14 KiB
14 KiB
keto
Access Control Policies as a Server
Homepage: https://www.ory.sh/keto/
Maintainers
| Name | Url | |
|---|---|---|
| ORY Team | hi@ory.sh | https://www.ory.sh/ |
Source Code
Requirements
| Repository | Name | Version |
|---|---|---|
| file://../ory-commons | ory(ory-commons) | 0.1.0 |
Values
| Key | Type | Default | Description |
|---|---|---|---|
| configmap.hashSumEnabled | bool | true |
switch to false to prevent checksum annotations being maintained and propogated to the pods |
| deployment.affinity | object | {} |
|
| deployment.annotations | object | {} |
|
| deployment.automigration | object | {"extraEnv":[]} |
Parameters for the automigration initContainer |
| deployment.automigration.extraEnv | list | [] |
Array of extra envs to be passed to the initContainer. Kubernetes format is expected. Value is processed with Helm tpl - name: FOO value: BAR |
| deployment.automountServiceAccountToken | bool | true |
|
| deployment.autoscaling | object | {"behavior":{},"enabled":false,"maxReplicas":100,"minReplicas":1,"targetCPU":{},"targetMemory":{}} |
Autoscaling for keto deployment |
| deployment.autoscaling.behavior | object | {} |
Set custom behavior https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/#configurable-scaling-behavior |
| deployment.customLivenessProbe | object | {} |
|
| deployment.customReadinessProbe | object | {} |
|
| deployment.customStartupProbe | object | {} |
|
| deployment.dnsConfig | object | {} |
Configure pod dnsConfig. |
| deployment.extraContainers | string | "" |
If you want to add extra sidecar containers. |
| deployment.extraEnv | list | [] |
Array of extra Envs to be added to the deployment. Kubernetes format expected. Value is processed with Helm tpl - name: FOO value: BAR |
| deployment.extraInitContainers | object | {} |
If you want to add extra init containers. These are processed before the migration init container. |
| deployment.extraLabels | object | {} |
Extra labels to be added to the deployment, and pods. K8s object format expected foo: bar my.special.label/type: value |
| deployment.extraPorts | list | [] |
Extra ports to be exposed by the main deployment |
| deployment.extraVolumeMounts | list | [] |
Array of extra VolumeMounts to be added to the deployment. K8s format expected - name: my-volume mountPath: /etc/secrets/my-secret readOnly: true |
| deployment.extraVolumes | list | [] |
Array of extra Volumes to be added to the deployment. K8s format expected - name: my-volume secret: secretName: my-secret |
| deployment.lifecycle | object | {} |
|
| deployment.minReadySeconds | int | 0 |
|
| deployment.nodeSelector | object | {} |
|
| deployment.podAnnotations | object | {} |
|
| deployment.podMetadata.annotations | object | {} |
|
| deployment.podMetadata.labels | object | {} |
|
| deployment.podSecurityContext | object | {} |
|
| deployment.readinessProbe.failureThreshold | int | 5 |
|
| deployment.readinessProbe.initialDelaySeconds | int | 5 |
|
| deployment.readinessProbe.periodSeconds | int | 10 |
|
| deployment.resources | object | {} |
|
| deployment.revisionHistoryLimit | int | 5 |
Number of revisions kept in history |
| deployment.startupProbe.failureThreshold | int | 5 |
|
| deployment.startupProbe.initialDelaySeconds | int | 0 |
|
| deployment.startupProbe.periodSeconds | int | 1 |
|
| deployment.startupProbe.successThreshold | int | 1 |
|
| deployment.startupProbe.timeoutSeconds | int | 1 |
|
| deployment.strategy.rollingUpdate.maxSurge | string | "25%" |
|
| deployment.strategy.rollingUpdate.maxUnavailable | string | "25%" |
|
| deployment.strategy.type | string | "RollingUpdate" |
|
| deployment.terminationGracePeriodSeconds | int | 60 |
|
| deployment.tolerations | list | [] |
|
| deployment.topologySpreadConstraints | list | [] |
Configure pod topologySpreadConstraints. |
| extraServices | object | {} |
|
| fullnameOverride | string | "" |
|
| image.pullPolicy | string | "IfNotPresent" |
Default image pull policy |
| image.repository | string | "oryd/keto" |
Ory KETO image |
| image.tag | string | "v0.12.0" |
Ory KETO version |
| imagePullSecrets | list | [] |
|
| ingress.read.annotations | object | {} |
|
| ingress.read.className | string | "" |
|
| ingress.read.enabled | bool | false |
|
| ingress.read.hosts[0].host | string | "chart-example.local" |
|
| ingress.read.hosts[0].paths[0].path | string | "/read" |
|
| ingress.read.hosts[0].paths[0].pathType | string | "Prefix" |
|
| ingress.read.tls | list | [] |
|
| ingress.write.annotations | object | {} |
|
| ingress.write.className | string | "" |
|
| ingress.write.enabled | bool | false |
|
| ingress.write.hosts[0].host | string | "chart-example.local" |
|
| ingress.write.hosts[0].paths[0].path | string | "/write" |
|
| ingress.write.hosts[0].paths[0].pathType | string | "Prefix" |
|
| ingress.write.tls | list | [] |
|
| job.annotations | object | {"helm.sh/hook":"pre-install, pre-upgrade","helm.sh/hook-delete-policy":"before-hook-creation,hook-succeeded","helm.sh/hook-weight":"1"} |
If you do want to specify annotations, uncomment the following lines, adjust them as necessary, and remove the curly braces after 'annotations:'. |
| job.automountServiceAccountToken | bool | false |
Set automounting of the SA token |
| job.extraContainers | string | "" |
If you want to add extra sidecar containers. |
| job.extraEnv | list | [] |
Array of extra envs to be passed to the job. This takes precedence over deployment variables. Kubernetes format is expected. Value is processed with Helm tpl - name: FOO value: BAR |
| job.extraInitContainers | string | "" |
If you want to add extra init containers. |
| job.lifecycle | string | "" |
If you want to add lifecycle hooks. |
| job.nodeSelector | object | {} |
Node labels for pod assignment. |
| job.podMetadata | object | {"annotations":{},"labels":{}} |
Specify pod metadata, this metadata is added directly to the pod, and not higher objects |
| job.podMetadata.annotations | object | {} |
Extra pod level annotations |
| job.podMetadata.labels | object | {} |
Extra pod level labels |
| job.resources | object | {} |
Job resources |
| job.serviceAccount | object | {"annotations":{"helm.sh/hook":"pre-install, pre-upgrade","helm.sh/hook-delete-policy":"before-hook-creation","helm.sh/hook-weight":"0"},"create":true,"name":""} |
Specify the serviceAccountName value. In some situations it is needed to provides specific permissions to Hydra deployments Like for example installing Hydra on a cluster with a PosSecurityPolicy and Istio. Uncoment if it is needed to provide a ServiceAccount for the Hydra deployment. |
| job.serviceAccount.annotations | object | {"helm.sh/hook":"pre-install, pre-upgrade","helm.sh/hook-delete-policy":"before-hook-creation","helm.sh/hook-weight":"0"} |
Annotations to add to the service account |
| job.serviceAccount.create | bool | true |
Specifies whether a service account should be created |
| job.serviceAccount.name | string | "" |
The name of the service account to use. If not set and create is true, a name is generated using the fullname template |
| job.shareProcessNamespace | bool | false |
Set sharing process namespace |
| job.spec.backoffLimit | int | 10 |
Set job back off limit |
| job.tolerations | list | [] |
Configure node tolerations. |
| keto.automigration | object | {"customArgs":[],"customCommand":[],"enabled":false,"resources":{},"type":"job"} |
Enables database migration |
| keto.automigration.customArgs | list | [] |
Ability to override arguments of the entrypoint. Can be used in-depended of customCommand eg: - sleep 5; - keto |
| keto.automigration.customCommand | list | [] |
Ability to override the entrypoint of the automigration container (e.g. to source dynamic secrets or export environment dynamic variables) |
| keto.automigration.resources | object | {} |
resource requests and limits for the automigration initcontainer |
| keto.automigration.type | string | "job" |
Configure the way to execute database migration. Possible values: job, initContainer When set to job, the migration will be executed as a job on release or upgrade. When set to initContainer, the migration will be executed when kratos pod is created Defaults to job |
| keto.command | list | ["keto"] |
Ability to override the entrypoint of keto container (e.g. to source dynamic secrets or export environment dynamic variables) |
| keto.config | object | {"dsn":"memory","namespaces":[{"id":0,"name":"sample"}],"serve":{"metrics":{"port":4468},"read":{"port":4466},"write":{"port":4467}}} |
Direct keto config. Full documentation can be found in https://www.ory.sh/keto/docs/reference/configuration |
| keto.customArgs | list | [] |
Ability to override arguments of the entrypoint. Can be used in-depended of customCommand |
| nameOverride | string | "" |
|
| pdb.enabled | bool | false |
|
| pdb.spec.maxUnavailable | string | "" |
|
| pdb.spec.minAvailable | string | "" |
|
| podSecurityContext.fsGroup | int | 65534 |
|
| podSecurityContext.fsGroupChangePolicy | string | "OnRootMismatch" |
|
| podSecurityContext.runAsGroup | int | 65534 |
|
| podSecurityContext.runAsNonRoot | bool | true |
|
| podSecurityContext.runAsUser | int | 65534 |
|
| podSecurityContext.seccompProfile.type | string | "RuntimeDefault" |
|
| priorityClassName | string | "" |
Pod priority https://kubernetes.io/docs/concepts/configuration/pod-priority-preemption/ |
| replicaCount | int | 1 |
Number of replicas in deployment |
| secret.enabled | bool | true |
Switch to false to prevent creating the secret |
| secret.hashSumEnabled | bool | true |
switch to false to prevent checksum annotations being maintained and propogated to the pods |
| secret.nameOverride | string | "" |
Provide custom name of existing secret, or custom name of secret to be created |
| secret.secretAnnotations | object | {"helm.sh/hook":"pre-install, pre-upgrade","helm.sh/hook-delete-policy":"before-hook-creation","helm.sh/hook-weight":"0","helm.sh/resource-policy":"keep"} |
Annotations to be added to secret. Annotations are added only when secret is being created. Existing secret will not be modified. |
| securityContext.allowPrivilegeEscalation | bool | false |
|
| securityContext.capabilities.drop[0] | string | "ALL" |
|
| securityContext.privileged | bool | false |
|
| securityContext.readOnlyRootFilesystem | bool | true |
|
| securityContext.runAsGroup | int | 65534 |
|
| securityContext.runAsNonRoot | bool | true |
|
| securityContext.runAsUser | int | 65534 |
|
| securityContext.seLinuxOptions.level | string | "s0:c123,c456" |
|
| securityContext.seccompProfile.type | string | "RuntimeDefault" |
|
| service.metrics.annotations | object | {} |
|
| service.metrics.enabled | bool | false |
|
| service.metrics.loadBalancerIP | string | "" |
|
| service.metrics.name | string | "http-metrics" |
|
| service.metrics.port | int | 80 |
|
| service.metrics.type | string | "ClusterIP" |
|
| service.read.appProtocol | string | "grpc" |
|
| service.read.clusterIP | string | "" |
|
| service.read.enabled | bool | true |
|
| service.read.headless.enabled | bool | true |
|
| service.read.loadBalancerIP | string | "" |
|
| service.read.name | string | "grpc-read" |
|
| service.read.port | int | 80 |
|
| service.read.type | string | "ClusterIP" |
|
| service.write.appProtocol | string | "grpc" |
|
| service.write.clusterIP | string | "" |
|
| service.write.enabled | bool | true |
|
| service.write.headless.enabled | bool | true |
|
| service.write.loadBalancerIP | string | "" |
|
| service.write.name | string | "grpc-write" |
|
| service.write.port | int | 80 |
|
| service.write.type | string | "ClusterIP" |
|
| serviceAccount.annotations | object | {} |
Annotations to add to the service account |
| serviceAccount.create | bool | true |
Specifies whether a service account should be created |
| serviceAccount.name | string | "" |
The name of the service account to use. If not set and create is true, a name is generated using the fullname template |
| serviceMonitor.labels | object | {} |
Provide additionnal labels to the ServiceMonitor ressource metadata |
| serviceMonitor.scheme | string | "http" |
HTTP scheme to use for scraping. |
| serviceMonitor.scrapeInterval | string | "60s" |
Interval at which metrics should be scraped |
| serviceMonitor.scrapeTimeout | string | "30s" |
Timeout after which the scrape is ended |
| serviceMonitor.tlsConfig | object | {} |
TLS configuration to use when scraping the endpoint |
| test.busybox | object | {"repository":"busybox","tag":1} |
use a busybox image from another repository |
| test.labels | object | {} |
Provide additional labels to the test pod |
| watcher.automountServiceAccountToken | bool | true |
|
| watcher.enabled | bool | false |
|
| watcher.image | string | "oryd/k8s-toolbox:v0.0.7" |
|
| watcher.mountFile | string | "" |
Path to mounted file, which wil be monitored for changes. eg: /etc/secrets/my-secret/foo |
| watcher.podMetadata | object | {"annotations":{},"labels":{}} |
Specify pod metadata, this metadata is added directly to the pod, and not higher objects |
| watcher.podMetadata.annotations | object | {} |
Extra pod level annotations |
| watcher.podMetadata.labels | object | {} |
Extra pod level labels |
| watcher.resources | object | {} |
|
| watcher.revisionHistoryLimit | int | 5 |
Number of revisions kept in history |
| watcher.watchLabelKey | string | "ory.sh/watcher" |
Label key used for managing applications |
Autogenerated from chart metadata using helm-docs v1.14.2