-
Notifications
You must be signed in to change notification settings - Fork 514
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add helm chart #1503
base: master
Are you sure you want to change the base?
Add helm chart #1503
Changes from 1 commit
3f734d2
aa873f4
5922c38
c7a05b0
c01f19c
794014c
6614999
de33e4c
637670a
e871562
1a4ceed
d0485c3
40732f8
a16ef65
58456ed
125ad55
27aa2fb
611a7d1
1b3e89f
0a306d6
a609888
f570e96
8fed2fb
6b19514
7d93c5f
88fe64d
1b39517
a161240
aac6862
541a81a
12ba72b
fcac30b
1361d97
e88e83c
eec0f16
647c622
53bd14c
60b4f42
c268c82
be04c2e
5efb93a
1734495
872c053
e5774ab
e14c189
35e573c
78edc48
57d2753
c925f19
dd87d94
78665b1
f689f91
8685262
adcd28b
81efdc9
e2fc091
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
Signed-off-by: Pato Arvizu <patoarvizu@gmail.com>
- Loading branch information
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -57,6 +57,7 @@ server: | |
- "docker.io/" | ||
- "mydomain.com/" | ||
|
||
|
||
# Set 'trust: local' if you don't want to spin up a signer instance. Otherwise, the remote signer service is made | ||
# available at the 'hostname' and 'port' specified here. | ||
trust: | ||
|
@@ -82,4 +83,76 @@ signer: | |
|
||
logging: | ||
# The logging level to set the 'logging.level' field in both the notary and signer config files. | ||
level: debug | ||
level: debug | ||
|
||
tls: | ||
# If this is set to true, the template will use the certificates and keys provided, otherwise it will automatically | ||
# generate self-signed certificates based on the parameters passed to the 'generated' map. | ||
# If using custom certificates, they should be base64-encoded. And both the public certificate and the private key | ||
# must be provided. | ||
custom: false | ||
|
||
# The CA that signed the server/signer certificates. It's assumed that the same CA is used for bother server | ||
# and signer certificates. | ||
# It doesn't need to strictly be a root CA, it can be an intermediate one. | ||
rootCACert: null | ||
|
||
# The public certificate and corresponding private key for the server. | ||
server: | ||
cert: null | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. If I want to use my own certificates, in what format should I put the certificate here? base64? string? I would be nice if specified in the comments. The same for the rest of the certificates. There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It's a string but yes, it should be clarified in the comments. Thanks! |
||
key: null | ||
|
||
# The public certificate and corresponding private key for the signer. | ||
signer: | ||
cert: null | ||
key: null | ||
|
||
# The CA that signed the server/signer database certificates. It's assumed that the same CA is used for bother server | ||
# and signer database certificates. | ||
# It doesn't need to strictly be a root CA, it can be an intermediate one. | ||
database: | ||
rootCACert: null | ||
|
||
# The public certificate and corresponding private key for the server database. | ||
server: | ||
cert: null | ||
key: null | ||
|
||
# The public certificate and corresponding private key for the signer database. | ||
signer: | ||
cert: null | ||
key: null | ||
|
||
# If Helm auto-generates the certificates, it'll create a self-signed CA and sign certificates off that CA. | ||
# The key of that root CA is thrown away, and only the public certificate is stored as a Kubernetes secret. | ||
generated: | ||
|
||
# The validity in days for the generated certificates. | ||
# Note that rotating the certificates is outside of the scope of this chart! | ||
validityDays: 365 | ||
|
||
server: | ||
# The list of valid DNS host names that the server certificate will accept | ||
dns: | ||
- notary-server | ||
- notaryserver | ||
|
||
signer: | ||
# The list of valid DNS host names that the signer certificate will accept | ||
dns: | ||
- notary-signer | ||
- notarysigner | ||
|
||
database: | ||
|
||
server: | ||
# The list of valid DNS host names that the server database certificate will accept | ||
dns: | ||
- postgresql | ||
- mysql | ||
|
||
signer: | ||
# The list of valid DNS host names that the signer database certificate will accept | ||
dns: | ||
- postgresql | ||
- mysql |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe it could be useful to add here also the fqdn of the service like
.Values.tls.generated.server.dns
+.Values.namespace
+.svc.cluster.local
?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah, good idea... I'll do that