-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathvalues.yaml
354 lines (300 loc) · 9.03 KB
/
values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
## Default values for Portus Helm Chart.
## This is a YAML-formatted file.
## Declare variables to be passed into your templates.
## Default values for Portus
##
portus:
replicas: 1
## Image configuration.
##
image:
repository: "opensuse/portus"
tag: "2.3"
pullPolicy: "IfNotPresent"
## Service configuration.
##
service:
port: "3000"
## Resource configuration.
##
resources:
requests:
memory: "512Mi"
cpu: "300m"
## Portus database configuration.
dbAdapter: "mysql2"
## only set db values if using existing database deployment
##
# dbHost
# dbDatabase:
# dbUsername:
# dbPassword:
## Defaults to a random 10-character alphanumeric string if not set
##
# password:
## Defaults to a random 10-character alphanumeric string if not set
## Password used for mariadb connection
# productionPassword: not-a-secure-password
## Defaults to a random 128-character alphanumeric string if not set
##
# secretKeyBase:
env:
## http://port.us.org/docs/debugging.html
## The available log levels are: debug, info, warn, error, fatal and unknown
log_level: info
## config
##
config:
email:
from: "[email protected]"
name: "Portus"
reply_to: "[email protected]"
smtp:
enabled: false
address: smtp.example.com
port: 587
domain: example.com
username: [email protected]
password: not-a-password
gravatar: true # If enabled, then the profile picture will be picked from the Gravatar
delete: true # Allow admins and owners to delete images and tags
## LDAP support. If enabled, then only users of the specified LDAP server will
## be able to use Portus. Take a look at the documentation of LDAP support in our
## online docs: http://port.us.org/features/2_LDAP-support.html.
ldap:
enabled: false
url:
port:
# Available options: "plain", "simple_tls" and "starttls". The default is
# "plain", the recommended is "starttls".
method: plain
# The base where users are located (e.g. "ou=users,dc=example,dc=com").
base:
# User filter (e.g. "mail=george*").
filter:
# The LDAP attribute where to search for username. The default is 'uid'.
uid:
# LDAP credentials used to search for a user.
authentication:
enabled: false
bind_dn:
password:
# Portus needs an email for each user, but there's no standard way to get
# that from LDAP servers. You can tell Portus how to get the email from users
# registered in the LDAP server with this configurable value. There are three
# possibilities:
#
# - disabled: this is the default value. It means that Portus won't do a
# thing when registering LDAP users (users will be redirected to their
# profile page until they setup an email account).
# - enabled where "attr" is empty: for this you need "ldap.base" to have
# some value. In this case, the hostname will be guessed from the domain
# component of the provided base string. For example, for the dn:
# "ou=users,dc=example,dc=com", and a user name "user", the resulting
# email is "[email protected]".
# - enabled where "attr" is not empty: with this you specify the attribute
# inside a LDIF record where the email is set.
#
# If something goes wrong when trying to guess the email, then it just falls
# back to the default behavior (empty email).
guess_email:
enabled: false
attr:
first_user_admin: true # First user signing up will be admin
signup: true # If enabled, then users can signup with the signup form
display_name: false # Allow users to have different display names on the web site
user_permission:
change_visibility: true # Allow users to change the visibility or their personal namespace
create_team: true # Allow users to create teams
manage_team: true # Allow users to create/modify teams if they are an owner of it
create_namespace: true # Allow users to create namespaces
manage_namespace: true # Allow users to create/modify namespaces if they are an owner of it
oauth:
# If enabled, users can authenticate with their Google Account.
# Callback url: <host>/users/auth/google_oauth2/callback
google_oauth2:
enabled: false
id:
secret:
domain:
options:
hd:
# OpenID authentication support. If enabled, then users can authenticate with OpenID/Connect
# Callback url: <host>/users/auth/open_id/callback
open_id:
enabled: false
identifier:
domain:
# Github authentication support.
# Callback url: <host>/users/auth/github/callback
github:
enabled: false
client_id:
client_secret:
organization:
team:
domain:
# Gitlab authentication support.
# Callback url: <host>/users/auth/gitlab/callback
gitlab:
enabled: false
application_id:
secret:
group:
domain:
server:
# Bitbucket authentication support. Need permission to read email.
# Callback url: <host>/users/auth/bitbucket/callback
bitbucket:
enabled: false
key:
secret:
domain:
options:
team:
security:
clair:
server: "" # This is only guaranteed to work for v2.0.x releases of Clair
health_port: 6061 # Port being used by Clair to report its status
zypper:
server: "" # support for this is experimental since this functionality has not been merged into master yet in zypper-docker
anonymous_browsing: true # Allow anonymous (non-logged-in) users to explore the images available in your Docker Registry
## TLS configuration
## the internal host names of the portus, registry and nginx service must be covered by the key/cert in order for TLS to work properly
##
tls:
enabled: false
## must include key if using tls
##
# key:
## must include certificate if using tls
##
# cert:
## must include signing authority cert
##
# cacert:
## background processing
##
background:
enabled: true
resources:
requests:
memory: "512Mi"
cpu: "300m"
## Default values for Docker Registry.
##
registry:
replicas: 1
mountPath: "/storage"
## persistence configuration.
##
persistence:
enabled: false
accessMode: "ReadWriteOnce"
size: "10Gi"
## image configuration.
# #
image:
repository: "library/registry"
tag: "2.6.2"
pullPolicy: "IfNotPresent"
## Service configuration.
##
service:
port: "5000"
debugPort: "5001"
## Resource configuration.
##
resources:
requests:
memory: "512Mi"
cpu: "300m"
## Default values for Ingress.
##
ingress:
enabled: true
host: registry.example.com
port: 443
## Anntations to be added to the web ingress
##
annotations: {}
## For NginxIngress
## nginx.ingress.kubernetes.io/proxy-body-size: "0"
## nginx.ingress.kubernetes.io/load-balance: "least_conn"
## nginx.ingress.kubernetes.io/server-snippet: |
## add_header Strict-Transport-Security "max-age=31536000; includeSubDomains";
## add_header X-Frame-Options DENY;
## add_header X-Content-Type-Options nosniff;
## add_header X-XSS-Protection "1; mode=block";
## chunked_transfer_encoding on;
## nginx.ingress.kubernetes.io/configuration-snippet: if ($http_user_agent ~ "^(docker\/1\.(3|4|5(?!\.[0-9]-dev))|Go ).*$" ) { return 404; }
## TLS configuration
## the ingress host must be covered by the key/cert in order for TLS to work properly
##
tls:
enabled: false
## Secrets containing SSL key and cert must be manually created in the namespace
##
# secretName: "portus-tls"
## must include key if using tls
##
# key:
## must include certificate if using tls
##
# cert:
## must include signing authority cert
##
# cacert:
## Default values for Mariadb.
##
mariadb:
## Use Mariadb chart dependency
## Set to false if using your own Mariadb
##
enabled: true
## persistence configuration.
##
persistence:
enabled: false
# storageClass: "-"
accessMode: "ReadWriteOnce"
size: "8Gi"
## Configuration values for Mariadb.
## must match Portus database values.
##
db:
user: "portus"
name: "portus"
## Defaults to
##password: {}
## REdis cache for Registry
##
redis:
enabled: true
cluster:
enabled: false
usePassword: false
persistance:
enabled: true
size: 6Gi
## Postgres For Clair
postgresql:
## postgresUser:
## postgresPassword:
postgresDatabase: clair
persistence:
enabled: true
size: 10Gi
accessMode: ReadWriteOnce
##
clair:
enabled: true
image:
repository: quay.io/coreos/clair-git
tag: latest
pullPolicy: IfNotPresent
resources:
requests:
memory: 256Mi
cpu: 100m
env: {}