mirror of
https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk.git
synced 2025-12-06 15:31:38 +01:00
Compare commits
1 Commits
trossner/f
...
feat/mon-r
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
83e7ff7a3e |
@@ -3,7 +3,7 @@
|
|||||||
---
|
---
|
||||||
include:
|
include:
|
||||||
- project: "${PROJECT_PATH_GITLAB_CONFIG_TOOLING}"
|
- project: "${PROJECT_PATH_GITLAB_CONFIG_TOOLING}"
|
||||||
ref: "v2.3.2"
|
ref: "main"
|
||||||
file:
|
file:
|
||||||
- "ci/common/automr.yml"
|
- "ci/common/automr.yml"
|
||||||
- "ci/common/lint.yml"
|
- "ci/common/lint.yml"
|
||||||
@@ -11,6 +11,8 @@ include:
|
|||||||
- local: "/.gitlab/generate/generate-docs.yml"
|
- local: "/.gitlab/generate/generate-docs.yml"
|
||||||
- project: "${PROJECT_PATH_CUSTOM_ENVIRONMENT_CONFIG}"
|
- project: "${PROJECT_PATH_CUSTOM_ENVIRONMENT_CONFIG}"
|
||||||
file: "gitlab/environments.yaml"
|
file: "gitlab/environments.yaml"
|
||||||
|
rules:
|
||||||
|
- if: "$INCLUDE_ENVIRONMENTS_ENABLED != 'false'"
|
||||||
- local: "/.gitlab/lint/lint-opendesk.yml"
|
- local: "/.gitlab/lint/lint-opendesk.yml"
|
||||||
rules:
|
rules:
|
||||||
- if: "$JOB_OPENDESK_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|merge_request_event'"
|
- if: "$JOB_OPENDESK_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|merge_request_event'"
|
||||||
@@ -26,7 +28,6 @@ stages:
|
|||||||
- ".pre"
|
- ".pre"
|
||||||
- "scan"
|
- "scan"
|
||||||
- "automr"
|
- "automr"
|
||||||
- "renovate"
|
|
||||||
- "lint"
|
- "lint"
|
||||||
- "env-cleanup"
|
- "env-cleanup"
|
||||||
- "env"
|
- "env"
|
||||||
@@ -35,6 +36,7 @@ stages:
|
|||||||
- "component-deploy-stage-2"
|
- "component-deploy-stage-2"
|
||||||
- "tests"
|
- "tests"
|
||||||
- "env-stop"
|
- "env-stop"
|
||||||
|
- "generate-release-assets"
|
||||||
- ".post"
|
- ".post"
|
||||||
|
|
||||||
variables:
|
variables:
|
||||||
@@ -132,12 +134,6 @@ variables:
|
|||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
RUN_RENOVATE:
|
|
||||||
description: "Triggers the Renovate based check for dependency updates."
|
|
||||||
value: "no"
|
|
||||||
options:
|
|
||||||
- "yes"
|
|
||||||
- "no"
|
|
||||||
RUN_TESTS:
|
RUN_TESTS:
|
||||||
description: "Triggers execution of E2E-tests."
|
description: "Triggers execution of E2E-tests."
|
||||||
value: "yes"
|
value: "yes"
|
||||||
@@ -201,7 +197,7 @@ env-start:
|
|||||||
name: "${NAMESPACE}"
|
name: "${NAMESPACE}"
|
||||||
on_stop: "env-stop"
|
on_stop: "env-stop"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
image: "${CI_DEPENDENCY_PROXY_DIRECT_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
image: "${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
@@ -382,7 +378,7 @@ env-stop:
|
|||||||
environment:
|
environment:
|
||||||
name: "${NAMESPACE}"
|
name: "${NAMESPACE}"
|
||||||
action: "stop"
|
action: "stop"
|
||||||
image: "${CI_DEPENDENCY_PROXY_DIRECT_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
image: "${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
||||||
needs: []
|
needs: []
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: >
|
||||||
@@ -452,10 +448,7 @@ run-tests:
|
|||||||
avscan-prepare:
|
avscan-prepare:
|
||||||
stage: ".pre"
|
stage: ".pre"
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: "$JOB_AVSCAN_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
$JOB_AVSCAN_ENABLED != 'false' &&
|
|
||||||
$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH &&
|
|
||||||
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
|
||||||
when: "always"
|
when: "always"
|
||||||
- when: "never"
|
- when: "never"
|
||||||
image: "external-registry.souvap-univention.de/docker-remote/mikefarah/yq"
|
image: "external-registry.souvap-univention.de/docker-remote/mikefarah/yq"
|
||||||
@@ -488,8 +481,7 @@ avscan-prepare:
|
|||||||
yq '.images
|
yq '.images
|
||||||
| with_entries(.key |= "scan-" + .)
|
| with_entries(.key |= "scan-" + .)
|
||||||
| .[].extends=".container-clamav"
|
| .[].extends=".container-clamav"
|
||||||
| with(.[]; .variables.CONTAINER_IMAGE = .repository
|
| with(.[]; .variables.CONTAINER_IMAGE = .repository | .variables.CONTAINER_TAG = .tag | .variables.CONTAINER_REGISTRY = .registry)
|
||||||
| .variables.CONTAINER_TAG = .tag | .variables.CONTAINER_REGISTRY = .registry)
|
|
||||||
| del(.[].repository)
|
| del(.[].repository)
|
||||||
| del(.[].tag)
|
| del(.[].tag)
|
||||||
| del(.[].registry)'
|
| del(.[].registry)'
|
||||||
@@ -502,10 +494,7 @@ avscan-prepare:
|
|||||||
avscan-start:
|
avscan-start:
|
||||||
stage: "scan"
|
stage: "scan"
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: "$JOB_AVSCAN_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
$JOB_AVSCAN_ENABLED != 'false' &&
|
|
||||||
$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH &&
|
|
||||||
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
|
||||||
when: "always"
|
when: "always"
|
||||||
- when: "never"
|
- when: "never"
|
||||||
trigger:
|
trigger:
|
||||||
@@ -514,7 +503,32 @@ avscan-start:
|
|||||||
job: "avscan-prepare"
|
job: "avscan-prepare"
|
||||||
strategy: "depend"
|
strategy: "depend"
|
||||||
|
|
||||||
# Declare .environments which is in environments repository. In case it is not available
|
generate-release-assets:
|
||||||
|
stage: "generate-release-assets"
|
||||||
|
image: "registry.souvap-univention.de/souvap/tooling/images/ansible:4.10.0"
|
||||||
|
rules:
|
||||||
|
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
|
when: "on_success"
|
||||||
|
- when: "never"
|
||||||
|
script:
|
||||||
|
- |
|
||||||
|
git clone https://gitlab-ci-token:${CI_JOB_TOKEN}@${CI_SERVER_HOST}/${ASSET_GENERATOR_REPO_PATH}
|
||||||
|
cd opendesk-asset-generator
|
||||||
|
export OPENDESK_DEPLOYMENT_AUTOMATION_PATH=${CI_PROJECT_DIR}
|
||||||
|
./opendesk_asset_generator.py
|
||||||
|
mv ./build_artefacts ${CI_PROJECT_DIR}
|
||||||
|
cd ..
|
||||||
|
rm -rf opendesk-asset-generator
|
||||||
|
ls -l ./build_artefacts
|
||||||
|
artifacts:
|
||||||
|
paths:
|
||||||
|
- "./build_artefacts/chart-index.json"
|
||||||
|
- "./build_artefacts/image-index.json"
|
||||||
|
tags: []
|
||||||
|
variables:
|
||||||
|
ASSET_GENERATOR_REPO_PATH: "bmi/opendesk/tooling/opendesk-asset-generator"
|
||||||
|
|
||||||
|
# Declare .environments which is in environments repository and only loaded when INCLUDE_ENVIRONMENTS_ENABLED not false.
|
||||||
# 'cache' is used because job must contain at least one key, so cache is just a dummy key.
|
# 'cache' is used because job must contain at least one key, so cache is just a dummy key.
|
||||||
.environments:
|
.environments:
|
||||||
cache: {}
|
cache: {}
|
||||||
@@ -543,33 +557,16 @@ reuse-linter:
|
|||||||
when: "never"
|
when: "never"
|
||||||
- when: "always"
|
- when: "always"
|
||||||
|
|
||||||
renovate:
|
|
||||||
rules:
|
|
||||||
- if: $RUN_RENOVATE == "yes"
|
|
||||||
when: "on_success"
|
|
||||||
image: "ghcr.io/renovatebot/renovate:37.59.7@sha256:a0dd48947ca03d9088ff7bfdcf689a5cc3c1eb9522d5ff87d14636b5ad60a3dc"
|
|
||||||
variables:
|
|
||||||
RENOVATE_CONFIG_FILE: "${CI_PROJECT_DIR}/.renovate/config.yaml"
|
|
||||||
RENOVATE_ENDPOINT: "${CI_API_V4_URL}"
|
|
||||||
RENOVATE_LOG_FILE_LEVEL: "debug"
|
|
||||||
script:
|
|
||||||
- "renovate ${RENOVATE_EXTRA_FLAGS}"
|
|
||||||
stage: "renovate"
|
|
||||||
|
|
||||||
generate-release-version:
|
generate-release-version:
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: "$JOB_RELEASE_ENABLED != 'false'"
|
||||||
$JOB_RELEASE_ENABLED != 'false' &&
|
|
||||||
$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH &&
|
|
||||||
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
|
||||||
when: "on_success"
|
when: "on_success"
|
||||||
|
|
||||||
release:
|
release:
|
||||||
|
dependencies:
|
||||||
|
- "generate-release-assets"
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
$JOB_AVSCAN_ENABLED != 'false' &&
|
|
||||||
$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH &&
|
|
||||||
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
|
||||||
when: "on_success"
|
when: "on_success"
|
||||||
script:
|
script:
|
||||||
- >
|
- >
|
||||||
@@ -585,7 +582,7 @@ release:
|
|||||||
- |
|
- |
|
||||||
echo -e "\n[INFO] Writing data to helm value file..."
|
echo -e "\n[INFO] Writing data to helm value file..."
|
||||||
cat <<EOF >helmfile/environments/default/global.generated.yaml
|
cat <<EOF >helmfile/environments/default/global.generated.yaml
|
||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
@@ -598,7 +595,16 @@ release:
|
|||||||
{
|
{
|
||||||
"branches": ["main"],
|
"branches": ["main"],
|
||||||
"plugins": [
|
"plugins": [
|
||||||
"@semantic-release/gitlab",
|
["@semantic-release/gitlab",
|
||||||
|
{
|
||||||
|
"assets": [
|
||||||
|
{ "path": "./build_artefacts/chart-index.json",
|
||||||
|
"label": "Chart Index JSON" },
|
||||||
|
{ "path": "./build_artefacts/image-index.json",
|
||||||
|
"label": "Image Index JSON" },
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
"@semantic-release/release-notes-generator",
|
"@semantic-release/release-notes-generator",
|
||||||
"@semantic-release/changelog",
|
"@semantic-release/changelog",
|
||||||
["@semantic-release/git", {
|
["@semantic-release/git", {
|
||||||
@@ -617,5 +623,6 @@ release:
|
|||||||
EOF
|
EOF
|
||||||
- "semantic-release"
|
- "semantic-release"
|
||||||
needs:
|
needs:
|
||||||
|
- "generate-release-assets"
|
||||||
- "generate-docs"
|
- "generate-docs"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -2,13 +2,14 @@
|
|||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
variables:
|
variables:
|
||||||
OPENDESK_CI_CLI_IMAGE: "registry.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli:2.4.3\
|
OPENDESK_CI_CLI_IMAGE: "registry.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli:2.4.2\
|
||||||
@sha256:4630299fddf4248af1ad04528f0435d78f5b2694a154c99fe72b960260a7be61"
|
@sha256:7a866a34b82dddea8867862afaaccb1d1e385854ce344fc71be492800a5b16a6"
|
||||||
OPENDESK_LINT_IMAGE: "registry.opencode.de/bmi/opendesk/components/platform-development/images/ci-lint:1.0.4\
|
OPENDESK_LINT_IMAGE: "registry.opencode.de/bmi/opendesk/components/platform-development/images/ci-lint:1.0.3\
|
||||||
@sha256:386e84e2c85c33537479e4bb1e1fe744c9cce5e87bcb9a3a384dcdc1727c19c0"
|
@sha256:096e649b985dd8e46e9dadff5f7e9c7a8772bf5a1b3df1bb2b4a887716c2ca85"
|
||||||
|
|
||||||
.common:
|
.common:
|
||||||
cache: {}
|
cache: {}
|
||||||
needs: []
|
needs: []
|
||||||
tags: []
|
tags:
|
||||||
|
- "docker"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -27,14 +27,7 @@ lint-kyverno:
|
|||||||
script:
|
script:
|
||||||
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${APP}"
|
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${APP}"
|
||||||
- "helmfile template -e test --include-needs > ${CI_PROJECT_DIR}/.kyverno/opendesk.yaml"
|
- "helmfile template -e test --include-needs > ${CI_PROJECT_DIR}/.kyverno/opendesk.yaml"
|
||||||
- >
|
- "node /app/opendesk-ci-cli/src/index.js generate-kyverno-tests -d ${CI_PROJECT_DIR}/.kyverno -t required -s manifest -f opendesk.yaml --skip-tests true ${APP}"
|
||||||
node /app/opendesk-ci-cli/src/index.js generate-kyverno-tests
|
|
||||||
-d ${CI_PROJECT_DIR}/.kyverno
|
|
||||||
-t required
|
|
||||||
-s manifest
|
|
||||||
-f opendesk.yaml
|
|
||||||
--skip-tests true
|
|
||||||
${APP}
|
|
||||||
- "node /app/opendesk-ci-cli/src/index.js filter-for-kinds -f ${CI_PROJECT_DIR}/.kyverno/opendesk.yaml"
|
- "node /app/opendesk-ci-cli/src/index.js filter-for-kinds -f ${CI_PROJECT_DIR}/.kyverno/opendesk.yaml"
|
||||||
- "cd ${CI_PROJECT_DIR}/.kyverno"
|
- "cd ${CI_PROJECT_DIR}/.kyverno"
|
||||||
- "kyverno test ."
|
- "kyverno test ."
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
pod:
|
pod:
|
||||||
@@ -12,7 +12,7 @@ pod:
|
|||||||
- "Pod"
|
- "Pod"
|
||||||
- "DaemonSet"
|
- "DaemonSet"
|
||||||
- name: "disallow-default-serviceaccount"
|
- name: "disallow-default-serviceaccount"
|
||||||
rule: "disallow-default-serviceAccountName"
|
rule: "require-sa"
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
@@ -20,8 +20,8 @@ pod:
|
|||||||
- "Job"
|
- "Job"
|
||||||
- "Pod"
|
- "Pod"
|
||||||
- "DaemonSet"
|
- "DaemonSet"
|
||||||
- name: "template-imagepullsecrets"
|
- name: "require-imagepullsecrets"
|
||||||
rule: "template-imagePullSecrets"
|
rule: "require-imagepullsecrets"
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
@@ -30,7 +30,7 @@ pod:
|
|||||||
- "Pod"
|
- "Pod"
|
||||||
- "DaemonSet"
|
- "DaemonSet"
|
||||||
- name: "disallow-latest-tag"
|
- name: "disallow-latest-tag"
|
||||||
rule: "disallow-latest-tag"
|
rule: "validate-image-tag"
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
@@ -38,17 +38,8 @@ pod:
|
|||||||
- "Job"
|
- "Job"
|
||||||
- "Pod"
|
- "Pod"
|
||||||
- "DaemonSet"
|
- "DaemonSet"
|
||||||
- name: "disallow-latest-tag"
|
- name: "require-imagepullpolicy-always"
|
||||||
rule: "require-image-tag-or-digest"
|
rule: "require-imagepullpolicy-always"
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "require-imagepullpolicy"
|
|
||||||
rule: "require-imagePullPolicy"
|
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
@@ -64,23 +55,23 @@ pod:
|
|||||||
- "Deployment"
|
- "Deployment"
|
||||||
- "Pod"
|
- "Pod"
|
||||||
- "DaemonSet"
|
- "DaemonSet"
|
||||||
- name: "template-storage"
|
- name: "require-storage"
|
||||||
rule: "template-storageClassName-pod"
|
rule: "require-storageclass-pvc"
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "PersistentVolumeClaim"
|
- "PersistentVolumeClaim"
|
||||||
- name: "template-storage"
|
- name: "require-storage"
|
||||||
rule: "template-storageClassName-pvc"
|
rule: "require-storageclass-pod"
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
- name: "template-storage"
|
- name: "require-storage"
|
||||||
rule: "template-requests-storage-pod"
|
rule: "require-storage-size-pvc"
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "PersistentVolumeClaim"
|
- "PersistentVolumeClaim"
|
||||||
- name: "template-storage"
|
- name: "require-storage"
|
||||||
rule: "template-requests-storage-pvc"
|
rule: "require-storage-size-pod"
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
@@ -93,8 +84,8 @@ pod:
|
|||||||
- "Job"
|
- "Job"
|
||||||
- "Pod"
|
- "Pod"
|
||||||
- "DaemonSet"
|
- "DaemonSet"
|
||||||
- name: "template-image-registries"
|
- name: "restrict-image-registries"
|
||||||
rule: "template-image-registries"
|
rule: "validate-registries"
|
||||||
type: "required"
|
type: "required"
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
@@ -174,119 +165,4 @@ pod:
|
|||||||
- "Job"
|
- "Job"
|
||||||
- "Pod"
|
- "Pod"
|
||||||
- "DaemonSet"
|
- "DaemonSet"
|
||||||
- name: "require-containersecuritycontext"
|
|
||||||
rule: "require-empty-seLinuxOptions"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "require-containersecuritycontext"
|
|
||||||
rule: "require-default-procMount"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "require-containersecuritycontext"
|
|
||||||
rule: "restrict-sysctls"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "disallow-container-sock-mounts"
|
|
||||||
rule: "validate-docker-sock-mount"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "disallow-container-sock-mounts"
|
|
||||||
rule: "validate-containerd-sock-mount"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "disallow-container-sock-mounts"
|
|
||||||
rule: "validate-crio-sock-mount"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "disallow-container-sock-mounts"
|
|
||||||
rule: "validate-dockerd-sock-mount"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "disallow-host-namespaces"
|
|
||||||
rule: "disallow-host-namespaces"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "disallow-host-path"
|
|
||||||
rule: "disallow-host-path"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "disallow-host-ports"
|
|
||||||
rule: "disallow-host-ports"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "disallow-host-process"
|
|
||||||
rule: "disallow-host-process"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
- "Job"
|
|
||||||
- "Pod"
|
|
||||||
- "DaemonSet"
|
|
||||||
- name: "template-ingress"
|
|
||||||
rule: "template-ingressClassName"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "Ingress"
|
|
||||||
- name: "template-ingress"
|
|
||||||
rule: "template-tls-secretName"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "Ingress"
|
|
||||||
- name: "template-replicas"
|
|
||||||
rule: "template-replicas"
|
|
||||||
type: "required"
|
|
||||||
kinds:
|
|
||||||
- "StatefulSet"
|
|
||||||
- "Deployment"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,80 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "disallow-container-sock-mounts"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Disallow CRI socket mounts"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
Container daemon socket bind mounts allow access to the container engine on the node.
|
|
||||||
This access can be used for privilege escalation and to manage containers outside of Kubernetes, and hence should
|
|
||||||
not be allowed.
|
|
||||||
This policy validates that the sockets used for CRI engines Docker, Containerd, and CRI-O are not used.
|
|
||||||
In addition to or replacement of this policy, preventing users from mounting the parent directories
|
|
||||||
(/var/run and /var) may be necessary to completely prevent socket bind mounts.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- name: "validate-docker-sock-mount"
|
|
||||||
match:
|
|
||||||
any:
|
|
||||||
- resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: "Use of the Docker Unix socket is not allowed."
|
|
||||||
anyPattern:
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
- =(hostPath):
|
|
||||||
path: "!/var/run/docker.sock"
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
- name: "validate-containerd-sock-mount"
|
|
||||||
match:
|
|
||||||
any:
|
|
||||||
- resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: "Use of the Containerd Unix socket is not allowed."
|
|
||||||
anyPattern:
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
- =(hostPath):
|
|
||||||
path: "!/var/run/containerd/containerd.sock"
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
- name: "validate-crio-sock-mount"
|
|
||||||
match:
|
|
||||||
any:
|
|
||||||
- resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: "Use of the CRI-O Unix socket is not allowed."
|
|
||||||
anyPattern:
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
- =(hostPath):
|
|
||||||
path: "!/var/run/crio/crio.sock"
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
- name: "validate-dockerd-sock-mount"
|
|
||||||
match:
|
|
||||||
any:
|
|
||||||
- resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: "Use of the Docker CRI socket is not allowed."
|
|
||||||
anyPattern:
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
- =(hostPath):
|
|
||||||
path: "!/var/run/cri-dockerd.sock"
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
@@ -1,20 +1,10 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
apiVersion: "kyverno.io/v1"
|
apiVersion: "kyverno.io/v1"
|
||||||
kind: "ClusterPolicy"
|
kind: "ClusterPolicy"
|
||||||
metadata:
|
metadata:
|
||||||
name: "disallow-default-serviceaccount"
|
name: "disallow-default-serviceaccount"
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Prevent default ServiceAccount privilege escalation"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
Kubernetes automatically creates a ServiceAccount object named default for every namespace in your cluster.
|
|
||||||
These default service accounts get no permissions by default.
|
|
||||||
Accidental or intended assignment of permissions on the default service account results in elevated permissions
|
|
||||||
for all pods with default service account assigned.
|
|
||||||
This risk can be mitigated by creating a custom ServiceAccount for each application or reduce the risk by disable
|
|
||||||
auto mounting the default service account into the pod.
|
|
||||||
spec:
|
spec:
|
||||||
background: true
|
background: true
|
||||||
rules:
|
rules:
|
||||||
@@ -22,15 +12,11 @@ spec:
|
|||||||
resources:
|
resources:
|
||||||
kinds:
|
kinds:
|
||||||
- "Pod"
|
- "Pod"
|
||||||
name: "disallow-default-serviceAccountName"
|
name: "require-sa"
|
||||||
validate:
|
validate:
|
||||||
message: >-
|
message: "serviceAccountName must be set to anything other than 'default'."
|
||||||
Field serviceAccountName must be set to anything other than 'default'.
|
pattern:
|
||||||
When serviceAccountName is 'default' then automountServiceAccountToken must set to 'false' .
|
spec:
|
||||||
anyPattern:
|
serviceAccountName: "!default"
|
||||||
- spec:
|
|
||||||
serviceAccountName: "!default"
|
|
||||||
- spec:
|
|
||||||
automountServiceAccountToken: "false"
|
|
||||||
validationFailureAction: "audit"
|
validationFailureAction: "audit"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,33 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "disallow-host-namespaces"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Disallow Host Namespaces"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
Host namespaces (Process ID namespace, Inter-Process Communication namespace, and network namespace) allow access
|
|
||||||
to shared information and can be used to elevate privileges.
|
|
||||||
Pods should not be allowed access to host namespaces.
|
|
||||||
This policy ensures fields which make use of these host namespaces are unset or set to `false`.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- name: "disallow-host-namespaces"
|
|
||||||
match:
|
|
||||||
any:
|
|
||||||
- resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: >-
|
|
||||||
Sharing the host namespaces is disallowed. The fields spec.hostNetwork,
|
|
||||||
spec.hostIPC, and spec.hostPID must be unset or set to `false`.
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
=(hostPID): "false"
|
|
||||||
=(hostIPC): "false"
|
|
||||||
=(hostNetwork): "false"
|
|
||||||
@@ -1,32 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "disallow-host-path"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Disallow hostPath"
|
|
||||||
policies.kyverno.io/subject: "Pod,Volume"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
HostPath volumes let Pods use host directories and volumes in containers.
|
|
||||||
Using host resources can be used to access shared data or escalate privileges and should not be allowed.
|
|
||||||
This policy ensures no hostPath volumes are in use.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- name: "disallow-host-path"
|
|
||||||
match:
|
|
||||||
any:
|
|
||||||
- resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: >-
|
|
||||||
HostPath volumes are forbidden. The field spec.volumes[*].hostPath must be unset.
|
|
||||||
anyPattern:
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
- X(hostPath): "null"
|
|
||||||
- spec:
|
|
||||||
=(volumes):
|
|
||||||
@@ -1,38 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "disallow-host-ports"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Disallow hostPorts"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
Access to host ports allows potential snooping of network traffic and should not be allowed, or at minimum
|
|
||||||
restricted to a known list. This policy ensures the `hostPort` field is unset or set to `0`.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- name: "disallow-host-ports"
|
|
||||||
match:
|
|
||||||
any:
|
|
||||||
- resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: >-
|
|
||||||
Use of host ports is disallowed. The fields spec.containers[*].ports[*].hostPort
|
|
||||||
, spec.initContainers[*].ports[*].hostPort, and spec.ephemeralContainers[*].ports[*].hostPort
|
|
||||||
must either be unset or set to `0`.
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
=(ephemeralContainers):
|
|
||||||
- =(ports):
|
|
||||||
- =(hostPort): 0
|
|
||||||
=(initContainers):
|
|
||||||
- =(ports):
|
|
||||||
- =(hostPort): 0
|
|
||||||
containers:
|
|
||||||
- =(ports):
|
|
||||||
- =(hostPort): 0
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "disallow-host-process"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Disallow hostProcess"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
Windows pods offer the ability to run HostProcess containers which enables privileged access to the Windows node.
|
|
||||||
Privileged access to the host is disallowed in the baseline policy.
|
|
||||||
HostProcess pods are an alpha feature as of Kubernetes v1.22.
|
|
||||||
This policy ensures the `hostProcess` field, if present, is set to `false`.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- name: "disallow-host-process"
|
|
||||||
match:
|
|
||||||
any:
|
|
||||||
- resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: >-
|
|
||||||
HostProcess containers are disallowed. The fields spec.securityContext.windowsOptions.hostProcess,
|
|
||||||
spec.containers[*].securityContext.windowsOptions.hostProcess,
|
|
||||||
spec.initContainers[*].securityContext.windowsOptions.hostProcess, and
|
|
||||||
spec.ephemeralContainers[*].securityContext.windowsOptions.hostProcess must either be undefined or set to
|
|
||||||
`false`.
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
=(ephemeralContainers):
|
|
||||||
- =(securityContext):
|
|
||||||
=(windowsOptions):
|
|
||||||
=(hostProcess): "false"
|
|
||||||
=(initContainers):
|
|
||||||
- =(securityContext):
|
|
||||||
=(windowsOptions):
|
|
||||||
=(hostProcess): "false"
|
|
||||||
containers:
|
|
||||||
- =(securityContext):
|
|
||||||
=(windowsOptions):
|
|
||||||
=(hostProcess): "false"
|
|
||||||
@@ -1,18 +1,10 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
apiVersion: "kyverno.io/v1"
|
apiVersion: "kyverno.io/v1"
|
||||||
kind: "ClusterPolicy"
|
kind: "ClusterPolicy"
|
||||||
metadata:
|
metadata:
|
||||||
name: "disallow-latest-tag"
|
name: "disallow-latest-tag"
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Disallow usage of latest tag"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
The ':latest' tag is mutable and can lead to unexpected errors if the image changes.
|
|
||||||
A best practice is to use an immutable tag that maps to a specific version of an application Pod.
|
|
||||||
This policy validates that the image specifies a tag and that it is not called `latest`.
|
|
||||||
Defining no image tag or digest result in the container engine retrieving the latest tag.
|
|
||||||
spec:
|
spec:
|
||||||
background: true
|
background: true
|
||||||
rules:
|
rules:
|
||||||
@@ -20,7 +12,7 @@ spec:
|
|||||||
resources:
|
resources:
|
||||||
kinds:
|
kinds:
|
||||||
- "Pod"
|
- "Pod"
|
||||||
name: "disallow-latest-tag"
|
name: "validate-image-tag"
|
||||||
validate:
|
validate:
|
||||||
message: "Using a mutable image tag e.g. 'latest' is not allowed."
|
message: "Using a mutable image tag e.g. 'latest' is not allowed."
|
||||||
pattern:
|
pattern:
|
||||||
@@ -31,27 +23,5 @@ spec:
|
|||||||
- image: "!*:latest"
|
- image: "!*:latest"
|
||||||
containers:
|
containers:
|
||||||
- image: "!*:latest"
|
- image: "!*:latest"
|
||||||
- match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
name: "require-image-tag-or-digest"
|
|
||||||
validate:
|
|
||||||
message: "A image tag or a digest is required, otherwise latest tag is chosen."
|
|
||||||
anyPattern:
|
|
||||||
- spec:
|
|
||||||
=(ephemeralContainers):
|
|
||||||
- image: "*:*"
|
|
||||||
=(initContainers):
|
|
||||||
- image: "*:*"
|
|
||||||
containers:
|
|
||||||
- image: "*:*"
|
|
||||||
- spec:
|
|
||||||
=(ephemeralContainers):
|
|
||||||
- image: "*@*"
|
|
||||||
=(initContainers):
|
|
||||||
- image: "*@*"
|
|
||||||
containers:
|
|
||||||
- image: "*@*"
|
|
||||||
validationFailureAction: "audit"
|
validationFailureAction: "audit"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,16 +1,10 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
apiVersion: "kyverno.io/v1"
|
apiVersion: "kyverno.io/v1"
|
||||||
kind: "ClusterPolicy"
|
kind: "ClusterPolicy"
|
||||||
metadata:
|
metadata:
|
||||||
name: "require-containersecuritycontext"
|
name: "require-containersecuritycontext"
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "ContainerSecurityContext best practices are set."
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
The containerSecurityContext is the most important security-related section because it has the highest precedence
|
|
||||||
and restricts the container to its minimal privileges.
|
|
||||||
spec:
|
spec:
|
||||||
background: true
|
background: true
|
||||||
rules:
|
rules:
|
||||||
@@ -175,70 +169,5 @@ spec:
|
|||||||
- securityContext:
|
- securityContext:
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
|
|
||||||
- name: "require-empty-seLinuxOptions"
|
|
||||||
match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: "SELinux options have to be unset."
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
=(ephemeralContainers):
|
|
||||||
- securityContext:
|
|
||||||
seLinuxOptions:
|
|
||||||
=(initContainers):
|
|
||||||
- securityContext:
|
|
||||||
seLinuxOptions:
|
|
||||||
containers:
|
|
||||||
- securityContext:
|
|
||||||
seLinuxOptions:
|
|
||||||
|
|
||||||
- name: "require-default-procMount"
|
|
||||||
match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: >-
|
|
||||||
Changing the proc mount from the default is not allowed. The fields
|
|
||||||
spec.containers[*].securityContext.procMount, spec.initContainers[*].securityContext.procMount,
|
|
||||||
and spec.ephemeralContainers[*].securityContext.procMount must be unset or
|
|
||||||
set to `Default`.
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
=(ephemeralContainers):
|
|
||||||
- =(securityContext):
|
|
||||||
=(procMount): "Default"
|
|
||||||
=(initContainers):
|
|
||||||
- =(securityContext):
|
|
||||||
=(procMount): "Default"
|
|
||||||
containers:
|
|
||||||
- =(securityContext):
|
|
||||||
=(procMount): "Default"
|
|
||||||
|
|
||||||
- name: "restrict-sysctls"
|
|
||||||
match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
validate:
|
|
||||||
message: >-
|
|
||||||
Setting additional sysctls above the allowed type is not allowed.
|
|
||||||
The field spec.securityContext.sysctls must be unset or not use any other names
|
|
||||||
than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range,
|
|
||||||
net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and
|
|
||||||
net.ipv4.ping_group_range.
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
=(securityContext):
|
|
||||||
=(sysctls):
|
|
||||||
- =(name): >-
|
|
||||||
kernel.shm_rmid_forced |
|
|
||||||
net.ipv4.ip_local_port_range |
|
|
||||||
net.ipv4.ip_unprivileged_port_start |
|
|
||||||
net.ipv4.tcp_syncookies |
|
|
||||||
net.ipv4.ping_group_range
|
|
||||||
|
|
||||||
validationFailureAction: "audit"
|
validationFailureAction: "audit"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,20 +1,10 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
apiVersion: "kyverno.io/v1"
|
apiVersion: "kyverno.io/v1"
|
||||||
kind: "ClusterPolicy"
|
kind: "ClusterPolicy"
|
||||||
metadata:
|
metadata:
|
||||||
name: "require-health-and-liveness-check"
|
name: "require-health-and-liveness-check"
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Disallow usage of latest tag"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
Liveness and readiness probes need to be configured to correctly manage a Pod's lifecycle during deployments,
|
|
||||||
restarts, and upgrades.
|
|
||||||
For each Pod, a periodic `livenessProbe` is performed by the kubelet to determine if the Pod's containers are
|
|
||||||
running or need to be restarted.
|
|
||||||
A `readinessProbe` is used by Services and Pods to determine if the Pod is ready to receive network traffic.
|
|
||||||
This policy validates that all containers have livenessProbe and readinessProbe defined.
|
|
||||||
spec:
|
spec:
|
||||||
background: true
|
background: true
|
||||||
rules:
|
rules:
|
||||||
@@ -24,9 +14,8 @@ spec:
|
|||||||
- "Pod"
|
- "Pod"
|
||||||
name: "require-health-and-liveness-check"
|
name: "require-health-and-liveness-check"
|
||||||
validate:
|
validate:
|
||||||
message: >-
|
message: "Liveness and readiness probes are required. spec.containers[*].livenessProbe.periodSeconds
|
||||||
Liveness and readiness probes are required. spec.containers[*].livenessProbe.periodSeconds must be set to a
|
must be set to a value greater than 0."
|
||||||
value greater than 0.
|
|
||||||
pattern:
|
pattern:
|
||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
|
|||||||
40
.kyverno/policies/require-imagepullpolicy-always.yaml
Normal file
40
.kyverno/policies/require-imagepullpolicy-always.yaml
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "require-imagepullpolicy-always"
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "require-imagepullpolicy-always"
|
||||||
|
validate:
|
||||||
|
message: "The imagePullPolicy must be set to `Always` when the tag `latest` is used."
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- (image): "*:latest"
|
||||||
|
imagePullPolicy: "Always"
|
||||||
|
=(initContainers):
|
||||||
|
- (image): "*:latest"
|
||||||
|
imagePullPolicy: "Always"
|
||||||
|
containers:
|
||||||
|
- (image): "*:latest"
|
||||||
|
imagePullPolicy: "Always"
|
||||||
|
- spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- (image): "!*:latest"
|
||||||
|
imagePullPolicy: "IfNotPresent"
|
||||||
|
=(initContainers):
|
||||||
|
- (image): "!*:latest"
|
||||||
|
imagePullPolicy: "IfNotPresent"
|
||||||
|
containers:
|
||||||
|
- (image): "!*:latest"
|
||||||
|
imagePullPolicy: "IfNotPresent"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
@@ -1,51 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "require-imagepullpolicy"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Disallow usage of latest tag"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
If the `latest` tag is allowed for images, it is a good idea to have the imagePullPolicy field set to `Always` to
|
|
||||||
ensure later pulls get an updated image in case the latest tag gets updated.
|
|
||||||
This policy validates the imagePullPolicy is set to `Always` when the `latest` tag is specified explicitly or
|
|
||||||
where a tag is not defined at all.
|
|
||||||
Additionally this policy checks if the variable `.Values.global.imagePullPolicy` is used in templates.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
name: "require-imagePullPolicy"
|
|
||||||
validate:
|
|
||||||
message: >-
|
|
||||||
The imagePullPolicy must be set to `Always` when the `latest` tag is used, otherwise the value from
|
|
||||||
`.Values.global.imagePullPolicy` has to be used.
|
|
||||||
anyPattern:
|
|
||||||
- spec:
|
|
||||||
=(ephemeralContainers):
|
|
||||||
- (image): "*:latest | !*:*"
|
|
||||||
imagePullPolicy: "Always"
|
|
||||||
=(initContainers):
|
|
||||||
- (image): "*:latest | !*:*"
|
|
||||||
imagePullPolicy: "Always"
|
|
||||||
containers:
|
|
||||||
- (image): "*:latest | !*:*"
|
|
||||||
imagePullPolicy: "Always"
|
|
||||||
- spec:
|
|
||||||
=(ephemeralContainers):
|
|
||||||
- (image): "!*:latest"
|
|
||||||
imagePullPolicy: "kyverno"
|
|
||||||
=(initContainers):
|
|
||||||
- (image): "!*:latest"
|
|
||||||
imagePullPolicy: "kyverno"
|
|
||||||
containers:
|
|
||||||
- (image): "!*:latest"
|
|
||||||
imagePullPolicy: "kyverno"
|
|
||||||
validationFailureAction: "audit"
|
|
||||||
...
|
|
||||||
23
.kyverno/policies/require-imagepullsecets.yaml
Normal file
23
.kyverno/policies/require-imagepullsecets.yaml
Normal file
@@ -0,0 +1,23 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "require-imagepullsecrets"
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "require-imagepullsecrets"
|
||||||
|
validate:
|
||||||
|
message: "ImagePullSecrets are required."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
imagePullSecrets:
|
||||||
|
- name: "*"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
@@ -1,20 +1,10 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
apiVersion: "kyverno.io/v1"
|
apiVersion: "kyverno.io/v1"
|
||||||
kind: "ClusterPolicy"
|
kind: "ClusterPolicy"
|
||||||
metadata:
|
metadata:
|
||||||
name: "require-requests-limits"
|
name: "require-requests-limits"
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Require resources cpu/memory request and limits."
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
As application workloads share cluster resources, it is important to limit resources requested and consumed by
|
|
||||||
each Pod.
|
|
||||||
It is recommended to require resource requests and limits per Pod, especially for memory and CPU.
|
|
||||||
If a Namespace level request or limit is specified, defaults will automatically be applied to each Pod based on
|
|
||||||
the LimitRange configuration.
|
|
||||||
This policy validates that all containers have specified requests for memory and CPU and a limit for memory.
|
|
||||||
spec:
|
spec:
|
||||||
background: true
|
background: true
|
||||||
rules:
|
rules:
|
||||||
|
|||||||
@@ -4,13 +4,7 @@
|
|||||||
apiVersion: "kyverno.io/v1"
|
apiVersion: "kyverno.io/v1"
|
||||||
kind: "ClusterPolicy"
|
kind: "ClusterPolicy"
|
||||||
metadata:
|
metadata:
|
||||||
name: "template-storage"
|
name: "require-storage"
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Validate storageClass and size templates."
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
This policy validates if `.Values.persistence.storageClassNames` variables are used in templates and if the size
|
|
||||||
of volumes can be customized by `.Values.persistence.size` variable.
|
|
||||||
spec:
|
spec:
|
||||||
background: true
|
background: true
|
||||||
rules:
|
rules:
|
||||||
@@ -18,9 +12,9 @@ spec:
|
|||||||
resources:
|
resources:
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
name: "template-storageClassName-pod"
|
name: "require-storageclass-pod"
|
||||||
validate:
|
validate:
|
||||||
message: "VolumeClaims inside pods needs to have storageClass set when templated."
|
message: "VolumeClaims inside pods need to have storageClass set when templated."
|
||||||
pattern:
|
pattern:
|
||||||
spec:
|
spec:
|
||||||
(volumeClaimTemplates):
|
(volumeClaimTemplates):
|
||||||
@@ -30,9 +24,9 @@ spec:
|
|||||||
resources:
|
resources:
|
||||||
kinds:
|
kinds:
|
||||||
- "PersistentVolumeClaim"
|
- "PersistentVolumeClaim"
|
||||||
name: "template-storageClassName-pvc"
|
name: "require-storageclass-pvc"
|
||||||
validate:
|
validate:
|
||||||
message: "PersistentVolumeClaim needs to have storageClassName set when templated."
|
message: "Persistent Volume Claim need to have storageClassName set when templated."
|
||||||
pattern:
|
pattern:
|
||||||
spec:
|
spec:
|
||||||
storageClassName: "kyverno-test"
|
storageClassName: "kyverno-test"
|
||||||
@@ -41,9 +35,9 @@ spec:
|
|||||||
resources:
|
resources:
|
||||||
kinds:
|
kinds:
|
||||||
- "StatefulSet"
|
- "StatefulSet"
|
||||||
name: "template-requests-storage-pod"
|
name: "require-storage-size-pod"
|
||||||
validate:
|
validate:
|
||||||
message: "VolumeClaims inside pods needs to have storageClass set when templated."
|
message: "VolumeClaims inside pods need to have storageClass set when templated."
|
||||||
pattern:
|
pattern:
|
||||||
spec:
|
spec:
|
||||||
(volumeClaimTemplates):
|
(volumeClaimTemplates):
|
||||||
@@ -55,9 +49,9 @@ spec:
|
|||||||
resources:
|
resources:
|
||||||
kinds:
|
kinds:
|
||||||
- "PersistentVolumeClaim"
|
- "PersistentVolumeClaim"
|
||||||
name: "template-requests-storage-pvc"
|
name: "require-storage-size-pvc"
|
||||||
validate:
|
validate:
|
||||||
message: "PersistentVolumeClaim needs to have storageClassName set when templated."
|
message: "Persistent Volume Claim need to have storageClassName set when templated."
|
||||||
pattern:
|
pattern:
|
||||||
spec:
|
spec:
|
||||||
resources:
|
resources:
|
||||||
@@ -1,18 +1,10 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
apiVersion: "kyverno.io/v1"
|
apiVersion: "kyverno.io/v1"
|
||||||
kind: "ClusterPolicy"
|
kind: "ClusterPolicy"
|
||||||
metadata:
|
metadata:
|
||||||
name: "require-tag-and-digest"
|
name: "require-tag-and-digest"
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Require tag and digest for image."
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
To ensure that containers are not compromised in container registry by pushing malicious code to the same tag, it
|
|
||||||
is required to reference images by setting a sha256 hashed digest.
|
|
||||||
Setting only the digest is complicated for humans to compare software versions, therefore in openDesk it is
|
|
||||||
required to reference container images by tag and digest.
|
|
||||||
spec:
|
spec:
|
||||||
background: true
|
background: true
|
||||||
rules:
|
rules:
|
||||||
|
|||||||
@@ -1,16 +1,10 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
apiVersion: "kyverno.io/v1"
|
apiVersion: "kyverno.io/v1"
|
||||||
kind: "ClusterPolicy"
|
kind: "ClusterPolicy"
|
||||||
metadata:
|
metadata:
|
||||||
name: "template-image-registries"
|
name: "restrict-image-registries"
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Check image registry template"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
This policy verifies that a custom external registry can be template to allow downloads from a private registry or
|
|
||||||
cache.
|
|
||||||
spec:
|
spec:
|
||||||
background: true
|
background: true
|
||||||
rules:
|
rules:
|
||||||
@@ -18,7 +12,7 @@ spec:
|
|||||||
resources:
|
resources:
|
||||||
kinds:
|
kinds:
|
||||||
- "Pod"
|
- "Pod"
|
||||||
name: "template-image-registries"
|
name: "validate-registries"
|
||||||
validate:
|
validate:
|
||||||
message: "Unknown image registry."
|
message: "Unknown image registry."
|
||||||
pattern:
|
pattern:
|
||||||
@@ -1,38 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "template-ingress"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Validate openDesk Ingress templating"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
This policy verifies that ingress variables are templated.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Ingress"
|
|
||||||
name: "template-ingressClassName"
|
|
||||||
validate:
|
|
||||||
message: "Verifies that ingressClassName can be customized by `.Values.ingress.ingressClassName` variable."
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
ingressClassName: "kyverno"
|
|
||||||
- match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Ingress"
|
|
||||||
name: "template-tls-secretName"
|
|
||||||
validate:
|
|
||||||
message: "Verifies that tls.secretName can be customized by `.Values.ingress.tls.secretName` variable."
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
tls:
|
|
||||||
- secretName: "kyverno-tls"
|
|
||||||
validationFailureAction: "audit"
|
|
||||||
...
|
|
||||||
@@ -1,29 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "template-replicas"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "Validate openDesk Pod replicas templating"
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
This policy verifies that `.Values.replicas.<app>` variables are templated.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Deployment"
|
|
||||||
- "StatefulSet"
|
|
||||||
name: "template-replicas"
|
|
||||||
validate:
|
|
||||||
message: "Verifies that replica count can be customized by `.Values.replicas.<app>` variable."
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
replicas: 42
|
|
||||||
|
|
||||||
validationFailureAction: "audit"
|
|
||||||
...
|
|
||||||
@@ -1,31 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
apiVersion: "kyverno.io/v1"
|
|
||||||
kind: "ClusterPolicy"
|
|
||||||
metadata:
|
|
||||||
name: "template-imagepullsecrets"
|
|
||||||
annotations:
|
|
||||||
policies.kyverno.io/title: "ImagePullSecrets template variable have to be implemented."
|
|
||||||
policies.kyverno.io/subject: "Pod"
|
|
||||||
policies.kyverno.io/description: >-
|
|
||||||
It is recommended to cache images to ensure continuous image availability during network partitions, rate limiting
|
|
||||||
or registry outages.
|
|
||||||
These caches as well as a company proxy may require authentication which will be provided as ImagePullSecrets.
|
|
||||||
This is a openDesk test to ensure that environment variables are templated in Helmfile deployment.
|
|
||||||
spec:
|
|
||||||
background: true
|
|
||||||
rules:
|
|
||||||
- match:
|
|
||||||
resources:
|
|
||||||
kinds:
|
|
||||||
- "Pod"
|
|
||||||
name: "template-imagePullSecrets"
|
|
||||||
validate:
|
|
||||||
message: "ImagePullSecrets are required."
|
|
||||||
pattern:
|
|
||||||
spec:
|
|
||||||
imagePullSecrets:
|
|
||||||
- name: "kyverno-test"
|
|
||||||
validationFailureAction: "audit"
|
|
||||||
...
|
|
||||||
@@ -1,81 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
# Platform type of repository
|
|
||||||
platform: "gitlab"
|
|
||||||
|
|
||||||
# Enable oboarding merge request
|
|
||||||
onboarding: false
|
|
||||||
|
|
||||||
# If set to true: keep repository data between runs instead of deleting the data
|
|
||||||
persistRepoData: true
|
|
||||||
|
|
||||||
# Controls Renovate's behavior regarding repository config files such as renovate.json
|
|
||||||
requireConfig: "ignored"
|
|
||||||
|
|
||||||
# List of Repositories
|
|
||||||
# See: https://docs.renovatebot.com/configuration-options/
|
|
||||||
repositories:
|
|
||||||
- repository: ""
|
|
||||||
# Prefix to use for all branch names created by renovate bot (default: "renovate/")
|
|
||||||
branchPrefix: "renovate/"
|
|
||||||
# Lowercase merge request and commit titles ("never" = leave titles untouched )
|
|
||||||
commitMessageLowerCase: "never"
|
|
||||||
# Commit scope to use if Semantic Commits are enabled (fix(<scope>)...)
|
|
||||||
semanticCommitScope: "ci"
|
|
||||||
# Commit type to use if Semantic Commits are enabled (default: "chore")
|
|
||||||
semanticCommitType: "chore"
|
|
||||||
# Include package files only within these defined paths
|
|
||||||
includePaths:
|
|
||||||
- "helmfile/environments/default/images.yaml"
|
|
||||||
- "helmfile/environments/default/charts.yaml"
|
|
||||||
customManagers:
|
|
||||||
- customType: "regex"
|
|
||||||
fileMatch:
|
|
||||||
- "helmfile/environments/default/images.yaml"
|
|
||||||
datasourceTemplate: "docker"
|
|
||||||
matchStrings:
|
|
||||||
- >
|
|
||||||
# yamllint disable rule:line-length
|
|
||||||
providerCategory: ["|']?(?<providerCategory>.+?)["|']?\n(?:.|\n|\r)+ registry: ["|']?(?<registryUrl>.+?)["|']?\n(?:.|\n|\r)+ repository: ["|']?(?<depName>.+?)["|']?\n(?:.|\n|\r)+ tag: ["|']?(?<currentValue>[^@]+)@(?<currentDigest>sha256:[a-f0-9]+)["|']
|
|
||||||
- customType: "regex"
|
|
||||||
fileMatch:
|
|
||||||
- "helmfile/environments/default/charts.yaml"
|
|
||||||
matchStrings:
|
|
||||||
- >
|
|
||||||
# yamllint disable rule:quoted-strings
|
|
||||||
providerCategory: ["|']?(?<providerCategory>.+?)["|']?\n(?:.|\n|\r)+ registry: ["|']?(?<registryUrl>.+?)["|']?\n(?:.|\n|\r)+ repository: ["|']?(?<depName>.+?)["|']?\n(?:.|\n|\r)+ name: ["|']?(?<FIGURE_THAT_OUT>.+?)["|']?\n(?:.|\n|\r)+ version: ["|']?(?<currentValue>.+?)["|']?
|
|
||||||
# Rules for matching packages
|
|
||||||
packageRules:
|
|
||||||
- matchDatasources: "docker"
|
|
||||||
matchDepTypes:
|
|
||||||
- "external"
|
|
||||||
groupName: "external-dependencies"
|
|
||||||
- matchDatasources: "docker"
|
|
||||||
matchDepTypes:
|
|
||||||
- "supplier"
|
|
||||||
groupName: "supplier-dependencies"
|
|
||||||
- matchDatasources: "docker"
|
|
||||||
matchDepTypes:
|
|
||||||
- "platform"
|
|
||||||
groupName: "platform-dependencies"
|
|
||||||
- matchDatasources: "helm"
|
|
||||||
matchDepTypes:
|
|
||||||
- "external"
|
|
||||||
groupName: "external-dependencies"
|
|
||||||
- matchDatasources: "helm"
|
|
||||||
matchDepTypes:
|
|
||||||
- "supplier"
|
|
||||||
groupName: "supplier-dependencies"
|
|
||||||
- matchDatasources: "helm"
|
|
||||||
matchDepTypes:
|
|
||||||
- "platform"
|
|
||||||
groupName: "platform-dependencies"
|
|
||||||
# Add merge request labels
|
|
||||||
labels:
|
|
||||||
- "renovate"
|
|
||||||
- "dependencies"
|
|
||||||
# Enable custom regex manager only
|
|
||||||
enabledManagers:
|
|
||||||
- "custom.regex"
|
|
||||||
...
|
|
||||||
16
CHANGELOG.md
16
CHANGELOG.md
@@ -1,19 +1,3 @@
|
|||||||
## [0.5.78](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.77...v0.5.78) (2024-02-23)
|
|
||||||
|
|
||||||
|
|
||||||
### Bug Fixes
|
|
||||||
|
|
||||||
* **ci:** Move main development repo OpenCoDE ([43718b8](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/43718b8da2966b87fab8e206df449c923f6615e7))
|
|
||||||
* **ci:** Run release pipeline only on pushes to main ([13dcb00](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/13dcb004419b4efd8ded8c25e7afa41d10156be8))
|
|
||||||
* **ci:** Update kyverno rules ([d9263c9](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/d9263c90110df241adaef8d1a5df8e8d8ceda11b))
|
|
||||||
* **docs:** Add missing footnote regarding Nubus ([bc6e4f8](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/bc6e4f8e5dcc32cc476de579fd56dbade79b7c31))
|
|
||||||
* **nextcloud:** Set admin priviledges for users in central IAM ([a3e415d](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/a3e415d575ba24b99e741994fb29d0f0cfd11d8a))
|
|
||||||
* **univention-management-stack:** Scaling udm-rest-api ([57d0f61](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/57d0f61b2c3e789b72a0098907817c97fee69268))
|
|
||||||
* **univention-management-stack:** Set Keycloak CSP header to allow session continuation in admin portal. ([a398e5a](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/a398e5aaf131c1f00b09e1776d6daf10f2c343ad))
|
|
||||||
* **univention-management-stack:** UMS portal-server scalability ([b1b4c28](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/b1b4c28618e0eca31b59719e9e1f2db8ecff7f5c))
|
|
||||||
* **univention-management-stack:** Univention Portal upstream codefixes version bump ([c2f62f7](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/c2f62f7c9487b2119b0d3efd98b40c92efb97c5d))
|
|
||||||
* **univention-management-stack:** Update provisioning to fix high CPU usage when in idle ([d9c23bd](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/d9c23bdf0b955c0b5e4c82dd1ee785b75ce18a3b))
|
|
||||||
|
|
||||||
## [0.5.77](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.76...v0.5.77) (2024-02-16)
|
## [0.5.77](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.76...v0.5.77) (2024-02-16)
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
46
README.md
46
README.md
@@ -11,13 +11,11 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
* [Requirements](#requirements)
|
* [Requirements](#requirements)
|
||||||
* [Getting started](#getting-started)
|
* [Getting started](#getting-started)
|
||||||
* [Advanced customization](#advanced-customization)
|
* [Advanced customization](#advanced-customization)
|
||||||
* [Development](#development)
|
|
||||||
* [Releases](#releases)
|
* [Releases](#releases)
|
||||||
* [Components](#components)
|
* [Components](#components)
|
||||||
* [Feedback](#feedback)
|
* [Feedback](#feedback)
|
||||||
* [License](#license)
|
* [License](#license)
|
||||||
* [Copyright](#copyright)
|
* [Copyright](#copyright)
|
||||||
* [Footnotes](#footnotes)
|
|
||||||
<!-- TOC -->
|
<!-- TOC -->
|
||||||
|
|
||||||
# Overview
|
# Overview
|
||||||
@@ -27,17 +25,17 @@ Aufbau ZenDiS" of Germany's Federal Ministry of the Interior.
|
|||||||
|
|
||||||
openDesk currently features the following functional main components:
|
openDesk currently features the following functional main components:
|
||||||
|
|
||||||
| Function | Functional Component | Component<br/>Version | Upstream Documentation |
|
| Function | Functional Component | Component<br/>Version | Upstream Documentation |
|
||||||
| -------------------- | --------------------------- | -------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
|
| -------------------- | --------------------------- | --------------------- | ----------------- |
|
||||||
| Chat & collaboration | Element ft. Nordeck widgets | [1.11.52](https://github.com/element-hq/element-desktop/blob/develop/CHANGELOG.md#changes-in-11152-2023-12-19) | [For the most recent release](https://element.io/user-guide) |
|
| Chat & collaboration | Element ft. Nordeck widgets | [1.11.52](https://github.com/element-hq/element-desktop/blob/develop/CHANGELOG.md#changes-in-11152-2023-12-19) | [For the most recent release](https://element.io/user-guide) |
|
||||||
| Diagram editor | Cryptpad ft. diagrams.net | [5.6.0](https://github.com/cryptpad/cryptpad/releases/tag/5.6.0) | [For the most recent release](https://docs.cryptpad.org/en/) |
|
| Diagram editor | Cryptpad ft. diagrams.net | [5.6.0](https://github.com/cryptpad/cryptpad/releases/tag/5.6.0) | [For the most recent release](https://docs.cryptpad.org/en/) |
|
||||||
| File management | Nextcloud | [28.0.2](https://nextcloud.com/de/changelog/#28-0-2) | [Nextcloud 28](https://docs.nextcloud.com/) |
|
| File management | Nextcloud | [28.0.2](https://nextcloud.com/de/changelog/#28-0-2) | [Nextcloud 28](https://docs.nextcloud.com/) |
|
||||||
| Groupware | OX Appsuite | [8.20](https://documentation.open-xchange.com/appsuite/releases/8.20/) | Online documentation available from within the installed application; [Additional resources](https://www.open-xchange.com/resources/oxpedia) |
|
| Groupware | OX Appsuite | [8.20](https://documentation.open-xchange.com/appsuite/releases/8.20/) | Online documentation available from within the installed application; [Additional resources](https://www.open-xchange.com/resources/oxpedia) |
|
||||||
| Knowledge management | XWiki | [15.10.4](https://www.xwiki.org/xwiki/bin/view/Blog/XWiki15104Released) | [For the most recent release](https://www.xwiki.org/xwiki/bin/view/Documentation) |
|
| Knowledge management | XWiki | [15.10.4](https://www.xwiki.org/xwiki/bin/view/Blog/XWiki15104Released) | [For the most recent release](https://www.xwiki.org/xwiki/bin/view/Documentation) |
|
||||||
| Portal & IAM | Nubus | Product Preview[^1] | [Univention's documentation website](https://docs.software-univention.de/n/en/index.html) |
|
| Portal & IAM | Nubus | Product Preview[^1] | [Univention's documentation website](https://docs.software-univention.de/n/en/index.html) |
|
||||||
| Project management | OpenProject | [13.3.1](https://www.openproject.org/docs/release-notes/13-3-1/) | [For the most recent release](https://www.openproject.org/docs/user-guide/) |
|
| Project management | OpenProject | [13.3.0](https://www.openproject.org/docs/release-notes/13-3-0/) | [For the most recent release](https://www.openproject.org/docs/user-guide/) |
|
||||||
| Videoconferencing | Jitsi | [2.0.8922](https://github.com/jitsi/jitsi-meet/releases/tag/stable%2Fjitsi-meet_8922) | [For the most recent release](https://jitsi.github.io/handbook/docs/category/user-guide/) |
|
| Videoconferencing | Jitsi | [2.0.8922](https://github.com/jitsi/jitsi-meet/releases/tag/stable%2Fjitsi-meet_8922) | [For the most recent release](https://jitsi.github.io/handbook/docs/category/user-guide/) |
|
||||||
| Weboffice | Collabora | [23.05.9.1.1](https://www.collaboraoffice.com/collabora-online-23-05-release-notes/) | Online documentation available from within the installed application; [Additional resources](https://sdk.collaboraonline.com/) |
|
| Weboffice | Collabora | [23.05.9.1.1](https://www.collaboraoffice.com/collabora-online-23-05-release-notes/) | Online documentation available from within the installed application; [Additional resources](https://sdk.collaboraonline.com/) |
|
||||||
|
|
||||||
While not all components are perfectly shaped for the execution inside containers, one of the project's objectives is to
|
While not all components are perfectly shaped for the execution inside containers, one of the project's objectives is to
|
||||||
align the applications with best practises regarding container design and operations.
|
align the applications with best practises regarding container design and operations.
|
||||||
@@ -77,10 +75,6 @@ Of course, further development also includes enhancing the documentation itself.
|
|||||||
- [Monitoring](./docs/monitoring.md)
|
- [Monitoring](./docs/monitoring.md)
|
||||||
- [Theming](./docs/theming.md)
|
- [Theming](./docs/theming.md)
|
||||||
|
|
||||||
# Development
|
|
||||||
|
|
||||||
⟶ To understand the repository contents from a developer perspective please read the [Development](./docs/development.md) guide.
|
|
||||||
|
|
||||||
# Releases
|
# Releases
|
||||||
|
|
||||||
All technical releases are created using [Semantic Versioning](https://semver.org/lang/de/).
|
All technical releases are created using [Semantic Versioning](https://semver.org/lang/de/).
|
||||||
@@ -89,10 +83,9 @@ Gitlab provides an
|
|||||||
[overview on the releases](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases)
|
[overview on the releases](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases)
|
||||||
of this project.
|
of this project.
|
||||||
|
|
||||||
Please find a list of the artefacts related to the release either in the source code archive attached to the release or
|
The following release artefacts are provided beside the default source code assets:
|
||||||
in the files from the release's git-tag:
|
- `chart-index.json`: An overview of all Helm charts used by the release.
|
||||||
- `./helmfile/environments/default/images.yaml`
|
- `image-index.json`: An overview of all container images used by the release.
|
||||||
- `./helmfile/environments/default/charts.yaml`
|
|
||||||
|
|
||||||
⟶ Visit our detailed [Workflow](./docs/workflow.md) docs.
|
⟶ Visit our detailed [Workflow](./docs/workflow.md) docs.
|
||||||
|
|
||||||
@@ -108,7 +101,7 @@ Related to the deployment / contents of this repository,
|
|||||||
please use the [issues within this project](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues).
|
please use the [issues within this project](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues).
|
||||||
|
|
||||||
If you want to address other topics, please check the section
|
If you want to address other topics, please check the section
|
||||||
["Rückmeldungen und Beteiligung" in the OVERVIEW.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung) of the [openDesk Info Repository](https://gitlab.opencode.de/bmi/opendesk/info).
|
["Rückmeldungen und Beteiligung" of the Infos' project OVERVIEW.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung).
|
||||||
|
|
||||||
# License
|
# License
|
||||||
|
|
||||||
@@ -117,12 +110,3 @@ This project uses the following license: Apache-2.0
|
|||||||
# Copyright
|
# Copyright
|
||||||
|
|
||||||
Copyright (C) 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
Copyright (C) 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
|
||||||
# Footnotes
|
|
||||||
|
|
||||||
[^1]: Nubus is the Cloud Portal and IAM from Univention.
|
|
||||||
It is currently integrated as a product preview within openDesk therefore,
|
|
||||||
not all resources like documentation and structured release notes are available,
|
|
||||||
while the
|
|
||||||
[source code can already be found on Open CoDE](https://gitlab.opencode.de/bmi/opendesk/component-code/crossfunctional/univention).
|
|
||||||
Please find updates regarding the Nubus at https://nubus.io.
|
|
||||||
|
|||||||
@@ -73,7 +73,7 @@ flowchart TD
|
|||||||
|
|
||||||
## Intercom Service (ICS)
|
## Intercom Service (ICS)
|
||||||
|
|
||||||
The Univention Intercom Service's role is to enable cross-application integration based on browser interaction.
|
The UCS Intercom Service's role is to enable cross-application integration based on browser interaction.
|
||||||
Handling authentication when the frontend of an application is using the API from another application is often a
|
Handling authentication when the frontend of an application is using the API from another application is often a
|
||||||
challenge.
|
challenge.
|
||||||
For more details on the ICS please refer to its own [doc](./components/intercom-service.md).
|
For more details on the ICS please refer to its own [doc](./components/intercom-service.md).
|
||||||
@@ -113,13 +113,8 @@ The Filestore can be enabled on a per-project level in OpenProject's project adm
|
|||||||
# Identity data flows
|
# Identity data flows
|
||||||
|
|
||||||
An overview of
|
An overview of
|
||||||
- components that consume the LDAP service.
|
- components that consume the LDAP service. Mostly by using a dedicated LDAP search account.
|
||||||
- The components accessing the LDAP using a component specific LDAP search account.
|
- components using Univention Keycloak as identity provider (IdP). If not otherwise denoted based on the OAuth2 / OIDC flows.
|
||||||
- components using Univention Keycloak as identity provider (IdP).
|
|
||||||
- If not otherwise denoted the components make use of OAuth2 / OIDC flows.
|
|
||||||
- All components have a client configured in Keycloak, except for Jitsi which is using authentication with the
|
|
||||||
[Authorization Code Flow](https://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth) that does not
|
|
||||||
require an OIDC client to be configured in Keycloak.
|
|
||||||
|
|
||||||
Some components trust others to handle authentication for them.
|
Some components trust others to handle authentication for them.
|
||||||
|
|
||||||
|
|||||||
@@ -1,141 +0,0 @@
|
|||||||
<!--
|
|
||||||
SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
-->
|
|
||||||
|
|
||||||
<h1>Developing openDesk deployment automation</h1>
|
|
||||||
|
|
||||||
Active development on the deployment is currently only available for project members.
|
|
||||||
But contributions will be possible soon once the CLA process is sorted out.
|
|
||||||
|
|
||||||
* [Overview](#overview)
|
|
||||||
* [Default branch, `develop` and other branches](#default-branch-develop-and-other-branches)
|
|
||||||
* [External artefacts - `charts.yaml` and `images.yaml`](#external-artefacts---chartsyaml-and-imagesyaml)
|
|
||||||
* [Linting](#linting)
|
|
||||||
* [Renovate](#renovate)
|
|
||||||
* [Mirroring](#mirroring)
|
|
||||||
* [Get new artefacts mirrored](#get-new-artefacts-mirrored)
|
|
||||||
* [Creating new charts / images](#creating-new-charts--images)
|
|
||||||
|
|
||||||
# Overview
|
|
||||||
|
|
||||||
The following sketch provides an high level overview to get a basic understanding of the deployment relevant
|
|
||||||
structure of this repository. An understanding of that structure is vital if you want to contribute to
|
|
||||||
the development of the deployment automation of openDesk.
|
|
||||||
|
|
||||||
```mermaid
|
|
||||||
flowchart TD
|
|
||||||
A[./helmfile.yaml]-->B[./helmfile/apps/*all_configured_apps*/helmfile.yaml\nReferences the relevant app Helm\ncharts using details from 'charts.yaml']
|
|
||||||
B-->C[./values-*all_configured_components*.yaml.gotmpl\nValues to template the charts\nwith references to the `images.yaml`]
|
|
||||||
A-->D[./helmfile/environments/default/*\nwith just some examples below]
|
|
||||||
D-->F[charts.yaml]
|
|
||||||
D-->G[images.yaml]
|
|
||||||
D-->H[global.*]
|
|
||||||
D-->I[secrets.yaml\nreplicas.yaml\nresources.yaml\n...]
|
|
||||||
A-->|overwrite defaults with\nyour environment specific values|E[./helmfile/environments/*your_environment*/values.yaml.gotmpl]
|
|
||||||
```
|
|
||||||
|
|
||||||
The `helmfile.yaml` in the root folder is the basis for the whole deployment. It references the app specific `helmfile.yaml` files as well as some
|
|
||||||
global values files in `./environments/default`. It allows you to overwrite defaults by using one of the three predefined environments `dev`, `test`
|
|
||||||
and `prod`.
|
|
||||||
|
|
||||||
Before you look into any app specifc configuration it is recommended to review the contents of `./environments/default` to get an understanding of what
|
|
||||||
details are maintained in there, as they are usually referenced by the app configurations.
|
|
||||||
|
|
||||||
# Default branch, `develop` and other branches
|
|
||||||
|
|
||||||
The `main` branch is configured to be the default branch, as visitors of the project on Open CoDE should see that
|
|
||||||
branch by default.
|
|
||||||
|
|
||||||
Please use the `develop` branch to diverge your own branch(es) from. See the [workflow guide](./workflow.md)
|
|
||||||
for more details on naming conventions.
|
|
||||||
|
|
||||||
There is a CI bot that automatically creates a merge request once you initially pushed your branch to Open CoDE.
|
|
||||||
The merge request will of course target the `develop` branch, be in status `draft` and have you as assignee.
|
|
||||||
|
|
||||||
In case you do not plan to actually merge from the branch you have pushed, please close or delete the autocreated MR.
|
|
||||||
|
|
||||||
# External artefacts - `charts.yaml` and `images.yaml`
|
|
||||||
|
|
||||||
The `charts.yaml` and `images.yaml` are the central place to reference external artefacts that are used for the deployment.
|
|
||||||
|
|
||||||
Beside the deployment automation itself some tools work with the contents of the files:
|
|
||||||
|
|
||||||
- **Linting**: Ensures consistency of the file contents for the other tools.
|
|
||||||
- **Renovate**: Automatically create MRs that update the components to their latest version.
|
|
||||||
- **Mirror**: Mirror artefacts to Open CoDE.
|
|
||||||
|
|
||||||
Please find details on these tools below.
|
|
||||||
|
|
||||||
## Linting
|
|
||||||
|
|
||||||
In the project's CI there is a step dedicated to lint the two yaml files, as we want them to be in
|
|
||||||
- alphabetical order regarding the components and
|
|
||||||
- in a logical order regarding the non-commented lines (registry > repository > tag).
|
|
||||||
|
|
||||||
In the linting step the [openDesk CI CLI](https://gitlab.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli) is used to apply the
|
|
||||||
just mentioned sorting and the result is compared with the unsorted version. If there is a delta the linting fails and you probably
|
|
||||||
want to fix it by running the CLI tool locally.
|
|
||||||
|
|
||||||
**Note**: Please ensure that in component blocks you use comments only at the beginning of the block or at its end. Ideally you just stick
|
|
||||||
with the many available examples in the yaml files.
|
|
||||||
|
|
||||||
Example:
|
|
||||||
```
|
|
||||||
synapse:
|
|
||||||
# providerCategory: 'Supplier'
|
|
||||||
# providerResponsible: 'Element'
|
|
||||||
# upstreamRegistry: 'registry-1.docker.io'
|
|
||||||
# upstreamRepository: 'matrixdotorg/synapse'
|
|
||||||
# upstreamMirrorTagFilterRegEx: '^v(\d+)\.(\d+)\.(\d+)$'
|
|
||||||
# upstreamMirrorStartFrom: ['1', '91', '2']
|
|
||||||
registry: "registry.opencode.de"
|
|
||||||
repository: "bmi/opendesk/components/supplier/element/images-mirror/synapse"
|
|
||||||
tag: "v1.91.2@sha256:1d19508db417bb2b911c8e086bd3dc3b719ee75c6f6194d58af59b4c32b11322"
|
|
||||||
```
|
|
||||||
|
|
||||||
## Renovate
|
|
||||||
|
|
||||||
- See also: https://gitlab.opencode.de/bmi/opendesk/tooling/renovate-opencode
|
|
||||||
|
|
||||||
Uses a regular expression to match the values of the attributes
|
|
||||||
- `# upstreamRegistry`
|
|
||||||
- `# upstreamRepository`
|
|
||||||
- `tag`
|
|
||||||
check for newer versions of the given artefact and create a MR containing the newest version's tag (and digest).
|
|
||||||
|
|
||||||
## Mirroring
|
|
||||||
|
|
||||||
- See also: https://gitlab.opencode.de/bmi/opendesk/tooling/oci-pull-mirror
|
|
||||||
|
|
||||||
**Note:** The mirror is scheduled to run every hour at 42 minutes past the hour.
|
|
||||||
|
|
||||||
openDesk strives to make all relevant artefacts available on Open CoDE so there is the mirroring process
|
|
||||||
configured to pull artefacts that do not originate from Open CoDE into projects called `*-Mirror` within the
|
|
||||||
[openDesk Components section](https://gitlab.opencode.de/bmi/opendesk/components).
|
|
||||||
|
|
||||||
The mirror script takes the information on what artefacts to mirror from the annotation inside the two yaml files:
|
|
||||||
- `# upstreamRegistry` *required*: To identify the source registry
|
|
||||||
- `# upstreamRepository` *required*: To identify the source repository
|
|
||||||
- `# upstreamMirrorTagFilterRegEx` *required*: If this annotation is set it activates the mirror for the component. Only tags are being mirrored that match the given regular expression.
|
|
||||||
- `# upstreamMirrorStartFrom` *optional*: Array of numeric values in case you want to mirror only artefacts beginning with a specific version. You must use capturing groups
|
|
||||||
in `# upstreamMirrorTagFilterRegEx` to identify the single numeric elements of the version within the tag and use per capturing group (left to right) one numeric array
|
|
||||||
element here to define the version the mirror should start with.
|
|
||||||
|
|
||||||
### Get new artefacts mirrored
|
|
||||||
|
|
||||||
If you want new images or charts to be mirrored that are not yet included in one of the yaml files there are two options:
|
|
||||||
|
|
||||||
You include them in your branch with all required annotations and either
|
|
||||||
1. ask somebody from the platform development team to trigger the mirror's CI based on your branch or
|
|
||||||
2. you get your branch merged to `develop` already.
|
|
||||||
|
|
||||||
# Creating new charts / images
|
|
||||||
|
|
||||||
When you create new Helm charts please check out the
|
|
||||||
[openDesk Best Practises](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-best-practises)
|
|
||||||
for Helm charts.
|
|
||||||
|
|
||||||
You may also want to make use of our [standard CI](https://gitlab.opencode.de/bmi/opendesk/tooling/gitlab-config) to
|
|
||||||
easily get Charts and Images that are signed, linted, scanned and released.
|
|
||||||
Check out the `.gitlab-ci.yaml` files in the project's [Charts](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts) or [Images](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images) to get an idea how little you need to do yourself.
|
|
||||||
@@ -82,6 +82,7 @@ openDesk certificate management disabled.
|
|||||||
|
|
||||||
Evaluation the openDesk deployment does not require any external service to start, but features may be limited.
|
Evaluation the openDesk deployment does not require any external service to start, but features may be limited.
|
||||||
|
|
||||||
|
|
||||||
| Group | Type | Version | Tested against |
|
| Group | Type | Version | Tested against |
|
||||||
|----------|---------------------|---------|-----------------------|
|
|----------|---------------------|---------|-----------------------|
|
||||||
| Cache | Memached | `1.6.x` | Memached |
|
| Cache | Memached | `1.6.x` | Memached |
|
||||||
|
|||||||
@@ -20,42 +20,38 @@ Verified positive effects are marke with a check-mark in `Scaling (verified)` co
|
|||||||
marked with a gear.
|
marked with a gear.
|
||||||
|
|
||||||
|
|
||||||
| Component | Name | Scaling (effective) | Scaling (verified) |
|
| Component | Name | Scaling (effective) | Scaling (verified) |
|
||||||
|-----------------------------|------------------------------------------|:-------------------:|:------------------:|
|
|------------------|------------------------------------------|:-------------------:|:------------------:|
|
||||||
| ClamAV | `replicas.clamav` | :white_check_mark: | :white_check_mark: |
|
| ClamAV | `replicas.clamav` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.clamd` | :white_check_mark: | :white_check_mark: |
|
| | `replicas.clamd` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.freshclam` | :x: | :x: |
|
| | `replicas.freshclam` | :x: | :x: |
|
||||||
| | `replicas.icap` | :white_check_mark: | :white_check_mark: |
|
| | `replicas.icap` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.milter` | :white_check_mark: | :white_check_mark: |
|
| | `replicas.milter` | :white_check_mark: | :white_check_mark: |
|
||||||
| Collabora | `replicas.collabora` | :white_check_mark: | :gear: |
|
| Collabora | `replicas.collabora` | :white_check_mark: | :gear: |
|
||||||
| CryptPad | `replicas.cryptpad` | :white_check_mark: | :gear: |
|
| CryptPad | `replicas.cryptpad` | :white_check_mark: | :gear: |
|
||||||
| Dovecot | `replicas.dovecot` | :x: | :gear: |
|
| Dovecot | `replicas.dovecot` | :x: | :gear: |
|
||||||
| Element | `replicas.element` | :white_check_mark: | :white_check_mark: |
|
| Element | `replicas.element` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.matrixNeoBoardWidget` | :white_check_mark: | :gear: |
|
| | `replicas.matrixNeoBoardWidget` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.matrixNeoChoiceWidget` | :white_check_mark: | :gear: |
|
| | `replicas.matrixNeoChoiceWidget` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.matrixNeoDateFixBot` | :white_check_mark: | :gear: |
|
| | `replicas.matrixNeoDateFixBot` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.matrixNeoDateFixWidget` | :white_check_mark: | :gear: |
|
| | `replicas.matrixNeoDateFixWidget` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.matrixUserVerificationService` | :white_check_mark: | :gear: |
|
| | `replicas.matrixUserVerificationService` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.synapse` | :x: | :gear: |
|
| | `replicas.synapse` | :x: | :gear: |
|
||||||
| | `replicas.synapseWeb` | :white_check_mark: | :white_check_mark: |
|
| | `replicas.synapseWeb` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.wellKnown` | :white_check_mark: | :white_check_mark: |
|
| | `replicas.wellKnown` | :white_check_mark: | :white_check_mark: |
|
||||||
| Intercom Service | `replicas.intercomService` | :white_check_mark: | :white_check_mark: |
|
| Intercom Service | `replicas.intercomService` | :white_check_mark: | :gear: |
|
||||||
| Jitsi | `replicas.jibri` | :white_check_mark: | :gear: |
|
| Jitsi | `replicas.jibri` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.jicofo` | :white_check_mark: | :gear: |
|
| | `replicas.jicofo` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.jitsi ` | :white_check_mark: | :gear: |
|
| | `replicas.jitsi ` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.jitsiKeycloakAdapter` | :white_check_mark: | :gear: |
|
| | `replicas.jitsiKeycloakAdapter` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.jvb ` | :x: | :x: |
|
| | `replicas.jvb ` | :x: | :x: |
|
||||||
| Keycloak | `replicas.keycloak` | :white_check_mark: | :gear: |
|
| Keycloak | `replicas.keycloak` | :white_check_mark: | :gear: |
|
||||||
| Memcached | `replicas.memcached` | :gear: | :gear: |
|
| Memcached | `replicas.memcached` | :gear: | :gear: |
|
||||||
| Minio | `replicas.minioDistributed` | :white_check_mark: | :white_check_mark: |
|
| Minio | `replicas.minioDistributed` | :white_check_mark: | :white_check_mark: |
|
||||||
| Nextcloud | `replicas.nextcloudApache2` | :white_check_mark: | :white_check_mark: |
|
| Nextcloud | `replicas.nextcloudApache2` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.nextcloudExporter` | :white_check_mark: | :white_check_mark: |
|
| | `replicas.nextcloudExporter` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.nextcloudPHP` | :white_check_mark: | :white_check_mark: |
|
| | `replicas.nextcloudPHP` | :white_check_mark: | :white_check_mark: |
|
||||||
| OpenProject | `replicas.openproject` | :white_check_mark: | :white_check_mark: |
|
| OpenProject | `replicas.openproject` | :white_check_mark: | :white_check_mark: |
|
||||||
| Postfix | `replicas.postfix` | :x: | :gear: |
|
| Postfix | `replicas.postfix` | :x: | :gear: |
|
||||||
| Redis | `replicas.redis` | :gear: | :gear: |
|
| Redis | `replicas.redis` | :gear: | :gear: |
|
||||||
| Univention Management Stack | | :gear: | :gear: |
|
| XWiki | `replicas.xwiki` | :x: | :gear: |
|
||||||
| | `replicas.umsPortalFrontend` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.umsPortalServer` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.umsUdmRestApi` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| XWiki | `replicas.xwiki` | :x: | :gear: |
|
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ collabora:
|
|||||||
username: "collabora-internal-admin"
|
username: "collabora-internal-admin"
|
||||||
password: {{ .Values.secrets.collabora.adminPassword | quote }}
|
password: {{ .Values.secrets.collabora.adminPassword | quote }}
|
||||||
aliasgroups:
|
aliasgroups:
|
||||||
- host: "https://{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
- host: "https://{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}:443"
|
||||||
|
|
||||||
fullnameOverride: "collabora"
|
fullnameOverride: "collabora"
|
||||||
|
|
||||||
@@ -19,9 +19,9 @@ grafana:
|
|||||||
dashboards:
|
dashboards:
|
||||||
enabled: {{ .Values.grafana.dashboards.enabled }}
|
enabled: {{ .Values.grafana.dashboards.enabled }}
|
||||||
labels:
|
labels:
|
||||||
{{ .Values.grafana.dashboards.labels | toYaml | nindent 6 }}
|
{{- toYaml .Values.grafana.dashboards.labels | nindent 6 }}
|
||||||
annotations:
|
annotations:
|
||||||
{{ .Values.grafana.dashboards.annotations | toYaml | nindent 6 }}
|
{{- toYaml .Values.grafana.dashboards.annotations | nindent 6 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry | default .Values.images.collabora.registry }}/{{ .Values.images.collabora.repository }}"
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.collabora.registry }}/{{ .Values.images.collabora.repository }}"
|
||||||
@@ -90,11 +90,11 @@ prometheus:
|
|||||||
servicemonitor:
|
servicemonitor:
|
||||||
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
labels:
|
labels:
|
||||||
{{ .Values.prometheus.serviceMonitors.labels | toYaml | nindent 6 }}
|
{{- toYaml .Values.prometheus.serviceMonitors.labels | nindent 6 }}
|
||||||
rules:
|
rules:
|
||||||
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
||||||
additionalLabels:
|
additionalLabels:
|
||||||
{{ .Values.prometheus.prometheusRules.labels | toYaml | nindent 6 }}
|
{{- toYaml .Values.prometheus.prometheusRules.labels | nindent 6 }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.collabora }}
|
replicaCount: {{ .Values.replicas.collabora }}
|
||||||
|
|
||||||
@@ -126,7 +126,7 @@ securityContext:
|
|||||||
- "NET_RAW"
|
- "NET_RAW"
|
||||||
- "SYS_CHROOT"
|
- "SYS_CHROOT"
|
||||||
- "MKNOD"
|
- "MKNOD"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.collabora | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.collabora }}
|
||||||
serviceAccount:
|
serviceAccount:
|
||||||
create: true
|
create: true
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -13,8 +13,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.cryptpad.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.cryptpad.registry }}/{{ .Values.charts.cryptpad.repository }}"
|
||||||
{{ .Values.charts.cryptpad.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "cryptpad"
|
- name: "cryptpad"
|
||||||
|
|||||||
@@ -70,7 +70,7 @@ securityContext:
|
|||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
runAsUser: 4001
|
runAsUser: 4001
|
||||||
runAsGroup: 4001
|
runAsGroup: 4001
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.cryptpad | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.cryptpad }}
|
||||||
|
|
||||||
serviceAccount:
|
serviceAccount:
|
||||||
create: true
|
create: true
|
||||||
|
|||||||
@@ -13,40 +13,35 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.element.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.element.registry }}/{{ .Values.charts.element.repository }}"
|
||||||
{{ .Values.charts.element.repository }}"
|
|
||||||
- name: "element-well-known-repo"
|
- name: "element-well-known-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.elementWellKnown.verify }}
|
verify: {{ .Values.charts.elementWellKnown.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.elementWellKnown.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.elementWellKnown.registry }}/{{ .Values.charts.elementWellKnown.repository }}"
|
||||||
{{ .Values.charts.elementWellKnown.repository }}"
|
|
||||||
- name: "synapse-web-repo"
|
- name: "synapse-web-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.synapseWeb.verify }}
|
verify: {{ .Values.charts.synapseWeb.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapseWeb.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapseWeb.registry }}/{{ .Values.charts.synapseWeb.repository }}"
|
||||||
{{ .Values.charts.synapseWeb.repository }}"
|
|
||||||
- name: "synapse-repo"
|
- name: "synapse-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.synapse.verify }}
|
verify: {{ .Values.charts.synapse.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapse.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapse.registry }}/{{ .Values.charts.synapse.repository }}"
|
||||||
{{ .Values.charts.synapse.repository }}"
|
|
||||||
- name: "synapse-create-account-repo"
|
- name: "synapse-create-account-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.synapseCreateAccount.verify }}
|
verify: {{ .Values.charts.synapseCreateAccount.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapseCreateAccount.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapseCreateAccount.registry }}/{{ .Values.charts.synapseCreateAccount.repository }}"
|
||||||
{{ .Values.charts.synapseCreateAccount.repository }}"
|
|
||||||
|
|
||||||
# openDesk Matrix Widgets
|
# openDesk Matrix Widgets
|
||||||
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-matrix-widgets
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-matrix-widgets
|
||||||
@@ -64,32 +59,28 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeoboardWidget.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeoboardWidget.registry }}/{{ .Values.charts.matrixNeoboardWidget.repository }}"
|
||||||
{{ .Values.charts.matrixNeoboardWidget.repository }}"
|
|
||||||
- name: "matrix-neochoice-widget-repo"
|
- name: "matrix-neochoice-widget-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.matrixNeoboardWidget.verify }}
|
verify: {{ .Values.charts.matrixNeoboardWidget.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeoboardWidget.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeoboardWidget.registry }}/{{ .Values.charts.matrixNeoboardWidget.repository }}"
|
||||||
{{ .Values.charts.matrixNeoboardWidget.repository }}"
|
|
||||||
- name: "matrix-neodatefix-widget-repo"
|
- name: "matrix-neodatefix-widget-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.matrixNeodatefixWidget.verify }}
|
verify: {{ .Values.charts.matrixNeodatefixWidget.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeodatefixWidget.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeodatefixWidget.registry }}/{{ .Values.charts.matrixNeodatefixWidget.repository }}"
|
||||||
{{ .Values.charts.matrixNeodatefixWidget.repository }}"
|
|
||||||
- name: "matrix-neodatefix-bot-repo"
|
- name: "matrix-neodatefix-bot-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.matrixNeodatefixBot.verify }}
|
verify: {{ .Values.charts.matrixNeodatefixBot.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeodatefixBot.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeodatefixBot.registry }}/{{ .Values.charts.matrixNeodatefixBot.repository }}"
|
||||||
{{ .Values.charts.matrixNeodatefixBot.repository }}"
|
|
||||||
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
configuration:
|
configuration:
|
||||||
endToEndEncryption: true
|
endToEndEncryption: false
|
||||||
additionalConfiguration:
|
additionalConfiguration:
|
||||||
logout_redirect_url: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}/protocol/openid-connect/logout?client_id=matrix&post_logout_redirect_uri=https%3A%2F%2F{{ .Values.global.hosts.univentionManagementStack }}.{{ .Values.global.domain }}"
|
logout_redirect_url: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}/protocol/openid-connect/logout?client_id=matrix&post_logout_redirect_uri=https%3A%2F%2F{{ .Values.global.hosts.univentionManagementStack }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
@@ -15,6 +15,9 @@ configuration:
|
|||||||
portal_url: "https://{{ .Values.global.hosts.univentionManagementStack }}.{{ .Values.global.domain }}/"
|
portal_url: "https://{{ .Values.global.hosts.univentionManagementStack }}.{{ .Values.global.domain }}/"
|
||||||
custom_css_variables:
|
custom_css_variables:
|
||||||
--cpd-color-text-action-accent: {{ .Values.theme.colors.primary | quote }}
|
--cpd-color-text-action-accent: {{ .Values.theme.colors.primary | quote }}
|
||||||
|
widget_types:
|
||||||
|
- jitsi
|
||||||
|
- net.nordeck
|
||||||
|
|
||||||
"net.nordeck.element_web.module.widget_lifecycle":
|
"net.nordeck.element_web.module.widget_lifecycle":
|
||||||
widget_permissions:
|
widget_permissions:
|
||||||
@@ -107,7 +110,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.element | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.element }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
domain: {{ .Values.global.domain | quote }}
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.matrixNeoBoardWidget | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.matrixNeoBoardWidget }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
domain: {{ .Values.global.domain | quote }}
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.matrixNeoChoiceWidget | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.matrixNeoChoiceWidget }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
domain: {{ .Values.global.domain | quote }}
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
|||||||
@@ -35,6 +35,6 @@ securityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.synapseCreateUser | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.synapseCreateUser }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -35,7 +35,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.matrixNeoDateFixBot | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.matrixNeoDateFixBot }}
|
||||||
|
|
||||||
extraEnvVars:
|
extraEnvVars:
|
||||||
- name: "ACCESS_TOKEN"
|
- name: "ACCESS_TOKEN"
|
||||||
@@ -43,6 +43,8 @@ extraEnvVars:
|
|||||||
secretKeyRef:
|
secretKeyRef:
|
||||||
name: "matrix-neodatefix-bot-account"
|
name: "matrix-neodatefix-bot-account"
|
||||||
key: "access_token"
|
key: "access_token"
|
||||||
|
- name: "ENABLE_CRYPTO"
|
||||||
|
value: "false"
|
||||||
|
|
||||||
image:
|
image:
|
||||||
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|||||||
@@ -18,7 +18,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.matrixNeoDateFixWidget | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.matrixNeoDateFixWidget }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
domain: {{ .Values.global.domain | quote }}
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
|||||||
@@ -35,5 +35,5 @@ securityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.synapseCreateUser | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.synapseCreateUser }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.matrixUserVerificationService | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.matrixUserVerificationService }}
|
||||||
|
|
||||||
extraEnvVars:
|
extraEnvVars:
|
||||||
- name: "UVS_ACCESS_TOKEN"
|
- name: "UVS_ACCESS_TOKEN"
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.synapseWeb | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.synapseWeb }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
domain: {{ .Values.global.domain | quote }}
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
|||||||
@@ -79,7 +79,7 @@ containerSecurityContext:
|
|||||||
runAsGroup: 10991
|
runAsGroup: 10991
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.synapse | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.synapse }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
domain: {{ .Values.global.domain | quote }}
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
---
|
---
|
||||||
configuration:
|
configuration:
|
||||||
e2ee:
|
e2ee:
|
||||||
forceDisable: false
|
forceDisable: true
|
||||||
|
|
||||||
containerSecurityContext:
|
containerSecurityContext:
|
||||||
allowPrivilegeEscalation: false
|
allowPrivilegeEscalation: false
|
||||||
@@ -18,7 +18,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 101
|
runAsUser: 101
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.wellKnown | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.wellKnown }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
domain: {{ .Values.global.domain | quote }}
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
|||||||
@@ -13,8 +13,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.intercomService.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.intercomService.registry }}/{{ .Values.charts.intercomService.repository }}"
|
||||||
{{ .Values.charts.intercomService.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "intercom-service"
|
- name: "intercom-service"
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ containerSecurityContext:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.intercom | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.intercom }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
domain: {{ .Values.global.domain | quote }}
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
|||||||
@@ -13,8 +13,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.jitsi.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.jitsi.registry }}/{{ .Values.charts.jitsi.repository }}"
|
||||||
{{ .Values.charts.jitsi.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "jitsi"
|
- name: "jitsi"
|
||||||
|
|||||||
@@ -23,7 +23,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 1993
|
runAsUser: 1993
|
||||||
runAsGroup: 1993
|
runAsGroup: 1993
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.jitsiKeycloakAdapter | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.jitsiKeycloakAdapter }}
|
||||||
|
|
||||||
cleanup:
|
cleanup:
|
||||||
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
@@ -75,7 +75,7 @@ jitsi:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.jitsi | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.jitsi }}
|
||||||
prosody:
|
prosody:
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry | default .Values.images.prosody.registry }}/{{ .Values.images.prosody.repository }}"
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.prosody.registry }}/{{ .Values.images.prosody.repository }}"
|
||||||
@@ -123,7 +123,7 @@ jitsi:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.prosody | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.prosody }}
|
||||||
jicofo:
|
jicofo:
|
||||||
replicaCount: {{ .Values.replicas.jicofo }}
|
replicaCount: {{ .Values.replicas.jicofo }}
|
||||||
image:
|
image:
|
||||||
@@ -145,7 +145,7 @@ jitsi:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.jicofo | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.jicofo }}
|
||||||
jvb:
|
jvb:
|
||||||
replicaCount: {{ .Values.replicas.jvb }}
|
replicaCount: {{ .Values.replicas.jvb }}
|
||||||
image:
|
image:
|
||||||
@@ -168,7 +168,7 @@ jitsi:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.jvb | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.jvb }}
|
||||||
jibri:
|
jibri:
|
||||||
replicaCount: {{ .Values.replicas.jibri }}
|
replicaCount: {{ .Values.replicas.jibri }}
|
||||||
image:
|
image:
|
||||||
@@ -206,7 +206,7 @@ patchJVB:
|
|||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.jitsiPatchJVB | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.jitsiPatchJVB }}
|
||||||
image:
|
image:
|
||||||
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.jitsiPatchJVB.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.jitsiPatchJVB.registry | quote }}
|
||||||
|
|||||||
@@ -13,16 +13,14 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.nextcloudManagement.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.nextcloudManagement.registry }}/{{ .Values.charts.nextcloudManagement.repository }}"
|
||||||
{{ .Values.charts.nextcloudManagement.repository }}"
|
|
||||||
- name: "nextcloud-repo"
|
- name: "nextcloud-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.nextcloud.verify }}
|
verify: {{ .Values.charts.nextcloud.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.nextcloud.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.nextcloud.registry }}/{{ .Values.charts.nextcloud.repository }}"
|
||||||
{{ .Values.charts.nextcloud.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "opendesk-nextcloud-management"
|
- name: "opendesk-nextcloud-management"
|
||||||
|
|||||||
@@ -47,20 +47,12 @@ configuration:
|
|||||||
ldap:
|
ldap:
|
||||||
host: {{ .Values.ldap.host | quote }}
|
host: {{ .Values.ldap.host | quote }}
|
||||||
password: {{ .Values.secrets.univentionManagementStack.ldapSearch.nextcloud | quote }}
|
password: {{ .Values.secrets.univentionManagementStack.ldapSearch.nextcloud | quote }}
|
||||||
adminGroupName: "managed-by-attribute-FileshareAdmin"
|
|
||||||
objectstore:
|
objectstore:
|
||||||
auth:
|
auth:
|
||||||
accessKey:
|
accessKey:
|
||||||
value: {{ .Values.objectstores.nextcloud.username | quote }}
|
value: "nextcloud_user"
|
||||||
secretKey:
|
secretKey:
|
||||||
value: {{ .Values.objectstores.nextcloud.secretKey | default .Values.secrets.minio.nextcloudUser | quote }}
|
value: {{ .Values.secrets.minio.nextcloudUser | quote }}
|
||||||
bucket: {{ .Values.objectstores.nextcloud.bucket | quote }}
|
|
||||||
host: {{ .Values.objectstores.nextcloud.endpoint | default (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
|
||||||
region: {{ .Values.objectstores.nextcloud.region | quote }}
|
|
||||||
storageClass: {{ .Values.objectstores.nextcloud.storageClass | quote }}
|
|
||||||
port: {{ .Values.objectstores.nextcloud.port | quote }}
|
|
||||||
pathStyle: {{ .Values.objectstores.nextcloud.pathStyle | quote }}
|
|
||||||
useSSL: {{ .Values.objectstores.nextcloud.useSSL | quote }}
|
|
||||||
oidc:
|
oidc:
|
||||||
username:
|
username:
|
||||||
value: "opendesk-nextcloud"
|
value: "opendesk-nextcloud"
|
||||||
@@ -95,7 +87,7 @@ containerSecurityContext:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: false
|
readOnlyRootFilesystem: false
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.nextcloudManagement | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.nextcloudManagement }}
|
||||||
|
|
||||||
debug:
|
debug:
|
||||||
loglevel: {{ if .Values.debug.enabled }}"0"{{ else }}"1"{{ end }}
|
loglevel: {{ if .Values.debug.enabled }}"0"{{ else }}"1"{{ end }}
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ exporter:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.nextcloudExporter | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.nextcloudExporter }}
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.nextcloudExporter.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.nextcloudExporter.registry | quote }}
|
||||||
repository: "{{ .Values.images.nextcloudExporter.repository }}"
|
repository: "{{ .Values.images.nextcloudExporter.repository }}"
|
||||||
@@ -35,12 +35,12 @@ exporter:
|
|||||||
serviceMonitor:
|
serviceMonitor:
|
||||||
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
labels:
|
labels:
|
||||||
{{ .Values.prometheus.serviceMonitors.labels | toYaml | nindent 8 }}
|
{{- toYaml .Values.prometheus.serviceMonitors.labels | nindent 8 }}
|
||||||
prometheusRule:
|
prometheusRule:
|
||||||
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
||||||
additionalLabels:
|
additionalLabels:
|
||||||
{{ .Values.prometheus.prometheusRules.labels | toYaml | nindent 8 }}
|
{{- toYaml .Values.prometheus.prometheusRules.labels | nindent 8 }}
|
||||||
replicaCount: {{ .Values.replicas.nextcloudExporter }}
|
replicas: {{ .Values.replicas.nextcloudExporter }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.nextcloudExporter | toYaml | nindent 4 }}
|
{{ .Values.resources.nextcloudExporter | toYaml | nindent 4 }}
|
||||||
|
|
||||||
@@ -78,7 +78,7 @@ php:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.nextcloudPHP | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.nextcloudPHP }}
|
||||||
cron:
|
cron:
|
||||||
successfulJobsHistoryLimit: {{ if .Values.debug.enabled }}"3"{{ else }}"0"{{ end }}
|
successfulJobsHistoryLimit: {{ if .Values.debug.enabled }}"3"{{ else }}"0"{{ end }}
|
||||||
debug:
|
debug:
|
||||||
@@ -92,12 +92,12 @@ php:
|
|||||||
serviceMonitor:
|
serviceMonitor:
|
||||||
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
labels:
|
labels:
|
||||||
{{ .Values.prometheus.serviceMonitors.labels | toYaml | nindent 8 }}
|
{{- toYaml .Values.prometheus.serviceMonitors.labels | nindent 8 }}
|
||||||
prometheusRule:
|
prometheusRule:
|
||||||
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
||||||
additionalLabels:
|
additionalLabels:
|
||||||
{{ .Values.prometheus.prometheusRules.labels | toYaml | nindent 8 }}
|
{{- toYaml .Values.prometheus.prometheusRules.labels | nindent 8 }}
|
||||||
replicaCount: {{ .Values.replicas.nextcloudPHP }}
|
replicas: {{ .Values.replicas.nextcloudPHP }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.nextcloudPHP | toYaml | nindent 4 }}
|
{{ .Values.resources.nextcloudPHP | toYaml | nindent 4 }}
|
||||||
|
|
||||||
@@ -118,7 +118,7 @@ apache2:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.nextcloudApache2 | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.nextcloudApache2 }}
|
||||||
ingress:
|
ingress:
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
@@ -130,7 +130,7 @@ apache2:
|
|||||||
repository: {{ .Values.images.nextcloudApache2.repository | quote }}
|
repository: {{ .Values.images.nextcloudApache2.repository | quote }}
|
||||||
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
tag: {{ .Values.images.nextcloudApache2.tag | quote }}
|
tag: {{ .Values.images.nextcloudApache2.tag | quote }}
|
||||||
replicaCount: {{ .Values.replicas.nextcloudApache2 }}
|
replicas: {{ .Values.replicas.nextcloudApache2 }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.nextcloudApache2 | toYaml | nindent 4 }}
|
{{ .Values.resources.nextcloudApache2 | toYaml | nindent 4 }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -13,16 +13,14 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.dovecot.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.dovecot.registry }}/{{ .Values.charts.dovecot.repository }}"
|
||||||
{{ .Values.charts.dovecot.repository }}"
|
|
||||||
|
|
||||||
# Open-Xchange
|
# Open-Xchange
|
||||||
- name: "open-xchange-repo"
|
- name: "open-xchange-repo"
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.openXchangeAppSuite.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.openXchangeAppSuite.registry }}/{{ .Values.charts.openXchangeAppSuite.repository }}"
|
||||||
{{ .Values.charts.openXchangeAppSuite.repository }}"
|
|
||||||
|
|
||||||
# openDesk Open-Xchange Bootstrap
|
# openDesk Open-Xchange Bootstrap
|
||||||
# Source: https://gitlab.opencode.de/bmi/opendesk/components/charts/opendesk-open-xchange-bootstrap
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/charts/opendesk-open-xchange-bootstrap
|
||||||
|
|||||||
@@ -66,7 +66,7 @@ containerSecurityContext:
|
|||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.dovecot | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.dovecot }}
|
||||||
|
|
||||||
podSecurityContext:
|
podSecurityContext:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|||||||
@@ -40,7 +40,7 @@ nextcloud-integration-ui:
|
|||||||
privileged: false
|
privileged: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeNextcloudIntegrationUI | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeNextcloudIntegrationUI }}
|
||||||
|
|
||||||
public-sector-ui:
|
public-sector-ui:
|
||||||
image:
|
image:
|
||||||
@@ -67,7 +67,7 @@ public-sector-ui:
|
|||||||
privileged: false
|
privileged: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangePublicSectorUI | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangePublicSectorUI }}
|
||||||
|
|
||||||
appsuite:
|
appsuite:
|
||||||
appsuite-toolkit:
|
appsuite-toolkit:
|
||||||
@@ -131,7 +131,7 @@ appsuite:
|
|||||||
privileged: false
|
privileged: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeGotenberg | toYaml | nindent 10 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeGotenberg }}
|
||||||
hooks:
|
hooks:
|
||||||
beforeAppsuiteStart:
|
beforeAppsuiteStart:
|
||||||
create-guard-dir.sh: |
|
create-guard-dir.sh: |
|
||||||
@@ -356,7 +356,7 @@ appsuite:
|
|||||||
privileged: false
|
privileged: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeCoreUI | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeCoreUI }}
|
||||||
|
|
||||||
core-ui-middleware:
|
core-ui-middleware:
|
||||||
enabled: true
|
enabled: true
|
||||||
@@ -398,7 +398,7 @@ appsuite:
|
|||||||
privileged: false
|
privileged: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeCoreUIMiddleware | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeCoreUIMiddleware }}
|
||||||
core-cacheservice:
|
core-cacheservice:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
@@ -428,7 +428,7 @@ appsuite:
|
|||||||
- "ALL"
|
- "ALL"
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeDocumentConverter | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeDocumentConverter }}
|
||||||
|
|
||||||
core-documents-collaboration:
|
core-documents-collaboration:
|
||||||
enabled: false
|
enabled: false
|
||||||
@@ -470,7 +470,7 @@ appsuite:
|
|||||||
privileged: false
|
privileged: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeCoreGuidedtours | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeCoreGuidedtours }}
|
||||||
|
|
||||||
core-imageconverter:
|
core-imageconverter:
|
||||||
enabled: true
|
enabled: true
|
||||||
@@ -500,7 +500,7 @@ appsuite:
|
|||||||
- "ALL"
|
- "ALL"
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeImageConverter | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeImageConverter }}
|
||||||
|
|
||||||
guard-ui:
|
guard-ui:
|
||||||
enabled: true
|
enabled: true
|
||||||
@@ -526,7 +526,7 @@ appsuite:
|
|||||||
privileged: false
|
privileged: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeGuardUI | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeGuardUI }}
|
||||||
core-spellcheck:
|
core-spellcheck:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
@@ -555,5 +555,5 @@ appsuite:
|
|||||||
privileged: false
|
privileged: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeCoreUserGuide | toYaml | nindent 8 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openxchangeCoreUserGuide }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -13,8 +13,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.openprojectBootstrap.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.openprojectBootstrap.registry }}/{{ .Values.charts.openprojectBootstrap.repository }}"
|
||||||
{{ .Values.charts.openprojectBootstrap.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "opendesk-openproject-bootstrap"
|
- name: "opendesk-openproject-bootstrap"
|
||||||
|
|||||||
@@ -38,7 +38,7 @@ containerSecurityContext:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openprojectBootstrap | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openprojectBootstrap }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.openprojectBootstrap.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.openprojectBootstrap.registry | quote }}
|
||||||
|
|||||||
@@ -13,8 +13,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.openproject.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.openproject.registry }}/{{ .Values.charts.openproject.repository }}"
|
||||||
{{ .Values.charts.openproject.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "openproject"
|
- name: "openproject"
|
||||||
|
|||||||
@@ -20,12 +20,12 @@ containerSecurityContext:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.openproject | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.openproject }}
|
||||||
|
|
||||||
environment:
|
environment:
|
||||||
# For more details and more options see
|
# For more details and more options see
|
||||||
# https://www.openproject.org/docs/installation-and-operations/configuration/environment/
|
# https://www.openproject.org/docs/installation-and-operations/configuration/environment/
|
||||||
OPENPROJECT_LOG__LEVEL: {{ if .Values.debug.enabled }}"debug"{{ else }}"warn"{{ end }}
|
OPENPROJECT_LOG__LEVEL: {{ if .Values.debug.enabled }}"debug"{{ else }}"info"{{ end }}
|
||||||
OPENPROJECT_LOGIN__REQUIRED: "true"
|
OPENPROJECT_LOGIN__REQUIRED: "true"
|
||||||
OPENPROJECT_OAUTH__ALLOW__REMAPPING__OF__EXISTING__USERS: "true"
|
OPENPROJECT_OAUTH__ALLOW__REMAPPING__OF__EXISTING__USERS: "true"
|
||||||
OPENPROJECT_OMNIAUTH__DIRECT__LOGIN__PROVIDER: "keycloak"
|
OPENPROJECT_OMNIAUTH__DIRECT__LOGIN__PROVIDER: "keycloak"
|
||||||
@@ -144,9 +144,7 @@ ingress:
|
|||||||
enabled: {{ .Values.ingress.tls.enabled }}
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
backgroundReplicaCount: {{ .Values.replicas.openprojectWorker }}
|
replicaCount: {{ .Values.replicas.openproject }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.openprojectWeb }}
|
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.openproject | toYaml | nindent 2 }}
|
{{ .Values.resources.openproject | toYaml | nindent 2 }}
|
||||||
@@ -155,13 +153,13 @@ s3:
|
|||||||
enabled: true
|
enabled: true
|
||||||
endpoint: {{ .Values.objectstores.openproject.endpoint | default (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
endpoint: {{ .Values.objectstores.openproject.endpoint | default (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
||||||
host: {{ (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
host: {{ (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
||||||
pathStyle: {{ .Values.objectstores.openproject.pathStyle | quote }}
|
pathStyle: "true"
|
||||||
region: {{ .Values.objectstores.openproject.region | quote }}
|
region: {{ .Values.objectstores.openproject.region | quote }}
|
||||||
bucketName: {{ .Values.objectstores.openproject.bucket | quote }}
|
bucketName: {{ .Values.objectstores.openproject.bucket | quote }}
|
||||||
use_iam_profile: {{ .Values.objectstores.openproject.useIAMProfile | default "false" | quote }}
|
use_iam_profile: {{ .Values.objectstores.openproject.useIAMProfile | default "false" | quote }}
|
||||||
auth:
|
auth:
|
||||||
accessKeyId: {{ .Values.objectstores.openproject.username | quote }}
|
accessKeyId: {{ .Values.objectstores.openproject.username | quote }}
|
||||||
secretAccessKey: {{ .Values.objectstores.openproject.secretKey | default .Values.secrets.minio.openprojectUser | quote }}
|
secretAccessKey: {{ .Values.objectstores.openproject.secret | default .Values.secrets.minio.openprojectUser | quote }}
|
||||||
|
|
||||||
seederJob:
|
seederJob:
|
||||||
annotations:
|
annotations:
|
||||||
|
|||||||
@@ -10,8 +10,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.oxConnector.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.oxConnector.registry }}/{{ .Values.charts.oxConnector.repository }}"
|
||||||
{{ .Values.charts.oxConnector.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "ox-connector"
|
- name: "ox-connector"
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ oxConnector:
|
|||||||
debugLevel: {{ if .Values.debug.enabled }}"4"{{ else }}"1"{{ end }}
|
debugLevel: {{ if .Values.debug.enabled }}"4"{{ else }}"1"{{ end }}
|
||||||
domainName: {{ .Values.global.domain | quote }}
|
domainName: {{ .Values.global.domain | quote }}
|
||||||
ldapHost: {{ .Values.ldap.host | quote }}
|
ldapHost: {{ .Values.ldap.host | quote }}
|
||||||
logLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"WARN"{{ end }}
|
logLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"INFO"{{ end }}
|
||||||
ldapPassword: {{ .Values.secrets.univentionManagementStack.ldapSecret | quote }}
|
ldapPassword: {{ .Values.secrets.univentionManagementStack.ldapSecret | quote }}
|
||||||
ldapBaseDn: "dc=swp-ldap,dc=internal"
|
ldapBaseDn: "dc=swp-ldap,dc=internal"
|
||||||
ldapHostDn: "cn=admin,dc=swp-ldap,dc=internal"
|
ldapHostDn: "cn=admin,dc=swp-ldap,dc=internal"
|
||||||
@@ -59,8 +59,6 @@ probes:
|
|||||||
failureThreshold: 30
|
failureThreshold: 30
|
||||||
successThreshold: 1
|
successThreshold: 1
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.oxConnector }}
|
|
||||||
|
|
||||||
securityContext:
|
securityContext:
|
||||||
allowPrivilegeEscalation: false
|
allowPrivilegeEscalation: false
|
||||||
capabilities:
|
capabilities:
|
||||||
@@ -85,7 +83,7 @@ securityContext:
|
|||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
readOnlyRootFilesystem: false
|
readOnlyRootFilesystem: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.oxConnector | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.oxConnector }}
|
||||||
|
|
||||||
serviceAccount:
|
serviceAccount:
|
||||||
create: true
|
create: true
|
||||||
|
|||||||
@@ -13,8 +13,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.otterize.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.otterize.registry }}/{{ .Values.charts.otterize.repository }}"
|
||||||
{{ .Values.charts.otterize.repository }}"
|
|
||||||
|
|
||||||
# openDesk Certificates
|
# openDesk Certificates
|
||||||
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-certificates
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-certificates
|
||||||
@@ -24,8 +23,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.certificates.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.certificates.registry }}/{{ .Values.charts.certificates.repository }}"
|
||||||
{{ .Values.charts.certificates.repository }}"
|
|
||||||
|
|
||||||
# openDesk PostgreSQL
|
# openDesk PostgreSQL
|
||||||
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-postgresql
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-postgresql
|
||||||
@@ -35,8 +33,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.postgresql.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.postgresql.registry }}/{{ .Values.charts.postgresql.repository }}"
|
||||||
{{ .Values.charts.postgresql.repository }}"
|
|
||||||
|
|
||||||
# openDesk MariaDB
|
# openDesk MariaDB
|
||||||
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-mariadb
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-mariadb
|
||||||
@@ -46,8 +43,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.mariadb.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.mariadb.registry }}/{{ .Values.charts.mariadb.repository }}"
|
||||||
{{ .Values.charts.mariadb.repository }}"
|
|
||||||
|
|
||||||
# openDesk Postfix
|
# openDesk Postfix
|
||||||
# https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-postfix
|
# https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-postfix
|
||||||
@@ -57,8 +53,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.postfix.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.postfix.registry }}/{{ .Values.charts.postfix.repository }}"
|
||||||
{{ .Values.charts.postfix.repository }}"
|
|
||||||
|
|
||||||
# openDesk Istio Resources
|
# openDesk Istio Resources
|
||||||
# https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-istio-resources
|
# https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-istio-resources
|
||||||
@@ -68,8 +63,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.istioResources.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.istioResources.registry }}/{{ .Values.charts.istioResources.repository }}"
|
||||||
{{ .Values.charts.istioResources.repository }}"
|
|
||||||
|
|
||||||
# openDesk ClamAV
|
# openDesk ClamAV
|
||||||
# https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-clamav
|
# https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-clamav
|
||||||
@@ -79,16 +73,14 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.clamav.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.clamav.registry }}/{{ .Values.charts.clamav.repository }}"
|
||||||
{{ .Values.charts.clamav.repository }}"
|
|
||||||
- name: "clamav-simple-repo"
|
- name: "clamav-simple-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.clamavSimple.verify }}
|
verify: {{ .Values.charts.clamavSimple.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.clamavSimple.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.clamavSimple.registry }}/{{ .Values.charts.clamavSimple.repository }}"
|
||||||
{{ .Values.charts.clamavSimple.repository }}"
|
|
||||||
|
|
||||||
# VMWare Bitnami
|
# VMWare Bitnami
|
||||||
# Source: https://github.com/bitnami/charts/
|
# Source: https://github.com/bitnami/charts/
|
||||||
@@ -98,24 +90,21 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.memcached.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.memcached.registry }}/{{ .Values.charts.memcached.repository }}"
|
||||||
{{ .Values.charts.memcached.repository }}"
|
|
||||||
- name: "redis-repo"
|
- name: "redis-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.redis.verify }}
|
verify: {{ .Values.charts.redis.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.redis.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.redis.registry }}/{{ .Values.charts.redis.repository }}"
|
||||||
{{ .Values.charts.redis.repository }}"
|
|
||||||
- name: "minio-repo"
|
- name: "minio-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.minio.verify }}
|
verify: {{ .Values.charts.minio.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.minio.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.minio.registry }}/{{ .Values.charts.minio.repository }}"
|
||||||
{{ .Values.charts.minio.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "opendesk-otterize"
|
- name: "opendesk-otterize"
|
||||||
|
|||||||
@@ -15,7 +15,7 @@ clamd:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.clamd | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.clamd }}
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.clamd.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.clamd.registry | quote }}
|
||||||
repository: {{ .Values.images.clamd.repository | quote }}
|
repository: {{ .Values.images.clamd.repository | quote }}
|
||||||
@@ -41,7 +41,7 @@ containerSecurityContext:
|
|||||||
capabilities:
|
capabilities:
|
||||||
drop: []
|
drop: []
|
||||||
privileged: false
|
privileged: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.clamav | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.clamav }}
|
||||||
|
|
||||||
freshclam:
|
freshclam:
|
||||||
containerSecurityContext:
|
containerSecurityContext:
|
||||||
@@ -57,7 +57,7 @@ freshclam:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.freshclam | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.freshclam }}
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.freshclam.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.freshclam.registry | quote }}
|
||||||
repository: {{ .Values.images.freshclam.repository | quote }}
|
repository: {{ .Values.images.freshclam.repository | quote }}
|
||||||
@@ -89,7 +89,7 @@ icap:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.icap | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.icap }}
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.icap.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.icap.registry | quote }}
|
||||||
repository: {{ .Values.images.icap.repository | quote }}
|
repository: {{ .Values.images.icap.repository | quote }}
|
||||||
@@ -117,7 +117,7 @@ milter:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.milter | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.milter }}
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.milter.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.milter.registry | quote }}
|
||||||
repository: {{ .Values.images.milter.repository | quote }}
|
repository: {{ .Values.images.milter.repository | quote }}
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ containerSecurityContext:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.clamavSimple | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.clamavSimple }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ containerSecurityContext:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.mariadb | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.mariadb }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
@@ -60,7 +60,7 @@ podSecurityContext:
|
|||||||
fsGroup: 1001
|
fsGroup: 1001
|
||||||
fsGroupChangePolicy: "OnRootMismatch"
|
fsGroupChangePolicy: "OnRootMismatch"
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.mariadb }}
|
replicaCount: 1
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.mariadb | toYaml | nindent 2 }}
|
{{ .Values.resources.mariadb | toYaml | nindent 2 }}
|
||||||
|
|||||||
@@ -1,8 +1,6 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
architecture: {{ if gt .Values.replicas.memcached 1 }}"high-availability"{{ else }}"standalone"{{ end }}
|
|
||||||
|
|
||||||
containerSecurityContext:
|
containerSecurityContext:
|
||||||
allowPrivilegeEscalation: false
|
allowPrivilegeEscalation: false
|
||||||
capabilities:
|
capabilities:
|
||||||
@@ -16,7 +14,7 @@ containerSecurityContext:
|
|||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.memcached | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.memcached }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
|
|||||||
@@ -29,7 +29,7 @@ containerSecurityContext:
|
|||||||
readOnlyRootFilesystem: false
|
readOnlyRootFilesystem: false
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.minio | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.minio }}
|
||||||
|
|
||||||
defaultBuckets: "openproject,openxchange,ums,nextcloud"
|
defaultBuckets: "openproject,openxchange,ums,nextcloud"
|
||||||
|
|
||||||
@@ -62,13 +62,13 @@ livenessProbe:
|
|||||||
periodSeconds: 10
|
periodSeconds: 10
|
||||||
timeoutSeconds: 10
|
timeoutSeconds: 10
|
||||||
|
|
||||||
mode: {{ if gt .Values.replicas.minio 1 }}"distributed"{{ else }}"standalone"{{ end }}
|
mode: "standalone"
|
||||||
|
|
||||||
metrics:
|
metrics:
|
||||||
serviceMonitor:
|
serviceMonitor:
|
||||||
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
additionalLabels:
|
additionalLabels:
|
||||||
{{ .Values.prometheus.serviceMonitors.labels | toYaml | nindent 6 }}
|
{{- toYaml .Values.prometheus.serviceMonitors.labels | nindent 6 }}
|
||||||
|
|
||||||
networkPolicy:
|
networkPolicy:
|
||||||
enabled: false
|
enabled: false
|
||||||
@@ -88,13 +88,16 @@ provisioning:
|
|||||||
extraCommands:
|
extraCommands:
|
||||||
- "mc anonymous set download provisioning/ums/portal-assets"
|
- "mc anonymous set download provisioning/ums/portal-assets"
|
||||||
buckets:
|
buckets:
|
||||||
- name: {{ .Values.objectstores.openproject.bucket | quote }}
|
- name: "openproject"
|
||||||
|
versioning: true
|
||||||
|
withLock: false
|
||||||
|
- name: "openxchange"
|
||||||
versioning: true
|
versioning: true
|
||||||
withLock: false
|
withLock: false
|
||||||
- name: {{ .Values.objectstores.univentionManagementStack.bucket | quote }}
|
- name: {{ .Values.objectstores.univentionManagementStack.bucket | quote }}
|
||||||
versioning: false
|
versioning: false
|
||||||
withLock: false
|
withLock: false
|
||||||
- name: {{ .Values.objectstores.nextcloud.bucket | quote }}
|
- name: "nextcloud"
|
||||||
versioning: true
|
versioning: true
|
||||||
withLock: false
|
withLock: false
|
||||||
policies:
|
policies:
|
||||||
@@ -110,6 +113,18 @@ provisioning:
|
|||||||
effect: "Allow"
|
effect: "Allow"
|
||||||
actions:
|
actions:
|
||||||
- "s3:*"
|
- "s3:*"
|
||||||
|
- name: "openxchange-bucket-policy"
|
||||||
|
statements:
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::openxchange"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::openxchange/*"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
- name: "ums-bucket-policy"
|
- name: "ums-bucket-policy"
|
||||||
statements:
|
statements:
|
||||||
- resources:
|
- resources:
|
||||||
@@ -135,19 +150,25 @@ provisioning:
|
|||||||
actions:
|
actions:
|
||||||
- "s3:*"
|
- "s3:*"
|
||||||
users:
|
users:
|
||||||
- username: {{ .Values.objectstores.openproject.username | quote }}
|
- username: "openproject_user"
|
||||||
password: {{ .Values.secrets.minio.openprojectUser | quote }}
|
password: {{ .Values.secrets.minio.openprojectUser | quote }}
|
||||||
disabled: false
|
disabled: false
|
||||||
policies:
|
policies:
|
||||||
- "openproject-bucket-policy"
|
- "openproject-bucket-policy"
|
||||||
setPolicies: true
|
setPolicies: true
|
||||||
|
- username: "openxchange_user"
|
||||||
|
password: {{ .Values.secrets.minio.openxchangeUser | quote }}
|
||||||
|
disabled: false
|
||||||
|
policies:
|
||||||
|
- "openxchange-bucket-policy"
|
||||||
|
setPolicies: true
|
||||||
- username: {{ .Values.objectstores.univentionManagementStack.username | quote }}
|
- username: {{ .Values.objectstores.univentionManagementStack.username | quote }}
|
||||||
password: {{ .Values.secrets.minio.umsUser | quote }}
|
password: {{ .Values.secrets.minio.umsUser | quote }}
|
||||||
disabled: false
|
disabled: false
|
||||||
policies:
|
policies:
|
||||||
- "ums-bucket-policy"
|
- "ums-bucket-policy"
|
||||||
setPolicies: true
|
setPolicies: true
|
||||||
- username: {{ .Values.objectstores.nextcloud.username | quote }}
|
- username: "nextcloud_user"
|
||||||
password: {{ .Values.secrets.minio.nextcloudUser | quote }}
|
password: {{ .Values.secrets.minio.nextcloudUser | quote }}
|
||||||
disabled: false
|
disabled: false
|
||||||
policies:
|
policies:
|
||||||
@@ -171,6 +192,6 @@ startupProbe:
|
|||||||
timeoutSeconds: 10
|
timeoutSeconds: 10
|
||||||
|
|
||||||
statefulset:
|
statefulset:
|
||||||
replicaCount: {{ .Values.replicas.minio }}
|
replicaCount: {{ .Values.replicas.minioDistributed }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -20,6 +20,8 @@ apps:
|
|||||||
enabled: {{ .Values.intercom.enabled }}
|
enabled: {{ .Values.intercom.enabled }}
|
||||||
jitsi:
|
jitsi:
|
||||||
enabled: {{ .Values.jitsi.enabled }}
|
enabled: {{ .Values.jitsi.enabled }}
|
||||||
|
keycloak:
|
||||||
|
enabled: {{ .Values.keycloak.enabled }}
|
||||||
mariadb:
|
mariadb:
|
||||||
enabled: {{ .Values.mariadb.enabled }}
|
enabled: {{ .Values.mariadb.enabled }}
|
||||||
memcached:
|
memcached:
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
privileged: true
|
privileged: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.postfix | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.postfix }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
|
|||||||
@@ -14,7 +14,7 @@ containerSecurityContext:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.postgresql | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.postgresql }}
|
||||||
|
|
||||||
job:
|
job:
|
||||||
|
|
||||||
@@ -26,7 +26,7 @@ podSecurityContext:
|
|||||||
postgres:
|
postgres:
|
||||||
user: "postgres"
|
user: "postgres"
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.postgres }}
|
replicaCount: 1
|
||||||
|
|
||||||
global:
|
global:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
|
|||||||
@@ -30,7 +30,7 @@ master:
|
|||||||
capabilities:
|
capabilities:
|
||||||
drop:
|
drop:
|
||||||
- "ALL"
|
- "ALL"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.redis | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.redis }}
|
||||||
count: {{ .Values.replicas.redis }}
|
count: {{ .Values.replicas.redis }}
|
||||||
persistence:
|
persistence:
|
||||||
size: {{ .Values.persistence.size.redis | quote }}
|
size: {{ .Values.persistence.size.redis | quote }}
|
||||||
@@ -38,7 +38,28 @@ master:
|
|||||||
{{ .Values.resources.redis | toYaml | nindent 4 }}
|
{{ .Values.resources.redis | toYaml | nindent 4 }}
|
||||||
|
|
||||||
metrics:
|
metrics:
|
||||||
enabled: false
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.redisExporter.registry | quote }}
|
||||||
|
repository: {{ .Values.images.redisExporter.repository | quote }}
|
||||||
|
tag: {{ .Values.images.redisExporter.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
serviceMonitor:
|
||||||
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
additionalLabels:
|
||||||
|
{{- toYaml .Values.prometheus.serviceMonitors.labels | nindent 6 }}
|
||||||
|
containerSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
seLinuxOptions: {}
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 0
|
||||||
|
runAsNonRoot: true
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
seccompProfile:
|
||||||
|
type: RuntimeDefault
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- ALL
|
||||||
|
|
||||||
sentinel:
|
sentinel:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|||||||
@@ -12,144 +12,126 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsGuardianManagementApi.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsGuardianManagementApi.registry }}/{{ .Values.charts.umsGuardianManagementApi.repository }}"
|
||||||
{{ .Values.charts.umsGuardianManagementApi.repository }}"
|
|
||||||
- name: "ums-guardian-management-ui-repo"
|
- name: "ums-guardian-management-ui-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsGuardianManagementUi.verify }}
|
verify: {{ .Values.charts.umsGuardianManagementUi.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsGuardianManagementUi.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsGuardianManagementUi.registry }}/{{ .Values.charts.umsGuardianManagementUi.repository }}"
|
||||||
{{ .Values.charts.umsGuardianManagementUi.repository }}"
|
|
||||||
- name: "ums-guardian-authorization-api-repo"
|
- name: "ums-guardian-authorization-api-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsGuardianAuthorizationApi.verify }}
|
verify: {{ .Values.charts.umsGuardianAuthorizationApi.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsGuardianAuthorizationApi.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsGuardianAuthorizationApi.registry }}/{{ .Values.charts.umsGuardianAuthorizationApi.repository }}"
|
||||||
{{ .Values.charts.umsGuardianAuthorizationApi.repository }}"
|
|
||||||
- name: "ums-open-policy-agent-repo"
|
- name: "ums-open-policy-agent-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsOpenPolicyAgent.verify }}
|
verify: {{ .Values.charts.umsOpenPolicyAgent.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsOpenPolicyAgent.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsOpenPolicyAgent.registry }}/{{ .Values.charts.umsOpenPolicyAgent.repository }}"
|
||||||
{{ .Values.charts.umsOpenPolicyAgent.repository }}"
|
|
||||||
- name: "ums-ldap-server-repo"
|
- name: "ums-ldap-server-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsLdapServer.verify }}
|
verify: {{ .Values.charts.umsLdapServer.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsLdapServer.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsLdapServer.registry }}/{{ .Values.charts.umsLdapServer.repository }}"
|
||||||
{{ .Values.charts.umsLdapServer.repository }}"
|
|
||||||
- name: "ums-ldap-notifier-repo"
|
- name: "ums-ldap-notifier-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsLdapNotifier.verify }}
|
verify: {{ .Values.charts.umsLdapNotifier.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsLdapNotifier.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsLdapNotifier.registry }}/{{ .Values.charts.umsLdapNotifier.repository }}"
|
||||||
{{ .Values.charts.umsLdapNotifier.repository }}"
|
|
||||||
- name: "ums-udm-rest-api-repo"
|
- name: "ums-udm-rest-api-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsUdmRestApi.verify }}
|
verify: {{ .Values.charts.umsUdmRestApi.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsUdmRestApi.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsUdmRestApi.registry }}/{{ .Values.charts.umsUdmRestApi.repository }}"
|
||||||
{{ .Values.charts.umsUdmRestApi.repository }}"
|
|
||||||
- name: "ums-stack-data-ums-repo"
|
- name: "ums-stack-data-ums-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsStackDataUms.verify }}
|
verify: {{ .Values.charts.umsStackDataUms.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsStackDataUms.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsStackDataUms.registry }}/{{ .Values.charts.umsStackDataUms.repository }}"
|
||||||
{{ .Values.charts.umsStackDataUms.repository }}"
|
|
||||||
- name: "ums-stack-data-swp-repo"
|
- name: "ums-stack-data-swp-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsStackDataSwp.verify }}
|
verify: {{ .Values.charts.umsStackDataSwp.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsStackDataSwp.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsStackDataSwp.registry }}/{{ .Values.charts.umsStackDataSwp.repository }}"
|
||||||
{{ .Values.charts.umsStackDataSwp.repository }}"
|
|
||||||
- name: "ums-portal-server-repo"
|
- name: "ums-portal-server-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsPortalServer.verify }}
|
verify: {{ .Values.charts.umsPortalServer.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsPortalServer.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsPortalServer.registry }}/{{ .Values.charts.umsPortalServer.repository }}"
|
||||||
{{ .Values.charts.umsPortalServer.repository }}"
|
|
||||||
- name: "ums-notifications-api-repo"
|
- name: "ums-notifications-api-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsNotificationsApi.verify }}
|
verify: {{ .Values.charts.umsNotificationsApi.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsNotificationsApi.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsNotificationsApi.registry }}/{{ .Values.charts.umsNotificationsApi.repository }}"
|
||||||
{{ .Values.charts.umsNotificationsApi.repository }}"
|
|
||||||
- name: "ums-portal-listener-repo"
|
- name: "ums-portal-listener-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsPortalListener.verify }}
|
verify: {{ .Values.charts.umsPortalListener.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsPortalListener.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsPortalListener.registry }}/{{ .Values.charts.umsPortalListener.repository }}"
|
||||||
{{ .Values.charts.umsPortalListener.repository }}"
|
|
||||||
- name: "ums-portal-frontend-repo"
|
- name: "ums-portal-frontend-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsPortalFrontend.verify }}
|
verify: {{ .Values.charts.umsPortalFrontend.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsPortalFrontend.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsPortalFrontend.registry }}/{{ .Values.charts.umsPortalFrontend.repository }}"
|
||||||
{{ .Values.charts.umsPortalFrontend.repository }}"
|
|
||||||
- name: "ums-umc-gateway-repo"
|
- name: "ums-umc-gateway-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsUmcGateway.verify }}
|
verify: {{ .Values.charts.umsUmcGateway.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsUmcGateway.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsUmcGateway.registry }}/{{ .Values.charts.umsUmcGateway.repository }}"
|
||||||
{{ .Values.charts.umsUmcGateway.repository }}"
|
|
||||||
- name: "ums-umc-server-repo"
|
- name: "ums-umc-server-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsUmcServer.verify }}
|
verify: {{ .Values.charts.umsUmcServer.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsUmcServer.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsUmcServer.registry }}/{{ .Values.charts.umsUmcServer.repository }}"
|
||||||
{{ .Values.charts.umsUmcServer.repository }}"
|
|
||||||
- name: "ums-selfservice-listener-repo"
|
- name: "ums-selfservice-listener-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsSelfserviceListener.verify }}
|
verify: {{ .Values.charts.umsSelfserviceListener.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsSelfserviceListener.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsSelfserviceListener.registry }}/{{ .Values.charts.umsSelfserviceListener.repository }}"
|
||||||
{{ .Values.charts.umsSelfserviceListener.repository }}"
|
|
||||||
- name: "ums-provisioning-repo"
|
- name: "ums-provisioning-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsProvisioning.verify }}
|
verify: {{ .Values.charts.umsProvisioning.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsProvisioning.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsProvisioning.registry }}/{{ .Values.charts.umsProvisioning.repository }}"
|
||||||
{{ .Values.charts.umsProvisioning.repository }}"
|
|
||||||
|
|
||||||
# Univention Keycloak Extensions
|
# Univention Keycloak Extensions
|
||||||
- name: "ums-keycloak-extensions-repo"
|
- name: "ums-keycloak-extensions-repo"
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsKeycloakExtensions.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsKeycloakExtensions.registry }}/{{ .Values.charts.umsKeycloakExtensions.repository }}"
|
||||||
{{ .Values.charts.umsKeycloakExtensions.repository }}"
|
|
||||||
# Univention Keycloak
|
# Univention Keycloak
|
||||||
- name: "ums-keycloak-repo"
|
- name: "ums-keycloak-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
@@ -157,16 +139,14 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsKeycloak.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsKeycloak.registry }}/{{ .Values.charts.umsKeycloak.repository }}"
|
||||||
{{ .Values.charts.umsKeycloak.repository }}"
|
|
||||||
- name: "ums-keycloak-bootstrap-repo"
|
- name: "ums-keycloak-bootstrap-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
verify: {{ .Values.charts.umsKeycloakBootstrap.verify }}
|
verify: {{ .Values.charts.umsKeycloakBootstrap.verify }}
|
||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsKeycloakBootstrap.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.umsKeycloakBootstrap.registry }}/{{ .Values.charts.umsKeycloakBootstrap.repository }}"
|
||||||
{{ .Values.charts.umsKeycloakBootstrap.repository }}"
|
|
||||||
- name: "opendesk-keycloak-bootstrap-repo"
|
- name: "opendesk-keycloak-bootstrap-repo"
|
||||||
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
verify: {{ .Values.charts.opendeskKeycloakBootstrap.verify }}
|
verify: {{ .Values.charts.opendeskKeycloakBootstrap.verify }}
|
||||||
@@ -183,8 +163,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.nginx.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.nginx.registry }}/{{ .Values.charts.nginx.repository }}"
|
||||||
{{ .Values.charts.nginx.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "ums-keycloak"
|
- name: "ums-keycloak"
|
||||||
@@ -350,15 +329,6 @@ releases:
|
|||||||
installed: {{ .Values.univentionManagementStack.enabled }}
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
timeout: 900
|
timeout: 900
|
||||||
|
|
||||||
- name: "ums-provisioning-udm-listener"
|
|
||||||
chart: "ums-provisioning-repo/{{ .Values.charts.umsProvisioningUdmListener.name }}"
|
|
||||||
version: "{{ .Values.charts.umsProvisioningUdmListener.version }}"
|
|
||||||
values:
|
|
||||||
- "values-common.yaml.gotmpl"
|
|
||||||
- "values-provisioning-udm-listener.yaml.gotmpl"
|
|
||||||
installed: {{ .Values.univentionManagementStack.enabled }}
|
|
||||||
timeout: 900
|
|
||||||
|
|
||||||
- name: "ums-guardian-management-api"
|
- name: "ums-guardian-management-api"
|
||||||
chart: "ums-guardian-management-api-repo/{{ .Values.charts.umsGuardianManagementApi.name }}"
|
chart: "ums-guardian-management-api-repo/{{ .Values.charts.umsGuardianManagementApi.name }}"
|
||||||
version: "{{ .Values.charts.umsGuardianManagementApi.version }}"
|
version: "{{ .Values.charts.umsGuardianManagementApi.version }}"
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ guardianAuthorizationApi:
|
|||||||
guardianAuthzAdapterAppPersistencePort: "udm_data"
|
guardianAuthzAdapterAppPersistencePort: "udm_data"
|
||||||
guardianAuthzAdapterPolicyPort: "opa"
|
guardianAuthzAdapterPolicyPort: "opa"
|
||||||
guardianAuthzAdapterAuthenticationPort: "fast_api_oauth"
|
guardianAuthzAdapterAuthenticationPort: "fast_api_oauth"
|
||||||
guardianAuthzLoggingLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"WARNING"{{ end }}
|
guardianAuthzLoggingLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"INFO"{{ end }}
|
||||||
guardianAuthzLoggingStructured: false
|
guardianAuthzLoggingStructured: false
|
||||||
guardianAuthzLoggingFormat: "<green>{time:YYYY-MM-DD HH:mm:ss.SSS ZZ}</green> | <level>{level}</level> | <level>{message}</level> | {extra}"
|
guardianAuthzLoggingFormat: "<green>{time:YYYY-MM-DD HH:mm:ss.SSS ZZ}</green> | <level>{level}</level> | <level>{message}</level> | {extra}"
|
||||||
home: "/guardian_service_dir"
|
home: "/guardian_service_dir"
|
||||||
@@ -55,6 +55,6 @@ securityContext:
|
|||||||
runAsGroup: 1000
|
runAsGroup: 1000
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
readOnlyRootFilesystem: false
|
readOnlyRootFilesystem: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsGuardianAuthorizationApi | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsGuardianAuthorizationApi }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -16,7 +16,7 @@ guardianManagementApi:
|
|||||||
guardianManagementAdapterAuthenticationPort: "fast_api_oauth"
|
guardianManagementAdapterAuthenticationPort: "fast_api_oauth"
|
||||||
guardianManagementAdapterAuthorizationApiUrl: "http://ums-guardian-authorization-api/guardian/authorization"
|
guardianManagementAdapterAuthorizationApiUrl: "http://ums-guardian-authorization-api/guardian/authorization"
|
||||||
guardianManagementAdapterResourceAuthorizationPort: "always"
|
guardianManagementAdapterResourceAuthorizationPort: "always"
|
||||||
guardianManagementLoggingLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"WARNING"{{ end }}
|
guardianManagementLoggingLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"INFO"{{ end }}
|
||||||
guardianManagementLoggingStructured: false
|
guardianManagementLoggingStructured: false
|
||||||
guardianManagementLoggingFormat: "<green>{time:YYYY-MM-DD HH:mm:ss.SSS ZZ}</green> | <level>{level}</level> | <level>{message}</level> | {extra}"
|
guardianManagementLoggingFormat: "<green>{time:YYYY-MM-DD HH:mm:ss.SSS ZZ}</green> | <level>{level}</level> | <level>{message}</level> | {extra}"
|
||||||
guardianManagementBaseUrl: "http://0.0.0.0:8000"
|
guardianManagementBaseUrl: "http://0.0.0.0:8000"
|
||||||
@@ -73,6 +73,6 @@ securityContext:
|
|||||||
runAsGroup: 1000
|
runAsGroup: 1000
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
readOnlyRootFilesystem: false
|
readOnlyRootFilesystem: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsGuardianManagementApi | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsGuardianManagementApi }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -46,6 +46,6 @@ securityContext:
|
|||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
readOnlyRootFilesystem: false
|
readOnlyRootFilesystem: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsGuardianManagementUi | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsGuardianManagementUi }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -27,7 +27,7 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsLdapNotifier | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsLdapNotifier }}
|
||||||
|
|
||||||
volumes:
|
volumes:
|
||||||
claims:
|
claims:
|
||||||
|
|||||||
@@ -76,7 +76,7 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsLdapServer | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsLdapServer }}
|
||||||
|
|
||||||
service:
|
service:
|
||||||
type: "ClusterIP"
|
type: "ClusterIP"
|
||||||
|
|||||||
@@ -44,6 +44,6 @@ securityContext:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
runAsGroup: 1000
|
runAsGroup: 1000
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsNotificationsApi | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsNotificationsApi }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -46,6 +46,6 @@ securityContext:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
runAsGroup: 1000
|
runAsGroup: 1000
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsOpenPolicyAgent | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsOpenPolicyAgent }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -597,7 +597,7 @@ containerSecurityContext:
|
|||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: true
|
readOnlyRootFilesystem: true
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.opendeskKeycloakBootstrap | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.opendeskKeycloakBootstrap }}
|
||||||
|
|
||||||
podAnnotations:
|
podAnnotations:
|
||||||
intents.otterize.com/service-name: "ums-keycloak-bootstrap"
|
intents.otterize.com/service-name: "ums-keycloak-bootstrap"
|
||||||
|
|||||||
@@ -83,8 +83,6 @@ image:
|
|||||||
path: "/univention/portal/custom/"
|
path: "/univention/portal/custom/"
|
||||||
tls: {}
|
tls: {}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.umsPortalFrontend }}
|
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsPortalFrontend | toYaml | nindent 2 }}
|
{{ .Values.resources.umsPortalFrontend | toYaml | nindent 2 }}
|
||||||
|
|
||||||
@@ -112,5 +110,5 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsPortalFrontend | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsPortalFrontend }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -41,10 +41,10 @@ portalListener:
|
|||||||
udmApiUsername: "cn=admin"
|
udmApiUsername: "cn=admin"
|
||||||
umcGetUrl: "http://ums-umc-server/get"
|
umcGetUrl: "http://ums-umc-server/get"
|
||||||
umcSessionUrl: "http://ums-umc-server/get/session-info"
|
umcSessionUrl: "http://ums-umc-server/get/session-info"
|
||||||
objectStorageEndpoint: {{ .Values.objectstores.univentionManagementStack.endpoint | default (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
objectStorageEndpoint: "http://minio:9000"
|
||||||
objectStorageBucket: {{ .Values.objectstores.univentionManagementStack.bucket | quote }}
|
objectStorageBucket: "ums"
|
||||||
objectStorageAccessKeyId: {{ .Values.objectstores.univentionManagementStack.username | quote }}
|
objectStorageAccessKeyId: "ums_user"
|
||||||
objectStorageSecretAccessKey: {{ .Values.objectstores.univentionManagementStack.secretKey | default .Values.secrets.minio.umsUser | quote }}
|
objectStorageSecretAccessKey: {{ .Values.secrets.minio.umsUser | quote }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsPortalListener | toYaml | nindent 2 }}
|
{{ .Values.resources.umsPortalListener | toYaml | nindent 2 }}
|
||||||
@@ -79,6 +79,6 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsPortalListener | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsPortalListener }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -16,19 +16,17 @@ portalServer:
|
|||||||
editable: "false"
|
editable: "false"
|
||||||
umcGetUrl: "http://ums-umc-server/get"
|
umcGetUrl: "http://ums-umc-server/get"
|
||||||
umcSessionUrl: "http://ums-umc-server/get/session-info"
|
umcSessionUrl: "http://ums-umc-server/get/session-info"
|
||||||
logLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"WARN"{{ end }}
|
logLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"INFO"{{ end }}
|
||||||
adminGroup: {{ printf "%s,%s" "cn=Domain Admins,cn=groups" .Values.ldap.baseDn | quote }}
|
adminGroup: {{ printf "%s,%s" "cn=Domain Admins,cn=groups" .Values.ldap.baseDn | quote }}
|
||||||
ucsInternalPath: "portal-data"
|
ucsInternalPath: "portal-data"
|
||||||
objectStorageEndpoint: {{ .Values.objectstores.univentionManagementStack.endpoint | default (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
objectStorageEndpoint: "http://minio:9000"
|
||||||
objectStorageBucket: {{ .Values.objectstores.univentionManagementStack.bucket | quote }}
|
objectStorageBucket: "ums"
|
||||||
objectStorageAccessKeyId: {{ .Values.objectstores.univentionManagementStack.username | quote }}
|
objectStorageAccessKeyId: "ums_user"
|
||||||
objectStorageSecretAccessKey: {{ .Values.objectstores.univentionManagementStack.secretKey | default .Values.secrets.minio.umsUser | quote }}
|
objectStorageSecretAccessKey: {{ .Values.secrets.minio.umsUser | quote }}
|
||||||
centralNavigation:
|
centralNavigation:
|
||||||
enabled: true
|
enabled: true
|
||||||
authenticatorSecret: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
authenticatorSecret: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.umsPortalServer }}
|
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsPortalServer | toYaml | nindent 2 }}
|
{{ .Values.resources.umsPortalServer | toYaml | nindent 2 }}
|
||||||
|
|
||||||
@@ -56,6 +54,6 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsPortalServer | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsPortalServer }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,28 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
image:
|
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.umsProvisioningUdmListener.registry | quote }}
|
|
||||||
repository: {{ .Values.images.umsProvisioningUdmListener.repository | quote }}
|
|
||||||
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
|
||||||
tag: {{ .Values.images.umsProvisioningUdmListener.tag | quote }}
|
|
||||||
pullSecrets:
|
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
|
||||||
- name: {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
config:
|
|
||||||
ldapBaseDn: {{ .Values.ldap.baseDn | quote }}
|
|
||||||
ldapHost: {{ .Values.ldap.host | quote }}
|
|
||||||
ldapHostDn: {{ printf "%s,%s" "cn=admin" .Values.ldap.baseDn | quote }}
|
|
||||||
ldapPassword: {{ .Values.secrets.univentionManagementStack.ldapSecret | quote }}
|
|
||||||
notifierServer: {{ .Values.ldap.notifierHost | quote }}
|
|
||||||
tlsMode: "off"
|
|
||||||
natsHost: "ums-provisioning-nats"
|
|
||||||
natsPort: "4222"
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.umsProvisioningUdmListener | toYaml | nindent 4 }}
|
|
||||||
...
|
|
||||||
@@ -15,13 +15,22 @@ dispatcher:
|
|||||||
- name: {{ . | quote }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsProvisioningDispatcher | toYaml | nindent 4 }}
|
{{ .Values.resources.umsProvisioning | toYaml | nindent 4 }}
|
||||||
config:
|
securityContext:
|
||||||
UDM_HOST: "ums-udm-rest-api"
|
allowPrivilegeEscalation: false
|
||||||
UDM_PORT: 9979
|
capabilities:
|
||||||
UDM_USERNAME: "cn=admin"
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
privileged: false
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsProvisioningDispatcher }}
|
||||||
|
|
||||||
api:
|
events-and-consumer-api:
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.umsProvisioningEventsAndConsumerApi.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.umsProvisioningEventsAndConsumerApi.registry | quote }}
|
||||||
repository: {{ .Values.images.umsProvisioningEventsAndConsumerApi.repository | quote }}
|
repository: {{ .Values.images.umsProvisioningEventsAndConsumerApi.repository | quote }}
|
||||||
@@ -31,51 +40,98 @@ api:
|
|||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . | quote }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
config:
|
rootPath: "/univention/provisioning-api"
|
||||||
rootPath: "/univention/provisioning-api"
|
ingress:
|
||||||
|
# copied from values-common.yaml.gotmpl
|
||||||
|
# Intentionally not using the Ingress configuration of the UMS stack at the
|
||||||
|
# moment, since it does depend on rewriting capabilities of the ingress
|
||||||
|
# controller. Those are encapsulated into the release "stack-gateway" so that
|
||||||
|
# the compatibility with all ingress controllers is increased.
|
||||||
|
enabled: false
|
||||||
|
host: {{ printf "%s.%s" .Values.global.hosts.univentionManagementStack .Values.global.domain | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsProvisioningEventsAndConsumerApi | toYaml | nindent 4 }}
|
{{ .Values.resources.umsProvisioning | toYaml | nindent 4 }}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
privileged: false
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsProvisioningEventsAndConsumerApi }}
|
||||||
|
|
||||||
prefill:
|
udm-listener:
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.umsProvisioningPrefill.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.umsProvisioningUdmListener.registry | quote }}
|
||||||
repository: {{ .Values.images.umsProvisioningPrefill.repository | quote }}
|
repository: {{ .Values.images.umsProvisioningUdmListener.repository | quote }}
|
||||||
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
tag: {{ .Values.images.umsProvisioningPrefill.tag | quote }}
|
tag: {{ .Values.images.umsProvisioningUdmListener.tag | quote }}
|
||||||
pullSecrets:
|
pullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . | quote }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
config:
|
||||||
|
ldapBaseDn: {{ .Values.ldap.baseDn | quote }}
|
||||||
|
ldapHost: {{ .Values.ldap.host | quote }}
|
||||||
|
ldapHostDn: {{ printf "%s,%s" "cn=admin" .Values.ldap.baseDn | quote }}
|
||||||
|
ldapPassword: {{ .Values.secrets.univentionManagementStack.ldapSecret | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsProvisioningPrefill | toYaml | nindent 4 }}
|
{{ .Values.resources.umsProvisioning | toYaml | nindent 4 }}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
add:
|
||||||
|
- "CHOWN"
|
||||||
|
- "DAC_OVERRIDE"
|
||||||
|
- "FOWNER"
|
||||||
|
- "FSETID"
|
||||||
|
- "KILL"
|
||||||
|
- "SETGID"
|
||||||
|
- "SETUID"
|
||||||
|
- "SETPCAP"
|
||||||
|
- "NET_BIND_SERVICE"
|
||||||
|
- "NET_RAW"
|
||||||
|
- "SYS_CHROOT"
|
||||||
|
privileged: false
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
runAsUser: 0
|
||||||
|
runAsGroup: 0
|
||||||
|
runAsNonRoot: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsProvisioningUdmListener }}
|
||||||
|
|
||||||
nats:
|
nats:
|
||||||
bundled: true
|
global:
|
||||||
nameOverride: ""
|
image:
|
||||||
resources:
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
{{ .Values.resources.umsProvisioningNats | toYaml | nindent 4 }}
|
pullSecretNames: {{ .Values.global.imagePullSecrets }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.umsProvisioningNats.registry | quote }}
|
||||||
containerSecurityContext:
|
container:
|
||||||
allowPrivilegeEscalation: false
|
image:
|
||||||
capabilities:
|
registry: {{ .Values.global.imageRegistry }}
|
||||||
drop:
|
repository: {{ .Values.images.umsProvisioningNats.repository | quote }}
|
||||||
- "ALL"
|
tag: {{ .Values.images.umsProvisioningNats.tag | quote }}
|
||||||
enabled: true
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
runAsUser: 1000
|
natsBox:
|
||||||
runAsGroup: 1000
|
container:
|
||||||
seccompProfile:
|
image:
|
||||||
type: "RuntimeDefault"
|
registry: {{ .Values.global.imageRegistry }}
|
||||||
readOnlyRootFilesystem: true
|
repository: {{ .Values.images.umsProvisioningNatsBox.repository | quote }}
|
||||||
runAsNonRoot: true
|
tag: {{ .Values.images.umsProvisioningNatsBox.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
podSecurityContext:
|
reloader:
|
||||||
enabled: true
|
image:
|
||||||
fsGroup: 1000
|
repository: {{ .Values.images.umsProvisioningNatsReloader.repository | quote }}
|
||||||
fsGroupChangePolicy: "Always"
|
tag: {{ .Values.images.umsProvisioningNatsReloader.tag | quote }}
|
||||||
sysctls:
|
registry: {{ .Values.global.imageRegistry }}
|
||||||
- name: "net.ipv4.ip_unprivileged_port_start"
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
value: "1"
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -73,6 +73,6 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsSelfserviceListener | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsSelfserviceListener }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -29,7 +29,7 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsDataLoader | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsDataLoader }}
|
||||||
|
|
||||||
stackDataContext:
|
stackDataContext:
|
||||||
ldapBase: "dc=swp-ldap,dc=internal"
|
ldapBase: "dc=swp-ldap,dc=internal"
|
||||||
|
|||||||
@@ -29,7 +29,7 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsDataLoader | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsDataLoader }}
|
||||||
|
|
||||||
stackDataContext:
|
stackDataContext:
|
||||||
idpSamlMetadataUrlInternal: null
|
idpSamlMetadataUrlInternal: null
|
||||||
@@ -46,8 +46,7 @@ stackDataContext:
|
|||||||
umcSamlSpFqdn: {{ printf "%s.%s" .Values.global.hosts.univentionManagementStack .Values.global.domain | quote }}
|
umcSamlSpFqdn: {{ printf "%s.%s" .Values.global.hosts.univentionManagementStack .Values.global.domain | quote }}
|
||||||
idpFqdn: {{ printf "%s.%s" .Values.global.hosts.keycloak .Values.global.domain | quote }}
|
idpFqdn: {{ printf "%s.%s" .Values.global.hosts.keycloak .Values.global.domain | quote }}
|
||||||
ldapSamlSpUrls: {{ printf "https://%s.%s%s" .Values.global.hosts.univentionManagementStack .Values.global.domain "/univention/saml/metadata" | quote }}
|
ldapSamlSpUrls: {{ printf "https://%s.%s%s" .Values.global.hosts.univentionManagementStack .Values.global.domain "/univention/saml/metadata" | quote }}
|
||||||
initialPasswordAdministrator: {{ .Values.secrets.univentionManagementStack.systemAccounts.administratorPassword | quote }}
|
initialPasswordAdministrator: {{ .Values.secrets.univentionManagementStack.defaultAccounts.administratorPassword | quote }}
|
||||||
initialPasswordSysIdpUser: {{ .Values.secrets.univentionManagementStack.systemAccounts.sysIdpUserPassword | quote }}
|
|
||||||
|
|
||||||
stackDataUms:
|
stackDataUms:
|
||||||
loadDevData: true
|
loadDevData: true
|
||||||
|
|||||||
@@ -53,7 +53,7 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsStoreDav | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsStoreDav }}
|
||||||
|
|
||||||
storeDav:
|
storeDav:
|
||||||
auth:
|
auth:
|
||||||
|
|||||||
@@ -27,8 +27,6 @@ image:
|
|||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsUdmRestApi | toYaml | nindent 2 }}
|
{{ .Values.resources.umsUdmRestApi | toYaml | nindent 2 }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.umsUdmRestApi }}
|
|
||||||
|
|
||||||
securityContext:
|
securityContext:
|
||||||
allowPrivilegeEscalation: false
|
allowPrivilegeEscalation: false
|
||||||
capabilities:
|
capabilities:
|
||||||
@@ -53,7 +51,7 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsUdmRestApi | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsUdmRestApi }}
|
||||||
|
|
||||||
udmRestApi:
|
udmRestApi:
|
||||||
# TODO: Stub value currently
|
# TODO: Stub value currently
|
||||||
|
|||||||
@@ -58,6 +58,6 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsUmcGateway | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsUmcGateway }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -94,7 +94,7 @@ securityContext:
|
|||||||
runAsUser: 0
|
runAsUser: 0
|
||||||
runAsGroup: 0
|
runAsGroup: 0
|
||||||
runAsNonRoot: false
|
runAsNonRoot: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsUmcServer | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsUmcServer }}
|
||||||
|
|
||||||
umcServer:
|
umcServer:
|
||||||
certPemFile: "/var/secrets/ssl/tls.crt"
|
certPemFile: "/var/secrets/ssl/tls.crt"
|
||||||
|
|||||||
@@ -66,7 +66,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsKeycloakBootstrap | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsKeycloakBootstrap }}
|
||||||
|
|
||||||
podAnnotations:
|
podAnnotations:
|
||||||
intents.otterize.com/service-name: "ums-keycloak-bootstrap"
|
intents.otterize.com/service-name: "ums-keycloak-bootstrap"
|
||||||
|
|||||||
@@ -27,10 +27,6 @@ handler:
|
|||||||
imagePullSecrets: {{ .Values.global.imagePullSecrets }}
|
imagePullSecrets: {{ .Values.global.imagePullSecrets }}
|
||||||
appConfig:
|
appConfig:
|
||||||
captchaProtectionEnable: false
|
captchaProtectionEnable: false
|
||||||
deviceProtectionEnable: true
|
|
||||||
ipProtectionEnable: true
|
|
||||||
logLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"WARN"{{ end }}
|
|
||||||
newDeviceLoginSubject: "New device login on your {{ .Values.theme.texts.productName }} account"
|
|
||||||
smtpPassword: {{ .Values.smtp.password | quote }}
|
smtpPassword: {{ .Values.smtp.password | quote }}
|
||||||
smtpHost: {{ .Values.smtp.host | quote }}
|
smtpHost: {{ .Values.smtp.host | quote }}
|
||||||
smtpPort: {{ .Values.smtp.port | quote }}
|
smtpPort: {{ .Values.smtp.port | quote }}
|
||||||
@@ -48,14 +44,12 @@ handler:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
runAsGroup: 1000
|
runAsGroup: 1000
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsKeycloakExtensionHandler | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsKeycloakExtensionHandler }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsKeycloakExtensionHandler | toYaml | nindent 4 }}
|
{{ .Values.resources.umsKeycloakExtensionHandler | toYaml | nindent 4 }}
|
||||||
postgresql:
|
postgresql:
|
||||||
enabled: false
|
enabled: false
|
||||||
proxy:
|
proxy:
|
||||||
appConfig:
|
|
||||||
logLevel: {{ if .Values.debug.enabled }}"debug"{{ else }}"warn"{{ end }}
|
|
||||||
image:
|
image:
|
||||||
registry: {{ .Values.global.imageRegistry | default .Values.images.umsKeycloakExtensionProxy.registry | quote }}
|
registry: {{ .Values.global.imageRegistry | default .Values.images.umsKeycloakExtensionProxy.registry | quote }}
|
||||||
repository: {{ .Values.images.umsKeycloakExtensionProxy.repository | quote }}
|
repository: {{ .Values.images.umsKeycloakExtensionProxy.repository | quote }}
|
||||||
@@ -77,14 +71,6 @@ proxy:
|
|||||||
path: "/resources"
|
path: "/resources"
|
||||||
- pathType: "Prefix"
|
- pathType: "Prefix"
|
||||||
path: "/fingerprintjs"
|
path: "/fingerprintjs"
|
||||||
- pathType: "Exact"
|
|
||||||
path: "/univention/meta.json"
|
|
||||||
backend:
|
|
||||||
service:
|
|
||||||
name: "ums-stack-gateway"
|
|
||||||
port:
|
|
||||||
name: "http"
|
|
||||||
|
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
host: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
||||||
@@ -103,7 +89,7 @@ proxy:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
runAsGroup: 1000
|
runAsGroup: 1000
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsKeycloakExtensionProxy | toYaml | nindent 6 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsKeycloakExtensionProxy }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.umsKeycloakExtensionProxy | toYaml | nindent 4 }}
|
{{ .Values.resources.umsKeycloakExtensionProxy | toYaml | nindent 4 }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -25,7 +25,7 @@ config:
|
|||||||
user: {{ .Values.databases.keycloak.username | quote }}
|
user: {{ .Values.databases.keycloak.username | quote }}
|
||||||
database: {{ .Values.databases.keycloak.name | quote }}
|
database: {{ .Values.databases.keycloak.name | quote }}
|
||||||
password: {{ .Values.databases.keycloak.password | default .Values.secrets.postgresql.keycloakUser | quote }}
|
password: {{ .Values.databases.keycloak.password | default .Values.secrets.postgresql.keycloakUser | quote }}
|
||||||
logLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"WARN"{{ end }}
|
logLevel: {{ if .Values.debug.enabled }}"DEBUG"{{ else }}"INFO"{{ end }}
|
||||||
enableMetrics: true
|
enableMetrics: true
|
||||||
# The availability of the admin console is already restricted through the path settings in the Keycloak Extensions
|
# The availability of the admin console is already restricted through the path settings in the Keycloak Extensions
|
||||||
# Proxy which is used in openDesk. The setting here is just relevant when Keycloak endpoints are exposed directly
|
# Proxy which is used in openDesk. The setting here is just relevant when Keycloak endpoints are exposed directly
|
||||||
@@ -44,7 +44,7 @@ containerSecurityContext:
|
|||||||
runAsUser: 1000
|
runAsUser: 1000
|
||||||
runAsGroup: 1000
|
runAsGroup: 1000
|
||||||
runAsNonRoot: true
|
runAsNonRoot: true
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsKeycloak | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsKeycloak }}
|
||||||
|
|
||||||
podSecurityContext:
|
podSecurityContext:
|
||||||
fsGroup: 1000
|
fsGroup: 1000
|
||||||
|
|||||||
@@ -45,7 +45,7 @@ containerSecurityContext:
|
|||||||
- "ALL"
|
- "ALL"
|
||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.umsStackGateway | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.umsStackGateway }}
|
||||||
|
|
||||||
service:
|
service:
|
||||||
type: "ClusterIP"
|
type: "ClusterIP"
|
||||||
@@ -280,6 +280,12 @@ serverBlock: |
|
|||||||
proxy_pass http://ums-portal-frontend:80/;
|
proxy_pass http://ums-portal-frontend:80/;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
## ums-provisioning
|
||||||
|
location /univention/provisioning-api/ {
|
||||||
|
rewrite ^/univention/provisioning-api(/.*)$ $1 break;
|
||||||
|
proxy_pass http://ums-provisioning-events-and-consumer-api:80;
|
||||||
|
}
|
||||||
|
|
||||||
## guardian
|
## guardian
|
||||||
location /univention/guardian/management-ui {
|
location /univention/guardian/management-ui {
|
||||||
proxy_pass http://ums-guardian-management-ui:80/univention/guardian/management-ui;
|
proxy_pass http://ums-guardian-management-ui:80/univention/guardian/management-ui;
|
||||||
|
|||||||
@@ -13,8 +13,7 @@ repositories:
|
|||||||
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: "{{ .Values.global.helmRegistry | default .Values.charts.xwiki.registry }}/\
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.xwiki.registry }}/{{ .Values.charts.xwiki.repository }}"
|
||||||
{{ .Values.charts.xwiki.repository }}"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "xwiki"
|
- name: "xwiki"
|
||||||
|
|||||||
@@ -36,7 +36,7 @@ containerSecurityContext:
|
|||||||
seccompProfile:
|
seccompProfile:
|
||||||
type: "RuntimeDefault"
|
type: "RuntimeDefault"
|
||||||
readOnlyRootFilesystem: false
|
readOnlyRootFilesystem: false
|
||||||
seLinuxOptions: {{ .Values.seLinuxOptions.xwiki | toYaml | nindent 4 }}
|
seLinuxOptions: {{ .Values.seLinuxOptions.xwiki }}
|
||||||
|
|
||||||
customConfigs:
|
customConfigs:
|
||||||
xwiki.cfg:
|
xwiki.cfg:
|
||||||
@@ -161,8 +161,7 @@ properties:
|
|||||||
"(&(objectClass=opendeskKnowledgemanagementGroup)(opendeskKnowledgemanagementEnabled=TRUE))"
|
"(&(objectClass=opendeskKnowledgemanagementGroup)(opendeskKnowledgemanagementEnabled=TRUE))"
|
||||||
"property:xwiki:XWiki.XWikiPreferences^XWiki.XWikiPreferences.title": "{{ .Values.theme.texts.productName }} Wissen - $!tdoc.displayTitle"
|
"property:xwiki:XWiki.XWikiPreferences^XWiki.XWikiPreferences.title": "{{ .Values.theme.texts.productName }} Wissen - $!tdoc.displayTitle"
|
||||||
|
|
||||||
cluster:
|
replicaCount: {{ .Values.replicas.xwiki }}
|
||||||
replicas: {{ .Values.replicas.xwiki }}
|
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.xwiki | toYaml | nindent 2 }}
|
{{ .Values.resources.xwiki | toYaml | nindent 2 }}
|
||||||
|
|||||||
File diff suppressed because it is too large
Load Diff
@@ -14,6 +14,6 @@ debug:
|
|||||||
# should activate debug output in all components and even allow e.g. successfully executed jobs
|
# should activate debug output in all components and even allow e.g. successfully executed jobs
|
||||||
# to stay available. This is going to be implemented on a case by case basis when we actually
|
# to stay available. This is going to be implemented on a case by case basis when we actually
|
||||||
# need debugging in a component.
|
# need debugging in a component.
|
||||||
# Use: `{{ if .Values.debug.enabled }}"DEBUG"{{ else }}"WARN"{{ end }}`
|
# Use: `{{ if .Values.debug.enabled }}"DEBUG"{{ else }}"INFO"{{ end }}`
|
||||||
enabled: false
|
enabled: false
|
||||||
...
|
...
|
||||||
|
|||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user