mirror of
https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk.git
synced 2025-12-06 15:31:38 +01:00
Compare commits
304 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
3ca54159f7 | ||
|
|
bf5dcda3b5 | ||
|
|
08ca525d3e | ||
|
|
dc7ce0bc4b | ||
|
|
729a1ea849 | ||
|
|
3b5493d78d | ||
|
|
6711791009 | ||
|
|
c41643ee3e | ||
|
|
2628a0e13e | ||
|
|
c8bc8b3172 | ||
|
|
24812b667c | ||
|
|
bec9a2d46b | ||
|
|
05cc82d7c5 | ||
|
|
82be996d97 | ||
|
|
d367739248 | ||
|
|
ef870ae385 | ||
|
|
466e741494 | ||
|
|
00fafb6a1b | ||
|
|
6d3e484855 | ||
|
|
845a0a3189 | ||
|
|
519db51be2 | ||
|
|
7ef3a10577 | ||
|
|
1c35ca67ce | ||
|
|
e0c6c14dca | ||
|
|
3cf348c7ae | ||
|
|
b3d45c45e1 | ||
|
|
c246edd8f9 | ||
|
|
c19bca2be0 | ||
|
|
a5f263ce48 | ||
|
|
cbe8fb2d65 | ||
|
|
8b6a4b2e88 | ||
|
|
a61d00482f | ||
|
|
0c7a77c4b6 | ||
|
|
211bee94bb | ||
|
|
b3ac0ae6d9 | ||
|
|
4c52a5aaa8 | ||
|
|
7a9ecf7b85 | ||
|
|
86b48188e1 | ||
|
|
7bbab22939 | ||
|
|
1343d6c93e | ||
|
|
735fec3b4c | ||
|
|
21b9d1d024 | ||
|
|
6dc92df2eb | ||
|
|
cac6abe251 | ||
|
|
6c1664fc0d | ||
|
|
36aa3ed7c9 | ||
|
|
23c46e7fe5 | ||
|
|
efbd814968 | ||
|
|
812eb5a439 | ||
|
|
f86a74ba10 | ||
|
|
71d11cfcd0 | ||
|
|
6aa3d386af | ||
|
|
7ac2e0f9de | ||
|
|
6f556bce70 | ||
|
|
a447c137fe | ||
|
|
47a385683c | ||
|
|
db48140f3a | ||
|
|
d7cae3b1fa | ||
|
|
7ae65a36a2 | ||
|
|
01466947cc | ||
|
|
061e588da9 | ||
|
|
b460206bd4 | ||
|
|
ea14f953a4 | ||
|
|
feed270fd7 | ||
|
|
225398b5a6 | ||
|
|
cd0e94f96f | ||
|
|
767c382091 | ||
|
|
55f6ba21dc | ||
|
|
b3c4ec5165 | ||
|
|
e231e5749d | ||
|
|
f98c48616b | ||
|
|
c460467d74 | ||
|
|
3f7faf88fb | ||
|
|
1971dfbded | ||
|
|
b50e5c982b | ||
|
|
97034a556f | ||
|
|
8b87432317 | ||
|
|
baa5827de3 | ||
|
|
1d03a6e11f | ||
|
|
08811decd9 | ||
|
|
69ea840517 | ||
|
|
ea5bd0a6b7 | ||
|
|
0d8e92fc5a | ||
|
|
d7119a656b | ||
|
|
89ae1d94ea | ||
|
|
dfc7fed325 | ||
|
|
65ce9a171b | ||
|
|
5e50ed119f | ||
|
|
d0a07997c1 | ||
|
|
985df5906f | ||
|
|
385d81b9a9 | ||
|
|
0ad043406b | ||
|
|
4a79728f01 | ||
|
|
7c56c7244f | ||
|
|
e0fce6631b | ||
|
|
899a8c5af9 | ||
|
|
6cee2c878b | ||
|
|
4359b21f1c | ||
|
|
d8b2bd3af0 | ||
|
|
8fafd906a3 | ||
|
|
fece4ace87 | ||
|
|
ab6014f8c6 | ||
|
|
fecd13612b | ||
|
|
38336d0240 | ||
|
|
9f9e4e9521 | ||
|
|
b47de62f98 | ||
|
|
9e54299917 | ||
|
|
d249d0e3ce | ||
|
|
fbe7de3c56 | ||
|
|
034e98c850 | ||
|
|
7feaadf7f8 | ||
|
|
a7fef3afff | ||
|
|
5d01f8ca46 | ||
|
|
7093022ec4 | ||
|
|
2313f75dbe | ||
|
|
af9caea726 | ||
|
|
b39986907c | ||
|
|
a02d7c6085 | ||
|
|
a046deaf17 | ||
|
|
c76e960446 | ||
|
|
535823e0a8 | ||
|
|
9966bf640e | ||
|
|
8e376bb4a5 | ||
|
|
7c0e4aa9a6 | ||
|
|
e609b75cc7 | ||
|
|
20d26a069b | ||
|
|
59d58e320e | ||
|
|
49b71aafb4 | ||
|
|
cbe514176a | ||
|
|
0898d96571 | ||
|
|
7f7c364071 | ||
|
|
fd9e04d992 | ||
|
|
86657b139a | ||
|
|
cdffbe1298 | ||
|
|
82a037ec7c | ||
|
|
1a4eced998 | ||
|
|
06dcdd78af | ||
|
|
f564efd97f | ||
|
|
16f2ac464e | ||
|
|
30405d182d | ||
|
|
785989e91d | ||
|
|
27b6796639 | ||
|
|
7756d35fa1 | ||
|
|
5afd2339c2 | ||
|
|
b7f220a6b6 | ||
|
|
fb7dba787c | ||
|
|
72e3afdffd | ||
|
|
85b8fcaab5 | ||
|
|
c3129f1443 | ||
|
|
000be8b032 | ||
|
|
da1bf3581c | ||
|
|
4d0011d957 | ||
|
|
74f9ec28e4 | ||
|
|
b1d4b2d8ea | ||
|
|
711d29e374 | ||
|
|
0ba7be2a5f | ||
|
|
d4c751d29f | ||
|
|
70744d04c6 | ||
|
|
e4e6d2d60a | ||
|
|
e42feb4c26 | ||
|
|
f12c2ed0c2 | ||
|
|
7dbcbfe723 | ||
|
|
1d8a0ccf1a | ||
|
|
e33acd33e7 | ||
|
|
74e206694e | ||
|
|
6fd655a0b1 | ||
|
|
d4c39025b6 | ||
|
|
d86f516747 | ||
|
|
4c5731e6bb | ||
|
|
6a390112da | ||
|
|
65d2642d34 | ||
|
|
55f73924df | ||
|
|
11cc708f6e | ||
|
|
b6b4972a5d | ||
|
|
2e3f5f6e53 | ||
|
|
3da2aaaed9 | ||
|
|
424317ed58 | ||
|
|
b335bc4c3b | ||
|
|
5343840bed | ||
|
|
2d5d3708f7 | ||
|
|
41dfdc0c8f | ||
|
|
ca5d5f8280 | ||
|
|
095059c7e5 | ||
|
|
1dd6582ec7 | ||
|
|
74b3d41381 | ||
|
|
a41b9a699c | ||
|
|
0b4cd739fc | ||
|
|
4372f063e0 | ||
|
|
15ad8ca7ab | ||
|
|
1884a90e6f | ||
|
|
0997f2e4a7 | ||
|
|
0f01b94aa1 | ||
|
|
892920b048 | ||
|
|
5c3568871b | ||
|
|
f22619bd8e | ||
|
|
275798c1d6 | ||
|
|
5ad25acafd | ||
|
|
437633cda6 | ||
|
|
62b767ef38 | ||
|
|
02be7c15bb | ||
|
|
9acce08139 | ||
|
|
3f8bffbcf3 | ||
|
|
98ec02f230 | ||
|
|
b340373133 | ||
|
|
6456f68b7b | ||
|
|
a37faf3b57 | ||
|
|
fbbf3f253b | ||
|
|
2703615dff | ||
|
|
85ad5ecd6d | ||
|
|
ae3d0daa11 | ||
|
|
0a17976aca | ||
|
|
ce7e5f670a | ||
|
|
917f9fb452 | ||
|
|
f46c8a9a5f | ||
|
|
c2b44da34e | ||
|
|
41b9afb364 | ||
|
|
63bdcf594b | ||
|
|
a99c088361 | ||
|
|
8d09aa02f9 | ||
|
|
1514678db0 | ||
|
|
b7254cf5dc | ||
|
|
7ab1cb5c7e | ||
|
|
0ba71f2749 | ||
|
|
77e362f6bc | ||
|
|
09079a1303 | ||
|
|
15db5dcbba | ||
|
|
d3c439038a | ||
|
|
9409ad829a | ||
|
|
a4bab4068d | ||
|
|
90019e3ef6 | ||
|
|
4835a2beec | ||
|
|
12c931fcff | ||
|
|
2f8a298925 | ||
|
|
ec3f1d96ac | ||
|
|
16c08f82c9 | ||
|
|
edb25bd765 | ||
|
|
c840608112 | ||
|
|
320da3bec3 | ||
|
|
c61b1b8281 | ||
|
|
96097e4704 | ||
|
|
5e1a7b19e2 | ||
|
|
13bcd785e8 | ||
|
|
c54bab165b | ||
|
|
836f491766 | ||
|
|
fe0e0cdce4 | ||
|
|
a74d662404 | ||
|
|
471a2fa262 | ||
|
|
5f79763e2b | ||
|
|
e120f5fb9a | ||
|
|
a799db03c4 | ||
|
|
d725b93798 | ||
|
|
e1070eeb06 | ||
|
|
c7fc187f14 | ||
|
|
89ac783dc3 | ||
|
|
882f1fbc93 | ||
|
|
b5583caec1 | ||
|
|
6d23534ee0 | ||
|
|
d2e7ac9348 | ||
|
|
2125037a3c | ||
|
|
ed7e5e428e | ||
|
|
d28a425673 | ||
|
|
a6fa846afc | ||
|
|
4380e78981 | ||
|
|
be82243966 | ||
|
|
f9886448b6 | ||
|
|
0eceb85e7d | ||
|
|
1ef4a861ac | ||
|
|
3b90533063 | ||
|
|
1349181d80 | ||
|
|
e1b84898c5 | ||
|
|
63a1e2568e | ||
|
|
ca4b1da84f | ||
|
|
ff462ab0dc | ||
|
|
4f2a8aeee4 | ||
|
|
c5ab1b81fe | ||
|
|
9d7866480c | ||
|
|
9a6d2409a6 | ||
|
|
f758293241 | ||
|
|
6321ff50a0 | ||
|
|
5fbf86b6bc | ||
|
|
6e68f7f28c | ||
|
|
41d40c9b73 | ||
|
|
cef11acbae | ||
|
|
6e5ef639c2 | ||
|
|
65b0ca5480 | ||
|
|
39565c7cfd | ||
|
|
0d374c1fea | ||
|
|
387bd8715c | ||
|
|
f219c42afa | ||
|
|
4d3bc2799c | ||
|
|
0f59736c5d | ||
|
|
7e9d39cc7f | ||
|
|
6ab4fa078b | ||
|
|
05361276c0 | ||
|
|
cda237a655 | ||
|
|
ea77d1712e | ||
|
|
2a61b5f2a6 | ||
|
|
f4dbdfb321 | ||
|
|
3d4d45f711 | ||
|
|
86fdb34735 | ||
|
|
7c9c6f9000 | ||
|
|
7f7eae8f99 | ||
|
|
c9953299cc | ||
|
|
a14c42f6ed |
5
.gitignore
vendored
5
.gitignore
vendored
@@ -2,7 +2,12 @@
|
|||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
.vscode
|
.vscode
|
||||||
.idea
|
.idea
|
||||||
|
.yamllint
|
||||||
|
|
||||||
# Ignore changes to sample environments
|
# Ignore changes to sample environments
|
||||||
helmfile/environments/dev/values.yaml
|
helmfile/environments/dev/values.yaml
|
||||||
|
helmfile/environments/dev/values.gotmpl
|
||||||
|
helmfile/environments/test/values.yaml
|
||||||
|
helmfile/environments/test/values.gotmpl
|
||||||
helmfile/environments/prod/values.yaml
|
helmfile/environments/prod/values.yaml
|
||||||
|
helmfile/environments/prod/values.gotmpl
|
||||||
|
|||||||
328
.gitlab-ci.yml
328
.gitlab-ci.yml
@@ -2,16 +2,20 @@
|
|||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
include:
|
include:
|
||||||
- project: "souvap/tooling/gitlab-config"
|
- project: "${PROJECT_PATH_GITLAB_CONFIG_TOOLING}"
|
||||||
ref: "main"
|
ref: "main"
|
||||||
file:
|
file:
|
||||||
|
- "ci/common/automr.yml"
|
||||||
- "ci/common/lint.yml"
|
- "ci/common/lint.yml"
|
||||||
- "ci/release-automation/semantic-release.yml"
|
- "ci/release-automation/semantic-release.yml"
|
||||||
- project: "souvap/devops/sovereign-workplace-env"
|
- project: "${PROJECT_PATH_CUSTOM_ENVIRONMENT_CONFIG}"
|
||||||
file: "gitlab/environments.yaml"
|
file: "gitlab/environments.yaml"
|
||||||
|
rules:
|
||||||
|
- if: "$INCLUDE_ENVIRONMENTS_ENABLED != 'false'"
|
||||||
|
|
||||||
stages:
|
stages:
|
||||||
- ".pre"
|
- ".pre"
|
||||||
|
- "automr"
|
||||||
- "lint"
|
- "lint"
|
||||||
- "env-cleanup"
|
- "env-cleanup"
|
||||||
- "env"
|
- "env"
|
||||||
@@ -20,25 +24,17 @@ stages:
|
|||||||
- "component-deploy-stage-2"
|
- "component-deploy-stage-2"
|
||||||
- "tests"
|
- "tests"
|
||||||
- "env-stop"
|
- "env-stop"
|
||||||
- "post"
|
- "generate-release-assets"
|
||||||
|
- ".post"
|
||||||
|
|
||||||
variables:
|
variables:
|
||||||
NAMESPACE:
|
NAMESPACE:
|
||||||
description: "The name of namespaces to deploy to."
|
description: "The name of namespaces to deploy to."
|
||||||
value: ""
|
value: ""
|
||||||
CLUSTER:
|
CLUSTER:
|
||||||
description: "Define which cluster to use"
|
description: "Define which cluster to use. Cluster must be defined in gitlab/environments.yaml of
|
||||||
value: "develop"
|
sovereign-workplace-env included above."
|
||||||
options:
|
value: "dev"
|
||||||
- "dev"
|
|
||||||
- "qa"
|
|
||||||
- "ref"
|
|
||||||
- "develop"
|
|
||||||
- "hubble"
|
|
||||||
- "prototype"
|
|
||||||
BASE_DOMAIN:
|
|
||||||
description: "Define the Cluster Base Domain."
|
|
||||||
value: "souvap.cloud"
|
|
||||||
MASTER_PASSWORD_WEB_VAR:
|
MASTER_PASSWORD_WEB_VAR:
|
||||||
description: "Optional: Provide a passphrase to be used for password generation."
|
description: "Optional: Provide a passphrase to be used for password generation."
|
||||||
value: ""
|
value: ""
|
||||||
@@ -61,10 +57,13 @@ variables:
|
|||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
DEPLOY_UCS:
|
DEPLOY_UCS:
|
||||||
description: "Enable Univention Corporate Server deployment."
|
description: >-
|
||||||
|
Enable Univention Corporate Server deployment.
|
||||||
|
"ums-eval" does deploy the Univention Management Stack instead of the UCS container.
|
||||||
value: "no"
|
value: "no"
|
||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
|
- "ums-eval"
|
||||||
- "no"
|
- "no"
|
||||||
DEPLOY_PROVISIONING:
|
DEPLOY_PROVISIONING:
|
||||||
description: "Enable Provisioning Components."
|
description: "Enable Provisioning Components."
|
||||||
@@ -78,6 +77,12 @@ variables:
|
|||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
|
DEPLOY_CRYPTPAD:
|
||||||
|
description: "Enable CryptPad deployment."
|
||||||
|
value: "no"
|
||||||
|
options:
|
||||||
|
- "yes"
|
||||||
|
- "no"
|
||||||
DEPLOY_ELEMENT:
|
DEPLOY_ELEMENT:
|
||||||
description: "Enable Element deployment."
|
description: "Enable Element deployment."
|
||||||
value: "no"
|
value: "no"
|
||||||
@@ -132,34 +137,24 @@ variables:
|
|||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
TESTS_PROJECT_URL:
|
TESTS_BRANCH:
|
||||||
description: "URL of the E2E-test Gitlab project API with project ID."
|
description: "Branch of E2E-tests on which the test pipeline is triggered"
|
||||||
# please use the following set of variables with normalized names:
|
value: "main"
|
||||||
DOMAIN: "${NAMESPACE}.${CLUSTER}.${BASE_DOMAIN}"
|
RUN_UMS_TESTS:
|
||||||
ISTIO_DOMAIN: "${NAMESPACE}.istio.${CLUSTER}.${BASE_DOMAIN}"
|
description: "Run E2E test suite of SouvAP Dev team"
|
||||||
|
value: "no"
|
||||||
|
options:
|
||||||
|
- "yes"
|
||||||
|
- "no"
|
||||||
|
UMS_TESTS_BRANCH:
|
||||||
|
description: "Branch of E2E test suite of SouvAP Dev team"
|
||||||
|
value: "main"
|
||||||
|
|
||||||
.deploy-common:
|
.deploy-common:
|
||||||
cache: {}
|
cache: {}
|
||||||
dependencies: []
|
dependencies: []
|
||||||
extends: ".environments"
|
extends: ".environments"
|
||||||
image: "registry.souvap-univention.de/souvap/tooling/images/helm:latest"
|
image: "registry.souvap-univention.de/souvap/tooling/images/helm:latest"
|
||||||
secrets:
|
|
||||||
SMTP_PASSWORD:
|
|
||||||
vault:
|
|
||||||
engine:
|
|
||||||
name: "kv-v2"
|
|
||||||
path: "swp"
|
|
||||||
path: "accounts/brained/mail/relay@souvap-univention.de"
|
|
||||||
field: "password"
|
|
||||||
file: false
|
|
||||||
TURN_CREDENTIALS:
|
|
||||||
vault:
|
|
||||||
engine:
|
|
||||||
name: "kv-v2"
|
|
||||||
path: "swp"
|
|
||||||
path: "accounts/souvap-univention.de/develop/turn/secret"
|
|
||||||
field: "credentials"
|
|
||||||
file: false
|
|
||||||
script:
|
script:
|
||||||
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${COMPONENT}"
|
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${COMPONENT}"
|
||||||
# MASTER_PASSWORD_WEB_VAR as precedence for MASTER_PASSWORD
|
# MASTER_PASSWORD_WEB_VAR as precedence for MASTER_PASSWORD
|
||||||
@@ -190,14 +185,21 @@ env-cleanup:
|
|||||||
$ENV_STOP_BEFORE != "no"
|
$ENV_STOP_BEFORE != "no"
|
||||||
when: "always"
|
when: "always"
|
||||||
script:
|
script:
|
||||||
- "helmfile destroy --namespace ${NAMESPACE}"
|
- |
|
||||||
- "kubectl delete pvc --all --namespace ${NAMESPACE}"
|
if [ "${OPENDESK_SLEDGEHAMMER_DESTROY_ENABLED}" = "yes" ]; then
|
||||||
|
for OPENDESK_RELEASE in $(helm ls -n ${NAMESPACE} -aq); do
|
||||||
|
helm uninstall -n ${NAMESPACE} ${OPENDESK_RELEASE};
|
||||||
|
done
|
||||||
|
kubectl delete pvc --all --namespace ${NAMESPACE};
|
||||||
|
kubectl delete jobs --all --namespace ${NAMESPACE};
|
||||||
|
else
|
||||||
|
helmfile destroy --namespace ${NAMESPACE};
|
||||||
|
fi
|
||||||
stage: "env-cleanup"
|
stage: "env-cleanup"
|
||||||
|
|
||||||
env-start:
|
env-start:
|
||||||
environment:
|
environment:
|
||||||
name: "${NAMESPACE}"
|
name: "${NAMESPACE}"
|
||||||
url: "https://portal.${DOMAIN}"
|
|
||||||
on_stop: "env-stop"
|
on_stop: "env-stop"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
image: "${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
image: "${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
||||||
@@ -238,7 +240,7 @@ ucs-deploy:
|
|||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_UCS != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_UCS == "yes")
|
||||||
when: "always"
|
when: "always"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "univention-corporate-container"
|
COMPONENT: "univention-corporate-container"
|
||||||
@@ -255,6 +257,18 @@ provisioning-deploy:
|
|||||||
variables:
|
variables:
|
||||||
COMPONENT: "provisioning"
|
COMPONENT: "provisioning"
|
||||||
|
|
||||||
|
ums-deploy:
|
||||||
|
stage: "component-deploy-stage-1"
|
||||||
|
extends: ".deploy-common"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
|
$NAMESPACE =~ /.+/ &&
|
||||||
|
$DEPLOY_UCS == "ums-eval"
|
||||||
|
when: "always"
|
||||||
|
variables:
|
||||||
|
COMPONENT: "univention-management-stack"
|
||||||
|
|
||||||
keycloak-deploy:
|
keycloak-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -283,6 +297,7 @@ keycloak-bootstrap-deploy:
|
|||||||
ox-deploy:
|
ox-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
|
timeout: "30m"
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
@@ -328,6 +343,18 @@ collabora-deploy:
|
|||||||
variables:
|
variables:
|
||||||
COMPONENT: "collabora"
|
COMPONENT: "collabora"
|
||||||
|
|
||||||
|
cryptpad-deploy:
|
||||||
|
stage: "component-deploy-stage-1"
|
||||||
|
extends: ".deploy-common"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
|
$NAMESPACE =~ /.+/ &&
|
||||||
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_NEXTCLOUD != "no" || $DEPLOY_CRYPTPAD != "no")
|
||||||
|
when: "always"
|
||||||
|
variables:
|
||||||
|
COMPONENT: "cryptpad"
|
||||||
|
|
||||||
nextcloud-deploy:
|
nextcloud-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -352,6 +379,18 @@ openproject-deploy:
|
|||||||
variables:
|
variables:
|
||||||
COMPONENT: "openproject"
|
COMPONENT: "openproject"
|
||||||
|
|
||||||
|
openproject-bootstrap-deploy:
|
||||||
|
stage: "component-deploy-stage-2"
|
||||||
|
extends: ".deploy-common"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
|
$NAMESPACE =~ /.+/ &&
|
||||||
|
($DEPLOY_ALL_COMPONENTS != "no" || ($DEPLOY_OPENPROJECT != "no" && $DEPLOY_NEXTCLOUD != "no"))
|
||||||
|
when: "always"
|
||||||
|
variables:
|
||||||
|
COMPONENT: "openproject-bootstrap"
|
||||||
|
|
||||||
jitsi-deploy:
|
jitsi-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -399,10 +438,6 @@ run-tests:
|
|||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
environment:
|
environment:
|
||||||
name: "${NAMESPACE}"
|
name: "${NAMESPACE}"
|
||||||
tags:
|
|
||||||
- "docker"
|
|
||||||
- "kubernetes"
|
|
||||||
- "${CLUSTER}"
|
|
||||||
stage: "tests"
|
stage: "tests"
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: >
|
||||||
@@ -410,70 +445,181 @@ run-tests:
|
|||||||
when: "always"
|
when: "always"
|
||||||
script:
|
script:
|
||||||
- |
|
- |
|
||||||
COMPONENTS="login or portal or profile or navigation"
|
|
||||||
if [ "${DEPLOY_ALL_COMPONENTS}" != "no" ]; then
|
|
||||||
COMPONENTS="${COMPONENTS} or collabora or ics or jitsi or keycloak or nextcloud or openproject or ox or ucs \
|
|
||||||
or xwiki"
|
|
||||||
else
|
|
||||||
[ "${DEPLOY_COLLABORA}" != "no" ] && COMPONENTS="${COMPONENTS} or collabora"
|
|
||||||
[ "${DEPLOY_ICS}" != "no" ] && COMPONENTS="${COMPONENTS} or ics"
|
|
||||||
[ "${DEPLOY_JITSI}" != "no" ] && COMPONENTS="${COMPONENTS} or jitsi"
|
|
||||||
[ "${DEPLOY_KEYCLOAK}" != "no" ] && COMPONENTS="${COMPONENTS} or keycloak"
|
|
||||||
[ "${DEPLOY_NEXTCLOUD}" != "no" ] && COMPONENTS="${COMPONENTS} or nextcloud"
|
|
||||||
[ "${DEPLOY_OPENPROJECT}" != "no" ] && COMPONENTS="${COMPONENTS} or openproject"
|
|
||||||
[ "${DEPLOY_OX}" != "no" ] && COMPONENTS="${COMPONENTS} or ox"
|
|
||||||
[ "${DEPLOY_UCS}" != "no" ] && COMPONENTS="${COMPONENTS} or ucs"
|
|
||||||
[ "${DEPLOY_XWIKI}" != "no" ] && COMPONENTS="${COMPONENTS} or xwiki"
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "Gathering passwords from UCS container ..."
|
|
||||||
UCS_CONTAINER_NAME=$( \
|
UCS_CONTAINER_NAME=$( \
|
||||||
kubectl -n ${NAMESPACE} get pods --no-headers \
|
kubectl -n ${NAMESPACE} get pods --no-headers --selector \
|
||||||
--selector 'app.kubernetes.io/instance=univention-corporate-container' \
|
'app.kubernetes.io/instance=univention-corporate-container' \
|
||||||
| awk '{print $1}' \
|
| grep Running \
|
||||||
|
| awk '{print $1}' \
|
||||||
)
|
)
|
||||||
echo "UCS_CONTAINER_NAME: ${UCS_CONTAINER_NAME}"
|
|
||||||
DEFAULT_USER_PASSWORD=$( \
|
DEFAULT_USER_PASSWORD=$( \
|
||||||
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
||||||
| grep DEFAULT_ACCOUNT_USER_PASSWORD \
|
| grep DEFAULT_ACCOUNT_USER_PASSWORD \
|
||||||
| awk '{print $2}' \
|
| awk '{print $2}' \
|
||||||
)
|
)
|
||||||
DEFAULT_ADMIN_PASSWORD=$( \
|
DEFAULT_ADMIN_PASSWORD=$(
|
||||||
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
||||||
| grep DEFAULT_ACCOUNT_ADMIN_PASSWORD \
|
| grep DEFAULT_ACCOUNT_ADMIN_PASSWORD \
|
||||||
| awk '{print $2}' \
|
| awk '{print $2}' \
|
||||||
)
|
)
|
||||||
|
|
||||||
echo "triggering test pipeline ..."
|
curl --request POST \
|
||||||
curl -X POST \
|
--header "Content-Type: application/json" \
|
||||||
-F "ref=main" \
|
--data "{ \
|
||||||
-F "token=${CI_JOB_TOKEN}" \
|
\"ref\": \"${TESTS_BRANCH}\", \
|
||||||
-F "variables[url]=https://portal.${DOMAIN}" \
|
\"token\": \"${CI_JOB_TOKEN}\", \
|
||||||
-F "variables[user_name]=${DEFAULT_USER_NAME}" \
|
\"variables\": { \
|
||||||
-F "variables[user_password]=${DEFAULT_USER_PASSWORD}" \
|
\"url\": \"https://portal.${DOMAIN}\", \
|
||||||
-F "variables[admin_name]=${DEFAULT_ADMIN_NAME}" \
|
\"user_name\": \"${DEFAULT_USER_NAME}\", \
|
||||||
-F "variables[admin_password]=${DEFAULT_ADMIN_PASSWORD}" \
|
\"user_password\": \"${DEFAULT_USER_PASSWORD}\", \
|
||||||
-F "variables[components]=\"${COMPONENTS}\"" \
|
\"admin_name\": \"${DEFAULT_ADMIN_NAME}\", \
|
||||||
https://${TESTS_PROJECT_URL}/trigger/pipeline
|
\"admin_password\": \"${DEFAULT_ADMIN_PASSWORD}\", \
|
||||||
|
\"DEPLOY_ALL_COMPONENTS\": \"${DEPLOY_ALL_COMPONENTS}\", \
|
||||||
|
\"DEPLOY_COLLABORA\": \"${DEPLOY_COLLABORA}\", \
|
||||||
|
\"DEPLOY_ELEMENT\": \"${DEPLOY_ELEMENT}\", \
|
||||||
|
\"DEPLOY_ICS\": \"${DEPLOY_ICS}\", \
|
||||||
|
\"DEPLOY_JITSI\": \"${DEPLOY_JITSI}\", \
|
||||||
|
\"DEPLOY_KEYCLOAK\": \"${DEPLOY_KEYCLOAK}\", \
|
||||||
|
\"DEPLOY_NEXTCLOUD\": \"${DEPLOY_NEXTCLOUD}\", \
|
||||||
|
\"DEPLOY_OPENPROJECT\": \"${DEPLOY_OPENPROJECT}\", \
|
||||||
|
\"DEPLOY_OX\": \"${DEPLOY_OX}\", \
|
||||||
|
\"DEPLOY_SERVICES\": \"${DEPLOY_SERVICES}\", \
|
||||||
|
\"DEPLOY_UCS\": \"${DEPLOY_UCS}\", \
|
||||||
|
\"DEPLOY_XWIKI\": \"${DEPLOY_XWIKI}\", \
|
||||||
|
\"DEPLOY_PROVISIONING\": \"${DEPLOY_PROVISIONING}\" \
|
||||||
|
} \
|
||||||
|
}" \
|
||||||
|
"https://${TESTS_PROJECT_URL}/trigger/pipeline"
|
||||||
|
|
||||||
|
run-souvap-dev-tests:
|
||||||
|
extends: ".deploy-common"
|
||||||
|
environment:
|
||||||
|
name: "${NAMESPACE}"
|
||||||
|
stage: "tests"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" && $NAMESPACE =~ /.+/ && $RUN_UMS_TESTS == "yes"
|
||||||
|
when: "always"
|
||||||
|
script:
|
||||||
|
- |
|
||||||
|
UCS_CONTAINER_NAME=$( \
|
||||||
|
kubectl -n ${NAMESPACE} get pods --no-headers --selector \
|
||||||
|
'app.kubernetes.io/instance=univention-corporate-container' \
|
||||||
|
| grep Running \
|
||||||
|
| awk '{print $1}' \
|
||||||
|
)
|
||||||
|
DEFAULT_USER_PASSWORD=$( \
|
||||||
|
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
||||||
|
| grep DEFAULT_ACCOUNT_USER_PASSWORD \
|
||||||
|
| awk '{print $2}' \
|
||||||
|
)
|
||||||
|
DEFAULT_ADMIN_PASSWORD=$(
|
||||||
|
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
||||||
|
| grep DEFAULT_ACCOUNT_ADMIN_PASSWORD \
|
||||||
|
| awk '{print $2}' \
|
||||||
|
)
|
||||||
|
|
||||||
|
curl --request POST \
|
||||||
|
--header "Content-Type: application/json" \
|
||||||
|
--data "{ \
|
||||||
|
\"ref\": \"${UMS_TESTS_BRANCH}\", \
|
||||||
|
\"token\": \"${CI_JOB_TOKEN}\", \
|
||||||
|
\"variables\": { \
|
||||||
|
\"portal_base_url\": \"https://portal.${DOMAIN}\", \
|
||||||
|
\"username\": \"${DEFAULT_USER_NAME}\", \
|
||||||
|
\"password\": \"${DEFAULT_USER_PASSWORD}\", \
|
||||||
|
\"admin_username\": \"${DEFAULT_ADMIN_NAME}\", \
|
||||||
|
\"admin_password\": \"${DEFAULT_ADMIN_PASSWORD}\", \
|
||||||
|
\"keycloak_base_url\": \"https://id.${DOMAIN}\" \
|
||||||
|
} \
|
||||||
|
}" \
|
||||||
|
"https://${UMS_TESTS_PROJECT_URL}/trigger/pipeline"
|
||||||
|
|
||||||
|
generate-release-assets:
|
||||||
|
stage: "generate-release-assets"
|
||||||
|
image: "registry.souvap-univention.de/souvap/tooling/images/ansible:4.10.0"
|
||||||
|
rules:
|
||||||
|
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
|
when: "always"
|
||||||
|
- when: "never"
|
||||||
|
script:
|
||||||
|
- |
|
||||||
|
git clone https://gitlab-ci-token:${CI_JOB_TOKEN}@${CI_SERVER_HOST}/${ASSET_GENERATOR_REPO_PATH}
|
||||||
|
cd opendesk-asset-generator
|
||||||
|
export OPENDESK_DEPLOYMENT_AUTOMATION_PATH=${CI_PROJECT_DIR}
|
||||||
|
./opendesk_asset_generator.py
|
||||||
|
mv ./build_artefacts ${CI_PROJECT_DIR}
|
||||||
|
cd ..
|
||||||
|
rm -rf opendesk-asset-generator
|
||||||
|
ls -l ./build_artefacts
|
||||||
|
artifacts:
|
||||||
|
paths:
|
||||||
|
- "./build_artefacts/chart-index.json"
|
||||||
|
- "./build_artefacts/image-index.json"
|
||||||
|
tags: []
|
||||||
|
variables:
|
||||||
|
ASSET_GENERATOR_REPO_PATH: "bmi/opendesk/tooling/opendesk-asset-generator"
|
||||||
|
|
||||||
|
|
||||||
|
# Declare .environments which is in environments repository and only loaded when INCLUDE_ENVIRONMENTS_ENABLED not false.
|
||||||
|
# 'cache' is used because job must contain at least one key, so cache is just a dummy key.
|
||||||
|
.environments:
|
||||||
|
cache: {}
|
||||||
|
|
||||||
# Overwrite shared settings
|
# Overwrite shared settings
|
||||||
.common-semantic-release:
|
.common-semantic-release:
|
||||||
image: "registry.souvap-univention.de/souvap/tooling/images/semantic-release-patched:latest"
|
image: "registry.souvap-univention.de/souvap/tooling/images/semantic-release-patched:latest"
|
||||||
except:
|
tags: []
|
||||||
- "tags"
|
|
||||||
- "triggers"
|
|
||||||
- "web"
|
|
||||||
|
|
||||||
common-yaml-linter:
|
common-yaml-linter:
|
||||||
except:
|
rules:
|
||||||
- "tags"
|
- if: "$JOB_COMMON_YAML_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
||||||
- "triggers"
|
when: "never"
|
||||||
- "web"
|
- when: "always"
|
||||||
|
|
||||||
reuse-linter:
|
reuse-linter:
|
||||||
allow_failure: false
|
allow_failure: false
|
||||||
except:
|
rules:
|
||||||
- "tags"
|
- if: "$JOB_REUSE_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
||||||
- "triggers"
|
when: "never"
|
||||||
- "web"
|
- when: "always"
|
||||||
|
|
||||||
|
generate-release-version:
|
||||||
|
rules:
|
||||||
|
- if: "$JOB_RELEASE_ENABLED != 'false'"
|
||||||
|
when: "always"
|
||||||
|
|
||||||
|
release:
|
||||||
|
dependencies:
|
||||||
|
- "generate-release-assets"
|
||||||
|
rules:
|
||||||
|
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
|
when: "always"
|
||||||
|
script:
|
||||||
|
- |
|
||||||
|
cat << 'EOF' > ${CI_PROJECT_DIR}/.releaserc
|
||||||
|
{
|
||||||
|
"branches": ["main"],
|
||||||
|
"plugins": [
|
||||||
|
["@semantic-release/gitlab",
|
||||||
|
{
|
||||||
|
"assets": [
|
||||||
|
{ "path": "./build_artefacts/chart-index.json",
|
||||||
|
"label": "Chart Index JSON" },
|
||||||
|
{ "path": "./build_artefacts/image-index.json",
|
||||||
|
"label": "Image Index JSON" },
|
||||||
|
]
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"@semantic-release/release-notes-generator",
|
||||||
|
"@semantic-release/changelog",
|
||||||
|
["@semantic-release/git", {
|
||||||
|
"assets": ["charts/**/Chart.yaml", "CHANGELOG.md", "charts/**/README.md"],
|
||||||
|
"message": "chore(release): ${nextRelease.version} [skip ci]\n\n${nextRelease.notes}"
|
||||||
|
}]
|
||||||
|
]
|
||||||
|
}
|
||||||
|
EOF
|
||||||
|
- "semantic-release"
|
||||||
|
needs:
|
||||||
|
- "generate-release-assets"
|
||||||
|
...
|
||||||
|
|||||||
8
.reuse/dep5
Normal file
8
.reuse/dep5
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
|
||||||
|
Upstream-Name: openDesk
|
||||||
|
Upstream-Contact: <git+bmi-souveraener-arbeitsplatz-cla-1339-29pr0g9pj4or9yi6wfly6pbhg-issue@opencode.de>
|
||||||
|
Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace
|
||||||
|
|
||||||
|
Files: helmfile/environments/default/theme/*
|
||||||
|
Copyright: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
License: Apache-2.0
|
||||||
738
CHANGELOG.md
738
CHANGELOG.md
@@ -1,3 +1,736 @@
|
|||||||
|
## [0.5.61](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.60...v0.5.61) (2023-12-05)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **services:** Fix port declaration for Postfix ([bf5dcda](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/bf5dcda3b59e1dc98cbee7e67f50a960d344b8e0))
|
||||||
|
|
||||||
|
## [0.5.60](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.59...v0.5.60) (2023-12-05)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Ensure release creation with artifacts ([dc7ce0b](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/dc7ce0bc4b9501b63274f68352e6d9e76b5424e8))
|
||||||
|
|
||||||
|
## [0.5.59](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.58...v0.5.59) (2023-12-05)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add configurable objectstore ([3b5493d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/3b5493d78dc027cd1f3206b26cf347dc6ce6e265))
|
||||||
|
|
||||||
|
## [0.5.58](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.57...v0.5.58) (2023-12-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Add websocket annotation ([c41643e](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c41643ee3e5610ef27a63a0355804159030a7452))
|
||||||
|
* **openproject:** Add seederJob intent ([05cc82d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/05cc82d7c5c5f93fb5de7df555a22e8e90279621))
|
||||||
|
* **openproject:** Bump to 2.6.2 ([c8bc8b3](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c8bc8b3172cfef3396379e3969dc087d67a228ee))
|
||||||
|
* **services:** Add NetworkPolicy section to docs/security.md ([24812b6](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/24812b667cded720a0ac09b8b3eb89df39b02afb))
|
||||||
|
* **services:** Add Otterize based security settings ([bec9a2d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/bec9a2d46b2b563b7001ed8c6625c10111d5f151))
|
||||||
|
* **univention-management-stack:** Add Otterize annotations for jobs ([2628a0e](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/2628a0e13e5957475ce81b12d4230400c9ffeafe))
|
||||||
|
|
||||||
|
## [0.5.57](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.56...v0.5.57) (2023-12-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Using correct private registry for postfix helm-chart ([d367739](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/d367739248ed43b3bad6a00b059b2c949dde4cb7))
|
||||||
|
|
||||||
|
## [0.5.56](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.55...v0.5.56) (2023-11-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Raise treshold for login rate limit to avoid too early barrier hitting normal users ([466e741](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/466e7414942837fdb1aecabfb08eae49f9dab272))
|
||||||
|
|
||||||
|
## [0.5.55](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.54...v0.5.55) (2023-11-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Update Helm chart to enable readiness and liveness probes ([6d3e484](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6d3e484855540569be53130e133e0821a04b2ca5))
|
||||||
|
|
||||||
|
## [0.5.54](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.53...v0.5.54) (2023-11-29)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add and document security context for components ([519db51](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/519db51be2be3ce292a88965ac0ec049b4c8bb8e))
|
||||||
|
|
||||||
|
## [0.5.53](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.52...v0.5.53) (2023-11-29)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-managemen-stack:** Integrate Attribute to Group Mapper into the containerized stack ([7bbab22](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/7bbab229396075c7d10f94f42bef14551faefe26))
|
||||||
|
* **univention-management-stack:** Add Announcements icon into "umc-gateway" ([7a9ecf7](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/7a9ecf7b8595edf0949d9c200d01b3409f25b9a7))
|
||||||
|
* **univention-management-stack:** Add Announcements module into "umc-server" ([4c52a5a](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/4c52a5aaa83ffb6f4c49faa039c94cb1855987bb))
|
||||||
|
* **univention-management-stack:** Add branding related configuration to stack-gateway ([a5f263c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/a5f263ce489f88b90cf1151de249f36616a51632))
|
||||||
|
* **univention-management-stack:** Apply styling ([b3d45c4](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/b3d45c45e1b754e14ab0519efcb6b6a359f0ad1e))
|
||||||
|
* **univention-management-stack:** Configure openDesk branding in frontend chart ([cbe8fb2](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/cbe8fb2d65e6ce73f9da95ef9b0ed3ffbb16d367))
|
||||||
|
* **univention-management-stack:** Document database of UMS Notifications API ([3cf348c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/3cf348c7ae8f438daf3e64addbf839230816f3d2))
|
||||||
|
* **univention-management-stack:** Move static settings from gotmpl into yaml for umc-gateway ([b3ac0ae](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/b3ac0ae6d91a058265fcd26c6653bb8a13d3e780))
|
||||||
|
* **univention-management-stack:** Quote all composed strings ([1c35ca6](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/1c35ca67ce0673e1b2f9a350bd07c82c22a05354))
|
||||||
|
* **univention-management-stack:** Remove frontend-custom ([8b6a4b2](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/8b6a4b2e88e8be1d299af91ed1ffff4405db88e6))
|
||||||
|
* **univention-management-stack:** Set SMTP host for self-service notifications ([0c7a77c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/0c7a77c4b6f20c6d83e977dabfc4e555b652f6ac))
|
||||||
|
* **univention-management-stack:** UMC uses external memcached ([211bee9](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/211bee94bb7675860f867f0335fec9f14fc96875))
|
||||||
|
* **univention-management-stack:** Update ums-dependencies ([e0c6c14](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/e0c6c14dcaefc0755495270bbf45898721e27985))
|
||||||
|
* **univention-management-stack:** Update ums-dependencies ([c246edd](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c246edd8f9753e37bc9c32683faf41f5b46d7675))
|
||||||
|
* **univention-management-stack:** Update ums-dependencies ([86b4818](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/86b48188e160c1f7d15f2c33f1f3cd0cc0e68bf2))
|
||||||
|
* **univention-management-stack:** Use "stack-gateway" in all deployments ([c19bca2](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c19bca2be0d14750bbef661e45c5c424f7da8e77))
|
||||||
|
|
||||||
|
## [0.5.52](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.51...v0.5.52) (2023-11-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Open automatic MRs for new branches ([735fec3](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/735fec3b4ccd33ba63e5fa6482526efb6853c64a))
|
||||||
|
|
||||||
|
## [0.5.51](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.50...v0.5.51) (2023-11-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Bump chart to fix central navigation ([cac6abe](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/cac6abe2510b6793963633077543684a6a4e7cbc))
|
||||||
|
* **openproject:** Update container and prepare for OIDC based user admin role setting ([6dc92df](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6dc92df2ebcae435e3b3609cc163dc6c33fb1b83))
|
||||||
|
|
||||||
|
## [0.5.50](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.49...v0.5.50) (2023-11-27)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Add metadata for renovate processing ([36aa3ed](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/36aa3ed7c9f9a6d0ffe23dc3ca2174d5f2741dfa))
|
||||||
|
|
||||||
|
## [0.5.49](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.48...v0.5.49) (2023-11-27)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Bump image to incorporate fix for https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267 ([efbd814](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/efbd81496868c5d4274f09805a1e771f47d548be))
|
||||||
|
|
||||||
|
## [0.5.48](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.47...v0.5.48) (2023-11-24)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **services:** Update resource requests and remove cpu limits ([f86a74b](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/f86a74ba100c7f08f6538b58a713bbc87c00e814))
|
||||||
|
|
||||||
|
## [0.5.47](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.46...v0.5.47) (2023-11-24)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Rename absolute paths on OpenCoDE to new 'opendesk' base group name ([7ac2e0f](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/7ac2e0f9de2a8386a7f5809ba40db4ed7164a857))
|
||||||
|
* **xwiki:** Enable the sync of user profile picture from LDAP ([6aa3d38](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6aa3d386afe8b3f22e47f9971fd719089006b54e))
|
||||||
|
|
||||||
|
## [0.5.46](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.45...v0.5.46) (2023-11-23)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Fix quotes in element chart ([a447c13](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a447c137fe58be343e7ada55afb7f6891a5cde74))
|
||||||
|
|
||||||
|
## [0.5.45](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.44...v0.5.45) (2023-11-22)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Add security context ([db48140](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/db48140f3ae6576b21e93ac0f10f40765efd608d))
|
||||||
|
|
||||||
|
## [0.5.44](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.43...v0.5.44) (2023-11-21)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Remove default BASE_DOMAIN in .gitlab-ci.yml ([7ae65a3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7ae65a36a2777d249ba3784bf965da4c790a1b21))
|
||||||
|
|
||||||
|
## [0.5.43](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.42...v0.5.43) (2023-11-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Update optional UMS preview state ([061e588](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/061e588da90e52b531df0688347675bf4dcb431e))
|
||||||
|
|
||||||
|
## [0.5.42](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.41...v0.5.42) (2023-11-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Add exporter and serviceMonitor ([feed270](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/feed270fd7949743e8f9974e7f147e89ab623347))
|
||||||
|
* **nextcloud:** Bump openDesk bootstrap to 3.2.3 to support serverinfo token ([ea14f95](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ea14f953a4a54c01cc0d66db1bdb645ca4a661e5))
|
||||||
|
|
||||||
|
## [0.5.41](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.40...v0.5.41) (2023-11-16)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Split README into docs ([cd0e94f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/cd0e94f96fa5b377ab382b6c7738ed279cb2a199))
|
||||||
|
|
||||||
|
## [0.5.40](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.39...v0.5.40) (2023-11-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Bump Dovecot and fix out-of-office replys ([55f6ba2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/55f6ba21dc9eab811ac501bf0e2b78d4ae772194))
|
||||||
|
|
||||||
|
## [0.5.39](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.38...v0.5.39) (2023-11-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Update optional UMS preview state ([e231e57](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e231e5749d3804f888ec23e12b58783856043219))
|
||||||
|
|
||||||
|
## [0.5.38](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.37...v0.5.38) (2023-11-13)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Update image to 23.05.5.4.1 ([c460467](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c460467d7449b107134562b785e95f6280e3473d))
|
||||||
|
|
||||||
|
## [0.5.37](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.36...v0.5.37) (2023-11-12)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Add bootstrapping of Nextcloud filestore ([1971dfb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1971dfbded21d16909e889ba6d19ff9cf3e4cb20))
|
||||||
|
|
||||||
|
## [0.5.36](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.35...v0.5.36) (2023-11-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element and Widgets ([97034a5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/97034a556f4cdcc447f61003ad9cd036c186bc3b))
|
||||||
|
|
||||||
|
## [0.5.35](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.34...v0.5.35) (2023-11-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Eliminate some yamllint errors ([1d03a6e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1d03a6e11f368fd81dd10b91b0d9d7fc29c0cb24))
|
||||||
|
* **helmfile:** Move ldap host variable into helpers ([08811de](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/08811decd92e7fd7802d0eba2644046512ec58a4))
|
||||||
|
* **helmfile:** Update charts to use proper quoting ([69ea840](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/69ea84051721f3aaf36a5dbafdfb37dd86b66dbb))
|
||||||
|
* **services:** Add minio as service and consume by OpenProject ([baa5827](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/baa5827de3e1e368abf238a932a5849f169af723))
|
||||||
|
|
||||||
|
## [0.5.34](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.33...v0.5.34) (2023-11-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Bump helmchart and properly template OP's initdb image ([0d8e92f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0d8e92fc5a4729ff7649e5a10e629b962a9b671b))
|
||||||
|
|
||||||
|
## [0.5.33](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.32...v0.5.33) (2023-11-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Update security context ([89ae1d9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/89ae1d94ea4c4e8a15a395a80847a7f235365747))
|
||||||
|
|
||||||
|
## [0.5.32](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.31...v0.5.32) (2023-11-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Resource definitions ([65ce9a1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/65ce9a171b7c8ebc453fb6bbe96743c8516da2c6))
|
||||||
|
|
||||||
|
## [0.5.31](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.30...v0.5.31) (2023-11-08)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Update optional UMS preview state ([d0a0799](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d0a07997c12ddb9731a0dfed0d6fa71d9a3790e7))
|
||||||
|
|
||||||
|
## [0.5.30](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.29...v0.5.30) (2023-11-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Init monitoring in defaults and in collabora (for prometheus-monitor, -rules and grafana dashboard) ([0ad0434](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0ad043406bef7bb10d561ef1418b58cbd8714d43))
|
||||||
|
* **helmfile:** Add monitoring.yaml for optional monitoring ([385d81b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/385d81b9a9e1ec319706493c51629c8e48822aa7))
|
||||||
|
|
||||||
|
## [0.5.29](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.28...v0.5.29) (2023-11-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **xwiki:** Update XWiki Helm configuration to enable LDAP and OIDC user synchronization ([7c56c72](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7c56c7244f3862b6b21627661430a94d804c6974))
|
||||||
|
|
||||||
|
## [0.5.28](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.27...v0.5.28) (2023-11-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Add Document- and ImageConverter, improve LDAP address book filters ([899a8c5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/899a8c5af9052634b98d9876dfbaea517d89ad49))
|
||||||
|
|
||||||
|
## [0.5.27](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.26...v0.5.27) (2023-11-04)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **docs:** Re-include release artefacts ([4359b21](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4359b21f1cdae91a87b87ad2b270d67a2b1eda21))
|
||||||
|
|
||||||
|
## [0.5.26](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.25...v0.5.26) (2023-11-02)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Enables user directory search for all users ([8fafd90](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/8fafd906a3b0efa7e4164b357656d7903fc55371))
|
||||||
|
|
||||||
|
## [0.5.25](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.24...v0.5.25) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Add CryptPad to support editing of diagrams.net files from within Nextcloud ([ab6014f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ab6014f8c6285785be5c56cd656fe0636df4434c))
|
||||||
|
|
||||||
|
## [0.5.24](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.23...v0.5.24) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Update image to 23.05.5.3.1 ([38336d0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/38336d024033f4fe1a28b0f76f9c63ecdb076156))
|
||||||
|
|
||||||
|
## [0.5.23](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.22...v0.5.23) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element Web to latest release ([b47de62](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b47de62f987e8778878fee55ecda3032beb55f3d))
|
||||||
|
|
||||||
|
## [0.5.22](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.21...v0.5.22) (2023-10-31)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Nextcloud integration within K8s instances ([d249d0e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d249d0e3ce3ee0966033e870ea5c4d9e1928f045))
|
||||||
|
|
||||||
|
## [0.5.21](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.20...v0.5.21) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Deinstall components if disabled ([7feaadf](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7feaadf7f8830d8d0d5df752733c9b8f47315df6))
|
||||||
|
* **helmfile:** Put enviroments in first document inside of a yaml ([034e98c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/034e98c850fa1f67300c04883904737a69448a25))
|
||||||
|
|
||||||
|
## [0.5.20](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.19...v0.5.20) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Remove old XWiki image, set explicit timeout for OP deployment, bump Jitsi Helm chart to enable chat for stand-alone Jitsi ([5d01f8c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5d01f8ca46384d63d69dab0119998c4bb3183084))
|
||||||
|
|
||||||
|
## [0.5.19](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.18...v0.5.19) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element Web and Nordeck Widgets to latest releases ([2313f75](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2313f75dbe32d855b0c440944bd0de51c8e104ca))
|
||||||
|
|
||||||
|
## [0.5.18](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.17...v0.5.18) (2023-10-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **xwiki:** Switch to Alpine/Jetty slim image ([b399869](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b39986907cece3cec06012531a55b2699d131f90))
|
||||||
|
|
||||||
|
## [0.5.17](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.16...v0.5.17) (2023-10-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Update swp_integration app and prepare CryptPad integration ([a046dea](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a046deaf173ab41029c2ab5e3161bd89e0fdabcb))
|
||||||
|
|
||||||
|
## [0.5.16](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.15...v0.5.16) (2023-10-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Slim container with upgraded helm-chart ([535823e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/535823e0a8b2bde72d159835248b2287fd136af7))
|
||||||
|
|
||||||
|
## [0.5.15](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.14...v0.5.15) (2023-10-25)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add XWiki Jetty and UniventionKeycloak to image.yaml for Compliance checks. They are not yet part of standard deployment. ([8e376bb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/8e376bb4a5e37e16d76ea527cd02a5f614cdfe3d))
|
||||||
|
|
||||||
|
## [0.5.14](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.13...v0.5.14) (2023-10-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Support for openDesk top bar with central navigation ([e609b75](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e609b75cc7fcbb7f03997cb5e26dd9cf4628f77d))
|
||||||
|
|
||||||
|
## [0.5.13](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.12...v0.5.13) (2023-10-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Configure rights and roles ([59d58e3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/59d58e320e503727e42dbfe0b027ba7948275ac6))
|
||||||
|
|
||||||
|
## [0.5.12](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.11...v0.5.12) (2023-10-19)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Add an application service for the intercom-service ([1a4eced](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1a4eced998998faa7ac862b8c409bbd743b16ec0))
|
||||||
|
* **element:** Add the Matrix NeoBoard Widget deployment ([5afd233](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5afd2339c20a0be41078ae4c3ce703c62f332557))
|
||||||
|
* **element:** Add the Matrix NeoChoice Widget deployment ([7756d35](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7756d35fa156b36ed50ba8f837273db56323f45f))
|
||||||
|
* **element:** Add the Matrix NeoDateFix Bot deployment ([785989e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/785989e91df5547ab5ac60914b82bc99c4f1a790))
|
||||||
|
* **element:** Add the Matrix NeoDateFix Widget deployment ([27b6796](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/27b6796639f37dbd6c26f21fd54502153398aed0))
|
||||||
|
* **element:** Add the Matrix User Verification Service deployment ([30405d1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/30405d182d44a5586a4070738dfbe1c141841d19))
|
||||||
|
* **element:** Upgrade Element to v1.11.46 ([82a037e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/82a037ec7c25baf41bd0542c3ded47402adc2844))
|
||||||
|
* **element:** Upgrade the opendesk-element charts to 2.3.0 ([fd9e04d](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/fd9e04d9922b949d0f213016169a9024a66a1ded))
|
||||||
|
* **element:** Upgrade the opendesk-matrix-widgets charts to 2.3.0 ([cbe5141](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/cbe514176a4d86d166db248d7297d215409016d2))
|
||||||
|
* **element:** Use a separate image configuration for the bootstrap tasks ([7f7c364](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7f7c364071072b01d485d3e248a3f8de49a07309))
|
||||||
|
* **intercom-service:** Allow access from the non-istio domain and reference to the correct synapse hostname ([16f2ac4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/16f2ac464eb7267f1c4d87c3ccaca2c91a7ecc1b))
|
||||||
|
* **intercom-service:** Fix the nordeck configuration ([06dcdd7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/06dcdd78afe0e6514c1f30d24924d3e7077ae6da))
|
||||||
|
* **jitsi:** Use template for the cluster networking domain ([0898d96](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0898d9657145d66fd4c52fe6036c955ad58a0cfe))
|
||||||
|
* **keycloak:** Use the correct backchannel logout configuration for element ([86657b1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/86657b139a6d8f4ff3f921b8755e04cb790c3786))
|
||||||
|
* **open-xchange:** Enable Element calendar integration ([f564efd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f564efd97f8db39cffaea317e36db3825fc9121e))
|
||||||
|
|
||||||
|
## [0.5.11](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.10...v0.5.11) (2023-10-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Quote all password template strings ([fb7dba7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/fb7dba787c232c402aa9c989c0e8ace51869d534))
|
||||||
|
* **services:** Add memcached service ([72e3afd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/72e3afdffdeb6f88f8e926426dbc26adf4b54e7a))
|
||||||
|
|
||||||
|
## [0.5.10](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.9...v0.5.10) (2023-10-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **intercom-service:** Update intercom-service chart to v2.0.0 ([c3129f1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c3129f14437728be890187bb7c4a1bfc42d90958))
|
||||||
|
|
||||||
|
## [0.5.9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.8...v0.5.9) (2023-10-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Enable the guest module in Synapse ([da1bf35](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/da1bf3581c5790786601948cabcef8a1d1c680ad))
|
||||||
|
|
||||||
|
## [0.5.8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.7...v0.5.8) (2023-10-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add default port for SMTP in environment ([74f9ec2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/74f9ec28e401f7caeefc4e50ac0a7e95fea41a53))
|
||||||
|
|
||||||
|
## [0.5.7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.6...v0.5.7) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Mail sender address ([711d29e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/711d29e374d13a3c8b7bcdf3e8440d03e0ef2b7d))
|
||||||
|
|
||||||
|
## [0.5.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.5...v0.5.6) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Use signed bitnami charts from openDesk Mirror Builds ([70744d0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/70744d04c66f32d65dc968c8570ed7a397f4efcc))
|
||||||
|
* **services:** Bump redis chart to 18.1.2 ([d4c751d](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d4c751d29f15c718957f6bc388a99347e2923c87))
|
||||||
|
|
||||||
|
## [0.5.5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.4...v0.5.5) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Switch image to fix central navigation; set email sender address ([e42feb4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e42feb4c260fc24692bc2742c97754230f8e2857))
|
||||||
|
|
||||||
|
## [0.5.4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.3...v0.5.4) (2023-10-02)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add third environment (test) ([7dbcbfe](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7dbcbfe7237b365cf53f4c850b149e8b95149901))
|
||||||
|
|
||||||
|
## [0.5.3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.2...v0.5.3) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Rollback MariaDB version to fix OX Guard initialization ([e33acd3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e33acd33e79740144e8fe318fe34dc705834ddf3))
|
||||||
|
|
||||||
|
## [0.5.2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.1...v0.5.2) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Add Gitlab-CI sledgehammer deployment removal ([6fd655a](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6fd655a0b1afd40303ac11130692202146bab215))
|
||||||
|
|
||||||
|
## [0.5.1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.0...v0.5.1) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **docs:** Add 'Helm Chart Trust Chain' section ([b6b4972](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b6b4972a5dd426bcc8fa00137d7e7b60056376c8))
|
||||||
|
* **docs:** Highlight that Helmfile >= 0.157.0 is required ([d86f516](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d86f516747323d117f620658c4368408926c507a))
|
||||||
|
* **element:** Use OCI registry and verify chart signatures ([a41b9a6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a41b9a699c79bf90163bbb3c233c805b8d0a999e))
|
||||||
|
* **helmfile:** Add cleanup flag for job resources ([0f01b94](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0f01b94aa19b40b4774ba11d9886fe6f12090e73))
|
||||||
|
* **helmfile:** Create directory for gpg pubkeys ([4c5731e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4c5731e6bb057cb272f660b4df0369b67709c203))
|
||||||
|
* **intercom-service:** Use OCI registry and verify chart signatures ([74b3d41](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/74b3d41381474efd2fbc5a9f3a0f1c0713811106))
|
||||||
|
* **jitsi:** Verify chart signatures ([1dd6582](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1dd6582ec7d742250ba08f69eba9a4679984b1ae))
|
||||||
|
* **keycloak-bootstrap:** Use OCI registry and verify chart signatures ([ca5d5f8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ca5d5f82800ea6d7ecfa38eb2b5d8b85e709bb9f))
|
||||||
|
* **keycloak:** Use OCI registry and verify chart signatures ([095059c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/095059c7e53bbe8a874773f574cc6794ef8af6e4))
|
||||||
|
* **nextcloud:** Use OCI registry and verify chart signatures ([41dfdc0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/41dfdc0c8f83e3d79fa5a763ac449f6edfc76676))
|
||||||
|
* **open-xchange:** Use OCI registry and verify chart signatures ([2d5d370](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2d5d3708f7f45600961c22ce11e750561de1fd27))
|
||||||
|
* **open-xchange:** Use renamed istio gateway ([65d2642](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/65d2642d34c1c21a00a29278f7e1143f7fabb2aa))
|
||||||
|
* **openproject:** Use OCI registry and verify chart signatures ([5343840](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5343840bed01992b3132eace362f91588c705a98))
|
||||||
|
* **services:** Add wildcard certifcate request support ([15ad8ca](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/15ad8ca7ab34b079252f7b69219ede81ad43aa1c))
|
||||||
|
* **services:** Bump opendesk-certificates to 2.1.0 ([4372f06](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4372f063e0a27d5156da963d44d3ed4e72490fc4))
|
||||||
|
* **services:** Only create istio gateway with webmail domain ([6a39011](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6a390112dab11afaca06118a0ca7a18afe633a30))
|
||||||
|
* **services:** Use OCI registry for all services and add gpg verify mechanism ([892920b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/892920b0487b41a35b5a96596c61101827e8dd6d))
|
||||||
|
* **univention-corporate-container:** Use OCI registry and verify chart signatures ([424317e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/424317ed585f7bd5036259d7e3d77d081d2aec1b))
|
||||||
|
|
||||||
|
# [0.5.0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.9...v0.5.0) (2023-09-27)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Move the static configuration into the values.yaml ([f22619b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f22619bd8ef11cb43147ef19dcff2c02d9fe0503))
|
||||||
|
* **element:** Specify resources for the guest module init container ([275798c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/275798c1d6aa47ef33fbb0da3bb03a86d3e4b0ee))
|
||||||
|
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* **element:** Activate the guest module ([5ad25ac](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5ad25acafd54d19dd2ed330b19f7860aff5d49f4))
|
||||||
|
|
||||||
|
## [0.4.9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.8...v0.4.9) (2023-09-27)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Bump Helm chart to add app "groupfolders" ([62b767e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/62b767ef38c8eae2874b20a9aa51e85d2a3fe5a3))
|
||||||
|
|
||||||
|
## [0.4.8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.7...v0.4.8) (2023-09-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Digest rollback ([9acce08](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/9acce081397c06426820b61f39c9aa0dcc1234a5))
|
||||||
|
|
||||||
|
## [0.4.7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.6...v0.4.7) (2023-09-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add timeout for database services ([98ec02f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/98ec02f230f1691eb8c17d8d3552fceda329bf7c))
|
||||||
|
* **openproject:** Image digest ([b340373](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b340373133ad973cfd6a3632adc9a74a23419cc7))
|
||||||
|
|
||||||
|
## [0.4.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.5...v0.4.6) (2023-09-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Use renamed registry open_desk ([a37faf3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a37faf3b5769aea9944ffa7626096c16296dcc85))
|
||||||
|
|
||||||
|
## [0.4.5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.4...v0.4.5) (2023-09-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Streamline timeouts ([2703615](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2703615dffb2ba5c70704a4f08bb0485629218f3))
|
||||||
|
|
||||||
|
## [0.4.4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.3...v0.4.4) (2023-09-25)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Updates for mail templates and mail export ([ae3d0da](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ae3d0daa117d3d0ff307f379590394914a757546))
|
||||||
|
|
||||||
|
## [0.4.3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.2...v0.4.3) (2023-09-25)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Update image to 27.1.1 ([ce7e5f6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ce7e5f670a4dbc980eb8be73e5f7d15b27e8b1de))
|
||||||
|
|
||||||
|
## [0.4.2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.1...v0.4.2) (2023-09-21)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Add Nextcloud app for OpenProject integration; Bump Collabora Image ([f46c8a9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f46c8a9a5f4f9778cb171d65e9a0280e4ce61c16))
|
||||||
|
|
||||||
|
## [0.4.1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.0...v0.4.1) (2023-09-19)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Remove doublette triple dashes in helmfile.yaml ([41b9afb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/41b9afb3648a0e1fddc5aa4337cc1501756b370c))
|
||||||
|
|
||||||
|
# [0.4.0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.3.2...v0.4.0) (2023-09-18)
|
||||||
|
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* **ci:** Optionally trigger E2E tests of the SouvAP Dev team ([a99c088](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a99c088361b95b2bb7ee2b161e3a254f02bcd9ae))
|
||||||
|
|
||||||
|
## [0.3.2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.3.1...v0.3.2) (2023-09-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Fix linter issues ([1514678](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1514678db00d32c1463d8fc496c0e6d1c2a2df96))
|
||||||
|
* **univention-management-stack:** Add "commonLabels" into helmfile ([16c08f8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/16c08f82c9b4934567bb3b9c7fccab754bfad494))
|
||||||
|
* **univention-management-stack:** Add Helm charts ([a74d662](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a74d66240423fd5ba87854cc2b71132f11271ec7))
|
||||||
|
* **univention-management-stack:** Add switch "univentionManagementStack.enabled" ([471a2fa](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/471a2fa26205b8ca3afb5eeeb4524897a57f5c20))
|
||||||
|
* **univention-management-stack:** Adjust Ingress configuration for portal-server ([13bcd78](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/13bcd785e8f7db22d20903020e0cdd28094309a9))
|
||||||
|
* **univention-management-stack:** Adjust Ingress configuration for umc ([320da3b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/320da3bec3a49d974765e567878d5c2f2b4e93ef))
|
||||||
|
* **univention-management-stack:** Adjust Ingress configuration of notifications-api ([5e1a7b1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5e1a7b19e278147d010c48dac2da111f828dd115))
|
||||||
|
* **univention-management-stack:** Adjust ingress configuration of the portal-frontend ([c54bab1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c54bab165bf81854471d790200781b4181eba22a))
|
||||||
|
* **univention-management-stack:** Adjust Ingress configuration of udm-rest-api ([c61b1b8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c61b1b828150caa8d2fe1a5b9f0a862b2fbef4f1))
|
||||||
|
* **univention-management-stack:** Adjust Ingress conifguration of store-dav ([96097e4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/96097e470483a5251acd81eb772da70ad7f55137))
|
||||||
|
* **univention-management-stack:** Configure cookie banner data ([12c931f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/12c931fcff5536116af11df1c9c0468429949fe2))
|
||||||
|
* **univention-management-stack:** Define resource requests and limits ([2f8a298](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2f8a2989250ea0f3b50dd3417f214a8864fe62d0))
|
||||||
|
* **univention-management-stack:** Disable istio for the stack ([4835a2b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4835a2beec408ec6267177f82257edd9ccb0d937))
|
||||||
|
* **univention-management-stack:** Prepare persistence configuration ([7ab1cb5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7ab1cb5c7e7bca85394eae2ed17141e513dd5a42))
|
||||||
|
* **univention-management-stack:** Process bases before releases ([ec3f1d9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ec3f1d96ac17cf1fb9d34ab692240460d5bd4ba1))
|
||||||
|
* **univention-management-stack:** Set externalDomainName for bootstrapping the stack ([0ba71f2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0ba71f2749eaf51b09429a5f3c705bd0075c1efa))
|
||||||
|
* **univention-management-stack:** Split templated from static values ([09079a1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/09079a13031be7894a34bf92945bd25a040c2290))
|
||||||
|
* **univention-management-stack:** Split values into templated and static ([d3c4390](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d3c439038a2551ec90324ab8659d24b65b223d4f))
|
||||||
|
* **univention-management-stack:** Update portal-listener to leverage dependency waiting ([c840608](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c84060811229bb131bcd473a9e4668dfa73f97d7))
|
||||||
|
* **univention-management-stack:** Use global secrets to fill initialPasswordAdministrator ([a4bab40](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a4bab4068dc298056ed864e60a244d49a2934c8b))
|
||||||
|
* **univention-management-stack:** Use global secrets to populate ldap related secrets ([9409ad8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/9409ad829a725c84ebc3de5d1c4d42fe735e9d0c))
|
||||||
|
* **univention-management-stack:** Use global secrets to set store-dav related passwords ([90019e3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/90019e3ef6de5e4ed1742ee9ddc3bbb256cd3dec))
|
||||||
|
* **univention-management-stack:** Use ldap base DN "dc=swp-ldap,dc=internal" ([77e362f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/77e362f6bc053c5d456bf65649f15130ce53547c))
|
||||||
|
* **univention-management-stack:** Use postgresql service for notifications-api ([fe0e0cd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/fe0e0cdce4622352afbf74875adcae8324d769a3))
|
||||||
|
* **univention-management-stack:** Use the prefix "ums-" for all releases ([edb25bd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/edb25bd7655beeefa73a62fb9a8c85e076c4cc2f))
|
||||||
|
* **univention-management-stack:** Use the value "global.imagePullPolicy" ([15db5dc](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/15db5dcbba33c39f752499f2d73c77cac32d1e8c))
|
||||||
|
|
||||||
|
## [0.3.1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.3.0...v0.3.1) (2023-09-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Update Ingress annotations and set securityContext ([b5583ca](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b5583caec10c24e3bfb312edcb2800e6a60a9b10))
|
||||||
|
* **element:** Improve default container security settings ([882f1fb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/882f1fbc93ceb4ac33683d445e100e445798b202))
|
||||||
|
* **element:** Update opendesk element version to 2.0.1 ([d725b93](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d725b937989987ffacf87d7a9ee05803dcdd4c93))
|
||||||
|
* **helmfile:** Remove default SMTP credentials and create docs for SMTP/TURN ([e120f5f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e120f5fb9a91b80ba71ce78eace99852b4da5fda))
|
||||||
|
* **helmfile:** Update images and use a tag and digest together ([c7fc187](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c7fc187f14b78cdcc698abbbaec1ba0bbfc718a1))
|
||||||
|
* **services:** Explicitly set securityContexts ([a799db0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a799db03c4115ba69303be1c265f7aefef95d659))
|
||||||
|
* **services:** Update Postfix to 2.0.2 fixing security gaining ([e1070ee](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e1070eeb0602523c240a91dae1b0869a7cc42a78))
|
||||||
|
|
||||||
|
# [0.3.0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.10...v0.3.0) (2023-09-12)
|
||||||
|
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* **ci:** Selective tests ([d2e7ac9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d2e7ac93481249e9eb7e5e1a41a6c6e333abe2dc))
|
||||||
|
|
||||||
|
## [0.2.10](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.9...v0.2.10) (2023-09-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add imagePullPolicy default env variable ([f988644](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f9886448b60bbbd917b5ba04d188401275293eec))
|
||||||
|
* **helmfile:** Update images and add jitsi, keycloak to security section in docs ([0eceb85](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0eceb85e7df7455fa61cb17a854807069fbcf51a))
|
||||||
|
* **jitsi:** Update chart to 1.4.2 with improved security and fixed change on each deployment ([1349181](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1349181d802ccb80d9e48cf50fe39f1505116c8e))
|
||||||
|
* **jitsi:** Update jitsi to 1.5.1 and fix prosody image ([ed7e5e4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ed7e5e428e5d9213a92f97dc03d72fa3e04334c2))
|
||||||
|
* **keycloak:** Improve default security settings ([3b90533](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/3b90533063c151a9f3cdc9861a115481f6dc440a))
|
||||||
|
* **nextcloud:** Fix yamllint disable comment ([4380e78](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4380e789814ec2b0458fb2c341c8160ab2743afc))
|
||||||
|
* **services:** Disable https redirect in istio to fix cert-manager issues ([1ef4a86](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1ef4a861acc955e2e85715c62f715a6629ada940))
|
||||||
|
* **services:** Fix capabilities of postifix ([a6fa846](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a6fa846afc9744f2b399c37cc754f878b6b9e90b))
|
||||||
|
* **services:** Fix OCI registry address of postgresql, mariadb ([be82243](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/be822439661f766c4db6044fd3581db0cce214bb))
|
||||||
|
|
||||||
|
## [0.2.10](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.9...v0.2.10) (2023-09-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add imagePullPolicy default env variable ([f988644](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f9886448b60bbbd917b5ba04d188401275293eec))
|
||||||
|
* **helmfile:** Update images and add jitsi, keycloak to security section in docs ([0eceb85](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0eceb85e7df7455fa61cb17a854807069fbcf51a))
|
||||||
|
* **jitsi:** Update chart to 1.4.2 with improved security and fixed change on each deployment ([1349181](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1349181d802ccb80d9e48cf50fe39f1505116c8e))
|
||||||
|
* **keycloak:** Improve default security settings ([3b90533](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/3b90533063c151a9f3cdc9861a115481f6dc440a))
|
||||||
|
* **nextcloud:** Fix yamllint disable comment ([4380e78](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4380e789814ec2b0458fb2c341c8160ab2743afc))
|
||||||
|
* **services:** Disable https redirect in istio to fix cert-manager issues ([1ef4a86](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1ef4a861acc955e2e85715c62f715a6629ada940))
|
||||||
|
* **services:** Fix capabilities of postifix ([a6fa846](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a6fa846afc9744f2b399c37cc754f878b6b9e90b))
|
||||||
|
* **services:** Fix OCI registry address of postgresql, mariadb ([be82243](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/be822439661f766c4db6044fd3581db0cce214bb))
|
||||||
|
|
||||||
|
## [0.2.9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.8...v0.2.9) (2023-09-05)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Add websocket support for NGINX Inc. Ingress ([6e5ef63](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6e5ef639c22aad93fd2d0eb75f7a1ffc00d6cc9a))
|
||||||
|
* **docs:** Add security part in README ([ff462ab](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ff462ab0dc2252cc7b517874f5337427b8d19053))
|
||||||
|
* **docs:** Update scaling docs ([63a1e25](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/63a1e2568e8c5ff62081c6e6594d2019c1aa4b74))
|
||||||
|
* **helmfile:** Reduce icap resources in default enviroment ([c5ab1b8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c5ab1b81fecbce46788c50b282ed6d1770124fa5))
|
||||||
|
* **helmfile:** Update clamav and nextcloud images in default environment ([4f2a8ae](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4f2a8aeee4ee6c3d27b1c8a99bad14f603486be5))
|
||||||
|
* **nextcloud:** Add support for up to 4G large upload for Ingress NGINX and NGINX Inc. Ingress ([6e68f7f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6e68f7f28c937319d93f8afe1dbb302012f77233))
|
||||||
|
* **nextcloud:** Rename sovereign-workplace-nextcloud-bootstrap to opendesk-nextcloud-bootstrap and use OCI ([cef11ac](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/cef11acbae28510809f9bfa13224dc3a6996207f))
|
||||||
|
* **nextcloud:** Use clamav-icap when clamavDistributed is activated ([41d40c9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/41d40c9b731b866da2666fa4ffa8cb6493737112))
|
||||||
|
* **services:** Enable security context and use default increased security settings ([9a6d240](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/9a6d2409a697f7e9811a0f4f8d31bb18bac1b926))
|
||||||
|
* **services:** Fix image registry templates for postfix ([6321ff5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6321ff50a00203abbfb7f5822e67a3c0e00d4b01))
|
||||||
|
* **services:** Replace image digest by tag ([f758293](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f7582932412f13b1a087d40459e97cf633b1a97e))
|
||||||
|
* **services:** Set readOnlyRootFilesystem to true on master ([5fbf86b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5fbf86b6bc7b63c81b3ac07c5e0fa8cd464fdad1))
|
||||||
|
* **services:** Update clamav to 4.0.0, redis to 18.0.0, postgresql to 2.0.2, mariadb to 2.0.2 and use OCI registries ([9d78664](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/9d7866480cee889fd3b3003b2eea313a6ed73344))
|
||||||
|
|
||||||
|
## [0.2.8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.7...v0.2.8) (2023-08-31)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Update images and Helm chart ([39565c7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/39565c7cfd89a8d1c2e645e3ecea28fba703ccc1))
|
||||||
|
|
||||||
|
## [0.2.7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.6...v0.2.7) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **jitsi:** Update Jitsi Helm chart to set the user's display name as default ([387bd87](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/387bd8715c5a1cf54733c6642cf57c6ef9a44316))
|
||||||
|
|
||||||
|
## [0.2.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.5...v0.2.6) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Change path of asset_generator ([6ab4fa0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6ab4fa078b0bb3939c54f46d6475770fa9901936))
|
||||||
|
* **ci:** Include deployment environments ([0f59736](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0f59736c5dcff905400ae2e1bbf7ae496ffb9b2c))
|
||||||
|
* **ci:** Release artefacts ([2a61b5f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2a61b5f2a66bf1dc1ad06f7111ef7ecaf9247b39))
|
||||||
|
|
||||||
|
## [0.2.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.5...v0.2.6) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Change path of asset_generator ([6ab4fa0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6ab4fa078b0bb3939c54f46d6475770fa9901936))
|
||||||
|
* **ci:** Include deployment environments ([0f59736](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0f59736c5dcff905400ae2e1bbf7ae496ffb9b2c))
|
||||||
|
* **ci:** Release artefacts ([2a61b5f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2a61b5f2a66bf1dc1ad06f7111ef7ecaf9247b39))
|
||||||
|
|
||||||
|
## [0.2.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.5...v0.2.6) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Change path of asset_generator ([6ab4fa0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6ab4fa078b0bb3939c54f46d6475770fa9901936))
|
||||||
|
* **ci:** Release artefacts ([2a61b5f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2a61b5f2a66bf1dc1ad06f7111ef7ecaf9247b39))
|
||||||
|
|
||||||
|
## [0.2.5](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.4...v0.2.5) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **xwiki:** Theming and language of central navigation ([3d4d45f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/3d4d45f7114e6e3bc353b8d6c5fdbcac4cb2460f))
|
||||||
|
|
||||||
|
## [0.2.4](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.3...v0.2.4) (2023-08-29)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Apply the global theme to Element ([7f7eae8](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/7f7eae8f99a6d8ad8085ad99c63af27b858ff9b7))
|
||||||
|
|
||||||
|
## [0.2.3](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.2...v0.2.3) (2023-08-29)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Add central branding information ([a14c42f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/a14c42f6ed2e3d8e12af5d04cae1a4bb1336fb3d))
|
||||||
|
|
||||||
## [0.2.2](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.1...v0.2.2) (2023-08-16)
|
## [0.2.2](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.1...v0.2.2) (2023-08-16)
|
||||||
|
|
||||||
|
|
||||||
@@ -126,3 +859,8 @@
|
|||||||
* **open-xchange:** OX AppSuite 8 within SWP is now publicly available ([6dc470f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/6dc470fd67edbb9711e406acb067569ca357b989))
|
* **open-xchange:** OX AppSuite 8 within SWP is now publicly available ([6dc470f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/6dc470fd67edbb9711e406acb067569ca357b989))
|
||||||
* **services:** Add clamav-simple deployment ([505f25c](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/505f25c5493ebb9e0181233ed5b7d8018e3a315d))
|
* **services:** Add clamav-simple deployment ([505f25c](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/505f25c5493ebb9e0181233ed5b7d8018e3a315d))
|
||||||
* **sovereign-workplace:** Initial commit ([533c504](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/533c5040faebd91f4012b604d0f4779ea1510424))
|
* **sovereign-workplace:** Initial commit ([533c504](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/533c5040faebd91f4012b604d0f4779ea1510424))
|
||||||
|
|
||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|||||||
@@ -1,28 +0,0 @@
|
|||||||
<!--
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
-->
|
|
||||||
**Content / Quick navigation**
|
|
||||||
|
|
||||||
[[_TOC_]]
|
|
||||||
|
|
||||||
# Functional Components
|
|
||||||
|
|
||||||
Functional components are the core of the SWP as they provide it's rich functionaly. We use the community versions of the named products. For production environments please use enterprise versions for support and scalabiliy reasons.
|
|
||||||
|
|
||||||
## Groupware - Open-Xchange AppSuite
|
|
||||||
|
|
||||||
## WebOffice - Collabora Development Edition
|
|
||||||
|
|
||||||
## File & Share - Nextcloud
|
|
||||||
|
|
||||||
## Kollaboration - dOnlineZusammenarbeit 2.0
|
|
||||||
|
|
||||||
## Videokonferenzen - Jitsi
|
|
||||||
|
|
||||||
## Knowledge Management - XWiki
|
|
||||||
|
|
||||||
## Project Management - OpenProject
|
|
||||||
|
|
||||||
## IAM - Univention Corporate Services
|
|
||||||
@@ -42,7 +42,7 @@ This service is used by:
|
|||||||
|
|
||||||
## TURN Server
|
## TURN Server
|
||||||
|
|
||||||
- dOZ 2.0
|
This services is used by:
|
||||||
- Jitsi
|
- Jitsi
|
||||||
|
|
||||||
## NFS
|
## NFS
|
||||||
@@ -60,3 +60,6 @@ This service is used by
|
|||||||
- Open-Xchange
|
- Open-Xchange
|
||||||
|
|
||||||
## Objectstore - MinIO
|
## Objectstore - MinIO
|
||||||
|
|
||||||
|
This services is used by:
|
||||||
|
- OpenProject (attachment storage)
|
||||||
|
|||||||
@@ -5,21 +5,21 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
|
|
||||||
# Read me first
|
# Read me first
|
||||||
|
|
||||||
Please read the [project's overall CONTRIBUTING.md](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info/-/blob/main/CONTRIBUTING.md) first.
|
Please read the [project's overall CONTRIBUTING.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/CONTRIBUTING.md) first.
|
||||||
|
|
||||||
# How to contribute?
|
# How to contribute?
|
||||||
|
|
||||||
When providing contributes to this project, please adhere to the standards and conventions described in further down in this document. Doing so please feel free to create merge requests.
|
When providing contributes to this project, please adhere to the standards and conventions described further down in this document. Doing so please feel free to create merge requests.
|
||||||
|
|
||||||
# Standards and conventions
|
# Standards and conventions
|
||||||
|
|
||||||
## Branching
|
## Branching
|
||||||
|
|
||||||
We use of [Github flow](https://docs.github.com/en/get-started/quickstart/github-flow).
|
We use [Github flow](https://docs.github.com/en/get-started/quickstart/github-flow).
|
||||||
|
|
||||||
## Verified commits
|
## Verified commits
|
||||||
|
|
||||||
We only allow verify commits:
|
We only allow verified commits:
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/ssh_signed_commits/
|
- https://docs.gitlab.com/ee/user/project/repository/ssh_signed_commits/
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/gpg_signed_commits/
|
- https://docs.gitlab.com/ee/user/project/repository/gpg_signed_commits/
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/x509_signed_commits/
|
- https://docs.gitlab.com/ee/user/project/repository/x509_signed_commits/
|
||||||
@@ -80,7 +80,7 @@ Due to DVS requirements:
|
|||||||
- we should avoid stand alone Manifests.
|
- we should avoid stand alone Manifests.
|
||||||
- we do not use Operators and CRDs.
|
- we do not use Operators and CRDs.
|
||||||
|
|
||||||
In order to align the Helm files from various sources into an unified deployment of the SWP we make use of to [Helmfile](https://github.com/helmfile/helmfile).
|
In order to align the Helm files from various sources into an unified deployment of the SWP we make use of [Helmfile](https://github.com/helmfile/helmfile).
|
||||||
|
|
||||||
## Tooling
|
## Tooling
|
||||||
|
|
||||||
|
|||||||
491
README.md
491
README.md
@@ -2,443 +2,106 @@
|
|||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
SPDX-License-Identifier: Apache-2.0
|
SPDX-License-Identifier: Apache-2.0
|
||||||
-->
|
-->
|
||||||
**Content / Quick navigation**
|
|
||||||
|
|
||||||
[[_TOC_]]
|

|
||||||
|
|
||||||
# Disclaimer August 2023
|
openDesk is a Kubernetes based, open-source and cloud-native digital workplace suite provided by the "Projektgruppe für
|
||||||
|
Aufbau ZenDiS" of Germany's Federal Ministry of the Interior.
|
||||||
|
|
||||||
The current state of the Sovereign Workplace contains components that are going to be
|
It features:
|
||||||
replaced. Like for example the UCS dev container monolith will be substituted by
|
- Fully integrated Identity Management (Univention)
|
||||||
multiple Univention Management Stack containers.
|
- File storage (Nextcloud)
|
||||||
|
- Weboffice (Collabora)
|
||||||
|
- Videoconference (Nordeck w/ Jitsi)
|
||||||
|
- Chat and Collaboration (Element w/ Nordeck)
|
||||||
|
- Groupware (OX Appsuite)
|
||||||
|
- Wiki (XWiki)
|
||||||
|
- Project Management (OpenProject)
|
||||||
|
- Notes and Diagrams (Cryptpad)
|
||||||
|
|
||||||
In the next months we not only expect upstream updates of the functional
|
openDesk integrates these components and is working towards a seamless user experience.
|
||||||
components within their feature scope, but we are also going to address
|
|
||||||
operational issues like monitoring and network policies.
|
While not all components are perfectly shaped for the execution inside containers, one of the project objectives is to
|
||||||
|
align the applications with the best practises regarding container design and operations.
|
||||||
|
|
||||||
|
This documentation aims to give you all that is needed to set up your own instance of the openDesk.
|
||||||
|
Basic knowledge of Kubernetes and Devops is required though.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Active development notice](#active-development-notice)
|
||||||
|
* [Feedback](#feedback)
|
||||||
|
* [Requirements](#requirements)
|
||||||
|
* [Getting started](#getting-started)
|
||||||
|
* [Advanced customization](#advanced-customization)
|
||||||
|
* [Releases](#releases)
|
||||||
|
* [Components](#components)
|
||||||
|
* [License](#license)
|
||||||
|
* [Copyright](#copyright)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# Active development notice
|
||||||
|
openDesk will face breaking changes in the near future without upgrade paths before
|
||||||
|
[technical release](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases)
|
||||||
|
v1.0.0 is reached.
|
||||||
|
|
||||||
|
While most components support upgrades, major configuration or component changes may occur, therefore we recommend
|
||||||
|
at the moment always installing from scratch.
|
||||||
|
|
||||||
|
Components that are going to be replaced soon are:
|
||||||
|
- the UCS dev container monolith will be substituted by multiple Univention Management Stack containers,
|
||||||
|
- the Nextcloud community container is going to be replaced by an openDesk specific Nextcloud distroless container and
|
||||||
|
- Dovecot Community is going to be replaced by a Dovecot container tailored for the needs of the public sector.
|
||||||
|
|
||||||
|
In the next months, we not only expect upstream updates of the functional components within their feature scope, but we
|
||||||
|
are also going to address operational issues like monitoring and network policies.
|
||||||
|
|
||||||
Of course, further development also includes enhancing the documentation.
|
Of course, further development also includes enhancing the documentation.
|
||||||
|
|
||||||
The first release of the Sovereign Workplace is scheduled for December 2023.
|
# Feedback
|
||||||
Before that release there will be breaking changes in the deployment.
|
|
||||||
|
|
||||||
|
We love to get feedback from you!
|
||||||
# The Sovereign Workplace (SWP)
|
Related to the deployment / contents of this repository,
|
||||||
|
please use the [issues within this project](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues).
|
||||||
The Sovereign Workplace's runtime environment is [Kubernetes](https://kubernetes.io/), or "K8s" in
|
|
||||||
short.
|
|
||||||
|
|
||||||
While not all components are still perfectly shaped for the execution inside
|
|
||||||
containers, one of the projects objectives is it to align the applications
|
|
||||||
with the best practises regarding container design and operations.
|
|
||||||
|
|
||||||
This documentation aims to give you all that is needed to set up your own
|
|
||||||
instance of the Sovereign Workplace. Basic knowledge of Kubernetes and Devops is
|
|
||||||
required though.
|
|
||||||
|
|
||||||
To have an overview of what can be found at Open CoDE and the basic components
|
|
||||||
of the Sovereign Workplace, please check out the
|
|
||||||
[OVERVIEW.md](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info/-/blob/main/OVERVIEW.md) in the [Info repository](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info).
|
|
||||||
|
|
||||||
We love to get feedback from you! Related to the deployment / contents of this
|
|
||||||
repository please use the [issues within this project](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/-/issues).
|
|
||||||
|
|
||||||
If you want to address other topics, please check the section
|
If you want to address other topics, please check the section
|
||||||
["Rückmeldungen und Beteiligung" of the Infos' project OVERVIEW.md](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung).
|
["Rückmeldungen und Beteiligung" of the Infos' project OVERVIEW.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung).
|
||||||
|
|
||||||
# Deployment
|
# Requirements
|
||||||
|
|
||||||
**Note for project members:** You can use the project's `dev` K8s cluster to set
|
⟶ Visit our detailed [Requirements](docs/requirements.md) overview.
|
||||||
up your own instance for development purposes. Please see the project
|
|
||||||
`sovereign-workplace-env` on the internal Gitlab for more details.
|
|
||||||
|
|
||||||
## Prerequisites
|
# Getting started
|
||||||
|
|
||||||
### Mandatory technical prerequisites
|
⟶ Visit our detailed [Getting started](docs/getting-started.md) guide.
|
||||||
|
|
||||||
These are the requirements of the Sovereign Workplace deployment:
|
# Advanced customization
|
||||||
|
|
||||||
- Vanilla K8s cluster
|
- [External services](docs/external-services.md)
|
||||||
- Domain and DNS Service
|
- [Security](docs/security.md)
|
||||||
- Ingress controller (supported are nginx-ingress, ingress-nginx, HAProxy)
|
- [Scaling](docs/scaling.md)
|
||||||
- [Helm](https://helm.sh/), [HelmFile](https://helmfile.readthedocs.io/en/latest/) and
|
- [Monitoring](docs/monitoring.md)
|
||||||
[HelmDiff](https://github.com/databus23/helm-diff)
|
- [Theming](docs/theming.md)
|
||||||
- Volume provisioner supporting RWO (read-write-once)
|
|
||||||
- Certificate handling with [cert-manager](https://cert-manager.io/)
|
|
||||||
- [Istio](https://istio.io/) is currently required to deploy and operate OX AppSuite8, we are
|
|
||||||
working with Open-Xchange to get rid of this dependency.
|
|
||||||
|
|
||||||
#### TLS Certificate
|
# Releases
|
||||||
|
|
||||||
The setup will create a `cert-manager.io` Certificate resource.
|
All technical releases are created using [Semantic Versioning](https://semver.org/lang/de/).
|
||||||
|
|
||||||
You can set the ClusterIssuer via `certificate.issuerRef.name`
|
Gitlab provides an
|
||||||
|
[overview on the releases](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases)
|
||||||
|
of this project.
|
||||||
|
|
||||||
### Required input variables
|
The following release artefacts are provided beside the default source code assets:
|
||||||
|
- `chart-index.json`: An overview of all Helm charts used by the release.
|
||||||
|
- `image-index.json`: An overview of all container images used by the release.
|
||||||
|
|
||||||
You need to expose following environment variables in order to run the
|
# Components
|
||||||
installation.
|
|
||||||
|
|
||||||
| name | default | description |
|
⟶ Visit our detailed [Component](docs/getting-started.md) docs.
|
||||||
|---------------------|-----------------------|---------------------------------------------------|
|
|
||||||
| `DOMAIN` | `souvap.cloud` | External reachable domain |
|
|
||||||
| `ISTIO_DOMAIN` | `istio.souvap.cloud` | External reachable domain for Istio Gateway |
|
|
||||||
| `MASTER_PASSWORD` | `sovereign-workplace` | The password that seeds the autogenerated secrets |
|
|
||||||
| `SMTP_PASSWORD` | | Password for SMTP relay gateway |
|
|
||||||
| `TURN_CREDENTIALS` | | Credentials for coturn server |
|
|
||||||
|
|
||||||
Please ensure that you set the DNS records pointing to the loadbalancer/IP for
|
|
||||||
`DOMAIN` and `ISTIO_DOMAIN`.
|
|
||||||
|
|
||||||
If you want inbound email you need to set the MX records that points to the
|
# License
|
||||||
public IP address of the Postfix-pods.
|
|
||||||
|
|
||||||
More details on DNS options including SPF/DKIM and autodiscovery options
|
This project uses the following license: Apache-2.0
|
||||||
are to come...
|
|
||||||
|
|
||||||
### Optional or feature based prerequisites
|
# Copyright
|
||||||
|
Copyright (C) 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
All of these requirements are optional as long as you do not want to use the
|
|
||||||
related feature.
|
|
||||||
|
|
||||||
| Feature | Component(s) | Requirement |
|
|
||||||
|------------------------------|----------------|-----------------------------|
|
|
||||||
| Component Scalability | Various[^1] | Read-Write-Many Provisioner |
|
|
||||||
| Sending outbound emails | Various | SMTP relay/gateway |
|
|
||||||
| S/MIME Support | OX AppSuite8 | PKI / CI |
|
|
||||||
| Improved videoconferencing | Jitsi | STUN/TURN server |
|
|
||||||
|
|
||||||
## CI based deployment
|
|
||||||
|
|
||||||
The project includes a `.gitlab-ci.yml` that allows you to execute the
|
|
||||||
deployment from a Gitlab instance of your choice.
|
|
||||||
|
|
||||||
Please ensure to provide the environment variables listed at
|
|
||||||
[Required input variables](#required-input-variables).
|
|
||||||
|
|
||||||
When starting the pipeline through the Gitlab UI you will be queried for some
|
|
||||||
of the variables plus the following ones:
|
|
||||||
|
|
||||||
- `BASE_DOMAIN`: The base domain the SWP will use. For example: `souvap.cloud`
|
|
||||||
- `NAMESPACE`: Defines into which namespace of your K8s cluster the SWP will be installed
|
|
||||||
- `MASTER_PASSWORD_WEB_VAR`: Overwrites value of `MASTER_PASSWORD`
|
|
||||||
|
|
||||||
Based on your input the following variables will be set:
|
|
||||||
- `DOMAIN` = `NAMESPACE`.`BASE_DOMAIN`
|
|
||||||
- `ISTIO_DOMAIN` = istio.`DOMAIN`
|
|
||||||
- `MASTER_PASSWORD` = `MASTER_PASSWORD_WEB_VAR`. If `MASTER_PASSWORD_WEB_VAR`
|
|
||||||
is not set, the default for `MASTER_PASSWORD` will be used, unless you set
|
|
||||||
`MASTER_PASSWORD` as a masked CI/CD variable in Gitlab to supercede the default.
|
|
||||||
|
|
||||||
You might want to set credential variables in the Gitlab project at
|
|
||||||
`Settings` > `CI/CD` > `Variables`.
|
|
||||||
|
|
||||||
## Local deployment
|
|
||||||
|
|
||||||
Please ensure to provide the environment variables listed at
|
|
||||||
[Required input variables](#required-input-variables).
|
|
||||||
Also, please read [Helmfile](#helmfile) a little below in case of a non default
|
|
||||||
configuration.
|
|
||||||
|
|
||||||
Then go with
|
|
||||||
|
|
||||||
```shell
|
|
||||||
helmfile apply -n <NAMESPACE>
|
|
||||||
```
|
|
||||||
|
|
||||||
and wait a little. After the deployment is finished some bootstrapping is
|
|
||||||
executed which might take some more minutes before you can log in your new
|
|
||||||
instance.
|
|
||||||
|
|
||||||
## Offline deployment
|
|
||||||
|
|
||||||
Before executing a [local deployment](#local-deployment), you can set following
|
|
||||||
environment variables to use your own container image and helm chart registry:
|
|
||||||
|
|
||||||
| name | description |
|
|
||||||
|------------------------------|--------------------------------|
|
|
||||||
| PRIVATE_CHART_REPOSITORY_URL | Your helm chart repository url |
|
|
||||||
| PRIVATE_IMAGE_REGISTRY_URL | Your image registry url |
|
|
||||||
|
|
||||||
## Logging in
|
|
||||||
|
|
||||||
When successfully deployed the SWP, all K8s jobs from the deployment should be
|
|
||||||
in the status `Succeeded` and all pods should be `Running`.
|
|
||||||
|
|
||||||
You should see the portal's login page at `https://portal.<DOMAIN>`.
|
|
||||||
|
|
||||||
Off the shelf you get two accounts with passwords you can look up in the
|
|
||||||
`univention-corporate-container-*` pod environment. You can use a shell on that
|
|
||||||
container or a `kubectl describe`-command to get the credentials.
|
|
||||||
|
|
||||||
| Username / Login | Password environment variable |
|
|
||||||
|--------------------|--------------------------------|
|
|
||||||
| default.user | DEFAULT_ACCOUNT_USER_PASSWORD |
|
|
||||||
| default.admin | DEFAULT_ACCOUNT_ADMIN_PASSWORD |
|
|
||||||
|
|
||||||
If you do not see any tiles in the portal after the login you may want to wait a
|
|
||||||
couple of minutes, as on the initial start some bootstrapping and cache building
|
|
||||||
is done. This blocks the portal entries from showing up.
|
|
||||||
|
|
||||||
# Helmfile
|
|
||||||
|
|
||||||
## Custom Configuration
|
|
||||||
|
|
||||||
### Deployment selection
|
|
||||||
|
|
||||||
By default, all components are deployed. The components of type `Eval` are used
|
|
||||||
for development and evaluation purposes only - they need to be replaced in
|
|
||||||
production deployments. These components are grouped together in the
|
|
||||||
subdirectory `/helmfile/apps/services`.
|
|
||||||
|
|
||||||
| Component | Name | Default | Description | Type |
|
|
||||||
|-----------------------------|-------------------------------------|---------|--------------------------------|------------|
|
|
||||||
| Certificates | `certificates.enabled` | `true` | TLS certificates | Eval |
|
|
||||||
| ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine | Eval |
|
|
||||||
| ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine | Eval |
|
|
||||||
| Collabora | `collabora.enabled` | `true` | Weboffice | Functional |
|
|
||||||
| Dovecot | `dovecot.enabled` | `true` | Mail backend | Functional |
|
|
||||||
| Element | `element.enabled` | `true` | Secure communications platform | Functional |
|
|
||||||
| Intercom Service | `intercom.enabled` | `true` | Cross service data exchange | Functional |
|
|
||||||
| Jitsi | `jitsi.enabled` | `true` | Videoconferencing | Functional |
|
|
||||||
| Keycloak | `keycloak.enabled` | `true` | Identity Provider | Functional |
|
|
||||||
| MariaDB | `mariadb.enabled` | `true` | Database | Eval |
|
|
||||||
| Nextcloud | `nextcloud.enabled` | `true` | File share | Functional |
|
|
||||||
| OpenProject | `openproject.enabled` | `true` | Project management | Functional |
|
|
||||||
| OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware | Functional |
|
|
||||||
| Provisioning | `oxConnector.enabled` | `true` | Backend provisioning | Functional |
|
|
||||||
| Postfix | `postfix.enabled` | `true` | MTA | Eval |
|
|
||||||
| PostgreSQL | `postgresql.enabled` | `true` | Database | Eval |
|
|
||||||
| Redis | `redis.enabled` | `true` | Cache Database | Eval |
|
|
||||||
| Univention Corporate Server | `univentionCorporateServer.enabled` | `true` | Identity Management & Portal | Functional |
|
|
||||||
| XWiki | `xwiki.enabled` | `true` | Knowledgebase | Functional |
|
|
||||||
|
|
||||||
|
|
||||||
#### Cluster capabilities
|
|
||||||
| Capability | Default | Options | Notes |
|
|
||||||
|-------------------------------------|-----------------|-----------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
|
||||||
| `cluster.service.type` | `LoadBalancer` | `ClusterIP`, `NodePort`, `LoadBalancer` | External access to TCP/UDP services. [Additional Information](https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services-service-types) |
|
|
||||||
| `cluster.persistence.readWriteMany` | `false` | `true`, `false` | Enable if ReadWriteMany (RWX) storage is available (f.e. CephFS, NFS, ...). |
|
|
||||||
| `cluster.networking.domain` | `cluster.local` | | Kubernetes cluster domain. |
|
|
||||||
| `cluster.networking.cidr` | `10.0.0.0/8` | | Kubernetes internal network |
|
|
||||||
|
|
||||||
|
|
||||||
#### Databases
|
|
||||||
|
|
||||||
In case you don't got for a develop or evaluation environment you want to point
|
|
||||||
the application to your own database instances.
|
|
||||||
|
|
||||||
| Component | Name | Type | Parameter | Key | Default |
|
|
||||||
|-------------|--------------------|------------|-----------|----------------------------------------|----------------------------|
|
|
||||||
| Element | Synapse | PostgreSQL | | | |
|
|
||||||
| | | | Name | `databases.synapse.name` | `matrix` |
|
|
||||||
| | | | Host | `databases.synapse.host` | `postgresql` |
|
|
||||||
| | | | Port | `databases.synapse.port` | `5432` |
|
|
||||||
| | | | Username | `databases.synapse.username` | `matrix_user` |
|
|
||||||
| | | | Password | `databases.synapse.password` | |
|
|
||||||
| Keycloak | Keycloak | PostgreSQL | | | |
|
|
||||||
| | | | Name | `databases.keycloak.name` | `keycloak` |
|
|
||||||
| | | | Host | `databases.keycloak.host` | `postgresql` |
|
|
||||||
| | | | Port | `databases.keycloak.port` | `5432` |
|
|
||||||
| | | | Username | `databases.keycloak.username` | `keycloak_user` |
|
|
||||||
| | | | Password | `databases.keycloak.password` | |
|
|
||||||
| | Keycloak Extension | PostgreSQL | | | |
|
|
||||||
| | | | Name | `databases.keycloakExtension.name` | `keycloak_extensions` |
|
|
||||||
| | | | Host | `databases.keycloakExtension.host` | `postgresql` |
|
|
||||||
| | | | Port | `databases.keycloakExtension.port` | `5432` |
|
|
||||||
| | | | Username | `databases.keycloakExtension.username` | `keycloak_extensions_user` |
|
|
||||||
| | | | Password | `databases.keycloakExtension.password` | |
|
|
||||||
| Nextcloud | Nextcloud | MariaDB | | | |
|
|
||||||
| | | | Name | `databases.nextcloud.name` | `nextcloud` |
|
|
||||||
| | | | Host | `databases.nextcloud.host` | `mariadb` |
|
|
||||||
| | | | Username | `databases.nextcloud.username` | `nextcloud_user` |
|
|
||||||
| | | | Password | `databases.nextcloud.password` | |
|
|
||||||
| OpenProject | Keycloak | PostgreSQL | | | |
|
|
||||||
| | | | Name | `databases.openproject.name` | `openproject` |
|
|
||||||
| | | | Host | `databases.openproject.host` | `postgresql` |
|
|
||||||
| | | | Port | `databases.openproject.port` | `5432` |
|
|
||||||
| | | | Username | `databases.openproject.username` | `openproject_user` |
|
|
||||||
| | | | Password | `databases.openproject.password` | |
|
|
||||||
| OX Appsuite | OX Appsuite | MariaDB | | | |
|
|
||||||
| | | | Name | `databases.oxAppsuite.name` | `CONFIGDB` |
|
|
||||||
| | | | Host | `databases.oxAppsuite.host` | `mariadb` |
|
|
||||||
| | | | Username | `databases.oxAppsuite.username` | `root` |
|
|
||||||
| | | | Password | `databases.oxAppsuite.password` | |
|
|
||||||
| XWiki | XWiki | MariaDB | | | |
|
|
||||||
| | | | Name | `databases.xwiki.name` | `xwiki` |
|
|
||||||
| | | | Host | `databases.xwiki.host` | `mariadb` |
|
|
||||||
| | | | Username | `databases.xwiki.username` | `xwiki_user` |
|
|
||||||
| | | | Password | `databases.xwiki.password` | |
|
|
||||||
|
|
||||||
### Scaling
|
|
||||||
|
|
||||||
The Replicas of components can be increased, while we still have to look in the
|
|
||||||
actual scalability of the components (see column `Scales at least to 2`).
|
|
||||||
|
|
||||||
| Component | Name | Default | Service | Scaling | Scales at least to 2 |
|
|
||||||
|-------------|------------------------|---------|--------------------|--------------------|----------------------|
|
|
||||||
| ClamAV | `replicas.clamav` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| | `replicas.clamd` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| | `replicas.freshclam` | `1` | :white_check_mark: | :x: | not tested |
|
|
||||||
| | `replicas.icap` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| | `replicas.milter` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| Collabora | `replicas.collabora` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| Dovecot | `replicas.dovecot` | `1` | :white_check_mark: | :x: | not tested |
|
|
||||||
| Element | `replicas.element` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.synapse` | `1` | :white_check_mark: | :x: | not tested |
|
|
||||||
| | `replicas.synapseWeb` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.wellKnown` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
|
||||||
| Jitsi | `replicas.jibri` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| | `replicas.jicofo` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| | `replicas.jitsi ` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| | `replicas.jvb ` | `1` | :white_check_mark: | :x: | :x: |
|
|
||||||
| Keycloak | `replicas.keycloak` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| Nextcloud | `replicas.nextcloud` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| OpenProject | `replicas.openproject` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
| Postfix | `replicas.postfix` | `1` | :white_check_mark: | :x: | not tested |
|
|
||||||
| XWiki | `replicas.xwiki` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
|
||||||
|
|
||||||
|
|
||||||
# Component integration
|
|
||||||
|
|
||||||
## Functional use cases
|
|
||||||
|
|
||||||
### Overview
|
|
||||||
|
|
||||||
Some use cases require inter component integration.
|
|
||||||
|
|
||||||
```mermaid
|
|
||||||
flowchart TD
|
|
||||||
OXAppSuiteFrontend-->|SilentLogin, Filepicker, CentralNavigation|IntercomService
|
|
||||||
IntercomService-->|SilentLogin, TokenExchange|Keycloak
|
|
||||||
IntercomService-->|Filepicker|Nextcloud
|
|
||||||
IntercomService-->|CentralNavigation|Portal
|
|
||||||
OXAppSuiteBackend-->|Filepicker|Nextcloud
|
|
||||||
Nextcloud-->|CentralNavigation|Portal
|
|
||||||
OpenProject-->|CentralNavigation|Portal
|
|
||||||
XWiki-->|CentralNavigation|Portal
|
|
||||||
Nextcloud-->|CentralContacts|OXAppSuiteBackend
|
|
||||||
OXAppSuiteFrontend-->|Filepicker|OXAppSuiteBackend
|
|
||||||
```
|
|
||||||
|
|
||||||
#### Intercom Service (ICS)
|
|
||||||
|
|
||||||
The UCS Intercom Service's role is to enable cross application integration based
|
|
||||||
on browser interaction. Handling authentication when the frontend of an
|
|
||||||
application is using the API from another application is often a challenge.
|
|
||||||
For more details on the ICS please refer to its own [README.md](./helmfile/apps/intercom-service/README.md).
|
|
||||||
|
|
||||||
In order to establish a session with the Intercom Service, the application that
|
|
||||||
wants to use the ICS must initiate a silent login.
|
|
||||||
|
|
||||||
Currently only OX AppSuite is using the frontend based integration, and
|
|
||||||
therefore it is right now the only consumer of the ICS API.
|
|
||||||
|
|
||||||
### Filepicker
|
|
||||||
|
|
||||||
The Nextcloud filepicker which is integrated into the OX AppSuite allows you to
|
|
||||||
add attachments or links to files from and saving attachments to Nextcloud.
|
|
||||||
|
|
||||||
The filepicker is using frontend and backend based integration. Frontend based
|
|
||||||
integration means that OX AppSuite in the browser is communicating with ICS.
|
|
||||||
While using backend based integration, OX AppSuite middleware is communicating
|
|
||||||
with Nextcloud, which is especially used when adding a file to an email or
|
|
||||||
storing a file into Nextcloud.
|
|
||||||
|
|
||||||
### Central Navigation
|
|
||||||
|
|
||||||
Central navigation is based on an API endpoint in the portal that provides the
|
|
||||||
contents of the portal for a user in order to allow components to render the
|
|
||||||
menu showing all available SWP applications for the user.
|
|
||||||
|
|
||||||
### (Read & write) Central contacts
|
|
||||||
|
|
||||||
Open-Xchange App Suite is used to manage contacts within the Sovereign
|
|
||||||
Workplace. There is an API in the AppSuite that is being used by
|
|
||||||
Nextcloud to lookup contacts as well as to create contacts. This is maybe done
|
|
||||||
when a file is shared with a not yet available personal contact.
|
|
||||||
|
|
||||||
# Identity data flows
|
|
||||||
|
|
||||||
An overview of
|
|
||||||
- components that consume the LDAP service. Mostly by using a dedicated LDAP search account.
|
|
||||||
- components using Keycloak as identity provider. If not otherwise denoted based on the OAuth2 / OIDC flows.
|
|
||||||
|
|
||||||
Some components trust others to handle authentication for them.
|
|
||||||
|
|
||||||
```mermaid
|
|
||||||
flowchart TD
|
|
||||||
K[Keycloak]-->L[LDAP]
|
|
||||||
N[Nextcloud]-->L
|
|
||||||
A[OX AppSuite]-->L
|
|
||||||
D[OX Dovecot]-->L
|
|
||||||
P[Portal/Admin]-->L
|
|
||||||
O[OpenProject]-->|in 2023|L
|
|
||||||
X[XWiki]-->|in 2023|L
|
|
||||||
A-->K
|
|
||||||
N-->K
|
|
||||||
D-->K
|
|
||||||
O-->K
|
|
||||||
X-->K
|
|
||||||
P-->|SAML|K
|
|
||||||
E[Element]-->K
|
|
||||||
J[Jitsi]-->K
|
|
||||||
I[IntercomService]-->K
|
|
||||||
C[Collabora]-->N
|
|
||||||
F[Postfix]-->D
|
|
||||||
```
|
|
||||||
|
|
||||||
# Provisioning
|
|
||||||
|
|
||||||
Currently active provisioning is only done for OX AppSuite. The OX-Connector
|
|
||||||
synchronizes creates, modifies and deletes activities for the following objects
|
|
||||||
to the OX AppSuite using the AppSuite's SOAP API:
|
|
||||||
|
|
||||||
- Contexts
|
|
||||||
- Users
|
|
||||||
- Groups
|
|
||||||
- Functional Mailboxes
|
|
||||||
- Resources
|
|
||||||
|
|
||||||
# Component specific documentation
|
|
||||||
|
|
||||||
We want to provide more information per component in separate, component
|
|
||||||
specific `README.md` files. In order to establish a common view on the
|
|
||||||
components we are going to cover various aspects:
|
|
||||||
|
|
||||||
- **Component overview**: Shall provide a quick introduction including the components prerequisites and subcomponents (f.e. pods).
|
|
||||||
- **Resources**: Will contain a link to the components upstream documentation, the helm chart and image locations.
|
|
||||||
- **Operational Capabilities**
|
|
||||||
- **Install**: The components installs within the SWP.
|
|
||||||
- **Restart**: Deleting and restarting pods works seamlessly.
|
|
||||||
- **Update**: Redeploying the component with a different configuration works as expected. The component makes use of the updates configuration afterwards.
|
|
||||||
- **Upgrade**: Component allows to upgrade existing deployments with more current versions of itself.
|
|
||||||
- **Secrets**: The component uses K8s secrets.
|
|
||||||
- **Logging**: Only logging to STDOUT, no logs inside the container.
|
|
||||||
- **Monitoring**: Application provides based on kube-prometheus-stack CRD: ServiceMonitor and PrometheusRule. Optional: Grafana Dashboard.
|
|
||||||
- **Scale**: If supported (as we use community products) the component should be manually scalable. Optional: Autoscaling.
|
|
||||||
- **Network policies**: Deny by default, allow application related traffic.
|
|
||||||
- **Uninstall**: Documented and working complete uninstallation of the component.
|
|
||||||
- **Debugging**: Some helpful information when it comes to debugging a component, e.g. setting log level.
|
|
||||||
|
|
||||||
## Links to component README.mds
|
|
||||||
|
|
||||||
- [Intercom-Service](./helmfile/apps/intercom-service/README.md)
|
|
||||||
|
|
||||||
## Tests
|
|
||||||
|
|
||||||
There is a frontend end-to-end test suite that can get triggered if the
|
|
||||||
deployment is performed via a Gitlab pipeline.
|
|
||||||
|
|
||||||
Currently, the test suite is in progress to be published, so right now it is
|
|
||||||
only usable by project members. But that will change soon, and it could be used
|
|
||||||
to create custom tests and perform them after deployment.
|
|
||||||
|
|
||||||
The deployment pipeline provides a variable named `TESTS_PROJECT_URL` that
|
|
||||||
points to the test pipeline residing in another Gitlab repository. At the end of
|
|
||||||
the deployment the test pipeline is triggered. Tests are just performed for
|
|
||||||
components that have been deployed prior.
|
|
||||||
|
|
||||||
|
|
||||||
# Footnotes
|
|
||||||
|
|
||||||
[^1] Required for scaling components Nextcloud, Dovecot and ClamAV Distributed.
|
|
||||||
|
|||||||
43
docs/ci.md
Normal file
43
docs/ci.md
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
<h1>CI/CD</h1>
|
||||||
|
|
||||||
|
This page will cover openDesk automation via Gitlab CI.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Deployment](#deployment)
|
||||||
|
* [Tests](#tests)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
## Deployment
|
||||||
|
|
||||||
|
The project includes a `.gitlab-ci.yml` that allows you to execute the deployment from a Gitlab instance of your choice.
|
||||||
|
|
||||||
|
|
||||||
|
When starting the pipeline through the Gitlab UI, you will be queried for some variables plus the following ones:
|
||||||
|
|
||||||
|
- `DOMAIN` = The domain to deploy to.
|
||||||
|
- `ISTIO_DOMAIN` = istio.`DOMAIN`
|
||||||
|
- `NAMESPACE`: Defines into which namespace of your K8s cluster the SWP will be installed
|
||||||
|
- `MASTER_PASSWORD_WEB_VAR`: Overwrites value of `MASTER_PASSWORD`
|
||||||
|
|
||||||
|
Based on your input, the following variables will be set:
|
||||||
|
- `MASTER_PASSWORD` = `MASTER_PASSWORD_WEB_VAR`. If `MASTER_PASSWORD_WEB_VAR`
|
||||||
|
is not set, the default for `MASTER_PASSWORD` will be used, unless you set
|
||||||
|
`MASTER_PASSWORD` as a masked CI/CD variable in Gitlab to supersede the default.
|
||||||
|
|
||||||
|
You might want to set credential variables in the Gitlab project at `Settings` > `CI/CD` > `Variables`.
|
||||||
|
|
||||||
|
|
||||||
|
## Tests
|
||||||
|
|
||||||
|
The gitlab-ci pipeline contains a job named `run-tests` that can trigger a test suite pipeline on another gitlab project.
|
||||||
|
The `DEPLOY_`-variables are used to determine which components should be tested.
|
||||||
|
In order for the trigger to work, the variable `TESTS_PROJECT_URL` has to be set on this gitlab project's CI variables
|
||||||
|
that can be found at `Settings` -> `CI/CD` -> `Variables`. The variable should have this format:
|
||||||
|
`<domain of gitlab>/api/v4/projects/<id>`.
|
||||||
|
|
||||||
|
If the branch of the test pipeline is not `main` this can be set with the .gitlab-ci.yml variable
|
||||||
|
`TESTS_BRANCH` while creating a new pipeline.
|
||||||
178
docs/components.md
Normal file
178
docs/components.md
Normal file
@@ -0,0 +1,178 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
<h1>Components</h1>
|
||||||
|
|
||||||
|
This section covers the internal system requirements as well as external service requirements for productive use.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Overview](#overview)
|
||||||
|
* [Component integration](#component-integration)
|
||||||
|
* [Intercom Service (ICS)](#intercom-service-ics)
|
||||||
|
* [Filepicker](#filepicker)
|
||||||
|
* [Central Navigation](#central-navigation)
|
||||||
|
* [(Read & write) Central contacts](#read--write-central-contacts)
|
||||||
|
* [OpenProject Filestore](#openproject-filestore)
|
||||||
|
* [Identity data flows](#identity-data-flows)
|
||||||
|
* [Provisioning](#provisioning)
|
||||||
|
* [Component specific documentation](#component-specific-documentation)
|
||||||
|
* [Links to component docs](#links-to-component-docs)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
## Overview
|
||||||
|
|
||||||
|
openDesk consists out of a variety of open-source projects. Here is a list with the description and type.
|
||||||
|
|
||||||
|
Components of type `Eval` are used for development and evaluation purposes only,
|
||||||
|
they need to be replaced in production deployments.
|
||||||
|
|
||||||
|
| Component | Description | Type |
|
||||||
|
|-----------------------------|--------------------------------|------------|
|
||||||
|
| Certificates | TLS certificates | Eval |
|
||||||
|
| ClamAV (Distributed) | Antivirus engine | Eval |
|
||||||
|
| ClamAV (Simple) | Antivirus engine | Eval |
|
||||||
|
| Collabora | Weboffice | Functional |
|
||||||
|
| CryptPad | Weboffice | Functional |
|
||||||
|
| Dovecot | Mail backend | Functional |
|
||||||
|
| Element | Secure communications platform | Functional |
|
||||||
|
| Intercom Service | Cross service data exchange | Functional |
|
||||||
|
| Jitsi | Videoconferencing | Functional |
|
||||||
|
| Keycloak | Identity Provider | Functional |
|
||||||
|
| MariaDB | Database | Eval |
|
||||||
|
| Memcached | Cache Database | Eval |
|
||||||
|
| MinIO | Object Storage | Eval |
|
||||||
|
| Nextcloud | File share | Functional |
|
||||||
|
| OpenProject | Project management | Functional |
|
||||||
|
| OX Appsuite | Groupware | Functional |
|
||||||
|
| Provisioning | Backend provisioning | Functional |
|
||||||
|
| Postfix | MTA | Eval |
|
||||||
|
| PostgreSQL | Database | Eval |
|
||||||
|
| Redis | Cache Database | Eval |
|
||||||
|
| Univention Corporate Server | Identity Management & Portal | Functional |
|
||||||
|
| Univention Management Stack | Identity Management & Portal | Eval |
|
||||||
|
| XWiki | Knowledgebase | Functional |
|
||||||
|
|
||||||
|
## Component integration
|
||||||
|
|
||||||
|
Some use cases require inter component integration.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
flowchart TD
|
||||||
|
OXAppSuiteFrontend-->|SilentLogin, Filepicker, CentralNavigation|IntercomService
|
||||||
|
IntercomService-->|SilentLogin, TokenExchange|Keycloak
|
||||||
|
IntercomService-->|Filepicker|Nextcloud
|
||||||
|
IntercomService-->|CentralNavigation|Portal
|
||||||
|
OXAppSuiteBackend-->|Filepicker|Nextcloud
|
||||||
|
Nextcloud-->|CentralNavigation|Portal
|
||||||
|
OpenProject-->|CentralNavigation|Portal
|
||||||
|
XWiki-->|CentralNavigation|Portal
|
||||||
|
Nextcloud-->|CentralContacts|OXAppSuiteBackend
|
||||||
|
OXAppSuiteFrontend-->|Filepicker|OXAppSuiteBackend
|
||||||
|
```
|
||||||
|
|
||||||
|
### Intercom Service (ICS)
|
||||||
|
|
||||||
|
The UCS Intercom Service's role is to enable cross-application integration based on browser interaction.
|
||||||
|
Handling authentication when the frontend of an application is using the API from another application is often a
|
||||||
|
challenge.
|
||||||
|
For more details on the ICS please refer to its own [doc](./components/intercom-service.md).
|
||||||
|
|
||||||
|
To establish a session with the Intercom Service, the application that wants to use the ICS must initiate a silent
|
||||||
|
login.
|
||||||
|
|
||||||
|
Currently only OX AppSuite is using the frontend-based integration, and therefore it is right now the only consumer of
|
||||||
|
the ICS API.
|
||||||
|
|
||||||
|
### Filepicker
|
||||||
|
|
||||||
|
The Nextcloud filepicker which is integrated into the OX AppSuite allows you to add attachments or links to files from
|
||||||
|
and saving attachments to Nextcloud.
|
||||||
|
|
||||||
|
The filepicker is using frontend and backend based integration.
|
||||||
|
Frontend-based integration means that OX AppSuite in the browser is communicating with ICS.
|
||||||
|
While using backend-based integration, OX AppSuite middleware is communicating with Nextcloud, which is especially used
|
||||||
|
when adding a file to an email or storing a file into Nextcloud.
|
||||||
|
|
||||||
|
### Central Navigation
|
||||||
|
|
||||||
|
Central navigation is based on an API endpoint in the portal that provides the contents of the portal for a user to
|
||||||
|
allow components to render the menu showing all available SWP applications for the user.
|
||||||
|
|
||||||
|
### (Read & write) Central contacts
|
||||||
|
|
||||||
|
Open-Xchange App Suite is used to manage contacts within openDesk. There is an API in the AppSuite that is being used by
|
||||||
|
Nextcloud to lookup contacts as well as to create contacts. This is maybe done when a file is shared with a not yet
|
||||||
|
available personal contact.
|
||||||
|
|
||||||
|
### OpenProject Filestore
|
||||||
|
|
||||||
|
By default, Nextcloud is a configured option for storing attachments in OpenProject.
|
||||||
|
The Filestore can be enabled on a per-project level in OpenProject's project admin section.
|
||||||
|
|
||||||
|
|
||||||
|
## Identity data flows
|
||||||
|
|
||||||
|
An overview of
|
||||||
|
- components that consume the LDAP service. Mostly by using a dedicated LDAP search account.
|
||||||
|
- components using Keycloak as identity provider. If not otherwise denoted based on the OAuth2 / OIDC flows.
|
||||||
|
|
||||||
|
Some components trust others to handle authentication for them.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
flowchart TD
|
||||||
|
K[Keycloak]-->L[LDAP]
|
||||||
|
N[Nextcloud]-->L
|
||||||
|
O[OpenProject] --> L
|
||||||
|
A[OX AppSuite]-->L
|
||||||
|
D[OX Dovecot]-->L
|
||||||
|
P[Portal/Admin]-->L
|
||||||
|
X[XWiki]-->|in 2023|L
|
||||||
|
A-->K
|
||||||
|
N-->K
|
||||||
|
D-->K
|
||||||
|
O-->K
|
||||||
|
X-->K
|
||||||
|
P-->|SAML|K
|
||||||
|
E[Element]-->K
|
||||||
|
J[Jitsi]-->K
|
||||||
|
I[IntercomService]-->K
|
||||||
|
C[Collabora]-->N
|
||||||
|
R[CryptPad]-->N
|
||||||
|
F[Postfix]-->D
|
||||||
|
```
|
||||||
|
|
||||||
|
## Provisioning
|
||||||
|
|
||||||
|
Currently, active provisioning is only done for OX AppSuite. The OX-Connector is synchronizing, creating, modifying and
|
||||||
|
deleting activities for the following objects to the OX AppSuite using the AppSuite's SOAP API:
|
||||||
|
|
||||||
|
- Contexts
|
||||||
|
- Users
|
||||||
|
- Groups
|
||||||
|
- Functional Mailboxes
|
||||||
|
- Resources
|
||||||
|
|
||||||
|
## Component specific documentation
|
||||||
|
|
||||||
|
We want to provide more information per component in separate, component-specific markdown file.
|
||||||
|
To establish a common view on the components, we are going to cover various aspects:
|
||||||
|
|
||||||
|
- **Component overview**: Shall provide a quick introduction including the components prerequisites and subcomponents (f.e. pods).
|
||||||
|
- **Resources**: Will contain a link to the component upstream documentation, the helm chart and image locations.
|
||||||
|
- **Operational Capabilities**
|
||||||
|
- **Install**: The components install within the SWP.
|
||||||
|
- **Restart**: Deleting and restarting pods works seamlessly.
|
||||||
|
- **Update**: Redeploying the component with a different configuration works as expected. The component makes use of the updates configuration afterwards.
|
||||||
|
- **Upgrade**: Component allows upgrading existing deployments with more current versions of itself.
|
||||||
|
- **Secrets**: The component uses K8s secrets.
|
||||||
|
- **Logging**: Only logging to STDOUT, no logs inside the container.
|
||||||
|
- **Monitoring**: Application provides based on kube-prometheus-stack CRD: ServiceMonitor and PrometheusRule. Optional: Grafana Dashboard.
|
||||||
|
- **Scale**: If supported (as we use community products) the component should be manually scalable. Optional: Autoscaling.
|
||||||
|
- **Network policies**: Deny by default, allow application related traffic.
|
||||||
|
- **Uninstall**: Documented and working complete uninstallation of the component.
|
||||||
|
- **Debugging**: Some helpful information when it comes to debugging a component, e.g. setting log level.
|
||||||
|
|
||||||
|
## Links to component docs
|
||||||
|
|
||||||
|
- [Intercom-Service](./components/intercom-service.md)
|
||||||
101
docs/external-services.md
Normal file
101
docs/external-services.md
Normal file
@@ -0,0 +1,101 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>External services</h1>
|
||||||
|
|
||||||
|
This document will cover the additional configuration to use external services like databases, caches or buckets.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Database](#database)
|
||||||
|
* [Objectstore](#objectstore)
|
||||||
|
* [Cache](#cache)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
## Database
|
||||||
|
|
||||||
|
When deploying this suite to production, you need to configure the applications to use your production grade database
|
||||||
|
service.
|
||||||
|
|
||||||
|
| Component | Name | Type | Parameter | Key | Default |
|
||||||
|
|-------------|--------------------|------------|-----------|----------------------------------------|----------------------------|
|
||||||
|
| Element | Synapse | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.synapse.name` | `matrix` |
|
||||||
|
| | | | Host | `databases.synapse.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.synapse.port` | `5432` |
|
||||||
|
| | | | Username | `databases.synapse.username` | `matrix_user` |
|
||||||
|
| | | | Password | `databases.synapse.password` | |
|
||||||
|
| Keycloak | Keycloak | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.keycloak.name` | `keycloak` |
|
||||||
|
| | | | Host | `databases.keycloak.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.keycloak.port` | `5432` |
|
||||||
|
| | | | Username | `databases.keycloak.username` | `keycloak_user` |
|
||||||
|
| | | | Password | `databases.keycloak.password` | |
|
||||||
|
| | Keycloak Extension | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.keycloakExtension.name` | `keycloak_extensions` |
|
||||||
|
| | | | Host | `databases.keycloakExtension.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.keycloakExtension.port` | `5432` |
|
||||||
|
| | | | Username | `databases.keycloakExtension.username` | `keycloak_extensions_user` |
|
||||||
|
| | | | Password | `databases.keycloakExtension.password` | |
|
||||||
|
| UMS | Notifications API | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.notificationsApi.name` | `notificationsapi` |
|
||||||
|
| | | | Host | `databases.notificationsApi.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.notificationsApi.port` | `5432` |
|
||||||
|
| | | | Username | `databases.notificationsApi.username` | `notificationsapi_user` |
|
||||||
|
| | | | Password | `databases.notificationsApi.password` | |
|
||||||
|
| Nextcloud | Nextcloud | MariaDB | | | |
|
||||||
|
| | | | Name | `databases.nextcloud.name` | `nextcloud` |
|
||||||
|
| | | | Host | `databases.nextcloud.host` | `mariadb` |
|
||||||
|
| | | | Username | `databases.nextcloud.username` | `nextcloud_user` |
|
||||||
|
| | | | Password | `databases.nextcloud.password` | |
|
||||||
|
| OpenProject | OpenProject | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.openproject.name` | `openproject` |
|
||||||
|
| | | | Host | `databases.openproject.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.openproject.port` | `5432` |
|
||||||
|
| | | | Username | `databases.openproject.username` | `openproject_user` |
|
||||||
|
| | | | Password | `databases.openproject.password` | |
|
||||||
|
| OX Appsuite | OX Appsuite | MariaDB | | | |
|
||||||
|
| | | | Name | `databases.oxAppsuite.name` | `CONFIGDB` |
|
||||||
|
| | | | Host | `databases.oxAppsuite.host` | `mariadb` |
|
||||||
|
| | | | Username | `databases.oxAppsuite.username` | `root` |
|
||||||
|
| | | | Password | `databases.oxAppsuite.password` | |
|
||||||
|
| XWiki | XWiki | MariaDB | | | |
|
||||||
|
| | | | Name | `databases.xwiki.name` | `xwiki` |
|
||||||
|
| | | | Host | `databases.xwiki.host` | `mariadb` |
|
||||||
|
| | | | Username | `databases.xwiki.username` | `xwiki_user` |
|
||||||
|
| | | | Password | `databases.xwiki.password` | |
|
||||||
|
|
||||||
|
## Objectstore
|
||||||
|
|
||||||
|
When deploying this suite to production, you need to configure the applications to use your production grade objectstore
|
||||||
|
service.
|
||||||
|
|
||||||
|
| Component | Name | Parameter | Key | Default |
|
||||||
|
|-------------|-------------|-----------------|------------------------------------------|--------------------|
|
||||||
|
| OpenProject | OpenProject | | | |
|
||||||
|
| | | Backend | `objectstores.openproject.backend` | `minio` |
|
||||||
|
| | | Bucket | `objectstores.openproject.bucket` | `openproject` |
|
||||||
|
| | | Endpoint | `objectstores.openproject.endpoint` | |
|
||||||
|
| | | Provider | `objectstores.openproject.provider` | `AWS` |
|
||||||
|
| | | Region | `objectstores.openproject.region` | |
|
||||||
|
| | | Secret | `objectstores.openproject.secret` | |
|
||||||
|
| | | Username | `objectstores.openproject.username` | `openproject_user` |
|
||||||
|
| | | Use IAM profile | `objectstores.openproject.useIAMProfile` | |
|
||||||
|
|
||||||
|
## Cache
|
||||||
|
|
||||||
|
When deploying this suite to production, you need to configure the applications to use your production grade cache
|
||||||
|
service.
|
||||||
|
|
||||||
|
| Component | Name | Type | Parameter | Key | Default |
|
||||||
|
|------------------|------------------|-----------|-----------|------------------------------|------------------|
|
||||||
|
| Intercom Service | Intercom Service | Redis | | | |
|
||||||
|
| | | | Host | `cache.intercomService.host` | `redis-headless` |
|
||||||
|
| | | | Port | `cache.intercomService.port` | `6379` |
|
||||||
|
| Nextcloud | Nextcloud | Redis | | | |
|
||||||
|
| | | | Host | `cache.nextcloud.host` | `redis-headless` |
|
||||||
|
| | | | Port | `cache.nextcloud.port` | `6379` |
|
||||||
|
| OpenProject | OpenProject | Memcached | | | |
|
||||||
|
| | | | Host | `cache.openproject.host` | `memcached` |
|
||||||
|
| | | | Port | `cache.openproject.port` | `11211` |
|
||||||
412
docs/getting-started.md
Normal file
412
docs/getting-started.md
Normal file
@@ -0,0 +1,412 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Getting stated</h1>
|
||||||
|
|
||||||
|
This documentation should enable you to create your own evaluation instance of openDesk on your Kubernetes cluster.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Requirements](#requirements)
|
||||||
|
* [Customize environment](#customize-environment)
|
||||||
|
* [Domain](#domain)
|
||||||
|
* [Apps](#apps)
|
||||||
|
* [Private OCI registry](#private-oci-registry)
|
||||||
|
* [Private Helm registry](#private-helm-registry)
|
||||||
|
* [Cluster capabilities](#cluster-capabilities)
|
||||||
|
* [Service](#service)
|
||||||
|
* [Networking](#networking)
|
||||||
|
* [Ingress](#ingress)
|
||||||
|
* [Container runtime](#container-runtime)
|
||||||
|
* [Volumes](#volumes)
|
||||||
|
* [Connectivity](#connectivity)
|
||||||
|
* [Mail/SMTP configuration](#mailsmtp-configuration)
|
||||||
|
* [TURN configuration](#turn-configuration)
|
||||||
|
* [Certificate issuer](#certificate-issuer)
|
||||||
|
* [Password seed](#password-seed)
|
||||||
|
* [Install](#install)
|
||||||
|
* [Install single app](#install-single-app)
|
||||||
|
* [Install single release/chart](#install-single-releasechart)
|
||||||
|
* [Access deployment](#access-deployment)
|
||||||
|
* [Uninstall](#uninstall)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
Thanks for looking into the openDesk Getting started guide. This documents covers essentials configuration steps to
|
||||||
|
deploy openDesk onto your kubernetes infrastructure.
|
||||||
|
|
||||||
|
## Requirements
|
||||||
|
|
||||||
|
Detailed system requirements are covered on [requirements](requirements.md) page.
|
||||||
|
|
||||||
|
## Customize environment
|
||||||
|
|
||||||
|
Before deploying openDesk, you have to configure the deployment to suit your environment.
|
||||||
|
To keep your deployment up to date, we recommend customizing in `dev`, `test` or `prod` and not in `default` environment
|
||||||
|
files.
|
||||||
|
|
||||||
|
> All configuration options and their default values can be found in files at `helmfile/environments/default/`
|
||||||
|
|
||||||
|
For the following guide, we will use `dev` as environment, where variables can be set in
|
||||||
|
`helmfile/environments/dev/values.yaml`.
|
||||||
|
|
||||||
|
### Domain
|
||||||
|
|
||||||
|
The deployment is designed to deploy each app under a subdomains. For your convenience, we recommend to create a
|
||||||
|
`*.domain.tld` A-Record to your cluster ingress controller, otherwise you need to create an A-Record for each subdomain.
|
||||||
|
|
||||||
|
A list of all subdomains can be found in `helmfile/environments/default/global.yaml`.
|
||||||
|
|
||||||
|
All subdomains can be customized. For example, _Nextcloud_ can be changed to `files.domain.tld` in `dev` environment:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
global:
|
||||||
|
hosts:
|
||||||
|
nextcloud: "files"
|
||||||
|
```
|
||||||
|
|
||||||
|
The domain have to be set either via `dev` environment
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
global:
|
||||||
|
domain: "my.open.desk"
|
||||||
|
istio:
|
||||||
|
domain: "istio.my.open.desk"
|
||||||
|
```
|
||||||
|
|
||||||
|
or via environment variable
|
||||||
|
|
||||||
|
```shell
|
||||||
|
export DOMAIN=my.open.desk
|
||||||
|
export ISTIO_DOMAIN=istio.my.open.desk
|
||||||
|
```
|
||||||
|
|
||||||
|
When you configure each subdomain individually, you can set `global.domain` and `istio.domain` to the same value.
|
||||||
|
|
||||||
|
Istio is only used for Open-Xchange Appsuite 8, when you don't want to install it, you can disable Istio:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
istio:
|
||||||
|
enabled: false
|
||||||
|
oxAppsuite:
|
||||||
|
enabled: false
|
||||||
|
```
|
||||||
|
|
||||||
|
### Apps
|
||||||
|
|
||||||
|
All available apps and their default value can be found in `helmfile/environments/default/workplace.yaml`.
|
||||||
|
|
||||||
|
| Component | Name | Default | Description |
|
||||||
|
|-----------------------------|-------------------------------------|---------|--------------------------------|
|
||||||
|
| Certificates | `certificates.enabled` | `true` | TLS certificates |
|
||||||
|
| ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine |
|
||||||
|
| ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine |
|
||||||
|
| Collabora | `collabora.enabled` | `true` | Weboffice |
|
||||||
|
| CryptPad | `cryptpad.enabled` | `true` | Weboffice |
|
||||||
|
| Dovecot | `dovecot.enabled` | `true` | Mail backend |
|
||||||
|
| Element | `element.enabled` | `true` | Secure communications platform |
|
||||||
|
| Intercom Service | `intercom.enabled` | `true` | Cross service data exchange |
|
||||||
|
| Jitsi | `jitsi.enabled` | `true` | Videoconferencing |
|
||||||
|
| Keycloak | `keycloak.enabled` | `true` | Identity Provider |
|
||||||
|
| MariaDB | `mariadb.enabled` | `true` | Database |
|
||||||
|
| Memcached | `memcached.enabled` | `true` | Cache Database |
|
||||||
|
| MinIO | `minio.enabled` | `true` | Object Storage |
|
||||||
|
| Nextcloud | `nextcloud.enabled` | `true` | File share |
|
||||||
|
| OpenProject | `openproject.enabled` | `true` | Project management |
|
||||||
|
| OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware |
|
||||||
|
| Provisioning | `oxConnector.enabled` | `true` | Backend provisioning |
|
||||||
|
| Postfix | `postfix.enabled` | `true` | MTA |
|
||||||
|
| PostgreSQL | `postgresql.enabled` | `true` | Database |
|
||||||
|
| Redis | `redis.enabled` | `true` | Cache Database |
|
||||||
|
| Univention Corporate Server | `univentionCorporateServer.enabled` | `true` | Identity Management & Portal |
|
||||||
|
| Univention Management Stack | `univentionManagementStack.enabled` | `false` | Identity Management & Portal |
|
||||||
|
| XWiki | `xwiki.enabled` | `true` | Knowledgebase |
|
||||||
|
|
||||||
|
Exemplary, Jitsi can be disabled like:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
jitsi:
|
||||||
|
enabled: false
|
||||||
|
```
|
||||||
|
|
||||||
|
### Private OCI registry
|
||||||
|
|
||||||
|
By default, all OCI artifacts are proxied via the project's container registry, which should get replaced soon by the
|
||||||
|
OCI registries provided by Open CoDE.
|
||||||
|
|
||||||
|
You also can set your own registry by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
global:
|
||||||
|
imageRegistry: "external-registry.souvap-univention.de/sovereign-workplace"
|
||||||
|
```
|
||||||
|
|
||||||
|
or via environments variable:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
export PRIVATE_IMAGE_REGISTRY_URL=external-registry.souvap-univention.de/sovereign-workplace
|
||||||
|
```
|
||||||
|
|
||||||
|
If authentication is required, you can reference imagePullSecrets as following:
|
||||||
|
```yaml
|
||||||
|
global:
|
||||||
|
imagePullSecrets:
|
||||||
|
- "external-registry"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Private Helm registry
|
||||||
|
|
||||||
|
Some apps use Chart Museum style helm registries. You can use your own registry by setting this environment variable:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
export PRIVATE_CHART_REPOSITORY_URL=charts.open.desk
|
||||||
|
```
|
||||||
|
|
||||||
|
### Cluster capabilities
|
||||||
|
|
||||||
|
#### Service
|
||||||
|
|
||||||
|
Some apps, like Jitsi or Dovecot, require HTTP and external TCP connections.
|
||||||
|
These apps create a Kubernetes service object.
|
||||||
|
You can configure, whether `NodePort` (for on-premise), `LoadBalancer` (for cloud) or `ClusterIP` (to disable) should be
|
||||||
|
used:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
service:
|
||||||
|
type: "NodePort"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Networking
|
||||||
|
|
||||||
|
If your cluster has not the default `cluster.local` domain configured, you need to provide the domain via:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
networking:
|
||||||
|
domain: "acme.internal"
|
||||||
|
```
|
||||||
|
|
||||||
|
If your cluster has not the default `10.0.0.0/8` CIDR configured, you need to provide the CIDR via:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
networking:
|
||||||
|
cidr: "127.0.0.0/8"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Ingress
|
||||||
|
|
||||||
|
By default, the `ingressClassName` is empty to choose your default ingress controller, you may want to customize it by
|
||||||
|
setting:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
ingress:
|
||||||
|
ingressClassName: "cilium"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Container runtime
|
||||||
|
|
||||||
|
Some apps require specific configuration for container runtimes. You can set your container runtime like `cri-o`,
|
||||||
|
`containerd` or `docker` by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
container:
|
||||||
|
engine: "containerd"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Volumes
|
||||||
|
|
||||||
|
When your cluster has a `ReadWriteMany` volume provisioner, you can benefit from distributed or scaling of apps. By
|
||||||
|
default, only `ReadWriteOnce` is enabled. To enable `ReadWriteMany` you can set:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
persistence:
|
||||||
|
readWriteMany: true
|
||||||
|
```
|
||||||
|
|
||||||
|
The **StorageClass** can be set by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
persistence:
|
||||||
|
storageClassNames:
|
||||||
|
RWX: "my-read-write-many-class"
|
||||||
|
RWO: "my-read-write-once-class"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Connectivity
|
||||||
|
|
||||||
|
#### Mail/SMTP configuration
|
||||||
|
|
||||||
|
To use the full potential of the openDesk, you need to set up an SMTP Smarthost/Relay which allows to send emails from
|
||||||
|
the whole subdomain.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
smtp:
|
||||||
|
host: "mail.open.desk"
|
||||||
|
username: "openDesk"
|
||||||
|
password: "secret"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### TURN configuration
|
||||||
|
|
||||||
|
Some components (Jitsi, Element) use for direct communication a TURN server. You can configure your own TURN server with
|
||||||
|
these options:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
turn:
|
||||||
|
transport: "udp" # or tcp
|
||||||
|
credentials: "secret"
|
||||||
|
server:
|
||||||
|
host: "turn.open.desk"
|
||||||
|
port: "3478"
|
||||||
|
tls:
|
||||||
|
host: "turns.open.desk"
|
||||||
|
port: "5349"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Certificate issuer
|
||||||
|
|
||||||
|
As mentioned in [requirements](requirements.md#certificate-management) you can provide your own valid certificate. A TLS
|
||||||
|
secret with name `opendesk-certificates-tls` needs to be present in application namespace. For deployment, you can
|
||||||
|
disable `Certificate` resource creation by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
certificates:
|
||||||
|
enabled: false
|
||||||
|
```
|
||||||
|
|
||||||
|
If you want to leverage the `cert-manager.io` to handle certificates, like `Let's encrypt`, you need to provide the
|
||||||
|
configured cluster issuer:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
certificate:
|
||||||
|
issuerRef:
|
||||||
|
name: "letsencrypt-prod"
|
||||||
|
```
|
||||||
|
|
||||||
|
Additionally, it is possible to request wildcard certificates by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
certificate:
|
||||||
|
wildcard: true
|
||||||
|
```
|
||||||
|
|
||||||
|
### Password seed
|
||||||
|
|
||||||
|
All secrets are generated from a single master password via Master Password (algorithm).
|
||||||
|
To prevent others from using your openDesk instance, we highly recommend setting an individual master password via:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
export MASTER_PASSWORD="openDesk"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Install
|
||||||
|
|
||||||
|
After setting your environment specific values in `dev` environment, you can start deployment by:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile apply -e dev -n <NAMESPACE> [-l <label>] [--suppress-diff]
|
||||||
|
```
|
||||||
|
|
||||||
|
**Arguments:**
|
||||||
|
|
||||||
|
- `-e <env>`: Environment name out of `default`, `dev`, `test`, `prod`
|
||||||
|
- `-n <namespace>`: Kubernetes namespace
|
||||||
|
- `-l <label>`: Label selector
|
||||||
|
- `--suppress-diff`: Disable diff printing
|
||||||
|
|
||||||
|
### Install single app
|
||||||
|
|
||||||
|
You can also install or upgrade only a single app like Collabora, either by label selector:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile apply -e dev -n <NAMESPACE> -l component=collabora
|
||||||
|
```
|
||||||
|
|
||||||
|
or by switching into the apps' directory (faster):
|
||||||
|
|
||||||
|
```shell
|
||||||
|
cd helmfile/apps/collabora
|
||||||
|
helmfile apply -e dev -n <NAMESPACE>
|
||||||
|
```
|
||||||
|
|
||||||
|
### Install single release/chart
|
||||||
|
|
||||||
|
Instead of iteration through all services, you can also deploy a single release like mariadb by:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile apply -e dev -n <NAMESPACE> -l name=mariadb
|
||||||
|
```
|
||||||
|
|
||||||
|
## Access deployment
|
||||||
|
|
||||||
|
When all apps are successfully deployed and pod status' went to `Running` or `Succeeded`, you can navigate to
|
||||||
|
|
||||||
|
```text
|
||||||
|
https://portal.domain.tld
|
||||||
|
```
|
||||||
|
|
||||||
|
If you change the subdomain of `univentionCorporateServer` or `univentionManagementStack`, you need to replace `portal`
|
||||||
|
by your specified subdomain.
|
||||||
|
|
||||||
|
**Credentials:**
|
||||||
|
|
||||||
|
```shell
|
||||||
|
# Replace with your namespace
|
||||||
|
NAMESPACE=your-namespace
|
||||||
|
|
||||||
|
# Get UCS container, which contains passwords as env var.
|
||||||
|
CONTAINER=$(kubectl -n ${NAMESPACE} get po -l app.kubernetes.io/name=univention-corporate-container -o jsonpath='{.items[0].metadata.name}')
|
||||||
|
# $ kubectl -n ${NAMESPACE} get po -l app.kubernetes.io/name=univention-corporate-container
|
||||||
|
#
|
||||||
|
# NAME READY STATUS RESTARTS AGE
|
||||||
|
# univention-corporate-container-8665c6f8b7-nlhc6 1/1 Running 0 10m
|
||||||
|
|
||||||
|
|
||||||
|
# Password of `default.user`
|
||||||
|
kubectl -n ${NAMESPACE} get po ${CONTAINER} -o=jsonpath='{.spec.containers[0].env[?(@.name=="DEFAULT_ACCOUNT_USER_PASSWORD")].value}'
|
||||||
|
# 40615..............................e9e2f
|
||||||
|
|
||||||
|
# Password of `default.admin`
|
||||||
|
kubectl -n ${NAMESPACE} get po ${CONTAINER} -o=jsonpath='{.spec.containers[0].env[?(@.name=="DEFAULT_ACCOUNT_ADMIN_PASSWORD")].value}'
|
||||||
|
# bdbbb..............................04db6
|
||||||
|
```
|
||||||
|
|
||||||
|
Now you can log in with obtained credentials:
|
||||||
|
|
||||||
|
| Username | Password | Description |
|
||||||
|
|-----------------|--------------------------------------------|------------------|
|
||||||
|
| `default.user` | `40615..............................e9e2f` | Application user |
|
||||||
|
| `default.admin` | `bdbbb..............................04db6` | Administrator |
|
||||||
|
|
||||||
|
## Uninstall
|
||||||
|
|
||||||
|
You can uninstall the deployment by:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile destroy -n <NAMESPACE>
|
||||||
|
```
|
||||||
|
|
||||||
|
> **Note**
|
||||||
|
> Not all Jobs, PersistentVolumeClaims or Certificates are deleted; you have to delete them manually
|
||||||
|
|
||||||
|
**'Sledgehammer destroy'** - for fast development turn-around times (at your own risk):
|
||||||
|
|
||||||
|
```shell
|
||||||
|
NAMESPACE=your-namespace
|
||||||
|
|
||||||
|
# Uninstall all Helm charts
|
||||||
|
for OPENDESK_RELEASE in $(helm ls -n ${NAMESPACE} -aq); do
|
||||||
|
helm uninstall -n ${NAMESPACE} ${OPENDESK_RELEASE};
|
||||||
|
done
|
||||||
|
|
||||||
|
# Delete leftover resources
|
||||||
|
kubectl delete pvc --all --namespace ${NAMESPACE};
|
||||||
|
kubectl delete jobs --all --namespace ${NAMESPACE};
|
||||||
|
```
|
||||||
|
|
||||||
|
> **Warning**
|
||||||
|
> Without specifying or empty `--namespace` flag, cluster-wide components get deleted!
|
||||||
71
docs/monitoring.md
Normal file
71
docs/monitoring.md
Normal file
@@ -0,0 +1,71 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Monitoring</h1>
|
||||||
|
|
||||||
|
This document will cover how you can enable observability with Prometheus based monitoring and Grafana dashboards, as
|
||||||
|
well as the overall status of monitoring integration.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Technology](#technology)
|
||||||
|
* [Defaults](#defaults)
|
||||||
|
* [Metrics](#metrics)
|
||||||
|
* [Alerts](#alerts)
|
||||||
|
* [Dashboards for Grafana](#dashboards-for-grafana)
|
||||||
|
* [Components](#components)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
## Technology
|
||||||
|
|
||||||
|
We provide integration into the Prometheus based monitoring.
|
||||||
|
Together with
|
||||||
|
[kube-prometheus-stack](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack) you
|
||||||
|
easily leverage the full potential of open-source cloud-native observability stack.
|
||||||
|
|
||||||
|
Before enabling the following options, you need to install the respective CRDs from the kube-prometheus-stack
|
||||||
|
repository or prometheus operator.
|
||||||
|
|
||||||
|
## Defaults
|
||||||
|
|
||||||
|
All configurable options and their defaults can be found in
|
||||||
|
[`monitoring.yaml`](../helmfile/environments/default/monitoring.yaml).
|
||||||
|
|
||||||
|
## Metrics
|
||||||
|
|
||||||
|
To deploy podMonitor and serviceMonitor custom resources, enable it by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
prometheus:
|
||||||
|
serviceMonitors:
|
||||||
|
enabled: true
|
||||||
|
podMonitors:
|
||||||
|
enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
## Alerts
|
||||||
|
|
||||||
|
Some helm-charts provide a default set of prometheusRules for alerting, enable it by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
prometheus:
|
||||||
|
prometheusRules:
|
||||||
|
enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
## Dashboards for Grafana
|
||||||
|
|
||||||
|
To deploy optional ConfigMaps with Grafana dashboards, enable it by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
grafana:
|
||||||
|
dashboards:
|
||||||
|
enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
## Components
|
||||||
|
| Component | Metrics (pod- or serviceMonitor) | Alerts (prometheusRule) | Dashboard (Grafana) |
|
||||||
|
|:----------|-----------------------------------|-------------------------|---------------------|
|
||||||
|
| Collabora | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Nextcloud | :white_check_mark: | :x: | :x: |
|
||||||
105
docs/requirements.md
Normal file
105
docs/requirements.md
Normal file
@@ -0,0 +1,105 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
<h1>Requirements</h1>
|
||||||
|
|
||||||
|
This section covers the internal system requirements as well as external service requirements for productive use.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [TL;DR;](#tldr)
|
||||||
|
* [Hardware](#hardware)
|
||||||
|
* [Kubernetes](#kubernetes)
|
||||||
|
* [Ingress controller](#ingress-controller)
|
||||||
|
* [Volume provisioner](#volume-provisioner)
|
||||||
|
* [Certificate management](#certificate-management)
|
||||||
|
* [External services](#external-services)
|
||||||
|
* [Deployment](#deployment)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
## TL;DR;
|
||||||
|
openDesk is a Kubernetes only solution and requires an existing Kubernetes (K8s) cluster.
|
||||||
|
|
||||||
|
- K8s cluster >= 1.24, [CNCF Certified Kubernetes Distro](https://www.cncf.io/certification/software-conformance/)
|
||||||
|
- Domain and DNS Service
|
||||||
|
- Ingress controller (supported are nginx-ingress, HAProxy)
|
||||||
|
- [Helm](https://helm.sh/) >= v3.9.0
|
||||||
|
- [Helmfile](https://helmfile.readthedocs.io/en/latest/) >= **v0.157.0**
|
||||||
|
- [HelmDiff](https://github.com/databus23/helm-diff) >= 3.6.0
|
||||||
|
- Volume provisioner supporting RWO (read-write-once)
|
||||||
|
- Certificate handling with [cert-manager](https://cert-manager.io/)
|
||||||
|
- [Istio](https://istio.io/) is currently required to deploy and operate OX AppSuite8
|
||||||
|
|
||||||
|
## Hardware
|
||||||
|
|
||||||
|
The following minimal requirements are thought for initial evaluation deployment:
|
||||||
|
|
||||||
|
| Spec | Value |
|
||||||
|
|------|------------------------------------------------------|
|
||||||
|
| CPU | 8 Cores of x64 or x86 CPU (ARM is not supported yet) |
|
||||||
|
| RAM | 16 GB, recommended 32 GB |
|
||||||
|
| Disk | HDD or SSD, >10 GB |
|
||||||
|
|
||||||
|
## Kubernetes
|
||||||
|
|
||||||
|
Any self-hosted or managed K8s cluster >= 1.24 listed in
|
||||||
|
[CNCF Certified Kubernetes Distros](https://www.cncf.io/certification/software-conformance/) should be supported.
|
||||||
|
|
||||||
|
The deployment is tested against [kubespray](https://github.com/kubernetes-sigs/kubespray) based clusters.
|
||||||
|
|
||||||
|
> **Note:** The deployment is not tested against OpenShift.
|
||||||
|
|
||||||
|
## Ingress controller
|
||||||
|
|
||||||
|
The deployment is intended to use only over HTTPS via a configured FQDN, therefor it is required to have a proper
|
||||||
|
configured ingress controller deployed.
|
||||||
|
|
||||||
|
**Maintained controllers:**
|
||||||
|
- [NGINX Ingress Controller](https://github.com/nginxinc/kubernetes-ingress)
|
||||||
|
- [HAProxy Kubernetes Ingress Controller](https://github.com/haproxytech/kubernetes-ingress)
|
||||||
|
|
||||||
|
**Community Supported:**
|
||||||
|
- [Ingress NGINX Controller](https://github.com/kubernetes/ingress-nginx)
|
||||||
|
|
||||||
|
When you want to use Open-Xchange Appsuite 8, you need to deploy and configure additionally [Istio](https://istio.io/)
|
||||||
|
|
||||||
|
## Volume provisioner
|
||||||
|
|
||||||
|
Initial evaluation deployment requires a `ReadWriteOnce` volume provisioner. For local deployment a local- or hostPath-
|
||||||
|
provisioner is sufficient.
|
||||||
|
|
||||||
|
> **Note:** Some components requiring a `ReadWriteMany` volume provisioner for distributed mode or scaling.
|
||||||
|
|
||||||
|
## Certificate management
|
||||||
|
|
||||||
|
This deployment leverages [cert-manager](https://cert-manager.io/) to generate valid certificates. This is **optional**,
|
||||||
|
but a secret containing a valid TLS certificate is required.
|
||||||
|
|
||||||
|
Only `Certificate` resources will be deployed, the `cert-manager` including its CRD must be installed prior to this or
|
||||||
|
openDesk certificate management disabled.
|
||||||
|
|
||||||
|
## External services
|
||||||
|
|
||||||
|
Evaluation the openDesk deployment does not require any external service to start, but features may be limited.
|
||||||
|
|
||||||
|
|
||||||
|
| Group | Type | Version | Tested against |
|
||||||
|
|----------|---------------------|---------|-----------------------|
|
||||||
|
| Cache | Memached | `1.6.x` | Memached |
|
||||||
|
| | Redis | `7.x.x` | Redis |
|
||||||
|
| Database | MariaDB | `10.x` | MariaDB |
|
||||||
|
| | PostgreSQL | `15.x` | PostgreSQL |
|
||||||
|
| Mail | Mail Transfer Agent | | Postfix |
|
||||||
|
| | PKI/CI (SMIME) | | |
|
||||||
|
| Security | AntiVirus/ICAP | | ClamAV |
|
||||||
|
| Storage | K8s ReadWriteOnce | | Ceph / Cloud specific |
|
||||||
|
| | K8s ReadWriteMany | | Ceph / NFS |
|
||||||
|
| | Object Storage | | MinIO |
|
||||||
|
| Voice | TURN | | Coturn |
|
||||||
|
|
||||||
|
## Deployment
|
||||||
|
|
||||||
|
The deployment of each individual component is [Helm](https://helm.sh/) based. The 35+ Helm charts are configured and
|
||||||
|
templated via [Helmfile](https://helmfile.readthedocs.io/en/latest/) to provide a streamlined deployment experience.
|
||||||
|
|
||||||
|
Helmfile requires [HelmDiff](https://github.com/databus23/helm-diff) to compare desired against deployed state.
|
||||||
52
docs/scaling.md
Normal file
52
docs/scaling.md
Normal file
@@ -0,0 +1,52 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Scaling</h1>
|
||||||
|
|
||||||
|
This document should cover the abilities to scale apps.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Replicas](#replicas)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
## Replicas
|
||||||
|
|
||||||
|
The Replicas can be increased of almost any component, but is only effective for high-availability or load-balancing for
|
||||||
|
apps with a check-mark in `Scaling (effective)` column.
|
||||||
|
|
||||||
|
Verified positive effects are marke with a check-mark in `Scaling (verified)` column, apps which are not yet tested are
|
||||||
|
marked with a gear.
|
||||||
|
|
||||||
|
|
||||||
|
| Component | Name | Scaling (effective) | Scaling (verified) |
|
||||||
|
|-------------|------------------------------------------|:-------------------:|:------------------:|
|
||||||
|
| ClamAV | `replicas.clamav` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.clamd` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.freshclam` | :x: | :x: |
|
||||||
|
| | `replicas.icap` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.milter` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Collabora | `replicas.collabora` | :white_check_mark: | :gear: |
|
||||||
|
| CryptPad | `replicas.cryptpad` | :white_check_mark: | :gear: |
|
||||||
|
| Dovecot | `replicas.dovecot` | :x: | :gear: |
|
||||||
|
| Element | `replicas.element` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.matrixNeoBoardWidget` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.matrixNeoChoiceWidget` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.matrixNeoDateFixBot` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.matrixNeoDateFixWidget` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.matrixUserVerificationService` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.synapse` | :x: | :gear: |
|
||||||
|
| | `replicas.synapseWeb` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.wellKnown` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Jitsi | `replicas.jibri` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.jicofo` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.jitsi ` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.jitsiKeycloakAdapter` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.jvb ` | :x: | :x: |
|
||||||
|
| Keycloak | `replicas.keycloak` | :white_check_mark: | :gear: |
|
||||||
|
| Minio | `replicas.minioDistributed` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Nextcloud | `replicas.nextcloud` | :white_check_mark: | :gear: |
|
||||||
|
| OpenProject | `replicas.openproject` | :white_check_mark: | :gear: |
|
||||||
|
| Postfix | `replicas.postfix` | :x: | :gear: |
|
||||||
|
| XWiki | `replicas.xwiki` | :white_check_mark: | :gear: |
|
||||||
121
docs/security.md
Normal file
121
docs/security.md
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Security</h1>
|
||||||
|
|
||||||
|
This document should cover the current status of security measurements.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Helm Chart Trust Chain](#helm-chart-trust-chain)
|
||||||
|
* [Kubernetes Security Enforcements](#kubernetes-security-enforcements)
|
||||||
|
* [NetworkPolicies](#networkpolicies)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
## Helm Chart Trust Chain
|
||||||
|
|
||||||
|
Helm Charts which are released via openDesk CI/CD process are always signed. The public GPG keys are present in
|
||||||
|
`pubkey.gpg` file and are validated during helmfile installation.
|
||||||
|
|
||||||
|
| Repository | OCI | Verifiable |
|
||||||
|
|--------------------------------------|:---:|:------------------:|
|
||||||
|
| bitnami-repo (openDesk build) | yes | :white_check_mark: |
|
||||||
|
| clamav-repo | yes | :white_check_mark: |
|
||||||
|
| collabora-online-repo | no | :x: |
|
||||||
|
| cryptpad-online-repo | no | :x: |
|
||||||
|
| intercom-service-repo | yes | :white_check_mark: |
|
||||||
|
| istio-resources-repo | yes | :white_check_mark: |
|
||||||
|
| jitsi-repo | yes | :white_check_mark: |
|
||||||
|
| keycloak-extensions-repo | no | :x: |
|
||||||
|
| keycloak-theme-repo | yes | :white_check_mark: |
|
||||||
|
| mariadb-repo | yes | :white_check_mark: |
|
||||||
|
| nextcloud-repo | no | :x: |
|
||||||
|
| opendesk-certificates-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-dovecot-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-element-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-keycloak-bootstrap-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-nextcloud-bootstrap-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-open-xchange-bootstrap-repo | yes | :white_check_mark: |
|
||||||
|
| openproject-repo | no | :x: |
|
||||||
|
| openxchange-repo | yes | :x: |
|
||||||
|
| ox-connector-repo | no | :x: |
|
||||||
|
| postfix-repo | yes | :white_check_mark: |
|
||||||
|
| postgresql-repo | yes | :white_check_mark: |
|
||||||
|
| univention-corporate-container-repo | yes | :white_check_mark: |
|
||||||
|
| ums-repo | no | :x: |
|
||||||
|
| xwiki-repo | no | :x: |
|
||||||
|
|
||||||
|
## Kubernetes Security Enforcements
|
||||||
|
|
||||||
|
This list gives you an overview of default security settings and if they comply with security standards:
|
||||||
|
|
||||||
|
|
||||||
|
| Component | Process | = | allowPrivilegeEscalation (`false`) | capabilities (`drop: ALL`) | seccompProfile (`RuntimeDefault`) | readOnlyRootFilesystem (`true`) | runAsNonRoot (`true`) | runAsUser | runAsGroup | fsGroup |
|
||||||
|
|-----------------|--------------------------------|:------------------:|:----------------------------------:|:----------------------------------------------------------------------------------------------------------------------------------------------:|:---------------------------------:|:-------------------------------:|:---------------------:|:---------:|:----------:|:-------:|
|
||||||
|
| ClamAV | clamd | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| | freshclam | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| | icap | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| | milter | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| Collabora | collabora | :x: | :x: | :x: (`CHOWN`, `DAC_OVERRIDE`, `FOWNER`, `FSETID`, `KILL`, `SETGID`, `SETUID`, `SETPCAP`, `NET_BIND_SERVICE`, `NET_RAW`, `SYS_CHROOT`, `MKNOD`) | :white_check_mark: | :x: | :white_check_mark: | 100 | 101 | 100 |
|
||||||
|
| CryptPad | npm | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 4001 | 4001 | 4001 |
|
||||||
|
| Dovecot | dovecot | :x: | :white_check_mark: | :x: (`CHOWN`, `DAC_OVERRIDE`, `KILL`, `NET_BIND_SERVICE`, `SETGID`, `SETUID`, `SYS_CHROOT`) | :white_check_mark: | :white_check_mark: | :x: | - | - | 1000 |
|
||||||
|
| Element | element | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||||
|
| | synapse | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 10991 | - | 10991 |
|
||||||
|
| | synapseWeb | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||||
|
| | wellKnown | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||||
|
| IntercomService | intercom-service | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | 1000 |
|
||||||
|
| Jitsi | jibri | :x: | :x: | :x: (`SYS_ADMIN`) | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| | jicofo | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| | jitsiKeycloakAdapter | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1993 | 1993 | - |
|
||||||
|
| | jvb | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| | prosody | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| | web | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| Keycloak | keycloak | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||||
|
| | keycloakConfigCli | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||||
|
| | keycloakExtensionHandler | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | keycloakExtensionProxy | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| MariaDB | mariadb | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||||
|
| Memcached | memcached | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | - | 1001 |
|
||||||
|
| Minio | minio | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | 1000 |
|
||||||
|
| Nextcloud | nextcloud | :x: | :white_check_mark: | :x: (`NET_BIND_SERVICE`, `SETGID`, `SETUID`) | :white_check_mark: | :x: | :x: | - | - | 33 |
|
||||||
|
| | nextcloud-cron | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | 33 |
|
||||||
|
| | opendesk-nextcloud-bootstrap | :x: | :white_check_mark: | :x: | :white_check_mark: | :x: | :x: | - | - | 33 |
|
||||||
|
| Open-Xchange | core-documentconverter | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 987 | 1000 | - |
|
||||||
|
| | core-guidedtours | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | core-imageconverter | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 987 | 1000 | - |
|
||||||
|
| | core-mw-default | :x: | :x: | :x: | :x: | :x: | :x: | - | - | - |
|
||||||
|
| | core-ui | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | core-ui-middleware | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | core-ui-middleware-updater | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | core-user-guide | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | gotenberg | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | guard-ui | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | nextlcoud-integration-ui | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | public-sector-ui | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| OpenProject | openproject | :x: | :white_check_mark: | :x: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| Postfix | postfix | :x: | :x: | :x: | :white_check_mark: | :x: | :x: | - | - | 101 |
|
||||||
|
| PostgreSQL | postgresql | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||||
|
| Redis | redis | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 0 | 1001 |
|
||||||
|
| UCC | univention-corporate-container | :x: | :x: | :x: | :x: | :x: | :x: | - | - | - |
|
||||||
|
| XWiki | xwiki | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| | xwiki initContainers | :x: | :x: | :x: | :white_check_mark: | :x: | :x: | - | - | 101 |
|
||||||
|
|
||||||
|
## NetworkPolicies
|
||||||
|
|
||||||
|
Kubernetes NetworkPolicies are an important measure to secure your kubernetes apps and clusters.
|
||||||
|
When applied, they restrict the traffic to your services.
|
||||||
|
This protects other deployments in your cluster or other services in your deployment to get compromised when one
|
||||||
|
component is compromised.
|
||||||
|
|
||||||
|
We ship a default set of Otterize ClientIntents via
|
||||||
|
[Otterize intents operator](https://github.com/otterize/intents-operator) which translates intent-based access control
|
||||||
|
(IBAC) into kubernetes native NetworkPolicies.
|
||||||
|
|
||||||
|
This requires the Otterize intents operator to be installed.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
security:
|
||||||
|
otterizeIntents:
|
||||||
|
enabled: true
|
||||||
|
```
|
||||||
59
docs/theming.md
Normal file
59
docs/theming.md
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Theming</h1>
|
||||||
|
|
||||||
|
This document will cover the theming and customization of your openDesk deployment.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Strings and texts](#strings-and-texts)
|
||||||
|
* [Colors](#colors)
|
||||||
|
* [Images and Logos](#images-and-logos)
|
||||||
|
* [Known limits](#known-limits)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
## Strings and texts
|
||||||
|
|
||||||
|
The deployment name can be changed by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
theme:
|
||||||
|
texts:
|
||||||
|
productName: "openDesk Cloud"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Colors
|
||||||
|
|
||||||
|
The primary color and their derivates with lesser opacity be customized by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
theme:
|
||||||
|
colors:
|
||||||
|
primary: "#5e27dd"
|
||||||
|
primary65: "#9673e9"
|
||||||
|
primary35: "#c7b3f3"
|
||||||
|
primary15: "#e7dffa"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Images and Logos
|
||||||
|
|
||||||
|
You can customize the logo and favicon by providing SVG or icon as inline value:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
theme:
|
||||||
|
imagery:
|
||||||
|
logoHeaderSvg: '<?xml version="1.0" encoding="UTF-8"?>...</svg>'
|
||||||
|
logoHeaderSvgWhite: '<?xml version="1.0" encoding="UTF-8"?>...</svg>'
|
||||||
|
logoPortalBackgroundSvg: '<?xml version="1.0" encoding="UTF-8"?>...</svg>'
|
||||||
|
faviconIco: "..."
|
||||||
|
```
|
||||||
|
|
||||||
|
## Known limits
|
||||||
|
|
||||||
|
Not all applications support theming. Known exceptions are:
|
||||||
|
- Univention Corporate Container (should be superseded by the Univention Management Stack which has planned support
|
||||||
|
for theming through the deployment).
|
||||||
|
- OpenProject
|
||||||
|
- Jitsi
|
||||||
@@ -9,6 +9,7 @@ helmfiles:
|
|||||||
- path: "helmfile/apps/services/helmfile.yaml"
|
- path: "helmfile/apps/services/helmfile.yaml"
|
||||||
- path: "helmfile/apps/keycloak/helmfile.yaml"
|
- path: "helmfile/apps/keycloak/helmfile.yaml"
|
||||||
- path: "helmfile/apps/univention-corporate-container/helmfile.yaml"
|
- path: "helmfile/apps/univention-corporate-container/helmfile.yaml"
|
||||||
|
- path: "helmfile/apps/univention-management-stack/helmfile.yaml"
|
||||||
- path: "helmfile/apps/keycloak-bootstrap/helmfile.yaml"
|
- path: "helmfile/apps/keycloak-bootstrap/helmfile.yaml"
|
||||||
- path: "helmfile/apps/intercom-service/helmfile.yaml"
|
- path: "helmfile/apps/intercom-service/helmfile.yaml"
|
||||||
- path: "helmfile/apps/open-xchange/helmfile.yaml"
|
- path: "helmfile/apps/open-xchange/helmfile.yaml"
|
||||||
@@ -19,6 +20,7 @@ helmfiles:
|
|||||||
- path: "helmfile/apps/openproject/helmfile.yaml"
|
- path: "helmfile/apps/openproject/helmfile.yaml"
|
||||||
- path: "helmfile/apps/xwiki/helmfile.yaml"
|
- path: "helmfile/apps/xwiki/helmfile.yaml"
|
||||||
- path: "helmfile/apps/provisioning/helmfile.yaml"
|
- path: "helmfile/apps/provisioning/helmfile.yaml"
|
||||||
|
- path: "helmfile/apps/openproject-bootstrap/helmfile.yaml"
|
||||||
|
|
||||||
missingFileHandler: "Error"
|
missingFileHandler: "Error"
|
||||||
|
|
||||||
@@ -27,17 +29,29 @@ missingFileHandler: "Error"
|
|||||||
# - Installing all releases from root via helmfile apply
|
# - Installing all releases from root via helmfile apply
|
||||||
# - Installing a single release from root via helmfile apply -f helmfile/apps/<app>/helmfile.yaml
|
# - Installing a single release from root via helmfile apply -f helmfile/apps/<app>/helmfile.yaml
|
||||||
# - Installing a single release from app directory via helmfile apply
|
# - Installing a single release from app directory via helmfile apply
|
||||||
# Issue: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/-/issues/2
|
# Issue: https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues/2
|
||||||
|
|
||||||
environments:
|
environments:
|
||||||
default:
|
default:
|
||||||
values:
|
values:
|
||||||
- "helmfile/environments/default/*.gotmpl"
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
dev:
|
dev:
|
||||||
values:
|
values:
|
||||||
- "helmfile/environments/default/*.gotmpl"
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
- "helmfile/environments/dev/values.yaml"
|
- "helmfile/environments/dev/values.yaml"
|
||||||
|
- "helmfile/environments/dev/values.gotmpl"
|
||||||
|
test:
|
||||||
|
values:
|
||||||
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
|
- "helmfile/environments/test/values.yaml"
|
||||||
|
- "helmfile/environments/test/values.gotmpl"
|
||||||
prod:
|
prod:
|
||||||
values:
|
values:
|
||||||
- "helmfile/environments/default/*.gotmpl"
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
- "helmfile/environments/prod/values.yaml"
|
- "helmfile/environments/prod/values.yaml"
|
||||||
|
- "helmfile/environments/prod/values.gotmpl"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,25 +1,33 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# Collabora Online
|
||||||
|
# Source: https://github.com/CollaboraOnline/online
|
||||||
- name: "collabora-online-repo"
|
- name: "collabora-online-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
default "https://collaboraonline.github.io/online" }}
|
default "https://collaboraonline.github.io/online" }}
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://collaboraonline.github.io/online
|
||||||
|
# packageName=collabora-online
|
||||||
|
# dataSource=helm
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "collabora-online"
|
- name: "collabora-online"
|
||||||
chart: "collabora-online-repo/collabora-online"
|
chart: "collabora-online-repo/collabora-online"
|
||||||
version: "1.0.2"
|
version: "1.0.2"
|
||||||
values:
|
values:
|
||||||
- "values.yaml"
|
- "values.yaml"
|
||||||
- "values.gotmpl"
|
- "values.gotmpl"
|
||||||
condition: "collabora.enabled"
|
installed: {{ .Values.collabora.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "collabora"
|
component: "collabora"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -5,41 +5,55 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
---
|
---
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.collabora.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.collabora.repository }}"
|
||||||
tag: "{{ .Values.images.collabora.tag }}"
|
tag: {{ .Values.images.collabora.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
className: "{{ .Values.ingress.ingressClassName }}"
|
className: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
- host: "{{ .Values.global.hosts.collabora }}.{{ .Values.global.domain }}"
|
- host: "{{ .Values.global.hosts.collabora }}.{{ .Values.global.domain }}"
|
||||||
paths:
|
paths:
|
||||||
- path: "/"
|
- path: "/"
|
||||||
pathType: "Prefix"
|
pathType: "Prefix"
|
||||||
tls:
|
tls:
|
||||||
- secretName: "{{ .Values.ingress.tls.secretName }}"
|
- secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
- "{{ .Values.global.hosts.collabora }}.{{ .Values.global.domain }}"
|
- "{{ .Values.global.hosts.collabora }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
collabora:
|
collabora:
|
||||||
# Admin Console Credentials: https://CODE-domain/browser/dist/admin/admin.html
|
# Admin Console Credentials: https://CODE-domain/browser/dist/admin/admin.html
|
||||||
username: "collabora-internal-admin"
|
username: "collabora-internal-admin"
|
||||||
password: {{ .Values.secrets.collabora.adminPassword }}
|
password: {{ .Values.secrets.collabora.adminPassword | quote }}
|
||||||
aliasgroups:
|
aliasgroups:
|
||||||
- host: "https://{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}:443"
|
- host: "https://{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}:443"
|
||||||
|
|
||||||
{{- if not (eq .Values.cluster.container.engine "containerd") }}
|
|
||||||
# In case of issues with "Failed to exec command '/usr/bin/loolforkit' (EPERM: Operation not permitted)...", activate:
|
|
||||||
# Ref.: https://github.com/CollaboraOnline/online/issues/2800
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
add:
|
|
||||||
- "MKNOD"
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.collabora }}
|
replicaCount: {{ .Values.replicas.collabora }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.collabora | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
prometheus:
|
||||||
|
servicemonitor:
|
||||||
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
labels:
|
||||||
|
{{- toYaml .Values.prometheus.serviceMonitors.labels | nindent 6 }}
|
||||||
|
rules:
|
||||||
|
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
||||||
|
additionalLabels:
|
||||||
|
{{- toYaml .Values.prometheus.prometheusRules.labels | nindent 6 }}
|
||||||
|
|
||||||
|
grafana:
|
||||||
|
dashboards:
|
||||||
|
enabled: {{ .Values.grafana.dashboards.enabled }}
|
||||||
|
labels:
|
||||||
|
{{- toYaml .Values.grafana.dashboards.labels | nindent 6 }}
|
||||||
|
annotations:
|
||||||
|
{{- toYaml .Values.grafana.dashboards.annotations | nindent 6 }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -14,19 +14,74 @@ collabora:
|
|||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
annotations:
|
annotations:
|
||||||
# nginx
|
# Ingress NGINX
|
||||||
nginx.ingress.kubernetes.io/upstream-hash-by: "$arg_WOPISrc"
|
nginx.ingress.kubernetes.io/upstream-hash-by: "$arg_WOPISrc"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-body-size: "0"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-read-timeout: "600"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-send-timeout: "600"
|
||||||
|
nginx.ingress.kubernetes.io/server-snippet: |
|
||||||
|
# block admin and metrics endpoint from outside by default
|
||||||
|
location /cool/getMetrics { deny all; return 403; }
|
||||||
|
location /cool/adminws/ { deny all; return 403; }
|
||||||
|
location /browser/dist/admin/admin.html { deny all; return 403; }
|
||||||
|
# NGINX
|
||||||
|
nginx.org/websocket-services: "collabora"
|
||||||
|
nginx.org/lb-method: "hash $arg_WOPISrc consistent"
|
||||||
|
nginx.org/proxy-read-timeout: "600"
|
||||||
|
nginx.org/proxy-send-timeout: "600"
|
||||||
|
nginx.org/client-max-body-size: "0"
|
||||||
|
nginx.org/server-snippets: |
|
||||||
|
# block admin and metrics endpoint from outside by default
|
||||||
|
location /cool/getMetrics { deny all; return 403; }
|
||||||
|
location /cool/adminws/ { deny all; return 403; }
|
||||||
|
location /browser/dist/admin/admin.html { deny all; return 403; }
|
||||||
# HAProxy
|
# HAProxy
|
||||||
haproxy.org/timeout-tunnel: "3600s"
|
haproxy.org/timeout-tunnel: "3600s"
|
||||||
haproxy.org/backend-config-snippet: |
|
haproxy.org/backend-config-snippet: |
|
||||||
mode http
|
balance url_param WOPISrc check_post
|
||||||
balance leastconn
|
hash-type consistent
|
||||||
stick-table type string len 2048 size 1k store conn_cur
|
# HAProxy - Community: https://haproxy-ingress.github.io/
|
||||||
http-request set-var(txn.wopisrcconns) url_param(WOPISrc),table_conn_cur()
|
haproxy-ingress.github.io/timeout-tunnel: "3600s"
|
||||||
http-request track-sc1 url_param(WOPISrc)
|
haproxy-ingress.github.io/balance-algorithm: "url_param WOPISrc check_post"
|
||||||
stick match url_param(WOPISrc) if { var(txn.wopisrcconns) -m int gt 0 }
|
haproxy-ingress.github.io/config-backend: |
|
||||||
stick store-request url_param(WOPISrc)
|
hash-type consistent
|
||||||
|
# block admin urls from outside
|
||||||
|
acl admin_url path_beg /cool/getMetrics
|
||||||
|
acl admin_url path_beg /cool/adminws/
|
||||||
|
acl admin_url path_beg /browser/dist/admin/admin.html
|
||||||
|
http-request deny if admin_url
|
||||||
autoscaling:
|
autoscaling:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
serviceAccount:
|
||||||
|
create: true
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
add:
|
||||||
|
- "CHOWN"
|
||||||
|
- "DAC_OVERRIDE"
|
||||||
|
- "FOWNER"
|
||||||
|
- "FSETID"
|
||||||
|
- "KILL"
|
||||||
|
- "SETGID"
|
||||||
|
- "SETUID"
|
||||||
|
- "SETPCAP"
|
||||||
|
- "NET_BIND_SERVICE"
|
||||||
|
- "NET_RAW"
|
||||||
|
- "SYS_CHROOT"
|
||||||
|
- "MKNOD"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 100
|
||||||
...
|
...
|
||||||
|
|||||||
33
helmfile/apps/cryptpad/helmfile.yaml
Normal file
33
helmfile/apps/cryptpad/helmfile.yaml
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
|
---
|
||||||
|
repositories:
|
||||||
|
# CryptPad
|
||||||
|
# Source: https://github.com/cryptpad/helm
|
||||||
|
- name: "cryptpad-online-repo"
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
|
default "https://cryptpad.github.io/helm" }}
|
||||||
|
|
||||||
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://cryptpad.github.io/helm
|
||||||
|
# packageName=cryptpad
|
||||||
|
# dataSource=helm
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "cryptpad"
|
||||||
|
chart: "cryptpad-online-repo/cryptpad"
|
||||||
|
version: "0.0.14"
|
||||||
|
values:
|
||||||
|
- "values.yaml"
|
||||||
|
- "values.gotmpl"
|
||||||
|
installed: {{ .Values.cryptpad.enabled }}
|
||||||
|
|
||||||
|
commonLabels:
|
||||||
|
deploy-stage: "component-1"
|
||||||
|
component: "cryptpad"
|
||||||
|
...
|
||||||
33
helmfile/apps/cryptpad/values.gotmpl
Normal file
33
helmfile/apps/cryptpad/values.gotmpl
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.cryptpad.repository }}"
|
||||||
|
tag: {{ .Values.images.cryptpad.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
className: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
hosts:
|
||||||
|
- host: "{{ .Values.global.hosts.cryptpad }}.{{ .Values.global.domain }}"
|
||||||
|
paths:
|
||||||
|
- path: "/"
|
||||||
|
pathType: "ImplementationSpecific"
|
||||||
|
tls:
|
||||||
|
- secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
hosts:
|
||||||
|
- "{{ .Values.global.hosts.cryptpad }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.cryptpad }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.cryptpad | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
51
helmfile/apps/cryptpad/values.yaml
Normal file
51
helmfile/apps/cryptpad/values.yaml
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
# https://github.com/cryptpad/helm/blob/main/charts/cryptpad/README.md or
|
||||||
|
# https://github.com/cryptpad/helm/blob/main/charts/cryptpad/values.yaml
|
||||||
|
|
||||||
|
# Disable registration and access to unregistered users:
|
||||||
|
# (https://docs.cryptpad.org/en/admin_guide/customization.html#application-config)
|
||||||
|
|
||||||
|
application_config:
|
||||||
|
availablePadTypes:
|
||||||
|
- "diagram"
|
||||||
|
|
||||||
|
# Deactivating public access breaks nextcloud plugin!
|
||||||
|
# registeredOnlyTypes:
|
||||||
|
# - "diagram"
|
||||||
|
|
||||||
|
autoscaling:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
enableEmbedding: true
|
||||||
|
|
||||||
|
fullnameOverride: "cryptpad"
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
annotations:
|
||||||
|
nginx.org/websocket-services: "cryptpad"
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 4001
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
# readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 4001
|
||||||
|
runAsGroup: 4001
|
||||||
|
|
||||||
|
serviceAccount:
|
||||||
|
create: true
|
||||||
|
|
||||||
|
workloadStateful: false
|
||||||
|
...
|
||||||
@@ -1,45 +1,190 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "sovereign-workplace-element-repo"
|
# openDesk Element
|
||||||
|
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/sovereign-workplace-element
|
||||||
|
- name: "opendesk-element-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/148/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-element" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
|
# openDesk Matrix Widgets
|
||||||
|
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/opendesk-matrix-widgets
|
||||||
|
- name: "opendesk-matrix-widgets-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/opendesk-matrix-widgets" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "sovereign-workplace-element"
|
# renovate:
|
||||||
chart: "sovereign-workplace-element-repo/sovereign-workplace-element"
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
version: "1.1.2"
|
# packageName=souvap/tooling/charts/sovereign-workplace-element/opendesk-element
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-element"
|
||||||
|
chart: "opendesk-element-repo/opendesk-element"
|
||||||
|
version: "2.5.1"
|
||||||
values:
|
values:
|
||||||
|
- "values-element.yaml"
|
||||||
- "values-element.gotmpl"
|
- "values-element.gotmpl"
|
||||||
condition: "element.enabled"
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
- name: "sovereign-workplace-well-known"
|
# renovate:
|
||||||
chart: "sovereign-workplace-element-repo/sovereign-workplace-well-known"
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
version: "1.1.2"
|
# packageName=souvap/tooling/charts/sovereign-workplace-element/opendesk-well-known
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-well-known"
|
||||||
|
chart: "opendesk-element-repo/opendesk-well-known"
|
||||||
|
version: "2.5.1"
|
||||||
values:
|
values:
|
||||||
|
- "values-well-known.yaml"
|
||||||
- "values-well-known.gotmpl"
|
- "values-well-known.gotmpl"
|
||||||
condition: "element.enabled"
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
- name: "sovereign-workplace-synapse-web"
|
# renovate:
|
||||||
chart: "sovereign-workplace-element-repo/sovereign-workplace-synapse-web"
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
version: "1.1.2"
|
# packageName=souvap/tooling/charts/sovereign-workplace-element/opendesk-synapse-web
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-synapse-web"
|
||||||
|
chart: "opendesk-element-repo/opendesk-synapse-web"
|
||||||
|
version: "2.5.1"
|
||||||
values:
|
values:
|
||||||
|
- "values-synapse-web.yaml"
|
||||||
- "values-synapse-web.gotmpl"
|
- "values-synapse-web.gotmpl"
|
||||||
condition: "element.enabled"
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
- name: "sovereign-workplace-synapse"
|
# renovate:
|
||||||
chart: "sovereign-workplace-element-repo/sovereign-workplace-synapse"
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
version: "1.1.2"
|
# packageName=souvap/tooling/charts/sovereign-workplace-element/opendesk-synapse
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-synapse"
|
||||||
|
chart: "opendesk-element-repo/opendesk-synapse"
|
||||||
|
version: "2.5.1"
|
||||||
values:
|
values:
|
||||||
|
- "values-synapse.yaml"
|
||||||
- "values-synapse.gotmpl"
|
- "values-synapse.gotmpl"
|
||||||
condition: "element.enabled"
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/sovereign-workplace-element/opendesk-synapse-create-account
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-matrix-user-verification-service-bootstrap"
|
||||||
|
chart: "opendesk-element-repo/opendesk-synapse-create-account"
|
||||||
|
version: "2.5.1"
|
||||||
|
values:
|
||||||
|
- "values-matrix-user-verification-service-bootstrap.yaml"
|
||||||
|
- "values-matrix-user-verification-service-bootstrap.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/sovereign-workplace-element/opendesk-matrix-user-verification-service
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-matrix-user-verification-service"
|
||||||
|
chart: "opendesk-element-repo/opendesk-matrix-user-verification-service"
|
||||||
|
version: "2.5.1"
|
||||||
|
values:
|
||||||
|
- "values-matrix-user-verification-service.yaml"
|
||||||
|
- "values-matrix-user-verification-service.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/opendesk-matrix-widgets/matrix-neoboard-widget
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "matrix-neoboard-widget"
|
||||||
|
chart: "opendesk-matrix-widgets-repo/matrix-neoboard-widget"
|
||||||
|
version: "3.2.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neoboard-widget.yaml"
|
||||||
|
- "values-matrix-neoboard-widget.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/opendesk-matrix-widgets/matrix-neochoice-widget
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "matrix-neochoice-widget"
|
||||||
|
chart: "opendesk-matrix-widgets-repo/matrix-neochoice-widget"
|
||||||
|
version: "3.2.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neochoice-widget.yaml"
|
||||||
|
- "values-matrix-neochoice-widget.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/opendesk-matrix-widgets/matrix-neodatefix-widget
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "matrix-neodatefix-widget"
|
||||||
|
chart: "opendesk-matrix-widgets-repo/matrix-neodatefix-widget"
|
||||||
|
version: "3.2.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-widget.yaml"
|
||||||
|
- "values-matrix-neodatefix-widget.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/sovereign-workplace-element/opendesk-synapse-create-account
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "matrix-neodatefix-bot-bootstrap"
|
||||||
|
chart: "opendesk-element-repo/opendesk-synapse-create-account"
|
||||||
|
version: "2.5.1"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-bot-bootstrap.yaml"
|
||||||
|
- "values-matrix-neodatefix-bot-bootstrap.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/opendesk-matrix-widgets/matrix-neodatefix-bot
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "matrix-neodatefix-bot"
|
||||||
|
chart: "opendesk-matrix-widgets-repo/matrix-neodatefix-bot"
|
||||||
|
version: "3.2.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-bot.yaml"
|
||||||
|
- "values-matrix-neodatefix-bot.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "element"
|
component: "element"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,25 +4,124 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
additionalConfiguration:
|
||||||
|
logout_redirect_url: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/logout?client_id=matrix&post_logout_redirect_uri=https%3A%2F%2F{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
"net.nordeck.element_web.module.opendesk":
|
||||||
|
config:
|
||||||
|
banner:
|
||||||
|
ics_navigation_json_url: "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/navigation.json"
|
||||||
|
ics_silent_url: "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/silent"
|
||||||
|
portal_logo_svg_url: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/univention/portal/icons/logos/domain.svg"
|
||||||
|
portal_url: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/"
|
||||||
|
custom_css_variables:
|
||||||
|
--cpd-color-text-action-accent: {{ .Values.theme.colors.primary | quote }}
|
||||||
|
widget_types:
|
||||||
|
- jitsi
|
||||||
|
- net.nordeck
|
||||||
|
|
||||||
|
"net.nordeck.element_web.module.widget_lifecycle":
|
||||||
|
widget_permissions:
|
||||||
|
"https://{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}/jitsi.html":
|
||||||
|
identity_approved: true
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoBoardWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.chunk
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.chunk
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.snapshot
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.snapshot
|
||||||
|
- org.matrix.msc2762.send.state_event:m.room.power_levels#
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels#
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.whiteboard
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.whiteboard
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.whiteboard.sessions#*
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.whiteboard.sessions
|
||||||
|
- org.matrix.msc3819.send.to_device:net.nordeck.whiteboard.connection_signaling
|
||||||
|
- org.matrix.msc3819.receive.to_device:net.nordeck.whiteboard.connection_signaling
|
||||||
|
- town.robin.msc3846.turn_servers
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoChoiceWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.poll.vote
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.poll.vote
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll.settings
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll.settings
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll.group
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll.group
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.poll.start
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.poll.start
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoDateFixWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
identity_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2931.navigate
|
||||||
|
- org.matrix.msc2762.timeline:*
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels
|
||||||
|
- org.matrix.msc2762.receive.event:m.reaction
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.create
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.tombstone
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.send.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.topic
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.space.parent
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.space.child
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.meetings.metadata
|
||||||
|
- org.matrix.msc2762.receive.state_event:im.vector.modular.widgets
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.breakoutsessions.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.breakoutsessions.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.close
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.close
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.widgets.handle
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.widgets.handle
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.participants.handle
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.participants.handle
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.update
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.update
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.change.message_permissions
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.change.message_permissions
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.sub_meetings.send_message
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.sub_meetings.send_message
|
||||||
|
- org.matrix.msc3973.user_directory_search
|
||||||
|
|
||||||
|
welcomeUserId: "@meetings-bot:{{ .Values.global.domain }}"
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
repository: "{{ .Values.images.element.repository }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
tag: "{{ .Values.images.element.tag }}"
|
repository: {{ .Values.images.element.repository | quote }}
|
||||||
|
tag: {{ .Values.images.element.tag | quote }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
host: "{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}"
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
tls:
|
tls:
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.element }}
|
replicaCount: {{ .Values.replicas.element }}
|
||||||
|
|
||||||
|
|||||||
21
helmfile/apps/element/values-element.yaml
Normal file
21
helmfile/apps/element/values-element.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
33
helmfile/apps/element/values-matrix-neoboard-widget.gotmpl
Normal file
33
helmfile/apps/element/values-matrix-neoboard-widget.gotmpl
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
repository: {{ .Values.images.matrixNeoBoardWidget.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixNeoBoardWidget.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoBoardWidget }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoBoardWidget | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
21
helmfile/apps/element/values-matrix-neoboard-widget.yaml
Normal file
21
helmfile/apps/element/values-matrix-neoboard-widget.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
33
helmfile/apps/element/values-matrix-neochoice-widget.gotmpl
Normal file
33
helmfile/apps/element/values-matrix-neochoice-widget.gotmpl
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
repository: {{ .Values.images.matrixNeoChoiceWidget.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixNeoChoiceWidget.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoChoiceWidget }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoChoiceWidget | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
21
helmfile/apps/element/values-matrix-neochoice-widget.yaml
Normal file
21
helmfile/apps/element/values-matrix-neochoice-widget.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
password: {{ .Values.secrets.matrixNeoDateFixBot.password | quote }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
url: {{ .Values.images.synapseCreateUser.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapseCreateUser.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,8 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
username: "meetings-bot"
|
||||||
|
pod: "opendesk-synapse-0"
|
||||||
|
secretName: "matrix-neodatefix-bot-account"
|
||||||
|
...
|
||||||
37
helmfile/apps/element/values-matrix-neodatefix-bot.gotmpl
Normal file
37
helmfile/apps/element/values-matrix-neodatefix-bot.gotmpl
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
openxchangeBaseUrl: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
repository: {{ .Values.images.matrixNeoDateFixBot.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixNeoDateFixBot.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
size: {{ .Values.persistence.size.matrixNeoDateFixBot | quote }}
|
||||||
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoDateFixBot }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoDateFixBot | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
50
helmfile/apps/element/values-matrix-neodatefix-bot.yaml
Normal file
50
helmfile/apps/element/values-matrix-neodatefix-bot.yaml
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
bot:
|
||||||
|
username: "meetings-bot"
|
||||||
|
displayname: "Terminplaner Bot"
|
||||||
|
|
||||||
|
strings:
|
||||||
|
breakoutSessionWidgetName: "Breakoutsessions"
|
||||||
|
calendarRoomName: "Terminplaner"
|
||||||
|
calendarWidgetName: "Terminplaner"
|
||||||
|
cockpitWidgetName: "Meeting Steuerung"
|
||||||
|
jitsiWidgetName: "Videokonferenz"
|
||||||
|
matrixNeoBoardWidgetName: "Whiteboard"
|
||||||
|
matrixNeoChoiceWidgetName: "Abstimmungen"
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
extraEnvVars:
|
||||||
|
- name: "ACCESS_TOKEN"
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: "matrix-neodatefix-bot-account"
|
||||||
|
key: "access_token"
|
||||||
|
|
||||||
|
# TODO: The health endpoint does not work with the haproxy configuration, yet
|
||||||
|
livenessProbe:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
# TODO: The health endpoint does not work with the haproxy configuration, yet
|
||||||
|
readinessProbe:
|
||||||
|
enabled: false
|
||||||
|
...
|
||||||
33
helmfile/apps/element/values-matrix-neodatefix-widget.gotmpl
Normal file
33
helmfile/apps/element/values-matrix-neodatefix-widget.gotmpl
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
repository: {{ .Values.images.matrixNeoDateFixWidget.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixNeoDateFixWidget.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoDateFixWidget }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoDateFixWidget | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
25
helmfile/apps/element/values-matrix-neodatefix-widget.yaml
Normal file
25
helmfile/apps/element/values-matrix-neodatefix-widget.yaml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
bot:
|
||||||
|
username: "meetings-bot"
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
password: {{ .Values.secrets.matrixUserVerificationService.password | quote }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
url: {{ .Values.images.synapseCreateUser.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapseCreateUser.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,8 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
username: "uvs"
|
||||||
|
pod: "opendesk-synapse-0"
|
||||||
|
secretName: "opendesk-matrix-user-verification-service-account"
|
||||||
|
...
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
repository: {{ .Values.images.matrixUserVerificationService.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixUserVerificationService.tag | quote }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixUserVerificationService }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixUserVerificationService | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,29 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
# TODO: the service can't run with read only filesystem or as non-root
|
||||||
|
# readOnlyRootFilesystem: true
|
||||||
|
# runAsGroup: 101
|
||||||
|
# runAsNonRoot: true
|
||||||
|
# runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
extraEnvVars:
|
||||||
|
- name: "UVS_ACCESS_TOKEN"
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: "opendesk-matrix-user-verification-service-account"
|
||||||
|
key: "access_token"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -4,25 +4,26 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
repository: "{{ .Values.images.synapseWeb.repository }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
tag: "{{ .Values.images.synapseWeb.tag }}"
|
repository: {{ .Values.images.synapseWeb.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapseWeb.tag | quote }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
host: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
tls:
|
tls:
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.synapseWeb }}
|
replicaCount: {{ .Values.replicas.synapseWeb }}
|
||||||
|
|
||||||
|
|||||||
21
helmfile/apps/element/values-synapse-web.yaml
Normal file
21
helmfile/apps/element/values-synapse-web.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -4,46 +4,65 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
repository: "{{ .Values.images.synapse.repository }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
tag: "{{ .Values.images.synapse.tag }}"
|
repository: {{ .Values.images.synapse.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapse.tag | quote }}
|
||||||
|
|
||||||
configuration:
|
configuration:
|
||||||
database:
|
database:
|
||||||
host: "{{ .Values.databases.synapse.host }}"
|
host: {{ .Values.databases.synapse.host | quote }}
|
||||||
name: "{{ .Values.databases.synapse.name }}"
|
name: {{ .Values.databases.synapse.name | quote }}
|
||||||
user: "{{ .Values.databases.synapse.username }}"
|
user: {{ .Values.databases.synapse.username | quote }}
|
||||||
password: "{{ .Values.databases.synapse.password | default .Values.secrets.postgresql.matrixUser }}"
|
password: {{ .Values.databases.synapse.password | default .Values.secrets.postgresql.matrixUser | quote }}
|
||||||
|
|
||||||
homeserver:
|
homeserver:
|
||||||
|
appServiceConfigs:
|
||||||
|
- as_token: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
|
hs_token: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
|
id: intercom-service
|
||||||
|
namespaces:
|
||||||
|
users:
|
||||||
|
- exclusive: false
|
||||||
|
regex: "@.*"
|
||||||
|
url: null
|
||||||
|
sender_localpart: intercom-service
|
||||||
|
|
||||||
oidc:
|
oidc:
|
||||||
clientSecret: {{ .Values.secrets.keycloak.clientSecret.matrix }}
|
clientSecret: {{ .Values.secrets.keycloak.clientSecret.matrix | quote }}
|
||||||
issuer: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
issuer: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
||||||
|
|
||||||
turn:
|
turn:
|
||||||
sharedSecret: {{ .Values.turn.credentials }}
|
sharedSecret: {{ .Values.turn.credentials | quote }}
|
||||||
servers:
|
servers:
|
||||||
{{- if .Values.turn.tls.host }}
|
{{- if .Values.turn.tls.host }}
|
||||||
- server: {{ .Values.turn.tls.host }}
|
- server: {{ .Values.turn.tls.host | quote }}
|
||||||
port: {{ .Values.turn.tls.port }}
|
port: {{ .Values.turn.tls.port }}
|
||||||
transport: {{ .Values.turn.transport }}
|
transport: {{ .Values.turn.transport | quote }}
|
||||||
{{- else if .Values.turn.server.host }}
|
{{- else if .Values.turn.server.host }}
|
||||||
- server: {{ .Values.turn.server.host }}
|
- server: {{ .Values.turn.server.host | quote }}
|
||||||
port: {{ .Values.turn.server.port }}
|
port: {{ .Values.turn.server.port }}
|
||||||
transport: {{ .Values.turn.transport }}
|
transport: {{ .Values.turn.transport | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
|
guestModule:
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
repository: {{ .Values.images.synapseGuestModule.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapseGuestModule.tag | quote }}
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
size: "{{ .Values.persistence.size.synapse }}"
|
size: {{ .Values.persistence.size.synapse | quote }}
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.synapse }}
|
replicaCount: {{ .Values.replicas.synapse }}
|
||||||
|
|
||||||
|
|||||||
45
helmfile/apps/element/values-synapse.yaml
Normal file
45
helmfile/apps/element/values-synapse.yaml
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
additionalConfiguration:
|
||||||
|
user_directory:
|
||||||
|
enabled: true
|
||||||
|
search_all_users: true
|
||||||
|
room_prejoin_state:
|
||||||
|
additional_event_types:
|
||||||
|
- "m.space.parent"
|
||||||
|
- "net.nordeck.meetings.metadata"
|
||||||
|
- "m.room.power_levels"
|
||||||
|
# When a user logs into Element a parallel request is done through Intercom Service to allow Synapse API
|
||||||
|
# interaction, to avoid (temporary) blocking of the user for followup logins we want to raise the limits.
|
||||||
|
# https://matrix-org.github.io/synapse/v1.59/usage/configuration/config_documentation.html#ratelimiting
|
||||||
|
rc_login:
|
||||||
|
account:
|
||||||
|
per_second: 2
|
||||||
|
burst_count: 8
|
||||||
|
address:
|
||||||
|
per_second: 2
|
||||||
|
burst_count: 12
|
||||||
|
|
||||||
|
homeserver:
|
||||||
|
guestModule:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 10991
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 10991
|
||||||
|
...
|
||||||
@@ -4,25 +4,26 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
repository: "{{ .Values.images.wellKnown.repository }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
tag: "{{ .Values.images.wellKnown.tag }}"
|
repository: {{ .Values.images.wellKnown.repository | quote }}
|
||||||
|
tag: {{ .Values.images.wellKnown.tag | quote }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
host: "{{ .Values.global.domain }}"
|
host: {{ .Values.global.domain | quote }}
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
tls:
|
tls:
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.wellKnown }}
|
replicaCount: {{ .Values.replicas.wellKnown }}
|
||||||
|
|
||||||
|
|||||||
25
helmfile/apps/element/values-well-known.yaml
Normal file
25
helmfile/apps/element/values-well-known.yaml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
e2ee:
|
||||||
|
forceDisable: true
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -1,25 +1,36 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# Intercom Service
|
||||||
|
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/intercom-service
|
||||||
- name: "intercom-service-repo"
|
- name: "intercom-service-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/66/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/intercom-service" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/intercom-service/intercom-service
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "intercom-service"
|
- name: "intercom-service"
|
||||||
chart: "intercom-service-repo/intercom-service"
|
chart: "intercom-service-repo/intercom-service"
|
||||||
version: "1.1.3"
|
version: "2.0.1"
|
||||||
values:
|
values:
|
||||||
- "values.yaml"
|
- "values.yaml"
|
||||||
- "values.gotmpl"
|
- "values.gotmpl"
|
||||||
condition: "intercom.enabled"
|
installed: {{ .Values.intercom.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "intercom-service"
|
component: "intercom-service"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,40 +4,49 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
ics:
|
ics:
|
||||||
secret: {{ .Values.secrets.intercom.secret }}
|
secret: {{ .Values.secrets.intercom.secret | quote }}
|
||||||
issuerBaseUrl: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
issuerBaseUrl: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
||||||
originRegex: "{{ .Values.istio.domain }}"
|
originRegex: "{{ .Values.istio.domain }}|{{ .Values.global.domain }}"
|
||||||
default:
|
default:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
oidc:
|
oidc:
|
||||||
secret: {{ .Values.secrets.keycloak.clientSecret.intercom }}
|
secret: {{ .Values.secrets.keycloak.clientSecret.intercom | quote }}
|
||||||
matrix:
|
matrix:
|
||||||
asSecret: {{ .Values.secrets.jitsi.synapseAsToken }}
|
asSecret: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
serverName: "matrix.{{ .Values.global.domain }}"
|
subdomain: {{ .Values.global.hosts.synapse | quote }}
|
||||||
|
serverName: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
|
||||||
|
nordeck:
|
||||||
|
subdomain: {{ .Values.global.hosts.matrixNeoDateFixBot | quote }}
|
||||||
portal:
|
portal:
|
||||||
apiKey: {{ .Values.secrets.centralnavigation.apiKey }}
|
apiKey: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
redis:
|
redis:
|
||||||
password: {{ .Values.secrets.redis.password }}
|
host: {{ .Values.cache.intercomService.host | quote }}
|
||||||
|
port: {{ .Values.cache.intercomService.port }}
|
||||||
|
password: {{ .Values.cache.intercomService.password | default .Values.secrets.redis.password | quote }}
|
||||||
openxchange:
|
openxchange:
|
||||||
url: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
url: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
repository: "{{ .Values.images.intercom.repository }}"
|
repository: {{ .Values.images.intercom.repository | quote }}
|
||||||
tag: "{{ .Values.images.intercom.tag }}"
|
tag: {{ .Values.images.intercom.tag | quote }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
host: "{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}"
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
tls:
|
tls:
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.intercomService | toYaml | nindent 2 }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,8 +1,21 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
istio:
|
containerSecurityContext:
|
||||||
enabled: false
|
allowPrivilegeEscalation: false
|
||||||
virtualService:
|
capabilities:
|
||||||
enabled: false
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 1000
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,24 +1,36 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# openDesk Jitsi
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-jitsi
|
||||||
- name: "jitsi-repo"
|
- name: "jitsi-repo"
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-jitsi" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-jitsi" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/sovereign-workplace-jitsi/sovereign-workplace-jitsi
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "jitsi"
|
- name: "jitsi"
|
||||||
chart: "jitsi-repo/sovereign-workplace-jitsi"
|
chart: "jitsi-repo/sovereign-workplace-jitsi"
|
||||||
version: "1.2.5"
|
version: "1.7.1"
|
||||||
values:
|
values:
|
||||||
- "values-jitsi.gotmpl"
|
- "values-jitsi.gotmpl"
|
||||||
condition: "jitsi.enabled"
|
installed: {{ .Values.jitsi.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "jitsi"
|
component: "jitsi"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,20 +4,27 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
repository: "{{ .Values.images.jitsiKeycloakAdapter.repository }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
tag: "{{ .Values.images.jitsiKeycloakAdapter.tag }}"
|
repository: {{ .Values.images.jitsiKeycloakAdapter.repository | quote }}
|
||||||
|
tag: {{ .Values.images.jitsiKeycloakAdapter.tag | quote }}
|
||||||
|
|
||||||
settings:
|
settings:
|
||||||
jwtAppSecret: "{{ .Values.secrets.jitsi.jwtAppSecret }}"
|
jwtAppSecret: {{ .Values.secrets.jitsi.jwtAppSecret | quote }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
jitsi:
|
jitsi:
|
||||||
publicURL: "https://{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
publicURL: "https://{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
||||||
@@ -25,16 +32,16 @@ jitsi:
|
|||||||
replicaCount: {{ .Values.replicas.jitsi }}
|
replicaCount: {{ .Values.replicas.jitsi }}
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jitsi.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jitsi.repository }}"
|
||||||
tag: "{{ .Values.images.jitsi.tag }}"
|
tag: {{ .Values.images.jitsi.tag | quote }}
|
||||||
ingress:
|
ingress:
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
- host: "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
- host: "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
||||||
paths:
|
paths:
|
||||||
- "/"
|
- "/"
|
||||||
tls:
|
tls:
|
||||||
- secretName: "{{ .Values.ingress.tls.secretName }}"
|
- secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
- "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
- "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
||||||
extraEnvs:
|
extraEnvs:
|
||||||
@@ -44,10 +51,10 @@ jitsi:
|
|||||||
prosody:
|
prosody:
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.prosody.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.prosody.repository }}"
|
||||||
tag: "{{ .Values.images.prosody.tag }}"
|
tag: {{ .Values.images.prosody.tag | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
extraEnvs:
|
extraEnvs:
|
||||||
- name: "AUTH_TYPE"
|
- name: "AUTH_TYPE"
|
||||||
@@ -55,69 +62,74 @@ jitsi:
|
|||||||
- name: "JWT_APP_ID"
|
- name: "JWT_APP_ID"
|
||||||
value: "myappid"
|
value: "myappid"
|
||||||
- name: "JWT_APP_SECRET"
|
- name: "JWT_APP_SECRET"
|
||||||
value: "{{ .Values.secrets.jitsi.jwtAppSecret }}"
|
value: {{ .Values.secrets.jitsi.jwtAppSecret | quote }}
|
||||||
|
- name: "MATRIX_UVS_SYNC_POWER_LEVELS"
|
||||||
|
value: "true"
|
||||||
|
- name: "MATRIX_UVS_URL"
|
||||||
|
value: "http://opendesk-matrix-user-verification-service.{{ .Release.Namespace }}.svc.{{ .Values.cluster.networking.domain }}"
|
||||||
- name: TURNS_HOST
|
- name: TURNS_HOST
|
||||||
value: "{{ .Values.turn.tls.host }}"
|
value: {{ .Values.turn.tls.host | quote }}
|
||||||
- name: TURNS_PORT
|
- name: TURNS_PORT
|
||||||
value: "{{ .Values.turn.tls.port }}"
|
value: {{ .Values.turn.tls.port | quote }}
|
||||||
- name: TURN_HOST
|
- name: TURN_HOST
|
||||||
value: "{{ .Values.turn.server.host }}"
|
value: {{ .Values.turn.server.host | quote }}
|
||||||
- name: TURN_PORT
|
- name: TURN_PORT
|
||||||
value: "{{ .Values.turn.server.port }}"
|
value: {{ .Values.turn.server.port | quote }}
|
||||||
- name: TURN_TRANSPORT
|
- name: TURN_TRANSPORT
|
||||||
value: "{{ .Values.turn.transport }}"
|
value: {{ .Values.turn.transport | quote }}
|
||||||
- name: TURN_CREDENTIALS
|
- name: TURN_CREDENTIALS
|
||||||
value: "{{ .Values.turn.credentials }}"
|
value: {{ .Values.turn.credentials | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.prosody | toYaml | nindent 6 }}
|
{{ .Values.resources.prosody | toYaml | nindent 6 }}
|
||||||
persistence:
|
persistence:
|
||||||
size: "{{ .Values.persistence.size.prosody }}"
|
size: {{ .Values.persistence.size.prosody | quote }}
|
||||||
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClassName: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
jicofo:
|
jicofo:
|
||||||
replicaCount: {{ .Values.replicas.jicofo }}
|
replicaCount: {{ .Values.replicas.jicofo }}
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jicofo.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jicofo.repository }}"
|
||||||
tag: "{{ .Values.images.jicofo.tag }}"
|
tag: {{ .Values.images.jicofo.tag | quote }}
|
||||||
xmpp:
|
xmpp:
|
||||||
password: "{{ .Values.secrets.jitsi.jicofoAuthPassword }}"
|
password: {{ .Values.secrets.jitsi.jicofoAuthPassword | quote }}
|
||||||
componentSecret: "{{ .Values.secrets.jitsi.jicofoComponentPassword }}"
|
componentSecret: {{ .Values.secrets.jitsi.jicofoComponentPassword | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.jicofo | toYaml | nindent 6 }}
|
{{ .Values.resources.jicofo | toYaml | nindent 6 }}
|
||||||
jvb:
|
jvb:
|
||||||
replicaCount: {{ .Values.replicas.jvb }}
|
replicaCount: {{ .Values.replicas.jvb }}
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jvb.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jvb.repository }}"
|
||||||
tag: "{{ .Values.images.jvb.tag }}"
|
tag: {{ .Values.images.jvb.tag | quote }}
|
||||||
xmpp:
|
xmpp:
|
||||||
password: "{{ .Values.secrets.jitsi.jvbAuthPassword }}"
|
password: {{ .Values.secrets.jitsi.jvbAuthPassword | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.jvb | toYaml | nindent 6 }}
|
{{ .Values.resources.jvb | toYaml | nindent 6 }}
|
||||||
service:
|
service:
|
||||||
type: "{{ .Values.cluster.service.type }}"
|
type: {{ .Values.cluster.service.type | quote }}
|
||||||
jibri:
|
jibri:
|
||||||
replicaCount: {{ .Values.replicas.jibri }}
|
replicaCount: {{ .Values.replicas.jibri }}
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jibri.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jibri.repository }}"
|
||||||
tag: "{{ .Values.images.jibri.tag }}"
|
tag: {{ .Values.images.jibri.tag | quote }}
|
||||||
recorder:
|
recorder:
|
||||||
password: "{{ .Values.secrets.jitsi.jibriRecorderPassword }}"
|
password: {{ .Values.secrets.jitsi.jibriRecorderPassword | quote }}
|
||||||
xmpp:
|
xmpp:
|
||||||
password: "{{ .Values.secrets.jitsi.jibriXmppPassword }}"
|
password: {{ .Values.secrets.jitsi.jibriXmppPassword | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.jibri | toYaml | nindent 6 }}
|
{{ .Values.resources.jibri | toYaml | nindent 6 }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
patchJVB:
|
patchJVB:
|
||||||
configuration:
|
configuration:
|
||||||
staticLoadbalancerIP: "{{ .Values.cluster.networking.ingressGatewayIP }}"
|
staticLoadbalancerIP: {{ .Values.cluster.networking.ingressGatewayIP | quote }}
|
||||||
loadbalancerStatusField: "{{ .Values.cluster.networking.loadBalancerStatusField }}"
|
loadbalancerStatusField: {{ .Values.cluster.networking.loadBalancerStatusField | quote }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
repository: "{{ .Values.images.jitsiPatchJVB.repository }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
tag: "{{ .Values.images.jitsiPatchJVB.tag }}"
|
repository: {{ .Values.images.jitsiPatchJVB.repository | quote }}
|
||||||
|
tag: {{ .Values.images.jitsiPatchJVB.tag | quote }}
|
||||||
replicaCount: {{ .Values.replicas.jitsiKeycloakAdapter }}
|
replicaCount: {{ .Values.replicas.jitsiKeycloakAdapter }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
|
|||||||
@@ -1,27 +1,40 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "sovereign-workplace-keycloak-bootstrap-repo"
|
# openDesk Keycloak Bootstrap
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-keycloak-bootstrap
|
||||||
|
- name: "opendesk-keycloak-bootstrap-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/138/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-keycloak-bootstrap" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "sovereign-workplace-keycloak-bootstrap"
|
# renovate:
|
||||||
chart: "sovereign-workplace-keycloak-bootstrap-repo/sovereign-workplace-keycloak-bootstrap"
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
version: "1.1.11"
|
# packageName=souvap/tooling/charts/opendesk-keycloak-bootstrap/opendesk-keycloak-bootstrap
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-keycloak-bootstrap"
|
||||||
|
chart: "opendesk-keycloak-bootstrap-repo/sovereign-workplace-keycloak-bootstrap"
|
||||||
|
version: "1.1.12"
|
||||||
values:
|
values:
|
||||||
- "values-bootstrap.gotmpl"
|
- "values-bootstrap.gotmpl"
|
||||||
- "values-bootstrap.yaml"
|
- "values-bootstrap.yaml"
|
||||||
condition: "keycloak.enabled"
|
installed: {{ .Values.keycloak.enabled }}
|
||||||
# as we have seen some slow clusters we want to ensure we not just fail due to a timeout.
|
# as we have seen some slow clusters we want to ensure we not just fail due to a timeout.
|
||||||
timeout: 1800
|
timeout: 1800
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "keycloak-bootstrap"
|
component: "keycloak-bootstrap"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,22 +4,31 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
keepPVCOnDelete: {{ .Values.cleanup.keepPVCOnDelete }}
|
||||||
|
|
||||||
config:
|
config:
|
||||||
administrator:
|
administrator:
|
||||||
password: "{{ .Values.secrets.keycloak.adminPassword }}"
|
password: {{ .Values.secrets.keycloak.adminPassword | quote }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.keycloakBootstrap.repository }}"
|
repository: {{ .Values.images.keycloakBootstrap.repository | quote }}
|
||||||
tag: "{{ .Values.images.keycloakBootstrap.tag }}"
|
tag: {{ .Values.images.keycloakBootstrap.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.keycloakBootstrap | toYaml | nindent 2 }}
|
{{ .Values.resources.keycloakBootstrap | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
additionalAnnotations:
|
||||||
|
annotations:
|
||||||
|
intents.otterize.com/service-name: "keycloak-bootstrap"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,7 +4,4 @@
|
|||||||
config:
|
config:
|
||||||
administrator:
|
administrator:
|
||||||
username: "kcadmin"
|
username: "kcadmin"
|
||||||
|
|
||||||
cleanup:
|
|
||||||
deletePodsOnSuccess: true
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,37 +1,68 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# VMWare Bitnami
|
||||||
|
# Source: https://github.com/bitnami/charts/
|
||||||
- name: "bitnami-repo"
|
- name: "bitnami-repo"
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "registry-1.docker.io/bitnamicharts" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/bitnami-charts" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Keycloak Theme
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/charts/opendesk-keycloak-theme
|
||||||
- name: "keycloak-theme-repo"
|
- name: "keycloak-theme-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/96/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/keycloak-theme" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Keycloak Extensions
|
||||||
- name: "keycloak-extensions-repo"
|
- name: "keycloak-extensions-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/77/packages/helm/stable" }}
|
default "https://gitlab.souvap-univention.de/api/v4/projects/77/packages/helm/stable" }}
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/keycloak-theme/opendesk-keycloak-theme
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "keycloak-theme"
|
- name: "keycloak-theme"
|
||||||
chart: "keycloak-theme-repo/sovereign-workplace-theme"
|
chart: "keycloak-theme-repo/opendesk-keycloak-theme"
|
||||||
version: "1.0.0"
|
version: "2.0.0"
|
||||||
values:
|
values:
|
||||||
- "values-theme.gotmpl"
|
- "values-theme.gotmpl"
|
||||||
condition: "keycloak.enabled"
|
installed: {{ .Values.keycloak.enabled }}
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/bitnami-charts/keycloak
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "keycloak"
|
- name: "keycloak"
|
||||||
chart: "bitnami-repo/keycloak"
|
chart: "bitnami-repo/keycloak"
|
||||||
version: "12.2.0"
|
version: "12.1.5"
|
||||||
values:
|
values:
|
||||||
- "values-keycloak.gotmpl"
|
- "values-keycloak.gotmpl"
|
||||||
- "values-keycloak.yaml"
|
- "values-keycloak.yaml"
|
||||||
- "values-keycloak-idp.yaml"
|
- "values-keycloak-idp.yaml"
|
||||||
wait: true
|
wait: true
|
||||||
condition: "keycloak.enabled"
|
installed: {{ .Values.keycloak.enabled }}
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://gitlab.souvap-univention.de/api/v4/projects/77/packages/helm/stable
|
||||||
|
# packageName=keycloak-extensions
|
||||||
|
# dataSource=helm
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "keycloak-extensions"
|
- name: "keycloak-extensions"
|
||||||
chart: "keycloak-extensions-repo/keycloak-extensions"
|
chart: "keycloak-extensions-repo/keycloak-extensions"
|
||||||
version: "0.1.0"
|
version: "0.1.0"
|
||||||
@@ -40,12 +71,9 @@ releases:
|
|||||||
values:
|
values:
|
||||||
- "values-extensions.yaml"
|
- "values-extensions.yaml"
|
||||||
- "values-extensions.gotmpl"
|
- "values-extensions.gotmpl"
|
||||||
condition: "keycloak.enabled"
|
installed: {{ .Values.keycloak.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "keycloak"
|
component: "keycloak"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -5,53 +5,42 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
keycloak:
|
keycloak:
|
||||||
adminPassword: {{ .Values.secrets.keycloak.adminPassword }}
|
adminPassword: {{ .Values.secrets.keycloak.adminPassword | quote }}
|
||||||
postgresql:
|
postgresql:
|
||||||
connection:
|
connection:
|
||||||
host: "{{ .Values.databases.keycloakExtension.host }}"
|
host: {{ .Values.databases.keycloakExtension.host | quote }}
|
||||||
port: "{{ .Values.databases.keycloakExtension.port }}"
|
port: {{ .Values.databases.keycloakExtension.port }}
|
||||||
auth:
|
auth:
|
||||||
database: "{{ .Values.databases.keycloakExtension.name }}"
|
database: {{ .Values.databases.keycloakExtension.name | quote }}
|
||||||
username: "{{ .Values.databases.keycloakExtension.username }}"
|
username: {{ .Values.databases.keycloakExtension.username | quote }}
|
||||||
password: {{ .Values.databases.keycloakExtension.password | default .Values.secrets.postgresql.keycloakExtensionUser }}
|
password: {{ .Values.databases.keycloakExtension.password | default .Values.secrets.postgresql.keycloakExtensionUser | quote }}
|
||||||
handler:
|
handler:
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.keycloakExtensionHandler.repository }}"
|
repository: {{ .Values.images.keycloakExtensionHandler.repository | quote }}
|
||||||
{{- if .Values.images.keycloakExtensionHandler.digest }}
|
tag: {{ .Values.images.keycloakExtensionHandler.tag | quote }}
|
||||||
sha256: "{{ .Values.images.keycloakExtensionHandler.digest}}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
{{- else if .Values.images.keycloakExtensionHandler.tag }}
|
|
||||||
tag: "{{ .Values.images.keycloakExtensionHandler.tag }}"
|
|
||||||
{{- end }}
|
|
||||||
imagePullPolicy: "Always"
|
|
||||||
appConfig:
|
appConfig:
|
||||||
smtpPassword: "{{ .Values.smtp.password }}"
|
smtpPassword: {{ .Values.smtp.password | quote }}
|
||||||
smtpHost: "{{ .Values.smtp.host }}"
|
smtpHost: {{ .Values.smtp.host | quote }}
|
||||||
smtpUsername: "{{ .Values.smtp.username }}"
|
smtpPort: {{ .Values.smtp.port | quote }}
|
||||||
|
smtpUsername: {{ .Values.smtp.username | quote }}
|
||||||
mailFrom: "noreply@{{ .Values.global.domain }}"
|
mailFrom: "noreply@{{ .Values.global.domain }}"
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.keycloakExtension | toYaml | nindent 4 }}
|
{{ .Values.resources.keycloakExtension | toYaml | nindent 4 }}
|
||||||
proxy:
|
proxy:
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.keycloakExtensionProxy.repository }}"
|
repository: {{ .Values.images.keycloakExtensionProxy.repository | quote }}
|
||||||
{{- if .Values.images.keycloakExtensionProxy.digest }}
|
tag: {{ .Values.images.keycloakExtensionProxy.tag | quote }}
|
||||||
sha256: "{{ .Values.images.keycloakExtensionProxy.digest}}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
{{- else if .Values.images.keycloakExtensionProxy.tag }}
|
|
||||||
tag: "{{ .Values.images.keycloakExtensionProxy.tag }}"
|
|
||||||
{{- end }}
|
|
||||||
imagePullPolicy: "Always"
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
annotations:
|
|
||||||
nginx.org/proxy-buffer-size: "8k"
|
|
||||||
nginx.ingress.kubernetes.io/proxy-buffer-size: "8k"
|
|
||||||
host: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
||||||
tls:
|
tls:
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.keycloakProxy | toYaml | nindent 4 }}
|
{{ .Values.resources.keycloakProxy | toYaml | nindent 4 }}
|
||||||
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -11,11 +11,35 @@ global:
|
|||||||
handler:
|
handler:
|
||||||
appConfig:
|
appConfig:
|
||||||
captchaProtectionEnable: "False"
|
captchaProtectionEnable: "False"
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
postgresql:
|
postgresql:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
proxy:
|
proxy:
|
||||||
image:
|
ingress:
|
||||||
tag: "latest"
|
annotations:
|
||||||
|
nginx.org/proxy-buffer-size: "8k"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-buffer-size: "8k"
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -181,7 +181,7 @@ keycloakConfigCli:
|
|||||||
"attributes": {
|
"attributes": {
|
||||||
"backchannel.logout.revoke.offline.tokens": "true",
|
"backchannel.logout.revoke.offline.tokens": "true",
|
||||||
"backchannel.logout.session.required": "true",
|
"backchannel.logout.session.required": "true",
|
||||||
"backchannel.logout.url": "https://$(ELEMENT_DOMAIN)/_synapse/client/oidc/backchannel_logout",
|
"backchannel.logout.url": "https://$(MATRIX_DOMAIN)/_synapse/client/oidc/backchannel_logout",
|
||||||
"post.logout.redirect.uris": "https://$(ELEMENT_DOMAIN)/*##https://$(MATRIX_DOMAIN)/*##https://$(UNIVENTION_CORPORATE_SERVER_DOMAIN)/*"
|
"post.logout.redirect.uris": "https://$(ELEMENT_DOMAIN)/*##https://$(MATRIX_DOMAIN)/*##https://$(UNIVENTION_CORPORATE_SERVER_DOMAIN)/*"
|
||||||
},
|
},
|
||||||
"authenticationFlowBindingOverrides": {},
|
"authenticationFlowBindingOverrides": {},
|
||||||
|
|||||||
@@ -4,26 +4,26 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.keycloak.repository }}"
|
repository: {{ .Values.images.keycloak.repository | quote }}
|
||||||
tag: "{{ .Values.images.keycloak.tag }}"
|
tag: {{ .Values.images.keycloak.tag | quote }}
|
||||||
digest: "{{ .Values.images.keycloak.digest }}"
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
externalDatabase:
|
externalDatabase:
|
||||||
host: "{{ .Values.databases.keycloak.host }}"
|
host: {{ .Values.databases.keycloak.host | quote }}
|
||||||
port: {{ .Values.databases.keycloak.port }}
|
port: {{ .Values.databases.keycloak.port }}
|
||||||
user: "{{ .Values.databases.keycloak.username }}"
|
user: {{ .Values.databases.keycloak.username | quote }}
|
||||||
database: "{{ .Values.databases.keycloak.name }}"
|
database: {{ .Values.databases.keycloak.name | quote }}
|
||||||
password: {{ .Values.databases.keycloak.password | default .Values.secrets.postgresql.keycloakUser }}
|
password: {{ .Values.databases.keycloak.password | default .Values.secrets.postgresql.keycloakUser | quote }}
|
||||||
|
|
||||||
auth:
|
auth:
|
||||||
adminPassword: {{ .Values.secrets.keycloak.adminPassword }}
|
adminPassword: {{ .Values.secrets.keycloak.adminPassword | quote }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.keycloak }}
|
replicaCount: {{ .Values.replicas.keycloak }}
|
||||||
|
|
||||||
@@ -34,7 +34,7 @@ keycloakConfigCli:
|
|||||||
- name: "LDAP_USERS_DN"
|
- name: "LDAP_USERS_DN"
|
||||||
value: "cn=users,dc=swp-ldap,dc=internal"
|
value: "cn=users,dc=swp-ldap,dc=internal"
|
||||||
- name: "LDAP_SERVER_URL"
|
- name: "LDAP_SERVER_URL"
|
||||||
value: "univention-corporate-container"
|
value: {{ .Values.ldap.host | quote }}
|
||||||
- name: "IDENTIFIER"
|
- name: "IDENTIFIER"
|
||||||
value: "souvap"
|
value: "souvap"
|
||||||
- name: "THEME"
|
- name: "THEME"
|
||||||
@@ -62,25 +62,27 @@ keycloakConfigCli:
|
|||||||
- name: "INTERCOM_SERVICE_DOMAIN"
|
- name: "INTERCOM_SERVICE_DOMAIN"
|
||||||
value: "{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}"
|
value: "{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}"
|
||||||
- name: "CLIENT_SECRET_INTERCOM_PASSWORD"
|
- name: "CLIENT_SECRET_INTERCOM_PASSWORD"
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.intercom }}
|
value: {{ .Values.secrets.keycloak.clientSecret.intercom | quote }}
|
||||||
- name: "CLIENT_SECRET_MATRIX_PASSWORD"
|
- name: "CLIENT_SECRET_MATRIX_PASSWORD"
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.matrix }}
|
value: {{ .Values.secrets.keycloak.clientSecret.matrix | quote }}
|
||||||
- name: "CLIENT_SECRET_JITSI_PASSWORD"
|
- name: "CLIENT_SECRET_JITSI_PASSWORD"
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.jitsi }}
|
value: {{ .Values.secrets.keycloak.clientSecret.jitsi | quote }}
|
||||||
- name: "CLIENT_SECRET_NCOIDC_PASSWORD"
|
- name: "CLIENT_SECRET_NCOIDC_PASSWORD"
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.ncoidc }}
|
value: {{ .Values.secrets.keycloak.clientSecret.ncoidc | quote }}
|
||||||
- name: "CLIENT_SECRET_OPENPROJECT_PASSWORD"
|
- name: "CLIENT_SECRET_OPENPROJECT_PASSWORD"
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.openproject }}
|
value: {{ .Values.secrets.keycloak.clientSecret.openproject | quote }}
|
||||||
- name: "CLIENT_SECRET_XWIKI_PASSWORD"
|
- name: "CLIENT_SECRET_XWIKI_PASSWORD"
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.xwiki }}
|
value: {{ .Values.secrets.keycloak.clientSecret.xwiki | quote }}
|
||||||
- name: "CLIENT_SECRET_AS8OIDC_PASSWORD"
|
- name: "CLIENT_SECRET_AS8OIDC_PASSWORD"
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.as8oidc }}
|
value: {{ .Values.secrets.keycloak.clientSecret.as8oidc | quote }}
|
||||||
- name: "KEYCLOAK_STORAGEPROVICER_UCSLDAP_NAME"
|
- name: "KEYCLOAK_STORAGEPROVICER_UCSLDAP_NAME"
|
||||||
value: "storage_provider_ucsldap"
|
value: "storage_provider_ucsldap"
|
||||||
- name: "LDAPSEARCH_PASSWORD"
|
- name: "LDAPSEARCH_PASSWORD"
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.keycloak }}
|
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.keycloak | quote }}
|
||||||
- name: "LDAPSEARCH_USERNAME"
|
- name: "LDAPSEARCH_USERNAME"
|
||||||
value: "ldapsearch_keycloak"
|
value: "ldapsearch_keycloak"
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.keycloak | toYaml | nindent 4 }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.keycloak | toYaml | nindent 2 }}
|
{{ .Values.resources.keycloak | toYaml | nindent 2 }}
|
||||||
|
|||||||
@@ -54,5 +54,32 @@ keycloakConfigCli:
|
|||||||
- "--import.var-substitution.enabled=true"
|
- "--import.var-substitution.enabled=true"
|
||||||
cache:
|
cache:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
containerSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 1001
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 1001
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 1001
|
||||||
|
fsGroupChangePolicy: "OnRootMismatch"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,7 +4,10 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,43 +1,64 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "sovereign-workplace-nextcloud-bootstrap-repo"
|
# openDesk Keycloak Bootstrap
|
||||||
|
# Source:
|
||||||
|
# https://gitlab.opencode.de/bmi/opendesk/components/charts/sovereign-workplace-nextcloud-bootstrap
|
||||||
|
- name: "opendesk-nextcloud-bootstrap-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/130/packages/helm/stable" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-nextcloud-bootstrap" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# Nextcloud
|
||||||
|
# Source: https://github.com/nextcloud/helm/
|
||||||
- name: "nextcloud-repo"
|
- name: "nextcloud-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
default "https://nextcloud.github.io/helm/" }}
|
default "https://nextcloud.github.io/helm/" }}
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "sovereign-workplace-nextcloud-bootstrap"
|
# renovate:
|
||||||
chart: "sovereign-workplace-nextcloud-bootstrap-repo/sovereign-workplace-nextcloud-bootstrap"
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
version: "2.2.0"
|
# packageName=souvap/tooling/charts/sovereign-workplace-nextcloud-bootstrap/opendesk-nextcloud-bootstrap
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-nextcloud-bootstrap"
|
||||||
|
chart: "opendesk-nextcloud-bootstrap-repo/opendesk-nextcloud-bootstrap"
|
||||||
|
version: "3.2.4"
|
||||||
wait: true
|
wait: true
|
||||||
waitForJobs: true
|
waitForJobs: true
|
||||||
values:
|
values:
|
||||||
- "values-bootstrap.gotmpl"
|
- "values-bootstrap.gotmpl"
|
||||||
- "values-bootstrap.yaml"
|
- "values-bootstrap.yaml"
|
||||||
condition: "nextcloud.enabled"
|
installed: {{ .Values.nextcloud.enabled }}
|
||||||
timeout: 1800
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://nextcloud.github.io/helm
|
||||||
|
# packageName=nextcloud
|
||||||
|
# dataSource=helm
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "nextcloud"
|
- name: "nextcloud"
|
||||||
chart: "nextcloud-repo/nextcloud"
|
chart: "nextcloud-repo/nextcloud"
|
||||||
version: "3.5.19"
|
version: "3.5.19"
|
||||||
needs:
|
needs:
|
||||||
- "sovereign-workplace-nextcloud-bootstrap"
|
- "opendesk-nextcloud-bootstrap"
|
||||||
values:
|
values:
|
||||||
- "values-nextcloud.gotmpl"
|
- "values-nextcloud.gotmpl"
|
||||||
- "values-nextcloud.yaml"
|
- "values-nextcloud.yaml"
|
||||||
condition: "nextcloud.enabled"
|
installed: {{ .Values.nextcloud.enabled }}
|
||||||
timeout: 1800
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "nextcloud"
|
component: "nextcloud"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,64 +4,78 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
istioDomain: "{{ .Values.istio.domain }}"
|
istioDomain: {{ .Values.istio.domain | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
config:
|
config:
|
||||||
administrator:
|
administrator:
|
||||||
password: {{ .Values.secrets.nextcloud.adminPassword }}
|
password: {{ .Values.secrets.nextcloud.adminPassword | quote }}
|
||||||
|
|
||||||
antivirus:
|
antivirus:
|
||||||
{{- if .Values.clamavDistributed.enabled }}
|
{{- if .Values.clamavDistributed.enabled }}
|
||||||
host: "clamav-sovereign-workplace-icap"
|
host: "clamav-icap"
|
||||||
{{- else if .Values.clamavSimple.enabled }}
|
{{- else if .Values.clamavSimple.enabled }}
|
||||||
host: "clamav-simple"
|
host: "clamav-simple"
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
apps:
|
apps:
|
||||||
integrationSwp:
|
integrationSwp:
|
||||||
password: {{ .Values.secrets.centralnavigation.apiKey }}
|
password: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
userOidc:
|
userOidc:
|
||||||
password: {{ .Values.secrets.keycloak.clientSecret.ncoidc }}
|
password: {{ .Values.secrets.keycloak.clientSecret.ncoidc | quote }}
|
||||||
|
|
||||||
database:
|
database:
|
||||||
host: "{{ .Values.databases.nextcloud.host }}"
|
host: {{ .Values.databases.nextcloud.host | quote }}
|
||||||
name: "{{ .Values.databases.nextcloud.name }}"
|
name: {{ .Values.databases.nextcloud.name | quote }}
|
||||||
user: "{{ .Values.databases.nextcloud.username }}"
|
user: {{ .Values.databases.nextcloud.username | quote }}
|
||||||
password: "{{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser }}"
|
password: {{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser | quote }}
|
||||||
|
|
||||||
ldapSearch:
|
ldapSearch:
|
||||||
password: "{{ .Values.secrets.univentionCorporateServer.ldapSearch.nextcloud }}"
|
host: {{ .Values.ldap.host | quote }}
|
||||||
|
password: {{ .Values.secrets.univentionCorporateServer.ldapSearch.nextcloud | quote }}
|
||||||
|
|
||||||
|
serverinfo:
|
||||||
|
token: {{ .Values.secrets.nextcloud.metricsToken | quote }}
|
||||||
|
|
||||||
smtp:
|
smtp:
|
||||||
host: "{{ .Values.smtp.host }}"
|
host: {{ .Values.smtp.host | quote }}
|
||||||
username: "{{ .Values.smtp.username }}"
|
port: {{ .Values.smtp.port | quote }}
|
||||||
password: "{{ .Values.smtp.password }}"
|
username: {{ .Values.smtp.username | quote }}
|
||||||
|
password: {{ .Values.smtp.password | quote }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
keepPVCOnDelete: {{ .Values.cleanup.keepPVCOnDelete }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
repository: "{{ .Values.images.nextcloud.repository }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
tag: "{{ .Values.images.nextcloud.tag }}"
|
repository: {{ .Values.images.nextcloud.repository | quote }}
|
||||||
|
tag: {{ .Values.images.nextcloud.tag | quote }}
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
||||||
accessModes:
|
accessModes:
|
||||||
- "ReadWriteMany"
|
- "ReadWriteMany"
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWX }}"
|
storageClass: {{ .Values.persistence.storageClassNames.RWX | quote }}
|
||||||
{{- else }}
|
{{- else }}
|
||||||
accessModes:
|
accessModes:
|
||||||
- "ReadWriteOnce"
|
- "ReadWriteOnce"
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
size:
|
size:
|
||||||
main: "{{ .Values.persistence.size.nextcloud.main }}"
|
main: {{ .Values.persistence.size.nextcloud.main | quote }}
|
||||||
data: "{{ .Values.persistence.size.nextcloud.data }}"
|
data: {{ .Values.persistence.size.nextcloud.data | quote }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.nextcloud | toYaml | nindent 2 }}
|
{{ .Values.resources.nextcloud | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -10,7 +10,22 @@ config:
|
|||||||
username: "phoenixusername"
|
username: "phoenixusername"
|
||||||
userOidc:
|
userOidc:
|
||||||
username: "ncoidc"
|
username: "ncoidc"
|
||||||
|
userIdAttribute: "entryuuid"
|
||||||
|
realm: "souvap"
|
||||||
|
|
||||||
cleanup:
|
cryptpad:
|
||||||
deletePodsOnSuccess: false
|
enabled: true
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
enabled: true
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsNonRoot: false
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 33
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -6,32 +6,51 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
nextcloud:
|
nextcloud:
|
||||||
host: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
||||||
username: "nextcloud"
|
username: "nextcloud"
|
||||||
password: {{ .Values.secrets.nextcloud.adminPassword }}
|
password: {{ .Values.secrets.nextcloud.adminPassword | quote }}
|
||||||
externalDatabase:
|
externalDatabase:
|
||||||
database: "{{ .Values.databases.nextcloud.name }}"
|
database: {{ .Values.databases.nextcloud.name | quote }}
|
||||||
user: "{{ .Values.databases.nextcloud.username }}"
|
user: {{ .Values.databases.nextcloud.username | quote }}
|
||||||
host: "{{ .Values.databases.nextcloud.host }}"
|
host: {{ .Values.databases.nextcloud.host | quote }}
|
||||||
password: "{{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser }}"
|
password: {{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser | quote }}
|
||||||
|
extraEnv:
|
||||||
|
REDIS_HOST: {{ .Values.cache.nextcloud.host | quote }}
|
||||||
|
REDIS_HOST_PORT: {{ .Values.cache.nextcloud.port | quote }}
|
||||||
|
REDIS_HOST_PASSWORD: {{ .Values.cache.nextcloud.password | default .Values.secrets.redis.password | quote }}
|
||||||
redis:
|
redis:
|
||||||
auth:
|
auth:
|
||||||
enabled: true
|
enabled: true
|
||||||
password: {{ .Values.secrets.redis.password }}
|
password: {{ .Values.cache.nextcloud.password | default .Values.secrets.redis.password | quote }}
|
||||||
ingress:
|
ingress:
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
className: {{ .Values.ingress.ingressClassName }}
|
className: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
tls:
|
tls:
|
||||||
- secretName: "{{ .Values.ingress.tls.secretName }}"
|
- secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
- "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
- "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.nextcloud.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.nextcloud.repository }}"
|
||||||
pullPolicy: "Always"
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
tag: "{{ .Values.images.nextcloud.tag }}"
|
tag: {{ .Values.images.nextcloud.tag | quote }}
|
||||||
pullSecrets:
|
pullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
metrics:
|
metrics:
|
||||||
token: "{{ .Values.secrets.nextcloud.metricsToken }}"
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
https: true
|
||||||
|
token: {{ .Values.secrets.nextcloud.metricsToken | quote }}
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.nextcloudExporter.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: {{ .Values.images.nextcloudExporter.tag | quote }}
|
||||||
|
pullSecrets:
|
||||||
|
{{- toYaml .Values.global.imagePullSecrets | nindent 4 }}
|
||||||
|
|
||||||
|
serviceMonitor:
|
||||||
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
labels:
|
||||||
|
{{- toYaml .Values.prometheus.serviceMonitors.labels | nindent 6 }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.nextcloudMetrics | toYaml | nindent 4 }}
|
||||||
|
|
||||||
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
||||||
replicaCount: {{ .Values.replicas.nextcloud }}
|
replicaCount: {{ .Values.replicas.nextcloud }}
|
||||||
|
|||||||
@@ -20,6 +20,16 @@ cronjob:
|
|||||||
- >
|
- >
|
||||||
sed -i "s/\*\/5 \* \* \* \* php -f \/var\/www\/html\/cron.php/\*\/1 \* \* \* \* php -f
|
sed -i "s/\*\/5 \* \* \* \* php -f \/var\/www\/html\/cron.php/\*\/1 \* \* \* \* php -f
|
||||||
\/var\/www\/html\/cron.php/g" /var/spool/cron/crontabs/www-data
|
\/var\/www\/html\/cron.php/g" /var/spool/cron/crontabs/www-data
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
annotations:
|
||||||
|
nginx.ingress.kubernetes.io/proxy-body-size: "4G"
|
||||||
|
nginx.org/client-max-body-size: "4G"
|
||||||
|
|
||||||
internalDatabase:
|
internalDatabase:
|
||||||
enabled: false
|
enabled: false
|
||||||
@@ -36,8 +46,31 @@ externalDatabase:
|
|||||||
# to the mariadb:
|
# to the mariadb:
|
||||||
type: "mysql"
|
type: "mysql"
|
||||||
|
|
||||||
metrics:
|
nextcloud:
|
||||||
enabled: false
|
configs:
|
||||||
|
mimetypealiases.json: |-
|
||||||
|
{
|
||||||
|
"application/x-drawio": "image"
|
||||||
|
}
|
||||||
|
|
||||||
|
mimetypemapping.json: |-
|
||||||
|
{
|
||||||
|
"drawio": ["application/x-drawio"]
|
||||||
|
}
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 33
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
add:
|
||||||
|
- "NET_BIND_SERVICE"
|
||||||
|
- "SETGID"
|
||||||
|
- "SETUID"
|
||||||
|
|
||||||
# this is not documented but can be found in values.yaml
|
# this is not documented but can be found in values.yaml
|
||||||
service:
|
service:
|
||||||
|
|||||||
@@ -1,47 +1,82 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "dovecot-repo"
|
# openDesk Dovecot
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/charts/opendesk-dovecot
|
||||||
|
- name: "opendesk-dovecot-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/80/packages/helm/stable" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/dovecot" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# Open-Xchange
|
||||||
- name: "openxchange-repo"
|
- name: "openxchange-repo"
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default "registry.open-xchange.com" }}
|
||||||
default "registry.open-xchange.com" }}
|
# openDesk Open-Xchange Bootstrap
|
||||||
- name: "sovereign-workplace-open-xchange-bootstrap-repo"
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/charts/opendesk-open-xchange-bootstrap
|
||||||
|
- name: "opendesk-open-xchange-bootstrap-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/139/packages/helm/stable" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-open-xchange-bootstrap" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/dovecot/dovecot
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "dovecot"
|
- name: "dovecot"
|
||||||
chart: "dovecot-repo/dovecot"
|
chart: "opendesk-dovecot-repo/dovecot"
|
||||||
version: "1.3.1"
|
version: "1.3.6"
|
||||||
values:
|
values:
|
||||||
- "values-dovecot.yaml"
|
- "values-dovecot.yaml"
|
||||||
- "values-dovecot.gotmpl"
|
- "values-dovecot.gotmpl"
|
||||||
condition: "dovecot.enabled"
|
installed: {{ .Values.dovecot.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.open-xchange.com
|
||||||
|
# packageName=appsuite-public-sector/charts/appsuite-public-sector
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "open-xchange"
|
- name: "open-xchange"
|
||||||
chart: "openxchange-repo/appsuite-public-sector/charts/appsuite-public-sector"
|
chart: "openxchange-repo/appsuite-public-sector/charts/appsuite-public-sector"
|
||||||
version: "1.2.13"
|
version: "2.1.1"
|
||||||
values:
|
values:
|
||||||
- "values-openxchange.yaml"
|
- "values-openxchange.yaml"
|
||||||
- "values-openxchange.gotmpl"
|
- "values-openxchange.gotmpl"
|
||||||
condition: "oxAppsuite.enabled"
|
- "values-openxchange-enterprise-contact-picker.yaml"
|
||||||
- name: "sovereign-workplace-open-xchange-bootstrap"
|
- "values-openxchange-enterprise-contact-picker.gotmpl"
|
||||||
chart: "sovereign-workplace-open-xchange-bootstrap-repo/sovereign-workplace-open-xchange-bootstrap"
|
installed: {{ .Values.oxAppsuite.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/sovereign-workplace-open-xchange-bootstrap/sovereign-workplace-open-xchange-bootstrap
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-open-xchange-bootstrap"
|
||||||
|
chart: "opendesk-open-xchange-bootstrap-repo/sovereign-workplace-open-xchange-bootstrap"
|
||||||
version: "1.3.1"
|
version: "1.3.1"
|
||||||
values:
|
values:
|
||||||
- "values-openxchange-bootstrap.yaml"
|
- "values-openxchange-bootstrap.gotmpl"
|
||||||
condition: "oxAppsuite.enabled"
|
installed: {{ .Values.oxAppsuite.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "open-xchange"
|
component: "open-xchange"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,29 +4,32 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
url: "{{ .Values.images.dovecot.repository }}"
|
url: {{ .Values.images.dovecot.repository | quote }}
|
||||||
digest: "{{ .Values.images.dovecot.digest }}"
|
tag: {{ .Values.images.dovecot.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
dovecot:
|
dovecot:
|
||||||
mailDomain: "{{ .Values.global.domain }}"
|
mailDomain: {{ .Values.global.domain | quote }}
|
||||||
password: {{ .Values.secrets.dovecot.doveadm }}
|
password: {{ .Values.secrets.dovecot.doveadm | quote }}
|
||||||
ldap:
|
ldap:
|
||||||
dn: "uid=ldapsearch_dovecot,cn=users,dc=swp-ldap,dc=internal"
|
dn: "uid=ldapsearch_dovecot,cn=users,dc=swp-ldap,dc=internal"
|
||||||
password: {{ .Values.secrets.univentionCorporateServer.ldapSearch.dovecot }}
|
host: {{ .Values.ldap.host | quote }}
|
||||||
|
password: {{ .Values.secrets.univentionCorporateServer.ldapSearch.dovecot | quote }}
|
||||||
oidc:
|
oidc:
|
||||||
introspectionURL: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/token/introspect"
|
introspectionHost: {{ printf "%s.%s" .Values.global.hosts.keycloak .Values.global.domain | quote }}
|
||||||
clientSecret: {{ .Values.secrets.keycloak.clientSecret.as8oidc }}
|
introspectionPath: "/realms/souvap/protocol/openid-connect/token/introspect"
|
||||||
|
clientSecret: {{ .Values.secrets.keycloak.clientSecret.as8oidc | quote }}
|
||||||
clientID: "as8oidc"
|
clientID: "as8oidc"
|
||||||
loginTrustedNetworks: "{{ .Values.cluster.networking.cidr }}"
|
loginTrustedNetworks: {{ .Values.cluster.networking.cidr | quote }}
|
||||||
|
|
||||||
certificate:
|
certificate:
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
||||||
replicaCount: {{ .Values.replicas.dovecot }}
|
replicaCount: {{ .Values.replicas.dovecot }}
|
||||||
@@ -36,15 +39,15 @@ replicaCount: 1
|
|||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
||||||
storageClassName: "{{ .Values.persistence.storageClassNames.RWX }}"
|
storageClassName: {{ .Values.persistence.storageClassNames.RWX | quote }}
|
||||||
accessModes:
|
accessModes:
|
||||||
- "ReadWriteMany"
|
- "ReadWriteMany"
|
||||||
{{- else }}
|
{{- else }}
|
||||||
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClassName: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
accessModes:
|
accessModes:
|
||||||
- "ReadWriteOnce"
|
- "ReadWriteOnce"
|
||||||
{{- end }}
|
{{- end }}
|
||||||
size: "{{ .Values.persistence.size.dovecot }}"
|
size: {{ .Values.persistence.size.dovecot | quote }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.dovecot | toYaml | nindent 2 }}
|
{{ .Values.resources.dovecot | toYaml | nindent 2 }}
|
||||||
|
|||||||
@@ -2,12 +2,26 @@
|
|||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
containerSecurityContext:
|
containerSecurityContext:
|
||||||
readOnlyRootFilesystem: false
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
add:
|
||||||
|
- "CHOWN"
|
||||||
|
- "DAC_OVERRIDE"
|
||||||
|
- "KILL"
|
||||||
|
- "NET_BIND_SERVICE"
|
||||||
|
- "SETGID"
|
||||||
|
- "SETUID"
|
||||||
|
- "SYS_CHROOT"
|
||||||
|
enabled: true
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
dovecot:
|
dovecot:
|
||||||
ldap:
|
ldap:
|
||||||
enabled: true
|
enabled: true
|
||||||
host: "univention-corporate-container"
|
|
||||||
port: 389
|
port: 389
|
||||||
base: "dc=swp-ldap,dc=internal"
|
base: "dc=swp-ldap,dc=internal"
|
||||||
|
|
||||||
@@ -15,4 +29,13 @@ dovecot:
|
|||||||
enabled: true
|
enabled: true
|
||||||
clientID: "as8oidc"
|
clientID: "as8oidc"
|
||||||
usernameAttribute: "phoenixusername"
|
usernameAttribute: "phoenixusername"
|
||||||
|
|
||||||
|
submission:
|
||||||
|
enabled: true
|
||||||
|
ssl: "no"
|
||||||
|
host: "postfix:25"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 1000
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -3,13 +3,18 @@ SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG Ze
|
|||||||
SPDX-License-Identifier: Apache-2.0
|
SPDX-License-Identifier: Apache-2.0
|
||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
url: "{{ .Values.images.openxchangeBootstrap.repository }}"
|
url: {{ .Values.images.openxchangeBootstrap.repository | quote }}
|
||||||
digest: "{{ .Values.images.openxchangeBootstrap.digest }}"
|
tag: {{ .Values.images.openxchangeBootstrap.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -0,0 +1,18 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
appsuite:
|
||||||
|
core-mw:
|
||||||
|
secretYAMLFiles:
|
||||||
|
ldap-client-config.yml:
|
||||||
|
contactsLdapClient:
|
||||||
|
pool:
|
||||||
|
host:
|
||||||
|
address: {{ .Values.ldap.host | quote }}
|
||||||
|
port: 389
|
||||||
|
auth:
|
||||||
|
adminDN:
|
||||||
|
password: {{ .Values.secrets.univentionCorporateServer.ldapSearch.ox | quote }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,394 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
appsuite:
|
||||||
|
core-mw:
|
||||||
|
|
||||||
|
properties:
|
||||||
|
# Enterprise contact picker
|
||||||
|
com.openexchange.contacts.ldap.accounts: "opendesk,other,functional"
|
||||||
|
com.openexchange.admin.bypassAccessCombinationChecks: "true"
|
||||||
|
ENABLE_INTERNAL_USER_EDIT: "false"
|
||||||
|
|
||||||
|
# Enterprise contact picker (see also gotmpl)
|
||||||
|
secretYAMLFiles:
|
||||||
|
ldap-client-config.yml:
|
||||||
|
contactsLdapClient:
|
||||||
|
pool:
|
||||||
|
type: "simple"
|
||||||
|
auth:
|
||||||
|
type: "adminDN"
|
||||||
|
adminDN:
|
||||||
|
dn: "uid=ldapsearch_ox,cn=users,dc=swp-ldap,dc=internal"
|
||||||
|
|
||||||
|
uiSettings:
|
||||||
|
# Enterprise contact picker
|
||||||
|
io.ox/core//features/enterprisePicker/enabled: "true"
|
||||||
|
|
||||||
|
yamlFiles:
|
||||||
|
contacts-provider-ldap.yml:
|
||||||
|
# Example definitions of available LDAP contact providers, together with their corresponding configuration,
|
||||||
|
# referenced LDAP client connection settings and attribute mappings.
|
||||||
|
#
|
||||||
|
# This template contains examples and will be overwritten during updates. To use, copy this file to
|
||||||
|
# /opt/open-xchange/etc/contacts-provider-ldap.yml and configure as needed.
|
||||||
|
#
|
||||||
|
# Each configured contacts provider can be enabled for users using the corresponding identifier used in this
|
||||||
|
# .yml file. For this purpose, the config-cascade-enabled setting "com.openexchange.contacts.provider.ldap"
|
||||||
|
# is available.
|
||||||
|
#
|
||||||
|
# Besides the provider configuration in this file, also accompanying LDAP client and contact property mappings
|
||||||
|
# need to be referenced.
|
||||||
|
#
|
||||||
|
# See also https://documentation.open-xchange.com/latest/middleware/contacts/contacts_provider_ldap.html
|
||||||
|
# for further details and a complete list of available configuration options.
|
||||||
|
#
|
||||||
|
|
||||||
|
# Key will be used as identifier for the contact provider
|
||||||
|
opendesk:
|
||||||
|
|
||||||
|
# The display name of this contacts provider.
|
||||||
|
name: "Example Address Lists"
|
||||||
|
|
||||||
|
# Configures the identifier of the LDAP client configuration settings to use, as defined in
|
||||||
|
# 'ldap-client-config.yml'. There, all further connection-related properties to access the LDAP server can
|
||||||
|
# be specified.
|
||||||
|
ldapClientId: "contactsLdapClient"
|
||||||
|
|
||||||
|
# A reference to the contact property <-> LDAP attribute mapping definitions to use, referencing the
|
||||||
|
# corresponding entry in the file 'contact-provider-ldap-mappings.yml'.
|
||||||
|
mappings: "ucs"
|
||||||
|
|
||||||
|
# Specifies if support for querying deleted objects is enabled or not. When enabled, deleted objects are
|
||||||
|
# identified with the filter 'isDeleted=TRUE', which is usually only available in Active Directory (as
|
||||||
|
# control with OID 1.2.840.113556.1.4.417). If disabled, no results are available for folders from this
|
||||||
|
# provider for the 'deleted' API call, and therefore no incremental synchronizations are possible. See also
|
||||||
|
# 'usedForSync' folders property. Defaults to "false".
|
||||||
|
isDeletedSupport: false
|
||||||
|
|
||||||
|
# Specifies the requested maximum size for paged results. "0" disables paged results. This should be
|
||||||
|
# configured, especially when the there are server-side restrictions towards the maximum result size.
|
||||||
|
# Defaults to "500".
|
||||||
|
maxPageSize: 500
|
||||||
|
|
||||||
|
# Optionally enables a local cache that holds certain properties of all of the provider's contacts in
|
||||||
|
# memory to speed up access. Can only be used if no individual authentication is used to access the
|
||||||
|
# LDAP server.
|
||||||
|
cache:
|
||||||
|
useCache: false
|
||||||
|
|
||||||
|
# Definition of addressbook folders of the contacts provider. Different folder modes are possible, each
|
||||||
|
# one with its specific configuration settings. The template contains examples for all possible modes,
|
||||||
|
# however, only the one specified through 'mode' property is actually used.
|
||||||
|
folders:
|
||||||
|
|
||||||
|
# Configures in which mode addressbook folders are provided by the contacts provider. Possible modes
|
||||||
|
# are "fixedAttributes" to have a common search filter per folder that varies by a fixed set of possible
|
||||||
|
# attribute values, "dynamicAttributes" to use a common filter and retrieve all possible values
|
||||||
|
# dynamically, or "static" to have a static search filter associated with each contact folder.
|
||||||
|
# The corresponding mode-specific section needs to be configured as well.
|
||||||
|
mode: "dynamicAttributes"
|
||||||
|
|
||||||
|
# Configures if the addressbook folders can be synchronized to external clients via CardDAV or not.
|
||||||
|
# If set to "false", the folders are only available in the web client. If set to "true", folders can
|
||||||
|
# be activated for synchronization. Should only be enabled if attribute mappings for the 'changing_date'
|
||||||
|
# and 'uid' contact properties are available, and the LDAP server supports the special
|
||||||
|
# "LDAP Show Deleted Control" to query tombstone entries via 'isDeleted=TRUE'. The 'protected' flag
|
||||||
|
# controls whether the default value can be changed by the client or not.
|
||||||
|
usedForSync:
|
||||||
|
protected: true
|
||||||
|
defaultValue: false
|
||||||
|
|
||||||
|
# Defines whether addressbook folders will be available in the contact picker dialog of App Suite.
|
||||||
|
# If enabled, contacts from this provider can be looked up through this dialog, otherwise they are
|
||||||
|
# hidden. The 'protected' flag controls whether the default value can be changed by the client or not.
|
||||||
|
usedInPicker:
|
||||||
|
protected: false
|
||||||
|
defaultValue: true
|
||||||
|
|
||||||
|
# Defines whether addressbook folders will be shown as 'subscribed' folders in the tree or not.
|
||||||
|
# If enabled, the folders will appear in the contacts module of App Suite as regular, subscribed folder.
|
||||||
|
# Otherwise, they're treated as hidden, unsubscribed folders. The 'protected' flag controls whether
|
||||||
|
# the default value can be changed by the client or not.
|
||||||
|
shownInTree:
|
||||||
|
protected: false
|
||||||
|
defaultValue: true
|
||||||
|
|
||||||
|
# In "static" folder mode, a fixed list of folder definitions is used, each one with its own contact
|
||||||
|
# filter and name (the names must be unique). Additionally, a "commonContactFilter" needs to be
|
||||||
|
# defined, which is used for operations that are not bound to
|
||||||
|
# a specific folder, like lookups across all visible folders.
|
||||||
|
# The filter's search scopes relative to the LDAP client's 'baseDN' can be configured as "one"
|
||||||
|
# (only immediate subordinates) or "sub" (base entry itself and any subordinate entries to any depth),
|
||||||
|
# and all default to "sub" unless specified otherwise.
|
||||||
|
static:
|
||||||
|
commonContactFilter: "(|(objectClass=person)(objectClass=groupOfNames))"
|
||||||
|
commonContactSearchScope: "sub"
|
||||||
|
folders:
|
||||||
|
- name: "Cupertino"
|
||||||
|
contactFilter: "(&(|(objectClass=person)(objectClass=groupOfNames))(l=Cupertino))"
|
||||||
|
contactSearchScope: "sub"
|
||||||
|
- name: "San Mateo"
|
||||||
|
contactFilter: "(&(|(objectClass=person)(objectClass=groupOfNames))(l=San Mateo))"
|
||||||
|
contactSearchScope: "sub"
|
||||||
|
- name: "Redwood Shores"
|
||||||
|
contactFilter: "(&(|(objectClass=person)(objectClass=groupOfNames))(l=Redwood Shores))"
|
||||||
|
contactSearchScope: "sub"
|
||||||
|
- name: "Armonk"
|
||||||
|
contactFilter: "(&(|(objectClass=person)(objectClass=groupOfNames))(l=Armonk))"
|
||||||
|
contactSearchScope: "sub"
|
||||||
|
|
||||||
|
# With mode "dynamic attributes", all possible values for one attribute are fetched periodically and
|
||||||
|
# serve as folders. The list of values is fetched by querying all entries that match the
|
||||||
|
# "contactFilterTemplate" (with the wildcard "*" as value) and "contactSearchScope" ("one"/"sub").
|
||||||
|
# Then, the folders are derived based on all distinct attribute values found, with the value as name.
|
||||||
|
# Depending on the configured authentication mode, this is either done per user individually, or globally.
|
||||||
|
# Therefore, per-user authentication is not recommend in this mode.
|
||||||
|
# The "refreshInterval" determines how often the list of attributes is refreshed, and can be defined
|
||||||
|
# using units of measurement:
|
||||||
|
# "D" (=days), "W" (=weeks), "H" (=hours) and "m" (=minutes). Defaults to "1h". The optional "sortOrder"
|
||||||
|
# allows to sort the attributes lexicographically, either "ascending" or "descending".
|
||||||
|
dynamicAttributes:
|
||||||
|
attributeName: "o"
|
||||||
|
contactFilterTemplate: "(&(univentionObjectType=users/user)(isOxUser=OK)(o=[value]))"
|
||||||
|
contactSearchScope: "sub"
|
||||||
|
# refreshInterval: 1h
|
||||||
|
refreshInterval: "5m"
|
||||||
|
sortOrder: "ascending"
|
||||||
|
|
||||||
|
# With mode "fixed attributes", all entries matching a filter and having an attribute set to one of the
|
||||||
|
# defined values do form a folder. Works similar to "dynamic attributes", but with a static list of
|
||||||
|
# possible values.
|
||||||
|
# All items defined in the "attributeValues" array are used as folder (with the value as name). When
|
||||||
|
# listing the contents of a specific folder, this folder's specific attribute value is inserted in the
|
||||||
|
# configured "contactFilterTemplate", using the "contactSearchScope" ("one"/"sub").
|
||||||
|
fixedAttributes:
|
||||||
|
contactFilterTemplate: "(&(|(objectClass=person)(objectClass=groupOfNames))(ou=[value]))"
|
||||||
|
contactSearchScope: "sub"
|
||||||
|
attributeValues:
|
||||||
|
- "Janitorial"
|
||||||
|
- "Product Development"
|
||||||
|
- "Management"
|
||||||
|
- "Human Resources"
|
||||||
|
|
||||||
|
other:
|
||||||
|
name: "Other contacts"
|
||||||
|
ldapClientId: "contactsLdapClient"
|
||||||
|
mappings: "ucs"
|
||||||
|
folders:
|
||||||
|
mode: "static"
|
||||||
|
usedForSync:
|
||||||
|
protected: true
|
||||||
|
defaultValue: false
|
||||||
|
usedInPicker:
|
||||||
|
protected: false
|
||||||
|
defaultValue: true
|
||||||
|
shownInTree:
|
||||||
|
protected: false
|
||||||
|
defaultValue: true
|
||||||
|
static:
|
||||||
|
commonContactFilter: "(&(univentionObjectType=users/user)(isOxUser=OK)(!(o=*)))"
|
||||||
|
folders:
|
||||||
|
- name: "Ohne Organisation"
|
||||||
|
contactFilter: "(&(univentionObjectType=users/user)(isOxUser=OK)(!(o=*)))"
|
||||||
|
|
||||||
|
functional:
|
||||||
|
name: "Functional mailboxes"
|
||||||
|
ldapClientId: "contactsLdapClient"
|
||||||
|
mappings: "functional"
|
||||||
|
folders:
|
||||||
|
mode: "static"
|
||||||
|
usedForSync:
|
||||||
|
protected: true
|
||||||
|
defaultValue: false
|
||||||
|
usedInPicker:
|
||||||
|
protected: false
|
||||||
|
defaultValue: true
|
||||||
|
shownInTree:
|
||||||
|
protected: false
|
||||||
|
defaultValue: true
|
||||||
|
static:
|
||||||
|
commonContactFilter: "(univentionObjectType=oxmail/functional_account)"
|
||||||
|
folders:
|
||||||
|
- name: "Funktionale Postfächer"
|
||||||
|
contactFilter: "(univentionObjectType=oxmail/functional_account)"
|
||||||
|
|
||||||
|
contacts-provider-ldap-mappings.yml:
|
||||||
|
# Example definitions of contact property <-> LDAP attribute mappings.
|
||||||
|
#
|
||||||
|
# This template contains examples and will be overwritten during updates. To use, copy this file to
|
||||||
|
# /opt/open-xchange/etc/contacts-provider-ldap-mappings.yml and configure as needed.
|
||||||
|
#
|
||||||
|
# Each configured set of mappings can be used for an LDAP contact provider (as defined through separate
|
||||||
|
# file contacts-provider-ldap.yml), by using the corresponding identifier used in this .yml file.
|
||||||
|
#
|
||||||
|
# Generally, contact properties are set based on an entry's value of the mapped LDAP attribute name.
|
||||||
|
# Empty mappings are ignored. It's possible to define a second LDAP attribute name for a property that is
|
||||||
|
# used as fall-back if the first one is empty in an LDAP result, e.g. to define multiple attributes for a
|
||||||
|
# display name, or to have multiple mappings for contacts and distribution lists.
|
||||||
|
#
|
||||||
|
# For the data-types, each LDAP attribute value is converted/parsed to the type necessary on the server
|
||||||
|
# (Strings, Numbers, Booleans). Dates are assumed to be in UTC and parsed using the pattern 'yyyyMMddHHmmss'.
|
||||||
|
# Binary properties may be indicated by appending ';binary' to the LDAP attribute name. In order to assign
|
||||||
|
# the internal user- and context identifier based on attributes yielding the corresponding
|
||||||
|
# login information (username / contextname), the special appendix ';logininfo' can be used.
|
||||||
|
# Boolean properties may also be set based on a comparison with the LDAP attribute value, which is defined
|
||||||
|
# by the syntax '[LDAP_ATTRIBUTE_NAME]=[EXPECTED_VALUE]', e.g. to set the 'mark_as_distribution_list'
|
||||||
|
# property based on a specific 'objectClass' value.
|
||||||
|
# Alternatively, a Boolean value may also be assigned based on the the existence of any attribute value
|
||||||
|
# using '*'.
|
||||||
|
#
|
||||||
|
# See also https://documentation.open-xchange.com/latest/middleware/contacts/contacts_provider_ldap.html
|
||||||
|
# for further details and a complete list of available configuration options.
|
||||||
|
#
|
||||||
|
|
||||||
|
# Mappings for a typical OpenLDAP server.
|
||||||
|
ucs:
|
||||||
|
# == ID Mappings =======================================================
|
||||||
|
# The object ID is always required and must be unique for the LDAP server. Will use the DN of the entry
|
||||||
|
# unless overridden.
|
||||||
|
# The 'guid' flag can be passed along to properly decode a Microsoft GUID. For 'regular' UUIDs, the
|
||||||
|
# flag 'binary' should be used.
|
||||||
|
objectid: "uidNumber,gidNumber"
|
||||||
|
# The user and context identifiers can be mapped to certain LDAP attributes to aid resolving contact
|
||||||
|
# entries to internal users, e.g. in scenarios where the default global addressbook folder is disabled.
|
||||||
|
# Will only be considered if an entry's context identifier matches the one from the actual session of
|
||||||
|
# the requesting operation.
|
||||||
|
# If used, they should be mapped to attributes that provide the matching rules "integerMatch" for
|
||||||
|
# "EQUALITY" as well as "integerOrderingMatch" for "ORDERING".
|
||||||
|
# Alternatively, if no internal context- or user identifier is available, also attributes yielding
|
||||||
|
# the corresponding login information (username / contextname) can be used by appending ';logininfo'
|
||||||
|
# to the attribute name.
|
||||||
|
internal_userid: "uid;logininfo"
|
||||||
|
contextid: "oxContextIDNum"
|
||||||
|
# The 'guid' flag can be passed along properly decode a Microsoft GUID. For 'regular' UUIDs in binary
|
||||||
|
# format, the flag 'binary' should be used.
|
||||||
|
# uid : entryUUID;binary;logininfo
|
||||||
|
|
||||||
|
# == String Mappings ===================================================
|
||||||
|
displayname: "oxDisplayName,displayName,name"
|
||||||
|
file_as: "oxDisplayName,displayName,name"
|
||||||
|
givenname: "givenName"
|
||||||
|
surname: "sn"
|
||||||
|
email1: "mailPrimaryAddress"
|
||||||
|
department: "oxDepartment,department"
|
||||||
|
company: "oxCompany,o"
|
||||||
|
branches: "oxBranches"
|
||||||
|
# business_category :
|
||||||
|
postal_code_business: "postalCode"
|
||||||
|
state_business: "oxStateBusiness,st"
|
||||||
|
street_business: "streetAddress"
|
||||||
|
# telephone_callback :
|
||||||
|
city_home: "oxCityHome"
|
||||||
|
commercial_register: "oxCommercialRegister"
|
||||||
|
country_home: "oxCountryHome"
|
||||||
|
email2: "oxEmail2"
|
||||||
|
email3: "oxEmail3"
|
||||||
|
employeetype: "employeeType"
|
||||||
|
fax_business: "oxFaxBusiness,facsimileTelehoneNumber"
|
||||||
|
fax_home: "oxFaxHome"
|
||||||
|
fax_other: "oxFaxOther"
|
||||||
|
instant_messenger1: "oxInstantMessenger1"
|
||||||
|
instant_messenger2: "oxInstantMessenger2"
|
||||||
|
telephone_ip: "oxTelephoneIp"
|
||||||
|
telephone_isdn: "internationaliSDNNumber"
|
||||||
|
marital_status: "oxMaritalStatus"
|
||||||
|
cellular_telephone1: "mobile"
|
||||||
|
# cellular_telephone2 :
|
||||||
|
nickname: "oxNickName"
|
||||||
|
number_of_children: "oxNumOfChildren"
|
||||||
|
number_of_employee: "employeeNumber"
|
||||||
|
note: "oxNote,description"
|
||||||
|
telephone_pager: "oxTelephonePager,pager"
|
||||||
|
telephone_assistant: "oxTelephoneAssistant"
|
||||||
|
telephone_business1: "oxTelephoneBusiness1,telephoneNumber"
|
||||||
|
telephone_business2: "oxTelephoneBusiness2"
|
||||||
|
telephone_car: "oxTelephoneCar"
|
||||||
|
telephone_company: "oxTelephoneCompany"
|
||||||
|
telephone_home1: "oxTelephoneHome1,homePhone"
|
||||||
|
telephone_home2: "oxTelephoneHome2"
|
||||||
|
telephone_other: "oxTelephoneOther"
|
||||||
|
postal_code_home: "oxPostalCodeHome"
|
||||||
|
# telephone_radio :
|
||||||
|
room_number: "roomNumber"
|
||||||
|
sales_volume: "oxSalesVolume"
|
||||||
|
city_other: "oxCityOther"
|
||||||
|
country_other: "oxCountryOther"
|
||||||
|
middle_name: "oxMiddleName,middleName"
|
||||||
|
postal_code_other: "oxPostalCodeOther"
|
||||||
|
state_other: "oxStateOther"
|
||||||
|
street_other: "oxStreetOther"
|
||||||
|
spouse_name: "oxSpouseName"
|
||||||
|
state_home: "oxStateHome"
|
||||||
|
street_home: "oxStreetHome"
|
||||||
|
suffix: "oxSuffix"
|
||||||
|
tax_id: "oxTaxId"
|
||||||
|
telephone_telex: "oxTelephoneTelex,telexNumber"
|
||||||
|
telephone_ttytdd: "oxTelephoneTtydd"
|
||||||
|
url: "oxUrl,wWWHome"
|
||||||
|
userfield01: "oxUserfiels01"
|
||||||
|
userfield02: "oxUserfiels02"
|
||||||
|
userfield03: "oxUserfiels03"
|
||||||
|
userfield04: "oxUserfiels04"
|
||||||
|
userfield05: "oxUserfiels05"
|
||||||
|
userfield06: "oxUserfiels06"
|
||||||
|
userfield07: "oxUserfiels07"
|
||||||
|
userfield08: "oxUserfiels08"
|
||||||
|
userfield09: "oxUserfiels09"
|
||||||
|
userfield10: "oxUserfiels10"
|
||||||
|
userfield11: "oxUserfiels11"
|
||||||
|
userfield12: "oxUserfiels12"
|
||||||
|
userfield13: "oxUserfiels13"
|
||||||
|
userfield14: "oxUserfiels14"
|
||||||
|
userfield15: "oxUserfiels15"
|
||||||
|
userfield16: "oxUserfiels16"
|
||||||
|
userfield17: "oxUserfiels17"
|
||||||
|
userfield18: "oxUserfiels18"
|
||||||
|
userfield19: "oxUserfiels19"
|
||||||
|
userfield20: "oxUserfiels20"
|
||||||
|
city_business: "l"
|
||||||
|
country_business: "oxCountryBusiness,country"
|
||||||
|
# telephone_primary :
|
||||||
|
# categories :
|
||||||
|
title: "title"
|
||||||
|
position: "oxPosition"
|
||||||
|
profession: "oxProfession"
|
||||||
|
|
||||||
|
# == Date Mappings =====================================================
|
||||||
|
birthday: "oxBirthday"
|
||||||
|
anniversary: "oxAnniversary"
|
||||||
|
# The last-modified and creation dates are required by the groupware server, therefore an implicit
|
||||||
|
# default date is assumed when no LDAP attribute is mapped here, and no results are available for this
|
||||||
|
# folder for the 'modified' and 'deleted' API calls. Therefore, any synchronization-based usage will
|
||||||
|
# not be available.
|
||||||
|
lastmodified: "modifyTimestamp"
|
||||||
|
creationdate: "createTimestamp"
|
||||||
|
|
||||||
|
# == Misc Mappings =====================================================
|
||||||
|
# Distribution list members are resolved dynamically using the DNs found in the mapped LDAP attribute.
|
||||||
|
# Alternatively, if the attribute value does not denote a DN reference, the value is assumed to be the
|
||||||
|
# plain email address of the member.
|
||||||
|
distributionlist: "memberUid"
|
||||||
|
# Special mapping where the value is evaluated using a string comparison with, or the existence of
|
||||||
|
# the attribute value.
|
||||||
|
markasdistributionlist: "objectClass=posixGroup"
|
||||||
|
# The values for the for assistant- and manager name mappings are either used as-is, or get resolved
|
||||||
|
# dynamically using the DNs found
|
||||||
|
# in the mapped LDAP attribute.
|
||||||
|
assistant_name: "secretary"
|
||||||
|
manager_name: "oxManagerName,manager"
|
||||||
|
# Contact image, binary format is expected.
|
||||||
|
image1: "jpegPhoto"
|
||||||
|
# Special mapping where the value is evaluated using a string comparison with, or the existence of
|
||||||
|
# the attribute value.
|
||||||
|
number_of_images: "jpegPhoto=*"
|
||||||
|
# Will be set internally if not defined.
|
||||||
|
# image_last_modified :
|
||||||
|
# Will be set automatically to "image/jpeg" if not defined.
|
||||||
|
# image1_content_type :
|
||||||
|
|
||||||
|
functional:
|
||||||
|
objectid: "mailPrimaryAddress"
|
||||||
|
displayname: "oxPersonal,cn,mailPrimaryAddress"
|
||||||
|
file_as: "oxPersonal,cn,mailPrimaryAddress"
|
||||||
|
email1: "mailPrimaryAddress"
|
||||||
@@ -4,36 +4,41 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
hostname: "{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
hostname: "{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
mysql:
|
mysql:
|
||||||
host: "{{ .Values.databases.oxAppsuite.host }}"
|
host: {{ .Values.databases.oxAppsuite.host | quote }}
|
||||||
database: "{{ .Values.databases.oxAppsuite.name }}"
|
database: {{ .Values.databases.oxAppsuite.name | quote }}
|
||||||
auth:
|
auth:
|
||||||
user: "{{ .Values.databases.oxAppsuite.username }}"
|
user: {{ .Values.databases.oxAppsuite.username | quote }}
|
||||||
password: "{{ .Values.databases.oxAppsuite.password | default .Values.secrets.mariadb.rootPassword }}"
|
password: {{ .Values.databases.oxAppsuite.password | default .Values.secrets.mariadb.rootPassword | quote }}
|
||||||
rootPassword: "{{ .Values.databases.oxAppsuite.password | default .Values.secrets.mariadb.rootPassword }}"
|
rootPassword: {{ .Values.databases.oxAppsuite.password | default .Values.secrets.mariadb.rootPassword | quote }}
|
||||||
|
|
||||||
istio:
|
istio:
|
||||||
enabled: {{ .Values.istio.enabled }}
|
enabled: {{ .Values.istio.enabled }}
|
||||||
|
|
||||||
nextcloud-integration-ui:
|
nextcloud-integration-ui:
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeNextcloudIntegrationUI.repository }}
|
repository: {{ .Values.images.openxchangeNextcloudIntegrationUI.repository | quote }}
|
||||||
tag: {{ .Values.images.openxchangeNextcloudIntegrationUI.tag }}
|
tag: {{ .Values.images.openxchangeNextcloudIntegrationUI.tag | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.openxchangeNextcloudIntegrationUI | toYaml | nindent 4 }}
|
||||||
|
|
||||||
public-sector-ui:
|
public-sector-ui:
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangePublicSectorUI.repository }}
|
repository: {{ .Values.images.openxchangePublicSectorUI.repository | quote }}
|
||||||
tag: {{ .Values.images.openxchangePublicSectorUI.tag }}
|
tag: {{ .Values.images.openxchangePublicSectorUI.tag | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.openxchangePublicSectorUI | toYaml | nindent 4 }}
|
||||||
|
|
||||||
appsuite:
|
appsuite:
|
||||||
istio:
|
istio:
|
||||||
@@ -52,6 +57,17 @@ appsuite:
|
|||||||
core-mw:
|
core-mw:
|
||||||
masterPassword: {{ .Values.secrets.oxAppsuite.adminPassword | quote }}
|
masterPassword: {{ .Values.secrets.oxAppsuite.adminPassword | quote }}
|
||||||
hostname: "{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
hostname: "{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
|
gotenberg:
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.openxchangeGotenberg.repository }}"
|
||||||
|
tag: {{ .Values.images.openxchangeGotenberg.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.openxchangeGotenberg | toYaml | nindent 8 }}
|
||||||
properties:
|
properties:
|
||||||
"com.openexchange.oauth.provider.jwt.jwksUri": "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/certs"
|
"com.openexchange.oauth.provider.jwt.jwksUri": "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/certs"
|
||||||
"com.openexchange.oauth.provider.allowedIssuer": "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
"com.openexchange.oauth.provider.allowedIssuer": "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
||||||
@@ -73,9 +89,20 @@ appsuite:
|
|||||||
propertiesFiles:
|
propertiesFiles:
|
||||||
"/opt/open-xchange/etc/ldapauth.properties":
|
"/opt/open-xchange/etc/ldapauth.properties":
|
||||||
bindDNPassword: {{ .Values.secrets.univentionCorporateServer.ldapSearch.ox | quote }}
|
bindDNPassword: {{ .Values.secrets.univentionCorporateServer.ldapSearch.ox | quote }}
|
||||||
|
java.naming.provider.url: "ldap://{{ .Values.ldap.host }}:389/dc=swp-ldap,dc=internal"
|
||||||
uiSettings:
|
uiSettings:
|
||||||
"io.ox.nextcloud//server": "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/fs/"
|
"io.ox.nextcloud//server": "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/fs/"
|
||||||
"io.ox.public-sector//ics/url": "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/"
|
"io.ox.public-sector//ics/url": "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/"
|
||||||
|
# Dynamic theme
|
||||||
|
io.ox/dynamic-theme//mainColor: {{ .Values.theme.colors.primary | quote }}
|
||||||
|
io.ox/dynamic-theme//logoURL: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/univention/portal/icons/logos/domain.svg"
|
||||||
|
io.ox/dynamic-theme//topbarBackground: {{ .Values.theme.colors.white | quote }}
|
||||||
|
io.ox/dynamic-theme//topbarColor: {{ .Values.theme.colors.black | quote }}
|
||||||
|
io.ox/dynamic-theme//listSelected: {{ .Values.theme.colors.primary15 | quote }}
|
||||||
|
io.ox/dynamic-theme//listHover: {{ .Values.theme.colors.secondaryGreyLight | quote }}
|
||||||
|
io.ox/dynamic-theme//folderBackground: {{ .Values.theme.colors.white | quote }}
|
||||||
|
io.ox/dynamic-theme//folderSelected: {{ .Values.theme.colors.primary15 | quote }}
|
||||||
|
io.ox/dynamic-theme//folderHover: {{ .Values.theme.colors.secondaryGreyLight | quote }}
|
||||||
secretETCFiles:
|
secretETCFiles:
|
||||||
# Format of the OX Guard master key:
|
# Format of the OX Guard master key:
|
||||||
# MC+base64(20 random bytes)
|
# MC+base64(20 random bytes)
|
||||||
@@ -83,26 +110,35 @@ appsuite:
|
|||||||
oxguardpass: |
|
oxguardpass: |
|
||||||
{{ .Values.secrets.oxAppsuite.oxguardMC }}
|
{{ .Values.secrets.oxAppsuite.oxguardMC }}
|
||||||
{{ .Values.secrets.oxAppsuite.oxguardRC }}
|
{{ .Values.secrets.oxAppsuite.oxguardRC }}
|
||||||
|
redis:
|
||||||
|
auth:
|
||||||
|
password: {{ .Values.secrets.redis.password | quote }}
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreMW.repository }}
|
repository: {{ .Values.images.openxchangeCoreMW.repository | quote }}
|
||||||
tag: {{ .Values.images.openxchangeCoreMW.tag }}
|
tag: {{ .Values.images.openxchangeCoreMW.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
update:
|
update:
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreMW.repository }}
|
repository: {{ .Values.images.openxchangeCoreMW.repository | quote }}
|
||||||
tag: {{ .Values.images.openxchangeCoreMW.tag }}
|
tag: {{ .Values.images.openxchangeCoreMW.tag | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.openxchangeCoreMW | toYaml | nindent 6 }}
|
||||||
|
|
||||||
core-ui:
|
core-ui:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreUI.repository }}
|
repository: {{ .Values.images.openxchangeCoreUI.repository | quote }}
|
||||||
tag: {{ .Values.images.openxchangeCoreUI.tag }}
|
tag: {{ .Values.images.openxchangeCoreUI.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.openxchangeCoreUI | toYaml | nindent 6 }}
|
||||||
|
|
||||||
core-ui-middleware:
|
core-ui-middleware:
|
||||||
ingress:
|
ingress:
|
||||||
@@ -111,36 +147,68 @@ appsuite:
|
|||||||
enabled: false
|
enabled: false
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreUIMiddleware.repository }}
|
repository: {{ .Values.images.openxchangeCoreUIMiddleware.repository | quote }}
|
||||||
tag: {{ .Values.images.openxchangeCoreUIMiddleware.tag }}
|
tag: {{ .Values.images.openxchangeCoreUIMiddleware.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
redis:
|
||||||
|
auth:
|
||||||
|
password: {{ .Values.secrets.redis.password | quote }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.openxchangeCoreUIMiddleware | toYaml | nindent 6 }}
|
||||||
|
updater:
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.openxchangeCoreUIMiddlewareUpdater | toYaml | nindent 6 }}
|
||||||
|
|
||||||
|
core-documentconverter:
|
||||||
|
image:
|
||||||
|
repository: {{ .Values.images.openxchangeDocumentConverter.repository | quote }}
|
||||||
|
tag: {{ .Values.images.openxchangeDocumentConverter.tag | quote }}
|
||||||
|
resources:
|
||||||
|
{{- .Values.resources.openxchangeCoreDocumentConverter | toYaml | nindent 6 }}
|
||||||
|
|
||||||
core-guidedtours:
|
core-guidedtours:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreGuidedtours.repository }}
|
repository: {{ .Values.images.openxchangeCoreGuidedtours.repository | quote }}
|
||||||
tag: {{ .Values.images.openxchangeCoreGuidedtours.tag }}
|
tag: {{ .Values.images.openxchangeCoreGuidedtours.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
resources:
|
||||||
|
{{- .Values.resources.openxchangeCoreGuidedtours | toYaml | nindent 6 }}
|
||||||
|
|
||||||
|
core-imageconverter:
|
||||||
|
image:
|
||||||
|
repository: {{ .Values.images.openxchangeImageConverter.repository | quote }}
|
||||||
|
tag: {{ .Values.images.openxchangeImageConverter.tag | quote }}
|
||||||
|
resources:
|
||||||
|
{{- .Values.resources.openxchangeCoreImageConverter | toYaml | nindent 6 }}
|
||||||
|
|
||||||
guard-ui:
|
guard-ui:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.global.imageRegistry }}/{{ .Values.images.openxchangeGuardUI.repository }}
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.openxchangeGuardUI.repository }}"
|
||||||
tag: {{ .Values.images.openxchangeGuardUI.tag }}
|
tag: {{ .Values.images.openxchangeGuardUI.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
resources:
|
||||||
|
{{- .Values.resources.openxchangeGuardUI | toYaml | nindent 6 }}
|
||||||
|
|
||||||
core-user-guide:
|
core-user-guide:
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreUserGuide.repository }}
|
repository: {{ .Values.images.openxchangeCoreUserGuide.repository | quote }}
|
||||||
tag: {{ .Values.images.openxchangeCoreUserGuide.tag }}
|
tag: {{ .Values.images.openxchangeCoreUserGuide.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
resources:
|
||||||
|
{{- .Values.resources.openxchangeCoreUserGuide | toYaml | nindent 6 }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,11 +4,27 @@
|
|||||||
appsuite:
|
appsuite:
|
||||||
istio:
|
istio:
|
||||||
ingressGateway:
|
ingressGateway:
|
||||||
name: "sovereign-workplace-gateway-istio-gateway"
|
name: "opendesk-gateway-istio-gateway"
|
||||||
|
|
||||||
|
switchboard:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
core-mw:
|
core-mw:
|
||||||
enabled: true
|
enabled: true
|
||||||
masterAdmin: "admin"
|
masterAdmin: "admin"
|
||||||
|
gotenberg:
|
||||||
|
enabled: true
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1001
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
features:
|
features:
|
||||||
status:
|
status:
|
||||||
# enable admin pack
|
# enable admin pack
|
||||||
@@ -22,6 +38,14 @@ appsuite:
|
|||||||
open-xchange-authentication-oauth: "enabled"
|
open-xchange-authentication-oauth: "enabled"
|
||||||
properties:
|
properties:
|
||||||
com.openexchange.UIWebPath: "/appsuite/"
|
com.openexchange.UIWebPath: "/appsuite/"
|
||||||
|
com.openexchange.showAdmin: "false"
|
||||||
|
# PDF Export
|
||||||
|
com.openexchange.capability.mail_export_pdf: "true"
|
||||||
|
com.openexchange.mail.exportpdf.gotenberg.enabled: "true"
|
||||||
|
com.openexchange.mail.exportpdf.collabora.enabled: "true"
|
||||||
|
com.openexchange.mail.exportpdf.pdfa.collabora.enabled: "true"
|
||||||
|
com.openexchange.mail.exportpdf.collabora.url: "http://collabora:9980"
|
||||||
|
com.openexchange.mail.exportpdf.gotenberg.url: "http://open-xchange-gotenberg:3000"
|
||||||
# OIDC
|
# OIDC
|
||||||
com.openexchange.oidc.enabled: "true"
|
com.openexchange.oidc.enabled: "true"
|
||||||
com.openexchange.oidc.autologinCookieMode: "ox_direct"
|
com.openexchange.oidc.autologinCookieMode: "ox_direct"
|
||||||
@@ -54,15 +78,24 @@ appsuite:
|
|||||||
com.openexchange.mail.filter.credentialSource: "mail"
|
com.openexchange.mail.filter.credentialSource: "mail"
|
||||||
com.openexchange.mail.filter.server: "dovecot"
|
com.openexchange.mail.filter.server: "dovecot"
|
||||||
com.openexchange.mail.filter.preferredSaslMech: "XOAUTH2"
|
com.openexchange.mail.filter.preferredSaslMech: "XOAUTH2"
|
||||||
|
# Dovecot
|
||||||
|
com.openexchange.imap.attachmentMarker.enabled: "true"
|
||||||
# Capabilities
|
# Capabilities
|
||||||
|
# Old capability can be used to toggle all integrations with a single switch
|
||||||
|
com.openexchange.capability.public-sector: "true"
|
||||||
|
# New capabilities in 2.0
|
||||||
|
com.openexchange.capability.public-sector-element: "true"
|
||||||
|
com.openexchange.capability.public-sector-navigation: "true"
|
||||||
com.openexchange.capability.client-onboarding: "true"
|
com.openexchange.capability.client-onboarding: "true"
|
||||||
com.openexchange.capability.dynamic-theme: "true"
|
com.openexchange.capability.dynamic-theme: "true"
|
||||||
com.openexchange.capability.filestorage_nextcloud: "true"
|
com.openexchange.capability.filestorage_nextcloud: "true"
|
||||||
com.openexchange.capability.filestorage_nextcloud_oauth: "true"
|
com.openexchange.capability.filestorage_nextcloud_oauth: "true"
|
||||||
com.openexchange.capability.guard: "true"
|
com.openexchange.capability.guard: "true"
|
||||||
com.openexchange.capability.guard-mail: "true"
|
com.openexchange.capability.guard-mail: "true"
|
||||||
com.openexchange.capability.public-sector: "true"
|
|
||||||
com.openexchange.capability.smime: "true"
|
com.openexchange.capability.smime: "true"
|
||||||
|
com.openexchange.capability.share_links: "false"
|
||||||
|
com.openexchange.capability.invite_guests: "false"
|
||||||
|
com.openexchange.capability.document_preview: "true"
|
||||||
# Secondary Accounts
|
# Secondary Accounts
|
||||||
com.openexchange.mail.secondary.authType: "XOAUTH2"
|
com.openexchange.mail.secondary.authType: "XOAUTH2"
|
||||||
com.openexchange.mail.transport.secondary.authType: "xoauth2"
|
com.openexchange.mail.transport.secondary.authType: "xoauth2"
|
||||||
@@ -74,6 +107,8 @@ appsuite:
|
|||||||
com.openexchange.gdpr.dataexport.enabled: "false"
|
com.openexchange.gdpr.dataexport.enabled: "false"
|
||||||
com.openexchange.gdpr.dataexport.active: "false"
|
com.openexchange.gdpr.dataexport.active: "false"
|
||||||
# Guard
|
# Guard
|
||||||
|
com.openexchange.guard.storage.file.fileStorageType: "file"
|
||||||
|
com.openexchange.guard.storage.file.uploadDirectory: "/opt/open-xchange/guard-files/"
|
||||||
com.openexchange.guard.guestSMTPServer: "postfix"
|
com.openexchange.guard.guestSMTPServer: "postfix"
|
||||||
# S/MIME
|
# S/MIME
|
||||||
# Usage (in browser console after login):
|
# Usage (in browser console after login):
|
||||||
@@ -88,11 +123,17 @@ appsuite:
|
|||||||
/opt/open-xchange/etc/system.properties:
|
/opt/open-xchange/etc/system.properties:
|
||||||
SERVER_NAME: "oxserver"
|
SERVER_NAME: "oxserver"
|
||||||
/opt/open-xchange/etc/ldapauth.properties:
|
/opt/open-xchange/etc/ldapauth.properties:
|
||||||
java.naming.provider.url: "ldap://univention-corporate-container:389/dc=swp-ldap,dc=internal"
|
|
||||||
bindOnly: "false"
|
bindOnly: "false"
|
||||||
bindDN: "uid=ldapsearch_ox,cn=users,dc=swp-ldap,dc=internal"
|
bindDN: "uid=ldapsearch_ox,cn=users,dc=swp-ldap,dc=internal"
|
||||||
|
|
||||||
uiSettings:
|
uiSettings:
|
||||||
|
# Show the Enterprise Picker in the top right corner instead of the launcher drop-down
|
||||||
|
io.ox/core//features/enterprisePicker/showLauncher: "false"
|
||||||
|
io.ox/core//features/enterprisePicker/showTopRightLauncher: "true"
|
||||||
|
# Text and icon color in the topbar
|
||||||
|
io.ox/dynamic-theme//topbarColor: "#000"
|
||||||
|
io.ox/dynamic-theme//logoWidth: "82"
|
||||||
|
io.ox/dynamic-theme//topbarHover: "rgba(0, 0, 0, 0.1)"
|
||||||
# Resources
|
# Resources
|
||||||
io.ox/core//features/resourceCalendars: "true"
|
io.ox/core//features/resourceCalendars: "true"
|
||||||
io.ox/core//features/managedResources: "true"
|
io.ox/core//features/managedResources: "true"
|
||||||
@@ -107,18 +148,8 @@ appsuite:
|
|||||||
# io.ox.public-sector//ics/url: "https://ics.<DOMAIN>/"
|
# io.ox.public-sector//ics/url: "https://ics.<DOMAIN>/"
|
||||||
io.ox/core//apps/quickLaunchCount: "0"
|
io.ox/core//apps/quickLaunchCount: "0"
|
||||||
io.ox/core//coloredIcons: "false"
|
io.ox/core//coloredIcons: "false"
|
||||||
# Dynamic theme
|
# Mail templates
|
||||||
io.ox/dynamic-theme//mainColor: "#004B76"
|
io.ox/core//features/templates: "true"
|
||||||
io.ox/dynamic-theme//logoURL: "io.ox.public-sector/logo.svg"
|
|
||||||
io.ox/dynamic-theme//logoWidth: "80"
|
|
||||||
io.ox/dynamic-theme//topbarBackground: "#fff"
|
|
||||||
io.ox/dynamic-theme//topbarColor: "#1f1f1f"
|
|
||||||
io.ox/dynamic-theme//topbarHover: "rgba(0, 0, 0, 0.1)"
|
|
||||||
io.ox/dynamic-theme//listSelected: "#ADC8F0"
|
|
||||||
io.ox/dynamic-theme//listHover: "#ddd"
|
|
||||||
io.ox/dynamic-theme//folderBackground: "#fff"
|
|
||||||
io.ox/dynamic-theme//folderSelected: "#ADC8F0"
|
|
||||||
io.ox/dynamic-theme//folderHover: "#ddd"
|
|
||||||
|
|
||||||
asConfig:
|
asConfig:
|
||||||
default:
|
default:
|
||||||
@@ -127,24 +158,147 @@ appsuite:
|
|||||||
oidcLogin: true
|
oidcLogin: true
|
||||||
oidcPath: "/oidc"
|
oidcPath: "/oidc"
|
||||||
|
|
||||||
|
redis:
|
||||||
|
enabled: true
|
||||||
|
mode: "standalone"
|
||||||
|
hosts:
|
||||||
|
- "redis-master"
|
||||||
|
|
||||||
|
hooks:
|
||||||
|
beforeAppsuiteStart:
|
||||||
|
create-guard-dir.sh: |
|
||||||
|
mkdir -p /opt/open-xchange/guard-files
|
||||||
|
chown open-xchange:open-xchange /opt/open-xchange/guard-files
|
||||||
|
|
||||||
|
# Security context for core-mw has no effect yet
|
||||||
|
# podSecurityContext: {}
|
||||||
|
# securityContext: {}
|
||||||
|
|
||||||
core-ui:
|
core-ui:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
core-ui-middleware:
|
core-ui-middleware:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
overrides: {}
|
||||||
|
redis:
|
||||||
|
mode: "standalone"
|
||||||
|
hosts:
|
||||||
|
- "redis-master:6379"
|
||||||
|
auth:
|
||||||
|
enabled: true
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
core-guidedtours:
|
core-guidedtours:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
guard-ui:
|
guard-ui:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
core-cacheservice:
|
core-cacheservice:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
core-user-guide:
|
core-user-guide:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
core-imageconverter:
|
core-imageconverter:
|
||||||
enabled: false
|
enabled: true
|
||||||
|
objectCache:
|
||||||
|
s3ObjectStores:
|
||||||
|
- id: -1
|
||||||
|
endpoint: "."
|
||||||
|
accessKey: "."
|
||||||
|
secretKey: "."
|
||||||
|
podSecurityContext:
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 987
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
securityContext:
|
||||||
|
# missing:
|
||||||
|
# readOnlyRootFilesystem: true
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
|
||||||
core-spellcheck:
|
core-spellcheck:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
core-documentconverter:
|
core-documentconverter:
|
||||||
enabled: false
|
enabled: true
|
||||||
|
documentConverter:
|
||||||
|
cache:
|
||||||
|
remoteCache:
|
||||||
|
enabled: false
|
||||||
|
podSecurityContext:
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 987
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
securityContext:
|
||||||
|
# missing:
|
||||||
|
# readOnlyRootFilesystem: true
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
|
||||||
core-documents-collaboration:
|
core-documents-collaboration:
|
||||||
enabled: false
|
enabled: false
|
||||||
office-web:
|
office-web:
|
||||||
@@ -159,3 +313,30 @@ appsuite:
|
|||||||
enabled: false
|
enabled: false
|
||||||
core-drive-help:
|
core-drive-help:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
nextcloud-integration-ui:
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
public-sector-ui:
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
...
|
||||||
|
|||||||
41
helmfile/apps/openproject-bootstrap/helmfile.yaml
Normal file
41
helmfile/apps/openproject-bootstrap/helmfile.yaml
Normal file
@@ -0,0 +1,41 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
|
---
|
||||||
|
repositories:
|
||||||
|
# openDesk OpenProject Bootstrap
|
||||||
|
# Source: Set when repo is managed on Open CoDE
|
||||||
|
- name: "opendesk-openproject-bootstrap-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/opendesk-openproject-bootstrap" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/opendesk-openproject-bootstrap/opendesk-openproject-bootstrap
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=vendor
|
||||||
|
- name: "opendesk-openproject-bootstrap"
|
||||||
|
chart: "opendesk-openproject-bootstrap-repo/opendesk-openproject-bootstrap"
|
||||||
|
version: "1.2.1"
|
||||||
|
wait: true
|
||||||
|
waitForJobs: true
|
||||||
|
values:
|
||||||
|
- "values.yaml"
|
||||||
|
- "values.gotmpl"
|
||||||
|
installed: {{ .Values.openproject.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
commonLabels:
|
||||||
|
deploy-stage: "component-2"
|
||||||
|
component: "opendesk-openproject-bootstrap"
|
||||||
|
...
|
||||||
34
helmfile/apps/openproject-bootstrap/values.gotmpl
Normal file
34
helmfile/apps/openproject-bootstrap/values.gotmpl
Normal file
@@ -0,0 +1,34 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: "{{ .Values.global.domain }}"
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry }}
|
||||||
|
repository: "{{ .Values.images.openprojectBootstrap.repository }}"
|
||||||
|
tag: "{{ .Values.images.openprojectBootstrap.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
keepPVCOnDelete: {{ .Values.cleanup.keepPVCOnDelete }}
|
||||||
|
|
||||||
|
config:
|
||||||
|
openproject:
|
||||||
|
fileshareName: "Nextcloud at {{ .Values.global.domain }}"
|
||||||
|
admin:
|
||||||
|
username: {{ .Values.secrets.openproject.apiAdminUsername | quote }}
|
||||||
|
password: {{ .Values.secrets.openproject.apiAdminPassword | quote }}
|
||||||
|
nextcloud:
|
||||||
|
admin:
|
||||||
|
username: "nextcloud"
|
||||||
|
password: {{ .Values.secrets.nextcloud.adminPassword | quote }}
|
||||||
|
...
|
||||||
25
helmfile/apps/openproject-bootstrap/values.yaml
Normal file
25
helmfile/apps/openproject-bootstrap/values.yaml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
|
job:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 1000
|
||||||
|
fsGroupChangePolicy: "OnRootMismatch"
|
||||||
|
...
|
||||||
@@ -1,25 +1,38 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# OpenProject
|
||||||
|
# Source: https://github.com/opf/helm-charts
|
||||||
- name: "openproject-repo"
|
- name: "openproject-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
default "https://charts.openproject.org" }}
|
default "https://charts.openproject.org" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/openproject-com.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://charts.openproject.org
|
||||||
|
# packageName=openproject
|
||||||
|
# dataSource=helm
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "openproject"
|
- name: "openproject"
|
||||||
chart: "openproject-repo/openproject"
|
chart: "openproject-repo/openproject"
|
||||||
version: "1.8.0"
|
version: "2.6.2"
|
||||||
|
wait: true
|
||||||
|
waitForJobs: true
|
||||||
values:
|
values:
|
||||||
- "values.yaml"
|
- "values.yaml"
|
||||||
- "values.gotmpl"
|
- "values.gotmpl"
|
||||||
condition: "openproject.enabled"
|
installed: {{ .Values.openproject.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "openproject"
|
component: "openproject"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -8,61 +8,85 @@ global:
|
|||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.openproject.repository }}"
|
repository: {{ .Values.images.openproject.repository | quote }}
|
||||||
pullPolicy: "Always"
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
tag: "{{ .Values.images.openproject.tag }}"
|
tag: {{ .Values.images.openproject.tag | quote }}
|
||||||
|
|
||||||
memcached:
|
initdb:
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.memcached.repository }}"
|
repository: "{{ .Values.images.openprojectInitDb.repository }}"
|
||||||
tag: "{{ .Values.images.memcached.tag }}"
|
tag: "{{ .Values.images.openprojectInitDb.tag }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
|
memcached:
|
||||||
|
connection:
|
||||||
|
host: {{ .Values.cache.openproject.host | quote }}
|
||||||
|
port: {{ .Values.cache.openproject.port }}
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
repository: {{ .Values.images.memcached.repository | quote }}
|
||||||
|
tag: {{ .Values.images.memcached.tag | quote }}
|
||||||
|
|
||||||
postgresql:
|
postgresql:
|
||||||
auth:
|
auth:
|
||||||
password: {{ .Values.databases.openproject.password | default .Values.secrets.postgresql.openprojectUser }}
|
password: {{ .Values.databases.openproject.password | default .Values.secrets.postgresql.openprojectUser | quote }}
|
||||||
username: "{{ .Values.databases.openproject.username }}"
|
username: {{ .Values.databases.openproject.username | quote }}
|
||||||
database: "{{ .Values.databases.openproject.name }}"
|
database: {{ .Values.databases.openproject.name | quote }}
|
||||||
connection:
|
connection:
|
||||||
host: "{{ .Values.databases.openproject.host }}"
|
host: {{ .Values.databases.openproject.host | quote }}
|
||||||
port: "{{ .Values.databases.openproject.port }}"
|
port: {{ .Values.databases.openproject.port }}
|
||||||
|
|
||||||
openproject:
|
openproject:
|
||||||
host: "{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}"
|
||||||
# Will only be set on initial seed / installation
|
# Will only be set on initial seed / installation
|
||||||
admin_user:
|
admin_user:
|
||||||
name: "OpenProject Interal Admin"
|
name: "OpenProject Internal Admin"
|
||||||
mail: "openproject-admin@swp-domain.internal"
|
mail: "openproject-admin@swp-domain.internal"
|
||||||
password_reset: "false"
|
password_reset: "false"
|
||||||
password: "{{ .Values.secrets.openproject.adminPassword }}"
|
password: {{ .Values.secrets.openproject.adminPassword | quote }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
host: "{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}"
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
tls:
|
tls:
|
||||||
enabled: {{ .Values.ingress.tls.enabled }}
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
environment:
|
environment:
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_SECRET: {{ .Values.secrets.keycloak.clientSecret.openproject }}
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_SECRET: {{ .Values.secrets.keycloak.clientSecret.openproject | quote }}
|
||||||
|
OPENPROJECT_AUTHENTICATION_GLOBAL__BASIC__AUTH_USER: {{ .Values.secrets.openproject.apiAdminUsername | quote }}
|
||||||
|
OPENPROJECT_AUTHENTICATION_GLOBAL__BASIC__AUTH_PASSWORD: {{ .Values.secrets.openproject.apiAdminPassword | quote }}
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_ISSUER: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_ISSUER: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_POST__LOGOUT__REDIRECT__URI: "https://{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}/"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_POST__LOGOUT__REDIRECT__URI: "https://{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}/"
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_HOST: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_HOST: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_END__SESSION__ENDPOINT: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/logout"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_END__SESSION__ENDPOINT: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/logout"
|
||||||
OPENPROJECT_SOUVAP__NAVIGATION__SECRET: {{ .Values.secrets.centralnavigation.apiKey }}
|
# Details: https://www.openproject-edge.com/docs/installation-and-operations/configuration/#seeding-ldap-connections
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_HOST: {{ .Values.ldap.host | quote }}
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_PORT: "389"
|
||||||
|
OPENPROJECT_SOUVAP__NAVIGATION__SECRET: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
OPENPROJECT_SOUVAP__NAVIGATION__URL: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/univention/portal/navigation.json?base=https%3A//{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}"
|
OPENPROJECT_SOUVAP__NAVIGATION__URL: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/univention/portal/navigation.json?base=https%3A//{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}"
|
||||||
OPENPROJECT_SMTP__DOMAIN: "{{ .Values.global.domain }}"
|
OPENPROJECT_SMTP__DOMAIN: {{ .Values.global.domain | quote }}
|
||||||
OPENPROJECT_SMTP__USER__NAME: "{{ .Values.smtp.username }}"
|
OPENPROJECT_SMTP__USER__NAME: {{ .Values.smtp.username | quote }}
|
||||||
OPENPROJECT_SMTP__PASSWORD: "{{ .Values.smtp.password }}"
|
OPENPROJECT_SMTP__PASSWORD: {{ .Values.smtp.password | quote }}
|
||||||
OPENPROJECT_SMTP__PORT: "587" # (default=587)
|
OPENPROJECT_SMTP__PORT: {{ .Values.smtp.port | quote }}
|
||||||
OPENPROJECT_SMTP__SSL: "false" # (default=false)
|
OPENPROJECT_SMTP__SSL: "false" # (default=false)
|
||||||
OPENPROJECT_SMTP__ADDRESS: "{{ .Values.smtp.host }}"
|
OPENPROJECT_SMTP__ADDRESS: {{ .Values.smtp.host | quote }}
|
||||||
|
OPENPROJECT_MAIL__FROM: "do-not-reply@{{ .Values.global.domain }}"
|
||||||
persistence:
|
# Details: https://www.openproject-edge.com/docs/installation-and-operations/configuration/#seeding-ldap-connections
|
||||||
size: "{{ .Values.persistence.size.openproject }}"
|
OPENPROJECT_SEED_LDAP_OPENDESK_BINDPASSWORD: {{ .Values.secrets.univentionCorporateServer.ldapSearch.openproject | quote }}
|
||||||
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
{{ if ne .Values.objectstores.openproject.backend "aws" }}
|
||||||
|
OPENPROJECT_FOG_CREDENTIALS_ENDPOINT: {{ .Values.objectstores.openproject.endpoint | default (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
||||||
|
OPENPROJECT_FOG_CREDENTIALS_PATH__STYLE: "true"
|
||||||
|
{{ end }}
|
||||||
|
OPENPROJECT_FOG_CREDENTIALS_AWS__ACCESS__KEY__ID: {{ .Values.objectstores.openproject.username | quote }}
|
||||||
|
OPENPROJECT_FOG_CREDENTIALS_AWS__SECRET__ACCESS__KEY: {{ .Values.objectstores.openproject.secret | default .Values.secrets.minio.openprojectUser | quote }}
|
||||||
|
OPENPROJECT_FOG_CREDENTIALS_PROVIDER: {{ .Values.objectstores.openproject.provider | default "AWS" | quote }}
|
||||||
|
OPENPROJECT_FOG_CREDENTIALS_REGION: {{ .Values.objectstores.openproject.region | quote }}
|
||||||
|
OPENPROJECT_FOG_DIRECTORY: {{ .Values.objectstores.openproject.bucket | quote }}
|
||||||
|
OPENPROJECT_FOG_CREDENTIALS_USE__IAM__PROFILE : {{ .Values.objectstores.openproject.useIAMProfile | default "false" | quote }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.openproject }}
|
replicaCount: {{ .Values.replicas.openproject }}
|
||||||
|
|
||||||
|
|||||||
@@ -4,6 +4,9 @@
|
|||||||
image:
|
image:
|
||||||
registry: "registry.souvap-univention.de"
|
registry: "registry.souvap-univention.de"
|
||||||
|
|
||||||
|
memcached:
|
||||||
|
bundled: false
|
||||||
|
|
||||||
probes:
|
probes:
|
||||||
liveness:
|
liveness:
|
||||||
initialDelaySeconds: 300
|
initialDelaySeconds: 300
|
||||||
@@ -27,6 +30,18 @@ openproject:
|
|||||||
# seed will only be executed on initial installation
|
# seed will only be executed on initial installation
|
||||||
seed_locale: "de"
|
seed_locale: "de"
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
s3:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
# For more details and more options see
|
# For more details and more options see
|
||||||
# https://www.openproject.org/docs/installation-and-operations/configuration/environment/
|
# https://www.openproject.org/docs/installation-and-operations/configuration/environment/
|
||||||
environment:
|
environment:
|
||||||
@@ -34,11 +49,38 @@ environment:
|
|||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_ATTRIBUTE__MAP_LOGIN: "phoenixusername"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_ATTRIBUTE__MAP_LOGIN: "phoenixusername"
|
||||||
OPENPROJECT_LOGIN__REQUIRED: "true"
|
OPENPROJECT_LOGIN__REQUIRED: "true"
|
||||||
OPENPROJECT_OAUTH__ALLOW__REMAPPING__OF__EXISTING__USERS: "true"
|
OPENPROJECT_OAUTH__ALLOW__REMAPPING__OF__EXISTING__USERS: "true"
|
||||||
|
OPENPROJECT_OMNIAUTH__DIRECT__LOGIN__PROVIDER: "keycloak"
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_DISPLAY__NAME: "Keycloak"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_DISPLAY__NAME: "Keycloak"
|
||||||
OPENPROJECT_PER__PAGE__OPTIONS: "20, 50, 100, 200"
|
OPENPROJECT_PER__PAGE__OPTIONS: "20, 50, 100, 200"
|
||||||
OPENPROJECT_EMAIL__DELIVERY__METHOD: "smtp"
|
OPENPROJECT_EMAIL__DELIVERY__METHOD: "smtp"
|
||||||
OPENPROJECT_SMTP__AUTHENTICATION: "plain"
|
OPENPROJECT_SMTP__AUTHENTICATION: "plain"
|
||||||
OPENPROJECT_SMTP__ENABLE__STARTTLS__AUTO: "true"
|
OPENPROJECT_SMTP__ENABLE__STARTTLS__AUTO: "true"
|
||||||
OPENPROJECT_SMTP__OPENSSL__VERIFY__MODE: "peer"
|
OPENPROJECT_SMTP__OPENSSL__VERIFY__MODE: "peer"
|
||||||
|
OPENPROJECT_DEFAULT__COMMENT__SORT__ORDER: "desc"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_SECURITY: "plain_ldap"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_BINDUSER: "uid=ldapsearch_openproject,cn=users,dc=swp-ldap,dc=internal"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_BASEDN: "dc=swp-ldap,dc=internal"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_FILTER:
|
||||||
|
"(&(objectClass=opendeskProjectmanagementUser)(opendeskProjectmanagementEnabled=TRUE))"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_SYNC__USERS: "true"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_LOGIN__MAPPING: "uid"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_FIRSTNAME__MAPPING: "givenName"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_LASTNAME__MAPPING: "sn"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_MAIL__MAPPING: "mailPrimaryAddress"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_ADMIN__MAPPING: "opendeskProjectmanagementAdmin"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_BASE: "dc=swp-ldap,dc=internal"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_FILTER:
|
||||||
|
"(&(objectClass=opendeskProjectmanagementGroup)(opendeskProjectmanagementEnabled=TRUE))"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_SYNC__USERS: "true"
|
||||||
|
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_GROUP__ATTRIBUTE: "cn"
|
||||||
|
# Details: https://www.openproject.org/docs/installation-and-operations/configuration/#attachments-storage
|
||||||
|
OPENPROJECT_ATTACHMENTS__STORAGE: "fog"
|
||||||
|
OPENPROJECT_FOG_CREDENTIALS_PATH__STYLE: "true"
|
||||||
|
# Define an admin mapping from the claim
|
||||||
|
# The attribute mapping cannot currently be defined in the value
|
||||||
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_ATTRIBUTE__MAP_ADMIN: "openproject_admin"
|
||||||
|
|
||||||
|
seederJob:
|
||||||
|
annotations:
|
||||||
|
intents.otterize.com/service-name: "openproject-seeder"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,25 +1,32 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# OX Connector
|
||||||
- name: "ox-connector-repo"
|
- name: "ox-connector-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/128/packages/helm/stable" }}
|
default "https://gitlab.souvap-univention.de/api/v4/projects/128/packages/helm/stable" }}
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://gitlab.souvap-univention.de/api/v4/projects/128/packages/helm/stable
|
||||||
|
# packageName=ox-connector
|
||||||
|
# dataSource=helm
|
||||||
|
# dependencyType=vendor
|
||||||
- name: "ox-connector"
|
- name: "ox-connector"
|
||||||
chart: "ox-connector-repo/ox-connector"
|
chart: "ox-connector-repo/ox-connector"
|
||||||
version: "0.1.0-pre-jconde-listener-entrypoint-chaining"
|
version: "0.1.0-pre-jconde-listener-entrypoint-chaining"
|
||||||
values:
|
values:
|
||||||
- "values-oxconnector.yaml"
|
- "values-oxconnector.yaml"
|
||||||
- "values-oxconnector.gotmpl"
|
- "values-oxconnector.gotmpl"
|
||||||
condition: "oxConnector.enabled"
|
installed: {{ .Values.oxConnector.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-2"
|
deploy-stage: "component-2"
|
||||||
component: "provisioning"
|
component: "provisioning"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,26 +4,29 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.oxConnector.repository }}"
|
repository: {{ .Values.images.oxConnector.repository | quote }}
|
||||||
pullPolicy: "Always"
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
tag: "{{ .Values.images.oxConnector.tag }}"
|
tag: {{ .Values.images.oxConnector.tag | quote }}
|
||||||
|
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
|
|
||||||
oxConnector:
|
oxConnector:
|
||||||
domainName: "{{ .Values.global.domain }}"
|
domainName: {{ .Values.global.domain | quote }}
|
||||||
|
ldapHost: {{ .Values.ldap.host | quote }}
|
||||||
|
notifierServer: {{ .Values.ldap.notifierHost | quote }}
|
||||||
#oxMasterAdmin: "(( .Values.appsuite.core-mw.masterAdmin ))"
|
#oxMasterAdmin: "(( .Values.appsuite.core-mw.masterAdmin ))"
|
||||||
oxMasterAdmin: "admin"
|
oxMasterAdmin: "admin"
|
||||||
oxMasterPassword: "{{ .Values.secrets.oxAppsuite.adminPassword }}"
|
oxMasterPassword: {{ .Values.secrets.oxAppsuite.adminPassword | quote }}
|
||||||
oxSoapServer: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
oxSoapServer: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
oxDefaultContext: "1"
|
oxDefaultContext: "1"
|
||||||
|
ldapPassword: {{ if eq .Values.ldap.host "univention-corporate-container" }} "ucctempldapstring" {{ else }} {{ .Values.secrets.univentionManagementStack.ldapSecret | quote }} {{ end }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.oxConnector | toYaml | nindent 2 }}
|
{{ .Values.resources.oxConnector | toYaml | nindent 2 }}
|
||||||
|
|||||||
@@ -5,14 +5,9 @@ ingress:
|
|||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
oxConnector:
|
oxConnector:
|
||||||
ldapHost: "univention-corporate-container"
|
|
||||||
# ldapHostIp: ""
|
|
||||||
ldapBaseDn: "dc=swp-ldap,dc=internal"
|
ldapBaseDn: "dc=swp-ldap,dc=internal"
|
||||||
ldapHostDn: "cn=admin,dc=swp-ldap,dc=internal"
|
ldapHostDn: "cn=admin,dc=swp-ldap,dc=internal"
|
||||||
notifierServer: "univention-corporate-container"
|
|
||||||
tlsMode: "off"
|
tlsMode: "off"
|
||||||
# current static password for UCC
|
|
||||||
ldapPassword: "ucctempldapstring"
|
|
||||||
caCert: "ucctempldapstring"
|
caCert: "ucctempldapstring"
|
||||||
debugLevel: "5"
|
debugLevel: "5"
|
||||||
logLevel: "DEBUG"
|
logLevel: "DEBUG"
|
||||||
|
|||||||
@@ -1,95 +1,232 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "sovereign-workplace-certificates-repo"
|
# openDesk Otterize
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-otterize
|
||||||
|
- name: "opendesk-otterize-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/133/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/opendesk-otterize" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Certificates
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-certificates
|
||||||
|
- name: "opendesk-certificates-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-certificates" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk PostgreSQL
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-postgresql
|
||||||
- name: "postgresql-repo"
|
- name: "postgresql-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/83/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/postgresql" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk MariaDB
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-mariadb
|
||||||
- name: "mariadb-repo"
|
- name: "mariadb-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/86/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/mariadb" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Postfix
|
||||||
|
# https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-postfix
|
||||||
- name: "postfix-repo"
|
- name: "postfix-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/85/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/postfix" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Istio Resources
|
||||||
|
# https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-istio-resources
|
||||||
- name: "istio-resources-repo"
|
- name: "istio-resources-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/69/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/istio-ressources" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk ClamAV
|
||||||
|
# https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-clamav
|
||||||
- name: "clamav-repo"
|
- name: "clamav-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/73/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/clamav" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# VMWare Bitnami
|
||||||
|
# Source: https://github.com/bitnami/charts/
|
||||||
- name: "bitnami-repo"
|
- name: "bitnami-repo"
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "registry-1.docker.io/bitnamicharts" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/bitnami-charts" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "sovereign-workplace-certificates"
|
# renovate:
|
||||||
chart: "sovereign-workplace-certificates-repo/sovereign-workplace-certificates"
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
version: "1.2.2"
|
# packageName=souvap/tooling/charts/opendesk-otterize/opendesk-otterize
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
|
- name: "opendesk-otterize"
|
||||||
|
chart: "opendesk-otterize-repo/opendesk-otterize"
|
||||||
|
version: "1.1.2"
|
||||||
|
values:
|
||||||
|
- "values-otterize.gotmpl"
|
||||||
|
installed: {{ .Values.security.otterizeIntents.enabled }}
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/sovereign-workplace-certificates/opendesk-certificates
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
|
- name: "opendesk-certificates"
|
||||||
|
chart: "opendesk-certificates-repo/opendesk-certificates"
|
||||||
|
version: "2.1.0"
|
||||||
values:
|
values:
|
||||||
- "values-certificates.gotmpl"
|
- "values-certificates.gotmpl"
|
||||||
condition: "certificates.enabled"
|
installed: {{ .Values.certificates.enabled }}
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/bitnami-charts/redis
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
- name: "redis"
|
- name: "redis"
|
||||||
chart: "bitnami-repo/redis"
|
chart: "bitnami-repo/redis"
|
||||||
version: "^17.9.3"
|
version: "18.1.2"
|
||||||
values:
|
values:
|
||||||
- "values-redis.gotmpl"
|
- "values-redis.gotmpl"
|
||||||
- "values-redis.yaml"
|
- "values-redis.yaml"
|
||||||
condition: "redis.enabled"
|
installed: {{ .Values.redis.enabled }}
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/bitnami-charts/memcached
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
|
- name: "memcached"
|
||||||
|
chart: "bitnami-repo/memcached"
|
||||||
|
version: "6.6.2"
|
||||||
|
values:
|
||||||
|
- "values-memcached.yaml"
|
||||||
|
- "values-memcached.gotmpl"
|
||||||
|
installed: {{ .Values.memcached.enabled }}
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/postgresql/postgresql
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
- name: "postgresql"
|
- name: "postgresql"
|
||||||
chart: "postgresql-repo/postgresql"
|
chart: "postgresql-repo/postgresql"
|
||||||
version: "2.0.0"
|
version: "2.0.3"
|
||||||
values:
|
values:
|
||||||
- "values-postgresql.yaml"
|
- "values-postgresql.yaml"
|
||||||
- "values-postgresql.gotmpl"
|
- "values-postgresql.gotmpl"
|
||||||
condition: "postgresql.enabled"
|
installed: {{ .Values.postgresql.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/mariadb/mariadb
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
- name: "mariadb"
|
- name: "mariadb"
|
||||||
chart: "mariadb-repo/mariadb"
|
chart: "mariadb-repo/mariadb"
|
||||||
version: "2.0.0"
|
version: "2.1.1"
|
||||||
values:
|
values:
|
||||||
- "values-mariadb.yaml"
|
- "values-mariadb.yaml"
|
||||||
- "values-mariadb.gotmpl"
|
- "values-mariadb.gotmpl"
|
||||||
condition: "mariadb.enabled"
|
installed: {{ .Values.mariadb.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/postfix/postfix
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
- name: "postfix"
|
- name: "postfix"
|
||||||
chart: "postfix-repo/postfix"
|
chart: "postfix-repo/postfix"
|
||||||
version: "1.13.0"
|
version: "2.0.4"
|
||||||
values:
|
values:
|
||||||
- "values-postfix.yaml"
|
- "values-postfix.yaml"
|
||||||
- "values-postfix.gotmpl"
|
- "values-postfix.gotmpl"
|
||||||
condition: "postfix.enabled"
|
installed: {{ .Values.postfix.enabled }}
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/clamav/opendesk-clamav
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
- name: "clamav"
|
- name: "clamav"
|
||||||
chart: "clamav-repo/sovereign-workplace-clamav"
|
chart: "clamav-repo/opendesk-clamav"
|
||||||
version: "2.1.0"
|
version: "4.0.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-clamav-distributed.yaml"
|
||||||
- "values-clamav-distributed.gotmpl"
|
- "values-clamav-distributed.gotmpl"
|
||||||
condition: "clamavDistributed.enabled"
|
installed: {{ .Values.clamavDistributed.enabled }}
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/clamav/clamav-simple
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
- name: "clamav-simple"
|
- name: "clamav-simple"
|
||||||
chart: "clamav-repo/clamav-simple"
|
chart: "clamav-repo/clamav-simple"
|
||||||
version: "2.1.0"
|
version: "4.0.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-clamav-simple.yaml"
|
||||||
- "values-clamav-simple.gotmpl"
|
- "values-clamav-simple.gotmpl"
|
||||||
condition: "clamavSimple.enabled"
|
installed: {{ .Values.clamavSimple.enabled }}
|
||||||
- name: "sovereign-workplace-gateway"
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/istio-ressources/istio-gateway
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
|
- name: "opendesk-gateway"
|
||||||
chart: "istio-resources-repo/istio-gateway"
|
chart: "istio-resources-repo/istio-gateway"
|
||||||
version: "1.1.2"
|
version: "2.0.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-istio-gateway.yaml"
|
||||||
- "values-istio-gateway.gotmpl"
|
- "values-istio-gateway.gotmpl"
|
||||||
condition: "istio.enabled"
|
installed: {{ .Values.istio.enabled }}
|
||||||
|
|
||||||
|
# renovate:
|
||||||
|
# registryUrl=https://registry.souvap-univention.de
|
||||||
|
# packageName=souvap/tooling/charts/bitnami-charts/minio
|
||||||
|
# dataSource=docker
|
||||||
|
# dependencyType=service
|
||||||
|
- name: "minio"
|
||||||
|
chart: "bitnami-repo/minio"
|
||||||
|
version: "12.8.19"
|
||||||
|
values:
|
||||||
|
- "values-minio.yaml"
|
||||||
|
- "values-minio.gotmpl"
|
||||||
|
installed: {{ .Values.minio.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "services"
|
deploy-stage: "services"
|
||||||
component: "services"
|
component: "services"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,18 +4,23 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: {{ .Values.global.domain | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
|
||||||
issuerRef:
|
issuerRef:
|
||||||
name: "{{ .Values.certificate.issuerRef.name }}"
|
name: {{ .Values.certificate.issuerRef.name | quote }}
|
||||||
|
|
||||||
{{- if .Values.istio.enabled }}
|
{{- if .Values.istio.enabled }}
|
||||||
istio:
|
istio:
|
||||||
enabled: {{ .Values.istio.enabled }}
|
enabled: {{ .Values.istio.enabled }}
|
||||||
domain: {{ .Values.istio.domain }}
|
domain: {{ .Values.istio.domain | quote }}
|
||||||
issuerRef:
|
issuerRef:
|
||||||
name: "{{ .Values.istio.issuerRef.name }}"
|
name: {{ .Values.istio.issuerRef.name | quote }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
keepRessourceOnDelete: {{ .Values.cleanup.keepRessourceOnDelete }}
|
||||||
|
|
||||||
|
wildcard: {{ .Values.certificate.wildcard }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -5,25 +5,23 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
---
|
---
|
||||||
clamd:
|
clamd:
|
||||||
podSecurityContext:
|
podSecurityContext:
|
||||||
{{/* Disabled until NFS Provisioner on IONOS is fixed */}}
|
|
||||||
enabled: false
|
|
||||||
replicaCount: {{ .Values.replicas.clamd }}
|
replicaCount: {{ .Values.replicas.clamd }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.clamd.repository }}"
|
repository: {{ .Values.images.clamd.repository | quote }}
|
||||||
tag: "{{ .Values.images.clamd.tag }}"
|
tag: {{ .Values.images.clamd.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.clamd | toYaml | nindent 4 }}
|
{{ .Values.resources.clamd | toYaml | nindent 4 }}
|
||||||
|
|
||||||
freshclam:
|
freshclam:
|
||||||
podSecurityContext:
|
podSecurityContext:
|
||||||
{{/* Disabled until NFS Provisioner on IONOS is fixed */}}
|
|
||||||
enabled: false
|
|
||||||
replicaCount: {{ .Values.replicas.freshclam }}
|
replicaCount: {{ .Values.replicas.freshclam }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.freshclam.repository }}"
|
repository: {{ .Values.images.freshclam.repository | quote }}
|
||||||
tag: "{{ .Values.images.freshclam.tag }}"
|
tag: {{ .Values.images.freshclam.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.freshclam | toYaml | nindent 4 }}
|
{{ .Values.resources.freshclam | toYaml | nindent 4 }}
|
||||||
|
|
||||||
@@ -34,25 +32,25 @@ global:
|
|||||||
icap:
|
icap:
|
||||||
replicaCount: {{ .Values.replicas.icap }}
|
replicaCount: {{ .Values.replicas.icap }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.icap.repository }}"
|
repository: {{ .Values.images.icap.repository | quote }}
|
||||||
tag: "{{ .Values.images.icap.tag }}"
|
tag: {{ .Values.images.icap.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.icap | toYaml | nindent 4 }}
|
{{ .Values.resources.icap | toYaml | nindent 4 }}
|
||||||
|
|
||||||
milter:
|
milter:
|
||||||
podSecurityContext:
|
podSecurityContext:
|
||||||
{{/* Disabled until NFS Provisioner on IONOS is fixed */}}
|
|
||||||
enabled: false
|
|
||||||
replicaCount: {{ .Values.replicas.milter }}
|
replicaCount: {{ .Values.replicas.milter }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.milter.repository }}"
|
repository: {{ .Values.images.milter.repository | quote }}
|
||||||
tag: "{{ .Values.images.milter.tag }}"
|
tag: {{ .Values.images.milter.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.milter | toYaml | nindent 4 }}
|
{{ .Values.resources.milter | toYaml | nindent 4 }}
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWX }}"
|
storageClass: {{ .Values.persistence.storageClassNames.RWX | quote }}
|
||||||
size: "{{ .Values.persistence.size.clamav }}"
|
size: {{ .Values.persistence.size.clamav | quote }}
|
||||||
...
|
...
|
||||||
|
|||||||
80
helmfile/apps/services/values-clamav-distributed.yaml
Normal file
80
helmfile/apps/services/values-clamav-distributed.yaml
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
enabled: true
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
|
||||||
|
clamd:
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
|
||||||
|
freshclam:
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
|
||||||
|
icap:
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
|
||||||
|
milter:
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
...
|
||||||
@@ -3,22 +3,19 @@ SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG Ze
|
|||||||
SPDX-License-Identifier: Apache-2.0
|
SPDX-License-Identifier: Apache-2.0
|
||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
|
|
||||||
podSecurityContext:
|
|
||||||
{{/* Disabled until NFS Provisioner on IONOS is fixed */}}
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.clamav }}
|
replicaCount: {{ .Values.replicas.clamav }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
clamav:
|
clamav:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.clamd.repository }}"
|
repository: {{ .Values.images.clamd.repository | quote }}
|
||||||
tag: "{{ .Values.images.clamd.tag }}"
|
tag: {{ .Values.images.clamd.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
icap:
|
icap:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
repository: "{{ .Values.images.icap.repository }}"
|
repository: {{ .Values.images.icap.repository | quote }}
|
||||||
tag: "{{ .Values.images.icap.tag }}"
|
tag: {{ .Values.images.icap.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.clamd | toYaml | nindent 4 }}
|
{{ .Values.resources.clamd | toYaml | nindent 4 }}
|
||||||
@@ -28,6 +25,6 @@ global:
|
|||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
size: "{{ .Values.persistence.size.clamav }}"
|
size: {{ .Values.persistence.size.clamav | quote }}
|
||||||
...
|
...
|
||||||
|
|||||||
19
helmfile/apps/services/values-clamav-simple.yaml
Normal file
19
helmfile/apps/services/values-clamav-simple.yaml
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
...
|
||||||
@@ -4,9 +4,9 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
domain: "{{ .Values.istio.domain }}"
|
domain: {{ .Values.istio.domain | quote }}
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
openxchange: {{ .Values.global.hosts.openxchange | quote }}
|
||||||
|
|
||||||
tls:
|
tls:
|
||||||
secretName: "{{ .Values.istio.domain }}-tls"
|
secretName: "{{ .Values.istio.domain }}-tls"
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
cleanup:
|
tls:
|
||||||
deletePodsOnSuccess: true
|
httpsRedirect: false
|
||||||
...
|
...
|
||||||
@@ -4,22 +4,25 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.images.mariadb.repository }}"
|
repository: {{ .Values.images.mariadb.repository | quote }}
|
||||||
tag: "{{ .Values.images.mariadb.tag }}"
|
tag: {{ .Values.images.mariadb.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
|
# Open-Xchange and XWiki require the permission to create database schemas, so they use the `root` account anyway.
|
||||||
|
# Please refer to `databases.yaml` for details.
|
||||||
job:
|
job:
|
||||||
users:
|
users:
|
||||||
- username: "xwiki_user"
|
- username: "xwiki_user"
|
||||||
password: "{{ .Values.secrets.mariadb.xwikiUser }}"
|
password: {{ .Values.secrets.mariadb.xwikiUser | quote }}
|
||||||
- username: "openxchange_user"
|
- username: "openxchange_user"
|
||||||
password: "{{ .Values.secrets.mariadb.openxchangeUser }}"
|
password: {{ .Values.secrets.mariadb.openxchangeUser | quote }}
|
||||||
- username: "nextcloud_user"
|
- username: "nextcloud_user"
|
||||||
password: "{{ .Values.secrets.mariadb.nextcloudUser }}"
|
password: {{ .Values.secrets.mariadb.nextcloudUser | quote}}
|
||||||
databases:
|
databases:
|
||||||
- name: "xwiki"
|
- name: "xwiki"
|
||||||
user: "xwiki_user"
|
user: "xwiki_user"
|
||||||
@@ -29,11 +32,11 @@ job:
|
|||||||
user: "openxchange_user"
|
user: "openxchange_user"
|
||||||
|
|
||||||
mariadb:
|
mariadb:
|
||||||
rootPassword: "{{ .Values.secrets.mariadb.rootPassword }}"
|
rootPassword: {{ .Values.secrets.mariadb.rootPassword | quote }}
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
size: "{{ .Values.persistence.size.mariadb }}"
|
size: {{ .Values.persistence.size.mariadb | quote }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.mariadb | toYaml | nindent 2 }}
|
{{ .Values.resources.mariadb | toYaml | nindent 2 }}
|
||||||
|
|||||||
@@ -1,6 +1,25 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 1001
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
job:
|
job:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 1001
|
||||||
|
fsGroupChangePolicy: "OnRootMismatch"
|
||||||
...
|
...
|
||||||
|
|||||||
19
helmfile/apps/services/values-memcached.gotmpl
Normal file
19
helmfile/apps/services/values-memcached.gotmpl
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
imageRegistry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | quote }}
|
||||||
|
repository: {{ .Values.images.memcached.repository | quote }}
|
||||||
|
tag: {{ .Values.images.memcached.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.memcached | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
18
helmfile/apps/services/values-memcached.yaml
Normal file
18
helmfile/apps/services/values-memcached.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsNonRoot: true
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
|
||||||
|
serviceAccount:
|
||||||
|
create: true
|
||||||
|
...
|
||||||
80
helmfile/apps/services/values-minio.gotmpl
Normal file
80
helmfile/apps/services/values-minio.gotmpl
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.minio.repository }}"
|
||||||
|
tag: "{{ .Values.images.minio.tag }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
|
auth:
|
||||||
|
rootPassword: {{ .Values.secrets.minio.rootPassword | quote }}
|
||||||
|
|
||||||
|
statefulset:
|
||||||
|
replicaCount: {{ .Values.replicas.minioDistributed }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.minio | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||||
|
hostname: "{{ .Values.global.hosts.minioConsole }}.{{ .Values.global.domain }}"
|
||||||
|
extraTls:
|
||||||
|
- hosts:
|
||||||
|
- "{{ .Values.global.hosts.minioConsole }}.{{ .Values.global.domain }}"
|
||||||
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|
||||||
|
apiIngress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName }}
|
||||||
|
hostname: "{{ .Values.global.hosts.minioApi }}.{{ .Values.global.domain }}"
|
||||||
|
extraTls:
|
||||||
|
- hosts:
|
||||||
|
- "{{ .Values.global.hosts.minioApi }}.{{ .Values.global.domain }}"
|
||||||
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|
||||||
|
metrics:
|
||||||
|
serviceMonitor:
|
||||||
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
prometheusRule:
|
||||||
|
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
||||||
|
size: "{{ .Values.persistence.size.minio }}"
|
||||||
|
|
||||||
|
provisioning:
|
||||||
|
users:
|
||||||
|
- username: "openproject_user"
|
||||||
|
password: {{ .Values.secrets.minio.openprojectUser | quote }}
|
||||||
|
disabled: false
|
||||||
|
policies:
|
||||||
|
- "openproject-bucket-policy"
|
||||||
|
setPolicies: true
|
||||||
|
- username: "openxchange_user"
|
||||||
|
password: {{ .Values.secrets.minio.openxchangeUser | quote }}
|
||||||
|
disabled: false
|
||||||
|
policies:
|
||||||
|
- "openxchange-bucket-policy"
|
||||||
|
setPolicies: true
|
||||||
|
- username: "ums_user"
|
||||||
|
password: {{ .Values.secrets.minio.umsUser | quote }}
|
||||||
|
disabled: false
|
||||||
|
policies:
|
||||||
|
- "ums-bucket-policy"
|
||||||
|
setPolicies: true
|
||||||
|
- username: "nextcloud_user"
|
||||||
|
password: {{ .Values.secrets.minio.nextcloudUser | quote }}
|
||||||
|
disabled: false
|
||||||
|
policies:
|
||||||
|
- "nextcloud-bucket-policy"
|
||||||
|
setPolicies: true
|
||||||
|
...
|
||||||
114
helmfile/apps/services/values-minio.yaml
Normal file
114
helmfile/apps/services/values-minio.yaml
Normal file
@@ -0,0 +1,114 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
mode: "standalone"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 1000
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
annotations:
|
||||||
|
nginx.org/websocket-services: "minio"
|
||||||
|
|
||||||
|
networkPolicy:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
defaultBuckets: "openproject,openxchange,ums,nextcloud"
|
||||||
|
|
||||||
|
provisioning:
|
||||||
|
enabled: true
|
||||||
|
cleanupAfterFinished:
|
||||||
|
enabled: true
|
||||||
|
buckets:
|
||||||
|
- name: "openproject"
|
||||||
|
versioning: true
|
||||||
|
withLock: false
|
||||||
|
- name: "openxchange"
|
||||||
|
versioning: true
|
||||||
|
withLock: false
|
||||||
|
- name: "ums"
|
||||||
|
versioning: true
|
||||||
|
withLock: false
|
||||||
|
- name: "nextcloud"
|
||||||
|
versioning: true
|
||||||
|
withLock: false
|
||||||
|
policies:
|
||||||
|
- name: "openproject-bucket-policy"
|
||||||
|
statements:
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::openproject"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::openproject/*"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
- name: "openxchange-bucket-policy"
|
||||||
|
statements:
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::openxchange"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::openxchange/*"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
- name: "ums-bucket-policy"
|
||||||
|
statements:
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::ums"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::ums/*"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
- name: "nextcloud-bucket-policy"
|
||||||
|
statements:
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::nextcloud"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
- resources:
|
||||||
|
- "arn:aws:s3:::nextcloud/*"
|
||||||
|
effect: "Allow"
|
||||||
|
actions:
|
||||||
|
- "s3:*"
|
||||||
|
|
||||||
|
livenessProbe:
|
||||||
|
enabled: true
|
||||||
|
initialDelaySeconds: 5
|
||||||
|
periodSeconds: 10
|
||||||
|
timeoutSeconds: 10
|
||||||
|
|
||||||
|
readinessProbe:
|
||||||
|
enabled: true
|
||||||
|
initialDelaySeconds: 5
|
||||||
|
periodSeconds: 10
|
||||||
|
timeoutSeconds: 10
|
||||||
|
|
||||||
|
startupProbe:
|
||||||
|
enabled: true
|
||||||
|
periodSeconds: 10
|
||||||
|
timeoutSeconds: 10
|
||||||
|
...
|
||||||
56
helmfile/apps/services/values-otterize.gotmpl
Normal file
56
helmfile/apps/services/values-otterize.gotmpl
Normal file
@@ -0,0 +1,56 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
apps:
|
||||||
|
clamavDistributed:
|
||||||
|
enabled: {{ .Values.clamavDistributed.enabled }}
|
||||||
|
clamavSimple:
|
||||||
|
enabled: {{ .Values.clamavSimple.enabled }}
|
||||||
|
collabora:
|
||||||
|
enabled: {{ .Values.collabora.enabled }}
|
||||||
|
cryptpad:
|
||||||
|
enabled: {{ .Values.cryptpad.enabled }}
|
||||||
|
dovecot:
|
||||||
|
enabled: {{ .Values.dovecot.enabled }}
|
||||||
|
element:
|
||||||
|
enabled: {{ .Values.element.enabled }}
|
||||||
|
intercom:
|
||||||
|
enabled: {{ .Values.intercom.enabled }}
|
||||||
|
jitsi:
|
||||||
|
enabled: {{ .Values.jitsi.enabled }}
|
||||||
|
keycloak:
|
||||||
|
enabled: {{ .Values.keycloak.enabled }}
|
||||||
|
mariadb:
|
||||||
|
enabled: {{ .Values.mariadb.enabled }}
|
||||||
|
memcached:
|
||||||
|
enabled: {{ .Values.memcached.enabled }}
|
||||||
|
minio:
|
||||||
|
enabled: {{ .Values.minio.enabled }}
|
||||||
|
nextcloud:
|
||||||
|
enabled: {{ .Values.nextcloud.enabled }}
|
||||||
|
openproject:
|
||||||
|
enabled: {{ .Values.openproject.enabled }}
|
||||||
|
oxAppsuite:
|
||||||
|
enabled: {{ .Values.oxAppsuite.enabled }}
|
||||||
|
oxConnector:
|
||||||
|
enabled: {{ .Values.oxConnector.enabled }}
|
||||||
|
postfix:
|
||||||
|
enabled: {{ .Values.postfix.enabled }}
|
||||||
|
postgresql:
|
||||||
|
enabled: {{ .Values.postgresql.enabled }}
|
||||||
|
redis:
|
||||||
|
enabled: {{ .Values.redis.enabled }}
|
||||||
|
univentionCorporateServer:
|
||||||
|
enabled: {{ .Values.univentionCorporateServer.enabled }}
|
||||||
|
univentionManagementStack:
|
||||||
|
enabled: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
xwiki:
|
||||||
|
enabled: {{ .Values.xwiki.enabled }}
|
||||||
|
|
||||||
|
extraApps:
|
||||||
|
clusterPostfix:
|
||||||
|
enabled: {{ .Values.security.clusterPostfix.enabled }}
|
||||||
|
namespace: {{ .Values.security.clusterPostfix.namespace }}
|
||||||
|
...
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user