mirror of
https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk.git
synced 2025-12-06 15:31:38 +01:00
Compare commits
206 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
6cee2c878b | ||
|
|
4359b21f1c | ||
|
|
d8b2bd3af0 | ||
|
|
8fafd906a3 | ||
|
|
fece4ace87 | ||
|
|
ab6014f8c6 | ||
|
|
fecd13612b | ||
|
|
38336d0240 | ||
|
|
9f9e4e9521 | ||
|
|
b47de62f98 | ||
|
|
9e54299917 | ||
|
|
d249d0e3ce | ||
|
|
fbe7de3c56 | ||
|
|
034e98c850 | ||
|
|
7feaadf7f8 | ||
|
|
a7fef3afff | ||
|
|
5d01f8ca46 | ||
|
|
7093022ec4 | ||
|
|
2313f75dbe | ||
|
|
af9caea726 | ||
|
|
b39986907c | ||
|
|
a02d7c6085 | ||
|
|
a046deaf17 | ||
|
|
c76e960446 | ||
|
|
535823e0a8 | ||
|
|
9966bf640e | ||
|
|
8e376bb4a5 | ||
|
|
7c0e4aa9a6 | ||
|
|
e609b75cc7 | ||
|
|
20d26a069b | ||
|
|
59d58e320e | ||
|
|
49b71aafb4 | ||
|
|
cbe514176a | ||
|
|
0898d96571 | ||
|
|
7f7c364071 | ||
|
|
fd9e04d992 | ||
|
|
86657b139a | ||
|
|
cdffbe1298 | ||
|
|
82a037ec7c | ||
|
|
1a4eced998 | ||
|
|
06dcdd78af | ||
|
|
f564efd97f | ||
|
|
16f2ac464e | ||
|
|
30405d182d | ||
|
|
785989e91d | ||
|
|
27b6796639 | ||
|
|
7756d35fa1 | ||
|
|
5afd2339c2 | ||
|
|
b7f220a6b6 | ||
|
|
fb7dba787c | ||
|
|
72e3afdffd | ||
|
|
85b8fcaab5 | ||
|
|
c3129f1443 | ||
|
|
000be8b032 | ||
|
|
da1bf3581c | ||
|
|
4d0011d957 | ||
|
|
74f9ec28e4 | ||
|
|
b1d4b2d8ea | ||
|
|
711d29e374 | ||
|
|
0ba7be2a5f | ||
|
|
d4c751d29f | ||
|
|
70744d04c6 | ||
|
|
e4e6d2d60a | ||
|
|
e42feb4c26 | ||
|
|
f12c2ed0c2 | ||
|
|
7dbcbfe723 | ||
|
|
1d8a0ccf1a | ||
|
|
e33acd33e7 | ||
|
|
74e206694e | ||
|
|
6fd655a0b1 | ||
|
|
d4c39025b6 | ||
|
|
d86f516747 | ||
|
|
4c5731e6bb | ||
|
|
6a390112da | ||
|
|
65d2642d34 | ||
|
|
55f73924df | ||
|
|
11cc708f6e | ||
|
|
b6b4972a5d | ||
|
|
2e3f5f6e53 | ||
|
|
3da2aaaed9 | ||
|
|
424317ed58 | ||
|
|
b335bc4c3b | ||
|
|
5343840bed | ||
|
|
2d5d3708f7 | ||
|
|
41dfdc0c8f | ||
|
|
ca5d5f8280 | ||
|
|
095059c7e5 | ||
|
|
1dd6582ec7 | ||
|
|
74b3d41381 | ||
|
|
a41b9a699c | ||
|
|
0b4cd739fc | ||
|
|
4372f063e0 | ||
|
|
15ad8ca7ab | ||
|
|
1884a90e6f | ||
|
|
0997f2e4a7 | ||
|
|
0f01b94aa1 | ||
|
|
892920b048 | ||
|
|
5c3568871b | ||
|
|
f22619bd8e | ||
|
|
275798c1d6 | ||
|
|
5ad25acafd | ||
|
|
437633cda6 | ||
|
|
62b767ef38 | ||
|
|
02be7c15bb | ||
|
|
9acce08139 | ||
|
|
3f8bffbcf3 | ||
|
|
98ec02f230 | ||
|
|
b340373133 | ||
|
|
6456f68b7b | ||
|
|
a37faf3b57 | ||
|
|
fbbf3f253b | ||
|
|
2703615dff | ||
|
|
85ad5ecd6d | ||
|
|
ae3d0daa11 | ||
|
|
0a17976aca | ||
|
|
ce7e5f670a | ||
|
|
917f9fb452 | ||
|
|
f46c8a9a5f | ||
|
|
c2b44da34e | ||
|
|
41b9afb364 | ||
|
|
63bdcf594b | ||
|
|
a99c088361 | ||
|
|
8d09aa02f9 | ||
|
|
1514678db0 | ||
|
|
b7254cf5dc | ||
|
|
7ab1cb5c7e | ||
|
|
0ba71f2749 | ||
|
|
77e362f6bc | ||
|
|
09079a1303 | ||
|
|
15db5dcbba | ||
|
|
d3c439038a | ||
|
|
9409ad829a | ||
|
|
a4bab4068d | ||
|
|
90019e3ef6 | ||
|
|
4835a2beec | ||
|
|
12c931fcff | ||
|
|
2f8a298925 | ||
|
|
ec3f1d96ac | ||
|
|
16c08f82c9 | ||
|
|
edb25bd765 | ||
|
|
c840608112 | ||
|
|
320da3bec3 | ||
|
|
c61b1b8281 | ||
|
|
96097e4704 | ||
|
|
5e1a7b19e2 | ||
|
|
13bcd785e8 | ||
|
|
c54bab165b | ||
|
|
836f491766 | ||
|
|
fe0e0cdce4 | ||
|
|
a74d662404 | ||
|
|
471a2fa262 | ||
|
|
5f79763e2b | ||
|
|
e120f5fb9a | ||
|
|
a799db03c4 | ||
|
|
d725b93798 | ||
|
|
e1070eeb06 | ||
|
|
c7fc187f14 | ||
|
|
89ac783dc3 | ||
|
|
882f1fbc93 | ||
|
|
b5583caec1 | ||
|
|
6d23534ee0 | ||
|
|
d2e7ac9348 | ||
|
|
2125037a3c | ||
|
|
ed7e5e428e | ||
|
|
d28a425673 | ||
|
|
a6fa846afc | ||
|
|
4380e78981 | ||
|
|
be82243966 | ||
|
|
f9886448b6 | ||
|
|
0eceb85e7d | ||
|
|
1ef4a861ac | ||
|
|
3b90533063 | ||
|
|
1349181d80 | ||
|
|
e1b84898c5 | ||
|
|
63a1e2568e | ||
|
|
ca4b1da84f | ||
|
|
ff462ab0dc | ||
|
|
4f2a8aeee4 | ||
|
|
c5ab1b81fe | ||
|
|
9d7866480c | ||
|
|
9a6d2409a6 | ||
|
|
f758293241 | ||
|
|
6321ff50a0 | ||
|
|
5fbf86b6bc | ||
|
|
6e68f7f28c | ||
|
|
41d40c9b73 | ||
|
|
cef11acbae | ||
|
|
6e5ef639c2 | ||
|
|
65b0ca5480 | ||
|
|
39565c7cfd | ||
|
|
0d374c1fea | ||
|
|
387bd8715c | ||
|
|
f219c42afa | ||
|
|
4d3bc2799c | ||
|
|
0f59736c5d | ||
|
|
7e9d39cc7f | ||
|
|
6ab4fa078b | ||
|
|
05361276c0 | ||
|
|
cda237a655 | ||
|
|
ea77d1712e | ||
|
|
2a61b5f2a6 | ||
|
|
f4dbdfb321 | ||
|
|
3d4d45f711 | ||
|
|
86fdb34735 | ||
|
|
7c9c6f9000 | ||
|
|
7f7eae8f99 |
4
.gitignore
vendored
4
.gitignore
vendored
@@ -5,4 +5,8 @@
|
|||||||
|
|
||||||
# Ignore changes to sample environments
|
# Ignore changes to sample environments
|
||||||
helmfile/environments/dev/values.yaml
|
helmfile/environments/dev/values.yaml
|
||||||
|
helmfile/environments/dev/values.gotmpl
|
||||||
|
helmfile/environments/test/values.yaml
|
||||||
|
helmfile/environments/test/values.gotmpl
|
||||||
helmfile/environments/prod/values.yaml
|
helmfile/environments/prod/values.yaml
|
||||||
|
helmfile/environments/prod/values.gotmpl
|
||||||
|
|||||||
240
.gitlab-ci.yml
240
.gitlab-ci.yml
@@ -7,8 +7,10 @@ include:
|
|||||||
file:
|
file:
|
||||||
- "ci/common/lint.yml"
|
- "ci/common/lint.yml"
|
||||||
- "ci/release-automation/semantic-release.yml"
|
- "ci/release-automation/semantic-release.yml"
|
||||||
- project: "souvap/devops/sovereign-workplace-env"
|
- project: "${PROJECT_PATH_CUSTOM_ENVIRONMENT_CONFIG}"
|
||||||
file: "gitlab/environments.yaml"
|
file: "gitlab/environments.yaml"
|
||||||
|
rules:
|
||||||
|
- if: "$INCLUDE_ENVIRONMENTS_ENABLED != 'false'"
|
||||||
|
|
||||||
stages:
|
stages:
|
||||||
- ".pre"
|
- ".pre"
|
||||||
@@ -20,7 +22,7 @@ stages:
|
|||||||
- "component-deploy-stage-2"
|
- "component-deploy-stage-2"
|
||||||
- "tests"
|
- "tests"
|
||||||
- "env-stop"
|
- "env-stop"
|
||||||
- "generate-release-artefacts"
|
- "generate-release-assets"
|
||||||
- ".post"
|
- ".post"
|
||||||
|
|
||||||
variables:
|
variables:
|
||||||
@@ -28,7 +30,8 @@ variables:
|
|||||||
description: "The name of namespaces to deploy to."
|
description: "The name of namespaces to deploy to."
|
||||||
value: ""
|
value: ""
|
||||||
CLUSTER:
|
CLUSTER:
|
||||||
description: "Define which cluster to use. Cluster must be defined in gitlab/environments.yaml of sovereign-workplace-env included above."
|
description: "Define which cluster to use. Cluster must be defined in gitlab/environments.yaml of
|
||||||
|
sovereign-workplace-env included above."
|
||||||
value: "dev"
|
value: "dev"
|
||||||
BASE_DOMAIN:
|
BASE_DOMAIN:
|
||||||
description: "Define the Cluster Base Domain."
|
description: "Define the Cluster Base Domain."
|
||||||
@@ -55,10 +58,13 @@ variables:
|
|||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
DEPLOY_UCS:
|
DEPLOY_UCS:
|
||||||
description: "Enable Univention Corporate Server deployment."
|
description: >-
|
||||||
|
Enable Univention Corporate Server deployment.
|
||||||
|
"ums-eval" does deploy the Univention Management Stack instead of the UCS container.
|
||||||
value: "no"
|
value: "no"
|
||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
|
- "ums-eval"
|
||||||
- "no"
|
- "no"
|
||||||
DEPLOY_PROVISIONING:
|
DEPLOY_PROVISIONING:
|
||||||
description: "Enable Provisioning Components."
|
description: "Enable Provisioning Components."
|
||||||
@@ -72,6 +78,12 @@ variables:
|
|||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
|
DEPLOY_CRYPTPAD:
|
||||||
|
description: "Enable CryptPad deployment."
|
||||||
|
value: "no"
|
||||||
|
options:
|
||||||
|
- "yes"
|
||||||
|
- "no"
|
||||||
DEPLOY_ELEMENT:
|
DEPLOY_ELEMENT:
|
||||||
description: "Enable Element deployment."
|
description: "Enable Element deployment."
|
||||||
value: "no"
|
value: "no"
|
||||||
@@ -126,8 +138,18 @@ variables:
|
|||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
TESTS_PROJECT_URL:
|
TESTS_BRANCH:
|
||||||
description: "URL of the E2E-test Gitlab project API with project ID."
|
description: "Branch of E2E-tests on which the test pipeline is triggered"
|
||||||
|
value: "main"
|
||||||
|
RUN_UMS_TESTS:
|
||||||
|
description: "Run E2E test suite of SouvAP Dev team"
|
||||||
|
value: "no"
|
||||||
|
options:
|
||||||
|
- "yes"
|
||||||
|
- "no"
|
||||||
|
UMS_TESTS_BRANCH:
|
||||||
|
description: "Branch of E2E test suite of SouvAP Dev team"
|
||||||
|
value: "main"
|
||||||
# please use the following set of variables with normalized names:
|
# please use the following set of variables with normalized names:
|
||||||
DOMAIN: "${NAMESPACE}.${CLUSTER}.${BASE_DOMAIN}"
|
DOMAIN: "${NAMESPACE}.${CLUSTER}.${BASE_DOMAIN}"
|
||||||
ISTIO_DOMAIN: "${NAMESPACE}.istio.${CLUSTER}.${BASE_DOMAIN}"
|
ISTIO_DOMAIN: "${NAMESPACE}.istio.${CLUSTER}.${BASE_DOMAIN}"
|
||||||
@@ -137,23 +159,6 @@ variables:
|
|||||||
dependencies: []
|
dependencies: []
|
||||||
extends: ".environments"
|
extends: ".environments"
|
||||||
image: "registry.souvap-univention.de/souvap/tooling/images/helm:latest"
|
image: "registry.souvap-univention.de/souvap/tooling/images/helm:latest"
|
||||||
secrets:
|
|
||||||
SMTP_PASSWORD:
|
|
||||||
vault:
|
|
||||||
engine:
|
|
||||||
name: "kv-v2"
|
|
||||||
path: "swp"
|
|
||||||
path: "accounts/brained/mail/relay@souvap-univention.de"
|
|
||||||
field: "password"
|
|
||||||
file: false
|
|
||||||
TURN_CREDENTIALS:
|
|
||||||
vault:
|
|
||||||
engine:
|
|
||||||
name: "kv-v2"
|
|
||||||
path: "swp"
|
|
||||||
path: "accounts/souvap-univention.de/develop/turn/secret"
|
|
||||||
field: "credentials"
|
|
||||||
file: false
|
|
||||||
script:
|
script:
|
||||||
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${COMPONENT}"
|
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${COMPONENT}"
|
||||||
# MASTER_PASSWORD_WEB_VAR as precedence for MASTER_PASSWORD
|
# MASTER_PASSWORD_WEB_VAR as precedence for MASTER_PASSWORD
|
||||||
@@ -184,8 +189,16 @@ env-cleanup:
|
|||||||
$ENV_STOP_BEFORE != "no"
|
$ENV_STOP_BEFORE != "no"
|
||||||
when: "always"
|
when: "always"
|
||||||
script:
|
script:
|
||||||
- "helmfile destroy --namespace ${NAMESPACE}"
|
- |
|
||||||
- "kubectl delete pvc --all --namespace ${NAMESPACE}"
|
if [ "${OPENDESK_SLEDGEHAMMER_DESTROY_ENABLED}" = "yes" ]; then
|
||||||
|
for OPENDESK_RELEASE in $(helm ls -n ${NAMESPACE} -aq); do
|
||||||
|
helm uninstall -n ${NAMESPACE} ${OPENDESK_RELEASE};
|
||||||
|
done
|
||||||
|
kubectl delete pvc --all --namespace ${NAMESPACE};
|
||||||
|
kubectl delete jobs --all --namespace ${NAMESPACE};
|
||||||
|
else
|
||||||
|
helmfile destroy --namespace ${NAMESPACE};
|
||||||
|
fi
|
||||||
stage: "env-cleanup"
|
stage: "env-cleanup"
|
||||||
|
|
||||||
env-start:
|
env-start:
|
||||||
@@ -232,7 +245,7 @@ ucs-deploy:
|
|||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_UCS != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_UCS == "yes")
|
||||||
when: "always"
|
when: "always"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "univention-corporate-container"
|
COMPONENT: "univention-corporate-container"
|
||||||
@@ -249,6 +262,18 @@ provisioning-deploy:
|
|||||||
variables:
|
variables:
|
||||||
COMPONENT: "provisioning"
|
COMPONENT: "provisioning"
|
||||||
|
|
||||||
|
ums-deploy:
|
||||||
|
stage: "component-deploy-stage-1"
|
||||||
|
extends: ".deploy-common"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
|
$NAMESPACE =~ /.+/ &&
|
||||||
|
$DEPLOY_UCS == "ums-eval"
|
||||||
|
when: "always"
|
||||||
|
variables:
|
||||||
|
COMPONENT: "univention-management-stack"
|
||||||
|
|
||||||
keycloak-deploy:
|
keycloak-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -323,6 +348,18 @@ collabora-deploy:
|
|||||||
variables:
|
variables:
|
||||||
COMPONENT: "collabora"
|
COMPONENT: "collabora"
|
||||||
|
|
||||||
|
cryptpad-deploy:
|
||||||
|
stage: "component-deploy-stage-1"
|
||||||
|
extends: ".deploy-common"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
|
$NAMESPACE =~ /.+/ &&
|
||||||
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_NEXTCLOUD != "no" || $DEPLOY_CRYPTPAD != "no")
|
||||||
|
when: "always"
|
||||||
|
variables:
|
||||||
|
COMPONENT: "cryptpad"
|
||||||
|
|
||||||
nextcloud-deploy:
|
nextcloud-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -405,54 +442,101 @@ run-tests:
|
|||||||
when: "always"
|
when: "always"
|
||||||
script:
|
script:
|
||||||
- |
|
- |
|
||||||
COMPONENTS="login or portal or profile or navigation"
|
|
||||||
if [ "${DEPLOY_ALL_COMPONENTS}" != "no" ]; then
|
|
||||||
COMPONENTS="${COMPONENTS} or collabora or ics or jitsi or keycloak or nextcloud or openproject or ox or ucs \
|
|
||||||
or xwiki"
|
|
||||||
else
|
|
||||||
[ "${DEPLOY_COLLABORA}" != "no" ] && COMPONENTS="${COMPONENTS} or collabora"
|
|
||||||
[ "${DEPLOY_ICS}" != "no" ] && COMPONENTS="${COMPONENTS} or ics"
|
|
||||||
[ "${DEPLOY_JITSI}" != "no" ] && COMPONENTS="${COMPONENTS} or jitsi"
|
|
||||||
[ "${DEPLOY_KEYCLOAK}" != "no" ] && COMPONENTS="${COMPONENTS} or keycloak"
|
|
||||||
[ "${DEPLOY_NEXTCLOUD}" != "no" ] && COMPONENTS="${COMPONENTS} or nextcloud"
|
|
||||||
[ "${DEPLOY_OPENPROJECT}" != "no" ] && COMPONENTS="${COMPONENTS} or openproject"
|
|
||||||
[ "${DEPLOY_OX}" != "no" ] && COMPONENTS="${COMPONENTS} or ox"
|
|
||||||
[ "${DEPLOY_UCS}" != "no" ] && COMPONENTS="${COMPONENTS} or ucs"
|
|
||||||
[ "${DEPLOY_XWIKI}" != "no" ] && COMPONENTS="${COMPONENTS} or xwiki"
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "Gathering passwords from UCS container ..."
|
|
||||||
UCS_CONTAINER_NAME=$( \
|
UCS_CONTAINER_NAME=$( \
|
||||||
kubectl -n ${NAMESPACE} get pods --no-headers \
|
kubectl -n ${NAMESPACE} get pods --no-headers --selector \
|
||||||
--selector 'app.kubernetes.io/instance=univention-corporate-container' \
|
'app.kubernetes.io/instance=univention-corporate-container' \
|
||||||
|
| grep Running \
|
||||||
| awk '{print $1}' \
|
| awk '{print $1}' \
|
||||||
)
|
)
|
||||||
echo "UCS_CONTAINER_NAME: ${UCS_CONTAINER_NAME}"
|
|
||||||
DEFAULT_USER_PASSWORD=$( \
|
DEFAULT_USER_PASSWORD=$( \
|
||||||
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
||||||
| grep DEFAULT_ACCOUNT_USER_PASSWORD \
|
| grep DEFAULT_ACCOUNT_USER_PASSWORD \
|
||||||
| awk '{print $2}' \
|
| awk '{print $2}' \
|
||||||
)
|
)
|
||||||
DEFAULT_ADMIN_PASSWORD=$( \
|
DEFAULT_ADMIN_PASSWORD=$(
|
||||||
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
||||||
| grep DEFAULT_ACCOUNT_ADMIN_PASSWORD \
|
| grep DEFAULT_ACCOUNT_ADMIN_PASSWORD \
|
||||||
| awk '{print $2}' \
|
| awk '{print $2}' \
|
||||||
)
|
)
|
||||||
|
|
||||||
echo "triggering test pipeline ..."
|
curl --request POST \
|
||||||
curl -X POST \
|
--header "Content-Type: application/json" \
|
||||||
-F "ref=main" \
|
--data "{ \
|
||||||
-F "token=${CI_JOB_TOKEN}" \
|
\"ref\": \"${TESTS_BRANCH}\", \
|
||||||
-F "variables[url]=https://portal.${DOMAIN}" \
|
\"token\": \"${CI_JOB_TOKEN}\", \
|
||||||
-F "variables[user_name]=${DEFAULT_USER_NAME}" \
|
\"variables\": { \
|
||||||
-F "variables[user_password]=${DEFAULT_USER_PASSWORD}" \
|
\"url\": \"https://portal.${DOMAIN}\", \
|
||||||
-F "variables[admin_name]=${DEFAULT_ADMIN_NAME}" \
|
\"user_name\": \"${DEFAULT_USER_NAME}\", \
|
||||||
-F "variables[admin_password]=${DEFAULT_ADMIN_PASSWORD}" \
|
\"user_password\": \"${DEFAULT_USER_PASSWORD}\", \
|
||||||
-F "variables[components]=\"${COMPONENTS}\"" \
|
\"admin_name\": \"${DEFAULT_ADMIN_NAME}\", \
|
||||||
https://${TESTS_PROJECT_URL}/trigger/pipeline
|
\"admin_password\": \"${DEFAULT_ADMIN_PASSWORD}\", \
|
||||||
|
\"DEPLOY_ALL_COMPONENTS\": \"${DEPLOY_ALL_COMPONENTS}\", \
|
||||||
|
\"DEPLOY_COLLABORA\": \"${DEPLOY_COLLABORA}\", \
|
||||||
|
\"DEPLOY_ELEMENT\": \"${DEPLOY_ELEMENT}\", \
|
||||||
|
\"DEPLOY_ICS\": \"${DEPLOY_ICS}\", \
|
||||||
|
\"DEPLOY_JITSI\": \"${DEPLOY_JITSI}\", \
|
||||||
|
\"DEPLOY_KEYCLOAK\": \"${DEPLOY_KEYCLOAK}\", \
|
||||||
|
\"DEPLOY_NEXTCLOUD\": \"${DEPLOY_NEXTCLOUD}\", \
|
||||||
|
\"DEPLOY_OPENPROJECT\": \"${DEPLOY_OPENPROJECT}\", \
|
||||||
|
\"DEPLOY_OX\": \"${DEPLOY_OX}\", \
|
||||||
|
\"DEPLOY_SERVICES\": \"${DEPLOY_SERVICES}\", \
|
||||||
|
\"DEPLOY_UCS\": \"${DEPLOY_UCS}\", \
|
||||||
|
\"DEPLOY_XWIKI\": \"${DEPLOY_XWIKI}\", \
|
||||||
|
\"DEPLOY_PROVISIONING\": \"${DEPLOY_PROVISIONING}\" \
|
||||||
|
} \
|
||||||
|
}" \
|
||||||
|
"https://${TESTS_PROJECT_URL}/trigger/pipeline"
|
||||||
|
|
||||||
generate-release-artefacts:
|
run-souvap-dev-tests:
|
||||||
stage: "generate-release-artefacts"
|
extends: ".deploy-common"
|
||||||
|
environment:
|
||||||
|
name: "${NAMESPACE}"
|
||||||
|
tags:
|
||||||
|
- "docker"
|
||||||
|
- "kubernetes"
|
||||||
|
- "${CLUSTER}"
|
||||||
|
stage: "tests"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" && $NAMESPACE =~ /.+/ && $RUN_UMS_TESTS == "yes"
|
||||||
|
when: "always"
|
||||||
|
script:
|
||||||
|
- |
|
||||||
|
UCS_CONTAINER_NAME=$( \
|
||||||
|
kubectl -n ${NAMESPACE} get pods --no-headers --selector \
|
||||||
|
'app.kubernetes.io/instance=univention-corporate-container' \
|
||||||
|
| grep Running \
|
||||||
|
| awk '{print $1}' \
|
||||||
|
)
|
||||||
|
DEFAULT_USER_PASSWORD=$( \
|
||||||
|
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
||||||
|
| grep DEFAULT_ACCOUNT_USER_PASSWORD \
|
||||||
|
| awk '{print $2}' \
|
||||||
|
)
|
||||||
|
DEFAULT_ADMIN_PASSWORD=$(
|
||||||
|
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
||||||
|
| grep DEFAULT_ACCOUNT_ADMIN_PASSWORD \
|
||||||
|
| awk '{print $2}' \
|
||||||
|
)
|
||||||
|
|
||||||
|
curl --request POST \
|
||||||
|
--header "Content-Type: application/json" \
|
||||||
|
--data "{ \
|
||||||
|
\"ref\": \"${UMS_TESTS_BRANCH}\", \
|
||||||
|
\"token\": \"${CI_JOB_TOKEN}\", \
|
||||||
|
\"variables\": { \
|
||||||
|
\"portal_base_url\": \"https://portal.${DOMAIN}\", \
|
||||||
|
\"username\": \"${DEFAULT_USER_NAME}\", \
|
||||||
|
\"password\": \"${DEFAULT_USER_PASSWORD}\", \
|
||||||
|
\"admin_username\": \"${DEFAULT_ADMIN_NAME}\", \
|
||||||
|
\"admin_password\": \"${DEFAULT_ADMIN_PASSWORD}\", \
|
||||||
|
\"keycloak_base_url\": \"https://id.${DOMAIN}\" \
|
||||||
|
} \
|
||||||
|
}" \
|
||||||
|
"https://${UMS_TESTS_PROJECT_URL}/trigger/pipeline"
|
||||||
|
|
||||||
|
generate-release-assets:
|
||||||
|
stage: "generate-release-assets"
|
||||||
image: "registry.souvap-univention.de/souvap/tooling/images/ansible:4.10.0"
|
image: "registry.souvap-univention.de/souvap/tooling/images/ansible:4.10.0"
|
||||||
rules:
|
rules:
|
||||||
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
@@ -460,47 +544,57 @@ generate-release-artefacts:
|
|||||||
- when: "never"
|
- when: "never"
|
||||||
script:
|
script:
|
||||||
- |
|
- |
|
||||||
git clone https://gitlab-ci-token:${CI_JOB_TOKEN}@${CI_SERVER_HOST}/souvap/devops/generate-deployment-artefacts
|
git clone https://gitlab-ci-token:${CI_JOB_TOKEN}@${CI_SERVER_HOST}/${ASSET_GENERATOR_REPO_PATH}
|
||||||
cd generate-deployment-artefacts
|
cd opendesk-asset-generator
|
||||||
export OPENDESK_DEPLOYMENT_AUTOMATION_PATH=${CI_PROJECT_DIR}
|
export OPENDESK_DEPLOYMENT_AUTOMATION_PATH=${CI_PROJECT_DIR}
|
||||||
./artefact_generator.py
|
./opendesk_asset_generator.py
|
||||||
mv ./build_artefacts ${CI_PROJECT_DIR}
|
mv ./build_artefacts ${CI_PROJECT_DIR}
|
||||||
cd ..
|
cd ..
|
||||||
rm -rf generate-deployment-artefacts
|
rm -rf opendesk-asset-generator
|
||||||
ls -l ./build_artefacts
|
ls -l ./build_artefacts
|
||||||
artifacts:
|
artifacts:
|
||||||
paths:
|
paths:
|
||||||
- "./build_artefacts/chart-index.json"
|
- "./build_artefacts/chart-index.json"
|
||||||
- "./build_artefacts/image-index.json"
|
- "./build_artefacts/image-index.json"
|
||||||
tags:
|
tags: []
|
||||||
- "docker"
|
variables:
|
||||||
|
ASSET_GENERATOR_REPO_PATH: "bmi/souveraener_arbeitsplatz/tooling/opendesk-asset-generator"
|
||||||
|
|
||||||
|
|
||||||
|
# Declare .environments which is in environments repository and only loaded when INCLUDE_ENVIRONMENTS_ENABLED not false.
|
||||||
|
# 'cache' is used because job must contain at least one key, so cache is just a dummy key.
|
||||||
|
.environments:
|
||||||
|
cache: {}
|
||||||
|
|
||||||
# Overwrite shared settings
|
# Overwrite shared settings
|
||||||
.common-semantic-release:
|
.common-semantic-release:
|
||||||
image: "registry.souvap-univention.de/souvap/tooling/images/semantic-release-patched:latest"
|
image: "registry.souvap-univention.de/souvap/tooling/images/semantic-release-patched:latest"
|
||||||
rules:
|
tags: []
|
||||||
- if: "$CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
|
||||||
when: "never"
|
|
||||||
- when: "always"
|
|
||||||
|
|
||||||
common-yaml-linter:
|
common-yaml-linter:
|
||||||
rules:
|
rules:
|
||||||
- if: "$CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
- if: "$JOB_COMMON_YAML_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
||||||
when: "never"
|
when: "never"
|
||||||
- when: "always"
|
- when: "always"
|
||||||
|
|
||||||
reuse-linter:
|
reuse-linter:
|
||||||
allow_failure: false
|
allow_failure: false
|
||||||
rules:
|
rules:
|
||||||
- if: "$CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
- if: "$JOB_REUSE_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
||||||
when: "never"
|
when: "never"
|
||||||
- when: "always"
|
- when: "always"
|
||||||
|
|
||||||
|
generate-release-version:
|
||||||
|
rules:
|
||||||
|
- if: "$JOB_RELEASE_ENABLED != 'false'"
|
||||||
|
when: "always"
|
||||||
|
|
||||||
release:
|
release:
|
||||||
|
dependencies:
|
||||||
|
- "generate-release-assets"
|
||||||
rules:
|
rules:
|
||||||
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
when: "always"
|
when: "always"
|
||||||
- when: "never"
|
|
||||||
script:
|
script:
|
||||||
- |
|
- |
|
||||||
cat << 'EOF' > ${CI_PROJECT_DIR}/.releaserc
|
cat << 'EOF' > ${CI_PROJECT_DIR}/.releaserc
|
||||||
|
|||||||
466
CHANGELOG.md
466
CHANGELOG.md
@@ -1,3 +1,464 @@
|
|||||||
|
## [0.5.27](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.26...v0.5.27) (2023-11-04)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **docs:** Re-include release artefacts ([4359b21](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4359b21f1cdae91a87b87ad2b270d67a2b1eda21))
|
||||||
|
|
||||||
|
## [0.5.26](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.25...v0.5.26) (2023-11-02)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Enables user directory search for all users ([8fafd90](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/8fafd906a3b0efa7e4164b357656d7903fc55371))
|
||||||
|
|
||||||
|
## [0.5.25](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.24...v0.5.25) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Add CryptPad to support editing of diagrams.net files from within Nextcloud ([ab6014f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ab6014f8c6285785be5c56cd656fe0636df4434c))
|
||||||
|
|
||||||
|
## [0.5.24](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.23...v0.5.24) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Update image to 23.05.5.3.1 ([38336d0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/38336d024033f4fe1a28b0f76f9c63ecdb076156))
|
||||||
|
|
||||||
|
## [0.5.23](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.22...v0.5.23) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element Web to latest release ([b47de62](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b47de62f987e8778878fee55ecda3032beb55f3d))
|
||||||
|
|
||||||
|
## [0.5.22](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.21...v0.5.22) (2023-10-31)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Nextcloud integration within K8s instances ([d249d0e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d249d0e3ce3ee0966033e870ea5c4d9e1928f045))
|
||||||
|
|
||||||
|
## [0.5.21](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.20...v0.5.21) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Deinstall components if disabled ([7feaadf](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7feaadf7f8830d8d0d5df752733c9b8f47315df6))
|
||||||
|
* **helmfile:** Put enviroments in first document inside of a yaml ([034e98c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/034e98c850fa1f67300c04883904737a69448a25))
|
||||||
|
|
||||||
|
## [0.5.20](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.19...v0.5.20) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Remove old XWiki image, set explicit timeout for OP deployment, bump Jitsi Helm chart to enable chat for stand-alone Jitsi ([5d01f8c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5d01f8ca46384d63d69dab0119998c4bb3183084))
|
||||||
|
|
||||||
|
## [0.5.19](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.18...v0.5.19) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element Web and Nordeck Widgets to latest releases ([2313f75](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2313f75dbe32d855b0c440944bd0de51c8e104ca))
|
||||||
|
|
||||||
|
## [0.5.18](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.17...v0.5.18) (2023-10-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **xwiki:** Switch to Alpine/Jetty slim image ([b399869](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b39986907cece3cec06012531a55b2699d131f90))
|
||||||
|
|
||||||
|
## [0.5.17](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.16...v0.5.17) (2023-10-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Update swp_integration app and prepare CryptPad integration ([a046dea](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a046deaf173ab41029c2ab5e3161bd89e0fdabcb))
|
||||||
|
|
||||||
|
## [0.5.16](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.15...v0.5.16) (2023-10-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Slim container with upgraded helm-chart ([535823e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/535823e0a8b2bde72d159835248b2287fd136af7))
|
||||||
|
|
||||||
|
## [0.5.15](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.14...v0.5.15) (2023-10-25)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add XWiki Jetty and UniventionKeycloak to image.yaml for Compliance checks. They are not yet part of standard deployment. ([8e376bb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/8e376bb4a5e37e16d76ea527cd02a5f614cdfe3d))
|
||||||
|
|
||||||
|
## [0.5.14](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.13...v0.5.14) (2023-10-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Support for openDesk top bar with central navigation ([e609b75](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e609b75cc7fcbb7f03997cb5e26dd9cf4628f77d))
|
||||||
|
|
||||||
|
## [0.5.13](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.12...v0.5.13) (2023-10-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Configure rights and roles ([59d58e3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/59d58e320e503727e42dbfe0b027ba7948275ac6))
|
||||||
|
|
||||||
|
## [0.5.12](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.11...v0.5.12) (2023-10-19)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Add an application service for the intercom-service ([1a4eced](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1a4eced998998faa7ac862b8c409bbd743b16ec0))
|
||||||
|
* **element:** Add the Matrix NeoBoard Widget deployment ([5afd233](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5afd2339c20a0be41078ae4c3ce703c62f332557))
|
||||||
|
* **element:** Add the Matrix NeoChoice Widget deployment ([7756d35](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7756d35fa156b36ed50ba8f837273db56323f45f))
|
||||||
|
* **element:** Add the Matrix NeoDateFix Bot deployment ([785989e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/785989e91df5547ab5ac60914b82bc99c4f1a790))
|
||||||
|
* **element:** Add the Matrix NeoDateFix Widget deployment ([27b6796](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/27b6796639f37dbd6c26f21fd54502153398aed0))
|
||||||
|
* **element:** Add the Matrix User Verification Service deployment ([30405d1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/30405d182d44a5586a4070738dfbe1c141841d19))
|
||||||
|
* **element:** Upgrade Element to v1.11.46 ([82a037e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/82a037ec7c25baf41bd0542c3ded47402adc2844))
|
||||||
|
* **element:** Upgrade the opendesk-element charts to 2.3.0 ([fd9e04d](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/fd9e04d9922b949d0f213016169a9024a66a1ded))
|
||||||
|
* **element:** Upgrade the opendesk-matrix-widgets charts to 2.3.0 ([cbe5141](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/cbe514176a4d86d166db248d7297d215409016d2))
|
||||||
|
* **element:** Use a separate image configuration for the bootstrap tasks ([7f7c364](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7f7c364071072b01d485d3e248a3f8de49a07309))
|
||||||
|
* **intercom-service:** Allow access from the non-istio domain and reference to the correct synapse hostname ([16f2ac4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/16f2ac464eb7267f1c4d87c3ccaca2c91a7ecc1b))
|
||||||
|
* **intercom-service:** Fix the nordeck configuration ([06dcdd7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/06dcdd78afe0e6514c1f30d24924d3e7077ae6da))
|
||||||
|
* **jitsi:** Use template for the cluster networking domain ([0898d96](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0898d9657145d66fd4c52fe6036c955ad58a0cfe))
|
||||||
|
* **keycloak:** Use the correct backchannel logout configuration for element ([86657b1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/86657b139a6d8f4ff3f921b8755e04cb790c3786))
|
||||||
|
* **open-xchange:** Enable Element calendar integration ([f564efd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f564efd97f8db39cffaea317e36db3825fc9121e))
|
||||||
|
|
||||||
|
## [0.5.11](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.10...v0.5.11) (2023-10-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Quote all password template strings ([fb7dba7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/fb7dba787c232c402aa9c989c0e8ace51869d534))
|
||||||
|
* **services:** Add memcached service ([72e3afd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/72e3afdffdeb6f88f8e926426dbc26adf4b54e7a))
|
||||||
|
|
||||||
|
## [0.5.10](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.9...v0.5.10) (2023-10-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **intercom-service:** Update intercom-service chart to v2.0.0 ([c3129f1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c3129f14437728be890187bb7c4a1bfc42d90958))
|
||||||
|
|
||||||
|
## [0.5.9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.8...v0.5.9) (2023-10-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Enable the guest module in Synapse ([da1bf35](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/da1bf3581c5790786601948cabcef8a1d1c680ad))
|
||||||
|
|
||||||
|
## [0.5.8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.7...v0.5.8) (2023-10-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add default port for SMTP in environment ([74f9ec2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/74f9ec28e401f7caeefc4e50ac0a7e95fea41a53))
|
||||||
|
|
||||||
|
## [0.5.7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.6...v0.5.7) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Mail sender address ([711d29e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/711d29e374d13a3c8b7bcdf3e8440d03e0ef2b7d))
|
||||||
|
|
||||||
|
## [0.5.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.5...v0.5.6) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Use signed bitnami charts from openDesk Mirror Builds ([70744d0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/70744d04c66f32d65dc968c8570ed7a397f4efcc))
|
||||||
|
* **services:** Bump redis chart to 18.1.2 ([d4c751d](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d4c751d29f15c718957f6bc388a99347e2923c87))
|
||||||
|
|
||||||
|
## [0.5.5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.4...v0.5.5) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Switch image to fix central navigation; set email sender address ([e42feb4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e42feb4c260fc24692bc2742c97754230f8e2857))
|
||||||
|
|
||||||
|
## [0.5.4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.3...v0.5.4) (2023-10-02)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add third environment (test) ([7dbcbfe](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7dbcbfe7237b365cf53f4c850b149e8b95149901))
|
||||||
|
|
||||||
|
## [0.5.3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.2...v0.5.3) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Rollback MariaDB version to fix OX Guard initialization ([e33acd3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e33acd33e79740144e8fe318fe34dc705834ddf3))
|
||||||
|
|
||||||
|
## [0.5.2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.1...v0.5.2) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Add Gitlab-CI sledgehammer deployment removal ([6fd655a](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6fd655a0b1afd40303ac11130692202146bab215))
|
||||||
|
|
||||||
|
## [0.5.1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.0...v0.5.1) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **docs:** Add 'Helm Chart Trust Chain' section ([b6b4972](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b6b4972a5dd426bcc8fa00137d7e7b60056376c8))
|
||||||
|
* **docs:** Highlight that Helmfile >= 0.157.0 is required ([d86f516](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d86f516747323d117f620658c4368408926c507a))
|
||||||
|
* **element:** Use OCI registry and verify chart signatures ([a41b9a6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a41b9a699c79bf90163bbb3c233c805b8d0a999e))
|
||||||
|
* **helmfile:** Add cleanup flag for job resources ([0f01b94](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0f01b94aa19b40b4774ba11d9886fe6f12090e73))
|
||||||
|
* **helmfile:** Create directory for gpg pubkeys ([4c5731e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4c5731e6bb057cb272f660b4df0369b67709c203))
|
||||||
|
* **intercom-service:** Use OCI registry and verify chart signatures ([74b3d41](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/74b3d41381474efd2fbc5a9f3a0f1c0713811106))
|
||||||
|
* **jitsi:** Verify chart signatures ([1dd6582](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1dd6582ec7d742250ba08f69eba9a4679984b1ae))
|
||||||
|
* **keycloak-bootstrap:** Use OCI registry and verify chart signatures ([ca5d5f8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ca5d5f82800ea6d7ecfa38eb2b5d8b85e709bb9f))
|
||||||
|
* **keycloak:** Use OCI registry and verify chart signatures ([095059c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/095059c7e53bbe8a874773f574cc6794ef8af6e4))
|
||||||
|
* **nextcloud:** Use OCI registry and verify chart signatures ([41dfdc0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/41dfdc0c8f83e3d79fa5a763ac449f6edfc76676))
|
||||||
|
* **open-xchange:** Use OCI registry and verify chart signatures ([2d5d370](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2d5d3708f7f45600961c22ce11e750561de1fd27))
|
||||||
|
* **open-xchange:** Use renamed istio gateway ([65d2642](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/65d2642d34c1c21a00a29278f7e1143f7fabb2aa))
|
||||||
|
* **openproject:** Use OCI registry and verify chart signatures ([5343840](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5343840bed01992b3132eace362f91588c705a98))
|
||||||
|
* **services:** Add wildcard certifcate request support ([15ad8ca](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/15ad8ca7ab34b079252f7b69219ede81ad43aa1c))
|
||||||
|
* **services:** Bump opendesk-certificates to 2.1.0 ([4372f06](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4372f063e0a27d5156da963d44d3ed4e72490fc4))
|
||||||
|
* **services:** Only create istio gateway with webmail domain ([6a39011](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6a390112dab11afaca06118a0ca7a18afe633a30))
|
||||||
|
* **services:** Use OCI registry for all services and add gpg verify mechanism ([892920b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/892920b0487b41a35b5a96596c61101827e8dd6d))
|
||||||
|
* **univention-corporate-container:** Use OCI registry and verify chart signatures ([424317e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/424317ed585f7bd5036259d7e3d77d081d2aec1b))
|
||||||
|
|
||||||
|
# [0.5.0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.9...v0.5.0) (2023-09-27)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Move the static configuration into the values.yaml ([f22619b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f22619bd8ef11cb43147ef19dcff2c02d9fe0503))
|
||||||
|
* **element:** Specify resources for the guest module init container ([275798c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/275798c1d6aa47ef33fbb0da3bb03a86d3e4b0ee))
|
||||||
|
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* **element:** Activate the guest module ([5ad25ac](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5ad25acafd54d19dd2ed330b19f7860aff5d49f4))
|
||||||
|
|
||||||
|
## [0.4.9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.8...v0.4.9) (2023-09-27)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Bump Helm chart to add app "groupfolders" ([62b767e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/62b767ef38c8eae2874b20a9aa51e85d2a3fe5a3))
|
||||||
|
|
||||||
|
## [0.4.8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.7...v0.4.8) (2023-09-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Digest rollback ([9acce08](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/9acce081397c06426820b61f39c9aa0dcc1234a5))
|
||||||
|
|
||||||
|
## [0.4.7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.6...v0.4.7) (2023-09-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add timeout for database services ([98ec02f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/98ec02f230f1691eb8c17d8d3552fceda329bf7c))
|
||||||
|
* **openproject:** Image digest ([b340373](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b340373133ad973cfd6a3632adc9a74a23419cc7))
|
||||||
|
|
||||||
|
## [0.4.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.5...v0.4.6) (2023-09-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Use renamed registry open_desk ([a37faf3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a37faf3b5769aea9944ffa7626096c16296dcc85))
|
||||||
|
|
||||||
|
## [0.4.5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.4...v0.4.5) (2023-09-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Streamline timeouts ([2703615](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2703615dffb2ba5c70704a4f08bb0485629218f3))
|
||||||
|
|
||||||
|
## [0.4.4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.3...v0.4.4) (2023-09-25)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Updates for mail templates and mail export ([ae3d0da](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ae3d0daa117d3d0ff307f379590394914a757546))
|
||||||
|
|
||||||
|
## [0.4.3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.2...v0.4.3) (2023-09-25)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Update image to 27.1.1 ([ce7e5f6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ce7e5f670a4dbc980eb8be73e5f7d15b27e8b1de))
|
||||||
|
|
||||||
|
## [0.4.2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.1...v0.4.2) (2023-09-21)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Add Nextcloud app for OpenProject integration; Bump Collabora Image ([f46c8a9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f46c8a9a5f4f9778cb171d65e9a0280e4ce61c16))
|
||||||
|
|
||||||
|
## [0.4.1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.4.0...v0.4.1) (2023-09-19)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Remove doublette triple dashes in helmfile.yaml ([41b9afb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/41b9afb3648a0e1fddc5aa4337cc1501756b370c))
|
||||||
|
|
||||||
|
# [0.4.0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.3.2...v0.4.0) (2023-09-18)
|
||||||
|
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* **ci:** Optionally trigger E2E tests of the SouvAP Dev team ([a99c088](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a99c088361b95b2bb7ee2b161e3a254f02bcd9ae))
|
||||||
|
|
||||||
|
## [0.3.2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.3.1...v0.3.2) (2023-09-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Fix linter issues ([1514678](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1514678db00d32c1463d8fc496c0e6d1c2a2df96))
|
||||||
|
* **univention-management-stack:** Add "commonLabels" into helmfile ([16c08f8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/16c08f82c9b4934567bb3b9c7fccab754bfad494))
|
||||||
|
* **univention-management-stack:** Add Helm charts ([a74d662](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a74d66240423fd5ba87854cc2b71132f11271ec7))
|
||||||
|
* **univention-management-stack:** Add switch "univentionManagementStack.enabled" ([471a2fa](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/471a2fa26205b8ca3afb5eeeb4524897a57f5c20))
|
||||||
|
* **univention-management-stack:** Adjust Ingress configuration for portal-server ([13bcd78](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/13bcd785e8f7db22d20903020e0cdd28094309a9))
|
||||||
|
* **univention-management-stack:** Adjust Ingress configuration for umc ([320da3b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/320da3bec3a49d974765e567878d5c2f2b4e93ef))
|
||||||
|
* **univention-management-stack:** Adjust Ingress configuration of notifications-api ([5e1a7b1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5e1a7b19e278147d010c48dac2da111f828dd115))
|
||||||
|
* **univention-management-stack:** Adjust ingress configuration of the portal-frontend ([c54bab1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c54bab165bf81854471d790200781b4181eba22a))
|
||||||
|
* **univention-management-stack:** Adjust Ingress configuration of udm-rest-api ([c61b1b8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c61b1b828150caa8d2fe1a5b9f0a862b2fbef4f1))
|
||||||
|
* **univention-management-stack:** Adjust Ingress conifguration of store-dav ([96097e4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/96097e470483a5251acd81eb772da70ad7f55137))
|
||||||
|
* **univention-management-stack:** Configure cookie banner data ([12c931f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/12c931fcff5536116af11df1c9c0468429949fe2))
|
||||||
|
* **univention-management-stack:** Define resource requests and limits ([2f8a298](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2f8a2989250ea0f3b50dd3417f214a8864fe62d0))
|
||||||
|
* **univention-management-stack:** Disable istio for the stack ([4835a2b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4835a2beec408ec6267177f82257edd9ccb0d937))
|
||||||
|
* **univention-management-stack:** Prepare persistence configuration ([7ab1cb5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7ab1cb5c7e7bca85394eae2ed17141e513dd5a42))
|
||||||
|
* **univention-management-stack:** Process bases before releases ([ec3f1d9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ec3f1d96ac17cf1fb9d34ab692240460d5bd4ba1))
|
||||||
|
* **univention-management-stack:** Set externalDomainName for bootstrapping the stack ([0ba71f2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0ba71f2749eaf51b09429a5f3c705bd0075c1efa))
|
||||||
|
* **univention-management-stack:** Split templated from static values ([09079a1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/09079a13031be7894a34bf92945bd25a040c2290))
|
||||||
|
* **univention-management-stack:** Split values into templated and static ([d3c4390](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d3c439038a2551ec90324ab8659d24b65b223d4f))
|
||||||
|
* **univention-management-stack:** Update portal-listener to leverage dependency waiting ([c840608](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c84060811229bb131bcd473a9e4668dfa73f97d7))
|
||||||
|
* **univention-management-stack:** Use global secrets to fill initialPasswordAdministrator ([a4bab40](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a4bab4068dc298056ed864e60a244d49a2934c8b))
|
||||||
|
* **univention-management-stack:** Use global secrets to populate ldap related secrets ([9409ad8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/9409ad829a725c84ebc3de5d1c4d42fe735e9d0c))
|
||||||
|
* **univention-management-stack:** Use global secrets to set store-dav related passwords ([90019e3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/90019e3ef6de5e4ed1742ee9ddc3bbb256cd3dec))
|
||||||
|
* **univention-management-stack:** Use ldap base DN "dc=swp-ldap,dc=internal" ([77e362f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/77e362f6bc053c5d456bf65649f15130ce53547c))
|
||||||
|
* **univention-management-stack:** Use postgresql service for notifications-api ([fe0e0cd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/fe0e0cdce4622352afbf74875adcae8324d769a3))
|
||||||
|
* **univention-management-stack:** Use the prefix "ums-" for all releases ([edb25bd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/edb25bd7655beeefa73a62fb9a8c85e076c4cc2f))
|
||||||
|
* **univention-management-stack:** Use the value "global.imagePullPolicy" ([15db5dc](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/15db5dcbba33c39f752499f2d73c77cac32d1e8c))
|
||||||
|
|
||||||
|
## [0.3.1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.3.0...v0.3.1) (2023-09-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Update Ingress annotations and set securityContext ([b5583ca](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b5583caec10c24e3bfb312edcb2800e6a60a9b10))
|
||||||
|
* **element:** Improve default container security settings ([882f1fb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/882f1fbc93ceb4ac33683d445e100e445798b202))
|
||||||
|
* **element:** Update opendesk element version to 2.0.1 ([d725b93](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d725b937989987ffacf87d7a9ee05803dcdd4c93))
|
||||||
|
* **helmfile:** Remove default SMTP credentials and create docs for SMTP/TURN ([e120f5f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e120f5fb9a91b80ba71ce78eace99852b4da5fda))
|
||||||
|
* **helmfile:** Update images and use a tag and digest together ([c7fc187](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c7fc187f14b78cdcc698abbbaec1ba0bbfc718a1))
|
||||||
|
* **services:** Explicitly set securityContexts ([a799db0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a799db03c4115ba69303be1c265f7aefef95d659))
|
||||||
|
* **services:** Update Postfix to 2.0.2 fixing security gaining ([e1070ee](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e1070eeb0602523c240a91dae1b0869a7cc42a78))
|
||||||
|
|
||||||
|
# [0.3.0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.10...v0.3.0) (2023-09-12)
|
||||||
|
|
||||||
|
|
||||||
|
### Features
|
||||||
|
|
||||||
|
* **ci:** Selective tests ([d2e7ac9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d2e7ac93481249e9eb7e5e1a41a6c6e333abe2dc))
|
||||||
|
|
||||||
|
## [0.2.10](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.9...v0.2.10) (2023-09-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add imagePullPolicy default env variable ([f988644](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f9886448b60bbbd917b5ba04d188401275293eec))
|
||||||
|
* **helmfile:** Update images and add jitsi, keycloak to security section in docs ([0eceb85](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0eceb85e7df7455fa61cb17a854807069fbcf51a))
|
||||||
|
* **jitsi:** Update chart to 1.4.2 with improved security and fixed change on each deployment ([1349181](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1349181d802ccb80d9e48cf50fe39f1505116c8e))
|
||||||
|
* **jitsi:** Update jitsi to 1.5.1 and fix prosody image ([ed7e5e4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ed7e5e428e5d9213a92f97dc03d72fa3e04334c2))
|
||||||
|
* **keycloak:** Improve default security settings ([3b90533](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/3b90533063c151a9f3cdc9861a115481f6dc440a))
|
||||||
|
* **nextcloud:** Fix yamllint disable comment ([4380e78](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4380e789814ec2b0458fb2c341c8160ab2743afc))
|
||||||
|
* **services:** Disable https redirect in istio to fix cert-manager issues ([1ef4a86](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1ef4a861acc955e2e85715c62f715a6629ada940))
|
||||||
|
* **services:** Fix capabilities of postifix ([a6fa846](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a6fa846afc9744f2b399c37cc754f878b6b9e90b))
|
||||||
|
* **services:** Fix OCI registry address of postgresql, mariadb ([be82243](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/be822439661f766c4db6044fd3581db0cce214bb))
|
||||||
|
|
||||||
|
## [0.2.10](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.9...v0.2.10) (2023-09-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add imagePullPolicy default env variable ([f988644](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f9886448b60bbbd917b5ba04d188401275293eec))
|
||||||
|
* **helmfile:** Update images and add jitsi, keycloak to security section in docs ([0eceb85](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0eceb85e7df7455fa61cb17a854807069fbcf51a))
|
||||||
|
* **jitsi:** Update chart to 1.4.2 with improved security and fixed change on each deployment ([1349181](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1349181d802ccb80d9e48cf50fe39f1505116c8e))
|
||||||
|
* **keycloak:** Improve default security settings ([3b90533](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/3b90533063c151a9f3cdc9861a115481f6dc440a))
|
||||||
|
* **nextcloud:** Fix yamllint disable comment ([4380e78](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4380e789814ec2b0458fb2c341c8160ab2743afc))
|
||||||
|
* **services:** Disable https redirect in istio to fix cert-manager issues ([1ef4a86](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1ef4a861acc955e2e85715c62f715a6629ada940))
|
||||||
|
* **services:** Fix capabilities of postifix ([a6fa846](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a6fa846afc9744f2b399c37cc754f878b6b9e90b))
|
||||||
|
* **services:** Fix OCI registry address of postgresql, mariadb ([be82243](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/be822439661f766c4db6044fd3581db0cce214bb))
|
||||||
|
|
||||||
|
## [0.2.9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.8...v0.2.9) (2023-09-05)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Add websocket support for NGINX Inc. Ingress ([6e5ef63](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6e5ef639c22aad93fd2d0eb75f7a1ffc00d6cc9a))
|
||||||
|
* **docs:** Add security part in README ([ff462ab](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ff462ab0dc2252cc7b517874f5337427b8d19053))
|
||||||
|
* **docs:** Update scaling docs ([63a1e25](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/63a1e2568e8c5ff62081c6e6594d2019c1aa4b74))
|
||||||
|
* **helmfile:** Reduce icap resources in default enviroment ([c5ab1b8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c5ab1b81fecbce46788c50b282ed6d1770124fa5))
|
||||||
|
* **helmfile:** Update clamav and nextcloud images in default environment ([4f2a8ae](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4f2a8aeee4ee6c3d27b1c8a99bad14f603486be5))
|
||||||
|
* **nextcloud:** Add support for up to 4G large upload for Ingress NGINX and NGINX Inc. Ingress ([6e68f7f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6e68f7f28c937319d93f8afe1dbb302012f77233))
|
||||||
|
* **nextcloud:** Rename sovereign-workplace-nextcloud-bootstrap to opendesk-nextcloud-bootstrap and use OCI ([cef11ac](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/cef11acbae28510809f9bfa13224dc3a6996207f))
|
||||||
|
* **nextcloud:** Use clamav-icap when clamavDistributed is activated ([41d40c9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/41d40c9b731b866da2666fa4ffa8cb6493737112))
|
||||||
|
* **services:** Enable security context and use default increased security settings ([9a6d240](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/9a6d2409a697f7e9811a0f4f8d31bb18bac1b926))
|
||||||
|
* **services:** Fix image registry templates for postfix ([6321ff5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6321ff50a00203abbfb7f5822e67a3c0e00d4b01))
|
||||||
|
* **services:** Replace image digest by tag ([f758293](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f7582932412f13b1a087d40459e97cf633b1a97e))
|
||||||
|
* **services:** Set readOnlyRootFilesystem to true on master ([5fbf86b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5fbf86b6bc7b63c81b3ac07c5e0fa8cd464fdad1))
|
||||||
|
* **services:** Update clamav to 4.0.0, redis to 18.0.0, postgresql to 2.0.2, mariadb to 2.0.2 and use OCI registries ([9d78664](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/9d7866480cee889fd3b3003b2eea313a6ed73344))
|
||||||
|
|
||||||
|
## [0.2.8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.7...v0.2.8) (2023-08-31)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Update images and Helm chart ([39565c7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/39565c7cfd89a8d1c2e645e3ecea28fba703ccc1))
|
||||||
|
|
||||||
|
## [0.2.7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.6...v0.2.7) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **jitsi:** Update Jitsi Helm chart to set the user's display name as default ([387bd87](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/387bd8715c5a1cf54733c6642cf57c6ef9a44316))
|
||||||
|
|
||||||
|
## [0.2.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.5...v0.2.6) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Change path of asset_generator ([6ab4fa0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6ab4fa078b0bb3939c54f46d6475770fa9901936))
|
||||||
|
* **ci:** Include deployment environments ([0f59736](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0f59736c5dcff905400ae2e1bbf7ae496ffb9b2c))
|
||||||
|
* **ci:** Release artefacts ([2a61b5f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2a61b5f2a66bf1dc1ad06f7111ef7ecaf9247b39))
|
||||||
|
|
||||||
|
## [0.2.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.5...v0.2.6) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Change path of asset_generator ([6ab4fa0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6ab4fa078b0bb3939c54f46d6475770fa9901936))
|
||||||
|
* **ci:** Include deployment environments ([0f59736](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0f59736c5dcff905400ae2e1bbf7ae496ffb9b2c))
|
||||||
|
* **ci:** Release artefacts ([2a61b5f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2a61b5f2a66bf1dc1ad06f7111ef7ecaf9247b39))
|
||||||
|
|
||||||
|
## [0.2.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.2.5...v0.2.6) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Change path of asset_generator ([6ab4fa0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6ab4fa078b0bb3939c54f46d6475770fa9901936))
|
||||||
|
* **ci:** Release artefacts ([2a61b5f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2a61b5f2a66bf1dc1ad06f7111ef7ecaf9247b39))
|
||||||
|
|
||||||
|
## [0.2.5](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.4...v0.2.5) (2023-08-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **xwiki:** Theming and language of central navigation ([3d4d45f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/3d4d45f7114e6e3bc353b8d6c5fdbcac4cb2460f))
|
||||||
|
|
||||||
|
## [0.2.4](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.3...v0.2.4) (2023-08-29)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Apply the global theme to Element ([7f7eae8](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/7f7eae8f99a6d8ad8085ad99c63af27b858ff9b7))
|
||||||
|
|
||||||
## [0.2.3](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.2...v0.2.3) (2023-08-29)
|
## [0.2.3](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/compare/v0.2.2...v0.2.3) (2023-08-29)
|
||||||
|
|
||||||
|
|
||||||
@@ -133,3 +594,8 @@
|
|||||||
* **open-xchange:** OX AppSuite 8 within SWP is now publicly available ([6dc470f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/6dc470fd67edbb9711e406acb067569ca357b989))
|
* **open-xchange:** OX AppSuite 8 within SWP is now publicly available ([6dc470f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/6dc470fd67edbb9711e406acb067569ca357b989))
|
||||||
* **services:** Add clamav-simple deployment ([505f25c](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/505f25c5493ebb9e0181233ed5b7d8018e3a315d))
|
* **services:** Add clamav-simple deployment ([505f25c](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/505f25c5493ebb9e0181233ed5b7d8018e3a315d))
|
||||||
* **sovereign-workplace:** Initial commit ([533c504](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/533c5040faebd91f4012b604d0f4779ea1510424))
|
* **sovereign-workplace:** Initial commit ([533c504](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/533c5040faebd91f4012b604d0f4779ea1510424))
|
||||||
|
|
||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|||||||
@@ -9,17 +9,17 @@ Please read the [project's overall CONTRIBUTING.md](https://gitlab.opencode.de/b
|
|||||||
|
|
||||||
# How to contribute?
|
# How to contribute?
|
||||||
|
|
||||||
When providing contributes to this project, please adhere to the standards and conventions described in further down in this document. Doing so please feel free to create merge requests.
|
When providing contributes to this project, please adhere to the standards and conventions described further down in this document. Doing so please feel free to create merge requests.
|
||||||
|
|
||||||
# Standards and conventions
|
# Standards and conventions
|
||||||
|
|
||||||
## Branching
|
## Branching
|
||||||
|
|
||||||
We use of [Github flow](https://docs.github.com/en/get-started/quickstart/github-flow).
|
We use [Github flow](https://docs.github.com/en/get-started/quickstart/github-flow).
|
||||||
|
|
||||||
## Verified commits
|
## Verified commits
|
||||||
|
|
||||||
We only allow verify commits:
|
We only allow verified commits:
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/ssh_signed_commits/
|
- https://docs.gitlab.com/ee/user/project/repository/ssh_signed_commits/
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/gpg_signed_commits/
|
- https://docs.gitlab.com/ee/user/project/repository/gpg_signed_commits/
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/x509_signed_commits/
|
- https://docs.gitlab.com/ee/user/project/repository/x509_signed_commits/
|
||||||
@@ -80,7 +80,7 @@ Due to DVS requirements:
|
|||||||
- we should avoid stand alone Manifests.
|
- we should avoid stand alone Manifests.
|
||||||
- we do not use Operators and CRDs.
|
- we do not use Operators and CRDs.
|
||||||
|
|
||||||
In order to align the Helm files from various sources into an unified deployment of the SWP we make use of to [Helmfile](https://github.com/helmfile/helmfile).
|
In order to align the Helm files from various sources into an unified deployment of the SWP we make use of [Helmfile](https://github.com/helmfile/helmfile).
|
||||||
|
|
||||||
## Tooling
|
## Tooling
|
||||||
|
|
||||||
|
|||||||
237
README.md
237
README.md
@@ -6,11 +6,20 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
|
|
||||||
[[_TOC_]]
|
[[_TOC_]]
|
||||||
|
|
||||||
# Disclaimer August 2023
|
# Disclaimer
|
||||||
|
|
||||||
The current state of the Sovereign Workplace contains components that are going to be
|
openDesk will face breaking changes in the near future without upgrade paths.
|
||||||
replaced. Like for example the UCS dev container monolith will be substituted by
|
|
||||||
multiple Univention Management Stack containers.
|
While most components support upgrades, major configuration or component changes
|
||||||
|
may occur, therefore we recommend always installing from scratch.
|
||||||
|
|
||||||
|
Components that are going to be replaced soon are:
|
||||||
|
- The UCS dev container monolith will be substituted by multiple Univention
|
||||||
|
Management Stack containers,
|
||||||
|
- the Nextcloud community container is going to be replaced by an openDesk
|
||||||
|
specific Nextcloud distroless container and
|
||||||
|
- Dovecot Community is going to be replaced by a Dovecot container tailored for the
|
||||||
|
needs of the public sector.
|
||||||
|
|
||||||
In the next months we not only expect upstream updates of the functional
|
In the next months we not only expect upstream updates of the functional
|
||||||
components within their feature scope, but we are also going to address
|
components within their feature scope, but we are also going to address
|
||||||
@@ -19,8 +28,6 @@ operational issues like monitoring and network policies.
|
|||||||
Of course, further development also includes enhancing the documentation.
|
Of course, further development also includes enhancing the documentation.
|
||||||
|
|
||||||
The first release of the Sovereign Workplace is scheduled for December 2023.
|
The first release of the Sovereign Workplace is scheduled for December 2023.
|
||||||
Before that release there will be breaking changes in the deployment.
|
|
||||||
|
|
||||||
|
|
||||||
# The Sovereign Workplace (SWP)
|
# The Sovereign Workplace (SWP)
|
||||||
|
|
||||||
@@ -45,6 +52,15 @@ repository please use the [issues within this project](https://gitlab.opencode.d
|
|||||||
If you want to address other topics, please check the section
|
If you want to address other topics, please check the section
|
||||||
["Rückmeldungen und Beteiligung" of the Infos' project OVERVIEW.md](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung).
|
["Rückmeldungen und Beteiligung" of the Infos' project OVERVIEW.md](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung).
|
||||||
|
|
||||||
|
# Releases
|
||||||
|
|
||||||
|
All technical releases are created using [Semantic Versioning](https://semver.org/lang/de/).
|
||||||
|
|
||||||
|
Gitlab provides an [overview on the releases](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/-/releases) of this project.
|
||||||
|
|
||||||
|
The following release artefacts are provided beside the default source code assets:
|
||||||
|
- `chart-index.json`: An overview of all Helm charts used by the release.
|
||||||
|
- `image-index.json`: An overview of all container images used by the release.
|
||||||
# Deployment
|
# Deployment
|
||||||
|
|
||||||
**Note for project members:** You can use the project's `dev` K8s cluster to set
|
**Note for project members:** You can use the project's `dev` K8s cluster to set
|
||||||
@@ -57,11 +73,12 @@ up your own instance for development purposes. Please see the project
|
|||||||
|
|
||||||
These are the requirements of the Sovereign Workplace deployment:
|
These are the requirements of the Sovereign Workplace deployment:
|
||||||
|
|
||||||
- Vanilla K8s cluster
|
- K8s cluster >= 1.24, [CNCF Certified Kubernetes Distro](https://www.cncf.io/certification/software-conformance/)
|
||||||
- Domain and DNS Service
|
- Domain and DNS Service
|
||||||
- Ingress controller (supported are nginx-ingress, ingress-nginx, HAProxy)
|
- Ingress controller (supported are nginx-ingress, ingress-nginx, HAProxy)
|
||||||
- [Helm](https://helm.sh/), [HelmFile](https://helmfile.readthedocs.io/en/latest/) and
|
- [Helm](https://helm.sh/) >= v3.9.0
|
||||||
[HelmDiff](https://github.com/databus23/helm-diff)
|
- [Helmfile](https://helmfile.readthedocs.io/en/latest/) >= **v0.157.0**
|
||||||
|
- [HelmDiff](https://github.com/databus23/helm-diff) >= 3.6.0
|
||||||
- Volume provisioner supporting RWO (read-write-once)
|
- Volume provisioner supporting RWO (read-write-once)
|
||||||
- Certificate handling with [cert-manager](https://cert-manager.io/)
|
- Certificate handling with [cert-manager](https://cert-manager.io/)
|
||||||
- [Istio](https://istio.io/) is currently required to deploy and operate OX AppSuite8, we are talking to Open-Xchange and will try to get rid of this dependency.
|
- [Istio](https://istio.io/) is currently required to deploy and operate OX AppSuite8, we are talking to Open-Xchange and will try to get rid of this dependency.
|
||||||
@@ -82,8 +99,6 @@ installation.
|
|||||||
| `DOMAIN` | `souvap.cloud` | External reachable domain |
|
| `DOMAIN` | `souvap.cloud` | External reachable domain |
|
||||||
| `ISTIO_DOMAIN` | `istio.souvap.cloud` | External reachable domain for Istio Gateway |
|
| `ISTIO_DOMAIN` | `istio.souvap.cloud` | External reachable domain for Istio Gateway |
|
||||||
| `MASTER_PASSWORD` | `sovereign-workplace` | The password that seeds the autogenerated secrets |
|
| `MASTER_PASSWORD` | `sovereign-workplace` | The password that seeds the autogenerated secrets |
|
||||||
| `SMTP_PASSWORD` | | Password for SMTP relay gateway |
|
|
||||||
| `TURN_CREDENTIALS` | | Credentials for coturn server |
|
|
||||||
|
|
||||||
Please ensure that you set the DNS records pointing to the loadbalancer/IP for
|
Please ensure that you set the DNS records pointing to the loadbalancer/IP for
|
||||||
`DOMAIN` and `ISTIO_DOMAIN`.
|
`DOMAIN` and `ISTIO_DOMAIN`.
|
||||||
@@ -148,6 +163,12 @@ and wait a little. After the deployment is finished some bootstrapping is
|
|||||||
executed which might take some more minutes before you can log in your new
|
executed which might take some more minutes before you can log in your new
|
||||||
instance.
|
instance.
|
||||||
|
|
||||||
|
Deployments can be removed with:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile destroy -n <NAMESPACE>
|
||||||
|
```
|
||||||
|
|
||||||
## Offline deployment
|
## Offline deployment
|
||||||
|
|
||||||
Before executing a [local deployment](#local-deployment), you can set following
|
Before executing a [local deployment](#local-deployment), you can set following
|
||||||
@@ -195,12 +216,14 @@ subdirectory `/helmfile/apps/services`.
|
|||||||
| ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine | Eval |
|
| ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine | Eval |
|
||||||
| ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine | Eval |
|
| ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine | Eval |
|
||||||
| Collabora | `collabora.enabled` | `true` | Weboffice | Functional |
|
| Collabora | `collabora.enabled` | `true` | Weboffice | Functional |
|
||||||
|
| CryptPad | `cryptpad.enabled` | `true` | Weboffice | Functional |
|
||||||
| Dovecot | `dovecot.enabled` | `true` | Mail backend | Functional |
|
| Dovecot | `dovecot.enabled` | `true` | Mail backend | Functional |
|
||||||
| Element | `element.enabled` | `true` | Secure communications platform | Functional |
|
| Element | `element.enabled` | `true` | Secure communications platform | Functional |
|
||||||
| Intercom Service | `intercom.enabled` | `true` | Cross service data exchange | Functional |
|
| Intercom Service | `intercom.enabled` | `true` | Cross service data exchange | Functional |
|
||||||
| Jitsi | `jitsi.enabled` | `true` | Videoconferencing | Functional |
|
| Jitsi | `jitsi.enabled` | `true` | Videoconferencing | Functional |
|
||||||
| Keycloak | `keycloak.enabled` | `true` | Identity Provider | Functional |
|
| Keycloak | `keycloak.enabled` | `true` | Identity Provider | Functional |
|
||||||
| MariaDB | `mariadb.enabled` | `true` | Database | Eval |
|
| MariaDB | `mariadb.enabled` | `true` | Database | Eval |
|
||||||
|
| Memcached | `memcached.enabled` | `true` | Cache Database | Eval |
|
||||||
| Nextcloud | `nextcloud.enabled` | `true` | File share | Functional |
|
| Nextcloud | `nextcloud.enabled` | `true` | File share | Functional |
|
||||||
| OpenProject | `openproject.enabled` | `true` | Project management | Functional |
|
| OpenProject | `openproject.enabled` | `true` | Project management | Functional |
|
||||||
| OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware | Functional |
|
| OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware | Functional |
|
||||||
@@ -209,6 +232,7 @@ subdirectory `/helmfile/apps/services`.
|
|||||||
| PostgreSQL | `postgresql.enabled` | `true` | Database | Eval |
|
| PostgreSQL | `postgresql.enabled` | `true` | Database | Eval |
|
||||||
| Redis | `redis.enabled` | `true` | Cache Database | Eval |
|
| Redis | `redis.enabled` | `true` | Cache Database | Eval |
|
||||||
| Univention Corporate Server | `univentionCorporateServer.enabled` | `true` | Identity Management & Portal | Functional |
|
| Univention Corporate Server | `univentionCorporateServer.enabled` | `true` | Identity Management & Portal | Functional |
|
||||||
|
| Univention Management Stack | `univentionManagementStack.enabled` | `false` | Identity Management & Portal | Eval |
|
||||||
| XWiki | `xwiki.enabled` | `true` | Knowledgebase | Functional |
|
| XWiki | `xwiki.enabled` | `true` | Knowledgebase | Functional |
|
||||||
|
|
||||||
|
|
||||||
@@ -223,8 +247,8 @@ subdirectory `/helmfile/apps/services`.
|
|||||||
|
|
||||||
#### Databases
|
#### Databases
|
||||||
|
|
||||||
In case you don't got for a develop or evaluation environment you want to point
|
When deploying this suite to production, you need to configure the applications to use your production grade database
|
||||||
the application to your own database instances.
|
service.
|
||||||
|
|
||||||
| Component | Name | Type | Parameter | Key | Default |
|
| Component | Name | Type | Parameter | Key | Default |
|
||||||
|-------------|--------------------|------------|-----------|----------------------------------------|----------------------------|
|
|-------------|--------------------|------------|-----------|----------------------------------------|----------------------------|
|
||||||
@@ -268,33 +292,153 @@ the application to your own database instances.
|
|||||||
| | | | Username | `databases.xwiki.username` | `xwiki_user` |
|
| | | | Username | `databases.xwiki.username` | `xwiki_user` |
|
||||||
| | | | Password | `databases.xwiki.password` | |
|
| | | | Password | `databases.xwiki.password` | |
|
||||||
|
|
||||||
|
#### Cache
|
||||||
|
|
||||||
|
When deploying this suite to production, you need to configure the applications to use your production grade cache
|
||||||
|
service.
|
||||||
|
|
||||||
|
| Component | Name | Type | Parameter | Key | Default |
|
||||||
|
|------------------|------------------|-----------|-----------|------------------------------|------------------|
|
||||||
|
| Intercom Service | Intercom Service | Redis | | | |
|
||||||
|
| | | | Host | `cache.intercomService.host` | `redis-headless` |
|
||||||
|
| | | | Port | `cache.intercomService.port` | `6379` |
|
||||||
|
| Nextcloud | Nextcloud | Redis | | | |
|
||||||
|
| | | | Host | `cache.nextcloud.host` | `redis-headless` |
|
||||||
|
| | | | Port | `cache.nextcloud.port` | `6379` |
|
||||||
|
| OpenProject | OpenProject | Memcached | | | |
|
||||||
|
| | | | Host | `cache.openproject.host` | `memcached` |
|
||||||
|
| | | | Port | `cache.openproject.port` | `11211` |
|
||||||
|
|
||||||
|
|
||||||
### Scaling
|
### Scaling
|
||||||
|
|
||||||
The Replicas of components can be increased, while we still have to look in the
|
The Replicas of components can be increased, while we still have to look in the
|
||||||
actual scalability of the components (see column `Scales at least to 2`).
|
actual scalability of the components (see column `Scaling (verified)`).
|
||||||
|
|
||||||
| Component | Name | Default | Service | Scaling | Scales at least to 2 |
|
| Component | Name | Scaling (effective) | Scaling (verified) |
|
||||||
|-------------|------------------------|---------|--------------------|--------------------|----------------------|
|
|-------------|------------------------|:-------------------:|:------------------:|
|
||||||
| ClamAV | `replicas.clamav` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| ClamAV | `replicas.clamav` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.clamd` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| | `replicas.clamd` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.freshclam` | `1` | :white_check_mark: | :x: | not tested |
|
| | `replicas.freshclam` | :x: | :x: |
|
||||||
| | `replicas.icap` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| | `replicas.icap` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.milter` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| | `replicas.milter` | :white_check_mark: | :white_check_mark: |
|
||||||
| Collabora | `replicas.collabora` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| Collabora | `replicas.collabora` | :white_check_mark: | :gear: |
|
||||||
| Dovecot | `replicas.dovecot` | `1` | :white_check_mark: | :x: | not tested |
|
| CryptPad | `replicas.cryptpad` | :white_check_mark: | :gear: |
|
||||||
| Element | `replicas.element` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
| Dovecot | `replicas.dovecot` | :x: | :gear: |
|
||||||
| | `replicas.synapse` | `1` | :white_check_mark: | :x: | not tested |
|
| Element | `replicas.element` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.synapseWeb` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
| | `replicas.synapse` | :x: | :gear: |
|
||||||
| | `replicas.wellKnown` | `2` | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
| | `replicas.synapseWeb` | :white_check_mark: | :white_check_mark: |
|
||||||
| Jitsi | `replicas.jibri` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| | `replicas.wellKnown` | :white_check_mark: | :white_check_mark: |
|
||||||
| | `replicas.jicofo` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| Jitsi | `replicas.jibri` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.jitsi ` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| | `replicas.jicofo` | :white_check_mark: | :gear: |
|
||||||
| | `replicas.jvb ` | `1` | :white_check_mark: | :x: | :x: |
|
| | `replicas.jitsi ` | :white_check_mark: | :gear: |
|
||||||
| Keycloak | `replicas.keycloak` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| | `replicas.jvb ` | :x: | :x: |
|
||||||
| Nextcloud | `replicas.nextcloud` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| Keycloak | `replicas.keycloak` | :white_check_mark: | :gear: |
|
||||||
| OpenProject | `replicas.openproject` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| Nextcloud | `replicas.nextcloud` | :white_check_mark: | :gear: |
|
||||||
| Postfix | `replicas.postfix` | `1` | :white_check_mark: | :x: | not tested |
|
| OpenProject | `replicas.openproject` | :white_check_mark: | :gear: |
|
||||||
| XWiki | `replicas.xwiki` | `1` | :white_check_mark: | :white_check_mark: | not tested |
|
| Postfix | `replicas.postfix` | :x: | :gear: |
|
||||||
|
| XWiki | `replicas.xwiki` | :white_check_mark: | :gear: |
|
||||||
|
|
||||||
|
|
||||||
|
### Mail/SMTP configuration
|
||||||
|
|
||||||
|
To use the full potential of the openDesk, you need to set up a STMP Smarthost/Relay which allows to send emails from
|
||||||
|
the whole subdomain.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
smtp:
|
||||||
|
host: # your SMTP host or IP-address
|
||||||
|
username: # username/email for authentication
|
||||||
|
password: # password for authentication, or via environment variable SMTP_PASSWORD
|
||||||
|
```
|
||||||
|
|
||||||
|
### TURN configuration
|
||||||
|
|
||||||
|
Some components (Jitsi, Element) use for direct communication a TURN server.
|
||||||
|
You can configure your own TURN server with these options:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
turn:
|
||||||
|
transport: # "udp" or "tcp"
|
||||||
|
credentials: # turn credential string
|
||||||
|
server: # configuration for unsecure connections
|
||||||
|
host: # your TURN host or IP-address
|
||||||
|
port: # server port
|
||||||
|
tls: # configuration for secure connections
|
||||||
|
host: # your TURN host or IP-address
|
||||||
|
port: # server port
|
||||||
|
```
|
||||||
|
|
||||||
|
## Security
|
||||||
|
|
||||||
|
This section summarizes various aspects of security and compliance aspects.
|
||||||
|
|
||||||
|
### Kubernetes Security Enforcements
|
||||||
|
|
||||||
|
This list gives you an overview of default security settings and if they comply with security standards:
|
||||||
|
|
||||||
|
|
||||||
|
| Component | Process | = | allowPrivilegeEscalation (`false`) | capabilities (`drop: ALL`) | seccompProfile (`RuntimeDefault`) | readOnlyRootFilesystem (`true`) | runAsNonRoot (`true`) | runAsUser | runAsGroup | fsGroup |
|
||||||
|
|-------------|--------------------------|:------------------:|:----------------------------------:|:----------------------------------------------------------------------------------------------------------------------------------------------:|:---------------------------------:|:-------------------------------:|:---------------------:|:---------:|:----------:|:-------:|
|
||||||
|
| ClamAV | clamd | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| | freshclam | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| | icap | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| | milter | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||||
|
| Collabora | collabora | :x: | :x: | :x: (`CHOWN`, `DAC_OVERRIDE`, `FOWNER`, `FSETID`, `KILL`, `SETGID`, `SETUID`, `SETPCAP`, `NET_BIND_SERVICE`, `NET_RAW`, `SYS_CHROOT`, `MKNOD`) | :white_check_mark: | :x: | :white_check_mark: | 100 | 101 | 100 |
|
||||||
|
| CryptPad | cryptpad | :x: | :x: | :x: | :white_check_mark: | :x: | :x: | - | - | 4001 |
|
||||||
|
| Element | element | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||||
|
| | synapse | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 10991 | - | 10991 |
|
||||||
|
| | synapseWeb | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||||
|
| | wellKnown | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||||
|
| Jitsi | jibri | :x: | :x: | :x: (`SYS_ADMIN`) | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| | jicofo | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| | jitsiKeycloakAdapter | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1993 | 1993 | - |
|
||||||
|
| | jvb | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| | prosody | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| | web | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| Keycloak | keycloak | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||||
|
| | keycloakConfigCli | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||||
|
| | keycloakExtensionHandler | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| | keycloakExtensionProxy | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||||
|
| MariaDB | mariadb | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||||
|
| Memcached | memcached | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | - | 1001 |
|
||||||
|
| Postfix | postfix | :x: | :x: | :x: | :white_check_mark: | :x: | :x: | - | - | 101 |
|
||||||
|
| OpenProject | openproject | :x: | :white_check_mark: | :x: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||||
|
| PostgreSQL | postgresql | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||||
|
|
||||||
|
|
||||||
|
### Helm Chart Trust Chain
|
||||||
|
|
||||||
|
Helm Charts which are released via openDesk CI/CD process are always signed. The public GPG keys are present in
|
||||||
|
`pubkey.gpg` file and are validated during helmfile installation.
|
||||||
|
|
||||||
|
| Repository | OCI | Verifiable |
|
||||||
|
|--------------------------------------|:---:|:------------------:|
|
||||||
|
| bitnami-repo (openDesk build) | yes | :white_check_mark: |
|
||||||
|
| clamav-repo | yes | :white_check_mark: |
|
||||||
|
| collabora-online-repo | no | :x: |
|
||||||
|
| cryptpad-online-repo | no | :x: |
|
||||||
|
| intercom-service-repo | yes | :white_check_mark: |
|
||||||
|
| istio-resources-repo | yes | :white_check_mark: |
|
||||||
|
| jitsi-repo | yes | :white_check_mark: |
|
||||||
|
| keycloak-extensions-repo | no | :x: |
|
||||||
|
| keycloak-theme-repo | yes | :white_check_mark: |
|
||||||
|
| mariadb-repo | yes | :white_check_mark: |
|
||||||
|
| nextcloud-repo | no | :x: |
|
||||||
|
| opendesk-certificates-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-dovecot-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-element-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-keycloak-bootstrap-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-nextcloud-bootstrap-repo | yes | :white_check_mark: |
|
||||||
|
| opendesk-open-xchange-bootstrap-repo | yes | :white_check_mark: |
|
||||||
|
| openproject-repo | no | :x: |
|
||||||
|
| openxchange-repo | yes | :x: |
|
||||||
|
| ox-connector-repo | no | :x: |
|
||||||
|
| postfix-repo | yes | :white_check_mark: |
|
||||||
|
| postgresql-repo | yes | :white_check_mark: |
|
||||||
|
| univention-corporate-container-repo | yes | :white_check_mark: |
|
||||||
|
| ums-repo | no | :x: |
|
||||||
|
| xwiki-repo | no | :x: |
|
||||||
|
|
||||||
|
|
||||||
# Component integration
|
# Component integration
|
||||||
@@ -383,6 +527,7 @@ flowchart TD
|
|||||||
J[Jitsi]-->K
|
J[Jitsi]-->K
|
||||||
I[IntercomService]-->K
|
I[IntercomService]-->K
|
||||||
C[Collabora]-->N
|
C[Collabora]-->N
|
||||||
|
R[CryptPad]-->N
|
||||||
F[Postfix]-->D
|
F[Postfix]-->D
|
||||||
```
|
```
|
||||||
|
|
||||||
@@ -425,18 +570,20 @@ components we are going to cover various aspects:
|
|||||||
|
|
||||||
## Tests
|
## Tests
|
||||||
|
|
||||||
There is a frontend end-to-end test suite that can get triggered if the
|
The gitlab-ci pipeline contains a job named `run-tests` that can trigger a test suite pipeline on another gitlab project.
|
||||||
deployment is performed via a Gitlab pipeline.
|
The `DEPLOY_`-variables are used to determine which components should be tested.
|
||||||
|
In order for the trigger to work, the variable `TESTS_PROJECT_URL` has to be set on this gitlab project's CI variables
|
||||||
|
that can be found at `Settings` -> `CI/CD` -> `Variables`. The variable should have this format:
|
||||||
|
`<domain of gitlab>/api/v4/projects/<id>`.
|
||||||
|
|
||||||
Currently, the test suite is in progress to be published, so right now it is
|
If the branch of the test pipeline is not `main` this can be set with the .gitlab-ci.yml variable
|
||||||
only usable by project members. But that will change soon, and it could be used
|
`TESTS_BRANCH` while creating a new pipeline.
|
||||||
to create custom tests and perform them after deployment.
|
|
||||||
|
|
||||||
The deployment pipeline provides a variable named `TESTS_PROJECT_URL` that
|
# License
|
||||||
points to the test pipeline residing in another Gitlab repository. At the end of
|
This project uses the following license: Apache-2.0
|
||||||
the deployment the test pipeline is triggered. Tests are just performed for
|
|
||||||
components that have been deployed prior.
|
|
||||||
|
|
||||||
|
# Copyright
|
||||||
|
Copyright (C) 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
|
||||||
# Footnotes
|
# Footnotes
|
||||||
|
|
||||||
|
|||||||
@@ -9,6 +9,7 @@ helmfiles:
|
|||||||
- path: "helmfile/apps/services/helmfile.yaml"
|
- path: "helmfile/apps/services/helmfile.yaml"
|
||||||
- path: "helmfile/apps/keycloak/helmfile.yaml"
|
- path: "helmfile/apps/keycloak/helmfile.yaml"
|
||||||
- path: "helmfile/apps/univention-corporate-container/helmfile.yaml"
|
- path: "helmfile/apps/univention-corporate-container/helmfile.yaml"
|
||||||
|
- path: "helmfile/apps/univention-management-stack/helmfile.yaml"
|
||||||
- path: "helmfile/apps/keycloak-bootstrap/helmfile.yaml"
|
- path: "helmfile/apps/keycloak-bootstrap/helmfile.yaml"
|
||||||
- path: "helmfile/apps/intercom-service/helmfile.yaml"
|
- path: "helmfile/apps/intercom-service/helmfile.yaml"
|
||||||
- path: "helmfile/apps/open-xchange/helmfile.yaml"
|
- path: "helmfile/apps/open-xchange/helmfile.yaml"
|
||||||
@@ -28,16 +29,28 @@ missingFileHandler: "Error"
|
|||||||
# - Installing a single release from root via helmfile apply -f helmfile/apps/<app>/helmfile.yaml
|
# - Installing a single release from root via helmfile apply -f helmfile/apps/<app>/helmfile.yaml
|
||||||
# - Installing a single release from app directory via helmfile apply
|
# - Installing a single release from app directory via helmfile apply
|
||||||
# Issue: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/-/issues/2
|
# Issue: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/-/issues/2
|
||||||
|
|
||||||
environments:
|
environments:
|
||||||
default:
|
default:
|
||||||
values:
|
values:
|
||||||
- "helmfile/environments/default/*.gotmpl"
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
dev:
|
dev:
|
||||||
values:
|
values:
|
||||||
- "helmfile/environments/default/*.gotmpl"
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
- "helmfile/environments/dev/values.yaml"
|
- "helmfile/environments/dev/values.yaml"
|
||||||
|
- "helmfile/environments/dev/values.gotmpl"
|
||||||
|
test:
|
||||||
|
values:
|
||||||
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
|
- "helmfile/environments/test/values.yaml"
|
||||||
|
- "helmfile/environments/test/values.gotmpl"
|
||||||
prod:
|
prod:
|
||||||
values:
|
values:
|
||||||
- "helmfile/environments/default/*.gotmpl"
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
- "helmfile/environments/prod/values.yaml"
|
- "helmfile/environments/prod/values.yaml"
|
||||||
|
- "helmfile/environments/prod/values.gotmpl"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,7 +1,13 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# Collabora Online
|
||||||
|
# Source: https://github.com/CollaboraOnline/online
|
||||||
- name: "collabora-online-repo"
|
- name: "collabora-online-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
@@ -14,12 +20,9 @@ releases:
|
|||||||
values:
|
values:
|
||||||
- "values.yaml"
|
- "values.yaml"
|
||||||
- "values.gotmpl"
|
- "values.gotmpl"
|
||||||
condition: "collabora.enabled"
|
installed: {{ .Values.collabora.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "collabora"
|
component: "collabora"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -6,6 +6,7 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.collabora.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.collabora.repository }}"
|
||||||
tag: "{{ .Values.images.collabora.tag }}"
|
tag: "{{ .Values.images.collabora.tag }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
@@ -28,18 +29,13 @@ ingress:
|
|||||||
collabora:
|
collabora:
|
||||||
# Admin Console Credentials: https://CODE-domain/browser/dist/admin/admin.html
|
# Admin Console Credentials: https://CODE-domain/browser/dist/admin/admin.html
|
||||||
username: "collabora-internal-admin"
|
username: "collabora-internal-admin"
|
||||||
password: {{ .Values.secrets.collabora.adminPassword }}
|
password: {{ .Values.secrets.collabora.adminPassword | quote }}
|
||||||
aliasgroups:
|
aliasgroups:
|
||||||
- host: "https://{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}:443"
|
- host: "https://{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}:443"
|
||||||
|
|
||||||
{{- if not (eq .Values.cluster.container.engine "containerd") }}
|
|
||||||
# In case of issues with "Failed to exec command '/usr/bin/loolforkit' (EPERM: Operation not permitted)...", activate:
|
|
||||||
# Ref.: https://github.com/CollaboraOnline/online/issues/2800
|
|
||||||
securityContext:
|
|
||||||
capabilities:
|
|
||||||
add:
|
|
||||||
- "MKNOD"
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.collabora }}
|
replicaCount: {{ .Values.replicas.collabora }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.collabora | toYaml | nindent 2 }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -14,19 +14,74 @@ collabora:
|
|||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
annotations:
|
annotations:
|
||||||
# nginx
|
# Ingress NGINX
|
||||||
nginx.ingress.kubernetes.io/upstream-hash-by: "$arg_WOPISrc"
|
nginx.ingress.kubernetes.io/upstream-hash-by: "$arg_WOPISrc"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-body-size: "0"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-read-timeout: "600"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-send-timeout: "600"
|
||||||
|
nginx.ingress.kubernetes.io/server-snippet: |
|
||||||
|
# block admin and metrics endpoint from outside by default
|
||||||
|
location /cool/getMetrics { deny all; return 403; }
|
||||||
|
location /cool/adminws/ { deny all; return 403; }
|
||||||
|
location /browser/dist/admin/admin.html { deny all; return 403; }
|
||||||
|
# NGINX
|
||||||
|
nginx.org/websocket-services: "collabora"
|
||||||
|
nginx.org/lb-method: "hash $arg_WOPISrc consistent"
|
||||||
|
nginx.org/proxy-read-timeout: "600"
|
||||||
|
nginx.org/proxy-send-timeout: "600"
|
||||||
|
nginx.org/client-max-body-size: "0"
|
||||||
|
nginx.org/server-snippets: |
|
||||||
|
# block admin and metrics endpoint from outside by default
|
||||||
|
location /cool/getMetrics { deny all; return 403; }
|
||||||
|
location /cool/adminws/ { deny all; return 403; }
|
||||||
|
location /browser/dist/admin/admin.html { deny all; return 403; }
|
||||||
# HAProxy
|
# HAProxy
|
||||||
haproxy.org/timeout-tunnel: "3600s"
|
haproxy.org/timeout-tunnel: "3600s"
|
||||||
haproxy.org/backend-config-snippet: |
|
haproxy.org/backend-config-snippet: |
|
||||||
mode http
|
balance url_param WOPISrc check_post
|
||||||
balance leastconn
|
hash-type consistent
|
||||||
stick-table type string len 2048 size 1k store conn_cur
|
# HAProxy - Community: https://haproxy-ingress.github.io/
|
||||||
http-request set-var(txn.wopisrcconns) url_param(WOPISrc),table_conn_cur()
|
haproxy-ingress.github.io/timeout-tunnel: "3600s"
|
||||||
http-request track-sc1 url_param(WOPISrc)
|
haproxy-ingress.github.io/balance-algorithm: "url_param WOPISrc check_post"
|
||||||
stick match url_param(WOPISrc) if { var(txn.wopisrcconns) -m int gt 0 }
|
haproxy-ingress.github.io/config-backend: |
|
||||||
stick store-request url_param(WOPISrc)
|
hash-type consistent
|
||||||
|
# block admin urls from outside
|
||||||
|
acl admin_url path_beg /cool/getMetrics
|
||||||
|
acl admin_url path_beg /cool/adminws/
|
||||||
|
acl admin_url path_beg /browser/dist/admin/admin.html
|
||||||
|
http-request deny if admin_url
|
||||||
autoscaling:
|
autoscaling:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
serviceAccount:
|
||||||
|
create: true
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
add:
|
||||||
|
- "CHOWN"
|
||||||
|
- "DAC_OVERRIDE"
|
||||||
|
- "FOWNER"
|
||||||
|
- "FSETID"
|
||||||
|
- "KILL"
|
||||||
|
- "SETGID"
|
||||||
|
- "SETUID"
|
||||||
|
- "SETPCAP"
|
||||||
|
- "NET_BIND_SERVICE"
|
||||||
|
- "NET_RAW"
|
||||||
|
- "SYS_CHROOT"
|
||||||
|
- "MKNOD"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 100
|
||||||
...
|
...
|
||||||
|
|||||||
28
helmfile/apps/cryptpad/helmfile.yaml
Normal file
28
helmfile/apps/cryptpad/helmfile.yaml
Normal file
@@ -0,0 +1,28 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
|
---
|
||||||
|
repositories:
|
||||||
|
# CryptPad
|
||||||
|
# Source: https://github.com/cryptpad/helm
|
||||||
|
- name: "cryptpad-online-repo"
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
|
default "https://cryptpad.github.io/helm" }}
|
||||||
|
|
||||||
|
releases:
|
||||||
|
- name: "cryptpad"
|
||||||
|
chart: "cryptpad-online-repo/cryptpad"
|
||||||
|
version: "0.0.13"
|
||||||
|
values:
|
||||||
|
- "values.yaml"
|
||||||
|
- "values.gotmpl"
|
||||||
|
installed: {{ .Values.cryptpad.enabled }}
|
||||||
|
|
||||||
|
commonLabels:
|
||||||
|
deploy-stage: "component-1"
|
||||||
|
component: "cryptpad"
|
||||||
|
...
|
||||||
33
helmfile/apps/cryptpad/values.gotmpl
Normal file
33
helmfile/apps/cryptpad/values.gotmpl
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.cryptpad.repository }}"
|
||||||
|
tag: {{ .Values.images.cryptpad.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
className: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
hosts:
|
||||||
|
- host: "{{ .Values.global.hosts.cryptpad }}.{{ .Values.global.domain }}"
|
||||||
|
paths:
|
||||||
|
- path: "/"
|
||||||
|
pathType: "ImplementationSpecific"
|
||||||
|
tls:
|
||||||
|
- secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
hosts:
|
||||||
|
- "{{ .Values.global.hosts.cryptpad }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.cryptpad }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.cryptpad | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
45
helmfile/apps/cryptpad/values.yaml
Normal file
45
helmfile/apps/cryptpad/values.yaml
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
# https://github.com/cryptpad/helm/blob/main/charts/cryptpad/README.md or
|
||||||
|
# https://github.com/cryptpad/helm/blob/main/charts/cryptpad/values.yaml
|
||||||
|
|
||||||
|
# Disable registration and access to unregistered users:
|
||||||
|
# (https://docs.cryptpad.org/en/admin_guide/customization.html#application-config)
|
||||||
|
|
||||||
|
application_config:
|
||||||
|
availablePadTypes:
|
||||||
|
- "diagram"
|
||||||
|
|
||||||
|
# Deactivating public access breaks nextcloud plugin!
|
||||||
|
# registeredOnlyTypes:
|
||||||
|
# - "diagram"
|
||||||
|
|
||||||
|
autoscaling:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
enableEmbedding: true
|
||||||
|
|
||||||
|
fullnameOverride: "cryptpad"
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 4001
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
# capabilities:
|
||||||
|
# drop:
|
||||||
|
# - ALL
|
||||||
|
# readOnlyRootFilesystem: true
|
||||||
|
# runAsNonRoot: true
|
||||||
|
# runAsUser: 1000
|
||||||
|
|
||||||
|
serviceAccount:
|
||||||
|
create: true
|
||||||
|
|
||||||
|
workloadStateful: false
|
||||||
|
...
|
||||||
@@ -1,45 +1,136 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "sovereign-workplace-element-repo"
|
# openDesk Element
|
||||||
|
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/sovereign-workplace-element
|
||||||
|
- name: "opendesk-element-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/148/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-element" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
|
# openDesk Matrix Widgets
|
||||||
|
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/opendesk-matrix-widgets
|
||||||
|
- name: "opendesk-matrix-widgets-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/opendesk-matrix-widgets" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "sovereign-workplace-element"
|
- name: "opendesk-element"
|
||||||
chart: "sovereign-workplace-element-repo/sovereign-workplace-element"
|
chart: "opendesk-element-repo/opendesk-element"
|
||||||
version: "1.1.2"
|
version: "2.5.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-element.yaml"
|
||||||
- "values-element.gotmpl"
|
- "values-element.gotmpl"
|
||||||
condition: "element.enabled"
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
- name: "sovereign-workplace-well-known"
|
- name: "opendesk-well-known"
|
||||||
chart: "sovereign-workplace-element-repo/sovereign-workplace-well-known"
|
chart: "opendesk-element-repo/opendesk-well-known"
|
||||||
version: "1.1.2"
|
version: "2.5.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-well-known.yaml"
|
||||||
- "values-well-known.gotmpl"
|
- "values-well-known.gotmpl"
|
||||||
condition: "element.enabled"
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
- name: "sovereign-workplace-synapse-web"
|
- name: "opendesk-synapse-web"
|
||||||
chart: "sovereign-workplace-element-repo/sovereign-workplace-synapse-web"
|
chart: "opendesk-element-repo/opendesk-synapse-web"
|
||||||
version: "1.1.2"
|
version: "2.5.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-synapse-web.yaml"
|
||||||
- "values-synapse-web.gotmpl"
|
- "values-synapse-web.gotmpl"
|
||||||
condition: "element.enabled"
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
- name: "sovereign-workplace-synapse"
|
- name: "opendesk-synapse"
|
||||||
chart: "sovereign-workplace-element-repo/sovereign-workplace-synapse"
|
chart: "opendesk-element-repo/opendesk-synapse"
|
||||||
version: "1.1.2"
|
version: "2.5.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-synapse.yaml"
|
||||||
- "values-synapse.gotmpl"
|
- "values-synapse.gotmpl"
|
||||||
condition: "element.enabled"
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "opendesk-matrix-user-verification-service-bootstrap"
|
||||||
|
chart: "opendesk-element-repo/opendesk-synapse-create-account"
|
||||||
|
version: "2.5.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-user-verification-service-bootstrap.yaml"
|
||||||
|
- "values-matrix-user-verification-service-bootstrap.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "opendesk-matrix-user-verification-service"
|
||||||
|
chart: "opendesk-element-repo/opendesk-matrix-user-verification-service"
|
||||||
|
version: "2.5.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-user-verification-service.yaml"
|
||||||
|
- "values-matrix-user-verification-service.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neoboard-widget"
|
||||||
|
chart: "opendesk-matrix-widgets-repo/matrix-neoboard-widget"
|
||||||
|
version: "3.1.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neoboard-widget.yaml"
|
||||||
|
- "values-matrix-neoboard-widget.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neochoice-widget"
|
||||||
|
chart: "opendesk-matrix-widgets-repo/matrix-neochoice-widget"
|
||||||
|
version: "3.1.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neochoice-widget.yaml"
|
||||||
|
- "values-matrix-neochoice-widget.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neodatefix-widget"
|
||||||
|
chart: "opendesk-matrix-widgets-repo/matrix-neodatefix-widget"
|
||||||
|
version: "3.1.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-widget.yaml"
|
||||||
|
- "values-matrix-neodatefix-widget.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neodatefix-bot-bootstrap"
|
||||||
|
chart: "opendesk-element-repo/opendesk-synapse-create-account"
|
||||||
|
version: "2.5.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-bot-bootstrap.yaml"
|
||||||
|
- "values-matrix-neodatefix-bot-bootstrap.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neodatefix-bot"
|
||||||
|
chart: "opendesk-matrix-widgets-repo/matrix-neodatefix-bot"
|
||||||
|
version: "3.1.0"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-bot.yaml"
|
||||||
|
- "values-matrix-neodatefix-bot.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "element"
|
component: "element"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -11,7 +11,99 @@ global:
|
|||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
additionalConfiguration:
|
||||||
|
logout_redirect_url: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/logout?client_id=matrix&post_logout_redirect_uri=https%3A%2F%2F{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
"net.nordeck.element_web.module.opendesk":
|
||||||
|
config:
|
||||||
|
ics_navigation_json_url: "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/navigation.json"
|
||||||
|
ics_silent_url: "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/silent"
|
||||||
|
portal_logo_svg_url: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/univention/portal/icons/logos/domain.svg"
|
||||||
|
portal_url: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/"
|
||||||
|
custom_css_variables:
|
||||||
|
--cpd-color-text-action-accent: {{ .Values.theme.colors.primary | quote }}
|
||||||
|
|
||||||
|
"net.nordeck.element_web.module.widget_lifecycle":
|
||||||
|
widget_permissions:
|
||||||
|
"https://{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}/jitsi.html":
|
||||||
|
identity_approved: true
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoBoardWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.chunk
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.chunk
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.snapshot
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.snapshot
|
||||||
|
- org.matrix.msc2762.send.state_event:m.room.power_levels#
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels#
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.whiteboard
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.whiteboard
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.whiteboard.sessions#*
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.whiteboard.sessions
|
||||||
|
- org.matrix.msc3819.send.to_device:net.nordeck.whiteboard.connection_signaling
|
||||||
|
- org.matrix.msc3819.receive.to_device:net.nordeck.whiteboard.connection_signaling
|
||||||
|
- town.robin.msc3846.turn_servers
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoChoiceWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.poll.vote
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.poll.vote
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll.settings
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll.settings
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll.group
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll.group
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.poll.start
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.poll.start
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoDateFixWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
identity_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2931.navigate
|
||||||
|
- org.matrix.msc2762.timeline:*
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels
|
||||||
|
- org.matrix.msc2762.receive.event:m.reaction
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.create
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.tombstone
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.send.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.topic
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.space.parent
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.space.child
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.meetings.metadata
|
||||||
|
- org.matrix.msc2762.receive.state_event:im.vector.modular.widgets
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.breakoutsessions.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.breakoutsessions.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.close
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.close
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.widgets.handle
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.widgets.handle
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.participants.handle
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.participants.handle
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.update
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.update
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.change.message_permissions
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.change.message_permissions
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.sub_meetings.send_message
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.sub_meetings.send_message
|
||||||
|
- org.matrix.msc3973.user_directory_search
|
||||||
|
|
||||||
|
welcomeUserId: "@meetings-bot:{{ .Values.global.domain }}"
|
||||||
|
|
||||||
image:
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.element.repository }}"
|
repository: "{{ .Values.images.element.repository }}"
|
||||||
tag: "{{ .Values.images.element.tag }}"
|
tag: "{{ .Values.images.element.tag }}"
|
||||||
@@ -24,6 +116,9 @@ ingress:
|
|||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
enabled: "{{ .Values.ingress.tls.enabled }}"
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.element }}
|
replicaCount: {{ .Values.replicas.element }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
|
|||||||
21
helmfile/apps/element/values-element.yaml
Normal file
21
helmfile/apps/element/values-element.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
33
helmfile/apps/element/values-matrix-neoboard-widget.gotmpl
Normal file
33
helmfile/apps/element/values-matrix-neoboard-widget.gotmpl
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: "{{ .Values.global.domain }}"
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
repository: "{{ .Values.images.matrixNeoBoardWidget.repository }}"
|
||||||
|
tag: "{{ .Values.images.matrixNeoBoardWidget.tag }}"
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: "{{ .Values.ingress.enabled }}"
|
||||||
|
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
||||||
|
tls:
|
||||||
|
enabled: "{{ .Values.ingress.tls.enabled }}"
|
||||||
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoBoardWidget }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoBoardWidget | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
21
helmfile/apps/element/values-matrix-neoboard-widget.yaml
Normal file
21
helmfile/apps/element/values-matrix-neoboard-widget.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
33
helmfile/apps/element/values-matrix-neochoice-widget.gotmpl
Normal file
33
helmfile/apps/element/values-matrix-neochoice-widget.gotmpl
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: "{{ .Values.global.domain }}"
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
repository: "{{ .Values.images.matrixNeoChoiceWidget.repository }}"
|
||||||
|
tag: "{{ .Values.images.matrixNeoChoiceWidget.tag }}"
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: "{{ .Values.ingress.enabled }}"
|
||||||
|
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
||||||
|
tls:
|
||||||
|
enabled: "{{ .Values.ingress.tls.enabled }}"
|
||||||
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoChoiceWidget }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoChoiceWidget | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
21
helmfile/apps/element/values-matrix-neochoice-widget.yaml
Normal file
21
helmfile/apps/element/values-matrix-neochoice-widget.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
password: {{ .Values.secrets.matrixNeoDateFixBot.password | quote }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
url: "{{ .Values.images.synapseCreateUser.repository }}"
|
||||||
|
tag: "{{ .Values.images.synapseCreateUser.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
...
|
||||||
@@ -0,0 +1,8 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
username: "meetings-bot"
|
||||||
|
pod: "opendesk-synapse-0"
|
||||||
|
secretName: "matrix-neodatefix-bot-account"
|
||||||
|
...
|
||||||
37
helmfile/apps/element/values-matrix-neodatefix-bot.gotmpl
Normal file
37
helmfile/apps/element/values-matrix-neodatefix-bot.gotmpl
Normal file
@@ -0,0 +1,37 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: "{{ .Values.global.domain }}"
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
openxchangeBaseUrl: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
repository: "{{ .Values.images.matrixNeoDateFixBot.repository }}"
|
||||||
|
tag: "{{ .Values.images.matrixNeoDateFixBot.tag }}"
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: "{{ .Values.ingress.enabled }}"
|
||||||
|
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
||||||
|
tls:
|
||||||
|
enabled: "{{ .Values.ingress.tls.enabled }}"
|
||||||
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
size: "{{ .Values.persistence.size.matrixNeoDateFixBot }}"
|
||||||
|
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoDateFixBot }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoDateFixBot | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
50
helmfile/apps/element/values-matrix-neodatefix-bot.yaml
Normal file
50
helmfile/apps/element/values-matrix-neodatefix-bot.yaml
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
bot:
|
||||||
|
username: "meetings-bot"
|
||||||
|
displayname: "Terminplaner Bot"
|
||||||
|
|
||||||
|
strings:
|
||||||
|
breakoutSessionWidgetName: "Breakoutsessions"
|
||||||
|
calendarRoomName: "Terminplaner"
|
||||||
|
calendarWidgetName: "Terminplaner"
|
||||||
|
cockpitWidgetName: "Meeting Steuerung"
|
||||||
|
jitsiWidgetName: "Videokonferenz"
|
||||||
|
matrixNeoBoardWidgetName: "Whiteboard"
|
||||||
|
matrixNeoChoiceWidgetName: "Abstimmungen"
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
extraEnvVars:
|
||||||
|
- name: "ACCESS_TOKEN"
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: "matrix-neodatefix-bot-account"
|
||||||
|
key: "access_token"
|
||||||
|
|
||||||
|
# TODO: The health endpoint does not work with the haproxy configuration, yet
|
||||||
|
livenessProbe:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
# TODO: The health endpoint does not work with the haproxy configuration, yet
|
||||||
|
readinessProbe:
|
||||||
|
enabled: false
|
||||||
|
...
|
||||||
33
helmfile/apps/element/values-matrix-neodatefix-widget.gotmpl
Normal file
33
helmfile/apps/element/values-matrix-neodatefix-widget.gotmpl
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: "{{ .Values.global.domain }}"
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
repository: "{{ .Values.images.matrixNeoDateFixWidget.repository }}"
|
||||||
|
tag: "{{ .Values.images.matrixNeoDateFixWidget.tag }}"
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: "{{ .Values.ingress.enabled }}"
|
||||||
|
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
||||||
|
tls:
|
||||||
|
enabled: "{{ .Values.ingress.tls.enabled }}"
|
||||||
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoDateFixWidget }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoDateFixWidget | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
25
helmfile/apps/element/values-matrix-neodatefix-widget.yaml
Normal file
25
helmfile/apps/element/values-matrix-neodatefix-widget.yaml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
bot:
|
||||||
|
username: "meetings-bot"
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
password: {{ .Values.secrets.matrixUserVerificationService.password }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
url: "{{ .Values.images.synapseCreateUser.repository }}"
|
||||||
|
tag: "{{ .Values.images.synapseCreateUser.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
...
|
||||||
@@ -0,0 +1,8 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
username: "uvs"
|
||||||
|
pod: "opendesk-synapse-0"
|
||||||
|
secretName: "opendesk-matrix-user-verification-service-account"
|
||||||
|
...
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: "{{ .Values.global.domain }}"
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
repository: "{{ .Values.images.matrixUserVerificationService.repository }}"
|
||||||
|
tag: "{{ .Values.images.matrixUserVerificationService.tag }}"
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixUserVerificationService }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixUserVerificationService | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,29 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
# TODO: the service can't run with read only filesystem or as non-root
|
||||||
|
# readOnlyRootFilesystem: true
|
||||||
|
# runAsGroup: 101
|
||||||
|
# runAsNonRoot: true
|
||||||
|
# runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
extraEnvVars:
|
||||||
|
- name: "UVS_ACCESS_TOKEN"
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: "opendesk-matrix-user-verification-service-account"
|
||||||
|
key: "access_token"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -12,6 +12,7 @@ global:
|
|||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.synapseWeb.repository }}"
|
repository: "{{ .Values.images.synapseWeb.repository }}"
|
||||||
tag: "{{ .Values.images.synapseWeb.tag }}"
|
tag: "{{ .Values.images.synapseWeb.tag }}"
|
||||||
|
|||||||
21
helmfile/apps/element/values-synapse-web.yaml
Normal file
21
helmfile/apps/element/values-synapse-web.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -12,6 +12,7 @@ global:
|
|||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.synapse.repository }}"
|
repository: "{{ .Values.images.synapse.repository }}"
|
||||||
tag: "{{ .Values.images.synapse.tag }}"
|
tag: "{{ .Values.images.synapse.tag }}"
|
||||||
@@ -21,9 +22,20 @@ configuration:
|
|||||||
host: "{{ .Values.databases.synapse.host }}"
|
host: "{{ .Values.databases.synapse.host }}"
|
||||||
name: "{{ .Values.databases.synapse.name }}"
|
name: "{{ .Values.databases.synapse.name }}"
|
||||||
user: "{{ .Values.databases.synapse.username }}"
|
user: "{{ .Values.databases.synapse.username }}"
|
||||||
password: "{{ .Values.databases.synapse.password | default .Values.secrets.postgresql.matrixUser }}"
|
password: {{ .Values.databases.synapse.password | default .Values.secrets.postgresql.matrixUser | quote }}
|
||||||
|
|
||||||
homeserver:
|
homeserver:
|
||||||
|
appServiceConfigs:
|
||||||
|
- as_token: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
|
hs_token: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
|
id: intercom-service
|
||||||
|
namespaces:
|
||||||
|
users:
|
||||||
|
- exclusive: false
|
||||||
|
regex: "@.*"
|
||||||
|
url: null
|
||||||
|
sender_localpart: intercom-service
|
||||||
|
|
||||||
oidc:
|
oidc:
|
||||||
clientSecret: {{ .Values.secrets.keycloak.clientSecret.matrix }}
|
clientSecret: {{ .Values.secrets.keycloak.clientSecret.matrix }}
|
||||||
issuer: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
issuer: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
||||||
@@ -41,6 +53,13 @@ configuration:
|
|||||||
transport: {{ .Values.turn.transport }}
|
transport: {{ .Values.turn.transport }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
|
guestModule:
|
||||||
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.synapseGuestModule.repository }}"
|
||||||
|
tag: "{{ .Values.images.synapseGuestModule.tag }}"
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
size: "{{ .Values.persistence.size.synapse }}"
|
size: "{{ .Values.persistence.size.synapse }}"
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
||||||
|
|||||||
35
helmfile/apps/element/values-synapse.yaml
Normal file
35
helmfile/apps/element/values-synapse.yaml
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
additionalConfiguration:
|
||||||
|
user_directory:
|
||||||
|
enabled: true
|
||||||
|
search_all_users: true
|
||||||
|
room_prejoin_state:
|
||||||
|
additional_event_types:
|
||||||
|
- "m.space.parent"
|
||||||
|
- "net.nordeck.meetings.metadata"
|
||||||
|
- "m.room.power_levels"
|
||||||
|
|
||||||
|
homeserver:
|
||||||
|
guestModule:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 10991
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 10991
|
||||||
|
...
|
||||||
@@ -12,6 +12,7 @@ global:
|
|||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.wellKnown.repository }}"
|
repository: "{{ .Values.images.wellKnown.repository }}"
|
||||||
tag: "{{ .Values.images.wellKnown.tag }}"
|
tag: "{{ .Values.images.wellKnown.tag }}"
|
||||||
|
|||||||
25
helmfile/apps/element/values-well-known.yaml
Normal file
25
helmfile/apps/element/values-well-known.yaml
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
e2ee:
|
||||||
|
forceDisable: true
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
...
|
||||||
@@ -1,25 +1,30 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# Intercom Service
|
||||||
|
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/intercom-service
|
||||||
- name: "intercom-service-repo"
|
- name: "intercom-service-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/66/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/intercom-service" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "intercom-service"
|
- name: "intercom-service"
|
||||||
chart: "intercom-service-repo/intercom-service"
|
chart: "intercom-service-repo/intercom-service"
|
||||||
version: "1.1.3"
|
version: "2.0.0"
|
||||||
values:
|
values:
|
||||||
- "values.yaml"
|
|
||||||
- "values.gotmpl"
|
- "values.gotmpl"
|
||||||
condition: "intercom.enabled"
|
installed: {{ .Values.intercom.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "intercom-service"
|
component: "intercom-service"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,6 +4,7 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: "{{ .Values.global.domain }}"
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
@@ -13,23 +14,28 @@ global:
|
|||||||
ics:
|
ics:
|
||||||
secret: {{ .Values.secrets.intercom.secret }}
|
secret: {{ .Values.secrets.intercom.secret }}
|
||||||
issuerBaseUrl: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
issuerBaseUrl: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
||||||
originRegex: "{{ .Values.istio.domain }}"
|
originRegex: "{{ .Values.istio.domain }}|{{ .Values.global.domain }}"
|
||||||
default:
|
default:
|
||||||
domain: "{{ .Values.global.domain }}"
|
domain: "{{ .Values.global.domain }}"
|
||||||
oidc:
|
oidc:
|
||||||
secret: {{ .Values.secrets.keycloak.clientSecret.intercom }}
|
secret: {{ .Values.secrets.keycloak.clientSecret.intercom }}
|
||||||
matrix:
|
matrix:
|
||||||
asSecret: {{ .Values.secrets.jitsi.synapseAsToken }}
|
asSecret: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
serverName: "matrix.{{ .Values.global.domain }}"
|
subdomain: {{ .Values.global.hosts.synapse }}
|
||||||
|
serverName: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
|
||||||
|
nordeck:
|
||||||
|
subdomain: {{ .Values.global.hosts.matrixNeoDateFixBot }}
|
||||||
portal:
|
portal:
|
||||||
apiKey: {{ .Values.secrets.centralnavigation.apiKey }}
|
apiKey: {{ .Values.secrets.centralnavigation.apiKey }}
|
||||||
redis:
|
redis:
|
||||||
password: {{ .Values.secrets.redis.password }}
|
host: {{ .Values.cache.intercomService.host }}
|
||||||
|
port: {{ .Values.cache.intercomService.port }}
|
||||||
|
password: {{ .Values.cache.intercomService.password | default .Values.secrets.redis.password | quote }}
|
||||||
openxchange:
|
openxchange:
|
||||||
url: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
url: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
repository: "{{ .Values.images.intercom.repository }}"
|
repository: "{{ .Values.images.intercom.repository }}"
|
||||||
tag: "{{ .Values.images.intercom.tag }}"
|
tag: "{{ .Values.images.intercom.tag }}"
|
||||||
|
|
||||||
|
|||||||
@@ -1,24 +1,31 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# openDesk Jitsi
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-jitsi
|
||||||
- name: "jitsi-repo"
|
- name: "jitsi-repo"
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-jitsi" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-jitsi" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "jitsi"
|
- name: "jitsi"
|
||||||
chart: "jitsi-repo/sovereign-workplace-jitsi"
|
chart: "jitsi-repo/sovereign-workplace-jitsi"
|
||||||
version: "1.3.0"
|
version: "1.7.1"
|
||||||
values:
|
values:
|
||||||
- "values-jitsi.gotmpl"
|
- "values-jitsi.gotmpl"
|
||||||
condition: "jitsi.enabled"
|
installed: {{ .Values.jitsi.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "jitsi"
|
component: "jitsi"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -11,7 +11,11 @@ global:
|
|||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.jitsiKeycloakAdapter.repository }}"
|
repository: "{{ .Values.images.jitsiKeycloakAdapter.repository }}"
|
||||||
tag: "{{ .Values.images.jitsiKeycloakAdapter.tag }}"
|
tag: "{{ .Values.images.jitsiKeycloakAdapter.tag }}"
|
||||||
@@ -59,6 +63,10 @@ jitsi:
|
|||||||
value: "myappid"
|
value: "myappid"
|
||||||
- name: "JWT_APP_SECRET"
|
- name: "JWT_APP_SECRET"
|
||||||
value: "{{ .Values.secrets.jitsi.jwtAppSecret }}"
|
value: "{{ .Values.secrets.jitsi.jwtAppSecret }}"
|
||||||
|
- name: "MATRIX_UVS_SYNC_POWER_LEVELS"
|
||||||
|
value: "true"
|
||||||
|
- name: "MATRIX_UVS_URL"
|
||||||
|
value: "http://opendesk-matrix-user-verification-service.{{ .Release.Namespace }}.svc.{{ .Values.cluster.networking.domain }}"
|
||||||
- name: TURNS_HOST
|
- name: TURNS_HOST
|
||||||
value: "{{ .Values.turn.tls.host }}"
|
value: "{{ .Values.turn.tls.host }}"
|
||||||
- name: TURNS_PORT
|
- name: TURNS_PORT
|
||||||
@@ -82,7 +90,7 @@ jitsi:
|
|||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jicofo.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jicofo.repository }}"
|
||||||
tag: "{{ .Values.images.jicofo.tag }}"
|
tag: "{{ .Values.images.jicofo.tag }}"
|
||||||
xmpp:
|
xmpp:
|
||||||
password: "{{ .Values.secrets.jitsi.jicofoAuthPassword }}"
|
password: {{ .Values.secrets.jitsi.jicofoAuthPassword | quote }}
|
||||||
componentSecret: "{{ .Values.secrets.jitsi.jicofoComponentPassword }}"
|
componentSecret: "{{ .Values.secrets.jitsi.jicofoComponentPassword }}"
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.jicofo | toYaml | nindent 6 }}
|
{{ .Values.resources.jicofo | toYaml | nindent 6 }}
|
||||||
@@ -118,6 +126,7 @@ patchJVB:
|
|||||||
staticLoadbalancerIP: "{{ .Values.cluster.networking.ingressGatewayIP }}"
|
staticLoadbalancerIP: "{{ .Values.cluster.networking.ingressGatewayIP }}"
|
||||||
loadbalancerStatusField: "{{ .Values.cluster.networking.loadBalancerStatusField }}"
|
loadbalancerStatusField: "{{ .Values.cluster.networking.loadBalancerStatusField }}"
|
||||||
image:
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.jitsiPatchJVB.repository }}"
|
repository: "{{ .Values.images.jitsiPatchJVB.repository }}"
|
||||||
tag: "{{ .Values.images.jitsiPatchJVB.tag }}"
|
tag: "{{ .Values.images.jitsiPatchJVB.tag }}"
|
||||||
|
|||||||
@@ -1,27 +1,35 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "sovereign-workplace-keycloak-bootstrap-repo"
|
# openDesk Keycloak Bootstrap
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-keycloak-bootstrap
|
||||||
|
- name: "opendesk-keycloak-bootstrap-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/138/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-keycloak-bootstrap" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "sovereign-workplace-keycloak-bootstrap"
|
- name: "opendesk-keycloak-bootstrap"
|
||||||
chart: "sovereign-workplace-keycloak-bootstrap-repo/sovereign-workplace-keycloak-bootstrap"
|
chart: "opendesk-keycloak-bootstrap-repo/sovereign-workplace-keycloak-bootstrap"
|
||||||
version: "1.1.11"
|
version: "1.1.11"
|
||||||
values:
|
values:
|
||||||
- "values-bootstrap.gotmpl"
|
- "values-bootstrap.gotmpl"
|
||||||
- "values-bootstrap.yaml"
|
- "values-bootstrap.yaml"
|
||||||
condition: "keycloak.enabled"
|
installed: {{ .Values.keycloak.enabled }}
|
||||||
# as we have seen some slow clusters we want to ensure we not just fail due to a timeout.
|
# as we have seen some slow clusters we want to ensure we not just fail due to a timeout.
|
||||||
timeout: 1800
|
timeout: 1800
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "keycloak-bootstrap"
|
component: "keycloak-bootstrap"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -11,14 +11,19 @@ global:
|
|||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
keepPVCOnDelete: {{ .Values.cleanup.keepPVCOnDelete }}
|
||||||
|
|
||||||
config:
|
config:
|
||||||
administrator:
|
administrator:
|
||||||
password: "{{ .Values.secrets.keycloak.adminPassword }}"
|
password: {{ .Values.secrets.keycloak.adminPassword | quote }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.keycloakBootstrap.repository }}"
|
repository: "{{ .Values.images.keycloakBootstrap.repository }}"
|
||||||
tag: "{{ .Values.images.keycloakBootstrap.tag }}"
|
tag: "{{ .Values.images.keycloakBootstrap.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.keycloakBootstrap | toYaml | nindent 2 }}
|
{{ .Values.resources.keycloakBootstrap | toYaml | nindent 2 }}
|
||||||
|
|||||||
@@ -4,7 +4,4 @@
|
|||||||
config:
|
config:
|
||||||
administrator:
|
administrator:
|
||||||
username: "kcadmin"
|
username: "kcadmin"
|
||||||
|
|
||||||
cleanup:
|
|
||||||
deletePodsOnSuccess: true
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,16 +1,30 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# VMWare Bitnami
|
||||||
|
# Source: https://github.com/bitnami/charts/
|
||||||
- name: "bitnami-repo"
|
- name: "bitnami-repo"
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "registry-1.docker.io/bitnamicharts" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/bitnami-charts" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Keycloak Theme
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-keycloak-theme
|
||||||
- name: "keycloak-theme-repo"
|
- name: "keycloak-theme-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/96/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/keycloak-theme" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Keycloak Extensions
|
||||||
- name: "keycloak-extensions-repo"
|
- name: "keycloak-extensions-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
@@ -18,20 +32,20 @@ repositories:
|
|||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "keycloak-theme"
|
- name: "keycloak-theme"
|
||||||
chart: "keycloak-theme-repo/sovereign-workplace-theme"
|
chart: "keycloak-theme-repo/opendesk-keycloak-theme"
|
||||||
version: "1.1.0"
|
version: "2.0.0"
|
||||||
values:
|
values:
|
||||||
- "values-theme.gotmpl"
|
- "values-theme.gotmpl"
|
||||||
condition: "keycloak.enabled"
|
installed: {{ .Values.keycloak.enabled }}
|
||||||
- name: "keycloak"
|
- name: "keycloak"
|
||||||
chart: "bitnami-repo/keycloak"
|
chart: "bitnami-repo/keycloak"
|
||||||
version: "12.2.0"
|
version: "12.1.5"
|
||||||
values:
|
values:
|
||||||
- "values-keycloak.gotmpl"
|
- "values-keycloak.gotmpl"
|
||||||
- "values-keycloak.yaml"
|
- "values-keycloak.yaml"
|
||||||
- "values-keycloak-idp.yaml"
|
- "values-keycloak-idp.yaml"
|
||||||
wait: true
|
wait: true
|
||||||
condition: "keycloak.enabled"
|
installed: {{ .Values.keycloak.enabled }}
|
||||||
- name: "keycloak-extensions"
|
- name: "keycloak-extensions"
|
||||||
chart: "keycloak-extensions-repo/keycloak-extensions"
|
chart: "keycloak-extensions-repo/keycloak-extensions"
|
||||||
version: "0.1.0"
|
version: "0.1.0"
|
||||||
@@ -40,12 +54,9 @@ releases:
|
|||||||
values:
|
values:
|
||||||
- "values-extensions.yaml"
|
- "values-extensions.yaml"
|
||||||
- "values-extensions.gotmpl"
|
- "values-extensions.gotmpl"
|
||||||
condition: "keycloak.enabled"
|
installed: {{ .Values.keycloak.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "keycloak"
|
component: "keycloak"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
---
|
---
|
||||||
global:
|
global:
|
||||||
keycloak:
|
keycloak:
|
||||||
adminPassword: {{ .Values.secrets.keycloak.adminPassword }}
|
adminPassword: {{ .Values.secrets.keycloak.adminPassword | quote }}
|
||||||
postgresql:
|
postgresql:
|
||||||
connection:
|
connection:
|
||||||
host: "{{ .Values.databases.keycloakExtension.host }}"
|
host: "{{ .Values.databases.keycloakExtension.host }}"
|
||||||
@@ -13,19 +13,15 @@ global:
|
|||||||
auth:
|
auth:
|
||||||
database: "{{ .Values.databases.keycloakExtension.name }}"
|
database: "{{ .Values.databases.keycloakExtension.name }}"
|
||||||
username: "{{ .Values.databases.keycloakExtension.username }}"
|
username: "{{ .Values.databases.keycloakExtension.username }}"
|
||||||
password: {{ .Values.databases.keycloakExtension.password | default .Values.secrets.postgresql.keycloakExtensionUser }}
|
password: {{ .Values.databases.keycloakExtension.password | default .Values.secrets.postgresql.keycloakExtensionUser | quote }}
|
||||||
handler:
|
handler:
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.keycloakExtensionHandler.repository }}"
|
repository: "{{ .Values.images.keycloakExtensionHandler.repository }}"
|
||||||
{{- if .Values.images.keycloakExtensionHandler.digest }}
|
|
||||||
sha256: "{{ .Values.images.keycloakExtensionHandler.digest}}"
|
|
||||||
{{- else if .Values.images.keycloakExtensionHandler.tag }}
|
|
||||||
tag: "{{ .Values.images.keycloakExtensionHandler.tag }}"
|
tag: "{{ .Values.images.keycloakExtensionHandler.tag }}"
|
||||||
{{- end }}
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
imagePullPolicy: "Always"
|
|
||||||
appConfig:
|
appConfig:
|
||||||
smtpPassword: "{{ .Values.smtp.password }}"
|
smtpPassword: {{ .Values.smtp.password | quote }}
|
||||||
smtpHost: "{{ .Values.smtp.host }}"
|
smtpHost: "{{ .Values.smtp.host }}"
|
||||||
smtpUsername: "{{ .Values.smtp.username }}"
|
smtpUsername: "{{ .Values.smtp.username }}"
|
||||||
mailFrom: "noreply@{{ .Values.global.domain }}"
|
mailFrom: "noreply@{{ .Values.global.domain }}"
|
||||||
@@ -35,18 +31,11 @@ proxy:
|
|||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.keycloakExtensionProxy.repository }}"
|
repository: "{{ .Values.images.keycloakExtensionProxy.repository }}"
|
||||||
{{- if .Values.images.keycloakExtensionProxy.digest }}
|
|
||||||
sha256: "{{ .Values.images.keycloakExtensionProxy.digest}}"
|
|
||||||
{{- else if .Values.images.keycloakExtensionProxy.tag }}
|
|
||||||
tag: "{{ .Values.images.keycloakExtensionProxy.tag }}"
|
tag: "{{ .Values.images.keycloakExtensionProxy.tag }}"
|
||||||
{{- end }}
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
imagePullPolicy: "Always"
|
|
||||||
ingress:
|
ingress:
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
enabled: "{{ .Values.ingress.enabled }}"
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
||||||
annotations:
|
|
||||||
nginx.org/proxy-buffer-size: "8k"
|
|
||||||
nginx.ingress.kubernetes.io/proxy-buffer-size: "8k"
|
|
||||||
host: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
||||||
tls:
|
tls:
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
enabled: "{{ .Values.ingress.tls.enabled }}"
|
||||||
|
|||||||
@@ -11,11 +11,35 @@ global:
|
|||||||
handler:
|
handler:
|
||||||
appConfig:
|
appConfig:
|
||||||
captchaProtectionEnable: "False"
|
captchaProtectionEnable: "False"
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
postgresql:
|
postgresql:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
proxy:
|
proxy:
|
||||||
image:
|
ingress:
|
||||||
tag: "latest"
|
annotations:
|
||||||
|
nginx.org/proxy-buffer-size: "8k"
|
||||||
|
nginx.ingress.kubernetes.io/proxy-buffer-size: "8k"
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
runAsNonRoot: true
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -181,7 +181,7 @@ keycloakConfigCli:
|
|||||||
"attributes": {
|
"attributes": {
|
||||||
"backchannel.logout.revoke.offline.tokens": "true",
|
"backchannel.logout.revoke.offline.tokens": "true",
|
||||||
"backchannel.logout.session.required": "true",
|
"backchannel.logout.session.required": "true",
|
||||||
"backchannel.logout.url": "https://$(ELEMENT_DOMAIN)/_synapse/client/oidc/backchannel_logout",
|
"backchannel.logout.url": "https://$(MATRIX_DOMAIN)/_synapse/client/oidc/backchannel_logout",
|
||||||
"post.logout.redirect.uris": "https://$(ELEMENT_DOMAIN)/*##https://$(MATRIX_DOMAIN)/*##https://$(UNIVENTION_CORPORATE_SERVER_DOMAIN)/*"
|
"post.logout.redirect.uris": "https://$(ELEMENT_DOMAIN)/*##https://$(MATRIX_DOMAIN)/*##https://$(UNIVENTION_CORPORATE_SERVER_DOMAIN)/*"
|
||||||
},
|
},
|
||||||
"authenticationFlowBindingOverrides": {},
|
"authenticationFlowBindingOverrides": {},
|
||||||
|
|||||||
@@ -13,17 +13,17 @@ image:
|
|||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.keycloak.repository }}"
|
repository: "{{ .Values.images.keycloak.repository }}"
|
||||||
tag: "{{ .Values.images.keycloak.tag }}"
|
tag: "{{ .Values.images.keycloak.tag }}"
|
||||||
digest: "{{ .Values.images.keycloak.digest }}"
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
externalDatabase:
|
externalDatabase:
|
||||||
host: "{{ .Values.databases.keycloak.host }}"
|
host: "{{ .Values.databases.keycloak.host }}"
|
||||||
port: {{ .Values.databases.keycloak.port }}
|
port: {{ .Values.databases.keycloak.port }}
|
||||||
user: "{{ .Values.databases.keycloak.username }}"
|
user: "{{ .Values.databases.keycloak.username }}"
|
||||||
database: "{{ .Values.databases.keycloak.name }}"
|
database: "{{ .Values.databases.keycloak.name }}"
|
||||||
password: {{ .Values.databases.keycloak.password | default .Values.secrets.postgresql.keycloakUser }}
|
password: {{ .Values.databases.keycloak.password | default .Values.secrets.postgresql.keycloakUser | quote }}
|
||||||
|
|
||||||
auth:
|
auth:
|
||||||
adminPassword: {{ .Values.secrets.keycloak.adminPassword }}
|
adminPassword: {{ .Values.secrets.keycloak.adminPassword | quote }}
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.keycloak }}
|
replicaCount: {{ .Values.replicas.keycloak }}
|
||||||
|
|
||||||
@@ -81,6 +81,8 @@ keycloakConfigCli:
|
|||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.keycloak }}
|
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.keycloak }}
|
||||||
- name: "LDAPSEARCH_USERNAME"
|
- name: "LDAPSEARCH_USERNAME"
|
||||||
value: "ldapsearch_keycloak"
|
value: "ldapsearch_keycloak"
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.keycloak | toYaml | nindent 4 }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.keycloak | toYaml | nindent 2 }}
|
{{ .Values.resources.keycloak | toYaml | nindent 2 }}
|
||||||
|
|||||||
@@ -54,5 +54,32 @@ keycloakConfigCli:
|
|||||||
- "--import.var-substitution.enabled=true"
|
- "--import.var-substitution.enabled=true"
|
||||||
cache:
|
cache:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
containerSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 1001
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 1001
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 1001
|
||||||
|
fsGroupChangePolicy: "OnRootMismatch"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,43 +1,54 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "sovereign-workplace-nextcloud-bootstrap-repo"
|
# openDesk Keycloak Bootstrap
|
||||||
|
# Source:
|
||||||
|
# https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/sovereign-workplace-nextcloud-bootstrap
|
||||||
|
- name: "opendesk-nextcloud-bootstrap-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/130/packages/helm/stable" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-nextcloud-bootstrap" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# Nextcloud
|
||||||
|
# Source: https://github.com/nextcloud/helm/
|
||||||
- name: "nextcloud-repo"
|
- name: "nextcloud-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
default "https://nextcloud.github.io/helm/" }}
|
default "https://nextcloud.github.io/helm/" }}
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "sovereign-workplace-nextcloud-bootstrap"
|
- name: "opendesk-nextcloud-bootstrap"
|
||||||
chart: "sovereign-workplace-nextcloud-bootstrap-repo/sovereign-workplace-nextcloud-bootstrap"
|
chart: "opendesk-nextcloud-bootstrap-repo/opendesk-nextcloud-bootstrap"
|
||||||
version: "2.3.0"
|
version: "3.2.2"
|
||||||
wait: true
|
wait: true
|
||||||
waitForJobs: true
|
waitForJobs: true
|
||||||
values:
|
values:
|
||||||
- "values-bootstrap.gotmpl"
|
- "values-bootstrap.gotmpl"
|
||||||
- "values-bootstrap.yaml"
|
- "values-bootstrap.yaml"
|
||||||
condition: "nextcloud.enabled"
|
installed: {{ .Values.nextcloud.enabled }}
|
||||||
timeout: 1800
|
timeout: 900
|
||||||
|
|
||||||
- name: "nextcloud"
|
- name: "nextcloud"
|
||||||
chart: "nextcloud-repo/nextcloud"
|
chart: "nextcloud-repo/nextcloud"
|
||||||
version: "3.5.19"
|
version: "3.5.19"
|
||||||
needs:
|
needs:
|
||||||
- "sovereign-workplace-nextcloud-bootstrap"
|
- "opendesk-nextcloud-bootstrap"
|
||||||
values:
|
values:
|
||||||
- "values-nextcloud.gotmpl"
|
- "values-nextcloud.gotmpl"
|
||||||
- "values-nextcloud.yaml"
|
- "values-nextcloud.yaml"
|
||||||
condition: "nextcloud.enabled"
|
installed: {{ .Values.nextcloud.enabled }}
|
||||||
timeout: 1800
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "nextcloud"
|
component: "nextcloud"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -14,26 +14,26 @@ global:
|
|||||||
|
|
||||||
config:
|
config:
|
||||||
administrator:
|
administrator:
|
||||||
password: {{ .Values.secrets.nextcloud.adminPassword }}
|
password: {{ .Values.secrets.nextcloud.adminPassword | quote }}
|
||||||
|
|
||||||
antivirus:
|
antivirus:
|
||||||
{{- if .Values.clamavDistributed.enabled }}
|
{{- if .Values.clamavDistributed.enabled }}
|
||||||
host: "clamav-sovereign-workplace-icap"
|
host: "clamav-icap"
|
||||||
{{- else if .Values.clamavSimple.enabled }}
|
{{- else if .Values.clamavSimple.enabled }}
|
||||||
host: "clamav-simple"
|
host: "clamav-simple"
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
apps:
|
apps:
|
||||||
integrationSwp:
|
integrationSwp:
|
||||||
password: {{ .Values.secrets.centralnavigation.apiKey }}
|
password: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
userOidc:
|
userOidc:
|
||||||
password: {{ .Values.secrets.keycloak.clientSecret.ncoidc }}
|
password: {{ .Values.secrets.keycloak.clientSecret.ncoidc | quote }}
|
||||||
|
|
||||||
database:
|
database:
|
||||||
host: "{{ .Values.databases.nextcloud.host }}"
|
host: "{{ .Values.databases.nextcloud.host }}"
|
||||||
name: "{{ .Values.databases.nextcloud.name }}"
|
name: "{{ .Values.databases.nextcloud.name }}"
|
||||||
user: "{{ .Values.databases.nextcloud.username }}"
|
user: "{{ .Values.databases.nextcloud.username }}"
|
||||||
password: "{{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser }}"
|
password: {{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser | quote }}
|
||||||
|
|
||||||
ldapSearch:
|
ldapSearch:
|
||||||
password: "{{ .Values.secrets.univentionCorporateServer.ldapSearch.nextcloud }}"
|
password: "{{ .Values.secrets.univentionCorporateServer.ldapSearch.nextcloud }}"
|
||||||
@@ -43,7 +43,13 @@ config:
|
|||||||
username: "{{ .Values.smtp.username }}"
|
username: "{{ .Values.smtp.username }}"
|
||||||
password: "{{ .Values.smtp.password }}"
|
password: "{{ .Values.smtp.password }}"
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
keepPVCOnDelete: {{ .Values.cleanup.keepPVCOnDelete }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.nextcloud.repository }}"
|
repository: "{{ .Values.images.nextcloud.repository }}"
|
||||||
tag: "{{ .Values.images.nextcloud.tag }}"
|
tag: "{{ .Values.images.nextcloud.tag }}"
|
||||||
|
|||||||
@@ -11,9 +11,9 @@ config:
|
|||||||
userOidc:
|
userOidc:
|
||||||
username: "ncoidc"
|
username: "ncoidc"
|
||||||
|
|
||||||
|
cryptpad:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
ldapSearch:
|
ldapSearch:
|
||||||
host: "univention-corporate-container"
|
host: "univention-corporate-container"
|
||||||
|
|
||||||
cleanup:
|
|
||||||
deletePodsOnSuccess: false
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -6,16 +6,20 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
nextcloud:
|
nextcloud:
|
||||||
host: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
||||||
username: "nextcloud"
|
username: "nextcloud"
|
||||||
password: {{ .Values.secrets.nextcloud.adminPassword }}
|
password: {{ .Values.secrets.nextcloud.adminPassword | quote }}
|
||||||
externalDatabase:
|
externalDatabase:
|
||||||
database: "{{ .Values.databases.nextcloud.name }}"
|
database: "{{ .Values.databases.nextcloud.name }}"
|
||||||
user: "{{ .Values.databases.nextcloud.username }}"
|
user: "{{ .Values.databases.nextcloud.username }}"
|
||||||
host: "{{ .Values.databases.nextcloud.host }}"
|
host: "{{ .Values.databases.nextcloud.host }}"
|
||||||
password: "{{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser }}"
|
password: {{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser | quote }}
|
||||||
|
extraEnv:
|
||||||
|
REDIS_HOST: {{ .Values.cache.nextcloud.host | quote }}
|
||||||
|
REDIS_HOST_PORT: {{ .Values.cache.nextcloud.port | quote }}
|
||||||
|
REDIS_HOST_PASSWORD: {{ .Values.cache.nextcloud.password | default .Values.secrets.redis.password | quote }}
|
||||||
redis:
|
redis:
|
||||||
auth:
|
auth:
|
||||||
enabled: true
|
enabled: true
|
||||||
password: {{ .Values.secrets.redis.password }}
|
password: {{ .Values.cache.nextcloud.password | default .Values.secrets.redis.password | quote }}
|
||||||
ingress:
|
ingress:
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
className: {{ .Values.ingress.ingressClassName }}
|
className: {{ .Values.ingress.ingressClassName }}
|
||||||
@@ -25,7 +29,7 @@ ingress:
|
|||||||
- "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
- "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
||||||
image:
|
image:
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.nextcloud.repository }}"
|
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.nextcloud.repository }}"
|
||||||
pullPolicy: "Always"
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
tag: "{{ .Values.images.nextcloud.tag }}"
|
tag: "{{ .Values.images.nextcloud.tag }}"
|
||||||
pullSecrets:
|
pullSecrets:
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|||||||
@@ -21,6 +21,11 @@ cronjob:
|
|||||||
sed -i "s/\*\/5 \* \* \* \* php -f \/var\/www\/html\/cron.php/\*\/1 \* \* \* \* php -f
|
sed -i "s/\*\/5 \* \* \* \* php -f \/var\/www\/html\/cron.php/\*\/1 \* \* \* \* php -f
|
||||||
\/var\/www\/html\/cron.php/g" /var/spool/cron/crontabs/www-data
|
\/var\/www\/html\/cron.php/g" /var/spool/cron/crontabs/www-data
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
annotations:
|
||||||
|
nginx.ingress.kubernetes.io/proxy-body-size: "4G"
|
||||||
|
nginx.org/client-max-body-size: "4G"
|
||||||
|
|
||||||
internalDatabase:
|
internalDatabase:
|
||||||
enabled: false
|
enabled: false
|
||||||
postgresql:
|
postgresql:
|
||||||
@@ -39,6 +44,18 @@ externalDatabase:
|
|||||||
metrics:
|
metrics:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
nextcloud:
|
||||||
|
configs:
|
||||||
|
mimetypealiases.json: |-
|
||||||
|
{
|
||||||
|
"application/x-drawio": "image"
|
||||||
|
}
|
||||||
|
|
||||||
|
mimetypemapping.json: |-
|
||||||
|
{
|
||||||
|
"drawio": ["application/x-drawio"]
|
||||||
|
}
|
||||||
|
|
||||||
# this is not documented but can be found in values.yaml
|
# this is not documented but can be found in values.yaml
|
||||||
service:
|
service:
|
||||||
port: "80"
|
port: "80"
|
||||||
|
|||||||
@@ -1,49 +1,67 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "dovecot-repo"
|
# openDesk Dovecot
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-dovecot
|
||||||
|
- name: "opendesk-dovecot-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/80/packages/helm/stable" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/dovecot" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# Open-Xchange
|
||||||
- name: "openxchange-repo"
|
- name: "openxchange-repo"
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default "registry.open-xchange.com" }}
|
||||||
default "registry.open-xchange.com" }}
|
# openDesk Open-Xchange Bootstrap
|
||||||
- name: "sovereign-workplace-open-xchange-bootstrap-repo"
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-open-xchange-bootstrap
|
||||||
|
- name: "opendesk-open-xchange-bootstrap-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/139/packages/helm/stable" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-open-xchange-bootstrap" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "dovecot"
|
- name: "dovecot"
|
||||||
chart: "dovecot-repo/dovecot"
|
chart: "opendesk-dovecot-repo/dovecot"
|
||||||
version: "1.3.1"
|
version: "1.3.1"
|
||||||
values:
|
values:
|
||||||
- "values-dovecot.yaml"
|
- "values-dovecot.yaml"
|
||||||
- "values-dovecot.gotmpl"
|
- "values-dovecot.gotmpl"
|
||||||
condition: "dovecot.enabled"
|
installed: {{ .Values.dovecot.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
- name: "open-xchange"
|
- name: "open-xchange"
|
||||||
chart: "openxchange-repo/appsuite-public-sector/charts/appsuite-public-sector"
|
chart: "openxchange-repo/appsuite-public-sector/charts/appsuite-public-sector"
|
||||||
version: "1.2.13"
|
version: "2.0.4"
|
||||||
values:
|
values:
|
||||||
- "values-openxchange.yaml"
|
- "values-openxchange.yaml"
|
||||||
- "values-openxchange.gotmpl"
|
- "values-openxchange.gotmpl"
|
||||||
- "values-openxchange-enterprise-contact-picker.yaml"
|
- "values-openxchange-enterprise-contact-picker.yaml"
|
||||||
- "values-openxchange-enterprise-contact-picker.gotmpl"
|
- "values-openxchange-enterprise-contact-picker.gotmpl"
|
||||||
condition: "oxAppsuite.enabled"
|
installed: {{ .Values.oxAppsuite.enabled }}
|
||||||
- name: "sovereign-workplace-open-xchange-bootstrap"
|
timeout: 900
|
||||||
chart: "sovereign-workplace-open-xchange-bootstrap-repo/sovereign-workplace-open-xchange-bootstrap"
|
|
||||||
|
- name: "opendesk-open-xchange-bootstrap"
|
||||||
|
chart: "opendesk-open-xchange-bootstrap-repo/sovereign-workplace-open-xchange-bootstrap"
|
||||||
version: "1.3.1"
|
version: "1.3.1"
|
||||||
values:
|
values:
|
||||||
- "values-openxchange-bootstrap.yaml"
|
- "values-openxchange-bootstrap.gotmpl"
|
||||||
condition: "oxAppsuite.enabled"
|
installed: {{ .Values.oxAppsuite.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "open-xchange"
|
component: "open-xchange"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -6,7 +6,8 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
url: "{{ .Values.images.dovecot.repository }}"
|
url: "{{ .Values.images.dovecot.repository }}"
|
||||||
digest: "{{ .Values.images.dovecot.digest }}"
|
tag: "{{ .Values.images.dovecot.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
@@ -15,10 +16,10 @@ imagePullSecrets:
|
|||||||
|
|
||||||
dovecot:
|
dovecot:
|
||||||
mailDomain: "{{ .Values.global.domain }}"
|
mailDomain: "{{ .Values.global.domain }}"
|
||||||
password: {{ .Values.secrets.dovecot.doveadm }}
|
password: {{ .Values.secrets.dovecot.doveadm | quote }}
|
||||||
ldap:
|
ldap:
|
||||||
dn: "uid=ldapsearch_dovecot,cn=users,dc=swp-ldap,dc=internal"
|
dn: "uid=ldapsearch_dovecot,cn=users,dc=swp-ldap,dc=internal"
|
||||||
password: {{ .Values.secrets.univentionCorporateServer.ldapSearch.dovecot }}
|
password: {{ .Values.secrets.univentionCorporateServer.ldapSearch.dovecot | quote }}
|
||||||
oidc:
|
oidc:
|
||||||
introspectionURL: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/token/introspect"
|
introspectionURL: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/token/introspect"
|
||||||
clientSecret: {{ .Values.secrets.keycloak.clientSecret.as8oidc }}
|
clientSecret: {{ .Values.secrets.keycloak.clientSecret.as8oidc }}
|
||||||
|
|||||||
@@ -3,10 +3,15 @@ SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG Ze
|
|||||||
SPDX-License-Identifier: Apache-2.0
|
SPDX-License-Identifier: Apache-2.0
|
||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
url: "{{ .Values.images.openxchangeBootstrap.repository }}"
|
url: "{{ .Values.images.openxchangeBootstrap.repository }}"
|
||||||
digest: "{{ .Values.images.openxchangeBootstrap.digest }}"
|
tag: "{{ .Values.images.openxchangeBootstrap.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
|||||||
@@ -11,8 +11,8 @@ global:
|
|||||||
database: "{{ .Values.databases.oxAppsuite.name }}"
|
database: "{{ .Values.databases.oxAppsuite.name }}"
|
||||||
auth:
|
auth:
|
||||||
user: "{{ .Values.databases.oxAppsuite.username }}"
|
user: "{{ .Values.databases.oxAppsuite.username }}"
|
||||||
password: "{{ .Values.databases.oxAppsuite.password | default .Values.secrets.mariadb.rootPassword }}"
|
password: {{ .Values.databases.oxAppsuite.password | default .Values.secrets.mariadb.rootPassword | quote }}
|
||||||
rootPassword: "{{ .Values.databases.oxAppsuite.password | default .Values.secrets.mariadb.rootPassword }}"
|
rootPassword: {{ .Values.databases.oxAppsuite.password | default .Values.secrets.mariadb.rootPassword | quote }}
|
||||||
|
|
||||||
istio:
|
istio:
|
||||||
enabled: {{ .Values.istio.enabled }}
|
enabled: {{ .Values.istio.enabled }}
|
||||||
@@ -34,6 +34,7 @@ public-sector-ui:
|
|||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . }}
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
appsuite:
|
appsuite:
|
||||||
istio:
|
istio:
|
||||||
@@ -52,6 +53,15 @@ appsuite:
|
|||||||
core-mw:
|
core-mw:
|
||||||
masterPassword: {{ .Values.secrets.oxAppsuite.adminPassword | quote }}
|
masterPassword: {{ .Values.secrets.oxAppsuite.adminPassword | quote }}
|
||||||
hostname: "{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
hostname: "{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
|
gotenberg:
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
image:
|
||||||
|
repository: {{ .Values.global.imageRegistry }}/{{ .Values.images.openxchangeGotenberg.repository }}
|
||||||
|
tag: {{ .Values.images.openxchangeGotenberg.tag }}
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
properties:
|
properties:
|
||||||
"com.openexchange.oauth.provider.jwt.jwksUri": "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/certs"
|
"com.openexchange.oauth.provider.jwt.jwksUri": "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/certs"
|
||||||
"com.openexchange.oauth.provider.allowedIssuer": "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
"com.openexchange.oauth.provider.allowedIssuer": "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
||||||
@@ -96,6 +106,7 @@ appsuite:
|
|||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreMW.repository }}
|
repository: {{ .Values.images.openxchangeCoreMW.repository }}
|
||||||
tag: {{ .Values.images.openxchangeCoreMW.tag }}
|
tag: {{ .Values.images.openxchangeCoreMW.tag }}
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
update:
|
update:
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreMW.repository }}
|
repository: {{ .Values.images.openxchangeCoreMW.repository }}
|
||||||
@@ -113,6 +124,7 @@ appsuite:
|
|||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreUI.repository }}
|
repository: {{ .Values.images.openxchangeCoreUI.repository }}
|
||||||
tag: {{ .Values.images.openxchangeCoreUI.tag }}
|
tag: {{ .Values.images.openxchangeCoreUI.tag }}
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
core-ui-middleware:
|
core-ui-middleware:
|
||||||
ingress:
|
ingress:
|
||||||
@@ -126,6 +138,7 @@ appsuite:
|
|||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreUIMiddleware.repository }}
|
repository: {{ .Values.images.openxchangeCoreUIMiddleware.repository }}
|
||||||
tag: {{ .Values.images.openxchangeCoreUIMiddleware.tag }}
|
tag: {{ .Values.images.openxchangeCoreUIMiddleware.tag }}
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
core-guidedtours:
|
core-guidedtours:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
@@ -135,6 +148,7 @@ appsuite:
|
|||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreGuidedtours.repository }}
|
repository: {{ .Values.images.openxchangeCoreGuidedtours.repository }}
|
||||||
tag: {{ .Values.images.openxchangeCoreGuidedtours.tag }}
|
tag: {{ .Values.images.openxchangeCoreGuidedtours.tag }}
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
guard-ui:
|
guard-ui:
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
@@ -144,11 +158,13 @@ appsuite:
|
|||||||
image:
|
image:
|
||||||
repository: {{ .Values.global.imageRegistry }}/{{ .Values.images.openxchangeGuardUI.repository }}
|
repository: {{ .Values.global.imageRegistry }}/{{ .Values.images.openxchangeGuardUI.repository }}
|
||||||
tag: {{ .Values.images.openxchangeGuardUI.tag }}
|
tag: {{ .Values.images.openxchangeGuardUI.tag }}
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
core-user-guide:
|
core-user-guide:
|
||||||
image:
|
image:
|
||||||
repository: {{ .Values.images.openxchangeCoreUserGuide.repository }}
|
repository: {{ .Values.images.openxchangeCoreUserGuide.repository }}
|
||||||
tag: {{ .Values.images.openxchangeCoreUserGuide.tag }}
|
tag: {{ .Values.images.openxchangeCoreUserGuide.tag }}
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
- name: {{ . }}
|
- name: {{ . }}
|
||||||
|
|||||||
@@ -4,11 +4,13 @@
|
|||||||
appsuite:
|
appsuite:
|
||||||
istio:
|
istio:
|
||||||
ingressGateway:
|
ingressGateway:
|
||||||
name: "sovereign-workplace-gateway-istio-gateway"
|
name: "opendesk-gateway-istio-gateway"
|
||||||
|
|
||||||
core-mw:
|
core-mw:
|
||||||
enabled: true
|
enabled: true
|
||||||
masterAdmin: "admin"
|
masterAdmin: "admin"
|
||||||
|
gotenberg:
|
||||||
|
enabled: true
|
||||||
features:
|
features:
|
||||||
status:
|
status:
|
||||||
# enable admin pack
|
# enable admin pack
|
||||||
@@ -22,6 +24,13 @@ appsuite:
|
|||||||
open-xchange-authentication-oauth: "enabled"
|
open-xchange-authentication-oauth: "enabled"
|
||||||
properties:
|
properties:
|
||||||
com.openexchange.UIWebPath: "/appsuite/"
|
com.openexchange.UIWebPath: "/appsuite/"
|
||||||
|
# PDF Export
|
||||||
|
com.openexchange.capability.mail_export_pdf: "true"
|
||||||
|
com.openexchange.mail.exportpdf.gotenberg.enabled: "true"
|
||||||
|
com.openexchange.mail.exportpdf.collabora.enabled: "true"
|
||||||
|
com.openexchange.mail.exportpdf.pdfa.collabora.enabled: "true"
|
||||||
|
com.openexchange.mail.exportpdf.collabora.url: "http://collabora:9980"
|
||||||
|
com.openexchange.mail.exportpdf.gotenberg.url: "http://open-xchange-gotenberg:3000"
|
||||||
# OIDC
|
# OIDC
|
||||||
com.openexchange.oidc.enabled: "true"
|
com.openexchange.oidc.enabled: "true"
|
||||||
com.openexchange.oidc.autologinCookieMode: "ox_direct"
|
com.openexchange.oidc.autologinCookieMode: "ox_direct"
|
||||||
@@ -55,13 +64,17 @@ appsuite:
|
|||||||
com.openexchange.mail.filter.server: "dovecot"
|
com.openexchange.mail.filter.server: "dovecot"
|
||||||
com.openexchange.mail.filter.preferredSaslMech: "XOAUTH2"
|
com.openexchange.mail.filter.preferredSaslMech: "XOAUTH2"
|
||||||
# Capabilities
|
# Capabilities
|
||||||
|
# Old capability can be used to toggle all integrations with a single switch
|
||||||
|
com.openexchange.capability.public-sector: "true"
|
||||||
|
# New capabilities in 2.0
|
||||||
|
com.openexchange.capability.public-sector-element: "true"
|
||||||
|
com.openexchange.capability.public-sector-navigation: "true"
|
||||||
com.openexchange.capability.client-onboarding: "true"
|
com.openexchange.capability.client-onboarding: "true"
|
||||||
com.openexchange.capability.dynamic-theme: "true"
|
com.openexchange.capability.dynamic-theme: "true"
|
||||||
com.openexchange.capability.filestorage_nextcloud: "true"
|
com.openexchange.capability.filestorage_nextcloud: "true"
|
||||||
com.openexchange.capability.filestorage_nextcloud_oauth: "true"
|
com.openexchange.capability.filestorage_nextcloud_oauth: "true"
|
||||||
com.openexchange.capability.guard: "true"
|
com.openexchange.capability.guard: "true"
|
||||||
com.openexchange.capability.guard-mail: "true"
|
com.openexchange.capability.guard-mail: "true"
|
||||||
com.openexchange.capability.public-sector: "true"
|
|
||||||
com.openexchange.capability.smime: "true"
|
com.openexchange.capability.smime: "true"
|
||||||
com.openexchange.capability.share_links: "false"
|
com.openexchange.capability.share_links: "false"
|
||||||
com.openexchange.capability.invite_guests: "false"
|
com.openexchange.capability.invite_guests: "false"
|
||||||
@@ -95,6 +108,11 @@ appsuite:
|
|||||||
bindDN: "uid=ldapsearch_ox,cn=users,dc=swp-ldap,dc=internal"
|
bindDN: "uid=ldapsearch_ox,cn=users,dc=swp-ldap,dc=internal"
|
||||||
|
|
||||||
uiSettings:
|
uiSettings:
|
||||||
|
# Show the Enterprise Picker in the top right corner instead of the launcher drop-down
|
||||||
|
io.ox/core//features/enterprisePicker/showLauncher: "false"
|
||||||
|
io.ox/core//features/enterprisePicker/showTopRightLauncher: "true"
|
||||||
|
# Text and icon color in the topbar
|
||||||
|
io.ox/dynamic-theme//topbarColor: "#000"
|
||||||
io.ox/dynamic-theme//logoWidth: "82"
|
io.ox/dynamic-theme//logoWidth: "82"
|
||||||
io.ox/dynamic-theme//topbarHover: "rgba(0, 0, 0, 0.1)"
|
io.ox/dynamic-theme//topbarHover: "rgba(0, 0, 0, 0.1)"
|
||||||
# Resources
|
# Resources
|
||||||
@@ -111,6 +129,8 @@ appsuite:
|
|||||||
# io.ox.public-sector//ics/url: "https://ics.<DOMAIN>/"
|
# io.ox.public-sector//ics/url: "https://ics.<DOMAIN>/"
|
||||||
io.ox/core//apps/quickLaunchCount: "0"
|
io.ox/core//apps/quickLaunchCount: "0"
|
||||||
io.ox/core//coloredIcons: "false"
|
io.ox/core//coloredIcons: "false"
|
||||||
|
# Mail templates
|
||||||
|
io.ox/core//features/templates: "true"
|
||||||
|
|
||||||
asConfig:
|
asConfig:
|
||||||
default:
|
default:
|
||||||
|
|||||||
@@ -1,7 +1,13 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# OpenProject
|
||||||
|
# Source: https://github.com/opf/helm-charts
|
||||||
- name: "openproject-repo"
|
- name: "openproject-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
@@ -10,16 +16,16 @@ repositories:
|
|||||||
releases:
|
releases:
|
||||||
- name: "openproject"
|
- name: "openproject"
|
||||||
chart: "openproject-repo/openproject"
|
chart: "openproject-repo/openproject"
|
||||||
version: "1.8.0"
|
version: "2.0.4"
|
||||||
|
wait: true
|
||||||
|
waitForJobs: true
|
||||||
values:
|
values:
|
||||||
- "values.yaml"
|
- "values.yaml"
|
||||||
- "values.gotmpl"
|
- "values.gotmpl"
|
||||||
condition: "openproject.enabled"
|
installed: {{ .Values.openproject.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "openproject"
|
component: "openproject"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -10,10 +10,13 @@ global:
|
|||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.openproject.repository }}"
|
repository: "{{ .Values.images.openproject.repository }}"
|
||||||
pullPolicy: "Always"
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
tag: "{{ .Values.images.openproject.tag }}"
|
tag: "{{ .Values.images.openproject.tag }}"
|
||||||
|
|
||||||
memcached:
|
memcached:
|
||||||
|
connection:
|
||||||
|
host: "{{ .Values.cache.openproject.host }}"
|
||||||
|
port: {{ .Values.cache.openproject.port }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.memcached.repository }}"
|
repository: "{{ .Values.images.memcached.repository }}"
|
||||||
@@ -21,7 +24,7 @@ memcached:
|
|||||||
|
|
||||||
postgresql:
|
postgresql:
|
||||||
auth:
|
auth:
|
||||||
password: {{ .Values.databases.openproject.password | default .Values.secrets.postgresql.openprojectUser }}
|
password: {{ .Values.databases.openproject.password | default .Values.secrets.postgresql.openprojectUser | quote }}
|
||||||
username: "{{ .Values.databases.openproject.username }}"
|
username: "{{ .Values.databases.openproject.username }}"
|
||||||
database: "{{ .Values.databases.openproject.name }}"
|
database: "{{ .Values.databases.openproject.name }}"
|
||||||
connection:
|
connection:
|
||||||
@@ -35,7 +38,7 @@ openproject:
|
|||||||
name: "OpenProject Interal Admin"
|
name: "OpenProject Interal Admin"
|
||||||
mail: "openproject-admin@swp-domain.internal"
|
mail: "openproject-admin@swp-domain.internal"
|
||||||
password_reset: "false"
|
password_reset: "false"
|
||||||
password: "{{ .Values.secrets.openproject.adminPassword }}"
|
password: {{ .Values.secrets.openproject.adminPassword | quote }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
host: "{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}"
|
host: "{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}"
|
||||||
@@ -51,20 +54,21 @@ environment:
|
|||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_POST__LOGOUT__REDIRECT__URI: "https://{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}/"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_POST__LOGOUT__REDIRECT__URI: "https://{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}/"
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_HOST: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_HOST: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_END__SESSION__ENDPOINT: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/logout"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_END__SESSION__ENDPOINT: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/logout"
|
||||||
OPENPROJECT_SOUVAP__NAVIGATION__SECRET: {{ .Values.secrets.centralnavigation.apiKey }}
|
OPENPROJECT_SOUVAP__NAVIGATION__SECRET: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
OPENPROJECT_SOUVAP__NAVIGATION__URL: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/univention/portal/navigation.json?base=https%3A//{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}"
|
OPENPROJECT_SOUVAP__NAVIGATION__URL: "https://{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}/univention/portal/navigation.json?base=https%3A//{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}"
|
||||||
OPENPROJECT_SMTP__DOMAIN: "{{ .Values.global.domain }}"
|
OPENPROJECT_SMTP__DOMAIN: "{{ .Values.global.domain }}"
|
||||||
OPENPROJECT_SMTP__USER__NAME: "{{ .Values.smtp.username }}"
|
OPENPROJECT_SMTP__USER__NAME: "{{ .Values.smtp.username }}"
|
||||||
OPENPROJECT_SMTP__PASSWORD: "{{ .Values.smtp.password }}"
|
OPENPROJECT_SMTP__PASSWORD: "{{ .Values.smtp.password }}"
|
||||||
OPENPROJECT_SMTP__PORT: "587" # (default=587)
|
OPENPROJECT_SMTP__PORT: "{{ .Values.smtp.port }}"
|
||||||
OPENPROJECT_SMTP__SSL: "false" # (default=false)
|
OPENPROJECT_SMTP__SSL: "false" # (default=false)
|
||||||
OPENPROJECT_SMTP__ADDRESS: "{{ .Values.smtp.host }}"
|
OPENPROJECT_SMTP__ADDRESS: "{{ .Values.smtp.host }}"
|
||||||
|
OPENPROJECT_MAIL__FROM: "do-not-reply@{{ .Values.global.domain }}"
|
||||||
# Details: https://www.openproject-edge.com/docs/installation-and-operations/configuration/#seeding-ldap-connections
|
# Details: https://www.openproject-edge.com/docs/installation-and-operations/configuration/#seeding-ldap-connections
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_BINDPASSWORD: "{{ .Values.secrets.univentionCorporateServer.ldapSearch.openproject }}"
|
OPENPROJECT_SEED_LDAP_OPENDESK_BINDPASSWORD: "{{ .Values.secrets.univentionCorporateServer.ldapSearch.openproject }}"
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
size: "{{ .Values.persistence.size.openproject }}"
|
size: "{{ .Values.persistence.size.openproject }}"
|
||||||
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClassName: "{{ .Values.persistence.storageClassNames.RWX }}"
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.openproject }}
|
replicaCount: {{ .Values.replicas.openproject }}
|
||||||
|
|
||||||
|
|||||||
@@ -4,6 +4,9 @@
|
|||||||
image:
|
image:
|
||||||
registry: "registry.souvap-univention.de"
|
registry: "registry.souvap-univention.de"
|
||||||
|
|
||||||
|
memcached:
|
||||||
|
bundled: false
|
||||||
|
|
||||||
probes:
|
probes:
|
||||||
liveness:
|
liveness:
|
||||||
initialDelaySeconds: 300
|
initialDelaySeconds: 300
|
||||||
@@ -27,6 +30,16 @@ openproject:
|
|||||||
# seed will only be executed on initial installation
|
# seed will only be executed on initial installation
|
||||||
seed_locale: "de"
|
seed_locale: "de"
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
accessModes:
|
||||||
|
- "ReadWriteMany"
|
||||||
|
|
||||||
# For more details and more options see
|
# For more details and more options see
|
||||||
# https://www.openproject.org/docs/installation-and-operations/configuration/environment/
|
# https://www.openproject.org/docs/installation-and-operations/configuration/environment/
|
||||||
environment:
|
environment:
|
||||||
@@ -34,19 +47,22 @@ environment:
|
|||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_ATTRIBUTE__MAP_LOGIN: "phoenixusername"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_ATTRIBUTE__MAP_LOGIN: "phoenixusername"
|
||||||
OPENPROJECT_LOGIN__REQUIRED: "true"
|
OPENPROJECT_LOGIN__REQUIRED: "true"
|
||||||
OPENPROJECT_OAUTH__ALLOW__REMAPPING__OF__EXISTING__USERS: "true"
|
OPENPROJECT_OAUTH__ALLOW__REMAPPING__OF__EXISTING__USERS: "true"
|
||||||
|
OPENPROJECT_OMNIAUTH__DIRECT__LOGIN__PROVIDER: "keycloak"
|
||||||
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_DISPLAY__NAME: "Keycloak"
|
OPENPROJECT_OPENID__CONNECT_KEYCLOAK_DISPLAY__NAME: "Keycloak"
|
||||||
OPENPROJECT_PER__PAGE__OPTIONS: "20, 50, 100, 200"
|
OPENPROJECT_PER__PAGE__OPTIONS: "20, 50, 100, 200"
|
||||||
OPENPROJECT_EMAIL__DELIVERY__METHOD: "smtp"
|
OPENPROJECT_EMAIL__DELIVERY__METHOD: "smtp"
|
||||||
OPENPROJECT_SMTP__AUTHENTICATION: "plain"
|
OPENPROJECT_SMTP__AUTHENTICATION: "plain"
|
||||||
OPENPROJECT_SMTP__ENABLE__STARTTLS__AUTO: "true"
|
OPENPROJECT_SMTP__ENABLE__STARTTLS__AUTO: "true"
|
||||||
OPENPROJECT_SMTP__OPENSSL__VERIFY__MODE: "peer"
|
OPENPROJECT_SMTP__OPENSSL__VERIFY__MODE: "peer"
|
||||||
|
OPENPROJECT_DEFAULT__COMMENT__SORT__ORDER: "desc"
|
||||||
# Details: https://www.openproject-edge.com/docs/installation-and-operations/configuration/#seeding-ldap-connections
|
# Details: https://www.openproject-edge.com/docs/installation-and-operations/configuration/#seeding-ldap-connections
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_HOST: "univention-corporate-container"
|
OPENPROJECT_SEED_LDAP_OPENDESK_HOST: "univention-corporate-container"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_PORT: "389"
|
OPENPROJECT_SEED_LDAP_OPENDESK_PORT: "389"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_SECURITY: "plain_ldap"
|
OPENPROJECT_SEED_LDAP_OPENDESK_SECURITY: "plain_ldap"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_BINDUSER: "uid=ldapsearch_openproject,cn=users,dc=swp-ldap,dc=internal"
|
OPENPROJECT_SEED_LDAP_OPENDESK_BINDUSER: "uid=ldapsearch_openproject,cn=users,dc=swp-ldap,dc=internal"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_BASEDN: "dc=swp-ldap,dc=internal"
|
OPENPROJECT_SEED_LDAP_OPENDESK_BASEDN: "dc=swp-ldap,dc=internal"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_FILTER: "(&(objectClass=opendeskProjectmanagementUser)(opendeskProjectmanagementEnabled=TRUE))"
|
OPENPROJECT_SEED_LDAP_OPENDESK_FILTER:
|
||||||
|
"(&(objectClass=opendeskProjectmanagementUser)(opendeskProjectmanagementEnabled=TRUE))"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_SYNC__USERS: "true"
|
OPENPROJECT_SEED_LDAP_OPENDESK_SYNC__USERS: "true"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_LOGIN__MAPPING: "uid"
|
OPENPROJECT_SEED_LDAP_OPENDESK_LOGIN__MAPPING: "uid"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_FIRSTNAME__MAPPING: "givenName"
|
OPENPROJECT_SEED_LDAP_OPENDESK_FIRSTNAME__MAPPING: "givenName"
|
||||||
@@ -54,7 +70,8 @@ environment:
|
|||||||
OPENPROJECT_SEED_LDAP_OPENDESK_MAIL__MAPPING: "mailPrimaryAddress"
|
OPENPROJECT_SEED_LDAP_OPENDESK_MAIL__MAPPING: "mailPrimaryAddress"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_ADMIN__MAPPING: "opendeskProjectmanagementAdmin"
|
OPENPROJECT_SEED_LDAP_OPENDESK_ADMIN__MAPPING: "opendeskProjectmanagementAdmin"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_BASE: "dc=swp-ldap,dc=internal"
|
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_BASE: "dc=swp-ldap,dc=internal"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_FILTER: "(&(objectClass=opendeskProjectmanagementGroup)(opendeskProjectmanagementEnabled=TRUE))"
|
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_FILTER:
|
||||||
|
"(&(objectClass=opendeskProjectmanagementGroup)(opendeskProjectmanagementEnabled=TRUE))"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_SYNC__USERS: "true"
|
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_SYNC__USERS: "true"
|
||||||
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_GROUP__ATTRIBUTE: "cn"
|
OPENPROJECT_SEED_LDAP_OPENDESK_GROUPFILTER_OPENDESK_GROUP__ATTRIBUTE: "cn"
|
||||||
|
|
||||||
|
|||||||
@@ -1,7 +1,12 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# OX Connector
|
||||||
- name: "ox-connector-repo"
|
- name: "ox-connector-repo"
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
@@ -14,12 +19,9 @@ releases:
|
|||||||
values:
|
values:
|
||||||
- "values-oxconnector.yaml"
|
- "values-oxconnector.yaml"
|
||||||
- "values-oxconnector.gotmpl"
|
- "values-oxconnector.gotmpl"
|
||||||
condition: "oxConnector.enabled"
|
installed: {{ .Values.oxConnector.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-2"
|
deploy-stage: "component-2"
|
||||||
component: "provisioning"
|
component: "provisioning"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.oxConnector.repository }}"
|
repository: "{{ .Values.images.oxConnector.repository }}"
|
||||||
pullPolicy: "Always"
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
tag: "{{ .Values.images.oxConnector.tag }}"
|
tag: "{{ .Values.images.oxConnector.tag }}"
|
||||||
|
|
||||||
imagePullSecrets:
|
imagePullSecrets:
|
||||||
@@ -21,7 +21,7 @@ oxConnector:
|
|||||||
domainName: "{{ .Values.global.domain }}"
|
domainName: "{{ .Values.global.domain }}"
|
||||||
#oxMasterAdmin: "(( .Values.appsuite.core-mw.masterAdmin ))"
|
#oxMasterAdmin: "(( .Values.appsuite.core-mw.masterAdmin ))"
|
||||||
oxMasterAdmin: "admin"
|
oxMasterAdmin: "admin"
|
||||||
oxMasterPassword: "{{ .Values.secrets.oxAppsuite.adminPassword }}"
|
oxMasterPassword: {{ .Values.secrets.oxAppsuite.adminPassword | quote }}
|
||||||
oxSoapServer: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
oxSoapServer: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
oxDefaultContext: "1"
|
oxDefaultContext: "1"
|
||||||
|
|
||||||
|
|||||||
@@ -1,95 +1,144 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
- name: "sovereign-workplace-certificates-repo"
|
# openDesk Certificates
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-certificates
|
||||||
|
- name: "opendesk-certificates-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/133/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-certificates" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk PostgreSQL
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-postgresql
|
||||||
- name: "postgresql-repo"
|
- name: "postgresql-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/83/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/postgresql" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk MariaDB
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-mariadb
|
||||||
- name: "mariadb-repo"
|
- name: "mariadb-repo"
|
||||||
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/86/packages/helm/stable" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/mariadb" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Postfix
|
||||||
|
# https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-postfix
|
||||||
- name: "postfix-repo"
|
- name: "postfix-repo"
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/85/packages/helm/stable" }}
|
|
||||||
- name: "istio-resources-repo"
|
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/69/packages/helm/stable" }}
|
|
||||||
- name: "clamav-repo"
|
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/73/packages/helm/stable" }}
|
|
||||||
- name: "bitnami-repo"
|
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
default "registry-1.docker.io/bitnamicharts" }}
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/postfix" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk Istio Resources
|
||||||
|
# https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-istio-resources
|
||||||
|
- name: "istio-resources-repo"
|
||||||
|
oci: true
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/istio-ressources" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# openDesk ClamAV
|
||||||
|
# https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-clamav
|
||||||
|
- name: "clamav-repo"
|
||||||
|
oci: true
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/clamav" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
# VMWare Bitnami
|
||||||
|
# Source: https://github.com/bitnami/charts/
|
||||||
|
- name: "bitnami-repo"
|
||||||
|
oci: true
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
||||||
|
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/bitnami-charts" }}
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "sovereign-workplace-certificates"
|
- name: "opendesk-certificates"
|
||||||
chart: "sovereign-workplace-certificates-repo/sovereign-workplace-certificates"
|
chart: "opendesk-certificates-repo/opendesk-certificates"
|
||||||
version: "1.2.2"
|
version: "2.1.0"
|
||||||
values:
|
values:
|
||||||
- "values-certificates.gotmpl"
|
- "values-certificates.gotmpl"
|
||||||
condition: "certificates.enabled"
|
installed: {{ .Values.certificates.enabled }}
|
||||||
- name: "redis"
|
- name: "redis"
|
||||||
chart: "bitnami-repo/redis"
|
chart: "bitnami-repo/redis"
|
||||||
version: "17.9.3"
|
version: "18.1.2"
|
||||||
values:
|
values:
|
||||||
- "values-redis.gotmpl"
|
- "values-redis.gotmpl"
|
||||||
- "values-redis.yaml"
|
- "values-redis.yaml"
|
||||||
condition: "redis.enabled"
|
installed: {{ .Values.redis.enabled }}
|
||||||
|
- name: "memcached"
|
||||||
|
chart: "bitnami-repo/memcached"
|
||||||
|
version: "6.6.2"
|
||||||
|
values:
|
||||||
|
- "values-memcached.yaml"
|
||||||
|
- "values-memcached.gotmpl"
|
||||||
|
installed: {{ .Values.memcached.enabled }}
|
||||||
- name: "postgresql"
|
- name: "postgresql"
|
||||||
chart: "postgresql-repo/postgresql"
|
chart: "postgresql-repo/postgresql"
|
||||||
version: "2.0.0"
|
version: "2.0.2"
|
||||||
values:
|
values:
|
||||||
- "values-postgresql.yaml"
|
- "values-postgresql.yaml"
|
||||||
- "values-postgresql.gotmpl"
|
- "values-postgresql.gotmpl"
|
||||||
condition: "postgresql.enabled"
|
installed: {{ .Values.postgresql.enabled }}
|
||||||
|
timeout: 900
|
||||||
- name: "mariadb"
|
- name: "mariadb"
|
||||||
chart: "mariadb-repo/mariadb"
|
chart: "mariadb-repo/mariadb"
|
||||||
version: "2.0.0"
|
version: "2.0.2"
|
||||||
values:
|
values:
|
||||||
- "values-mariadb.yaml"
|
- "values-mariadb.yaml"
|
||||||
- "values-mariadb.gotmpl"
|
- "values-mariadb.gotmpl"
|
||||||
condition: "mariadb.enabled"
|
installed: {{ .Values.mariadb.enabled }}
|
||||||
|
timeout: 900
|
||||||
- name: "postfix"
|
- name: "postfix"
|
||||||
chart: "postfix-repo/postfix"
|
chart: "postfix-repo/postfix"
|
||||||
version: "1.13.0"
|
version: "2.0.3"
|
||||||
values:
|
values:
|
||||||
- "values-postfix.yaml"
|
- "values-postfix.yaml"
|
||||||
- "values-postfix.gotmpl"
|
- "values-postfix.gotmpl"
|
||||||
condition: "postfix.enabled"
|
installed: {{ .Values.postfix.enabled }}
|
||||||
- name: "clamav"
|
- name: "clamav"
|
||||||
chart: "clamav-repo/sovereign-workplace-clamav"
|
chart: "clamav-repo/opendesk-clamav"
|
||||||
version: "2.1.0"
|
version: "4.0.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-clamav-distributed.yaml"
|
||||||
- "values-clamav-distributed.gotmpl"
|
- "values-clamav-distributed.gotmpl"
|
||||||
condition: "clamavDistributed.enabled"
|
installed: {{ .Values.clamavDistributed.enabled }}
|
||||||
- name: "clamav-simple"
|
- name: "clamav-simple"
|
||||||
chart: "clamav-repo/clamav-simple"
|
chart: "clamav-repo/clamav-simple"
|
||||||
version: "2.1.0"
|
version: "4.0.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-clamav-simple.yaml"
|
||||||
- "values-clamav-simple.gotmpl"
|
- "values-clamav-simple.gotmpl"
|
||||||
condition: "clamavSimple.enabled"
|
installed: {{ .Values.clamavSimple.enabled }}
|
||||||
- name: "sovereign-workplace-gateway"
|
- name: "opendesk-gateway"
|
||||||
chart: "istio-resources-repo/istio-gateway"
|
chart: "istio-resources-repo/istio-gateway"
|
||||||
version: "1.1.2"
|
version: "2.0.0"
|
||||||
values:
|
values:
|
||||||
|
- "values-istio-gateway.yaml"
|
||||||
- "values-istio-gateway.gotmpl"
|
- "values-istio-gateway.gotmpl"
|
||||||
condition: "istio.enabled"
|
installed: {{ .Values.istio.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "services"
|
deploy-stage: "services"
|
||||||
component: "services"
|
component: "services"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -18,4 +18,9 @@ istio:
|
|||||||
issuerRef:
|
issuerRef:
|
||||||
name: "{{ .Values.istio.issuerRef.name }}"
|
name: "{{ .Values.istio.issuerRef.name }}"
|
||||||
{{- end }}
|
{{- end }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
keepRessourceOnDelete: {{ .Values.cleanup.keepRessourceOnDelete }}
|
||||||
|
|
||||||
|
wildcard: {{ .Values.certificate.wildcard }}
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -5,25 +5,23 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
---
|
---
|
||||||
clamd:
|
clamd:
|
||||||
podSecurityContext:
|
podSecurityContext:
|
||||||
{{/* Disabled until NFS Provisioner on IONOS is fixed */}}
|
|
||||||
enabled: false
|
|
||||||
replicaCount: {{ .Values.replicas.clamd }}
|
replicaCount: {{ .Values.replicas.clamd }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.clamd.repository }}"
|
repository: "{{ .Values.images.clamd.repository }}"
|
||||||
tag: "{{ .Values.images.clamd.tag }}"
|
tag: "{{ .Values.images.clamd.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.clamd | toYaml | nindent 4 }}
|
{{ .Values.resources.clamd | toYaml | nindent 4 }}
|
||||||
|
|
||||||
freshclam:
|
freshclam:
|
||||||
podSecurityContext:
|
podSecurityContext:
|
||||||
{{/* Disabled until NFS Provisioner on IONOS is fixed */}}
|
|
||||||
enabled: false
|
|
||||||
replicaCount: {{ .Values.replicas.freshclam }}
|
replicaCount: {{ .Values.replicas.freshclam }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.freshclam.repository }}"
|
repository: "{{ .Values.images.freshclam.repository }}"
|
||||||
tag: "{{ .Values.images.freshclam.tag }}"
|
tag: "{{ .Values.images.freshclam.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.freshclam | toYaml | nindent 4 }}
|
{{ .Values.resources.freshclam | toYaml | nindent 4 }}
|
||||||
|
|
||||||
@@ -37,18 +35,18 @@ icap:
|
|||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.icap.repository }}"
|
repository: "{{ .Values.images.icap.repository }}"
|
||||||
tag: "{{ .Values.images.icap.tag }}"
|
tag: "{{ .Values.images.icap.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.icap | toYaml | nindent 4 }}
|
{{ .Values.resources.icap | toYaml | nindent 4 }}
|
||||||
|
|
||||||
milter:
|
milter:
|
||||||
podSecurityContext:
|
podSecurityContext:
|
||||||
{{/* Disabled until NFS Provisioner on IONOS is fixed */}}
|
|
||||||
enabled: false
|
|
||||||
replicaCount: {{ .Values.replicas.milter }}
|
replicaCount: {{ .Values.replicas.milter }}
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.milter.repository }}"
|
repository: "{{ .Values.images.milter.repository }}"
|
||||||
tag: "{{ .Values.images.milter.tag }}"
|
tag: "{{ .Values.images.milter.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.milter | toYaml | nindent 4 }}
|
{{ .Values.resources.milter | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
|||||||
80
helmfile/apps/services/values-clamav-distributed.yaml
Normal file
80
helmfile/apps/services/values-clamav-distributed.yaml
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
enabled: true
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
|
||||||
|
clamd:
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
|
||||||
|
freshclam:
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
|
||||||
|
icap:
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
|
||||||
|
milter:
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
...
|
||||||
@@ -3,11 +3,6 @@ SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG Ze
|
|||||||
SPDX-License-Identifier: Apache-2.0
|
SPDX-License-Identifier: Apache-2.0
|
||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
|
|
||||||
podSecurityContext:
|
|
||||||
{{/* Disabled until NFS Provisioner on IONOS is fixed */}}
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.clamav }}
|
replicaCount: {{ .Values.replicas.clamav }}
|
||||||
|
|
||||||
image:
|
image:
|
||||||
@@ -15,10 +10,12 @@ image:
|
|||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.clamd.repository }}"
|
repository: "{{ .Values.images.clamd.repository }}"
|
||||||
tag: "{{ .Values.images.clamd.tag }}"
|
tag: "{{ .Values.images.clamd.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
icap:
|
icap:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.icap.repository }}"
|
repository: "{{ .Values.images.icap.repository }}"
|
||||||
tag: "{{ .Values.images.icap.tag }}"
|
tag: "{{ .Values.images.icap.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.clamd | toYaml | nindent 4 }}
|
{{ .Values.resources.clamd | toYaml | nindent 4 }}
|
||||||
|
|||||||
19
helmfile/apps/services/values-clamav-simple.yaml
Normal file
19
helmfile/apps/services/values-clamav-simple.yaml
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 100
|
||||||
|
runAsGroup: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
...
|
||||||
@@ -6,7 +6,7 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
global:
|
global:
|
||||||
domain: "{{ .Values.istio.domain }}"
|
domain: "{{ .Values.istio.domain }}"
|
||||||
hosts:
|
hosts:
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
openxchange: "{{ .Values.global.hosts.openxchange }}"
|
||||||
|
|
||||||
tls:
|
tls:
|
||||||
secretName: "{{ .Values.istio.domain }}-tls"
|
secretName: "{{ .Values.istio.domain }}-tls"
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
cleanup:
|
tls:
|
||||||
deletePodsOnSuccess: true
|
httpsRedirect: false
|
||||||
...
|
...
|
||||||
@@ -11,17 +11,18 @@ global:
|
|||||||
image:
|
image:
|
||||||
repository: "{{ .Values.images.mariadb.repository }}"
|
repository: "{{ .Values.images.mariadb.repository }}"
|
||||||
tag: "{{ .Values.images.mariadb.tag }}"
|
tag: "{{ .Values.images.mariadb.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
# Open-Xchange and XWiki require the permission to create database schemas, so they use the `root` account anyway.
|
# Open-Xchange and XWiki require the permission to create database schemas, so they use the `root` account anyway.
|
||||||
# Please refer to `databases.yaml` for details.
|
# Please refer to `databases.yaml` for details.
|
||||||
job:
|
job:
|
||||||
users:
|
users:
|
||||||
- username: "xwiki_user"
|
- username: "xwiki_user"
|
||||||
password: "{{ .Values.secrets.mariadb.xwikiUser }}"
|
password: {{ .Values.secrets.mariadb.xwikiUser | quote }}
|
||||||
- username: "openxchange_user"
|
- username: "openxchange_user"
|
||||||
password: "{{ .Values.secrets.mariadb.openxchangeUser }}"
|
password: {{ .Values.secrets.mariadb.openxchangeUser | quote }}
|
||||||
- username: "nextcloud_user"
|
- username: "nextcloud_user"
|
||||||
password: "{{ .Values.secrets.mariadb.nextcloudUser }}"
|
password: {{ .Values.secrets.mariadb.nextcloudUser | quote}}
|
||||||
databases:
|
databases:
|
||||||
- name: "xwiki"
|
- name: "xwiki"
|
||||||
user: "xwiki_user"
|
user: "xwiki_user"
|
||||||
@@ -31,7 +32,7 @@ job:
|
|||||||
user: "openxchange_user"
|
user: "openxchange_user"
|
||||||
|
|
||||||
mariadb:
|
mariadb:
|
||||||
rootPassword: "{{ .Values.secrets.mariadb.rootPassword }}"
|
rootPassword: {{ .Values.secrets.mariadb.rootPassword | quote }}
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
||||||
|
|||||||
@@ -1,6 +1,25 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 1001
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
job:
|
job:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 1001
|
||||||
|
fsGroupChangePolicy: "OnRootMismatch"
|
||||||
...
|
...
|
||||||
|
|||||||
19
helmfile/apps/services/values-memcached.gotmpl
Normal file
19
helmfile/apps/services/values-memcached.gotmpl
Normal file
@@ -0,0 +1,19 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.memcached.repository }}"
|
||||||
|
tag: "{{ .Values.images.memcached.tag }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.memcached | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
18
helmfile/apps/services/values-memcached.yaml
Normal file
18
helmfile/apps/services/values-memcached.yaml
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsNonRoot: true
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
|
||||||
|
serviceAccount:
|
||||||
|
create: true
|
||||||
|
...
|
||||||
@@ -3,14 +3,16 @@ SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG Ze
|
|||||||
SPDX-License-Identifier: Apache-2.0
|
SPDX-License-Identifier: Apache-2.0
|
||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
image:
|
global:
|
||||||
url: "{{ .Values.global.imageRegistry }}/{{ .Values.images.postfix.repository }}"
|
registry: {{ .Values.global.imageRegistry }}
|
||||||
digest: "{{ .Values.images.postfix.digest }}"
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
imagePullSecrets:
|
image:
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
registry: {{ .Values.global.imageRegistry }}
|
||||||
- name: {{ . }}
|
repository: "{{ .Values.images.postfix.repository }}"
|
||||||
{{- end }}
|
tag: "{{ .Values.images.postfix.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
certificate:
|
certificate:
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|||||||
@@ -5,6 +5,19 @@ certificate:
|
|||||||
request:
|
request:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: true
|
||||||
|
capabilities: {}
|
||||||
|
enabled: true
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsNonRoot: false
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
postfix:
|
postfix:
|
||||||
hostname: "postfix"
|
hostname: "postfix"
|
||||||
inetProtocols: "ipv4"
|
inetProtocols: "ipv4"
|
||||||
|
|||||||
@@ -11,19 +11,20 @@ global:
|
|||||||
image:
|
image:
|
||||||
repository: "{{ .Values.images.postgresql.repository }}"
|
repository: "{{ .Values.images.postgresql.repository }}"
|
||||||
tag: "{{ .Values.images.postgresql.tag }}"
|
tag: "{{ .Values.images.postgresql.tag }}"
|
||||||
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
job:
|
job:
|
||||||
users:
|
users:
|
||||||
- username: "keycloak_user"
|
- username: "keycloak_user"
|
||||||
password: {{ .Values.secrets.postgresql.keycloakUser }}
|
password: {{ .Values.secrets.postgresql.keycloakUser | quote }}
|
||||||
- username: "openproject_user"
|
- username: "openproject_user"
|
||||||
password: {{ .Values.secrets.postgresql.openprojectUser }}
|
password: {{ .Values.secrets.postgresql.openprojectUser | quote }}
|
||||||
- username: "keycloak_extensions_user"
|
- username: "keycloak_extensions_user"
|
||||||
password: {{ .Values.secrets.postgresql.keycloakExtensionUser }}
|
password: {{ .Values.secrets.postgresql.keycloakExtensionUser | quote }}
|
||||||
- username: "matrix_user"
|
- username: "matrix_user"
|
||||||
password: {{ .Values.secrets.postgresql.matrixUser }}
|
password: {{ .Values.secrets.postgresql.matrixUser | quote }}
|
||||||
- username: "notificationsapi_user"
|
- username: "notificationsapi_user"
|
||||||
password: {{ .Values.secrets.postgresql.notificationsapiUser }}
|
password: {{ .Values.secrets.postgresql.notificationsapiUser | quote }}
|
||||||
databases:
|
databases:
|
||||||
- name: "keycloak"
|
- name: "keycloak"
|
||||||
user: "keycloak_user"
|
user: "keycloak_user"
|
||||||
@@ -42,7 +43,7 @@ persistence:
|
|||||||
size: "{{ .Values.persistence.size.postgresql }}"
|
size: "{{ .Values.persistence.size.postgresql }}"
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
password: {{ .Values.secrets.postgresql.postgresUser }}
|
password: {{ .Values.secrets.postgresql.postgresUser | quote }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.postgresql | toYaml | nindent 2 }}
|
{{ .Values.resources.postgresql | toYaml | nindent 2 }}
|
||||||
|
|||||||
@@ -1,11 +1,29 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
enabled: true
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 1001
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
job:
|
job:
|
||||||
image:
|
image:
|
||||||
digest: "sha256:de7451b563ef79eb6acb2851dbadd18388e6436cd757b65d275a3dc60dbb0b73"
|
digest: "sha256:de7451b563ef79eb6acb2851dbadd18388e6436cd757b65d275a3dc60dbb0b73"
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 1001
|
||||||
|
fsGroupChangePolicy: "OnRootMismatch"
|
||||||
|
|
||||||
|
|
||||||
postgres:
|
postgres:
|
||||||
user: "postgres"
|
user: "postgres"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
*/}}
|
*/}}
|
||||||
---
|
---
|
||||||
auth:
|
auth:
|
||||||
password: {{ .Values.secrets.redis.password }}
|
password: {{ .Values.secrets.redis.password | quote }}
|
||||||
|
|
||||||
global:
|
global:
|
||||||
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
||||||
@@ -16,6 +16,7 @@ image:
|
|||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
repository: "{{ .Values.images.redis.repository }}"
|
repository: "{{ .Values.images.redis.repository }}"
|
||||||
tag: "{{ .Values.images.redis.tag }}"
|
tag: "{{ .Values.images.redis.tag }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
|
||||||
master:
|
master:
|
||||||
persistence:
|
persistence:
|
||||||
|
|||||||
@@ -8,4 +8,8 @@ sentinel:
|
|||||||
|
|
||||||
metrics:
|
metrics:
|
||||||
enabled: false
|
enabled: false
|
||||||
|
|
||||||
|
master:
|
||||||
|
containerSecurityContext:
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,11 +1,21 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
---
|
---
|
||||||
repositories:
|
repositories:
|
||||||
|
# openDesk Univention Corporate Server (as eval Container)
|
||||||
- name: "univention-corporate-container-repo"
|
- name: "univention-corporate-container-repo"
|
||||||
|
oci: true
|
||||||
|
# yamllint disable rule:line-length
|
||||||
url: >-
|
url: >-
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/132/packages/helm/stable" }}
|
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/univention-corporate-container" }}
|
||||||
|
# yamllint enable rule:line-length
|
||||||
|
verify: true
|
||||||
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "univention-corporate-container"
|
- name: "univention-corporate-container"
|
||||||
@@ -14,12 +24,9 @@ releases:
|
|||||||
values:
|
values:
|
||||||
- "values.yaml"
|
- "values.yaml"
|
||||||
- "values.gotmpl"
|
- "values.gotmpl"
|
||||||
condition: "univentionCorporateServer.enabled"
|
installed: {{ .Values.univentionCorporateServer.enabled }}
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "univention-corporate-container"
|
component: "univention-corporate-container"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -13,7 +13,7 @@ global:
|
|||||||
|
|
||||||
image:
|
image:
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
imagePullPolicy: "Always"
|
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
repository: "{{ .Values.images.univentionCorporateServer.repository }}"
|
repository: "{{ .Values.images.univentionCorporateServer.repository }}"
|
||||||
tag: "{{ .Values.images.univentionCorporateServer.tag }}"
|
tag: "{{ .Values.images.univentionCorporateServer.tag }}"
|
||||||
|
|
||||||
@@ -37,31 +37,31 @@ extraEnvVars:
|
|||||||
- name: LDAPSEARCH_OX_USERNAME
|
- name: LDAPSEARCH_OX_USERNAME
|
||||||
value: "ldapsearch_ox"
|
value: "ldapsearch_ox"
|
||||||
- name: LDAPSEARCH_OX_PASSWORD
|
- name: LDAPSEARCH_OX_PASSWORD
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.ox }}
|
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.ox | quote }}
|
||||||
- name: LDAPSEARCH_DOVECOT_USERNAME
|
- name: LDAPSEARCH_DOVECOT_USERNAME
|
||||||
value: "ldapsearch_dovecot"
|
value: "ldapsearch_dovecot"
|
||||||
- name: LDAPSEARCH_DOVECOT_PASSWORD
|
- name: LDAPSEARCH_DOVECOT_PASSWORD
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.dovecot }}
|
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.dovecot | quote }}
|
||||||
- name: LDAPSEARCH_KEYCLOAK_USERNAME
|
- name: LDAPSEARCH_KEYCLOAK_USERNAME
|
||||||
value: "ldapsearch_keycloak"
|
value: "ldapsearch_keycloak"
|
||||||
- name: LDAPSEARCH_KEYCLOAK_PASSWORD
|
- name: LDAPSEARCH_KEYCLOAK_PASSWORD
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.keycloak }}
|
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.keycloak | quote }}
|
||||||
- name: LDAPSEARCH_NEXTCLOUD_USERNAME
|
- name: LDAPSEARCH_NEXTCLOUD_USERNAME
|
||||||
value: "ldapsearch_nextcloud"
|
value: "ldapsearch_nextcloud"
|
||||||
- name: LDAPSEARCH_NEXTCLOUD_PASSWORD
|
- name: LDAPSEARCH_NEXTCLOUD_PASSWORD
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.nextcloud }}
|
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.nextcloud | quote }}
|
||||||
- name: LDAPSEARCH_OPENPROJECT_USERNAME
|
- name: LDAPSEARCH_OPENPROJECT_USERNAME
|
||||||
value: "ldapsearch_openproject"
|
value: "ldapsearch_openproject"
|
||||||
- name: LDAPSEARCH_OPENPROJECT_PASSWORD
|
- name: LDAPSEARCH_OPENPROJECT_PASSWORD
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.openproject }}
|
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.openproject | quote }}
|
||||||
- name: LDAPSEARCH_XWIKI_USERNAME
|
- name: LDAPSEARCH_XWIKI_USERNAME
|
||||||
value: "ldapsearch_xwiki"
|
value: "ldapsearch_xwiki"
|
||||||
- name: LDAPSEARCH_XWIKI_PASSWORD
|
- name: LDAPSEARCH_XWIKI_PASSWORD
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.xwiki }}
|
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.xwiki | quote }}
|
||||||
- name: DEFAULT_ACCOUNT_USER_PASSWORD
|
- name: DEFAULT_ACCOUNT_USER_PASSWORD
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.defaultAccounts.userPassword }}
|
value: {{ .Values.secrets.univentionCorporateServer.defaultAccounts.userPassword | quote }}
|
||||||
- name: DEFAULT_ACCOUNT_ADMIN_PASSWORD
|
- name: DEFAULT_ACCOUNT_ADMIN_PASSWORD
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.defaultAccounts.adminPassword }}
|
value: {{ .Values.secrets.univentionCorporateServer.defaultAccounts.adminPassword | quote }}
|
||||||
|
|
||||||
resources:
|
resources:
|
||||||
{{ .Values.resources.univentionCorporateServer | toYaml | nindent 2 }}
|
{{ .Values.resources.univentionCorporateServer | toYaml | nindent 2 }}
|
||||||
|
|||||||
120
helmfile/apps/univention-management-stack/helmfile.yaml
Normal file
120
helmfile/apps/univention-management-stack/helmfile.yaml
Normal file
@@ -0,0 +1,120 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
|
||||||
|
---
|
||||||
|
repositories:
|
||||||
|
# Univention Management Stack
|
||||||
|
- name: "ums-repo"
|
||||||
|
url: >-
|
||||||
|
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
||||||
|
default "https://gitlab.souvap-univention.de/api/v4/projects/155/packages/helm/stable" }}
|
||||||
|
|
||||||
|
releases:
|
||||||
|
- name: "ums-store-dav"
|
||||||
|
chart: "ums-repo/store-dav"
|
||||||
|
version: "0.2.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-store-dav.gotmpl"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-ldap-server"
|
||||||
|
chart: "ums-repo/ldap-server"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-ldap-server.gotmpl"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-ldap-notifier"
|
||||||
|
chart: "ums-repo/ldap-notifier"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-ldap-notifier.gotmpl"
|
||||||
|
- "values-ldap-notifier.yaml"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-udm-rest-api"
|
||||||
|
chart: "ums-repo/udm-rest-api"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-udm-rest-api.gotmpl"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-stack-data-ums"
|
||||||
|
chart: "ums-repo/stack-data-ums"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-stack-data-ums.gotmpl"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-stack-data-swp"
|
||||||
|
chart: "ums-repo/stack-data-swp"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-stack-data-swp.gotmpl"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-portal-server"
|
||||||
|
chart: "ums-repo/portal-server"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-portal-server.gotmpl"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-notifications-api"
|
||||||
|
chart: "ums-repo/notifications-api"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-notifications-api.gotmpl"
|
||||||
|
- "values-notifications-api.yaml"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-portal-listener"
|
||||||
|
chart: "ums-repo/portal-listener"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-portal-listener.gotmpl"
|
||||||
|
- "values-portal-listener.yaml"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-portal-frontend"
|
||||||
|
chart: "ums-repo/portal-frontend"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-portal-frontend.gotmpl"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-umc-gateway"
|
||||||
|
chart: "ums-repo/umc-gateway"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-umc-gateway.gotmpl"
|
||||||
|
- "values-umc-gateway.yaml"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
- name: "ums-umc-server"
|
||||||
|
chart: "ums-repo/umc-server"
|
||||||
|
version: "0.1.0"
|
||||||
|
values:
|
||||||
|
- "values-common.gotmpl"
|
||||||
|
- "values-common.yaml"
|
||||||
|
- "values-umc-server.gotmpl"
|
||||||
|
installed: {{ .Values.univentionManagementStack.enabled }}
|
||||||
|
|
||||||
|
commonLabels:
|
||||||
|
deploy-stage: "component-1"
|
||||||
|
component: "univention-management-stack"
|
||||||
|
...
|
||||||
@@ -0,0 +1,14 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
host: "{{ .Values.global.hosts.univentionManagementStack }}.{{ .Values.global.domain }}"
|
||||||
|
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
||||||
|
tls:
|
||||||
|
# The TLS configuration is on the "master" Ingress, see "portal-frontend"
|
||||||
|
enabled: false
|
||||||
|
secretName: ""
|
||||||
@@ -1,8 +1,6 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
|
||||||
istio:
|
istio:
|
||||||
enabled: false
|
enabled: false
|
||||||
virtualService:
|
|
||||||
enabled: false
|
|
||||||
...
|
|
||||||
@@ -0,0 +1,20 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsLdapNotifier.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsLdapNotifier.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsLdapNotifier | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,10 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
|
||||||
|
volumes:
|
||||||
|
claims:
|
||||||
|
shared-data: "shared-data-ums-ldap-server-0"
|
||||||
|
shared-run: "shared-run-ums-ldap-server-0"
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,44 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
ldapServer:
|
||||||
|
ldapSecret: "{{ .Values.secrets.univentionManagementStack.ldapSecret }}"
|
||||||
|
ldapBaseDn: "dc=swp-ldap,dc=internal"
|
||||||
|
|
||||||
|
# TODO: Certificates handling
|
||||||
|
# caCert: ""
|
||||||
|
# certPem: ""
|
||||||
|
# privateKey: ""
|
||||||
|
# dhParam: ""
|
||||||
|
tlsMode: "off"
|
||||||
|
|
||||||
|
# TODO: SAML integration
|
||||||
|
# samlMetadataUrl: "http://localhost:8097/realms/ucs/protocol/saml/descriptor"
|
||||||
|
# samlMetadataUrlInternal: "http://keycloak.default/realms/ucs/protocol/saml/descriptor"
|
||||||
|
# serviceProviders: "http://localhost:8000/univention/saml/metadata,http://localhost:8000/auth/realms/ucs"
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsLdapServer.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsLdapServer.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# TODO: Pending upstream support, #199
|
||||||
|
persistence:
|
||||||
|
data:
|
||||||
|
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
||||||
|
size: "{{ .Values.persistence.size.univentionManagementStack.ldapServerData }}"
|
||||||
|
shared:
|
||||||
|
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
||||||
|
size: "{{ .Values.persistence.size.univentionManagementStack.ldapServerShared }}"
|
||||||
|
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsLdapServer | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,28 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
postgresql:
|
||||||
|
bundled: false
|
||||||
|
connection:
|
||||||
|
host: "postgresql"
|
||||||
|
port: 5432
|
||||||
|
auth:
|
||||||
|
username: "notificationsapi_user"
|
||||||
|
database: "notificationsapi"
|
||||||
|
password: {{ .Values.secrets.postgresql.notificationsapiUser | quote }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsNotificationsApi.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsNotificationsApi.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsNotificationsApi | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,12 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
notificationsapi:
|
||||||
|
apply_database_migrations: "True"
|
||||||
|
dev_mode: "False"
|
||||||
|
environment: "staging"
|
||||||
|
log_level: "DEBUG"
|
||||||
|
sql_echo: "False"
|
||||||
|
api_prefix: "/univention/portal/notifications-api"
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,31 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsPortalFrontend.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsPortalFrontend.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
extraIngresses:
|
||||||
|
redirects:
|
||||||
|
# The TLS configuration is on the "master" Ingress, see below.
|
||||||
|
tls:
|
||||||
|
enabled: false
|
||||||
|
master:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: "{{ .Values.ingress.tls.secretName }}"
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsPortalFrontend | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,54 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
portalListener:
|
||||||
|
adminGroup: "cn=Domain Admins,cn=groups,dc=swp-ldap,dc=internal"
|
||||||
|
environment: "staging"
|
||||||
|
debugLevel: "4"
|
||||||
|
assetsRoot: "http://portal-listener:{{ .Values.secrets.univentionManagementStack.storeDavUsers.portalListener }}@ums-store-dav/portal-assets/"
|
||||||
|
ucsInternalUrl: "http://portal-listener:{{ .Values.secrets.univentionManagementStack.storeDavUsers.portalListener }}@ums-store-dav/portal-data/"
|
||||||
|
umcGetUrl: "http://ums-umc-server/get"
|
||||||
|
umcSessionUrl: "http://ums-umc-server/get/session-info"
|
||||||
|
|
||||||
|
ldapBaseDn: "dc=swp-ldap,dc=internal"
|
||||||
|
ldapHost: "ums-ldap-server"
|
||||||
|
ldapHostDn: "cn=admin,dc=swp-ldap,dc=internal"
|
||||||
|
ldapSecret: "{{ .Values.secrets.univentionManagementStack.ldapSecret }}"
|
||||||
|
machineSecret: "{{ .Values.secrets.univentionManagementStack.ldapSecret }}"
|
||||||
|
notifierServer: "ums-ldap-notifier"
|
||||||
|
portalDefaultDn: "cn=domain,cn=portal,cn=portals,cn=univention,dc=swp-ldap,dc=internal"
|
||||||
|
udmApiUrl: "http://ums-udm-rest-api/udm/"
|
||||||
|
udmApiUsername: "cn=admin"
|
||||||
|
|
||||||
|
tlsMode: "off"
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsPortalListener.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsPortalListener.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
waitForDependency:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsWaitForDependency.repository }}"
|
||||||
|
imagePullPolicy: "Always"
|
||||||
|
tag: "{{ .Values.images.umsWaitForDependency.tag }}"
|
||||||
|
|
||||||
|
# TODO: Pending upstream support, #200
|
||||||
|
persistence:
|
||||||
|
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
||||||
|
size: "{{ .Values.persistence.size.univentionManagementStack.portalListener }}"
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsPortalListener | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
resourcesDependencyWaiter:
|
||||||
|
{{ .Values.resources.umsPortalListenerDependencies | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,8 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
|
||||||
|
store-dav:
|
||||||
|
bundled: false
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,28 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
portalServer:
|
||||||
|
adminGroup: "cn=Domain Admins,cn=groups,dc=swp-ldap,dc=internal"
|
||||||
|
authMode: "saml"
|
||||||
|
environment: "staging"
|
||||||
|
editable: "true"
|
||||||
|
logLevel: "DEBUG"
|
||||||
|
ucsInternalUrl: "http://portal-server:{{ .Values.secrets.univentionManagementStack.storeDavUsers.portalServer }}@ums-store-dav/portal-data"
|
||||||
|
umcGetUrl: "http://ums-umc-server/get"
|
||||||
|
umcSessionUrl: "http://ums-umc-server/get/session-info"
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsPortalServer.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsPortalServer.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsPortalServer | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,38 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
stackDataSwp:
|
||||||
|
udmApiUsername: "cn=admin"
|
||||||
|
udmApiPassword: {{ .Values.secrets.univentionManagementStack.ldapSecret | quote }}
|
||||||
|
udmApiUrl: "http://ums-udm-rest-api/udm/"
|
||||||
|
loadDevData: true
|
||||||
|
|
||||||
|
stackDataContext:
|
||||||
|
ldapBase: "dc=swp-ldap,dc=internal"
|
||||||
|
externalDomainName: "{{ .Values.global.domain }}"
|
||||||
|
externalMailDomain: "{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
portalGroupwareLinkBase: "https://webmail.{{ .Values.istio.domain }}"
|
||||||
|
portalFileshareLinkBase: "https://fs.{{ .Values.global.domain }}"
|
||||||
|
portalRealtimeCollaborationLinkBase: "https://chat.{{ .Values.global.domain }}"
|
||||||
|
portalRealtimeVideoconferenceLinkBase: "https://meet.{{ .Values.global.domain }}"
|
||||||
|
portalManagementProjectLinkBase: "https://project.{{ .Values.global.domain }}"
|
||||||
|
portalManagementKnowledgeLinkBase: "https://wiki.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
oxDefaultContext: "10"
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsDataLoader.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsDataLoader.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsStackDataSwp | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,31 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
stackDataUms:
|
||||||
|
udmApiUser: "cn=admin"
|
||||||
|
udmApiPassword: {{ .Values.secrets.univentionManagementStack.ldapSecret | quote }}
|
||||||
|
udmApiUrl: "http://ums-udm-rest-api/udm/"
|
||||||
|
loadDevData: true
|
||||||
|
|
||||||
|
stackDataContext:
|
||||||
|
ldapBase: "dc=swp-ldap,dc=internal"
|
||||||
|
initialPasswordAdministrator: {{ .Values.secrets.univentionManagementStack.defaultAccounts.administratorPassword | quote }}
|
||||||
|
|
||||||
|
# The SWP configuration brings its own UMC policies.
|
||||||
|
installUmcPolicies: false
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsDataLoader.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsDataLoader.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsStackDataUms | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,39 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
storeDav:
|
||||||
|
auth:
|
||||||
|
basicAuth:
|
||||||
|
portal-listener: "{{ .Values.secrets.univentionManagementStack.storeDavUsers.portalListener }}"
|
||||||
|
portal-server: "{{ .Values.secrets.univentionManagementStack.storeDavUsers.portalServer }}"
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsStoreDav.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsStoreDav.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
configHtpasswd:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsConfigHtpasswd.repository }}"
|
||||||
|
pullPolicy: "Always"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsConfigHtpasswd.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
# TODO: Pending upstream support, #201
|
||||||
|
persistence:
|
||||||
|
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
||||||
|
size: "{{ .Values.persistence.size.univentionManagementStack.storeDav }}"
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsStoreDav | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,44 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
udmRestApi:
|
||||||
|
apiLogLevel: "4"
|
||||||
|
authGroups:
|
||||||
|
dcBackup: "cn=DC Backup Hosts,cn=groups,dc=swp-ldap,dc=internal"
|
||||||
|
dcSlaves: "cn=DC Slave Hosts,cn=groups,dc=swp-ldap,dc=internal"
|
||||||
|
domainAdmins: "cn=Domain Admins,cn=groups,dc=swp-ldap,dc=internal"
|
||||||
|
ldapHost: "ums-ldap-server"
|
||||||
|
ldapBaseDn: "dc=swp-ldap,dc=internal"
|
||||||
|
# TODO: This should not be required, the machine account is not there
|
||||||
|
# ldapHostDn: cn=stub-value,cn=dc,cn=computers,dc=swp-ldap,dc=internal
|
||||||
|
ldapHostDn: "cn=admin,dc=swp-ldap,dc=internal"
|
||||||
|
# TODO: Secret should be entered without b64enc
|
||||||
|
ldapSecret: "{{ .Values.secrets.univentionManagementStack.ldapSecret | b64enc }}"
|
||||||
|
# TODO: Secret should be entered without b64enc
|
||||||
|
machineSecret: "{{ .Values.secrets.univentionManagementStack.ldapSecret | b64enc }}"
|
||||||
|
# TODO: why do we need this many subprocesses?
|
||||||
|
numberOfSubprocesses: 8
|
||||||
|
# TODO: Stub value currently
|
||||||
|
caCert: ""
|
||||||
|
# TODO: This should not be part of the udm-rest-api anymore
|
||||||
|
loadJoinData:
|
||||||
|
enabled: true
|
||||||
|
# TODO: configurable
|
||||||
|
tlsMode: "off"
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsUdmRestApi.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsUdmRestApi.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsUdmRestApi | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,23 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
umcGateway:
|
||||||
|
domainname: "{{ .Values.global.domain }}"
|
||||||
|
hostname: "{{ .Values.global.hosts.univentionManagementStack }}"
|
||||||
|
ssoFqdn: "localhost:8097"
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: "{{ .Values.global.imageRegistry }}"
|
||||||
|
repository: "{{ .Values.images.umsUmcGateway.repository }}"
|
||||||
|
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
||||||
|
tag: "{{ .Values.images.umsUmcGateway.tag }}"
|
||||||
|
pullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.umsUmcGateway | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user