1# Default values for headlamp.
2# This is a YAML-formatted file.
3# Declare variables to be passed into your templates.
5# -- Number of desired pods
8 # -- Container image registry
10 # -- Container image name
11 repository: chainguard-private/headlamp
12 # -- Image pull policy. One of Always, Never, IfNotPresent
13 pullPolicy: IfNotPresent
14 # -- Container image tag, If "" uses appVersion in Chart.yaml
15 tag: latest@sha256:8eb827559a7072d2f8015de1e8fc9cfbdc5cad91282ae5a74220b317679850e6
16# -- An optional list of references to secrets in the same namespace to use for pulling any of the images used
18# -- Overrides the name of the chart
20# -- Overrides the full name of the chart
22# -- Override the deployment namespace; defaults to .Release.Namespace
24# -- An optional list of init containers to be run before the main containers.
26# -- An optional list of extra containers to be run along side the main containers.
30 inClusterContextName: "main"
31 # -- base url path at which headlamp should run
33 # -- session token TTL in seconds (default is 24 hours)
37 # @param config.oidc.secret - OIDC secret configuration
38 # If you want to use an existing secret, set create to false and provide the name of the secret.
39 # If you want to create a new secret, set create to true and provide the name of the secret.
40 # Also provide the values for clientID, clientSecret, issuerURL, and scopes.
48 # -- Generate OIDC secret. If true, will generate a secret using .config.oidc.
50 # -- Name of the OIDC secret.
53 # @param config.oidc - OIDC env configuration
54 # If you want to set the OIDC configuration directly, set the following values.
58 # clientID: "clientID"
59 # clientSecret: "clientSecret"
60 # issuerURL: "issuerURL"
65 # -- OIDC client secret
69 # -- OIDC scopes to be used
71 # -- OIDC callback URL
73 # -- OIDC client to be used during token validation
75 # -- OIDC Issuer URL to be used during token validation
76 validatorIssuerURL: ""
77 # -- Use 'access_token' instead of 'id_token' when authenticating using OIDC
79 # -- Use PKCE (Proof Key for Code Exchange) for enhanced security in OIDC flow
81 # -- Enable using OIDC cookie for authentication outside of cluster
84 # @param config.oidc - External OIDC secret configuration
85 # If you want to use an external secret for OIDC configuration, enable this option.
86 # Provide the name of the secret to use.
98 # -- URL to fetch additional user info for the /me endpoint.
99 # For oauth2proxy /oauth2/userinfo can be used. Empty and it will not be used.
101 # -- directory to look for plugins
102 pluginsDir: "/headlamp/plugins"
105 # tlsCertPath: "/headlamp-cert/headlamp-ca.crt"
106 # tlsKeyPath: "/headlamp-cert/headlamp-tls.key"
107 # Extra arguments that can be given to the container. See charts/headlamp/README.md for more information.
109# -- An optional list of environment variables
111# - name: KUBERNETES_SERVICE_HOST
113# - name: KUBERNETES_SERVICE_PORT
116# -- Mount Service Account token in pod
117automountServiceAccountToken: true
119 # -- Specifies whether a service account should be created
121 # -- Annotations to add to the service account
123 # -- The name of the service account to use.(If not set and create is true, a name is generated using the fullname template)
126 # -- Specified whether a cluster role binding should be created
128 # -- Set name of the Cluster Role with limited permissions from you cluster
129 # for example - clusterRoleName: user-ro
130 clusterRoleName: cluster-admin
131 # -- Annotations to add to the cluster role binding
133# -- Annotations to add to the deployment
134deploymentAnnotations: {}
135# -- Annotations to add to the pod
137# -- Labels to add to the pod
139# -- Controls user namespace isolation for the Headlamp pod.
140# When true (default), the pod shares the host user namespace (user namespaces are DISABLED).
141# When false, the pod uses a separate user namespace (user namespaces are ENABLED) for stronger isolation,
142# if supported by the cluster. Set this to false if your cluster supports user namespaces and you want
143# additional isolation; leave as true if user namespaces are not available.
144# See: https://kubernetes.io/docs/concepts/workloads/pods/user-namespaces/
146# -- Headlamp pod's Security Context
147podSecurityContext: {}
150# -- Headlamp containers Security Context
155 # readOnlyRootFilesystem: true
160# Uses these defaults if this is empty.
161# allowPrivilegeEscalation: false
164# type: RuntimeDefault
170 # -- Annotations to add to the service
172 # -- Kubernetes Service type
174 # -- Kubernetes Service port
176 # -- Kubernetes Service clusterIP
178 # -- Kubernetes Service loadBalancerIP
180 # -- Kubernetes Service loadBalancerSourceRanges
181 loadBalancerSourceRanges: []
182 # -- Kubernetes Service Nodeport
184# -- Headlamp containers volume mounts
186# -- Headlamp pod's volumes
188persistentVolumeClaim:
189 # -- Enable Persistent Volume Claim
191 # -- Annotations to add to the persistent volume claim (if enabled)
193 # -- accessModes for the persistent volume claim, eg: ReadWriteOnce, ReadOnlyMany, ReadWriteMany etc.
195 # -- size of the persistent volume claim, eg: 10Gi. Required if enabled is true.
197 # -- storageClassName for the persistent volume claim.
199 # -- selector for the persistent volume claim.
201 # -- volumeMode for the persistent volume claim, eg: Filesystem, Block.
204 # -- Enable ingress controller resource
206 # -- Annotations for Ingress resource
208 # kubernetes.io/tls-acme: "true"
210 # -- Additional labels to add to the Ingress resource
212 # app.kubernetes.io/part-of: traefik
215 # -- Ingress class name. replacement for the deprecated "kubernetes.io/ingress.class" annotation
217 # -- Hostname(s) for the Ingress resource
218 # Please refer to https://kubernetes.io/docs/reference/kubernetes-api/service-resources/ingress-v1/#IngressSpec for more information.
220 # - host: chart-example.local
223 # type: ImplementationSpecific
224 # -- Ingress TLS configuration
226 # - secretName: chart-example-tls
228 # - chart-example.local
229# HTTPRoute configuration for Gateway API
230# Please refer to https://gateway-api.sigs.k8s.io/reference/spec/#gateway.networking.k8s.io/v1.HTTPRoute
232 # -- Enable HTTPRoute resource for Gateway API
234 # -- Annotations for HTTPRoute resource
236 # -- Additional labels for HTTPRoute resource
238 # -- Parent references (REQUIRED when enabled - HTTPRoute will not work without this)
242 # namespace: gateway-namespace
244 # -- Hostnames for the HTTPRoute
247 # - headlamp.example.com
249 # -- Custom routing rules (optional, defaults to path prefix /)
250 # If not specified, a default rule routing all traffic to the service is used
252 # Example custom rules:
259 # - name: "{{ .Release.Name }}-headlamp"
261# -- CPU/Memory resource requests/limits
263# We usually recommend not to specify default resources and to leave this as a conscious
264# choice for the user. This also increases chances charts run on environments with little
265# resources, such as Minikube. If you do want to specify resources, uncomment the following
266# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
274# -- Node labels for pod assignment
276# -- Toleration labels for pod assignment
278# -- Affinity settings for pod assignment
280# -- Topology Spread Constraints for pod assignment
281topologySpreadConstraints: []
283# topologyKey: topology.kubernetes.io/zone
284# whenUnsatisfiable: ScheduleAnyway
288# topologyKey: kubernetes.io/hostname
289# whenUnsatisfiable: DoNotSchedule
293# -- Pod priority class
295# Plugin Manager Sidecar Container Configuration
297 # -- Enable plugin manager
299 # -- Plugin configuration file name
300 configFile: "plugin.yml"
301 # -- Plugin configuration content in YAML format. This is required if plugins.enabled is true.
303 # -- Base node image to use
304 baseImage: cgr.dev/chainguard-private/node:latest@sha256:92f74407d67cbd01b10d7b1df1b77f76dbb0e1c74f9eff63d7f5ec0188b48a3e
305 # -- Headlamp plugin package version to install
307 # -- Plugin manager containers volume mounts
309 # -- Plugin manager env variable configuration
311 # - name: HTTPS_PROXY
312 # value: "proxy.example.com:8080"
313 # -- Specify resrouces
321 # If omitted, the plugin manager will inherit the global securityContext
325 # allowPrivilegeEscalation: false
326 # readOnlyRootFilesystem: true
331 # -- enable PodDisruptionBudget
332 # ref: https://kubernetes.io/docs/concepts/workloads/pods/disruptions/
335 # type: [null, integer, string]
337 # -- Minimum number/percentage of pods that should remain scheduled.
338 # When it's set, maxUnavailable must be disabled by `maxUnavailable: null`
341 # type: [null, integer, string]
343 # -- Maximum number/percentage of pods that may be made unavailable
346 # type: [null, string]
348 # -- How are unhealthy, but running, pods counted for eviction
349 unhealthyPodEvictionPolicy: null
350# -- Additional Kubernetes manifests to be deployed. Include the manifest as nested YAML.