A Helm chart for deploying Sigstore scaffold chart that is opinionated for OpenShift
This wrapper chart builds on top of the Scaffold chart from the Sigstore project to both simplify and satisfy the requirements for deployment within an OpenShift
If you have already read this document and want a quick no-fail path to installing a Sigstore stack with RH SSO, follow quick start
The chart enhances the scaffold chart by taking care of the following:
- Provision Namespaces
- Configure
RoleBindings
to enable access to theanyuid
SecurityContextConstraint - Inject Fulcio root and Rekor signing keys
Similar to any Helm dependency, values from the upstream scaffold
chart can be customized by embedding the properties
within the scaffold
property similar to the following:
scaffold:
fulcio:
namespace:
name: fulcio-system
create: false
...
The following must be satisfied prior to deploying the sample implementation:
- Fulcio root CA certificate and signing keys
- More information in requirements-keys-certs.md
- OpenID Token Issuer endpoint
- Keycloak/RHSSO requirements can be followed and deployed in OpenShift with keycloak-example.md
Helm values files are available in the examples directory that provides a baseline to work off of. It can be customized based on an individual target environment. Perform the following modifications to the example values file to curate the deployment of the chart:
-
Modify the OIDC Issuer URL in the fulcio config section of the values file as necessary.
-
Perform any additional customizations as desired
When logged in as an elevated OpenShift user, execute the following to install the chart referencing the
customized values file. The OPENSHIFT_APPS_SUBDOMAIN will be substituted in the values file with envsubst
below:
OPENSHIFT_APPS_SUBDOMAIN=apps.$(oc get dns cluster -o jsonpath='{ .spec.baseDomain }') envsubst < examples/values-sigstore-openshift.yaml | helm upgrade -i trusted-artifact-signer --debug charts/trusted-artifact-signer -n sigstore --create-namespace --values -
For real-time analytics through Grafana, refer to our enable-grafana-monitoring.md guide.
Follow this to sign and/or verify artifacts.
Kubernetes: >= 1.19.0-0
Repository | Name | Version |
---|---|---|
https://sigstore.github.io/helm-charts | scaffold(scaffold) | 0.6.41 |
Key | Description | Type | Default |
---|---|---|---|
configs.clientserver.consoleDownload | This can only be enabled if the OpenShift CRD is registered. | bool | true |
configs.clientserver.images.clientserver_cg.pullPolicy | string | "IfNotPresent" |
|
configs.clientserver.images.clientserver_cg.registry | string | "quay.io" |
|
configs.clientserver.images.clientserver_cg.repository | string | "redhat-user-workloads/rhtas-tenant/cli/client-server-cg" |
|
configs.clientserver.images.clientserver_cg.version | string | "sha256:18deade47e3f1be1179bba021270edba0560f7546a4d0273179c5901104a3ffc" |
|
configs.clientserver.images.clientserver_re.pullPolicy | string | "IfNotPresent" |
|
configs.clientserver.images.clientserver_re.registry | string | "quay.io" |
|
configs.clientserver.images.clientserver_re.repository | string | "redhat-user-workloads/rhtas-tenant/cli/client-server-re" |
|
configs.clientserver.images.clientserver_re.version | string | "sha256:fc956d235060f9ce8e97410043bb80dd8c79ab43c220d2bbf46b0aec27ff7d19" |
|
configs.clientserver.images.httpd.pullPolicy | string | "IfNotPresent" |
|
configs.clientserver.images.httpd.registry | string | "registry.redhat.io" |
|
configs.clientserver.images.httpd.repository | string | "ubi9/httpd-24" |
|
configs.clientserver.images.httpd.version | string | "sha256:7874b82335a80269dcf99e5983c2330876f5fe8bdc33dc6aa4374958a2ffaaee" |
|
configs.clientserver.name | string | "tas-clients" |
|
configs.clientserver.namespace | string | "trusted-artifact-signer-clientserver" |
|
configs.clientserver.namespace_create | bool | true |
|
configs.clientserver.rolebindings[0] | string | "tas-clients" |
|
configs.clientserver.route | Whether to create the OpenShift route resource | bool | true |
configs.cosign_deploy.enabled | bool | false |
|
configs.cosign_deploy.image | Image containing the cosign binary as well as environment variables with the base domain injected. | object | {"pullPolicy":"IfNotPresent","registry":"quay.io","repository":"redhat-user-workloads/rhtas-tenant/cli/cosign","version":"sha256:2a21f17b3c8e0f223cd6cb76008dae924c5ac48ae49db3fee5c5dd4593c12a8d"} |
configs.cosign_deploy.name | Name of deployment | string | "cosign" |
configs.cosign_deploy.namespace | string | "cosign" |
|
configs.cosign_deploy.namespace_create | bool | true |
|
configs.cosign_deploy.rolebindings | names for rolebindings to add clusterroles to cosign serviceaccounts. The names must match the serviceaccount names in the cosign namespace. | list | ["cosign"] |
configs.ctlog.namespace | string | "ctlog-system" |
|
configs.ctlog.namespace_create | bool | true |
|
configs.ctlog.rolebindings | Names for rolebindings to add clusterroles to ctlog serviceaccounts. The names must match the serviceaccount names in the ctlog namespace. | list | ["ctlog","ctlog-createtree","trusted-artifact-signer-ctlog-createctconfig"] |
configs.fulcio.clusterMonitoring.enabled | bool | true |
|
configs.fulcio.clusterMonitoring.endpoints[0].interval | string | "30s" |
|
configs.fulcio.clusterMonitoring.endpoints[0].port | string | "2112-tcp" |
|
configs.fulcio.clusterMonitoring.endpoints[0].scheme | string | "http" |
|
configs.fulcio.namespace | string | "fulcio-system" |
|
configs.fulcio.namespace_create | bool | true |
|
configs.fulcio.rolebindings | Names for rolebindings to add clusterroles to fulcio serviceaccounts. The names must match the serviceaccount names in the fulcio namespace. | list | ["fulcio-createcerts","fulcio-server"] |
configs.fulcio.server.secret.name | string | "" |
|
configs.fulcio.server.secret.password | password to decrypt the signing key | string | "" |
configs.fulcio.server.secret.private_key | a PEM-encoded encrypted signing key | string | "" |
configs.fulcio.server.secret.private_key_file | file containing a PEM-encoded encrypted signing key | string | "" |
configs.fulcio.server.secret.public_key | signer public key | string | "" |
configs.fulcio.server.secret.public_key_file | file containing signer public key | string | "" |
configs.fulcio.server.secret.root_cert | fulcio root certificate authority (CA) | string | "" |
configs.fulcio.server.secret.root_cert_file | file containing fulcio root certificate authority (CA) | string | "" |
configs.rekor.backfillRedis.enabled | bool | true |
|
configs.rekor.backfillRedis.image.pullPolicy | string | "IfNotPresent" |
|
configs.rekor.backfillRedis.image.registry | string | "quay.io" |
|
configs.rekor.backfillRedis.image.repository | string | "redhat-user-workloads/rhtas-tenant/rekor/backfill-redis" |
|
configs.rekor.backfillRedis.image.version | string | "sha256:0097a4525aa962a14ac1aaef4175f5e99be557793c93dfd68790f0e233d72ede" |
|
configs.rekor.backfillRedis.schedule | string | "0 0 * * *" |
|
configs.rekor.clusterMonitoring.enabled | bool | true |
|
configs.rekor.clusterMonitoring.endpoints[0].interval | string | "30s" |
|
configs.rekor.clusterMonitoring.endpoints[0].port | string | "2112-tcp" |
|
configs.rekor.clusterMonitoring.endpoints[0].scheme | string | "http" |
|
configs.rekor.namespace | string | "rekor-system" |
|
configs.rekor.namespace_create | bool | true |
|
configs.rekor.rolebindings | names for rolebindings to add clusterroles to rekor serviceaccounts. The names must match the serviceaccount names in the rekor namespace. | list | ["rekor-redis","rekor-server","trusted-artifact-signer-rekor-createtree"] |
configs.rekor.signer | Signer holds secret that contains the private key used to sign entries and the tree head of the transparency log When this section is left out, scaffold.rekor creates the secret and key. | object | {"secret":{"name":"","private_key":"","private_key_file":""}} |
configs.rekor.signer.secret.name | Name of the secret to create with the private key data. This name must match the value in scaffold.rekor.server.signer.signerFileSecretOptions.secretName. | string | "" |
configs.rekor.signer.secret.private_key | Private encrypted signing key | string | "" |
configs.rekor.signer.secret.private_key_file | File containing a private encrypted signing key | string | "" |
configs.rekorui.enabled | bool | true |
|
configs.rekorui.image.imagePullPolicy | string | "Always" |
|
configs.rekorui.image.registry | string | "quay.io" |
|
configs.rekorui.image.repository | string | "redhat-user-workloads/rhtas-tenant/rekor-search-ui/rekor-search-ui" |
|
configs.rekorui.image.version | string | "sha256:6ba83b2e09d77c0e3cc21739cb51c6639a9a8586de9b8e9924983795dad4f9ba" |
|
configs.rekorui.name | string | "rekor-ui" |
|
configs.rekorui.namespace | string | "rekor-ui" |
|
configs.rekorui.namespace_create | bool | true |
|
configs.rekorui.route | bool | true |
|
configs.rekorui.subdomain | string | "rekorui.appsSubdomain" |
|
configs.segment_backup_job.enabled | bool | false |
|
configs.segment_backup_job.image.pullPolicy | string | "IfNotPresent" |
|
configs.segment_backup_job.image.registry | string | "quay.io" |
|
configs.segment_backup_job.image.repository | string | "redhat-user-workloads/rhtas-tenant/segment-backup-job/segment-backup-job" |
|
configs.segment_backup_job.image.version | string | "sha256:8adc001b08216d001271d254f918fc1855c575123e393783102ddc991bf9f082" |
|
configs.segment_backup_job.name | string | "segment-backup-job" |
|
configs.segment_backup_job.namespace | string | "trusted-artifact-signer-monitoring" |
|
configs.segment_backup_job.namespace_create | bool | false |
|
configs.segment_backup_job.rolebindings[0] | string | "segment-backup-job" |
|
configs.trillian.namespace | string | "trillian-system" |
|
configs.trillian.namespace_create | bool | true |
|
configs.trillian.rolebindings | names for rolebindings to add clusterroles to trillian serviceaccounts. The names must match the serviceaccount names in the trillian namespace. | list | ["trillian-logserver","trillian-logsigner","trillian-mysql"] |
configs.tuf.namespace | string | "tuf-system" |
|
configs.tuf.namespace_create | bool | true |
|
configs.tuf.rolebindings | names for rolebindings to add clusterroles to tuf serviceaccounts. The names must match the serviceaccount names in the tuf namespace. | list | ["tuf","tuf-secret-copy-job"] |
global.appsSubdomain | DNS name to generate environment variables and consoleCLIDownload urls. By default, in OpenShift, the value for this is apps.$(oc get dns cluster -o jsonpath='{ .spec.baseDomain }') | string | "" |
rbac.clusterrole | clusterrole to be added to sigstore component serviceaccounts. | string | "system:openshift:scc:anyuid" |
scaffold.copySecretJob.backoffLimit | int | 1000 |
|
scaffold.copySecretJob.enabled | bool | true |
|
scaffold.copySecretJob.imagePullPolicy | string | "IfNotPresent" |
|
scaffold.copySecretJob.name | string | "copy-secrets-job" |
|
scaffold.copySecretJob.registry | string | "registry.redhat.io" |
|
scaffold.copySecretJob.repository | string | "openshift4/ose-cli" |
|
scaffold.copySecretJob.serviceaccount | string | "tuf-secret-copy-job" |
|
scaffold.copySecretJob.version | string | "latest" |
|
scaffold.ctlog.createcerts.fullnameOverride | string | "ctlog-createcerts" |
|
scaffold.ctlog.createctconfig.backoffLimit | int | 30 |
|
scaffold.ctlog.createctconfig.enabled | bool | true |
|
scaffold.ctlog.createctconfig.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.ctlog.createctconfig.image.registry | string | "quay.io" |
|
scaffold.ctlog.createctconfig.image.repository | string | "redhat-user-workloads/rhtas-tenant/scaffold/createctconfig" |
|
scaffold.ctlog.createctconfig.image.version | string | "sha256:abaa6e085face8d2868cf8b9a4f7a1ce4dac65bad50e94b5275e54742731043c" |
|
scaffold.ctlog.createctconfig.initContainerImage.curl.imagePullPolicy | string | "IfNotPresent" |
|
scaffold.ctlog.createctconfig.initContainerImage.curl.registry | string | "registry.access.redhat.com" |
|
scaffold.ctlog.createctconfig.initContainerImage.curl.repository | string | "ubi9/ubi-minimal" |
|
scaffold.ctlog.createctconfig.initContainerImage.curl.version | string | "latest" |
|
scaffold.ctlog.createtree.displayName | string | "ctlog-tree" |
|
scaffold.ctlog.createtree.fullnameOverride | string | "ctlog-createtree" |
|
scaffold.ctlog.createtree.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.ctlog.createtree.image.registry | string | "quay.io" |
|
scaffold.ctlog.createtree.image.repository | string | "redhat-user-workloads/rhtas-tenant/scaffold/trillian-createtree" |
|
scaffold.ctlog.createtree.image.version | string | "sha256:9c8c8d3e37c270d4f61abf35cae8c0e264e9ab94caffe989cd1eeaa8d00b6529" |
|
scaffold.ctlog.enabled | bool | true |
|
scaffold.ctlog.forceNamespace | string | "ctlog-system" |
|
scaffold.ctlog.fullnameOverride | string | "ctlog" |
|
scaffold.ctlog.namespace.create | bool | false |
|
scaffold.ctlog.namespace.name | string | "ctlog-system" |
|
scaffold.ctlog.server.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.ctlog.server.image.registry | string | "quay.io" |
|
scaffold.ctlog.server.image.repository | string | "redhat-user-workloads/rhtas-tenant/certificate-transparency-go/certificate-transparency-go" |
|
scaffold.ctlog.server.image.version | string | "sha256:31227e32767658664dad905547dacbcfc8f634d7d21a43787868a8bd8905c986" |
|
scaffold.fulcio.createcerts.enabled | bool | false |
|
scaffold.fulcio.createcerts.fullnameOverride | string | "fulcio-createcerts" |
|
scaffold.fulcio.createcerts.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.fulcio.createcerts.image.registry | string | "quay.io" |
|
scaffold.fulcio.createcerts.image.repository | string | "redhat-user-workloads/rhtas-tenant/scaffold/fulcio-createcerts" |
|
scaffold.fulcio.createcerts.image.version | string | "sha256:9501e5cde897c88164ff7ed008608e1e614ff6b140480450f86cc01094a675c1" |
|
scaffold.fulcio.ctlog.createctconfig.logPrefix | string | "sigstorescaffolding" |
|
scaffold.fulcio.ctlog.enabled | bool | false |
|
scaffold.fulcio.enabled | bool | true |
|
scaffold.fulcio.forceNamespace | string | "fulcio-system" |
|
scaffold.fulcio.namespace.create | bool | false |
|
scaffold.fulcio.namespace.name | string | "fulcio-system" |
|
scaffold.fulcio.server.fullnameOverride | string | "fulcio-server" |
|
scaffold.fulcio.server.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.fulcio.server.image.registry | string | "quay.io" |
|
scaffold.fulcio.server.image.repository | string | "redhat-user-workloads/rhtas-tenant/fulcio/fulcio-server" |
|
scaffold.fulcio.server.image.version | string | "sha256:14a8cb8baf1868d3c82ff3c0037579599007b3bee6ac21906420143d55ac5561" |
|
scaffold.fulcio.server.ingress.http.annotations."route.openshift.io/termination" | string | "edge" |
|
scaffold.fulcio.server.ingress.http.className | string | "" |
|
scaffold.fulcio.server.ingress.http.enabled | bool | true |
|
scaffold.fulcio.server.ingress.http.hosts[0].host | string | "fulcio.appsSubdomain" |
|
scaffold.fulcio.server.ingress.http.hosts[0].path | string | "/" |
|
scaffold.fulcio.server.secret | string | "fulcio-secret-rh" |
|
scaffold.rekor.createtree.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.rekor.createtree.image.registry | string | "quay.io" |
|
scaffold.rekor.createtree.image.repository | string | "redhat-user-workloads/rhtas-tenant/scaffold/trillian-createtree" |
|
scaffold.rekor.createtree.image.version | string | "sha256:9c8c8d3e37c270d4f61abf35cae8c0e264e9ab94caffe989cd1eeaa8d00b6529" |
|
scaffold.rekor.enabled | bool | true |
|
scaffold.rekor.forceNamespace | string | "rekor-system" |
|
scaffold.rekor.fullnameOverride | string | "rekor" |
|
scaffold.rekor.initContainerImage.curl.imagePullPolicy | string | "IfNotPresent" |
|
scaffold.rekor.initContainerImage.curl.registry | string | "registry.access.redhat.com" |
|
scaffold.rekor.initContainerImage.curl.repository | string | "ubi9/ubi-minimal" |
|
scaffold.rekor.initContainerImage.curl.version | string | "sha256:06d06f15f7b641a78f2512c8817cbecaa1bf549488e273f5ac27ff1654ed33f0" |
|
scaffold.rekor.namespace.create | bool | false |
|
scaffold.rekor.namespace.name | string | "rekor-system" |
|
scaffold.rekor.redis.args[0] | string | "/usr/bin/run-redis" |
|
scaffold.rekor.redis.args[1] | string | "--bind" |
|
scaffold.rekor.redis.args[2] | string | "0.0.0.0" |
|
scaffold.rekor.redis.args[3] | string | "--appendonly" |
|
scaffold.rekor.redis.args[4] | string | "yes" |
|
scaffold.rekor.redis.fullnameOverride | string | "rekor-redis" |
|
scaffold.rekor.redis.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.rekor.redis.image.registry | string | "quay.io" |
|
scaffold.rekor.redis.image.repository | string | "redhat-user-workloads/rhtas-tenant/trillian/redis" |
|
scaffold.rekor.redis.image.version | string | "sha256:a39b745eb2878191d82ff002b61e4fb0a4004a416751d5fd62eabc72e8b81647" |
|
scaffold.rekor.server.fullnameOverride | string | "rekor-server" |
|
scaffold.rekor.server.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.rekor.server.image.registry | string | "quay.io" |
|
scaffold.rekor.server.image.repository | string | "redhat-user-workloads/rhtas-tenant/rekor/rekor-server" |
|
scaffold.rekor.server.image.version | string | "sha256:e4a5dd78a96686ba66b5723dc3516a2f2b717162aabff42a969dece606ca43c9" |
|
scaffold.rekor.server.ingress.annotations."route.openshift.io/termination" | string | "edge" |
|
scaffold.rekor.server.ingress.className | string | "" |
|
scaffold.rekor.server.ingress.hosts[0].host | string | "rekor.appsSubdomain" |
|
scaffold.rekor.server.ingress.hosts[0].path | string | "/" |
|
scaffold.rekor.server.signer | string | "/key/private" |
|
scaffold.rekor.server.signerFileSecretOptions.privateKeySecretKey | string | "private" |
|
scaffold.rekor.server.signerFileSecretOptions.secretMountPath | string | "/key" |
|
scaffold.rekor.server.signerFileSecretOptions.secretMountSubPath | string | "private" |
|
scaffold.rekor.server.signerFileSecretOptions.secretName | string | "rekor-private-key" |
|
scaffold.rekor.trillian.enabled | bool | false |
|
scaffold.trillian.createdb.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.trillian.createdb.image.registry | string | "quay.io" |
|
scaffold.trillian.createdb.image.repository | string | "redhat-user-workloads/rhtas-tenant/scaffold/trillian-createdb" |
|
scaffold.trillian.createdb.image.version | string | "sha256:2fc6e590399e316d0f63a556162c1f7bde5f13864116ae05f5189f1d6ff03e6f" |
|
scaffold.trillian.enabled | bool | true |
|
scaffold.trillian.forceNamespace | string | "trillian-system" |
|
scaffold.trillian.fullnameOverride | string | "trillian" |
|
scaffold.trillian.initContainerImage.curl.imagePullPolicy | string | "IfNotPresent" |
|
scaffold.trillian.initContainerImage.curl.registry | string | "registry.access.redhat.com" |
|
scaffold.trillian.initContainerImage.curl.repository | string | "ubi9/ubi-minimal" |
|
scaffold.trillian.initContainerImage.curl.version | string | "latest" |
|
scaffold.trillian.initContainerImage.netcat.registry | string | "registry.redhat.io" |
|
scaffold.trillian.initContainerImage.netcat.repository | string | "openshift4/ose-tools-rhel8" |
|
scaffold.trillian.initContainerImage.netcat.version | string | "sha256:486b4d2dd0d10c5ef0212714c94334e04fe8a3d36cf619881986201a50f123c7" |
|
scaffold.trillian.logServer.fullnameOverride | string | "trillian-logserver" |
|
scaffold.trillian.logServer.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.trillian.logServer.image.registry | string | "quay.io" |
|
scaffold.trillian.logServer.image.repository | string | "redhat-user-workloads/rhtas-tenant/trillian/logserver" |
|
scaffold.trillian.logServer.image.version | string | "sha256:bd457ba83dddf9c5a278e9c18ddf21f5ba11834590635fc197c25a4f98dc9afe" |
|
scaffold.trillian.logServer.name | string | "trillian-logserver" |
|
scaffold.trillian.logServer.portHTTP | int | 8090 |
|
scaffold.trillian.logServer.portRPC | int | 8091 |
|
scaffold.trillian.logSigner.fullnameOverride | string | "trillian-logsigner" |
|
scaffold.trillian.logSigner.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.trillian.logSigner.image.registry | string | "quay.io" |
|
scaffold.trillian.logSigner.image.repository | string | "redhat-user-workloads/rhtas-tenant/trillian/logsigner" |
|
scaffold.trillian.logSigner.image.version | string | "sha256:0f55a1065bdeca25bee583c4b3666795a749d43b6a490b0f77c5b9913d55bb2d" |
|
scaffold.trillian.logSigner.name | string | "trillian-logsigner" |
|
scaffold.trillian.mysql.args | list | [] |
|
scaffold.trillian.mysql.fullnameOverride | string | "trillian-mysql" |
|
scaffold.trillian.mysql.gcp.scaffoldSQLProxy.registry | string | "registry.redhat.io" |
|
scaffold.trillian.mysql.gcp.scaffoldSQLProxy.repository | string | "rhtas-tech-preview/cloudsqlproxy-rhel9" |
|
scaffold.trillian.mysql.gcp.scaffoldSQLProxy.version | string | "sha256:f6879364d41b2adbe339c6de1dae5d17be575ea274786895448ee4277831cb7f" |
|
scaffold.trillian.mysql.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.trillian.mysql.image.registry | string | "quay.io" |
|
scaffold.trillian.mysql.image.repository | string | "redhat-user-workloads/rhtas-tenant/trillian/database" |
|
scaffold.trillian.mysql.image.version | string | "sha256:995a05b679ac0953514f3744fa8b19f24bedccfadf5a32813e678cea175d3e88" |
|
scaffold.trillian.mysql.livenessProbe.exec.command[0] | string | "mysqladmin" |
|
scaffold.trillian.mysql.livenessProbe.exec.command[1] | string | "ping" |
|
scaffold.trillian.mysql.livenessProbe.exec.command[2] | string | "-h" |
|
scaffold.trillian.mysql.livenessProbe.exec.command[3] | string | "localhost" |
|
scaffold.trillian.mysql.livenessProbe.exec.command[4] | string | "-u" |
|
scaffold.trillian.mysql.livenessProbe.exec.command[5] | string | "$(MYSQL_USER)" |
|
scaffold.trillian.mysql.livenessProbe.exec.command[6] | string | "-p$(MYSQL_PASSWORD)" |
|
scaffold.trillian.mysql.readinessProbe.exec.command[0] | string | "mysqladmin" |
|
scaffold.trillian.mysql.readinessProbe.exec.command[1] | string | "ping" |
|
scaffold.trillian.mysql.readinessProbe.exec.command[2] | string | "-h" |
|
scaffold.trillian.mysql.readinessProbe.exec.command[3] | string | "localhost" |
|
scaffold.trillian.mysql.readinessProbe.exec.command[4] | string | "-u" |
|
scaffold.trillian.mysql.readinessProbe.exec.command[5] | string | "$(MYSQL_USER)" |
|
scaffold.trillian.mysql.readinessProbe.exec.command[6] | string | "-p$(MYSQL_PASSWORD)" |
|
scaffold.trillian.mysql.securityContext.fsGroup | int | 0 |
|
scaffold.trillian.namespace.create | bool | false |
|
scaffold.trillian.namespace.name | string | "trillian-system" |
|
scaffold.trillian.redis.args | list | [] |
|
scaffold.trillian.redis.image.pullPolicy | string | "IfNotPresent" |
|
scaffold.trillian.redis.image.registry | string | "quay.io" |
|
scaffold.trillian.redis.image.repository | string | "redhat-user-workloads/rhtas-tenant/trillian/redis" |
|
scaffold.trillian.redis.image.version | string | "sha256:a39b745eb2878191d82ff002b61e4fb0a4004a416751d5fd62eabc72e8b81647" |
|
scaffold.tsa.enabled | bool | false |
|
scaffold.tsa.forceNamespace | string | "tsa-system" |
|
scaffold.tsa.namespace.create | bool | false |
|
scaffold.tsa.namespace.name | string | "tsa-system" |
|
scaffold.tsa.server.fullnameOverride | string | "tsa-server" |
|
scaffold.tuf.deployment.registry | string | "quay.io" |
|
scaffold.tuf.deployment.repository | string | "redhat-user-workloads/rhtas-tenant/scaffold/tuf-server" |
|
scaffold.tuf.deployment.version | string | "sha256:fe1fb5ee68635a05c831ac5f596d94869b48d2e3756bc0f4094333de7ca56833" |
|
scaffold.tuf.enabled | bool | true |
|
scaffold.tuf.forceNamespace | string | "tuf-system" |
|
scaffold.tuf.fullnameOverride | string | "tuf" |
|
scaffold.tuf.ingress.annotations."route.openshift.io/termination" | string | "edge" |
|
scaffold.tuf.ingress.className | string | "" |
|
scaffold.tuf.ingress.http.hosts[0].host | string | "tuf.appsSubdomain" |
|
scaffold.tuf.ingress.http.hosts[0].path | string | "/" |
|
scaffold.tuf.namespace.create | bool | false |
|
scaffold.tuf.namespace.name | string | "tuf-system" |
|
scaffold.tuf.secrets.ctlog.name | string | "ctlog-public-key" |
|
scaffold.tuf.secrets.ctlog.path | string | "ctfe.pub" |
|
scaffold.tuf.secrets.fulcio.name | string | "fulcio-secret-rh" |
|
scaffold.tuf.secrets.fulcio.path | string | "fulcio_v1.crt.pem" |
|
scaffold.tuf.secrets.rekor.name | string | "rekor-public-key" |
|
scaffold.tuf.secrets.rekor.path | string | "rekor.pub" |