oc-k8s/opencloud/dev-values.yaml

265 lines
5.9 KiB
YAML
Raw Normal View History

env: dev # For storage class provisioning
host: localhost # For reverse proxy rule
mongo-express:
enabled: true
mongodbServer: dev-mongodb.dev
mongodbPort: 27017
mongodbEnableAdmin: true
mongodbAdminUsername: root
mongodbAdminPassword: rootpwd
siteBaseUrl: /mongoexpress
basicAuthUsername: test
basicAuthPassword: testme
mongodb:
enabled: false
mongodb:
enabled: true
global:
defaultStorageClass: kind-sc
storageClass: kind-sc
architecture: standalone
useStatefulSet: false
auth:
2024-12-16 14:50:39 +01:00
enabled: true
rootUser: root
rootPassword: rootpwd
2024-12-16 14:50:39 +01:00
databases: ["DC_myDC"]
usernames: ["opencloud"]
passwords: ["opencloud"]
resourcesPreset: "small"
replicaCount: 1
persistence:
enabled: true
storageClass: kind-sc
2024-11-29 16:35:05 +01:00
existingClaim: mongo-pvc
accessModes:
- ReadWriteOnce
size: 100Mi
persistentVolumeClaimRetentionPolicy:
enabled: true
whenDeleted: Retain
whenScaled: Retain
arbiter:
enabled: false
livenessProbe:
enabled: true
readinessProbe:
enabled: true
nats:
enabled: true
jetstream:
enabled: true
fileStore:
size: 20Mi
storageClassName: kind-sc
2024-12-02 13:57:37 +01:00
openldap:
enabled: true
test:
enabled: false
ltb-passwd:
2024-12-02 13:57:37 +01:00
enabled: false
replicaCount: 1
image:
repository: osixia/openldap
tag: 1.5.0
tls:
enabled: false
env:
LDAP_ORGANISATION: "Example opencloud"
LDAP_DOMAIN: "example.com"
2024-12-02 13:57:37 +01:00
LDAP_BACKEND: "mdb"
LDAP_TLS: "false"
LDAP_TLS_ENFORCE: "false"
2024-12-02 13:57:37 +01:00
LDAP_REMOVE_CONFIG_AFTER_SETUP: "true"
adminPassword: "admin@password"
configPassword: "config@password"
phpldapadmin:
enabled: false
2024-12-02 13:57:37 +01:00
persistence:
enabled: true
accessMode: ReadWriteOnce
size: 10Mi
storageClass: kind-sc
replication:
enabled: false
2024-12-02 13:57:37 +01:00
customLdifFiles:
01-schema.ldif: |-
dn: ou=groups,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: organizationalUnit
ou: groups
dn: ou=users,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: organizationalUnit
ou: users
dn: cn=lastGID,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: device
objectClass: top
description: Records the last GID used to create a Posix group. This prevents the re-use of a GID from a deleted group.
cn: lastGID
serialNumber: 2001
dn: cn=lastUID,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: device
objectClass: top
serialNumber: 2001
description: Records the last UID used to create a Posix account. This prevents the re-use of a UID from a deleted account.
cn: lastUID
2024-12-16 14:50:39 +01:00
dn: cn=everybody,ou=groups,dc=example,dc=com
objectClass: top
objectClass: posixGroup
cn: everybody
memberUid: admin
gidNumber: 2003
2024-12-02 13:57:37 +01:00
02-ldapadmin.ldif : |-
dn: cn=ldapadmin,ou=groups,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: top
objectClass: posixGroup
cn: ldapadmin
memberUid: ldapadmin
2024-12-02 13:57:37 +01:00
gidNumber: 2001
dn: uid=ldapadmin,ou=users,dc=example,dc=com
givenName: ldap
sn: admin
uid: ldapadmin
cn: ldapadmin
mail: ldapadmin@example.com
2024-12-02 13:57:37 +01:00
objectClass: person
objectClass: inetOrgPerson
objectClass: posixAccount
userPassword: ldapadmin
2024-12-02 13:57:37 +01:00
uidNumber: 2001
gidNumber: 2001
loginShell: /bin/bash
homeDirectory: /home/ldapadmin
2024-12-02 13:57:37 +01:00
2024-12-16 14:50:39 +01:00
03-opencloudadmin.ldif : |-
dn: cn=admin,ou=groups,dc=example,dc=com
objectClass: top
objectClass: posixGroup
cn: admin
memberUid: admin
gidNumber: 2002
dn: uid=admin,ou=users,dc=example,dc=com
givenName: John
sn: Doe
uid: admin
mail: john.doe@example.com
cn: JohnDoe
objectClass: person
objectClass: inetOrgPerson
objectClass: posixAccount
userPassword:: e0NSWVBUfSQ2JDdTZ0daU1FXJGw1ZWRTTHVDaDV6a0NvUlllZzFLd3MwUHRKQ
jJQL09CQWdoc0RkbWhzTXJPcEpCbzR3b01yNWJQcjlubi8udWdzM25LcHlKQmt2eHVJWFM0eUQ1
cnox
uidNumber: 2002
gidNumber: 2002
loginShell: /bin/bash
homeDirectory: /home/admin
2024-12-02 13:57:37 +01:00
# ldap user manager configuration
ldapUserManager:
2024-12-02 13:57:37 +01:00
enabled: true
env:
SERVER_HOSTNAME: "users.example.com"
LDAP_BASE_DN: "dc=example,dc=com"
LDAP_REQUIRE_STARTTLS: "false"
LDAP_ADMINS_GROUP: "ldapadmin"
LDAP_ADMIN_BIND_DN: "cn=admin,dc=example,dc=com"
LDAP_ADMIN_BIND_PWD: "admin@password"
LDAP_IGNORE_CERT_ERRORS: "true"
EMAIL_DOMAIN: ""
NO_HTTPS: "true"
SERVER_PATH: "/users"
ORGANISATION_NAME: "Example"
LDAP_USER_OU: "users"
LDAP_GROUP_OU: "groups"
ACCEPT_WEAK_PASSWORDS: "true"
resources:
limits:
cpu: "128m"
memory: "256Mi"
requests:
cpu: "128m"
memory: "256Mi"
2024-11-28 11:09:51 +01:00
traefik:
enabled: true
service:
type: NodePort
ingressRoute:
dashboard:
enabled: true
matchRule: Host(`localhost`) && PathPrefix(`/api`) || PathPrefix(`/dashboard`)
entryPoints: [web]
ports:
web:
2024-12-02 13:20:11 +01:00
nodePort: 30950
hydra:
enabled: true
maester:
enabled: true
2024-12-02 13:20:11 +01:00
hydra:
dev: true
config:
dsn: memory
urls:
login: http://localhost/authentication/login
consent: http://localhost/consent/consent
logout: http://localhost/authentication/logout
2024-12-02 13:20:11 +01:00
self:
issuer: http://localhost/idp
keto:
enabled: true
2024-12-16 14:50:39 +01:00
keto:
config:
serve:
read:
port: 4466
write:
port: 4467
metrics:
port: 4468
namespaces:
- id: 0
name: open-cloud
dsn: memory
ocAuth:
2024-12-16 14:50:39 +01:00
enabled: true
image: oc/oc-auth:0.0.1
authType: hydra
2024-12-16 14:50:39 +01:00
keto:
adminRole: admin
2024-12-16 14:50:39 +01:00
hydra:
openCloudOauth2ClientSecretName: oc-auth-got-secret
ldap:
bindDn: "cn=admin,dc=example,dc=com"
2024-12-16 14:50:39 +01:00
binPwd: "admin@password"
baseDn: "dc=example,dc=com"
roleBaseDn: "ou=AppRoles,dc=example,dc=com"
resources:
limits:
cpu: "128m"
memory: "128Mi"
requests:
cpu: "128m"
memory: "256Mi"
2024-12-16 14:50:39 +01:00
loki:
enabled: false
grafana:
enabled: false