@@ -10,15 +10,15 @@ license: "---ENTER-YOUR-LICENSE-HERE---"
10
10
licenseServer :
11
11
url : " https://license.kerberos.io/verify"
12
12
token : " 214%ˆ#ddfsf@#3rfdsgl_)23sffeqasSwefDSFNBM" # do not change otherwise Kerberos Hub will not work.
13
-
13
+
14
14
# Private Docker Registry: The registry secret is required if you have your Docker images behind a private registry.
15
15
# By default it will pull from Docker hub (https://hub.docker.com/r/kerberos).
16
16
# imagePullSecrets:
17
17
# - name: regcred
18
-
18
+
19
19
# Environment: set to 'production', 'develop', 'demo', 'staging' or 'acceptance'.
20
20
# Set to 'true' if this is a private deployment.
21
- environment : ' production'
21
+ environment : " production"
22
22
23
23
# Set to 'true' if this is a private deployment.
24
24
isPrivate : true
@@ -151,7 +151,7 @@ kerberoshub:
151
151
api :
152
152
repository : kerberos/hub-api
153
153
pullPolicy : IfNotPresent
154
- tag : " 1.0.1222305520 "
154
+ tag : " 1.0.1265092716 "
155
155
replicas : 2
156
156
jwtSecret : " this-is-a-secret-please-change-to-random-string" # change to a random value, this is for generating JWT tokens.
157
157
schema : " https"
@@ -175,7 +175,7 @@ kerberoshub:
175
175
176
176
# MFA issuer name
177
177
mfaIssuer : " Kerberos.io"
178
-
178
+
179
179
# Admin API's are made available for automation of Kerberos Hub.
180
180
# To access those API's (e.g. creation of owner users), an API key needs to be provided.
181
181
apiKey : " a-random-admin-api-key"
@@ -218,27 +218,29 @@ kerberoshub:
218
218
- domain : " uug.ai"
219
219
redirectUrl : " https://api.cloud.kerberos.io/sso/callback/uug.ai"
220
220
issuer : " https://xxx.eu.auth0.com/"
221
+ claimId : " email" # claim which is used to identify the user
221
222
clientId : " xxx"
222
223
clientSecret : " xxx"
223
224
clientVerificationId : " " # This is only required for SSO chaining.
224
225
- domain : " kerberos.io"
225
226
redirectUrl : " https://api.cloud.kerberos.io/sso/callback/kerberos.io"
226
227
issuer : " https://accounts.google.com"
228
+ claimId : " email" # claim which is used to identify the user
227
229
clientId : " xxx"
228
230
clientSecret : " xxx"
229
231
clientVerificationId : " " # This is only required for SSO chaining.
230
232
frontend :
231
233
repository : kerberos/hub-frontend
232
234
pullPolicy : IfNotPresent
233
- tag : " 1.0.1222303921 "
235
+ tag : " 1.0.1265984636 "
234
236
replicas : 2
235
237
schema : " https"
236
238
url : " yourdomain.com"
237
239
resources :
238
240
requests :
239
241
memory : 50Mi
240
242
cpu : 50m
241
-
243
+
242
244
# The front-end but in read-only mode
243
245
# demoUrl: "demo.yourdomain.com"
244
246
# When migrating to another url, this might help migrating.
@@ -278,7 +280,7 @@ kerberoshub:
278
280
# of accounts and subaccounts. However through the concept of domains, you
279
281
# take it a step further. Within a domain, user accounts are unique, and are prefixed by a (domain\).
280
282
# multiTenant: true
281
- # tenantBaseDomain: "yourdomain.com" # this would resolve in following sub domain "https://domain.kerberos.io"
283
+ # tenantBaseDomain: "yourdomain.com" # this would resolve in following sub domain "https://domain.kerberos.io"
282
284
283
285
# Page title (browser)
284
286
title : " Kerberos Hub - Video surveillance as it should be"
@@ -532,4 +534,4 @@ kerberospipeline:
532
534
resources :
533
535
requests :
534
536
memory : 10Mi
535
- cpu : 10m
537
+ cpu : 10m
0 commit comments