Sonatype Nexus Repository Manager - Universal Binary repository
- https://www.sonatype.com/nexus-repository-oss
- https://github.com/sonatype/nexus-public
The upstream Nexus Repository Manager release notes may help when reviewing this package. We do not track an upstream chart for this package.
- Kubernetes Cluster deployed
- Kubernetes config installed in
~/.kube/config
- Helm installed
Install Helm
https://helm.sh/docs/intro/install/
- Clone down the repository
- cd into directory
helm install nexus-repository-manager chart/
Key | Type | Default | Description |
---|---|---|---|
hostname | string | "nexus" |
Big Bang Additions |
domain | string | "bigbang.dev" |
|
istio.enabled | bool | false |
|
istio.hardened.enabled | bool | false |
|
istio.hardened.customAuthorizationPolicies | list | [] |
|
istio.hardened.outboundTrafficPolicyMode | string | "REGISTRY_ONLY" |
|
istio.hardened.customServiceEntries | list | [] |
|
istio.hardened.monitoring.enabled | bool | true |
|
istio.hardened.monitoring.namespaces[0] | string | "monitoring" |
|
istio.hardened.monitoring.principals[0] | string | "cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-prometheus" |
|
istio.injection | string | "disabled" |
|
istio.nexus.gateways[0] | string | "istio-system/main" |
|
istio.nexus.hosts[0] | string | "{{ .Values.hostname }}.{{ .Values.domain }}" |
|
istio.mtls.mode | string | "STRICT" |
|
networkPolicies.enabled | bool | false |
|
networkPolicies.ingressLabels.app | string | "istio-ingressgateway" |
|
networkPolicies.ingressLabels.istio | string | "ingressgateway" |
|
networkPolicies.additionalPolicies | list | [] |
|
custom_admin_password | string | "" |
|
custom_metrics_password | string | "" |
|
monitoring.enabled | bool | false |
|
monitoring.serviceMonitor.createMetricsUser | bool | false |
|
monitoring.serviceMonitor.additionalLabels | object | {} |
|
monitoring.serviceMonitor.scheme | string | "http" |
|
license_key | string | "" |
|
license.mountPath | string | "/nexus-data/sonatype-license.lic" |
|
license.subPath | string | "sonatype-license.lic" |
|
realms[0] | string | "NexusAuthenticatingRealm" |
|
sso.enabled | bool | false |
|
sso.idp_data.entityId | string | "" |
|
sso.idp_data.usernameAttribute | string | "" |
|
sso.idp_data.firstNameAttribute | string | "" |
|
sso.idp_data.lastNameAttribute | string | "" |
|
sso.idp_data.emailAttribute | string | "" |
|
sso.idp_data.groupsAttribute | string | "" |
|
sso.idp_data.validateResponseSignature | bool | true |
|
sso.idp_data.validateAssertionSignature | bool | true |
|
sso.idp_data.idpMetadata | string | "" |
|
sso.role[0].id | string | "nexus" |
|
sso.role[0].name | string | "nexus" |
|
sso.role[0].description | string | "nexus group" |
|
sso.role[0].privileges[0] | string | "nx-all" |
|
sso.role[0].roles[0] | string | "nx-admin" |
|
proxy.enabled | bool | false |
|
proxy.request.tid | int | 1 |
|
proxy.request.action | string | "coreui_HttpSettings" |
|
proxy.request.method | string | "update" |
|
proxy.request.type | string | "rpc" |
|
proxy.request.data[0].userAgentSuffix | string | nil |
|
proxy.request.data[0].timeout | string | nil |
|
proxy.request.data[0].retries | string | nil |
|
proxy.request.data[0].httpEnabled | bool | false |
|
proxy.request.data[0].httpHost | string | nil |
|
proxy.request.data[0].httpPort | string | nil |
|
proxy.request.data[0].httpAuthEnabled | string | nil |
|
proxy.request.data[0].httpAuthUsername | string | nil |
|
proxy.request.data[0].httpAuthPassword | string | nil |
|
proxy.request.data[0].httpAuthNtlmHost | string | nil |
|
proxy.request.data[0].httpAuthNtlmDomain | string | nil |
|
proxy.request.data[0].httpsEnabled | bool | false |
|
proxy.request.data[0].httpsHost | string | nil |
|
proxy.request.data[0].httpsPort | string | nil |
|
proxy.request.data[0].httpsAuthEnabled | string | nil |
|
proxy.request.data[0].httpsAuthUsername | string | nil |
|
proxy.request.data[0].httpsAuthPassword | string | nil |
|
proxy.request.data[0].httpsAuthNtlmHost | string | nil |
|
proxy.request.data[0].httpsAuthNtlmDomain | string | nil |
|
proxy.request.data[0].nonProxyHosts | list | [] |
|
job_image.repository | string | "registry1.dso.mil/ironbank/redhat/ubi/ubi9-minimal" |
|
job_image.tag | float | 9.5 |
|
job_image.pullPolicy | string | "IfNotPresent" |
|
openshift | bool | false |
|
bbtests.enabled | bool | false |
|
bbtests.cypress.artifacts | bool | true |
|
bbtests.cypress.envs.cypress_nexus_url | string | "http://nexus-nexus-repository-manager:8081" |
|
bbtests.cypress.envs.cypress_nexus_user | string | "admin" |
|
bbtests.cypress.secretEnvs[0].name | string | "cypress_nexus_pass" |
|
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.name | string | "nexus-repository-manager-secret" |
|
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.key | string | "admin.password" |
|
bbtests.cypress.resources.requests.cpu | int | 2 |
|
bbtests.cypress.resources.requests.memory | string | "4Gi" |
|
bbtests.cypress.resources.limits.cpu | int | 2 |
|
bbtests.cypress.resources.limits.memory | string | "4Gi" |
|
bbtests.scripts.image | string | "registry1.dso.mil/bigbang-ci/devops-tester:1.1.2" |
|
bbtests.scripts.additionalVolumes[0].name | string | "docker-config" |
|
bbtests.scripts.additionalVolumes[0].secret.secretName | string | "private-registry" |
|
bbtests.scripts.additionalVolumes[0].secret.items[0].key | string | ".dockerconfigjson" |
|
bbtests.scripts.additionalVolumes[0].secret.items[0].path | string | "auth.json" |
|
bbtests.scripts.additionalVolumeMounts[0].name | string | "docker-config" |
|
bbtests.scripts.additionalVolumeMounts[0].mountPath | string | "/.docker/" |
|
bbtests.scripts.envs.docker_host | string | "nexus-nexus-repository-manager-docker-5000:5000" |
|
bbtests.scripts.envs.docker_user | string | "admin" |
|
bbtests.scripts.secretEnvs[0].name | string | "docker_password" |
|
bbtests.scripts.secretEnvs[0].valueFrom.secretKeyRef.name | string | "nexus-repository-manager-secret" |
|
bbtests.scripts.secretEnvs[0].valueFrom.secretKeyRef.key | string | "admin.password" |
|
statefulset | object | {"enabled":false} |
End of BigBang Additions |
deploymentStrategy | string | "Recreate" |
|
image.repository | string | "registry1.dso.mil/ironbank/sonatype/nexus/nexus" |
|
image.tag | string | "3.75.0-06" |
|
image.pullPolicy | string | "IfNotPresent" |
|
imagePullSecrets[0].name | string | "private-registry" |
|
nexus.affinity | object | {} |
|
nexus.extraLabels.app | string | "nexus-repository-manager" |
|
nexus.blobstores.enabled | bool | false |
|
nexus.blobstores.blobstore | list | [{"blobstore_data":{"bucketConfiguration":{"bucket":{"expiration":3,"name":"your-bucket-name","prefix":"","region":"your-bucket-region"},"bucketSecurity":{"accessKeyId":"your-accessKeyId","role":"your-role","secretAccessKey":"your-secretAccessKey","sessionToken":"your-sessionToken"}},"name":"test-nexus-blobstore"},"name":"test-nexus-blobstore","type":"s3"}] |
.type must be one of s3 , azure , or file . .blobstore_data must match the schema described in the Nexus blobstore API docs for more details. |
nexus.repository.enabled | bool | false |
|
nexus.repository.repo[0].name | string | "test-nexus" |
|
nexus.repository.repo[0].format | string | "raw" |
|
nexus.repository.repo[0].type | string | "hosted" |
|
nexus.repository.repo[0].repo_data.name | string | "test-nexus" |
|
nexus.repository.repo[0].repo_data.online | bool | true |
|
nexus.repository.repo[0].repo_data.storage.blobStoreName | string | "default" |
|
nexus.repository.repo[0].repo_data.storage.strictContentTypeValidation | bool | true |
|
nexus.repository.repo[0].repo_data.storage.writePolicy | string | "allow_once" |
|
nexus.repository.repo[0].repo_data.cleanup.policyNames[0] | string | "string" |
|
nexus.repository.repo[0].repo_data.component.proprietaryComponents | bool | true |
|
nexus.repository.repo[0].repo_data.raw.contentDisposition | string | "ATTACHMENT" |
|
nexus.docker.enabled | bool | false |
|
nexus.env[0].name | string | "INSTALL4J_ADD_VM_PARAMS" |
|
nexus.env[0].value | string | "-Dcom.redhat.fips=false -Xms2703M -Xmx2703M -XX:MaxDirectMemorySize=2703M -XX:+UnlockExperimentalVMOptions -XX:+UseContainerSupport -Djava.util.prefs.userRoot=/nexus-data/javaprefs" |
|
nexus.env[1].name | string | "NEXUS_SECURITY_RANDOMPASSWORD" |
|
nexus.env[1].value | string | "true" |
|
nexus.properties.override | bool | false |
|
nexus.properties.data | object | {} |
|
nexus.resources.requests.cpu | int | 4 |
|
nexus.resources.requests.memory | string | "8Gi" |
|
nexus.resources.limits.cpu | int | 4 |
|
nexus.resources.limits.memory | string | "8Gi" |
|
nexus.nexusPort | int | 8081 |
|
nexus.securityContext.runAsNonRoot | bool | true |
|
nexus.securityContext.fsGroup | int | 2000 |
|
nexus.securityContext.runAsUser | int | 200 |
|
nexus.securityContext.runAsGroup | int | 2000 |
|
nexus.containerSecurityContext.capabilities.drop[0] | string | "ALL" |
|
nexus.podAnnotations | object | {} |
|
nexus.livenessProbe.initialDelaySeconds | int | 30 |
|
nexus.livenessProbe.periodSeconds | int | 30 |
|
nexus.livenessProbe.failureThreshold | int | 6 |
|
nexus.livenessProbe.timeoutSeconds | int | 10 |
|
nexus.livenessProbe.path | string | "/" |
|
nexus.readinessProbe.initialDelaySeconds | int | 30 |
|
nexus.readinessProbe.periodSeconds | int | 30 |
|
nexus.readinessProbe.failureThreshold | int | 6 |
|
nexus.readinessProbe.timeoutSeconds | int | 10 |
|
nexus.readinessProbe.path | string | "/" |
|
nexus.hostAliases | list | [] |
|
nameOverride | string | "" |
|
fullnameOverride | string | "" |
|
deployment.annotations | object | {} |
|
deployment.initContainers | string | nil |
|
deployment.postStart.command | string | nil |
|
deployment.preStart.command | string | nil |
|
deployment.terminationGracePeriodSeconds | int | 120 |
|
deployment.additionalContainers | string | nil |
|
deployment.additionalVolumes | string | nil |
|
deployment.additionalVolumeMounts | string | nil |
|
ingress.enabled | bool | false |
|
ingress.ingressClassName | string | "nginx" |
|
ingress.annotations."nginx.ingress.kubernetes.io/proxy-body-size" | string | "0" |
|
ingress.hostPath | string | "/" |
|
ingress.hostRepo | string | "repo.demo" |
|
service.name | string | "nexus3" |
|
service.enabled | bool | true |
|
service.labels | object | {} |
|
service.annotations | object | {} |
|
service.type | string | "ClusterIP" |
|
route.enabled | bool | false |
|
route.name | string | "docker" |
|
route.portName | string | "docker" |
|
route.labels | string | nil |
|
route.annotations | string | nil |
|
nexusProxyRoute.enabled | bool | false |
|
nexusProxyRoute.labels | string | nil |
|
nexusProxyRoute.annotations | string | nil |
|
persistence.enabled | bool | true |
|
persistence.accessMode | string | "ReadWriteOnce" |
|
persistence.storageSize | string | "8Gi" |
|
tolerations | list | [] |
|
config.enabled | bool | false |
|
config.mountPath | string | "/sonatype-nexus-conf" |
|
config.data | list | [] |
|
secret.enabled | bool | true |
|
secret.mountPath | string | "/nexus-data/admin.password" |
|
secret.subPath | string | "admin.password" |
|
secret.readOnly | bool | true |
|
serviceAccount.create | bool | true |
|
serviceAccount.annotations | object | {} |
|
serviceAccount.name | string | "" |
Please see the contributing guide if you are interested in contributing.
This file is programatically generated using helm-docs
and some BigBang-specific templates. The gluon
repository has instructions for regenerating package READMEs.