Options
All
  • Public
  • Public/Protected
  • All
Menu

ACME configures this issuer to communicate with a RFC8555 (ACME) server to obtain signed x509 certificates.

schema

ClusterIssuerSpecAcme

Hierarchy

  • ClusterIssuerSpecAcme

Index

Properties

Optional Readonly disableAccountKeyGeneration

disableAccountKeyGeneration: boolean

Enables or disables generating a new ACME account key. If true, the Issuer resource will not request a new account but will expect the account key to be supplied via an existing secret. If false, the cert-manager system will generate a new ACME account key for the Issuer. Defaults to false.

default

false.

schema

ClusterIssuerSpecAcme#disableAccountKeyGeneration

Optional Readonly email

email: string

Email is the email address to be associated with the ACME account. This field is optional, but it is strongly recommended to be set. It will be used to contact you in case of issues with your account or certificates, including expiry notification emails. This field may be updated after the account is initially registered.

schema

ClusterIssuerSpecAcme#email

Optional Readonly enableDurationFeature

enableDurationFeature: boolean

Enables requesting a Not After date on certificates that matches the duration of the certificate. This is not supported by all ACME servers like Let's Encrypt. If set to true when the ACME server does not support it it will create an error on the Order. Defaults to false.

default

false.

schema

ClusterIssuerSpecAcme#enableDurationFeature

Optional Readonly externalAccountBinding

ExternalAccountBinding is a reference to a CA external account of the ACME server. If set, upon registration cert-manager will attempt to associate the given external account credentials with the registered ACME account.

schema

ClusterIssuerSpecAcme#externalAccountBinding

Optional Readonly preferredChain

preferredChain: string

PreferredChain is the chain to use if the ACME server outputs multiple. PreferredChain is no guarantee that this one gets delivered by the ACME endpoint. For example, for Let's Encrypt's DST crosssign you would use: "DST Root CA X3" or "ISRG Root X1" for the newer Let's Encrypt root CA. This value picks the first certificate bundle in the ACME alternative chains that has a certificate with this value as its issuer's CN

schema

ClusterIssuerSpecAcme#preferredChain

Readonly privateKeySecretRef

PrivateKey is the name of a Kubernetes Secret resource that will be used to store the automatically generated ACME account private key. Optionally, a key may be specified to select a specific entry within the named Secret resource. If key is not specified, a default of tls.key will be used.

schema

ClusterIssuerSpecAcme#privateKeySecretRef

Readonly server

server: string

Server is the URL used to access the ACME server's 'directory' endpoint. For example, for Let's Encrypt's staging endpoint, you would use: "https://acme-staging-v02.api.letsencrypt.org/directory". Only ACME v2 endpoints (i.e. RFC 8555) are supported.

schema

ClusterIssuerSpecAcme#server

Optional Readonly skipTlsVerify

skipTlsVerify: boolean

Enables or disables validation of the ACME server TLS certificate. If true, requests to the ACME server will not have their TLS certificate validated (i.e. insecure connections will be allowed). Only enable this option in development environments. The cert-manager system installed roots will be used to verify connections to the ACME server if this is false. Defaults to false.

default

false.

schema

ClusterIssuerSpecAcme#skipTLSVerify

Optional Readonly solvers

Solvers is a list of challenge solvers that will be used to solve ACME challenges for the matching domains. Solver configurations must be provided in order to obtain certificates from an ACME server. For more information, see: https://cert-manager.io/docs/configuration/acme/

schema

ClusterIssuerSpecAcme#solvers

Generated using TypeDoc