|
| 1 | +kind: ConfigMap |
| 2 | +apiVersion: v1 |
| 3 | +metadata: |
| 4 | + name: "{{ template "core.fullname" . }}" |
| 5 | + labels: |
| 6 | + app: "{{ template "fullname" . }}" |
| 7 | + chart: "{{ .Chart.Name }}-{{ .Chart.Version }}" |
| 8 | + release: "{{ .Release.Name }}" |
| 9 | + heritage: "{{ .Release.Service }}" |
| 10 | + component: core |
| 11 | +data: |
| 12 | + config.yaml: | |
| 13 | + # Anchore Service Configuration File from ConfigMap |
| 14 | + service_dir: {{ default "/config" .Values.globalConfig.configDir }} |
| 15 | + tmp_dir: "/tmp" |
| 16 | +
|
| 17 | + allow_awsecr_iam_auto: {{ .Values.globalConfig.allowECRUseIAMRole }} |
| 18 | + cleanup_images: {{ .Values.globalConfig.cleanupImages }} |
| 19 | +
|
| 20 | + # docker_conn: 'unix://var/run/docker.sock' |
| 21 | + # docker_conn_timeout: 600 |
| 22 | +
|
| 23 | + log_level: {{ .Values.coreConfig.logLevel }} |
| 24 | + host_id: ${ANCHORE_HOST_ID} |
| 25 | + internal_ssl_verify: {{ .Values.globalConfig.internalServicesSslVerifyCerts }} |
| 26 | +
|
| 27 | + # Uncomment if you have a local endpoint that can accept |
| 28 | + # notifications from the anchore-engine, as configured below |
| 29 | + # |
| 30 | + {{ if .Values.coreConfig.webhooks.enabled }} |
| 31 | + webhooks: |
| 32 | +{{ toYaml .Values.coreConfig.webhooks.config | indent 6 }} |
| 33 | + {{ end }} |
| 34 | + |
| 35 | + # A feeds section is available for override, but shouldn't be |
| 36 | + # needed. By default, the 'admin' credentials are used if present, |
| 37 | + # otherwise anonymous access for feed sync is used |
| 38 | + |
| 39 | + #feeds: |
| 40 | + # selective_sync: |
| 41 | + # # If enabled only sync specific feeds instead of all. |
| 42 | + # enabled: True |
| 43 | + # feeds: |
| 44 | + # vulnerabilities: True |
| 45 | + # # Warning: enabling the package sync causes the service to require much |
| 46 | + # # more memory to do process the significant data volume. We recommend at least 4GB available for the container |
| 47 | + # packages: False |
| 48 | + # anonymous_user_username: anon@ancho.re |
| 49 | + # anonymous_user_password: pbiU2RYZ2XrmYQ |
| 50 | + # url: 'https://ancho.re/v1/service/feeds' |
| 51 | + # client_url: 'https://ancho.re/v1/account/users' |
| 52 | + # token_url: 'https://ancho.re/oauth/token' |
| 53 | + # connection_timeout_seconds: 3 |
| 54 | + # read_timeout_seconds: 60 |
| 55 | + |
| 56 | + credentials: |
| 57 | + users: |
| 58 | + admin: |
| 59 | + password: ${ANCHORE_ADMIN_PASSWORD} |
| 60 | + email: {{ .Values.globalConfig.users.admin.email }} |
| 61 | + external_service_auths: |
| 62 | + {{ if not .Values.globalConfig.users.admin.anchoreIOCredentials.useAnonymous }} |
| 63 | + anchoreio: |
| 64 | + anchorecli: |
| 65 | + auth: "${ANCHORE_IO_USER}:${ANCHORE_IO_PASSWORD}" |
| 66 | + {{ end }} |
| 67 | + auto_policy_sync: {{ .Values.coreConfig.policyBundleSyncEnabled }} |
| 68 | + |
| 69 | + database: |
| 70 | + {{ if .Values.postgresql.enabled }} |
| 71 | + db_connect: 'postgresql+pg8000://${ANCHORE_DB_USER}:${ANCHORE_DB_PASSWORD}@{{ template "postgres.fullname" . }}:5432/{{ .Values.postgresql.postgresDatabase }}' |
| 72 | + {{ else }} |
| 73 | + db_connect: 'postgresql+pg8000://${ANCHORE_DB_USER}:${ANCHORE_DB_PASSWORD}@{{ .Values.postgresql.externalEndpoint}}/{{ .Values.postgresql.postgresDatabase }}' |
| 74 | + {{ end }} |
| 75 | + db_connect_args: |
| 76 | + timeout: 120 |
| 77 | + ssl: {{ .Values.postgresql.sslEnabled }} |
| 78 | + db_pool_size: {{ .Values.globalConfig.dbConfig.connectionPoolSize }} |
| 79 | + db_pool_max_overflow: {{ .Values.globalConfig.dbConfig.connectionPoolSize }} |
| 80 | + services: |
| 81 | + apiext: |
| 82 | + enabled: True |
| 83 | + require_auth: True |
| 84 | + endpoint_hostname: {{ template "fullname" . }} |
| 85 | + listen: '0.0.0.0' |
| 86 | + port: {{ .Values.service.ports.api }} |
| 87 | + ssl_enable: {{ .Values.globalConfig.internalServicesSslEnabled }} |
| 88 | + ssl_cert: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretCertName }} |
| 89 | + ssl_key: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretKeyName }} |
| 90 | + kubernetes_webhook: |
| 91 | + enabled: True |
| 92 | + require_auth: False |
| 93 | + endpoint_hostname: {{ template "fullname" . }} |
| 94 | + listen: '0.0.0.0' |
| 95 | + port: {{ .Values.service.ports.k8sImagePolicyWebhook }} |
| 96 | + ssl_enable: {{ .Values.globalConfig.internalServicesSslEnabled }} |
| 97 | + ssl_cert: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretCertName }} |
| 98 | + ssl_key: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretKeyName }} |
| 99 | + catalog: |
| 100 | + enabled: True |
| 101 | + require_auth: True |
| 102 | + endpoint_hostname: {{ template "fullname" . }} |
| 103 | + listen: '0.0.0.0' |
| 104 | + port: {{ .Values.service.ports.catalog }} |
| 105 | + use_db: True |
| 106 | + cycle_timer_seconds: '1' |
| 107 | + cycle_timers: |
| 108 | +{{ toYaml .Values.globalConfig.cycleTimers | indent 10 }} |
| 109 | + ssl_enable: {{ .Values.globalConfig.internalServicesSslEnabled }} |
| 110 | + ssl_cert: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretCertName }} |
| 111 | + ssl_key: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretKeyName }} |
| 112 | + simplequeue: |
| 113 | + enabled: True |
| 114 | + require_auth: True |
| 115 | + endpoint_hostname: {{ template "fullname" . }} |
| 116 | + listen: '0.0.0.0' |
| 117 | + port: {{ .Values.service.ports.queue }} |
| 118 | + ssl_enable: {{ .Values.globalConfig.internalServicesSslEnabled }} |
| 119 | + ssl_cert: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretCertName }} |
| 120 | + ssl_key: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretKeyName }} |
| 121 | + analyzer: |
| 122 | + enabled: False |
| 123 | + policy_engine: |
| 124 | + enabled: True |
| 125 | + require_auth: True |
| 126 | + endpoint_hostname: {{ template "fullname" . }} |
| 127 | + listen: '0.0.0.0' |
| 128 | + port: {{ .Values.service.ports.policy }} |
| 129 | + ssl_cert: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretCertName }} |
| 130 | + ssl_key: {{ .Values.coreConfig.ssl.certDir -}}/{{- .Values.coreConfig.ssl.certSecretKeyName }} |
| 131 | + ssl_enable: {{ .Values.globalConfig.internalServicesSslEnabled }} |
0 commit comments