feature gates that should be enabled on the cainjector pod.
+
+
+string
+
+
+
+
+""
+
+
+
+
+cainjector.resources
+
+
+Resources to provide to the cert-manager cainjector pod
+
+For example:
+
+```yaml
+requests:
+ cpu: 10m
+ memory: 32Mi
+```
+
+
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+cainjector.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+```yaml
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+```yaml
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+```
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.topologySpreadConstraints
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+```yaml
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+```
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.podLabels
+
+
+Optional additional labels to add to the CA Injector Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.image.registry
+
+
+The container registry to pull the cainjector image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.repository
+
+
+The container image for the cert-manager cainjector
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-controller
+
+
+
+
+cainjector.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+cainjector.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.annotations
+
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.labels
+
+
+Optional additional labels to add to the cainjector's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+cainjector.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### Startup API Check
+
+
+This startupapicheck is a Helm post-install hook that waits for the webhook endpoints to become available. The check is implemented using a Kubernetes Job - if you are injecting mesh sidecar proxies into cert-manager pods, you probably want to ensure that they are not injected into this Job's pod. Otherwise the installation may time out due to the Job never being completed because the sidecar proxy does not exit. See https://github.com/cert-manager/cert-manager/pull/4414 for context.
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+acmesolver.image.registry
+
+
+The container registry to pull the acmesolver image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.repository
+
+
+The container image for the cert-manager acmesolver
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-acmesolver
+
+
+
+
+acmesolver.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+# The port that the webhook should listen on for requests.
+# In GKE private clusters, by default kubernetes apiservers are allowed to
+# talk to the cluster nodes only on 443 and 10250. so configuring
+# securePort: 10250, will work out of the box without needing to add firewall
+# rules or requiring NET_BIND_SERVICE capabilities to bind port numbers < 1000.
+# This should be uncommented and set as a default by the chart once we graduate
+# the apiVersion of WebhookConfiguration past v1alpha1.
+securePort: 10250
+
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+startupapicheck.enabled
+
+
+Enables the startup api check
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.securityContext
+
+
+Pod Security Context to be set on the startupapicheck component Pod
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+startupapicheck.containerSecurityContext
+
+
+Container Security Context to be set on the controller component container
+
+```yaml
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+```
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+startupapicheck.timeout
+
+
+Timeout for 'kubectl check api' command
+
+
+string
+
+
+
+
+1m
+
+
+
+
+startupapicheck.backoffLimit
+
+
+Job backoffLimit
+
+
+number
+
+
+
+
+4
+
+
+
+
+startupapicheck.jobAnnotations
+
+
+Optional additional annotations to add to the startupapicheck Job
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "1"
+
+
+
+
+startupapicheck.extraArgs[0]
+
+
+
+string
+
+
+
+
+-v
+
+
+
+
+startupapicheck.resources
+
+
+Resources to provide to the cert-manager controller pod
+
+For example:
+
+```yaml
+requests:
+ cpu: 10m
+ memory: 32Mi
+```
+
+
+
+```yaml
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+startupapicheck.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+```yaml
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+```
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+```yaml
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+```
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.podLabels
+
+
+Optional additional labels to add to the startupapicheck Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.image.registry
+
+
+The container registry to pull the startupapicheck image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.repository
+
+
+The container image for the cert-manager startupapicheck
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-startupapicheck
+
+
+
+
+startupapicheck.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+startupapicheck.rbac.annotations
+
+
+annotations for the startup API Check job RBAC and PSP resources
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+
+
+
+
+startupapicheck.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.serviceAccount.annotations
+
+
+Optional additional annotations to add to the Job's ServiceAccount
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+
+
+
+
+startupapicheck.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.serviceAccount.labels
+
+
+Optional additional labels to add to the startupapicheck's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+object
+
+
+
+
+
+{}
+
+
+
+
+webhook.strategy
+
+
+Deployment update strategy for the cert-manager webhook deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+For example:
+
+
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.securityContext
+
+
+Pod Security Context to be set on the webhook component Pod
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+webhook.containerSecurityContext
+
+
+Container Security Context to be set on the webhook component container
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+webhook.podDisruptionBudget.enabled
+
+
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.podDisruptionBudget.minAvailable
+
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.podDisruptionBudget.maxUnavailable
+
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.deploymentAnnotations
+
+
+Optional additional annotations to add to the webhook Deployment
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.podAnnotations
+
+
+Optional additional annotations to add to the webhook Pods
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAnnotations
+
+
+Optional additional annotations to add to the webhook Service
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.mutatingWebhookConfigurationAnnotations
+
+
+Optional additional annotations to add to the webhook MutatingWebhookConfiguration
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.validatingWebhookConfigurationAnnotations
+
+
+Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.extraArgs
+
+
+Additional command line flags to pass to cert-manager webhook binary. To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:
+array
+
+
+
+
+[]
+
+
+
+
+webhook.featureGates
+
+
+Comma separated list of feature gates that should be enabled on the webhook pod.
+
+
+string
+
+
+
+
+""
+
+
+
+
+webhook.resources
+
+
+Resources to provide to the cert-manager webhook pod
+
+For example:
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.livenessProbe
+
+
+Liveness probe values
+
+
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+
+
+
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 60
+periodSeconds: 10
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.readinessProbe
+
+
+Readiness probe values
+
+
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+
+
+
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 5
+periodSeconds: 5
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+webhook.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.topologySpreadConstraints
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.podLabels
+
+
+Optional additional labels to add to the Webhook Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.serviceLabels
+
+
+Optional additional labels to add to the Webhook Service
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.image.registry
+
+
+The container registry to pull the webhook image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.repository
+
+
+The container image for the cert-manager webhook
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-webhook
+
+
+
+
+webhook.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+webhook.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.annotations
+
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.labels
+
+
+Optional additional labels to add to the webhook's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+webhook.securePort
+
+
+The port that the webhook should listen on for requests. In GKE private clusters, by default kubernetes apiservers are allowed to talk to the cluster nodes only on 443 and 10250. so configuring securePort: 10250, will work out of the box without needing to add firewall rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
+
+
+number
+
+
+
+
+10250
+
+
+
+
+webhook.hostNetwork
+
+
+Specifies if the webhook should be started in hostNetwork mode.
+
+Required for use in some managed kubernetes clusters (such as AWS EKS) with custom. CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working
+
+Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.serviceType
+
+
+Specifies how the service should be handled. Useful if you want to expose the webhook to outside of the cluster. In some cases, the control plane cannot reach internal services.
+
+
+string
+
+
+
+
+ClusterIP
+
+
+
+
+webhook.loadBalancerIP
+
+
+Specify the load balancer IP for the created service
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.url
+
+
+Overrides the mutating webhook and validating webhook so they reach the webhook service using the `url` field instead of a service.
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.networkPolicy.enabled
+
+
+Create network policies for the webhooks
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.networkPolicy.ingress
+
+
+Ingress rule for the webhook network policy, by default will allow all inbound traffic
+
+
+
+array
+
+
+
+
+- from:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.networkPolicy.egress
+
+
+Egress rule for the webhook network policy, by default will allow all outbound traffic traffic to ports 80 and 443, as well as DNS ports
+
+
+
+array
+
+
+
+
+- ports:
+ - port: 80
+ protocol: TCP
+ - port: 443
+ protocol: TCP
+ - port: 53
+ protocol: TCP
+ - port: 53
+ protocol: UDP
+ - port: 6443
+ protocol: TCP
+ to:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+
+
+### CA Injector
+
+
+webhook.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### ACME Solver
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+cainjector.enabled
+
+
+Create the CA Injector deployment
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.replicaCount
+
+
+Number of replicas of the cert-manager cainjector to run.
+
+The default is 1, but in production you should set this to 2 or 3 to provide high availability.
+
+If `replicas > 1` you should also consider setting cainjector.podDisruptionBudget.enabled=true.
+
+Note: cert-manager uses leader election to ensure that there can only be a single instance active at a time.
+
+
+number
+
+
+
+
+1
+
+
+
+
+cainjector.config
+
+
+Used to configure options for the cainjector pod.
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+For example:
+
+
+apiVersion: cainjector.config.cert-manager.io/v1alpha1
+kind: CAInjectorConfiguration
+logging:
+ verbosity: 2
+ format: text
+leaderElectionConfig:
+ namespace: kube-system
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.strategy
+
+
+Deployment update strategy for the cert-manager cainjector deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+For example:
+
+
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.securityContext
+
+
+Pod Security Context to be set on the cainjector component Pod
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+cainjector.containerSecurityContext
+
+
+Container Security Context to be set on the cainjector component container
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+cainjector.podDisruptionBudget.enabled
+
+
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+cainjector.podDisruptionBudget.minAvailable
+
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+cainjector.podDisruptionBudget.maxUnavailable
+
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+cainjector.deploymentAnnotations
+
+
+Optional additional annotations to add to the cainjector Deployment
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.podAnnotations
+
+
+Optional additional annotations to add to the cainjector Pods
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.extraArgs
+
+
+Additional command line flags to pass to cert-manager cainjector binary. To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.featureGates
+
+
+Comma separated list of feature gates that should be enabled on the cainjector pod.
+
+
+string
+
+
+
+
+""
+
+
+
+
+cainjector.resources
+
+
+Resources to provide to the cert-manager cainjector pod
+
+For example:
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+cainjector.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.topologySpreadConstraints
+
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.podLabels
+
+
+Optional additional labels to add to the CA Injector Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.image.registry
+
+
+The container registry to pull the cainjector image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.repository
+
+
+The container image for the cert-manager cainjector
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-controller
+
+
+
+
+cainjector.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+cainjector.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.annotations
+
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.labels
+
+
+Optional additional labels to add to the cainjector's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+cainjector.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### Startup API Check
+
+
+This startupapicheck is a Helm post-install hook that waits for the webhook endpoints to become available. The check is implemented using a Kubernetes Job - if you are injecting mesh sidecar proxies into cert-manager pods, you probably want to ensure that they are not injected into this Job's pod. Otherwise the installation may time out due to the Job never being completed because the sidecar proxy does not exit. See https://github.com/cert-manager/cert-manager/pull/4414 for context.
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+acmesolver.image.registry
+
+
+The container registry to pull the acmesolver image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.repository
+
+
+The container image for the cert-manager acmesolver
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-acmesolver
+
+
+
+
+acmesolver.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+# The port that the webhook should listen on for requests.
+# In GKE private clusters, by default kubernetes apiservers are allowed to
+# talk to the cluster nodes only on 443 and 10250. so configuring
+# securePort: 10250, will work out of the box without needing to add firewall
+# rules or requiring NET_BIND_SERVICE capabilities to bind port numbers < 1000.
+# This should be uncommented and set as a default by the chart once we graduate
+# the apiVersion of WebhookConfiguration past v1alpha1.
+securePort: 10250
+
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+startupapicheck.enabled
+
+
+Enables the startup api check
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.securityContext
+
+
+Pod Security Context to be set on the startupapicheck component Pod
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+startupapicheck.containerSecurityContext
+
+
+Container Security Context to be set on the controller component container
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+startupapicheck.timeout
+
+
+Timeout for 'kubectl check api' command
+
+
+string
+
+
+
+
+1m
+
+
+
+
+startupapicheck.backoffLimit
+
+
+Job backoffLimit
+
+
+number
+
+
+
+
+4
+
+
+
+
+startupapicheck.jobAnnotations
+
+
+Optional additional annotations to add to the startupapicheck Job
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "1"
+
+
+
+
+startupapicheck.extraArgs[0]
+
+
+
+string
+
+
+
+
+-v
+
+
+
+
+startupapicheck.resources
+
+
+Resources to provide to the cert-manager controller pod
+
+For example:
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.nodeSelector
+
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+startupapicheck.affinity
+
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.tolerations
+
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.podLabels
+
+
+Optional additional labels to add to the startupapicheck Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.image.registry
+
+
+The container registry to pull the startupapicheck image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.repository
+
+
+The container image for the cert-manager startupapicheck
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-startupapicheck
+
+
+
+
+startupapicheck.image.tag
+
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.digest
+
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.pullPolicy
+
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+startupapicheck.rbac.annotations
+
+
+annotations for the startup API Check job RBAC and PSP resources
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+
+
+
+
+startupapicheck.automountServiceAccountToken
+
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.serviceAccount.create
+
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.serviceAccount.name
+
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.serviceAccount.annotations
+
+
+Optional additional annotations to add to the Job's ServiceAccount
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+
+
+
+
+startupapicheck.serviceAccount.automountServiceAccountToken
+
+
+Automount API credentials for a Service Account.
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.serviceAccount.labels
+
+
+Optional additional labels to add to the startupapicheck's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.volumes
+
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.volumeMounts
+
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.enableServiceLinks
+
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+object
+
+
+
+
+
+{}
+
+
+
+
+webhook.strategy
+
+Deployment update strategy for the cert-manager webhook deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+For example:
+
+
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.securityContext
+
+Pod Security Context to be set on the webhook component Pod
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+webhook.containerSecurityContext
+
+Container Security Context to be set on the webhook component container
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+webhook.podDisruptionBudget.enabled
+
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.podDisruptionBudget.minAvailable
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.podDisruptionBudget.maxUnavailable
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.deploymentAnnotations
+
+Optional additional annotations to add to the webhook Deployment
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.podAnnotations
+
+Optional additional annotations to add to the webhook Pods
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAnnotations
+
+Optional additional annotations to add to the webhook Service
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.mutatingWebhookConfigurationAnnotations
+
+Optional additional annotations to add to the webhook MutatingWebhookConfiguration
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.validatingWebhookConfigurationAnnotations
+
+Optional additional annotations to add to the webhook ValidatingWebhookConfiguration
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.extraArgs
+
+Additional command line flags to pass to cert-manager webhook binary. To see all available flags run docker run quay.io/jetstack/cert-manager-webhook:
+array
+
+
+
+
+[]
+
+
+
+
+webhook.featureGates
+
+Comma separated list of feature gates that should be enabled on the webhook pod.
+
+
+string
+
+
+
+
+""
+
+
+
+
+webhook.resources
+
+Resources to provide to the cert-manager webhook pod
+
+For example:
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.livenessProbe
+
+Liveness probe values
+
+
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+
+
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 60
+periodSeconds: 10
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.readinessProbe
+
+Readiness probe values
+
+
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+
+
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 5
+periodSeconds: 5
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.nodeSelector
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+webhook.affinity
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.tolerations
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.topologySpreadConstraints
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.podLabels
+
+Optional additional labels to add to the Webhook Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.serviceLabels
+
+Optional additional labels to add to the Webhook Service
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.image.registry
+
+The container registry to pull the webhook image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.repository
+
+The container image for the cert-manager webhook
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-webhook
+
+
+
+
+webhook.image.tag
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.digest
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.pullPolicy
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+webhook.serviceAccount.create
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.serviceAccount.name
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.annotations
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.labels
+
+Optional additional labels to add to the webhook's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.automountServiceAccountToken
+
+Automount API credentials for a Service Account.
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.automountServiceAccountToken
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+webhook.securePort
+
+The port that the webhook should listen on for requests. In GKE private clusters, by default kubernetes apiservers are allowed to talk to the cluster nodes only on 443 and 10250. so configuring securePort: 10250, will work out of the box without needing to add firewall rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000
+
+
+number
+
+
+
+
+10250
+
+
+
+
+webhook.hostNetwork
+
+Specifies if the webhook should be started in hostNetwork mode.
+
+Required for use in some managed kubernetes clusters (such as AWS EKS) with custom. CNI (such as calico), because control-plane managed by AWS cannot communicate with pods' IP CIDR and admission webhooks are not working
+
+Since the default port for the webhook conflicts with kubelet on the host network, `webhook.securePort` should be changed to an available port if running in hostNetwork mode.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.serviceType
+
+Specifies how the service should be handled. Useful if you want to expose the webhook to outside of the cluster. In some cases, the control plane cannot reach internal services.
+
+
+string
+
+
+
+
+ClusterIP
+
+
+
+
+webhook.loadBalancerIP
+
+Specify the load balancer IP for the created service
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.url
+
+Overrides the mutating webhook and validating webhook so they reach the webhook service using the `url` field instead of a service.
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.networkPolicy.enabled
+
+Create network policies for the webhooks
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.networkPolicy.ingress
+
+Ingress rule for the webhook network policy, by default will allow all inbound traffic
+
+
+
+array
+
+
+
+
+- from:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.networkPolicy.egress
+
+Egress rule for the webhook network policy, by default will allow all outbound traffic traffic to ports 80 and 443, as well as DNS ports
+
+
+
+array
+
+
+
+
+- ports:
+ - port: 80
+ protocol: TCP
+ - port: 443
+ protocol: TCP
+ - port: 53
+ protocol: TCP
+ - port: 53
+ protocol: UDP
+ - port: 6443
+ protocol: TCP
+ to:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.volumes
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.volumeMounts
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+
+
+### CA Injector
+
+
+webhook.enableServiceLinks
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### ACME Solver
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+cainjector.enabled
+
+Create the CA Injector deployment
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.replicaCount
+
+Number of replicas of the cert-manager cainjector to run.
+
+The default is 1, but in production you should set this to 2 or 3 to provide high availability.
+
+If `replicas > 1` you should also consider setting cainjector.podDisruptionBudget.enabled=true.
+
+Note: cert-manager uses leader election to ensure that there can only be a single instance active at a time.
+
+
+number
+
+
+
+
+1
+
+
+
+
+cainjector.config
+
+Used to configure options for the cainjector pod.
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+For example:
+
+
+apiVersion: cainjector.config.cert-manager.io/v1alpha1
+kind: CAInjectorConfiguration
+logging:
+ verbosity: 2
+ format: text
+leaderElectionConfig:
+ namespace: kube-system
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.strategy
+
+Deployment update strategy for the cert-manager cainjector deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy
+
+For example:
+
+
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.securityContext
+
+Pod Security Context to be set on the cainjector component Pod
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+cainjector.containerSecurityContext
+
+Container Security Context to be set on the cainjector component container
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+cainjector.podDisruptionBudget.enabled
+
+Enable or disable the PodDisruptionBudget resource
+
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+cainjector.podDisruptionBudget.minAvailable
+
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+cainjector.podDisruptionBudget.maxUnavailable
+
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
+
+
+
+number
+
+
+
+
+undefined
+
+
+
+
+cainjector.deploymentAnnotations
+
+Optional additional annotations to add to the cainjector Deployment
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.podAnnotations
+
+Optional additional annotations to add to the cainjector Pods
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.extraArgs
+
+Additional command line flags to pass to cert-manager cainjector binary. To see all available flags run docker run quay.io/jetstack/cert-manager-cainjector:
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.featureGates
+
+Comma separated list of feature gates that should be enabled on the cainjector pod.
+
+
+string
+
+
+
+
+""
+
+
+
+
+cainjector.resources
+
+Resources to provide to the cert-manager cainjector pod
+
+For example:
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.nodeSelector
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+cainjector.affinity
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.tolerations
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.topologySpreadConstraints
+
+A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
+
+For example:
+
+
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.podLabels
+
+Optional additional labels to add to the CA Injector Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.image.registry
+
+The container registry to pull the cainjector image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.repository
+
+The container image for the cert-manager cainjector
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-controller
+
+
+
+
+cainjector.image.tag
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.digest
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.pullPolicy
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+cainjector.serviceAccount.create
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.serviceAccount.name
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.annotations
+
+Optional additional annotations to add to the controller's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.labels
+
+Optional additional labels to add to the cainjector's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.automountServiceAccountToken
+
+Automount API credentials for a Service Account.
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.automountServiceAccountToken
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+cainjector.volumes
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.volumeMounts
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.enableServiceLinks
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### Startup API Check
+
+This startupapicheck is a Helm post-install hook that waits for the webhook endpoints to become available. The check is implemented using a Kubernetes Job - if you are injecting mesh sidecar proxies into cert-manager pods, you probably want to ensure that they are not injected into this Job's pod. Otherwise the installation may time out due to the Job never being completed because the sidecar proxy does not exit. See https://github.com/cert-manager/cert-manager/pull/4414 for context.
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+acmesolver.image.registry
+
+The container registry to pull the acmesolver image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.repository
+
+The container image for the cert-manager acmesolver
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-acmesolver
+
+
+
+
+acmesolver.image.tag
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.digest
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.pullPolicy
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+# The port that the webhook should listen on for requests.
+# In GKE private clusters, by default kubernetes apiservers are allowed to
+# talk to the cluster nodes only on 443 and 10250. so configuring
+# securePort: 10250, will work out of the box without needing to add firewall
+# rules or requiring NET_BIND_SERVICE capabilities to bind port numbers < 1000.
+# This should be uncommented and set as a default by the chart once we graduate
+# the apiVersion of WebhookConfiguration past v1alpha1.
+securePort: 10250
+
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+startupapicheck.enabled
+
+Enables the startup api check
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.securityContext
+
+Pod Security Context to be set on the startupapicheck component Pod
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+startupapicheck.containerSecurityContext
+
+Container Security Context to be set on the controller component container
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+startupapicheck.timeout
+
+Timeout for 'kubectl check api' command
+
+
+string
+
+
+
+
+1m
+
+
+
+
+startupapicheck.backoffLimit
+
+Job backoffLimit
+
+
+number
+
+
+
+
+4
+
+
+
+
+startupapicheck.jobAnnotations
+
+Optional additional annotations to add to the startupapicheck Job
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "1"
+
+
+
+
+startupapicheck.extraArgs[0]
+
+
+
+string
+
+
+
+
+-v
+
+
+
+
+startupapicheck.resources
+
+Resources to provide to the cert-manager controller pod
+
+For example:
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.nodeSelector
+
+The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/
+
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+startupapicheck.affinity
+
+A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core
+
+For example:
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.tolerations
+
+A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core
+
+For example:
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.podLabels
+
+Optional additional labels to add to the startupapicheck Pods
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.image.registry
+
+The container registry to pull the startupapicheck image from
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.repository
+
+The container image for the cert-manager startupapicheck
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-startupapicheck
+
+
+
+
+startupapicheck.image.tag
+
+Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used.
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.digest
+
+Setting a digest will override any tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.pullPolicy
+
+Kubernetes imagePullPolicy on Deployment.
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+startupapicheck.rbac.annotations
+
+annotations for the startup API Check job RBAC and PSP resources
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+
+
+
+
+startupapicheck.automountServiceAccountToken
+
+Automounting API credentials for a particular pod
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.serviceAccount.create
+
+Specifies whether a service account should be created
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.serviceAccount.name
+
+The name of the service account to use.
+If not set and create is true, a name is generated using the fullname template
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.serviceAccount.annotations
+
+Optional additional annotations to add to the Job's ServiceAccount
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+
+
+
+
+startupapicheck.serviceAccount.automountServiceAccountToken
+
+Automount API credentials for a Service Account.
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.serviceAccount.labels
+
+Optional additional labels to add to the startupapicheck's ServiceAccount
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.volumes
+
+Additional volumes to add to the cert-manager controller pod.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.volumeMounts
+
+Additional volume mounts to add to the cert-manager controller container.
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.enableServiceLinks
+
+enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links.
+
+
+bool
+
+
+
+
+false
+
+object
+
+
+
+
+
+{}
+
+
+
+
+webhook.strategy
+
+
+
+
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.securityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+webhook.containerSecurityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+webhook.podDisruptionBudget.enabled
+
+
+
+
+Pod is currently running.
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.podDisruptionBudget.minAvailable
+
+
+
+
+Cannot be used if `maxUnavailable` is set.
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.podDisruptionBudget.maxUnavailable
+
+
+
+
+Cannot be used if `minAvailable` is set.
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.deploymentAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.podAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.mutatingWebhookConfigurationAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.validatingWebhookConfigurationAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.extraArgs
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.featureGates
+
+
+
+string
+
+
+
+
+""
+
+
+
+
+webhook.resources
+
+
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.livenessProbe
+
+
+
+
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 60
+periodSeconds: 10
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.readinessProbe
+
+
+
+
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 5
+periodSeconds: 5
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.nodeSelector
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+webhook.affinity
+
+
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.tolerations
+
+
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.topologySpreadConstraints
+
+
+
+
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.podLabels
+
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.serviceLabels
+
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.image.registry
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.repository
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-controller
+
+
+
+
+webhook.image.tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.digest
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.pullPolicy
+
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+webhook.serviceAccount.create
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.serviceAccount.name
+
+
+
+
+If not set and create is true, a name is generated using the fullname template
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.annotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.labels
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.automountServiceAccountToken
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.automountServiceAccountToken
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+webhook.securePort
+
+
+
+number
+
+
+
+
+10250
+
+
+
+
+webhook.hostNetwork
+
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.serviceType
+
+
+
+string
+
+
+
+
+ClusterIP
+
+
+
+
+webhook.loadBalancerIP
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.url
+
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.networkPolicy.enabled
+
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.networkPolicy.ingress
+
+
+
+array
+
+
+
+
+- from:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.networkPolicy.egress
+
+
+
+array
+
+
+
+
+- ports:
+ - port: 80
+ protocol: TCP
+ - port: 443
+ protocol: TCP
+ - port: 53
+ protocol: TCP
+ - port: 53
+ protocol: UDP
+ - port: 6443
+ protocol: TCP
+ to:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.volumes
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.volumeMounts
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+
+
+### CA Injector
+
+
+webhook.enableServiceLinks
+
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### ACME Solver
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+cainjector.enabled
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.replicaCount
+
+
+
+number
+
+
+
+
+1
+
+
+
+
+cainjector.config
+
+
+
+
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+
+apiVersion: cainjector.config.cert-manager.io/v1alpha1
+kind: CAInjectorConfiguration
+logging:
+ verbosity: 2
+ format: text
+leaderElectionConfig:
+ namespace: kube-system
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.strategy
+
+
+
+
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.securityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+cainjector.containerSecurityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+cainjector.podDisruptionBudget.enabled
+
+
+
+
+Pod is currently running.
+
+bool
+
+
+
+
+false
+
+
+
+
+cainjector.podDisruptionBudget.minAvailable
+
+
+
+
+Cannot be used if `maxUnavailable` is set.
+
+number
+
+
+
+
+undefined
+
+
+
+
+cainjector.podDisruptionBudget.maxUnavailable
+
+
+
+
+Cannot be used if `minAvailable` is set.
+
+number
+
+
+
+
+undefined
+
+
+
+
+cainjector.deploymentAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.podAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.extraArgs
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.featureGates
+
+
+
+string
+
+
+
+
+""
+
+
+
+
+cainjector.resources
+
+
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.nodeSelector
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+cainjector.affinity
+
+
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.tolerations
+
+
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.topologySpreadConstraints
+
+
+
+
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.podLabels
+
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.image.registry
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.repository
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-controller
+
+
+
+
+cainjector.image.tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.digest
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.image.pullPolicy
+
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+cainjector.serviceAccount.create
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.serviceAccount.name
+
+
+
+
+If not set and create is true, a name is generated using the fullname template
+
+string
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.annotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.labels
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.serviceAccount.automountServiceAccountToken
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.automountServiceAccountToken
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+cainjector.volumes
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.volumeMounts
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.enableServiceLinks
+
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### Startup API Check
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+acmesolver.image.registry
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.repository
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-acmesolver
+
+
+
+
+acmesolver.image.tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.digest
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+acmesolver.image.pullPolicy
+
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+# The port that the webhook should listen on for requests.
+# In GKE private clusters, by default kubernetes apiservers are allowed to
+# talk to the cluster nodes only on 443 and 10250. so configuring
+# securePort: 10250, will work out of the box without needing to add firewall
+# rules or requiring NET_BIND_SERVICE capabilities to bind port numbers < 1000.
+# This should be uncommented and set as a default by the chart once we graduate
+# the apiVersion of WebhookConfiguration past v1alpha1.
+securePort: 10250
+
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+startupapicheck.enabled
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.securityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+startupapicheck.containerSecurityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+startupapicheck.timeout
+
+
+
+string
+
+
+
+
+1m
+
+
+
+
+startupapicheck.backoffLimit
+
+
+
+number
+
+
+
+
+4
+
+
+
+
+startupapicheck.jobAnnotations
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "1"
+
+
+
+
+startupapicheck.extraArgs[0]
+
+
+
+string
+
+
+
+
+-v
+
+
+
+
+startupapicheck.resources
+
+
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.nodeSelector
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+startupapicheck.affinity
+
+
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.tolerations
+
+
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.podLabels
+
+
+
+object
+
+
+
+
+{}
+
+
+
+
+startupapicheck.image.registry
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.repository
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-startupapicheck
+
+
+
+
+startupapicheck.image.tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.digest
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.image.pullPolicy
+
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+startupapicheck.rbac.annotations
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+
+
+
+
+startupapicheck.automountServiceAccountToken
+
+
+
+bool
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.serviceAccount.create
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.serviceAccount.name
+
+
+
+
+If not set and create is true, a name is generated using the fullname template
+
+string
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.serviceAccount.annotations
+
+
+
+object
+
+
+
+
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
+
+
+
+
+startupapicheck.serviceAccount.automountServiceAccountToken
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+startupapicheck.serviceAccount.labels
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+startupapicheck.volumes
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.volumeMounts
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+startupapicheck.enableServiceLinks
+
+
+
+bool
+
+
+
+
+false
+
+object
+
+
+
+
+
+{}
+
+
+
+
+webhook.strategy
+
+
+
+
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.securityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+webhook.containerSecurityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+webhook.podDisruptionBudget.enabled
+
+
+
+
+Pod is currently running.
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.podDisruptionBudget.minAvailable
+
+
+
+
+Cannot be used if `maxUnavailable` is set.
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.podDisruptionBudget.maxUnavailable
+
+
+
+
+Cannot be used if `minAvailable` is set.
+
+number
+
+
+
+
+undefined
+
+
+
+
+webhook.deploymentAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.podAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.mutatingWebhookConfigurationAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.validatingWebhookConfigurationAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.extraArgs
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.featureGates
+
+
+
+string
+
+
+
+
+""
+
+
+
+
+webhook.resources
+
+
+
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.livenessProbe
+
+
+
+
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 60
+periodSeconds: 10
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.readinessProbe
+
+
+
+
+ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
+
+
+object
+
+
+
+
+failureThreshold: 3
+initialDelaySeconds: 5
+periodSeconds: 5
+successThreshold: 1
+timeoutSeconds: 1
+
+
+
+
+webhook.nodeSelector
+
+
+
+object
+
+
+
+
+kubernetes.io/os: linux
+
+
+
+
+webhook.affinity
+
+
+
+
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.tolerations
+
+
+
+
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.topologySpreadConstraints
+
+
+
+
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.podLabels
+
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.serviceLabels
+
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.image.registry
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.repository
+
+
+
+string
+
+
+
+
+quay.io/jetstack/cert-manager-controller
+
+
+
+
+webhook.image.tag
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.digest
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.image.pullPolicy
+
+
+
+string
+
+
+
+
+IfNotPresent
+
+
+
+
+webhook.serviceAccount.create
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.serviceAccount.name
+
+
+
+
+If not set and create is true, a name is generated using the fullname template
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.annotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.labels
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+webhook.serviceAccount.automountServiceAccountToken
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+webhook.automountServiceAccountToken
+
+
+
-bool
+bool
+
+
+
+
+undefined
+
+
+
+
+webhook.securePort
+
+
+
+number
+
+
+
+
+10250
+
+
+
+
+webhook.hostNetwork
+
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.serviceType
+
+
+
+string
+
+
+
+
+ClusterIP
+
+
+
+
+webhook.loadBalancerIP
+
+
+
+string
+
+
+
+
+undefined
+
+
+
+
+webhook.url
+
+
+
+object
+
+
+
+
+{}
+
+
+
+
+webhook.networkPolicy.enabled
+
+
+
+bool
+
+
+
+
+false
+
+
+
+
+webhook.networkPolicy.ingress
+
+
+
+array
+
+
+
+
+- from:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.networkPolicy.egress
+
+
+
+array
+
+
+
+
+- ports:
+ - port: 80
+ protocol: TCP
+ - port: 443
+ protocol: TCP
+ - port: 53
+ protocol: TCP
+ - port: 53
+ protocol: UDP
+ - port: 6443
+ protocol: TCP
+ to:
+ - ipBlock:
+ cidr: 0.0.0.0/0
+
+
+
+
+webhook.volumes
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+webhook.volumeMounts
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+
+
+### CA Injector
+
+
+webhook.enableServiceLinks
+
+
+
+bool
+
+
+
+
+false
+
+
+
+
+### ACME Solver
+
+
+
+
+Property
+Description
+Type
+Default
+
+
+
+cainjector.enabled
+
+
+
+bool
+
+
+
+
+true
+
+
+
+
+cainjector.replicaCount
+
+
+
+number
+
+
+
+
+1
+
+
+
+
+cainjector.config
+
+
+
+
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+
+apiVersion: cainjector.config.cert-manager.io/v1alpha1
+kind: CAInjectorConfiguration
+logging:
+ verbosity: 2
+ format: text
+leaderElectionConfig:
+ namespace: kube-system
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.strategy
+
+
+
+
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
+
+
+object
+
+
+
+
+{}
+
+
+
+
+cainjector.securityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+
+
+
+
+cainjector.containerSecurityContext
+
+
+
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
+object
+
+
+
+
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+
+
+
+
+cainjector.podDisruptionBudget.enabled
+
+
+
+
+Pod is currently running.
+
+bool
+
+
+
+
+false
+
+
+
+
cainjector.podDisruptionBudget.minAvailable
+
+
+
+
+Cannot be used if `maxUnavailable` is set.
+
+number
undefined
@@ -671,34 +14005,116 @@ Automounting API credentials for a particular pod
-
enableCertificateOwnerRef
+cainjector.podDisruptionBudget.maxUnavailable
-
+Cannot be used if `minAvailable` is set.
bool
+number
-
false
+undefined
-
+config
+cainjector.deploymentAnnotations
+
-This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
-Flags will override options that are set here.
+Optional additional annotations to add to the cainjector Deployment
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.podAnnotations
+
+
+
+object
+
+
+
+
+undefined
+
+
+
+
+cainjector.extraArgs
+
+
+
+array
+
+
+
+
+[]
+
+
+
+
+cainjector.featureGates
+
+
+
+string
+
+
+
+
+""
+
+
+
+
cainjector.resources
+
+
+
@@ -742,55 +14150,91 @@ featureGates:
-apiVersion: controller.config.cert-manager.io/v1alpha1
-kind: ControllerConfiguration
-logging:
- verbosity: 2
- format: text
-leaderElectionConfig:
- namespace: kube-system
-kubernetesAPIQPS: 9000
-kubernetesAPIBurst: 9000
-numberOfConcurrentWorkers: 200
-featureGates:
- AdditionalCertificateOutputFormats: true
- DisallowInsecureCSRUsageDefinition: true
- ExperimentalCertificateSigningRequestControllers: true
- ExperimentalGatewayAPISupport: true
- LiteralCertificateSubject: true
- SecretsFilteredCaching: true
- ServerSideApply: true
- StableCertificateRequestName: true
- UseCertificateRequestBasicConstraints: true
- ValidateCAA: true
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
-
dns01RecursiveNameservers
+cainjector.nodeSelector
-string
+object
-
""
+kubernetes.io/os: linux
-
dns01RecursiveNameserversOnly
+cainjector.affinity
-
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
bool
+object
-
false
+{}
-
extraArgs
+cainjector.tolerations
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
array
@@ -802,14 +14246,30 @@ Additional command line flags to pass to cert-manager controller binary. To see
-
extraEnv
+cainjector.topologySpreadConstraints
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
array
@@ -822,12 +14282,12 @@ Additional environment variables
-
resources
+cainjector.podLabels
-
+securityContext
+cainjector.image.registry
+
-ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
-
+string
+
+
+
-undefined
object
+
+
+
+
cainjector.image.repository
-
+runAsNonRoot: true
-seccompProfile:
- type: RuntimeDefault
+string
+
+
+
quay.io/jetstack/cert-manager-controller
-
+containerSecurityContext
+cainjector.image.tag
+
-ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
-
+string
+
+
+
-undefined
object
+
+
+
+
cainjector.image.digest
-
+allowPrivilegeEscalation: false
-capabilities:
- drop:
- - ALL
-readOnlyRootFilesystem: true
+string
+
+
+
undefined
-
volumes
+cainjector.image.pullPolicy
-array
+string
-
[]
+IfNotPresent
-
volumeMounts
+cainjector.serviceAccount.create
-array
+bool
-
[]
+true
-
deploymentAnnotations
+cainjector.serviceAccount.name
-
+If not set and create is true, a name is generated using the fullname template
object
+string
undefined
@@ -959,12 +14448,12 @@ Optional additional annotations to add to the controller Deployment
-
podAnnotations
+cainjector.serviceAccount.annotations
-
podLabels
+cainjector.serviceAccount.labels
object
-
{}
+undefined
-
serviceAnnotations
+cainjector.serviceAccount.automountServiceAccountToken
-object
+bool
-
undefined
+true
-
serviceLabels
+cainjector.automountServiceAccountToken
-object
+bool
undefined
@@ -1042,75 +14531,84 @@ Optional additional labels to add to the controller Service
-
podDnsPolicy
+cainjector.volumes
-string
+array
-
undefined
+[]
-
podDnsConfig
+cainjector.volumeMounts
-object
+array
-
undefined
+[]
-
+nodeSelector
+cainjector.enableServiceLinks
-object
+bool
-
+kubernetes.io/os: linux
+false
+
-
+
Property
+Description
+Type
+Default
-
ingressShim.defaultIssuerName
+acmesolver.image.registry
-
ingressShim.defaultIssuerKind
+acmesolver.image.repository
string
-
undefined
+quay.io/jetstack/cert-manager-acmesolver
-
ingressShim.defaultIssuerGroup
+acmesolver.image.tag
-
http_proxy
+acmesolver.image.digest
+
string
@@ -1183,672 +14687,674 @@ Optional default issuer group to use for ingress resources
-
-https_proxy
+acmesolver.image.pullPolicy
+
string
-
undefined
+IfNotPresent
+ no_proxy
-
+### Startup API Check
-
-string
-
+
+undefined
+This startupapicheck is a Helm post-install hook that waits for the webhook endpoints to become available. The check is implemented using a Kubernetes Job - if you are injecting mesh sidecar proxies into cert-manager pods, you probably want to ensure that they are not injected into this Job's pod. Otherwise the installation may time out due to the Job never being completed because the sidecar proxy does not exit. See https://github.com/cert-manager/cert-manager/pull/4414 for context.
-
Property | +Description | +Type | +Default | ||
---|---|---|---|---|---|
affinity | +startupapicheck.enabled |
-A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core for example: +Enables the startup api check -
-affinity:
- nodeAffinity:
- requiredDuringSchedulingIgnoredDuringExecution:
- nodeSelectorTerms:
- - matchExpressions:
- - key: foo.bar.com/role
- operator: In
- values:
- - master
-
-
|
-object | +bool |
-{}
+true
|
tolerations | +startupapicheck.securityContext |
-A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core for example: +Pod Security Context to be set on the startupapicheck component Pod
-tolerations:
-- key: foo.bar.com/role
- operator: Equal
- value: master
- effect: NoSchedule
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
|
-array | +object |
-[]
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
|
topologySpreadConstraints | +startupapicheck.containerSecurityContext |
-A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core for example: +Container Security Context to be set on the controller component container
-topologySpreadConstraints:
-- maxSkew: 2
- topologyKey: topology.kubernetes.io/zone
- whenUnsatisfiable: ScheduleAnyway
- labelSelector:
- matchLabels:
- app.kubernetes.io/instance: cert-manager
- app.kubernetes.io/component: controller
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
|
-array | +object |
-[]
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
|
livenessProbe.enabled | -- - | -bool | +startupapicheck.timeout |
-true
-
- |
+|
livenessProbe.initialDelaySeconds | -+ | -number | +string |
-10
+1m
|
|
livenessProbe.periodSeconds | +startupapicheck.backoffLimit |
+ + +Job backoffLimit + + + |
number |
-10
+4
|
|
livenessProbe.timeoutSeconds | -- - | -number | +startupapicheck.jobAnnotations |
-15
+- |
+Optional additional annotations to add to the startupapicheck Job
-|
livenessProbe.successThreshold | -- | number | +object |
-1
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "1"
|
|
livenessProbe.failureThreshold | +startupapicheck.extraArgs[0] | - | number | +string |
-8
+-v
|
enableServiceLinks | +startupapicheck.resources |
-enableServiceLinks indicates whether information about services should be injected into pod's environment variables, matching the syntax of Docker links. +Resources to provide to the cert-manager controller pod +- |
-bool | -
+For example:
-false
+
- |
+
-### Prometheus -
Property | -Description | -Type | -Default | -||
---|---|---|---|---|---|
prometheus.enabled | -
+
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
|
-bool | +object |
-true
+{}
|
|
prometheus.servicemonitor.enabled | +startupapicheck.nodeSelector |
-Create a ServiceMonitor resource to scrape the metrics endpoint +The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/ +- |
-bool | -
-
-false
-
- |
+This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
-|
prometheus.servicemonitor.prometheusInstance | -- | string | +object |
-default
+kubernetes.io/os: linux
|
|
prometheus.servicemonitor.targetPort | +startupapicheck.affinity |
-The port to scrape metrics from +A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core + + ++ +For example: +
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
|
-number | +object |
-9402
+{}
|
prometheus.servicemonitor.path | +startupapicheck.tolerations |
-Path to scrape metrics from +A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core + + ++ +For example: +
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
|
-string | +array |
-/metrics
+[]
|
prometheus.servicemonitor.interval | +startupapicheck.podLabels |
-Interval to scrape metrics +Optional additional labels to add to the startupapicheck Pods |
-string | +object |
-60s
+{}
|
prometheus.servicemonitor.scrapeTimeout | +startupapicheck.image.registry |
-Timeout for each metrics scrape +The container registry to pull the startupapicheck image from + |
string |
-30s
+undefined
|
|
prometheus.servicemonitor.labels | +startupapicheck.image.repository |
-Labels to add to the ServiceMonitor resource +The container image for the cert-manager startupapicheck + |
-object | +string |
-{}
+quay.io/jetstack/cert-manager-startupapicheck
|
prometheus.servicemonitor.annotations | +startupapicheck.image.tag |
-Annotations to add to the ServiceMonitor resource +Override the image tag to deploy by setting this variable. If no value is set, the chart's appVersion will be used. + |
-object | +string |
-{}
+undefined
|
prometheus.servicemonitor.honorLabels | -- - | -bool | +startupapicheck.image.digest |
-false
+- |
+Setting a digest will override any tag
-|
prometheus.servicemonitor.endpointAdditionalProperties | -- | object | +string |
-{}
+undefined
|
|
prometheus.podmonitor.enabled | +startupapicheck.image.pullPolicy |
-Create a PodMonitor resource to scrape the metrics endpoint +Kubernetes imagePullPolicy on Deployment. |
-bool | +string |
-false
+IfNotPresent
|
prometheus.podmonitor.prometheusInstance | +startupapicheck.rbac.annotations |
+ + +annotations for the startup API Check job RBAC and PSP resources + + + + |
-string | +object |
-default
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
|
prometheus.podmonitor.path | +startupapicheck.automountServiceAccountToken |
-Path to scrape metrics from +Automounting API credentials for a particular pod + |
-string | +bool |
-/metrics
+undefined
|
prometheus.podmonitor.interval | +startupapicheck.serviceAccount.create |
-Interval to scrape metrics +Specifies whether a service account should be created |
-string | +bool |
-60s
+true
|
prometheus.podmonitor.scrapeTimeout | +startupapicheck.serviceAccount.name |
-Timeout for each metrics scrape
+The name of the service account to use. |
string |
-30s
+undefined
|
|
prometheus.podmonitor.labels | +startupapicheck.serviceAccount.annotations |
-Labels to add to the PodMonitor resource +Optional additional annotations to add to the Job's ServiceAccount + |
object |
-{}
+helm.sh/hook: post-install
+helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
+helm.sh/hook-weight: "-5"
|
|
prometheus.podmonitor.annotations | +startupapicheck.serviceAccount.automountServiceAccountToken |
-Annotations to add to the PodMonitor resource +Automount API credentials for a Service Account. + |
-object | +bool |
-{}
+true
|
prometheus.podmonitor.honorLabels | -- - | -bool | +startupapicheck.serviceAccount.labels |
-false
+- |
+Optional additional labels to add to the startupapicheck's ServiceAccount
-|
prometheus.podmonitor.endpointAdditionalProperties | -object |
-{}
+undefined
|
-
Property | -Description | -Type | -Default | -||
---|---|---|---|---|---|
webhook.replicaCount | -+ | -number | +array |
-1
+[]
|
|
webhook.timeoutSeconds | +startupapicheck.volumeMounts |
-Seconds the API server should wait for the webhook to respond before treating the call as a failure. - -We set the default to the maximum value of 30 seconds. Here's why: Users sometimes report that the connection between the K8S API server and the cert-manager webhook server times out. If *this* timeout is reached, the error message will be "context deadline exceeded", which doesn't help the user diagnose what phase of the HTTPS connection timed out. For example, it could be during DNS resolution, TCP connection, TLS negotiation, HTTP negotiation, or slow HTTP response from the webhook server. So by setting this timeout to its maximum value the underlying timeout error message has more chance of being returned to the end user. +Additional volume mounts to add to the cert-manager controller container. |
-number | +array |
-30
+[]
|
webhook.config | +startupapicheck.enableServiceLinks |
-Used to configure options for the webhook pod.
-apiVersion: webhook.config.cert-manager.io/v1alpha1
-kind: WebhookConfiguration
+ |
+bool | +
+
+false
+
+ |
+
+
-Deployment strategy, for example: +Deployment update strategy for the cert-manager webhook deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy + +
++ +For example:
-type: RollingUpdate
-rollingUpdate:
- maxSurge: 0
- maxUnavailable: 1
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
-Pod Security Context to be set on the webhook component Pod. Rref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/ +Pod Security Context to be set on the webhook component Pod
+
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+ +Container Security Context to be set on the webhook component container + +
+ +
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
false
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+ +Enable or disable the PodDisruptionBudget resource +
-minAvailable can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%)
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
undefined
+false
-maxUnavailable can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%)
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
-Container Security Context to be set on the webhook component container
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
-ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
-
-
allowPrivilegeEscalation: false
-capabilities:
- drop:
- - ALL
-readOnlyRootFilesystem: true
+undefined
+ +Resources to provide to the cert-manager webhook pod + +
++ +For example: + +
+ +
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
++ + + +
+ +
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+ +The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/ + +
++ +This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster. + +
++ +A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core + +
++ +For example: + +
+ +
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+ +A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core + +
++ +For example: + +
+ +
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+ +A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core + +
++ +For example: + +
+ +
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
-Registry to pull the image from +The container registry to pull the webhook image from
@@ -2352,15 +15984,16 @@ Registry to pull the image from-Image name, this can be the full image including registry or the short name excluding the registry. The registy can also be set in the `registry` property +The container image for the cert-manager webhook
+quay.io/jetstack/cert-manager-webhook
+quay.io/jetstack/cert-manager-controller
-Image pull policy, see https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy +Kubernetes imagePullPolicy on Deployment.
@@ -2533,6 +16166,27 @@ Automount API credentials for a Service Account.+ +Automounting API credentials for a particular pod + +
+ + +undefined
+
++ +Specify the load balancer IP for the created service + +
++ +Create network policies for the webhooks + +
++ +Ingress rule for the webhook network policy, by default will allow all inbound traffic + +
++ +Egress rule for the webhook network policy, by default will allow all outbound traffic traffic to ports 80 and 443, as well as DNS ports + +
++ +Additional volumes to add to the cert-manager controller pod. + +
++ +Additional volume mounts to add to the cert-manager controller container. + +
++ +Create the CA Injector deployment + +
++ +Number of replicas of the cert-manager cainjector to run. + +
++ +The default is 1, but in production you should set this to 2 or 3 to provide high availability. + +
++ +If `replicas > 1` you should also consider setting cainjector.podDisruptionBudget.enabled=true. + +
++ +Note: cert-manager uses leader election to ensure that there can only be a single instance active at a time. + +
+
Used to configure options for the cainjector pod.
-This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file. Flags will override options that are set here. For example:
+This allows setting options that'd usually be provided via flags. An APIVersion and Kind must be specified in your values.yaml file.
+Flags will override options that are set here.
+
+
+ +For example:
@@ -2821,15 +16544,21 @@ leaderElectionConfig:-Deployment strategy, for example: +Deployment update strategy for the cert-manager cainjector deployment. See https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy + +
++ +For example:
-type: RollingUpdate
-rollingUpdate:
- maxSurge: 0
- maxUnavailable: 1
+strategy:
+ type: RollingUpdate
+ rollingUpdate:
+ maxSurge: 0
+ maxUnavailable: 1
-
true
+Pod Security Context to be set on the cainjector component Pod
-
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
-RuntimeDefault
+runAsNonRoot: true
+seccompProfile:
+ type: RuntimeDefault
+ +Container Security Context to be set on the cainjector component container + +
+ +
+ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
+
+
+
false
+allowPrivilegeEscalation: false
+capabilities:
+ drop:
+ - ALL
+readOnlyRootFilesystem: true
+ +Enable or disable the PodDisruptionBudget resource +
-minAvailable can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%)
+This prevents downtime during voluntary disruptions such as during a Node upgrade. For example, the PodDisruptionBudget will block `kubectl drain` if it is used on the Node where the only remaining cert-manager
+Pod is currently running.
undefined
+false
-maxUnavailable can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%)
+Configures the minimum available pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `maxUnavailable` is set.
-Container Security Context to be set on the cainjector component container
+Configures the maximum unavailable pods for disruptions. Can either be set to an integer (e.g. 1) or a percentage value (e.g. 25%).
+Cannot be used if `minAvailable` is set.
-ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
-
-
allowPrivilegeEscalation: false
-capabilities:
- drop:
- - ALL
-readOnlyRootFilesystem: true
+undefined
+ +Resources to provide to the cert-manager cainjector pod + +
++ +For example: + +
+ +
+requests:
+ cpu: 10m
+ memory: 32Mi
+
+
++ + + +
+ +
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+
+ +The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/ + +
++ +This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster. + +
++ +A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core + +
++ +For example: + +
+ +
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+ +A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core + +
++ +For example: + +
+ +
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
+ +A list of Kubernetes TopologySpreadConstraints, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core + +
++ +For example: + +
+ +
+topologySpreadConstraints:
+- maxSkew: 2
+ topologyKey: topology.kubernetes.io/zone
+ whenUnsatisfiable: ScheduleAnyway
+ labelSelector:
+ matchLabels:
+ app.kubernetes.io/instance: cert-manager
+ app.kubernetes.io/component: controller
+
+
-Registry to pull the image from +The container registry to pull the cainjector image from
@@ -3155,15 +16999,16 @@ Registry to pull the image from-Image name, this can be the full image including registry or the short name excluding the registry. The registy can also be set in the `registry` property +The container image for the cert-manager cainjector
+quay.io/jetstack/cert-manager-cainjector
+quay.io/jetstack/cert-manager-controller
-Image pull policy, see https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy +Kubernetes imagePullPolicy on Deployment.
@@ -3300,7 +17145,6 @@ Optional additional annotations to add to the controller's ServiceAccount
-Automount API credentials for a Service Account.
Optional additional labels to add to the cainjector's ServiceAccount
+ +Automount API credentials for a Service Account. + +
++ +Additional volumes to add to the cert-manager controller pod. + +
++ +Additional volume mounts to add to the cert-manager controller container. + +
+-Image registry to pull from +The container registry to pull the acmesolver image from
@@ -3438,10 +17300,11 @@ Image registry to pull from-Image name, this can be the full image including registry or the short name excluding the registry. The registy can also be set in the `registry` property +The container image for the cert-manager acmesolver
++ +Kubernetes imagePullPolicy on Deployment. + +
+ +IfNotPresent
+
+-This startupapicheck is a Helm post-install hook that waits for the webhook endpoints to become available. The check is implemented using a Kubernetes Job- if you are injecting mesh sidecar proxies into cert-manager pods, you probably want to ensure that they are not injected into this Job's pod. Otherwise the installation may time out due to the Job never being completed because the sidecar proxy does not exit. See https://github.com/cert-manager/cert-manager/pull/4414 for context. +This startupapicheck is a Helm post-install hook that waits for the webhook endpoints to become available. The check is implemented using a Kubernetes Job - if you are injecting mesh sidecar proxies into cert-manager pods, you probably want to ensure that they are not injected into this Job's pod. Otherwise the installation may time out due to the Job never being completed because the sidecar proxy does not exit. See https://github.com/cert-manager/cert-manager/pull/4414 for context.
@@ -3516,6 +17399,12 @@ This startupapicheck is a Helm post-install hook that waits for the webhook endp+ +Enables the startup api check + +
+- -Optional additional annotations to add to the startupapicheck Pods - -
- -undefined
+-v
-Additional command line flags to pass to startupapicheck binary. To see all available flags run docker run quay.io/jetstack/cert-manager-ctl:
-We enable verbose logging by default so that if startupapicheck fails, users can know what exactly caused the failure. Verbose logs include details of the webhook URL, IP address and TCP connect errors for example. +For example:
+
+requests:
+ cpu: 10m
+ memory: 32Mi
+
--
- -v
-
+ref: https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/
+
+ +The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with matching labels. See https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/ + +
++ +This default ensures that Pods are only scheduled to Linux nodes. It prevents Pods being scheduled to Windows nodes in a mixed OS cluster. + +
++ +A Kubernetes Affinity, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core + +
++ +For example: + +
+ +
+affinity:
+ nodeAffinity:
+ requiredDuringSchedulingIgnoredDuringExecution:
+ nodeSelectorTerms:
+ - matchExpressions:
+ - key: foo.bar.com/role
+ operator: In
+ values:
+ - master
+
+
+ +A list of Kubernetes Tolerations, if required; see https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core + +
++ +For example: + +
+ +
+tolerations:
+- key: foo.bar.com/role
+ operator: Equal
+ value: master
+ effect: NoSchedule
+
+
-Image registry to pull from +The container registry to pull the startupapicheck image from
@@ -3796,10 +17732,11 @@ Image registry to pull from-Image name, this can be the full image including registry or the short name excluding the registry. The registy can also be set in the `registry` property +The container image for the cert-manager startupapicheck
+-Image pull policy, see https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy +Kubernetes imagePullPolicy on Deployment.
@@ -3896,6 +17833,27 @@ helm.sh/hook-weight: "-5"+ +Automounting API credentials for a particular pod + +
+ + +undefined
+
++ +Additional volumes to add to the cert-manager controller pod. + +
++ +Additional volume mounts to add to the cert-manager controller container. + +
+
-{{- range .Contents }}
+```yaml
{{ . }}
-{{- end }}
-
+```
{{- else if eq .Type "text" }}
-- -{{ $firstLineInParagraph := true }} -{{- range .Contents }} -{{- if eq . "" }} - -
-
-
-{{ $firstLineInParagraph = true }}
-{{- else }}
-{{- if $firstLineInParagraph }}{{ . }}{{ else }}
-{{ . }}{{ end }}
-{{- $firstLineInParagraph = false }}
-{{- end }}
-{{- end }}
-
-
{{.Default}}
+```yaml
+{{.Default}}
+```
Property | +{{ .Name }} | +
---|---|
Type | +{{.Type}} | +
Default | ++ +```yaml +{{.Default}} +``` + + | +