mirror of
https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk.git
synced 2025-12-06 23:41:43 +01:00
feat(helm): Template support for XWiki external secrets
Signed-off-by: Axel Lender <lender@b1-systems.de>
This commit is contained in:
38
docs/external-secrets.md
Normal file
38
docs/external-secrets.md
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>External Secrets</h1>
|
||||||
|
|
||||||
|
This document covers how to utilise external secrets and special requirements.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [General](#general)
|
||||||
|
* [Components](#components)
|
||||||
|
* [XWiki](#xwiki)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# General
|
||||||
|
|
||||||
|
For most components when set the external secret will supersede e.g. a password in a `values.yaml` file.
|
||||||
|
|
||||||
|
The file [`external_secrets.yaml`](/helmfile/environments/default/external_secrets.yaml.gotmpl) lists all possible references to external secrets that are currently implemented in openDesk.
|
||||||
|
|
||||||
|
# Components
|
||||||
|
|
||||||
|
This section covers information and special requirements to external secrets that some Helm Charts expect.
|
||||||
|
|
||||||
|
## XWiki
|
||||||
|
|
||||||
|
Properties listed in the file of the external secret will overwrite plain values.
|
||||||
|
|
||||||
|
Like described in the [upstream `values.yaml`](https://github.com/xwiki-contrib/xwiki-helm/blob/master/charts/xwiki/values.yaml#L435) credentials and information about a user in external secrets listed in `propertiesSecret` have to be formatted as follows:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
stringData:
|
||||||
|
propertiesFile: |
|
||||||
|
propertie1=propertie1Value
|
||||||
|
propertie2=propertie2Value
|
||||||
|
propertie3=propertie3Value
|
||||||
|
```
|
||||||
@@ -30,10 +30,13 @@ javaOptsSecrets:
|
|||||||
trustStorePassword:
|
trustStorePassword:
|
||||||
option: "-Djavax.net.ssl.trustStorePassword="
|
option: "-Djavax.net.ssl.trustStorePassword="
|
||||||
value: {{ .Values.secrets.certificates.password }}
|
value: {{ .Values.secrets.certificates.password }}
|
||||||
|
secret:
|
||||||
|
name: {{ .Values.externalSecrets.certificates.password.name | quote }}
|
||||||
|
key: {{ .Values.externalSecrets.certificates.password.key | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
externalDB:
|
externalDB:
|
||||||
{{- if eq .Values.databases.xwiki.type "mariadb" }}
|
{{- if eq .Values.databases.xwiki.type "mariadb" }}
|
||||||
password: {{ .Values.databases.xwiki.password | default .Values.secrets.mariadb.rootPassword | quote }}
|
password: {{ .Values.databases.xwiki.password | default .Values.secrets.mariadb.rootPassword | quote }}
|
||||||
{{- else }}
|
{{- else }}
|
||||||
password: {{ .Values.databases.xwiki.password | default .Values.secrets.postgresql.xwikiUser | quote }}
|
password: {{ .Values.databases.xwiki.password | default .Values.secrets.postgresql.xwikiUser | quote }}
|
||||||
@@ -42,7 +45,18 @@ externalDB:
|
|||||||
user: {{ .Values.databases.xwiki.username | quote }}
|
user: {{ .Values.databases.xwiki.username | quote }}
|
||||||
host: {{ printf "%s:%d" .Values.databases.xwiki.host .Values.databases.xwiki.port | quote }}
|
host: {{ printf "%s:%d" .Values.databases.xwiki.host .Values.databases.xwiki.port | quote }}
|
||||||
customKeyRef:
|
customKeyRef:
|
||||||
|
{{- if or (.Values.externalSecrets.mariadb.rootPassword.name) (.Values.externalSecrets.postgresql.xwikiUser.name) }}
|
||||||
|
enabled: true
|
||||||
|
{{- else }}
|
||||||
enabled: false
|
enabled: false
|
||||||
|
{{- end }}
|
||||||
|
{{- if eq .Values.databases.xwiki.type "mariadb" }}
|
||||||
|
name: {{ .Values.externalSecrets.mariadb.rootPassword.name | quote }}
|
||||||
|
key: {{ .Values.externalSecrets.mariadb.rootPassword.key | quote }}
|
||||||
|
{{- else }}
|
||||||
|
name: {{ .Values.externalSecrets.postgresql.xwikiUser.name | quote }}
|
||||||
|
key: {{ .Values.externalSecrets.postgresql.xwikiUser.key | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
securityContext:
|
securityContext:
|
||||||
enabled: true
|
enabled: true
|
||||||
@@ -119,14 +133,26 @@ customConfigsSecrets:
|
|||||||
## Password of "superadmin" user, disables account if not password is set
|
## Password of "superadmin" user, disables account if not password is set
|
||||||
xwiki.superadminpassword:
|
xwiki.superadminpassword:
|
||||||
value: {{ .Values.secrets.xwiki.superadminpassword | quote }}
|
value: {{ .Values.secrets.xwiki.superadminpassword | quote }}
|
||||||
|
secret:
|
||||||
|
name: {{ .Values.externalSecrets.xwiki.xwikiSuperadminpassword.name | quote }}
|
||||||
|
key: {{ .Values.externalSecrets.xwiki.xwikiSuperadminpassword.key | quote }}
|
||||||
{{ end }}
|
{{ end }}
|
||||||
xwiki.authentication.ldap.bind_pass:
|
xwiki.authentication.ldap.bind_pass:
|
||||||
value: {{ .Values.secrets.nubus.ldapSearch.xwiki | quote }}
|
value: {{ .Values.secrets.nubus.ldapSearch.xwiki | quote }}
|
||||||
|
secret:
|
||||||
|
name: {{ .Values.externalSecrets.nubus.ldapSearch.xwiki.name | quote }}
|
||||||
|
key: {{ .Values.externalSecrets.nubus.ldapSearch.xwiki.key | quote }}
|
||||||
xwiki.properties:
|
xwiki.properties:
|
||||||
oidc.secret:
|
oidc.secret:
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.xwiki | quote }}
|
value: {{ .Values.secrets.keycloak.clientSecret.xwiki | quote }}
|
||||||
|
secret:
|
||||||
|
name: {{ .Values.externalSecrets.keycloak.clientSecret.xwiki.name | quote }}
|
||||||
|
key: {{ .Values.externalSecrets.keycloak.clientSecret.xwiki.key | quote }}
|
||||||
workplaceServices.portalSecret:
|
workplaceServices.portalSecret:
|
||||||
value: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
value: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
|
secret:
|
||||||
|
name: {{ .Values.externalSecrets.centralnavigation.apiKey.name | quote }}
|
||||||
|
key: {{ .Values.externalSecrets.centralnavigation.apiKey.key | quote }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
@@ -235,8 +261,8 @@ properties:
|
|||||||
|
|
||||||
## Properties listed in the secret file will overwrite plain values
|
## Properties listed in the secret file will overwrite plain values
|
||||||
propertiesSecret:
|
propertiesSecret:
|
||||||
name: ""
|
name: {{ .Values.externalSecrets.xwiki.propertiesSecret.name | quote }}
|
||||||
key: ""
|
key: {{ .Values.externalSecrets.xwiki.propertiesSecret.key | quote }}
|
||||||
|
|
||||||
cluster:
|
cluster:
|
||||||
replicas: {{ .Values.replicas.xwiki }}
|
replicas: {{ .Values.replicas.xwiki }}
|
||||||
|
|||||||
40
helmfile/environments/default/external_secrets.yaml.gotmpl
Normal file
40
helmfile/environments/default/external_secrets.yaml.gotmpl
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
externalSecrets:
|
||||||
|
centralnavigation:
|
||||||
|
apiKey:
|
||||||
|
name: ~
|
||||||
|
key: ~
|
||||||
|
certificates:
|
||||||
|
password:
|
||||||
|
name: ~
|
||||||
|
key: ~
|
||||||
|
keycloak:
|
||||||
|
clientSecret:
|
||||||
|
xwiki:
|
||||||
|
name: ~
|
||||||
|
key: ~
|
||||||
|
nubus:
|
||||||
|
ldapSearch:
|
||||||
|
xwiki:
|
||||||
|
name: ~
|
||||||
|
key: ~
|
||||||
|
mariadb:
|
||||||
|
rootPassword:
|
||||||
|
name: ~
|
||||||
|
key: ~
|
||||||
|
postgresql:
|
||||||
|
xwikiUser:
|
||||||
|
name: ~
|
||||||
|
key: ~
|
||||||
|
xwiki:
|
||||||
|
xwikiSuperadminpassword:
|
||||||
|
name: ~
|
||||||
|
key: ~
|
||||||
|
propertiesSecret:
|
||||||
|
name: ~
|
||||||
|
key: ~
|
||||||
|
...
|
||||||
Reference in New Issue
Block a user