# Default values for openldap. # This is a YAML-formatted file. # Declare variables to be passed into your templates. replicaCount: 3 # Define deployment strategy - IMPORTANT: use rollingUpdate: null when use Recreate strategy. # It prevents from merging with existing map keys which are forbidden. strategy: {} # type: RollingUpdate # rollingUpdate: # maxSurge: 1 # maxUnavailable: 0 # # or # # type: Recreate # rollingUpdate: null image: # From repository https://github.com/osixia/docker-openldap repository: osixia/openldap tag: 1.4.0 pullPolicy: Always pullSecret: harbor # Set the container log level # Valid log levels: none, error, warning, info (default), debug, trace logLevel: info # Spcifies an existing secret to be used for admin and config user passwords existingSecret: "" # settings for enabling TLS with custom certificate tls: enabled: true secret: "" # The name of a kubernetes.io/tls type secret to use for TLS CA: enabled: false secret: "" # The name of a generic secret to use for custom CA certificate (ca.crt) ## Add additional labels to all resources extraLabels: {} ## Add additional annotations to pods podAnnotations: {} service: annotations: {} ldapPort: 389 sslLdapPort: 636 ## If service type NodePort, define the value here #ldapPortNodePort: #sslLdapPortNodePort: ## List of IP addresses at which the service is available ## Ref: https://kubernetes.io/docs/user-guide/services/#external-ips ## externalIPs: [] #loadBalancerIP: #loadBalancerSourceRanges: [] type: ClusterIP # Default configuration for openldap as environment variables. These get injected directly in the container. # Use the env variables from https://github.com/osixia/docker-openldap#beginner-guide env: LDAP_LOG_LEVEL: "256" LDAP_ORGANISATION: "Example Inc." LDAP_DOMAIN: "example.org" LDAP_READONLY_USER: "false" LDAP_READONLY_USER_USERNAME: "readonly" LDAP_READONLY_USER_PASSWORD: "readonly" LDAP_RFC2307BIS_SCHEMA: "false" LDAP_BACKEND: "mdb" LDAP_TLS: "true" LDAP_TLS_CRT_FILENAME: "ldap.crt" LDAP_TLS_KEY_FILENAME: "ldap.key" LDAP_TLS_DH_PARAM_FILENAME: "dhparam.pem" LDAP_TLS_CA_CRT_FILENAME: "ca.crt" LDAP_TLS_ENFORCE: "false" CONTAINER_LOG_LEVEL: "4" LDAP_TLS_REQCERT: "never" KEEP_EXISTING_CONFIG: "false" LDAP_REMOVE_CONFIG_AFTER_SETUP: "true" LDAP_SSL_HELPER_PREFIX: "ldap" LDAP_TLS_VERIFY_CLIENT: "never" LDAP_TLS_PROTOCOL_MIN: "3.0" LDAP_TLS_CIPHER_SUITE: "NORMAL" # Default Passwords to use, stored as a secret. # You can override these at install time with # helm install openldap --set openldap.adminPassword=,openldap.configPassword= adminPassword: Not@SecurePassw0rd configPassword: Not@SecurePassw0rd # Custom openldap configuration files used to override default settings # customLdifFiles: # 01-default-users.ldif: |- # Predefine users here replication: enabled: true # Enter the name of your cluster, defaults to "cluster.local" clusterName: "cluster.local" retry: 60 timeout: 1 interval: 00:00:00:10 starttls: "critical" tls_reqcert: "never" ## Persist data to a persistent volume persistence: enabled: true ## database data Persistent Volume Storage Class ## If defined, storageClassName: ## If set to "-", storageClassName: "", which disables dynamic provisioning ## If undefined (the default) or set to null, no storageClassName spec is ## set, choosing the default provisioner. (gp2 on AWS, standard on ## GKE, AWS & OpenStack) ## # storageClass: "standard-singlewriter" accessModes: - ReadWriteOnce size: 8Gi resources: {} # requests: # cpu: "100m" # memory: "256Mi" # limits: # cpu: "500m" # memory: "512Mi" nodeSelector: {} tolerations: [] ## test container details test: enabled: false image: repository: dduportal/bats tag: 0.4.0 ltb-passwd: enabled : true ingress: enabled: true annotations: {} path: / ## Ingress Host hosts: - "ssl-ldap2.example" ldap: server: ldap://openldap searchBase: dc=example,dc=org # existingSecret: openldaptest bindDN: cn=admin,dc=example,dc=org bindPWKey: LDAP_ADMIN_PASSWORD phpldapadmin: enabled: true ingress: enabled: true annotations: {} path: / ## Ingress Host hosts: - phpldapadmin.example env: PHPLDAPADMIN_LDAP_HOSTS: openldap # TODO make it works # "#PYTHON2BASH: # [{'openldap.openldap': # [{'server': [ # {'tls': False}, # {'port':636} # ]}, # {'login': # [{'bind_id': 'cn=admin,dc=example,dc=org'}] # }] # }]"