Update
This commit is contained in:
@@ -1,14 +0,0 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: wildcard-prd-tls
|
||||
namespace: certificates-ops
|
||||
spec:
|
||||
secretName: wildcard-prd-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-dns01-prod
|
||||
kind: ClusterIssuer
|
||||
dnsNames:
|
||||
- "*.prd.gkdomaine.fr"
|
||||
- "prd.gkdomaine.fr"
|
||||
|
||||
@@ -1,14 +0,0 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: wildcard-rct-tls
|
||||
namespace: certificates-ops
|
||||
spec:
|
||||
secretName: wildcard-rct-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-dns01-prod
|
||||
kind: ClusterIssuer
|
||||
dnsNames:
|
||||
- "*.rct.gkdomaine.fr"
|
||||
- "rct.gkdomaine.fr"
|
||||
|
||||
@@ -1,13 +0,0 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: longhorn-dev-tls
|
||||
namespace: certificates-ops
|
||||
spec:
|
||||
secretName: longhorn-dev-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-prod
|
||||
kind: ClusterIssuer
|
||||
dnsNames:
|
||||
- longhorn.dev.gkdomaine.fr
|
||||
|
||||
@@ -1,48 +0,0 @@
|
||||
# ClusterRole pour permettre à cert-manager d'utiliser le webhook OVH
|
||||
# Le ServiceAccount cert-manager doit pouvoir créer des ressources "ovh"
|
||||
# dans le groupe API acme.gkdomaine.fr
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: cert-manager-webhook-ovh:cert-manager
|
||||
labels:
|
||||
app: cert-manager-webhook-ovh
|
||||
rules:
|
||||
- apiGroups:
|
||||
- acme.gkdomaine.fr
|
||||
resources:
|
||||
- ovh
|
||||
verbs:
|
||||
- create
|
||||
- get
|
||||
- list
|
||||
- watch
|
||||
- update
|
||||
- patch
|
||||
- delete
|
||||
# Permissions pour lire les secrets (nécessaire pour lire ovh-credentials)
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- secrets
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
---
|
||||
# ClusterRoleBinding pour lier le ClusterRole au ServiceAccount cert-manager
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: cert-manager-webhook-ovh:cert-manager
|
||||
labels:
|
||||
app: cert-manager-webhook-ovh
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: cert-manager-webhook-ovh:cert-manager
|
||||
subjects:
|
||||
# Le ServiceAccount cert-manager dans cert-manager-ops (selon l'erreur RBAC)
|
||||
- kind: ServiceAccount
|
||||
name: cert-manager
|
||||
namespace: cert-manager-ops
|
||||
|
||||
@@ -1,38 +0,0 @@
|
||||
# ClusterRole pour permettre au webhook OVH de lire les secrets OVH
|
||||
# Utilisation d'un ClusterRole pour éviter tout problème de permissions
|
||||
# Le ServiceAccount du webhook doit pouvoir lire le secret ovh-credentials
|
||||
# dans le namespace cert-manager-ops
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: cert-manager-webhook-ovh:secrets
|
||||
labels:
|
||||
app: cert-manager-webhook-ovh
|
||||
rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resources:
|
||||
- secrets
|
||||
# Pas de resourceNames avec ClusterRole, mais on limite au namespace via le ClusterRoleBinding
|
||||
verbs:
|
||||
- get
|
||||
- list
|
||||
---
|
||||
# ClusterRoleBinding pour lier le ClusterRole au ServiceAccount du webhook
|
||||
# Le nom du ServiceAccount est défini par le chart officiel
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRoleBinding
|
||||
metadata:
|
||||
name: cert-manager-webhook-ovh:secrets
|
||||
labels:
|
||||
app: cert-manager-webhook-ovh
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: cert-manager-webhook-ovh:secrets
|
||||
subjects:
|
||||
# Le ServiceAccount du webhook (nom basé sur le release name du chart)
|
||||
- kind: ServiceAccount
|
||||
name: cert-manager-webhook-ovh-ops
|
||||
namespace: cert-manager-ops
|
||||
|
||||
@@ -1,12 +0,0 @@
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: ovh-credentials
|
||||
namespace: cert-manager-ops
|
||||
type: Opaque
|
||||
stringData:
|
||||
# Utilisez stringData pour mettre les valeurs en CLAIR,
|
||||
# K8s les encodera proprement en base64 pour vous.
|
||||
application-key: "XXXXXXXXXXXXXXXXX"
|
||||
application-secret: "XXXXXXXXXXXXXXXXX"
|
||||
consumer-key: "XXXXXXXXXXXXXXXXX"
|
||||
@@ -1,12 +0,0 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: traefik-dev-tls
|
||||
namespace: certificates-ops
|
||||
spec:
|
||||
secretName: traefik-dev-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-prod
|
||||
kind: ClusterIssuer
|
||||
dnsNames:
|
||||
- traefik.dev.gkdomaine.fr
|
||||
Reference in New Issue
Block a user