forked from sigstore/helm-charts
-
Notifications
You must be signed in to change notification settings - Fork 0
/
values.yaml
156 lines (150 loc) · 3.86 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
namespace:
create: false
name: ctlog-system
imagePullSecrets: []
server:
replicaCount: 1
config:
key: treeID
treeID: ""
image:
registry: ghcr.io
repository: sigstore/scaffolding/ct_server
pullPolicy: IfNotPresent
# v0.6.17
version: sha256:e16f0a2be43a317a4c392cca24eec8c8fef06b0e836bc3545979ac0335fcf6f5
livenessProbe:
httpGet:
path: /healthz
port: 6962
initialDelaySeconds: 10
readinessProbe:
httpGet:
path: /healthz
port: 6962
initialDelaySeconds: 10
serviceAccount:
create: true
name: ""
annotations: {}
mountToken: false
podAnnotations:
prometheus.io/scrape: "true"
prometheus.io/path: /metrics
prometheus.io/port: "6963"
portHTTP: 6962
portHTTPMetrics: 6963
service:
# backendConfig:
# name: ctlog-backend-config
# spec: # https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-configuration#configuring_ingress_features_through_backendconfig_parameters
# securityPolicy:
# name: ctlog-security-policy
# logging:
# enable: true
# healthCheck:
# port: 6962
# requestPath: "/healthz"
# type: HTTP
type: ClusterIP
ports:
- name: 6962-tcp
port: 80
protocol: TCP
targetPort: 6962
- name: 6963-tcp
port: 6963
protocol: TCP
targetPort: 6963
ingress:
enabled: false
className: nginx
hosts:
- path: /
annotations: {}
tls: []
ingresses:
- enabled: false
name: "gce-ingress"
className: "gce"
hosts:
- host: fulcio.localhost
paths:
- path: /test
pathType: Prefix
- path: /other-shard
serviceName: other-shard
annotations: {}
tls: []
staticGlobalIP: lb-ext-ip
frontendConfigSpec: # https://cloud.google.com/kubernetes-engine/docs/how-to/ingress-configuration#configuring_ingress_features_through_frontendconfig_parameters
sslPolicy: ctlog-ssl-policy
redirectToHttps:
enabled: true
extraArgs: []
securityContext:
runAsNonRoot: true
runAsUser: 65533
createtree:
enabled: true
name: createtree
# This must be < 20 characters
displayName: ctlog-tree
image:
registry: ghcr.io
repository: sigstore/scaffolding/createtree
pullPolicy: IfNotPresent
# v0.6.17
version: sha256:eb1a94738f34964c7456d18d30b8a45a654af89bb5371f69b2403df373be0826
ttlSecondsAfterFinished: 3600
serviceAccount:
create: true
name: ""
annotations: {}
mountToken: true
securityContext:
runAsNonRoot: true
runAsUser: 65533
annotations: {}
createctconfig:
enabled: true
replicaCount: 1
backoffLimit: 6
name: createctconfig
initContainerImage:
curl:
registry: docker.io
repository: curlimages/curl
# -- 8.5.0
version: "sha256:4bfa3e2c0164fb103fb9bfd4dc956facce32b6c5d47cc09fcec883ce9535d5ac"
imagePullPolicy: IfNotPresent
image:
registry: ghcr.io
repository: sigstore/scaffolding/createctconfig
pullPolicy: IfNotPresent
# -- v0.6.17
version: sha256:a891233c7f54a11025a4cac6119ba4aeea4f643c2012ff30e921aeca8a32d6db
fulcioURL: "http://fulcio-server.fulcio-system.svc"
logPrefix: sigstorescaffolding
privateKeyPasswordSecretName: ""
ttlSecondsAfterFinished: 3600
pubkeysecret: "ctlog-public-key"
# If there's an existing private key that should be used for ctlog, specify
# here. This is important if a key has been created and imported into TUF.
privateSecret: ""
serviceAccount:
create: true
name: ""
annotations: {}
mountToken: true
securityContext:
runAsNonRoot: true
runAsUser: 65533
annotations: {}
trillian:
namespace: trillian-system
logServer:
name: trillian-logserver
portRPC: 8091
# Force namespace of namespaced resources
forceNamespace: ""