https://github.com/kadras-io/package-for-cert-manager
Kubernetes-native package for cert-manager, a cloud-native solution to automatically provision and manage X.509 certificates.
https://github.com/kadras-io/package-for-cert-manager
carvel cert-manager certificate-management kadras kapp-controller kubernetes security tls
Last synced: 12 days ago
JSON representation
Kubernetes-native package for cert-manager, a cloud-native solution to automatically provision and manage X.509 certificates.
- Host: GitHub
- URL: https://github.com/kadras-io/package-for-cert-manager
- Owner: kadras-io
- License: apache-2.0
- Created: 2022-10-22T20:16:25.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2025-05-30T19:24:27.000Z (9 months ago)
- Last Synced: 2025-05-31T04:17:54.797Z (9 months ago)
- Topics: carvel, cert-manager, certificate-management, kadras, kapp-controller, kubernetes, security, tls
- Language: Makefile
- Homepage:
- Size: 269 KB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 9
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Codeowners: .github/CODEOWNERS.md
- Security: SECURITY.md
- Maintainers: MAINTAINERS.md
Awesome Lists containing this project
README
# cert-manager


[](https://slsa.dev/spec/v1.0/levels)
[](https://opensource.org/licenses/Apache-2.0)
[](https://bsky.app/profile/kadras.bsky.social)
A Carvel package for [cert-manager](https://cert-manager.io), a cloud-native solution to automatically provision and manage X.509 certificates in Kubernetes.
## 🚀 Getting Started
### Prerequisites
* Kubernetes 1.33+
* Carvel [`kctrl`](https://carvel.dev/kapp-controller/docs/latest/install/#installing-kapp-controller-cli-kctrl) CLI.
* Carvel [kapp-controller](https://carvel.dev/kapp-controller) deployed in your Kubernetes cluster. You can install it with Carvel [`kapp`](https://carvel.dev/kapp/docs/latest/install) (recommended choice) or `kubectl`.
```shell
kapp deploy -a kapp-controller -y \
-f https://github.com/carvel-dev/kapp-controller/releases/latest/download/release.yml
```
### Installation
Add the Kadras [package repository](https://github.com/kadras-io/kadras-packages) to your Kubernetes cluster:
```shell
kctrl package repository add -r kadras-packages \
--url ghcr.io/kadras-io/kadras-packages \
-n kadras-system --create-namespace
```
Installation without package repository
The recommended way of installing the cert-manager package is via the Kadras package repository. If you prefer not using the repository, you can add the package definition directly using kapp or kubectl.
```shell
kubectl create namespace kadras-system
kapp deploy -a cert-manager-package -n kadras-system -y \
-f https://github.com/kadras-io/package-for-cert-manager/releases/latest/download/metadata.yml \
-f https://github.com/kadras-io/package-for-cert-manager/releases/latest/download/package.yml
```
Install the cert-manager package:
```shell
kctrl package install -i cert-manager \
-p cert-manager.packages.kadras.io \
-v ${VERSION} \
-n kadras-system
```
> **Note**
> You can find the `${VERSION}` value by retrieving the list of package versions available in the Kadras package repository installed on your cluster.
>
> ```shell
> kctrl package available list -p cert-manager.packages.kadras.io -n kadras-system
> ```
Verify the installed packages and their status:
```shell
kctrl package installed list -n kadras-system
```
## 📙 Documentation
Documentation, tutorials and examples for this package are available in the [docs](docs) folder.
For documentation specific to cert-manager, check out [cert-manager.io](https://cert-manager.io).
## 🎯 Configuration
The cert-manager package can be customized via a `values.yml` file.
```yaml
letsencrypt:
include: true
production: true
email: security@example.net
```
Reference the `values.yml` file from the `kctrl` command when installing or upgrading the package.
```shell
kctrl package install -i cert-manager \
-p cert-manager.packages.kadras.io \
-v ${VERSION} \
-n kadras-system \
--values-file values.yml
```
### Values
The cert-manager package has the following configurable properties.
Configurable properties
| Config | Default | Description |
|--------|---------|-------------|
| `namespace` | `cert-manager` | The namespace in which to deploy cert-manager. |
| `policies.include` | `false` | Whether to include the out-of-the-box Kyverno policies to validate and secure the package installation. |
Settings for the corporate proxy.
| Config | Default | Description |
|--------|---------|-------------|
| `proxy.http_proxy` | `""` | The HTTPS proxy to use for network traffic. |
| `proxy.https_proxy` | `""` | The HTTP proxy to use for network traffic. |
| `proxy.no_proxy` | `""` | A comma-separated list of hostnames, IP addresses, or IP ranges in CIDR format that should not use the proxy. |
Settings for the cert-manager controller.
| Config | Default | Description |
|--------|---------|-------------|
| `controller.loglevel` | `2` | Number of the log level verbosity. |
| `controller.replicas` | `1` | The number of replicas. In order to enable high availability, 2 replicas are recommended. |
| `controller.dns01.recursive_nameservers` | `[]` | Each nameserver can be either the IP address and port of a standard recursive DNS server, or the endpoint to an RFC 8484 DNS over HTTPS endpoint. |
| `controller.dns01.recursive_nameservers_only` | `false` | When true, cert-manager will only ever query the configured DNS resolvers to perform the ACME DNS01 self check. This is useful in DNS constrained environments, where access to authoritative nameservers is restricted. Enabling this option could cause the DNS01 self check to take longer due to caching performed by the recursive nameservers. |
Settings for the cert-manager cainjector.
| Config | Default | Description |
|--------|---------|-------------|
| `cainjector.loglevel` | `2` | Number of the log level verbosity. |
| `cainjector.replicas` | `1` | The number of replicas. In order to enable high availability, 2 replicas are recommended. |
Settings for the cert-manager webhook.
| Config | Default | Description |
|--------|---------|-------------|
| `webhook.loglevel` | `2` | Number of the log level verbosity. |
| `webhook.replicas` | `1` | The number of replicas. In order to enable high availability, at least 3 replicas are recommended. |
| `webhook.host_network` | `false` | Whether to run the webhook in the host network so that it can be reached by the cert-manager controller in environments like AWS EKS. More information: https://cert-manager.io/docs/installation/compatibility. |
| `webhook.secure_port` | `6443` | The port where the webhook is exposed. The default port needs changing in environments like AWS EKS and AWS Fargate. More information: https://cert-manager.io/docs/installation/compatibility. |
Leader election configuration for the cert-manager controller and cainjector Deployments.
| Config | Default | Description |
|--------|---------|-------------|
| `leader_election.namespace` | `kube-system` | Namespace used to perform leader election. The default namespace needs changing in environments like GKE. More information: https://cert-manager.io/docs/installation/compatibility. |
Issues configuration.
| Config | Default | Description |
|-------|-------------------|-------------|
| `private_pki.include` | `true` | Whether to include a ClusterIssuer for a private PKI. |
| `letsencrypt.include` | `false` | Whether to include a ClusterIssuer for Let's Encrypt. |
| `letsencrypt.production` | `false` | Whether to use Let's Encrypt staging (recommended for non-production environments) or production. |
| `letsencrypt.email` | `""` | The email address that Let's Encrypt will use to send info on expiring certificates or other issues. |
| `letsencrypt.challenge.type` | `http01` | The type of challenge used by the ACME CA Server. Valid options: `http01`, `dns01`. |
| `letsencrypt.challenge.secret.name` | `""` | Name of the Secret containing the credentials needed for the dns01 challenge. |
| `letsencrypt.challenge.secret.key` | `""` | The key within the Secret that contains the credentials needed for the dns01 challenge. |
| `letsencrypt.challenge.secret.namespace` | `""` | Namespace containing the Secret with the credentials needed for the dns01 challenge. |
| `letsencrypt.challenge.dns_provider` | `http01` | The DNS provider to use for the ACME dns01 challenge. Valid options: `cloudflare`, `digital_ocean`. |
## 🛡️ Security
The security process for reporting vulnerabilities is described in [SECURITY.md](SECURITY.md).
## 🖊️ License
This project is licensed under the **Apache License 2.0**. See [LICENSE](LICENSE) for more information.