delete wildcard
This commit is contained in:
@@ -1,52 +0,0 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: ClusterIssuer
|
||||
metadata:
|
||||
name: letsencrypt-dns01-prod
|
||||
spec:
|
||||
acme:
|
||||
server: https://acme-v02.api.letsencrypt.org/directory
|
||||
email: gkpoubelle78@gmail.com
|
||||
privateKeySecretRef:
|
||||
name: letsencrypt-dns01-prod-key
|
||||
solvers:
|
||||
# Configuration DNS-01 pour OVH via webhook
|
||||
# IMPORTANT: Vous devez installer cert-manager-webhook-ovh avant d'utiliser cette configuration
|
||||
# Installation: helm repo add cert-manager-webhook-ovh https://cert-manager.github.io/webhook-ovh
|
||||
# helm install cert-manager-webhook-ovh cert-manager-webhook-ovh/cert-manager-webhook-ovh -n cert-manager-ops
|
||||
- selector:
|
||||
dnsZones:
|
||||
- "dev.gkdomaine.fr"
|
||||
dns01:
|
||||
webhook:
|
||||
groupName: acme.gkdomaine.fr
|
||||
solverName: ovh
|
||||
config:
|
||||
endpoint: ovh-eu
|
||||
applicationKeyRef:
|
||||
name: ovh-credentials
|
||||
key: application-key
|
||||
applicationSecretRef:
|
||||
name: ovh-credentials
|
||||
key: application-secret
|
||||
consumerKeyRef:
|
||||
name: ovh-credentials
|
||||
key: consumer-key
|
||||
|
||||
# Option 4 : Generic (webhook personnalisé)
|
||||
# - dns01:
|
||||
# webhook:
|
||||
# groupName: acme.example.com
|
||||
# solverName: my-dns-solver
|
||||
# config:
|
||||
# # Configuration spécifique au webhook
|
||||
|
||||
# Option 5 : RFC2136 (DNS dynamique standard)
|
||||
# - dns01:
|
||||
# rfc2136:
|
||||
# nameserver: 8.8.8.8
|
||||
# tsigSecretSecretRef:
|
||||
# name: rfc2136-credentials
|
||||
# key: tsig-secret
|
||||
# tsigKeyName: "keyname"
|
||||
# tsigAlgorithm: HMACSHA256
|
||||
|
||||
@@ -0,0 +1,13 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: longhorn-dev-tls
|
||||
namespace: certificates-ops
|
||||
spec:
|
||||
secretName: longhorn-dev-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-prod
|
||||
kind: ClusterIssuer
|
||||
dnsNames:
|
||||
- longhorn.dev.gkdomaine.fr
|
||||
|
||||
@@ -1,28 +0,0 @@
|
||||
# Secret pour les credentials OVH
|
||||
# IMPORTANT: Remplacez VOTRE_APPLICATION_SECRET par votre vrai Application Secret OVH
|
||||
# Ce fichier est un template - vous devez créer le Secret manuellement avec vos vraies valeurs
|
||||
#
|
||||
# Pour créer le Secret manuellement :
|
||||
# kubectl create secret generic ovh-credentials \
|
||||
# --from-literal=application-secret=VOTRE_APPLICATION_SECRET \
|
||||
# -n certificates-ops \
|
||||
# --context=cluster-ops
|
||||
#
|
||||
# OU utilisez ce template en remplaçant la valeur base64 ci-dessous :
|
||||
# echo -n 'VOTRE_APPLICATION_SECRET' | base64
|
||||
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: ovh-credentials
|
||||
namespace: certificates-ops
|
||||
type: Opaque
|
||||
data:
|
||||
# Encodez vos credentials en base64 :
|
||||
# echo -n 'VOTRE_APPLICATION_KEY' | base64
|
||||
# echo -n 'VOTRE_APPLICATION_SECRET' | base64
|
||||
# echo -n 'VOTRE_CONSUMER_KEY' | base64
|
||||
application-key: ZTVhOGJiNzNkZWQxN2VlNg== # e598bb73ded17ee6 en base64
|
||||
application-secret: NDYyMGM0ODI0OTlmOTcxZjRkMTgxNGY4MTU3ZjgyY2M= # VOTRE_APPLICATION_SECRET en base64
|
||||
consumer-key: MzcyZTI3Mzg1ODIwNGQ5NzJkYmY3YzUwNTA2ZDEyYTE= # 372e273858204d972dbf7c50506d12a1 en base64
|
||||
|
||||
@@ -1,16 +0,0 @@
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: wildcard-dev-tls
|
||||
namespace: certificates-ops
|
||||
spec:
|
||||
secretName: wildcard-dev-tls
|
||||
issuerRef:
|
||||
name: letsencrypt-dns01-prod
|
||||
kind: ClusterIssuer
|
||||
dnsNames:
|
||||
- "*.dev.gkdomaine.fr"
|
||||
- dev.gkdomaine.fr # Inclut aussi le domaine racine
|
||||
# Note: Certificat wildcard pour tous les sous-domaines dev
|
||||
# Nécessite DNS-01 challenge (le domaine doit être résolvable publiquement)
|
||||
|
||||
Reference in New Issue
Block a user