teepot/examples/k8s/vault-unseal-pod-0.yaml
Harald Hoyer 3257f316b5
feat(ci): switch to GitHub Container Registry for images
Updated the workflow to push container images to GitHub Container Registry instead of Docker Hub. Added a login step for GHCR and updated image tagging and pushing commands accordingly.

Signed-off-by: Harald Hoyer <harald@matterlabs.dev>
2025-04-02 17:10:20 +02:00

40 lines
1.1 KiB
YAML

apiVersion: v1
kind: Pod
metadata:
labels:
app: teepot-vault-unseal-0
name: teepot-vault-unseal-0
namespace: stage2
spec:
tolerations:
- key: sgx.intel.com/provision
operator: Exists
effect: NoSchedule
containers:
- image: ghcr.io/matter-labs/teepot-vault-unseal-sgx-azure:latest
name: vault-unseal
imagePullPolicy: Always
env:
- name: VAULT_ADDR
value: "https://teepot-vault-0.teepot-vault:8210"
- name: ALLOWED_TCB_LEVELS
value: "SwHardeningNeeded"
- name: VAULT_SGX_ALLOWED_TCB_LEVELS
value: "SwHardeningNeeded"
# - name: VAULT_SGX_MRENCLAVE
# value: "7754423259719411a536d3a11d0bf764b0910e44a9e15721d879d763a5f3fa39"
- name: VAULT_SGX_MRSIGNER
value: "c5591a72b8b86e0d8814d6e8750e3efe66aea2d102b8ba2405365559b858697d"
ports:
- containerPort: 8443
name: https
protocol: TCP
resources:
limits:
sgx.intel.com/epc: "10Mi"
requests:
sgx.intel.com/epc: "10Mi"
securityContext:
privileged: true
restartPolicy: Never
status: { }