oc-k8s/opencloud/dev-values.yaml

190 lines
4.3 KiB
YAML
Raw Normal View History

env: dev # For storage class provisioning
host: localhost # For reverse proxy rule
mongo-express:
enabled: true
mongodbServer: dev-mongodb.dev
mongodbPort: 27017
mongodbEnableAdmin: true
mongodbAdminUsername: root
mongodbAdminPassword: rootpwd
siteBaseUrl: /mongoexpress
basicAuthUsername: test
basicAuthPassword: testme
mongodb:
enabled: false
mongodb:
enabled: true
global:
defaultStorageClass: kind-sc
storageClass: kind-sc
architecture: standalone
useStatefulSet: false
auth:
rootUser: root
rootPassword: rootpwd
usernames: []
passwords: []
resourcesPreset: "small"
replicaCount: 1
persistence:
enabled: true
storageClass: kind-sc
2024-11-29 16:35:05 +01:00
existingClaim: mongo-pvc
accessModes:
- ReadWriteOnce
size: 100Mi
persistentVolumeClaimRetentionPolicy:
enabled: true
whenDeleted: Retain
whenScaled: Retain
arbiter:
enabled: false
livenessProbe:
enabled: true
readinessProbe:
enabled: true
nats:
enabled: true
jetstream:
enabled: true
fileStore:
size: 20Mi
storageClassName: kind-sc
2024-12-02 13:57:37 +01:00
openldap:
enabled: true
test:
enabled: false
ltb-passwd:
2024-12-02 13:57:37 +01:00
enabled: false
replicaCount: 1
image:
repository: osixia/openldap
tag: 1.5.0
tls:
enabled: false
env:
2024-12-02 13:57:37 +01:00
LDAP_ORGANISATION: "Acme opencloud"
LDAP_DOMAIN: "acme.com"
LDAP_BACKEND: "mdb"
LDAP_TLS: "false"
LDAP_TLS_ENFORCE: "false"
2024-12-02 13:57:37 +01:00
LDAP_REMOVE_CONFIG_AFTER_SETUP: "true"
adminPassword: "goaChai9"
configPassword: "xaidee2M"
phpldapadmin:
enabled: false
2024-12-02 13:57:37 +01:00
persistence:
enabled: true
accessMode: ReadWriteOnce
size: 10Mi
storageClass: kind-sc
replication:
enabled: false
2024-12-02 13:57:37 +01:00
customLdifFiles:
01-schema.ldif: |-
dn: ou=groups,dc=acme,dc=com
objectClass: organizationalUnit
ou: groups
dn: ou=users,dc=acme,dc=com
objectClass: organizationalUnit
ou: users
2024-12-02 13:57:37 +01:00
dn: cn=lastGID,dc=acme,dc=com
objectClass: device
objectClass: top
description: Records the last GID used to create a Posix group. This prevents the re-use of a GID from a deleted group.
cn: lastGID
serialNumber: 2001
2024-12-02 13:57:37 +01:00
dn: cn=lastUID,dc=acme,dc=com
objectClass: device
objectClass: top
serialNumber: 2001
description: Records the last UID used to create a Posix account. This prevents the re-use of a UID from a deleted account.
cn: lastUID
02-ldapadmin.ldif : |-
dn: cn=ldapadmin,ou=groups,dc=acme,dc=com
objectClass: top
objectClass: posixGroup
cn: ldapadmin
memberUid: acme.ldapadmin
gidNumber: 2001
dn: uid=acme.ldapadmin,ou=users,dc=acme,dc=com
givenName: ldapadmin
sn: ldapadmin
uid: acme.ldapadmin
cn: acmeldapadmin
objectClass: person
objectClass: inetOrgPerson
objectClass: posixAccount
userPassword:: e0NSWVBUfSQ2JDhycFZxbk5NJHNmWVhBYUNYUzdZbXFhR1VWTjdJa20wT2hXLmVtT3oua2x5L3V5YUdjNE81MDVEalU0R2ZMb0hTaFVwNUkvVUxFT0JubWJ2d29meFNFcXIuaFRVMm0u
uidNumber: 2001
gidNumber: 2001
loginShell: /bin/bash
homeDirectory: /home/acme.ldapadmin
#acme.ldapadmin ia3Bahr3
# ldap user manager configuration
ldapUserManager:
2024-12-02 13:57:37 +01:00
enabled: true
env:
2024-12-02 13:57:37 +01:00
SERVER_HOSTNAME: "users.acme.com"
LDAP_BASE_DN: "dc=acme,dc=com"
LDAP_REQUIRE_STARTTLS: "false"
LDAP_ADMINS_GROUP: "ldapadmin"
2024-12-02 13:57:37 +01:00
LDAP_ADMIN_BIND_DN: "cn=admin,dc=acme,dc=com"
LDAP_ADMIN_BIND_PWD: "goaChai9"
LDAP_IGNORE_CERT_ERRORS: "true"
EMAIL_DOMAIN: ""
NO_HTTPS: "true"
SERVER_PATH: "/users"
2024-12-02 13:57:37 +01:00
ORGANISATION_NAME: "Acme"
LDAP_USER_OU: "users"
LDAP_GROUP_OU: "groups"
ACCEPT_WEAK_PASSWORDS: "true"
resources:
limits:
cpu: "128m"
memory: "256Mi"
requests:
cpu: "128m"
memory: "256Mi"
2024-11-28 11:09:51 +01:00
traefik:
enabled: true
service:
type: NodePort
ingressRoute:
dashboard:
enabled: true
matchRule: Host(`localhost`) && PathPrefix(`/api`) || PathPrefix(`/dashboard`)
entryPoints: [web]
ports:
web:
2024-12-02 13:20:11 +01:00
nodePort: 30950
hydra:
enabled: true
maester:
enabled: false
hydra:
dev: true
config:
dsn: memory
urls:
login: http://localhost/auth/login
consent: http://localhost/auth/consent
logout: http://localhost/auth/logout
self:
issuer: http://localhost/auth