deploy-templates/values-custom-certs.yaml (60 lines of code) (raw):

global: gitProviders: - gitlab dnsWildCard: platform: openshift # Define the Image Registry that will be used in Pipelines. # This section is optional, and users can configure the registry within the EDP Portal user interface. # # Platform supports several types of registries, such as 'ecr', 'harbor', 'dockerhub' and 'openshift'. # 'openshift' registry is available only in case if platform is deployed on the OpenShift cluster and the variable global.platform is set to 'openshift' # # Below is an example of endpoint values for each registry type: # type: | url # ============================= # ecr | <aws_account_id>.dkr.ecr.<aws_region>.amazonaws.com # harbor | <registry.example.com> # dockerhub | 'docker.io' # openshift | <image-registry.openshift-image-registry.svc:5000> # # For example to integrate platform with dockerhub and publish image under 'my_user' account: # dockerRegistry: # type: "dockerhub" # url: "docker.io" # space: "my_user" # As a result all image artifacts are published under https://hub.docker.com/repository/docker/my_user dockerRegistry: type: "" url: "" space: "" externalSecrets: enabled: false edp-headlamp: extraVolumes: - name: custom-ca secret: defaultMode: 420 secretName: custom-ca-certificates # -- Additional volumeMounts to be added to the container extraVolumeMounts: - name: custom-ca mountPath: /etc/ssl/certs/ca.crt readOnly: true subPath: ca.crt config: oidc: enabled: true clientID: "client" gerrit-operator: enabled: false gerrit: caCerts: # -- Flag for enabling additional CA certificates enabled: true # -- Change init CA certificates container image image: adoptopenjdk/openjdk11:alpine # -- Name of the secret containing additional CA certificates secret: custom-ca-certificates edp-tekton: dashboard: readOnly: false ingress: annotations: nginx.ingress.kubernetes.io/auth-signin: https://<oauth-ingress-host>/oauth2/start?rd=https://$host$request_uri nginx.ingress.kubernetes.io/auth-url: http://oauth2-proxy.edp.svc.cluster.local:8080/oauth2/auth gitlab: host: gitlab.com # -- Enable SSO for EDP components. Required keycloak-operator deployment. Default: false sso: enabled: false # -- Keycloak URL keycloakUrl: https://keycloak.example.com # -- Administrators of your tenant admins: - "stub_user_one@example.com" # -- Developers of your tenant developers: - "stub_user_one@example.com" - "stub_user_two@example.com" # -- Additional volumes to be added to the OAuth2-proxy pod extraVolumes: - name: custom-ca secret: defaultMode: 420 secretName: custom-ca # -- Additional volumeMounts to be added to the OAuth2-proxy container extraVolumeMounts: - name: custom-ca mountPath: /etc/ssl/certs/ca.crt readOnly: true subPath: ca.crt