Skip to content

Commit

Permalink
test: disable cert manager minio cert request
Browse files Browse the repository at this point in the history
  • Loading branch information
alee-x committed Oct 9, 2024
1 parent f93dc90 commit 559889a
Showing 1 changed file with 44 additions and 44 deletions.
88 changes: 44 additions & 44 deletions charts/agent-stack/templates/minio-cert.yaml
Original file line number Diff line number Diff line change
@@ -1,44 +1,44 @@
{{- if .Values.minio.enabled }}
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: minio-tls-secret
namespace: {{ .Release.Namespace }}
spec:
# Secret names are always required.
secretName: minio-tls-secret
duration: 2160h0m0s #90d
renewBefore: 360h0m0s #15d
subject:
organizations:
- serp
privateKey:
algorithm: RSA
encoding: PKCS1
size: 2048
usages:
- server auth
- digital signature
- client auth
- key encipherment
dnsNames:
- "minio.{{ .Values.global.network.ingress.host }}"
- "minio"
- "minio.{{ .Release.Namespace }}"
- "minio.{{ .Release.Namespace }}.svc"
- "minio.{{ .Release.Namespace }}.svc.cluster.local"
- "{{ .Values.minio.tenantName }}-hl"
- "{{ .Values.minio.tenantName }}-hl.{{ .Release.Namespace }}"
- "{{ .Values.minio.tenantName }}-hl.{{ .Release.Namespace }}.svc"
- "{{ .Values.minio.tenantName }}-hl.{{ .Release.Namespace }}.svc.cluster.local"
- "*.{{ .Values.minio.tenantName }}-hl.{{ .Release.Namespace }}.svc.cluster.local"
- "*.{{ .Release.Namespace }}.svc.cluster.local"
# we use this as a cheat/workaround to get it to trust the keycloak ca for oidc
- {{ include "agent-deploy.oidcHost" . }}
ipAddresses:
- 127.0.0.1
issuerRef:
name: {{ .Values.global.network.certificate.clusterIssuer }}
kind: ClusterIssuer
group: cert-manager.io
{{- end }}
# {{- if .Values.minio.enabled }}
# apiVersion: cert-manager.io/v1
# kind: Certificate
# metadata:
# name: minio-tls-secret
# namespace: {{ .Release.Namespace }}
# spec:
# # Secret names are always required.
# secretName: minio-tls-secret
# duration: 2160h0m0s #90d
# renewBefore: 360h0m0s #15d
# subject:
# organizations:
# - serp
# privateKey:
# algorithm: RSA
# encoding: PKCS1
# size: 2048
# usages:
# - server auth
# - digital signature
# - client auth
# - key encipherment
# dnsNames:
# - "minio.{{ .Values.global.network.ingress.host }}"
# - "minio"
# - "minio.{{ .Release.Namespace }}"
# - "minio.{{ .Release.Namespace }}.svc"
# - "minio.{{ .Release.Namespace }}.svc.cluster.local"
# - "{{ .Values.minio.tenantName }}-hl"
# - "{{ .Values.minio.tenantName }}-hl.{{ .Release.Namespace }}"
# - "{{ .Values.minio.tenantName }}-hl.{{ .Release.Namespace }}.svc"
# - "{{ .Values.minio.tenantName }}-hl.{{ .Release.Namespace }}.svc.cluster.local"
# - "*.{{ .Values.minio.tenantName }}-hl.{{ .Release.Namespace }}.svc.cluster.local"
# - "*.{{ .Release.Namespace }}.svc.cluster.local"
# # we use this as a cheat/workaround to get it to trust the keycloak ca for oidc
# - {{ include "agent-deploy.oidcHost" . }}
# ipAddresses:
# - 127.0.0.1
# issuerRef:
# name: {{ .Values.global.network.certificate.clusterIssuer }}
# kind: ClusterIssuer
# group: cert-manager.io
# {{- end }}

0 comments on commit 559889a

Please sign in to comment.