env: dev # For storage class provisioning host: localhost # For reverse proxy rule mongo-express: enabled: true mongodbServer: dev-mongodb.dev mongodbPort: 27017 mongodbEnableAdmin: true mongodbAdminUsername: root mongodbAdminPassword: rootpwd siteBaseUrl: /mongoexpress basicAuthUsername: test basicAuthPassword: testme mongodb: enabled: false mongodb: enabled: true global: defaultStorageClass: kind-sc storageClass: kind-sc architecture: standalone useStatefulSet: false auth: rootUser: root rootPassword: rootpwd usernames: [] passwords: [] resourcesPreset: "small" replicaCount: 1 persistence: enabled: true storageClass: kind-sc existingClaim: mongo-pvc accessModes: - ReadWriteOnce size: 100Mi persistentVolumeClaimRetentionPolicy: enabled: true whenDeleted: Retain whenScaled: Retain arbiter: enabled: false livenessProbe: enabled: true readinessProbe: enabled: true nats: enabled: true jetstream: enabled: true fileStore: size: 20Mi storageClassName: kind-sc openldap: enabled: true test: enabled: false ltb-passwd: enabled: false replicaCount: 1 image: repository: osixia/openldap tag: 1.5.0 tls: enabled: false env: LDAP_ORGANISATION: "Acme opencloud" LDAP_DOMAIN: "acme.com" LDAP_BACKEND: "mdb" LDAP_TLS: "false" LDAP_TLS_ENFORCE: "false" LDAP_REMOVE_CONFIG_AFTER_SETUP: "true" adminPassword: "goaChai9" configPassword: "xaidee2M" phpldapadmin: enabled: false persistence: enabled: true accessMode: ReadWriteOnce size: 10Mi storageClass: kind-sc replication: enabled: false customLdifFiles: 01-schema.ldif: |- dn: ou=groups,dc=acme,dc=com objectClass: organizationalUnit ou: groups dn: ou=users,dc=acme,dc=com objectClass: organizationalUnit ou: users dn: cn=lastGID,dc=acme,dc=com objectClass: device objectClass: top description: Records the last GID used to create a Posix group. This prevents the re-use of a GID from a deleted group. cn: lastGID serialNumber: 2001 dn: cn=lastUID,dc=acme,dc=com objectClass: device objectClass: top serialNumber: 2001 description: Records the last UID used to create a Posix account. This prevents the re-use of a UID from a deleted account. cn: lastUID 02-ldapadmin.ldif : |- dn: cn=ldapadmin,ou=groups,dc=acme,dc=com objectClass: top objectClass: posixGroup cn: ldapadmin memberUid: acme.ldapadmin gidNumber: 2001 dn: uid=acme.ldapadmin,ou=users,dc=acme,dc=com givenName: ldapadmin sn: ldapadmin uid: acme.ldapadmin cn: acmeldapadmin objectClass: person objectClass: inetOrgPerson objectClass: posixAccount userPassword:: e0NSWVBUfSQ2JDhycFZxbk5NJHNmWVhBYUNYUzdZbXFhR1VWTjdJa20wT2hXLmVtT3oua2x5L3V5YUdjNE81MDVEalU0R2ZMb0hTaFVwNUkvVUxFT0JubWJ2d29meFNFcXIuaFRVMm0u uidNumber: 2001 gidNumber: 2001 loginShell: /bin/bash homeDirectory: /home/acme.ldapadmin #acme.ldapadmin ia3Bahr3 # ldap user manager configuration ldapUserManager: enabled: true env: SERVER_HOSTNAME: "users.acme.com" LDAP_BASE_DN: "dc=acme,dc=com" LDAP_REQUIRE_STARTTLS: "false" LDAP_ADMINS_GROUP: "ldapadmin" LDAP_ADMIN_BIND_DN: "cn=admin,dc=acme,dc=com" LDAP_ADMIN_BIND_PWD: "goaChai9" LDAP_IGNORE_CERT_ERRORS: "true" EMAIL_DOMAIN: "" NO_HTTPS: "true" SERVER_PATH: "/users" ORGANISATION_NAME: "Acme" LDAP_USER_OU: "users" LDAP_GROUP_OU: "groups" ACCEPT_WEAK_PASSWORDS: "true" resources: limits: cpu: "128m" memory: "256Mi" requests: cpu: "128m" memory: "256Mi" traefik: enabled: true service: type: NodePort ingressRoute: dashboard: enabled: true matchRule: Host(`localhost`) && PathPrefix(`/api`) || PathPrefix(`/dashboard`) entryPoints: [web] ports: web: nodePort: 30950 hydra: enabled: true maester: enabled: false hydra: dev: true config: dsn: memory urls: login: http://localhost/auth/login consent: http://localhost/auth/consent logout: http://localhost/auth/logout self: issuer: http://localhost/auth