-
-
Notifications
You must be signed in to change notification settings - Fork 276
Expand file tree
/
Copy pathvalues.yaml
More file actions
460 lines (416 loc) · 15.4 KB
/
values.yaml
File metadata and controls
460 lines (416 loc) · 15.4 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
# -- Global setting, passed down to all pods
global:
# -- Overrides the Docker registry globally for all images
imageRegistry: null
## -- Mode for oathkeeper controller: possible modes are: controller or sidecar
ory:
oathkeeper:
maester:
mode: controller
# -- Specify pod metadata, this metadata is added directly to the pod, and not higher objects
podMetadata:
# -- Extra pod level labels
labels: {}
# -- Extra pod level annotations
annotations: {}
# -- Number of ORY Oathkeeper members
replicaCount: 1
# -- Number of revisions kept in history
revisionHistoryLimit: 5
## -- Image configuration
image:
# -- ORY Oathkeeper image registry
registry: "docker.io"
# -- ORY Oathkeeper image
repository: oryd/oathkeeper
# -- ORY Oathkeeper version
tag: "v26.2.0"
# -- Image pull policy
pullPolicy: IfNotPresent
# -- use a busybox image from another repository
initContainer:
repository: busybox
tag: 1
## -- Options for the sidecar
sidecar:
image:
repository: oryd/oathkeeper-maester
tag: v0.1.13
envs: {}
# -- Pod priority
# https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/
priorityClassName: ""
# -- Image pull secrets
imagePullSecrets: []
# -- Chart name override
nameOverride: ""
# -- Full chart name override
fullnameOverride: ""
## -- Container level security context
securityContext:
capabilities:
drop:
- ALL
readOnlyRootFilesystem: true
runAsNonRoot: true
runAsUser: 65534
runAsGroup: 65534
allowPrivilegeEscalation: false
privileged: false
seccompProfile:
type: RuntimeDefault
seLinuxOptions:
level: "s0:c123,c456"
## -- Pod level security context
podSecurityContext:
fsGroupChangePolicy: "OnRootMismatch"
runAsNonRoot: true
runAsUser: 65534
fsGroup: 65534
runAsGroup: 65534
seccompProfile:
type: RuntimeDefault
# -- If enabled, a demo deployment with exemplary access rules and JSON Web Key Secrets will be generated.
demo: false
## -- Configures the Kubernetes service
service:
# -- Configures the Kubernetes service for the proxy port.
proxy:
# -- En-/disable the service
enabled: true
# -- The service type
type: ClusterIP
# -- The load balancer IP
loadBalancerIP: ""
# -- The service port
port: 4455
# -- The service port name. Useful to set a custom service port name if it must follow a scheme (e.g. Istio)
name: http
# -- If you do want to specify annotations, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'annotations:'.
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
annotations: {}
# -- If you do want to specify additional labels, uncomment the following lines, adjust them as necessary, and remove the curly braces after 'labels:'.
# e.g. app: oathkeeper
labels: {}
# -- https://kubernetes.io/docs/reference/networking/virtual-ips/#traffic-policies
externalTrafficPolicy: ""
# -- https://kubernetes.io/docs/reference/networking/virtual-ips/#traffic-policies
internalTrafficPolicy: ""
# -- Configures the Kubernetes service for the api port.
api:
# -- En-/disable the service
enabled: true
# -- The service type
type: ClusterIP
# -- The load balancer IP
loadBalancerIP: ""
# -- The service port
port: 4456
# -- The service port name. Useful to set a custom service port name if it must follow a scheme (e.g. Istio)
name: http
# -- If you do want to specify annotations, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'annotations:'.
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
annotations: {}
# -- If you do want to specify additional labels, uncomment the following lines, adjust them as necessary, and remove the curly braces after 'labels:'.
# e.g. app: oathkeeper
labels: {}
# -- https://kubernetes.io/docs/reference/networking/virtual-ips/#traffic-policies
externalTrafficPolicy: ""
# -- https://kubernetes.io/docs/reference/networking/virtual-ips/#traffic-policies
internalTrafficPolicy: ""
# -- Configures the Kubernetes service for the metrics port.
metrics:
# -- En-/disable the service
enabled: true
# -- The service type
type: ClusterIP
# -- Load balancer IP
loadBalancerIP: ""
# -- The service port
port: 80
# -- The service port name. Useful to set a custom service port name if it must follow a scheme (e.g. Istio)
name: http
# -- If you do want to specify annotations, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'annotations:'.
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
annotations: {}
# -- If you do want to specify additional labels, uncomment the following lines, adjust them as necessary, and remove the curly braces after 'labels:'.
# e.g. app: oathkeeper
labels: {}
## -- Configure ingress
ingress:
# -- Configure ingress for the proxy port.
proxy:
# -- En-/Disable the proxy ingress.
enabled: false
className: ""
annotations: {}
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
hosts:
- host: proxy.oathkeeper.localhost
paths:
- path: /
pathType: ImplementationSpecific
# tls: []
# hosts:
# - proxy.oathkeeper.local
# - secretName: oathkeeper-proxy-example-tls
# -- Configuration for custom default service. This service will be used to handle the response when the configured service in the Ingress rule does not have any active endpoints
defaultBackend: {}
# service:
# name: myservice
# port:
# number: 80
api:
# -- En-/Disable the api ingress.
enabled: false
className: ""
annotations: {}
# If you do want to specify annotations, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'annotations:'.
# kubernetes.io/ingress.class: nginx
# kubernetes.io/tls-acme: "true"
hosts:
- host: api.oathkeeper.localhost
paths:
- path: /
pathType: ImplementationSpecific
# tls: []
# hosts:
# - api.oathkeeper.local
# - secretName: oathkeeper-api-example-tls
## -- Configure ORY Oathkeeper itself
oathkeeper:
# -- Runs the `tpl` function on the config object.
# Warrning! This may break configuration settings that use go templates, like https://github.com/ory/k8s/issues/707
helmTemplatedConfigEnabled: false
# -- Enables frontloading oathkeeper config using an existing CM, or changing the name of the generated one
configFileOverride:
# -- Enable/Disable the creation of the config ConfigMap
enabled: true
# -- Change the name of the configmap or specify the name of an existing configmap to be used
nameOverride: ""
# -- The ORY Oathkeeper configuration. For a full list of available settings, check:
# https://github.com/ory/oathkeeper/blob/master/docs/config.yaml
config:
access_rules:
repositories:
- file:///etc/rules/access-rules.json
serve:
proxy:
port: 4455
api:
port: 4456
prometheus:
port: 9000
# -- If set, uses the given JSON Web Key Set as the signing key for the ID Token Mutator. Requires secret.enabled to be set `true`.
mutatorIdTokenJWKs: ""
# -- Enables frontloading oathkeeper rules using an existing CM, or changing the name of the generated one
accessRulesOverride:
# -- Change the name of the configmap or specify the name of an existing configmap to be used
nameOverride: ""
# -- If set, uses the given access rules.
accessRules: ""
# -- If you enable maester, the following value should be set to "false" to avoid overwriting
# the rules generated by the CDRs. Additionally, the value "accessRules" shouldn't be
# used as it will have no effect once "managedAccessRules" is disabled.
managedAccessRules: true
## -- Secret management
secret:
# -- Switch to false to prevent using mutatorIdTokenJWKs secret
enabled: false
# -- Provide custom name of existing secret if oathkeeper.mutatorIdTokenJWKs is left empty, or custom name of secret to be created
nameOverride: ""
# nameOverride: "myCustomSecret"
# -- enableDefaultAnnotations set to `true` will add default annotations to the secret. As such the Secret will be managed by helm hooks.
enableDefaultAnnotations: true
# -- Annotations to be added to secret. Annotations are added only when secret is being created. Existing secret will not be modified.
secretAnnotations:
# Create the secret before installation, and only then. This saves the secret from regenerating during an upgrade
# pre-upgrade is needed to upgrade from 0.7.0 to newer. Can be deleted afterwards.
helm.sh/hook-weight: "0"
helm.sh/hook: "pre-install, pre-upgrade"
helm.sh/hook-delete-policy: "before-hook-creation"
helm.sh/resource-policy: "keep"
# -- extraAnnotations to be added to secret.
extraAnnotations: {}
# -- default mount path for the kubernetes secret
mountPath: /etc/secrets
# -- default filename of JWKS (mounted as secret)
filename: mutator.id_token.jwks.json
# -- switch to false to prevent checksum annotations being maintained and propogated to the pods
hashSumEnabled: true
## -- Deployment specific config
deployment:
strategy:
type: RollingUpdate
rollingUpdate: {}
resources: {}
# We usually recommend not to specify default resources and to leave this as a conscious
# choice for the user. This also increases chances charts run on environments with little
# resources, such as Minikube. If you do want to specify resources, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
# limits:
# cpu: 100m
# memory: 128Mi
# requests:
# cpu: 100m
# memory: 128Mi
lifecycle: {}
# -- Configure the readinessProbe parameters
readinessProbe:
initialDelaySeconds: 5
periodSeconds: 10
failureThreshold: 5
# -- Configure the startupProbe parameters
startupProbe:
failureThreshold: 5
successThreshold: 1
timeoutSeconds: 2
initialDelaySeconds: 1
# -- Configure a custom livenessProbe. This overwrites the default object
customLivenessProbe: {}
# -- Configure a custom readinessProbe. This overwrites the default object
customReadinessProbe: {}
# -- Configure a custom startupProbe. This overwrites the default object
customStartupProbe: {}
# -- Specify the serviceAccountName value.
# In some situations it is needed to provides specific permissions to Hydra deployments
# Like for example installing Hydra on a cluster with a PosSecurityPolicy and Istio.
# Uncoment if it is needed to provide a ServiceAccount for the Hydra deployment.**
serviceAccount:
# -- Specifies whether a service account should be created
create: true
# -- Annotations to add to the service account
annotations: {}
# -- The name of the service account to use. If not set and create is true, a name is generated using the fullname template
name: ""
automountServiceAccountToken: true
terminationGracePeriodSeconds: 60
# -- Node labels for pod assignment.
nodeSelector: {}
# If you do want to specify node labels, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'annotations:'.
# foo: bar
# -- Array of extra envs to be passed to the deployment. Kubernetes format is expected. Value is processed with Helm
# `tpl`
# - name: FOO
# value: BAR
extraEnv: []
# -- Array of extra arguments to be passed down to the Deployment. Kubernetes args format is expected
extraArgs: []
# -- Extra volumes you can attach to the pod.
extraVolumes: []
# - name: my-volume
# secret:
# secretName: my-secret
# -- Extra volume mounts, allows mounting the extraVolumes to the container.
extraVolumeMounts: []
# - name: my-volume
# mountPath: /etc/secrets/my-secret
# readOnly: true
# -- If you want to add extra sidecar containers.
extraContainers: ""
# extraContainers: |
# - name: ...
# image: ...
# -- If you want to add extra init containers.
extraInitContainers: ""
# extraInitContainers: |
# - name: ...
# image: ...
# -- Configure node tolerations.
tolerations: []
# -- Configure pod topologySpreadConstraints.
topologySpreadConstraints: []
# - maxSkew: 1
# topologyKey: topology.kubernetes.io/zone
# whenUnsatisfiable: DoNotSchedule
# labelSelector:
# matchLabels:
# app.kubernetes.io/name: oathkeeper
# app.kubernetes.io/instance: oathkeeper
# -- Configure pod dnsConfig.
dnsConfig: {}
# options:
# - name: "ndots"
# value: "1"
labels: {}
# If you do want to specify additional labels, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'labels:'.
# e.g. type: app
annotations: {}
# If you do want to specify annotations, uncomment the following
# lines, adjust them as necessary, and remove the curly braces after 'annotations:'.
# e.g. sidecar.istio.io/rewriteAppHTTPProbers: "true"
# -- Specify pod metadata, this metadata is added directly to the pod, and not higher objects
podMetadata:
# -- Extra pod level labels
labels: {}
# -- Extra pod level annotations
annotations: {}
# -- Configure horizontal pod autoscaler for deployment
autoscaling:
enabled: false
minReplicas: 1
maxReplicas: 5
targetCPU: {}
# type: Utilization
# averageUtilization: 80
targetMemory: {}
# type: Utilization
# averageUtilization: 80
# -- Set custom behavior
# https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/#configurable-scaling-behavior
behavior: {}
# -- Add extraContainer container resource metrics
# https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/#container-resource-metrics
extraMetrics: []
# -- Configure node affinity
affinity: {}
## -- Configures controller setup
maester:
enabled: false
## -- PodDistributionBudget configuration
pdb:
enabled: false
spec:
minAvailable: ""
maxUnavailable: ""
## -- Parameters for the Prometheus ServiceMonitor objects.
# Reference: https://docs.openshift.com/container-platform/4.6/rest_api/monitoring_apis/servicemonitor-monitoring-coreos-com-v1.html
serviceMonitor:
# -- switch to true to enable creating the ServiceMonitor
enabled: false
# -- HTTP scheme to use for scraping.
scheme: http
# -- Interval at which metrics should be scraped
scrapeInterval: 60s
# -- Timeout after which the scrape is ended
scrapeTimeout: 30s
# -- Provide additional metricRelabelings to apply to samples before ingestion.
metricRelabelings: []
# -- Provide additional relabelings to apply to samples before scraping
relabelings: []
# -- Provide additional labels to the ServiceMonitor resource metadata
labels: {}
# -- TLS configuration to use when scraping the endpoint
tlsConfig: {}
# -- Additional metric labels
targetLabels: []
configmap:
# -- switch to false to prevent checksum annotations being maintained and propogated to the pods
hashSumEnabled: true
test:
# -- Provide additional labels to the test pod
labels: {}
# -- use a busybox image from another repository
busybox:
repository: busybox
tag: 1