-
Notifications
You must be signed in to change notification settings - Fork 72
Expand file tree
/
Copy pathexample_config.yaml
More file actions
276 lines (214 loc) · 9.18 KB
/
example_config.yaml
File metadata and controls
276 lines (214 loc) · 9.18 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
---
### Example OCM Container Configuration.
#
# This file contains all of the configuration options
# available and their defaults and options.
# Set the container engine to use. Supported options are
# `podman` or `docker`. Defaults to podman
engine: podman
# The following block contains optional formatting directives for
# the ocm-container logger
log:
# Level can be one of debug, info, warn, warning, err, error.
# Defaults to warning
level: warning
# Color allows you to disable log format coloring. It is enabled
# only in a TTY by default. Set this to false to disable colors
color: true
# Set the default image that ocm-container should use
# This is especially useful if you build your own layers on top
# of the default container
# this defaults to `quay.io/redhat-services-prod/openshift/ocm-container:latest`
#
# Other pre-built options are ocm-container-micro or ocm-container-minimal, which have smaller
# footprints.
image: quay.io/redhat-services-prod/openshift/ocm-container:latest
# How often do you want to pull the image. Default to always so that
# you always have the latest ocm-container build image. This is built
# nightly, but may be updated at any time.
imagePullPolicy: always
# Turn off automatic login if a cluster id is passed:
# Defaults to false. Can also be passed with `--no-login`
no-login: true
# env contains a kubernetes-style list of name:value pairs that
# are to be passed into the container. If only the `name` is
# provided, then that var will be passed from your local env
# Any env vars passed with `-e` into the ocm-container CLI
# invocation will override anything set within here, but otherwise
# anything with `-e` will be appended to this list
env:
# equivelant of `podman run -e MY_CONFIG_VAR=myValue`
- name: MY_CONFIG_VAR
value: myValue
# the following will pass the value of SOME_SECRET_TOKEN
# directly from your local env without exposing the value
# equivelant of `podman run -e SOME_SECRET_TOKEN`
- name: SOME_SECRET_TOKEN
# volumeMounts contains a list of local directories to pass
# into the container as additional volumes.
volumeMounts:
- /path/to/local/dir:/root/dir
# The Ports configuration provides port forwarding capabilities,
# allowing you to expose container ports to your host system and
# access services running inside the container
ports:
# Enable or disable all port forwarding
# Default: true
enabled: true
# Console port configuration
# This port is used for accessing web consoles or services like
# `ocm backplane console` running inside the container
console:
# Enable or disable console port forwarding
# Default: true
enabled: true
# Container port to bind for console access
# The actual host port will be randomly assigned by the container engine
# and written to /tmp/portmap inside the container
# Default: 9999
port: 9999
# Individual feature configuration
features:
# The Additional Cluster Envs integration automatically exports
# cluster-related environment variables when logging into a cluster
# with --cluster-id
additional_cluster_envs:
# Enable or disable the additional cluster environment variables
# Default: true
enabled: true
# The Backplane integration mounts your backplane configuration
# file into the container for seamless use of backplane CLI tools
backplane:
# Enable or disable the backplane integration
# Default: true
enabled: true
# Optional path to the backplane config file
# Defaults to '.config/backplane/config.json'
# Can be either an absolute path or relative to $HOME
# Note: BACKPLANE_CONFIG environment variable takes priority over this setting
config_file: .config/backplane/config.json
# The certificate authorities functionality automatically
# mounts your trusted certificates inside the container
certificate_authorities:
# Enable or disable the CA integration
# Defaults to true
enabled: true
# Optional path to the source anchors folder on your host
# to mount in the container. Default is as shown:
source_anchors: /etc/pki/ca-trust/source/anchors
# The GCP integration mounts the google cloud CLI directory
# and passes it to the default location within the container.
gcloud:
# Enable or disable the gcloud integration
# Defaults to true
enabled: true
# Optional path to the gcp config directory, defaults
# to ~/.config/gcloud
config_dir: .config/gcloud
# Optional mount directive to mount the config directory
# read-only or read-write. Defaults to `ro`.
# Accepted values are `ro`, `rw`, `z`, `Z`, `ro,z`, `ro,Z`, `rw,z`, `rw,Z`
config_mount: ro
# The Image Cache integration provides persistent container image
# caching, improving startup times by reusing previously pulled images
image_cache:
# Enable or disable the image cache integration
# Default: false, must be explicitly enabled.
enabled: false
# Path to the storage directory where container images will be cached
# Defaults to '.config/ocm-container/images'
# Can be either an absolute path or relative to $HOME
storage_dir: .config/ocm-container/images
# The JIRA integration mounts JIRA env vars and
# config file to be able to use the JIRA cli
# within the container
jira:
# Enable or disable the JIRA integration
# Defaults to true
enabled: true
# Optional path to the config.yml file, defaults
# to ~/.jira/.config.yml
config_file: .jira/.config.yml
# Optional mount directive to mount the config file
# read-only or read-write. Defaults to `ro`.
# Accepted values are `ro`, `rw`, `z`, `Z`, `ro,z`, `ro,Z`, `rw,z`, `rw,Z`
config_mount: ro
# The Legacy AWS Credentials integration mounts your
# ~/.aws/config and ~/.aws/credentials files so that your
# AWS Profiles are available within the container.
legacy_aws_credentials:
# Enable or disable the AWS Profile integration
enabled: true
# The Ops Utils integration mounts the ops-sop/v4/utils
# directory into the container at /root/ops-utils
ops_utils:
# Enable or disable the ops-utils integration
# Default: true, switch to false to disable.
enabled: true
# Path to the ops-sop/v4/utils directory
# This is required for the feature to work - no default value
source_dir: /path/to/ops-sop/v4/utils
# Optional mount option directive to mount the directory
# read-only or read-write. Defaults to `ro`. Accepted
# values are `rw` or `ro`
mount_options: ro
# The OSDCTL integration mounts your osdctl configuration
# and optional vault token into the container
osdctl:
# Enable or disable the osdctl integration
# Default: true, switch to false to disable.
enabled: true
# Path to the osdctl config file
# This is required for the feature to work
# Defaults to '.config/osdctl' (relative to $HOME if not absolute)
config_file: .config/osdctl
# Path to the vault token file (optional)
# Defaults to '.vault-token' (relative to $HOME if not absolute)
token_file: .vault-token
# Optional mount option directive for the config file
# read-only or read-write. Defaults to `ro`. Accepted
# values are `rw` or `ro`
config_mount_options: ro
# Optional mount option directive for the token file
# read-only or read-write. Defaults to `rw`. Accepted
# values are `rw` or `ro`
token_mount_options: rw
# The PagerDuty integration mounts a PagerDuty config file
# within the container.
pagerduty:
# Enable or disable the pagerduty integration
# Default: true, switch to false to disable.
enabled: true
# Optional path to the token file. Defaults to
# ~/.config/pagerduty/token.json
config_file: ~/.config/pagerduty/token.json
# Optional mount option directive to mount the config file
# read-only or read-write. Defaults to `ro`.
# Accepted values are `ro`, `rw`, `z`, `Z`, `ro,z`, `ro,Z`, `rw,z`, `rw,Z`
config_mount: ro
# The Persistent Histories integration provides per-cluster
# persistent bash history, maintaining separate command histories
# for each cluster you work with
persistent_histories:
# Enable or disable the persistent histories integration
# Default: false, must be explicitly enabled.
enabled: false
# Path to the storage directory where cluster histories will be saved
# Defaults to '.config/ocm-container/per-cluster-persistent'
# Can be either an absolute path or relative to $HOME
# if this storage directory doesn't exist, this feature will error out
storage_dir: .config/ocm-container/per-cluster-persistent
# The Personalization integration mounts your bash
# personalizations (aliases, functions, etc.) into the container
personalization:
# Enable or disable the personalization integration
# Default: true, switch to false to disable.
enabled: true
# Path to the directory or file containing your personalizations
# This is required for the feature to work
# Can be either a directory or a single file
source: /path/to/personalizations
# Optional mount option directive to mount the personalization
# read-only or read-write. Defaults to `ro`. Accepted
# values are `rw` or `ro`
mount_options: ro