mirror of
https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk.git
synced 2025-12-06 15:31:38 +01:00
Compare commits
11 Commits
lender/fea
...
trossner/x
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
da4d258d22 | ||
|
|
62ba5aba49 | ||
|
|
9f762a7c2e | ||
|
|
67fe50e53c | ||
|
|
bd4c997950 | ||
|
|
997c083335 | ||
|
|
688a505ef7 | ||
|
|
d249448794 | ||
|
|
bbbcd6807e | ||
|
|
834c84768a | ||
|
|
410a1ade69 |
@@ -15,27 +15,27 @@ SPDX-License-Identifier: Apache-2.0
|
||||
* [Keycloak Extensions](#keycloak-extensions)
|
||||
* [OpenLDAP](#openldap)
|
||||
* [Authorization](#authorization)
|
||||
* [LDAP Group Synchronization](#ldap-group-synchronization)
|
||||
* [LDAP group synchronization](#ldap-group-synchronization)
|
||||
* [Provisioning](#provisioning)
|
||||
* [OX Connector](#ox-connector)
|
||||
* [SCIM](#scim)
|
||||
* [Component integration](#component-integration)
|
||||
* [Intercom Service / Silent Login](#intercom-service--silent-login)
|
||||
* [Central Contacts](#central-contacts)
|
||||
* [Central Navigation](#central-navigation)
|
||||
* [Intercom Service / Silent login](#intercom-service--silent-login)
|
||||
* [Central contacts](#central-contacts)
|
||||
* [Central navigation](#central-navigation)
|
||||
* [Filepicker](#filepicker)
|
||||
* [Newsfeed](#newsfeed)
|
||||
* [(OpenProject) File Store](#openproject-file-store)
|
||||
* [Applications vs. Services](#applications-vs-services)
|
||||
* [Collabora (Office)](#collabora-office)
|
||||
* [CryptPad Online (Diagrams)](#cryptpad-online-diagrams)
|
||||
* [Element/Synapse (Chat \& Call)](#elementsynapse-chat--call)
|
||||
* [Jitsi (Video Conferencing)](#jitsi-video-conferencing)
|
||||
* [Nextcloud (Files)](#nextcloud-files)
|
||||
* [Nubus (Identity and Access Management / Portal)](#nubus-identity-and-access-management--portal)
|
||||
* [OpenProject (Project management)](#openproject-project-management)
|
||||
* [OX App Suite (Groupware) with OX Dovecot (Mail backend)](#ox-app-suite-groupware-with-ox-dovecot-mail-backend)
|
||||
* [XWiki (Knowledge management)](#xwiki-knowledge-management)
|
||||
* [(OpenProject) File store](#openproject-file-store)
|
||||
* [Applications vs. services](#applications-vs-services)
|
||||
* [Collabora (weboffice)](#collabora-weboffice)
|
||||
* [CryptPad Online (diagrams)](#cryptpad-online-diagrams)
|
||||
* [Element/Synapse (chat \& call)](#elementsynapse-chat--call)
|
||||
* [Jitsi (video conferencing)](#jitsi-video-conferencing)
|
||||
* [Nextcloud (files)](#nextcloud-files)
|
||||
* [Nubus (identity and access management / portal)](#nubus-identity-and-access-management--portal)
|
||||
* [OpenProject (project management)](#openproject-project-management)
|
||||
* [OX App Suite (groupware) with OX Dovecot (mail backend)](#ox-app-suite-groupware-with-ox-dovecot-mail-backend)
|
||||
* [XWiki (knowledge management)](#xwiki-knowledge-management)
|
||||
* [Application specific user accounts](#application-specific-user-accounts)
|
||||
* [Footnotes](#footnotes)
|
||||
<!-- TOC -->
|
||||
@@ -210,7 +210,7 @@ To address these use cases, the Keycloak Extensions act as a proxy to Keycloak.
|
||||
|
||||
# Authorization
|
||||
|
||||
## LDAP Group Synchronization
|
||||
## LDAP group synchronization
|
||||
|
||||
LDAP group synchronization ensures that user group memberships are consistent across the applications in openDesk that make use of the IAM group information. Nubus uses OpenLDAP to store and manage user groups, which are synchronized with integrated applications to enforce access control policies.
|
||||
|
||||
@@ -273,7 +273,7 @@ flowchart TD
|
||||
|
||||
Details can be found in the upstream documentation that is linked in the respective sections.
|
||||
|
||||
## Intercom Service / Silent Login
|
||||
## Intercom Service / Silent login
|
||||
|
||||
The Intercom Service is deployed in the context of Nubus. Its role is to enable cross-application integration
|
||||
based on the user's browser interaction, as handling authentication when the frontend of an application has to call
|
||||
@@ -286,7 +286,7 @@ Currently, only OX AppSuite and Element are using the frontend-based integration
|
||||
**Links:**
|
||||
- [Intercom Service upstream documentation](https://docs.software-univention.de/intercom-service/latest/index.html).
|
||||
|
||||
## Central Contacts
|
||||
## Central contacts
|
||||
|
||||
OX App Suite is responsible for managing contacts in openDesk. Therefore, Nextcloud's PHP backend is using the OX AppSuite's middleware Contacts API to
|
||||
- create a new contact in the user's contacts folder when a file is shared with an unknown email address.
|
||||
@@ -296,7 +296,7 @@ OX App Suite is responsible for managing contacts in openDesk. Therefore, Nextcl
|
||||
- Currently used [OX Contacts API (deprecated)](https://documentation.open-xchange.com/components/middleware/http/8/index.html#!Contacts).
|
||||
- New [OX Addressbooks API](https://documentation.open-xchange.com/components/middleware/http/8/index.html#!Addressbooks) the Central Contacts integration will switch to.
|
||||
|
||||
## Central Navigation
|
||||
## Central navigation
|
||||
|
||||
Central navigation is based on an API endpoint in the Nubus portal that returns a JSON containing the portal's contents for
|
||||
a given user. The response from the API endpoint is used in the openDesk applications to render the central navigation.
|
||||
@@ -338,7 +338,7 @@ service through the Intercom Service's `/wiki` endpoint, in combination with the
|
||||
**Links:**
|
||||
- [XWiki Blog feature](https://extensions.xwiki.org/xwiki/bin/view/Extension/Blog%20Application)
|
||||
|
||||
## (OpenProject) File Store
|
||||
## (OpenProject) File store
|
||||
|
||||
While OpenProject allows you to attach files to work packages directly, it is often preferred that the files are
|
||||
stored within Nextcloud or to link an existing file from your openDesk Nextcloud to a work package.
|
||||
@@ -351,7 +351,7 @@ The file store must still be enabled per project in OpenProject's project admin
|
||||
- [OpenProject's documentation on Nextcloud integration](https://www.openproject.org/docs/system-admin-guide/integrations/nextcloud/)
|
||||
- [OpenProject Integration Nextcloud app](https://apps.nextcloud.com/apps/integration_openproject)
|
||||
|
||||
# Applications vs. Services
|
||||
# Applications vs. services
|
||||
|
||||
openDesk consists of a variety of open-source projects, please find an overview below:
|
||||
|
||||
@@ -366,16 +366,16 @@ openDesk consists of a variety of open-source projects, please find an overview
|
||||
| Element | Secure communications platform | Application |
|
||||
| Jitsi | Videoconferencing | Application |
|
||||
| MariaDB | Database | Service |
|
||||
| Memcached | Cache Database | Service |
|
||||
| MinIO | Object Storage | Service |
|
||||
| Memcached | Cache database | Service |
|
||||
| MinIO | Object storage | Service |
|
||||
| Nextcloud | File share | Application |
|
||||
| Nubus (UMS) | Identity Management & Portal | Application |
|
||||
| Nubus (UMS) | Identity management & portal | Application |
|
||||
| OpenProject | Project management | Application |
|
||||
| OX Appsuite & Dovecot | Groupware with IMAP mail backend | Application |
|
||||
| Postfix | MTA | Service |
|
||||
| PostgreSQL | Database | Service |
|
||||
| Redis | Cache Database | Service |
|
||||
| XWiki | Knowledge Management | Application |
|
||||
| Redis | Cache database | Service |
|
||||
| XWiki | Knowledge management | Application |
|
||||
|
||||
The end user focussed components are called applications and provide the functional scope of openDesk, please find separate paragraphs on each of the applications below.
|
||||
|
||||
@@ -383,25 +383,25 @@ Other components are of type "Service", these are used for development and evalu
|
||||
|
||||
For the APIs / Protocols supported by the applications, please read the [apis.md](./docs/architecture/apis.md).
|
||||
|
||||
## Collabora (Office)
|
||||
## Collabora (weboffice)
|
||||
|
||||
[Collabora](https://www.collaboraonline.com) is a powerful online document editing suite.
|
||||
|
||||
In openDesk, Collabora is used for editing Office documents such as rich texts, spreadsheets and presentations.
|
||||
|
||||
## CryptPad Online (Diagrams)
|
||||
## CryptPad Online (diagrams)
|
||||
|
||||
[CryptPad](https://cryptpad.org/) is a collaborative editor framework supporting end-to-end encryption.
|
||||
|
||||
In openDesk, CryptPad is for editing diagrams.net documents.
|
||||
|
||||
## Element/Synapse (Chat & Call)
|
||||
## Element/Synapse (chat & call)
|
||||
|
||||
[Element Web](https://github.com/element-hq/element-web) is the web frontend for [Synapse](https://github.com/element-hq/synapse), the reference implementation of the sovereign and secure [Matrix protocol](https://matrix.org).
|
||||
|
||||
In openDesk, Element is used for chat and direct audio & video calling.
|
||||
|
||||
## Jitsi (Video Conferencing)
|
||||
## Jitsi (video conferencing)
|
||||
|
||||
[Jitsi](https://jitsi.org) is an open-source video conferencing solution that allows users to hold secure video meetings.
|
||||
|
||||
@@ -409,27 +409,27 @@ In openDesk, Jitsi is used for video conferencing and online meetings. It integr
|
||||
|
||||
[Jigasi](https://github.com/jitsi/jigasi) (Jitsi's SIP component) also allows joining the meeting via phone call if an external SIP server and SIP trunk are provided.
|
||||
|
||||
## Nextcloud (Files)
|
||||
## Nextcloud (files)
|
||||
|
||||
[Nextcloud](https://nextcloud.com) is a file storage and sync platform with powerful collaboration capabilities with desktop, mobile and web interfaces.
|
||||
|
||||
## Nubus (Identity and Access Management / Portal)
|
||||
## Nubus (identity and access management / portal)
|
||||
|
||||
[Nubus](https://www.univention.com/products/nubus/) is a unified Identity & Access Management, providing you with full control and digital sovereignty over your IAM processes and data.
|
||||
|
||||
In openDesk, Nubus provides the management required for users, groups and other IAM objects, as well as the portal, the Identity provider for Single Sign-On and federation scenarios.
|
||||
|
||||
## OpenProject (Project management)
|
||||
## OpenProject (project management)
|
||||
|
||||
[OpenProject](https://www.openproject.org) is a project management tool that supports agile project management, team collaboration, issue tracking, and more.
|
||||
|
||||
## OX App Suite (Groupware) with OX Dovecot (Mail backend)
|
||||
## OX App Suite (groupware) with OX Dovecot (mail backend)
|
||||
|
||||
[OX App Suite](https://www.open-xchange.com/products/ox-app-suite) is a groupware application using [OX Dovecot](https://www.dovecot.org/) as its backend mail store.
|
||||
|
||||
In openDesk, OX App Suite is used for email, calendar, address book and personal task management.
|
||||
|
||||
## XWiki (Knowledge management)
|
||||
## XWiki (knowledge management)
|
||||
|
||||
[XWiki](https://www.xwiki.org) is an open-source wiki platform for knowledge management and collaboration.
|
||||
|
||||
|
||||
@@ -9,7 +9,7 @@ SPDX-License-Identifier: Apache-2.0
|
||||
* [Software bill of materials (SBOMs)](#software-bill-of-materials-sboms)
|
||||
* [Artifact SBOMs](#artifact-sboms)
|
||||
* [Source code SBOMs](#source-code-sboms)
|
||||
* [License Compliance](#license-compliance)
|
||||
* [License compliance](#license-compliance)
|
||||
* [Software supply chain security](#software-supply-chain-security)
|
||||
* [Container architectural basics](#container-architectural-basics)
|
||||
* [Security](#security)
|
||||
@@ -25,7 +25,7 @@ SPDX-License-Identifier: Apache-2.0
|
||||
* [Top bar](#top-bar)
|
||||
* [Look and feel](#look-and-feel)
|
||||
* [Central navigation](#central-navigation)
|
||||
* [Functional Administration](#functional-administration)
|
||||
* [Functional administration](#functional-administration)
|
||||
* [Theming](#theming)
|
||||
* [Central user profile](#central-user-profile)
|
||||
* [Footnotes](#footnotes)
|
||||
@@ -60,7 +60,7 @@ Today's software development platforms like GitLab or GitHub provide dependency
|
||||
|
||||
**Reference:** Currently we do not have source code SBOMs in place.
|
||||
|
||||
# License Compliance
|
||||
# License compliance
|
||||
|
||||
All parts of openDesk Community Edition must be open source with source code (also) published or at least publishable on openCode.
|
||||
|
||||
@@ -243,7 +243,7 @@ When implementing the central navigation into an application there are two optio
|
||||
|
||||
**Reference:** This is available in current deployments in all applications except for Jitsi, Collabora, and CryptPad.
|
||||
|
||||
## Functional Administration
|
||||
## Functional administration
|
||||
|
||||
While applications usually support technical and functional administration the technical part should be in the responsibility of the operator and is usually done at (re)deployment time. Therefore the administrative tasks within an application should be limited to functional administration.
|
||||
|
||||
|
||||
@@ -1,38 +0,0 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>External Secrets</h1>
|
||||
|
||||
This document covers how to utilise external secrets and special requirements.
|
||||
|
||||
<!-- TOC -->
|
||||
* [General](#general)
|
||||
* [Components](#components)
|
||||
* [Notes](#notes)
|
||||
<!-- TOC -->
|
||||
|
||||
# General
|
||||
|
||||
For most components when set the external secret will supersede e.g. a password in a `values.yaml` file.
|
||||
|
||||
The file [`external_secrets.yaml`](/helmfile/environments/default/external_secrets.yaml.gotmpl) lists all possible references to external secrets that are currently implemented in openDesk.
|
||||
|
||||
# Components
|
||||
|
||||
This section covers information and special requirements to external secrets that some Helm Charts expect.
|
||||
|
||||
## Notes
|
||||
|
||||
There are some values that consist of more than just one secret part.
|
||||
|
||||
```yaml
|
||||
backend:
|
||||
configuration:
|
||||
django:
|
||||
superuserEmail:
|
||||
value: {{ printf "default.admin@%s" .Values.global.domain | quote }}
|
||||
redisUrl:
|
||||
value: "redis://default:{{ .Values.cache.notes.password | default .Values.secrets.redis.password }}@{{ .Values.cache.notes.host }}:{{ .Values.cache.notes.port }}/7"
|
||||
```
|
||||
@@ -26,6 +26,7 @@ The following categories are available. Each category contains a set of options
|
||||
* Portal options (`functional.portal.*`): Options to customize the openDesk portal, e.g. if the login dialog should be enforced.
|
||||
* Chat options (`functional.chat.*`): Configuration options for the chat component of openDesk.
|
||||
* Migration options (`functional.migration.*`): Helpful setting(s) for migration scenarios.
|
||||
* Groupware options (`functional.groupware.*`): Options to customize Open-Xchange and mail settings, e.g. mail quota.
|
||||
|
||||
## Customization of functional options
|
||||
|
||||
|
||||
@@ -20,7 +20,7 @@ openDesk uses role-based access control (RBAC) to manage permissions. This syste
|
||||
* [Administrative access to applications](#administrative-access-to-applications)
|
||||
* [Custom groups](#custom-groups)
|
||||
* [Assigning roles/groups and permissions](#assigning-rolesgroups-and-permissions)
|
||||
* [Predefined roles / user templates](#predefined-roles--user-templates)
|
||||
* [Predefined roles/user templates](#predefined-rolesuser-templates)
|
||||
* [*openDesk User*](#opendesk-user)
|
||||
* [*openDesk Administrator*](#opendesk-administrator)
|
||||
* [Managing permissions](#managing-permissions)
|
||||
@@ -30,7 +30,7 @@ openDesk uses role-based access control (RBAC) to manage permissions. This syste
|
||||
* [Delegation](#delegation)
|
||||
* [Regular review](#regular-review)
|
||||
* [Applications](#applications)
|
||||
* [Roles/groups](#rolesgroups)
|
||||
* [Roles/Groups](#rolesgroups)
|
||||
<!-- TOC -->
|
||||
|
||||
# Identity and Access Management (IAM)
|
||||
@@ -126,7 +126,7 @@ While openDesk ships with predefined groups, additional groups can be [created](
|
||||
|
||||
Users get roles assigned based on their responsibilities and the tasks they need to perform. This assignment can be done by an admin through the [administration portal](https://docs.opendesk.eu/administration/).
|
||||
|
||||
## Predefined roles / user templates
|
||||
## Predefined roles/user templates
|
||||
|
||||
openDesk defines [templates](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-nubus/-/blob/main/udm/udm-data-loader/65-usertemplate.yaml) for the *User* and *Administrator* roles. The templates can be used by an *openDesk Administrator* to create users with these roles using the [administration portal](https://docs.opendesk.eu/administration/).
|
||||
|
||||
@@ -191,7 +191,7 @@ While the overall role and permission setup must be checked by the customer, inc
|
||||
|
||||
Managing all application permissions within the IAM would require a superset of permissions to be available in the IAM. This would lead to a high level of administrative complexity. Instead, the application specific permissions are usually managed within an application itself and mapped to roles/groups that are managed in the IAM.
|
||||
|
||||
## Roles/groups
|
||||
## Roles/Groups
|
||||
|
||||
Within IAM groups, the visibility of openDesk applications can be configured. Like with users, this is done in the "openDesk" tab of the [group administration](https://docs.opendesk.eu/administration/gruppen/).
|
||||
|
||||
|
||||
@@ -3,30 +3,30 @@ SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlic
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Release Management</h1>
|
||||
<h1>Release management</h1>
|
||||
|
||||
This document outlines the release and patch management strategy for **openDesk**, ensuring that all updates, patches, and new releases are systematically **planned, tested, documented**, and **reliably deployed** into production. The process is designed to align with operational planning requirements and maintain system stability and security.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Release Cycle](#release-cycle)
|
||||
* [Release Types](#release-types)
|
||||
* [Release Schedule](#release-schedule)
|
||||
* [Release cycle](#release-cycle)
|
||||
* [Release types](#release-types)
|
||||
* [Release schedule](#release-schedule)
|
||||
* [Upgrades](#upgrades)
|
||||
* [Patch Management Process](#application-administration)
|
||||
* [Patch Identification & Prioritization](#patch-identification-prioritization)
|
||||
* [Patch Workflow](#patch-workflow)
|
||||
* [Communication Plan](#communication-plan)
|
||||
* [Announcement Channels](#announcement-channels)
|
||||
* [Timing of Communications](#timing-of-communications)
|
||||
* [Documentation Requirements](#documentation-requirements)
|
||||
* [Compliance & Review](#compliance-review)
|
||||
* [Patch management process](#patch-management-process)
|
||||
* [Patch identification \& prioritization](#patch-identification--prioritization)
|
||||
* [Patch workflow](#patch-workflow)
|
||||
* [Communication plan](#communication-plan)
|
||||
* [Announcement channels](#announcement-channels)
|
||||
* [Timing of communications](#timing-of-communications)
|
||||
* [Documentation requirements](#documentation-requirements)
|
||||
* [Compliance \& review](#compliance--review)
|
||||
<!-- TOC -->
|
||||
|
||||
# Release Cycle
|
||||
# Release cycle
|
||||
|
||||
openDesk follows a structured release cycle to ensure predictability and reliability:
|
||||
|
||||
## Release Types
|
||||
## Release types
|
||||
|
||||
| Type | Frequency | Content |
|
||||
|----------------|---------------|---------------------------------------------------------------|
|
||||
@@ -36,7 +36,7 @@ openDesk follows a structured release cycle to ensure predictability and reliabi
|
||||
|
||||
> **Note:** openDesk does **not** guarantee that minor releases are 100% backward‑compatible. When a breaking change is unavoidable it is announced in the release notes under a dedicated header **“Breaking Changes”** and a migration guide is provided.
|
||||
|
||||
## Release Schedule
|
||||
## Release schedule
|
||||
|
||||
- **Major releases** are scheduled for **Q3 each year**, with planning beginning in Q1.
|
||||
- **Minor releases** occur **monthly on Mondays**, typically **around 10:00 AM** local time.
|
||||
@@ -54,11 +54,11 @@ openDesk follows a structured release cycle to ensure predictability and reliabi
|
||||
- All breaking changes, including those in monthly minor releases, are highlighted in the release notes under Breaking Changes.
|
||||
- Additional, non‑binding migration hints are collected in `migrations.md`
|
||||
|
||||
# Patch Management Process
|
||||
# Patch management process
|
||||
|
||||
A standardized process ensures patches are developed, prioritized, and deployed efficiently.
|
||||
|
||||
## Patch Identification & Prioritization
|
||||
## Patch identification & prioritization
|
||||
|
||||
Patches are categorized by severity and urgency:
|
||||
|
||||
@@ -69,7 +69,7 @@ Patches are categorized by severity and urgency:
|
||||
| **Medium** | Functional bugs with workarounds, minor usability issues |
|
||||
| **Low** | Cosmetic issues, documentation updates |
|
||||
|
||||
## Patch Workflow
|
||||
## Patch workflow
|
||||
|
||||
The following steps define the patch workflow from issue identification to post-deployment review. This process ensures consistent quality and minimal disruption to users:
|
||||
|
||||
@@ -83,18 +83,18 @@ The following steps define the patch workflow from issue identification to post-
|
||||
|
||||
This workflow ensures that patches are handled with the same level of discipline as planned releases, supporting both reliability and agility.
|
||||
|
||||
# Communication Plan
|
||||
# Communication plan
|
||||
|
||||
A lightweight approach reduces manual effort while maintaining transparency.
|
||||
|
||||
## Announcement Channels
|
||||
## Announcement channels
|
||||
|
||||
| Channel | Audience | Purpose | Owner |
|
||||
|---------|----------|---------|-------|
|
||||
| **openCode Changelog** | Community & EE | Primary source of truth for every release | DevOps |
|
||||
| **Account‑Manager Mail / Ticket** | Enterprise customers | Targeted information & upgrade advice | Customer Success |
|
||||
|
||||
## Timing of Communications
|
||||
## Timing of communications
|
||||
|
||||
| Release Type | What | When |
|
||||
|--------------|------|------|
|
||||
@@ -107,7 +107,7 @@ A lightweight approach reduces manual effort while maintaining transparency.
|
||||
|
||||
Community users consume information via openCode; Enterprise customers get an additional nudge via their account manager – **no mass mailings are sent manually**.
|
||||
|
||||
# Documentation Requirements
|
||||
# Documentation requirements
|
||||
|
||||
Each release (major, minor, or patch) must include:
|
||||
|
||||
@@ -116,7 +116,7 @@ Each release (major, minor, or patch) must include:
|
||||
- **Test reports** confirming QA coverage and results
|
||||
- **Deployment checklist** reviewed and approved by the product owner
|
||||
|
||||
# Compliance & Review
|
||||
# Compliance & review
|
||||
|
||||
- The release process is reviewed **bi-annually** to incorporate feedback and evolving requirements
|
||||
- Emergency patches (e.g., zero-day security issues) may bypass the standard schedule but must be documented post-deployment
|
||||
|
||||
@@ -8,12 +8,12 @@ SPDX-License-Identifier: Apache-2.0
|
||||
This document covers the current status of security measures.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Helm Chart Trust Chain](#helm-chart-trust-chain)
|
||||
* [Kubernetes Security Enforcements](#kubernetes-security-enforcements)
|
||||
* [NetworkPolicies](#networkpolicies)
|
||||
* [Helm chart trust chain](#helm-chart-trust-chain)
|
||||
* [Kubernetes security enforcements](#kubernetes-security-enforcements)
|
||||
* [Network policies](#network-policies)
|
||||
<!-- TOC -->
|
||||
|
||||
# Helm Chart Trust Chain
|
||||
# Helm chart trust chain
|
||||
|
||||
Helm charts are signed and validated against GPG keys in `helmfile/files/gpg-pubkeys`.
|
||||
|
||||
@@ -25,22 +25,22 @@ All charts except the ones mentioned below are verifiable:
|
||||
|-------------------|:----------:|
|
||||
| open-xchange-repo | no |
|
||||
|
||||
# Kubernetes Security Enforcements
|
||||
# Kubernetes security enforcements
|
||||
|
||||
This list gives you an overview of default security settings and whether they comply with security standards:
|
||||
|
||||
⟶ Visit our generated detailed [Security Context](./docs/security-context.md) overview.
|
||||
|
||||
# NetworkPolicies
|
||||
# Network policies
|
||||
|
||||
Kubernetes NetworkPolicies are an essential measure to secure your Kubernetes apps and clusters.
|
||||
Kubernetes network policies are an essential measure to secure your Kubernetes apps and clusters.
|
||||
When applied, they restrict traffic to your services.
|
||||
NetworkPolicies protect other deployments in your cluster or other services in your deployment from getting compromised when another
|
||||
`NetworkPolicy` resources protect other deployments in your cluster or other services in your deployment from getting compromised when another
|
||||
component is compromised.
|
||||
|
||||
We ship a default set of Otterize ClientIntents via
|
||||
We ship a default set of Otterize `ClientIntents` via
|
||||
[Otterize intents operator](https://github.com/otterize/intents-operator) which translates intent-based access control
|
||||
(IBAC) into Kubernetes native NetworkPolicies.
|
||||
(IBAC) into Kubernetes native network policies.
|
||||
|
||||
This requires the Otterize intents operator to be installed.
|
||||
|
||||
|
||||
@@ -132,7 +132,7 @@ configuration:
|
||||
allowUsersToUpdateDisplayname: {{ .Values.functional.chat.matrix.profile.allowUsersToUpdateDisplayname }}
|
||||
|
||||
smtp:
|
||||
senderAddress: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.domain }}"
|
||||
senderAddress: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.mailDomain | default .Values.global.domain }}"
|
||||
host: {{ printf "%s.%s.svc.%s" "postfix" (.Values.apps.postfix.namespace | default .Release.Namespace) .Values.cluster.networking.domain | quote }}
|
||||
port: 25
|
||||
tls: false
|
||||
|
||||
@@ -161,7 +161,7 @@ configuration:
|
||||
host: {{ printf "%s.%s.svc.%s" "postfix" (.Values.apps.postfix.namespace | default .Release.Namespace) .Values.cluster.networking.domain | quote }}
|
||||
port: 587
|
||||
fromAddress: {{ .Values.smtp.localpartNoReply | quote }}
|
||||
mailDomain: "{{ .Values.global.domain }}"
|
||||
mailDomain: "{{ .Values.global.mailDomain | default .Values.global.domain }}"
|
||||
security: "tls"
|
||||
skipVerifyPeer: true
|
||||
|
||||
|
||||
@@ -4,16 +4,12 @@
|
||||
global:
|
||||
collaborationServerSecret:
|
||||
value: {{ .Values.secrets.notes.collaborationSecret | quote }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.notes.collaborationSecret.name | quote }}
|
||||
key: {{ .Values.externalSecrets.notes.collaborationSecret.key | quote }}
|
||||
fqdn: "{{ .Values.global.hosts.notes }}.{{ .Values.global.domain }}"
|
||||
imagePullSecrets:
|
||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||
tlsSecretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||
yProviderApiKey:
|
||||
value: {{ .Values.secrets.notes.collaborationSecret | quote }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.notes.collaborationSecret.name | quote }}
|
||||
key: {{ .Values.externalSecrets.notes.collaborationSecret.key | quote }}
|
||||
fqdn: "{{ .Values.global.hosts.notes }}.{{ .Values.global.domain }}"
|
||||
tlsSecretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||
|
||||
backend:
|
||||
image:
|
||||
@@ -29,35 +25,25 @@ backend:
|
||||
{{- if .Values.annotations.notesBackend.ingress }}
|
||||
{{ .Values.annotations.notesBackend.ingress | toYaml | nindent 6 }}
|
||||
{{- end }}
|
||||
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||
ingressAdmin:
|
||||
enabled: true
|
||||
annotations:
|
||||
{{ .Values.annotations.notesBackend.ingressAdmin | toYaml | nindent 6 }}
|
||||
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||
replicaCount: {{ .Values.replicas.notesBackend }}
|
||||
containerSecurityContext:
|
||||
seLinuxOptions:
|
||||
{{ .Values.seLinuxOptions.notesBackend | toYaml | nindent 6 }}
|
||||
configuration:
|
||||
ai:
|
||||
apiKey:
|
||||
value: {{ .Values.ai.apiKey }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.ai.apiKey.name | quote }}
|
||||
key: {{ .Values.externalSecrets.ai.apiKey.key | quote }}
|
||||
baseUrl: {{ .Values.ai.endpoint }}
|
||||
model: {{ .Values.ai.model | quote }}
|
||||
aws:
|
||||
endpointUrl: {{ printf "https://%s" (.Values.objectstores.notes.endpoint | default (printf "%s.%s" .Values.global.hosts.minioApi .Values.global.domain)) | quote }}
|
||||
s3AccessKeyId:
|
||||
value: {{ .Values.objectstores.notes.username }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.objectstores.notes.s3AccessKeyId.name | quote }}
|
||||
key: {{ .Values.externalSecrets.objectstores.notes.s3AccessKeyId.key | quote }}
|
||||
s3SecretAccessKey:
|
||||
value: {{ .Values.objectstores.notes.secretKey | default .Values.secrets.minio.notesUser | quote }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.objectstores.notes.s3SecretAccessKey.name | quote }}
|
||||
key: {{ .Values.externalSecrets.objectstores.notes.s3SecretAccessKey.key | quote }}
|
||||
storageBucketName: {{ .Values.objectstores.notes.bucket }}
|
||||
collaboration:
|
||||
apiUrl: {{ printf "https://%s.%s/collaboration/api/" .Values.global.hosts.notes .Values.global.domain | quote }}
|
||||
@@ -67,40 +53,25 @@ backend:
|
||||
name: {{ .Values.databases.notes.name | quote }}
|
||||
password:
|
||||
value: {{ .Values.databases.notes.password | default .Values.secrets.postgresql.notesUser | quote }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.databases.notes.password.name | quote }}
|
||||
key: {{ .Values.externalSecrets.databases.notes.password.key | quote }}
|
||||
port: {{ .Values.databases.notes.port | quote }}
|
||||
user:
|
||||
value: {{ .Values.databases.notes.username | quote }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.databases.notes.user.name | quote }}
|
||||
key: {{ .Values.externalSecrets.databases.notes.user.key | quote }}
|
||||
email:
|
||||
brandName: "openDesk"
|
||||
from: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.domain }}"
|
||||
from: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.mailDomain | default .Values.global.domain }}"
|
||||
host: "postfix"
|
||||
port: "25"
|
||||
logoImage: {{ printf "https://%s.%s/univention/portal/icons/entries/swp.notes.svg" .Values.global.hosts.nubus .Values.global.domain | quote }}
|
||||
user:
|
||||
value: {{ printf "%s@%s" "opendesk-system" ( .Values.global.mailDomain | default .Values.global.domain ) }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.postfix.opendeskSystemUsername.name | quote }}
|
||||
key: {{ .Values.externalSecrets.postfix.opendeskSystemUsername.key | quote }}
|
||||
password:
|
||||
value: {{ .Values.secrets.postfix.opendeskSystemPassword | quote }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.postfix.opendeskSystemPassword.name | quote }}
|
||||
key: {{ .Values.externalSecrets.postfix.opendeskSystemPassword.key | quote }}
|
||||
oidc:
|
||||
enabled: true
|
||||
rpClientId:
|
||||
value: "opendesk-notes"
|
||||
rpClientSecret:
|
||||
value: {{ .Values.secrets.keycloak.clientSecret.notes | quote }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.keycloak.clientSecret.notes.name | quote }}
|
||||
key: {{ .Values.externalSecrets.keycloak.clientSecret.notes.key | quote }}
|
||||
opJWKSEndpoint: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}/protocol/openid-connect/certs"
|
||||
opAuthorizationEndpoint: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}/protocol/openid-connect/auth"
|
||||
opTokenEndpoint: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}/protocol/openid-connect/token"
|
||||
@@ -117,37 +88,44 @@ backend:
|
||||
django:
|
||||
secretKey:
|
||||
value: {{ .Values.secrets.notes.djangoSecretKey }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.notes.django.secretKey.name | quote }}
|
||||
key: {{ .Values.externalSecrets.notes.django.secretKey.key | quote }}
|
||||
createSuperuser: true
|
||||
superuserEmail:
|
||||
value: {{ printf "default.admin@%s" .Values.global.domain | quote }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.notes.django.superuserEmail.name | quote }}
|
||||
key: {{ .Values.externalSecrets.notes.django.superuserEmail.key | quote }}
|
||||
superuserPassword:
|
||||
value: {{ .Values.secrets.notes.superuser }}
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.notes.django.superuserPassword.name | quote }}
|
||||
key: {{ .Values.externalSecrets.notes.django.superuserPassword.key | quote }}
|
||||
frontendTheme: "openDesk"
|
||||
redisUrl:
|
||||
value: "redis://default:{{ .Values.cache.notes.password | default .Values.secrets.redis.password }}@{{ .Values.cache.notes.host }}:{{ .Values.cache.notes.port }}/7"
|
||||
existingSecret:
|
||||
name: {{ .Values.externalSecrets.notes.redisUrl.name | quote }}
|
||||
key: {{ .Values.externalSecrets.notes.redisUrl.key | quote }}
|
||||
extraEnvVars:
|
||||
- name: "FRONTEND_HOMEPAGE_FEATURE_ENABLED"
|
||||
value: "False"
|
||||
- name: "FRONTEND_FOOTER_FEATURE_ENABLED"
|
||||
value: "False"
|
||||
containerSecurityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- "ALL"
|
||||
enabled: true
|
||||
privileged: false
|
||||
runAsUser: 1001
|
||||
runAsGroup: 1001
|
||||
seccompProfile:
|
||||
type: "RuntimeDefault"
|
||||
readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
seLinuxOptions:
|
||||
{{ .Values.seLinuxOptions.notesBackend | toYaml | nindent 6 }}
|
||||
podAnnotations:
|
||||
{{ .Values.annotations.notesBackend.pod | toYaml | nindent 4 }}
|
||||
podAnnotationsCreateUser:
|
||||
{{ .Values.annotations.notesBackend.createUserJob | toYaml | nindent 4 }}
|
||||
podAnnotationsMigrate:
|
||||
{{ .Values.annotations.notesBackend.migrateJob | toYaml | nindent 4 }}
|
||||
podSecurityContext:
|
||||
enabled: true
|
||||
fsGroup: 1000
|
||||
fsGroupChangePolicy: "Always"
|
||||
resources:
|
||||
{{ .Values.resources.notesBackend | toYaml | nindent 4 }}
|
||||
service:
|
||||
@@ -173,10 +151,16 @@ frontend:
|
||||
repository: {{ .Values.images.notesFrontend.repository | quote }}
|
||||
pullPolicy: "IfNotPresent"
|
||||
tag: {{ .Values.images.notesFrontend.tag | quote }}
|
||||
ingress:
|
||||
enabled: true
|
||||
annotations:
|
||||
{{ .Values.annotations.notesFrontend.ingress | toYaml | nindent 6 }}
|
||||
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||
ingressMedia:
|
||||
enabled: true
|
||||
annotations:
|
||||
{{ .Values.annotations.notesFrontend.ingressMedia | toYaml | nindent 6 }}
|
||||
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||
extraEnvVars:
|
||||
- name: "ICS_BASE_URL"
|
||||
value: {{ printf "https://%s.%s" .Values.global.hosts.intercomService .Values.global.domain | quote }}
|
||||
@@ -187,10 +171,26 @@ frontend:
|
||||
resources:
|
||||
{{ .Values.resources.notesFrontend | toYaml | nindent 4 }}
|
||||
containerSecurityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- "ALL"
|
||||
enabled: true
|
||||
privileged: false
|
||||
runAsUser: 1000
|
||||
runAsGroup: 1000
|
||||
seccompProfile:
|
||||
type: "RuntimeDefault"
|
||||
readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
seLinuxOptions:
|
||||
{{ .Values.seLinuxOptions.notesFrontend | toYaml | nindent 6 }}
|
||||
podAnnotations:
|
||||
{{ .Values.annotations.notesFrontend.pod | toYaml | nindent 4 }}
|
||||
podSecurityContext:
|
||||
enabled: true
|
||||
fsGroup: 1000
|
||||
fsGroupChangePolicy: "Always"
|
||||
service:
|
||||
annotations:
|
||||
{{ .Values.annotations.notesFrontend.service | toYaml | nindent 6 }}
|
||||
@@ -223,16 +223,34 @@ y-provider:
|
||||
subPath: "ca-certificates.crt"
|
||||
{{- end }}
|
||||
containerSecurityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- "ALL"
|
||||
enabled: true
|
||||
privileged: false
|
||||
runAsUser: 1001
|
||||
runAsGroup: 1001
|
||||
seccompProfile:
|
||||
type: "RuntimeDefault"
|
||||
readOnlyRootFilesystem: true
|
||||
runAsNonRoot: true
|
||||
seLinuxOptions:
|
||||
{{ .Values.seLinuxOptions.notesBackend | toYaml | nindent 6 }}
|
||||
ingressCollaborationApi:
|
||||
annotations:
|
||||
{{ .Values.annotations.notesYProvider.ingressCollaborationAPI | toYaml | nindent 6 }}
|
||||
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||
ingressCollaborationWs:
|
||||
annotations:
|
||||
{{ .Values.annotations.notesYProvider.ingressCollaborationWS | toYaml | nindent 6 }}
|
||||
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||
podAnnotations:
|
||||
{{ .Values.annotations.notesYProvider.pod | toYaml | nindent 4 }}
|
||||
podSecurityContext:
|
||||
enabled: true
|
||||
fsGroup: 1001
|
||||
fsGroupChangePolicy: "Always"
|
||||
service:
|
||||
annotations:
|
||||
{{ .Values.annotations.notesYProvider.service | toYaml | nindent 6 }}
|
||||
|
||||
@@ -550,7 +550,7 @@ nubusKeycloakExtensions:
|
||||
newDeviceLoginNotificationEnable: {{ if .Values.functional.authentication.newDeviceLoginNotification.enabled }}"True"{{ else }}"False"{{ end }}
|
||||
logLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"WARN"{{ end }}
|
||||
newDeviceLoginSubject: "New device login on your {{ .Values.theme.texts.productName }} account"
|
||||
mailFrom: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.domain }}"
|
||||
mailFrom: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.mailDomain | default .Values.global.domain }}"
|
||||
image:
|
||||
registry: {{ coalesce .Values.repositories.image.registryOpencodeDe .Values.global.imageRegistry .Values.images.nubusKeycloakExtensionHandler.registry | quote }}
|
||||
repository: {{ .Values.images.nubusKeycloakExtensionHandler.repository }}
|
||||
@@ -1128,13 +1128,6 @@ nubusProvisioning:
|
||||
|
||||
nubusUdmListener:
|
||||
enabled: true
|
||||
# Temporary local liveness probe, should be removed once available in the upstream Nubus Helm chart
|
||||
livenessProbe:
|
||||
exec:
|
||||
command:
|
||||
- sh
|
||||
- -c
|
||||
- 'grep -E "^[13]$" /var/lib/univention-directory-listener/handlers/ldap_listener'
|
||||
containerSecurityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
|
||||
@@ -37,6 +37,7 @@ dovecot:
|
||||
dn: "uid=ldapsearch_dovecot,cn=users,{{ .Values.ldap.baseDn }}"
|
||||
password:
|
||||
value: {{ .Values.secrets.nubus.ldapSearch.dovecot | quote }}
|
||||
loginTrustedNetworks: {{ join " " .Values.cluster.networking.cidr | quote }}
|
||||
oidc:
|
||||
enabled: true
|
||||
clientID:
|
||||
@@ -46,7 +47,14 @@ dovecot:
|
||||
introspectionHost: {{ printf "%s.%s" .Values.global.hosts.keycloak .Values.global.domain | quote }}
|
||||
introspectionPath: "/realms/{{ .Values.platform.realm }}/protocol/openid-connect/token/introspect"
|
||||
usernameAttribute: "opendesk_username"
|
||||
loginTrustedNetworks: {{ join " " .Values.cluster.networking.cidr | quote }}
|
||||
quotaRules:
|
||||
- "*:storage={{ mul .Values.functional.groupware.quota.default 1024 }}M"
|
||||
- "Trash:storage=+{{ div (mul (mul .Values.functional.groupware.quota.default 1024) 20) 100 }}M"
|
||||
- "LAZY_EXPUNGE:ignore"
|
||||
quotaGrace: "{{ div (mul (mul .Values.functional.groupware.quota.default 1024) 10) 100 }}M"
|
||||
sieve:
|
||||
notify:
|
||||
mailtoEnvelopeFrom: "orig_recipient"
|
||||
submission:
|
||||
enabled: true
|
||||
ssl: "no"
|
||||
|
||||
@@ -502,6 +502,9 @@ appsuite:
|
||||
com.openexchange.carddav.url: {{ printf "https://%s.%s/carddav/[folderId]" .Values.global.hosts.openxchangeDav .Values.global.domain }}
|
||||
com.openexchange.client.onboarding.caldav.url: {{ printf "https://%s.%s/" .Values.global.hosts.openxchangeDav .Values.global.domain }}
|
||||
com.openexchange.client.onboarding.carddav.url: {{ printf "https://%s.%s/" .Values.global.hosts.openxchangeDav .Values.global.domain }}
|
||||
{{- else }}
|
||||
com.openexchange.caldav.enabled: "false"
|
||||
com.openexchange.carddav.enabled: "false"
|
||||
{{- end }}
|
||||
# Other
|
||||
com.openexchange.secret.secretSource: "\"<user-id> + '@' + <context-id> + '/' + <random>\""
|
||||
@@ -545,13 +548,6 @@ appsuite:
|
||||
MASTER_ACCOUNT_OVERRIDE: "true"
|
||||
/opt/open-xchange/etc/AdminUser.properties:
|
||||
USERNAME_CHANGEABLE: "true"
|
||||
/opt/open-xchange/etc/system.properties:
|
||||
SERVER_NAME: "oxserver"
|
||||
/opt/open-xchange/etc/ldapauth.properties:
|
||||
java.naming.provider.url: "ldap://{{ .Values.ldap.host }}:389/{{ .Values.ldap.baseDn }}"
|
||||
bindDN: "uid=ldapsearch_ox,cn=users,{{ .Values.ldap.baseDn }}"
|
||||
bindDNPassword: {{ .Values.secrets.nubus.ldapSearch.ox | quote }}
|
||||
bindOnly: "false"
|
||||
/opt/open-xchange/etc/antivirus.properties:
|
||||
com.openexchange.antivirus.enabled: "true"
|
||||
{{- if .Values.antivirus.icap.host }}
|
||||
@@ -571,6 +567,20 @@ appsuite:
|
||||
com.openexchange.filestore.s3.ox-filestore-s3.bucketName: {{ .Values.objectstores.openxchange.bucket | quote }}
|
||||
com.openexchange.filestore.s3.ox-filestore-s3.accessKey: {{ .Values.objectstores.openxchange.username | quote }}
|
||||
com.openexchange.filestore.s3.ox-filestore-s3.secretKey: {{ .Values.objectstores.openxchange.secretKey | default .Values.secrets.minio.openxchangeUser | quote }}
|
||||
/opt/open-xchange/etc/ldapauth.properties:
|
||||
java.naming.provider.url: "ldap://{{ .Values.ldap.host }}:389/{{ .Values.ldap.baseDn }}"
|
||||
bindDN: "uid=ldapsearch_ox,cn=users,{{ .Values.ldap.baseDn }}"
|
||||
bindDNPassword: {{ .Values.secrets.nubus.ldapSearch.ox | quote }}
|
||||
bindOnly: "false"
|
||||
/opt/open-xchange/etc/noreply.properties:
|
||||
com.openexchange.noreply.address: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.mailDomain | default .Values.global.domain }}"
|
||||
com.openexchange.noreply.login: {{ printf "%s@%s" "opendesk-system" ( .Values.global.mailDomain | default .Values.global.domain ) }}
|
||||
com.openexchange.noreply.password: {{ .Values.secrets.postfix.opendeskSystemPassword | quote }}
|
||||
com.openexchange.noreply.server: "postfix"
|
||||
com.openexchange.noreply.port: "25"
|
||||
com.openexchange.noreply.secureMode: "plain"
|
||||
/opt/open-xchange/etc/system.properties:
|
||||
SERVER_NAME: "oxserver"
|
||||
uiSettings:
|
||||
io.ox.nextcloud//server: "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/fs/"
|
||||
io.ox.public-sector//ics/url: "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/"
|
||||
@@ -610,6 +620,8 @@ appsuite:
|
||||
io.ox/dynamic-theme//folderBackground: {{ .Values.theme.colors.white | quote }}
|
||||
io.ox/dynamic-theme//folderSelected: {{ .Values.theme.colors.primary15 | quote }}
|
||||
io.ox/dynamic-theme//folderHover: {{ .Values.theme.colors.secondaryGreyLight | quote }}
|
||||
# openDesk logo in top bar links to portal
|
||||
io.ox/core//logoAction: {{ printf "https://%s.%s" .Values.global.hosts.nubus .Values.global.domain | quote }}
|
||||
secretETCFiles:
|
||||
# Format of the OX Guard master key:
|
||||
# MC+base64(20 random bytes)
|
||||
|
||||
@@ -82,7 +82,7 @@ environment:
|
||||
OPENPROJECT_SMTP__AUTHENTICATION: "cram_md5"
|
||||
OPENPROJECT_SMTP__ENABLE__STARTTLS__AUTO: "true"
|
||||
OPENPROJECT_SMTP__OPENSSL__VERIFY__MODE: "none"
|
||||
OPENPROJECT_MAIL__FROM: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.domain }}"
|
||||
OPENPROJECT_MAIL__FROM: "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.mailDomain | default .Values.global.domain }}"
|
||||
OPENPROJECT_HOME__URL: {{ printf "https://%s.%s/" .Values.global.hosts.nubus .Values.global.domain | quote }}
|
||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_ISSUER: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}"
|
||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_POST__LOGOUT__REDIRECT__URI: "https://{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}/"
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
# SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-FileCopyrightText: 2024-2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
@@ -6,17 +6,11 @@ commonAnnotations:
|
||||
{{ .Values.annotations.xwiki.common | toYaml | nindent 2 }}
|
||||
|
||||
image:
|
||||
{{- if eq .Values.databases.xwiki.type "mariadb" }}
|
||||
name: "{{ coalesce .Values.repositories.image.registryOpencodeDe .Values.global.imageRegistry .Values.images.xwikiMariadb.registry }}/{{ .Values.images.xwikiMariadb.repository }}"
|
||||
tag: {{ .Values.images.xwikiMariadb.tag | quote }}
|
||||
{{- else if eq .Values.databases.xwiki.type "postgresql" }}
|
||||
name: "{{ coalesce .Values.repositories.image.registryOpencodeDe .Values.global.imageRegistry .Values.images.xwikiPostgres.registry }}/{{ .Values.images.xwikiPostgres.repository }}"
|
||||
tag: {{ .Values.images.xwikiPostgres.tag | quote }}
|
||||
{{- else }}
|
||||
{{- fail "Unsupported value for .Values.databases.xwiki.type, supported values are 'mariadb' or 'postgresql'" }}
|
||||
{{- end }}
|
||||
name: "{{ .Values.images.xwiki.registry }}/{{ .Values.images.xwiki.repository }}"
|
||||
tag: {{ .Values.images.xwiki.tag | quote }}
|
||||
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||
imagePullSecrets: {{ .Values.global.imagePullSecrets }}
|
||||
imagePullSecrets:
|
||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 2 }}
|
||||
|
||||
javaOpts:
|
||||
{{- if and (eq (env "OPENDESK_ENTERPRISE") "true") .Values.enterpriseKeys.xwiki.opendeskEnterpriseLicense .Values.enterpriseKeys.xwiki.proApplicationslicense }}
|
||||
@@ -171,7 +165,7 @@ properties:
|
||||
# therefore on XWiki restart an LDAP sync is triggered to load the dynamic mapping.
|
||||
"property:xwiki:XWiki.XWikiPreferences^XWiki.XWikiPreferences.ldap_group_mapping": "xwiki:XWiki.XWikiAdminGroup=cn=managed-by-attribute-KnowledgemanagementAdmin,cn=groups,{{ .Values.ldap.baseDn }}"
|
||||
## SMTP settings
|
||||
"property:xwiki:Mail.MailConfig^Mail.SendMailConfigClass.from": "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.domain }}"
|
||||
"property:xwiki:Mail.MailConfig^Mail.SendMailConfigClass.from": "{{ .Values.smtp.localpartNoReply }}@{{ .Values.global.mailDomain | default .Values.global.domain }}"
|
||||
"property:xwiki:Mail.MailConfig^Mail.SendMailConfigClass.host": {{ printf "%s.%s.svc.%s" "postfix" (.Values.apps.postfix.namespace | default .Release.Namespace) .Values.cluster.networking.domain | quote }}
|
||||
"property:xwiki:Mail.MailConfig^Mail.SendMailConfigClass.port": 587
|
||||
"property:xwiki:Mail.MailConfig^Mail.SendMailConfigClass.properties": "mail.smtp.starttls.enable=true"
|
||||
|
||||
@@ -6,7 +6,7 @@ charts:
|
||||
registry: "registry.opencode.de"
|
||||
repository: "zendis/opendesk-enterprise/components/product-development/charts/opendesk-dovecot-pro"
|
||||
name: "dovecot"
|
||||
version: "3.1.1"
|
||||
version: "3.1.7"
|
||||
verify: true
|
||||
oxAppSuite:
|
||||
registry: "registry.opencode.de"
|
||||
|
||||
@@ -14,7 +14,7 @@ images:
|
||||
nextcloud:
|
||||
registry: "registry.opencode.de"
|
||||
repository: "zendis/opendesk-enterprise/components/supplier/nextcloud/images/opendesk-nextcloud"
|
||||
tag: "31.0.6@sha256:07cd284179654739c8e6aea05e960ee7d3e3eb4cd09bd9a3e3747c69b9e2ec22"
|
||||
tag: "31.0.6@sha256:cf893f2a7e1613a8c7641651c8a459f321c8bbbd234071b89f5638163ada00ef"
|
||||
openxchangeCoreMW:
|
||||
registry: "registry.opencode.de"
|
||||
repository: "zendis/opendesk-enterprise/components/supplier/open-xchange/images-mirror/middleware-public-sector-pro"
|
||||
|
||||
@@ -134,6 +134,7 @@ annotations:
|
||||
pod: ~
|
||||
service: ~
|
||||
notesFrontend:
|
||||
ingress: ~
|
||||
ingressMedia: ~
|
||||
pod: ~
|
||||
service: ~
|
||||
|
||||
@@ -97,7 +97,7 @@ charts:
|
||||
registry: "registry.opencode.de"
|
||||
repository: "bmi/opendesk/components/platform-development/charts/opendesk-dovecot"
|
||||
name: "dovecot"
|
||||
version: "3.1.1"
|
||||
version: "3.1.5"
|
||||
verify: true
|
||||
element:
|
||||
# providerCategory: "Platform"
|
||||
|
||||
@@ -1,55 +0,0 @@
|
||||
# SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
# The variables set in this file are required to upgrade components to their "Enterprise" product variant.
|
||||
---
|
||||
externalSecrets:
|
||||
ai:
|
||||
apiKey:
|
||||
name: "a"
|
||||
key: "aiapikey"
|
||||
databases:
|
||||
notes:
|
||||
password:
|
||||
name: "a"
|
||||
key: "notesDatabasePassword"
|
||||
user:
|
||||
name: "a"
|
||||
key: "notesDatabaseUser"
|
||||
keycloak:
|
||||
clientSecret:
|
||||
notes:
|
||||
name: "a"
|
||||
key: "keycloaknotes"
|
||||
notes:
|
||||
collaborationSecret:
|
||||
name: "a"
|
||||
key: "notesCollaborationSecret"
|
||||
django:
|
||||
secretKey:
|
||||
name: "a"
|
||||
key: "notesDjangoSecretKey"
|
||||
superuserEmail:
|
||||
name: "a"
|
||||
key: "notessuperuserEmail"
|
||||
superuserPassword:
|
||||
name: "a"
|
||||
key: "notessuperuserPassword"
|
||||
redisUrl:
|
||||
name: "a"
|
||||
key: "notesredisurl"
|
||||
objectstores:
|
||||
notes:
|
||||
s3AccessKeyId:
|
||||
name: "a"
|
||||
key: "objectstoresNotesS3AccessKeyId"
|
||||
s3SecretAccessKey:
|
||||
name: "a"
|
||||
key: "objectstoresNotesS3SecretAccessKey"
|
||||
postfix:
|
||||
opendeskSystemPassword:
|
||||
name: "a"
|
||||
key: "postfixopendeskSystemPassword"
|
||||
opendeskSystemUsername:
|
||||
name: "a"
|
||||
key: "postfixopendeskSystemUsername"
|
||||
...
|
||||
@@ -100,7 +100,7 @@ functional:
|
||||
|
||||
filestore:
|
||||
quota:
|
||||
# Set the default quota for all users in GB
|
||||
# Set the default quota for all users in gigabyte
|
||||
default: 1
|
||||
# Options related to file sharing.
|
||||
# Changing these options might require a restart of the `opendesk-nextcloud-php` Pod(s).
|
||||
@@ -152,6 +152,11 @@ functional:
|
||||
# - https://<.Values.global.hosts.openxchangeDav>.<.Values.global.domain>/carddav/[folderId]"
|
||||
# Can be switched off using the below feature toggle.
|
||||
enabled: true
|
||||
quota:
|
||||
# Set the default mail storage quota for users in gigabyte.
|
||||
# Just provide the plain number without quoting. It will allow a quota grace of 10% and +20% in trash storage.
|
||||
# If you need different rules you can use customizing on Dovecot's `quotaRules` and `quotaGrace` templating.
|
||||
default: 1
|
||||
|
||||
migration:
|
||||
oxAppSuite:
|
||||
|
||||
@@ -63,7 +63,7 @@ global:
|
||||
whiteboard: "whiteboard"
|
||||
xwiki: "wiki"
|
||||
|
||||
## Credentials to fetch images from private registry
|
||||
## Define a list containing names of the secrets to use when fetching images from private registries.
|
||||
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
#
|
||||
imagePullSecrets: []
|
||||
|
||||
@@ -332,7 +332,7 @@ images:
|
||||
# upstreamRepository: "bmi/opendesk/components/platform-development/images/opendesk-nextcloud"
|
||||
registry: "registry.opencode.de"
|
||||
repository: "bmi/opendesk/components/platform-development/images/opendesk-nextcloud"
|
||||
tag: "31.0.6@sha256:4b99dc24ac61db1e5159fbb63e4c9f4178155fba821a9f5552060264b3dd6e31"
|
||||
tag: "31.0.6@sha256:0fc39982b568383b531e7b5864c421725085bb70787a44cb30e401d6face8efa"
|
||||
nextcloudExporter:
|
||||
# providerCategory: "Platform"
|
||||
# providerResponsible: "openDesk"
|
||||
@@ -997,24 +997,12 @@ images:
|
||||
registry: "registry-1.docker.io"
|
||||
repository: "library/nginx"
|
||||
tag: "1.28.0-alpine3.21@sha256:aed99734248e851764f1f2146835ecad42b5f994081fa6631cc5d79240891ec9"
|
||||
xwikiMariadb:
|
||||
xwiki:
|
||||
# providerCategory: "Supplier"
|
||||
# providerResponsible: "XWiki"
|
||||
# upstreamRegistry: "https://git.xwikisas.com:5050"
|
||||
# upstreamRepository: "xwikisas/swp/xwiki"
|
||||
# upstreamMirrorTagFilterRegEx: '^(\d+)\.(\d+)-mariadb.+$'
|
||||
# upstreamMirrorStartFrom: ["0", "12"]
|
||||
registry: "registry.opencode.de"
|
||||
repository: "bmi/opendesk/components/supplier/xwiki/images-mirror/xwiki"
|
||||
tag: "0.25-mariadb-jetty-alpine@sha256:7175ef5e454b4eb0f6fd6a92a9503d8a680db3ca97b25c3a4eedac9c9bfbcdaf"
|
||||
xwikiPostgres:
|
||||
# providerCategory: "Supplier"
|
||||
# providerResponsible: "XWiki"
|
||||
# upstreamRegistry: "https://git.xwikisas.com:5050"
|
||||
# upstreamRepository: "xwikisas/swp/xwiki"
|
||||
# upstreamMirrorTagFilterRegEx: '^(\d+)\.(\d+)-postgres.+$'
|
||||
# upstreamMirrorStartFrom: ["0", "23"]
|
||||
registry: "registry.opencode.de"
|
||||
repository: "bmi/opendesk/components/supplier/xwiki/images-mirror/xwiki"
|
||||
tag: "0.25-postgres-jetty-alpine@sha256:1bfc57a65f8bc6b059d550791699b5afa33b91db8d4c75ca8f6f3d2299f7c335"
|
||||
# upstreamRepository: "xwikisas/swp/xwiki-solr"
|
||||
registry: "git.xwikisas.com:5050"
|
||||
repository: "xwikisas/swp/xwiki-solr"
|
||||
tag: "1.0.0"
|
||||
...
|
||||
|
||||
Reference in New Issue
Block a user