Compare commits

..

16 Commits

Author SHA1 Message Date
Dominik Kaminski
83aeb4ece2 chore(release): 0.2.0 [skip ci]
# [0.2.0](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.1.2...v0.2.0) (2023-08-15)

### Bug Fixes

* **helmfile:** Replace bitnami repositories with OCI ([4c21fd2](4c21fd2286))

### Features

* **helmfile:** Implement private image/chart registry variables ([5788323](5788323621))
2023-08-15 10:40:25 +00:00
Dominik Kaminski
4c21fd2286 fix(helmfile): Replace bitnami repositories with OCI 2023-08-15 11:32:03 +02:00
Dominik Kaminski
5788323621 feat(helmfile): Implement private image/chart registry variables 2023-08-15 11:32:03 +02:00
Dominik Kaminski
3cad4ce886 chore(release): 0.1.2 [skip ci]
## [0.1.2](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.1.1...v0.1.2) (2023-08-15)

### Bug Fixes

* **jitsi:** Update support for NodePort setups with different ingress/egress ips ([de25789](de257893d4))
2023-08-15 09:20:34 +00:00
Dominik Kaminski
de257893d4 fix(jitsi): Update support for NodePort setups with different ingress/egress ips 2023-08-14 18:50:42 +02:00
Thomas Kaltenbrunner
dcbb9981f5 chore(release): 0.1.1 [skip ci]
## [0.1.1](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.1.0...v0.1.1) (2023-08-14)

### Bug Fixes

* **open-xchange:** Bump dovecot and sovereign-workplace-open-xchange-bootstrap to 1.3.0 with image digest support ([53796da](53796dae66))
* **open-xchange:** Bump sovereign-workplace-open-xchange-bootstrap to 1.3.1 ([390f2de](390f2dee52))
2023-08-14 10:32:36 +00:00
Thomas Kaltenbrunner
390f2dee52 fix(open-xchange): Bump sovereign-workplace-open-xchange-bootstrap to 1.3.1 2023-08-14 11:18:35 +02:00
Thomas Kaltenbrunner
53796dae66 fix(open-xchange): Bump dovecot and sovereign-workplace-open-xchange-bootstrap to 1.3.0 with image digest support 2023-08-14 11:18:33 +02:00
Thomas Kaltenbrunner
2d376b35ed chore(xwiki): Remove xwiki init 2023-08-14 11:17:29 +02:00
Dominik Kaminski
bcee05d537 chore(release): 0.1.0 [skip ci]
# [0.1.0](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.0.6...v0.1.0) (2023-08-14)

### Bug Fixes

* **docs:** Typo ([ee684a7](ee684a7891))

### Features

* **element:** Add element component ([5f0ca92](5f0ca92a05))
2023-08-14 08:36:35 +00:00
Thorsten Rossner
ee684a7891 fix(docs): Typo 2023-08-14 08:34:08 +00:00
Dominik Kaminski
5f0ca92a05 feat(element): Add element component 2023-08-14 08:48:42 +02:00
Thorsten Rossner
152b4fb7b5 chore(release): 0.0.6 [skip ci]
## [0.0.6](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.0.5...v0.0.6) (2023-08-14)

### Bug Fixes

* **open-xchange:** Functional mailboxes auth settings update in AppSuite and Dovecot ([53948ea](53948eae76))
2023-08-14 06:44:08 +00:00
Thorsten Rossner
53948eae76 fix(open-xchange): Functional mailboxes auth settings update in AppSuite and Dovecot 2023-08-14 06:42:59 +00:00
Thorsten Rossner
48a87fb839 chore(release): 0.0.5 [skip ci]
## [0.0.5](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.0.4...v0.0.5) (2023-08-11)

### Bug Fixes

* **keycloak:** Improve digest image pinning ([b8a8932](b8a8932221))
2023-08-11 09:31:56 +00:00
Thorsten Rossner
b8a8932221 fix(keycloak): Improve digest image pinning 2023-08-11 09:30:37 +00:00
39 changed files with 578 additions and 225 deletions

View File

@@ -78,6 +78,12 @@ variables:
options: options:
- "yes" - "yes"
- "no" - "no"
DEPLOY_ELEMENT:
description: "Enable Element deployment."
value: "no"
options:
- "yes"
- "no"
DEPLOY_KEYCLOAK: DEPLOY_KEYCLOAK:
description: "Enable Keycloak deployment." description: "Enable Keycloak deployment."
value: "no" value: "no"
@@ -127,8 +133,7 @@ variables:
- "yes" - "yes"
- "no" - "no"
TESTS_PROJECT_URL: TESTS_PROJECT_URL:
description: "URL of the E2E-test gitlab project API with project ID." description: "URL of the E2E-test Gitlab project API with project ID."
value: "gitlab.souvap-univention.de/api/v4/projects/6"
# please use the following set of variables with normalized names: # please use the following set of variables with normalized names:
DOMAIN: "${NAMESPACE}.${CLUSTER}.${BASE_DOMAIN}" DOMAIN: "${NAMESPACE}.${CLUSTER}.${BASE_DOMAIN}"
ISTIO_DOMAIN: "${NAMESPACE}.istio.${CLUSTER}.${BASE_DOMAIN}" ISTIO_DOMAIN: "${NAMESPACE}.istio.${CLUSTER}.${BASE_DOMAIN}"
@@ -192,7 +197,7 @@ env-cleanup:
env-start: env-start:
environment: environment:
name: "${NAMESPACE}" name: "${NAMESPACE}"
url: "https://portal.${NAMESPACE}.${SWP_DOMAIN}" url: "https://portal.${DOMAIN}"
on_stop: "env-stop" on_stop: "env-stop"
extends: ".deploy-common" extends: ".deploy-common"
image: "${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6" image: "${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
@@ -359,6 +364,18 @@ jitsi-deploy:
variables: variables:
COMPONENT: "jitsi" COMPONENT: "jitsi"
element-deploy:
stage: "component-deploy-stage-1"
extends: ".deploy-common"
rules:
- if: >
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
$NAMESPACE =~ /.+/ &&
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_ELEMENT != "no")
when: "always"
variables:
COMPONENT: "element"
env-stop: env-stop:
extends: ".deploy-common" extends: ".deploy-common"
environment: environment:
@@ -445,15 +462,18 @@ run-tests:
image: "registry.souvap-univention.de/souvap/tooling/images/semantic-release-patched:latest" image: "registry.souvap-univention.de/souvap/tooling/images/semantic-release-patched:latest"
except: except:
- "tags" - "tags"
- "triggers"
- "web" - "web"
common-yaml-linter: common-yaml-linter:
except: except:
- "tags" - "tags"
- "triggers"
- "web" - "web"
reuse-linter: reuse-linter:
allow_failure: false allow_failure: false
except: except:
- "tags" - "tags"
- "triggers"
- "web" - "web"

View File

@@ -1,3 +1,56 @@
# [0.2.0](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.1.2...v0.2.0) (2023-08-15)
### Bug Fixes
* **helmfile:** Replace bitnami repositories with OCI ([4c21fd2](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/4c21fd228654520bb71d56dc1bda96332334002b))
### Features
* **helmfile:** Implement private image/chart registry variables ([5788323](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/57883236219811d2a5fc422649b4f9b042a0ac22))
## [0.1.2](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.1.1...v0.1.2) (2023-08-15)
### Bug Fixes
* **jitsi:** Update support for NodePort setups with different ingress/egress ips ([de25789](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/de257893d4ff2b3e8ea1d6988c6bdde5ed1eae9a))
## [0.1.1](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.1.0...v0.1.1) (2023-08-14)
### Bug Fixes
* **open-xchange:** Bump dovecot and sovereign-workplace-open-xchange-bootstrap to 1.3.0 with image digest support ([53796da](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/53796dae660463207a460b387b6f3dd23ce20cd0))
* **open-xchange:** Bump sovereign-workplace-open-xchange-bootstrap to 1.3.1 ([390f2de](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/390f2dee5226b83855a6cca8bf1c0d0f5647ee34))
# [0.1.0](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.0.6...v0.1.0) (2023-08-14)
### Bug Fixes
* **docs:** Typo ([ee684a7](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/ee684a78910ce721ea834e9ec2f4222ed37572c6))
### Features
* **element:** Add element component ([5f0ca92](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/5f0ca92a058e51a27aa56e35ebcf2048bad88671))
## [0.0.6](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.0.5...v0.0.6) (2023-08-14)
### Bug Fixes
* **open-xchange:** Functional mailboxes auth settings update in AppSuite and Dovecot ([53948ea](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/53948eae7648cc9785d2b8a813fc7e40b36aa3aa))
## [0.0.5](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.0.4...v0.0.5) (2023-08-11)
### Bug Fixes
* **keycloak:** Improve digest image pinning ([b8a8932](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/b8a8932221ae4d6632c7d1f4a85f46fea01a92e7))
## [0.0.4](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.0.3...v0.0.4) (2023-08-11) ## [0.0.4](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.0.3...v0.0.4) (2023-08-11)

View File

@@ -8,10 +8,7 @@ SPDX-License-Identifier: Apache-2.0
# Disclaimer August 2023 # Disclaimer August 2023
The current state of the Sovereign Workplace misses the component The current state of the Sovereign Workplace contains components that are going to be
_Element Starter Edition_ because it is not generally available yet.
Also does the Sovereign Workplace contain components that are going to be
replaced. Like for example the UCS dev container monolith will be substituted by replaced. Like for example the UCS dev container monolith will be substituted by
multiple Univention Management Stack containers. multiple Univention Management Stack containers.
@@ -152,6 +149,16 @@ and wait a little. After the deployment is finished some bootstrapping is
executed which might take some more minutes before you can log in your new executed which might take some more minutes before you can log in your new
instance. instance.
## Offline deployment
Before executing a [local deployment](#local-deployment), you can set following
environment variables to use your own container image and helm chart registry:
| name | description |
|------------------------------|--------------------------------|
| PRIVATE_CHART_REPOSITORY_URL | Your helm chart repository url |
| PRIVATE_IMAGE_REGISTRY_URL | Your image registry url |
## Logging in ## Logging in
When successfully deployed the SWP, all K8s jobs from the deployment should be When successfully deployed the SWP, all K8s jobs from the deployment should be
@@ -183,26 +190,27 @@ for development and evaluation purposes only - they need to be replaced in
production deployments. These components are grouped together in the production deployments. These components are grouped together in the
subdirectory `/helmfile/apps/services`. subdirectory `/helmfile/apps/services`.
| Component | Name | Default | Description | Type | | Component | Name | Default | Description | Type |
|-----------------------------|-------------------------------------|---------|------------------------------|------------| |-----------------------------|-------------------------------------|---------|--------------------------------|------------|
| Certificates | `certificates.enabled` | `true` | TLS certificates | Eval | | Certificates | `certificates.enabled` | `true` | TLS certificates | Eval |
| ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine | Eval | | ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine | Eval |
| ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine | Eval | | ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine | Eval |
| Collabora | `collabora.enabled` | `true` | Weboffice | Functional | | Collabora | `collabora.enabled` | `true` | Weboffice | Functional |
| Dovecot | `dovecot.enabled` | `true` | Mail backend | Functional | | Dovecot | `dovecot.enabled` | `true` | Mail backend | Functional |
| Intercom Service | `intercom.enabled` | `true` | Cross service data exchange | Functional | | Element | `element.enabled` | `true` | Secure communications platform | Functional |
| Jitsi | `jitsi.enabled` | `true` | Videoconferencing | Functional | | Intercom Service | `intercom.enabled` | `true` | Cross service data exchange | Functional |
| Keycloak | `keycloak.enabled` | `true` | Identity Provider | Functional | | Jitsi | `jitsi.enabled` | `true` | Videoconferencing | Functional |
| MariaDB | `mariadb.enabled` | `true` | Database | Eval | | Keycloak | `keycloak.enabled` | `true` | Identity Provider | Functional |
| Nextcloud | `nextcloud.enabled` | `true` | File share | Functional | | MariaDB | `mariadb.enabled` | `true` | Database | Eval |
| OpenProject | `openproject.enabled` | `true` | Project management | Functional | | Nextcloud | `nextcloud.enabled` | `true` | File share | Functional |
| OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware | Functional | | OpenProject | `openproject.enabled` | `true` | Project management | Functional |
| Provisioning | `oxConnector.enabled` | `true` | Backend provisioning | Functional | | OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware | Functional |
| Postfix | `postfix.enabled` | `true` | MTA | Eval | | Provisioning | `oxConnector.enabled` | `true` | Backend provisioning | Functional |
| PostgreSQL | `postgresql.enabled` | `true` | Database | Eval | | Postfix | `postfix.enabled` | `true` | MTA | Eval |
| Redis | `redis.enabled` | `true` | Cache Database | Eval | | PostgreSQL | `postgresql.enabled` | `true` | Database | Eval |
| Univention Corporate Server | `univentionCorporateServer.enabled` | `true` | Identity Management & Portal | Functional | | Redis | `redis.enabled` | `true` | Cache Database | Eval |
| XWiki | `xwiki.enabled` | `true` | Knowledgebase | Functional | | Univention Corporate Server | `univentionCorporateServer.enabled` | `true` | Identity Management & Portal | Functional |
| XWiki | `xwiki.enabled` | `true` | Knowledgebase | Functional |
#### Cluster capabilities #### Cluster capabilities
@@ -221,6 +229,12 @@ the application to your own database instances.
| Component | Name | Type | Parameter | Key | Default | | Component | Name | Type | Parameter | Key | Default |
|-------------|--------------------|------------|-----------|----------------------------------------|----------------------------| |-------------|--------------------|------------|-----------|----------------------------------------|----------------------------|
| Element | Synapse | PostgreSQL | | | |
| | | | Name | `databases.synapse.name` | `matrix` |
| | | | Host | `databases.synapse.host` | `postgresql` |
| | | | Port | `databases.synapse.port` | `5432` |
| | | | Username | `databases.synapse.username` | `matrix_user` |
| | | | Password | `databases.synapse.password` | |
| Keycloak | Keycloak | PostgreSQL | | | | | Keycloak | Keycloak | PostgreSQL | | | |
| | | | Name | `databases.keycloak.name` | `keycloak` | | | | | Name | `databases.keycloak.name` | `keycloak` |
| | | | Host | `databases.keycloak.host` | `postgresql` | | | | | Host | `databases.keycloak.host` | `postgresql` |
@@ -269,10 +283,14 @@ actual scalability of the components (see column `Scales at least to 2`).
| | `replicas.milter` | `1` | :white_check_mark: | :white_check_mark: | not tested | | | `replicas.milter` | `1` | :white_check_mark: | :white_check_mark: | not tested |
| Collabora | `replicas.collabora` | `1` | :white_check_mark: | :white_check_mark: | not tested | | Collabora | `replicas.collabora` | `1` | :white_check_mark: | :white_check_mark: | not tested |
| Dovecot | `replicas.dovecot` | `1` | :white_check_mark: | :x: | not tested | | Dovecot | `replicas.dovecot` | `1` | :white_check_mark: | :x: | not tested |
| Element | `replicas.element` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
| | `replicas.synapse` | `1` | :white_check_mark: | :x: | not tested |
| | `replicas.synapseWeb` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
| | `replicas.wellKnown` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
| Jitsi | `replicas.jibri` | `1` | :white_check_mark: | :white_check_mark: | not tested | | Jitsi | `replicas.jibri` | `1` | :white_check_mark: | :white_check_mark: | not tested |
| | `replicas.jicofo` | `1` | :white_check_mark: | :white_check_mark: | not tested | | | `replicas.jicofo` | `1` | :white_check_mark: | :white_check_mark: | not tested |
| | `replicas.jitsi ` | `1` | :white_check_mark: | :white_check_mark: | not tested | | | `replicas.jitsi ` | `1` | :white_check_mark: | :white_check_mark: | not tested |
| | `replicas.jvb ` | `1` | :white_check_mark: | :x: | tested | | | `replicas.jvb ` | `1` | :white_check_mark: | :x: | :x: |
| Keycloak | `replicas.keycloak` | `1` | :white_check_mark: | :white_check_mark: | not tested | | Keycloak | `replicas.keycloak` | `1` | :white_check_mark: | :white_check_mark: | not tested |
| Nextcloud | `replicas.nextcloud` | `1` | :white_check_mark: | :white_check_mark: | not tested | | Nextcloud | `replicas.nextcloud` | `1` | :white_check_mark: | :white_check_mark: | not tested |
| OpenProject | `replicas.openproject` | `1` | :white_check_mark: | :white_check_mark: | not tested | | OpenProject | `replicas.openproject` | `1` | :white_check_mark: | :white_check_mark: | not tested |

View File

@@ -15,6 +15,7 @@ helmfiles:
- path: "helmfile/apps/nextcloud/helmfile.yaml" - path: "helmfile/apps/nextcloud/helmfile.yaml"
- path: "helmfile/apps/collabora/helmfile.yaml" - path: "helmfile/apps/collabora/helmfile.yaml"
- path: "helmfile/apps/jitsi/helmfile.yaml" - path: "helmfile/apps/jitsi/helmfile.yaml"
- path: "helmfile/apps/element/helmfile.yaml"
- path: "helmfile/apps/openproject/helmfile.yaml" - path: "helmfile/apps/openproject/helmfile.yaml"
- path: "helmfile/apps/xwiki/helmfile.yaml" - path: "helmfile/apps/xwiki/helmfile.yaml"
- path: "helmfile/apps/provisioning/helmfile.yaml" - path: "helmfile/apps/provisioning/helmfile.yaml"

View File

@@ -2,12 +2,14 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "collabora-online" - name: "collabora-online-repo"
url: "https://collaboraonline.github.io/online" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://collaboraonline.github.io/online" }}
releases: releases:
- name: "collabora-online" - name: "collabora-online"
chart: "collabora-online/collabora-online" chart: "collabora-online-repo/collabora-online"
version: "1.0.2" version: "1.0.2"
values: values:
- "values.yaml" - "values.yaml"

View File

@@ -0,0 +1,45 @@
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
# SPDX-License-Identifier: Apache-2.0
---
repositories:
- name: "sovereign-workplace-element-repo"
url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/148/packages/helm/stable" }}
releases:
- name: "sovereign-workplace-element"
chart: "sovereign-workplace-element-repo/sovereign-workplace-element"
version: "1.1.2"
values:
- "values-element.gotmpl"
condition: "element.enabled"
- name: "sovereign-workplace-well-known"
chart: "sovereign-workplace-element-repo/sovereign-workplace-well-known"
version: "1.1.2"
values:
- "values-well-known.gotmpl"
condition: "element.enabled"
- name: "sovereign-workplace-synapse-web"
chart: "sovereign-workplace-element-repo/sovereign-workplace-synapse-web"
version: "1.1.2"
values:
- "values-synapse-web.gotmpl"
condition: "element.enabled"
- name: "sovereign-workplace-synapse"
chart: "sovereign-workplace-element-repo/sovereign-workplace-synapse"
version: "1.1.2"
values:
- "values-synapse.gotmpl"
condition: "element.enabled"
commonLabels:
deploy-stage: "component-1"
component: "element"
bases:
- "../../bases/environments.yaml"
...

View File

@@ -0,0 +1,31 @@
{{/*
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
SPDX-License-Identifier: Apache-2.0
*/}}
---
global:
domain: "{{ .Values.global.domain }}"
registry: "{{ .Values.global.imageRegistry }}"
hosts:
{{ .Values.global.hosts | toYaml | nindent 4 }}
imagePullSecrets:
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
image:
registry: "{{ .Values.global.imageRegistry }}"
repository: "{{ .Values.images.element.repository }}"
tag: "{{ .Values.images.element.tag }}"
ingress:
host: "{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}"
enabled: "{{ .Values.ingress.enabled }}"
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
tls:
enabled: "{{ .Values.ingress.tls.enabled }}"
secretName: "{{ .Values.ingress.tls.secretName }}"
replicaCount: {{ .Values.replicas.element }}
resources:
{{ .Values.resources.element | toYaml | nindent 2 }}
...

View File

@@ -0,0 +1,31 @@
{{/*
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
SPDX-License-Identifier: Apache-2.0
*/}}
---
global:
domain: "{{ .Values.global.domain }}"
registry: "{{ .Values.global.imageRegistry }}"
hosts:
{{ .Values.global.hosts | toYaml | nindent 4 }}
imagePullSecrets:
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
image:
registry: "{{ .Values.global.imageRegistry }}"
repository: "{{ .Values.images.synapseWeb.repository }}"
tag: "{{ .Values.images.synapseWeb.tag }}"
ingress:
host: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
enabled: "{{ .Values.ingress.enabled }}"
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
tls:
enabled: "{{ .Values.ingress.tls.enabled }}"
secretName: "{{ .Values.ingress.tls.secretName }}"
replicaCount: {{ .Values.replicas.synapseWeb }}
resources:
{{ .Values.resources.synapseWeb | toYaml | nindent 2 }}
...

View File

@@ -0,0 +1,52 @@
{{/*
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
SPDX-License-Identifier: Apache-2.0
*/}}
---
global:
domain: "{{ .Values.global.domain }}"
registry: "{{ .Values.global.imageRegistry }}"
hosts:
{{ .Values.global.hosts | toYaml | nindent 4 }}
imagePullSecrets:
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
image:
registry: "{{ .Values.global.imageRegistry }}"
repository: "{{ .Values.images.synapse.repository }}"
tag: "{{ .Values.images.synapse.tag }}"
configuration:
database:
host: "{{ .Values.databases.synapse.host }}"
name: "{{ .Values.databases.synapse.name }}"
user: "{{ .Values.databases.synapse.username }}"
password: "{{ .Values.databases.synapse.password | default .Values.secrets.postgresql.matrixUser }}"
homeserver:
oidc:
clientSecret: {{ .Values.secrets.keycloak.clientSecret.matrix }}
issuer: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
turn:
sharedSecret: {{ .Values.turn.credentials }}
servers:
{{- if .Values.turn.tls.host }}
- server: {{ .Values.turn.tls.host }}
port: {{ .Values.turn.tls.port }}
transport: {{ .Values.turn.transport }}
{{- else if .Values.turn.server.host }}
- server: {{ .Values.turn.server.host }}
port: {{ .Values.turn.server.port }}
transport: {{ .Values.turn.transport }}
{{- end }}
persistence:
size: "{{ .Values.persistence.size.synapse }}"
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
replicaCount: {{ .Values.replicas.synapse }}
resources:
{{ .Values.resources.synapse | toYaml | nindent 2 }}
...

View File

@@ -0,0 +1,31 @@
{{/*
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
SPDX-License-Identifier: Apache-2.0
*/}}
---
global:
domain: "{{ .Values.global.domain }}"
registry: "{{ .Values.global.imageRegistry }}"
hosts:
{{ .Values.global.hosts | toYaml | nindent 4 }}
imagePullSecrets:
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
image:
registry: "{{ .Values.global.imageRegistry }}"
repository: "{{ .Values.images.wellKnown.repository }}"
tag: "{{ .Values.images.wellKnown.tag }}"
ingress:
host: "{{ .Values.global.domain }}"
enabled: "{{ .Values.ingress.enabled }}"
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
tls:
enabled: "{{ .Values.ingress.tls.enabled }}"
secretName: "{{ .Values.ingress.tls.secretName }}"
replicaCount: {{ .Values.replicas.wellKnown }}
resources:
{{ .Values.resources.wellKnown | toYaml | nindent 2 }}
...

View File

@@ -2,12 +2,14 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "intercom-service" - name: "intercom-service-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/66/packages/helm/stable" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/66/packages/helm/stable" }}
releases: releases:
- name: "intercom-service" - name: "intercom-service"
chart: "intercom-service/intercom-service" chart: "intercom-service-repo/intercom-service"
version: "1.1.3" version: "1.1.3"
values: values:
- "values.yaml" - "values.yaml"

View File

@@ -2,13 +2,15 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "jitsi" - name: "jitsi-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/137/packages/helm/stable" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/137/packages/helm/stable" }}
releases: releases:
- name: "jitsi" - name: "jitsi"
chart: "jitsi/sovereign-workplace-jitsi" chart: "jitsi-repo/sovereign-workplace-jitsi"
version: "1.1.0" version: "1.2.1"
values: values:
- "values-jitsi.gotmpl" - "values-jitsi.gotmpl"
condition: "jitsi.enabled" condition: "jitsi.enabled"

View File

@@ -17,10 +17,10 @@ image:
tag: "{{ .Values.images.jitsiKeycloakAdapter.tag }}" tag: "{{ .Values.images.jitsiKeycloakAdapter.tag }}"
settings: settings:
jwtAppSecret: "{{ .Values.secrets.jitsiPlain.jwtAppSecret }}" jwtAppSecret: "{{ .Values.secrets.jitsi.jwtAppSecret }}"
jitsi: jitsi:
publicURL: "https://{{ .Values.global.hosts.jitsiPlain }}.{{ .Values.global.domain }}" publicURL: "https://{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
web: web:
replicaCount: {{ .Values.replicas.jitsi }} replicaCount: {{ .Values.replicas.jitsi }}
image: image:
@@ -30,13 +30,13 @@ jitsi:
enabled: "{{ .Values.ingress.enabled }}" enabled: "{{ .Values.ingress.enabled }}"
ingressClassName: "{{ .Values.ingress.ingressClassName }}" ingressClassName: "{{ .Values.ingress.ingressClassName }}"
hosts: hosts:
- host: "{{ .Values.global.hosts.jitsiPlain }}.{{ .Values.global.domain }}" - host: "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
paths: paths:
- "/" - "/"
tls: tls:
- secretName: "{{ .Values.ingress.tls.secretName }}" - secretName: "{{ .Values.ingress.tls.secretName }}"
hosts: hosts:
- "{{ .Values.global.hosts.jitsiPlain }}.{{ .Values.global.domain }}" - "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
extraEnvs: extraEnvs:
TURN_ENABLE: "1" TURN_ENABLE: "1"
resources: resources:
@@ -51,11 +51,11 @@ jitsi:
{{- end }} {{- end }}
extraEnvs: extraEnvs:
- name: "AUTH_TYPE" - name: "AUTH_TYPE"
value: "jwt" value: "hybrid_matrix_token"
- name: "JWT_APP_ID" - name: "JWT_APP_ID"
value: "myappid" value: "myappid"
- name: "JWT_APP_SECRET" - name: "JWT_APP_SECRET"
value: "{{ .Values.secrets.jitsiPlain.jwtAppSecret }}" value: "{{ .Values.secrets.jitsi.jwtAppSecret }}"
- name: TURNS_HOST - name: TURNS_HOST
value: "{{ .Values.turn.tls.host }}" value: "{{ .Values.turn.tls.host }}"
- name: TURNS_PORT - name: TURNS_PORT
@@ -79,8 +79,8 @@ jitsi:
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jicofo.repository }}" repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jicofo.repository }}"
tag: "{{ .Values.images.jicofo.tag }}" tag: "{{ .Values.images.jicofo.tag }}"
xmpp: xmpp:
password: "{{ .Values.secrets.jitsiPlain.jicofoAuthPassword }}" password: "{{ .Values.secrets.jitsi.jicofoAuthPassword }}"
componentSecret: "{{ .Values.secrets.jitsiPlain.jicofoComponentPassword }}" componentSecret: "{{ .Values.secrets.jitsi.jicofoComponentPassword }}"
resources: resources:
{{ .Values.resources.jicofo | toYaml | nindent 6 }} {{ .Values.resources.jicofo | toYaml | nindent 6 }}
jvb: jvb:
@@ -89,7 +89,7 @@ jitsi:
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jvb.repository }}" repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jvb.repository }}"
tag: "{{ .Values.images.jvb.tag }}" tag: "{{ .Values.images.jvb.tag }}"
xmpp: xmpp:
password: "{{ .Values.secrets.jitsiPlain.jvbAuthPassword }}" password: "{{ .Values.secrets.jitsi.jvbAuthPassword }}"
resources: resources:
{{ .Values.resources.jvb | toYaml | nindent 6 }} {{ .Values.resources.jvb | toYaml | nindent 6 }}
service: service:
@@ -100,9 +100,9 @@ jitsi:
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jibri.repository }}" repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jibri.repository }}"
tag: "{{ .Values.images.jibri.tag }}" tag: "{{ .Values.images.jibri.tag }}"
recorder: recorder:
password: "{{ .Values.secrets.jitsiPlain.jibriRecorderPassword }}" password: "{{ .Values.secrets.jitsi.jibriRecorderPassword }}"
xmpp: xmpp:
password: "{{ .Values.secrets.jitsiPlain.jibriXmppPassword }}" password: "{{ .Values.secrets.jitsi.jibriXmppPassword }}"
resources: resources:
{{ .Values.resources.jibri | toYaml | nindent 6 }} {{ .Values.resources.jibri | toYaml | nindent 6 }}
imagePullSecrets: imagePullSecrets:
@@ -111,6 +111,8 @@ jitsi:
{{- end }} {{- end }}
patchJVB: patchJVB:
configuration:
staticLoadbalancerIP: "{{ .Values.cluster.networking.ingressGatewayIP }}"
image: image:
registry: "{{ .Values.global.imageRegistry }}" registry: "{{ .Values.global.imageRegistry }}"
repository: "{{ .Values.images.jitsiPatchJVB.repository }}" repository: "{{ .Values.images.jitsiPatchJVB.repository }}"

View File

@@ -2,12 +2,14 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "sovereign-workplace-keycloak-bootstrap" - name: "sovereign-workplace-keycloak-bootstrap-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/138/packages/helm/stable" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/138/packages/helm/stable" }}
releases: releases:
- name: "sovereign-workplace-keycloak-bootstrap" - name: "sovereign-workplace-keycloak-bootstrap"
chart: "sovereign-workplace-keycloak-bootstrap/sovereign-workplace-keycloak-bootstrap" chart: "sovereign-workplace-keycloak-bootstrap-repo/sovereign-workplace-keycloak-bootstrap"
version: "1.1.11" version: "1.1.11"
values: values:
- "values-bootstrap.gotmpl" - "values-bootstrap.gotmpl"

View File

@@ -2,22 +2,29 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "bitnami" - name: "bitnami-repo"
url: "https://charts.bitnami.com/bitnami" oci: true
- name: "keycloak-theme" url: >-
url: "https://gitlab.souvap-univention.de/api/v4/projects/96/packages/helm/stable" {{ env "PRIVATE_CHART_REPOSITORY_URL" |
- name: "keycloak-extensions" default "registry-1.docker.io/bitnamicharts" }}
url: "https://gitlab.souvap-univention.de/api/v4/projects/77/packages/helm/stable" - name: "keycloak-theme-repo"
url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/96/packages/helm/stable" }}
- name: "keycloak-extensions-repo"
url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/77/packages/helm/stable" }}
releases: releases:
- name: "keycloak-theme" - name: "keycloak-theme"
chart: "keycloak-theme/sovereign-workplace-theme" chart: "keycloak-theme-repo/sovereign-workplace-theme"
version: "1.0.0" version: "1.0.0"
values: values:
- "values-theme.gotmpl" - "values-theme.gotmpl"
condition: "keycloak.enabled" condition: "keycloak.enabled"
- name: "keycloak" - name: "keycloak"
chart: "bitnami/keycloak" chart: "bitnami-repo/keycloak"
version: "12.2.0" version: "12.2.0"
values: values:
- "values-keycloak.gotmpl" - "values-keycloak.gotmpl"
@@ -26,7 +33,7 @@ releases:
wait: true wait: true
condition: "keycloak.enabled" condition: "keycloak.enabled"
- name: "keycloak-extensions" - name: "keycloak-extensions"
chart: "keycloak-extensions/keycloak-extensions" chart: "keycloak-extensions-repo/keycloak-extensions"
version: "0.1.0" version: "0.1.0"
needs: needs:
- "keycloak" - "keycloak"

View File

@@ -18,7 +18,11 @@ handler:
image: image:
registry: "{{ .Values.global.imageRegistry }}" registry: "{{ .Values.global.imageRegistry }}"
repository: "{{ .Values.images.keycloakExtensionHandler.repository }}" repository: "{{ .Values.images.keycloakExtensionHandler.repository }}"
{{- if .Values.images.keycloakExtensionHandler.digest }}
sha256: "{{ .Values.images.keycloakExtensionHandler.digest}}"
{{- else if .Values.images.keycloakExtensionHandler.tag }}
tag: "{{ .Values.images.keycloakExtensionHandler.tag }}" tag: "{{ .Values.images.keycloakExtensionHandler.tag }}"
{{- end }}
imagePullPolicy: "Always" imagePullPolicy: "Always"
appConfig: appConfig:
smtpPassword: "{{ .Values.smtp.password }}" smtpPassword: "{{ .Values.smtp.password }}"
@@ -31,7 +35,11 @@ proxy:
image: image:
registry: "{{ .Values.global.imageRegistry }}" registry: "{{ .Values.global.imageRegistry }}"
repository: "{{ .Values.images.keycloakExtensionProxy.repository }}" repository: "{{ .Values.images.keycloakExtensionProxy.repository }}"
{{- if .Values.images.keycloakExtensionProxy.digest }}
sha256: "{{ .Values.images.keycloakExtensionProxy.digest}}"
{{- else if .Values.images.keycloakExtensionProxy.tag }}
tag: "{{ .Values.images.keycloakExtensionProxy.tag }}" tag: "{{ .Values.images.keycloakExtensionProxy.tag }}"
{{- end }}
imagePullPolicy: "Always" imagePullPolicy: "Always"
ingress: ingress:
enabled: "{{ .Values.ingress.enabled }}" enabled: "{{ .Values.ingress.enabled }}"

View File

@@ -116,9 +116,9 @@ keycloakConfigCli:
"enabled": true, "enabled": true,
"alwaysDisplayInConsole": false, "alwaysDisplayInConsole": false,
"clientAuthenticatorType": "client-secret", "clientAuthenticatorType": "client-secret",
"secret": "$(CLIENT_SECRET_JITSI_PLAIN_PASSWORD)", "secret": "$(CLIENT_SECRET_JITSI_PASSWORD)",
"redirectUris": [ "redirectUris": [
"https://$(JITSI_PLAIN_DOMAIN)/*" "https://$(JITSI_DOMAIN)/*"
], ],
"webOrigins": [ "webOrigins": [
"*" "*"
@@ -135,7 +135,7 @@ keycloakConfigCli:
"frontchannelLogout": true, "frontchannelLogout": true,
"protocol": "openid-connect", "protocol": "openid-connect",
"attributes": { "attributes": {
"post.logout.redirect.uris": "https://$(JITSI_PLAIN_DOMAIN)/*##https://$(UNIVENTION_CORPORATE_SERVER_DOMAIN)/*" "post.logout.redirect.uris": "https://$(JITSI_DOMAIN)/*##https://$(UNIVENTION_CORPORATE_SERVER_DOMAIN)/*"
}, },
"authenticationFlowBindingOverrides": {}, "authenticationFlowBindingOverrides": {},
"fullScopeAllowed": true, "fullScopeAllowed": true,

View File

@@ -55,8 +55,8 @@ keycloakConfigCli:
value: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}" value: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
- name: "MATRIX_DOMAIN" - name: "MATRIX_DOMAIN"
value: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}" value: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
- name: "JITSI_PLAIN_DOMAIN" - name: "JITSI_DOMAIN"
value: "{{ .Values.global.hosts.jitsiPlain }}.{{ .Values.global.domain }}" value: "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
- name: "ELEMENT_DOMAIN" - name: "ELEMENT_DOMAIN"
value: "{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}" value: "{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}"
- name: "INTERCOM_SERVICE_DOMAIN" - name: "INTERCOM_SERVICE_DOMAIN"
@@ -65,8 +65,8 @@ keycloakConfigCli:
value: {{ .Values.secrets.keycloak.clientSecret.intercom }} value: {{ .Values.secrets.keycloak.clientSecret.intercom }}
- name: "CLIENT_SECRET_MATRIX_PASSWORD" - name: "CLIENT_SECRET_MATRIX_PASSWORD"
value: {{ .Values.secrets.keycloak.clientSecret.matrix }} value: {{ .Values.secrets.keycloak.clientSecret.matrix }}
- name: "CLIENT_SECRET_JITSI_PLAIN_PASSWORD" - name: "CLIENT_SECRET_JITSI_PASSWORD"
value: {{ .Values.secrets.keycloak.clientSecret.jitsiPlain }} value: {{ .Values.secrets.keycloak.clientSecret.jitsi }}
- name: "CLIENT_SECRET_NCOIDC_PASSWORD" - name: "CLIENT_SECRET_NCOIDC_PASSWORD"
value: {{ .Values.secrets.keycloak.clientSecret.ncoidc }} value: {{ .Values.secrets.keycloak.clientSecret.ncoidc }}
- name: "CLIENT_SECRET_OPENPROJECT_PASSWORD" - name: "CLIENT_SECRET_OPENPROJECT_PASSWORD"

View File

@@ -2,14 +2,18 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "sovereign-workplace-nextcloud-bootstrap" - name: "sovereign-workplace-nextcloud-bootstrap-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/130/packages/helm/stable" url: >-
- name: "nextcloud" {{ env "PRIVATE_CHART_REPOSITORY_URL" |
url: "https://nextcloud.github.io/helm/" default "https://gitlab.souvap-univention.de/api/v4/projects/130/packages/helm/stable" }}
- name: "nextcloud-repo"
url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://nextcloud.github.io/helm/" }}
releases: releases:
- name: "sovereign-workplace-nextcloud-bootstrap" - name: "sovereign-workplace-nextcloud-bootstrap"
chart: "sovereign-workplace-nextcloud-bootstrap/sovereign-workplace-nextcloud-bootstrap" chart: "sovereign-workplace-nextcloud-bootstrap-repo/sovereign-workplace-nextcloud-bootstrap"
version: "2.2.0" version: "2.2.0"
wait: true wait: true
waitForJobs: true waitForJobs: true
@@ -20,7 +24,7 @@ releases:
timeout: 1800 timeout: 1800
- name: "nextcloud" - name: "nextcloud"
chart: "nextcloud/nextcloud" chart: "nextcloud-repo/nextcloud"
version: "3.5.19" version: "3.5.19"
needs: needs:
- "sovereign-workplace-nextcloud-bootstrap" - "sovereign-workplace-nextcloud-bootstrap"

View File

@@ -2,32 +2,38 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "dovecot" - name: "dovecot-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/80/packages/helm/stable" url: >-
- name: "openxchange" {{ env "PRIVATE_CHART_REPOSITORY_URL" |
url: "registry.open-xchange.com" default "https://gitlab.souvap-univention.de/api/v4/projects/80/packages/helm/stable" }}
- name: "openxchange-repo"
oci: true oci: true
- name: "sovereign-workplace-open-xchange-bootstrap" url: >-
url: "https://gitlab.souvap-univention.de/api/v4/projects/139/packages/helm/stable" {{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "registry.open-xchange.com" }}
- name: "sovereign-workplace-open-xchange-bootstrap-repo"
url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/139/packages/helm/stable" }}
releases: releases:
- name: "dovecot" - name: "dovecot"
chart: "dovecot/dovecot" chart: "dovecot-repo/dovecot"
version: "1.2.0" version: "1.3.1"
values: values:
- "values-dovecot.yaml" - "values-dovecot.yaml"
- "values-dovecot.gotmpl" - "values-dovecot.gotmpl"
condition: "dovecot.enabled" condition: "dovecot.enabled"
- name: "open-xchange" - name: "open-xchange"
chart: "openxchange/appsuite-public-sector/charts/appsuite-public-sector" chart: "openxchange-repo/appsuite-public-sector/charts/appsuite-public-sector"
version: "1.2.13" version: "1.2.13"
values: values:
- "values-openxchange.yaml" - "values-openxchange.yaml"
- "values-openxchange.gotmpl" - "values-openxchange.gotmpl"
condition: "oxAppsuite.enabled" condition: "oxAppsuite.enabled"
- name: "sovereign-workplace-open-xchange-bootstrap" - name: "sovereign-workplace-open-xchange-bootstrap"
chart: "sovereign-workplace-open-xchange-bootstrap/sovereign-workplace-open-xchange-bootstrap" chart: "sovereign-workplace-open-xchange-bootstrap-repo/sovereign-workplace-open-xchange-bootstrap"
version: "1.2.2" version: "1.3.1"
values: values:
- "values-openxchange-bootstrap.yaml" - "values-openxchange-bootstrap.yaml"
condition: "oxAppsuite.enabled" condition: "oxAppsuite.enabled"

View File

@@ -6,7 +6,7 @@ SPDX-License-Identifier: Apache-2.0
image: image:
registry: "{{ .Values.global.imageRegistry }}" registry: "{{ .Values.global.imageRegistry }}"
url: "{{ .Values.images.dovecot.repository }}" url: "{{ .Values.images.dovecot.repository }}"
tag: "{{ .Values.images.dovecot.tag }}" digest: "{{ .Values.images.dovecot.digest }}"
imagePullSecrets: imagePullSecrets:
{{- range .Values.global.imagePullSecrets }} {{- range .Values.global.imagePullSecrets }}

View File

@@ -0,0 +1,15 @@
{{/*
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
SPDX-License-Identifier: Apache-2.0
*/}}
---
image:
registry: "{{ .Values.global.imageRegistry }}"
url: "{{ .Values.images.openxchangeBootstrap.repository }}"
digest: "{{ .Values.images.openxchangeBootstrap.digest }}"
imagePullSecrets:
{{- range .Values.global.imagePullSecrets }}
- name: {{ . }}
{{- end }}
...

View File

@@ -2,22 +2,5 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
cleanup: cleanup:
deletePodsOnSuccess: false deletePodsOnSuccess: true
# resources:
# limits:
# # The max amount of CPUs to consume.
# cpu: 1
# # The max amount of RAM to consume.
# memory: "1Gi"
# requests:
# # The amount of CPUs which has to be available on the scheduled node.
# cpu: 1
# # The amount of RAM which has to be available on the scheduled node.
# memory: "256Mi"
# Keep default values:
# coreMiddleware:
# statefulSet: "open-xchange-core-mw-default-0"
# pod: "open-xchange-core-mw-default-0"
... ...

View File

@@ -65,6 +65,7 @@ appsuite:
com.openexchange.capability.smime: "true" com.openexchange.capability.smime: "true"
# Secondary Accounts # Secondary Accounts
com.openexchange.mail.secondary.authType: "XOAUTH2" com.openexchange.mail.secondary.authType: "XOAUTH2"
com.openexchange.mail.transport.secondary.authType: "xoauth2"
# Nextcloud integration # Nextcloud integration
com.openexchange.file.storage.nextcloud.oauth.url: "http://nextcloud/" com.openexchange.file.storage.nextcloud.oauth.url: "http://nextcloud/"
com.openexchange.file.storage.nextcloud.oauth.webdav.username.strategy: "user" com.openexchange.file.storage.nextcloud.oauth.webdav.username.strategy: "user"

View File

@@ -2,12 +2,14 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "openproject" - name: "openproject-repo"
url: "https://charts.openproject.org" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://charts.openproject.org" }}
releases: releases:
- name: "openproject" - name: "openproject"
chart: "openproject/openproject" chart: "openproject-repo/openproject"
version: "1.8.0" version: "1.8.0"
values: values:
- "values.yaml" - "values.yaml"

View File

@@ -2,12 +2,14 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "ox-connector" - name: "ox-connector-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/128/packages/helm/stable" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/128/packages/helm/stable" }}
releases: releases:
- name: "ox-connector" - name: "ox-connector"
chart: "ox-connector/ox-connector" chart: "ox-connector-repo/ox-connector"
version: "0.1.0-pre-jconde-listener-entrypoint-chaining" version: "0.1.0-pre-jconde-listener-entrypoint-chaining"
values: values:
- "values-oxconnector.yaml" - "values-oxconnector.yaml"

View File

@@ -2,70 +2,85 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "sovereign-workplace-certificates" - name: "sovereign-workplace-certificates-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/133/packages/helm/stable" url: >-
- name: "postgresql" {{ env "PRIVATE_CHART_REPOSITORY_URL" |
url: "https://gitlab.souvap-univention.de/api/v4/projects/83/packages/helm/stable" default "https://gitlab.souvap-univention.de/api/v4/projects/133/packages/helm/stable" }}
- name: "mariadb" - name: "postgresql-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/86/packages/helm/stable" url: >-
- name: "postfix" {{ env "PRIVATE_CHART_REPOSITORY_URL" |
url: "https://gitlab.souvap-univention.de/api/v4/projects/85/packages/helm/stable" default "https://gitlab.souvap-univention.de/api/v4/projects/83/packages/helm/stable" }}
- name: "istio-resources" - name: "mariadb-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/69/packages/helm/stable" url: >-
- name: "clamav" {{ env "PRIVATE_CHART_REPOSITORY_URL" |
url: "https://gitlab.souvap-univention.de/api/v4/projects/73/packages/helm/stable" default "https://gitlab.souvap-univention.de/api/v4/projects/86/packages/helm/stable" }}
- name: "bitnami" - name: "postfix-repo"
url: "https://charts.bitnami.com/bitnami" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/85/packages/helm/stable" }}
- name: "istio-resources-repo"
url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/69/packages/helm/stable" }}
- name: "clamav-repo"
url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/73/packages/helm/stable" }}
- name: "bitnami-repo"
oci: true
url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "registry-1.docker.io/bitnamicharts" }}
releases: releases:
- name: "sovereign-workplace-certificates" - name: "sovereign-workplace-certificates"
chart: "sovereign-workplace-certificates/sovereign-workplace-certificates" chart: "sovereign-workplace-certificates-repo/sovereign-workplace-certificates"
version: "1.2.1" version: "1.2.2"
values: values:
- "values-certificates.gotmpl" - "values-certificates.gotmpl"
condition: "certificates.enabled" condition: "certificates.enabled"
- name: "redis" - name: "redis"
chart: "bitnami/redis" chart: "bitnami-repo/redis"
version: "^17.9.3" version: "^17.9.3"
values: values:
- "values-redis.gotmpl" - "values-redis.gotmpl"
- "values-redis.yaml" - "values-redis.yaml"
condition: "redis.enabled" condition: "redis.enabled"
- name: "postgresql" - name: "postgresql"
chart: "postgresql/postgresql" chart: "postgresql-repo/postgresql"
version: "2.0.0" version: "2.0.0"
values: values:
- "values-postgresql.yaml" - "values-postgresql.yaml"
- "values-postgresql.gotmpl" - "values-postgresql.gotmpl"
condition: "postgresql.enabled" condition: "postgresql.enabled"
- name: "mariadb" - name: "mariadb"
chart: "mariadb/mariadb" chart: "mariadb-repo/mariadb"
version: "2.0.0" version: "2.0.0"
values: values:
- "values-mariadb.yaml" - "values-mariadb.yaml"
- "values-mariadb.gotmpl" - "values-mariadb.gotmpl"
condition: "mariadb.enabled" condition: "mariadb.enabled"
- name: "postfix" - name: "postfix"
chart: "postfix/postfix" chart: "postfix-repo/postfix"
version: "1.13.0" version: "1.13.0"
values: values:
- "values-postfix.yaml" - "values-postfix.yaml"
- "values-postfix.gotmpl" - "values-postfix.gotmpl"
condition: "postfix.enabled" condition: "postfix.enabled"
- name: "clamav" - name: "clamav"
chart: "clamav/sovereign-workplace-clamav" chart: "clamav-repo/sovereign-workplace-clamav"
version: "2.1.0" version: "2.1.0"
values: values:
- "values-clamav-distributed.gotmpl" - "values-clamav-distributed.gotmpl"
condition: "clamavDistributed.enabled" condition: "clamavDistributed.enabled"
- name: "clamav-simple" - name: "clamav-simple"
chart: "clamav/clamav-simple" chart: "clamav-repo/clamav-simple"
version: "2.1.0" version: "2.1.0"
values: values:
- "values-clamav-simple.gotmpl" - "values-clamav-simple.gotmpl"
condition: "clamavSimple.enabled" condition: "clamavSimple.enabled"
- name: "sovereign-workplace-gateway" - name: "sovereign-workplace-gateway"
chart: "istio-resources/istio-gateway" chart: "istio-resources-repo/istio-gateway"
version: "1.1.2" version: "1.1.2"
values: values:
- "values-istio-gateway.gotmpl" - "values-istio-gateway.gotmpl"

View File

@@ -2,12 +2,14 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "univention-corporate-container" - name: "univention-corporate-container-repo"
url: "https://gitlab.souvap-univention.de/api/v4/projects/132/packages/helm/stable" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://gitlab.souvap-univention.de/api/v4/projects/132/packages/helm/stable" }}
releases: releases:
- name: "univention-corporate-container" - name: "univention-corporate-container"
chart: "univention-corporate-container/univention-corporate-container" chart: "univention-corporate-container-repo/univention-corporate-container"
version: "1.0.10" version: "1.0.10"
values: values:
- "values.yaml" - "values.yaml"

View File

@@ -2,12 +2,14 @@
# SPDX-License-Identifier: Apache-2.0 # SPDX-License-Identifier: Apache-2.0
--- ---
repositories: repositories:
- name: "xwiki" - name: "xwiki-repo"
url: "https://xwiki-contrib.github.io/xwiki-helm" url: >-
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
default "https://xwiki-contrib.github.io/xwiki-helm" }}
releases: releases:
- name: "xwiki" - name: "xwiki"
chart: "xwiki/xwiki" chart: "xwiki-repo/xwiki"
version: "1.1.1" version: "1.1.1"
wait: true wait: true
timeout: 600 timeout: 600

View File

@@ -1,20 +0,0 @@
{{/*
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
SPDX-License-Identifier: Apache-2.0
*/}}
---
global:
imageRegistry: "{{ .Values.global.imageRegistry }}"
imagePullSecrets:
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
xwiki:
url: "https://{{ .Values.global.hosts.xwiki }}.{{ .Values.global.domain }}/"
superadmin:
username: "superadmin"
password: {{ .Values.secrets.xwiki.superadminpassword | quote }}
image:
repository: "{{ .Values.images.xwikiInit.repository }}"
tag: "{{ .Values.images.xwikiInit.tag }}"
...

View File

@@ -19,6 +19,10 @@ cluster:
domain: "cluster.local" domain: "cluster.local"
# Kubernetes cluster network CIDR. # Kubernetes cluster network CIDR.
cidr: "10.0.0.0/8" cidr: "10.0.0.0/8"
# Ingress-gateway IP - only relevant for "NodePort" cluster services.
# When ingress and egress gateway use different ips, which results that pods can't self-discover their incoming ip,
# you need to provide the public (load-balanced) ingress gateways ip address.
ingressGatewayIP: ""
container: container:
# Used container engine in kubernetes cluster. # Used container engine in kubernetes cluster.

View File

@@ -32,6 +32,12 @@ databases:
name: "CONFIGDB" name: "CONFIGDB"
username: "root" username: "root"
password: "" password: ""
synapse:
host: "postgresql"
name: "matrix"
username: "matrix_user"
password: ""
port: 5432
xwiki: xwiki:
name: "xwiki" name: "xwiki"
host: "mariadb" host: "mariadb"

View File

@@ -12,16 +12,14 @@ global:
hosts: hosts:
collabora: "collabora" collabora: "collabora"
dimension: "integration" dimension: "integration"
element: "ucc" element: "chat"
etherpad: "etherpad" etherpad: "etherpad"
intercomService: "ics" intercomService: "ics"
jitsi: "av" jitsi: "meet"
jitsiPlain: "jitsi"
keycloak: "id" keycloak: "id"
meetingWidgetsBot: "meeting-widgets-bot" meetingWidgetsBot: "meeting-widgets-bot"
meetingWidgets: "meeting-widgets" meetingWidgets: "meeting-widgets"
newWorkBoardWidget: "whiteboard-widget" newWorkBoardWidget: "whiteboard-widget"
moodle: "learn"
nextcloud: "fs" nextcloud: "fs"
openproject: "project" openproject: "project"
openxchange: "webmail" openxchange: "webmail"
@@ -38,21 +36,11 @@ global:
## Define docker registry address. ## Define docker registry address.
# #
imageRegistry: "external-registry.souvap-univention.de/sovereign-workplace" imageRegistry: {{ env "PRIVATE_IMAGE_REGISTRY_URL" | default "external-registry.souvap-univention.de/sovereign-workplace" }}
## Credentials to fetch images from private registry ## Credentials to fetch images from private registry
## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/ ## Ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
# #
imagePullSecrets: imagePullSecrets:
- "external-registry" - "external-registry"
## Define internal kubernetes domain, usually svc.cluster.local
## Workaround for calico with postfix
#
internalDomain: "svc.cluster.local"
## Define internal kubernetes network for postfix
## Attention: Mail from this network can be sent without authentication!
#
internalNetwork: "10.0.0.0/8"
... ...

View File

@@ -12,7 +12,10 @@ images:
tag: "23.05.2.2.1" tag: "23.05.2.2.1"
dovecot: dovecot:
repository: "dovecot/dovecot" repository: "dovecot/dovecot"
tag: "2.3.20" digest: "sha256:96d414aa3f6978669b417f6468c16313a54ee6143a4846870e9f0eda280806e7"
element:
repository: "vectorim/element-web"
tag: "v1.11.35"
freshclam: freshclam:
repository: "clamav/clamav" repository: "clamav/clamav"
tag: "1.1.0_base" tag: "1.1.0_base"
@@ -48,11 +51,11 @@ images:
repository: "souvap/tooling/images/ansible" repository: "souvap/tooling/images/ansible"
tag: "4.10.0" tag: "4.10.0"
keycloakExtensionHandler: keycloakExtensionHandler:
repository: "souvap/tooling/images/keycloak-extensions/keycloak-handler@sha256" repository: "souvap/tooling/images/keycloak-extensions/keycloak-handler"
tag: "cdaaab8fb1b658ee2ca45557e76570153bb306c43061db5b5ee0f418c40e2200" digest: "cdaaab8fb1b658ee2ca45557e76570153bb306c43061db5b5ee0f418c40e2200"
keycloakExtensionProxy: keycloakExtensionProxy:
repository: "souvap/tooling/images/keycloak-extensions/keycloak-proxy@sha256" repository: "souvap/tooling/images/keycloak-extensions/keycloak-proxy"
tag: "15ad665620368178d98721c0bd91744dd9c965c2e470abc3838e353fff530093" digest: "15ad665620368178d98721c0bd91744dd9c965c2e470abc3838e353fff530093"
mariadb: mariadb:
repository: "mariadb" repository: "mariadb"
tag: "10" tag: "10"
@@ -68,6 +71,9 @@ images:
openproject: openproject:
repository: "souvap/tooling/images/openproject/souvap" repository: "souvap/tooling/images/openproject/souvap"
tag: "dev" tag: "dev"
openxchangeBootstrap:
repository: "alpine/k8s"
digest: "sha256:199a4457602b4e260d9781358cd2e342f63c177f4bcfa8053493be01e57beddf"
openxchangeCoreGuidedtours: openxchangeCoreGuidedtours:
repository: "appsuite-public-sector/core-guidedtours" repository: "appsuite-public-sector/core-guidedtours"
tag: "8.5.0" tag: "8.5.0"
@@ -107,13 +113,19 @@ images:
redis: redis:
repository: "bitnami/redis" repository: "bitnami/redis"
tag: "7.0.12-debian-11-r0" tag: "7.0.12-debian-11-r0"
synapse:
repository: "matrixdotorg/synapse"
tag: "v1.87.0"
synapseWeb:
repository: "library/haproxy"
tag: "2.4"
univentionCorporateServer: univentionCorporateServer:
repository: "souvap/tooling/images/univention-corporate-server-swp/ucs" repository: "souvap/tooling/images/univention-corporate-server-swp/ucs@sha256"
tag: "20230806T234258" tag: "286503f13726399284b49d4521f45fdbed81216875d78e76dcae20e0d8301f65"
wellKnown:
repository: "library/nginx"
tag: "1.23"
xwiki: xwiki:
repository: "xwikisas/swp/xwiki" repository: "xwikisas/swp/xwiki"
tag: "0.8-mariadb-tomcat" tag: "0.8-mariadb-tomcat"
xwikiInit:
repository: "curlimages/curl"
tag: "8.1.2"
... ...

View File

@@ -19,6 +19,7 @@ persistence:
postgresql: "1Gi" postgresql: "1Gi"
prosody: "1Gi" prosody: "1Gi"
redis: "1Gi" redis: "1Gi"
synapse: "1Gi"
univentionCorporateServer: "1Gi" univentionCorporateServer: "1Gi"
xwiki: "1Gi" xwiki: "1Gi"
... ...

View File

@@ -10,6 +10,7 @@ replicas:
clamd: 1 clamd: 1
collabora: 1 collabora: 1
dovecot: 1 dovecot: 1
element: 2
{{/* clamav-distributed */}} {{/* clamav-distributed */}}
freshclam: 1 freshclam: 1
{{/* clamav-distributed */}} {{/* clamav-distributed */}}
@@ -25,5 +26,8 @@ replicas:
nextcloud: 1 nextcloud: 1
openproject: 1 openproject: 1
postfix: 1 postfix: 1
synapse: 1
synapseWeb: 2
wellKnown: 2
xwiki: 1 xwiki: 1
... ...

View File

@@ -14,17 +14,24 @@ resources:
dovecot: dovecot:
limits: limits:
cpu: 0.5 cpu: 0.5
memory: "0.25Gi" memory: "250Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
element:
limits:
cpu: 1
memory: "250Mi"
requests:
cpu: 0.1
memory: "50Mi"
freshclam: freshclam:
limits: limits:
cpu: 1 cpu: 1
memory: "1Gi" memory: "1Gi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
icap: icap:
limits: limits:
cpu: 2 cpu: 2
@@ -35,24 +42,24 @@ resources:
jibri: jibri:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "125Mi"
jicofo: jicofo:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
jitsi: jitsi:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
jitsiKeycloakAdapter: jitsiKeycloakAdapter:
limits: limits:
cpu: "100m" cpu: "100m"
@@ -63,45 +70,45 @@ resources:
jvb: jvb:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
keycloak: keycloak:
limits: limits:
cpu: 2 cpu: 2
memory: "2Gi" memory: "2Gi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.75Gi" memory: "750Mi"
keycloakExtension: keycloakExtension:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
keycloakBootstrap: keycloakBootstrap:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.25Gi" memory: "250Mi"
keycloakProxy: keycloakProxy:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
mariadb: mariadb:
limits: limits:
cpu: 2 cpu: 2
memory: "2Gi" memory: "2Gi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.5Gi" memory: "500Mi"
milter: milter:
limits: limits:
cpu: 4 cpu: 4
@@ -115,49 +122,63 @@ resources:
memory: "1Gi" memory: "1Gi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.5Gi" memory: "500Mi"
openproject: openproject:
limits: limits:
cpu: 2 cpu: 2
memory: "1Gi" memory: "1Gi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.25Gi" memory: "250Mi"
oxConnector: oxConnector:
limits: limits:
cpu: 2 cpu: 2
memory: "2Gi" memory: "2Gi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.25Gi" memory: "250Mi"
postfix: postfix:
limits: limits:
cpu: 0.5 cpu: 0.5
memory: "0.25Gi" memory: "250Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
postgresql: postgresql:
limits: limits:
cpu: 2 cpu: 2
memory: "1Gi" memory: "1Gi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.25Gi" memory: "250Mi"
prosody: prosody:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
redis: redis:
limits: limits:
cpu: 1 cpu: 1
memory: "0.5Gi" memory: "500Mi"
requests: requests:
cpu: 0.1 cpu: 0.1
memory: "0.1Gi" memory: "100Mi"
synapse:
limits:
cpu: 4
memory: "4Gi"
requests:
cpu: 1
memory: "2Gi"
synapseWeb:
limits:
cpu: 1
memory: "250Mi"
requests:
cpu: 0.1
memory: "50Mi"
univentionCorporateServer: univentionCorporateServer:
limits: limits:
cpu: 2 cpu: 2
@@ -165,6 +186,13 @@ resources:
requests: requests:
cpu: 0.5 cpu: 0.5
memory: "1Gi" memory: "1Gi"
wellKnown:
limits:
cpu: 1
memory: "250Mi"
requests:
cpu: 0.1
memory: "50Mi"
xwiki: xwiki:
limits: limits:
cpu: 2 cpu: 2

View File

@@ -40,7 +40,7 @@ secrets:
clientSecret: clientSecret:
intercom: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "intercom_client_secret" | sha1sum) }} intercom: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "intercom_client_secret" | sha1sum) }}
matrix: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "matrix_client_secret" | sha1sum) }} matrix: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "matrix_client_secret" | sha1sum) }}
jitsiPlain: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "jitsi_plain_client_secret" | sha1sum) }} jitsi: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "jitsi_plain_client_secret" | sha1sum) }}
ncoidc: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "ncoidc_client_secret" | sha1sum) }} ncoidc: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "ncoidc_client_secret" | sha1sum) }}
openproject: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "openproject_client_secret" | sha1sum) }} openproject: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "openproject_client_secret" | sha1sum) }}
xwiki: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "xwiki_client_secret" | sha1sum) }} xwiki: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "keycloak" "xwiki_client_secret" | sha1sum) }}
@@ -54,17 +54,6 @@ secrets:
adminPassword: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "collabora" "collabora_admin_user" | sha1sum) }} adminPassword: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "collabora" "collabora_admin_user" | sha1sum) }}
jitsi: jitsi:
synapseAsToken: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "as_token" | sha1sum) }} synapseAsToken: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "as_token" | sha1sum) }}
synapseHsToken: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "hs_token" | sha1sum) }}
jicofoAuth: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "jicofo_auth" | sha1sum) }}
componentAuth: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "component_auth" | sha1sum) }}
jvbAuth: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "jvb_auth" | sha1sum) }}
jigasiAuth: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "jigasi_auth" | sha1sum) }}
jibriUserAuth: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "jibri_user_auth" | sha1sum) }}
jibriRecorderAuth: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "jibri_recorder_auth" | sha1sum) }}
rageshakeListingPass: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "rageshakeListingPass" | sha1sum) }}
conferencemapperSecret: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "conferencemapperSecret" | sha1sum) }}
jitsiFeedbackBackend: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jitsi" "jitsiFeedbackBackend" | sha1sum) }}
jitsiPlain:
jwtAppSecret: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jistiStandalone" "jwtAppSecret" | sha1sum) }} jwtAppSecret: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jistiStandalone" "jwtAppSecret" | sha1sum) }}
jibriRecorderPassword: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jistiStandalone" "jibriRecorderPassword" | sha1sum) }} jibriRecorderPassword: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jistiStandalone" "jibriRecorderPassword" | sha1sum) }}
jibriXmppPassword: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jistiStandalone" "jibriXmppPassword" | sha1sum) }} jibriXmppPassword: {{ (derivePassword 1 "long" (env "MASTER_PASSWORD" | default "sovereign-workplace") "jistiStandalone" "jibriXmppPassword" | sha1sum) }}

View File

@@ -15,6 +15,8 @@ collabora:
enabled: true enabled: true
dovecot: dovecot:
enabled: true enabled: true
element:
enabled: true
intercom: intercom:
enabled: true enabled: true
jitsi: jitsi: