oc-k8s/opencloud/dev-values.yaml

212 lines
4.7 KiB
YAML
Raw Normal View History

env: dev # For storage class provisioning
host: localhost # For reverse proxy rule
mongo-express:
enabled: true
mongodbServer: dev-mongodb.dev
mongodbPort: 27017
mongodbEnableAdmin: true
mongodbAdminUsername: root
mongodbAdminPassword: rootpwd
siteBaseUrl: /mongoexpress
basicAuthUsername: test
basicAuthPassword: testme
mongodb:
enabled: false
mongodb:
enabled: true
global:
defaultStorageClass: kind-sc
storageClass: kind-sc
architecture: standalone
useStatefulSet: false
auth:
rootUser: root
rootPassword: rootpwd
usernames: []
passwords: []
resourcesPreset: "small"
replicaCount: 1
persistence:
enabled: true
storageClass: kind-sc
2024-11-29 16:35:05 +01:00
existingClaim: mongo-pvc
accessModes:
- ReadWriteOnce
size: 100Mi
persistentVolumeClaimRetentionPolicy:
enabled: true
whenDeleted: Retain
whenScaled: Retain
arbiter:
enabled: false
livenessProbe:
enabled: true
readinessProbe:
enabled: true
nats:
enabled: true
jetstream:
enabled: true
fileStore:
size: 20Mi
storageClassName: kind-sc
2024-12-02 13:57:37 +01:00
openldap:
enabled: true
test:
enabled: false
ltb-passwd:
2024-12-02 13:57:37 +01:00
enabled: false
replicaCount: 1
image:
repository: osixia/openldap
tag: 1.5.0
tls:
enabled: false
env:
LDAP_ORGANISATION: "Example opencloud"
LDAP_DOMAIN: "example.com"
2024-12-02 13:57:37 +01:00
LDAP_BACKEND: "mdb"
LDAP_TLS: "false"
LDAP_TLS_ENFORCE: "false"
2024-12-02 13:57:37 +01:00
LDAP_REMOVE_CONFIG_AFTER_SETUP: "true"
adminPassword: "admin@password"
configPassword: "config@password"
phpldapadmin:
enabled: false
2024-12-02 13:57:37 +01:00
persistence:
enabled: true
accessMode: ReadWriteOnce
size: 10Mi
storageClass: kind-sc
replication:
enabled: false
2024-12-02 13:57:37 +01:00
customLdifFiles:
01-schema.ldif: |-
dn: ou=groups,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: organizationalUnit
ou: groups
dn: ou=users,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: organizationalUnit
ou: users
dn: cn=lastGID,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: device
objectClass: top
description: Records the last GID used to create a Posix group. This prevents the re-use of a GID from a deleted group.
cn: lastGID
serialNumber: 2001
dn: cn=lastUID,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: device
objectClass: top
serialNumber: 2001
description: Records the last UID used to create a Posix account. This prevents the re-use of a UID from a deleted account.
cn: lastUID
02-ldapadmin.ldif : |-
dn: cn=ldapadmin,ou=groups,dc=example,dc=com
2024-12-02 13:57:37 +01:00
objectClass: top
objectClass: posixGroup
cn: ldapadmin
memberUid: ldapadmin
2024-12-02 13:57:37 +01:00
gidNumber: 2001
dn: uid=ldapadmin,ou=users,dc=example,dc=com
givenName: ldap
sn: admin
uid: ldapadmin
cn: ldapadmin
mail: ldapadmin@example.com
2024-12-02 13:57:37 +01:00
objectClass: person
objectClass: inetOrgPerson
objectClass: posixAccount
userPassword: ldapadmin
2024-12-02 13:57:37 +01:00
uidNumber: 2001
gidNumber: 2001
loginShell: /bin/bash
homeDirectory: /home/ldapadmin
2024-12-02 13:57:37 +01:00
# ldap user manager configuration
ldapUserManager:
2024-12-02 13:57:37 +01:00
enabled: true
env:
SERVER_HOSTNAME: "users.example.com"
LDAP_BASE_DN: "dc=example,dc=com"
LDAP_REQUIRE_STARTTLS: "false"
LDAP_ADMINS_GROUP: "ldapadmin"
LDAP_ADMIN_BIND_DN: "cn=admin,dc=example,dc=com"
LDAP_ADMIN_BIND_PWD: "admin@password"
LDAP_IGNORE_CERT_ERRORS: "true"
EMAIL_DOMAIN: ""
NO_HTTPS: "true"
SERVER_PATH: "/users"
ORGANISATION_NAME: "Example"
LDAP_USER_OU: "users"
LDAP_GROUP_OU: "groups"
ACCEPT_WEAK_PASSWORDS: "true"
resources:
limits:
cpu: "128m"
memory: "256Mi"
requests:
cpu: "128m"
memory: "256Mi"
2024-11-28 11:09:51 +01:00
traefik:
enabled: true
service:
type: NodePort
ingressRoute:
dashboard:
enabled: true
matchRule: Host(`localhost`) && PathPrefix(`/api`) || PathPrefix(`/dashboard`)
entryPoints: [web]
ports:
web:
2024-12-02 13:20:11 +01:00
nodePort: 30950
hydra:
enabled: true
maester:
enabled: true
2024-12-02 13:20:11 +01:00
hydra:
dev: true
config:
dsn: memory
urls:
login: http://localhost/authentication/login
consent: http://localhost/consent/consent
logout: http://localhost/authentication/logout
2024-12-02 13:20:11 +01:00
self:
issuer: http://localhost/idp
keto:
enabled: true
ocAuth:
enabled: false
image: oc-auth:latest
authType: hydra
hydra:
adminRole: admin
openCloudOauth2ClientSecretName: oc-auth-got-secret
ldap:
bindDn: "cn=admin,dc=example,dc=com"
binPwd: "password"
baseDn: "dc=example,dc=com"
roleBaseDn: "ou=AppRoles,dc=example,dc=com"
resources:
limits:
cpu: "128m"
memory: "128Mi"
requests:
cpu: "128m"
memory: "256Mi"