3# Default values for cert-manager.
4# This is a YAML-formatted file.
5# Declare variables to be passed into your templates.
7 # Reference to one or more secrets to be used when pulling images.
8 # For more information, see [Pull an Image from a Private Registry](https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/).
12 # - name: "image-pull-secret"
14 # Global node selector
16 # The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with
18 # For more information, see [Assigning Pods to Nodes](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
20 # If a component-specific nodeSelector is also set, it will be merged and take precedence.
23 # Labels to apply to all resources.
24 # Please note that this does not add labels to the resources created dynamically by the controllers.
25 # For these resources, you have to add the labels in the template in the cert-manager custom resource:
26 # For example, podTemplate/ ingressTemplate in ACMEChallengeSolverHTTP01Ingress
27 # For more information, see the [cert-manager documentation](https://cert-manager.io/docs/reference/api-docs/#acme.cert-manager.io/v1.ACMEChallengeSolverHTTP01Ingress).
28 # For example, secretTemplate in CertificateSpec
29 # For more information, see the [cert-manager documentation](https://cert-manager.io/docs/reference/api-docs/#cert-manager.io/v1.CertificateSpec).
31 # The number of old ReplicaSets to retain to allow rollback (if not set, the default Kubernetes value is set to 10).
33 # revisionHistoryLimit: 1
35 # The optional priority class to be used for the cert-manager pods.
37 # Set all pods to run in a user namespace without host access.
38 # Experimental: may be removed once the Kubernetes User Namespaces feature is GA.
41 # - Kubernetes ≥ 1.33, or
42 # - Kubernetes 1.27–1.32 with UserNamespacesSupport feature gate enabled.
44 # Set to false to run pods in a user namespace without host access.
46 # See [limitations](https://kubernetes.io/docs/concepts/workloads/pods/user-namespaces/#limitations) for details.
50 # Create required ClusterRoles and ClusterRoleBindings for cert-manager.
52 # Aggregate ClusterRoles to Kubernetes default user-facing roles. For more information, see [User-facing roles](https://kubernetes.io/docs/reference/access-authn-authz/rbac/#user-facing-roles)
53 aggregateClusterRoles: true
55 # Create PodSecurityPolicy for cert-manager.
57 # Note that PodSecurityPolicy was deprecated in Kubernetes 1.21 and removed in Kubernetes 1.25.
59 # Configure the PodSecurityPolicy to use AppArmor.
61 # Set the verbosity of cert-manager. A range of 0 - 6, with 6 being the most verbose.
64 # Override the namespace used for the leader election lease.
65 namespace: "kube-system"
66 # The duration that non-leader candidates will wait after observing a
67 # leadership renewal until attempting to acquire leadership of a led but
68 # unrenewed leader slot. This is effectively the maximum duration that a
69 # leader can be stopped before it is replaced by another candidate.
72# The interval between attempts by the acting master to renew a leadership
73# slot before it stops leading. This must be less than or equal to the
78# The duration the clients should wait between attempting acquisition and
79# renewal of a leadership.
83# This option is equivalent to setting crds.enabled=true and crds.keep=true.
84# Deprecated: use crds.enabled and crds.keep instead.
87 # This option decides if the CRDs should be installed
88 # as part of the Helm installation.
90 # This option makes it so that the "helm.sh/resource-policy": keep
91 # annotation is added to the CRD. This will prevent Helm from uninstalling
92 # the CRD when the Helm release is uninstalled.
93 # WARNING: when the CRDs are removed, all cert-manager custom resources
94 # (Certificates, Issuers, ...) will be removed too by the garbage collector.
96# +docs:section=Controller
98# The number of replicas of the cert-manager controller to run.
100# The default is 1, but in production set this to 2 or 3 to provide high
103# If `replicas > 1`, consider setting `podDisruptionBudget.enabled=true`.
105# Note that cert-manager uses leader election to ensure that there can
106# only be a single instance active at a time.
108# Deployment update strategy for the cert-manager controller deployment.
109# For more information, see the [Kubernetes documentation](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy).
119 # Enable or disable the PodDisruptionBudget resource.
121 # This prevents downtime during voluntary disruptions such as during a Node upgrade.
122 # For example, the PodDisruptionBudget will block `kubectl drain`
123 # if it is used on the Node where the only remaining cert-manager
124 # Pod is currently running.
126 # This configures the minimum available pods for disruptions. It can either be set to
127 # an integer (e.g., 1) or a percentage value (e.g., 25%).
128 # It cannot be used if `maxUnavailable` is set.
132# This configures the maximum unavailable pods for disruptions. It can either be set to
133# an integer (e.g., 1) or a percentage value (e.g., 25%).
134# it cannot be used if `minAvailable` is set.
139# This configures how to act with unhealthy pods during eviction
140# Note that this requires Kubernetes 1.31 or `PDBUnhealthyPodEvictionPolicy` feature gate enabled for
141# the cluster to work.
144# unhealthyPodEvictionPolicy: AlwaysAllow
146# A comma-separated list of feature gates that should be enabled on the
149# The maximum number of challenges that can be scheduled as 'processing' at once.
150maxConcurrentChallenges: 60
151# The container registry used for all cert-manager images by default.
152# This can include path prefixes (e.g. `artifactory.example.com/docker`).
154imageRegistry: quay.io
155# The repository namespace used for all cert-manager images by default.
160imageNamespace: jetstack
162 # Deprecated: per-component registry prefix.
164 # If set, this value is *prepended* to the image repository that the chart would otherwise render.
165 # This applies both when `image.repository` is set and when the repository is computed from
166 # `imageRegistry` + `imageNamespace` + `image.name`.
168 # This can produce "double registry" style references such as `legacy.example.io/quay.io/jetstack/...`.
169 # Prefer using the global `imageRegistry`/`imageNamespace` values.
173 # The image name for the cert-manager controller.
174 # This is used (together with `imageRegistry` and `imageNamespace`) to construct the full image reference.
176 name: cert-manager-controller
177 # Full repository override (takes precedence over `imageRegistry`, `imageNamespace`, and `image.name`).
178 # Example: quay.io/jetstack/cert-manager-controller
180 repository: chainguard-private/cert-manager-controller
181 # Override the image tag to deploy by setting this variable.
182 # If no value is set, the chart's appVersion is used.
186 # Setting a digest pins the image. If a tag is also set, the rendered reference will include
187 # both ("image:tag@digest"), though only the digest will be used for pulling.
189 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
191 # Kubernetes imagePullPolicy on Deployment.
192 pullPolicy: IfNotPresent
195 digest: sha256:7633d0eb0f3e4de4dd105bd3a770fc476c560d8ae51a7baa9a0e52a01516b4df
196# Override the namespace used to store DNS provider credentials etc. for ClusterIssuer
197# resources. By default, the same namespace as cert-manager is deployed within is
198# used. This namespace will not be automatically created by the Helm chart.
199clusterResourceNamespace: ""
200# This namespace allows you to define where the services are installed into.
201# If not set then they use the namespace of the release.
202# This is helpful when installing cert manager as a chart dependency (sub chart).
204# Override the "cert-manager.fullname" value. This value is used as part of
205# most of the names of the resources created by this Helm chart.
207# fullnameOverride: "my-cert-manager"
209# Override the "cert-manager.name" value, which is used to annotate some of
210# the resources that are created by this Chart (using "app.kubernetes.io/name").
211# NOTE: There are some inconsistencies in the Helm chart when it comes to
212# these annotations (some resources use, e.g., "cainjector.name" which resolves
213# to the value "cainjector").
215# nameOverride: "my-cert-manager"
217 # Specifies whether a service account should be created.
219 # The name of the service account to use.
220 # If not set and create is true, a name is generated using the fullname template.
224 # Optional additional annotations to add to the controller's Service Account. Templates are allowed for both keys and values.
225 # Example using templating:
227 # "{{ .Chart.Name }}-helm-chart/version": "{{ .Chart.Version }}"
231 # Optional additional labels to add to the controller's Service Account.
235 # Automount API credentials for a Service Account.
236 automountServiceAccountToken: true
237# Automounting API credentials for a particular pod.
239# automountServiceAccountToken: true
241# When this flag is enabled, secrets will be automatically removed when the certificate resource is deleted.
242enableCertificateOwnerRef: false
243# This property is used to configure options for the controller pod.
244# This allows setting options that would usually be provided using flags.
246# If `apiVersion` and `kind` are unspecified they default to the current latest
247# version (currently `controller.config.cert-manager.io/v1alpha1`). You can pin
248# the version by specifying the `apiVersion` yourself.
252# apiVersion: controller.config.cert-manager.io/v1alpha1
253# kind: ControllerConfiguration
257# leaderElectionConfig:
258# namespace: kube-system
259# kubernetesAPIQPS: 9000
260# kubernetesAPIBurst: 9000
261# numberOfConcurrentWorkers: 200
262# enableGatewayAPI: true
263# # Feature gates as of v1.20.0. Listed with their default values.
264# # See https://cert-manager.io/docs/cli/controller/
266# AllAlpha: false # ALPHA - default=false
267# AllBeta: false # BETA - default=false
268# ACMEHTTP01IngressPathTypeExact: true # BETA - default=true
269# ExperimentalCertificateSigningRequestControllers: false # ALPHA - default=false
270# ExperimentalGatewayAPISupport: true # BETA - default=true
271# LiteralCertificateSubject: true # BETA - default=true
272# NameConstraints: true # BETA - default=true
273# OtherNames: true # BETA - default=true
274# SecretsFilteredCaching: true # BETA - default=true
275# ServerSideApply: false # ALPHA - default=false
276# StableCertificateRequestName: true # BETA - default=true
277# UseCertificateRequestBasicConstraints: false # ALPHA - default=false
278# # Configure the metrics server for TLS
279# # See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
282# secretNamespace: "cert-manager"
283# secretName: "cert-manager-metrics-ca"
285# - cert-manager-metrics
286# # Configure PEM size limits for certificate validation
287# # Useful for certificates with many DNS names (e.g., Istio gateways with 100+ DNS names)
288# pemSizeLimitsConfig:
289# maxCertificateSize: 36500 # Maximum size in bytes for individual certificates (default: 36500)
290# maxPrivateKeySize: 13000 # Maximum size in bytes for private keys (default: 13000)
291# maxChainLength: 95000 # Maximum size in bytes for certificate chains (default: 95000)
292# maxBundleSize: 330000 # Maximum size in bytes for certificate bundles (default: 330000)
294# Setting Nameservers for DNS01 Self Check.
295# For more information, see the [cert-manager documentation](https://cert-manager.io/docs/configuration/acme/dns01/#setting-nameservers-for-dns01-self-check).
297# A comma-separated string with the host and port of the recursive nameservers cert-manager should query.
298dns01RecursiveNameservers: ""
299# Forces cert-manager to use only the recursive nameservers for verification.
300# Enabling this option could cause the DNS01 self check to take longer owing to caching performed by the recursive nameservers.
301dns01RecursiveNameserversOnly: false
302# Option to disable cert-manager's build-in auto-approver. The auto-approver
303# approves all CertificateRequests that reference issuers matching the 'approveSignerNames'
304# option. This 'disableAutoApproval' option is useful when you want to make all approval decisions
305# using a different approver (like approver-policy - https://github.com/cert-manager/approver-policy).
306disableAutoApproval: false
307# List of signer names that cert-manager will approve by default. CertificateRequests
308# referencing these signer names will be auto-approved by cert-manager. Defaults to just
309# approving the cert-manager.io Issuer and ClusterIssuer issuers. When set to an empty
310# array, ALL issuers will be auto-approved by cert-manager. To disable the auto-approval,
311# because, e.g., you are using approver-policy, you can enable 'disableAutoApproval'.
312# ref: https://cert-manager.io/docs/concepts/certificaterequest/#approval
315 - issuers.cert-manager.io/*
316 - clusterissuers.cert-manager.io/*
317# Additional command line flags to pass to cert-manager controller binary.
318# To see all available flags run `docker run quay.io/jetstack/cert-manager-controller:<version> --help`.
320# Use this flag to enable or disable arbitrary controllers. For example, to disable the CertificateRequests approver.
324# - --controllers=*,-certificaterequests-approver
326# Extra containers to add to the pod spec in the deployment of the cert-manager controller.
327# For example, to deploy the [aws_signing_helper](https://github.com/aws/rolesanywhere-credential-helper) (replacing the ARNs as relevant):
330# - name: AWS_EC2_METADATA_SERVICE_ENDPOINT
331# - value: http://127.0.0.1:9911
333# - name: rolesanywhere-credential-helper
334# image: public.ecr.aws/rolesanywhere/credential-helper:latest
335# command: [aws_signing_helper]
346# - --trust-anchor-arn
350# mountPath: /etc/cert/
357# Additional environment variables to pass to cert-manager controller binary.
363# Resources to provide to the cert-manager controller pod.
370# For more information, see [Resource Management for Pods and Containers](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/).
372# Pod Security Context.
373# For more information, see [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/).
379# Container Security Context to be set on the controller component container.
380# For more information, see [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/).
382containerSecurityContext:
383 allowPrivilegeEscalation: false
387 readOnlyRootFilesystem: true
388# Additional volumes to add to the cert-manager controller pod.
390# Additional volume mounts to add to the cert-manager controller container.
392# Optional additional annotations to add to the controller Deployment.
394# deploymentAnnotations: {}
396# Optional additional annotations to add to the controller Pods.
400# Optional additional labels to add to the controller Pods.
402# Optional annotations to add to the controller Service.
404# serviceAnnotations: {}
406# Optional additional labels to add to the controller Service.
410# Optionally set the IP family policy for the controller Service to configure dual-stack; see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services).
412# serviceIPFamilyPolicy: ""
414# Optionally set the IP families for the controller Service that should be supported, in the order in which they should be applied to ClusterIP. Can be IPv4 and/or IPv6.
416# serviceIPFamilies: []
418# Optional DNS settings. These are useful if you have a public and private DNS zone for
419# the same domain on Route 53. The following is an example of ensuring
420# cert-manager can access an ingress or DNS TXT records at all times.
421# Note that this requires Kubernetes 1.10 or `CustomPodDNS` feature gate enabled for
422# the cluster to work.
425# For more information, see [Pod's DNS Policy](https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-s-dns-policy).
427# podDnsPolicy: "None"
429# Pod DNS configuration. The podDnsConfig field is optional and can work with any podDnsPolicy
430# settings. However, when a Pod's dnsPolicy is set to "None", the dnsConfig field has to be specified.
431# For more information, see [Pod's DNS Config](https://kubernetes.io/docs/concepts/services-networking/dns-pod-service/#pod-dns-config).
438# Optional hostAliases for cert-manager-controller pods. May be useful when performing ACME DNS-01 self checks.
449# The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with
451# For more information, see [Assigning Pods to Nodes](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
453# This default ensures that Pods are only scheduled to Linux nodes.
454# It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
457 kubernetes.io/os: linux
458# Enables default network policies for cert-manager.
459# This provides a way for you to restrict network traffic
460# between cert-manager components and other pods.
461# For more information, see [Network Policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
462# NOTE: an incorrect networkPolicy will cause traffic to be dropped
464 # Create network policies for cert-manager.
466 # Ingress rule for the cert-manager network policy.
467 # By default all pods are allowed access to:
468 # http-metrics and http-healthz ports
476 # Egress rule for the cert-manager network policy. By default, it allows all
477 # outbound traffic to ports 80 and 443, as well as DNS ports.
489 # On OpenShift and OKD, the Kubernetes API server listens on.
495# Optional default issuer to use for ingress resources.
496# +docs:property=ingressShim.defaultIssuerName
497# defaultIssuerName: ""
499# Optional default issuer kind to use for ingress resources.
500# +docs:property=ingressShim.defaultIssuerKind
501# defaultIssuerKind: ""
503# Optional default issuer group to use for ingress resources.
504# +docs:property=ingressShim.defaultIssuerGroup
505# defaultIssuerGroup: ""
507# Use these variables to configure the HTTP_PROXY environment variables.
509# Configures the HTTP_PROXY environment variable where a HTTP proxy is required.
511# http_proxy: "http://proxy:8080"
513# Configures the HTTPS_PROXY environment variable where a HTTP proxy is required.
515# https_proxy: "https://proxy:8080"
517# Configures the NO_PROXY environment variable where a HTTP proxy is required,
518# but certain domains should be excluded.
520# no_proxy: 127.0.0.1,localhost
522# A Kubernetes Affinity, if required. For more information, see [Affinity v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core).
527# requiredDuringSchedulingIgnoredDuringExecution:
530# - key: foo.bar.com/role
535# A list of Kubernetes Tolerations, if required. For more information, see [Toleration v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core).
539# - key: foo.bar.com/role
544# A list of Kubernetes TopologySpreadConstraints, if required. For more information, see [Topology spread constraint v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core
547# topologySpreadConstraints:
549# topologyKey: topology.kubernetes.io/zone
550# whenUnsatisfiable: ScheduleAnyway
553# app.kubernetes.io/instance: cert-manager
554# app.kubernetes.io/component: controller
555topologySpreadConstraints: []
556# LivenessProbe settings for the controller container of the controller Pod.
558# This is enabled by default, in order to enable the clock-skew liveness probe that
559# restarts the controller in case of a skew between the system clock and the monotonic clock.
560# LivenessProbe durations and thresholds are based on those used for the Kubernetes
561# controller-manager. For more information see the following on the
562# [Kubernetes GitHub repository](https://github.com/kubernetes/kubernetes/blob/806b30170c61a38fedd54cc9ede4cd6275a1ad3b/cmd/kubeadm/app/util/staticpod/utils.go#L241-L245)
566 initialDelaySeconds: 10
571# enableServiceLinks indicates whether information about services should be
572# injected into the pod's environment variables, matching the syntax of Docker
574enableServiceLinks: false
575# +docs:section=Prometheus
577 # Enable Prometheus monitoring for the cert-manager controller and webhook.
578 # If you use the Prometheus Operator, set prometheus.podmonitor.enabled or
579 # prometheus.servicemonitor.enabled, to create a PodMonitor or a
580 # ServiceMonitor resource.
581 # Otherwise, 'prometheus.io' annotations are added to the cert-manager and
582 # cert-manager-webhook Deployments.
583 # Note that you cannot enable both PodMonitor and ServiceMonitor as they are
584 # mutually exclusive. Enabling both will result in an error.
587 # Create a ServiceMonitor to add cert-manager to Prometheus.
589 # The namespace that the service monitor should live in, defaults
590 # to the cert-manager namespace.
592 # namespace: cert-manager
594 # Specifies the `prometheus` label on the created ServiceMonitor. This is
595 # used when different Prometheus instances have label selectors matching
596 # different ServiceMonitors.
597 prometheusInstance: default
598 # The target port to set on the ServiceMonitor. This must match the port that the
599 # cert-manager controller is listening on for metrics.
600 # +docs:type=string,integer
601 targetPort: http-metrics
602 # The path to scrape for metrics.
604 # The interval to scrape metrics.
606 # The timeout before a metrics scrape fails.
608 # Additional labels to add to the ServiceMonitor.
610 # Additional annotations to add to the ServiceMonitor.
612 # Keep labels from scraped data, overriding server-side labels.
614 # EndpointAdditionalProperties allows setting additional properties on the
615 # endpoint such as relabelings, metricRelabelings etc.
618 # endpointAdditionalProperties:
622 # - __meta_kubernetes_pod_node_name
623 # targetLabel: instance
626 endpointAdditionalProperties: {}
627 # Note that you cannot enable both PodMonitor and ServiceMonitor as they are mutually exclusive. Enabling both will result in an error.
629 # Create a PodMonitor to add cert-manager to Prometheus.
631 # The namespace that the pod monitor should live in, defaults
632 # to the cert-manager namespace.
634 # namespace: cert-manager
636 # Specifies the `prometheus` label on the created PodMonitor. This is
637 # used when different Prometheus instances have label selectors matching
638 # different PodMonitors.
639 prometheusInstance: default
640 # The path to scrape for metrics.
642 # The interval to scrape metrics.
644 # The timeout before a metrics scrape fails.
646 # Additional labels to add to the PodMonitor.
648 # Additional annotations to add to the PodMonitor.
650 # Keep labels from scraped data, overriding server-side labels.
652 # EndpointAdditionalProperties allows setting additional properties on the
653 # endpoint such as relabelings, metricRelabelings etc.
656 # endpointAdditionalProperties:
660 # - __meta_kubernetes_pod_node_name
661 # targetLabel: instance
662 # # Configure the PodMonitor for TLS connections
663 # # See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
666 # serverName: cert-manager-metrics
669 # name: cert-manager-metrics-ca
673 endpointAdditionalProperties: {}
674# +docs:section=Webhook
676 # Number of replicas of the cert-manager webhook to run.
678 # The default is 1, but in production set this to 2 or 3 to provide high
681 # If `replicas > 1`, consider setting `webhook.podDisruptionBudget.enabled=true`.
683 # The number of seconds the API server should wait for the webhook to respond before treating the call as a failure.
684 # The value must be between 1 and 30 seconds. For more information, see
685 # [Validating webhook configuration v1](https://kubernetes.io/docs/reference/kubernetes-api/extend-resources/validating-webhook-configuration-v1/).
687 # The default is set to the maximum value of 30 seconds as
688 # users sometimes report that the connection between the K8S API server and
689 # the cert-manager webhook server times out.
690 # If *this* timeout is reached, the error message will be "context deadline exceeded",
691 # which doesn't help the user diagnose what phase of the HTTPS connection timed out.
692 # For example, it could be during DNS resolution, TCP connection, TLS
693 # negotiation, HTTP negotiation, or slow HTTP response from the webhook
695 # By setting this timeout to its maximum value the underlying timeout error
696 # message has more chance of being returned to the end user.
698 # This is used to configure options for the webhook pod.
699 # This allows setting options that would usually be provided using flags.
701 # If `apiVersion` and `kind` are unspecified they default to the current latest
702 # version (currently `webhook.config.cert-manager.io/v1alpha1`). You can pin
703 # the version by specifying the `apiVersion` yourself.
706 # apiVersion: webhook.config.cert-manager.io/v1alpha1
707 # kind: WebhookConfiguration
708 # # The port that the webhook listens on for requests.
709 # # In GKE private clusters, by default Kubernetes apiservers are allowed to
710 # # talk to the cluster nodes only on 443 and 10250. Configuring
711 # # securePort: 10250 therefore will work out-of-the-box without needing to add firewall
712 # # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers < 1000.
713 # # This should be uncommented and set as a default by the chart once
714 # # the apiVersion of WebhookConfiguration graduates beyond v1alpha1.
716 # # Configure the metrics server for TLS
717 # # See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
720 # secretNamespace: "cert-manager"
721 # secretName: "cert-manager-metrics-ca"
723 # - cert-manager-metrics
725 # The update strategy for the cert-manager webhook deployment.
726 # For more information, see the [Kubernetes documentation](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy)
730 # type: RollingUpdate
735 # Pod Security Context to be set on the webhook component Pod.
736 # For more information, see [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/).
742 # Container Security Context to be set on the webhook component container.
743 # For more information, see [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/).
745 containerSecurityContext:
746 allowPrivilegeEscalation: false
750 readOnlyRootFilesystem: true
752 # Enable or disable the PodDisruptionBudget resource.
754 # This prevents downtime during voluntary disruptions such as during a Node upgrade.
755 # For example, the PodDisruptionBudget will block `kubectl drain`
756 # if it is used on the Node where the only remaining cert-manager
757 # Pod is currently running.
759 # This property configures the minimum available pods for disruptions. Can either be set to
760 # an integer (e.g., 1) or a percentage value (e.g., 25%).
761 # It cannot be used if `maxUnavailable` is set.
765 # This property configures the maximum unavailable pods for disruptions. Can either be set to
766 # an integer (e.g., 1) or a percentage value (e.g., 25%).
767 # It cannot be used if `minAvailable` is set.
772 # This configures how to act with unhealthy pods during eviction
773 # Note that this requires Kubernetes 1.31 or `PDBUnhealthyPodEvictionPolicy` feature gate enabled for
774 # the cluster to work.
777 # unhealthyPodEvictionPolicy: AlwaysAllow
779 # Optional additional annotations to add to the webhook Deployment.
781 # deploymentAnnotations: {}
783 # Optional additional annotations to add to the webhook Pods.
787 # Optional additional annotations to add to the webhook Service.
789 # serviceAnnotations: {}
791 # Optional additional annotations to add to the webhook MutatingWebhookConfiguration.
793 # mutatingWebhookConfigurationAnnotations: {}
795 # Optional additional annotations to add to the webhook ValidatingWebhookConfiguration.
797 # validatingWebhookConfigurationAnnotations: {}
798 validatingWebhookConfiguration:
799 # Configure spec.namespaceSelector for validating webhooks.
803 - key: "cert-manager.io/disable-validation"
807 mutatingWebhookConfiguration:
808 # Configure spec.namespaceSelector for mutating webhooks.
810 namespaceSelector: {}
814 # - key: kubernetes.io/metadata.name
818 # Additional command line flags to pass to cert-manager webhook binary.
819 # To see all available flags run `docker run quay.io/jetstack/cert-manager-webhook:<version> --help`.
821 # Path to a file containing a WebhookConfiguration object used to configure the webhook.
822 # - --config=<path-to-config-file>
824 # Additional environment variables to pass to cert-manager webhook binary.
828 # value: 'some value'
830 # Comma separated list of feature gates that should be enabled on the
833 # Resources to provide to the cert-manager webhook pod.
840 # For more information, see [Resource Management for Pods and Containers](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/).
842 # Liveness probe values.
843 # For more information, see [Container probes](https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes).
848 initialDelaySeconds: 60
852 # Readiness probe values.
853 # For more information, see [Container probes](https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes).
858 initialDelaySeconds: 5
862 # The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with
864 # For more information, see [Assigning Pods to Nodes](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
866 # This default ensures that Pods are only scheduled to Linux nodes.
867 # It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
870 kubernetes.io/os: linux
871 # A Kubernetes Affinity, if required. For more information, see [Affinity v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core).
876 # requiredDuringSchedulingIgnoredDuringExecution:
878 # - matchExpressions:
879 # - key: foo.bar.com/role
884 # A list of Kubernetes Tolerations, if required. For more information, see [Toleration v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core).
888 # - key: foo.bar.com/role
893 # A list of Kubernetes TopologySpreadConstraints, if required. For more information, see [Topology spread constraint v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core).
896 # topologySpreadConstraints:
898 # topologyKey: topology.kubernetes.io/zone
899 # whenUnsatisfiable: ScheduleAnyway
902 # app.kubernetes.io/instance: cert-manager
903 # app.kubernetes.io/component: controller
904 topologySpreadConstraints: []
905 # Optional additional labels to add to the Webhook Pods.
907 # Optional additional labels to add to the Webhook Service.
909 # Optionally set the IP family policy for the controller Service to configure dual-stack; see [Configure dual-stack](https://kubernetes.io/docs/concepts/services-networking/dual-stack/#services).
910 serviceIPFamilyPolicy: ""
911 # Optionally set the IP families for the controller Service that should be supported, in the order in which they should be applied to ClusterIP. Can be IPv4 and/or IPv6.
912 serviceIPFamilies: []
914 # Deprecated: per-component registry prefix.
916 # If set, this value is *prepended* to the image repository that the chart would otherwise render.
917 # This applies both when `webhook.image.repository` is set and when the repository is computed from
918 # `imageRegistry` + `imageNamespace` + `webhook.image.name`.
920 # This can produce "double registry" style references such as `legacy.example.io/quay.io/jetstack/...`.
921 # Prefer using the global `imageRegistry`/`imageNamespace` values.
925 # The image name for the cert-manager webhook.
927 name: cert-manager-webhook
928 # Full repository override (takes precedence over `imageRegistry`, `imageNamespace`, and `webhook.image.name`).
930 repository: chainguard-private/cert-manager-webhook
931 # Override the image tag to deploy by setting this variable.
932 # If no value is set, the chart's appVersion will be used.
936 # Setting a digest pins the image. If a tag is also set, the rendered reference will include
937 # both ("image:tag@digest"), though only the digest will be used for pulling.
939 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
941 # Kubernetes imagePullPolicy on Deployment.
942 pullPolicy: IfNotPresent
945 digest: sha256:21375a2325983993aba4e86bda0f99e53522537d54ccac6d3bcdf18418123188
947 # Specifies whether a service account should be created.
949 # The name of the service account to use.
950 # If not set and create is true, a name is generated using the fullname template.
954 # Optional additional annotations to add to the webhook's Service Account.
958 # Optional additional labels to add to the webhook's Service Account.
962 # Automount API credentials for a Service Account.
963 automountServiceAccountToken: true
964 # Automounting API credentials for a particular pod.
966 # automountServiceAccountToken: true
968 # The port that the webhook listens on for requests.
969 # In GKE private clusters, by default Kubernetes apiservers are allowed to
970 # talk to the cluster nodes only on 443 and 10250. Configuring
971 # securePort: 10250, therefore will work out-of-the-box without needing to add firewall
972 # rules or requiring NET_BIND_SERVICE capabilities to bind port numbers <1000.
974 # Specifies if the webhook should be started in hostNetwork mode.
976 # Required for use in some managed kubernetes clusters (such as AWS EKS) with custom
977 # CNI (such as calico), because control-plane managed by AWS cannot communicate
978 # with pods' IP CIDR and admission webhooks are not working
980 # Since the default port for the webhook conflicts with kubelet on the host
981 # network, `webhook.securePort` should be changed to an available port if
982 # running in hostNetwork mode.
984 # Specifies how the service should be handled. Useful if you want to expose the
985 # webhook outside of the cluster. In some cases, the control plane cannot
986 # reach internal services.
987 serviceType: ClusterIP
988 # Specify the load balancer IP for the created service.
990 # loadBalancerIP: "10.10.10.10"
992 # Overrides the mutating webhook and validating webhook so they reach the webhook
993 # service using the `url` field instead of a service.
997 # Enables default network policies for webhooks.
998 # This provides a way for you to restrict network traffic
999 # between cert-manager components and other pods.
1000 # For more information, see [Network Policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
1001 # NOTE: an incorrect networkPolicy will cause traffic to be dropped
1003 # Create network policies for the webhooks.
1005 # Ingress rule for the webhook network policy.
1006 # By default all pods are allowed access to:
1007 # https, http-metrics, and http-healthz ports
1015 - port: http-metrics
1017 # Egress rule for the webhook network policy. By default, it allows all
1018 # outbound traffic to ports 80 and 443, as well as DNS ports.
1030 # On OpenShift and OKD, the Kubernetes API server listens on.
1034 # Additional volumes to add to the cert-manager controller pod.
1036 # Additional volume mounts to add to the cert-manager controller container.
1038 # enableServiceLinks indicates whether information about services should be
1039 # injected into the pod's environment variables, matching the syntax of Docker
1041 enableServiceLinks: false
1042 # enableClientVerification turns on client verification of requests
1043 # made to the webhook server
1044 enableClientVerification: false
1045 # the client CA file to be used for verification
1047 # Subject names to verify for the client certificate.
1048 # Multiple values may be supplied as a comma-separated list.
1049 apiserverClientCertSubjects: ""
1050# +docs:section=CA Injector
1052 # Create the CA Injector deployment
1054 # The number of replicas of the cert-manager cainjector to run.
1056 # The default is 1, but in production set this to 2 or 3 to provide high
1059 # If `replicas > 1`, consider setting `cainjector.podDisruptionBudget.enabled=true`.
1061 # Note that cert-manager uses leader election to ensure that there can
1062 # only be a single instance active at a time.
1064 # This is used to configure options for the cainjector pod.
1065 # It allows setting options that are usually provided via flags.
1067 # If `apiVersion` and `kind` are unspecified they default to the current latest
1068 # version (currently `cainjector.config.cert-manager.io/v1alpha1`). You can pin
1069 # the version by specifying the `apiVersion` yourself.
1072 # apiVersion: cainjector.config.cert-manager.io/v1alpha1
1073 # kind: CAInjectorConfiguration
1077 # leaderElectionConfig:
1078 # namespace: kube-system
1079 # # Configure the metrics server for TLS
1080 # # See https://cert-manager.io/docs/devops-tips/prometheus-metrics/#tls
1083 # secretNamespace: "cert-manager"
1084 # secretName: "cert-manager-metrics-ca"
1086 # - cert-manager-metrics
1088 # Deployment update strategy for the cert-manager cainjector deployment.
1089 # For more information, see the [Kubernetes documentation](https://kubernetes.io/docs/concepts/workloads/controllers/deployment/#strategy).
1093 # type: RollingUpdate
1098 # Pod Security Context to be set on the cainjector component Pod
1099 # For more information, see [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/).
1104 type: RuntimeDefault
1105 # Container Security Context to be set on the cainjector component container
1106 # For more information, see [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/).
1108 containerSecurityContext:
1109 allowPrivilegeEscalation: false
1113 readOnlyRootFilesystem: true
1114 # Enables default network policies for cainjector.
1115 # This provides a way for you to restrict network traffic
1116 # between cert-manager components and other pods.
1117 # For more information, see [Network Policies](https://kubernetes.io/docs/concepts/services-networking/network-policies/)
1118 # NOTE: an incorrect networkPolicy will cause traffic to be dropped
1120 # Create network policies for the cainjector.
1122 # Ingress rule for the webhook cainjector policy.
1123 # By default all pods are allowed access to:
1128 - port: http-metrics
1130 # Egress rule for the cainjector network policy. By default, it allows all
1131 # outbound traffic to ports 80 and 443, as well as DNS ports.
1143 # On OpenShift and OKD, the Kubernetes API server listens on.
1147 podDisruptionBudget:
1148 # Enable or disable the PodDisruptionBudget resource.
1150 # This prevents downtime during voluntary disruptions such as during a Node upgrade.
1151 # For example, the PodDisruptionBudget will block `kubectl drain`
1152 # if it is used on the Node where the only remaining cert-manager
1153 # Pod is currently running.
1155 # `minAvailable` configures the minimum available pods for disruptions. It can either be set to
1156 # an integer (e.g., 1) or a percentage value (e.g., 25%).
1157 # Cannot be used if `maxUnavailable` is set.
1159 # +docs:type=unknown
1161 # `maxUnavailable` configures the maximum unavailable pods for disruptions. It can either be set to
1162 # an integer (e.g., 1) or a percentage value (e.g., 25%).
1163 # Cannot be used if `minAvailable` is set.
1165 # +docs:type=unknown
1168 # This configures how to act with unhealthy pods during eviction
1169 # Note that this requires Kubernetes 1.31 or `PDBUnhealthyPodEvictionPolicy` feature gate enabled for
1170 # the cluster to work.
1173 # unhealthyPodEvictionPolicy: AlwaysAllow
1175 # Optional additional annotations to add to the cainjector Deployment.
1177 # deploymentAnnotations: {}
1179 # Optional additional annotations to add to the cainjector Pods.
1181 # podAnnotations: {}
1183 # Optional additional annotations to add to the cainjector metrics Service.
1185 # serviceAnnotations: {}
1187 # Additional command line flags to pass to cert-manager cainjector binary.
1188 # To see all available flags run `docker run quay.io/jetstack/cert-manager-cainjector:<version> --help`.
1190 # Enable profiling for cainjector.
1191 # - --enable-profiling=true
1193 # Additional environment variables to pass to cert-manager cainjector binary.
1197 # value: 'some value'
1199 # Comma separated list of feature gates that should be enabled on the
1202 # Resources to provide to the cert-manager cainjector pod.
1209 # For more information, see [Resource Management for Pods and Containers](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/).
1211 # The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with
1213 # For more information, see [Assigning Pods to Nodes](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
1215 # This default ensures that Pods are only scheduled to Linux nodes.
1216 # It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
1219 kubernetes.io/os: linux
1220 # A Kubernetes Affinity, if required. For more information, see [Affinity v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core).
1225 # requiredDuringSchedulingIgnoredDuringExecution:
1226 # nodeSelectorTerms:
1227 # - matchExpressions:
1228 # - key: foo.bar.com/role
1233 # A list of Kubernetes Tolerations, if required. For more information, see [Toleration v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core).
1237 # - key: foo.bar.com/role
1240 # effect: NoSchedule
1242 # A list of Kubernetes TopologySpreadConstraints, if required. For more information, see [Topology spread constraint v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#topologyspreadconstraint-v1-core).
1245 # topologySpreadConstraints:
1247 # topologyKey: topology.kubernetes.io/zone
1248 # whenUnsatisfiable: ScheduleAnyway
1251 # app.kubernetes.io/instance: cert-manager
1252 # app.kubernetes.io/component: controller
1253 topologySpreadConstraints: []
1254 # Optional additional labels to add to the CA Injector Pods.
1256 # Optional additional labels to add to the CA Injector metrics Service.
1259 # Deprecated: per-component registry prefix.
1261 # If set, this value is *prepended* to the image repository that the chart would otherwise render.
1262 # This applies both when `cainjector.image.repository` is set and when the repository is computed from
1263 # `imageRegistry` + `imageNamespace` + `cainjector.image.name`.
1265 # This can produce "double registry" style references such as `legacy.example.io/quay.io/jetstack/...`.
1266 # Prefer using the global `imageRegistry`/`imageNamespace` values.
1270 # The image name for the cert-manager cainjector.
1272 name: cert-manager-cainjector
1273 # Full repository override (takes precedence over `imageRegistry`, `imageNamespace`, and `cainjector.image.name`).
1275 repository: chainguard-private/cert-manager-cainjector
1276 # Override the image tag to deploy by setting this variable.
1277 # If no value is set, the chart's appVersion will be used.
1281 # Setting a digest pins the image. If a tag is also set, the rendered reference will include
1282 # both ("image:tag@digest"), though only the digest will be used for pulling.
1284 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
1286 # Kubernetes imagePullPolicy on Deployment.
1287 pullPolicy: IfNotPresent
1290 digest: sha256:d0224a8cf274a5966b4375e501c873fc77d1124d87b225682eefc29b5ff3a9a2
1292 # Specifies whether a service account should be created.
1294 # The name of the service account to use.
1295 # If not set and create is true, a name is generated using the fullname template
1299 # Optional additional annotations to add to the cainjector's Service Account.
1303 # Optional additional labels to add to the cainjector's Service Account.
1307 # Automount API credentials for a Service Account.
1308 automountServiceAccountToken: true
1309 # Automounting API credentials for a particular pod.
1311 # automountServiceAccountToken: true
1313 # Additional volumes to add to the cert-manager controller pod.
1315 # Additional volume mounts to add to the cert-manager controller container.
1317 # enableServiceLinks indicates whether information about services should be
1318 # injected into the pod's environment variables, matching the syntax of Docker
1320 enableServiceLinks: false
1321# +docs:section=ACME Solver
1324 # Deprecated: per-component registry prefix.
1326 # If set, this value is *prepended* to the image repository that the chart would otherwise render.
1327 # This applies both when `acmesolver.image.repository` is set and when the repository is computed from
1328 # `imageRegistry` + `imageNamespace` + `acmesolver.image.name`.
1330 # This can produce "double registry" style references such as `legacy.example.io/quay.io/jetstack/...`.
1331 # Prefer using the global `imageRegistry`/`imageNamespace` values.
1335 # The image name for the cert-manager acmesolver.
1337 name: cert-manager-acmesolver
1338 # Full repository override (takes precedence over `imageRegistry`, `imageNamespace`, and `acmesolver.image.name`).
1340 repository: chainguard-private/cert-manager-acmesolver
1341 # Override the image tag to deploy by setting this variable.
1342 # If no value is set, the chart's appVersion is used.
1346 # Setting a digest pins the image. If a tag is also set, the rendered reference will include
1347 # both ("image:tag@digest"), though only the digest will be used for pulling.
1349 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
1351 # Kubernetes imagePullPolicy on Deployment.
1352 pullPolicy: IfNotPresent
1355 digest: sha256:285fc11b9235f2315df40a495f28980343fe3493f8cae734973478af9048111f
1356# +docs:section=Startup API Check
1357# This startupapicheck is a Helm post-install hook that waits for the webhook
1358# endpoints to become available.
1359# The check is implemented using a Kubernetes Job - if you are injecting mesh
1360# sidecar proxies into cert-manager pods, ensure that they
1361# are not injected into this Job's pod. Otherwise, the installation may time out
1362# owing to the Job never being completed because the sidecar proxy does not exit.
1363# For more information, see [this note](https://github.com/cert-manager/cert-manager/pull/4414).
1365 # Enables the startup api check.
1367 # Pod Security Context to be set on the startupapicheck component Pod.
1368 # For more information, see [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/).
1373 type: RuntimeDefault
1374 # Container Security Context to be set on the controller component container.
1375 # For more information, see [Configure a Security Context for a Pod or Container](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/).
1377 containerSecurityContext:
1378 allowPrivilegeEscalation: false
1382 readOnlyRootFilesystem: true
1383 # Timeout for 'kubectl check api' command.
1387 # Optional additional annotations to add to the startupapicheck Job.
1390 helm.sh/hook: post-install
1391 helm.sh/hook-weight: "1"
1392 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
1393 # Optional additional annotations to add to the startupapicheck Pods.
1395 # podAnnotations: {}
1397 # Additional command line flags to pass to startupapicheck binary.
1398 # To see all available flags run `docker run quay.io/jetstack/cert-manager-startupapicheck:<version> --help`.
1400 # Verbose logging is enabled by default so that if startupapicheck fails, you
1401 # can know what exactly caused the failure. Verbose logs include details of
1402 # the webhook URL, IP address and TCP connect errors for example.
1406 # Additional environment variables to pass to cert-manager startupapicheck binary.
1410 # value: 'some value'
1412 # Resources to provide to the cert-manager controller pod.
1419 # For more information, see [Resource Management for Pods and Containers](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/).
1421 # The nodeSelector on Pods tells Kubernetes to schedule Pods on the nodes with
1423 # For more information, see [Assigning Pods to Nodes](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/).
1425 # This default ensures that Pods are only scheduled to Linux nodes.
1426 # It prevents Pods being scheduled to Windows nodes in a mixed OS cluster.
1429 kubernetes.io/os: linux
1430 # A Kubernetes Affinity, if required. For more information, see [Affinity v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#affinity-v1-core).
1434 # requiredDuringSchedulingIgnoredDuringExecution:
1435 # nodeSelectorTerms:
1436 # - matchExpressions:
1437 # - key: foo.bar.com/role
1442 # A list of Kubernetes Tolerations, if required. For more information, see [Toleration v1 core](https://kubernetes.io/docs/reference/generated/kubernetes-api/v1.27/#toleration-v1-core).
1446 # - key: foo.bar.com/role
1449 # effect: NoSchedule
1451 # Optional additional labels to add to the startupapicheck Pods.
1454 # Deprecated: per-component registry prefix.
1456 # If set, this value is *prepended* to the image repository that the chart would otherwise render.
1457 # This applies both when `startupapicheck.image.repository` is set and when the repository is computed from
1458 # `imageRegistry` + `imageNamespace` + `startupapicheck.image.name`.
1460 # This can produce "double registry" style references such as `legacy.example.io/quay.io/jetstack/...`.
1461 # Prefer using the global `imageRegistry`/`imageNamespace` values.
1465 # The image name for the cert-manager startupapicheck.
1467 name: cert-manager-startupapicheck
1468 # Full repository override (takes precedence over `imageRegistry`, `imageNamespace`, and `startupapicheck.image.name`).
1470 repository: chainguard-private/cert-manager-startupapicheck
1471 # Override the image tag to deploy by setting this variable.
1472 # If no value is set, the chart's appVersion is used.
1476 # Setting a digest pins the image. If a tag is also set, the rendered reference will include
1477 # both ("image:tag@digest"), though only the digest will be used for pulling.
1479 # digest: sha256:0e072dddd1f7f8fc8909a2ca6f65e76c5f0d2fcfb8be47935ae3457e8bbceb20
1481 # Kubernetes imagePullPolicy on Deployment.
1482 pullPolicy: IfNotPresent
1485 digest: sha256:c1515e7b67160c8a4ab58644436911cb7da2c86ae795848a32e33c4c06080a4e
1487 # annotations for the startup API Check job RBAC and PSP resources.
1490 helm.sh/hook: post-install
1491 helm.sh/hook-weight: "-5"
1492 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
1493 # Automounting API credentials for a particular pod.
1495 # automountServiceAccountToken: true
1497 # Specifies whether a service account should be created.
1499 # The name of the service account to use.
1500 # If not set and create is true, a name is generated using the fullname template.
1504 # Optional additional annotations to add to the Job's Service Account.
1507 helm.sh/hook: post-install
1508 helm.sh/hook-weight: "-5"
1509 helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
1510 # Automount API credentials for a Service Account.
1512 automountServiceAccountToken: true
1513 # Optional additional labels to add to the startupapicheck's Service Account.
1516 # Additional volumes to add to the cert-manager controller pod.
1518 # Additional volume mounts to add to the cert-manager controller container.
1520 # enableServiceLinks indicates whether information about services should be
1521 # injected into pod's environment variables, matching the syntax of Docker
1523 enableServiceLinks: false
1524# Create dynamic manifests via values.
1532# name: '{{ template "cert-manager.fullname" . }}-extra-configmap'
1534# Field used by our release pipeline to produce the static manifests.
1535# The field defaults to "helm" but is set to "static" when we render
1536# the static YAML manifests.
1539# Field that can be used as a condition when cert-manager is a dependency.
1540# This definition is only here as a placeholder such that it is included in
1542# See https://helm.sh/docs/chart_best_practices/dependencies/#conditions-and-tags