2022-10-11 15:18:19 +00:00
|
|
|
# Helm template
|
|
|
|
inject:
|
|
|
|
enabled: true
|
|
|
|
# Config contains the configuration files ca.json and defaults.json
|
|
|
|
config:
|
|
|
|
files:
|
|
|
|
ca.json:
|
|
|
|
root: /home/step/certs/root_ca.crt
|
|
|
|
federateRoots: []
|
|
|
|
crt: /home/step/certs/intermediate_ca.crt
|
|
|
|
key: /home/step/secrets/intermediate_ca_key
|
|
|
|
address: 127.0.0.1:9000
|
|
|
|
dnsNames:
|
|
|
|
- 127.0.0.1
|
|
|
|
logger:
|
|
|
|
format: json
|
|
|
|
db:
|
|
|
|
type: badgerv2
|
|
|
|
dataSource: /home/step/db
|
|
|
|
authority:
|
|
|
|
enableAdmin: true
|
|
|
|
provisioners:
|
2022-10-13 22:09:32 +00:00
|
|
|
- {"type":"JWK","name":"step-cli","key":{"use":"sig","kty":"EC","kid":"zsUmysmDVoGJ71YoPHyZ-68tNihDaDaO5Mu7xX3M-_I","crv":"P-256","alg":"ES256","x":"Pqnua4CzqKz6ua41J3yeWZ1sRkGt0UlCkbHv8H2DGuY","y":"UhoZ_2ItDen9KQTcjay-ph-SBXH0mwqhHyvrrqIFDOI"},"encryptedKey":"eyJhbGciOiJQQkVTMi1IUzI1NitBMTI4S1ciLCJjdHkiOiJqd2sranNvbiIsImVuYyI6IkEyNTZHQ00iLCJwMmMiOjEwMDAwMCwicDJzIjoiZjVvdGVRS2hvOXl4MmQtSGlMZi05QSJ9.eYA6tt3fNuUpoxKWDT7P0Lbn2juxhEbTxEnwEMbjlYLLQ3sxL-dYTA.ven-FhmdjlC9itH0.a2jRTarN9vPd6F_mWnNBlOn6KbfMjCApmci2t65XbAsLzYFzhI_79Ykm5ueMYTupWLTjBJctl-g51ZHmsSB55pStbpoyyLNAsUX2E1fTmHe-Ni8bRrspwLv15FoN1Xo1g0mpR-ufWIFxOsW-QIfnMmMIIkygVuHFXmg2tFpzTNNG5aS29K3dN2nyk0WJrdIq79hZSTqVkkBU25Yu3A46sgjcM86XcIJJ2XUEih_KWEa6T1YrkixGu96pebjVqbO0R6dbDckfPF7FqNnwPHVtb1ACFpEYoOJVIbUCMaARBpWsxYhjJZlEM__XA46l8snFQDkNY3CdN0p1_gF3ckA.JLmq9nmu1h9oUi1S8ZxYjA","options":{"x509":{},"ssh":{}}}
|
2022-10-11 15:18:19 +00:00
|
|
|
tls:
|
|
|
|
cipherSuites:
|
|
|
|
- TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305_SHA256
|
|
|
|
- TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256
|
|
|
|
minVersion: 1.2
|
|
|
|
maxVersion: 1.3
|
|
|
|
renegotiation: false
|
|
|
|
|
|
|
|
defaults.json:
|
|
|
|
ca-url: https://127.0.0.1
|
|
|
|
ca-config: /home/step/config/ca.json
|
|
|
|
fingerprint:
|
|
|
|
root: /home/step/certs/root_ca.crt
|
|
|
|
|
|
|
|
# Certificates contains the root and intermediate certificate and
|
|
|
|
# optionally the SSH host and user public keys
|
|
|
|
certificates:
|
|
|
|
# intermediate_ca contains the text of the intermediate CA Certificate
|
|
|
|
intermediate_ca: |
|
|
|
|
|
|
|
|
|
|
|
|
# root_ca contains the text of the root CA Certificate
|
|
|
|
root_ca: |
|
|
|
|
|
|
|
|
|
|
|
|
# Secrets contains the root and intermediate keys and optionally the SSH
|
|
|
|
# private keys
|
|
|
|
secrets:
|
|
|
|
# ca_password contains the password used to encrypt x509.intermediate_ca_key, ssh.host_ca_key and ssh.user_ca_key
|
|
|
|
# This value must be base64 encoded.
|
|
|
|
ca_password:
|
|
|
|
provisioner_password:
|
|
|
|
|
|
|
|
x509:
|
|
|
|
# intermediate_ca_key contains the contents of your encrypted intermediate CA key
|
|
|
|
intermediate_ca_key: |
|
|
|
|
|
|
|
|
|
|
|
|
# root_ca_key contains the contents of your encrypted root CA key
|
|
|
|
# Note that this value can be omitted without impacting the functionality of step-certificates
|
|
|
|
# If supplied, this should be encrypted using a unique password that is not used for encrypting
|
|
|
|
# the intermediate_ca_key, ssh.host_ca_key or ssh.user_ca_key.
|
|
|
|
root_ca_key: |
|
|
|
|
|