1
1
# policy-controller
2
2
3
- ![ Version: 0.5.8 ] ( https://img.shields.io/badge/Version-0.5.8 -informational?style=flat-square ) ![ Type: application] ( https://img.shields.io/badge/Type-application-informational?style=flat-square ) ![ AppVersion: 0.7.0 ] ( https://img.shields.io/badge/AppVersion-0.7.0 -informational?style=flat-square )
3
+ ![ Version: 0.7.0 ] ( https://img.shields.io/badge/Version-0.6.0 -informational?style=flat-square ) ![ Type: application] ( https://img.shields.io/badge/Type-application-informational?style=flat-square ) ![ AppVersion: 0.8.2 ] ( https://img.shields.io/badge/AppVersion-0.8.2 -informational?style=flat-square )
4
4
5
5
The Helm chart for Policy Controller
6
6
@@ -27,17 +27,19 @@ The Helm chart for Policy Controller
27
27
| cosign.webhookName | string | ` "policy.sigstore.dev" ` | |
28
28
| imagePullSecrets | list | ` [] ` | |
29
29
| installCRDs | bool | ` true ` | |
30
- | webhook.configData | object | ` {} ` | Set the data of the ` policy-config-controller ` configmap |
31
- | webhook.webhookNames.defaulting | string | ` "defaulting.clusterimagepolicy.sigstore.dev" ` | |
32
- | webhook.webhookNames.validating | string | ` "validating.clusterimagepolicy.sigstore.dev" ` | |
30
+ | leasescleanup.image.pullPolicy | string | ` "IfNotPresent" ` | |
31
+ | leasescleanup.image.repository | string | ` "cgr.dev/chainguard/kubectl" ` | |
32
+ | leasescleanup.image.version | string | ` "1.26.0" ` | |
33
+ | leasescleanup.securityContext.enabled | bool | ` false ` | |
33
34
| serviceMonitor.enabled | bool | ` false ` | |
35
+ | webhook.configData | object | ` {} ` | |
34
36
| webhook.env | object | ` {} ` | |
35
37
| webhook.extraArgs | object | ` {} ` | |
38
+ | webhook.failurePolicy | string | ` "Fail" ` | |
36
39
| webhook.image.pullPolicy | string | ` "IfNotPresent" ` | |
37
40
| webhook.image.repository | string | ` "ghcr.io/sigstore/policy-controller/policy-controller" ` | |
38
- | webhook.image.version | string | ` "sha256:e91bcd954394b414d3b80adfc2cefdae84dd7985fb938a895471eb34aac57744" ` | ` "v0.8.0" ` |
41
+ | webhook.image.version | string | ` "sha256:e91bcd954394b414d3b80adfc2cefdae84dd7985fb938a895471eb34aac57744" ` | |
39
42
| webhook.name | string | ` "webhook" ` | |
40
- | webhook.failurePolicy | string | ` "Fail" ` | |
41
43
| webhook.namespaceSelector.matchExpressions[ 0] .key | string | ` "policy.sigstore.dev/include" ` | |
42
44
| webhook.namespaceSelector.matchExpressions[ 0] .operator | string | ` "In" ` | |
43
45
| webhook.namespaceSelector.matchExpressions[ 0] .values[ 0] | string | ` "true" ` | |
@@ -48,8 +50,8 @@ The Helm chart for Policy Controller
48
50
| webhook.podSecurityContext.runAsUser | int | ` 1000 ` | |
49
51
| webhook.registryCaBundle | object | ` {} ` | |
50
52
| webhook.replicaCount | int | ` 1 ` | |
51
- | webhook.resources.limits.cpu | string | ` "100m " ` | |
52
- | webhook.resources.limits.memory | string | ` "256Mi " ` | |
53
+ | webhook.resources.limits.cpu | string | ` "200m " ` | |
54
+ | webhook.resources.limits.memory | string | ` "512Mi " ` | |
53
55
| webhook.resources.requests.cpu | string | ` "100m" ` | |
54
56
| webhook.resources.requests.memory | string | ` "128Mi" ` | |
55
57
| webhook.securityContext.enabled | bool | ` false ` | |
@@ -62,9 +64,8 @@ The Helm chart for Policy Controller
62
64
| webhook.serviceAccount.name | string | ` "" ` | |
63
65
| webhook.volumeMounts | list | ` [] ` | |
64
66
| webhook.volumes | list | ` [] ` | |
65
- | leasescleanup.image.pullPolicy | string | ` "IfNotPresent" ` | |
66
- | leasescleanup.image.repository | string | ` "cgr.dev/chainguard/kubectl" ` | |
67
- | leasescleanup.image.version | string | ` "1.26.0" ` | |
67
+ | webhook.webhookNames.defaulting | string | ` "defaulting.clusterimagepolicy.sigstore.dev" ` | |
68
+ | webhook.webhookNames.validating | string | ` "validating.clusterimagepolicy.sigstore.dev" ` | |
68
69
69
70
### Deploy ` policy-controller ` Helm Chart
70
71
0 commit comments