|
@@ -132,6 +132,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `ingress.core.extraPaths` | An array with additional arbitrary paths that may need to be added to the ingress under the main host | `[]` |
|
|
|
| `ingress.core.extraTls` | TLS configuration for additional hostname(s) to be covered with this ingress record | `[]` |
|
|
|
| `ingress.core.secrets` | Custom TLS certificates as secrets | `[]` |
|
|
|
+| `ingress.core.extraRules` | Additional rules to be covered with this ingress record | `[]` |
|
|
|
| `ingress.notary.ingressClassName` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) | `""` |
|
|
|
| `ingress.notary.pathType` | Ingress path type | `ImplementationSpecific` |
|
|
|
| `ingress.notary.apiVersion` | Force Ingress API version (automatically detected if not set) | `""` |
|
|
@@ -144,6 +145,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `ingress.notary.extraPaths` | An array with additional arbitrary paths that may need to be added to the ingress under the main host | `[]` |
|
|
|
| `ingress.notary.extraTls` | TLS configuration for additional hostname(s) to be covered with this ingress record | `[]` |
|
|
|
| `ingress.notary.secrets` | Custom TLS certificates as secrets | `[]` |
|
|
|
+| `ingress.notary.extraRules` | Additional rules to be covered with this ingress record | `[]` |
|
|
|
|
|
|
|
|
|
### Persistence Parameters
|
|
@@ -245,7 +247,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `volumePermissions.enabled` | Enable init container that changes the owner and group of the persistent volume | `false` |
|
|
|
| `volumePermissions.image.registry` | Init container volume-permissions image registry | `docker.io` |
|
|
|
| `volumePermissions.image.repository` | Init container volume-permissions image repository | `bitnami/bitnami-shell` |
|
|
|
-| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `10-debian-10-r411` |
|
|
|
+| `volumePermissions.image.tag` | Init container volume-permissions image tag (immutable tags are recommended) | `10-debian-10-r424` |
|
|
|
| `volumePermissions.image.pullPolicy` | Init container volume-permissions image pull policy | `IfNotPresent` |
|
|
|
| `volumePermissions.image.pullSecrets` | Init container volume-permissions image pull secrets | `[]` |
|
|
|
| `volumePermissions.resources.limits` | Init container volume-permissions resource limits | `{}` |
|
|
@@ -256,75 +258,75 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
|
|
|
### NGINX Parameters
|
|
|
|
|
|
-| Name | Description | Value |
|
|
|
-| --------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | ---------------------- |
|
|
|
-| `nginx.image.registry` | NGINX image registry | `docker.io` |
|
|
|
-| `nginx.image.repository` | NGINX image repository | `bitnami/nginx` |
|
|
|
-| `nginx.image.tag` | NGINX image tag (immutable tags are recommended) | `1.21.6-debian-10-r93` |
|
|
|
-| `nginx.image.pullPolicy` | NGINX image pull policy | `IfNotPresent` |
|
|
|
-| `nginx.image.pullSecrets` | NGINX image pull secrets | `[]` |
|
|
|
-| `nginx.image.debug` | Enable NGINX image debug mode | `false` |
|
|
|
-| `nginx.tls.enabled` | Enable TLS termination | `true` |
|
|
|
-| `nginx.tls.existingSecret` | Existing secret name containing your own TLS certificates. | `""` |
|
|
|
-| `nginx.tls.commonName` | The common name used to generate the self-signed TLS certificates | `core.harbor.domain` |
|
|
|
-| `nginx.behindReverseProxy` | If NGINX is behind another reverse proxy, set to true | `false` |
|
|
|
-| `nginx.command` | Override default container command (useful when using custom images) | `[]` |
|
|
|
-| `nginx.args` | Override default container args (useful when using custom images) | `[]` |
|
|
|
-| `nginx.extraEnvVars` | Array with extra environment variables to add NGINX pods | `[]` |
|
|
|
-| `nginx.extraEnvVarsCM` | ConfigMap containing extra environment variables for NGINX pods | `""` |
|
|
|
-| `nginx.extraEnvVarsSecret` | Secret containing extra environment variables (in case of sensitive data) for NGINX pods | `""` |
|
|
|
-| `nginx.containerPorts.http` | NGINX HTTP container port | `8080` |
|
|
|
-| `nginx.containerPorts.https` | NGINX HTTPS container port | `8443` |
|
|
|
-| `nginx.containerPorts.notary` | NGINX container port where Notary svc is exposed | `4443` |
|
|
|
-| `nginx.replicaCount` | Number of NGINX replicas | `1` |
|
|
|
-| `nginx.livenessProbe.enabled` | Enable livenessProbe on NGINX containers | `true` |
|
|
|
-| `nginx.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `20` |
|
|
|
-| `nginx.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
|
|
|
-| `nginx.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` |
|
|
|
-| `nginx.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` |
|
|
|
-| `nginx.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
|
|
|
-| `nginx.readinessProbe.enabled` | Enable readinessProbe on NGINX containers | `true` |
|
|
|
-| `nginx.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `20` |
|
|
|
-| `nginx.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
|
|
|
-| `nginx.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` |
|
|
|
-| `nginx.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` |
|
|
|
-| `nginx.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
|
|
|
-| `nginx.startupProbe.enabled` | Enable startupProbe on NGINX containers | `false` |
|
|
|
-| `nginx.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` |
|
|
|
-| `nginx.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
|
|
|
-| `nginx.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` |
|
|
|
-| `nginx.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` |
|
|
|
-| `nginx.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
|
|
|
-| `nginx.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
|
|
-| `nginx.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
|
|
-| `nginx.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
|
|
-| `nginx.resources.limits` | The resources limits for the NGINX containers | `{}` |
|
|
|
-| `nginx.resources.requests` | The requested resources for the NGINX containers | `{}` |
|
|
|
-| `nginx.podSecurityContext.enabled` | Enabled NGINX pods' Security Context | `true` |
|
|
|
-| `nginx.podSecurityContext.fsGroup` | Set NGINX pod's Security Context fsGroup | `1001` |
|
|
|
-| `nginx.containerSecurityContext.enabled` | Enabled NGINX containers' Security Context | `true` |
|
|
|
-| `nginx.containerSecurityContext.runAsUser` | Set NGINX containers' Security Context runAsUser | `1001` |
|
|
|
-| `nginx.containerSecurityContext.runAsNonRoot` | Set NGINX containers' Security Context runAsNonRoot | `true` |
|
|
|
-| `nginx.updateStrategy.type` | NGINX deployment strategy type - only really applicable for deployments with RWO PVs attached | `RollingUpdate` |
|
|
|
-| `nginx.lifecycleHooks` | LifecycleHook for the NGINX container(s) to automate configuration before or after startup | `{}` |
|
|
|
-| `nginx.hostAliases` | NGINX pods host aliases | `[]` |
|
|
|
-| `nginx.podLabels` | Add additional labels to the NGINX pods (evaluated as a template) | `{}` |
|
|
|
-| `nginx.podAnnotations` | Annotations to add to the NGINX pods (evaluated as a template) | `{}` |
|
|
|
-| `nginx.podAffinityPreset` | NGINX Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
|
|
-| `nginx.podAntiAffinityPreset` | NGINX Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
|
|
-| `nginx.nodeAffinityPreset.type` | NGINX Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
|
|
-| `nginx.nodeAffinityPreset.key` | NGINX Node label key to match Ignored if `affinity` is set. | `""` |
|
|
|
-| `nginx.nodeAffinityPreset.values` | NGINX Node label values to match. Ignored if `affinity` is set. | `[]` |
|
|
|
-| `nginx.affinity` | NGINX Affinity for pod assignment | `{}` |
|
|
|
-| `nginx.nodeSelector` | NGINX Node labels for pod assignment | `{}` |
|
|
|
-| `nginx.tolerations` | NGINX Tolerations for pod assignment | `[]` |
|
|
|
-| `nginx.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `{}` |
|
|
|
-| `nginx.priorityClassName` | Priority Class Name | `""` |
|
|
|
-| `nginx.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` |
|
|
|
-| `nginx.sidecars` | Add additional sidecar containers to the NGINX pods | `[]` |
|
|
|
-| `nginx.initContainers` | Add additional init containers to the NGINX pods | `[]` |
|
|
|
-| `nginx.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the NGINX pods | `[]` |
|
|
|
-| `nginx.extraVolumes` | Optionally specify extra list of additional volumes for the NGINX pods | `[]` |
|
|
|
+| Name | Description | Value |
|
|
|
+| --------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | ----------------------- |
|
|
|
+| `nginx.image.registry` | NGINX image registry | `docker.io` |
|
|
|
+| `nginx.image.repository` | NGINX image repository | `bitnami/nginx` |
|
|
|
+| `nginx.image.tag` | NGINX image tag (immutable tags are recommended) | `1.21.6-debian-10-r107` |
|
|
|
+| `nginx.image.pullPolicy` | NGINX image pull policy | `IfNotPresent` |
|
|
|
+| `nginx.image.pullSecrets` | NGINX image pull secrets | `[]` |
|
|
|
+| `nginx.image.debug` | Enable NGINX image debug mode | `false` |
|
|
|
+| `nginx.tls.enabled` | Enable TLS termination | `true` |
|
|
|
+| `nginx.tls.existingSecret` | Existing secret name containing your own TLS certificates. | `""` |
|
|
|
+| `nginx.tls.commonName` | The common name used to generate the self-signed TLS certificates | `core.harbor.domain` |
|
|
|
+| `nginx.behindReverseProxy` | If NGINX is behind another reverse proxy, set to true | `false` |
|
|
|
+| `nginx.command` | Override default container command (useful when using custom images) | `[]` |
|
|
|
+| `nginx.args` | Override default container args (useful when using custom images) | `[]` |
|
|
|
+| `nginx.extraEnvVars` | Array with extra environment variables to add NGINX pods | `[]` |
|
|
|
+| `nginx.extraEnvVarsCM` | ConfigMap containing extra environment variables for NGINX pods | `""` |
|
|
|
+| `nginx.extraEnvVarsSecret` | Secret containing extra environment variables (in case of sensitive data) for NGINX pods | `""` |
|
|
|
+| `nginx.containerPorts.http` | NGINX HTTP container port | `8080` |
|
|
|
+| `nginx.containerPorts.https` | NGINX HTTPS container port | `8443` |
|
|
|
+| `nginx.containerPorts.notary` | NGINX container port where Notary svc is exposed | `4443` |
|
|
|
+| `nginx.replicaCount` | Number of NGINX replicas | `1` |
|
|
|
+| `nginx.livenessProbe.enabled` | Enable livenessProbe on NGINX containers | `true` |
|
|
|
+| `nginx.livenessProbe.initialDelaySeconds` | Initial delay seconds for livenessProbe | `20` |
|
|
|
+| `nginx.livenessProbe.periodSeconds` | Period seconds for livenessProbe | `10` |
|
|
|
+| `nginx.livenessProbe.timeoutSeconds` | Timeout seconds for livenessProbe | `5` |
|
|
|
+| `nginx.livenessProbe.failureThreshold` | Failure threshold for livenessProbe | `6` |
|
|
|
+| `nginx.livenessProbe.successThreshold` | Success threshold for livenessProbe | `1` |
|
|
|
+| `nginx.readinessProbe.enabled` | Enable readinessProbe on NGINX containers | `true` |
|
|
|
+| `nginx.readinessProbe.initialDelaySeconds` | Initial delay seconds for readinessProbe | `20` |
|
|
|
+| `nginx.readinessProbe.periodSeconds` | Period seconds for readinessProbe | `10` |
|
|
|
+| `nginx.readinessProbe.timeoutSeconds` | Timeout seconds for readinessProbe | `5` |
|
|
|
+| `nginx.readinessProbe.failureThreshold` | Failure threshold for readinessProbe | `6` |
|
|
|
+| `nginx.readinessProbe.successThreshold` | Success threshold for readinessProbe | `1` |
|
|
|
+| `nginx.startupProbe.enabled` | Enable startupProbe on NGINX containers | `false` |
|
|
|
+| `nginx.startupProbe.initialDelaySeconds` | Initial delay seconds for startupProbe | `10` |
|
|
|
+| `nginx.startupProbe.periodSeconds` | Period seconds for startupProbe | `10` |
|
|
|
+| `nginx.startupProbe.timeoutSeconds` | Timeout seconds for startupProbe | `1` |
|
|
|
+| `nginx.startupProbe.failureThreshold` | Failure threshold for startupProbe | `15` |
|
|
|
+| `nginx.startupProbe.successThreshold` | Success threshold for startupProbe | `1` |
|
|
|
+| `nginx.customLivenessProbe` | Custom livenessProbe that overrides the default one | `{}` |
|
|
|
+| `nginx.customReadinessProbe` | Custom readinessProbe that overrides the default one | `{}` |
|
|
|
+| `nginx.customStartupProbe` | Custom startupProbe that overrides the default one | `{}` |
|
|
|
+| `nginx.resources.limits` | The resources limits for the NGINX containers | `{}` |
|
|
|
+| `nginx.resources.requests` | The requested resources for the NGINX containers | `{}` |
|
|
|
+| `nginx.podSecurityContext.enabled` | Enabled NGINX pods' Security Context | `true` |
|
|
|
+| `nginx.podSecurityContext.fsGroup` | Set NGINX pod's Security Context fsGroup | `1001` |
|
|
|
+| `nginx.containerSecurityContext.enabled` | Enabled NGINX containers' Security Context | `true` |
|
|
|
+| `nginx.containerSecurityContext.runAsUser` | Set NGINX containers' Security Context runAsUser | `1001` |
|
|
|
+| `nginx.containerSecurityContext.runAsNonRoot` | Set NGINX containers' Security Context runAsNonRoot | `true` |
|
|
|
+| `nginx.updateStrategy.type` | NGINX deployment strategy type - only really applicable for deployments with RWO PVs attached | `RollingUpdate` |
|
|
|
+| `nginx.lifecycleHooks` | LifecycleHook for the NGINX container(s) to automate configuration before or after startup | `{}` |
|
|
|
+| `nginx.hostAliases` | NGINX pods host aliases | `[]` |
|
|
|
+| `nginx.podLabels` | Add additional labels to the NGINX pods (evaluated as a template) | `{}` |
|
|
|
+| `nginx.podAnnotations` | Annotations to add to the NGINX pods (evaluated as a template) | `{}` |
|
|
|
+| `nginx.podAffinityPreset` | NGINX Pod affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
|
|
+| `nginx.podAntiAffinityPreset` | NGINX Pod anti-affinity preset. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `soft` |
|
|
|
+| `nginx.nodeAffinityPreset.type` | NGINX Node affinity preset type. Ignored if `affinity` is set. Allowed values: `soft` or `hard` | `""` |
|
|
|
+| `nginx.nodeAffinityPreset.key` | NGINX Node label key to match Ignored if `affinity` is set. | `""` |
|
|
|
+| `nginx.nodeAffinityPreset.values` | NGINX Node label values to match. Ignored if `affinity` is set. | `[]` |
|
|
|
+| `nginx.affinity` | NGINX Affinity for pod assignment | `{}` |
|
|
|
+| `nginx.nodeSelector` | NGINX Node labels for pod assignment | `{}` |
|
|
|
+| `nginx.tolerations` | NGINX Tolerations for pod assignment | `[]` |
|
|
|
+| `nginx.topologySpreadConstraints` | Topology Spread Constraints for pod assignment spread across your cluster among failure-domains. Evaluated as a template | `{}` |
|
|
|
+| `nginx.priorityClassName` | Priority Class Name | `""` |
|
|
|
+| `nginx.schedulerName` | Use an alternate scheduler, e.g. "stork". | `""` |
|
|
|
+| `nginx.sidecars` | Add additional sidecar containers to the NGINX pods | `[]` |
|
|
|
+| `nginx.initContainers` | Add additional init containers to the NGINX pods | `[]` |
|
|
|
+| `nginx.extraVolumeMounts` | Optionally specify extra list of additional volumeMounts for the NGINX pods | `[]` |
|
|
|
+| `nginx.extraVolumes` | Optionally specify extra list of additional volumes for the NGINX pods | `[]` |
|
|
|
|
|
|
|
|
|
### Harbor Portal Parameters
|
|
@@ -333,7 +335,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | ----------------------- |
|
|
|
| `portal.image.registry` | Harbor Portal image registry | `docker.io` |
|
|
|
| `portal.image.repository` | Harbor Portal image repository | `bitnami/harbor-portal` |
|
|
|
-| `portal.image.tag` | Harbor Portal image tag (immutable tags are recommended) | `2.5.0-debian-10-r21` |
|
|
|
+| `portal.image.tag` | Harbor Portal image tag (immutable tags are recommended) | `2.5.0-debian-10-r33` |
|
|
|
| `portal.image.pullPolicy` | Harbor Portal image pull policy | `IfNotPresent` |
|
|
|
| `portal.image.pullSecrets` | Harbor Portal image pull secrets | `[]` |
|
|
|
| `portal.image.debug` | Enable Harbor Portal image debug mode | `false` |
|
|
@@ -405,7 +407,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| -------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | --------------------- |
|
|
|
| `core.image.registry` | Harbor Core image registry | `docker.io` |
|
|
|
| `core.image.repository` | Harbor Core image repository | `bitnami/harbor-core` |
|
|
|
-| `core.image.tag` | Harbor Core image tag (immutable tags are recommended) | `2.5.0-debian-10-r19` |
|
|
|
+| `core.image.tag` | Harbor Core image tag (immutable tags are recommended) | `2.5.0-debian-10-r34` |
|
|
|
| `core.image.pullPolicy` | Harbor Core image pull policy | `IfNotPresent` |
|
|
|
| `core.image.pullSecrets` | Harbor Core image pull secrets | `[]` |
|
|
|
| `core.image.debug` | Enable Harbor Core image debug mode | `false` |
|
|
@@ -487,7 +489,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| -------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------ | ------------------------------ |
|
|
|
| `jobservice.image.registry` | Harbor Jobservice image registry | `docker.io` |
|
|
|
| `jobservice.image.repository` | Harbor Jobservice image repository | `bitnami/harbor-jobservice` |
|
|
|
-| `jobservice.image.tag` | Harbor Jobservice image tag (immutable tags are recommended) | `2.5.0-debian-10-r11` |
|
|
|
+| `jobservice.image.tag` | Harbor Jobservice image tag (immutable tags are recommended) | `2.5.0-debian-10-r24` |
|
|
|
| `jobservice.image.pullPolicy` | Harbor Jobservice image pull policy | `IfNotPresent` |
|
|
|
| `jobservice.image.pullSecrets` | Harbor Jobservice image pull secrets | `[]` |
|
|
|
| `jobservice.image.debug` | Enable Harbor Jobservice image debug mode | `false` |
|
|
@@ -600,7 +602,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `registry.automountServiceAccountToken` | Automount service account token | `false` |
|
|
|
| `registry.server.image.registry` | Harbor Registry image registry | `docker.io` |
|
|
|
| `registry.server.image.repository` | Harbor Registry image repository | `bitnami/harbor-registry` |
|
|
|
-| `registry.server.image.tag` | Harbor Registry image tag (immutable tags are recommended) | `2.5.0-debian-10-r19` |
|
|
|
+| `registry.server.image.tag` | Harbor Registry image tag (immutable tags are recommended) | `2.5.0-debian-10-r32` |
|
|
|
| `registry.server.image.pullPolicy` | Harbor Registry image pull policy | `IfNotPresent` |
|
|
|
| `registry.server.image.pullSecrets` | Harbor Registry image pull secrets | `[]` |
|
|
|
| `registry.server.image.debug` | Enable Harbor Registry image debug mode | `false` |
|
|
@@ -646,7 +648,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `registry.server.service.ports.metrics` | Harbor Registry metrics service port | `8001` |
|
|
|
| `registry.controller.image.registry` | Harbor Registryctl image registry | `docker.io` |
|
|
|
| `registry.controller.image.repository` | Harbor Registryctl image repository | `bitnami/harbor-registryctl` |
|
|
|
-| `registry.controller.image.tag` | Harbor Registryctl image tag (immutable tags are recommended) | `2.5.0-debian-10-r19` |
|
|
|
+| `registry.controller.image.tag` | Harbor Registryctl image tag (immutable tags are recommended) | `2.5.0-debian-10-r32` |
|
|
|
| `registry.controller.image.pullPolicy` | Harbor Registryctl image pull policy | `IfNotPresent` |
|
|
|
| `registry.controller.image.pullSecrets` | Harbor Registryctl image pull secrets | `[]` |
|
|
|
| `registry.controller.image.debug` | Enable Harbor Registryctl image debug mode | `false` |
|
|
@@ -695,7 +697,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| --------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | ---------------------- |
|
|
|
| `chartmuseum.image.registry` | ChartMuseum image registry | `docker.io` |
|
|
|
| `chartmuseum.image.repository` | ChartMuseum image repository | `bitnami/chartmuseum` |
|
|
|
-| `chartmuseum.image.tag` | ChartMuseum image tag (immutable tags are recommended) | `0.14.0-debian-10-r86` |
|
|
|
+| `chartmuseum.image.tag` | ChartMuseum image tag (immutable tags are recommended) | `0.14.0-debian-10-r99` |
|
|
|
| `chartmuseum.image.pullPolicy` | ChartMuseum image pull policy | `IfNotPresent` |
|
|
|
| `chartmuseum.image.pullSecrets` | ChartMuseum image pull secrets | `[]` |
|
|
|
| `chartmuseum.image.debug` | Enable ChartMuseum image debug mode | `false` |
|
|
@@ -812,7 +814,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `clair.automountServiceAccountToken` | Automount service account token | `false` |
|
|
|
| `clair.adapter.image.registry` | Harbor Adapter for Clair image registry | `docker.io` |
|
|
|
| `clair.adapter.image.repository` | Harbor Adapter for Clair image repository | `bitnami/harbor-adapter-clair` |
|
|
|
-| `clair.adapter.image.tag` | Harbor Adapter for Clair image tag (immutable tags are recommended) | `2.5.0-debian-10-r18` |
|
|
|
+| `clair.adapter.image.tag` | Harbor Adapter for Clair image tag (immutable tags are recommended) | `2.5.0-debian-10-r31` |
|
|
|
| `clair.adapter.image.pullPolicy` | Harbor Adapter for Clair image pull policy | `IfNotPresent` |
|
|
|
| `clair.adapter.image.pullSecrets` | Harbor Adapter for Clair image pull secrets | `[]` |
|
|
|
| `clair.adapter.image.debug` | Enable Harbor Adapter for Clair image debug mode | `false` |
|
|
@@ -855,7 +857,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `clair.adapter.service.ports.https` | Harbor Adapter for Clair HTTPS service port | `8443` |
|
|
|
| `clair.server.image.registry` | Harbor Clair image registry | `docker.io` |
|
|
|
| `clair.server.image.repository` | Harbor Clair image repository | `bitnami/harbor-clair` |
|
|
|
-| `clair.server.image.tag` | Harbor Clair image tag (immutable tags are recommended) | `2.5.0-debian-10-r19` |
|
|
|
+| `clair.server.image.tag` | Harbor Clair image tag (immutable tags are recommended) | `2.5.0-debian-10-r32` |
|
|
|
| `clair.server.image.pullPolicy` | Harbor Clair image pull policy | `IfNotPresent` |
|
|
|
| `clair.server.image.pullSecrets` | Harbor Clair image pull secrets | `[]` |
|
|
|
| `clair.server.image.debug` | Enable Harbor Clair image debug mode | `false` |
|
|
@@ -906,7 +908,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `notary.secretName` | Fill the name of a kubernetes secret if you want to use your own TLS certificate authority, certificate and private key for notary communications. The secret must contain keys named `notary-signer-ca.crt`, `notary-signer.key` and `notary-signer.crt` that contain the CA, certificate and private key. They will be generated if not set. | `""` |
|
|
|
| `notary.server.image.registry` | Harbor Notary Server image registry | `docker.io` |
|
|
|
| `notary.server.image.repository` | Harbor Notary Server image repository | `bitnami/harbor-notary-server` |
|
|
|
-| `notary.server.image.tag` | Harbor Notary Server image tag (immutable tags are recommended) | `2.5.0-debian-10-r19` |
|
|
|
+| `notary.server.image.tag` | Harbor Notary Server image tag (immutable tags are recommended) | `2.5.0-debian-10-r32` |
|
|
|
| `notary.server.image.pullPolicy` | Harbor Notary Server image pull policy | `IfNotPresent` |
|
|
|
| `notary.server.image.pullSecrets` | Harbor Notary Server image pull secrets | `[]` |
|
|
|
| `notary.server.image.debug` | Enable Harbor Notary Server image debug mode | `false` |
|
|
@@ -968,7 +970,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `notary.server.automountServiceAccountToken` | Automount service account token | `false` |
|
|
|
| `notary.signer.image.registry` | Harbor Notary Signer image registry | `docker.io` |
|
|
|
| `notary.signer.image.repository` | Harbor Notary Signer image repository | `bitnami/harbor-notary-signer` |
|
|
|
-| `notary.signer.image.tag` | Harbor Notary Signer image tag (immutable tags are recommended) | `2.5.0-debian-10-r19` |
|
|
|
+| `notary.signer.image.tag` | Harbor Notary Signer image tag (immutable tags are recommended) | `2.5.0-debian-10-r32` |
|
|
|
| `notary.signer.image.pullPolicy` | Harbor Notary Signer image pull policy | `IfNotPresent` |
|
|
|
| `notary.signer.image.pullSecrets` | Harbor Notary Signer image pull secrets | `[]` |
|
|
|
| `notary.signer.image.debug` | Enable Harbor Notary Signer image debug mode | `false` |
|
|
@@ -1038,7 +1040,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| --------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------ | -------------------------------------- |
|
|
|
| `trivy.image.registry` | Harbor Adapter Trivy image registry | `docker.io` |
|
|
|
| `trivy.image.repository` | Harbor Adapter Trivy image repository | `bitnami/harbor-adapter-trivy` |
|
|
|
-| `trivy.image.tag` | Harbor Adapter Trivy image tag (immutable tags are recommended) | `2.5.0-debian-10-r20` |
|
|
|
+| `trivy.image.tag` | Harbor Adapter Trivy image tag (immutable tags are recommended) | `2.5.0-debian-10-r33` |
|
|
|
| `trivy.image.pullPolicy` | Harbor Adapter Trivy image pull policy | `IfNotPresent` |
|
|
|
| `trivy.image.pullSecrets` | Harbor Adapter Trivy image pull secrets | `[]` |
|
|
|
| `trivy.image.debug` | Enable Harbor Adapter Trivy image debug mode | `false` |
|
|
@@ -1119,7 +1121,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| ------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------- |
|
|
|
| `exporter.image.registry` | Registry for exporter image | `docker.io` |
|
|
|
| `exporter.image.repository` | Repository for exporter image | `bitnami/harbor-exporter` |
|
|
|
-| `exporter.image.tag` | Tag for exporter image | `2.5.0-debian-10-r19` |
|
|
|
+| `exporter.image.tag` | Tag for exporter image | `2.5.0-debian-10-r32` |
|
|
|
| `exporter.image.pullPolicy` | Harbor exporter image pull policy | `IfNotPresent` |
|
|
|
| `exporter.image.pullSecrets` | Specify docker-registry secret names as an array | `[]` |
|
|
|
| `exporter.image.debug` | Specify if debug logs should be enabled | `false` |
|
|
@@ -1195,7 +1197,7 @@ Additionally, if `persistence.resourcePolicy` is set to `keep`, you should manua
|
|
|
| `postgresql.primary.initdb.scripts` | Initdb scripts to create Harbor databases | `{}` |
|
|
|
| `postgresql.image.registry` | PostgreSQL image registry | `docker.io` |
|
|
|
| `postgresql.image.repository` | PostgreSQL image repository | `bitnami/postgresql` |
|
|
|
-| `postgresql.image.tag` | PostgreSQL image tag (immutable tags are recommended) | `13.6.0-debian-10-r86` |
|
|
|
+| `postgresql.image.tag` | PostgreSQL image tag (immutable tags are recommended) | `13.7.0-debian-10-r0` |
|
|
|
| `externalDatabase.host` | Database host | `localhost` |
|
|
|
| `externalDatabase.port` | Database port number | `5432` |
|
|
|
| `externalDatabase.user` | Non-root username for Harbor | `bn_harbor` |
|