forked from jupyterhub/zero-to-jupyterhub-k8s
-
Notifications
You must be signed in to change notification settings - Fork 0
/
dev-config.yaml
86 lines (81 loc) · 1.93 KB
/
dev-config.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
proxy:
secretToken: pppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppppp
service:
type: NodePort
nodePorts:
http: 30080
https: 30443
https:
enabled: true
type: letsencrypt
hosts:
- local.jovyan.org
letsencrypt:
contactEmail: '[email protected]'
acmeServer: https://pebble/dir
traefik:
extraVolumes:
- name: pebble-root-cert
configMap:
name: pebble
extraVolumeMounts:
- name: pebble-root-cert
subPath: root-cert.pem
mountPath: /etc/pebble/root-cert.pem
extraEnv:
LEGO_CA_CERTIFICATES: /etc/pebble/root-cert.pem
chp:
resources:
requests:
memory: 0
cpu: 0
networkPolicy:
egress: [] # overrides allowance of 0.0.0.0/0
hub:
cookieSecret: cccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccccc
db:
type: sqlite-memory
services:
test:
admin: true
apiToken: ssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssssss
networkPolicy:
egress: # overrides allowance of 0.0.0.0/0
# In kind/k3s clusters the Kubernetes API server is exposing this port
- ports:
- protocol: TCP
port: 6443
resources:
requests:
memory: 0
cpu: 0
singleuser:
storage:
type: none
memory:
guarantee: null
networkPolicy:
# For testing purposes in test_singleuser_netpol
egress:
- to:
- ipBlock:
cidr: 104.28.9.110/32 # jupyter.org 1
- ipBlock:
cidr: 104.28.8.110/32 # jupyter.org 2
extraEnv:
TEST_ENV_FIELDREF_TO_NAMESPACE:
valueFrom:
fieldRef:
fieldPath: metadata.namespace
prePuller:
hook:
enabled: false
scheduling:
userScheduler:
enabled: true
# replicas lowered to make it easier to get the relevant logs if a pod get
# stuck in pending mode
replicas: 1
logLevel: 10
debug:
enabled: true