附录 A. 使用 AWS 值文件模板的 Red Hat Trusted Profile Analyzer
红帽的 Trusted Profile Analyzer (RHTPA)带有 Amazon Web Services (AWS)值文件模板,供 RHTPA Helm Chart 使用。
模板
appDomain: $APP_DOMAIN_URL ingress: className: openshift-default additionalAnnotations: "haproxy.router.openshift.io/timeout": "5m" authenticator: type: cognito storage: type: s3 region: REGION bucket: trustify-UNIQUE_ID accessKey: valueFrom: secretKeyRef: name: storage-credentials key: aws_access_key_id secretKey: valueFrom: secretKeyRef: name: storage-credentials key: aws_secret_access_key database: sslMode: require host: valueFrom: secretKeyRef: name: postgresql-credentials key: db.host port: valueFrom: secretKeyRef: name: postgresql-credentials key: db.port name: valueFrom: secretKeyRef: name: postgresql-credentials key: db.name username: valueFrom: secretKeyRef: name: postgresql-credentials key: db.user password: valueFrom: secretKeyRef: name: postgresql-credentials key: db.password createDatabase: name: valueFrom: secretKeyRef: name: postgresql-admin-credentials key: db.name username: valueFrom: secretKeyRef: name: postgresql-admin-credentials key: db.user password: valueFrom: secretKeyRef: name: postgresql-admin-credentials key: db.password migrateDatabase: username: valueFrom: secretKeyRef: name: postgresql-admin-credentials key: db.user password: valueFrom: secretKeyRef: name: postgresql-admin-credentials key: db.password modules: createDatabase: enabled: true migrateDatabase: enabled: true oidc: issuerUrl: https://cognito-idp.REGION.amazonaws.com/USER_POOL_ID clients: frontend: clientId: FRONTEND_CLIENT_ID cli: clientId: CLI_CLIENT_ID clientSecret: valueFrom: secretKeyRef: name: oidc-cli key: client-secret
appDomain: $APP_DOMAIN_URL
ingress:
className: openshift-default
additionalAnnotations:
"haproxy.router.openshift.io/timeout": "5m"
authenticator:
type: cognito
storage:
type: s3
region: REGION
bucket: trustify-UNIQUE_ID
accessKey:
valueFrom:
secretKeyRef:
name: storage-credentials
key: aws_access_key_id
secretKey:
valueFrom:
secretKeyRef:
name: storage-credentials
key: aws_secret_access_key
database:
sslMode: require
host:
valueFrom:
secretKeyRef:
name: postgresql-credentials
key: db.host
port:
valueFrom:
secretKeyRef:
name: postgresql-credentials
key: db.port
name:
valueFrom:
secretKeyRef:
name: postgresql-credentials
key: db.name
username:
valueFrom:
secretKeyRef:
name: postgresql-credentials
key: db.user
password:
valueFrom:
secretKeyRef:
name: postgresql-credentials
key: db.password
createDatabase:
name:
valueFrom:
secretKeyRef:
name: postgresql-admin-credentials
key: db.name
username:
valueFrom:
secretKeyRef:
name: postgresql-admin-credentials
key: db.user
password:
valueFrom:
secretKeyRef:
name: postgresql-admin-credentials
key: db.password
migrateDatabase:
username:
valueFrom:
secretKeyRef:
name: postgresql-admin-credentials
key: db.user
password:
valueFrom:
secretKeyRef:
name: postgresql-admin-credentials
key: db.password
modules:
createDatabase:
enabled: true
migrateDatabase:
enabled: true
oidc:
issuerUrl: https://cognito-idp.REGION.amazonaws.com/USER_POOL_ID
clients:
frontend:
clientId: FRONTEND_CLIENT_ID
cli:
clientId: CLI_CLIENT_ID
clientSecret:
valueFrom:
secretKeyRef:
name: oidc-cli
key: client-secret