104 lines
3.2 KiB
Plaintext
104 lines
3.2 KiB
Plaintext
# Copyright 2015 clair authors
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
# you may not use this file except in compliance with the License.
|
|
# You may obtain a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
# See the License for the specific language governing permissions and
|
|
# limitations under the License.
|
|
|
|
# The values specified here are the default values that Clair uses if no configuration file is specified or if the keys are not defined.
|
|
clair:
|
|
database:
|
|
# Database driver
|
|
type: pgsql
|
|
options:
|
|
# PostgreSQL Connection string
|
|
# https://www.postgresql.org/docs/current/static/libpq-connect.html#LIBPQ-CONNSTRING
|
|
source: host=localhost port=5432 user=postgres sslmode=disable statement_timeout=60000
|
|
|
|
# Number of elements kept in the cache
|
|
# Values unlikely to change (e.g. namespaces) are cached in order to save prevent needless roundtrips to the database.
|
|
cachesize: 16384
|
|
|
|
# 32-bit URL-safe base64 key used to encrypt pagination tokens
|
|
# If one is not provided, it will be generated.
|
|
# Multiple clair instances in the same cluster need the same value.
|
|
paginationkey:
|
|
|
|
api:
|
|
# v3 grpc/RESTful API server address
|
|
addr: "0.0.0.0:6060"
|
|
|
|
# Health server address
|
|
# This is an unencrypted endpoint useful for load balancers to check to healthiness of the clair server.
|
|
healthaddr: "0.0.0.0:6061"
|
|
|
|
# Deadline before an API request will respond with a 503
|
|
timeout: 900s
|
|
|
|
# Optional PKI configuration
|
|
# If you want to easily generate client certificates and CAs, try the following projects:
|
|
# https://github.com/coreos/etcd-ca
|
|
# https://github.com/cloudflare/cfssl
|
|
servername:
|
|
cafile:
|
|
keyfile:
|
|
certfile:
|
|
|
|
worker:
|
|
namespace_detectors:
|
|
- os-release
|
|
- lsb-release
|
|
- apt-sources
|
|
- alpine-release
|
|
- redhat-release
|
|
|
|
feature_listers:
|
|
- apk
|
|
- dpkg
|
|
- rpm
|
|
|
|
updater:
|
|
# Frequency the database will be updated with vulnerabilities from the default data sources
|
|
# The value 0 disables the updater entirely.
|
|
interval: 2h
|
|
enabledupdaters:
|
|
- debian
|
|
- ubuntu
|
|
- rhel
|
|
- oracle
|
|
- alpine
|
|
|
|
notifier:
|
|
# Number of attempts before the notification is marked as failed to be sent
|
|
attempts: 3
|
|
|
|
# Duration before a failed notification is retried
|
|
renotifyinterval: 2h
|
|
|
|
http:
|
|
# Optional endpoint that will receive notifications via POST requests
|
|
endpoint:
|
|
|
|
# Optional PKI configuration
|
|
# If you want to easily generate client certificates and CAs, try the following projects:
|
|
# https://github.com/cloudflare/cfssl
|
|
# https://github.com/coreos/etcd-ca
|
|
servername:
|
|
cafile:
|
|
keyfile:
|
|
certfile:
|
|
|
|
# Optional HTTP Proxy: must be a valid URL (including the scheme).
|
|
proxy:
|
|
|
|
grafeas:
|
|
enabled: false
|
|
addr: "http://grafeas.example.com"
|
|
projectId: "vuln-scanner" |