mirror of
https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk.git
synced 2025-12-06 15:31:38 +01:00
Compare commits
343 Commits
v0.5.1
...
refactor/u
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
4a23e39b6a | ||
|
|
81ed9d9094 | ||
|
|
9df91c4ee4 | ||
|
|
5f9036bd64 | ||
|
|
c395d35dd7 | ||
|
|
cb33a929ef | ||
|
|
f94e9c4930 | ||
|
|
5f9d015f0b | ||
|
|
7cc39647d8 | ||
|
|
8c97bcf994 | ||
|
|
5a39e8725b | ||
|
|
34d2c05959 | ||
|
|
42f63e3992 | ||
|
|
81105d1e94 | ||
|
|
a41ddd5451 | ||
|
|
8e889db63e | ||
|
|
5ebf291a4d | ||
|
|
d565c057dd | ||
|
|
50e263866b | ||
|
|
0fd4a26c71 | ||
|
|
0aa4cfb46f | ||
|
|
391d959630 | ||
|
|
9c32058fcc | ||
|
|
bc18724d70 | ||
|
|
011ad2cd6b | ||
|
|
ee99eefb72 | ||
|
|
a2b333b462 | ||
|
|
7ee9e47e82 | ||
|
|
d677ca5691 | ||
|
|
31e5cf317c | ||
|
|
410a023714 | ||
|
|
8b065fd9d7 | ||
|
|
f4b8226ea1 | ||
|
|
2023d5bce4 | ||
|
|
8807b24ce0 | ||
|
|
d4442261aa | ||
|
|
2efceef076 | ||
|
|
7ec123b9a1 | ||
|
|
3d31127a6a | ||
|
|
de190bfb7d | ||
|
|
bc6e4f8e5d | ||
|
|
a398e5aaf1 | ||
|
|
57d0f61b2c | ||
|
|
d9263c9011 | ||
|
|
d9c23bdf0b | ||
|
|
c2f62f7c94 | ||
|
|
d087b979fe | ||
|
|
b1b4c28618 | ||
|
|
a3e415d575 | ||
|
|
17fa80d20a | ||
|
|
13dcb00441 | ||
|
|
43718b8da2 | ||
|
|
47d6a8d53f | ||
|
|
8b50347bfa | ||
|
|
b525a814fc | ||
|
|
83ac645fae | ||
|
|
f2b8acfba8 | ||
|
|
49f126d169 | ||
|
|
02d04faa2a | ||
|
|
c2087efcf9 | ||
|
|
affa92cde2 | ||
|
|
d9e07ff7bd | ||
|
|
01599022f1 | ||
|
|
bc7eeb8c9d | ||
|
|
1396071865 | ||
|
|
7c9f38f06e | ||
|
|
7ebbd03bdc | ||
|
|
110ff56f74 | ||
|
|
c0fc225349 | ||
|
|
56f5e35895 | ||
|
|
ba0824bac3 | ||
|
|
250ef2bc3f | ||
|
|
d2b1f0b07b | ||
|
|
8f83261986 | ||
|
|
5d95e7ab2a | ||
|
|
ee1a337ab5 | ||
|
|
41bc09ee49 | ||
|
|
acaec3b8ac | ||
|
|
6c15dc1d66 | ||
|
|
2909e1d821 | ||
|
|
cabee0c9da | ||
|
|
c16c0ac795 | ||
|
|
6f0b1f37fc | ||
|
|
fd2a66f8f2 | ||
|
|
dd535daac0 | ||
|
|
3bcdcd06b7 | ||
|
|
f05acb57c9 | ||
|
|
bea1413b86 | ||
|
|
af63e5c18d | ||
|
|
cbb33b922d | ||
|
|
02f41a2f1a | ||
|
|
e778a59cdd | ||
|
|
67f7c05038 | ||
|
|
89c149af95 | ||
|
|
3630f583b5 | ||
|
|
a99f3389dc | ||
|
|
a49daa6fa2 | ||
|
|
db0a544155 | ||
|
|
77e32fada8 | ||
|
|
acbef3ae3e | ||
|
|
bb289d545e | ||
|
|
2d2455fdb3 | ||
|
|
0bf059e8e1 | ||
|
|
0492420d60 | ||
|
|
8f09740677 | ||
|
|
969c42a590 | ||
|
|
7daa93f061 | ||
|
|
452624ce74 | ||
|
|
b23152bb20 | ||
|
|
78993e122b | ||
|
|
87b6fcfc37 | ||
|
|
4945c13d05 | ||
|
|
08754cc527 | ||
|
|
45967c7a0b | ||
|
|
acf6816653 | ||
|
|
f8943703ed | ||
|
|
712605e4f1 | ||
|
|
a0d5fb8955 | ||
|
|
fec0d1f26a | ||
|
|
807b73c8a4 | ||
|
|
506ef4a20f | ||
|
|
306252da6f | ||
|
|
5f5a65f59d | ||
|
|
09d001b6db | ||
|
|
9aa907a909 | ||
|
|
2ad48b6fd5 | ||
|
|
6b3d99d1d1 | ||
|
|
813a2e29e9 | ||
|
|
e1f63701f1 | ||
|
|
9ff605623c | ||
|
|
db749d8b1b | ||
|
|
b30b29df8a | ||
|
|
7a145315f9 | ||
|
|
f13f39a0a0 | ||
|
|
3b557a892c | ||
|
|
41e777c81d | ||
|
|
90152bdc41 | ||
|
|
8db9bf3c99 | ||
|
|
c2e9204c56 | ||
|
|
61eb206c74 | ||
|
|
1c4db30b65 | ||
|
|
d039c65c4b | ||
|
|
18e95b7f07 | ||
|
|
0952221f90 | ||
|
|
0e1e87550f | ||
|
|
40fb9dc9fa | ||
|
|
4fe0c9feb2 | ||
|
|
006e20f06b | ||
|
|
1f7b3ca0f9 | ||
|
|
8d6503cf28 | ||
|
|
ecf0ac77f2 | ||
|
|
d342efe9a9 | ||
|
|
c21dd46289 | ||
|
|
8c378c6f91 | ||
|
|
597842a871 | ||
|
|
36bbbae579 | ||
|
|
902076c629 | ||
|
|
1b9f394489 | ||
|
|
450c434ed0 | ||
|
|
4b6a20faa4 | ||
|
|
ce38714a81 | ||
|
|
37f1eb9794 | ||
|
|
db4bfa4884 | ||
|
|
6a649cb7f0 | ||
|
|
b6ef559cde | ||
|
|
cc0daa2a22 | ||
|
|
c69c62cd45 | ||
|
|
6a26299a75 | ||
|
|
4101e91ae6 | ||
|
|
83192b7834 | ||
|
|
3b1091bb3e | ||
|
|
e67ab8f430 | ||
|
|
da731e7d5e | ||
|
|
0ea585633b | ||
|
|
fe40b7cfa1 | ||
|
|
d04a60349d | ||
|
|
94ae3da78b | ||
|
|
3ca54159f7 | ||
|
|
bf5dcda3b5 | ||
|
|
08ca525d3e | ||
|
|
dc7ce0bc4b | ||
|
|
729a1ea849 | ||
|
|
3b5493d78d | ||
|
|
6711791009 | ||
|
|
c41643ee3e | ||
|
|
2628a0e13e | ||
|
|
c8bc8b3172 | ||
|
|
24812b667c | ||
|
|
bec9a2d46b | ||
|
|
05cc82d7c5 | ||
|
|
82be996d97 | ||
|
|
d367739248 | ||
|
|
ef870ae385 | ||
|
|
466e741494 | ||
|
|
00fafb6a1b | ||
|
|
6d3e484855 | ||
|
|
845a0a3189 | ||
|
|
519db51be2 | ||
|
|
7ef3a10577 | ||
|
|
1c35ca67ce | ||
|
|
e0c6c14dca | ||
|
|
3cf348c7ae | ||
|
|
b3d45c45e1 | ||
|
|
c246edd8f9 | ||
|
|
c19bca2be0 | ||
|
|
a5f263ce48 | ||
|
|
cbe8fb2d65 | ||
|
|
8b6a4b2e88 | ||
|
|
a61d00482f | ||
|
|
0c7a77c4b6 | ||
|
|
211bee94bb | ||
|
|
b3ac0ae6d9 | ||
|
|
4c52a5aaa8 | ||
|
|
7a9ecf7b85 | ||
|
|
86b48188e1 | ||
|
|
7bbab22939 | ||
|
|
1343d6c93e | ||
|
|
735fec3b4c | ||
|
|
21b9d1d024 | ||
|
|
6dc92df2eb | ||
|
|
cac6abe251 | ||
|
|
6c1664fc0d | ||
|
|
36aa3ed7c9 | ||
|
|
23c46e7fe5 | ||
|
|
efbd814968 | ||
|
|
812eb5a439 | ||
|
|
f86a74ba10 | ||
|
|
71d11cfcd0 | ||
|
|
6aa3d386af | ||
|
|
7ac2e0f9de | ||
|
|
6f556bce70 | ||
|
|
a447c137fe | ||
|
|
47a385683c | ||
|
|
db48140f3a | ||
|
|
d7cae3b1fa | ||
|
|
7ae65a36a2 | ||
|
|
01466947cc | ||
|
|
061e588da9 | ||
|
|
b460206bd4 | ||
|
|
ea14f953a4 | ||
|
|
feed270fd7 | ||
|
|
225398b5a6 | ||
|
|
cd0e94f96f | ||
|
|
767c382091 | ||
|
|
55f6ba21dc | ||
|
|
b3c4ec5165 | ||
|
|
e231e5749d | ||
|
|
f98c48616b | ||
|
|
c460467d74 | ||
|
|
3f7faf88fb | ||
|
|
1971dfbded | ||
|
|
b50e5c982b | ||
|
|
97034a556f | ||
|
|
8b87432317 | ||
|
|
baa5827de3 | ||
|
|
1d03a6e11f | ||
|
|
08811decd9 | ||
|
|
69ea840517 | ||
|
|
ea5bd0a6b7 | ||
|
|
0d8e92fc5a | ||
|
|
d7119a656b | ||
|
|
89ae1d94ea | ||
|
|
dfc7fed325 | ||
|
|
65ce9a171b | ||
|
|
5e50ed119f | ||
|
|
d0a07997c1 | ||
|
|
985df5906f | ||
|
|
385d81b9a9 | ||
|
|
0ad043406b | ||
|
|
4a79728f01 | ||
|
|
7c56c7244f | ||
|
|
e0fce6631b | ||
|
|
899a8c5af9 | ||
|
|
6cee2c878b | ||
|
|
4359b21f1c | ||
|
|
d8b2bd3af0 | ||
|
|
8fafd906a3 | ||
|
|
fece4ace87 | ||
|
|
ab6014f8c6 | ||
|
|
fecd13612b | ||
|
|
38336d0240 | ||
|
|
9f9e4e9521 | ||
|
|
b47de62f98 | ||
|
|
9e54299917 | ||
|
|
d249d0e3ce | ||
|
|
fbe7de3c56 | ||
|
|
034e98c850 | ||
|
|
7feaadf7f8 | ||
|
|
a7fef3afff | ||
|
|
5d01f8ca46 | ||
|
|
7093022ec4 | ||
|
|
2313f75dbe | ||
|
|
af9caea726 | ||
|
|
b39986907c | ||
|
|
a02d7c6085 | ||
|
|
a046deaf17 | ||
|
|
c76e960446 | ||
|
|
535823e0a8 | ||
|
|
9966bf640e | ||
|
|
8e376bb4a5 | ||
|
|
7c0e4aa9a6 | ||
|
|
e609b75cc7 | ||
|
|
20d26a069b | ||
|
|
59d58e320e | ||
|
|
49b71aafb4 | ||
|
|
cbe514176a | ||
|
|
0898d96571 | ||
|
|
7f7c364071 | ||
|
|
fd9e04d992 | ||
|
|
86657b139a | ||
|
|
cdffbe1298 | ||
|
|
82a037ec7c | ||
|
|
1a4eced998 | ||
|
|
06dcdd78af | ||
|
|
f564efd97f | ||
|
|
16f2ac464e | ||
|
|
30405d182d | ||
|
|
785989e91d | ||
|
|
27b6796639 | ||
|
|
7756d35fa1 | ||
|
|
5afd2339c2 | ||
|
|
b7f220a6b6 | ||
|
|
fb7dba787c | ||
|
|
72e3afdffd | ||
|
|
85b8fcaab5 | ||
|
|
c3129f1443 | ||
|
|
000be8b032 | ||
|
|
da1bf3581c | ||
|
|
4d0011d957 | ||
|
|
74f9ec28e4 | ||
|
|
b1d4b2d8ea | ||
|
|
711d29e374 | ||
|
|
0ba7be2a5f | ||
|
|
d4c751d29f | ||
|
|
70744d04c6 | ||
|
|
e4e6d2d60a | ||
|
|
e42feb4c26 | ||
|
|
f12c2ed0c2 | ||
|
|
7dbcbfe723 | ||
|
|
1d8a0ccf1a | ||
|
|
e33acd33e7 | ||
|
|
74e206694e | ||
|
|
6fd655a0b1 |
9
.gitignore
vendored
9
.gitignore
vendored
@@ -2,7 +2,12 @@
|
|||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
.vscode
|
.vscode
|
||||||
.idea
|
.idea
|
||||||
|
.yamllint
|
||||||
|
|
||||||
# Ignore changes to sample environments
|
# Ignore changes to sample environments
|
||||||
helmfile/environments/dev/values.yaml
|
helmfile/environments/dev/values.yaml.gotmpl
|
||||||
helmfile/environments/prod/values.yaml
|
helmfile/environments/prod/values.yaml.gotmpl
|
||||||
|
|
||||||
|
# Ignore in CI generated files
|
||||||
|
.kyverno/opendesk.yaml
|
||||||
|
.kyverno/kyverno-test.yaml
|
||||||
|
|||||||
402
.gitlab-ci.yml
402
.gitlab-ci.yml
@@ -1,19 +1,33 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
include:
|
include:
|
||||||
- project: "${PROJECT_PATH_GITLAB_CONFIG_TOOLING}"
|
- project: "${PROJECT_PATH_GITLAB_CONFIG_TOOLING}"
|
||||||
ref: "main"
|
ref: "v2.3.2"
|
||||||
file:
|
file:
|
||||||
|
- "ci/common/automr.yml"
|
||||||
- "ci/common/lint.yml"
|
- "ci/common/lint.yml"
|
||||||
- "ci/release-automation/semantic-release.yml"
|
- "ci/release-automation/semantic-release.yml"
|
||||||
|
- local: "/.gitlab/generate/generate-docs.yml"
|
||||||
- project: "${PROJECT_PATH_CUSTOM_ENVIRONMENT_CONFIG}"
|
- project: "${PROJECT_PATH_CUSTOM_ENVIRONMENT_CONFIG}"
|
||||||
file: "gitlab/environments.yaml"
|
file: "gitlab/environments.yaml"
|
||||||
|
ref: "main"
|
||||||
|
- local: "/.gitlab/lint/lint-opendesk.yml"
|
||||||
rules:
|
rules:
|
||||||
- if: "$INCLUDE_ENVIRONMENTS_ENABLED != 'false'"
|
- if: "$JOB_OPENDESK_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|merge_request_event'"
|
||||||
|
when: "never"
|
||||||
|
- when: "always"
|
||||||
|
- local: "/.gitlab/lint/lint-kyverno.yml"
|
||||||
|
rules:
|
||||||
|
- if: "$JOB_KYVERNO_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|merge_request_event|web|triggers'"
|
||||||
|
when: "never"
|
||||||
|
- when: "always"
|
||||||
|
|
||||||
stages:
|
stages:
|
||||||
- ".pre"
|
- ".pre"
|
||||||
|
- "scan"
|
||||||
|
- "automr"
|
||||||
- "lint"
|
- "lint"
|
||||||
- "env-cleanup"
|
- "env-cleanup"
|
||||||
- "env"
|
- "env"
|
||||||
@@ -22,7 +36,6 @@ stages:
|
|||||||
- "component-deploy-stage-2"
|
- "component-deploy-stage-2"
|
||||||
- "tests"
|
- "tests"
|
||||||
- "env-stop"
|
- "env-stop"
|
||||||
- "generate-release-assets"
|
|
||||||
- ".post"
|
- ".post"
|
||||||
|
|
||||||
variables:
|
variables:
|
||||||
@@ -30,17 +43,17 @@ variables:
|
|||||||
description: "The name of namespaces to deploy to."
|
description: "The name of namespaces to deploy to."
|
||||||
value: ""
|
value: ""
|
||||||
CLUSTER:
|
CLUSTER:
|
||||||
description: "Define which cluster to use. Cluster must be defined in gitlab/environments.yaml of
|
description: "Which cluster to use. Cluster must be defined in `gitlab/environments.yaml` of the
|
||||||
sovereign-workplace-env included above."
|
repo that is included above using the env var `PROJECT_PATH_CUSTOM_ENVIRONMENT_CONFIG`:
|
||||||
|
${PROJECT_PATH_CUSTOM_ENVIRONMENT_CONFIG}"
|
||||||
value: "dev"
|
value: "dev"
|
||||||
BASE_DOMAIN:
|
|
||||||
description: "Define the Cluster Base Domain."
|
|
||||||
value: "souvap.cloud"
|
|
||||||
MASTER_PASSWORD_WEB_VAR:
|
MASTER_PASSWORD_WEB_VAR:
|
||||||
description: "Optional: Provide a passphrase to be used for password generation."
|
description: >
|
||||||
|
Optional: Provide a seed to be used for generation of all internal secrets.
|
||||||
|
Same seed will result in same secrets.
|
||||||
value: ""
|
value: ""
|
||||||
ENV_STOP_BEFORE:
|
ENV_STOP_BEFORE:
|
||||||
description: "Stop environment/delete namespace for the deployment"
|
description: "Stop environment/delete namespace for the deployment."
|
||||||
value: "no"
|
value: "no"
|
||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
@@ -57,14 +70,11 @@ variables:
|
|||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
DEPLOY_UCS:
|
DEPLOY_UMS:
|
||||||
description: >-
|
description: "Enable Univention Management Stack deployment."
|
||||||
Enable Univention Corporate Server deployment.
|
|
||||||
"ums-eval" does deploy the Univention Management Stack instead of the UCS container.
|
|
||||||
value: "no"
|
value: "no"
|
||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "ums-eval"
|
|
||||||
- "no"
|
- "no"
|
||||||
DEPLOY_PROVISIONING:
|
DEPLOY_PROVISIONING:
|
||||||
description: "Enable Provisioning Components."
|
description: "Enable Provisioning Components."
|
||||||
@@ -78,14 +88,14 @@ variables:
|
|||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
DEPLOY_ELEMENT:
|
DEPLOY_CRYPTPAD:
|
||||||
description: "Enable Element deployment."
|
description: "Enable CryptPad deployment."
|
||||||
value: "no"
|
value: "no"
|
||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
- "no"
|
- "no"
|
||||||
DEPLOY_KEYCLOAK:
|
DEPLOY_ELEMENT:
|
||||||
description: "Enable Keycloak deployment."
|
description: "Enable Element deployment."
|
||||||
value: "no"
|
value: "no"
|
||||||
options:
|
options:
|
||||||
- "yes"
|
- "yes"
|
||||||
@@ -135,24 +145,13 @@ variables:
|
|||||||
TESTS_BRANCH:
|
TESTS_BRANCH:
|
||||||
description: "Branch of E2E-tests on which the test pipeline is triggered"
|
description: "Branch of E2E-tests on which the test pipeline is triggered"
|
||||||
value: "main"
|
value: "main"
|
||||||
RUN_UMS_TESTS:
|
|
||||||
description: "Run E2E test suite of SouvAP Dev team"
|
|
||||||
value: "no"
|
|
||||||
options:
|
|
||||||
- "yes"
|
|
||||||
- "no"
|
|
||||||
UMS_TESTS_BRANCH:
|
|
||||||
description: "Branch of E2E test suite of SouvAP Dev team"
|
|
||||||
value: "main"
|
|
||||||
# please use the following set of variables with normalized names:
|
|
||||||
DOMAIN: "${NAMESPACE}.${CLUSTER}.${BASE_DOMAIN}"
|
|
||||||
ISTIO_DOMAIN: "${NAMESPACE}.istio.${CLUSTER}.${BASE_DOMAIN}"
|
|
||||||
|
|
||||||
.deploy-common:
|
.deploy-common:
|
||||||
cache: {}
|
cache: {}
|
||||||
dependencies: []
|
dependencies: []
|
||||||
extends: ".environments"
|
extends: ".environments"
|
||||||
image: "registry.souvap-univention.de/souvap/tooling/images/helm:latest"
|
image: "registry.opencode.de/bmi/opendesk/components/platform-development/images/helm:1.0.1\
|
||||||
|
@sha256:d38f41b88374e055332860018f2936db8807b763caf6089735db0484cbb2842a"
|
||||||
script:
|
script:
|
||||||
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${COMPONENT}"
|
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${COMPONENT}"
|
||||||
# MASTER_PASSWORD_WEB_VAR as precedence for MASTER_PASSWORD
|
# MASTER_PASSWORD_WEB_VAR as precedence for MASTER_PASSWORD
|
||||||
@@ -181,24 +180,31 @@ env-cleanup:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
$ENV_STOP_BEFORE != "no"
|
$ENV_STOP_BEFORE != "no"
|
||||||
when: "always"
|
when: "on_success"
|
||||||
script:
|
script:
|
||||||
- "helmfile destroy --namespace ${NAMESPACE}"
|
- |
|
||||||
- "kubectl delete pvc --all --namespace ${NAMESPACE}"
|
if [ "${OPENDESK_SLEDGEHAMMER_DESTROY_ENABLED}" = "yes" ]; then
|
||||||
|
for OPENDESK_RELEASE in $(helm ls -n ${NAMESPACE} -aq); do
|
||||||
|
helm uninstall -n ${NAMESPACE} ${OPENDESK_RELEASE};
|
||||||
|
done
|
||||||
|
kubectl delete pvc --all --namespace ${NAMESPACE};
|
||||||
|
kubectl delete jobs --all --namespace ${NAMESPACE};
|
||||||
|
else
|
||||||
|
helmfile destroy --namespace ${NAMESPACE};
|
||||||
|
fi
|
||||||
stage: "env-cleanup"
|
stage: "env-cleanup"
|
||||||
|
|
||||||
env-start:
|
env-start:
|
||||||
environment:
|
environment:
|
||||||
name: "${NAMESPACE}"
|
name: "${NAMESPACE}"
|
||||||
url: "https://portal.${DOMAIN}"
|
|
||||||
on_stop: "env-stop"
|
on_stop: "env-stop"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
image: "${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
image: "${CI_DEPENDENCY_PROXY_DIRECT_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/
|
$NAMESPACE =~ /.+/
|
||||||
when: "always"
|
when: "on_success"
|
||||||
script:
|
script:
|
||||||
- "echo \"Deploying to Environment ${NAMESPACE} in ${CLUSTER} Cluster\""
|
- "echo \"Deploying to Environment ${NAMESPACE} in ${CLUSTER} Cluster\""
|
||||||
- "kubectl create namespace ${NAMESPACE} --dry-run=client -o yaml | kubectl apply -f -"
|
- "kubectl create namespace ${NAMESPACE} --dry-run=client -o yaml | kubectl apply -f -"
|
||||||
@@ -206,8 +212,8 @@ env-start:
|
|||||||
kubectl create secret
|
kubectl create secret
|
||||||
--namespace "${NAMESPACE}"
|
--namespace "${NAMESPACE}"
|
||||||
docker-registry external-registry
|
docker-registry external-registry
|
||||||
--docker-server "external-registry.souvap-univention.de"
|
--docker-server "${EXTERNAL_REGISTRY}"
|
||||||
--docker-username sovereign-workplace
|
--docker-username "${EXTERNAL_REGISTRY_USERNAME}"
|
||||||
--docker-password "${EXTERNAL_REGISTRY_PASSWORD}"
|
--docker-password "${EXTERNAL_REGISTRY_PASSWORD}"
|
||||||
--dry-run=client -o yaml | kubectl apply -f -
|
--dry-run=client -o yaml | kubectl apply -f -
|
||||||
stage: "env"
|
stage: "env"
|
||||||
@@ -220,22 +226,10 @@ services-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_SERVICES != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_SERVICES != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "services"
|
COMPONENT: "services"
|
||||||
|
|
||||||
ucs-deploy:
|
|
||||||
stage: "component-deploy-stage-1"
|
|
||||||
extends: ".deploy-common"
|
|
||||||
rules:
|
|
||||||
- if: >
|
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
|
||||||
$NAMESPACE =~ /.+/ &&
|
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_UCS == "yes")
|
|
||||||
when: "always"
|
|
||||||
variables:
|
|
||||||
COMPONENT: "univention-corporate-container"
|
|
||||||
|
|
||||||
provisioning-deploy:
|
provisioning-deploy:
|
||||||
stage: "component-deploy-stage-2"
|
stage: "component-deploy-stage-2"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -243,8 +237,8 @@ provisioning-deploy:
|
|||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_UCS != "no" || $DEPLOY_PROVISIONING != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_UMS != "no" || $DEPLOY_PROVISIONING != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "provisioning"
|
COMPONENT: "provisioning"
|
||||||
|
|
||||||
@@ -255,36 +249,11 @@ ums-deploy:
|
|||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
$DEPLOY_UCS == "ums-eval"
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_UMS != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "univention-management-stack"
|
COMPONENT: "univention-management-stack"
|
||||||
|
|
||||||
keycloak-deploy:
|
|
||||||
stage: "component-deploy-stage-1"
|
|
||||||
extends: ".deploy-common"
|
|
||||||
rules:
|
|
||||||
- if: >
|
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
|
||||||
$NAMESPACE =~ /.+/ &&
|
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_KEYCLOAK != "no")
|
|
||||||
when: "always"
|
|
||||||
variables:
|
|
||||||
COMPONENT: "keycloak"
|
|
||||||
|
|
||||||
keycloak-bootstrap-deploy:
|
|
||||||
stage: "component-deploy-stage-1"
|
|
||||||
extends: ".deploy-common"
|
|
||||||
timeout: "30m"
|
|
||||||
rules:
|
|
||||||
- if: >
|
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
|
||||||
$NAMESPACE =~ /.+/ &&
|
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_KEYCLOAK != "no")
|
|
||||||
when: "always"
|
|
||||||
variables:
|
|
||||||
COMPONENT: "keycloak-bootstrap"
|
|
||||||
|
|
||||||
ox-deploy:
|
ox-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -294,7 +263,7 @@ ox-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_OX != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_OX != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "open-xchange"
|
COMPONENT: "open-xchange"
|
||||||
|
|
||||||
@@ -306,7 +275,7 @@ ics-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_ICS != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_ICS != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "intercom-service"
|
COMPONENT: "intercom-service"
|
||||||
|
|
||||||
@@ -318,7 +287,7 @@ xwiki-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_XWIKI != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_XWIKI != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "xwiki"
|
COMPONENT: "xwiki"
|
||||||
|
|
||||||
@@ -330,10 +299,22 @@ collabora-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_NEXTCLOUD != "no" || $DEPLOY_COLLABORA != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_NEXTCLOUD != "no" || $DEPLOY_COLLABORA != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "collabora"
|
COMPONENT: "collabora"
|
||||||
|
|
||||||
|
cryptpad-deploy:
|
||||||
|
stage: "component-deploy-stage-1"
|
||||||
|
extends: ".deploy-common"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
|
$NAMESPACE =~ /.+/ &&
|
||||||
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_NEXTCLOUD != "no" || $DEPLOY_CRYPTPAD != "no")
|
||||||
|
when: "on_success"
|
||||||
|
variables:
|
||||||
|
COMPONENT: "cryptpad"
|
||||||
|
|
||||||
nextcloud-deploy:
|
nextcloud-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -342,7 +323,7 @@ nextcloud-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_NEXTCLOUD != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_NEXTCLOUD != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "nextcloud"
|
COMPONENT: "nextcloud"
|
||||||
|
|
||||||
@@ -354,10 +335,22 @@ openproject-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_OPENPROJECT != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_OPENPROJECT != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "openproject"
|
COMPONENT: "openproject"
|
||||||
|
|
||||||
|
openproject-bootstrap-deploy:
|
||||||
|
stage: "component-deploy-stage-2"
|
||||||
|
extends: ".deploy-common"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
|
$NAMESPACE =~ /.+/ &&
|
||||||
|
($DEPLOY_ALL_COMPONENTS != "no" || ($DEPLOY_OPENPROJECT != "no" && $DEPLOY_NEXTCLOUD != "no"))
|
||||||
|
when: "on_success"
|
||||||
|
variables:
|
||||||
|
COMPONENT: "openproject-bootstrap"
|
||||||
|
|
||||||
jitsi-deploy:
|
jitsi-deploy:
|
||||||
stage: "component-deploy-stage-1"
|
stage: "component-deploy-stage-1"
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
@@ -366,7 +359,7 @@ jitsi-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_JITSI != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_JITSI != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "jitsi"
|
COMPONENT: "jitsi"
|
||||||
|
|
||||||
@@ -378,7 +371,7 @@ element-deploy:
|
|||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" &&
|
||||||
$NAMESPACE =~ /.+/ &&
|
$NAMESPACE =~ /.+/ &&
|
||||||
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_ELEMENT != "no")
|
($DEPLOY_ALL_COMPONENTS != "no" || $DEPLOY_ELEMENT != "no")
|
||||||
when: "always"
|
when: "on_success"
|
||||||
variables:
|
variables:
|
||||||
COMPONENT: "element"
|
COMPONENT: "element"
|
||||||
|
|
||||||
@@ -387,7 +380,7 @@ env-stop:
|
|||||||
environment:
|
environment:
|
||||||
name: "${NAMESPACE}"
|
name: "${NAMESPACE}"
|
||||||
action: "stop"
|
action: "stop"
|
||||||
image: "${CI_DEPENDENCY_PROXY_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
image: "${CI_DEPENDENCY_PROXY_DIRECT_GROUP_IMAGE_PREFIX}/alpine/k8s:1.25.6"
|
||||||
needs: []
|
needs: []
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: >
|
||||||
@@ -401,38 +394,31 @@ env-stop:
|
|||||||
variables:
|
variables:
|
||||||
GIT_STRATEGY: "none"
|
GIT_STRATEGY: "none"
|
||||||
|
|
||||||
|
.ums-default-password: &ums-default-password
|
||||||
|
- |
|
||||||
|
UMS_PASSWORDS=$( \
|
||||||
|
kubectl -n ${NAMESPACE} get cm ums-stack-data-swp-data -o jsonpath='{.data.dev-test-users\.yaml}' \
|
||||||
|
| yq '.properties.password' > passwords.txt \
|
||||||
|
)
|
||||||
|
DEFAULT_USER_PASSWORD=$( \
|
||||||
|
awk 'NR==1{print $1}' passwords.txt \
|
||||||
|
)
|
||||||
|
DEFAULT_ADMIN_PASSWORD=$(
|
||||||
|
awk 'NR==3{print $1}' passwords.txt \
|
||||||
|
)
|
||||||
|
|
||||||
run-tests:
|
run-tests:
|
||||||
extends: ".deploy-common"
|
extends: ".deploy-common"
|
||||||
environment:
|
environment:
|
||||||
name: "${NAMESPACE}"
|
name: "${NAMESPACE}"
|
||||||
tags:
|
|
||||||
- "docker"
|
|
||||||
- "kubernetes"
|
|
||||||
- "${CLUSTER}"
|
|
||||||
stage: "tests"
|
stage: "tests"
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" && $NAMESPACE =~ /.+/ && $RUN_TESTS == "yes"
|
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" && $NAMESPACE =~ /.+/ && $RUN_TESTS == "yes"
|
||||||
when: "always"
|
when: "on_success"
|
||||||
script:
|
script:
|
||||||
|
- *ums-default-password
|
||||||
- |
|
- |
|
||||||
UCS_CONTAINER_NAME=$( \
|
|
||||||
kubectl -n ${NAMESPACE} get pods --no-headers --selector \
|
|
||||||
'app.kubernetes.io/instance=univention-corporate-container' \
|
|
||||||
| grep Running \
|
|
||||||
| awk '{print $1}' \
|
|
||||||
)
|
|
||||||
DEFAULT_USER_PASSWORD=$( \
|
|
||||||
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
|
||||||
| grep DEFAULT_ACCOUNT_USER_PASSWORD \
|
|
||||||
| awk '{print $2}' \
|
|
||||||
)
|
|
||||||
DEFAULT_ADMIN_PASSWORD=$(
|
|
||||||
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
|
||||||
| grep DEFAULT_ACCOUNT_ADMIN_PASSWORD \
|
|
||||||
| awk '{print $2}' \
|
|
||||||
)
|
|
||||||
|
|
||||||
curl --request POST \
|
curl --request POST \
|
||||||
--header "Content-Type: application/json" \
|
--header "Content-Type: application/json" \
|
||||||
--data "{ \
|
--data "{ \
|
||||||
@@ -449,93 +435,84 @@ run-tests:
|
|||||||
\"DEPLOY_ELEMENT\": \"${DEPLOY_ELEMENT}\", \
|
\"DEPLOY_ELEMENT\": \"${DEPLOY_ELEMENT}\", \
|
||||||
\"DEPLOY_ICS\": \"${DEPLOY_ICS}\", \
|
\"DEPLOY_ICS\": \"${DEPLOY_ICS}\", \
|
||||||
\"DEPLOY_JITSI\": \"${DEPLOY_JITSI}\", \
|
\"DEPLOY_JITSI\": \"${DEPLOY_JITSI}\", \
|
||||||
\"DEPLOY_KEYCLOAK\": \"${DEPLOY_KEYCLOAK}\", \
|
\"DEPLOY_KEYCLOAK\": \"${DEPLOY_UMS}\", \
|
||||||
\"DEPLOY_NEXTCLOUD\": \"${DEPLOY_NEXTCLOUD}\", \
|
\"DEPLOY_NEXTCLOUD\": \"${DEPLOY_NEXTCLOUD}\", \
|
||||||
\"DEPLOY_OPENPROJECT\": \"${DEPLOY_OPENPROJECT}\", \
|
\"DEPLOY_OPENPROJECT\": \"${DEPLOY_OPENPROJECT}\", \
|
||||||
\"DEPLOY_OX\": \"${DEPLOY_OX}\", \
|
\"DEPLOY_OX\": \"${DEPLOY_OX}\", \
|
||||||
\"DEPLOY_SERVICES\": \"${DEPLOY_SERVICES}\", \
|
\"DEPLOY_SERVICES\": \"${DEPLOY_SERVICES}\", \
|
||||||
\"DEPLOY_UCS\": \"${DEPLOY_UCS}\", \
|
\"DEPLOY_UCS\": \"${DEPLOY_UMS}\", \
|
||||||
\"DEPLOY_XWIKI\": \"${DEPLOY_XWIKI}\", \
|
\"DEPLOY_XWIKI\": \"${DEPLOY_XWIKI}\", \
|
||||||
\"DEPLOY_PROVISIONING\": \"${DEPLOY_PROVISIONING}\" \
|
\"DEPLOY_PROVISIONING\": \"${DEPLOY_PROVISIONING}\" \
|
||||||
} \
|
} \
|
||||||
}" \
|
}" \
|
||||||
"https://${TESTS_PROJECT_URL}/trigger/pipeline"
|
"https://${TESTS_PROJECT_URL}/trigger/pipeline"
|
||||||
|
|
||||||
run-souvap-dev-tests:
|
avscan-prepare:
|
||||||
extends: ".deploy-common"
|
stage: ".pre"
|
||||||
environment:
|
|
||||||
name: "${NAMESPACE}"
|
|
||||||
tags:
|
|
||||||
- "docker"
|
|
||||||
- "kubernetes"
|
|
||||||
- "${CLUSTER}"
|
|
||||||
stage: "tests"
|
|
||||||
rules:
|
rules:
|
||||||
- if: >
|
- if: >
|
||||||
$CI_PIPELINE_SOURCE =~ "web|schedules|triggers" && $NAMESPACE =~ /.+/ && $RUN_UMS_TESTS == "yes"
|
$JOB_AVSCAN_ENABLED != 'false' &&
|
||||||
when: "always"
|
$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH &&
|
||||||
script:
|
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
||||||
- |
|
|
||||||
UCS_CONTAINER_NAME=$( \
|
|
||||||
kubectl -n ${NAMESPACE} get pods --no-headers --selector \
|
|
||||||
'app.kubernetes.io/instance=univention-corporate-container' \
|
|
||||||
| grep Running \
|
|
||||||
| awk '{print $1}' \
|
|
||||||
)
|
|
||||||
DEFAULT_USER_PASSWORD=$( \
|
|
||||||
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
|
||||||
| grep DEFAULT_ACCOUNT_USER_PASSWORD \
|
|
||||||
| awk '{print $2}' \
|
|
||||||
)
|
|
||||||
DEFAULT_ADMIN_PASSWORD=$(
|
|
||||||
kubectl -n ${NAMESPACE} describe pod ${UCS_CONTAINER_NAME} \
|
|
||||||
| grep DEFAULT_ACCOUNT_ADMIN_PASSWORD \
|
|
||||||
| awk '{print $2}' \
|
|
||||||
)
|
|
||||||
|
|
||||||
curl --request POST \
|
|
||||||
--header "Content-Type: application/json" \
|
|
||||||
--data "{ \
|
|
||||||
\"ref\": \"${UMS_TESTS_BRANCH}\", \
|
|
||||||
\"token\": \"${CI_JOB_TOKEN}\", \
|
|
||||||
\"variables\": { \
|
|
||||||
\"portal_base_url\": \"https://portal.${DOMAIN}\", \
|
|
||||||
\"username\": \"${DEFAULT_USER_NAME}\", \
|
|
||||||
\"password\": \"${DEFAULT_USER_PASSWORD}\", \
|
|
||||||
\"admin_username\": \"${DEFAULT_ADMIN_NAME}\", \
|
|
||||||
\"admin_password\": \"${DEFAULT_ADMIN_PASSWORD}\", \
|
|
||||||
\"keycloak_base_url\": \"https://id.${DOMAIN}\" \
|
|
||||||
} \
|
|
||||||
}" \
|
|
||||||
"https://${UMS_TESTS_PROJECT_URL}/trigger/pipeline"
|
|
||||||
|
|
||||||
generate-release-assets:
|
|
||||||
stage: "generate-release-assets"
|
|
||||||
image: "registry.souvap-univention.de/souvap/tooling/images/ansible:4.10.0"
|
|
||||||
rules:
|
|
||||||
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
|
||||||
when: "always"
|
when: "always"
|
||||||
- when: "never"
|
- when: "never"
|
||||||
|
image: "${CI_DEPENDENCY_PROXY_DIRECT_GROUP_IMAGE_PREFIX}/mikefarah/yq"
|
||||||
script:
|
script:
|
||||||
- |
|
- |
|
||||||
git clone https://gitlab-ci-token:${CI_JOB_TOKEN}@${CI_SERVER_HOST}/${ASSET_GENERATOR_REPO_PATH}
|
cat << 'EOF' > dynamic-scans.yml
|
||||||
cd opendesk-asset-generator
|
---
|
||||||
export OPENDESK_DEPLOYMENT_AUTOMATION_PATH=${CI_PROJECT_DIR}
|
stages:
|
||||||
./opendesk_asset_generator.py
|
- "scan"
|
||||||
mv ./build_artefacts ${CI_PROJECT_DIR}
|
|
||||||
cd ..
|
.container-clamav:
|
||||||
rm -rf opendesk-asset-generator
|
stage: "scan"
|
||||||
ls -l ./build_artefacts
|
image: "registry.opencode.de/bmi/opendesk/components/platform-development/images/clamav-imagescan:1.0.0"
|
||||||
|
before_script:
|
||||||
|
- "sed -i \"/^DatabaseMirror .*$/c DatabaseMirror ${DATABASE_MIRROR}\" /etc/clamav/freshclam.conf"
|
||||||
|
- "freshclam"
|
||||||
|
- "mkdir /scan"
|
||||||
|
script:
|
||||||
|
- "export IMAGE=${EXTERNAL_REGISTRY:-${CONTAINER_REGISTRY}}/${CONTAINER_IMAGE}:${CONTAINER_TAG}"
|
||||||
|
- "echo Pulling and scanning $IMAGE..."
|
||||||
|
- "crane pull $IMAGE /scan/image.tar"
|
||||||
|
- "clamscan /scan"
|
||||||
|
variables:
|
||||||
|
CONTAINER_IMAGE: ""
|
||||||
|
CONTAINER_REGISTRY: ""
|
||||||
|
CONTAINER_TAG: ""
|
||||||
|
DATABASE_MIRROR: "https://nexus.souvap-univention.de/repository/ClamAV"
|
||||||
|
EOF
|
||||||
|
- >
|
||||||
|
yq '.images
|
||||||
|
| with_entries(.key |= "scan-" + .)
|
||||||
|
| .[].extends=".container-clamav"
|
||||||
|
| with(.[]; .variables.CONTAINER_IMAGE = .repository
|
||||||
|
| .variables.CONTAINER_TAG = .tag | .variables.CONTAINER_REGISTRY = .registry)
|
||||||
|
| del(.[].repository)
|
||||||
|
| del(.[].tag)
|
||||||
|
| del(.[].registry)'
|
||||||
|
helmfile/environments/default/images.yaml
|
||||||
|
>> dynamic-scans.yml
|
||||||
artifacts:
|
artifacts:
|
||||||
paths:
|
paths:
|
||||||
- "./build_artefacts/chart-index.json"
|
- "dynamic-scans.yml"
|
||||||
- "./build_artefacts/image-index.json"
|
|
||||||
tags: []
|
|
||||||
variables:
|
|
||||||
ASSET_GENERATOR_REPO_PATH: "bmi/souveraener_arbeitsplatz/tooling/opendesk-asset-generator"
|
|
||||||
|
|
||||||
|
avscan-start:
|
||||||
|
stage: "scan"
|
||||||
|
rules:
|
||||||
|
- if: >
|
||||||
|
$JOB_AVSCAN_ENABLED != 'false' &&
|
||||||
|
$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH &&
|
||||||
|
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
||||||
|
when: "always"
|
||||||
|
- when: "never"
|
||||||
|
trigger:
|
||||||
|
include:
|
||||||
|
- artifact: "dynamic-scans.yml"
|
||||||
|
job: "avscan-prepare"
|
||||||
|
strategy: "depend"
|
||||||
|
|
||||||
# Declare .environments which is in environments repository and only loaded when INCLUDE_ENVIRONMENTS_ENABLED not false.
|
# Declare .environments which is in environments repository. In case it is not available
|
||||||
# 'cache' is used because job must contain at least one key, so cache is just a dummy key.
|
# 'cache' is used because job must contain at least one key, so cache is just a dummy key.
|
||||||
.environments:
|
.environments:
|
||||||
cache: {}
|
cache: {}
|
||||||
@@ -545,6 +522,12 @@ generate-release-assets:
|
|||||||
image: "registry.souvap-univention.de/souvap/tooling/images/semantic-release-patched:latest"
|
image: "registry.souvap-univention.de/souvap/tooling/images/semantic-release-patched:latest"
|
||||||
tags: []
|
tags: []
|
||||||
|
|
||||||
|
conventional-commits-linter:
|
||||||
|
rules:
|
||||||
|
- if: "$JOB_CONVENTIONAL_COMMITS_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|merge_request_event'"
|
||||||
|
when: "never"
|
||||||
|
- when: "always"
|
||||||
|
|
||||||
common-yaml-linter:
|
common-yaml-linter:
|
||||||
rules:
|
rules:
|
||||||
- if: "$JOB_COMMON_YAML_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
- if: "$JOB_COMMON_YAML_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|triggers|web|merge_request_event'"
|
||||||
@@ -560,39 +543,64 @@ reuse-linter:
|
|||||||
|
|
||||||
generate-release-version:
|
generate-release-version:
|
||||||
rules:
|
rules:
|
||||||
- if: "$JOB_RELEASE_ENABLED != 'false'"
|
- if: >
|
||||||
when: "always"
|
$JOB_RELEASE_ENABLED != 'false' &&
|
||||||
|
$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH &&
|
||||||
|
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
||||||
|
when: "on_success"
|
||||||
|
|
||||||
release:
|
release:
|
||||||
dependencies:
|
|
||||||
- "generate-release-assets"
|
|
||||||
rules:
|
rules:
|
||||||
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
- if: >
|
||||||
when: "always"
|
$JOB_AVSCAN_ENABLED != 'false' &&
|
||||||
|
$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH &&
|
||||||
|
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
||||||
|
when: "on_success"
|
||||||
script:
|
script:
|
||||||
|
- >
|
||||||
|
export RELEASE_VERSION=$(semantic-release --dry-run --branches $CI_COMMIT_REF_NAME --plugins
|
||||||
|
"@semantic-release/gitlab" | grep -oP "Published release [0-9]+\.[0-9]+\.[0-9]+ on" |
|
||||||
|
grep -oP "[0-9]+\.[0-9]+\.[0-9]+")
|
||||||
|
- |
|
||||||
|
if [ -z "${RELEASE_VERSION}" ]; then
|
||||||
|
echo "RELEASE_VERSION=$(git describe --tags --abbrev=0 | sed s@^v@@g )"
|
||||||
|
else
|
||||||
|
echo "RELEASE_VERSION=${RELEASE_VERSION}"
|
||||||
|
fi
|
||||||
|
- |
|
||||||
|
echo -e "\n[INFO] Writing data to helm value file..."
|
||||||
|
cat <<EOF >helmfile/environments/default/global.generated.yaml
|
||||||
|
# SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
systemInformation:
|
||||||
|
releaseVersion: "v$(echo -E "$RELEASE_VERSION")"
|
||||||
|
...
|
||||||
|
EOF
|
||||||
- |
|
- |
|
||||||
cat << 'EOF' > ${CI_PROJECT_DIR}/.releaserc
|
cat << 'EOF' > ${CI_PROJECT_DIR}/.releaserc
|
||||||
{
|
{
|
||||||
"branches": ["main"],
|
"branches": ["main"],
|
||||||
"plugins": [
|
"plugins": [
|
||||||
["@semantic-release/gitlab",
|
"@semantic-release/gitlab",
|
||||||
{
|
|
||||||
"assets": [
|
|
||||||
{ "path": "./build_artefacts/chart-index.json",
|
|
||||||
"label": "Chart Index JSON" },
|
|
||||||
{ "path": "./build_artefacts/image-index.json",
|
|
||||||
"label": "Image Index JSON" },
|
|
||||||
]
|
|
||||||
}
|
|
||||||
],
|
|
||||||
"@semantic-release/release-notes-generator",
|
"@semantic-release/release-notes-generator",
|
||||||
"@semantic-release/changelog",
|
"@semantic-release/changelog",
|
||||||
["@semantic-release/git", {
|
["@semantic-release/git", {
|
||||||
"assets": ["charts/**/Chart.yaml", "CHANGELOG.md", "charts/**/README.md"],
|
"assets": [
|
||||||
|
"charts/**/Chart.yaml",
|
||||||
|
"CHANGELOG.md",
|
||||||
|
"charts/**/README.md",
|
||||||
|
"helmfile/environments/default/global.generated.yaml",
|
||||||
|
".kyverno/kyverno-test.yaml",
|
||||||
|
"docs"
|
||||||
|
],
|
||||||
"message": "chore(release): ${nextRelease.version} [skip ci]\n\n${nextRelease.notes}"
|
"message": "chore(release): ${nextRelease.version} [skip ci]\n\n${nextRelease.notes}"
|
||||||
}]
|
}]
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
EOF
|
EOF
|
||||||
- "semantic-release"
|
- "semantic-release"
|
||||||
|
needs:
|
||||||
|
- "generate-docs"
|
||||||
...
|
...
|
||||||
|
|||||||
14
.gitlab/common/common.yml
Normal file
14
.gitlab/common/common.yml
Normal file
@@ -0,0 +1,14 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
variables:
|
||||||
|
OPENDESK_CI_CLI_IMAGE: "registry.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli:2.4.3\
|
||||||
|
@sha256:4630299fddf4248af1ad04528f0435d78f5b2694a154c99fe72b960260a7be61"
|
||||||
|
OPENDESK_LINT_IMAGE: "registry.opencode.de/bmi/opendesk/components/platform-development/images/ci-lint:1.0.4\
|
||||||
|
@sha256:386e84e2c85c33537479e4bb1e1fe744c9cce5e87bcb9a3a384dcdc1727c19c0"
|
||||||
|
|
||||||
|
.common:
|
||||||
|
cache: {}
|
||||||
|
needs: []
|
||||||
|
tags: []
|
||||||
|
...
|
||||||
11
.gitlab/generate/generate-common.yml
Normal file
11
.gitlab/generate/generate-common.yml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
include:
|
||||||
|
- local: "/.gitlab/common/common.yml"
|
||||||
|
|
||||||
|
.generate-common:
|
||||||
|
extends: ".common"
|
||||||
|
stage: ".post"
|
||||||
|
tags: []
|
||||||
|
...
|
||||||
20
.gitlab/generate/generate-docs.yml
Normal file
20
.gitlab/generate/generate-docs.yml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
include:
|
||||||
|
- local: "/.gitlab/generate/generate-common.yml"
|
||||||
|
|
||||||
|
generate-docs:
|
||||||
|
cache:
|
||||||
|
- key: "generate-docs-${CI_COMMIT_REF_SLUG}"
|
||||||
|
paths:
|
||||||
|
- "${CI_PROJECT_DIR}/docs"
|
||||||
|
policy: "push"
|
||||||
|
extends: ".generate-common"
|
||||||
|
image: "${OPENDESK_CI_CLI_IMAGE}"
|
||||||
|
rules:
|
||||||
|
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH"
|
||||||
|
when: "on_success"
|
||||||
|
script:
|
||||||
|
- "node /app/src/index.js generate-docs -d ${CI_PROJECT_DIR}"
|
||||||
|
...
|
||||||
11
.gitlab/lint/lint-common.yml
Normal file
11
.gitlab/lint/lint-common.yml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
include:
|
||||||
|
- local: "/.gitlab/common/common.yml"
|
||||||
|
|
||||||
|
.lint-common:
|
||||||
|
extends: ".common"
|
||||||
|
stage: "lint"
|
||||||
|
|
||||||
|
...
|
||||||
42
.gitlab/lint/lint-kyverno.yml
Normal file
42
.gitlab/lint/lint-kyverno.yml
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
include:
|
||||||
|
- local: "/.gitlab/lint/lint-common.yml"
|
||||||
|
|
||||||
|
lint-kyverno:
|
||||||
|
allow_failure: true
|
||||||
|
extends: ".lint-common"
|
||||||
|
image: "${OPENDESK_LINT_IMAGE}"
|
||||||
|
parallel:
|
||||||
|
matrix:
|
||||||
|
- APP:
|
||||||
|
- "collabora"
|
||||||
|
- "cryptpad"
|
||||||
|
- "element"
|
||||||
|
- "intercom-service"
|
||||||
|
- "jitsi"
|
||||||
|
- "nextcloud"
|
||||||
|
- "open-xchange"
|
||||||
|
- "openproject"
|
||||||
|
- "openproject-bootstrap"
|
||||||
|
- "provisioning"
|
||||||
|
- "services"
|
||||||
|
- "univention-management-stack"
|
||||||
|
- "xwiki"
|
||||||
|
script:
|
||||||
|
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${APP}"
|
||||||
|
- "helmfile template -e test --include-needs > ${CI_PROJECT_DIR}/.kyverno/opendesk.yaml"
|
||||||
|
- >
|
||||||
|
node /app/opendesk-ci-cli/src/index.js generate-kyverno-tests
|
||||||
|
-d ${CI_PROJECT_DIR}/.kyverno
|
||||||
|
-t required
|
||||||
|
-s manifest
|
||||||
|
-f opendesk.yaml
|
||||||
|
--skip-tests true
|
||||||
|
${APP}
|
||||||
|
- "node /app/opendesk-ci-cli/src/index.js filter-for-kinds -f ${CI_PROJECT_DIR}/.kyverno/opendesk.yaml"
|
||||||
|
- "cd ${CI_PROJECT_DIR}/.kyverno"
|
||||||
|
- "kyverno test ."
|
||||||
|
|
||||||
|
...
|
||||||
13
.gitlab/lint/lint-opendesk.yml
Normal file
13
.gitlab/lint/lint-opendesk.yml
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
include:
|
||||||
|
- local: "/.gitlab/lint/lint-common.yml"
|
||||||
|
|
||||||
|
lint-opendesk:
|
||||||
|
extends: ".lint-common"
|
||||||
|
image: "${OPENDESK_CI_CLI_IMAGE}"
|
||||||
|
script:
|
||||||
|
- "node /app/src/index.js sort-all -d ${CI_PROJECT_DIR}/helmfile"
|
||||||
|
- "git diff --exit-code"
|
||||||
|
...
|
||||||
292
.kyverno/policies/_policies.yaml
Normal file
292
.kyverno/policies/_policies.yaml
Normal file
@@ -0,0 +1,292 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
pod:
|
||||||
|
- name: "require-tag-and-digest"
|
||||||
|
rule: "require-tag-and-digest"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-default-serviceaccount"
|
||||||
|
rule: "disallow-default-serviceAccountName"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "template-imagepullsecrets"
|
||||||
|
rule: "template-imagePullSecrets"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-latest-tag"
|
||||||
|
rule: "disallow-latest-tag"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-latest-tag"
|
||||||
|
rule: "require-image-tag-or-digest"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-imagepullpolicy"
|
||||||
|
rule: "require-imagePullPolicy"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-health-and-liveness-check"
|
||||||
|
rule: "require-health-and-liveness-check"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "template-storage"
|
||||||
|
rule: "template-storageClassName-pod"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "PersistentVolumeClaim"
|
||||||
|
- name: "template-storage"
|
||||||
|
rule: "template-storageClassName-pvc"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- name: "template-storage"
|
||||||
|
rule: "template-requests-storage-pod"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "PersistentVolumeClaim"
|
||||||
|
- name: "template-storage"
|
||||||
|
rule: "template-requests-storage-pvc"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- name: "require-requests-limits"
|
||||||
|
rule: "validate-resources"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "template-image-registries"
|
||||||
|
rule: "template-image-registries"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-ro-rootfs"
|
||||||
|
type: "optional"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-no-privilege-escalation"
|
||||||
|
type: "optional"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-all-capabilities-dropped"
|
||||||
|
type: "optional"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-no-privileged"
|
||||||
|
type: "optional"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-run-as-user"
|
||||||
|
type: "optional"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-run-as-group"
|
||||||
|
type: "optional"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-seccomp-profile"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-run-as-non-root"
|
||||||
|
type: "optional"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-empty-seLinuxOptions"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "require-default-procMount"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "require-containersecuritycontext"
|
||||||
|
rule: "restrict-sysctls"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-container-sock-mounts"
|
||||||
|
rule: "validate-docker-sock-mount"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-container-sock-mounts"
|
||||||
|
rule: "validate-containerd-sock-mount"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-container-sock-mounts"
|
||||||
|
rule: "validate-crio-sock-mount"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-container-sock-mounts"
|
||||||
|
rule: "validate-dockerd-sock-mount"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-host-namespaces"
|
||||||
|
rule: "disallow-host-namespaces"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-host-path"
|
||||||
|
rule: "disallow-host-path"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-host-ports"
|
||||||
|
rule: "disallow-host-ports"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "disallow-host-process"
|
||||||
|
rule: "disallow-host-process"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
- "Job"
|
||||||
|
- "Pod"
|
||||||
|
- "DaemonSet"
|
||||||
|
- name: "template-ingress"
|
||||||
|
rule: "template-ingressClassName"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "Ingress"
|
||||||
|
- name: "template-ingress"
|
||||||
|
rule: "template-tls-secretName"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "Ingress"
|
||||||
|
- name: "template-replicas"
|
||||||
|
rule: "template-replicas"
|
||||||
|
type: "required"
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
- "Deployment"
|
||||||
|
...
|
||||||
80
.kyverno/policies/disallow-container-sock-mounts.yaml
Normal file
80
.kyverno/policies/disallow-container-sock-mounts.yaml
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "disallow-container-sock-mounts"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Disallow CRI socket mounts"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
Container daemon socket bind mounts allow access to the container engine on the node.
|
||||||
|
This access can be used for privilege escalation and to manage containers outside of Kubernetes, and hence should
|
||||||
|
not be allowed.
|
||||||
|
This policy validates that the sockets used for CRI engines Docker, Containerd, and CRI-O are not used.
|
||||||
|
In addition to or replacement of this policy, preventing users from mounting the parent directories
|
||||||
|
(/var/run and /var) may be necessary to completely prevent socket bind mounts.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- name: "validate-docker-sock-mount"
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Use of the Docker Unix socket is not allowed."
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
|
- =(hostPath):
|
||||||
|
path: "!/var/run/docker.sock"
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
|
- name: "validate-containerd-sock-mount"
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Use of the Containerd Unix socket is not allowed."
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
|
- =(hostPath):
|
||||||
|
path: "!/var/run/containerd/containerd.sock"
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
|
- name: "validate-crio-sock-mount"
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Use of the CRI-O Unix socket is not allowed."
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
|
- =(hostPath):
|
||||||
|
path: "!/var/run/crio/crio.sock"
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
|
- name: "validate-dockerd-sock-mount"
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Use of the Docker CRI socket is not allowed."
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
|
- =(hostPath):
|
||||||
|
path: "!/var/run/cri-dockerd.sock"
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
36
.kyverno/policies/disallow-default-serviceaccount.yaml
Normal file
36
.kyverno/policies/disallow-default-serviceaccount.yaml
Normal file
@@ -0,0 +1,36 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "disallow-default-serviceaccount"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Prevent default ServiceAccount privilege escalation"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
Kubernetes automatically creates a ServiceAccount object named default for every namespace in your cluster.
|
||||||
|
These default service accounts get no permissions by default.
|
||||||
|
Accidental or intended assignment of permissions on the default service account results in elevated permissions
|
||||||
|
for all pods with default service account assigned.
|
||||||
|
This risk can be mitigated by creating a custom ServiceAccount for each application or reduce the risk by disable
|
||||||
|
auto mounting the default service account into the pod.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "disallow-default-serviceAccountName"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
Field serviceAccountName must be set to anything other than 'default'.
|
||||||
|
When serviceAccountName is 'default' then automountServiceAccountToken must set to 'false' .
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
serviceAccountName: "!default"
|
||||||
|
- spec:
|
||||||
|
automountServiceAccountToken: "false"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
33
.kyverno/policies/disallow-host-namespaces.yaml
Normal file
33
.kyverno/policies/disallow-host-namespaces.yaml
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "disallow-host-namespaces"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Disallow Host Namespaces"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
Host namespaces (Process ID namespace, Inter-Process Communication namespace, and network namespace) allow access
|
||||||
|
to shared information and can be used to elevate privileges.
|
||||||
|
Pods should not be allowed access to host namespaces.
|
||||||
|
This policy ensures fields which make use of these host namespaces are unset or set to `false`.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- name: "disallow-host-namespaces"
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
Sharing the host namespaces is disallowed. The fields spec.hostNetwork,
|
||||||
|
spec.hostIPC, and spec.hostPID must be unset or set to `false`.
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(hostPID): "false"
|
||||||
|
=(hostIPC): "false"
|
||||||
|
=(hostNetwork): "false"
|
||||||
32
.kyverno/policies/disallow-host-path.yaml
Normal file
32
.kyverno/policies/disallow-host-path.yaml
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "disallow-host-path"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Disallow hostPath"
|
||||||
|
policies.kyverno.io/subject: "Pod,Volume"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
HostPath volumes let Pods use host directories and volumes in containers.
|
||||||
|
Using host resources can be used to access shared data or escalate privileges and should not be allowed.
|
||||||
|
This policy ensures no hostPath volumes are in use.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- name: "disallow-host-path"
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
HostPath volumes are forbidden. The field spec.volumes[*].hostPath must be unset.
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
|
- X(hostPath): "null"
|
||||||
|
- spec:
|
||||||
|
=(volumes):
|
||||||
38
.kyverno/policies/disallow-host-ports.yaml
Normal file
38
.kyverno/policies/disallow-host-ports.yaml
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "disallow-host-ports"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Disallow hostPorts"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
Access to host ports allows potential snooping of network traffic and should not be allowed, or at minimum
|
||||||
|
restricted to a known list. This policy ensures the `hostPort` field is unset or set to `0`.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- name: "disallow-host-ports"
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
Use of host ports is disallowed. The fields spec.containers[*].ports[*].hostPort
|
||||||
|
, spec.initContainers[*].ports[*].hostPort, and spec.ephemeralContainers[*].ports[*].hostPort
|
||||||
|
must either be unset or set to `0`.
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- =(ports):
|
||||||
|
- =(hostPort): 0
|
||||||
|
=(initContainers):
|
||||||
|
- =(ports):
|
||||||
|
- =(hostPort): 0
|
||||||
|
containers:
|
||||||
|
- =(ports):
|
||||||
|
- =(hostPort): 0
|
||||||
45
.kyverno/policies/disallow-host-process.yaml
Normal file
45
.kyverno/policies/disallow-host-process.yaml
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "disallow-host-process"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Disallow hostProcess"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
Windows pods offer the ability to run HostProcess containers which enables privileged access to the Windows node.
|
||||||
|
Privileged access to the host is disallowed in the baseline policy.
|
||||||
|
HostProcess pods are an alpha feature as of Kubernetes v1.22.
|
||||||
|
This policy ensures the `hostProcess` field, if present, is set to `false`.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- name: "disallow-host-process"
|
||||||
|
match:
|
||||||
|
any:
|
||||||
|
- resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
HostProcess containers are disallowed. The fields spec.securityContext.windowsOptions.hostProcess,
|
||||||
|
spec.containers[*].securityContext.windowsOptions.hostProcess,
|
||||||
|
spec.initContainers[*].securityContext.windowsOptions.hostProcess, and
|
||||||
|
spec.ephemeralContainers[*].securityContext.windowsOptions.hostProcess must either be undefined or set to
|
||||||
|
`false`.
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- =(securityContext):
|
||||||
|
=(windowsOptions):
|
||||||
|
=(hostProcess): "false"
|
||||||
|
=(initContainers):
|
||||||
|
- =(securityContext):
|
||||||
|
=(windowsOptions):
|
||||||
|
=(hostProcess): "false"
|
||||||
|
containers:
|
||||||
|
- =(securityContext):
|
||||||
|
=(windowsOptions):
|
||||||
|
=(hostProcess): "false"
|
||||||
57
.kyverno/policies/disallow-latest-tag.yaml
Normal file
57
.kyverno/policies/disallow-latest-tag.yaml
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "disallow-latest-tag"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Disallow usage of latest tag"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
The ':latest' tag is mutable and can lead to unexpected errors if the image changes.
|
||||||
|
A best practice is to use an immutable tag that maps to a specific version of an application Pod.
|
||||||
|
This policy validates that the image specifies a tag and that it is not called `latest`.
|
||||||
|
Defining no image tag or digest result in the container engine retrieving the latest tag.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "disallow-latest-tag"
|
||||||
|
validate:
|
||||||
|
message: "Using a mutable image tag e.g. 'latest' is not allowed."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- image: "!*:latest"
|
||||||
|
=(initContainers):
|
||||||
|
- image: "!*:latest"
|
||||||
|
containers:
|
||||||
|
- image: "!*:latest"
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "require-image-tag-or-digest"
|
||||||
|
validate:
|
||||||
|
message: "A image tag or a digest is required, otherwise latest tag is chosen."
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- image: "*:*"
|
||||||
|
=(initContainers):
|
||||||
|
- image: "*:*"
|
||||||
|
containers:
|
||||||
|
- image: "*:*"
|
||||||
|
- spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- image: "*@*"
|
||||||
|
=(initContainers):
|
||||||
|
- image: "*@*"
|
||||||
|
containers:
|
||||||
|
- image: "*@*"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
244
.kyverno/policies/require-containersecuritycontext.yaml
Normal file
244
.kyverno/policies/require-containersecuritycontext.yaml
Normal file
@@ -0,0 +1,244 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "require-containersecuritycontext"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "ContainerSecurityContext best practices are set."
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
The containerSecurityContext is the most important security-related section because it has the highest precedence
|
||||||
|
and restricts the container to its minimal privileges.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- name: "require-ro-rootfs"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Root filesystem must be read-only."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
|
||||||
|
- name: "require-no-privilege-escalation"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Disallow privilege escalation."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
|
||||||
|
- name: "require-all-capabilities-dropped"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Required to drop ALL linux capabilities."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
|
||||||
|
- name: "require-no-privileged"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Disallow privileged container."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
privileged: false
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
privileged: false
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
privileged: false
|
||||||
|
|
||||||
|
- name: "require-run-as-user"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Container must run as non-root user."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
runAsUser: ">0"
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
runAsUser: ">0"
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
runAsUser: ">0"
|
||||||
|
|
||||||
|
- name: "require-run-as-group"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Container must run as non-root group."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
runAsGroup: ">0"
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
runAsGroup: ">0"
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
runAsGroup: ">0"
|
||||||
|
|
||||||
|
- name: "require-seccomp-profile"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Container must have seccompProfile"
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault | Localhost"
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault | Localhost"
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault | Localhost"
|
||||||
|
|
||||||
|
- name: "require-run-as-non-root"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "Container must run in non-root mode."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
runAsNonRoot: true
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
runAsNonRoot: true
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
runAsNonRoot: true
|
||||||
|
|
||||||
|
- name: "require-empty-seLinuxOptions"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: "SELinux options have to be unset."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- securityContext:
|
||||||
|
seLinuxOptions:
|
||||||
|
=(initContainers):
|
||||||
|
- securityContext:
|
||||||
|
seLinuxOptions:
|
||||||
|
containers:
|
||||||
|
- securityContext:
|
||||||
|
seLinuxOptions:
|
||||||
|
|
||||||
|
- name: "require-default-procMount"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
Changing the proc mount from the default is not allowed. The fields
|
||||||
|
spec.containers[*].securityContext.procMount, spec.initContainers[*].securityContext.procMount,
|
||||||
|
and spec.ephemeralContainers[*].securityContext.procMount must be unset or
|
||||||
|
set to `Default`.
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- =(securityContext):
|
||||||
|
=(procMount): "Default"
|
||||||
|
=(initContainers):
|
||||||
|
- =(securityContext):
|
||||||
|
=(procMount): "Default"
|
||||||
|
containers:
|
||||||
|
- =(securityContext):
|
||||||
|
=(procMount): "Default"
|
||||||
|
|
||||||
|
- name: "restrict-sysctls"
|
||||||
|
match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
Setting additional sysctls above the allowed type is not allowed.
|
||||||
|
The field spec.securityContext.sysctls must be unset or not use any other names
|
||||||
|
than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range,
|
||||||
|
net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and
|
||||||
|
net.ipv4.ping_group_range.
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(securityContext):
|
||||||
|
=(sysctls):
|
||||||
|
- =(name): >-
|
||||||
|
kernel.shm_rmid_forced |
|
||||||
|
net.ipv4.ip_local_port_range |
|
||||||
|
net.ipv4.ip_unprivileged_port_start |
|
||||||
|
net.ipv4.tcp_syncookies |
|
||||||
|
net.ipv4.ping_group_range
|
||||||
|
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
38
.kyverno/policies/require-health-and-liveness-check.yaml
Normal file
38
.kyverno/policies/require-health-and-liveness-check.yaml
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "require-health-and-liveness-check"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Disallow usage of latest tag"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
Liveness and readiness probes need to be configured to correctly manage a Pod's lifecycle during deployments,
|
||||||
|
restarts, and upgrades.
|
||||||
|
For each Pod, a periodic `livenessProbe` is performed by the kubelet to determine if the Pod's containers are
|
||||||
|
running or need to be restarted.
|
||||||
|
A `readinessProbe` is used by Services and Pods to determine if the Pod is ready to receive network traffic.
|
||||||
|
This policy validates that all containers have livenessProbe and readinessProbe defined.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "require-health-and-liveness-check"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
Liveness and readiness probes are required. spec.containers[*].livenessProbe.periodSeconds must be set to a
|
||||||
|
value greater than 0.
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- livenessProbe:
|
||||||
|
periodSeconds: ">0"
|
||||||
|
readinessProbe:
|
||||||
|
periodSeconds: ">0"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
51
.kyverno/policies/require-imagepullpolicy.yaml
Normal file
51
.kyverno/policies/require-imagepullpolicy.yaml
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "require-imagepullpolicy"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Disallow usage of latest tag"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
If the `latest` tag is allowed for images, it is a good idea to have the imagePullPolicy field set to `Always` to
|
||||||
|
ensure later pulls get an updated image in case the latest tag gets updated.
|
||||||
|
This policy validates the imagePullPolicy is set to `Always` when the `latest` tag is specified explicitly or
|
||||||
|
where a tag is not defined at all.
|
||||||
|
Additionally this policy checks if the variable `.Values.global.imagePullPolicy` is used in templates.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "require-imagePullPolicy"
|
||||||
|
validate:
|
||||||
|
message: >-
|
||||||
|
The imagePullPolicy must be set to `Always` when the `latest` tag is used, otherwise the value from
|
||||||
|
`.Values.global.imagePullPolicy` has to be used.
|
||||||
|
anyPattern:
|
||||||
|
- spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- (image): "*:latest | !*:*"
|
||||||
|
imagePullPolicy: "Always"
|
||||||
|
=(initContainers):
|
||||||
|
- (image): "*:latest | !*:*"
|
||||||
|
imagePullPolicy: "Always"
|
||||||
|
containers:
|
||||||
|
- (image): "*:latest | !*:*"
|
||||||
|
imagePullPolicy: "Always"
|
||||||
|
- spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- (image): "!*:latest"
|
||||||
|
imagePullPolicy: "kyverno"
|
||||||
|
=(initContainers):
|
||||||
|
- (image): "!*:latest"
|
||||||
|
imagePullPolicy: "kyverno"
|
||||||
|
containers:
|
||||||
|
- (image): "!*:latest"
|
||||||
|
imagePullPolicy: "kyverno"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
38
.kyverno/policies/require-requests-limits.yaml
Normal file
38
.kyverno/policies/require-requests-limits.yaml
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "require-requests-limits"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Require resources cpu/memory request and limits."
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
As application workloads share cluster resources, it is important to limit resources requested and consumed by
|
||||||
|
each Pod.
|
||||||
|
It is recommended to require resource requests and limits per Pod, especially for memory and CPU.
|
||||||
|
If a Namespace level request or limit is specified, defaults will automatically be applied to each Pod based on
|
||||||
|
the LimitRange configuration.
|
||||||
|
This policy validates that all containers have specified requests for memory and CPU and a limit for memory.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "validate-resources"
|
||||||
|
validate:
|
||||||
|
message: "CPU and memory resource requests and limits are required."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- resources:
|
||||||
|
limits:
|
||||||
|
memory: "?*"
|
||||||
|
requests:
|
||||||
|
cpu: "?*"
|
||||||
|
memory: "?*"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
35
.kyverno/policies/require-tag-and-digest.yaml
Normal file
35
.kyverno/policies/require-tag-and-digest.yaml
Normal file
@@ -0,0 +1,35 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "require-tag-and-digest"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Require tag and digest for image."
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
To ensure that containers are not compromised in container registry by pushing malicious code to the same tag, it
|
||||||
|
is required to reference images by setting a sha256 hashed digest.
|
||||||
|
Setting only the digest is complicated for humans to compare software versions, therefore in openDesk it is
|
||||||
|
required to reference container images by tag and digest.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "require-tag-and-digest"
|
||||||
|
validate:
|
||||||
|
message: "An image tag and digest required."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- image: "*:*@sha256:*"
|
||||||
|
=(initContainers):
|
||||||
|
- image: "*:*@sha256:*"
|
||||||
|
containers:
|
||||||
|
- image: "*:*@sha256:*"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
33
.kyverno/policies/template-image-registries.yaml
Normal file
33
.kyverno/policies/template-image-registries.yaml
Normal file
@@ -0,0 +1,33 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "template-image-registries"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Check image registry template"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
This policy verifies that a custom external registry can be template to allow downloads from a private registry or
|
||||||
|
cache.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "template-image-registries"
|
||||||
|
validate:
|
||||||
|
message: "Unknown image registry."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
=(ephemeralContainers):
|
||||||
|
- image: "external-registry.souvap-univention.de/*"
|
||||||
|
=(initContainers):
|
||||||
|
- image: "external-registry.souvap-univention.de/*"
|
||||||
|
containers:
|
||||||
|
- image: "external-registry.souvap-univention.de/*"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
38
.kyverno/policies/template-ingress.yaml
Normal file
38
.kyverno/policies/template-ingress.yaml
Normal file
@@ -0,0 +1,38 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "template-ingress"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Validate openDesk Ingress templating"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
This policy verifies that ingress variables are templated.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Ingress"
|
||||||
|
name: "template-ingressClassName"
|
||||||
|
validate:
|
||||||
|
message: "Verifies that ingressClassName can be customized by `.Values.ingress.ingressClassName` variable."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
ingressClassName: "kyverno"
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Ingress"
|
||||||
|
name: "template-tls-secretName"
|
||||||
|
validate:
|
||||||
|
message: "Verifies that tls.secretName can be customized by `.Values.ingress.tls.secretName` variable."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
tls:
|
||||||
|
- secretName: "kyverno-tls"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
29
.kyverno/policies/template-replicas.yaml
Normal file
29
.kyverno/policies/template-replicas.yaml
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "template-replicas"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Validate openDesk Pod replicas templating"
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
This policy verifies that `.Values.replicas.<app>` variables are templated.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Deployment"
|
||||||
|
- "StatefulSet"
|
||||||
|
name: "template-replicas"
|
||||||
|
validate:
|
||||||
|
message: "Verifies that replica count can be customized by `.Values.replicas.<app>` variable."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
replicas: 42
|
||||||
|
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
31
.kyverno/policies/template-require-imagepullsecets.yaml
Normal file
31
.kyverno/policies/template-require-imagepullsecets.yaml
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "template-imagepullsecrets"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "ImagePullSecrets template variable have to be implemented."
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
It is recommended to cache images to ensure continuous image availability during network partitions, rate limiting
|
||||||
|
or registry outages.
|
||||||
|
These caches as well as a company proxy may require authentication which will be provided as ImagePullSecrets.
|
||||||
|
This is a openDesk test to ensure that environment variables are templated in Helmfile deployment.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "Pod"
|
||||||
|
name: "template-imagePullSecrets"
|
||||||
|
validate:
|
||||||
|
message: "ImagePullSecrets are required."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
imagePullSecrets:
|
||||||
|
- name: "kyverno-test"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
67
.kyverno/policies/template-storage.yaml
Normal file
67
.kyverno/policies/template-storage.yaml
Normal file
@@ -0,0 +1,67 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
apiVersion: "kyverno.io/v1"
|
||||||
|
kind: "ClusterPolicy"
|
||||||
|
metadata:
|
||||||
|
name: "template-storage"
|
||||||
|
annotations:
|
||||||
|
policies.kyverno.io/title: "Validate storageClass and size templates."
|
||||||
|
policies.kyverno.io/subject: "Pod"
|
||||||
|
policies.kyverno.io/description: >-
|
||||||
|
This policy validates if `.Values.persistence.storageClassNames` variables are used in templates and if the size
|
||||||
|
of volumes can be customized by `.Values.persistence.size` variable.
|
||||||
|
spec:
|
||||||
|
background: true
|
||||||
|
rules:
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
name: "template-storageClassName-pod"
|
||||||
|
validate:
|
||||||
|
message: "VolumeClaims inside pods needs to have storageClass set when templated."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
(volumeClaimTemplates):
|
||||||
|
- spec:
|
||||||
|
storageClassName: "kyverno-test"
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "PersistentVolumeClaim"
|
||||||
|
name: "template-storageClassName-pvc"
|
||||||
|
validate:
|
||||||
|
message: "PersistentVolumeClaim needs to have storageClassName set when templated."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
storageClassName: "kyverno-test"
|
||||||
|
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "StatefulSet"
|
||||||
|
name: "template-requests-storage-pod"
|
||||||
|
validate:
|
||||||
|
message: "VolumeClaims inside pods needs to have storageClass set when templated."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
(volumeClaimTemplates):
|
||||||
|
- spec:
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: "42Gi"
|
||||||
|
- match:
|
||||||
|
resources:
|
||||||
|
kinds:
|
||||||
|
- "PersistentVolumeClaim"
|
||||||
|
name: "template-requests-storage-pvc"
|
||||||
|
validate:
|
||||||
|
message: "PersistentVolumeClaim needs to have storageClassName set when templated."
|
||||||
|
pattern:
|
||||||
|
spec:
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
storage: "42Gi"
|
||||||
|
validationFailureAction: "audit"
|
||||||
|
...
|
||||||
@@ -6,3 +6,7 @@ Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sover
|
|||||||
Files: helmfile/environments/default/theme/*
|
Files: helmfile/environments/default/theme/*
|
||||||
Copyright: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
Copyright: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
License: Apache-2.0
|
License: Apache-2.0
|
||||||
|
|
||||||
|
Files: helmfile/files/gpg-pubkeys/*
|
||||||
|
Copyright: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
License: CC0-1.0
|
||||||
|
|||||||
731
CHANGELOG.md
731
CHANGELOG.md
@@ -1,3 +1,729 @@
|
|||||||
|
## [0.5.81](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.80...v0.5.81) (2024-03-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **docs:** Various updates ([50e2638](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/50e263866be8b51ef295ebf8025c3117821a2b6c))
|
||||||
|
* **element:** Update Element Web to v1.11.59 with widget sync fix and NeoBoard v1.14.0 ([0fd4a26](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/0fd4a26c711fb345b79cdff1c775d7ef20335768))
|
||||||
|
* **helmfile:** Fix OpenAPI validations for Kubernetes v1.28 ([0aa4cfb](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/0aa4cfb46f793369a472a736b28eea834a545439))
|
||||||
|
* **nextcloud:** Bump to 28.0.3 ([34d2c05](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/34d2c059596466f8f7d6d09c2855c595391a7e0d))
|
||||||
|
* **nextcloud:** Rename default shared folder to `__Shared_with_me__` ([5f9d015](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/5f9d015f0b98579d652fd4172e74835ed67ccf11))
|
||||||
|
* **open-xchange:** Bump to 8.22 ([5ebf291](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/5ebf291a4dbe88a09c0afe2befa6140ad33bf30b))
|
||||||
|
* **openproject:** Bump OpenProject to 13.4.0 ([d565c05](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/d565c057ddb7b348f7a829e0f931b1ea448b454b))
|
||||||
|
* **openproject:** Bump version to 13.4.1 ([7cc3964](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/7cc39647d89538630bac9caa158c47b5cb8d2c45))
|
||||||
|
* **services:** Update Otterize Policies ([42f63e3](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/42f63e399230495c83f934e07beb9fc950ef5e29))
|
||||||
|
* **univention-management-stack:** Add missing authenticator secret mount to portal-server ([5a39e87](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/5a39e8725b6454591f552f87f12535201e52df7c))
|
||||||
|
* **univention-management-stack:** Update LDAP server for BSI base security compliance ([8e889db](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/8e889db63eaf05b24cc23838545f63d969232c65))
|
||||||
|
* **univention-management-stack:** Update ldap-notifier and ldap-server ([a41ddd5](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/a41ddd5451a9fbd3c6319827fee3eaffbd931271))
|
||||||
|
* **univention-management-stack:** Update provisioning charts, images and helm value to add authentication ([8c97bcf](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/8c97bcf994487281ae94e6d66c73f4a11c08a0be))
|
||||||
|
|
||||||
|
## [0.5.80](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.79...v0.5.80) (2024-03-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Remove creation of release artefacts, use the `images.yaml` and `charts.yaml` in `./helmfile/environments/default` for information about the artefacts instead. ([ee99eef](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/ee99eefb72d3207866ffd1b3bd21a36bd55ad288))
|
||||||
|
* **collabora:** Bump image to 23.05.9.4.1 ([9c32058](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/9c32058fcc21a14e9e66a46064ea044402638920))
|
||||||
|
* **docs:** Add development.md and refactor `images.yaml` and `charts.yaml` ([a2b333b](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/a2b333b46277a4bb86b75ca04edb64e69efff916))
|
||||||
|
* **helmfile:** YAML handling of seLinuxOptions and align overall `toYaml` syntax ([011ad2c](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/011ad2cd6bfe552e04a598452e8814d4d1029152))
|
||||||
|
* **nextcloud:** Update images digests ([bc18724](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/bc18724d70ffff749d5192487944e62233cf4376))
|
||||||
|
* **openproject:** Bump to 13.3.1 ([7ee9e47](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/7ee9e47e8269334294c80093a359b247d86f5d62))
|
||||||
|
|
||||||
|
## [0.5.79](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.78...v0.5.79) (2024-02-29)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Bump image to 23.05.9.2.1 ([f4b8226](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/f4b8226ea13971a38d61145ea9ac3821bc35f6b3))
|
||||||
|
* **collabora:** Fix aliasgroups configuration whitelisting the Nextcloud host ([8b065fd](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/8b065fd9d789cdd597a584937fefaae40f42bba2))
|
||||||
|
* **docs:** Update version numbers of functional components for release in README.md ([31e5cf3](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/31e5cf317ca7cd84a94cf42d57d0964152904471))
|
||||||
|
* **element:** Provide end-to-end encryption as user controlled option ([3d31127](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/3d31127a6ab0fa1d3af02695b521db5918932279))
|
||||||
|
* **helmfile:** Enhance objectore environment variables to allow external Object Store ([d444226](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/d4442261aa141e21222dc13407023b96570d055f))
|
||||||
|
* **helmfile:** Set debuglevel to WARN instead of INFO when debug is not enabled. ([2efceef](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/2efceef076beb06a3719859d7f4e2f0d03b99f44))
|
||||||
|
* **nextcloud:** Bump images to enable password_policy and fix email with groupware ([8807b24](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/8807b24ce09e59aaea39c349e9e12ee2a44a117a))
|
||||||
|
* **univention-management-stack:** Bump Keycloak Extensions chart and configure the `/univention/meta.json` to be retrieved from `ums-stack-gateway` to avoid the inline 404 during Keycloak login. ([2023d5b](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/2023d5bce4642f794831670713b1a2520a0419d6))
|
||||||
|
* **univention-management-stack:** Provisioning version bump ([410a023](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/410a0237149a5e41434c09795959bc53e57fb4ca))
|
||||||
|
* **univention-management-stack:** Template more Keycloak Extension values incl. logLevel ([7ec123b](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/7ec123b9a174c8dade1fe9f6679796979749efab))
|
||||||
|
|
||||||
|
## [0.5.78](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.77...v0.5.78) (2024-02-23)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Move main development repo OpenCoDE ([43718b8](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/43718b8da2966b87fab8e206df449c923f6615e7))
|
||||||
|
* **ci:** Run release pipeline only on pushes to main ([13dcb00](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/13dcb004419b4efd8ded8c25e7afa41d10156be8))
|
||||||
|
* **ci:** Update kyverno rules ([d9263c9](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/d9263c90110df241adaef8d1a5df8e8d8ceda11b))
|
||||||
|
* **docs:** Add missing footnote regarding Nubus ([bc6e4f8](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/bc6e4f8e5dcc32cc476de579fd56dbade79b7c31))
|
||||||
|
* **nextcloud:** Set admin priviledges for users in central IAM ([a3e415d](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/a3e415d575ba24b99e741994fb29d0f0cfd11d8a))
|
||||||
|
* **univention-management-stack:** Scaling udm-rest-api ([57d0f61](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/57d0f61b2c3e789b72a0098907817c97fee69268))
|
||||||
|
* **univention-management-stack:** Set Keycloak CSP header to allow session continuation in admin portal. ([a398e5a](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/a398e5aaf131c1f00b09e1776d6daf10f2c343ad))
|
||||||
|
* **univention-management-stack:** UMS portal-server scalability ([b1b4c28](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/b1b4c28618e0eca31b59719e9e1f2db8ecff7f5c))
|
||||||
|
* **univention-management-stack:** Univention Portal upstream codefixes version bump ([c2f62f7](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/c2f62f7c9487b2119b0d3efd98b40c92efb97c5d))
|
||||||
|
* **univention-management-stack:** Update provisioning to fix high CPU usage when in idle ([d9c23bd](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/d9c23bdf0b955c0b5e4c82dd1ee785b75ce18a3b))
|
||||||
|
|
||||||
|
## [0.5.77](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.76...v0.5.77) (2024-02-16)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Complete CI var usage for external registry ([3bcdcd0](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/3bcdcd06b7c4829686f11b8f065ec38829b5a5a6))
|
||||||
|
* **ci:** Update openDesk CI Lint to v2.3.1 ([250ef2b](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/250ef2bc3fe9047b49b236b606ec3e3fa28e13ce))
|
||||||
|
* **collabora:** Add chart validation ([0159902](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/01599022f14d447dfdadf390ca9e8e29668dfb07))
|
||||||
|
* **collabora:** Bump to 23.05.9.1.1 ([b525a81](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/b525a814fc25867c068579d5cbd8d1a993144519))
|
||||||
|
* **cryptpad:** Update chart to v0.0.18 ([6f0b1f3](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/6f0b1f37fc06c40bf537dbaed60f314341211e41))
|
||||||
|
* **docs:** Add functional component table referencing the component versions to README.md ([bc7eeb8](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/bc7eeb8c9d3dd19f625d6f7ba94b15eb4b782d20))
|
||||||
|
* **docs:** Add generated security-context.md ([d9e07ff](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/d9e07ff7bd0e8be090f4fe2c370fa9978c22dfd5))
|
||||||
|
* **element:** Change name of neodatefix bot job ([dd535da](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/dd535daac0bb0e602eefa45e8dc448fd07fbdd33))
|
||||||
|
* **element:** Disable e2ee ([ba0824b](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/ba0824bac30ae1fc43458bdc8c09a143076e874c))
|
||||||
|
* **helmfile:** Add additional provisioning components and configuration ([110ff56](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/110ff56f7487e7ac89b1b75c8c63d04e1c2a41c0))
|
||||||
|
* **helmfile:** Add seLinuxOptions for all applications ([02d04fa](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/02d04faa2a8d8a0b3bfc179cc8efb3fec086bc70))
|
||||||
|
* **helmfile:** Annotations in image.yaml ([7ebbd03](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/7ebbd03bdcb11abf4e459035c459b74adf8cfcda))
|
||||||
|
* **helmfile:** Bump Collabora Chart to 1.11.1 and Image to 23.05.8.4.1 ([d2b1f0b](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/d2b1f0b07b5ebe4b98b2dc29b916857e28ce5706))
|
||||||
|
* **helmfile:** Fix annotations in images.yaml ([acaec3b](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/acaec3b8ac6e0ecd58167fca874cd56caa15fa98))
|
||||||
|
* **helmfile:** Fix umsPortalFrontend image annotation ([8f83261](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/8f832619864504eaa04945a9a79d6790d2ab8a48))
|
||||||
|
* **helmfile:** Improve debugging ([56f5e35](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/56f5e35895c712440c1a7d249be672c86fc34eeb))
|
||||||
|
* **nextcloud:** Bump openincryptpad to 0.3.3 and disable circles app ([f2b8acf](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/f2b8acfba85d384ed425779fa52133935e553e86))
|
||||||
|
* **nextcloud:** Set backchannel logout url ([c0fc225](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/c0fc225349794034feea1d0c05b29068b9a455af))
|
||||||
|
* **nextcloud:** Update image, nextcloud apps and chart ([fd2a66f](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/fd2a66f8f2a987aa71872122267f29aee3d5f22a))
|
||||||
|
* **nextcloud:** Update nextcloud image and chart to support upgrades ([5d95e7a](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/5d95e7ab2a71097d8c6231bff8c3a6aa3b6f163a))
|
||||||
|
* **nextcloud:** Update to Nextcloud to v28 ([7c9f38f](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/7c9f38f06e1f0d000992ecdfd77921d6fc28015c))
|
||||||
|
* **open-xchange:** Bump Gotenberg image ([49f126d](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/49f126d169759b3e9dd130101e64892822750d7b))
|
||||||
|
* **open-xchange:** Dovecot image on OpenCoDE without mirror ([1396071](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/139607186549f7a9a129023f1f72aff82cf36460))
|
||||||
|
* **openproject:** Bump version to 13.3.0 ([c2087ef](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/c2087efcf95bf2eef19556ba1a1d26b7807021c4))
|
||||||
|
* **univention-management-stack:** New device login notifications on first login with 2FA ([ee1a337](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/ee1a337ab5dea7001045860eb6a5bee1dfc84219))
|
||||||
|
* **univention-management-stack:** Patches not applied to uldap ([2909e1d](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/2909e1d821397797244d7c11c0935a3bbc902bb1))
|
||||||
|
* **univention-management-stack:** Support for object-storage icons and portal files ([83ac645](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/83ac645faec748e773dd7940ca0ca1102bd6dff3))
|
||||||
|
* **univention-management-stack:** Update NGINX Helm chart to 15.9.3 ([c16c0ac](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/c16c0ac7955e64254214d7129ae70d5dd8808743))
|
||||||
|
* **univention-management-stack:** Update otterize to allow umc-server communication with memcached ([6c15dc1](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/6c15dc1d668623ddd95090e321d1bb268e681db5))
|
||||||
|
* **xwiki:** Add bottom border to top nav bar to be aligned with the other components ([affa92c](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/affa92cde2caa175707f8ae0e8d4adedbdceb608))
|
||||||
|
* **xwiki:** Bump XWiki chart to 1.3.0 ([cabee0c](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/cabee0c9da3a32e180931b3bd490ba8f83aadb79))
|
||||||
|
|
||||||
|
## [0.5.76](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.75...v0.5.76) (2024-01-24)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Correct indent in monitoring resources ([bea1413](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/bea1413b860aa69cab3bb4a9dfb6d8593594cc25))
|
||||||
|
* **services:** Monitoring for minio with correct labels and there are no prometheusRule ([af63e5c](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/af63e5c18dbd6d7d1e1ebd79ad91c4f994fe7003))
|
||||||
|
* **univention-management-stack:** Fix external registry for nats charts ([cbb33b9](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/cbb33b922d397467d01a9227f3eb18d789cdc39c))
|
||||||
|
|
||||||
|
## [0.5.75](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/compare/v0.5.74...v0.5.75) (2024-01-24)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Add Kyverno CI Lint ([e778a59](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/e778a59cddecc7c73b827e03af5e47ddd5c3dcee))
|
||||||
|
* **helmfile:** Cleanup and small conformity fixes ([db0a544](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/db0a5441550ae08450afc04ef274ff8d19e85138))
|
||||||
|
* **helmfile:** Merge .yaml and .gotmpl files for Services, Provisioning, Cryptpad, Intercom-Service and Element ([a49daa6](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/a49daa6fa27dc7c51c3163b1155eec33b78949f5))
|
||||||
|
* **helmfile:** Split image and helm registry ([89c149a](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/89c149af954a6f0884ae905e55b52e8db9036b05))
|
||||||
|
* **univention-management-stack:** UMC secure session cookie ([67f7c05](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/67f7c050387157808f010857395715335b42d767))
|
||||||
|
* **univention-management-stack:** Update guardian to version 2 ([a99f338](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/commit/a99f3389dc90aa89ce2ba4bcfc266a2dfdf15ab9))
|
||||||
|
|
||||||
|
## [0.5.74](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.73...v0.5.74) (2024-01-12)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Add opendesk-ci linter ([b23152b](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/b23152bb20f3460c62719e47ce519d093a42c034))
|
||||||
|
* **ci:** Scan all images for malware on release ([807b73c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/807b73c8a4f39de31f6ae02003541cf19597a3b7))
|
||||||
|
* **ci:** Switch to 'on_success' instead of 'always' ([e1f6370](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/e1f63701f108bcc124ec67079df1a8649cc2e7c2))
|
||||||
|
* **collabora:** Migrate collabora to yaml.gotmpl file ([09d001b](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/09d001b6db167ff0a5cd95a1cd58dd2f117f338f))
|
||||||
|
* **cryptpad:** Bump image ([90152bd](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/90152bdc41131c359075556d26873c1ad5292950))
|
||||||
|
* **cryptpad:** Bump image to 5.6.0 ([1c4db30](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/1c4db30b65249294696d71e435307d2877556b2c))
|
||||||
|
* **cryptpad:** Verify against GPG key ([fec0d1f](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/fec0d1f26acd729e71d441ae8043830049028cf4))
|
||||||
|
* **docs:** Update Helm Chart Trust Chain information ([f894370](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/f8943703ede8f3757dc10b789d95239fe8038d5c))
|
||||||
|
* **element:** Fix rights & roles of neoboard ([7daa93f](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/7daa93f06179a9d6eedbc058503252d7b7aa04b1))
|
||||||
|
* **element:** Fix rights and roles configuration ([452624c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/452624ce749b60abb1208a9f298e92af7d0168d0))
|
||||||
|
* **helmfile:** Add image annotations for mirroring ([41e777c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/41e777c81dcb50ead8486683fea8cbbc69f07129))
|
||||||
|
* **helmfile:** Add logLevel to globals ([8db9bf3](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/8db9bf3c993845c94331c7f1891c3abda907d6e6))
|
||||||
|
* **helmfile:** Add XWiki GPG key ([712605e](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/712605e4f14913f8e5cda61f64514e077d8df5dc))
|
||||||
|
* **helmfile:** Increase timeouts for deployment of services ([3b557a8](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/3b557a892c80f4c0061c36fc706502c49a7c4607))
|
||||||
|
* **helmfile:** Merge fix values filename for Jitsi ([7a14531](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/7a145315f9768f5b5606a1b951f7f07f8a8a7673))
|
||||||
|
* **helmfile:** Remove oci flag from charts.yaml and move user/password ([2ad48b6](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/2ad48b6fd528c002501771dea96784e54d272c03))
|
||||||
|
* **helmfile:** Sort images and charts ([acf6816](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/acf681665352c84de00246b57b0be9afa48a820d))
|
||||||
|
* **helmfile:** Switch artefacts to be pulled from Open CoDE or upstream ([6b3d99d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6b3d99d1d1a41368650f828eaea69d9159b8e752))
|
||||||
|
* **intercom-service:** Add scaling option. ([969c42a](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/969c42a590bb47cddf4c5f59940d53d55dba8810))
|
||||||
|
* **jitsi:** Add available securityContexts here ([8f09740](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/8f097406773ad769e3bece6af6c994df8254228c))
|
||||||
|
* **nextcloud:** Replace community Nextcloud with openDesk Nextcloud ([813a2e2](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/813a2e29e964f95bff133a6b09608ff9f6fda255))
|
||||||
|
* **open-xchange:** Enable ICAP and merge yaml and gotmpl files ([306252d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/306252da6fb70c3728cf781ea62ab76ad1099af6))
|
||||||
|
* **openproject:** Consolidate env values set by Helm chart ([08754cc](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/08754cc527e2828a44e853277ed55d6b3d041a37))
|
||||||
|
* **openproject:** Merge yaml and gotmpl value files ([45967c7](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/45967c7a0b18df6ff23ebff62d5a4c67bde7cee2))
|
||||||
|
* **services:** Add scaling to all services ([0492420](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/0492420d60bf8e866b39dc51a2e3627cc710de75))
|
||||||
|
* **univention-management-stack:** Add guardian components ([db749d8](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/db749d8b1b5982d7ffd1728a40c343928a94dc9b))
|
||||||
|
* **univention-management-stack:** Add missing image template for ums stack gateway and imagePullSecrets to keycloak extensions ([0bf059e](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/0bf059e8e1560a63d4b5efbd80a00a896539f86b))
|
||||||
|
* **univention-management-stack:** Add ums provisioning service ([d039c65](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/d039c65c4b808e2a55a428502a8cfc05d001b43c))
|
||||||
|
* **univention-management-stack:** Bump Keycloak Bootstrap image ([bb289d5](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/bb289d545e2ee306ecf032d4889c694c7182f243))
|
||||||
|
* **univention-management-stack:** Bump Keycloak chart and image and provide settings for IT-Grundschutz ([c2e9204](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c2e9204c56c526b96e084bd7578cb981f3be29c0))
|
||||||
|
* **univention-management-stack:** Keycloak clients for guardian ([b30b29d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/b30b29df8aa179dd065db4ade1d2911f6c7ab458))
|
||||||
|
* **univention-management-stack:** Provide openDesk version info for admins in portal menu ([5f5a65f](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/5f5a65f59d4f67b589f6ac1f5c51ed584ab91ff0))
|
||||||
|
* **univention-management-stack:** SAML join using internal Keycloak hostname ([acbef3a](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/acbef3ae3e335de0c5dfc2e54e2c31b64643990a))
|
||||||
|
* **univention-management-stack:** Streamline timeouts for deployment ([506ef4a](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/506ef4a20f8f5de509a678f7df64f24137e985f6))
|
||||||
|
* **univention-management-stack:** Updated base image ([78993e1](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/78993e122bad05cc2801acf516ebebb4accc1aaf))
|
||||||
|
* **xwiki:** Bump Helm chart und image, fix favicon ([87b6fcf](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/87b6fcfc37babaca03ffdbb1ba4ae603db4f1c23))
|
||||||
|
* **xwiki:** Ldap group sync filter ([9aa907a](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/9aa907a90996b7b4fe4addbd4ca9f0eae6f65aec))
|
||||||
|
* **xwiki:** Update default XWiki configuration ([f13f39a](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/f13f39a0a0fe9748f12270e9c933c985919b8eda))
|
||||||
|
* **xwiki:** Update Image to include XWiki 15.10.4 ([9ff6056](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/9ff605623c955d34dcccfdfb69c5b6245ab3f4fc))
|
||||||
|
* **xwiki:** Update to 1.2.6 and add imagePullSecrets ([2d2455f](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/2d2455fdb347ec001e6a48a5a61dc9098a66e6d6))
|
||||||
|
* **xwiki:** Verify against GPG key ([a0d5fb8](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/a0d5fb895518aa28b6e69cffdcecde1fe2a53ceb))
|
||||||
|
|
||||||
|
## [0.5.73](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.72...v0.5.73) (2023-12-21)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **docs:** Add and reference workflow.md ([0e1e875](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/0e1e87550f2ff10a3ff11e860e559a54251702cb))
|
||||||
|
* **helmfile:** Make GPG keys to use CC0-1.0 ([006e20f](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/006e20f06bf5969a213c40c9cbd241cb35adef6c))
|
||||||
|
* **helmfile:** Pull Univention Helm charts from OCI ([8d6503c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/8d6503cf28e7960f914325a834032cd9c4e01724))
|
||||||
|
* **helmfile:** Switch Helm charts to Open CoDE ([0952221](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/0952221f9052f0e58e19629ccd47d85b60b53155))
|
||||||
|
* **open-xchange:** Disable debug container (appsuite-toolkit) ([40fb9dc](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/40fb9dc9faf7cf579707758d2f5d8714509d34d9))
|
||||||
|
* **univention-management-stack:** Add extended timeouts to Helm deployment ([1f7b3ca](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/1f7b3ca0f93036300d1421bedc962cf725e6459e))
|
||||||
|
|
||||||
|
## [0.5.72](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.71...v0.5.72) (2023-12-18)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Update image to 23.05.6.3.1 ([8c378c6](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/8c378c6f91a88da3b45c209da5360cabfeb911aa))
|
||||||
|
* **docs:** Update scaling.md ([d342efe](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/d342efe9a9bbc8f018831e2723e664e5365abba3))
|
||||||
|
* **open-xchange:** Update Helm chart removing yaml templating doublettes ([c21dd46](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c21dd462895870fd6ba98bbb167ac063e747a501))
|
||||||
|
|
||||||
|
## [0.5.71](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.70...v0.5.71) (2023-12-15)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **docs:** Security.md ([36bbbae](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/36bbbae57918036f44ddb23e47b550b2f46e5f35))
|
||||||
|
* **univention-management-stack:** Switch to Univention Keycloak ([902076c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/902076c62909889f8ffcf90328bc06ebb908b9b8))
|
||||||
|
|
||||||
|
## [0.5.70](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.69...v0.5.70) (2023-12-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Remove UCS container monolith and make UMS standard IAM ([450c434](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/450c434ed08120ad0757d672dc269a78362e780d))
|
||||||
|
|
||||||
|
## [0.5.69](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.68...v0.5.69) (2023-12-12)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Functional replacement for UCS container monolith, still optional. ([ce38714](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/ce38714a81ea3b0e1377e6ea2d640fb65f317396))
|
||||||
|
|
||||||
|
## [0.5.68](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.67...v0.5.68) (2023-12-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **jitsi:** Disable IP Blacklist ([6a649cb](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6a649cb7f0d04736ccabcd27c035ef6d051f6fd5))
|
||||||
|
* **open-xchange:** Update to latest version ([db4bfa4](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/db4bfa488401f10bad111ce03c20a60473c64837))
|
||||||
|
|
||||||
|
## [0.5.67](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.66...v0.5.67) (2023-12-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **services:** Use Charts from openCoDE registry ([cc0daa2](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/cc0daa2a22837c00583038ffd9df7e669004e84e))
|
||||||
|
|
||||||
|
## [0.5.66](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.65...v0.5.66) (2023-12-08)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element and Widgets ([6a26299](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6a26299a7507ae749ffcf25288d2cf5b24d220db))
|
||||||
|
|
||||||
|
## [0.5.65](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.64...v0.5.65) (2023-12-08)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Bump OX Connector ([83192b7](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/83192b78345c62465e2979195d9a1c882ddbf0ea))
|
||||||
|
|
||||||
|
## [0.5.64](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.63...v0.5.64) (2023-12-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Switch to release container and set home url link ([e67ab8f](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/e67ab8f4304a525b50a3a723c86d1e610313c594))
|
||||||
|
|
||||||
|
## [0.5.63](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.62...v0.5.63) (2023-12-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Remove Talk folder ([0ea5856](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/0ea585633b4bf72fe180ca744cc99d9e9f84998f))
|
||||||
|
|
||||||
|
## [0.5.62](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.61...v0.5.62) (2023-12-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Bump image to 27.1.4 and update Helm chart to configure "Shared_with_me" folder ([d04a603](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/d04a60349dbbff2d64ca2b36b9c44b75526bf859))
|
||||||
|
* **univention-management-stack:** Update optional UMS preview state ([94ae3da](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/94ae3da78bd79c61fd7a22db5a541d473eea6a2e))
|
||||||
|
|
||||||
|
## [0.5.61](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.60...v0.5.61) (2023-12-05)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **services:** Fix port declaration for Postfix ([bf5dcda](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/bf5dcda3b59e1dc98cbee7e67f50a960d344b8e0))
|
||||||
|
|
||||||
|
## [0.5.60](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.59...v0.5.60) (2023-12-05)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Ensure release creation with artifacts ([dc7ce0b](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/dc7ce0bc4b9501b63274f68352e6d9e76b5424e8))
|
||||||
|
|
||||||
|
## [0.5.59](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.58...v0.5.59) (2023-12-05)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add configurable objectstore ([3b5493d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/3b5493d78dc027cd1f3206b26cf347dc6ce6e265))
|
||||||
|
|
||||||
|
## [0.5.58](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.57...v0.5.58) (2023-12-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Add websocket annotation ([c41643e](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c41643ee3e5610ef27a63a0355804159030a7452))
|
||||||
|
* **openproject:** Add seederJob intent ([05cc82d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/05cc82d7c5c5f93fb5de7df555a22e8e90279621))
|
||||||
|
* **openproject:** Bump to 2.6.2 ([c8bc8b3](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c8bc8b3172cfef3396379e3969dc087d67a228ee))
|
||||||
|
* **services:** Add NetworkPolicy section to docs/security.md ([24812b6](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/24812b667cded720a0ac09b8b3eb89df39b02afb))
|
||||||
|
* **services:** Add Otterize based security settings ([bec9a2d](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/bec9a2d46b2b563b7001ed8c6625c10111d5f151))
|
||||||
|
* **univention-management-stack:** Add Otterize annotations for jobs ([2628a0e](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/2628a0e13e5957475ce81b12d4230400c9ffeafe))
|
||||||
|
|
||||||
|
## [0.5.57](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.56...v0.5.57) (2023-12-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Using correct private registry for postfix helm-chart ([d367739](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/d367739248ed43b3bad6a00b059b2c949dde4cb7))
|
||||||
|
|
||||||
|
## [0.5.56](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.55...v0.5.56) (2023-11-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Raise treshold for login rate limit to avoid too early barrier hitting normal users ([466e741](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/466e7414942837fdb1aecabfb08eae49f9dab272))
|
||||||
|
|
||||||
|
## [0.5.55](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.54...v0.5.55) (2023-11-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Update Helm chart to enable readiness and liveness probes ([6d3e484](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6d3e484855540569be53130e133e0821a04b2ca5))
|
||||||
|
|
||||||
|
## [0.5.54](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.53...v0.5.54) (2023-11-29)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add and document security context for components ([519db51](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/519db51be2be3ce292a88965ac0ec049b4c8bb8e))
|
||||||
|
|
||||||
|
## [0.5.53](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.52...v0.5.53) (2023-11-29)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-managemen-stack:** Integrate Attribute to Group Mapper into the containerized stack ([7bbab22](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/7bbab229396075c7d10f94f42bef14551faefe26))
|
||||||
|
* **univention-management-stack:** Add Announcements icon into "umc-gateway" ([7a9ecf7](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/7a9ecf7b8595edf0949d9c200d01b3409f25b9a7))
|
||||||
|
* **univention-management-stack:** Add Announcements module into "umc-server" ([4c52a5a](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/4c52a5aaa83ffb6f4c49faa039c94cb1855987bb))
|
||||||
|
* **univention-management-stack:** Add branding related configuration to stack-gateway ([a5f263c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/a5f263ce489f88b90cf1151de249f36616a51632))
|
||||||
|
* **univention-management-stack:** Apply styling ([b3d45c4](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/b3d45c45e1b754e14ab0519efcb6b6a359f0ad1e))
|
||||||
|
* **univention-management-stack:** Configure openDesk branding in frontend chart ([cbe8fb2](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/cbe8fb2d65e6ce73f9da95ef9b0ed3ffbb16d367))
|
||||||
|
* **univention-management-stack:** Document database of UMS Notifications API ([3cf348c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/3cf348c7ae8f438daf3e64addbf839230816f3d2))
|
||||||
|
* **univention-management-stack:** Move static settings from gotmpl into yaml for umc-gateway ([b3ac0ae](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/b3ac0ae6d91a058265fcd26c6653bb8a13d3e780))
|
||||||
|
* **univention-management-stack:** Quote all composed strings ([1c35ca6](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/1c35ca67ce0673e1b2f9a350bd07c82c22a05354))
|
||||||
|
* **univention-management-stack:** Remove frontend-custom ([8b6a4b2](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/8b6a4b2e88e8be1d299af91ed1ffff4405db88e6))
|
||||||
|
* **univention-management-stack:** Set SMTP host for self-service notifications ([0c7a77c](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/0c7a77c4b6f20c6d83e977dabfc4e555b652f6ac))
|
||||||
|
* **univention-management-stack:** UMC uses external memcached ([211bee9](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/211bee94bb7675860f867f0335fec9f14fc96875))
|
||||||
|
* **univention-management-stack:** Update ums-dependencies ([e0c6c14](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/e0c6c14dcaefc0755495270bbf45898721e27985))
|
||||||
|
* **univention-management-stack:** Update ums-dependencies ([c246edd](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c246edd8f9753e37bc9c32683faf41f5b46d7675))
|
||||||
|
* **univention-management-stack:** Update ums-dependencies ([86b4818](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/86b48188e160c1f7d15f2c33f1f3cd0cc0e68bf2))
|
||||||
|
* **univention-management-stack:** Use "stack-gateway" in all deployments ([c19bca2](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/c19bca2be0d14750bbef661e45c5c424f7da8e77))
|
||||||
|
|
||||||
|
## [0.5.52](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.51...v0.5.52) (2023-11-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Open automatic MRs for new branches ([735fec3](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/735fec3b4ccd33ba63e5fa6482526efb6853c64a))
|
||||||
|
|
||||||
|
## [0.5.51](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.50...v0.5.51) (2023-11-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Bump chart to fix central navigation ([cac6abe](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/cac6abe2510b6793963633077543684a6a4e7cbc))
|
||||||
|
* **openproject:** Update container and prepare for OIDC based user admin role setting ([6dc92df](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6dc92df2ebcae435e3b3609cc163dc6c33fb1b83))
|
||||||
|
|
||||||
|
## [0.5.50](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.49...v0.5.50) (2023-11-27)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Add metadata for renovate processing ([36aa3ed](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/36aa3ed7c9f9a6d0ffe23dc3ca2174d5f2741dfa))
|
||||||
|
|
||||||
|
## [0.5.49](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.48...v0.5.49) (2023-11-27)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Bump image to incorporate fix for https://github.com/nextcloud/security-advisories/security/advisories/GHSA-f962-hw26-g267 ([efbd814](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/efbd81496868c5d4274f09805a1e771f47d548be))
|
||||||
|
|
||||||
|
## [0.5.48](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.47...v0.5.48) (2023-11-24)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **services:** Update resource requests and remove cpu limits ([f86a74b](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/f86a74ba100c7f08f6538b58a713bbc87c00e814))
|
||||||
|
|
||||||
|
## [0.5.47](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/compare/v0.5.46...v0.5.47) (2023-11-24)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Rename absolute paths on OpenCoDE to new 'opendesk' base group name ([7ac2e0f](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/7ac2e0f9de2a8386a7f5809ba40db4ed7164a857))
|
||||||
|
* **xwiki:** Enable the sync of user profile picture from LDAP ([6aa3d38](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/commit/6aa3d386afe8b3f22e47f9971fd719089006b54e))
|
||||||
|
|
||||||
|
## [0.5.46](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.45...v0.5.46) (2023-11-23)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Fix quotes in element chart ([a447c13](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a447c137fe58be343e7ada55afb7f6891a5cde74))
|
||||||
|
|
||||||
|
## [0.5.45](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.44...v0.5.45) (2023-11-22)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Add security context ([db48140](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/db48140f3ae6576b21e93ac0f10f40765efd608d))
|
||||||
|
|
||||||
|
## [0.5.44](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.43...v0.5.44) (2023-11-21)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Remove default BASE_DOMAIN in .gitlab-ci.yml ([7ae65a3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7ae65a36a2777d249ba3784bf965da4c790a1b21))
|
||||||
|
|
||||||
|
## [0.5.43](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.42...v0.5.43) (2023-11-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Update optional UMS preview state ([061e588](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/061e588da90e52b531df0688347675bf4dcb431e))
|
||||||
|
|
||||||
|
## [0.5.42](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.41...v0.5.42) (2023-11-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Add exporter and serviceMonitor ([feed270](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/feed270fd7949743e8f9974e7f147e89ab623347))
|
||||||
|
* **nextcloud:** Bump openDesk bootstrap to 3.2.3 to support serverinfo token ([ea14f95](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ea14f953a4a54c01cc0d66db1bdb645ca4a661e5))
|
||||||
|
|
||||||
|
## [0.5.41](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.40...v0.5.41) (2023-11-16)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Split README into docs ([cd0e94f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/cd0e94f96fa5b377ab382b6c7738ed279cb2a199))
|
||||||
|
|
||||||
|
## [0.5.40](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.39...v0.5.40) (2023-11-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Bump Dovecot and fix out-of-office replys ([55f6ba2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/55f6ba21dc9eab811ac501bf0e2b78d4ae772194))
|
||||||
|
|
||||||
|
## [0.5.39](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.38...v0.5.39) (2023-11-14)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Update optional UMS preview state ([e231e57](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e231e5749d3804f888ec23e12b58783856043219))
|
||||||
|
|
||||||
|
## [0.5.38](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.37...v0.5.38) (2023-11-13)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Update image to 23.05.5.4.1 ([c460467](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c460467d7449b107134562b785e95f6280e3473d))
|
||||||
|
|
||||||
|
## [0.5.37](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.36...v0.5.37) (2023-11-12)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Add bootstrapping of Nextcloud filestore ([1971dfb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1971dfbded21d16909e889ba6d19ff9cf3e4cb20))
|
||||||
|
|
||||||
|
## [0.5.36](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.35...v0.5.36) (2023-11-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element and Widgets ([97034a5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/97034a556f4cdcc447f61003ad9cd036c186bc3b))
|
||||||
|
|
||||||
|
## [0.5.35](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.34...v0.5.35) (2023-11-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Eliminate some yamllint errors ([1d03a6e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1d03a6e11f368fd81dd10b91b0d9d7fc29c0cb24))
|
||||||
|
* **helmfile:** Move ldap host variable into helpers ([08811de](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/08811decd92e7fd7802d0eba2644046512ec58a4))
|
||||||
|
* **helmfile:** Update charts to use proper quoting ([69ea840](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/69ea84051721f3aaf36a5dbafdfb37dd86b66dbb))
|
||||||
|
* **services:** Add minio as service and consume by OpenProject ([baa5827](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/baa5827de3e1e368abf238a932a5849f169af723))
|
||||||
|
|
||||||
|
## [0.5.34](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.33...v0.5.34) (2023-11-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Bump helmchart and properly template OP's initdb image ([0d8e92f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0d8e92fc5a4729ff7649e5a10e629b962a9b671b))
|
||||||
|
|
||||||
|
## [0.5.33](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.32...v0.5.33) (2023-11-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Update security context ([89ae1d9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/89ae1d94ea4c4e8a15a395a80847a7f235365747))
|
||||||
|
|
||||||
|
## [0.5.32](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.31...v0.5.32) (2023-11-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Resource definitions ([65ce9a1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/65ce9a171b7c8ebc453fb6bbe96743c8516da2c6))
|
||||||
|
|
||||||
|
## [0.5.31](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.30...v0.5.31) (2023-11-08)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **univention-management-stack:** Update optional UMS preview state ([d0a0799](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d0a07997c12ddb9731a0dfed0d6fa71d9a3790e7))
|
||||||
|
|
||||||
|
## [0.5.30](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.29...v0.5.30) (2023-11-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Init monitoring in defaults and in collabora (for prometheus-monitor, -rules and grafana dashboard) ([0ad0434](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0ad043406bef7bb10d561ef1418b58cbd8714d43))
|
||||||
|
* **helmfile:** Add monitoring.yaml for optional monitoring ([385d81b](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/385d81b9a9e1ec319706493c51629c8e48822aa7))
|
||||||
|
|
||||||
|
## [0.5.29](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.28...v0.5.29) (2023-11-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **xwiki:** Update XWiki Helm configuration to enable LDAP and OIDC user synchronization ([7c56c72](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7c56c7244f3862b6b21627661430a94d804c6974))
|
||||||
|
|
||||||
|
## [0.5.28](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.27...v0.5.28) (2023-11-06)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Add Document- and ImageConverter, improve LDAP address book filters ([899a8c5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/899a8c5af9052634b98d9876dfbaea517d89ad49))
|
||||||
|
|
||||||
|
## [0.5.27](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.26...v0.5.27) (2023-11-04)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **docs:** Re-include release artefacts ([4359b21](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/4359b21f1cdae91a87b87ad2b270d67a2b1eda21))
|
||||||
|
|
||||||
|
## [0.5.26](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.25...v0.5.26) (2023-11-02)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Enables user directory search for all users ([8fafd90](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/8fafd906a3b0efa7e4164b357656d7903fc55371))
|
||||||
|
|
||||||
|
## [0.5.25](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.24...v0.5.25) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **cryptpad:** Add CryptPad to support editing of diagrams.net files from within Nextcloud ([ab6014f](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/ab6014f8c6285785be5c56cd656fe0636df4434c))
|
||||||
|
|
||||||
|
## [0.5.24](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.23...v0.5.24) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **collabora:** Update image to 23.05.5.3.1 ([38336d0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/38336d024033f4fe1a28b0f76f9c63ecdb076156))
|
||||||
|
|
||||||
|
## [0.5.23](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.22...v0.5.23) (2023-11-01)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element Web to latest release ([b47de62](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b47de62f987e8778878fee55ecda3032beb55f3d))
|
||||||
|
|
||||||
|
## [0.5.22](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.21...v0.5.22) (2023-10-31)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Nextcloud integration within K8s instances ([d249d0e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d249d0e3ce3ee0966033e870ea5c4d9e1928f045))
|
||||||
|
|
||||||
|
## [0.5.21](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.20...v0.5.21) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Deinstall components if disabled ([7feaadf](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7feaadf7f8830d8d0d5df752733c9b8f47315df6))
|
||||||
|
* **helmfile:** Put enviroments in first document inside of a yaml ([034e98c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/034e98c850fa1f67300c04883904737a69448a25))
|
||||||
|
|
||||||
|
## [0.5.20](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.19...v0.5.20) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Remove old XWiki image, set explicit timeout for OP deployment, bump Jitsi Helm chart to enable chat for stand-alone Jitsi ([5d01f8c](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5d01f8ca46384d63d69dab0119998c4bb3183084))
|
||||||
|
|
||||||
|
## [0.5.19](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.18...v0.5.19) (2023-10-30)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Update Element Web and Nordeck Widgets to latest releases ([2313f75](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/2313f75dbe32d855b0c440944bd0de51c8e104ca))
|
||||||
|
|
||||||
|
## [0.5.18](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.17...v0.5.18) (2023-10-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **xwiki:** Switch to Alpine/Jetty slim image ([b399869](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/b39986907cece3cec06012531a55b2699d131f90))
|
||||||
|
|
||||||
|
## [0.5.17](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.16...v0.5.17) (2023-10-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **nextcloud:** Update swp_integration app and prepare CryptPad integration ([a046dea](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/a046deaf173ab41029c2ab5e3161bd89e0fdabcb))
|
||||||
|
|
||||||
|
## [0.5.16](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.15...v0.5.16) (2023-10-26)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Slim container with upgraded helm-chart ([535823e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/535823e0a8b2bde72d159835248b2287fd136af7))
|
||||||
|
|
||||||
|
## [0.5.15](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.14...v0.5.15) (2023-10-25)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add XWiki Jetty and UniventionKeycloak to image.yaml for Compliance checks. They are not yet part of standard deployment. ([8e376bb](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/8e376bb4a5e37e16d76ea527cd02a5f614cdfe3d))
|
||||||
|
|
||||||
|
## [0.5.14](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.13...v0.5.14) (2023-10-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Support for openDesk top bar with central navigation ([e609b75](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e609b75cc7fcbb7f03997cb5e26dd9cf4628f77d))
|
||||||
|
|
||||||
|
## [0.5.13](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.12...v0.5.13) (2023-10-20)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Configure rights and roles ([59d58e3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/59d58e320e503727e42dbfe0b027ba7948275ac6))
|
||||||
|
|
||||||
|
## [0.5.12](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.11...v0.5.12) (2023-10-19)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Add an application service for the intercom-service ([1a4eced](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/1a4eced998998faa7ac862b8c409bbd743b16ec0))
|
||||||
|
* **element:** Add the Matrix NeoBoard Widget deployment ([5afd233](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/5afd2339c20a0be41078ae4c3ce703c62f332557))
|
||||||
|
* **element:** Add the Matrix NeoChoice Widget deployment ([7756d35](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7756d35fa156b36ed50ba8f837273db56323f45f))
|
||||||
|
* **element:** Add the Matrix NeoDateFix Bot deployment ([785989e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/785989e91df5547ab5ac60914b82bc99c4f1a790))
|
||||||
|
* **element:** Add the Matrix NeoDateFix Widget deployment ([27b6796](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/27b6796639f37dbd6c26f21fd54502153398aed0))
|
||||||
|
* **element:** Add the Matrix User Verification Service deployment ([30405d1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/30405d182d44a5586a4070738dfbe1c141841d19))
|
||||||
|
* **element:** Upgrade Element to v1.11.46 ([82a037e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/82a037ec7c25baf41bd0542c3ded47402adc2844))
|
||||||
|
* **element:** Upgrade the opendesk-element charts to 2.3.0 ([fd9e04d](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/fd9e04d9922b949d0f213016169a9024a66a1ded))
|
||||||
|
* **element:** Upgrade the opendesk-matrix-widgets charts to 2.3.0 ([cbe5141](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/cbe514176a4d86d166db248d7297d215409016d2))
|
||||||
|
* **element:** Use a separate image configuration for the bootstrap tasks ([7f7c364](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7f7c364071072b01d485d3e248a3f8de49a07309))
|
||||||
|
* **intercom-service:** Allow access from the non-istio domain and reference to the correct synapse hostname ([16f2ac4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/16f2ac464eb7267f1c4d87c3ccaca2c91a7ecc1b))
|
||||||
|
* **intercom-service:** Fix the nordeck configuration ([06dcdd7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/06dcdd78afe0e6514c1f30d24924d3e7077ae6da))
|
||||||
|
* **jitsi:** Use template for the cluster networking domain ([0898d96](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/0898d9657145d66fd4c52fe6036c955ad58a0cfe))
|
||||||
|
* **keycloak:** Use the correct backchannel logout configuration for element ([86657b1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/86657b139a6d8f4ff3f921b8755e04cb790c3786))
|
||||||
|
* **open-xchange:** Enable Element calendar integration ([f564efd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/f564efd97f8db39cffaea317e36db3825fc9121e))
|
||||||
|
|
||||||
|
## [0.5.11](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.10...v0.5.11) (2023-10-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Quote all password template strings ([fb7dba7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/fb7dba787c232c402aa9c989c0e8ace51869d534))
|
||||||
|
* **services:** Add memcached service ([72e3afd](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/72e3afdffdeb6f88f8e926426dbc26adf4b54e7a))
|
||||||
|
|
||||||
|
## [0.5.10](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.9...v0.5.10) (2023-10-11)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **intercom-service:** Update intercom-service chart to v2.0.0 ([c3129f1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/c3129f14437728be890187bb7c4a1bfc42d90958))
|
||||||
|
|
||||||
|
## [0.5.9](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.8...v0.5.9) (2023-10-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **element:** Enable the guest module in Synapse ([da1bf35](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/da1bf3581c5790786601948cabcef8a1d1c680ad))
|
||||||
|
|
||||||
|
## [0.5.8](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.7...v0.5.8) (2023-10-10)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add default port for SMTP in environment ([74f9ec2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/74f9ec28e401f7caeefc4e50ac0a7e95fea41a53))
|
||||||
|
|
||||||
|
## [0.5.7](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.6...v0.5.7) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Mail sender address ([711d29e](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/711d29e374d13a3c8b7bcdf3e8440d03e0ef2b7d))
|
||||||
|
|
||||||
|
## [0.5.6](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.5...v0.5.6) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Use signed bitnami charts from openDesk Mirror Builds ([70744d0](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/70744d04c66f32d65dc968c8570ed7a397f4efcc))
|
||||||
|
* **services:** Bump redis chart to 18.1.2 ([d4c751d](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/d4c751d29f15c718957f6bc388a99347e2923c87))
|
||||||
|
|
||||||
|
## [0.5.5](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.4...v0.5.5) (2023-10-09)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **openproject:** Switch image to fix central navigation; set email sender address ([e42feb4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e42feb4c260fc24692bc2742c97754230f8e2857))
|
||||||
|
|
||||||
|
## [0.5.4](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.3...v0.5.4) (2023-10-02)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **helmfile:** Add third environment (test) ([7dbcbfe](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/7dbcbfe7237b365cf53f4c850b149e8b95149901))
|
||||||
|
|
||||||
|
## [0.5.3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.2...v0.5.3) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **open-xchange:** Rollback MariaDB version to fix OX Guard initialization ([e33acd3](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/e33acd33e79740144e8fe318fe34dc705834ddf3))
|
||||||
|
|
||||||
|
## [0.5.2](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.1...v0.5.2) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
|
### Bug Fixes
|
||||||
|
|
||||||
|
* **ci:** Add Gitlab-CI sledgehammer deployment removal ([6fd655a](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/commit/6fd655a0b1afd40303ac11130692202146bab215))
|
||||||
|
|
||||||
## [0.5.1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.0...v0.5.1) (2023-09-28)
|
## [0.5.1](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/compare/v0.5.0...v0.5.1) (2023-09-28)
|
||||||
|
|
||||||
|
|
||||||
@@ -395,3 +1121,8 @@
|
|||||||
* **open-xchange:** OX AppSuite 8 within SWP is now publicly available ([6dc470f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/6dc470fd67edbb9711e406acb067569ca357b989))
|
* **open-xchange:** OX AppSuite 8 within SWP is now publicly available ([6dc470f](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/6dc470fd67edbb9711e406acb067569ca357b989))
|
||||||
* **services:** Add clamav-simple deployment ([505f25c](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/505f25c5493ebb9e0181233ed5b7d8018e3a315d))
|
* **services:** Add clamav-simple deployment ([505f25c](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/505f25c5493ebb9e0181233ed5b7d8018e3a315d))
|
||||||
* **sovereign-workplace:** Initial commit ([533c504](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/533c5040faebd91f4012b604d0f4779ea1510424))
|
* **sovereign-workplace:** Initial commit ([533c504](https://gitlab.souvap-univention.de/souvap/devops/sovereign-workplace/commit/533c5040faebd91f4012b604d0f4779ea1510424))
|
||||||
|
|
||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|||||||
@@ -1,28 +0,0 @@
|
|||||||
<!--
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
-->
|
|
||||||
**Content / Quick navigation**
|
|
||||||
|
|
||||||
[[_TOC_]]
|
|
||||||
|
|
||||||
# Functional Components
|
|
||||||
|
|
||||||
Functional components are the core of the SWP as they provide it's rich functionaly. We use the community versions of the named products. For production environments please use enterprise versions for support and scalabiliy reasons.
|
|
||||||
|
|
||||||
## Groupware - Open-Xchange AppSuite
|
|
||||||
|
|
||||||
## WebOffice - Collabora Development Edition
|
|
||||||
|
|
||||||
## File & Share - Nextcloud
|
|
||||||
|
|
||||||
## Kollaboration - Element
|
|
||||||
|
|
||||||
## Videokonferenzen - Jitsi
|
|
||||||
|
|
||||||
## Knowledge Management - XWiki
|
|
||||||
|
|
||||||
## Project Management - OpenProject
|
|
||||||
|
|
||||||
## Portal & IAM - Univention Corporate Services
|
|
||||||
@@ -1,62 +0,0 @@
|
|||||||
<!--
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
-->
|
|
||||||
**Content / Quick navigation**
|
|
||||||
|
|
||||||
[[_TOC_]]
|
|
||||||
|
|
||||||
# Service Components
|
|
||||||
|
|
||||||
Service components are required to operate the SWP. The deployment automation contains a full set of service components in order for the deployment to be self contained. But please be aware that the components are not ment to be used in production scenarios. Check out the service components details to understand how to make use of external services in case you want to setup production environments.
|
|
||||||
|
|
||||||
## Database - MariaDB
|
|
||||||
|
|
||||||
This services is used by:
|
|
||||||
- Nextcloud
|
|
||||||
- Open-Xchange
|
|
||||||
- XWiki
|
|
||||||
|
|
||||||
## Database - PostgreSQL
|
|
||||||
|
|
||||||
This services is used by:
|
|
||||||
- Keycloak
|
|
||||||
- OpenProject
|
|
||||||
|
|
||||||
## Redis
|
|
||||||
|
|
||||||
This service is used by:
|
|
||||||
- Intercom-Service
|
|
||||||
- Nextcloud
|
|
||||||
|
|
||||||
## Postfix
|
|
||||||
|
|
||||||
This service is used by:
|
|
||||||
- Keycloak (e.g. new device login notification)
|
|
||||||
- Nextcloud (e.g. share file notifictions)
|
|
||||||
- Open-Xchange (emails)
|
|
||||||
- OpenProject (general notifications)
|
|
||||||
- UCS (e.g. password reset emails)
|
|
||||||
- XWiki (e.g. change notifications)
|
|
||||||
|
|
||||||
## TURN Server
|
|
||||||
|
|
||||||
This services is used by:
|
|
||||||
- Jitsi
|
|
||||||
|
|
||||||
## NFS
|
|
||||||
|
|
||||||
[remove this as it should be addressed by the RWX prerequsite!?]
|
|
||||||
|
|
||||||
This service is used by
|
|
||||||
- Dovecot
|
|
||||||
- Nextcloud
|
|
||||||
|
|
||||||
## ICAP
|
|
||||||
|
|
||||||
This service is used by
|
|
||||||
- Nextcloud
|
|
||||||
- Open-Xchange
|
|
||||||
|
|
||||||
## Objectstore - MinIO
|
|
||||||
@@ -5,72 +5,12 @@ SPDX-License-Identifier: Apache-2.0
|
|||||||
|
|
||||||
# Read me first
|
# Read me first
|
||||||
|
|
||||||
Please read the [project's overall CONTRIBUTING.md](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info/-/blob/main/CONTRIBUTING.md) first.
|
Please read the [project's overall CONTRIBUTING.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/CONTRIBUTING.md) first.
|
||||||
|
|
||||||
# How to contribute?
|
# How to contribute?
|
||||||
|
|
||||||
When providing contributes to this project, please adhere to the standards and conventions described further down in this document. Doing so please feel free to create merge requests.
|
Please also read the [project's workflow documentation](./docs/workflow.md) for more details on standards like commit
|
||||||
|
messages and branching.
|
||||||
# Standards and conventions
|
|
||||||
|
|
||||||
## Branching
|
|
||||||
|
|
||||||
We use [Github flow](https://docs.github.com/en/get-started/quickstart/github-flow).
|
|
||||||
|
|
||||||
## Verified commits
|
|
||||||
|
|
||||||
We only allow verified commits:
|
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/ssh_signed_commits/
|
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/gpg_signed_commits/
|
|
||||||
- https://docs.gitlab.com/ee/user/project/repository/x509_signed_commits/
|
|
||||||
|
|
||||||
## Approval
|
|
||||||
|
|
||||||
MRs require one approval from the SouvAP devops team with security clearance.
|
|
||||||
|
|
||||||
## Conventional Commits
|
|
||||||
|
|
||||||
See https://www.conventionalcommits.org/en/v1.0.0/#summary for reference.
|
|
||||||
|
|
||||||
Commits that do not adhere to the standard might be rejected.
|
|
||||||
|
|
||||||
```text
|
|
||||||
<type>(<scope>): [path/to/issue#1] <short summary>
|
|
||||||
│ │ │ │
|
|
||||||
│ │ | └─> Summary in present tense, sentence case, with no period at the end
|
|
||||||
│ │ |
|
|
||||||
│ │ └─> Issue reference (optional)
|
|
||||||
│ │
|
|
||||||
│ └─> Commit Scope: helmfile, docs, collabora, intercom-service, ...
|
|
||||||
│
|
|
||||||
└─> Commit Type: chore, ci, docs, feat, fix
|
|
||||||
```
|
|
||||||
Valid commit scopes:
|
|
||||||
- `helmfile`
|
|
||||||
- `ci`
|
|
||||||
- `docs`
|
|
||||||
- `collabora`
|
|
||||||
- `ìntercom-service`
|
|
||||||
- `jitsi`
|
|
||||||
- `keycloak`
|
|
||||||
- `keycloak-bootstrap`
|
|
||||||
- `nextcloud`
|
|
||||||
- `open-xchange`
|
|
||||||
- `openproject`
|
|
||||||
- `provisioning`
|
|
||||||
- `services`
|
|
||||||
- `univention-corporate-container`
|
|
||||||
- `xwiki`
|
|
||||||
|
|
||||||
## Semantic Release
|
|
||||||
|
|
||||||
See https://github.com/semantic-release/semantic-release for reference.
|
|
||||||
|
|
||||||
## Linting
|
|
||||||
|
|
||||||
Following linters must pass:
|
|
||||||
- [yaml-lint](https://github.com/adrienverge/yamllint)
|
|
||||||
- [helm-lint](https://helm.sh/docs/helm/helm_lint/)
|
|
||||||
|
|
||||||
## Helm vs. Operators vs. Manifests
|
## Helm vs. Operators vs. Manifests
|
||||||
|
|
||||||
@@ -80,10 +20,18 @@ Due to DVS requirements:
|
|||||||
- we should avoid stand alone Manifests.
|
- we should avoid stand alone Manifests.
|
||||||
- we do not use Operators and CRDs.
|
- we do not use Operators and CRDs.
|
||||||
|
|
||||||
In order to align the Helm files from various sources into an unified deployment of the SWP we make use of [Helmfile](https://github.com/helmfile/helmfile).
|
In order to align the Helm files from various sources into the unified deployment of openDesk we make use of
|
||||||
|
[Helmfile](https://github.com/helmfile/helmfile).
|
||||||
|
|
||||||
## Tooling
|
## Tooling
|
||||||
|
|
||||||
We should not introduce a new tool without sharing the purpose with the team and let the team decide if the tool should be used.
|
We should not introduce a new tool without sharing the purpose with the team and let the team decide if the tool should
|
||||||
|
be used.
|
||||||
|
|
||||||
We should avoid adding unnecessary complexity.
|
We should avoid adding unnecessary complexity.
|
||||||
|
|
||||||
|
## In doubt? Ask!
|
||||||
|
|
||||||
|
We are always happy about contributions, but also like to discuss technical approaches to solve a problem to ensure
|
||||||
|
a contribution fits the openDesk platform strategy or clarify that specific topics might be must ahead on our own
|
||||||
|
roadmap. So when in doubt please [open an issue](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues/new) and start a discussion.
|
||||||
|
|||||||
121
LICENSES/CC0-1.0.txt
Normal file
121
LICENSES/CC0-1.0.txt
Normal file
@@ -0,0 +1,121 @@
|
|||||||
|
Creative Commons Legal Code
|
||||||
|
|
||||||
|
CC0 1.0 Universal
|
||||||
|
|
||||||
|
CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE
|
||||||
|
LEGAL SERVICES. DISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN
|
||||||
|
ATTORNEY-CLIENT RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS
|
||||||
|
INFORMATION ON AN "AS-IS" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES
|
||||||
|
REGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS
|
||||||
|
PROVIDED HEREUNDER, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM
|
||||||
|
THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED
|
||||||
|
HEREUNDER.
|
||||||
|
|
||||||
|
Statement of Purpose
|
||||||
|
|
||||||
|
The laws of most jurisdictions throughout the world automatically confer
|
||||||
|
exclusive Copyright and Related Rights (defined below) upon the creator
|
||||||
|
and subsequent owner(s) (each and all, an "owner") of an original work of
|
||||||
|
authorship and/or a database (each, a "Work").
|
||||||
|
|
||||||
|
Certain owners wish to permanently relinquish those rights to a Work for
|
||||||
|
the purpose of contributing to a commons of creative, cultural and
|
||||||
|
scientific works ("Commons") that the public can reliably and without fear
|
||||||
|
of later claims of infringement build upon, modify, incorporate in other
|
||||||
|
works, reuse and redistribute as freely as possible in any form whatsoever
|
||||||
|
and for any purposes, including without limitation commercial purposes.
|
||||||
|
These owners may contribute to the Commons to promote the ideal of a free
|
||||||
|
culture and the further production of creative, cultural and scientific
|
||||||
|
works, or to gain reputation or greater distribution for their Work in
|
||||||
|
part through the use and efforts of others.
|
||||||
|
|
||||||
|
For these and/or other purposes and motivations, and without any
|
||||||
|
expectation of additional consideration or compensation, the person
|
||||||
|
associating CC0 with a Work (the "Affirmer"), to the extent that he or she
|
||||||
|
is an owner of Copyright and Related Rights in the Work, voluntarily
|
||||||
|
elects to apply CC0 to the Work and publicly distribute the Work under its
|
||||||
|
terms, with knowledge of his or her Copyright and Related Rights in the
|
||||||
|
Work and the meaning and intended legal effect of CC0 on those rights.
|
||||||
|
|
||||||
|
1. Copyright and Related Rights. A Work made available under CC0 may be
|
||||||
|
protected by copyright and related or neighboring rights ("Copyright and
|
||||||
|
Related Rights"). Copyright and Related Rights include, but are not
|
||||||
|
limited to, the following:
|
||||||
|
|
||||||
|
i. the right to reproduce, adapt, distribute, perform, display,
|
||||||
|
communicate, and translate a Work;
|
||||||
|
ii. moral rights retained by the original author(s) and/or performer(s);
|
||||||
|
iii. publicity and privacy rights pertaining to a person's image or
|
||||||
|
likeness depicted in a Work;
|
||||||
|
iv. rights protecting against unfair competition in regards to a Work,
|
||||||
|
subject to the limitations in paragraph 4(a), below;
|
||||||
|
v. rights protecting the extraction, dissemination, use and reuse of data
|
||||||
|
in a Work;
|
||||||
|
vi. database rights (such as those arising under Directive 96/9/EC of the
|
||||||
|
European Parliament and of the Council of 11 March 1996 on the legal
|
||||||
|
protection of databases, and under any national implementation
|
||||||
|
thereof, including any amended or successor version of such
|
||||||
|
directive); and
|
||||||
|
vii. other similar, equivalent or corresponding rights throughout the
|
||||||
|
world based on applicable law or treaty, and any national
|
||||||
|
implementations thereof.
|
||||||
|
|
||||||
|
2. Waiver. To the greatest extent permitted by, but not in contravention
|
||||||
|
of, applicable law, Affirmer hereby overtly, fully, permanently,
|
||||||
|
irrevocably and unconditionally waives, abandons, and surrenders all of
|
||||||
|
Affirmer's Copyright and Related Rights and associated claims and causes
|
||||||
|
of action, whether now known or unknown (including existing as well as
|
||||||
|
future claims and causes of action), in the Work (i) in all territories
|
||||||
|
worldwide, (ii) for the maximum duration provided by applicable law or
|
||||||
|
treaty (including future time extensions), (iii) in any current or future
|
||||||
|
medium and for any number of copies, and (iv) for any purpose whatsoever,
|
||||||
|
including without limitation commercial, advertising or promotional
|
||||||
|
purposes (the "Waiver"). Affirmer makes the Waiver for the benefit of each
|
||||||
|
member of the public at large and to the detriment of Affirmer's heirs and
|
||||||
|
successors, fully intending that such Waiver shall not be subject to
|
||||||
|
revocation, rescission, cancellation, termination, or any other legal or
|
||||||
|
equitable action to disrupt the quiet enjoyment of the Work by the public
|
||||||
|
as contemplated by Affirmer's express Statement of Purpose.
|
||||||
|
|
||||||
|
3. Public License Fallback. Should any part of the Waiver for any reason
|
||||||
|
be judged legally invalid or ineffective under applicable law, then the
|
||||||
|
Waiver shall be preserved to the maximum extent permitted taking into
|
||||||
|
account Affirmer's express Statement of Purpose. In addition, to the
|
||||||
|
extent the Waiver is so judged Affirmer hereby grants to each affected
|
||||||
|
person a royalty-free, non transferable, non sublicensable, non exclusive,
|
||||||
|
irrevocable and unconditional license to exercise Affirmer's Copyright and
|
||||||
|
Related Rights in the Work (i) in all territories worldwide, (ii) for the
|
||||||
|
maximum duration provided by applicable law or treaty (including future
|
||||||
|
time extensions), (iii) in any current or future medium and for any number
|
||||||
|
of copies, and (iv) for any purpose whatsoever, including without
|
||||||
|
limitation commercial, advertising or promotional purposes (the
|
||||||
|
"License"). The License shall be deemed effective as of the date CC0 was
|
||||||
|
applied by Affirmer to the Work. Should any part of the License for any
|
||||||
|
reason be judged legally invalid or ineffective under applicable law, such
|
||||||
|
partial invalidity or ineffectiveness shall not invalidate the remainder
|
||||||
|
of the License, and in such case Affirmer hereby affirms that he or she
|
||||||
|
will not (i) exercise any of his or her remaining Copyright and Related
|
||||||
|
Rights in the Work or (ii) assert any associated claims and causes of
|
||||||
|
action with respect to the Work, in either case contrary to Affirmer's
|
||||||
|
express Statement of Purpose.
|
||||||
|
|
||||||
|
4. Limitations and Disclaimers.
|
||||||
|
|
||||||
|
a. No trademark or patent rights held by Affirmer are waived, abandoned,
|
||||||
|
surrendered, licensed or otherwise affected by this document.
|
||||||
|
b. Affirmer offers the Work as-is and makes no representations or
|
||||||
|
warranties of any kind concerning the Work, express, implied,
|
||||||
|
statutory or otherwise, including without limitation warranties of
|
||||||
|
title, merchantability, fitness for a particular purpose, non
|
||||||
|
infringement, or the absence of latent or other defects, accuracy, or
|
||||||
|
the present or absence of errors, whether or not discoverable, all to
|
||||||
|
the greatest extent permissible under applicable law.
|
||||||
|
c. Affirmer disclaims responsibility for clearing rights of other persons
|
||||||
|
that may apply to the Work or any use thereof, including without
|
||||||
|
limitation any person's Copyright and Related Rights in the Work.
|
||||||
|
Further, Affirmer disclaims responsibility for obtaining any necessary
|
||||||
|
consents, permissions or other rights required for any use of the
|
||||||
|
Work.
|
||||||
|
d. Affirmer understands and acknowledges that Creative Commons is not a
|
||||||
|
party to this document and has no duty or obligation with respect to
|
||||||
|
this CC0 or use of the Work.
|
||||||
600
README.md
600
README.md
@@ -1,546 +1,128 @@
|
|||||||
<!--
|
<!--
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
SPDX-License-Identifier: Apache-2.0
|
SPDX-License-Identifier: Apache-2.0
|
||||||
-->
|
-->
|
||||||
**Content / Quick navigation**
|
|
||||||
|
|
||||||
[[_TOC_]]
|
<h1>openDesk Deployment Automation</h1>
|
||||||
|
|
||||||
# Disclaimer August 2023
|
<!-- TOC -->
|
||||||
|
* [Overview](#overview)
|
||||||
|
* [Disclaimer](#disclaimer)
|
||||||
|
* [Requirements](#requirements)
|
||||||
|
* [Getting started](#getting-started)
|
||||||
|
* [Advanced customization](#advanced-customization)
|
||||||
|
* [Development](#development)
|
||||||
|
* [Releases](#releases)
|
||||||
|
* [Components](#components)
|
||||||
|
* [Feedback](#feedback)
|
||||||
|
* [License](#license)
|
||||||
|
* [Copyright](#copyright)
|
||||||
|
* [Footnotes](#footnotes)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
The current state of the Sovereign Workplace contains components that are going to be
|
# Overview
|
||||||
replaced. Like for example the UCS dev container monolith will be substituted by
|
|
||||||
multiple Univention Management Stack containers.
|
|
||||||
|
|
||||||
In the next months we not only expect upstream updates of the functional
|
openDesk is a Kubernetes based, open-source and cloud-native digital workplace suite provided by the "Projektgruppe für
|
||||||
components within their feature scope, but we are also going to address
|
Aufbau ZenDiS" of Germany's Federal Ministry of the Interior.
|
||||||
operational issues like monitoring and network policies.
|
|
||||||
|
|
||||||
Of course, further development also includes enhancing the documentation.
|
openDesk currently features the following functional main components:
|
||||||
|
|
||||||
The first release of the Sovereign Workplace is scheduled for December 2023.
|
| Function | Functional Component | Component<br/>Version | Upstream Documentation |
|
||||||
Before that release there will be breaking changes in the deployment.
|
| -------------------- | --------------------------- | -------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||||
|
| Chat & collaboration | Element ft. Nordeck widgets | [1.11.59](https://github.com/element-hq/element-desktop/releases/tag/v1.11.59) | [For the most recent release](https://element.io/user-guide) |
|
||||||
|
| Diagram editor | Cryptpad ft. diagrams.net | [5.6.0](https://github.com/cryptpad/cryptpad/releases/tag/5.6.0) | [For the most recent release](https://docs.cryptpad.org/en/) |
|
||||||
|
| File management | Nextcloud | [28.0.4](https://nextcloud.com/de/changelog/#28-0-4) | [Nextcloud 28](https://docs.nextcloud.com/) |
|
||||||
|
| Groupware | OX Appsuite | [8.22](https://documentation.open-xchange.com/appsuite/releases/8.22/) | Online documentation available from within the installed application; [Additional resources](https://www.open-xchange.com/resources/oxpedia) |
|
||||||
|
| Knowledge management | XWiki | [15.10.8](https://www.xwiki.org/xwiki/bin/view/Blog/XWiki15108Released) | [For the most recent release](https://www.xwiki.org/xwiki/bin/view/Documentation) |
|
||||||
|
| Portal & IAM | Nubus | Product Preview[^1] | [Univention's documentation website](https://docs.software-univention.de/n/en/index.html) |
|
||||||
|
| Project management | OpenProject | [13.4.1](https://www.openproject.org/docs/release-notes/13-4-1/) | [For the most recent release](https://www.openproject.org/docs/user-guide/) |
|
||||||
|
| Videoconferencing | Jitsi | [2.0.8922](https://github.com/jitsi/jitsi-meet/releases/tag/stable%2Fjitsi-meet_8922) | [For the most recent release](https://jitsi.github.io/handbook/docs/category/user-guide/) |
|
||||||
|
| Weboffice | Collabora | [23.05.9.4.1](https://www.collaboraoffice.com/collabora-online-23-05-release-notes/) | Online documentation available from within the installed application; [Additional resources](https://sdk.collaboraonline.com/) |
|
||||||
|
|
||||||
|
While not all components are perfectly shaped for the execution inside containers, one of the project's objectives is to
|
||||||
|
align the applications with best practises regarding container design and operations.
|
||||||
|
|
||||||
# The Sovereign Workplace (SWP)
|
This documentation aims to give you all that is needed to set up your own instance of the openDesk.
|
||||||
|
|
||||||
The Sovereign Workplace's runtime environment is [Kubernetes](https://kubernetes.io/), or "K8s" in
|
Basic knowledge of Kubernetes and DevOps processes is required though.
|
||||||
short.
|
|
||||||
|
|
||||||
While not all components are still perfectly shaped for the execution inside
|
# Disclaimer
|
||||||
containers, one of the projects objectives is it to align the applications
|
|
||||||
with the best practises regarding container design and operations.
|
|
||||||
|
|
||||||
This documentation aims to give you all that is needed to set up your own
|
openDesk will face breaking changes in the near future without upgrade paths before
|
||||||
instance of the Sovereign Workplace. Basic knowledge of Kubernetes and Devops is
|
[technical release](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases)
|
||||||
required though.
|
v1.0.0 is reached.
|
||||||
|
|
||||||
To have an overview of what can be found at Open CoDE and the basic components
|
While most components support upgrades, major configuration or component changes may occur, therefore we recommend
|
||||||
of the Sovereign Workplace, please check out the
|
from scratch installations for now.
|
||||||
[OVERVIEW.md](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info/-/blob/main/OVERVIEW.md) in the [Info repository](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info).
|
|
||||||
|
|
||||||
We love to get feedback from you! Related to the deployment / contents of this
|
In the next months, we not only expect to integrate upstream updates of the functional components to include their
|
||||||
repository please use the [issues within this project](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/-/issues).
|
most recent feature and security sets, but also to address operational topics like scalability for the openDesk
|
||||||
|
platform.
|
||||||
|
|
||||||
If you want to address other topics, please check the section
|
Of course, further development also includes enhancing the documentation itself.
|
||||||
["Rückmeldungen und Beteiligung" of the Infos' project OVERVIEW.md](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung).
|
|
||||||
|
# Requirements
|
||||||
|
|
||||||
|
⟶ Visit our detailed [Requirements](./docs/requirements.md) overview.
|
||||||
|
|
||||||
|
# Getting started
|
||||||
|
|
||||||
|
⟶ Visit our detailed [Getting started](./docs/getting-started.md) guide.
|
||||||
|
|
||||||
|
# Advanced customization
|
||||||
|
|
||||||
|
- [External services](./docs/external-services.md)
|
||||||
|
- [Security](./docs/security.md)
|
||||||
|
- [Scaling](./docs/scaling.md)
|
||||||
|
- [Monitoring](./docs/monitoring.md)
|
||||||
|
- [Theming](./docs/theming.md)
|
||||||
|
|
||||||
|
# Development
|
||||||
|
|
||||||
|
⟶ To understand the repository contents from a developer perspective please read the [Development](./docs/development.md) guide.
|
||||||
|
|
||||||
# Releases
|
# Releases
|
||||||
|
|
||||||
All technical releases are created using [Semantic Versioning](https://semver.org/lang/de/).
|
All technical releases are created using [Semantic Versioning](https://semver.org/lang/de/).
|
||||||
|
|
||||||
Gitlab provides an [overview on the releases](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/-/releases) of this project.
|
Gitlab provides an
|
||||||
|
[overview on the releases](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases)
|
||||||
|
of this project.
|
||||||
|
|
||||||
The following release artefacts are provided beside the default source code assets:
|
Please find a list of the artefacts related to the release either in the source code archive attached to the release or
|
||||||
- `chart-index.json`: An overview of all Helm charts used by the release.
|
in the files from the release's git-tag:
|
||||||
- `image-index.json`: An overview of all container images used by the release.
|
- `./helmfile/environments/default/images.yaml`
|
||||||
# Deployment
|
- `./helmfile/environments/default/charts.yaml`
|
||||||
|
|
||||||
**Note for project members:** You can use the project's `dev` K8s cluster to set
|
⟶ Visit our detailed [Workflow](./docs/workflow.md) docs.
|
||||||
up your own instance for development purposes. Please see the project
|
|
||||||
`sovereign-workplace-env` on the internal Gitlab for more details.
|
|
||||||
|
|
||||||
## Prerequisites
|
# Components
|
||||||
|
|
||||||
### Mandatory technical prerequisites
|
⟶ Visit our detailed [Component](./docs/components.md) docs.
|
||||||
|
|
||||||
These are the requirements of the Sovereign Workplace deployment:
|
# Feedback
|
||||||
|
|
||||||
- K8s cluster >= 1.24, [CNCF Certified Kubernetes Distro](https://www.cncf.io/certification/software-conformance/)
|
We love to get feedback from you!
|
||||||
- Domain and DNS Service
|
|
||||||
- Ingress controller (supported are nginx-ingress, ingress-nginx, HAProxy)
|
|
||||||
- [Helm](https://helm.sh/) >= v3.9.0
|
|
||||||
- [Helmfile](https://helmfile.readthedocs.io/en/latest/) >= **v0.157.0**
|
|
||||||
- [HelmDiff](https://github.com/databus23/helm-diff) >= 3.6.0
|
|
||||||
- Volume provisioner supporting RWO (read-write-once)
|
|
||||||
- Certificate handling with [cert-manager](https://cert-manager.io/)
|
|
||||||
- [Istio](https://istio.io/) is currently required to deploy and operate OX AppSuite8, we are talking to Open-Xchange and will try to get rid of this dependency.
|
|
||||||
|
|
||||||
#### TLS Certificate
|
Related to the deployment / contents of this repository,
|
||||||
|
please use the [issues within this project](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues).
|
||||||
|
|
||||||
The setup will create a `cert-manager.io` Certificate resource.
|
If you want to address other topics, please check the section
|
||||||
|
["Rückmeldungen und Beteiligung" in the OVERVIEW.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung) of the [openDesk Info Repository](https://gitlab.opencode.de/bmi/opendesk/info).
|
||||||
|
|
||||||
You can set the ClusterIssuer via `certificate.issuerRef.name`
|
# License
|
||||||
|
|
||||||
### Required input variables
|
This project uses the following license: Apache-2.0
|
||||||
|
|
||||||
You need to expose following environment variables in order to run the
|
# Copyright
|
||||||
installation.
|
|
||||||
|
|
||||||
| name | default | description |
|
|
||||||
|---------------------|-----------------------|---------------------------------------------------|
|
|
||||||
| `DOMAIN` | `souvap.cloud` | External reachable domain |
|
|
||||||
| `ISTIO_DOMAIN` | `istio.souvap.cloud` | External reachable domain for Istio Gateway |
|
|
||||||
| `MASTER_PASSWORD` | `sovereign-workplace` | The password that seeds the autogenerated secrets |
|
|
||||||
|
|
||||||
Please ensure that you set the DNS records pointing to the loadbalancer/IP for
|
|
||||||
`DOMAIN` and `ISTIO_DOMAIN`.
|
|
||||||
|
|
||||||
If you want inbound email you need to set the MX records that points to the
|
|
||||||
public IP address of the Postfix-pods.
|
|
||||||
|
|
||||||
More details on DNS options including SPF/DKIM and autodiscovery options
|
|
||||||
are to come...
|
|
||||||
|
|
||||||
### Optional or feature based prerequisites
|
|
||||||
|
|
||||||
All of these requirements are optional as long as you do not want to use the
|
|
||||||
related feature.
|
|
||||||
|
|
||||||
| Feature | Component(s) | Requirement |
|
|
||||||
|------------------------------|----------------|-----------------------------|
|
|
||||||
| Component Scalability | Various[^1] | Read-Write-Many Provisioner |
|
|
||||||
| Sending outbound emails | Various | SMTP relay/gateway |
|
|
||||||
| S/MIME Support | OX AppSuite8 | PKI / CI |
|
|
||||||
| Improved videoconferencing | Jitsi | STUN/TURN server |
|
|
||||||
|
|
||||||
## CI based deployment
|
|
||||||
|
|
||||||
The project includes a `.gitlab-ci.yml` that allows you to execute the
|
|
||||||
deployment from a Gitlab instance of your choice.
|
|
||||||
|
|
||||||
Please ensure to provide the environment variables listed at
|
|
||||||
[Required input variables](#required-input-variables).
|
|
||||||
|
|
||||||
When starting the pipeline through the Gitlab UI you will be queried for some
|
|
||||||
of the variables plus the following ones:
|
|
||||||
|
|
||||||
- `BASE_DOMAIN`: The base domain the SWP will use. For example: `souvap.cloud`
|
|
||||||
- `NAMESPACE`: Defines into which namespace of your K8s cluster the SWP will be installed
|
|
||||||
- `MASTER_PASSWORD_WEB_VAR`: Overwrites value of `MASTER_PASSWORD`
|
|
||||||
|
|
||||||
Based on your input the following variables will be set:
|
|
||||||
- `DOMAIN` = `NAMESPACE`.`BASE_DOMAIN`
|
|
||||||
- `ISTIO_DOMAIN` = istio.`DOMAIN`
|
|
||||||
- `MASTER_PASSWORD` = `MASTER_PASSWORD_WEB_VAR`. If `MASTER_PASSWORD_WEB_VAR`
|
|
||||||
is not set, the default for `MASTER_PASSWORD` will be used, unless you set
|
|
||||||
`MASTER_PASSWORD` as a masked CI/CD variable in Gitlab to supercede the default.
|
|
||||||
|
|
||||||
You might want to set credential variables in the Gitlab project at
|
|
||||||
`Settings` > `CI/CD` > `Variables`.
|
|
||||||
|
|
||||||
## Local deployment
|
|
||||||
|
|
||||||
Please ensure to provide the environment variables listed at
|
|
||||||
[Required input variables](#required-input-variables).
|
|
||||||
Also, please read [Helmfile](#helmfile) a little below in case of a non default
|
|
||||||
configuration.
|
|
||||||
|
|
||||||
Then go with
|
|
||||||
|
|
||||||
```shell
|
|
||||||
helmfile apply -n <NAMESPACE>
|
|
||||||
```
|
|
||||||
|
|
||||||
and wait a little. After the deployment is finished some bootstrapping is
|
|
||||||
executed which might take some more minutes before you can log in your new
|
|
||||||
instance.
|
|
||||||
|
|
||||||
## Offline deployment
|
|
||||||
|
|
||||||
Before executing a [local deployment](#local-deployment), you can set following
|
|
||||||
environment variables to use your own container image and helm chart registry:
|
|
||||||
|
|
||||||
| name | description |
|
|
||||||
|------------------------------|--------------------------------|
|
|
||||||
| PRIVATE_CHART_REPOSITORY_URL | Your helm chart repository url |
|
|
||||||
| PRIVATE_IMAGE_REGISTRY_URL | Your image registry url |
|
|
||||||
|
|
||||||
## Logging in
|
|
||||||
|
|
||||||
When successfully deployed the SWP, all K8s jobs from the deployment should be
|
|
||||||
in the status `Succeeded` and all pods should be `Running`.
|
|
||||||
|
|
||||||
You should see the portal's login page at `https://portal.<DOMAIN>`.
|
|
||||||
|
|
||||||
Off the shelf you get two accounts with passwords you can look up in the
|
|
||||||
`univention-corporate-container-*` pod environment. You can use a shell on that
|
|
||||||
container or a `kubectl describe`-command to get the credentials.
|
|
||||||
|
|
||||||
| Username / Login | Password environment variable |
|
|
||||||
|--------------------|--------------------------------|
|
|
||||||
| default.user | DEFAULT_ACCOUNT_USER_PASSWORD |
|
|
||||||
| default.admin | DEFAULT_ACCOUNT_ADMIN_PASSWORD |
|
|
||||||
|
|
||||||
If you do not see any tiles in the portal after the login you may want to wait a
|
|
||||||
couple of minutes, as on the initial start some bootstrapping and cache building
|
|
||||||
is done. This blocks the portal entries from showing up.
|
|
||||||
|
|
||||||
# Helmfile
|
|
||||||
|
|
||||||
## Custom Configuration
|
|
||||||
|
|
||||||
### Deployment selection
|
|
||||||
|
|
||||||
By default, all components are deployed. The components of type `Eval` are used
|
|
||||||
for development and evaluation purposes only - they need to be replaced in
|
|
||||||
production deployments. These components are grouped together in the
|
|
||||||
subdirectory `/helmfile/apps/services`.
|
|
||||||
|
|
||||||
| Component | Name | Default | Description | Type |
|
|
||||||
|-----------------------------|-------------------------------------|---------|--------------------------------|------------|
|
|
||||||
| Certificates | `certificates.enabled` | `true` | TLS certificates | Eval |
|
|
||||||
| ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine | Eval |
|
|
||||||
| ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine | Eval |
|
|
||||||
| Collabora | `collabora.enabled` | `true` | Weboffice | Functional |
|
|
||||||
| Dovecot | `dovecot.enabled` | `true` | Mail backend | Functional |
|
|
||||||
| Element | `element.enabled` | `true` | Secure communications platform | Functional |
|
|
||||||
| Intercom Service | `intercom.enabled` | `true` | Cross service data exchange | Functional |
|
|
||||||
| Jitsi | `jitsi.enabled` | `true` | Videoconferencing | Functional |
|
|
||||||
| Keycloak | `keycloak.enabled` | `true` | Identity Provider | Functional |
|
|
||||||
| MariaDB | `mariadb.enabled` | `true` | Database | Eval |
|
|
||||||
| Nextcloud | `nextcloud.enabled` | `true` | File share | Functional |
|
|
||||||
| OpenProject | `openproject.enabled` | `true` | Project management | Functional |
|
|
||||||
| OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware | Functional |
|
|
||||||
| Provisioning | `oxConnector.enabled` | `true` | Backend provisioning | Functional |
|
|
||||||
| Postfix | `postfix.enabled` | `true` | MTA | Eval |
|
|
||||||
| PostgreSQL | `postgresql.enabled` | `true` | Database | Eval |
|
|
||||||
| Redis | `redis.enabled` | `true` | Cache Database | Eval |
|
|
||||||
| Univention Corporate Server | `univentionCorporateServer.enabled` | `true` | Identity Management & Portal | Functional |
|
|
||||||
| Univention Management Stack | `univentionManagementStack.enabled` | `false` | Identity Management & Portal | Eval |
|
|
||||||
| XWiki | `xwiki.enabled` | `true` | Knowledgebase | Functional |
|
|
||||||
|
|
||||||
|
|
||||||
#### Cluster capabilities
|
|
||||||
| Capability | Default | Options | Notes |
|
|
||||||
|-------------------------------------|-----------------|-----------------------------------------|-------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
|
||||||
| `cluster.service.type` | `LoadBalancer` | `ClusterIP`, `NodePort`, `LoadBalancer` | External access to TCP/UDP services. [Additional Information](https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services-service-types) |
|
|
||||||
| `cluster.persistence.readWriteMany` | `false` | `true`, `false` | Enable if ReadWriteMany (RWX) storage is available (f.e. CephFS, NFS, ...). |
|
|
||||||
| `cluster.networking.domain` | `cluster.local` | | Kubernetes cluster domain. |
|
|
||||||
| `cluster.networking.cidr` | `10.0.0.0/8` | | Kubernetes internal network |
|
|
||||||
|
|
||||||
|
|
||||||
#### Databases
|
|
||||||
|
|
||||||
In case you don't got for a develop or evaluation environment you want to point
|
|
||||||
the application to your own database instances.
|
|
||||||
|
|
||||||
| Component | Name | Type | Parameter | Key | Default |
|
|
||||||
|-------------|--------------------|------------|-----------|----------------------------------------|----------------------------|
|
|
||||||
| Element | Synapse | PostgreSQL | | | |
|
|
||||||
| | | | Name | `databases.synapse.name` | `matrix` |
|
|
||||||
| | | | Host | `databases.synapse.host` | `postgresql` |
|
|
||||||
| | | | Port | `databases.synapse.port` | `5432` |
|
|
||||||
| | | | Username | `databases.synapse.username` | `matrix_user` |
|
|
||||||
| | | | Password | `databases.synapse.password` | |
|
|
||||||
| Keycloak | Keycloak | PostgreSQL | | | |
|
|
||||||
| | | | Name | `databases.keycloak.name` | `keycloak` |
|
|
||||||
| | | | Host | `databases.keycloak.host` | `postgresql` |
|
|
||||||
| | | | Port | `databases.keycloak.port` | `5432` |
|
|
||||||
| | | | Username | `databases.keycloak.username` | `keycloak_user` |
|
|
||||||
| | | | Password | `databases.keycloak.password` | |
|
|
||||||
| | Keycloak Extension | PostgreSQL | | | |
|
|
||||||
| | | | Name | `databases.keycloakExtension.name` | `keycloak_extensions` |
|
|
||||||
| | | | Host | `databases.keycloakExtension.host` | `postgresql` |
|
|
||||||
| | | | Port | `databases.keycloakExtension.port` | `5432` |
|
|
||||||
| | | | Username | `databases.keycloakExtension.username` | `keycloak_extensions_user` |
|
|
||||||
| | | | Password | `databases.keycloakExtension.password` | |
|
|
||||||
| Nextcloud | Nextcloud | MariaDB | | | |
|
|
||||||
| | | | Name | `databases.nextcloud.name` | `nextcloud` |
|
|
||||||
| | | | Host | `databases.nextcloud.host` | `mariadb` |
|
|
||||||
| | | | Username | `databases.nextcloud.username` | `nextcloud_user` |
|
|
||||||
| | | | Password | `databases.nextcloud.password` | |
|
|
||||||
| OpenProject | Keycloak | PostgreSQL | | | |
|
|
||||||
| | | | Name | `databases.openproject.name` | `openproject` |
|
|
||||||
| | | | Host | `databases.openproject.host` | `postgresql` |
|
|
||||||
| | | | Port | `databases.openproject.port` | `5432` |
|
|
||||||
| | | | Username | `databases.openproject.username` | `openproject_user` |
|
|
||||||
| | | | Password | `databases.openproject.password` | |
|
|
||||||
| OX Appsuite | OX Appsuite | MariaDB | | | |
|
|
||||||
| | | | Name | `databases.oxAppsuite.name` | `CONFIGDB` |
|
|
||||||
| | | | Host | `databases.oxAppsuite.host` | `mariadb` |
|
|
||||||
| | | | Username | `databases.oxAppsuite.username` | `root` |
|
|
||||||
| | | | Password | `databases.oxAppsuite.password` | |
|
|
||||||
| XWiki | XWiki | MariaDB | | | |
|
|
||||||
| | | | Name | `databases.xwiki.name` | `xwiki` |
|
|
||||||
| | | | Host | `databases.xwiki.host` | `mariadb` |
|
|
||||||
| | | | Username | `databases.xwiki.username` | `xwiki_user` |
|
|
||||||
| | | | Password | `databases.xwiki.password` | |
|
|
||||||
|
|
||||||
### Scaling
|
|
||||||
|
|
||||||
The Replicas of components can be increased, while we still have to look in the
|
|
||||||
actual scalability of the components (see column `Scaling (verified)`).
|
|
||||||
|
|
||||||
| Component | Name | Scaling (effective) | Scaling (verified) |
|
|
||||||
|-------------|------------------------|:-------------------:|:------------------:|
|
|
||||||
| ClamAV | `replicas.clamav` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.clamd` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.freshclam` | :x: | :x: |
|
|
||||||
| | `replicas.icap` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.milter` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| Collabora | `replicas.collabora` | :white_check_mark: | :gear: |
|
|
||||||
| Dovecot | `replicas.dovecot` | :x: | :gear: |
|
|
||||||
| Element | `replicas.element` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.synapse` | :x: | :gear: |
|
|
||||||
| | `replicas.synapseWeb` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| | `replicas.wellKnown` | :white_check_mark: | :white_check_mark: |
|
|
||||||
| Jitsi | `replicas.jibri` | :white_check_mark: | :gear: |
|
|
||||||
| | `replicas.jicofo` | :white_check_mark: | :gear: |
|
|
||||||
| | `replicas.jitsi ` | :white_check_mark: | :gear: |
|
|
||||||
| | `replicas.jvb ` | :x: | :x: |
|
|
||||||
| Keycloak | `replicas.keycloak` | :white_check_mark: | :gear: |
|
|
||||||
| Nextcloud | `replicas.nextcloud` | :white_check_mark: | :gear: |
|
|
||||||
| OpenProject | `replicas.openproject` | :white_check_mark: | :gear: |
|
|
||||||
| Postfix | `replicas.postfix` | :x: | :gear: |
|
|
||||||
| XWiki | `replicas.xwiki` | :white_check_mark: | :gear: |
|
|
||||||
|
|
||||||
|
|
||||||
### Mail/SMTP configuration
|
|
||||||
|
|
||||||
To use the full potential of the openDesk, you need to set up a STMP Smarthost/Relay which allows to send emails from
|
|
||||||
the whole subdomain.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
smtp:
|
|
||||||
host: # your SMTP host or IP-address
|
|
||||||
username: # username/email for authentication
|
|
||||||
password: # password for authentication, or via environment variable SMTP_PASSWORD
|
|
||||||
```
|
|
||||||
|
|
||||||
### TURN configuration
|
|
||||||
|
|
||||||
Some components (Jitsi, Element) use for direct communication a TURN server.
|
|
||||||
You can configure your own TURN server with these options:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
turn:
|
|
||||||
transport: # "udp" or "tcp"
|
|
||||||
credentials: # turn credential string
|
|
||||||
server: # configuration for unsecure connections
|
|
||||||
host: # your TURN host or IP-address
|
|
||||||
port: # server port
|
|
||||||
tls: # configuration for secure connections
|
|
||||||
host: # your TURN host or IP-address
|
|
||||||
port: # server port
|
|
||||||
```
|
|
||||||
|
|
||||||
## Security
|
|
||||||
|
|
||||||
This section summarizes various aspects of security and compliance aspects.
|
|
||||||
|
|
||||||
### Kubernetes Security Enforcements
|
|
||||||
|
|
||||||
This list gives you an overview of default security settings and if they comply with security standards:
|
|
||||||
|
|
||||||
|
|
||||||
| Component | Process | = | allowPrivilegeEscalation (`false`) | capabilities (`drop: ALL`) | seccompProfile (`RuntimeDefault`) | readOnlyRootFilesystem (`true`) | runAsNonRoot (`true`) | runAsUser | runAsGroup | fsGroup |
|
|
||||||
|------------|--------------------------|:------------------:|:----------------------------------:|:----------------------------------------------------------------------------------------------------------------------------------------------:|:---------------------------------:|:-------------------------------:|:---------------------:|:---------:|:----------:|:-------:|
|
|
||||||
| ClamAV | clamd | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
|
||||||
| | freshclam | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
|
||||||
| | icap | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
|
||||||
| | milter | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
|
||||||
| Collabora | collabora | :x: | :x: | :x: (`CHOWN`, `DAC_OVERRIDE`, `FOWNER`, `FSETID`, `KILL`, `SETGID`, `SETUID`, `SETPCAP`, `NET_BIND_SERVICE`, `NET_RAW`, `SYS_CHROOT`, `MKNOD`) | :white_check_mark: | :x: | :white_check_mark: | 100 | 101 | 100 |
|
|
||||||
| Element | element | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
|
||||||
| | synapse | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 10991 | - | 10991 |
|
|
||||||
| | synapseWeb | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
|
||||||
| | wellKnown | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
|
||||||
| Jitsi | jibri | :x: | :x: | :x: (`SYS_ADMIN`) | :white_check_mark: | :x: | :x: | - | - | - |
|
|
||||||
| | jicofo | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
|
||||||
| | jitsiKeycloakAdapter | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1993 | 1993 | - |
|
|
||||||
| | jvb | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
|
||||||
| | prosody | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
|
||||||
| | web | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
|
||||||
| Keycloak | keycloak | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 1001 | 1001 | 1001 |
|
|
||||||
| | keycloakConfigCli | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
|
||||||
| | keycloakExtensionHandler | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
|
||||||
| | keycloakExtensionProxy | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
|
||||||
| MariaDB | mariadb | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
|
||||||
| Postfix | postfix | :x: | :x: | :x: | :white_check_mark: | :x: | :x: | - | - | 101 |
|
|
||||||
| PostgreSQL | postgresql | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
|
||||||
|
|
||||||
|
|
||||||
### Helm Chart Trust Chain
|
|
||||||
|
|
||||||
Helm Charts which are released via openDesk CI/CD process are always signed. The public GPG keys are present in
|
|
||||||
`pubkey.gpg` file and are validated during helmfile installation.
|
|
||||||
|
|
||||||
| Repository | OCI | Verifiable |
|
|
||||||
|--------------------------------------|:---:|:------------------:|
|
|
||||||
| bitnami-repo | yes | :x: |
|
|
||||||
| clamav-repo | yes | :white_check_mark: |
|
|
||||||
| collabora-online-repo | no | :x: |
|
|
||||||
| intercom-service-repo | yes | :white_check_mark: |
|
|
||||||
| istio-resources-repo | yes | :white_check_mark: |
|
|
||||||
| jitsi-repo | yes | :white_check_mark: |
|
|
||||||
| keycloak-extensions-repo | no | :x: |
|
|
||||||
| keycloak-theme-repo | yes | :white_check_mark: |
|
|
||||||
| mariadb-repo | yes | :white_check_mark: |
|
|
||||||
| nextcloud-repo | no | :x: |
|
|
||||||
| opendesk-certificates-repo | yes | :white_check_mark: |
|
|
||||||
| opendesk-dovecot-repo | yes | :white_check_mark: |
|
|
||||||
| opendesk-element-repo | yes | :white_check_mark: |
|
|
||||||
| opendesk-keycloak-bootstrap-repo | yes | :white_check_mark: |
|
|
||||||
| opendesk-nextcloud-bootstrap-repo | yes | :white_check_mark: |
|
|
||||||
| opendesk-open-xchange-bootstrap-repo | yes | :white_check_mark: |
|
|
||||||
| openproject-repo | no | :x: |
|
|
||||||
| openxchange-repo | yes | :x: |
|
|
||||||
| ox-connector-repo | no | :x: |
|
|
||||||
| postfix-repo | yes | :white_check_mark: |
|
|
||||||
| postgresql-repo | yes | :white_check_mark: |
|
|
||||||
| univention-corporate-container-repo | yes | :white_check_mark: |
|
|
||||||
| ums-repo | no | :x: |
|
|
||||||
| xwiki-repo | no | :x: |
|
|
||||||
|
|
||||||
|
|
||||||
# Component integration
|
|
||||||
|
|
||||||
## Functional use cases
|
|
||||||
|
|
||||||
### Overview
|
|
||||||
|
|
||||||
Some use cases require inter component integration.
|
|
||||||
|
|
||||||
```mermaid
|
|
||||||
flowchart TD
|
|
||||||
OXAppSuiteFrontend-->|SilentLogin, Filepicker, CentralNavigation|IntercomService
|
|
||||||
IntercomService-->|SilentLogin, TokenExchange|Keycloak
|
|
||||||
IntercomService-->|Filepicker|Nextcloud
|
|
||||||
IntercomService-->|CentralNavigation|Portal
|
|
||||||
OXAppSuiteBackend-->|Filepicker|Nextcloud
|
|
||||||
Nextcloud-->|CentralNavigation|Portal
|
|
||||||
OpenProject-->|CentralNavigation|Portal
|
|
||||||
XWiki-->|CentralNavigation|Portal
|
|
||||||
Nextcloud-->|CentralContacts|OXAppSuiteBackend
|
|
||||||
OXAppSuiteFrontend-->|Filepicker|OXAppSuiteBackend
|
|
||||||
```
|
|
||||||
|
|
||||||
#### Intercom Service (ICS)
|
|
||||||
|
|
||||||
The UCS Intercom Service's role is to enable cross application integration based
|
|
||||||
on browser interaction. Handling authentication when the frontend of an
|
|
||||||
application is using the API from another application is often a challenge.
|
|
||||||
For more details on the ICS please refer to its own [README.md](./helmfile/apps/intercom-service/README.md).
|
|
||||||
|
|
||||||
In order to establish a session with the Intercom Service, the application that
|
|
||||||
wants to use the ICS must initiate a silent login.
|
|
||||||
|
|
||||||
Currently only OX AppSuite is using the frontend based integration, and
|
|
||||||
therefore it is right now the only consumer of the ICS API.
|
|
||||||
|
|
||||||
### Filepicker
|
|
||||||
|
|
||||||
The Nextcloud filepicker which is integrated into the OX AppSuite allows you to
|
|
||||||
add attachments or links to files from and saving attachments to Nextcloud.
|
|
||||||
|
|
||||||
The filepicker is using frontend and backend based integration. Frontend based
|
|
||||||
integration means that OX AppSuite in the browser is communicating with ICS.
|
|
||||||
While using backend based integration, OX AppSuite middleware is communicating
|
|
||||||
with Nextcloud, which is especially used when adding a file to an email or
|
|
||||||
storing a file into Nextcloud.
|
|
||||||
|
|
||||||
### Central Navigation
|
|
||||||
|
|
||||||
Central navigation is based on an API endpoint in the portal that provides the
|
|
||||||
contents of the portal for a user in order to allow components to render the
|
|
||||||
menu showing all available SWP applications for the user.
|
|
||||||
|
|
||||||
### (Read & write) Central contacts
|
|
||||||
|
|
||||||
Open-Xchange App Suite is used to manage contacts within the Sovereign
|
|
||||||
Workplace. There is an API in the AppSuite that is being used by
|
|
||||||
Nextcloud to lookup contacts as well as to create contacts. This is maybe done
|
|
||||||
when a file is shared with a not yet available personal contact.
|
|
||||||
|
|
||||||
# Identity data flows
|
|
||||||
|
|
||||||
An overview of
|
|
||||||
- components that consume the LDAP service. Mostly by using a dedicated LDAP search account.
|
|
||||||
- components using Keycloak as identity provider. If not otherwise denoted based on the OAuth2 / OIDC flows.
|
|
||||||
|
|
||||||
Some components trust others to handle authentication for them.
|
|
||||||
|
|
||||||
```mermaid
|
|
||||||
flowchart TD
|
|
||||||
K[Keycloak]-->L[LDAP]
|
|
||||||
N[Nextcloud]-->L
|
|
||||||
A[OX AppSuite]-->L
|
|
||||||
D[OX Dovecot]-->L
|
|
||||||
P[Portal/Admin]-->L
|
|
||||||
O[OpenProject]-->L
|
|
||||||
X[XWiki]-->|in 2023|L
|
|
||||||
A-->K
|
|
||||||
N-->K
|
|
||||||
D-->K
|
|
||||||
O-->K
|
|
||||||
X-->K
|
|
||||||
P-->|SAML|K
|
|
||||||
E[Element]-->K
|
|
||||||
J[Jitsi]-->K
|
|
||||||
I[IntercomService]-->K
|
|
||||||
C[Collabora]-->N
|
|
||||||
F[Postfix]-->D
|
|
||||||
```
|
|
||||||
|
|
||||||
# Provisioning
|
|
||||||
|
|
||||||
Currently active provisioning is only done for OX AppSuite. The OX-Connector
|
|
||||||
synchronizes creates, modifies and deletes activities for the following objects
|
|
||||||
to the OX AppSuite using the AppSuite's SOAP API:
|
|
||||||
|
|
||||||
- Contexts
|
|
||||||
- Users
|
|
||||||
- Groups
|
|
||||||
- Functional Mailboxes
|
|
||||||
- Resources
|
|
||||||
|
|
||||||
# Component specific documentation
|
|
||||||
|
|
||||||
We want to provide more information per component in separate, component
|
|
||||||
specific `README.md` files. In order to establish a common view on the
|
|
||||||
components we are going to cover various aspects:
|
|
||||||
|
|
||||||
- **Component overview**: Shall provide a quick introduction including the components prerequisites and subcomponents (f.e. pods).
|
|
||||||
- **Resources**: Will contain a link to the components upstream documentation, the helm chart and image locations.
|
|
||||||
- **Operational Capabilities**
|
|
||||||
- **Install**: The components installs within the SWP.
|
|
||||||
- **Restart**: Deleting and restarting pods works seamlessly.
|
|
||||||
- **Update**: Redeploying the component with a different configuration works as expected. The component makes use of the updates configuration afterwards.
|
|
||||||
- **Upgrade**: Component allows to upgrade existing deployments with more current versions of itself.
|
|
||||||
- **Secrets**: The component uses K8s secrets.
|
|
||||||
- **Logging**: Only logging to STDOUT, no logs inside the container.
|
|
||||||
- **Monitoring**: Application provides based on kube-prometheus-stack CRD: ServiceMonitor and PrometheusRule. Optional: Grafana Dashboard.
|
|
||||||
- **Scale**: If supported (as we use community products) the component should be manually scalable. Optional: Autoscaling.
|
|
||||||
- **Network policies**: Deny by default, allow application related traffic.
|
|
||||||
- **Uninstall**: Documented and working complete uninstallation of the component.
|
|
||||||
- **Debugging**: Some helpful information when it comes to debugging a component, e.g. setting log level.
|
|
||||||
|
|
||||||
## Links to component README.mds
|
|
||||||
|
|
||||||
- [Intercom-Service](./helmfile/apps/intercom-service/README.md)
|
|
||||||
|
|
||||||
## Tests
|
|
||||||
|
|
||||||
The gitlab-ci pipeline contains a job named `run-tests` that can trigger a test suite pipeline on another gitlab project.
|
|
||||||
The `DEPLOY_`-variables are used to determine which components should be tested.
|
|
||||||
In order for the trigger to work, the variable `TESTS_PROJECT_URL` has to be set on this gitlab project's CI variables
|
|
||||||
that can be found at `Settings` -> `CI/CD` -> `Variables`. The variable should have this format:
|
|
||||||
`<domain of gitlab>/api/v4/projects/<id>`.
|
|
||||||
|
|
||||||
If the branch of the test pipeline is not `main` this can be set with the .gitlab-ci.yml variable
|
|
||||||
`TESTS_BRANCH` while creating a new pipeline.
|
|
||||||
|
|
||||||
|
Copyright (C) 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
|
||||||
# Footnotes
|
# Footnotes
|
||||||
|
|
||||||
[^1] Required for scaling components Nextcloud, Dovecot and ClamAV Distributed.
|
[^1]: Nubus is the Cloud Portal and IAM from Univention.
|
||||||
|
It is currently integrated as a product preview within openDesk therefore,
|
||||||
|
not all resources like documentation and structured release notes are available,
|
||||||
|
while the
|
||||||
|
[source code can already be found on Open CoDE](https://gitlab.opencode.de/bmi/opendesk/component-code/crossfunctional/univention).
|
||||||
|
Please find updates regarding the Nubus at https://nubus.io.
|
||||||
|
|||||||
42
docs/ci.md
Normal file
42
docs/ci.md
Normal file
@@ -0,0 +1,42 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
<h1>CI/CD</h1>
|
||||||
|
|
||||||
|
This page will cover openDesk automation via Gitlab CI.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Deployment](#deployment)
|
||||||
|
* [Tests](#tests)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# Deployment
|
||||||
|
|
||||||
|
The project includes a `.gitlab-ci.yml` that allows you to execute the deployment from a Gitlab instance of your choice.
|
||||||
|
|
||||||
|
|
||||||
|
When starting the pipeline through the Gitlab UI, you will be queried for some variables plus the following ones:
|
||||||
|
|
||||||
|
- `DOMAIN` = The domain to deploy to.
|
||||||
|
- `ISTIO_DOMAIN` = istio.`DOMAIN`
|
||||||
|
- `NAMESPACE`: Defines into which namespace of your K8s cluster the SWP will be installed
|
||||||
|
- `MASTER_PASSWORD_WEB_VAR`: Overwrites value of `MASTER_PASSWORD`
|
||||||
|
|
||||||
|
Based on your input, the following variables will be set:
|
||||||
|
- `MASTER_PASSWORD` = `MASTER_PASSWORD_WEB_VAR`. If `MASTER_PASSWORD_WEB_VAR`
|
||||||
|
is not set, the default for `MASTER_PASSWORD` will be used, unless you set
|
||||||
|
`MASTER_PASSWORD` as a masked CI/CD variable in Gitlab to supersede the default.
|
||||||
|
|
||||||
|
You might want to set credential variables in the Gitlab project at `Settings` > `CI/CD` > `Variables`.
|
||||||
|
|
||||||
|
# Tests
|
||||||
|
|
||||||
|
The gitlab-ci pipeline contains a job named `run-tests` that can trigger a test suite pipeline on another gitlab project.
|
||||||
|
The `DEPLOY_`-variables are used to determine which components should be tested.
|
||||||
|
In order for the trigger to work, the variable `TESTS_PROJECT_URL` has to be set on this gitlab project's CI variables
|
||||||
|
that can be found at `Settings` -> `CI/CD` -> `Variables`. The variable should have this format:
|
||||||
|
`<domain of gitlab>/api/v4/projects/<id>`.
|
||||||
|
|
||||||
|
If the branch of the test pipeline is not `main` this can be set with the .gitlab-ci.yml variable
|
||||||
|
`TESTS_BRANCH` while creating a new pipeline.
|
||||||
183
docs/components.md
Normal file
183
docs/components.md
Normal file
@@ -0,0 +1,183 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
<h1>Components</h1>
|
||||||
|
|
||||||
|
This section covers the internal system requirements as well as external service requirements for productive use.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Overview](#overview)
|
||||||
|
* [Component integration](#component-integration)
|
||||||
|
* [Intercom Service (ICS)](#intercom-service-ics)
|
||||||
|
* [Filepicker](#filepicker)
|
||||||
|
* [Central Navigation](#central-navigation)
|
||||||
|
* [(Read \& write) Central contacts](#read--write-central-contacts)
|
||||||
|
* [OpenProject Filestore](#openproject-filestore)
|
||||||
|
* [Identity data flows](#identity-data-flows)
|
||||||
|
* [Provisioning](#provisioning)
|
||||||
|
* [Component specific documentation](#component-specific-documentation)
|
||||||
|
* [Links to component docs](#links-to-component-docs)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# Overview
|
||||||
|
|
||||||
|
openDesk consists out of a variety of open-source projects. Here is a list with the description and type.
|
||||||
|
|
||||||
|
Components of type `Eval` are used for development and evaluation purposes only,
|
||||||
|
they need to be replaced in production deployments.
|
||||||
|
|
||||||
|
| Component | Description | Type |
|
||||||
|
|-----------------------------|--------------------------------|------------|
|
||||||
|
| Certificates | TLS certificates | Eval |
|
||||||
|
| ClamAV (Distributed) | Antivirus engine | Eval |
|
||||||
|
| ClamAV (Simple) | Antivirus engine | Eval |
|
||||||
|
| Collabora | Weboffice | Functional |
|
||||||
|
| CryptPad | Weboffice | Functional |
|
||||||
|
| Element | Secure communications platform | Functional |
|
||||||
|
| Intercom Service | Cross service data exchange | Functional |
|
||||||
|
| Jitsi | Videoconferencing | Functional |
|
||||||
|
| MariaDB | Database | Eval |
|
||||||
|
| Memcached | Cache Database | Eval |
|
||||||
|
| MinIO | Object Storage | Eval |
|
||||||
|
| Nextcloud | File share | Functional |
|
||||||
|
| OpenProject | Project management | Functional |
|
||||||
|
| OX Appsuite | Groupware | Functional |
|
||||||
|
| OX Dovecot | Mail backend (IMAP) | Functional |
|
||||||
|
| Provisioning (OX Connector) | Groupware provisioning | Functional |
|
||||||
|
| Postfix | MTA | Eval |
|
||||||
|
| PostgreSQL | Database | Eval |
|
||||||
|
| Redis | Cache Database | Eval |
|
||||||
|
| Univention Management Stack | Identity Management & Portal | Functional |
|
||||||
|
| XWiki | Knowledgebase | Functional |
|
||||||
|
|
||||||
|
# Component integration
|
||||||
|
|
||||||
|
Some use cases require inter component integration.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
flowchart TD
|
||||||
|
OXAppSuiteFrontend-->|SilentLogin, Filepicker, CentralNavigation|IntercomService
|
||||||
|
Element-->|CentralNavigation|IntercomService
|
||||||
|
IntercomService-->|SilentLogin, TokenExchange|IdP
|
||||||
|
IntercomService-->|Filepicker|Nextcloud
|
||||||
|
IntercomService-->|CentralNavigation|Portal
|
||||||
|
OXAppSuiteBackend-->|Filepicker|Nextcloud
|
||||||
|
Nextcloud-->|CentralNavigation|Portal
|
||||||
|
OpenProject-->|CentralNavigation|Portal
|
||||||
|
OpenProject-->|Filestore|Nextcloud
|
||||||
|
XWiki-->|CentralNavigation|Portal
|
||||||
|
Nextcloud-->|CentralContacts|OXAppSuiteBackend
|
||||||
|
OXAppSuiteFrontend-->|Filepicker|OXAppSuiteBackend
|
||||||
|
```
|
||||||
|
|
||||||
|
## Intercom Service (ICS)
|
||||||
|
|
||||||
|
The Univention Intercom Service's role is to enable cross-application integration based on browser interaction.
|
||||||
|
Handling authentication when the frontend of an application is using the API from another application is often a
|
||||||
|
challenge.
|
||||||
|
For more details on the ICS please refer to its own [doc](./components/intercom-service.md).
|
||||||
|
|
||||||
|
To establish a session with the Intercom Service, the application that wants to use the ICS must initiate a silent
|
||||||
|
login.
|
||||||
|
|
||||||
|
Currently only OX AppSuite is using the frontend-based integration, and therefore it is right now the only consumer of
|
||||||
|
the ICS API.
|
||||||
|
|
||||||
|
## Filepicker
|
||||||
|
|
||||||
|
The Nextcloud filepicker which is integrated into the OX AppSuite allows you to add attachments or links to files from
|
||||||
|
and saving attachments to Nextcloud.
|
||||||
|
|
||||||
|
The filepicker is using frontend and backend based integration.
|
||||||
|
Frontend-based integration means that OX AppSuite in the browser is communicating with ICS.
|
||||||
|
While using backend-based integration, OX AppSuite middleware is communicating with Nextcloud, which is especially used
|
||||||
|
when adding a file to an email or storing a file into Nextcloud.
|
||||||
|
|
||||||
|
## Central Navigation
|
||||||
|
|
||||||
|
Central navigation is based on an API endpoint in the portal that provides the contents of the portal for a user to
|
||||||
|
allow components to render the menu showing all available SWP applications for the user.
|
||||||
|
|
||||||
|
## (Read & write) Central contacts
|
||||||
|
|
||||||
|
Open-Xchange App Suite is used to manage contacts within openDesk. There is an API in the AppSuite that is being used by
|
||||||
|
Nextcloud to lookup contacts as well as to create contacts. This is maybe done when a file is shared with a not yet
|
||||||
|
available personal contact.
|
||||||
|
|
||||||
|
## OpenProject Filestore
|
||||||
|
|
||||||
|
By default, Nextcloud is a configured option for storing attachments in OpenProject.
|
||||||
|
The Filestore can be enabled on a per-project level in OpenProject's project admin section.
|
||||||
|
|
||||||
|
# Identity data flows
|
||||||
|
|
||||||
|
An overview of
|
||||||
|
- components that consume the LDAP service.
|
||||||
|
- The components accessing the LDAP using a component specific LDAP search account.
|
||||||
|
- components using Univention Keycloak as identity provider (IdP).
|
||||||
|
- If not otherwise denoted the components make use of OAuth2 / OIDC flows.
|
||||||
|
- All components have a client configured in Keycloak, except for Jitsi which is using authentication with the
|
||||||
|
[Authorization Code Flow](https://openid.net/specs/openid-connect-core-1_0.html#CodeFlowAuth) that does not
|
||||||
|
require an OIDC client to be configured in Keycloak.
|
||||||
|
|
||||||
|
Some components trust others to handle authentication for them.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
flowchart TD
|
||||||
|
K[IdP]-->L[LDAP]
|
||||||
|
N[Nextcloud]-->L
|
||||||
|
O[OpenProject] --> L
|
||||||
|
A[OX AppSuite]-->L
|
||||||
|
D[OX Dovecot]-->L
|
||||||
|
P[Portal/Admin]-->L
|
||||||
|
X[XWiki]-->L
|
||||||
|
A-->K
|
||||||
|
N-->K
|
||||||
|
D-->K
|
||||||
|
O-->K
|
||||||
|
X-->K
|
||||||
|
P-->|SAML|K
|
||||||
|
E[Element]-->K
|
||||||
|
J[Jitsi]-->K
|
||||||
|
I[IntercomService]-->K
|
||||||
|
C[Collabora]-->N
|
||||||
|
R[CryptPad]-->N
|
||||||
|
F[Postfix]-->D
|
||||||
|
```
|
||||||
|
|
||||||
|
# Provisioning
|
||||||
|
|
||||||
|
Currently, active provisioning is only done for OX AppSuite. The OX-Connector is synchronizing, creating, modifying and
|
||||||
|
deleting activities for the following objects to the OX AppSuite using the AppSuite's SOAP API:
|
||||||
|
|
||||||
|
- Contexts
|
||||||
|
- Users
|
||||||
|
- Groups
|
||||||
|
- Functional Mailboxes
|
||||||
|
- Resources
|
||||||
|
|
||||||
|
# Component specific documentation
|
||||||
|
|
||||||
|
We want to provide more information per component in separate, component-specific markdown file.
|
||||||
|
To establish a common view on the components, we are going to cover various aspects:
|
||||||
|
|
||||||
|
- **Component overview**: Shall provide a quick introduction including the components prerequisites and subcomponents (f.e. pods).
|
||||||
|
- **Resources**: Will contain a link to the component upstream documentation, the helm chart and image locations.
|
||||||
|
- **Operational Capabilities**
|
||||||
|
- **Install**: The components install within the SWP.
|
||||||
|
- **Restart**: Deleting and restarting pods works seamlessly.
|
||||||
|
- **Update**: Redeploying the component with a different configuration works as expected. The component makes use of the updates configuration afterwards.
|
||||||
|
- **Upgrade**: Component allows upgrading existing deployments with more current versions of itself.
|
||||||
|
- **Secrets**: The component uses K8s secrets.
|
||||||
|
- **Logging**: Only logging to STDOUT, no logs inside the container.
|
||||||
|
- **Monitoring**: Application provides based on kube-prometheus-stack CRD: ServiceMonitor and PrometheusRule. Optional: Grafana Dashboard.
|
||||||
|
- **Scale**: If supported (as we use community products) the component should be manually scalable. Optional: Autoscaling.
|
||||||
|
- **Network policies**: Deny by default, allow application related traffic.
|
||||||
|
- **Uninstall**: Documented and working complete uninstallation of the component.
|
||||||
|
- **Debugging**: Some helpful information when it comes to debugging a component, e.g. setting log level.
|
||||||
|
|
||||||
|
# Links to component docs
|
||||||
|
|
||||||
|
- [Intercom-Service](./components/intercom-service.md)
|
||||||
83
docs/debugging.md
Normal file
83
docs/debugging.md
Normal file
@@ -0,0 +1,83 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
<h1>Debugging</h1>
|
||||||
|
|
||||||
|
* [Disclaimer](#disclaimer)
|
||||||
|
* [Enable debugging](#enable-debugging)
|
||||||
|
* [Components](#components)
|
||||||
|
* [MariaDB](#mariadb)
|
||||||
|
* [Nextcloud](#nextcloud)
|
||||||
|
* [OpenProject](#openproject)
|
||||||
|
* [PostgreSQL](#postgresql)
|
||||||
|
|
||||||
|
# Disclaimer
|
||||||
|
|
||||||
|
This document collects information how to deal with debugging an openDesk deployment.
|
||||||
|
|
||||||
|
It will be extended over time as we have to deal with debugging cases.
|
||||||
|
|
||||||
|
We for sure do not want to reinvent the wheel, so we might link to external sources that contain helpful
|
||||||
|
information where available.
|
||||||
|
|
||||||
|
**Note:** You should never enable debug in production environments! By looking up `debug.enable` in the deployment you
|
||||||
|
will find the various places changes are applied when enabling debugging. So outside of development and test
|
||||||
|
environments you may want to make use of them in a very thoughtful and selective manner if needed.
|
||||||
|
|
||||||
|
# Enable debugging
|
||||||
|
|
||||||
|
Set `debug.enable` to `true` in [`debug.yaml`](../helmfile/environments/default/debug.yaml) to set the
|
||||||
|
component's loglevel to debug and it get some features like:
|
||||||
|
- The `/admin` console is routed for Keycloak.
|
||||||
|
- An ingress for `http://minio-console.<your_domain>` is configured.
|
||||||
|
and set the loglevel for components to "Debug".
|
||||||
|
|
||||||
|
**Note:** All containers should write their log output to STDOUT, if you find (valuable) logs inside a container, please let us know!
|
||||||
|
|
||||||
|
# Components
|
||||||
|
|
||||||
|
## MariaDB
|
||||||
|
|
||||||
|
When using the openDesk bundled MariaDB you can explore database(s) using the MariaDB interactive terminal from the pod's command line: `mariadb -u root -p`. As password provide the value for `MARIADB_ROOT_PASSWORD` set in the pod's environment.
|
||||||
|
|
||||||
|
While you will find all details for the CLI tool in [the online documentation](https://mariadb.com/kb/en/mariadb-command-line-client/), some quick commands are:
|
||||||
|
|
||||||
|
- `help`: Get help on the psql command set
|
||||||
|
- `show databases`: Lists all databases
|
||||||
|
- `use <databasename>`: Connect to `<databasename>`
|
||||||
|
- `show tables`: Lists tables within the currently connected database
|
||||||
|
- `quit`: Quit the client
|
||||||
|
|
||||||
|
## Nextcloud
|
||||||
|
|
||||||
|
`occ` is the CLI for Nextcloud, all the details can be found in the [upstream documentation](https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/occ_command.html).
|
||||||
|
|
||||||
|
You can run occ commands in the `opendesk-nextcloud-php` pod like this: `php /var/www/html/occ config:list`
|
||||||
|
|
||||||
|
## OpenProject
|
||||||
|
|
||||||
|
OpenProject is a Ruby on Rails application. Therefore you can make use of the Rails console from the pod's command line `bundle exec rails console`
|
||||||
|
|
||||||
|
and run debug code like this:
|
||||||
|
|
||||||
|
```
|
||||||
|
uri = URI('https://nextcloud.url/index.php/apps/integration_openproject/check-config')
|
||||||
|
Net::HTTP.start(uri.host, uri.port,
|
||||||
|
:use_ssl => uri.scheme == 'https') do |http|
|
||||||
|
request = Net::HTTP::Get.new uri
|
||||||
|
response = http.request request # Net::HTTPResponse object
|
||||||
|
end
|
||||||
|
```
|
||||||
|
|
||||||
|
## PostgreSQL
|
||||||
|
|
||||||
|
When using the openDesk bundled PostgreSQL you can explore database(s) using the PostgreSQL interactive terminal from the pod's command line: `psql -U postgres`.
|
||||||
|
|
||||||
|
While you will find all details in the [psql subsection](https://www.postgresql.org/docs/current/app-psql.html)) of the PostgreSQL documentation, some quick commands are:
|
||||||
|
|
||||||
|
- `\?`: Get help on the psql command set
|
||||||
|
- `\l`: Lists all databases
|
||||||
|
- `\c <databasename>`: Connect to `<databasename>`
|
||||||
|
- `\dt`: List (describe) tables within the currently connected database
|
||||||
|
- `\q`: Quit the client
|
||||||
142
docs/development.md
Normal file
142
docs/development.md
Normal file
@@ -0,0 +1,142 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Developing openDesk deployment automation</h1>
|
||||||
|
|
||||||
|
Active development on the deployment is currently only available for project members.
|
||||||
|
But contributions will be possible soon once the CLA process is sorted out.
|
||||||
|
|
||||||
|
* [Overview](#overview)
|
||||||
|
* [Default branch, `develop` and other branches](#default-branch-develop-and-other-branches)
|
||||||
|
* [External artefacts - `charts.yaml` and `images.yaml`](#external-artefacts---chartsyaml-and-imagesyaml)
|
||||||
|
* [Linting](#linting)
|
||||||
|
* [Renovate](#renovate)
|
||||||
|
* [Mirroring](#mirroring)
|
||||||
|
* [Get new artefacts mirrored](#get-new-artefacts-mirrored)
|
||||||
|
* [Creating new charts / images](#creating-new-charts--images)
|
||||||
|
|
||||||
|
# Overview
|
||||||
|
|
||||||
|
The following sketch provides an high level overview to get a basic understanding of the deployment relevant
|
||||||
|
structure of this repository. An understanding of that structure is vital if you want to contribute to
|
||||||
|
the development of the deployment automation of openDesk.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
flowchart TD
|
||||||
|
A[./helmfile.yaml]-->B[./helmfile/apps/*all_configured_apps*/helmfile.yaml\nReferences the relevant app Helm\ncharts using details from 'charts.yaml']
|
||||||
|
B-->C[./values-*all_configured_components*.yaml.gotmpl\nValues to template the charts\nwith references to the `images.yaml`]
|
||||||
|
A-->D[./helmfile/environments/default/*\nwith just some examples below]
|
||||||
|
D-->F[charts.yaml]
|
||||||
|
D-->G[images.yaml]
|
||||||
|
D-->H[global.*]
|
||||||
|
D-->I[secrets.yaml\nreplicas.yaml\nresources.yaml\n...]
|
||||||
|
A-->|overwrite defaults with your\ndeployment/environment specific values|E[./helmfile/environments/*your_environment*/values.yaml.gotmpl]
|
||||||
|
```
|
||||||
|
|
||||||
|
The `helmfile.yaml` in the root folder is the basis for the whole deployment. It references the app specific `helmfile.yaml` files as well as some
|
||||||
|
global values files in `./environments/default`. It allows you to overwrite defaults by using one of the three predefined environments `dev`, `test`
|
||||||
|
and `prod`.
|
||||||
|
|
||||||
|
Before you look into any app specifc configuration it is recommended to review the contents of `./environments/default` to get an understanding of what
|
||||||
|
details are maintained in there, as they are usually referenced by the app configurations.
|
||||||
|
|
||||||
|
# Default branch, `develop` and other branches
|
||||||
|
|
||||||
|
The `main` branch is configured to be the default branch, as visitors of the project on Open CoDE should see that
|
||||||
|
branch by default.
|
||||||
|
|
||||||
|
Please use the `develop` branch to diverge your own branch(es) from. See the [workflow guide](./workflow.md)
|
||||||
|
for more details on naming conventions.
|
||||||
|
|
||||||
|
There is a CI bot that automatically creates a merge request once you initially pushed your branch to Open CoDE.
|
||||||
|
The merge request will of course target the `develop` branch, be in status `draft` and have you as assignee.
|
||||||
|
|
||||||
|
In case you do not plan to actually merge from the branch you have pushed, please close or delete the autocreated MR.
|
||||||
|
|
||||||
|
# External artefacts - `charts.yaml` and `images.yaml`
|
||||||
|
|
||||||
|
The `charts.yaml` and `images.yaml` are the central place to reference external artefacts that are used for the deployment.
|
||||||
|
|
||||||
|
Beside the deployment automation itself some tools work with the contents of the files:
|
||||||
|
|
||||||
|
- **Linting**: Ensures consistency of the file contents for the other tools.
|
||||||
|
- **Renovate**: Automatically create MRs that update the components to their latest version.
|
||||||
|
- **Mirror**: Mirror artefacts to Open CoDE.
|
||||||
|
|
||||||
|
Please find details on these tools below.
|
||||||
|
|
||||||
|
## Linting
|
||||||
|
|
||||||
|
In the project's CI there is a step dedicated to lint the two yaml files, as we want them to be in
|
||||||
|
- alphabetical order regarding the components and
|
||||||
|
- in a logical order regarding the non-commented lines (registry > repository > tag).
|
||||||
|
|
||||||
|
In the linting step the [openDesk CI CLI](https://gitlab.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli) is used to apply the
|
||||||
|
just mentioned sorting and the result is compared with the unsorted version. If there is a delta the linting fails and you probably
|
||||||
|
want to fix it by running the CLI tool locally.
|
||||||
|
|
||||||
|
**Note**: Please ensure that in component blocks you use comments only at the beginning of the block or at its end. Ideally you just stick
|
||||||
|
with the many available examples in the yaml files.
|
||||||
|
|
||||||
|
Example:
|
||||||
|
```
|
||||||
|
synapse:
|
||||||
|
# providerCategory: 'Supplier'
|
||||||
|
# providerResponsible: 'Element'
|
||||||
|
# upstreamRegistry: 'registry-1.docker.io'
|
||||||
|
# upstreamRepository: 'matrixdotorg/synapse'
|
||||||
|
# upstreamMirrorTagFilterRegEx: '^v(\d+)\.(\d+)\.(\d+)$'
|
||||||
|
# upstreamMirrorStartFrom: ['1', '91', '2']
|
||||||
|
registry: "registry.opencode.de"
|
||||||
|
repository: "bmi/opendesk/components/supplier/element/images-mirror/synapse"
|
||||||
|
tag: "v1.91.2@sha256:1d19508db417bb2b911c8e086bd3dc3b719ee75c6f6194d58af59b4c32b11322"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Renovate
|
||||||
|
|
||||||
|
Uses a regular expression to match the values of the following attributes:
|
||||||
|
|
||||||
|
- `registry`
|
||||||
|
- `repository`
|
||||||
|
- `tag`
|
||||||
|
|
||||||
|
Checks for newer versions of the given artefact and creates a MR containing the newest version's tag (and digest).
|
||||||
|
|
||||||
|
## Mirroring
|
||||||
|
|
||||||
|
- See also: https://gitlab.opencode.de/bmi/opendesk/tooling/oci-pull-mirror
|
||||||
|
|
||||||
|
**Note:** The mirror is scheduled to run every hour at 42 minutes past the hour.
|
||||||
|
|
||||||
|
openDesk strives to make all relevant artefacts available on Open CoDE so there is the mirroring process
|
||||||
|
configured to pull artefacts that do not originate from Open CoDE into projects called `*-Mirror` within the
|
||||||
|
[openDesk Components section](https://gitlab.opencode.de/bmi/opendesk/components).
|
||||||
|
|
||||||
|
The mirror script takes the information on what artefacts to mirror from the annotation inside the two yaml files:
|
||||||
|
- `# upstreamRegistry` *required*: To identify the source registry
|
||||||
|
- `# upstreamRepository` *required*: To identify the source repository
|
||||||
|
- `# upstreamMirrorTagFilterRegEx` *required*: If this annotation is set it activates the mirror for the component. Only tags are being mirrored that match the given regular expression.
|
||||||
|
- `# upstreamMirrorStartFrom` *optional*: Array of numeric values in case you want to mirror only artefacts beginning with a specific version. You must use capturing groups
|
||||||
|
in `# upstreamMirrorTagFilterRegEx` to identify the single numeric elements of the version within the tag and use per capturing group (left to right) one numeric array
|
||||||
|
element here to define the version the mirror should start with.
|
||||||
|
|
||||||
|
### Get new artefacts mirrored
|
||||||
|
|
||||||
|
If you want new images or charts to be mirrored that are not yet included in one of the yaml files there are two options:
|
||||||
|
|
||||||
|
You include them in your branch with all required annotations and either
|
||||||
|
1. ask somebody from the platform development team to trigger the mirror's CI based on your branch or
|
||||||
|
2. you get your branch merged to `develop` already.
|
||||||
|
|
||||||
|
# Creating new charts / images
|
||||||
|
|
||||||
|
When you create new Helm charts please check out the
|
||||||
|
[openDesk Best Practises](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-best-practises)
|
||||||
|
for Helm charts.
|
||||||
|
|
||||||
|
You may also want to make use of our [standard CI](https://gitlab.opencode.de/bmi/opendesk/tooling/gitlab-config) to
|
||||||
|
easily get Charts and Images that are signed, linted, scanned and released.
|
||||||
|
Check out the `.gitlab-ci.yaml` files in the project's [Charts](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts) or [Images](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images) to get an idea how little you need to do yourself.
|
||||||
110
docs/external-services.md
Normal file
110
docs/external-services.md
Normal file
@@ -0,0 +1,110 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>External services</h1>
|
||||||
|
|
||||||
|
This document will cover the additional configuration to use external services like databases, caches or buckets.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Database](#database)
|
||||||
|
* [Objectstore](#objectstore)
|
||||||
|
* [Cache](#cache)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# Database
|
||||||
|
|
||||||
|
When deploying this suite to production, you need to configure the applications to use your production grade database
|
||||||
|
service.
|
||||||
|
|
||||||
|
| Component | Name | Type | Parameter | Key | Default |
|
||||||
|
|-------------|--------------------|------------|-----------|------------------------------------------|----------------------------|
|
||||||
|
| Element | Synapse | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.synapse.name` | `matrix` |
|
||||||
|
| | | | Host | `databases.synapse.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.synapse.port` | `5432` |
|
||||||
|
| | | | Username | `databases.synapse.username` | `matrix_user` |
|
||||||
|
| | | | Password | `databases.synapse.password` | |
|
||||||
|
| Keycloak | Keycloak | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.keycloak.name` | `keycloak` |
|
||||||
|
| | | | Host | `databases.keycloak.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.keycloak.port` | `5432` |
|
||||||
|
| | | | Username | `databases.keycloak.username` | `keycloak_user` |
|
||||||
|
| | | | Password | `databases.keycloak.password` | |
|
||||||
|
| | Keycloak Extension | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.keycloakExtension.name` | `keycloak_extensions` |
|
||||||
|
| | | | Host | `databases.keycloakExtension.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.keycloakExtension.port` | `5432` |
|
||||||
|
| | | | Username | `databases.keycloakExtension.username` | `keycloak_extensions_user` |
|
||||||
|
| | | | Password | `databases.keycloakExtension.password` | |
|
||||||
|
| UMS | Notifications API | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.umsNotificationsApi.name` | `notificationsapi` |
|
||||||
|
| | | | Host | `databases.umsNotificationsApi.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.umsNotificationsApi.port` | `5432` |
|
||||||
|
| | | | Username | `databases.umsNotificationsApi.username` | `notificationsapi_user` |
|
||||||
|
| | | | Password | `databases.umsNotificationsApi.password` | |
|
||||||
|
| | Self Service | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.umsSelfservice.name` | `selfservice` |
|
||||||
|
| | | | Host | `databases.umsSelfservice.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.umsSelfservice.port` | `5432` |
|
||||||
|
| | | | Username | `databases.umsSelfservice.username` | `selfservice_user` |
|
||||||
|
| | | | Password | `databases.umsSelfservice.password` | |
|
||||||
|
| Nextcloud | Nextcloud | MariaDB | | | |
|
||||||
|
| | | | Name | `databases.nextcloud.name` | `nextcloud` |
|
||||||
|
| | | | Host | `databases.nextcloud.host` | `mariadb` |
|
||||||
|
| | | | Username | `databases.nextcloud.username` | `nextcloud_user` |
|
||||||
|
| | | | Password | `databases.nextcloud.password` | |
|
||||||
|
| OpenProject | OpenProject | PostgreSQL | | | |
|
||||||
|
| | | | Name | `databases.openproject.name` | `openproject` |
|
||||||
|
| | | | Host | `databases.openproject.host` | `postgresql` |
|
||||||
|
| | | | Port | `databases.openproject.port` | `5432` |
|
||||||
|
| | | | Username | `databases.openproject.username` | `openproject_user` |
|
||||||
|
| | | | Password | `databases.openproject.password` | |
|
||||||
|
| OX Appsuite | OX Appsuite | MariaDB | | | |
|
||||||
|
| | | | Name | `databases.oxAppsuite.name` | `CONFIGDB` |
|
||||||
|
| | | | Host | `databases.oxAppsuite.host` | `mariadb` |
|
||||||
|
| | | | Username | `databases.oxAppsuite.username` | `root` |
|
||||||
|
| | | | Password | `databases.oxAppsuite.password` | |
|
||||||
|
| XWiki | XWiki | MariaDB | | | |
|
||||||
|
| | | | Name | `databases.xwiki.name` | `xwiki` |
|
||||||
|
| | | | Host | `databases.xwiki.host` | `mariadb` |
|
||||||
|
| | | | Username | `databases.xwiki.username` | `xwiki_user` |
|
||||||
|
| | | | Password | `databases.xwiki.password` | |
|
||||||
|
|
||||||
|
# Objectstore
|
||||||
|
|
||||||
|
When deploying this suite to production, you need to configure the applications to use your production grade objectstore
|
||||||
|
service.
|
||||||
|
|
||||||
|
| Component | Name | Parameter | Key | Default |
|
||||||
|
|-------------|-------------|-----------------|------------------------------------------|--------------------|
|
||||||
|
| OpenProject | OpenProject | | | |
|
||||||
|
| | | Backend | `objectstores.openproject.backend` | `minio` |
|
||||||
|
| | | Bucket | `objectstores.openproject.bucket` | `openproject` |
|
||||||
|
| | | Endpoint | `objectstores.openproject.endpoint` | |
|
||||||
|
| | | Provider | `objectstores.openproject.provider` | `AWS` |
|
||||||
|
| | | Region | `objectstores.openproject.region` | |
|
||||||
|
| | | Secret | `objectstores.openproject.secret` | |
|
||||||
|
| | | Username | `objectstores.openproject.username` | `openproject_user` |
|
||||||
|
| | | Use IAM profile | `objectstores.openproject.useIAMProfile` | |
|
||||||
|
|
||||||
|
# Cache
|
||||||
|
|
||||||
|
When deploying this suite to production, you need to configure the applications to use your production grade cache
|
||||||
|
service.
|
||||||
|
|
||||||
|
| Component | Name | Type | Parameter | Key | Default |
|
||||||
|
|------------------|------------------|-----------|-----------|------------------------------|------------------|
|
||||||
|
| Intercom Service | Intercom Service | Redis | | | |
|
||||||
|
| | | | Host | `cache.intercomService.host` | `redis-headless` |
|
||||||
|
| | | | Port | `cache.intercomService.port` | `6379` |
|
||||||
|
| Nextcloud | Nextcloud | Redis | | | |
|
||||||
|
| | | | Host | `cache.nextcloud.host` | `redis-headless` |
|
||||||
|
| | | | Port | `cache.nextcloud.port` | `6379` |
|
||||||
|
| OpenProject | OpenProject | Memcached | | | |
|
||||||
|
| | | | Host | `cache.openproject.host` | `memcached` |
|
||||||
|
| | | | Port | `cache.openproject.port` | `11211` |
|
||||||
|
| UMS | Self Service | Memcached | | | |
|
||||||
|
| | | | Host | `cache.umsSelfservice.host` | `memcached` |
|
||||||
|
| | | | Port | `cache.umsSelfservice.port` | `11211` |
|
||||||
398
docs/getting-started.md
Normal file
398
docs/getting-started.md
Normal file
@@ -0,0 +1,398 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Getting stated</h1>
|
||||||
|
|
||||||
|
This documentation should enable you to create your own evaluation instance of openDesk on your Kubernetes cluster.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Requirements](#requirements)
|
||||||
|
* [Customize environment](#customize-environment)
|
||||||
|
* [Domain](#domain)
|
||||||
|
* [Apps](#apps)
|
||||||
|
* [Private registries](#private-registries)
|
||||||
|
* [Cluster capabilities](#cluster-capabilities)
|
||||||
|
* [Service](#service)
|
||||||
|
* [Networking](#networking)
|
||||||
|
* [Ingress](#ingress)
|
||||||
|
* [Container runtime](#container-runtime)
|
||||||
|
* [Volumes](#volumes)
|
||||||
|
* [Connectivity](#connectivity)
|
||||||
|
* [Mail/SMTP configuration](#mailsmtp-configuration)
|
||||||
|
* [TURN configuration](#turn-configuration)
|
||||||
|
* [Certificate issuer](#certificate-issuer)
|
||||||
|
* [Password seed](#password-seed)
|
||||||
|
* [Install](#install)
|
||||||
|
* [Install single app](#install-single-app)
|
||||||
|
* [Install single release/chart](#install-single-releasechart)
|
||||||
|
* [Access deployment](#access-deployment)
|
||||||
|
* [Uninstall](#uninstall)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
Thanks for looking into the openDesk Getting started guide. This documents covers essentials configuration steps to
|
||||||
|
deploy openDesk onto your kubernetes infrastructure.
|
||||||
|
|
||||||
|
# Requirements
|
||||||
|
|
||||||
|
Detailed system requirements are covered on [requirements](requirements.md) page.
|
||||||
|
|
||||||
|
# Customize environment
|
||||||
|
|
||||||
|
Before deploying openDesk, you have to configure the deployment to suit your environment.
|
||||||
|
To keep your deployment up to date, we recommend customizing in `dev`, `test` or `prod` and not in `default` environment
|
||||||
|
files.
|
||||||
|
|
||||||
|
> All configuration options and their default values can be found in files at `helmfile/environments/default/`
|
||||||
|
|
||||||
|
For the following guide, we will use `dev` as environment, where variables can be set in
|
||||||
|
`helmfile/environments/dev/values.yaml`.
|
||||||
|
|
||||||
|
## Domain
|
||||||
|
|
||||||
|
The deployment is designed to deploy each app under a subdomains. For your convenience, we recommend to create a
|
||||||
|
`*.domain.tld` A-Record to your cluster ingress controller, otherwise you need to create an A-Record for each subdomain.
|
||||||
|
|
||||||
|
A list of all subdomains can be found in `helmfile/environments/default/global.yaml`.
|
||||||
|
|
||||||
|
All subdomains can be customized. For example, _Nextcloud_ can be changed to `files.domain.tld` in `dev` environment:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
global:
|
||||||
|
hosts:
|
||||||
|
nextcloud: "files"
|
||||||
|
```
|
||||||
|
|
||||||
|
The domain have to be set either via `dev` environment
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
global:
|
||||||
|
domain: "my.open.desk"
|
||||||
|
istio:
|
||||||
|
domain: "istio.my.open.desk"
|
||||||
|
```
|
||||||
|
|
||||||
|
or via environment variable
|
||||||
|
|
||||||
|
```shell
|
||||||
|
export DOMAIN=my.open.desk
|
||||||
|
export ISTIO_DOMAIN=istio.my.open.desk
|
||||||
|
```
|
||||||
|
|
||||||
|
When you configure each subdomain individually, you can set `global.domain` and `istio.domain` to the same value.
|
||||||
|
|
||||||
|
Istio is only used for Open-Xchange Appsuite 8, when you don't want to install it, you can disable Istio:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
istio:
|
||||||
|
enabled: false
|
||||||
|
oxAppsuite:
|
||||||
|
enabled: false
|
||||||
|
```
|
||||||
|
|
||||||
|
### Apps
|
||||||
|
|
||||||
|
All available apps and their default value can be found in `helmfile/environments/default/workplace.yaml`.
|
||||||
|
|
||||||
|
| Component | Name | Default | Description |
|
||||||
|
|-----------------------------|-------------------------------------|---------|--------------------------------|
|
||||||
|
| Certificates | `certificates.enabled` | `true` | TLS certificates |
|
||||||
|
| ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine |
|
||||||
|
| ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine |
|
||||||
|
| Collabora | `collabora.enabled` | `true` | Weboffice |
|
||||||
|
| CryptPad | `cryptpad.enabled` | `true` | Weboffice |
|
||||||
|
| Dovecot | `dovecot.enabled` | `true` | Mail backend |
|
||||||
|
| Element | `element.enabled` | `true` | Secure communications platform |
|
||||||
|
| Intercom Service | `intercom.enabled` | `true` | Cross service data exchange |
|
||||||
|
| Jitsi | `jitsi.enabled` | `true` | Videoconferencing |
|
||||||
|
| MariaDB | `mariadb.enabled` | `true` | Database |
|
||||||
|
| Memcached | `memcached.enabled` | `true` | Cache Database |
|
||||||
|
| MinIO | `minio.enabled` | `true` | Object Storage |
|
||||||
|
| Nextcloud | `nextcloud.enabled` | `true` | File share |
|
||||||
|
| OpenProject | `openproject.enabled` | `true` | Project management |
|
||||||
|
| OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware |
|
||||||
|
| Provisioning | `oxConnector.enabled` | `true` | Backend provisioning |
|
||||||
|
| Postfix | `postfix.enabled` | `true` | MTA |
|
||||||
|
| PostgreSQL | `postgresql.enabled` | `true` | Database |
|
||||||
|
| Redis | `redis.enabled` | `true` | Cache Database |
|
||||||
|
| Univention Management Stack | `univentionManagementStack.enabled` | `true` | Identity Management & Portal |
|
||||||
|
| XWiki | `xwiki.enabled` | `true` | Knowledgebase |
|
||||||
|
|
||||||
|
Exemplary, Jitsi can be disabled like:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
jitsi:
|
||||||
|
enabled: false
|
||||||
|
```
|
||||||
|
|
||||||
|
## Private registries
|
||||||
|
|
||||||
|
By default Helm charts and container images are fetched from OCI registries. These registries can be found for most cases
|
||||||
|
in the [openDesk/component section on Open CoDE](https://gitlab.opencode.de/bmi/opendesk/components).
|
||||||
|
|
||||||
|
For untouched upstream artefacts that do not belong to a functional component's core we use upstream registries
|
||||||
|
like Docker Hub.
|
||||||
|
|
||||||
|
Doing a test deployment will most likely be fine with this setup. In case you want to deploy multiple times a day
|
||||||
|
and fetch from the same IP address you might run into rate limits at Docker Hub. In that case and in cases you
|
||||||
|
prefer the use of a private image registry anyway you can configure such for
|
||||||
|
[your target environment](./../helmfile/environments/dev/values.yaml.gotmpl.sample) by setting
|
||||||
|
- `global.imageRegistry` for a private image registry and
|
||||||
|
- `global.helmRegistry` for a private Helm chart registry.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
global:
|
||||||
|
imageRegistry: "external-registry.souvap-univention.de/sovereign-workplace"
|
||||||
|
```
|
||||||
|
|
||||||
|
alternatively you can use an environment variable:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
export PRIVATE_IMAGE_REGISTRY_URL=external-registry.souvap-univention.de/sovereign-workplace
|
||||||
|
```
|
||||||
|
|
||||||
|
If authentication is required, you can reference imagePullSecrets as following:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
global:
|
||||||
|
imagePullSecrets:
|
||||||
|
- "external-registry"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Cluster capabilities
|
||||||
|
|
||||||
|
### Service
|
||||||
|
|
||||||
|
Some apps, like Jitsi or Dovecot, require HTTP and external TCP connections.
|
||||||
|
These apps create a Kubernetes service object.
|
||||||
|
You can configure, whether `NodePort` (for on-premise), `LoadBalancer` (for cloud) or `ClusterIP` (to disable) should be
|
||||||
|
used:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
service:
|
||||||
|
type: "NodePort"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Networking
|
||||||
|
|
||||||
|
If your cluster has not the default `cluster.local` domain configured, you need to provide the domain via:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
networking:
|
||||||
|
domain: "acme.internal"
|
||||||
|
```
|
||||||
|
|
||||||
|
If your cluster has not the default `10.0.0.0/8` CIDR configured, you need to provide the CIDR via:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
networking:
|
||||||
|
cidr: "127.0.0.0/8"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Ingress
|
||||||
|
|
||||||
|
By default, the `ingressClassName` is empty to choose your default ingress controller, you may want to customize it by
|
||||||
|
setting:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
ingress:
|
||||||
|
ingressClassName: "cilium"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Container runtime
|
||||||
|
|
||||||
|
Some apps require specific configuration for container runtimes. You can set your container runtime like `cri-o`,
|
||||||
|
`containerd` or `docker` by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
container:
|
||||||
|
engine: "containerd"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Volumes
|
||||||
|
|
||||||
|
When your cluster has a `ReadWriteMany` volume provisioner, you can benefit from distributed or scaling of apps. By
|
||||||
|
default, only `ReadWriteOnce` is enabled. To enable `ReadWriteMany` you can set:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
cluster:
|
||||||
|
persistence:
|
||||||
|
readWriteMany: true
|
||||||
|
```
|
||||||
|
|
||||||
|
The **StorageClass** can be set by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
persistence:
|
||||||
|
storageClassNames:
|
||||||
|
RWX: "my-read-write-many-class"
|
||||||
|
RWO: "my-read-write-once-class"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Connectivity
|
||||||
|
|
||||||
|
### Mail/SMTP configuration
|
||||||
|
|
||||||
|
To use the full potential of the openDesk, you need to set up an SMTP Smarthost/Relay which allows to send emails from
|
||||||
|
the whole subdomain.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
smtp:
|
||||||
|
host: "mail.open.desk"
|
||||||
|
username: "openDesk"
|
||||||
|
password: "secret"
|
||||||
|
```
|
||||||
|
|
||||||
|
### TURN configuration
|
||||||
|
|
||||||
|
Some components (Jitsi, Element) use for direct communication a TURN server. You can configure your own TURN server with
|
||||||
|
these options:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
turn:
|
||||||
|
transport: "udp" # or tcp
|
||||||
|
credentials: "secret"
|
||||||
|
server:
|
||||||
|
host: "turn.open.desk"
|
||||||
|
port: "3478"
|
||||||
|
tls:
|
||||||
|
host: "turns.open.desk"
|
||||||
|
port: "5349"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Certificate issuer
|
||||||
|
|
||||||
|
As mentioned in [requirements](requirements.md#certificate-management) you can provide your own valid certificate. A TLS
|
||||||
|
secret with name `opendesk-certificates-tls` needs to be present in application namespace. For deployment, you can
|
||||||
|
disable `Certificate` resource creation by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
certificates:
|
||||||
|
enabled: false
|
||||||
|
```
|
||||||
|
|
||||||
|
If you want to leverage the `cert-manager.io` to handle certificates, like `Let's encrypt`, you need to provide the
|
||||||
|
configured cluster issuer:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
certificate:
|
||||||
|
issuerRef:
|
||||||
|
name: "letsencrypt-prod"
|
||||||
|
```
|
||||||
|
|
||||||
|
Additionally, it is possible to request wildcard certificates by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
certificate:
|
||||||
|
wildcard: true
|
||||||
|
```
|
||||||
|
|
||||||
|
## Password seed
|
||||||
|
|
||||||
|
All secrets are generated from a single master password via Master Password (algorithm).
|
||||||
|
To prevent others from using your openDesk instance, we highly recommend setting an individual master password via:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
export MASTER_PASSWORD="openDesk"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Install
|
||||||
|
|
||||||
|
After setting your environment specific values in `dev` environment, you can start deployment by:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile apply -e dev -n <NAMESPACE> [-l <label>] [--suppress-diff]
|
||||||
|
```
|
||||||
|
|
||||||
|
**Arguments:**
|
||||||
|
|
||||||
|
- `-e <env>`: Environment name out of `default`, `dev`, `test`, `prod`
|
||||||
|
- `-n <namespace>`: Kubernetes namespace
|
||||||
|
- `-l <label>`: Label selector
|
||||||
|
- `--suppress-diff`: Disable diff printing
|
||||||
|
|
||||||
|
## Install single app
|
||||||
|
|
||||||
|
You can also install or upgrade only a single app like Collabora, either by label selector:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile apply -e dev -n <NAMESPACE> -l component=collabora
|
||||||
|
```
|
||||||
|
|
||||||
|
or by switching into the apps' directory (faster):
|
||||||
|
|
||||||
|
```shell
|
||||||
|
cd helmfile/apps/collabora
|
||||||
|
helmfile apply -e dev -n <NAMESPACE>
|
||||||
|
```
|
||||||
|
|
||||||
|
## Install single release/chart
|
||||||
|
|
||||||
|
Instead of iteration through all services, you can also deploy a single release like mariadb by:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile apply -e dev -n <NAMESPACE> -l name=mariadb
|
||||||
|
```
|
||||||
|
|
||||||
|
# Access deployment
|
||||||
|
|
||||||
|
When all apps are successfully deployed and pod status' went to `Running` or `Succeeded`, you can navigate to
|
||||||
|
|
||||||
|
```text
|
||||||
|
https://portal.domain.tld
|
||||||
|
```
|
||||||
|
|
||||||
|
If you change the subdomain of `univentionManagementStack`, you need to replace `portal`
|
||||||
|
by your specified subdomain.
|
||||||
|
|
||||||
|
**Credentials:**
|
||||||
|
|
||||||
|
```shell
|
||||||
|
# Replace with your namespace
|
||||||
|
NAMESPACE=your-namespace
|
||||||
|
|
||||||
|
# Get ConfigMap with credentials
|
||||||
|
kubectl -n ${NAMESPACE} get cm ums-stack-data-swp-data -o jsonpath='{.data.dev-test-users\.yaml}'
|
||||||
|
```
|
||||||
|
|
||||||
|
Renders you a two part ConfigMap where the `username` and `password` attributes in the `properties`
|
||||||
|
section provide you with the desired information to login with the two default user roles:
|
||||||
|
|
||||||
|
| Username | Password | Description |
|
||||||
|
|-----------------|--------------------------------------------|------------------|
|
||||||
|
| `default.user` | `40615..............................e9e2f` | Application user |
|
||||||
|
| `default.admin` | `bdbbb..............................04db6` | Administrator |
|
||||||
|
|
||||||
|
# Uninstall
|
||||||
|
|
||||||
|
You can uninstall the deployment by:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
helmfile destroy -n <NAMESPACE>
|
||||||
|
```
|
||||||
|
|
||||||
|
> **Note**
|
||||||
|
> Not all Jobs, PersistentVolumeClaims or Certificates are deleted; you have to delete them manually
|
||||||
|
|
||||||
|
**'Sledgehammer destroy'** - for fast development turn-around times (at your own risk):
|
||||||
|
|
||||||
|
```shell
|
||||||
|
NAMESPACE=your-namespace
|
||||||
|
|
||||||
|
# Uninstall all Helm charts
|
||||||
|
for OPENDESK_RELEASE in $(helm ls -n ${NAMESPACE} -aq); do
|
||||||
|
helm uninstall -n ${NAMESPACE} ${OPENDESK_RELEASE};
|
||||||
|
done
|
||||||
|
|
||||||
|
# Delete leftover resources
|
||||||
|
kubectl delete pvc --all --namespace ${NAMESPACE};
|
||||||
|
kubectl delete jobs --all --namespace ${NAMESPACE};
|
||||||
|
```
|
||||||
|
|
||||||
|
> **Warning**
|
||||||
|
> Without specifying or empty `--namespace` flag, cluster-wide components get deleted!
|
||||||
72
docs/monitoring.md
Normal file
72
docs/monitoring.md
Normal file
@@ -0,0 +1,72 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Monitoring</h1>
|
||||||
|
|
||||||
|
This document will cover how you can enable observability with Prometheus based monitoring and Grafana dashboards, as
|
||||||
|
well as the overall status of monitoring integration.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Technology](#technology)
|
||||||
|
* [Defaults](#defaults)
|
||||||
|
* [Metrics](#metrics)
|
||||||
|
* [Alerts](#alerts)
|
||||||
|
* [Dashboards for Grafana](#dashboards-for-grafana)
|
||||||
|
* [Components](#components)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# Technology
|
||||||
|
|
||||||
|
We provide integration into the Prometheus based monitoring.
|
||||||
|
Together with
|
||||||
|
[kube-prometheus-stack](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack) you
|
||||||
|
easily leverage the full potential of open-source cloud-native observability stack.
|
||||||
|
|
||||||
|
Before enabling the following options, you need to install the respective CRDs from the kube-prometheus-stack
|
||||||
|
repository or prometheus operator.
|
||||||
|
|
||||||
|
# Defaults
|
||||||
|
|
||||||
|
All configurable options and their defaults can be found in
|
||||||
|
[`monitoring.yaml`](../helmfile/environments/default/monitoring.yaml).
|
||||||
|
|
||||||
|
# Metrics
|
||||||
|
|
||||||
|
To deploy podMonitor and serviceMonitor custom resources, enable it by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
prometheus:
|
||||||
|
serviceMonitors:
|
||||||
|
enabled: true
|
||||||
|
podMonitors:
|
||||||
|
enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
# Alerts
|
||||||
|
|
||||||
|
Some helm-charts provide a default set of prometheusRules for alerting, enable it by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
prometheus:
|
||||||
|
prometheusRules:
|
||||||
|
enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
# Dashboards for Grafana
|
||||||
|
|
||||||
|
To deploy optional ConfigMaps with Grafana dashboards, enable it by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
grafana:
|
||||||
|
dashboards:
|
||||||
|
enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
# Components
|
||||||
|
|
||||||
|
| Component | Metrics (pod- or serviceMonitor) | Alerts (prometheusRule) | Dashboard (Grafana) |
|
||||||
|
|:----------|-----------------------------------|-------------------------|---------------------|
|
||||||
|
| Collabora | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Nextcloud | :white_check_mark: | :x: | :x: |
|
||||||
104
docs/requirements.md
Normal file
104
docs/requirements.md
Normal file
@@ -0,0 +1,104 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
<h1>Requirements</h1>
|
||||||
|
|
||||||
|
This section covers the internal system requirements as well as external service requirements for productive use.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [tl;dr](#tldr)
|
||||||
|
* [Hardware](#hardware)
|
||||||
|
* [Kubernetes](#kubernetes)
|
||||||
|
* [Ingress controller](#ingress-controller)
|
||||||
|
* [Volume provisioner](#volume-provisioner)
|
||||||
|
* [Certificate management](#certificate-management)
|
||||||
|
* [External services](#external-services)
|
||||||
|
* [Deployment](#deployment)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# tl;dr
|
||||||
|
openDesk is a Kubernetes only solution and requires an existing Kubernetes (K8s) cluster.
|
||||||
|
|
||||||
|
- K8s cluster >= 1.24, [CNCF Certified Kubernetes Distro](https://www.cncf.io/certification/software-conformance/)
|
||||||
|
- Domain and DNS Service
|
||||||
|
- Ingress controller (supported are nginx-ingress, HAProxy)
|
||||||
|
- [Helm](https://helm.sh/) >= v3.9.0
|
||||||
|
- [Helmfile](https://helmfile.readthedocs.io/en/latest/) >= **v0.157.0**
|
||||||
|
- [HelmDiff](https://github.com/databus23/helm-diff) >= 3.6.0
|
||||||
|
- Volume provisioner supporting RWO (read-write-once)
|
||||||
|
- Certificate handling with [cert-manager](https://cert-manager.io/)
|
||||||
|
- [Istio](https://istio.io/) is currently required to deploy and operate OX AppSuite8
|
||||||
|
|
||||||
|
# Hardware
|
||||||
|
|
||||||
|
The following minimal requirements are thought for initial evaluation deployment:
|
||||||
|
|
||||||
|
| Spec | Value |
|
||||||
|
|------|------------------------------------------------------|
|
||||||
|
| CPU | 8 Cores of x64 or x86 CPU (ARM is not supported yet) |
|
||||||
|
| RAM | 16 GB, recommended 32 GB |
|
||||||
|
| Disk | HDD or SSD, >10 GB |
|
||||||
|
|
||||||
|
# Kubernetes
|
||||||
|
|
||||||
|
Any self-hosted or managed K8s cluster >= 1.24 listed in
|
||||||
|
[CNCF Certified Kubernetes Distros](https://www.cncf.io/certification/software-conformance/) should be supported.
|
||||||
|
|
||||||
|
The deployment is tested against [kubespray](https://github.com/kubernetes-sigs/kubespray) based clusters.
|
||||||
|
|
||||||
|
> **Note:** The deployment is not tested against OpenShift.
|
||||||
|
|
||||||
|
# Ingress controller
|
||||||
|
|
||||||
|
The deployment is intended to use only over HTTPS via a configured FQDN, therefor it is required to have a proper
|
||||||
|
configured ingress controller deployed.
|
||||||
|
|
||||||
|
**Maintained controllers:**
|
||||||
|
- [NGINX Ingress Controller](https://github.com/nginxinc/kubernetes-ingress)
|
||||||
|
- [HAProxy Kubernetes Ingress Controller](https://github.com/haproxytech/kubernetes-ingress)
|
||||||
|
|
||||||
|
**Community Supported:**
|
||||||
|
- [Ingress NGINX Controller](https://github.com/kubernetes/ingress-nginx)
|
||||||
|
|
||||||
|
When you want to use Open-Xchange Appsuite 8, you need to deploy and configure additionally [Istio](https://istio.io/)
|
||||||
|
|
||||||
|
# Volume provisioner
|
||||||
|
|
||||||
|
Initial evaluation deployment requires a `ReadWriteOnce` volume provisioner. For local deployment a local- or hostPath-
|
||||||
|
provisioner is sufficient.
|
||||||
|
|
||||||
|
> **Note:** Some components requiring a `ReadWriteMany` volume provisioner for distributed mode or scaling.
|
||||||
|
|
||||||
|
# Certificate management
|
||||||
|
|
||||||
|
This deployment leverages [cert-manager](https://cert-manager.io/) to generate valid certificates. This is **optional**,
|
||||||
|
but a secret containing a valid TLS certificate is required.
|
||||||
|
|
||||||
|
Only `Certificate` resources will be deployed, the `cert-manager` including its CRD must be installed prior to this or
|
||||||
|
openDesk certificate management disabled.
|
||||||
|
|
||||||
|
# External services
|
||||||
|
|
||||||
|
Evaluation the openDesk deployment does not require any external service to start, but features may be limited.
|
||||||
|
|
||||||
|
| Group | Type | Version | Tested against |
|
||||||
|
|----------|---------------------|---------|-----------------------|
|
||||||
|
| Cache | Memached | `1.6.x` | Memached |
|
||||||
|
| | Redis | `7.x.x` | Redis |
|
||||||
|
| Database | MariaDB | `10.x` | MariaDB |
|
||||||
|
| | PostgreSQL | `15.x` | PostgreSQL |
|
||||||
|
| Mail | Mail Transfer Agent | | Postfix |
|
||||||
|
| | PKI/CI (SMIME) | | |
|
||||||
|
| Security | AntiVirus/ICAP | | ClamAV |
|
||||||
|
| Storage | K8s ReadWriteOnce | | Ceph / Cloud specific |
|
||||||
|
| | K8s ReadWriteMany | | Ceph / NFS |
|
||||||
|
| | Object Storage | | MinIO |
|
||||||
|
| Voice | TURN | | Coturn |
|
||||||
|
|
||||||
|
# Deployment
|
||||||
|
|
||||||
|
The deployment of each individual component is [Helm](https://helm.sh/) based. The 35+ Helm charts are configured and
|
||||||
|
templated via [Helmfile](https://helmfile.readthedocs.io/en/latest/) to provide a streamlined deployment experience.
|
||||||
|
|
||||||
|
Helmfile requires [HelmDiff](https://github.com/databus23/helm-diff) to compare desired against deployed state.
|
||||||
61
docs/scaling.md
Normal file
61
docs/scaling.md
Normal file
@@ -0,0 +1,61 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Scaling</h1>
|
||||||
|
|
||||||
|
This document should cover the abilities to scale apps.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Replicas](#replicas)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# Replicas
|
||||||
|
|
||||||
|
The Replicas can be increased of almost any component, but is only effective for high-availability or load-balancing for
|
||||||
|
apps with a check-mark in `Scaling (effective)` column.
|
||||||
|
|
||||||
|
Verified positive effects are marke with a check-mark in `Scaling (verified)` column, apps which are not yet tested are
|
||||||
|
marked with a gear.
|
||||||
|
|
||||||
|
|
||||||
|
| Component | Name | Scaling (effective) | Scaling (verified) |
|
||||||
|
|-----------------------------|------------------------------------------|:-------------------:|:------------------:|
|
||||||
|
| ClamAV | `replicas.clamav` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.clamd` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.freshclam` | :x: | :x: |
|
||||||
|
| | `replicas.icap` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.milter` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Collabora | `replicas.collabora` | :white_check_mark: | :gear: |
|
||||||
|
| CryptPad | `replicas.cryptpad` | :white_check_mark: | :gear: |
|
||||||
|
| Dovecot | `replicas.dovecot` | :x: | :gear: |
|
||||||
|
| Element | `replicas.element` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.matrixNeoBoardWidget` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.matrixNeoChoiceWidget` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.matrixNeoDateFixBot` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.matrixNeoDateFixWidget` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.matrixUserVerificationService` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.synapse` | :x: | :gear: |
|
||||||
|
| | `replicas.synapseWeb` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.wellKnown` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Intercom Service | `replicas.intercomService` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Jitsi | `replicas.jibri` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.jicofo` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.jitsi ` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.jitsiKeycloakAdapter` | :white_check_mark: | :gear: |
|
||||||
|
| | `replicas.jvb ` | :x: | :x: |
|
||||||
|
| Keycloak | `replicas.keycloak` | :white_check_mark: | :gear: |
|
||||||
|
| Memcached | `replicas.memcached` | :gear: | :gear: |
|
||||||
|
| Minio | `replicas.minioDistributed` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Nextcloud | `replicas.nextcloudApache2` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.nextcloudExporter` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.nextcloudPHP` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| OpenProject | `replicas.openproject` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| Postfix | `replicas.postfix` | :x: | :gear: |
|
||||||
|
| Redis | `replicas.redis` | :gear: | :gear: |
|
||||||
|
| Univention Management Stack | | :gear: | :gear: |
|
||||||
|
| | `replicas.umsPortalFrontend` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.umsPortalServer` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| | `replicas.umsUdmRestApi` | :white_check_mark: | :white_check_mark: |
|
||||||
|
| XWiki | `replicas.xwiki` | :x: | :gear: |
|
||||||
227
docs/security-context.md
Normal file
227
docs/security-context.md
Normal file
@@ -0,0 +1,227 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
<h1>Kubernetes Security Context</h1>
|
||||||
|
|
||||||
|
* [Container Security Context](#container-security-context)
|
||||||
|
* [allowPrivilegeEscalation](#allowprivilegeescalation)
|
||||||
|
* [capabilities](#capabilities)
|
||||||
|
* [privileged](#privileged)
|
||||||
|
* [runAsUser](#runasuser)
|
||||||
|
* [runAsGroup](#runasgroup)
|
||||||
|
* [seccompProfile](#seccompprofile)
|
||||||
|
* [readOnlyRootFilesystem](#readonlyrootfilesystem)
|
||||||
|
* [runAsNonRoot](#runasnonroot)
|
||||||
|
* [Status quo](#status-quo)
|
||||||
|
|
||||||
|
# Container Security Context
|
||||||
|
|
||||||
|
|
||||||
|
The containerSecurityContext is the most important security-related section because it has the highest precedence and restricts the container to its minimal privileges.
|
||||||
|
|
||||||
|
## allowPrivilegeEscalation
|
||||||
|
|
||||||
|
|
||||||
|
Privilege escalation (such as via set-user-ID or set-group-ID file mode) should not be allowed (Linux only) at any time.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
```
|
||||||
|
|
||||||
|
## capabilities
|
||||||
|
|
||||||
|
|
||||||
|
Containers must drop ALL capabilities, and are only permitted to add back the `NET_BIND_SERVICE` capability (Linux only).
|
||||||
|
|
||||||
|
|
||||||
|
**Optimal:**
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
**Allowed:**
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
add:
|
||||||
|
- "NET_BIND_SERVICE"
|
||||||
|
```
|
||||||
|
|
||||||
|
## privileged
|
||||||
|
|
||||||
|
|
||||||
|
Privileged Pods disable most security mechanisms and must be disallowed.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
privileged: false
|
||||||
|
```
|
||||||
|
|
||||||
|
## runAsUser
|
||||||
|
|
||||||
|
|
||||||
|
Containers should set a user id >= 1000 and never use 0 (root) as user.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
runAsUser: 1000
|
||||||
|
```
|
||||||
|
|
||||||
|
## runAsGroup
|
||||||
|
|
||||||
|
|
||||||
|
Containers should set a group id >= 1000 and never use 0 (root) as user.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
runAsGroup: 1000
|
||||||
|
```
|
||||||
|
|
||||||
|
## seccompProfile
|
||||||
|
|
||||||
|
|
||||||
|
Seccomp profile must be explicitly set to one of the allowed values. An unconfined profile and the complete absence of the profile are prohibited.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
or
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
seccompProfile:
|
||||||
|
type: "Localhost"
|
||||||
|
```
|
||||||
|
|
||||||
|
## readOnlyRootFilesystem
|
||||||
|
|
||||||
|
|
||||||
|
Containers should have an immutable file systems, so that attackers could not modify application code or download malicious code.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
```
|
||||||
|
|
||||||
|
## runAsNonRoot
|
||||||
|
|
||||||
|
|
||||||
|
Containers must be required to run as non-root users.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
containerSecurityContext:
|
||||||
|
runAsNonRoot: true
|
||||||
|
```
|
||||||
|
|
||||||
|
# Status quo
|
||||||
|
|
||||||
|
|
||||||
|
openDesk aims to achieve that all security relevant settings are explicitly templated and comply with security recommendations.
|
||||||
|
|
||||||
|
|
||||||
|
The rendered manifests are also validated against Kyverno [policies](/.kyverno/policies) in CI to ensure that the provided values inside openDesk are also properly templated by the given Helm charts.
|
||||||
|
|
||||||
|
|
||||||
|
This list gives you an overview of templated security settings and if they comply with security standards:
|
||||||
|
|
||||||
|
|
||||||
|
- **yes**: Value is set to `true`
|
||||||
|
- **no**: Value is set to `false`
|
||||||
|
- **n/a**: No explicitly templated in openDesk and default is used.
|
||||||
|
|
||||||
|
| process | status | allowPrivilegeEscalation | privileged | readOnlyRootFilesystem | runAsNonRoot | runAsUser | runAsGroup | seccompProfile | capabilities |
|
||||||
|
| ------- | ------ | ------------------------ | ---------- | ---------------------- | ------------ | --------- | ---------- | -------------- | ------------ |
|
||||||
|
| **collabora**/collabora-online | :x: | yes | no | no | yes | 100 | 101 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT","MKNOD"] |
|
||||||
|
| **cryptpad**/cryptpad | :x: | no | no | no | yes | 4001 | 4001 | yes | yes |
|
||||||
|
| **element**/matrix-neoboard-widget | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **element**/matrix-neochoice-widget | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **element**/matrix-neodatefix-bot | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **element**/matrix-neodatefix-bot-bootstrap | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **element**/matrix-neodatefix-widget | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **element**/opendesk-element | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **element**/opendesk-matrix-user-verification-service | :x: | no | no | no | no | 0 | 0 | yes | yes |
|
||||||
|
| **element**/opendesk-matrix-user-verification-service-bootstrap | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **element**/opendesk-synapse | :white_check_mark: | no | no | yes | yes | 10991 | 10991 | yes | yes |
|
||||||
|
| **element**/opendesk-synapse-web | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **element**/opendesk-well-known | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||||
|
| **intercom-service**/intercom-service | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **jitsi**/jitsi | :white_check_mark: | no | no | yes | yes | 1993 | 1993 | yes | yes |
|
||||||
|
| **jitsi**/jitsi/jitsi/jibri | :x: | n/a | n/a | n/a | n/a | n/a | n/a | n/a | no ["SYS_ADMIN"] |
|
||||||
|
| **jitsi**/jitsi/jitsi/jicofo | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||||
|
| **jitsi**/jitsi/jitsi/jvb | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||||
|
| **jitsi**/jitsi/jitsi/prosody | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||||
|
| **jitsi**/jitsi/jitsi/web | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||||
|
| **jitsi**/jitsi/patchJVB | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||||
|
| **nextcloud**/opendesk-nextcloud-management | :x: | no | no | no | yes | 65532 | 65532 | yes | yes |
|
||||||
|
| **nextcloud**/opendesk-nextcloud/apache2 | :white_check_mark: | no | no | yes | yes | 65532 | 65532 | yes | yes |
|
||||||
|
| **nextcloud**/opendesk-nextcloud/exporter | :white_check_mark: | no | no | yes | yes | 65532 | 65532 | yes | yes |
|
||||||
|
| **nextcloud**/opendesk-nextcloud/php | :white_check_mark: | no | no | yes | yes | 65532 | 65532 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/appsuite/core-documentconverter | :x: | no | no | no | yes | 987 | 1000 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/appsuite/core-guidedtours | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/appsuite/core-imageconverter | :x: | no | no | no | yes | 987 | 1000 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/appsuite/core-mw/gotenberg | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/appsuite/core-ui | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/appsuite/core-ui-middleware | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/appsuite/core-user-guide | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/appsuite/guard-ui | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/nextcloud-integration-ui | :x: | no | no | no | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **open-xchange**/open-xchange/public-sector-ui | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **openproject**/openproject | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **openproject-bootstrap**/opendesk-openproject-bootstrap | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **provisioning**/ox-connector | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **services**/clamav | :x: | no | no | yes | no | 0 | 0 | yes | no |
|
||||||
|
| **services**/clamav-simple | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||||
|
| **services**/clamav/clamd | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||||
|
| **services**/clamav/freshclam | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||||
|
| **services**/clamav/icap | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||||
|
| **services**/clamav/milter | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||||
|
| **services**/mariadb | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||||
|
| **services**/memcached | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||||
|
| **services**/minio | :x: | no | no | no | yes | 1000 | 0 | yes | yes |
|
||||||
|
| **services**/postfix | :x: | yes | yes | no | no | 0 | 0 | yes | no |
|
||||||
|
| **services**/postgresql | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||||
|
| **services**/redis/master | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||||
|
| **univention-management-stack**/opendesk-keycloak-bootstrap | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-guardian-authorization-api | :x: | no | no | no | yes | 1000 | 1000 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-guardian-management-api | :x: | no | no | no | yes | 1000 | 1000 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-guardian-management-ui | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-keycloak | :x: | no | no | no | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-keycloak-bootstrap | :x: | no | no | no | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-keycloak-extensions/handler | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-keycloak-extensions/proxy | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-ldap-notifier | :x: | no | no | no | no | 0 | 0 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-ldap-server | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-notifications-api | :x: | no | no | no | no | 1000 | 1000 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-open-policy-agent | :x: | no | no | no | yes | 1000 | 1000 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-portal-frontend | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-portal-listener | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-portal-server | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-provisioning/dispatcher | :x: | no | no | no | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-provisioning/events-and-consumer-api | :x: | no | no | no | yes | 1000 | 1000 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-provisioning/udm-listener | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-selfservice-listener | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-stack-data-swp | :x: | no | no | no | no | 0 | 0 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-stack-data-ums | :x: | no | no | no | no | 0 | 0 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-stack-gateway | :x: | no | no | no | yes | 1001 | 1001 | yes | yes |
|
||||||
|
| **univention-management-stack**/ums-store-dav | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-udm-rest-api | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-umc-gateway | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **univention-management-stack**/ums-umc-server | :x: | no | no | no | no | 0 | 0 | yes | no ["CHOWN","DAC_OVERRIDE","FOWNER","FSETID","KILL","SETGID","SETUID","SETPCAP","NET_BIND_SERVICE","NET_RAW","SYS_CHROOT"] |
|
||||||
|
| **xwiki**/xwiki | :x: | no | no | no | yes | 100 | 101 | yes | yes |
|
||||||
|
|
||||||
|
|
||||||
|
This file is auto-generated by [openDesk CI CLI](https://gitlab.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli)
|
||||||
51
docs/security.md
Normal file
51
docs/security.md
Normal file
@@ -0,0 +1,51 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Security</h1>
|
||||||
|
|
||||||
|
This document should cover the current status of security measurements.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Helm Chart Trust Chain](#helm-chart-trust-chain)
|
||||||
|
* [Kubernetes Security Enforcements](#kubernetes-security-enforcements)
|
||||||
|
* [NetworkPolicies](#networkpolicies)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# Helm Chart Trust Chain
|
||||||
|
|
||||||
|
Helm charts are signed and validated against GPG keys which can be found in `helmfile/files/gpg-pubkeys`.
|
||||||
|
|
||||||
|
For more details on Chart validation please visit: https://helm.sh/docs/topics/provenance/
|
||||||
|
|
||||||
|
All charts except the ones mentioned below are verifiable:
|
||||||
|
|
||||||
|
| Repository | Verifiable |
|
||||||
|
|-------------------|:----------:|
|
||||||
|
| open-xchange-repo | no |
|
||||||
|
|
||||||
|
# Kubernetes Security Enforcements
|
||||||
|
|
||||||
|
This list gives you an overview of default security settings and if they comply with security standards:
|
||||||
|
|
||||||
|
⟶ Visit our generated detailed [Security Context](./security-context.md) overview.
|
||||||
|
|
||||||
|
# NetworkPolicies
|
||||||
|
|
||||||
|
Kubernetes NetworkPolicies are an important measure to secure your kubernetes apps and clusters.
|
||||||
|
When applied, they restrict the traffic to your services.
|
||||||
|
This protects other deployments in your cluster or other services in your deployment to get compromised when one
|
||||||
|
component is compromised.
|
||||||
|
|
||||||
|
We ship a default set of Otterize ClientIntents via
|
||||||
|
[Otterize intents operator](https://github.com/otterize/intents-operator) which translates intent-based access control
|
||||||
|
(IBAC) into kubernetes native NetworkPolicies.
|
||||||
|
|
||||||
|
This requires the Otterize intents operator to be installed.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
security:
|
||||||
|
otterizeIntents:
|
||||||
|
enabled: true
|
||||||
|
```
|
||||||
57
docs/theming.md
Normal file
57
docs/theming.md
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Theming</h1>
|
||||||
|
|
||||||
|
This document will cover the theming and customization of your openDesk deployment.
|
||||||
|
|
||||||
|
<!-- TOC -->
|
||||||
|
* [Strings and texts](#strings-and-texts)
|
||||||
|
* [Colors](#colors)
|
||||||
|
* [Images and Logos](#images-and-logos)
|
||||||
|
* [Known limits](#known-limits)
|
||||||
|
<!-- TOC -->
|
||||||
|
|
||||||
|
# Strings and texts
|
||||||
|
|
||||||
|
The deployment name can be changed by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
theme:
|
||||||
|
texts:
|
||||||
|
productName: "openDesk Cloud"
|
||||||
|
```
|
||||||
|
|
||||||
|
# Colors
|
||||||
|
|
||||||
|
The primary color and their derivates with lesser opacity be customized by:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
theme:
|
||||||
|
colors:
|
||||||
|
primary: "#5e27dd"
|
||||||
|
primary65: "#9673e9"
|
||||||
|
primary35: "#c7b3f3"
|
||||||
|
primary15: "#e7dffa"
|
||||||
|
```
|
||||||
|
|
||||||
|
## Images and Logos
|
||||||
|
|
||||||
|
You can customize the logo and favicon by providing SVG or icon as inline value:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
theme:
|
||||||
|
imagery:
|
||||||
|
logoHeaderSvg: '<?xml version="1.0" encoding="UTF-8"?>...</svg>'
|
||||||
|
logoHeaderSvgWhite: '<?xml version="1.0" encoding="UTF-8"?>...</svg>'
|
||||||
|
logoPortalBackgroundSvg: '<?xml version="1.0" encoding="UTF-8"?>...</svg>'
|
||||||
|
faviconIco: "..."
|
||||||
|
```
|
||||||
|
|
||||||
|
# Known limits
|
||||||
|
|
||||||
|
Not all applications support theming. Known exceptions are:
|
||||||
|
- OpenProject
|
||||||
|
- Jitsi
|
||||||
402
docs/workflow.md
Normal file
402
docs/workflow.md
Normal file
@@ -0,0 +1,402 @@
|
|||||||
|
<!--
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
-->
|
||||||
|
|
||||||
|
<h1>Technical development and release workflow</h1>
|
||||||
|
|
||||||
|
* [Scope](#scope)
|
||||||
|
* [Roles and responsibilities](#roles-and-responsibilities)
|
||||||
|
* [Deployment automation](#deployment-automation)
|
||||||
|
* [openDesk technical component classes](#opendesk-technical-component-classes)
|
||||||
|
* [Functional vs. service components](#functional-vs-service-components)
|
||||||
|
* [Origins](#origins)
|
||||||
|
* [Reference CI for creating Images and Helm charts (gitlab-config)](#reference-ci-for-creating-images-and-helm-charts-gitlab-config)
|
||||||
|
* [Licensing](#licensing)
|
||||||
|
* [Development workflow](#development-workflow)
|
||||||
|
* [Disclaimer](#disclaimer)
|
||||||
|
* [Workflow](#workflow)
|
||||||
|
* [Branching concept](#branching-concept)
|
||||||
|
* [Standard Quality Gate (SQG)](#standard-quality-gate-sqg)
|
||||||
|
* [Branch workflows](#branch-workflows)
|
||||||
|
* [`main`](#main)
|
||||||
|
* [`develop`](#develop)
|
||||||
|
* [`docu`](#docu)
|
||||||
|
* [`mntn`](#mntn)
|
||||||
|
* [`feat`](#feat)
|
||||||
|
* [Branch names](#branch-names)
|
||||||
|
* [Commit messages / Conventional Commits](#commit-messages--conventional-commits)
|
||||||
|
* [Verified commits](#verified-commits)
|
||||||
|
* [Footnotes](#footnotes)
|
||||||
|
|
||||||
|
# Scope
|
||||||
|
|
||||||
|
This document covers the development of a technical release, thereby addressing
|
||||||
|
- the development and branching concept for the openDesk deployment automation,
|
||||||
|
- the related quality gates and
|
||||||
|
- how technical releases are being created.
|
||||||
|
|
||||||
|
It does not cover additional artifacts that might be related to a functional release.
|
||||||
|
|
||||||
|
# Roles and responsibilities
|
||||||
|
|
||||||
|
The following section should provide a high-level view of the involved parties in the openDesk context and their responsibilities:
|
||||||
|
|
||||||
|
- **Open source product suppliers**
|
||||||
|
- Focus areas
|
||||||
|
- Development of upstream products
|
||||||
|
- Development of integrational functionality relevant to openDesk and others
|
||||||
|
- Providing source code and the artifacts required to install openDesk to Open CoDE
|
||||||
|
- Hand over to _openDesk platform development_
|
||||||
|
- Helm charts
|
||||||
|
- Container images
|
||||||
|
- Documentation
|
||||||
|
- **openDesk platform development**
|
||||||
|
- Focus areas
|
||||||
|
- Integration of the supplier's artifacts addressing basic operational needs
|
||||||
|
- Implementation of services required (e.g. persistence layer) to develop and test openDesk
|
||||||
|
- Implementation of the required quality gates (QG)
|
||||||
|
- Ensuring the quality gates are passed
|
||||||
|
- Hand over to _Operator_
|
||||||
|
- Deployment automation
|
||||||
|
- **Operator**
|
||||||
|
- Focus areas
|
||||||
|
- Providing production-grade required services (e.g. persistence layer) to operate openDesk
|
||||||
|
- Rollout, operate, and support openDesk
|
||||||
|
- Further develop the deployment automation to meet extended operational requirements, ideally providing these developments upstream to openDesk platform development to adopt them into the standard
|
||||||
|
- The operator can either use a self-operated Kubernetes cluster to deploy openDesk or make use of managed Kubernetes offerings of a **Cloud Provider**.
|
||||||
|
|
||||||
|
# Deployment automation
|
||||||
|
|
||||||
|
The openDesk deployment automation is the core outcome of the platform development process.
|
||||||
|
|
||||||
|
The openDesk platform development team created and maintains the deployment automation to allow interested parties to deploy openDesk into their cloud infrastructure with a low entry barrier. The core technology for the automation are [Helm charts](https://helm.sh/) which are orchestrated using [Helmfile](https://github.com/helmfile/helmfile). Of course this deployment is also used in the everyday work by the suppliers and the platform team.
|
||||||
|
|
||||||
|
Please find the deployment automation including the relevant documentation here: https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace
|
||||||
|
|
||||||
|
The automation supports Gitlab CI/CD execution as well as local execution triggering the Helmfile deployment for the whole platform or single applications.
|
||||||
|
|
||||||
|
## openDesk technical component classes
|
||||||
|
|
||||||
|
The below rendering in class diagram notation shows the three component classes openDesk consists of. In each of these:
|
||||||
|
- the first section below the name of the class shows the required **characteristics** of each component of the given class, and
|
||||||
|
- the second section shows the **methods** like linting that have to be applied to artifacts of that class.
|
||||||
|
|
||||||
|
**Note:** The methods prefixed with '-' are not yet available in `gitlab-config` you will learn about them later.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
classDiagram
|
||||||
|
Images <|-- Helm_charts
|
||||||
|
Images <|-- Helmfile_based_deployment_automation
|
||||||
|
Helm_charts <|-- Helmfile_based_deployment_automation
|
||||||
|
class Images{
|
||||||
|
SBOM
|
||||||
|
SBOM signature
|
||||||
|
Image signature
|
||||||
|
reuseLint()
|
||||||
|
CVE analysis()
|
||||||
|
hadolint()
|
||||||
|
Malware scan()
|
||||||
|
}
|
||||||
|
class Helm_charts{
|
||||||
|
HelmDocs
|
||||||
|
Helm chart signature
|
||||||
|
reuseLint()
|
||||||
|
KubeLinter()
|
||||||
|
YamlLint()
|
||||||
|
-Kubescape()
|
||||||
|
}
|
||||||
|
class Helmfile_based_deployment_automation{
|
||||||
|
reuseLint()
|
||||||
|
YamlLint()
|
||||||
|
-markdownlint()
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## Functional vs. service components
|
||||||
|
|
||||||
|
The focus of openDesk is to provide an integrated functional productivity platform based on the functional components (products) of the involved suppliers. These functional components usually rely on certain service components, e.g. database services for persistence. When running openDesk in production the operator is responsible for providing these services production grade. For evaluation and development purposes the openDesk deployment automation includes these services.
|
||||||
|
|
||||||
|
Find the list of functional and service components in the [deployment automation's components.md](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/blob/main/docs/components.md).
|
||||||
|
|
||||||
|
## Origins
|
||||||
|
|
||||||
|
The openDesk platform consolidates the technical components from various origins:
|
||||||
|
|
||||||
|
1) Supplier - for functional components: Provide their upstream product including sometimes openDesk-specific builds or extensions and also the deployment of the product (Helm charts).
|
||||||
|
2) 3rd party upstream - for service components: The platform development tries to use as many as possible community upstream components for the services they have to provide within openDesk.
|
||||||
|
3) Platform development - filling the gap: Some suppliers might not provide Helm charts or images for their product that fit the needs of openDesk and some 3rd party upstream components are not built to fit into openDesk. In these cases, the platform development team creates their own Helm charts and images.
|
||||||
|
|
||||||
|
## Reference CI for creating Images and Helm charts (gitlab-config)
|
||||||
|
|
||||||
|
As mentioned in the chapter "Origins" above, the openDesk platform development also creates images and Helm charts when needed.
|
||||||
|
|
||||||
|
For that purpose openDesk provides a [GitLab CI-based reference implementation](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/tooling/gitlab-config) called `gitlab-config` to achieve the required characteristics and apply the necessary methods including releasing the artifacts based on [Semantic Release](https://github.com/semantic-release/semantic-release#readme) into the GitLab container registry.
|
||||||
|
|
||||||
|
## Licensing
|
||||||
|
|
||||||
|
As a standard, the openDesk platform development team uses [reuse.software](https://reuse.software/) wherever possible to annotate license and copyright.
|
||||||
|
|
||||||
|
openDesk uses Apache 2.0 as the license for their work. A typical reuse copyright and license header looks like this:
|
||||||
|
```
|
||||||
|
# SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
```
|
||||||
|
As the way to mark the license header as a comment differs between the various filetypes, please find matching examples for the types all across the [deployment automation repository](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace).
|
||||||
|
|
||||||
|
**Remark**: If there is already an existing `SPDX-FileCopyrightText` please just add the one from the above example.
|
||||||
|
|
||||||
|
## Development workflow
|
||||||
|
|
||||||
|
### Disclaimer
|
||||||
|
|
||||||
|
openDesk consists only of community products, so there is no SLA to receive service updates or backports of critical security fixes. This has two consequences:
|
||||||
|
- In production scenarios, you should replace the community versions of the functional components with supported, SLA-backed paid versions.
|
||||||
|
- openDesk aims to always update to the latest available releases of the community components and we therefore have rolling technical releases.
|
||||||
|
|
||||||
|
### Workflow
|
||||||
|
|
||||||
|
This chapter describes the development workflow of the deployment automation. The suppliers have their development processes and workflows. While we aim to update always to the most recent community version(s) available, openDesk also sponsors development done by the suppliers. As the openDesk team has to take a closer look at these sponsored features, they are referred to as *supplier deliverables* within the platform development workflow.
|
||||||
|
|
||||||
|
#### Branching concept
|
||||||
|
|
||||||
|
The picture below uses Gitflow notation to give an overview of the different types of development flows.
|
||||||
|
|
||||||
|
The basic facts for the flow are:
|
||||||
|
- When the `develop` branch is merged into `main` a technical release is created (except when the merge commit(s) are of type `chore` or `docs`)
|
||||||
|
- Changes that will be applied to openDesk have to branch off from `develop`, we call these branches *feature* branches.
|
||||||
|
- Developers can create sub-branches from their feature branch(es) as needed.
|
||||||
|
- When a *feature* branch gets pushed a Merge Request in `Draft` state is automatically created.
|
||||||
|
- We know three types of *feature* branches:
|
||||||
|
- `docu`: Doing just documentation changes
|
||||||
|
- `mntn`: Maintenance of the openDesk software components and minor configurational changes
|
||||||
|
- `feat`: All changes that do not fall into the two categories above, especially
|
||||||
|
- supplier deliverables and
|
||||||
|
- configurational changes that have a significant impact on openDesk users or require migrations[^1]
|
||||||
|
- The *QG* entries in the workflow refer to quality gates that are explained in more detail later
|
||||||
|
- All merges into `develop` or `main` require two approvals from the platform development team[^2]. The approvers have to ensure that the defined quality gates have been passed successfully.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
gitGraph
|
||||||
|
commit id: "QA 'nightly main'"
|
||||||
|
commit id: " "
|
||||||
|
branch "develop"
|
||||||
|
checkout "develop"
|
||||||
|
commit id: "QA 'nightly develop'"
|
||||||
|
commit id: " "
|
||||||
|
branch "docu"
|
||||||
|
checkout "docu"
|
||||||
|
commit id: "Documentation commits" type: HIGHLIGHT
|
||||||
|
checkout "develop"
|
||||||
|
merge "docu"
|
||||||
|
checkout "main"
|
||||||
|
merge "develop" tag: "No release"
|
||||||
|
checkout "develop"
|
||||||
|
commit id: " "
|
||||||
|
branch "mntn"
|
||||||
|
checkout "mntn"
|
||||||
|
commit id: "Maintenance commits" type: HIGHLIGHT
|
||||||
|
commit id: "QG 'mntn'" type: REVERSE
|
||||||
|
checkout "develop"
|
||||||
|
merge "mntn"
|
||||||
|
commit id: "QA 'release merge'" type: REVERSE
|
||||||
|
checkout "main"
|
||||||
|
merge "develop" tag: "Patch or minor release"
|
||||||
|
checkout "develop"
|
||||||
|
commit id: " "
|
||||||
|
branch "feat"
|
||||||
|
checkout "feat"
|
||||||
|
commit id: "Feature commits" type: HIGHLIGHT
|
||||||
|
commit id: "QG 'feat'" type: REVERSE
|
||||||
|
commit id: "Manual Feature QA" type: REVERSE
|
||||||
|
commit id: "Develop Tests"
|
||||||
|
commit id: "Documentation"
|
||||||
|
checkout "develop"
|
||||||
|
merge "feat"
|
||||||
|
commit id: "QA 'release merge' " type: REVERSE
|
||||||
|
checkout "main"
|
||||||
|
merge "develop" tag: "Minor or major release"
|
||||||
|
checkout "develop"
|
||||||
|
checkout "main"
|
||||||
|
commit id: " "
|
||||||
|
commit id: "Manual Functional Release Activities" type: HIGHLIGHT
|
||||||
|
commit id: " "
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Standard Quality Gate (SQG)
|
||||||
|
|
||||||
|
The Standard Quality Gate addresses quality assurance steps that should be executed within each of the mentioned quality gates in the workflow.
|
||||||
|
|
||||||
|
1. Linting
|
||||||
|
- Blocking
|
||||||
|
- Licening: [reuse](https://github.com/fsfe/reuse-tool)
|
||||||
|
- openDesk specific: Especially `images.yaml` and `charts.yaml`, find more details in the [development](./development.md) docu
|
||||||
|
- Non Blocking
|
||||||
|
- Security: [Kyverno policy check](../.kyverno) addressing some IT-Grundschutz requirements
|
||||||
|
- Formal: Yaml
|
||||||
|
1. Deploy the full openDesk stack from scratch:
|
||||||
|
- All deployment steps must be successful (green)
|
||||||
|
- All tests from the end-to-end test set must be successful
|
||||||
|
1. Update deployment[^3] of the full openDesk stack and apply the quality measures from the step #1:
|
||||||
|
- Deploy the current merge target baseline (`develop` or `main`)
|
||||||
|
- Update deploy from your QA branch into the instance from the previous step
|
||||||
|
1. No showstopper found regarding
|
||||||
|
- SBOM compliance[^4]
|
||||||
|
- Malware check
|
||||||
|
- CVE check[^5]
|
||||||
|
- Kubescape scan[^5]
|
||||||
|
|
||||||
|
Steps #1 to #3 from above are executed as GitLab CI and therefore documented within GitLab.
|
||||||
|
|
||||||
|
Step #4 is focussed on security and was not fully implemented yet. Its main objective is to check for regressions. That step is just the second step of a security check and monitoring chain as shown below. While some checks can be executed against the static artefacts (e.g. container images) other might require an up-and-running instance. These are especially located in the third step below which is not yet implemented.
|
||||||
|
|
||||||
|
```mermaid
|
||||||
|
flowchart TD
|
||||||
|
A[<u><b>Container image</b></u>
|
||||||
|
checks during build time
|
||||||
|
e.g. based on openDesk
|
||||||
|
reference implementation 'gitlab-config'.
|
||||||
|
>> Can the artefact be integrated? <<
|
||||||
|
] -->|integrate Artefacts| B[<u><b>Deployment automation</b></u> SQG
|
||||||
|
based on GitLab CI during
|
||||||
|
technical release process.
|
||||||
|
>> Can the platform be released? <<
|
||||||
|
]
|
||||||
|
B-->|release| C[<u><b>openDesk release</b></u> monitoring
|
||||||
|
on a regular e.g. daily or live basis.
|
||||||
|
>> Do we need to fix something? <<
|
||||||
|
]
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Branch workflows
|
||||||
|
|
||||||
|
This section will explain the workflow for each branch (type) based on the Gitflow picture from above.
|
||||||
|
|
||||||
|
##### `main`
|
||||||
|
|
||||||
|
- `QA 'nightly main'`: Execute the SQG based on the most recent release. The upgrade test environment should be a long-standing environment that only gets built from scratch with the previous technical release when something breaks the environment.
|
||||||
|
- Merge points: We are using the [Semantic Release convention](https://github.com/semantic-release/semantic-release) which itself is based on the [Semantic Versioning (SemVer) notation](https://semver.org) to automatically create technical releases on the merge points.
|
||||||
|
- "No release": When a merge from `develop` includes only changes from `docu` branches the merge into `main` will only consist of `docs` or `chore` commits. No new release will be generated by that merge.
|
||||||
|
- "Patch or minor release": When changes from `mntn` branches get merged these might contain `fix` or `feat` commits causing a new technical release to be built with an updated version on Patch or Minor level.
|
||||||
|
- "Minor or major release": When changes from `feat` branches get merged these might contain `feat` commits even with breaking changes, causing a technical release to be built with an updated version on Minor or Major level.
|
||||||
|
- "Manual Functional Release Activities": Technical releases are loosely coupled to functional releases. The additional activities for a functional release select an existing technical release as a basis to generate the artifacts required for a functional release, for example:
|
||||||
|
- Conduct additional manual explorative and regression tests.
|
||||||
|
- Perform checks like IT Grundschutz, Accessibility, or Data Protection.
|
||||||
|
|
||||||
|
##### `develop`
|
||||||
|
|
||||||
|
- `QA 'nightly develop'`: Follows the same approach as `QA 'nightly main'` - execute the SQG based in this case on the head revision of the `develop` branch.
|
||||||
|
- `QA 'release merge'`: The Merge Request for this merge has to be created manually by members of the platform development team. It should document:
|
||||||
|
- That the SQG was successfully executed upon the to-be merged state - it could be done explicitly or based on a `QA 'nightly develop'`
|
||||||
|
- In case of `mntn` changes that usually how no test automation: Changes have been verified by a member of the platform development team.
|
||||||
|
- That the changes have been reviewed by at least two members of the platform development team giving their approval on the Merge Request.
|
||||||
|
- Merge points (from `docu`, `mntn`, and `feat` branches): No additional activity on these merge points as the QA is ensured before the merge in the just-named branch types.
|
||||||
|
|
||||||
|
##### `docu`
|
||||||
|
|
||||||
|
Branches of type `docu` only contain the commits themselves and have to adhere to the workflow basic fact that:
|
||||||
|
> All merges into `develop` or `main` require two approvals from the platform development team.
|
||||||
|
|
||||||
|
##### `mntn`
|
||||||
|
|
||||||
|
Besides the actual changes being committed in an `mntn` branch there is only the:
|
||||||
|
- `QG 'mntn'`: In addition to validating the actual change the owner of the branch has to ensure the successful execution of the SQG.
|
||||||
|
|
||||||
|
##### `feat`
|
||||||
|
|
||||||
|
This branch type requires the most activities on top of the actual development:
|
||||||
|
- `QG 'feat'`: The owner of the branch has to validate the implemented functionality and has to ensure the SQG is passed successfully.
|
||||||
|
- `Manual Feature QA`:
|
||||||
|
- This is the actual interface between the platform development workflow and the supplier work package workflow.
|
||||||
|
- The openDesk QA team validates the change, ideally based on the acceptance criteria defined in the supplier's work package definition.
|
||||||
|
- If improvements are needed QA passes on the feedback to the developer/supplier.
|
||||||
|
- If the QA was successful test cases for the testautomation of the feature are defined.
|
||||||
|
- QA should also evaluate if there is a need for end-user documentation of the feature.
|
||||||
|
- `Develop Test`: The test cases are implemented by the openDesk platform development and added to the openDesk end-to-end test suite.
|
||||||
|
- `Documentation`: When required the documentation team has to update the end-user documentation.
|
||||||
|
|
||||||
|
#### Branch names
|
||||||
|
|
||||||
|
Branches created from the `develop` branch have to adhere to the following notation: `<party[-developer]>/<type>/<component>/<details>`:
|
||||||
|
|
||||||
|
- `<party[-developer]>`: An identifier for the developing party optionally plus the name of the developer or team working on that branch. The following two-letter shorthand notations should be used for the owner:
|
||||||
|
- Suppliers
|
||||||
|
- `co`: Collabora
|
||||||
|
- `cp`: CryptPad
|
||||||
|
- `el`: Element
|
||||||
|
- `nc`: Nextcloud
|
||||||
|
- `nd`: Nordeck
|
||||||
|
- `op`: OpenProject
|
||||||
|
- `ox`: Open-Xchange
|
||||||
|
- `uv`: Univention
|
||||||
|
- `xw`: XWiki
|
||||||
|
- Other
|
||||||
|
- `pd`: (openDesk) Platform Development
|
||||||
|
- `xx`: Other, not one of the parties mentioned before
|
||||||
|
|
||||||
|
- `<type>`: Based on the branch types described in this document valid values for type are
|
||||||
|
- `docu`
|
||||||
|
- `mntn`
|
||||||
|
- `feat`
|
||||||
|
|
||||||
|
- `<component>`: Valid components are
|
||||||
|
- `helmfile`
|
||||||
|
- `ci`
|
||||||
|
- `cross-functional`
|
||||||
|
- `docs`
|
||||||
|
- `collabora`
|
||||||
|
- `cryptpad`
|
||||||
|
- `element`
|
||||||
|
- `jitsi`
|
||||||
|
- `nextcloud`
|
||||||
|
- `open-xchange`
|
||||||
|
- `openproject`
|
||||||
|
- `services`
|
||||||
|
- `univention-management-stack`
|
||||||
|
- `xwiki`
|
||||||
|
|
||||||
|
- `<details>`: A very short note about what is going to happen in the branch
|
||||||
|
|
||||||
|
Example: `pd-tom/fix/open-xchange/bump_to_8.76`.
|
||||||
|
|
||||||
|
**Note**: The above naming convention is not enforced yet, but please ensure you make use of it.
|
||||||
|
|
||||||
|
#### Commit messages / Conventional Commits
|
||||||
|
|
||||||
|
Commit messages must adhere to the [Conventional Commit standard](https://www.conventionalcommits.org/en/v1.0.0/#summary). Commits that do not adhere to the standard get rejected by either [Gitlab push rules](https://docs.gitlab.com/ee/user/project/repository/push_rules.html) or the CI.
|
||||||
|
|
||||||
|
```text
|
||||||
|
<type>(<scope>): [path/to/issue#1] <short summary>
|
||||||
|
│ │ │ │
|
||||||
|
│ │ | └─> Summary in present tense, sentence case, with no period at the end
|
||||||
|
│ │ |
|
||||||
|
│ │ └─> Issue reference (optional)
|
||||||
|
│ │
|
||||||
|
│ └─> Commit Scope: helmfile, docs, collabora, intercom-service, ...
|
||||||
|
│
|
||||||
|
└─> Commit Type: chore, ci, docs, feat, fix
|
||||||
|
```
|
||||||
|
|
||||||
|
Example: `fix(univention-management-stack): Update standard session timeout of openDesk realm in Keycloak`
|
||||||
|
|
||||||
|
**Beware**: The commit messages are an essential part of the [technical releases](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases) as the release's notes are generated from the messages.
|
||||||
|
|
||||||
|
#### Verified commits
|
||||||
|
|
||||||
|
We only allow verified commits, please read on about the options you have to make your commits verified:
|
||||||
|
- https://docs.gitlab.com/ee/user/project/repository/ssh_signed_commits/
|
||||||
|
- https://docs.gitlab.com/ee/user/project/repository/gpg_signed_commits/
|
||||||
|
- https://docs.gitlab.com/ee/user/project/repository/x509_signed_commits/
|
||||||
|
|
||||||
|
# Footnotes
|
||||||
|
|
||||||
|
[^1]: Migrations are in general not supported before openDesk hits [technical release](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases) v1.0.0
|
||||||
|
|
||||||
|
[^2]: These approval rules are not available in the Gitlab Free Tier which is one of the main reasons why the deployment automation is not developed on Open CoDE.
|
||||||
|
|
||||||
|
[^3]: As long as migrations/upgrade paths are not provided - see also footnote #1 - this step is optional.
|
||||||
|
|
||||||
|
[^4]: The SBOM process is currently executed asynchronously to the development process and tests the most current technical release from main. The process is not fully automated yet.
|
||||||
|
|
||||||
|
[^5]: The quality gate is not yet implemented especially when it comes to identifying regressions.
|
||||||
@@ -7,10 +7,7 @@
|
|||||||
helmfiles:
|
helmfiles:
|
||||||
# Path to the helmfile state file being processed BEFORE releases in this state file
|
# Path to the helmfile state file being processed BEFORE releases in this state file
|
||||||
- path: "helmfile/apps/services/helmfile.yaml"
|
- path: "helmfile/apps/services/helmfile.yaml"
|
||||||
- path: "helmfile/apps/keycloak/helmfile.yaml"
|
|
||||||
- path: "helmfile/apps/univention-corporate-container/helmfile.yaml"
|
|
||||||
- path: "helmfile/apps/univention-management-stack/helmfile.yaml"
|
- path: "helmfile/apps/univention-management-stack/helmfile.yaml"
|
||||||
- path: "helmfile/apps/keycloak-bootstrap/helmfile.yaml"
|
|
||||||
- path: "helmfile/apps/intercom-service/helmfile.yaml"
|
- path: "helmfile/apps/intercom-service/helmfile.yaml"
|
||||||
- path: "helmfile/apps/open-xchange/helmfile.yaml"
|
- path: "helmfile/apps/open-xchange/helmfile.yaml"
|
||||||
- path: "helmfile/apps/nextcloud/helmfile.yaml"
|
- path: "helmfile/apps/nextcloud/helmfile.yaml"
|
||||||
@@ -20,6 +17,7 @@ helmfiles:
|
|||||||
- path: "helmfile/apps/openproject/helmfile.yaml"
|
- path: "helmfile/apps/openproject/helmfile.yaml"
|
||||||
- path: "helmfile/apps/xwiki/helmfile.yaml"
|
- path: "helmfile/apps/xwiki/helmfile.yaml"
|
||||||
- path: "helmfile/apps/provisioning/helmfile.yaml"
|
- path: "helmfile/apps/provisioning/helmfile.yaml"
|
||||||
|
- path: "helmfile/apps/openproject-bootstrap/helmfile.yaml"
|
||||||
|
|
||||||
missingFileHandler: "Error"
|
missingFileHandler: "Error"
|
||||||
|
|
||||||
@@ -28,7 +26,8 @@ missingFileHandler: "Error"
|
|||||||
# - Installing all releases from root via helmfile apply
|
# - Installing all releases from root via helmfile apply
|
||||||
# - Installing a single release from root via helmfile apply -f helmfile/apps/<app>/helmfile.yaml
|
# - Installing a single release from root via helmfile apply -f helmfile/apps/<app>/helmfile.yaml
|
||||||
# - Installing a single release from app directory via helmfile apply
|
# - Installing a single release from app directory via helmfile apply
|
||||||
# Issue: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace/-/issues/2
|
# Issue: https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues/2
|
||||||
|
|
||||||
environments:
|
environments:
|
||||||
default:
|
default:
|
||||||
values:
|
values:
|
||||||
@@ -38,10 +37,15 @@ environments:
|
|||||||
values:
|
values:
|
||||||
- "helmfile/environments/default/*.gotmpl"
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
- "helmfile/environments/default/*.yaml"
|
- "helmfile/environments/default/*.yaml"
|
||||||
- "helmfile/environments/dev/values.yaml"
|
- "helmfile/environments/dev/values.yaml.gotmpl"
|
||||||
|
test:
|
||||||
|
values:
|
||||||
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
|
- "helmfile/environments/default/*.yaml"
|
||||||
|
- "helmfile/environments/test/values.yaml.gotmpl"
|
||||||
prod:
|
prod:
|
||||||
values:
|
values:
|
||||||
- "helmfile/environments/default/*.gotmpl"
|
- "helmfile/environments/default/*.gotmpl"
|
||||||
- "helmfile/environments/default/*.yaml"
|
- "helmfile/environments/default/*.yaml"
|
||||||
- "helmfile/environments/prod/values.yaml"
|
- "helmfile/environments/prod/values.yaml.gotmpl"
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,27 +1,30 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
---
|
||||||
repositories:
|
repositories:
|
||||||
# Collabora Online
|
# Collabora Online
|
||||||
# Source: https://github.com/CollaboraOnline/online
|
# Source: https://github.com/CollaboraOnline/online
|
||||||
- name: "collabora-online-repo"
|
- name: "collabora-online-repo"
|
||||||
url: >-
|
keyring: "../../files/gpg-pubkeys/collaboraoffice-com.gpg"
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
verify: {{ .Values.charts.collabora.verify }}
|
||||||
default "https://collaboraonline.github.io/online" }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.collabora.registry }}/\
|
||||||
|
{{ .Values.charts.collabora.repository }}"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "collabora-online"
|
- name: "collabora-online"
|
||||||
chart: "collabora-online-repo/collabora-online"
|
chart: "collabora-online-repo/{{ .Values.charts.collabora.name }}"
|
||||||
version: "1.0.2"
|
version: "{{ .Values.charts.collabora.version }}"
|
||||||
values:
|
values:
|
||||||
- "values.yaml"
|
- "values.yaml.gotmpl"
|
||||||
- "values.gotmpl"
|
installed: {{ .Values.collabora.enabled }}
|
||||||
condition: "collabora.enabled"
|
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "collabora"
|
component: "collabora"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,41 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
image:
|
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.collabora.repository }}"
|
|
||||||
tag: "{{ .Values.images.collabora.tag }}"
|
|
||||||
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
|
|
||||||
imagePullSecrets:
|
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
|
||||||
- name: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
|
||||||
className: "{{ .Values.ingress.ingressClassName }}"
|
|
||||||
hosts:
|
|
||||||
- host: "{{ .Values.global.hosts.collabora }}.{{ .Values.global.domain }}"
|
|
||||||
paths:
|
|
||||||
- path: "/"
|
|
||||||
pathType: "Prefix"
|
|
||||||
tls:
|
|
||||||
- secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
hosts:
|
|
||||||
- "{{ .Values.global.hosts.collabora }}.{{ .Values.global.domain }}"
|
|
||||||
|
|
||||||
collabora:
|
|
||||||
# Admin Console Credentials: https://CODE-domain/browser/dist/admin/admin.html
|
|
||||||
username: "collabora-internal-admin"
|
|
||||||
password: {{ .Values.secrets.collabora.adminPassword }}
|
|
||||||
aliasgroups:
|
|
||||||
- host: "https://{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}:443"
|
|
||||||
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.collabora }}
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.collabora | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,16 +1,37 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
{{/*
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
---
|
---
|
||||||
# https://github.com/CollaboraOnline/online/blob/master/kubernetes/helm/README.md or
|
autoscaling:
|
||||||
# https://github.com/CollaboraOnline/online/blob/master/kubernetes/helm/collabora-online/values.yaml
|
enabled: false
|
||||||
|
|
||||||
fullnameOverride: "collabora"
|
|
||||||
|
|
||||||
image:
|
|
||||||
pullPolicy: "IfNotPresent"
|
|
||||||
|
|
||||||
collabora:
|
collabora:
|
||||||
extra_params: "--o:ssl.enable=false --o:ssl.termination=true"
|
extra_params: "--o:ssl.enable=false --o:ssl.termination=true"
|
||||||
|
username: "collabora-internal-admin"
|
||||||
|
password: {{ .Values.secrets.collabora.adminPassword | quote }}
|
||||||
|
aliasgroups:
|
||||||
|
- host: "https://{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
fullnameOverride: "collabora"
|
||||||
|
|
||||||
|
grafana:
|
||||||
|
dashboards:
|
||||||
|
enabled: {{ .Values.grafana.dashboards.enabled }}
|
||||||
|
labels:
|
||||||
|
{{ .Values.grafana.dashboards.labels | toYaml | nindent 6 }}
|
||||||
|
annotations:
|
||||||
|
{{ .Values.grafana.dashboards.annotations | toYaml | nindent 6 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.collabora.registry }}/{{ .Values.images.collabora.repository }}"
|
||||||
|
tag: {{ .Values.images.collabora.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
ingress:
|
ingress:
|
||||||
annotations:
|
annotations:
|
||||||
@@ -50,11 +71,35 @@ ingress:
|
|||||||
acl admin_url path_beg /cool/adminws/
|
acl admin_url path_beg /cool/adminws/
|
||||||
acl admin_url path_beg /browser/dist/admin/admin.html
|
acl admin_url path_beg /browser/dist/admin/admin.html
|
||||||
http-request deny if admin_url
|
http-request deny if admin_url
|
||||||
autoscaling:
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
enabled: false
|
className: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
hosts:
|
||||||
|
- host: "{{ .Values.global.hosts.collabora }}.{{ .Values.global.domain }}"
|
||||||
|
paths:
|
||||||
|
- path: "/"
|
||||||
|
pathType: "Prefix"
|
||||||
|
tls:
|
||||||
|
- secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
hosts:
|
||||||
|
- "{{ .Values.global.hosts.collabora }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
serviceAccount:
|
podSecurityContext:
|
||||||
create: true
|
fsGroup: 100
|
||||||
|
|
||||||
|
prometheus:
|
||||||
|
servicemonitor:
|
||||||
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
labels:
|
||||||
|
{{ .Values.prometheus.serviceMonitors.labels | toYaml | nindent 6 }}
|
||||||
|
rules:
|
||||||
|
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
||||||
|
additionalLabels:
|
||||||
|
{{ .Values.prometheus.prometheusRules.labels | toYaml | nindent 6 }}
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.collabora }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.collabora | toYaml | nindent 2 }}
|
||||||
|
|
||||||
securityContext:
|
securityContext:
|
||||||
allowPrivilegeEscalation: true
|
allowPrivilegeEscalation: true
|
||||||
@@ -81,7 +126,8 @@ securityContext:
|
|||||||
- "NET_RAW"
|
- "NET_RAW"
|
||||||
- "SYS_CHROOT"
|
- "SYS_CHROOT"
|
||||||
- "MKNOD"
|
- "MKNOD"
|
||||||
|
seLinuxOptions:
|
||||||
podSecurityContext:
|
{{ .Values.seLinuxOptions.collabora | toYaml | nindent 4 }}
|
||||||
fsGroup: 100
|
serviceAccount:
|
||||||
|
create: true
|
||||||
...
|
...
|
||||||
30
helmfile/apps/cryptpad/helmfile.yaml
Normal file
30
helmfile/apps/cryptpad/helmfile.yaml
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
---
|
||||||
|
repositories:
|
||||||
|
# CryptPad
|
||||||
|
# Source: https://github.com/cryptpad/helm
|
||||||
|
- name: "cryptpad-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/xwiki-com.gpg"
|
||||||
|
verify: {{ .Values.charts.cryptpad.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.cryptpad.registry }}/\
|
||||||
|
{{ .Values.charts.cryptpad.repository }}"
|
||||||
|
|
||||||
|
releases:
|
||||||
|
- name: "cryptpad"
|
||||||
|
chart: "cryptpad-repo/{{ .Values.charts.cryptpad.name }}"
|
||||||
|
version: "{{ .Values.charts.cryptpad.version }}"
|
||||||
|
values:
|
||||||
|
- "values.yaml.gotmpl"
|
||||||
|
installed: {{ .Values.cryptpad.enabled }}
|
||||||
|
|
||||||
|
commonLabels:
|
||||||
|
deploy-stage: "component-1"
|
||||||
|
component: "cryptpad"
|
||||||
|
...
|
||||||
81
helmfile/apps/cryptpad/values.yaml.gotmpl
Normal file
81
helmfile/apps/cryptpad/values.yaml.gotmpl
Normal file
@@ -0,0 +1,81 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
# https://github.com/cryptpad/helm/blob/main/charts/cryptpad/README.md or
|
||||||
|
# https://github.com/cryptpad/helm/blob/main/charts/cryptpad/values.yaml
|
||||||
|
|
||||||
|
# Disable registration and access to unregistered users:
|
||||||
|
# (https://docs.cryptpad.org/en/admin_guide/customization.html#application-config)
|
||||||
|
|
||||||
|
application_config:
|
||||||
|
availablePadTypes:
|
||||||
|
- "diagram"
|
||||||
|
|
||||||
|
# Deactivating public access breaks nextcloud plugin!
|
||||||
|
# registeredOnlyTypes:
|
||||||
|
# - "diagram"
|
||||||
|
|
||||||
|
autoscaling:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
enableEmbedding: true
|
||||||
|
|
||||||
|
fullnameOverride: "cryptpad"
|
||||||
|
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.cryptpad.registry }}/{{ .Values.images.cryptpad.repository }}"
|
||||||
|
tag: {{ .Values.images.cryptpad.tag | quote }}
|
||||||
|
pullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
annotations:
|
||||||
|
nginx.org/websocket-services: "cryptpad"
|
||||||
|
className: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
hosts:
|
||||||
|
- host: "{{ .Values.global.hosts.cryptpad }}.{{ .Values.global.domain }}"
|
||||||
|
paths:
|
||||||
|
- path: "/"
|
||||||
|
pathType: "ImplementationSpecific"
|
||||||
|
tls:
|
||||||
|
- secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
hosts:
|
||||||
|
- "{{ .Values.global.hosts.cryptpad }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
fsGroup: 4001
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.cryptpad }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.cryptpad | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
privileged: false
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 4001
|
||||||
|
runAsGroup: 4001
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.cryptpad | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
serviceAccount:
|
||||||
|
create: true
|
||||||
|
|
||||||
|
workloadStateful: false
|
||||||
|
|
||||||
|
...
|
||||||
@@ -1,56 +1,187 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
---
|
||||||
repositories:
|
repositories:
|
||||||
# openDesk Element
|
# openDesk Element
|
||||||
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/sovereign-workplace-element
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-element
|
||||||
- name: "opendesk-element-repo"
|
- name: "element-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.element.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
# yamllint disable rule:line-length
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.element.registry }}/\
|
||||||
url: >-
|
{{ .Values.charts.element.repository }}"
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
- name: "element-well-known-repo"
|
||||||
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-element" }}
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
# yamllint enable rule:line-length
|
verify: {{ .Values.charts.elementWellKnown.verify }}
|
||||||
verify: true
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.elementWellKnown.registry }}/\
|
||||||
|
{{ .Values.charts.elementWellKnown.repository }}"
|
||||||
|
- name: "synapse-web-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.synapseWeb.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapseWeb.registry }}/\
|
||||||
|
{{ .Values.charts.synapseWeb.repository }}"
|
||||||
|
- name: "synapse-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.synapse.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapse.registry }}/\
|
||||||
|
{{ .Values.charts.synapse.repository }}"
|
||||||
|
- name: "synapse-create-account-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.synapseCreateAccount.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.synapseCreateAccount.registry }}/\
|
||||||
|
{{ .Values.charts.synapseCreateAccount.repository }}"
|
||||||
|
|
||||||
|
# openDesk Matrix Widgets
|
||||||
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-matrix-widgets
|
||||||
|
- name: "matrix-user-verification-service-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.matrixUserVerificationService.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixUserVerificationService.registry }}/\
|
||||||
|
{{ .Values.charts.matrixUserVerificationService.repository }}"
|
||||||
|
- name: "matrix-neoboard-widget-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.matrixNeoboardWidget.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeoboardWidget.registry }}/\
|
||||||
|
{{ .Values.charts.matrixNeoboardWidget.repository }}"
|
||||||
|
- name: "matrix-neochoice-widget-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.matrixNeoboardWidget.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeoboardWidget.registry }}/\
|
||||||
|
{{ .Values.charts.matrixNeoboardWidget.repository }}"
|
||||||
|
- name: "matrix-neodatefix-widget-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.matrixNeodatefixWidget.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeodatefixWidget.registry }}/\
|
||||||
|
{{ .Values.charts.matrixNeodatefixWidget.repository }}"
|
||||||
|
- name: "matrix-neodatefix-bot-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.matrixNeodatefixBot.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.matrixNeodatefixBot.registry }}/\
|
||||||
|
{{ .Values.charts.matrixNeodatefixBot.repository }}"
|
||||||
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "opendesk-element"
|
- name: "opendesk-element"
|
||||||
chart: "opendesk-element-repo/opendesk-element"
|
chart: "element-repo/{{ .Values.charts.element.name }}"
|
||||||
version: "2.2.0"
|
version: "{{ .Values.charts.element.version }}"
|
||||||
values:
|
values:
|
||||||
- "values-element.yaml"
|
- "values-element.yaml.gotmpl"
|
||||||
- "values-element.gotmpl"
|
installed: {{ .Values.element.enabled }}
|
||||||
condition: "element.enabled"
|
timeout: 900
|
||||||
|
|
||||||
- name: "opendesk-well-known"
|
- name: "opendesk-well-known"
|
||||||
chart: "opendesk-element-repo/opendesk-well-known"
|
chart: "element-well-known-repo/{{ .Values.charts.elementWellKnown.name }}"
|
||||||
version: "2.2.0"
|
version: "{{ .Values.charts.elementWellKnown.version }}"
|
||||||
values:
|
values:
|
||||||
- "values-well-known.yaml"
|
- "values-well-known.yaml.gotmpl"
|
||||||
- "values-well-known.gotmpl"
|
installed: {{ .Values.element.enabled }}
|
||||||
condition: "element.enabled"
|
timeout: 900
|
||||||
|
|
||||||
- name: "opendesk-synapse-web"
|
- name: "opendesk-synapse-web"
|
||||||
chart: "opendesk-element-repo/opendesk-synapse-web"
|
chart: "synapse-web-repo/{{ .Values.charts.synapseWeb.name }}"
|
||||||
version: "2.2.0"
|
version: "{{ .Values.charts.synapseWeb.version }}"
|
||||||
values:
|
values:
|
||||||
- "values-synapse-web.yaml"
|
- "values-synapse-web.yaml.gotmpl"
|
||||||
- "values-synapse-web.gotmpl"
|
installed: {{ .Values.element.enabled }}
|
||||||
condition: "element.enabled"
|
timeout: 900
|
||||||
|
|
||||||
- name: "opendesk-synapse"
|
- name: "opendesk-synapse"
|
||||||
chart: "opendesk-element-repo/opendesk-synapse"
|
chart: "synapse-repo/{{ .Values.charts.synapse.name }}"
|
||||||
version: "2.2.0"
|
version: "{{ .Values.charts.synapse.version }}"
|
||||||
values:
|
values:
|
||||||
- "values-synapse.yaml"
|
- "values-synapse.yaml.gotmpl"
|
||||||
- "values-synapse.gotmpl"
|
installed: {{ .Values.element.enabled }}
|
||||||
condition: "element.enabled"
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "opendesk-matrix-user-verification-service-bootstrap"
|
||||||
|
chart: "synapse-create-account-repo/{{ .Values.charts.synapseCreateAccount.name }}"
|
||||||
|
version: "{{ .Values.charts.synapseCreateAccount.version }}"
|
||||||
|
values:
|
||||||
|
- "values-matrix-user-verification-service-bootstrap.yaml.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "opendesk-matrix-user-verification-service"
|
||||||
|
chart: "matrix-user-verification-service-repo/{{ .Values.charts.matrixUserVerificationService.name }}"
|
||||||
|
version: "{{ .Values.charts.matrixUserVerificationService.version }}"
|
||||||
|
values:
|
||||||
|
- "values-matrix-user-verification-service.yaml.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neoboard-widget"
|
||||||
|
chart: "matrix-neoboard-widget-repo/{{ .Values.charts.matrixNeoboardWidget.name }}"
|
||||||
|
version: "{{ .Values.charts.matrixNeoboardWidget.version }}"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neoboard-widget.yaml.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neochoice-widget"
|
||||||
|
chart: "matrix-neochoice-widget-repo/{{ .Values.charts.matrixNeochoiseWidget.name }}"
|
||||||
|
version: "{{ .Values.charts.matrixNeochoiseWidget.version }}"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neochoice-widget.yaml.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neodatefix-widget"
|
||||||
|
chart: "matrix-neodatefix-widget-repo/{{ .Values.charts.matrixNeodatefixWidget.name }}"
|
||||||
|
version: "{{ .Values.charts.matrixNeodatefixWidget.version }}"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-widget.yaml.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neodatefix-bot-bootstrap"
|
||||||
|
chart: "synapse-create-account-repo/{{ .Values.charts.synapseCreateAccount.name }}"
|
||||||
|
version: "{{ .Values.charts.synapseCreateAccount.version }}"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-bot-bootstrap.yaml.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
|
- name: "matrix-neodatefix-bot"
|
||||||
|
chart: "matrix-neodatefix-bot-repo/{{ .Values.charts.matrixNeodatefixBot.name }}"
|
||||||
|
version: "{{ .Values.charts.matrixNeodatefixBot.version }}"
|
||||||
|
values:
|
||||||
|
- "values-matrix-neodatefix-bot.yaml.gotmpl"
|
||||||
|
installed: {{ .Values.element.enabled }}
|
||||||
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "element"
|
component: "element"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,39 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
configuration:
|
|
||||||
additionalConfiguration:
|
|
||||||
logout_redirect_url: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/logout?client_id=matrix&post_logout_redirect_uri=https%3A%2F%2F{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}"
|
|
||||||
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.element.repository }}"
|
|
||||||
tag: "{{ .Values.images.element.tag }}"
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
host: "{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}"
|
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
|
||||||
tls:
|
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
|
|
||||||
theme:
|
|
||||||
{{ .Values.theme | toYaml | nindent 2 }}
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.element }}
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.element | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
containerSecurityContext:
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- "ALL"
|
|
||||||
enabled: true
|
|
||||||
privileged: false
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
runAsGroup: 101
|
|
||||||
runAsNonRoot: true
|
|
||||||
runAsUser: 101
|
|
||||||
seccompProfile:
|
|
||||||
type: "RuntimeDefault"
|
|
||||||
|
|
||||||
podSecurityContext:
|
|
||||||
enabled: true
|
|
||||||
fsGroup: 101
|
|
||||||
...
|
|
||||||
146
helmfile/apps/element/values-element.yaml.gotmpl
Normal file
146
helmfile/apps/element/values-element.yaml.gotmpl
Normal file
@@ -0,0 +1,146 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
endToEndEncryption: true
|
||||||
|
additionalConfiguration:
|
||||||
|
logout_redirect_url: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}/protocol/openid-connect/logout?client_id=matrix&post_logout_redirect_uri=https%3A%2F%2F{{ .Values.global.hosts.univentionManagementStack }}.{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
"net.nordeck.element_web.module.opendesk":
|
||||||
|
config:
|
||||||
|
banner:
|
||||||
|
ics_navigation_json_url: "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/navigation.json"
|
||||||
|
ics_silent_url: "https://{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}/silent"
|
||||||
|
portal_logo_svg_url: "https://{{ .Values.global.hosts.univentionManagementStack }}.{{ .Values.global.domain }}/univention/portal/icons/logos/domain.svg"
|
||||||
|
portal_url: "https://{{ .Values.global.hosts.univentionManagementStack }}.{{ .Values.global.domain }}/"
|
||||||
|
custom_css_variables:
|
||||||
|
--cpd-color-text-action-accent: {{ .Values.theme.colors.primary | quote }}
|
||||||
|
|
||||||
|
"net.nordeck.element_web.module.widget_lifecycle":
|
||||||
|
widget_permissions:
|
||||||
|
"https://{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}/jitsi.html":
|
||||||
|
identity_approved: true
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoBoardWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.chunk
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.chunk
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.whiteboard.document.snapshot
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.whiteboard.document.snapshot
|
||||||
|
- org.matrix.msc2762.send.state_event:m.room.power_levels#
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels#
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.whiteboard
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.whiteboard
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.whiteboard.sessions#*
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.whiteboard.sessions
|
||||||
|
- org.matrix.msc3819.send.to_device:net.nordeck.whiteboard.connection_signaling
|
||||||
|
- org.matrix.msc3819.receive.to_device:net.nordeck.whiteboard.connection_signaling
|
||||||
|
- town.robin.msc3846.turn_servers
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoChoiceWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.poll.vote
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.poll.vote
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll.settings
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll.settings
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.send.state_event:net.nordeck.poll.group
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.poll.group
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.poll.start
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.poll.start
|
||||||
|
"https://{{ .Values.global.hosts.matrixNeoDateFixWidget }}.{{ .Values.global.domain }}/*":
|
||||||
|
preload_approved: true
|
||||||
|
identity_approved: true
|
||||||
|
capabilities_approved:
|
||||||
|
- org.matrix.msc2931.navigate
|
||||||
|
- org.matrix.msc2762.timeline:*
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.power_levels
|
||||||
|
- org.matrix.msc2762.receive.event:m.reaction
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.create
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.tombstone
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.send.state_event:m.room.member
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.name
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.room.topic
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.space.parent
|
||||||
|
- org.matrix.msc2762.receive.state_event:m.space.child
|
||||||
|
- org.matrix.msc2762.receive.state_event:net.nordeck.meetings.metadata
|
||||||
|
- org.matrix.msc2762.receive.state_event:im.vector.modular.widgets
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.breakoutsessions.create
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.breakoutsessions.create
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.close
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.close
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.widgets.handle
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.widgets.handle
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.participants.handle
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.participants.handle
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.update
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.update
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.meeting.change.message_permissions
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.meeting.change.message_permissions
|
||||||
|
- org.matrix.msc2762.send.event:net.nordeck.meetings.sub_meetings.send_message
|
||||||
|
- org.matrix.msc2762.receive.event:net.nordeck.meetings.sub_meetings.send_message
|
||||||
|
- org.matrix.msc3973.user_directory_search
|
||||||
|
|
||||||
|
welcomeUserId: "@meetings-bot:{{ .Values.global.domain }}"
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.element | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.element.registry | quote }}
|
||||||
|
repository: {{ .Values.images.element.repository | quote }}
|
||||||
|
tag: {{ .Values.images.element.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
host: "{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}"
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.element }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.element | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,52 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.matrixNeoBoardWidget | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.matrixNeoBoardWidget.registry | quote }}
|
||||||
|
repository: {{ .Values.images.matrixNeoBoardWidget.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixNeoBoardWidget.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoBoardWidget }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoBoardWidget | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,52 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.matrixNeoChoiceWidget | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.matrixNeoChoiceWidget.registry | quote }}
|
||||||
|
repository: {{ .Values.images.matrixNeoChoiceWidget.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixNeoChoiceWidget.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoChoiceWidget }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoChoiceWidget | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,41 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
username: "meetings-bot"
|
||||||
|
pod: "opendesk-synapse-0"
|
||||||
|
secretName: "matrix-neodatefix-bot-account"
|
||||||
|
password: {{ .Values.secrets.matrixNeoDateFixBot.password | quote }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.synapseCreateUser.registry | quote }}
|
||||||
|
url: {{ .Values.images.synapseCreateUser.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapseCreateUser.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
|
fullnameOverride: "matrix-neodatefix-bot-bootstrap"
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.synapseCreateUser | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,80 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
bot:
|
||||||
|
username: "meetings-bot"
|
||||||
|
displayname: "Terminplaner Bot"
|
||||||
|
openxchangeBaseUrl: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
|
strings:
|
||||||
|
breakoutSessionWidgetName: "Breakoutsessions"
|
||||||
|
calendarRoomName: "Terminplaner"
|
||||||
|
calendarWidgetName: "Terminplaner"
|
||||||
|
cockpitWidgetName: "Meeting Steuerung"
|
||||||
|
jitsiWidgetName: "Videokonferenz"
|
||||||
|
matrixNeoBoardWidgetName: "Whiteboard"
|
||||||
|
matrixNeoChoiceWidgetName: "Abstimmungen"
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.matrixNeoDateFixBot | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
extraEnvVars:
|
||||||
|
- name: "ACCESS_TOKEN"
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: "matrix-neodatefix-bot-account"
|
||||||
|
key: "access_token"
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.matrixNeoDateFixBot.registry | quote }}
|
||||||
|
repository: {{ .Values.images.matrixNeoDateFixBot.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixNeoDateFixBot.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
livenessProbe:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
size: {{ .Values.persistence.size.matrixNeoDateFixBot | quote }}
|
||||||
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
readinessProbe:
|
||||||
|
enabled: true
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoDateFixBot }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoDateFixBot | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,56 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
bot:
|
||||||
|
username: "meetings-bot"
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.matrixNeoDateFixWidget | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.matrixNeoDateFixWidget.registry | quote }}
|
||||||
|
repository: {{ .Values.images.matrixNeoDateFixWidget.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixNeoDateFixWidget.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixNeoDateFixWidget }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixNeoDateFixWidget | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -0,0 +1,40 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
username: "uvs"
|
||||||
|
pod: "opendesk-synapse-0"
|
||||||
|
secretName: "opendesk-matrix-user-verification-service-account"
|
||||||
|
password: {{ .Values.secrets.matrixUserVerificationService.password | quote }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.synapseCreateUser.registry | quote }}
|
||||||
|
url: {{ .Values.images.synapseCreateUser.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapseCreateUser.tag | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
|
||||||
|
fullnameOverride: "opendesk-matrix-user-verification-service-bootstrap"
|
||||||
|
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.synapseCreateUser | toYaml | nindent 4 }}
|
||||||
|
...
|
||||||
@@ -0,0 +1,51 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsGroup: 0
|
||||||
|
runAsNonRoot: false
|
||||||
|
runAsUser: 0
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.matrixUserVerificationService | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
extraEnvVars:
|
||||||
|
- name: "UVS_ACCESS_TOKEN"
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: "opendesk-matrix-user-verification-service-account"
|
||||||
|
key: "access_token"
|
||||||
|
- name: "UVS_DISABLE_IP_BLACKLIST"
|
||||||
|
value: "true"
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.matrixUserVerificationService.registry | quote }}
|
||||||
|
repository: {{ .Values.images.matrixUserVerificationService.repository | quote }}
|
||||||
|
tag: {{ .Values.images.matrixUserVerificationService.tag | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.matrixUserVerificationService }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.matrixUserVerificationService | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -1,32 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.synapseWeb.repository }}"
|
|
||||||
tag: "{{ .Values.images.synapseWeb.tag }}"
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
host: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
|
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
|
||||||
tls:
|
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.synapseWeb }}
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.synapseWeb | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,21 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
containerSecurityContext:
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- "ALL"
|
|
||||||
enabled: true
|
|
||||||
privileged: false
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
runAsGroup: 101
|
|
||||||
runAsNonRoot: true
|
|
||||||
runAsUser: 101
|
|
||||||
seccompProfile:
|
|
||||||
type: "RuntimeDefault"
|
|
||||||
|
|
||||||
podSecurityContext:
|
|
||||||
enabled: true
|
|
||||||
fsGroup: 101
|
|
||||||
...
|
|
||||||
50
helmfile/apps/element/values-synapse-web.yaml.gotmpl
Normal file
50
helmfile/apps/element/values-synapse-web.yaml.gotmpl
Normal file
@@ -0,0 +1,50 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.synapseWeb | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.synapseWeb.registry | quote }}
|
||||||
|
repository: {{ .Values.images.synapseWeb.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapseWeb.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
host: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.synapseWeb }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.synapseWeb | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -1,60 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.synapse.repository }}"
|
|
||||||
tag: "{{ .Values.images.synapse.tag }}"
|
|
||||||
|
|
||||||
configuration:
|
|
||||||
database:
|
|
||||||
host: "{{ .Values.databases.synapse.host }}"
|
|
||||||
name: "{{ .Values.databases.synapse.name }}"
|
|
||||||
user: "{{ .Values.databases.synapse.username }}"
|
|
||||||
password: "{{ .Values.databases.synapse.password | default .Values.secrets.postgresql.matrixUser }}"
|
|
||||||
|
|
||||||
homeserver:
|
|
||||||
oidc:
|
|
||||||
clientSecret: {{ .Values.secrets.keycloak.clientSecret.matrix }}
|
|
||||||
issuer: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
|
||||||
|
|
||||||
turn:
|
|
||||||
sharedSecret: {{ .Values.turn.credentials }}
|
|
||||||
servers:
|
|
||||||
{{- if .Values.turn.tls.host }}
|
|
||||||
- server: {{ .Values.turn.tls.host }}
|
|
||||||
port: {{ .Values.turn.tls.port }}
|
|
||||||
transport: {{ .Values.turn.transport }}
|
|
||||||
{{- else if .Values.turn.server.host }}
|
|
||||||
- server: {{ .Values.turn.server.host }}
|
|
||||||
port: {{ .Values.turn.server.port }}
|
|
||||||
transport: {{ .Values.turn.transport }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
guestModule:
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.synapseGuestModule.repository }}"
|
|
||||||
tag: "{{ .Values.images.synapseGuestModule.tag }}"
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
size: "{{ .Values.persistence.size.synapse }}"
|
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.synapse }}
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.synapse | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
configuration:
|
|
||||||
homeserver:
|
|
||||||
guestModule:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
containerSecurityContext:
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- "ALL"
|
|
||||||
enabled: true
|
|
||||||
privileged: false
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
runAsNonRoot: true
|
|
||||||
runAsUser: 10991
|
|
||||||
seccompProfile:
|
|
||||||
type: "RuntimeDefault"
|
|
||||||
|
|
||||||
podSecurityContext:
|
|
||||||
enabled: true
|
|
||||||
fsGroup: 10991
|
|
||||||
...
|
|
||||||
115
helmfile/apps/element/values-synapse.yaml.gotmpl
Normal file
115
helmfile/apps/element/values-synapse.yaml.gotmpl
Normal file
@@ -0,0 +1,115 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
additionalConfiguration:
|
||||||
|
user_directory:
|
||||||
|
enabled: true
|
||||||
|
search_all_users: true
|
||||||
|
room_prejoin_state:
|
||||||
|
additional_event_types:
|
||||||
|
- "m.space.parent"
|
||||||
|
- "net.nordeck.meetings.metadata"
|
||||||
|
- "m.room.power_levels"
|
||||||
|
# When a user logs into Element a parallel request is done through Intercom Service to allow Synapse API
|
||||||
|
# interaction, to avoid (temporary) blocking of the user for followup logins we want to raise the limits.
|
||||||
|
# https://matrix-org.github.io/synapse/v1.59/usage/configuration/config_documentation.html#ratelimiting
|
||||||
|
rc_login:
|
||||||
|
account:
|
||||||
|
per_second: 2
|
||||||
|
burst_count: 8
|
||||||
|
address:
|
||||||
|
per_second: 2
|
||||||
|
burst_count: 12
|
||||||
|
|
||||||
|
database:
|
||||||
|
host: {{ .Values.databases.synapse.host | quote }}
|
||||||
|
name: {{ .Values.databases.synapse.name | quote }}
|
||||||
|
user: {{ .Values.databases.synapse.username | quote }}
|
||||||
|
password: {{ .Values.databases.synapse.password | default .Values.secrets.postgresql.matrixUser | quote }}
|
||||||
|
|
||||||
|
homeserver:
|
||||||
|
appServiceConfigs:
|
||||||
|
- as_token: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
|
hs_token: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
|
id: intercom-service
|
||||||
|
namespaces:
|
||||||
|
users:
|
||||||
|
- exclusive: false
|
||||||
|
regex: "@.*"
|
||||||
|
url: null
|
||||||
|
sender_localpart: intercom-service
|
||||||
|
|
||||||
|
oidc:
|
||||||
|
clientId: "opendesk-matrix"
|
||||||
|
clientSecret: {{ .Values.secrets.keycloak.clientSecret.matrix | quote }}
|
||||||
|
issuer: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}"
|
||||||
|
|
||||||
|
turn:
|
||||||
|
sharedSecret: {{ .Values.turn.credentials | quote }}
|
||||||
|
servers:
|
||||||
|
{{- if .Values.turn.tls.host }}
|
||||||
|
- server: {{ .Values.turn.tls.host | quote }}
|
||||||
|
port: {{ .Values.turn.tls.port }}
|
||||||
|
transport: {{ .Values.turn.transport | quote }}
|
||||||
|
{{- else if .Values.turn.server.host }}
|
||||||
|
- server: {{ .Values.turn.server.host | quote }}
|
||||||
|
port: {{ .Values.turn.server.port }}
|
||||||
|
transport: {{ .Values.turn.transport | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
guestModule:
|
||||||
|
enabled: true
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.synapseGuestModule.registry | quote }}
|
||||||
|
repository: {{ .Values.images.synapseGuestModule.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapseGuestModule.tag | quote }}
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 10991
|
||||||
|
runAsGroup: 10991
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.synapse | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.synapse.registry | quote }}
|
||||||
|
repository: {{ .Values.images.synapse.repository | quote }}
|
||||||
|
tag: {{ .Values.images.synapse.tag | quote }}
|
||||||
|
|
||||||
|
persistence:
|
||||||
|
size: {{ .Values.persistence.size.synapse | quote }}
|
||||||
|
storageClass: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 10991
|
||||||
|
|
||||||
|
readinessProbe:
|
||||||
|
initialDelaySeconds: 15
|
||||||
|
periodSeconds: 5
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.synapse }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.synapse | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -1,32 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.wellKnown.repository }}"
|
|
||||||
tag: "{{ .Values.images.wellKnown.tag }}"
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
host: "{{ .Values.global.domain }}"
|
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
|
||||||
tls:
|
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.wellKnown }}
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.wellKnown | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,25 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
configuration:
|
|
||||||
e2ee:
|
|
||||||
forceDisable: true
|
|
||||||
|
|
||||||
containerSecurityContext:
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- "ALL"
|
|
||||||
enabled: true
|
|
||||||
privileged: false
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
runAsGroup: 101
|
|
||||||
runAsNonRoot: true
|
|
||||||
runAsUser: 101
|
|
||||||
seccompProfile:
|
|
||||||
type: "RuntimeDefault"
|
|
||||||
|
|
||||||
podSecurityContext:
|
|
||||||
enabled: true
|
|
||||||
fsGroup: 101
|
|
||||||
...
|
|
||||||
54
helmfile/apps/element/values-well-known.yaml.gotmpl
Normal file
54
helmfile/apps/element/values-well-known.yaml.gotmpl
Normal file
@@ -0,0 +1,54 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
configuration:
|
||||||
|
e2ee:
|
||||||
|
forceDisable: false
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsGroup: 101
|
||||||
|
runAsNonRoot: true
|
||||||
|
runAsUser: 101
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.wellKnown | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.wellKnown.registry | quote }}
|
||||||
|
repository: {{ .Values.images.wellKnown.repository | quote }}
|
||||||
|
tag: {{ .Values.images.wellKnown.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
host: {{ .Values.global.domain | quote }}
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 101
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.wellKnown }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.wellKnown | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -1,30 +1,30 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
---
|
||||||
repositories:
|
repositories:
|
||||||
# Intercom Service
|
# Intercom Service
|
||||||
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/intercom-service
|
# Source: https://gitlab.souvap-univention.de/souvap/tooling/charts/intercom-service
|
||||||
- name: "intercom-service-repo"
|
- name: "intercom-service-repo"
|
||||||
oci: true
|
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
|
||||||
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/intercom-service" }}
|
|
||||||
verify: true
|
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
||||||
|
verify: {{ .Values.charts.intercomService.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.intercomService.registry }}/\
|
||||||
|
{{ .Values.charts.intercomService.repository }}"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "intercom-service"
|
- name: "intercom-service"
|
||||||
chart: "intercom-service-repo/intercom-service"
|
chart: "intercom-service-repo/{{ .Values.charts.intercomService.name }}"
|
||||||
version: "1.1.3"
|
version: "{{ .Values.charts.intercomService.version }}"
|
||||||
values:
|
values:
|
||||||
- "values.yaml"
|
- "values.yaml.gotmpl"
|
||||||
- "values.gotmpl"
|
installed: {{ .Values.intercom.enabled }}
|
||||||
condition: "intercom.enabled"
|
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "intercom-service"
|
component: "intercom-service"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,44 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
ics:
|
|
||||||
secret: {{ .Values.secrets.intercom.secret }}
|
|
||||||
issuerBaseUrl: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap"
|
|
||||||
originRegex: "{{ .Values.istio.domain }}"
|
|
||||||
default:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
oidc:
|
|
||||||
secret: {{ .Values.secrets.keycloak.clientSecret.intercom }}
|
|
||||||
matrix:
|
|
||||||
asSecret: {{ .Values.secrets.jitsi.synapseAsToken }}
|
|
||||||
serverName: "matrix.{{ .Values.global.domain }}"
|
|
||||||
portal:
|
|
||||||
apiKey: {{ .Values.secrets.centralnavigation.apiKey }}
|
|
||||||
redis:
|
|
||||||
password: {{ .Values.secrets.redis.password }}
|
|
||||||
openxchange:
|
|
||||||
url: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
|
||||||
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.intercom.repository }}"
|
|
||||||
tag: "{{ .Values.images.intercom.tag }}"
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
host: "{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}"
|
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
|
||||||
tls:
|
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
...
|
|
||||||
@@ -1,8 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
istio:
|
|
||||||
enabled: false
|
|
||||||
virtualService:
|
|
||||||
enabled: false
|
|
||||||
...
|
|
||||||
80
helmfile/apps/intercom-service/values.yaml.gotmpl
Normal file
80
helmfile/apps/intercom-service/values.yaml.gotmpl
Normal file
@@ -0,0 +1,80 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
|
---
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 1000
|
||||||
|
runAsGroup: 1000
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.intercom | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
ics:
|
||||||
|
secret: {{ .Values.secrets.intercom.secret | quote }}
|
||||||
|
issuerBaseUrl: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/{{ .Values.platform.realm }}"
|
||||||
|
originRegex: "{{ .Values.istio.domain }}|{{ .Values.global.domain }}"
|
||||||
|
keycloak:
|
||||||
|
realm: {{ .Values.platform.realm | quote }}
|
||||||
|
default:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
oidc:
|
||||||
|
id: "opendesk-intercom"
|
||||||
|
secret: {{ .Values.secrets.keycloak.clientSecret.intercom | quote }}
|
||||||
|
matrix:
|
||||||
|
asSecret: {{ .Values.secrets.intercom.synapseAsToken | quote }}
|
||||||
|
subdomain: {{ .Values.global.hosts.synapse | quote }}
|
||||||
|
serverName: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
|
||||||
|
nordeck:
|
||||||
|
subdomain: {{ .Values.global.hosts.matrixNeoDateFixBot | quote }}
|
||||||
|
portal:
|
||||||
|
apiKey: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
|
redis:
|
||||||
|
host: {{ .Values.cache.intercomService.host | quote }}
|
||||||
|
port: {{ .Values.cache.intercomService.port }}
|
||||||
|
password: {{ .Values.cache.intercomService.password | default .Values.secrets.redis.password | quote }}
|
||||||
|
openxchange:
|
||||||
|
oci: true
|
||||||
|
url: "https://{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
||||||
|
audience: "opendesk-oxappsuite"
|
||||||
|
nextcloud:
|
||||||
|
audience: "opendesk-nextcloud"
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.intercom.registry | quote }}
|
||||||
|
repository: {{ .Values.images.intercom.repository | quote }}
|
||||||
|
tag: {{ .Values.images.intercom.tag | quote }}
|
||||||
|
|
||||||
|
ingress:
|
||||||
|
host: "{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}"
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
tls:
|
||||||
|
enabled: {{ .Values.ingress.tls.enabled }}
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
|
||||||
|
podSecurityContext:
|
||||||
|
enabled: true
|
||||||
|
fsGroup: 1000
|
||||||
|
fsGroupChangePolicy: "Always"
|
||||||
|
|
||||||
|
replicaCount: {{ .Values.replicas.intercomService }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.intercomService | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -1,30 +1,31 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
---
|
||||||
repositories:
|
repositories:
|
||||||
# openDesk Jitsi
|
# openDesk Jitsi
|
||||||
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-jitsi
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-jitsi
|
||||||
- name: "jitsi-repo"
|
- name: "jitsi-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.jitsi.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.jitsi.registry }}/\
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
{{ .Values.charts.jitsi.repository }}"
|
||||||
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-jitsi" }}
|
|
||||||
verify: true
|
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "jitsi"
|
- name: "jitsi"
|
||||||
chart: "jitsi-repo/sovereign-workplace-jitsi"
|
chart: "jitsi-repo/{{ .Values.charts.jitsi.name }}"
|
||||||
version: "1.5.1"
|
version: "{{ .Values.charts.jitsi.version }}"
|
||||||
values:
|
values:
|
||||||
- "values-jitsi.gotmpl"
|
- "values-jitsi.yaml.gotmpl"
|
||||||
condition: "jitsi.enabled"
|
installed: {{ .Values.jitsi.enabled }}
|
||||||
timeout: 900
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "jitsi"
|
component: "jitsi"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,133 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
cleanup:
|
|
||||||
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
|
||||||
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.jitsiKeycloakAdapter.repository }}"
|
|
||||||
tag: "{{ .Values.images.jitsiKeycloakAdapter.tag }}"
|
|
||||||
|
|
||||||
settings:
|
|
||||||
jwtAppSecret: "{{ .Values.secrets.jitsi.jwtAppSecret }}"
|
|
||||||
|
|
||||||
theme:
|
|
||||||
{{ .Values.theme | toYaml | nindent 2 }}
|
|
||||||
|
|
||||||
jitsi:
|
|
||||||
publicURL: "https://{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
|
||||||
web:
|
|
||||||
replicaCount: {{ .Values.replicas.jitsi }}
|
|
||||||
image:
|
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jitsi.repository }}"
|
|
||||||
tag: "{{ .Values.images.jitsi.tag }}"
|
|
||||||
ingress:
|
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
|
||||||
hosts:
|
|
||||||
- host: "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
|
||||||
paths:
|
|
||||||
- "/"
|
|
||||||
tls:
|
|
||||||
- secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
hosts:
|
|
||||||
- "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
|
||||||
extraEnvs:
|
|
||||||
TURN_ENABLE: "1"
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.jitsi | toYaml | nindent 6 }}
|
|
||||||
prosody:
|
|
||||||
image:
|
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.prosody.repository }}"
|
|
||||||
tag: "{{ .Values.images.prosody.tag }}"
|
|
||||||
imagePullSecrets:
|
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
|
||||||
- name: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
extraEnvs:
|
|
||||||
- name: "AUTH_TYPE"
|
|
||||||
value: "hybrid_matrix_token"
|
|
||||||
- name: "JWT_APP_ID"
|
|
||||||
value: "myappid"
|
|
||||||
- name: "JWT_APP_SECRET"
|
|
||||||
value: "{{ .Values.secrets.jitsi.jwtAppSecret }}"
|
|
||||||
- name: TURNS_HOST
|
|
||||||
value: "{{ .Values.turn.tls.host }}"
|
|
||||||
- name: TURNS_PORT
|
|
||||||
value: "{{ .Values.turn.tls.port }}"
|
|
||||||
- name: TURN_HOST
|
|
||||||
value: "{{ .Values.turn.server.host }}"
|
|
||||||
- name: TURN_PORT
|
|
||||||
value: "{{ .Values.turn.server.port }}"
|
|
||||||
- name: TURN_TRANSPORT
|
|
||||||
value: "{{ .Values.turn.transport }}"
|
|
||||||
- name: TURN_CREDENTIALS
|
|
||||||
value: "{{ .Values.turn.credentials }}"
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.prosody | toYaml | nindent 6 }}
|
|
||||||
persistence:
|
|
||||||
size: "{{ .Values.persistence.size.prosody }}"
|
|
||||||
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
|
||||||
jicofo:
|
|
||||||
replicaCount: {{ .Values.replicas.jicofo }}
|
|
||||||
image:
|
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jicofo.repository }}"
|
|
||||||
tag: "{{ .Values.images.jicofo.tag }}"
|
|
||||||
xmpp:
|
|
||||||
password: "{{ .Values.secrets.jitsi.jicofoAuthPassword }}"
|
|
||||||
componentSecret: "{{ .Values.secrets.jitsi.jicofoComponentPassword }}"
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.jicofo | toYaml | nindent 6 }}
|
|
||||||
jvb:
|
|
||||||
replicaCount: {{ .Values.replicas.jvb }}
|
|
||||||
image:
|
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jvb.repository }}"
|
|
||||||
tag: "{{ .Values.images.jvb.tag }}"
|
|
||||||
xmpp:
|
|
||||||
password: "{{ .Values.secrets.jitsi.jvbAuthPassword }}"
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.jvb | toYaml | nindent 6 }}
|
|
||||||
service:
|
|
||||||
type: "{{ .Values.cluster.service.type }}"
|
|
||||||
jibri:
|
|
||||||
replicaCount: {{ .Values.replicas.jibri }}
|
|
||||||
image:
|
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.jibri.repository }}"
|
|
||||||
tag: "{{ .Values.images.jibri.tag }}"
|
|
||||||
recorder:
|
|
||||||
password: "{{ .Values.secrets.jitsi.jibriRecorderPassword }}"
|
|
||||||
xmpp:
|
|
||||||
password: "{{ .Values.secrets.jitsi.jibriXmppPassword }}"
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.jibri | toYaml | nindent 6 }}
|
|
||||||
imagePullSecrets:
|
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
|
||||||
- name: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
patchJVB:
|
|
||||||
configuration:
|
|
||||||
staticLoadbalancerIP: "{{ .Values.cluster.networking.ingressGatewayIP }}"
|
|
||||||
loadbalancerStatusField: "{{ .Values.cluster.networking.loadBalancerStatusField }}"
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.jitsiPatchJVB.repository }}"
|
|
||||||
tag: "{{ .Values.images.jitsiPatchJVB.tag }}"
|
|
||||||
replicaCount: {{ .Values.replicas.jitsiKeycloakAdapter }}
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.jitsiKeycloakAdapter | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
221
helmfile/apps/jitsi/values-jitsi.yaml.gotmpl
Normal file
221
helmfile/apps/jitsi/values-jitsi.yaml.gotmpl
Normal file
@@ -0,0 +1,221 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
enabled: true
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
privileged: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
runAsUser: 1993
|
||||||
|
runAsGroup: 1993
|
||||||
|
runAsNonRoot: true
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.jitsiKeycloakAdapter | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.jitsiKeycloakAdapter.registry | quote }}
|
||||||
|
repository: {{ .Values.images.jitsiKeycloakAdapter.repository | quote }}
|
||||||
|
tag: {{ .Values.images.jitsiKeycloakAdapter.tag | quote }}
|
||||||
|
|
||||||
|
settings:
|
||||||
|
jwtAppSecret: {{ .Values.secrets.jitsi.jwtAppSecret | quote }}
|
||||||
|
keycloakRealm: {{ .Values.platform.realm | quote }}
|
||||||
|
keycloakClientId: "opendesk-jitsi"
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
jitsi:
|
||||||
|
publicURL: "https://{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
||||||
|
web:
|
||||||
|
replicaCount: {{ .Values.replicas.jitsi }}
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.jitsi.registry }}/{{ .Values.images.jitsi.repository }}"
|
||||||
|
tag: {{ .Values.images.jitsi.tag | quote }}
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
hosts:
|
||||||
|
- host: "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
||||||
|
paths:
|
||||||
|
- "/"
|
||||||
|
tls:
|
||||||
|
- secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
hosts:
|
||||||
|
- "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
||||||
|
extraEnvs:
|
||||||
|
TURN_ENABLE: "1"
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.jitsi | toYaml | nindent 6 }}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities: {}
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsGroup: 0
|
||||||
|
runAsNonRoot: false
|
||||||
|
runAsUser: 0
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.jitsi | toYaml | nindent 8 }}
|
||||||
|
prosody:
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.prosody.registry }}/{{ .Values.images.prosody.repository }}"
|
||||||
|
tag: {{ .Values.images.prosody.tag | quote }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
extraEnvs:
|
||||||
|
- name: "AUTH_TYPE"
|
||||||
|
value: "hybrid_matrix_token"
|
||||||
|
- name: "JWT_APP_ID"
|
||||||
|
value: "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
||||||
|
- name: "JWT_APP_SECRET"
|
||||||
|
value: {{ .Values.secrets.jitsi.jwtAppSecret | quote }}
|
||||||
|
- name: "MATRIX_UVS_SYNC_POWER_LEVELS"
|
||||||
|
value: "true"
|
||||||
|
- name: "MATRIX_UVS_URL"
|
||||||
|
value: "http://opendesk-matrix-user-verification-service.{{ .Release.Namespace }}.svc.{{ .Values.cluster.networking.domain }}"
|
||||||
|
- name: TURNS_HOST
|
||||||
|
value: {{ .Values.turn.tls.host | quote }}
|
||||||
|
- name: TURNS_PORT
|
||||||
|
value: {{ .Values.turn.tls.port | quote }}
|
||||||
|
- name: TURN_HOST
|
||||||
|
value: {{ .Values.turn.server.host | quote }}
|
||||||
|
- name: TURN_PORT
|
||||||
|
value: {{ .Values.turn.server.port | quote }}
|
||||||
|
- name: TURN_TRANSPORT
|
||||||
|
value: {{ .Values.turn.transport | quote }}
|
||||||
|
- name: TURN_CREDENTIALS
|
||||||
|
value: {{ .Values.turn.credentials | quote }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.prosody | toYaml | nindent 6 }}
|
||||||
|
persistence:
|
||||||
|
size: {{ .Values.persistence.size.prosody | quote }}
|
||||||
|
storageClassName: {{ .Values.persistence.storageClassNames.RWO | quote }}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities: {}
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsGroup: 0
|
||||||
|
runAsNonRoot: false
|
||||||
|
runAsUser: 0
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.prosody | toYaml | nindent 8 }}
|
||||||
|
jicofo:
|
||||||
|
replicaCount: {{ .Values.replicas.jicofo }}
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.jicofo.registry }}/{{ .Values.images.jicofo.repository }}"
|
||||||
|
tag: {{ .Values.images.jicofo.tag | quote }}
|
||||||
|
xmpp:
|
||||||
|
password: {{ .Values.secrets.jitsi.jicofoAuthPassword | quote }}
|
||||||
|
componentSecret: {{ .Values.secrets.jitsi.jicofoComponentPassword | quote }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.jicofo | toYaml | nindent 6 }}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities: {}
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsGroup: 0
|
||||||
|
runAsNonRoot: false
|
||||||
|
runAsUser: 0
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.jicofo | toYaml | nindent 8 }}
|
||||||
|
jvb:
|
||||||
|
replicaCount: {{ .Values.replicas.jvb }}
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.jvb.registry }}/{{ .Values.images.jvb.repository }}"
|
||||||
|
tag: {{ .Values.images.jvb.tag | quote }}
|
||||||
|
xmpp:
|
||||||
|
password: {{ .Values.secrets.jitsi.jvbAuthPassword | quote }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.jvb | toYaml | nindent 6 }}
|
||||||
|
service:
|
||||||
|
type: {{ .Values.cluster.service.type | quote }}
|
||||||
|
securityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities: {}
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsGroup: 0
|
||||||
|
runAsNonRoot: false
|
||||||
|
runAsUser: 0
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.jvb | toYaml | nindent 8 }}
|
||||||
|
jibri:
|
||||||
|
replicaCount: {{ .Values.replicas.jibri }}
|
||||||
|
image:
|
||||||
|
repository: "{{ .Values.global.imageRegistry | default .Values.images.jibri.registry }}/{{ .Values.images.jibri.repository }}"
|
||||||
|
tag: {{ .Values.images.jibri.tag | quote }}
|
||||||
|
recorder:
|
||||||
|
password: {{ .Values.secrets.jitsi.jibriRecorderPassword | quote }}
|
||||||
|
xmpp:
|
||||||
|
password: {{ .Values.secrets.jitsi.jibriXmppPassword | quote }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.jibri | toYaml | nindent 6 }}
|
||||||
|
securityContext:
|
||||||
|
# Chart does not allow to template more
|
||||||
|
capabilities:
|
||||||
|
add: ["SYS_ADMIN"]
|
||||||
|
imagePullSecrets:
|
||||||
|
{{- range .Values.global.imagePullSecrets }}
|
||||||
|
- name: {{ . | quote }}
|
||||||
|
{{- end }}
|
||||||
|
|
||||||
|
patchJVB:
|
||||||
|
configuration:
|
||||||
|
staticLoadbalancerIP: {{ .Values.cluster.networking.ingressGatewayIP | quote }}
|
||||||
|
loadbalancerStatusField: {{ .Values.cluster.networking.loadBalancerStatusField | quote }}
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsUser: 1001
|
||||||
|
runAsGroup: 1001
|
||||||
|
runAsNonRoot: true
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.jitsiPatchJVB | toYaml | nindent 6 }}
|
||||||
|
image:
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.jitsiPatchJVB.registry | quote }}
|
||||||
|
repository: {{ .Values.images.jitsiPatchJVB.repository | quote }}
|
||||||
|
tag: {{ .Values.images.jitsiPatchJVB.tag | quote }}
|
||||||
|
replicaCount: {{ .Values.replicas.jitsiKeycloakAdapter }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.jitsiKeycloakAdapter | toYaml | nindent 2 }}
|
||||||
|
...
|
||||||
@@ -1,34 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
repositories:
|
|
||||||
# openDesk Keycloak Bootstrap
|
|
||||||
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-keycloak-bootstrap
|
|
||||||
- name: "opendesk-keycloak-bootstrap-repo"
|
|
||||||
oci: true
|
|
||||||
# yamllint disable rule:line-length
|
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
|
||||||
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-keycloak-bootstrap" }}
|
|
||||||
# yamllint enable rule:line-length
|
|
||||||
verify: true
|
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
|
||||||
|
|
||||||
releases:
|
|
||||||
- name: "opendesk-keycloak-bootstrap"
|
|
||||||
chart: "opendesk-keycloak-bootstrap-repo/sovereign-workplace-keycloak-bootstrap"
|
|
||||||
version: "1.1.11"
|
|
||||||
values:
|
|
||||||
- "values-bootstrap.gotmpl"
|
|
||||||
- "values-bootstrap.yaml"
|
|
||||||
condition: "keycloak.enabled"
|
|
||||||
# as we have seen some slow clusters we want to ensure we not just fail due to a timeout.
|
|
||||||
timeout: 1800
|
|
||||||
|
|
||||||
commonLabels:
|
|
||||||
deploy-stage: "component-1"
|
|
||||||
component: "keycloak-bootstrap"
|
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
|
||||||
@@ -1,30 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
cleanup:
|
|
||||||
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
|
||||||
keepPVCOnDelete: {{ .Values.cleanup.keepPVCOnDelete }}
|
|
||||||
|
|
||||||
config:
|
|
||||||
administrator:
|
|
||||||
password: "{{ .Values.secrets.keycloak.adminPassword }}"
|
|
||||||
|
|
||||||
image:
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.keycloakBootstrap.repository }}"
|
|
||||||
tag: "{{ .Values.images.keycloakBootstrap.tag }}"
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.keycloakBootstrap | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,7 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
config:
|
|
||||||
administrator:
|
|
||||||
username: "kcadmin"
|
|
||||||
...
|
|
||||||
@@ -1,61 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
repositories:
|
|
||||||
# VMWare Bitnami
|
|
||||||
# Source: https://github.com/bitnami/charts/
|
|
||||||
- name: "bitnami-repo"
|
|
||||||
oci: true
|
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
|
||||||
default "registry-1.docker.io/bitnamicharts" }}
|
|
||||||
# Bitnami charts are not signed, see https://github.com/bitnami/charts/issues/14491
|
|
||||||
verify: false
|
|
||||||
# openDesk Keycloak Theme
|
|
||||||
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-keycloak-theme
|
|
||||||
- name: "keycloak-theme-repo"
|
|
||||||
oci: true
|
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" |
|
|
||||||
default "external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/keycloak-theme" }}
|
|
||||||
verify: true
|
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
|
||||||
# openDesk Keycloak Extensions
|
|
||||||
- name: "keycloak-extensions-repo"
|
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
|
||||||
default "https://gitlab.souvap-univention.de/api/v4/projects/77/packages/helm/stable" }}
|
|
||||||
|
|
||||||
releases:
|
|
||||||
- name: "keycloak-theme"
|
|
||||||
chart: "keycloak-theme-repo/opendesk-keycloak-theme"
|
|
||||||
version: "2.0.0"
|
|
||||||
values:
|
|
||||||
- "values-theme.gotmpl"
|
|
||||||
condition: "keycloak.enabled"
|
|
||||||
- name: "keycloak"
|
|
||||||
chart: "bitnami-repo/keycloak"
|
|
||||||
version: "12.2.0"
|
|
||||||
values:
|
|
||||||
- "values-keycloak.gotmpl"
|
|
||||||
- "values-keycloak.yaml"
|
|
||||||
- "values-keycloak-idp.yaml"
|
|
||||||
wait: true
|
|
||||||
condition: "keycloak.enabled"
|
|
||||||
- name: "keycloak-extensions"
|
|
||||||
chart: "keycloak-extensions-repo/keycloak-extensions"
|
|
||||||
version: "0.1.0"
|
|
||||||
needs:
|
|
||||||
- "keycloak"
|
|
||||||
values:
|
|
||||||
- "values-extensions.yaml"
|
|
||||||
- "values-extensions.gotmpl"
|
|
||||||
condition: "keycloak.enabled"
|
|
||||||
|
|
||||||
commonLabels:
|
|
||||||
deploy-stage: "component-1"
|
|
||||||
component: "keycloak"
|
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
|
||||||
@@ -1,46 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
keycloak:
|
|
||||||
adminPassword: {{ .Values.secrets.keycloak.adminPassword }}
|
|
||||||
postgresql:
|
|
||||||
connection:
|
|
||||||
host: "{{ .Values.databases.keycloakExtension.host }}"
|
|
||||||
port: "{{ .Values.databases.keycloakExtension.port }}"
|
|
||||||
auth:
|
|
||||||
database: "{{ .Values.databases.keycloakExtension.name }}"
|
|
||||||
username: "{{ .Values.databases.keycloakExtension.username }}"
|
|
||||||
password: {{ .Values.databases.keycloakExtension.password | default .Values.secrets.postgresql.keycloakExtensionUser }}
|
|
||||||
handler:
|
|
||||||
image:
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.keycloakExtensionHandler.repository }}"
|
|
||||||
tag: "{{ .Values.images.keycloakExtensionHandler.tag }}"
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
appConfig:
|
|
||||||
smtpPassword: "{{ .Values.smtp.password }}"
|
|
||||||
smtpHost: "{{ .Values.smtp.host }}"
|
|
||||||
smtpUsername: "{{ .Values.smtp.username }}"
|
|
||||||
mailFrom: "noreply@{{ .Values.global.domain }}"
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.keycloakExtension | toYaml | nindent 4 }}
|
|
||||||
proxy:
|
|
||||||
image:
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.keycloakExtensionProxy.repository }}"
|
|
||||||
tag: "{{ .Values.images.keycloakExtensionProxy.tag }}"
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
ingress:
|
|
||||||
enabled: "{{ .Values.ingress.enabled }}"
|
|
||||||
ingressClassName: "{{ .Values.ingress.ingressClassName }}"
|
|
||||||
host: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
|
||||||
tls:
|
|
||||||
enabled: "{{ .Values.ingress.tls.enabled }}"
|
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.keycloakProxy | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
...
|
|
||||||
@@ -1,45 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
keycloak:
|
|
||||||
host: "keycloak"
|
|
||||||
adminUsername: "kcadmin"
|
|
||||||
adminRealm: "master"
|
|
||||||
realm: "souvap"
|
|
||||||
|
|
||||||
handler:
|
|
||||||
appConfig:
|
|
||||||
captchaProtectionEnable: "False"
|
|
||||||
securityContext:
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- "ALL"
|
|
||||||
seccompProfile:
|
|
||||||
type: "RuntimeDefault"
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
runAsUser: 1000
|
|
||||||
runAsGroup: 1000
|
|
||||||
runAsNonRoot: true
|
|
||||||
|
|
||||||
postgresql:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
proxy:
|
|
||||||
ingress:
|
|
||||||
annotations:
|
|
||||||
nginx.org/proxy-buffer-size: "8k"
|
|
||||||
nginx.ingress.kubernetes.io/proxy-buffer-size: "8k"
|
|
||||||
securityContext:
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- "ALL"
|
|
||||||
seccompProfile:
|
|
||||||
type: "RuntimeDefault"
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
runAsUser: 1000
|
|
||||||
runAsGroup: 1000
|
|
||||||
runAsNonRoot: true
|
|
||||||
...
|
|
||||||
File diff suppressed because it is too large
Load Diff
@@ -1,89 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
imageRegistry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
|
||||||
|
|
||||||
image:
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.keycloak.repository }}"
|
|
||||||
tag: "{{ .Values.images.keycloak.tag }}"
|
|
||||||
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
|
|
||||||
externalDatabase:
|
|
||||||
host: "{{ .Values.databases.keycloak.host }}"
|
|
||||||
port: {{ .Values.databases.keycloak.port }}
|
|
||||||
user: "{{ .Values.databases.keycloak.username }}"
|
|
||||||
database: "{{ .Values.databases.keycloak.name }}"
|
|
||||||
password: {{ .Values.databases.keycloak.password | default .Values.secrets.postgresql.keycloakUser }}
|
|
||||||
|
|
||||||
auth:
|
|
||||||
adminPassword: {{ .Values.secrets.keycloak.adminPassword }}
|
|
||||||
|
|
||||||
replicaCount: {{ .Values.replicas.keycloak }}
|
|
||||||
|
|
||||||
keycloakConfigCli:
|
|
||||||
extraEnvVars:
|
|
||||||
- name: "LDAP_GROUPS_DN"
|
|
||||||
value: "cn=groups,dc=swp-ldap,dc=internal"
|
|
||||||
- name: "LDAP_USERS_DN"
|
|
||||||
value: "cn=users,dc=swp-ldap,dc=internal"
|
|
||||||
- name: "LDAP_SERVER_URL"
|
|
||||||
value: "univention-corporate-container"
|
|
||||||
- name: "IDENTIFIER"
|
|
||||||
value: "souvap"
|
|
||||||
- name: "THEME"
|
|
||||||
value: "souvap"
|
|
||||||
- name: "KEYCLOAK_AVAILABILITYCHECK_TIMEOUT"
|
|
||||||
value: "600s"
|
|
||||||
- name: "UNIVENTION_CORPORATE_SERVER_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.univentionCorporateServer }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "KEYCLOAK_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "OPENXCHANGE_8_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.openxchange }}.{{ .Values.istio.domain }}"
|
|
||||||
- name: "XWIKI_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.xwiki }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "OPENPROJECT_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.openproject }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "NEXTCLOUD_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "MATRIX_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.synapse }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "JITSI_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.jitsi }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "ELEMENT_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.element }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "INTERCOM_SERVICE_DOMAIN"
|
|
||||||
value: "{{ .Values.global.hosts.intercomService }}.{{ .Values.global.domain }}"
|
|
||||||
- name: "CLIENT_SECRET_INTERCOM_PASSWORD"
|
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.intercom }}
|
|
||||||
- name: "CLIENT_SECRET_MATRIX_PASSWORD"
|
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.matrix }}
|
|
||||||
- name: "CLIENT_SECRET_JITSI_PASSWORD"
|
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.jitsi }}
|
|
||||||
- name: "CLIENT_SECRET_NCOIDC_PASSWORD"
|
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.ncoidc }}
|
|
||||||
- name: "CLIENT_SECRET_OPENPROJECT_PASSWORD"
|
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.openproject }}
|
|
||||||
- name: "CLIENT_SECRET_XWIKI_PASSWORD"
|
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.xwiki }}
|
|
||||||
- name: "CLIENT_SECRET_AS8OIDC_PASSWORD"
|
|
||||||
value: {{ .Values.secrets.keycloak.clientSecret.as8oidc }}
|
|
||||||
- name: "KEYCLOAK_STORAGEPROVICER_UCSLDAP_NAME"
|
|
||||||
value: "storage_provider_ucsldap"
|
|
||||||
- name: "LDAPSEARCH_PASSWORD"
|
|
||||||
value: {{ .Values.secrets.univentionCorporateServer.ldapSearch.keycloak }}
|
|
||||||
- name: "LDAPSEARCH_USERNAME"
|
|
||||||
value: "ldapsearch_keycloak"
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.keycloak | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.keycloak | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,85 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
postgresql:
|
|
||||||
enabled: false
|
|
||||||
externalDatabase:
|
|
||||||
existingSecret: ""
|
|
||||||
existingSecretPasswordKey: ""
|
|
||||||
auth:
|
|
||||||
adminUser: "kcadmin"
|
|
||||||
# not working as expected with older helm chart, check if it works with most recent one.
|
|
||||||
# meanwhile we set the loglevel using the extraEnvVars a bit below.
|
|
||||||
# logging:
|
|
||||||
# level: "DEBUG"
|
|
||||||
extraEnvVars:
|
|
||||||
- name: "KC_LOG_LEVEL"
|
|
||||||
value: "INFO"
|
|
||||||
extraStartupArgs: >
|
|
||||||
-Dkeycloak.profile.feature.token_exchange=enabled
|
|
||||||
-Dkeycloak.profile.feature.admin_fine_grained_authz=enabled
|
|
||||||
|
|
||||||
service:
|
|
||||||
type: "ClusterIP"
|
|
||||||
ingress:
|
|
||||||
enabled: false
|
|
||||||
extraVolumes:
|
|
||||||
- name: "keycloak-theme"
|
|
||||||
configMap:
|
|
||||||
name: "keycloak-theme"
|
|
||||||
items:
|
|
||||||
- key: "theme.properties"
|
|
||||||
path: "souvap/login/theme.properties"
|
|
||||||
- key: "messages_de.properties"
|
|
||||||
path: "souvap/login/messages/messages_de.properties"
|
|
||||||
- key: "messages_en.properties"
|
|
||||||
path: "souvap/login/messages/messages_en.properties"
|
|
||||||
- key: "styles.css"
|
|
||||||
path: "souvap/login/resources/css/styles.css"
|
|
||||||
- key: "logo.svg"
|
|
||||||
path: "souvap/login/resources/img/logo_phoenix.svg"
|
|
||||||
- key: "login.ftl"
|
|
||||||
path: "souvap/login/login.ftl"
|
|
||||||
extraVolumeMounts:
|
|
||||||
- name: "keycloak-theme"
|
|
||||||
mountPath: "/opt/bitnami/keycloak/themes"
|
|
||||||
|
|
||||||
keycloakConfigCli:
|
|
||||||
enabled: true
|
|
||||||
command:
|
|
||||||
- "java"
|
|
||||||
- "-jar"
|
|
||||||
- "/opt/bitnami/keycloak-config-cli/keycloak-config-cli-19.0.3.jar"
|
|
||||||
args:
|
|
||||||
- "--import.var-substitution.enabled=true"
|
|
||||||
cache:
|
|
||||||
enabled: false
|
|
||||||
containerSecurityContext:
|
|
||||||
enabled: true
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- "ALL"
|
|
||||||
seccompProfile:
|
|
||||||
type: "RuntimeDefault"
|
|
||||||
readOnlyRootFilesystem: true
|
|
||||||
runAsUser: 1001
|
|
||||||
runAsGroup: 1001
|
|
||||||
runAsNonRoot: true
|
|
||||||
|
|
||||||
containerSecurityContext:
|
|
||||||
allowPrivilegeEscalation: false
|
|
||||||
capabilities:
|
|
||||||
drop:
|
|
||||||
- "ALL"
|
|
||||||
seccompProfile:
|
|
||||||
type: "RuntimeDefault"
|
|
||||||
readOnlyRootFilesystem: false
|
|
||||||
runAsUser: 1001
|
|
||||||
runAsGroup: 1001
|
|
||||||
runAsNonRoot: true
|
|
||||||
|
|
||||||
podSecurityContext:
|
|
||||||
fsGroup: 1001
|
|
||||||
fsGroupChangePolicy: "OnRootMismatch"
|
|
||||||
...
|
|
||||||
@@ -1,13 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
theme:
|
|
||||||
{{ .Values.theme | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,53 +1,49 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
---
|
||||||
repositories:
|
repositories:
|
||||||
# openDesk Keycloak Bootstrap
|
|
||||||
# Source:
|
|
||||||
# https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/sovereign-workplace-nextcloud-bootstrap
|
|
||||||
- name: "opendesk-nextcloud-bootstrap-repo"
|
|
||||||
oci: true
|
|
||||||
# yamllint disable rule:line-length
|
|
||||||
url: >-
|
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
|
||||||
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-nextcloud-bootstrap" }}
|
|
||||||
# yamllint enable rule:line-length
|
|
||||||
verify: true
|
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
|
||||||
# Nextcloud
|
# Nextcloud
|
||||||
# Source: https://github.com/nextcloud/helm/
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-nextcloud
|
||||||
|
- name: "nextcloud-management-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.nextcloudManagement.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.nextcloudManagement.registry }}/\
|
||||||
|
{{ .Values.charts.nextcloudManagement.repository }}"
|
||||||
- name: "nextcloud-repo"
|
- name: "nextcloud-repo"
|
||||||
url: >-
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
{{ env "PRIVATE_CHART_REPOSITORY_URL" |
|
verify: {{ .Values.charts.nextcloud.verify }}
|
||||||
default "https://nextcloud.github.io/helm/" }}
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
|
oci: true
|
||||||
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.nextcloud.registry }}/\
|
||||||
|
{{ .Values.charts.nextcloud.repository }}"
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "opendesk-nextcloud-bootstrap"
|
- name: "opendesk-nextcloud-management"
|
||||||
chart: "opendesk-nextcloud-bootstrap-repo/opendesk-nextcloud-bootstrap"
|
chart: "nextcloud-repo/{{ .Values.charts.nextcloudManagement.name }}"
|
||||||
version: "3.1.2"
|
version: "{{ .Values.charts.nextcloudManagement.version }}"
|
||||||
wait: true
|
values:
|
||||||
|
- "values-nextcloud-mgmt.yaml.gotmpl"
|
||||||
waitForJobs: true
|
waitForJobs: true
|
||||||
values:
|
wait: true
|
||||||
- "values-bootstrap.gotmpl"
|
installed: {{ .Values.nextcloud.enabled }}
|
||||||
- "values-bootstrap.yaml"
|
|
||||||
condition: "nextcloud.enabled"
|
|
||||||
timeout: 900
|
timeout: 900
|
||||||
|
- name: "opendesk-nextcloud"
|
||||||
- name: "nextcloud"
|
chart: "nextcloud-repo/{{ .Values.charts.nextcloud.name }}"
|
||||||
chart: "nextcloud-repo/nextcloud"
|
version: "{{ .Values.charts.nextcloud.version }}"
|
||||||
version: "3.5.19"
|
values:
|
||||||
|
- "values-nextcloud.yaml.gotmpl"
|
||||||
needs:
|
needs:
|
||||||
- "opendesk-nextcloud-bootstrap"
|
- "opendesk-nextcloud-management"
|
||||||
values:
|
installed: {{ .Values.nextcloud.enabled }}
|
||||||
- "values-nextcloud.gotmpl"
|
|
||||||
- "values-nextcloud.yaml"
|
|
||||||
condition: "nextcloud.enabled"
|
|
||||||
timeout: 900
|
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "nextcloud"
|
component: "nextcloud"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,76 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
global:
|
|
||||||
domain: "{{ .Values.global.domain }}"
|
|
||||||
istioDomain: "{{ .Values.istio.domain }}"
|
|
||||||
hosts:
|
|
||||||
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
imagePullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
config:
|
|
||||||
administrator:
|
|
||||||
password: {{ .Values.secrets.nextcloud.adminPassword }}
|
|
||||||
|
|
||||||
antivirus:
|
|
||||||
{{- if .Values.clamavDistributed.enabled }}
|
|
||||||
host: "clamav-icap"
|
|
||||||
{{- else if .Values.clamavSimple.enabled }}
|
|
||||||
host: "clamav-simple"
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
apps:
|
|
||||||
integrationSwp:
|
|
||||||
password: {{ .Values.secrets.centralnavigation.apiKey }}
|
|
||||||
userOidc:
|
|
||||||
password: {{ .Values.secrets.keycloak.clientSecret.ncoidc }}
|
|
||||||
|
|
||||||
database:
|
|
||||||
host: "{{ .Values.databases.nextcloud.host }}"
|
|
||||||
name: "{{ .Values.databases.nextcloud.name }}"
|
|
||||||
user: "{{ .Values.databases.nextcloud.username }}"
|
|
||||||
password: "{{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser }}"
|
|
||||||
|
|
||||||
ldapSearch:
|
|
||||||
password: "{{ .Values.secrets.univentionCorporateServer.ldapSearch.nextcloud }}"
|
|
||||||
|
|
||||||
smtp:
|
|
||||||
host: "{{ .Values.smtp.host }}"
|
|
||||||
username: "{{ .Values.smtp.username }}"
|
|
||||||
password: "{{ .Values.smtp.password }}"
|
|
||||||
|
|
||||||
cleanup:
|
|
||||||
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
|
||||||
deletePodsOnSuccessTimeout: {{ .Values.cleanup.deletePodsOnSuccessTimeout }}
|
|
||||||
keepPVCOnDelete: {{ .Values.cleanup.keepPVCOnDelete }}
|
|
||||||
|
|
||||||
image:
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
repository: "{{ .Values.images.nextcloud.repository }}"
|
|
||||||
tag: "{{ .Values.images.nextcloud.tag }}"
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
|
||||||
accessModes:
|
|
||||||
- "ReadWriteMany"
|
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWX }}"
|
|
||||||
{{- else }}
|
|
||||||
accessModes:
|
|
||||||
- "ReadWriteOnce"
|
|
||||||
storageClass: "{{ .Values.persistence.storageClassNames.RWO }}"
|
|
||||||
{{- end }}
|
|
||||||
size:
|
|
||||||
main: "{{ .Values.persistence.size.nextcloud.main }}"
|
|
||||||
data: "{{ .Values.persistence.size.nextcloud.data }}"
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.nextcloud | toYaml | nindent 2 }}
|
|
||||||
|
|
||||||
theme:
|
|
||||||
{{ .Values.theme | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
config:
|
|
||||||
administrator:
|
|
||||||
username: "nextcloud"
|
|
||||||
|
|
||||||
apps:
|
|
||||||
integrationSwp:
|
|
||||||
username: "phoenixusername"
|
|
||||||
userOidc:
|
|
||||||
username: "ncoidc"
|
|
||||||
|
|
||||||
ldapSearch:
|
|
||||||
host: "univention-corporate-container"
|
|
||||||
...
|
|
||||||
116
helmfile/apps/nextcloud/values-nextcloud-mgmt.yaml.gotmpl
Normal file
116
helmfile/apps/nextcloud/values-nextcloud-mgmt.yaml.gotmpl
Normal file
@@ -0,0 +1,116 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
domain: {{ .Values.global.domain | quote }}
|
||||||
|
hosts:
|
||||||
|
{{ .Values.global.hosts | toYaml | nindent 4 }}
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
istioDomain: {{ .Values.istio.domain }}
|
||||||
|
|
||||||
|
additionalAnnotations:
|
||||||
|
intents.otterize.com/service-name: "opendesk-nextcloud-php"
|
||||||
|
|
||||||
|
cleanup:
|
||||||
|
deletePodsOnSuccess: {{ .Values.cleanup.deletePodsOnSuccess }}
|
||||||
|
|
||||||
|
configuration:
|
||||||
|
administrator:
|
||||||
|
username: "nextcloud"
|
||||||
|
password: {{ .Values.secrets.nextcloud.adminPassword | quote }}
|
||||||
|
antivirus:
|
||||||
|
{{- if .Values.clamavDistributed.enabled }}
|
||||||
|
host: "clamav-icap"
|
||||||
|
{{- else if .Values.clamavSimple.enabled }}
|
||||||
|
host: "clamav-simple"
|
||||||
|
{{- end }}
|
||||||
|
cache:
|
||||||
|
auth:
|
||||||
|
enabled: true
|
||||||
|
username:
|
||||||
|
value: "default"
|
||||||
|
password:
|
||||||
|
value: {{ .Values.cache.nextcloud.password | default .Values.secrets.redis.password | quote }}
|
||||||
|
host: {{ .Values.cache.nextcloud.host | quote }}
|
||||||
|
port: {{ .Values.cache.nextcloud.port | quote }}
|
||||||
|
database:
|
||||||
|
host: {{ .Values.databases.nextcloud.host | quote }}
|
||||||
|
port: {{ .Values.databases.nextcloud.port | quote }}
|
||||||
|
auth:
|
||||||
|
username:
|
||||||
|
value: "nextcloud_user"
|
||||||
|
password:
|
||||||
|
value: {{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser | quote }}
|
||||||
|
ldap:
|
||||||
|
host: {{ .Values.ldap.host | quote }}
|
||||||
|
password: {{ .Values.secrets.univentionManagementStack.ldapSearch.nextcloud | quote }}
|
||||||
|
adminGroupName: "managed-by-attribute-FileshareAdmin"
|
||||||
|
objectstore:
|
||||||
|
auth:
|
||||||
|
accessKey:
|
||||||
|
value: {{ .Values.objectstores.nextcloud.username | quote }}
|
||||||
|
secretKey:
|
||||||
|
value: {{ .Values.objectstores.nextcloud.secretKey | default .Values.secrets.minio.nextcloudUser | quote }}
|
||||||
|
bucket: {{ .Values.objectstores.nextcloud.bucket | quote }}
|
||||||
|
host: {{ .Values.objectstores.nextcloud.endpoint | default (printf "https://%s.%s" .Values.global.hosts.minioApi .Values.global.domain) | quote }}
|
||||||
|
region: {{ .Values.objectstores.nextcloud.region | quote }}
|
||||||
|
storageClass: {{ .Values.objectstores.nextcloud.storageClass | quote }}
|
||||||
|
port: {{ .Values.objectstores.nextcloud.port | quote }}
|
||||||
|
pathStyle: {{ .Values.objectstores.nextcloud.pathStyle | quote }}
|
||||||
|
useSSL: {{ .Values.objectstores.nextcloud.useSSL | quote }}
|
||||||
|
oidc:
|
||||||
|
username:
|
||||||
|
value: "opendesk-nextcloud"
|
||||||
|
password:
|
||||||
|
value: {{ .Values.secrets.keycloak.clientSecret.ncoidc | quote }}
|
||||||
|
opendeskIntegration:
|
||||||
|
username:
|
||||||
|
value: "opendesk_username"
|
||||||
|
password:
|
||||||
|
value: {{ .Values.secrets.centralnavigation.apiKey | quote }}
|
||||||
|
smtp:
|
||||||
|
auth:
|
||||||
|
username:
|
||||||
|
value: {{ .Values.smtp.username | quote }}
|
||||||
|
password:
|
||||||
|
value: {{ .Values.smtp.password | quote }}
|
||||||
|
host: {{ .Values.smtp.host | quote }}
|
||||||
|
port: {{ .Values.smtp.port | quote }}
|
||||||
|
serverinfo:
|
||||||
|
token: {{ .Values.secrets.nextcloud.metricsToken | quote }}
|
||||||
|
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 65532
|
||||||
|
runAsGroup: 65532
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: false
|
||||||
|
runAsNonRoot: true
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.nextcloudManagement | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
debug:
|
||||||
|
loglevel: {{ if .Values.debug.enabled }}"0"{{ else }}"1"{{ end }}
|
||||||
|
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.nextcloudManagement.registry | quote }}
|
||||||
|
repository: "{{ .Values.images.nextcloudManagement.repository }}"
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
tag: {{ .Values.images.nextcloudManagement.tag | quote }}
|
||||||
|
|
||||||
|
theme:
|
||||||
|
{{ .Values.theme | toYaml | nindent 2 }}
|
||||||
|
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.nextcloudPHP | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
...
|
||||||
@@ -1,44 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
nextcloud:
|
|
||||||
host: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
|
||||||
username: "nextcloud"
|
|
||||||
password: {{ .Values.secrets.nextcloud.adminPassword }}
|
|
||||||
externalDatabase:
|
|
||||||
database: "{{ .Values.databases.nextcloud.name }}"
|
|
||||||
user: "{{ .Values.databases.nextcloud.username }}"
|
|
||||||
host: "{{ .Values.databases.nextcloud.host }}"
|
|
||||||
password: "{{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser }}"
|
|
||||||
redis:
|
|
||||||
auth:
|
|
||||||
enabled: true
|
|
||||||
password: {{ .Values.secrets.redis.password }}
|
|
||||||
ingress:
|
|
||||||
enabled: {{ .Values.ingress.enabled }}
|
|
||||||
className: {{ .Values.ingress.ingressClassName }}
|
|
||||||
tls:
|
|
||||||
- secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
hosts:
|
|
||||||
- "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
|
||||||
image:
|
|
||||||
repository: "{{ .Values.global.imageRegistry }}/{{ .Values.images.nextcloud.repository }}"
|
|
||||||
pullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
tag: "{{ .Values.images.nextcloud.tag }}"
|
|
||||||
pullSecrets:
|
|
||||||
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
|
||||||
|
|
||||||
metrics:
|
|
||||||
token: "{{ .Values.secrets.nextcloud.metricsToken }}"
|
|
||||||
|
|
||||||
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
|
||||||
replicaCount: {{ .Values.replicas.nextcloud }}
|
|
||||||
{{- else }}
|
|
||||||
replicaCount: 1
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.nextcloud | toYaml | nindent 2 }}
|
|
||||||
...
|
|
||||||
@@ -1,49 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
persistence:
|
|
||||||
enabled: true
|
|
||||||
existingClaim: "nextcloud-main"
|
|
||||||
nextcloudData:
|
|
||||||
enabled: true
|
|
||||||
existingClaim: "nextcloud-data"
|
|
||||||
|
|
||||||
redis:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
cronjob:
|
|
||||||
enabled: true
|
|
||||||
lifecycle:
|
|
||||||
postStartCommand:
|
|
||||||
- "sh"
|
|
||||||
- "-c"
|
|
||||||
- >
|
|
||||||
sed -i "s/\*\/5 \* \* \* \* php -f \/var\/www\/html\/cron.php/\*\/1 \* \* \* \* php -f
|
|
||||||
\/var\/www\/html\/cron.php/g" /var/spool/cron/crontabs/www-data
|
|
||||||
|
|
||||||
ingress:
|
|
||||||
annotations:
|
|
||||||
nginx.ingress.kubernetes.io/proxy-body-size: "4G"
|
|
||||||
nginx.org/client-max-body-size: "4G"
|
|
||||||
|
|
||||||
internalDatabase:
|
|
||||||
enabled: false
|
|
||||||
postgresql:
|
|
||||||
enabled: false
|
|
||||||
mariadb:
|
|
||||||
enabled: false
|
|
||||||
externalDatabase:
|
|
||||||
enabled: true
|
|
||||||
# The nextcloud helm chart provides a sub-chart for mariadb.
|
|
||||||
# If we use mariadb as a sub-chart it's linked to nextcloud,
|
|
||||||
# and it is not independent anymore. Since externalDatabase.type
|
|
||||||
# allows just mysql or postgres, mysql is chosen to connect
|
|
||||||
# to the mariadb:
|
|
||||||
type: "mysql"
|
|
||||||
|
|
||||||
metrics:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
# this is not documented but can be found in values.yaml
|
|
||||||
service:
|
|
||||||
port: "80"
|
|
||||||
139
helmfile/apps/nextcloud/values-nextcloud.yaml.gotmpl
Normal file
139
helmfile/apps/nextcloud/values-nextcloud.yaml.gotmpl
Normal file
@@ -0,0 +1,139 @@
|
|||||||
|
{{/*
|
||||||
|
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
|
SPDX-License-Identifier: Apache-2.0
|
||||||
|
*/}}
|
||||||
|
---
|
||||||
|
global:
|
||||||
|
imagePullSecrets:
|
||||||
|
{{ .Values.global.imagePullSecrets | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
exporter:
|
||||||
|
enabled: true
|
||||||
|
configuration:
|
||||||
|
token:
|
||||||
|
value: {{ .Values.secrets.nextcloud.metricsToken | quote }}
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 65532
|
||||||
|
runAsGroup: 65532
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.nextcloudExporter | toYaml | nindent 6 }}
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.nextcloudExporter.registry | quote }}
|
||||||
|
repository: "{{ .Values.images.nextcloudExporter.repository }}"
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
tag: {{ .Values.images.nextcloudExporter.tag | quote }}
|
||||||
|
prometheus:
|
||||||
|
serviceMonitor:
|
||||||
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
labels:
|
||||||
|
{{ .Values.prometheus.serviceMonitors.labels | toYaml | nindent 8 }}
|
||||||
|
prometheusRule:
|
||||||
|
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
||||||
|
additionalLabels:
|
||||||
|
{{ .Values.prometheus.prometheusRules.labels | toYaml | nindent 8 }}
|
||||||
|
replicaCount: {{ .Values.replicas.nextcloudExporter }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.nextcloudExporter | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
php:
|
||||||
|
additionalAnnotations:
|
||||||
|
intents.otterize.com/service-name: "opendesk-nextcloud-php"
|
||||||
|
configuration:
|
||||||
|
cache:
|
||||||
|
auth:
|
||||||
|
enabled: true
|
||||||
|
username:
|
||||||
|
value: "default"
|
||||||
|
password:
|
||||||
|
value: {{ .Values.cache.nextcloud.password | default .Values.secrets.redis.password | quote }}
|
||||||
|
host: {{ .Values.cache.nextcloud.host | quote }}
|
||||||
|
port: {{ .Values.cache.nextcloud.port | quote }}
|
||||||
|
database:
|
||||||
|
host: {{ .Values.databases.nextcloud.host | quote }}
|
||||||
|
port: {{ .Values.databases.nextcloud.port | quote }}
|
||||||
|
auth:
|
||||||
|
username:
|
||||||
|
value: "nextcloud_user"
|
||||||
|
password:
|
||||||
|
value: {{ .Values.databases.nextcloud.password | default .Values.secrets.mariadb.nextcloudUser | quote }}
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 65532
|
||||||
|
runAsGroup: 65532
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.nextcloudPHP | toYaml | nindent 6 }}
|
||||||
|
cron:
|
||||||
|
successfulJobsHistoryLimit: {{ if .Values.debug.enabled }}"3"{{ else }}"0"{{ end }}
|
||||||
|
debug:
|
||||||
|
loglevel: {{ if .Values.debug.enabled }}"0"{{ else }}"1"{{ end }}
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.nextcloudPHP.registry | quote }}
|
||||||
|
repository: "{{ .Values.images.nextcloudPHP.repository }}"
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
tag: {{ .Values.images.nextcloudPHP.tag | quote }}
|
||||||
|
prometheus:
|
||||||
|
serviceMonitor:
|
||||||
|
enabled: {{ .Values.prometheus.serviceMonitors.enabled }}
|
||||||
|
labels:
|
||||||
|
{{ .Values.prometheus.serviceMonitors.labels | toYaml | nindent 8 }}
|
||||||
|
prometheusRule:
|
||||||
|
enabled: {{ .Values.prometheus.prometheusRules.enabled }}
|
||||||
|
additionalLabels:
|
||||||
|
{{ .Values.prometheus.prometheusRules.labels | toYaml | nindent 8 }}
|
||||||
|
replicaCount: {{ .Values.replicas.nextcloudPHP }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.nextcloudPHP | toYaml | nindent 4 }}
|
||||||
|
|
||||||
|
apache2:
|
||||||
|
configuration:
|
||||||
|
php:
|
||||||
|
host: "opendesk-nextcloud-php.{{ .Release.Namespace }}.svc.{{ .Values.cluster.networking.domain }}"
|
||||||
|
containerSecurityContext:
|
||||||
|
allowPrivilegeEscalation: false
|
||||||
|
capabilities:
|
||||||
|
drop:
|
||||||
|
- "ALL"
|
||||||
|
enabled: true
|
||||||
|
privileged: false
|
||||||
|
runAsUser: 65532
|
||||||
|
runAsGroup: 65532
|
||||||
|
seccompProfile:
|
||||||
|
type: "RuntimeDefault"
|
||||||
|
readOnlyRootFilesystem: true
|
||||||
|
runAsNonRoot: true
|
||||||
|
seLinuxOptions:
|
||||||
|
{{ .Values.seLinuxOptions.nextcloudApache2 | toYaml | nindent 6 }}
|
||||||
|
ingress:
|
||||||
|
enabled: {{ .Values.ingress.enabled }}
|
||||||
|
ingressClassName: {{ .Values.ingress.ingressClassName | quote }}
|
||||||
|
host: "{{ .Values.global.hosts.nextcloud }}.{{ .Values.global.domain }}"
|
||||||
|
tls:
|
||||||
|
secretName: {{ .Values.ingress.tls.secretName | quote }}
|
||||||
|
image:
|
||||||
|
registry: {{ .Values.global.imageRegistry | default .Values.images.nextcloudApache2.registry | quote }}
|
||||||
|
repository: {{ .Values.images.nextcloudApache2.repository | quote }}
|
||||||
|
imagePullPolicy: {{ .Values.global.imagePullPolicy | quote }}
|
||||||
|
tag: {{ .Values.images.nextcloudApache2.tag | quote }}
|
||||||
|
replicaCount: {{ .Values.replicas.nextcloudApache2 }}
|
||||||
|
resources:
|
||||||
|
{{ .Values.resources.nextcloudApache2 | toYaml | nindent 4 }}
|
||||||
|
...
|
||||||
@@ -1,66 +1,70 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
# SPDX-License-Identifier: Apache-2.0
|
||||||
---
|
---
|
||||||
|
bases:
|
||||||
|
- "../../bases/environments.yaml"
|
||||||
|
---
|
||||||
repositories:
|
repositories:
|
||||||
# openDesk Dovecot
|
# openDesk Dovecot
|
||||||
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-dovecot
|
# Source: https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-dovecot
|
||||||
- name: "opendesk-dovecot-repo"
|
- name: "dovecot-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.dovecot.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.dovecot.registry }}/\
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
{{ .Values.charts.dovecot.repository }}"
|
||||||
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/dovecot" }}
|
|
||||||
verify: true
|
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
|
||||||
# Open-Xchange
|
# Open-Xchange
|
||||||
- name: "openxchange-repo"
|
- name: "open-xchange-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/open-xchange-com.gpg"
|
||||||
|
verify: {{ .Values.charts.openXchangeAppSuite.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
url: >-
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.openXchangeAppSuite.registry }}/\
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default "registry.open-xchange.com" }}
|
{{ .Values.charts.openXchangeAppSuite.repository }}"
|
||||||
|
|
||||||
# openDesk Open-Xchange Bootstrap
|
# openDesk Open-Xchange Bootstrap
|
||||||
# Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/opendesk-open-xchange-bootstrap
|
# Source:
|
||||||
- name: "opendesk-open-xchange-bootstrap-repo"
|
# https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-open-xchange-bootstrap
|
||||||
|
- name: "open-xchange-bootstrap-repo"
|
||||||
|
keyring: "../../files/gpg-pubkeys/opencode.gpg"
|
||||||
|
verify: {{ .Values.charts.openXchangeAppSuiteBootstrap.verify }}
|
||||||
|
username: {{ env "OD_PRIVATE_REGISTRY_USERNAME" | quote }}
|
||||||
|
password: {{ env "OD_PRIVATE_REGISTRY_PASSWORD" | quote }}
|
||||||
oci: true
|
oci: true
|
||||||
# yamllint disable rule:line-length
|
url: "{{ .Values.global.helmRegistry | default .Values.charts.openXchangeAppSuiteBootstrap.registry }}/\
|
||||||
url: >-
|
{{ .Values.charts.openXchangeAppSuiteBootstrap.repository }}"
|
||||||
{{ env "PRIVATE_IMAGE_REGISTRY_URL" | default
|
|
||||||
"external-registry.souvap-univention.de/sovereign-workplace/souvap/tooling/charts/sovereign-workplace-open-xchange-bootstrap" }}
|
|
||||||
# yamllint enable rule:line-length
|
|
||||||
verify: true
|
|
||||||
keyring: "../../files/gpg-pubkeys/souvap-univention-de.gpg"
|
|
||||||
|
|
||||||
releases:
|
releases:
|
||||||
- name: "dovecot"
|
- name: "dovecot"
|
||||||
chart: "opendesk-dovecot-repo/dovecot"
|
chart: "dovecot-repo/{{ .Values.charts.dovecot.name }}"
|
||||||
version: "1.3.1"
|
version: "{{ .Values.charts.dovecot.version }}"
|
||||||
values:
|
values:
|
||||||
- "values-dovecot.yaml"
|
- "values-dovecot.yaml.gotmpl"
|
||||||
- "values-dovecot.gotmpl"
|
installed: {{ .Values.dovecot.enabled }}
|
||||||
condition: "dovecot.enabled"
|
|
||||||
timeout: 900
|
timeout: 900
|
||||||
|
|
||||||
- name: "open-xchange"
|
- name: "open-xchange"
|
||||||
chart: "openxchange-repo/appsuite-public-sector/charts/appsuite-public-sector"
|
chart: "open-xchange-repo/{{ .Values.charts.openXchangeAppSuite.name }}"
|
||||||
version: "2.0.4"
|
version: "{{ .Values.charts.openXchangeAppSuite.version }}"
|
||||||
values:
|
values:
|
||||||
- "values-openxchange.yaml"
|
- "values-openxchange.yaml.gotmpl"
|
||||||
- "values-openxchange.gotmpl"
|
- "values-openxchange-enterprise-contact-picker.yaml.gotmpl"
|
||||||
- "values-openxchange-enterprise-contact-picker.yaml"
|
installed: {{ .Values.oxAppsuite.enabled }}
|
||||||
- "values-openxchange-enterprise-contact-picker.gotmpl"
|
|
||||||
condition: "oxAppsuite.enabled"
|
|
||||||
timeout: 900
|
timeout: 900
|
||||||
|
|
||||||
- name: "opendesk-open-xchange-bootstrap"
|
- name: "opendesk-open-xchange-bootstrap"
|
||||||
chart: "opendesk-open-xchange-bootstrap-repo/sovereign-workplace-open-xchange-bootstrap"
|
chart: "open-xchange-bootstrap-repo/{{ .Values.charts.openXchangeAppSuiteBootstrap.name }}"
|
||||||
version: "1.3.1"
|
version: "{{ .Values.charts.openXchangeAppSuiteBootstrap.version }}"
|
||||||
values:
|
values:
|
||||||
- "values-openxchange-bootstrap.gotmpl"
|
- "values-openxchange-bootstrap.yaml.gotmpl"
|
||||||
condition: "oxAppsuite.enabled"
|
installed: {{ .Values.oxAppsuite.enabled }}
|
||||||
timeout: 900
|
timeout: 900
|
||||||
|
|
||||||
commonLabels:
|
commonLabels:
|
||||||
deploy-stage: "component-1"
|
deploy-stage: "component-1"
|
||||||
component: "open-xchange"
|
component: "open-xchange"
|
||||||
|
|
||||||
bases:
|
|
||||||
- "../../bases/environments.yaml"
|
|
||||||
...
|
...
|
||||||
|
|||||||
@@ -1,59 +0,0 @@
|
|||||||
{{/*
|
|
||||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
SPDX-License-Identifier: Apache-2.0
|
|
||||||
*/}}
|
|
||||||
---
|
|
||||||
image:
|
|
||||||
registry: "{{ .Values.global.imageRegistry }}"
|
|
||||||
url: "{{ .Values.images.dovecot.repository }}"
|
|
||||||
tag: "{{ .Values.images.dovecot.tag }}"
|
|
||||||
imagePullPolicy: "{{ .Values.global.imagePullPolicy }}"
|
|
||||||
|
|
||||||
imagePullSecrets:
|
|
||||||
{{- range .Values.global.imagePullSecrets }}
|
|
||||||
- name: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
dovecot:
|
|
||||||
mailDomain: "{{ .Values.global.domain }}"
|
|
||||||
password: {{ .Values.secrets.dovecot.doveadm }}
|
|
||||||
ldap:
|
|
||||||
dn: "uid=ldapsearch_dovecot,cn=users,dc=swp-ldap,dc=internal"
|
|
||||||
password: {{ .Values.secrets.univentionCorporateServer.ldapSearch.dovecot }}
|
|
||||||
oidc:
|
|
||||||
introspectionURL: "https://{{ .Values.global.hosts.keycloak }}.{{ .Values.global.domain }}/realms/souvap/protocol/openid-connect/token/introspect"
|
|
||||||
clientSecret: {{ .Values.secrets.keycloak.clientSecret.as8oidc }}
|
|
||||||
clientID: "as8oidc"
|
|
||||||
loginTrustedNetworks: "{{ .Values.cluster.networking.cidr }}"
|
|
||||||
|
|
||||||
certificate:
|
|
||||||
secretName: "{{ .Values.ingress.tls.secretName }}"
|
|
||||||
|
|
||||||
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
|
||||||
replicaCount: {{ .Values.replicas.dovecot }}
|
|
||||||
{{- else }}
|
|
||||||
replicaCount: 1
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
{{- if .Values.cluster.persistence.readWriteMany.enabled }}
|
|
||||||
storageClassName: "{{ .Values.persistence.storageClassNames.RWX }}"
|
|
||||||
accessModes:
|
|
||||||
- "ReadWriteMany"
|
|
||||||
{{- else }}
|
|
||||||
storageClassName: "{{ .Values.persistence.storageClassNames.RWO }}"
|
|
||||||
accessModes:
|
|
||||||
- "ReadWriteOnce"
|
|
||||||
{{- end }}
|
|
||||||
size: "{{ .Values.persistence.size.dovecot }}"
|
|
||||||
|
|
||||||
resources:
|
|
||||||
{{ .Values.resources.dovecot | toYaml | nindent 2 }}
|
|
||||||
|
|
||||||
{{- if or (eq .Values.cluster.service.type "NodePort") (eq .Values.cluster.service.type "LoadBalancer") }}
|
|
||||||
service:
|
|
||||||
external:
|
|
||||||
enabled: true
|
|
||||||
type: {{ .Values.cluster.service.type | quote }}
|
|
||||||
{{- end }}
|
|
||||||
...
|
|
||||||
@@ -1,18 +0,0 @@
|
|||||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
|
||||||
# SPDX-License-Identifier: Apache-2.0
|
|
||||||
---
|
|
||||||
containerSecurityContext:
|
|
||||||
readOnlyRootFilesystem: false
|
|
||||||
|
|
||||||
dovecot:
|
|
||||||
ldap:
|
|
||||||
enabled: true
|
|
||||||
host: "univention-corporate-container"
|
|
||||||
port: 389
|
|
||||||
base: "dc=swp-ldap,dc=internal"
|
|
||||||
|
|
||||||
oidc:
|
|
||||||
enabled: true
|
|
||||||
clientID: "as8oidc"
|
|
||||||
usernameAttribute: "phoenixusername"
|
|
||||||
...
|
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user