Compare commits
858 Commits
v0.5.51
...
document-n
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
ca9bc78794 | ||
|
|
5c771baa88 | ||
|
|
a7400f0402 | ||
|
|
38f2bdd2b9 | ||
|
|
0314a7076a | ||
|
|
83e8cec991 | ||
|
|
9c7b8d772c | ||
|
|
cd2a356b89 | ||
|
|
4aebe22f22 | ||
|
|
eb2a1811fb | ||
|
|
dd0e516778 | ||
|
|
42b11059d2 | ||
|
|
57c96af5a5 | ||
|
|
84d6b504d2 | ||
|
|
6d7937a6ca | ||
|
|
62ba5aba49 | ||
|
|
9f762a7c2e | ||
|
|
67fe50e53c | ||
|
|
bd4c997950 | ||
|
|
997c083335 | ||
|
|
688a505ef7 | ||
|
|
d249448794 | ||
|
|
bbbcd6807e | ||
|
|
834c84768a | ||
|
|
410a1ade69 | ||
|
|
9980d50dce | ||
|
|
25ba486ba0 | ||
|
|
a84d440f9f | ||
|
|
f549fdfd19 | ||
|
|
3507c62f83 | ||
|
|
5d01f6023d | ||
|
|
90b22904da | ||
|
|
174d4fc61c | ||
|
|
e35dac087a | ||
|
|
ef8d67f3c1 | ||
|
|
7f17a80597 | ||
|
|
797308f1ec | ||
|
|
39c057904a | ||
|
|
bba9b716a3 | ||
|
|
6fd52b167e | ||
|
|
3106ca793e | ||
|
|
8eaa12e53b | ||
|
|
09f54b4134 | ||
|
|
5537dbbd7c | ||
|
|
9d51e40063 | ||
|
|
489986e906 | ||
|
|
13ab665900 | ||
|
|
0df6212ca9 | ||
|
|
0d8c148062 | ||
|
|
f0057c6417 | ||
|
|
cd000826df | ||
|
|
672e649b60 | ||
|
|
09a0aace45 | ||
|
|
c3dfa2a607 | ||
|
|
31b7ec7827 | ||
|
|
bdc7331cb5 | ||
|
|
e273abbecf | ||
|
|
386dbbf453 | ||
|
|
6e054008a2 | ||
|
|
02318a478a | ||
|
|
b610a8825c | ||
|
|
248213a285 | ||
|
|
879838bbb2 | ||
|
|
1185f4d97a | ||
|
|
573e11f5c5 | ||
|
|
3b9ddab603 | ||
|
|
c858692e6b | ||
|
|
de1554aed1 | ||
|
|
a79e40f44a | ||
|
|
5c332264ed | ||
|
|
22c179d3f2 | ||
|
|
20cbad31e7 | ||
|
|
237c9af3c1 | ||
|
|
acbabdb806 | ||
|
|
a4c8be60f3 | ||
|
|
9e92aa3005 | ||
|
|
5160711050 | ||
|
|
98d31f811b | ||
|
|
26e4b54cad | ||
|
|
7ae716bc82 | ||
|
|
d39c406d63 | ||
|
|
1a6f438724 | ||
|
|
e4f1afca0f | ||
|
|
19f4ea90e2 | ||
|
|
8777722cf1 | ||
|
|
0cc04c0be0 | ||
|
|
6aa6d3af2f | ||
|
|
4e0ffeea1f | ||
|
|
ccd5ab84e3 | ||
|
|
8d832107c1 | ||
|
|
51ff7a5fdb | ||
|
|
4eb6570b0a | ||
|
|
9b7f439d83 | ||
|
|
2b317514c6 | ||
|
|
9014324156 | ||
|
|
c5dd8814ae | ||
|
|
c56f564025 | ||
|
|
e30d4f126d | ||
|
|
55b93cb190 | ||
|
|
d3c7462371 | ||
|
|
7f478bffd6 | ||
|
|
3df9342b31 | ||
|
|
6baec0b587 | ||
|
|
5a3e47ea5d | ||
|
|
74c4cc309d | ||
|
|
feaaa81094 | ||
|
|
03f414ffaf | ||
|
|
f773a9371c | ||
|
|
69faf77d15 | ||
|
|
9f4e3c86c7 | ||
|
|
e06642f6b6 | ||
|
|
0d4e1b01e3 | ||
|
|
bc436b2485 | ||
|
|
3b9fd4eb99 | ||
|
|
e9594382ed | ||
|
|
1edd7c3f06 | ||
|
|
6d6b1a6dd7 | ||
|
|
b60f9c7576 | ||
|
|
4dcb683118 | ||
|
|
bc8028dd93 | ||
|
|
e143a9c9d8 | ||
|
|
9354ee7196 | ||
|
|
8e9ef0867b | ||
|
|
87c30ab8e3 | ||
|
|
7547f4948e | ||
|
|
b608a610fe | ||
|
|
59a40864ed | ||
|
|
add72669ae | ||
|
|
fe510fa679 | ||
|
|
805cdf26ae | ||
|
|
559fbf6801 | ||
|
|
561e44fd4c | ||
|
|
0d616871e3 | ||
|
|
b185fe055c | ||
|
|
d1a1e5dc29 | ||
|
|
1ea9cae1ce | ||
|
|
3b3d8aca54 | ||
|
|
785be8b662 | ||
|
|
6d06e1fcc2 | ||
|
|
b9640d9321 | ||
|
|
c40de73ccf | ||
|
|
3d694a8248 | ||
|
|
174c73c012 | ||
|
|
b1acec9171 | ||
|
|
2f56a94b2a | ||
|
|
b5908100dd | ||
|
|
cc16bee370 | ||
|
|
26970483b2 | ||
|
|
f8fa301b6c | ||
|
|
b40b8630c1 | ||
|
|
9b9726087f | ||
|
|
88b29c57e8 | ||
|
|
f2b1384670 | ||
|
|
d916365cb4 | ||
|
|
bba2af0f06 | ||
|
|
1d2b17b495 | ||
|
|
709e50ff7c | ||
|
|
7603bbdc64 | ||
|
|
4b305768c4 | ||
|
|
91a25f4c18 | ||
|
|
006aed791e | ||
|
|
b45a0bf832 | ||
|
|
8e638b6714 | ||
|
|
e91efa8ecc | ||
|
|
58b74c7cfd | ||
|
|
c3417f404c | ||
|
|
799ba97b3c | ||
|
|
9320274162 | ||
|
|
5f58a857ac | ||
|
|
86bfa3e559 | ||
|
|
42f6151121 | ||
|
|
6cbb6b6922 | ||
|
|
7ba84b99ca | ||
|
|
f49980b3ef | ||
|
|
69e66c65f6 | ||
|
|
aed14e1ce1 | ||
|
|
e557393025 | ||
|
|
45b924e8fa | ||
|
|
9446faaa59 | ||
|
|
17efbd79f1 | ||
|
|
d794a2036e | ||
|
|
7414f05005 | ||
|
|
3d80c7e2b1 | ||
|
|
d74742808c | ||
|
|
861b84b14d | ||
|
|
a9fae59b74 | ||
|
|
693295391b | ||
|
|
393ee31163 | ||
|
|
b0088b028c | ||
|
|
7f1cfc5555 | ||
|
|
9cde57d74b | ||
|
|
cf750a8ddb | ||
|
|
8f12208074 | ||
|
|
90c49f6f83 | ||
|
|
e25cb5e0f3 | ||
|
|
79975a58e3 | ||
|
|
02867c47c0 | ||
|
|
4df50b011d | ||
|
|
c22b467a61 | ||
|
|
4bf98d0da0 | ||
|
|
8585b8419e | ||
|
|
464efb41f2 | ||
|
|
790baebf71 | ||
|
|
3fcfa00503 | ||
|
|
fe664a7f8d | ||
|
|
67a1df0f80 | ||
|
|
6e6d15552e | ||
|
|
46b38342d3 | ||
|
|
08ee9ee44c | ||
|
|
a0f852e104 | ||
|
|
aa8e30b34f | ||
|
|
5cd12b91c7 | ||
|
|
f758685a2e | ||
|
|
c37eedba42 | ||
|
|
04efd54022 | ||
|
|
1c50aa5ce2 | ||
|
|
2bf8e1de98 | ||
|
|
5d398f5d64 | ||
|
|
897bd4c466 | ||
|
|
d070b09636 | ||
|
|
466b70a9bb | ||
|
|
adb3fa18eb | ||
|
|
1e62a0dfe1 | ||
|
|
696f2daa9c | ||
|
|
2c8d7f0380 | ||
|
|
c9a8a60ff3 | ||
|
|
7d7e9e65b3 | ||
|
|
baa5b14551 | ||
|
|
9e083de84d | ||
|
|
d018385473 | ||
|
|
2f584bd8e8 | ||
|
|
2dddff1d51 | ||
|
|
747cae545a | ||
|
|
896b3c102c | ||
|
|
2a0f2a3333 | ||
|
|
01106757da | ||
|
|
3d35440dc7 | ||
|
|
770e0a92a5 | ||
|
|
44c2081bd8 | ||
|
|
bfd27f3c39 | ||
|
|
8a2d218a60 | ||
|
|
6ee7f1ab98 | ||
|
|
0b8ff865d9 | ||
|
|
6edfe7239f | ||
|
|
0efc0af761 | ||
|
|
4d59d12a97 | ||
|
|
dd3b35b626 | ||
|
|
037537b394 | ||
|
|
7456543d81 | ||
|
|
2730b03e70 | ||
|
|
41e0aaeffe | ||
|
|
2e992fc236 | ||
|
|
c5909424d3 | ||
|
|
028cfa3a5c | ||
|
|
02488fe2dd | ||
|
|
bc55f6a366 | ||
|
|
f1147f0fdf | ||
|
|
3d2f75165a | ||
|
|
d18abb0d0a | ||
|
|
f92b76b2b2 | ||
|
|
6723a34c22 | ||
|
|
f26250774e | ||
|
|
1480253a52 | ||
|
|
87144b8fd3 | ||
|
|
fdfe76c37e | ||
|
|
51ae1c0a1a | ||
|
|
1724fa14a3 | ||
|
|
2389d59735 | ||
|
|
f34a4a3601 | ||
|
|
dbcc785134 | ||
|
|
dbec2ec36f | ||
|
|
e46c3759e0 | ||
|
|
52b0b13e6b | ||
|
|
4c42ed76e8 | ||
|
|
7b05213d6e | ||
|
|
4296db7c90 | ||
|
|
a6de1fe694 | ||
|
|
817af98fcd | ||
|
|
780596ab40 | ||
|
|
da3adff0ef | ||
|
|
60f5e36b7c | ||
|
|
c4e4258162 | ||
|
|
c62e66cd84 | ||
|
|
ef7e3d225d | ||
|
|
31a22f38cc | ||
|
|
a25a0e9173 | ||
|
|
ba333cd74e | ||
|
|
17a0adb67c | ||
|
|
91d0f98682 | ||
|
|
09f482981b | ||
|
|
930ae9d3e7 | ||
|
|
581c8aed1f | ||
|
|
de8b560fe7 | ||
|
|
370247b951 | ||
|
|
b32996da34 | ||
|
|
10e0b0ad6c | ||
|
|
32df1657d2 | ||
|
|
8dcac46d98 | ||
|
|
284c9fe0c7 | ||
|
|
83c311b101 | ||
|
|
aff8edbde2 | ||
|
|
9c79c44453 | ||
|
|
1e9e7d8e3a | ||
|
|
1f051e7779 | ||
|
|
824e5cbf3e | ||
|
|
955f17ef8b | ||
|
|
ab49bf9f6b | ||
|
|
777e7d2fc6 | ||
|
|
b70959d82d | ||
|
|
6e343c76a3 | ||
|
|
cd9c54b177 | ||
|
|
4662709673 | ||
|
|
8eeaa23c2f | ||
|
|
601e649913 | ||
|
|
2fcf014894 | ||
|
|
c51c92536a | ||
|
|
e23c97430f | ||
|
|
61d94a8de6 | ||
|
|
4e21129456 | ||
|
|
1323ef142e | ||
|
|
03ec70435c | ||
|
|
40aa9d0e63 | ||
|
|
1cdfcf2784 | ||
|
|
ccb51a0de3 | ||
|
|
9d8e9c3ade | ||
|
|
d096fb1154 | ||
|
|
a0f52ee7d4 | ||
|
|
335806a53e | ||
|
|
d5e73feb88 | ||
|
|
3662b5cd25 | ||
|
|
bacf51efb1 | ||
|
|
033cb558dd | ||
|
|
5496317fee | ||
|
|
b4b714ff41 | ||
|
|
04ab28c029 | ||
|
|
ae27a35f5a | ||
|
|
b0e665b031 | ||
|
|
9d0f6daad0 | ||
|
|
5aae75a152 | ||
|
|
054c39c124 | ||
|
|
ba18e6f61c | ||
|
|
a16d9071c9 | ||
|
|
0b230fa2cc | ||
|
|
6f2f7cd5db | ||
|
|
fab862eec6 | ||
|
|
b71c2e57ee | ||
|
|
33ff9227b7 | ||
|
|
0c91117575 | ||
|
|
6c67eca7aa | ||
|
|
0e21d2cea5 | ||
|
|
a13cf63024 | ||
|
|
28a6528528 | ||
|
|
2926e2c93a | ||
|
|
6796f320f7 | ||
|
|
63562c1aae | ||
|
|
1c643ac8ff | ||
|
|
4811b570e7 | ||
|
|
0e69f38fef | ||
|
|
3983c608be | ||
|
|
174951cd51 | ||
|
|
16dfd255c6 | ||
|
|
669995bb95 | ||
|
|
6d329e18cf | ||
|
|
6438284090 | ||
|
|
a63d7cb861 | ||
|
|
4602396583 | ||
|
|
b9656772a9 | ||
|
|
4403dfe720 | ||
|
|
31ec1003c0 | ||
|
|
4cda827f55 | ||
|
|
96f18196c5 | ||
|
|
eac214e364 | ||
|
|
3ad285a869 | ||
|
|
e4d9106c45 | ||
|
|
7f60ab3b7a | ||
|
|
4c7422a411 | ||
|
|
99851e6286 | ||
|
|
77108587c7 | ||
|
|
718eb45e9c | ||
|
|
af77ff8bf6 | ||
|
|
186f12fba0 | ||
|
|
539a30263c | ||
|
|
47ce294403 | ||
|
|
b90bff30b3 | ||
|
|
277a1f5a65 | ||
|
|
0e3b661565 | ||
|
|
627b9c1e84 | ||
|
|
00a1a9394e | ||
|
|
1441c5734f | ||
|
|
9d7644dc04 | ||
|
|
54f9e4c3f8 | ||
|
|
2a94f2dd4b | ||
|
|
c0cbb76921 | ||
|
|
45add7981c | ||
|
|
d3b191644b | ||
|
|
bbe7550c46 | ||
|
|
a9c8dfeab1 | ||
|
|
f630a369da | ||
|
|
508e286232 | ||
|
|
407f2be2ad | ||
|
|
18fcaa0331 | ||
|
|
f96942536f | ||
|
|
56ce3355fc | ||
|
|
6ff1fcd438 | ||
|
|
8611d95e5a | ||
|
|
86ef0be542 | ||
|
|
df144fe3d3 | ||
|
|
83da87e962 | ||
|
|
e2b3bd543f | ||
|
|
e5ad0bb2e0 | ||
|
|
1213ecc425 | ||
|
|
5e0b2e26fc | ||
|
|
1402593556 | ||
|
|
564fb2d7c7 | ||
|
|
9e102e2d1b | ||
|
|
b3b6ab5a61 | ||
|
|
7f1f6cdcd4 | ||
|
|
de15071ae9 | ||
|
|
c8c12a278e | ||
|
|
71ff9141cb | ||
|
|
43f427e06a | ||
|
|
31ea6e0e08 | ||
|
|
1b13c3ea65 | ||
|
|
0738fa080d | ||
|
|
c06e0bb8d4 | ||
|
|
c63cca72a3 | ||
|
|
9dbb2b755c | ||
|
|
08feab1cfc | ||
|
|
0c88699917 | ||
|
|
58fc76db5b | ||
|
|
5c691e4508 | ||
|
|
b6725dddc1 | ||
|
|
4c82adf668 | ||
|
|
f1202f5fa5 | ||
|
|
c71faf5e80 | ||
|
|
b25ada1f60 | ||
|
|
3b3679bab1 | ||
|
|
a86c0afdbb | ||
|
|
bc0ca8b4c1 | ||
|
|
901b1f529e | ||
|
|
17e9b8a7bd | ||
|
|
756628d759 | ||
|
|
a0f8e7aa5f | ||
|
|
30a7e0a0f6 | ||
|
|
6ba6923612 | ||
|
|
7aee88ec94 | ||
|
|
cc4b359124 | ||
|
|
fc7099a8a6 | ||
|
|
e3238f96f7 | ||
|
|
a91f181c46 | ||
|
|
a7e5f64b50 | ||
|
|
e619db6da2 | ||
|
|
28dd762db3 | ||
|
|
6347966765 | ||
|
|
560aa30cba | ||
|
|
3a9468f04d | ||
|
|
b7faa24d76 | ||
|
|
7bf8e6976a | ||
|
|
d641359c29 | ||
|
|
fdb37c3943 | ||
|
|
c9ae0391b0 | ||
|
|
71f21dc433 | ||
|
|
356d8dfbfd | ||
|
|
e512486e74 | ||
|
|
d693ff94f4 | ||
|
|
11b0d441e0 | ||
|
|
6b2ca6a136 | ||
|
|
fb8f7cd28a | ||
|
|
6325b69a91 | ||
|
|
add2ab1a41 | ||
|
|
b1946d0c1d | ||
|
|
3baf37c509 | ||
|
|
81f5969653 | ||
|
|
a7ea701cc6 | ||
|
|
b9db81f69d | ||
|
|
ef1dad7433 | ||
|
|
751f5783d0 | ||
|
|
13e0bb8d68 | ||
|
|
8229949b47 | ||
|
|
dcb6e15e90 | ||
|
|
a7d3d2585c | ||
|
|
e923468cd6 | ||
|
|
4ff720d36f | ||
|
|
fa8572f785 | ||
|
|
9eb854616c | ||
|
|
6a60c6dd43 | ||
|
|
8cd2f3a993 | ||
|
|
9d7d89f74f | ||
|
|
180ccddfaa | ||
|
|
11f750e1d6 | ||
|
|
91e34aabaa | ||
|
|
deacbc9db5 | ||
|
|
cbe6b1ae6c | ||
|
|
67d52c771e | ||
|
|
1023f3d081 | ||
|
|
12680e5c1a | ||
|
|
592f03135f | ||
|
|
bdc6ad2864 | ||
|
|
57f70b876a | ||
|
|
e9f779049c | ||
|
|
9f081d8567 | ||
|
|
603b102f41 | ||
|
|
f297d8c0b7 | ||
|
|
f4b9395b41 | ||
|
|
31753ffb19 | ||
|
|
73455630fd | ||
|
|
5f72da4e57 | ||
|
|
dd80abe622 | ||
|
|
9950b73ae3 | ||
|
|
6b88f731eb | ||
|
|
11ebb80494 | ||
|
|
ade8535c44 | ||
|
|
3d84e804c2 | ||
|
|
8bca56d4ac | ||
|
|
df9380b924 | ||
|
|
7348547d96 | ||
|
|
8ef69ecaf2 | ||
|
|
fa04f88370 | ||
|
|
efc41cb3aa | ||
|
|
370c7cd836 | ||
|
|
ac148d0c28 | ||
|
|
3d441933ca | ||
|
|
b60fe39b5c | ||
|
|
c03566dd63 | ||
|
|
fbe4909a8e | ||
|
|
e1d15e4bc6 | ||
|
|
c63e725525 | ||
|
|
45715a2059 | ||
|
|
3ad81e6b92 | ||
|
|
a395759551 | ||
|
|
8aa1a7fa7d | ||
|
|
ce03400043 | ||
|
|
61d74966d0 | ||
|
|
97f7a1cafd | ||
|
|
49ad36ef4e | ||
|
|
7d0d6ea8d1 | ||
|
|
a46a632616 | ||
|
|
4b99357b21 | ||
|
|
f194f24845 | ||
|
|
be6806f62f | ||
|
|
fd3df7df67 | ||
|
|
6b609edc4a | ||
|
|
63f8394e04 | ||
|
|
74d444e2d6 | ||
|
|
8a2d951c3b | ||
|
|
46412d1a9e | ||
|
|
26a7641a5a | ||
|
|
671f57a809 | ||
|
|
fe923bb9cd | ||
|
|
b4570a9a87 | ||
|
|
1067e725b3 | ||
|
|
dfaf4be640 | ||
|
|
e54aaab072 | ||
|
|
b806d51311 | ||
|
|
db7f5d60bd | ||
|
|
972020f946 | ||
|
|
23ef1d557b | ||
|
|
382af1dfb9 | ||
|
|
7239df2ec1 | ||
|
|
86a328bda1 | ||
|
|
85149086ae | ||
|
|
01c5e6b359 | ||
|
|
a8692d5506 | ||
|
|
1ad35f1e12 | ||
|
|
01767d3806 | ||
|
|
7268f607a5 | ||
|
|
e52343440d | ||
|
|
c03e4a5340 | ||
|
|
c90f7c1742 | ||
|
|
ceb09bee8c | ||
|
|
890b36ecbb | ||
|
|
6ef3641d82 | ||
|
|
45e569955d | ||
|
|
0ce346b162 | ||
|
|
c07b25c4b9 | ||
|
|
e89b16a747 | ||
|
|
064a5ad246 | ||
|
|
d8f3e05e58 | ||
|
|
368fe13ddb | ||
|
|
fcf33825d5 | ||
|
|
b1d0a05a0c | ||
|
|
b0eb28bc3f | ||
|
|
1a811743df | ||
|
|
d7a127fe26 | ||
|
|
e31a0a258e | ||
|
|
742c293243 | ||
|
|
f856205afc | ||
|
|
9fa8ace80f | ||
|
|
dc39b94e88 | ||
|
|
a31c5f59a6 | ||
|
|
a899699e21 | ||
|
|
bd2d7cf748 | ||
|
|
ecb566f61e | ||
|
|
75cd077351 | ||
|
|
6202bc4719 | ||
|
|
e1e8a7f121 | ||
|
|
af711b0edb | ||
|
|
4f92001d68 | ||
|
|
58693162e6 | ||
|
|
b95fd1152a | ||
|
|
a4ff89b213 | ||
|
|
d7fbc572ca | ||
|
|
4d99bf3bf0 | ||
|
|
6e4972107e | ||
|
|
2f88752ae6 | ||
|
|
f3d8cf08ef | ||
|
|
592e17027b | ||
|
|
6570c13f3a | ||
|
|
931ed95ce1 | ||
|
|
2b48698817 | ||
|
|
b2cfa8b996 | ||
|
|
11796699bb | ||
|
|
1c6666fe45 | ||
|
|
923209b474 | ||
|
|
650c41c3f0 | ||
|
|
88ac2396e6 | ||
|
|
1d47fa681a | ||
|
|
96baa6cc15 | ||
|
|
7167055303 | ||
|
|
e0852119e8 | ||
|
|
4e56ce4073 | ||
|
|
923533d7b7 | ||
|
|
04d9372cfc | ||
|
|
02b76d3f45 | ||
|
|
36139b42f1 | ||
|
|
e6fe2a7c18 | ||
|
|
7cb2c2261b | ||
|
|
4a2801c8a0 | ||
|
|
b9ac5ecf2d | ||
|
|
fefd2f6cae | ||
|
|
2ad027082f | ||
|
|
9be3b78761 | ||
|
|
3dc648421b | ||
|
|
c7e217208c | ||
|
|
cd225703eb | ||
|
|
e9ec2f3a6e | ||
|
|
d1bd43fa95 | ||
|
|
76b7d41d5c | ||
|
|
1b748b6bf6 | ||
|
|
a943ca9a3c | ||
|
|
3be3564ec7 | ||
|
|
10ecb44aa6 | ||
|
|
79c52d014c | ||
|
|
5e3f4faade | ||
|
|
c395d35dd7 | ||
|
|
cb33a929ef | ||
|
|
f94e9c4930 | ||
|
|
5f9d015f0b | ||
|
|
7cc39647d8 | ||
|
|
8c97bcf994 | ||
|
|
5a39e8725b | ||
|
|
34d2c05959 | ||
|
|
42f63e3992 | ||
|
|
81105d1e94 | ||
|
|
a41ddd5451 | ||
|
|
8e889db63e | ||
|
|
5ebf291a4d | ||
|
|
d565c057dd | ||
|
|
50e263866b | ||
|
|
0fd4a26c71 | ||
|
|
0aa4cfb46f | ||
|
|
391d959630 | ||
|
|
9c32058fcc | ||
|
|
bc18724d70 | ||
|
|
011ad2cd6b | ||
|
|
ee99eefb72 | ||
|
|
a2b333b462 | ||
|
|
7ee9e47e82 | ||
|
|
d677ca5691 | ||
|
|
31e5cf317c | ||
|
|
410a023714 | ||
|
|
8b065fd9d7 | ||
|
|
f4b8226ea1 | ||
|
|
2023d5bce4 | ||
|
|
8807b24ce0 | ||
|
|
d4442261aa | ||
|
|
2efceef076 | ||
|
|
7ec123b9a1 | ||
|
|
3d31127a6a | ||
|
|
de190bfb7d | ||
|
|
bc6e4f8e5d | ||
|
|
a398e5aaf1 | ||
|
|
57d0f61b2c | ||
|
|
d9263c9011 | ||
|
|
d9c23bdf0b | ||
|
|
c2f62f7c94 | ||
|
|
d087b979fe | ||
|
|
b1b4c28618 | ||
|
|
a3e415d575 | ||
|
|
17fa80d20a | ||
|
|
13dcb00441 | ||
|
|
43718b8da2 | ||
|
|
47d6a8d53f | ||
|
|
8b50347bfa | ||
|
|
b525a814fc | ||
|
|
83ac645fae | ||
|
|
f2b8acfba8 | ||
|
|
49f126d169 | ||
|
|
02d04faa2a | ||
|
|
c2087efcf9 | ||
|
|
affa92cde2 | ||
|
|
d9e07ff7bd | ||
|
|
01599022f1 | ||
|
|
bc7eeb8c9d | ||
|
|
1396071865 | ||
|
|
7c9f38f06e | ||
|
|
7ebbd03bdc | ||
|
|
110ff56f74 | ||
|
|
c0fc225349 | ||
|
|
56f5e35895 | ||
|
|
ba0824bac3 | ||
|
|
250ef2bc3f | ||
|
|
d2b1f0b07b | ||
|
|
8f83261986 | ||
|
|
5d95e7ab2a | ||
|
|
ee1a337ab5 | ||
|
|
41bc09ee49 | ||
|
|
acaec3b8ac | ||
|
|
6c15dc1d66 | ||
|
|
2909e1d821 | ||
|
|
cabee0c9da | ||
|
|
c16c0ac795 | ||
|
|
6f0b1f37fc | ||
|
|
fd2a66f8f2 | ||
|
|
dd535daac0 | ||
|
|
3bcdcd06b7 | ||
|
|
f05acb57c9 | ||
|
|
bea1413b86 | ||
|
|
af63e5c18d | ||
|
|
cbb33b922d | ||
|
|
02f41a2f1a | ||
|
|
e778a59cdd | ||
|
|
67f7c05038 | ||
|
|
89c149af95 | ||
|
|
3630f583b5 | ||
|
|
a99f3389dc | ||
|
|
a49daa6fa2 | ||
|
|
db0a544155 | ||
|
|
77e32fada8 | ||
|
|
acbef3ae3e | ||
|
|
bb289d545e | ||
|
|
2d2455fdb3 | ||
|
|
0bf059e8e1 | ||
|
|
0492420d60 | ||
|
|
8f09740677 | ||
|
|
969c42a590 | ||
|
|
7daa93f061 | ||
|
|
452624ce74 | ||
|
|
b23152bb20 | ||
|
|
78993e122b | ||
|
|
87b6fcfc37 | ||
|
|
4945c13d05 | ||
|
|
08754cc527 | ||
|
|
45967c7a0b | ||
|
|
acf6816653 | ||
|
|
f8943703ed | ||
|
|
712605e4f1 | ||
|
|
a0d5fb8955 | ||
|
|
fec0d1f26a | ||
|
|
807b73c8a4 | ||
|
|
506ef4a20f | ||
|
|
306252da6f | ||
|
|
5f5a65f59d | ||
|
|
09d001b6db | ||
|
|
9aa907a909 | ||
|
|
2ad48b6fd5 | ||
|
|
6b3d99d1d1 | ||
|
|
813a2e29e9 | ||
|
|
e1f63701f1 | ||
|
|
9ff605623c | ||
|
|
db749d8b1b | ||
|
|
b30b29df8a | ||
|
|
7a145315f9 | ||
|
|
f13f39a0a0 | ||
|
|
3b557a892c | ||
|
|
41e777c81d | ||
|
|
90152bdc41 | ||
|
|
8db9bf3c99 | ||
|
|
c2e9204c56 | ||
|
|
61eb206c74 | ||
|
|
1c4db30b65 | ||
|
|
d039c65c4b | ||
|
|
18e95b7f07 | ||
|
|
0952221f90 | ||
|
|
0e1e87550f | ||
|
|
40fb9dc9fa | ||
|
|
4fe0c9feb2 | ||
|
|
006e20f06b | ||
|
|
1f7b3ca0f9 | ||
|
|
8d6503cf28 | ||
|
|
ecf0ac77f2 | ||
|
|
d342efe9a9 | ||
|
|
c21dd46289 | ||
|
|
8c378c6f91 | ||
|
|
597842a871 | ||
|
|
36bbbae579 | ||
|
|
902076c629 | ||
|
|
1b9f394489 | ||
|
|
450c434ed0 | ||
|
|
4b6a20faa4 | ||
|
|
ce38714a81 | ||
|
|
37f1eb9794 | ||
|
|
db4bfa4884 | ||
|
|
6a649cb7f0 | ||
|
|
b6ef559cde | ||
|
|
cc0daa2a22 | ||
|
|
c69c62cd45 | ||
|
|
6a26299a75 | ||
|
|
4101e91ae6 | ||
|
|
83192b7834 | ||
|
|
3b1091bb3e | ||
|
|
e67ab8f430 | ||
|
|
da731e7d5e | ||
|
|
0ea585633b | ||
|
|
fe40b7cfa1 | ||
|
|
d04a60349d | ||
|
|
94ae3da78b | ||
|
|
3ca54159f7 | ||
|
|
bf5dcda3b5 | ||
|
|
08ca525d3e | ||
|
|
dc7ce0bc4b | ||
|
|
729a1ea849 | ||
|
|
3b5493d78d | ||
|
|
6711791009 | ||
|
|
c41643ee3e | ||
|
|
2628a0e13e | ||
|
|
c8bc8b3172 | ||
|
|
24812b667c | ||
|
|
bec9a2d46b | ||
|
|
05cc82d7c5 | ||
|
|
82be996d97 | ||
|
|
d367739248 | ||
|
|
ef870ae385 | ||
|
|
466e741494 | ||
|
|
00fafb6a1b | ||
|
|
6d3e484855 | ||
|
|
845a0a3189 | ||
|
|
519db51be2 | ||
|
|
7ef3a10577 | ||
|
|
1c35ca67ce | ||
|
|
e0c6c14dca | ||
|
|
3cf348c7ae | ||
|
|
b3d45c45e1 | ||
|
|
c246edd8f9 | ||
|
|
c19bca2be0 | ||
|
|
a5f263ce48 | ||
|
|
cbe8fb2d65 | ||
|
|
8b6a4b2e88 | ||
|
|
a61d00482f | ||
|
|
0c7a77c4b6 | ||
|
|
211bee94bb | ||
|
|
b3ac0ae6d9 | ||
|
|
4c52a5aaa8 | ||
|
|
7a9ecf7b85 | ||
|
|
86b48188e1 | ||
|
|
7bbab22939 | ||
|
|
1343d6c93e | ||
|
|
735fec3b4c |
29
.gitignore
vendored
@@ -5,9 +5,26 @@
|
||||
.yamllint
|
||||
|
||||
# Ignore changes to sample environments
|
||||
helmfile/environments/dev/values.yaml
|
||||
helmfile/environments/dev/values.gotmpl
|
||||
helmfile/environments/test/values.yaml
|
||||
helmfile/environments/test/values.gotmpl
|
||||
helmfile/environments/prod/values.yaml
|
||||
helmfile/environments/prod/values.gotmpl
|
||||
helmfile/environments/dev/*.yaml.gotmpl
|
||||
helmfile/environments/test/*.yaml.gotmpl
|
||||
helmfile/environments/prod/*.yaml.gotmpl
|
||||
helmfile/environments/dev/*/
|
||||
helmfile/environments/test/*/
|
||||
helmfile/environments/prod/*/
|
||||
!helmfile/environments/dev/sample.yaml.gotmpl
|
||||
!helmfile/environments/test/sample.yaml.gotmpl
|
||||
!helmfile/environments/prod/sample.yaml.gotmpl
|
||||
|
||||
# Ignore in CI generated files
|
||||
.kyverno/opendesk.yaml
|
||||
.kyverno/kyverno-test.yaml
|
||||
|
||||
# Ignore editor backup files
|
||||
*~
|
||||
|
||||
# Ignore ./log directory and *.log files
|
||||
logs
|
||||
*.log
|
||||
|
||||
# Ignore backup files, e.g. created by the script that eases the local chart development
|
||||
*.bak
|
||||
|
||||
932
.gitlab-ci.yml
14
.gitlab/common/common.yml
Normal file
@@ -0,0 +1,14 @@
|
||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
variables:
|
||||
OPENDESK_CI_CLI_IMAGE: "registry.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli:2.7.2\
|
||||
@sha256:e33a6327b9c8f89f6e86d13804d5d81e9fdf6974a2f280874d6901067c22fd83"
|
||||
OPENDESK_LINT_IMAGE: "registry.opencode.de/bmi/opendesk/components/platform-development/images/ci-lint:1.0.14\
|
||||
@sha256:34d2a96e5fc25155abd48fef4d335b131c71d8cbc00ad531df0cae9918b9f2ab"
|
||||
|
||||
.common:
|
||||
cache: {}
|
||||
needs: []
|
||||
tags: []
|
||||
...
|
||||
11
.gitlab/generate/generate-common.yml
Normal file
@@ -0,0 +1,11 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
include:
|
||||
- local: "/.gitlab/common/common.yml"
|
||||
|
||||
.generate-common:
|
||||
extends: ".common"
|
||||
stage: ".post"
|
||||
tags: []
|
||||
...
|
||||
20
.gitlab/generate/generate-docs.yml
Normal file
@@ -0,0 +1,20 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
include:
|
||||
- local: "/.gitlab/generate/generate-common.yml"
|
||||
|
||||
generate-docs:
|
||||
cache:
|
||||
- key: "generate-docs-${CI_COMMIT_REF_SLUG}"
|
||||
paths:
|
||||
- "${CI_PROJECT_DIR}/docs"
|
||||
policy: "push"
|
||||
extends: ".generate-common"
|
||||
image: "${OPENDESK_CI_CLI_IMAGE}"
|
||||
rules:
|
||||
- if: "$JOB_RELEASE_ENABLED != 'false' && $CI_COMMIT_BRANCH == $RELEASE_BRANCH"
|
||||
when: "on_success"
|
||||
script:
|
||||
- "node /app/src/index.js generate-docs -d ${CI_PROJECT_DIR}"
|
||||
...
|
||||
26
.gitlab/lint/lint-common.yml
Normal file
@@ -0,0 +1,26 @@
|
||||
# SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
include:
|
||||
- local: "/.gitlab/common/common.yml"
|
||||
|
||||
.lint-common:
|
||||
extends: ".common"
|
||||
stage: "lint"
|
||||
|
||||
common-yaml-linter:
|
||||
rules:
|
||||
- if: "$JOB_COMMON_YAML_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|web|merge_request_event'"
|
||||
when: "never"
|
||||
- when: "always"
|
||||
|
||||
conventional-commits-linter:
|
||||
rules:
|
||||
- if: >
|
||||
$RUN_RENOVATE == "yes" ||
|
||||
$JOB_CONVENTIONAL_COMMITS_LINTER_ENABLED == 'false' ||
|
||||
$CI_PIPELINE_SOURCE =~ 'tags|merge_request_event'
|
||||
when: "never"
|
||||
- when: "always"
|
||||
...
|
||||
60
.gitlab/lint/lint-kyverno.yml
Normal file
@@ -0,0 +1,60 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
include:
|
||||
- local: "/.gitlab/lint/lint-common.yml"
|
||||
|
||||
lint-kyverno:
|
||||
allow_failure: false
|
||||
extends: ".lint-common"
|
||||
image: "${OPENDESK_LINT_IMAGE}"
|
||||
parallel:
|
||||
matrix:
|
||||
- APP:
|
||||
- "collabora"
|
||||
- "cryptpad"
|
||||
- "element"
|
||||
- "jitsi"
|
||||
- "nextcloud"
|
||||
- "notes"
|
||||
- "nubus"
|
||||
- "open-xchange"
|
||||
- "opendesk-migrations-post"
|
||||
- "opendesk-migrations-pre"
|
||||
- "opendesk-openproject-bootstrap"
|
||||
- "opendesk-services"
|
||||
- "openproject"
|
||||
- "services-external"
|
||||
- "xwiki"
|
||||
script:
|
||||
- "cd ${CI_PROJECT_DIR}/helmfile/apps/${APP}"
|
||||
- >
|
||||
node /app/opendesk-ci-cli/src/index.js generate-kyverno-env
|
||||
-d ${CI_PROJECT_DIR}/helmfile/environments
|
||||
-x ${CI_PROJECT_DIR}/.kyverno/_overwrite.yaml
|
||||
- "helmfile template -e test --include-needs --skip-tests > ${CI_PROJECT_DIR}/.kyverno/opendesk.yaml"
|
||||
- >
|
||||
node /app/opendesk-ci-cli/src/index.js remove-empty-keys
|
||||
-f ${CI_PROJECT_DIR}/.kyverno/opendesk.yaml
|
||||
- "cd ${CI_PROJECT_DIR}/.kyverno"
|
||||
# Test optional
|
||||
- >
|
||||
node /app/opendesk-ci-cli/src/index.js generate-kyverno-tests
|
||||
-d ${CI_PROJECT_DIR}/.kyverno
|
||||
-t optional
|
||||
-s manifest
|
||||
-f opendesk.yaml
|
||||
--skip-tests true
|
||||
${APP}
|
||||
- "kyverno test . || true"
|
||||
# Test required
|
||||
- >
|
||||
node /app/opendesk-ci-cli/src/index.js generate-kyverno-tests
|
||||
-d ${CI_PROJECT_DIR}/.kyverno
|
||||
-t required
|
||||
-s manifest
|
||||
-f opendesk.yaml
|
||||
--skip-tests true
|
||||
${APP}
|
||||
- "kyverno test ."
|
||||
...
|
||||
18
.gitlab/lint/lint-opendesk.yml
Normal file
@@ -0,0 +1,18 @@
|
||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
include:
|
||||
- local: "/.gitlab/lint/lint-common.yml"
|
||||
|
||||
lint-opendesk:
|
||||
extends: ".lint-common"
|
||||
image: "${OPENDESK_CI_CLI_IMAGE}"
|
||||
rules:
|
||||
- if: >
|
||||
$RUN_RENOVATE == "yes"
|
||||
when: "never"
|
||||
- when: "always"
|
||||
script:
|
||||
- "node /app/src/index.js sort-all -d ${CI_PROJECT_DIR}/helmfile"
|
||||
- "git diff --exit-code"
|
||||
...
|
||||
10
.gitlab/lint/lint-reuse.yml
Normal file
@@ -0,0 +1,10 @@
|
||||
# SPDX-FileCopyrightText: 2025 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
reuse-linter:
|
||||
allow_failure: false
|
||||
rules:
|
||||
- if: "$JOB_REUSE_LINTER_ENABLED == 'false' || $CI_PIPELINE_SOURCE =~ 'tags|web|merge_request_event'"
|
||||
when: "never"
|
||||
- when: "always"
|
||||
...
|
||||
59
.gitlab/merge_request_templates/Bugfix.md
Normal file
@@ -0,0 +1,59 @@
|
||||
# 🪲 Bugfix
|
||||
|
||||
*Expected MR Title and git commit message*
|
||||
*`fix(<app-name>): <Short description of what has been fixed>`*
|
||||
|
||||
|
||||
## ✅ Changes
|
||||
|
||||
Explain for the reviewer how the change addresses the issue, providing some insights on the underlaying cause of the bug.
|
||||
|
||||
- ...
|
||||
|
||||
## 🧪 How to reproduce & test
|
||||
|
||||
Provida a link to the issue or document the required details below.
|
||||
In case it is a GitLab issue, reference it at the end of the commit message in square brackets, like `[#123]`
|
||||
|
||||
### Before the Fix
|
||||
|
||||
1. ...
|
||||
|
||||
### After the Fix
|
||||
|
||||
Provide steps for QA or reviewers to test the fix and mention anything reviewers should be aware of:
|
||||
|
||||
1. ...
|
||||
|
||||
## 🔄 Requirements for migrations
|
||||
|
||||
- [ ] Describe manual steps required to update existing deployments. This especially applies if this MR introduces breaking changes:
|
||||
- [ ] Any other considerations in context of the update:
|
||||
|
||||
# Checklist / Sign-offs
|
||||
|
||||
## 🏷️ Labels
|
||||
|
||||
Set labels:
|
||||
|
||||
```
|
||||
/label ~"MR-Type::Bugfix"
|
||||
/label ~"PO::👀"
|
||||
/label ~"Tech Lead::👀"
|
||||
/label ~"QA::👀"
|
||||
/label ~"Testautomation::👀"
|
||||
```
|
||||
|
||||
# 👷 Developer Checklist
|
||||
|
||||
**Documentation:**
|
||||
|
||||
Does this MR introduce changes (e.g., new secrets, configuration options) that require documentation?
|
||||
- [ ] No
|
||||
- [ ] Yes, and the documentation has been updated accordingly
|
||||
|
||||
**Quality Assurance:**
|
||||
- [ ] Verified that the feature works as expected, including upgrade scenarios
|
||||
- [ ] Performed regression testing
|
||||
- Link to internal comment(s) with detailed QA results (to avoid exposing infrastructure details):
|
||||
- ...
|
||||
8
.gitlab/merge_request_templates/Default.md
Normal file
@@ -0,0 +1,8 @@
|
||||
Thank you for your contribution!
|
||||
|
||||
Please follow these simple guidelines to continue:
|
||||
|
||||
- Create MRs early and use the "draft" state to show that this MR isn't ready for review and merge.
|
||||
- Flag the MR "ready" as soon as it can be reviewed and QA'd.
|
||||
- Always assign the MR to yourself and set somebody from the development team as reviewer. If you do not know whom to chose leave the reviewer empty.
|
||||
- Select one of the templates in case your contribution contains more than simple documentation updates and follow the templates instructions.
|
||||
49
.gitlab/merge_request_templates/Feature.md
Normal file
@@ -0,0 +1,49 @@
|
||||
# ⬆️ Feature
|
||||
|
||||
*Expected MR Title and git commit message*
|
||||
*`feat(<app-name>): <Short description of the new feature>`*
|
||||
|
||||
## ✅ Changes
|
||||
|
||||
List the key changes made in this MR:
|
||||
|
||||
- ...
|
||||
|
||||
## 🧪 Tests
|
||||
|
||||
Provide steps for QA or reviewers to test the feature and mention anything reviewers should be aware of:
|
||||
|
||||
- ...
|
||||
|
||||
## 🔄 Requirements for migrations
|
||||
|
||||
- [ ] Describe manual steps required to update existing deployments. This especially applies if this MR introduces breaking changes:
|
||||
- [ ] Any other considerations in context of the update:
|
||||
|
||||
# Checklist / Sign-offs
|
||||
|
||||
## 🏷️ Labels
|
||||
|
||||
Set labels:
|
||||
|
||||
```
|
||||
/label ~"MR-Type::Feature"
|
||||
/label ~"PO::👀"
|
||||
/label ~"Tech Lead::👀"
|
||||
/label ~"QA::👀"
|
||||
/label ~"Testautomation::👀"
|
||||
```
|
||||
|
||||
# 👷 Developer Checklist
|
||||
|
||||
**Documentation:**
|
||||
|
||||
Does this MR introduce changes (e.g., new secrets, configuration options) that require documentation?
|
||||
- [ ] No
|
||||
- [ ] Yes, and the documentation has been updated accordingly
|
||||
|
||||
**Quality Assurance:**
|
||||
- [ ] Verified that the feature works as expected, including upgrade scenarios
|
||||
- [ ] Performed regression testing
|
||||
- Link to internal comment(s) with detailed QA results (to avoid exposing infrastructure details):
|
||||
- ...
|
||||
43
.gitlab/merge_request_templates/Other.md
Normal file
@@ -0,0 +1,43 @@
|
||||
# 🎉 Other
|
||||
|
||||
*Expected MR Title and git commit message*
|
||||
*`fix(<component>): <Short description of what has been changed>`*
|
||||
|
||||
## ✅ Changes
|
||||
|
||||
Explain for the reviewer and QA the reason for the MR and what changes are included.
|
||||
|
||||
- ...
|
||||
|
||||
## 🔄 Requirements for migrations
|
||||
|
||||
- [ ] Describe manual steps required to update existing deployments. This especially applies if this MR introduces breaking changes:
|
||||
- [ ] Any other considerations in context of the update:
|
||||
|
||||
# Checklist / Sign-offs
|
||||
|
||||
## 🏷️ Labels
|
||||
|
||||
Set labels:
|
||||
|
||||
```
|
||||
/label ~"MR-Type::Other"
|
||||
/label ~"PO::👀"
|
||||
/label ~"Tech Lead::👀"
|
||||
/label ~"QA::👀"
|
||||
/label ~"Testautomation::👀"
|
||||
```
|
||||
|
||||
# 👷 Developer Checklist
|
||||
|
||||
**Documentation:**
|
||||
|
||||
Does this MR introduce changes (e.g., new secrets, configuration options) that require documentation?
|
||||
- [ ] No
|
||||
- [ ] Yes, and the documentation has been updated accordingly
|
||||
|
||||
**Quality Assurance:**
|
||||
- [ ] Verified that the feature works as expected, including upgrade scenarios
|
||||
- [ ] Performed regression testing
|
||||
- Link to internal comment(s) with detailed QA results (to avoid exposing infrastructure details):
|
||||
- ...
|
||||
43
.gitlab/merge_request_templates/Update.md
Normal file
@@ -0,0 +1,43 @@
|
||||
# ⬆️ Application Update
|
||||
|
||||
*Expected MR Title and git commit message*
|
||||
*`feat/fix(<app-name>): Update from <old-version> to <new-version>`*
|
||||
|
||||
## 📋 Changelog/Release Notes
|
||||
|
||||
- [ ] [README.md](../../README.md) component table updated including the link to the related release notes
|
||||
- [ ] Provide significant improvements you'd like to see in the openDesk release notes. If you have a lot of details to provide or someone else is providing the details, please use a comment on the MR and link the comment in here.
|
||||
|
||||
## 🔄 Requirements for migrations
|
||||
|
||||
- [ ] Minimum version of the application required in existing depoyments to update/upgrade:
|
||||
- [ ] Describe manual steps required to update existing deployments. This especially applies if the upgrade includes any breaking changes:
|
||||
- [ ] Any other considerations in context of the update:
|
||||
|
||||
# Checklist / Sign-offs
|
||||
|
||||
## 🏷️ Labels
|
||||
|
||||
Set labels:
|
||||
|
||||
```
|
||||
/label ~"MR-Type::AppUpdate"
|
||||
/label ~"PO::👀"
|
||||
/label ~"Tech Lead::👀"
|
||||
/label ~"QA::👀"
|
||||
/label ~"Testautomation::👀"
|
||||
```
|
||||
|
||||
# 👷 Developer Checklist
|
||||
|
||||
**Documentation:**
|
||||
|
||||
Does this MR introduce changes (e.g., new secrets, configuration options) that require documentation?
|
||||
- [ ] No
|
||||
- [ ] Yes, and the documentation has been updated accordingly
|
||||
|
||||
**Quality Assurance:**
|
||||
- [ ] Verified that the feature works as expected, including upgrade scenarios
|
||||
- [ ] Performed regression testing
|
||||
- Link to internal comment(s) with detailed QA results (to avoid exposing infrastructure details):
|
||||
- ...
|
||||
8
.gitlab/release/release-common.yml
Normal file
@@ -0,0 +1,8 @@
|
||||
# SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
# Overwrite shared settings
|
||||
.common-semantic-release:
|
||||
image: "registry.opencode.de/bmi/opendesk/components/platform-development/images/semantic-release:1.1.0"
|
||||
tags: []
|
||||
...
|
||||
11
.gitlab/release/release-generate-version.yml
Normal file
@@ -0,0 +1,11 @@
|
||||
# SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
generate-release-version:
|
||||
rules:
|
||||
- if: >
|
||||
$JOB_RELEASE_ENABLED != 'false' &&
|
||||
$CI_COMMIT_BRANCH == $RELEASE_BRANCH &&
|
||||
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
||||
when: "on_success"
|
||||
...
|
||||
63
.gitlab/release/release-semantic.yml
Normal file
@@ -0,0 +1,63 @@
|
||||
# SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
release:
|
||||
cache:
|
||||
- key: "generate-docs-${CI_COMMIT_REF_SLUG}"
|
||||
paths:
|
||||
- "${CI_PROJECT_DIR}/docs"
|
||||
policy: "pull"
|
||||
rules:
|
||||
- if: >
|
||||
$JOB_AVSCAN_ENABLED != 'false' &&
|
||||
$CI_COMMIT_BRANCH == $RELEASE_BRANCH &&
|
||||
$CI_PIPELINE_SOURCE =~ "push|merge_request_event"
|
||||
when: "on_success"
|
||||
script:
|
||||
- >
|
||||
export RELEASE_VERSION=$(semantic-release --dry-run --branches $CI_COMMIT_REF_NAME --plugins
|
||||
"@semantic-release/gitlab" | grep -oP "Published release [0-9]+\.[0-9]+\.[0-9]+ on" |
|
||||
grep -oP "[0-9]+\.[0-9]+\.[0-9]+")
|
||||
- |
|
||||
if [ -z "${RELEASE_VERSION}" ]; then
|
||||
echo "RELEASE_VERSION=$(git describe --tags --abbrev=0 | sed s@^v@@g )"
|
||||
else
|
||||
echo "RELEASE_VERSION=${RELEASE_VERSION}"
|
||||
fi
|
||||
- |
|
||||
echo -e "\n[INFO] Writing data to helm value file..."
|
||||
cat <<EOF >helmfile/environments/default/global.generated.yaml.gotmpl
|
||||
# SPDX-FileCopyrightText: 2024-2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
global:
|
||||
systemInformation:
|
||||
releaseVersion: "v$(echo -E "$RELEASE_VERSION")"
|
||||
...
|
||||
EOF
|
||||
- |
|
||||
cat << 'EOF' > ${CI_PROJECT_DIR}/.releaserc
|
||||
{
|
||||
"branches": ["main"],
|
||||
"plugins": [
|
||||
"@semantic-release/gitlab",
|
||||
"@semantic-release/release-notes-generator",
|
||||
"@semantic-release/changelog",
|
||||
["@semantic-release/git", {
|
||||
"assets": [
|
||||
"charts/**/Chart.yaml",
|
||||
"CHANGELOG.md",
|
||||
"charts/**/README.md",
|
||||
"helmfile/environments/default/global.generated.yaml.gotmpl",
|
||||
".kyverno/kyverno-test.yaml",
|
||||
"docs"
|
||||
],
|
||||
"message": "chore(release): ${nextRelease.version} [skip ci]\n\n${nextRelease.notes}"
|
||||
}]
|
||||
]
|
||||
}
|
||||
EOF
|
||||
- "semantic-release"
|
||||
needs:
|
||||
- "generate-docs"
|
||||
...
|
||||
19
.gitlab/renovate/renovate.yml
Normal file
@@ -0,0 +1,19 @@
|
||||
# SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
renovate:
|
||||
rules:
|
||||
- if: >
|
||||
$RUN_RENOVATE == "yes"
|
||||
when: "on_success"
|
||||
# The `-full` image does not install the dependencies on the fly, that is our preferred approach
|
||||
image: "${CI_DEPENDENCY_PROXY_DIRECT_GROUP_IMAGE_PREFIX}/renovate/renovate:37.356-full"
|
||||
variables:
|
||||
RENOVATE_CONFIG_FILE: "${CI_PROJECT_DIR}/.renovate/config.yaml"
|
||||
RENOVATE_ENDPOINT: "${CI_API_V4_URL}"
|
||||
# Increase the renovatebot log level on stdout
|
||||
LOG_LEVEL: "DEBUG"
|
||||
script:
|
||||
- "renovate ${RENOVATE_EXTRA_FLAGS}"
|
||||
stage: "renovate"
|
||||
...
|
||||
@@ -1,8 +1,6 @@
|
||||
# SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
|
||||
store-dav:
|
||||
bundled: false
|
||||
|
||||
replicas:
|
||||
umsLdapServerPrimary: 2
|
||||
...
|
||||
292
.kyverno/policies/_policies.yaml
Normal file
@@ -0,0 +1,292 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
pod:
|
||||
- name: "require-tag-and-digest"
|
||||
rule: "require-tag-and-digest"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-default-serviceaccount"
|
||||
rule: "disallow-default-serviceAccountName"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "template-imagepullsecrets"
|
||||
rule: "template-imagePullSecrets"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-latest-tag"
|
||||
rule: "disallow-latest-tag"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-latest-tag"
|
||||
rule: "require-image-tag-or-digest"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-imagepullpolicy"
|
||||
rule: "require-imagePullPolicy"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-health-and-liveness-check"
|
||||
rule: "require-health-and-liveness-check"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "template-storage"
|
||||
rule: "template-storageClassName-pod"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "PersistentVolumeClaim"
|
||||
- name: "template-storage"
|
||||
rule: "template-storageClassName-pvc"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- name: "template-storage"
|
||||
rule: "template-requests-storage-pod"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "PersistentVolumeClaim"
|
||||
- name: "template-storage"
|
||||
rule: "template-requests-storage-pvc"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- name: "require-requests-limits"
|
||||
rule: "validate-resources"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "template-image-registries"
|
||||
rule: "template-image-registries"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-ro-rootfs"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-no-privilege-escalation"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-all-capabilities-dropped"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-no-privileged"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-run-as-user"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-run-as-group"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-seccomp-profile"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-run-as-non-root"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-empty-seLinuxOptions"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "require-default-procMount"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "require-containersecuritycontext"
|
||||
rule: "restrict-sysctls"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-container-sock-mounts"
|
||||
rule: "validate-docker-sock-mount"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-container-sock-mounts"
|
||||
rule: "validate-containerd-sock-mount"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-container-sock-mounts"
|
||||
rule: "validate-crio-sock-mount"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-container-sock-mounts"
|
||||
rule: "validate-dockerd-sock-mount"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-host-namespaces"
|
||||
rule: "disallow-host-namespaces"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-host-path"
|
||||
rule: "disallow-host-path"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-host-ports"
|
||||
rule: "disallow-host-ports"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "disallow-host-process"
|
||||
rule: "disallow-host-process"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
- "Job"
|
||||
- "Pod"
|
||||
- "DaemonSet"
|
||||
- name: "template-ingress"
|
||||
rule: "template-ingressClassName"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "Ingress"
|
||||
- name: "template-ingress"
|
||||
rule: "template-tls-secretName"
|
||||
type: "required"
|
||||
kinds:
|
||||
- "Ingress"
|
||||
- name: "template-replicas"
|
||||
rule: "template-replicas"
|
||||
type: "optional"
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
- "Deployment"
|
||||
...
|
||||
80
.kyverno/policies/disallow-container-sock-mounts.yaml
Normal file
@@ -0,0 +1,80 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "disallow-container-sock-mounts"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Disallow CRI socket mounts"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
Container daemon socket bind mounts allow access to the container engine on the node.
|
||||
This access can be used for privilege escalation and to manage containers outside of Kubernetes, and hence should
|
||||
not be allowed.
|
||||
This policy validates that the sockets used for CRI engines Docker, Containerd, and CRI-O are not used.
|
||||
In addition to or replacement of this policy, preventing users from mounting the parent directories
|
||||
(/var/run and /var) may be necessary to completely prevent socket bind mounts.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- name: "validate-docker-sock-mount"
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Use of the Docker Unix socket is not allowed."
|
||||
anyPattern:
|
||||
- spec:
|
||||
=(volumes):
|
||||
- =(hostPath):
|
||||
path: "!/var/run/docker.sock"
|
||||
- spec:
|
||||
=(volumes):
|
||||
- name: "validate-containerd-sock-mount"
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Use of the Containerd Unix socket is not allowed."
|
||||
anyPattern:
|
||||
- spec:
|
||||
=(volumes):
|
||||
- =(hostPath):
|
||||
path: "!/var/run/containerd/containerd.sock"
|
||||
- spec:
|
||||
=(volumes):
|
||||
- name: "validate-crio-sock-mount"
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Use of the CRI-O Unix socket is not allowed."
|
||||
anyPattern:
|
||||
- spec:
|
||||
=(volumes):
|
||||
- =(hostPath):
|
||||
path: "!/var/run/crio/crio.sock"
|
||||
- spec:
|
||||
=(volumes):
|
||||
- name: "validate-dockerd-sock-mount"
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Use of the Docker CRI socket is not allowed."
|
||||
anyPattern:
|
||||
- spec:
|
||||
=(volumes):
|
||||
- =(hostPath):
|
||||
path: "!/var/run/cri-dockerd.sock"
|
||||
- spec:
|
||||
=(volumes):
|
||||
36
.kyverno/policies/disallow-default-serviceaccount.yaml
Normal file
@@ -0,0 +1,36 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "disallow-default-serviceaccount"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Prevent default ServiceAccount privilege escalation"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
Kubernetes automatically creates a ServiceAccount object named default for every namespace in your cluster.
|
||||
These default service accounts get no permissions by default.
|
||||
Accidental or intended assignment of permissions on the default service account results in elevated permissions
|
||||
for all pods with default service account assigned.
|
||||
This risk can be mitigated by creating a custom ServiceAccount for each application or reduce the risk by disable
|
||||
auto mounting the default service account into the pod.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "disallow-default-serviceAccountName"
|
||||
validate:
|
||||
message: >-
|
||||
Field serviceAccountName must be set to anything other than 'default'.
|
||||
When serviceAccountName is 'default' then automountServiceAccountToken must set to 'false' .
|
||||
anyPattern:
|
||||
- spec:
|
||||
serviceAccountName: "!default"
|
||||
- spec:
|
||||
automountServiceAccountToken: "false"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
33
.kyverno/policies/disallow-host-namespaces.yaml
Normal file
@@ -0,0 +1,33 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "disallow-host-namespaces"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Disallow Host Namespaces"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
Host namespaces (Process ID namespace, Inter-Process Communication namespace, and network namespace) allow access
|
||||
to shared information and can be used to elevate privileges.
|
||||
Pods should not be allowed access to host namespaces.
|
||||
This policy ensures fields which make use of these host namespaces are unset or set to `false`.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- name: "disallow-host-namespaces"
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: >-
|
||||
Sharing the host namespaces is disallowed. The fields spec.hostNetwork,
|
||||
spec.hostIPC, and spec.hostPID must be unset or set to `false`.
|
||||
pattern:
|
||||
spec:
|
||||
=(hostPID): "false"
|
||||
=(hostIPC): "false"
|
||||
=(hostNetwork): "false"
|
||||
32
.kyverno/policies/disallow-host-path.yaml
Normal file
@@ -0,0 +1,32 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "disallow-host-path"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Disallow hostPath"
|
||||
policies.kyverno.io/subject: "Pod,Volume"
|
||||
policies.kyverno.io/description: >-
|
||||
HostPath volumes let Pods use host directories and volumes in containers.
|
||||
Using host resources can be used to access shared data or escalate privileges and should not be allowed.
|
||||
This policy ensures no hostPath volumes are in use.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- name: "disallow-host-path"
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: >-
|
||||
HostPath volumes are forbidden. The field spec.volumes[*].hostPath must be unset.
|
||||
anyPattern:
|
||||
- spec:
|
||||
=(volumes):
|
||||
- X(hostPath): "null"
|
||||
- spec:
|
||||
=(volumes):
|
||||
38
.kyverno/policies/disallow-host-ports.yaml
Normal file
@@ -0,0 +1,38 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "disallow-host-ports"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Disallow hostPorts"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
Access to host ports allows potential snooping of network traffic and should not be allowed, or at minimum
|
||||
restricted to a known list. This policy ensures the `hostPort` field is unset or set to `0`.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- name: "disallow-host-ports"
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: >-
|
||||
Use of host ports is disallowed. The fields spec.containers[*].ports[*].hostPort
|
||||
, spec.initContainers[*].ports[*].hostPort, and spec.ephemeralContainers[*].ports[*].hostPort
|
||||
must either be unset or set to `0`.
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- =(ports):
|
||||
- =(hostPort): 0
|
||||
=(initContainers):
|
||||
- =(ports):
|
||||
- =(hostPort): 0
|
||||
containers:
|
||||
- =(ports):
|
||||
- =(hostPort): 0
|
||||
45
.kyverno/policies/disallow-host-process.yaml
Normal file
@@ -0,0 +1,45 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "disallow-host-process"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Disallow hostProcess"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
Windows pods offer the ability to run HostProcess containers which enables privileged access to the Windows node.
|
||||
Privileged access to the host is disallowed in the baseline policy.
|
||||
HostProcess pods are an alpha feature as of Kubernetes v1.22.
|
||||
This policy ensures the `hostProcess` field, if present, is set to `false`.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- name: "disallow-host-process"
|
||||
match:
|
||||
any:
|
||||
- resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: >-
|
||||
HostProcess containers are disallowed. The fields spec.securityContext.windowsOptions.hostProcess,
|
||||
spec.containers[*].securityContext.windowsOptions.hostProcess,
|
||||
spec.initContainers[*].securityContext.windowsOptions.hostProcess, and
|
||||
spec.ephemeralContainers[*].securityContext.windowsOptions.hostProcess must either be undefined or set to
|
||||
`false`.
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- =(securityContext):
|
||||
=(windowsOptions):
|
||||
=(hostProcess): "false"
|
||||
=(initContainers):
|
||||
- =(securityContext):
|
||||
=(windowsOptions):
|
||||
=(hostProcess): "false"
|
||||
containers:
|
||||
- =(securityContext):
|
||||
=(windowsOptions):
|
||||
=(hostProcess): "false"
|
||||
57
.kyverno/policies/disallow-latest-tag.yaml
Normal file
@@ -0,0 +1,57 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "disallow-latest-tag"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Disallow usage of latest tag"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
The ':latest' tag is mutable and can lead to unexpected errors if the image changes.
|
||||
A best practice is to use an immutable tag that maps to a specific version of an application Pod.
|
||||
This policy validates that the image specifies a tag and that it is not called `latest`.
|
||||
Defining no image tag or digest result in the container engine retrieving the latest tag.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "disallow-latest-tag"
|
||||
validate:
|
||||
message: "Using a mutable image tag e.g. 'latest' is not allowed."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- image: "!*:latest"
|
||||
=(initContainers):
|
||||
- image: "!*:latest"
|
||||
containers:
|
||||
- image: "!*:latest"
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "require-image-tag-or-digest"
|
||||
validate:
|
||||
message: "A image tag or a digest is required, otherwise latest tag is chosen."
|
||||
anyPattern:
|
||||
- spec:
|
||||
=(ephemeralContainers):
|
||||
- image: "*:*"
|
||||
=(initContainers):
|
||||
- image: "*:*"
|
||||
containers:
|
||||
- image: "*:*"
|
||||
- spec:
|
||||
=(ephemeralContainers):
|
||||
- image: "*@*"
|
||||
=(initContainers):
|
||||
- image: "*@*"
|
||||
containers:
|
||||
- image: "*@*"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
244
.kyverno/policies/require-containersecuritycontext.yaml
Normal file
@@ -0,0 +1,244 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "require-containersecuritycontext"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "ContainerSecurityContext best practices are set."
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
The containerSecurityContext is the most important security-related section because it has the highest precedence
|
||||
and restricts the container to its minimal privileges.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- name: "require-ro-rootfs"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Root filesystem must be read-only."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
containers:
|
||||
- securityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
|
||||
- name: "require-no-privilege-escalation"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Disallow privilege escalation."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
containers:
|
||||
- securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
|
||||
- name: "require-all-capabilities-dropped"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Required to drop ALL linux capabilities."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- "ALL"
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- "ALL"
|
||||
containers:
|
||||
- securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- "ALL"
|
||||
|
||||
- name: "require-no-privileged"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Disallow privileged container."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
privileged: false
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
privileged: false
|
||||
containers:
|
||||
- securityContext:
|
||||
privileged: false
|
||||
|
||||
- name: "require-run-as-user"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Container must run as non-root user."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
runAsUser: ">0"
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
runAsUser: ">0"
|
||||
containers:
|
||||
- securityContext:
|
||||
runAsUser: ">0"
|
||||
|
||||
- name: "require-run-as-group"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Container must run as non-root group."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
runAsGroup: ">0"
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
runAsGroup: ">0"
|
||||
containers:
|
||||
- securityContext:
|
||||
runAsGroup: ">0"
|
||||
|
||||
- name: "require-seccomp-profile"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Container must have seccompProfile"
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
seccompProfile:
|
||||
type: "RuntimeDefault | Localhost"
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
seccompProfile:
|
||||
type: "RuntimeDefault | Localhost"
|
||||
containers:
|
||||
- securityContext:
|
||||
seccompProfile:
|
||||
type: "RuntimeDefault | Localhost"
|
||||
|
||||
- name: "require-run-as-non-root"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "Container must run in non-root mode."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
runAsNonRoot: true
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
runAsNonRoot: true
|
||||
containers:
|
||||
- securityContext:
|
||||
runAsNonRoot: true
|
||||
|
||||
- name: "require-empty-seLinuxOptions"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: "SELinux options have to be unset."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- securityContext:
|
||||
seLinuxOptions:
|
||||
=(initContainers):
|
||||
- securityContext:
|
||||
seLinuxOptions:
|
||||
containers:
|
||||
- securityContext:
|
||||
seLinuxOptions:
|
||||
|
||||
- name: "require-default-procMount"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: >-
|
||||
Changing the proc mount from the default is not allowed. The fields
|
||||
spec.containers[*].securityContext.procMount, spec.initContainers[*].securityContext.procMount,
|
||||
and spec.ephemeralContainers[*].securityContext.procMount must be unset or
|
||||
set to `Default`.
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- =(securityContext):
|
||||
=(procMount): "Default"
|
||||
=(initContainers):
|
||||
- =(securityContext):
|
||||
=(procMount): "Default"
|
||||
containers:
|
||||
- =(securityContext):
|
||||
=(procMount): "Default"
|
||||
|
||||
- name: "restrict-sysctls"
|
||||
match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
validate:
|
||||
message: >-
|
||||
Setting additional sysctls above the allowed type is not allowed.
|
||||
The field spec.securityContext.sysctls must be unset or not use any other names
|
||||
than kernel.shm_rmid_forced, net.ipv4.ip_local_port_range,
|
||||
net.ipv4.ip_unprivileged_port_start, net.ipv4.tcp_syncookies and
|
||||
net.ipv4.ping_group_range.
|
||||
pattern:
|
||||
spec:
|
||||
=(securityContext):
|
||||
=(sysctls):
|
||||
- =(name): >-
|
||||
kernel.shm_rmid_forced |
|
||||
net.ipv4.ip_local_port_range |
|
||||
net.ipv4.ip_unprivileged_port_start |
|
||||
net.ipv4.tcp_syncookies |
|
||||
net.ipv4.ping_group_range
|
||||
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
38
.kyverno/policies/require-health-and-liveness-check.yaml
Normal file
@@ -0,0 +1,38 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "require-health-and-liveness-check"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Disallow usage of latest tag"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
Liveness and readiness probes need to be configured to correctly manage a Pod's lifecycle during deployments,
|
||||
restarts, and upgrades.
|
||||
For each Pod, a periodic `livenessProbe` is performed by the kubelet to determine if the Pod's containers are
|
||||
running or need to be restarted.
|
||||
A `readinessProbe` is used by Services and Pods to determine if the Pod is ready to receive network traffic.
|
||||
This policy validates that all containers have livenessProbe and readinessProbe defined.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "require-health-and-liveness-check"
|
||||
validate:
|
||||
message: >-
|
||||
Liveness and readiness probes are required. spec.containers[*].livenessProbe.periodSeconds must be set to a
|
||||
value greater than 0.
|
||||
pattern:
|
||||
spec:
|
||||
containers:
|
||||
- livenessProbe:
|
||||
periodSeconds: ">0"
|
||||
readinessProbe:
|
||||
periodSeconds: ">0"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
51
.kyverno/policies/require-imagepullpolicy.yaml
Normal file
@@ -0,0 +1,51 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "require-imagepullpolicy"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Disallow usage of latest tag"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
If the `latest` tag is allowed for images, it is a good idea to have the imagePullPolicy field set to `Always` to
|
||||
ensure later pulls get an updated image in case the latest tag gets updated.
|
||||
This policy validates the imagePullPolicy is set to `Always` when the `latest` tag is specified explicitly or
|
||||
where a tag is not defined at all.
|
||||
Additionally this policy checks if the variable `.Values.global.imagePullPolicy` is used in templates.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "require-imagePullPolicy"
|
||||
validate:
|
||||
message: >-
|
||||
The imagePullPolicy must be set to `Always` when the `latest` tag is used, otherwise the value from
|
||||
`.Values.global.imagePullPolicy` has to be used.
|
||||
anyPattern:
|
||||
- spec:
|
||||
=(ephemeralContainers):
|
||||
- (image): "*:latest | !*:*"
|
||||
imagePullPolicy: "Always"
|
||||
=(initContainers):
|
||||
- (image): "*:latest | !*:*"
|
||||
imagePullPolicy: "Always"
|
||||
containers:
|
||||
- (image): "*:latest | !*:*"
|
||||
imagePullPolicy: "Always"
|
||||
- spec:
|
||||
=(ephemeralContainers):
|
||||
- (image): "!*:latest"
|
||||
imagePullPolicy: "kyverno"
|
||||
=(initContainers):
|
||||
- (image): "!*:latest"
|
||||
imagePullPolicy: "kyverno"
|
||||
containers:
|
||||
- (image): "!*:latest"
|
||||
imagePullPolicy: "kyverno"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
52
.kyverno/policies/require-requests-limits.yaml
Normal file
@@ -0,0 +1,52 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "require-requests-limits"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Require resources cpu/memory request and limits."
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
As application workloads share cluster resources, it is important to limit resources requested and consumed by
|
||||
each Pod.
|
||||
It is recommended to require resource requests and limits per Pod, especially for memory and CPU.
|
||||
If a Namespace level request or limit is specified, defaults will automatically be applied to each Pod based on
|
||||
the LimitRange configuration.
|
||||
This policy validates that all containers have specified requests for memory and CPU and a limit for memory.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "validate-resources"
|
||||
validate:
|
||||
message: "CPU and memory resource requests and limits are required."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- resources:
|
||||
limits:
|
||||
memory: "?*"
|
||||
requests:
|
||||
cpu: "?*"
|
||||
memory: "?*"
|
||||
=(initContainers):
|
||||
- resources:
|
||||
limits:
|
||||
memory: "?*"
|
||||
requests:
|
||||
cpu: "?*"
|
||||
memory: "?*"
|
||||
containers:
|
||||
- resources:
|
||||
limits:
|
||||
memory: "?*"
|
||||
requests:
|
||||
cpu: "?*"
|
||||
memory: "?*"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
35
.kyverno/policies/require-tag-and-digest.yaml
Normal file
@@ -0,0 +1,35 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "require-tag-and-digest"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Require tag and digest for image."
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
To ensure that containers are not compromised in container registry by pushing malicious code to the same tag, it
|
||||
is required to reference images by setting a sha256 hashed digest.
|
||||
Setting only the digest is complicated for humans to compare software versions, therefore in openDesk it is
|
||||
required to reference container images by tag and digest.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "require-tag-and-digest"
|
||||
validate:
|
||||
message: "An image tag and digest required."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- image: "*:*@sha256:*"
|
||||
=(initContainers):
|
||||
- image: "*:*@sha256:*"
|
||||
containers:
|
||||
- image: "*:*@sha256:*"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
33
.kyverno/policies/template-image-registries.yaml
Normal file
@@ -0,0 +1,33 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "template-image-registries"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Check image registry template"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
This policy verifies that a custom external registry can be template to allow downloads from a private registry or
|
||||
cache.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "template-image-registries"
|
||||
validate:
|
||||
message: "Unknown image registry."
|
||||
pattern:
|
||||
spec:
|
||||
=(ephemeralContainers):
|
||||
- image: "my_private_registry.domain.tld/*"
|
||||
=(initContainers):
|
||||
- image: "my_private_registry.domain.tld/*"
|
||||
containers:
|
||||
- image: "my_private_registry.domain.tld/*"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
38
.kyverno/policies/template-ingress.yaml
Normal file
@@ -0,0 +1,38 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "template-ingress"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Validate openDesk Ingress templating"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
This policy verifies that ingress variables are templated.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Ingress"
|
||||
name: "template-ingressClassName"
|
||||
validate:
|
||||
message: "Verifies that ingressClassName can be customized by `.Values.ingress.ingressClassName` variable."
|
||||
pattern:
|
||||
spec:
|
||||
ingressClassName: "kyverno"
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Ingress"
|
||||
name: "template-tls-secretName"
|
||||
validate:
|
||||
message: "Verifies that tls.secretName can be customized by `.Values.ingress.tls.secretName` variable."
|
||||
pattern:
|
||||
spec:
|
||||
tls:
|
||||
- secretName: "kyverno-tls"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
29
.kyverno/policies/template-replicas.yaml
Normal file
@@ -0,0 +1,29 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "template-replicas"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Validate openDesk Pod replicas templating"
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
This policy verifies that `.Values.replicas.<app>` variables are templated.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Deployment"
|
||||
- "StatefulSet"
|
||||
name: "template-replicas"
|
||||
validate:
|
||||
message: "Verifies that replica count can be customized by `.Values.replicas.<app>` variable."
|
||||
pattern:
|
||||
spec:
|
||||
replicas: 42
|
||||
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
31
.kyverno/policies/template-require-imagepullsecets.yaml
Normal file
@@ -0,0 +1,31 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "template-imagepullsecrets"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "ImagePullSecrets template variable have to be implemented."
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
It is recommended to cache images to ensure continuous image availability during network partitions, rate limiting
|
||||
or registry outages.
|
||||
These caches as well as a company proxy may require authentication which will be provided as ImagePullSecrets.
|
||||
This is a openDesk test to ensure that environment variables are templated in Helmfile deployment.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "Pod"
|
||||
name: "template-imagePullSecrets"
|
||||
validate:
|
||||
message: "ImagePullSecrets are required."
|
||||
pattern:
|
||||
spec:
|
||||
imagePullSecrets:
|
||||
- name: "kyverno-test"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
67
.kyverno/policies/template-storage.yaml
Normal file
@@ -0,0 +1,67 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
apiVersion: "kyverno.io/v1"
|
||||
kind: "ClusterPolicy"
|
||||
metadata:
|
||||
name: "template-storage"
|
||||
annotations:
|
||||
policies.kyverno.io/title: "Validate storageClass and size templates."
|
||||
policies.kyverno.io/subject: "Pod"
|
||||
policies.kyverno.io/description: >-
|
||||
This policy validates if `.Values.persistence.storageClassNames` variables are used in templates and if the size
|
||||
of volumes can be customized by `.Values.persistence.storages.<COMPONENT>.size` variable.
|
||||
spec:
|
||||
background: true
|
||||
rules:
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
name: "template-storageClassName-pod"
|
||||
validate:
|
||||
message: "VolumeClaims inside pods needs to have storageClass set when templated."
|
||||
pattern:
|
||||
spec:
|
||||
(volumeClaimTemplates):
|
||||
- spec:
|
||||
storageClassName: "kyverno-test"
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "PersistentVolumeClaim"
|
||||
name: "template-storageClassName-pvc"
|
||||
validate:
|
||||
message: "PersistentVolumeClaim needs to have storageClassName set when templated."
|
||||
pattern:
|
||||
spec:
|
||||
storageClassName: "kyverno-test"
|
||||
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "StatefulSet"
|
||||
name: "template-requests-storage-pod"
|
||||
validate:
|
||||
message: "VolumeClaims inside pods needs to have storageClass set when templated."
|
||||
pattern:
|
||||
spec:
|
||||
(volumeClaimTemplates):
|
||||
- spec:
|
||||
resources:
|
||||
requests:
|
||||
storage: "42Gi"
|
||||
- match:
|
||||
resources:
|
||||
kinds:
|
||||
- "PersistentVolumeClaim"
|
||||
name: "template-requests-storage-pvc"
|
||||
validate:
|
||||
message: "PersistentVolumeClaim needs to have storageClassName set when templated."
|
||||
pattern:
|
||||
spec:
|
||||
resources:
|
||||
requests:
|
||||
storage: "42Gi"
|
||||
validationFailureAction: "audit"
|
||||
...
|
||||
28
.opencode/openDesk-logo-rgb-color.svg
Normal file
@@ -0,0 +1,28 @@
|
||||
<?xml version="1.0" encoding="UTF-8"?>
|
||||
<svg id="Ebene_1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 693.25 214.02">
|
||||
<defs>
|
||||
<style>
|
||||
.cls-1 {
|
||||
fill: #571efa;
|
||||
}
|
||||
|
||||
.cls-2 {
|
||||
fill: #927afa;
|
||||
}
|
||||
</style>
|
||||
</defs>
|
||||
<g>
|
||||
<path class="cls-2" d="M126.14,140.32v2.13c0,8.99-7.31,16.3-16.3,16.3h-38.26c-8.99,0-16.3-7.31-16.3-16.3v-38.26c0-8.99,7.31-16.3,16.3-16.3h2.13v52.44h52.44Z"/>
|
||||
<path class="cls-1" d="M126.85,127.56h-40.39v-44.65c0-15.24,12.4-27.64,27.64-27.64h12.76c17.58,0,31.89,14.31,31.89,31.89v8.5c0,17.58-14.31,31.89-31.89,31.89ZM104.88,109.13h21.97c7.42,0,13.46-6.04,13.46-13.46v-8.5c0-7.42-6.04-13.46-13.46-13.46h-12.76c-5.08,0-9.21,4.13-9.21,9.21v26.22Z"/>
|
||||
</g>
|
||||
<g>
|
||||
<path d="M210.82,90.76c14.85,0,24.34,10.9,24.34,24.25s-9.49,24.25-24.34,24.25-24.44-10.9-24.44-24.25,9.49-24.25,24.44-24.25ZM210.82,133.34c11.37,0,17.39-8.46,17.39-18.33s-6.02-18.33-17.39-18.33-17.48,8.46-17.48,18.33,6.01,18.33,17.48,18.33Z"/>
|
||||
<path d="M244.19,91.7h6.96v11.84c3.29-7.8,10.25-12.78,20.4-12.78,13.07,0,21.9,9.87,21.9,24.34s-8.83,24.16-21.9,24.16c-10.34,0-17.2-5.17-20.4-12.78v28.95h-6.96v-63.73ZM269.38,133.34c9.4,0,17.11-5.83,17.11-18.24s-7.71-18.42-17.11-18.42-17.95,6.11-17.95,18.42,8.65,18.24,17.95,18.24Z"/>
|
||||
<path d="M322.96,90.76c13.35,0,22.28,8.37,22.28,22.65v2.82h-37.5c.28,9.78,5.26,17.29,15.6,17.29,8.55,0,13.54-4.51,15.23-11.47h6.86c-1.97,8.27-7.61,17.2-21.9,17.2-15.13,0-22.46-11.28-22.46-24.91,0-15.04,8.74-23.59,21.9-23.59ZM338.37,110.78c-.66-9.12-6.77-14.29-15.51-14.29-8.18,0-14.29,5.26-15.04,14.29h30.55Z"/>
|
||||
<path d="M355.01,91.7h6.96v12.97c2.54-8.65,9.12-13.91,19.36-13.91s16.73,6.77,16.73,18.99v28.57h-7.05v-28.01c0-9.68-3.76-13.63-12.03-13.63-10.53,0-17.01,8.84-17.01,21.34v20.3h-6.96v-46.62Z"/>
|
||||
<path d="M409.81,72.05h24.35c6.89,0,12.97.85,18.24,2.54,5.26,1.69,9.57,4.98,12.92,9.87,3.35,4.89,5.03,11.78,5.03,20.68s-1.68,15.89-5.03,20.77c-3.35,4.89-7.66,8.18-12.92,9.87-5.27,1.69-11.34,2.54-18.24,2.54h-24.35v-66.27ZM434.16,125.07c4.76,0,8.57-.38,11.42-1.13s5.17-2.55,6.96-5.41c1.79-2.85,2.68-7.32,2.68-13.39s-.91-10.46-2.72-13.35c-1.82-2.88-4.14-4.7-6.96-5.45s-6.61-1.13-11.37-1.13h-9.31v39.86h9.31Z"/>
|
||||
<path d="M480.17,101.33c2.1-3.67,5.01-6.47,8.74-8.41s8.01-2.91,12.83-2.91c7.9,0,14.07,2.1,18.52,6.3,4.45,4.2,6.67,10,6.67,17.39v3.95h-35.53c.25,3.38,1.32,6.03,3.2,7.94,1.88,1.91,4.45,2.87,7.71,2.87,2.82,0,5.15-.59,7-1.79,1.85-1.19,3.02-2.88,3.53-5.08h14.19c-.75,5.26-3.28,9.53-7.57,12.78-4.29,3.26-9.98,4.89-17.06,4.89-5.2,0-9.71-1.05-13.54-3.15-3.82-2.1-6.75-5.03-8.79-8.79-2.04-3.76-3.05-8.08-3.05-12.97s1.05-9.35,3.15-13.02ZM513.02,109.93c-.25-3.01-1.36-5.33-3.34-6.96-1.97-1.63-4.53-2.44-7.66-2.44s-5.56.82-7.47,2.44c-1.91,1.63-2.99,3.95-3.24,6.96h21.71Z"/>
|
||||
<path d="M539.62,134.65c-4.14-3.07-6.21-7.58-6.21-13.54h14.29c0,2.7.85,4.69,2.54,5.97,1.69,1.29,4.29,1.93,7.8,1.93,2.57,0,4.43-.33,5.59-.99,1.16-.66,1.74-1.71,1.74-3.15,0-1-.34-1.82-1.03-2.44-.69-.63-1.79-1.16-3.29-1.6l-14.48-3.95c-3.2-.81-5.95-2.27-8.27-4.37-2.32-2.1-3.48-5-3.48-8.7,0-4.45,1.83-7.86,5.5-10.25,3.67-2.38,8.79-3.57,15.37-3.57,7.27,0,12.94,1.46,17.01,4.37s6.11,7.13,6.11,12.64h-14.29c0-4.57-2.91-6.86-8.74-6.86-2.07,0-3.7.35-4.89,1.03-1.19.69-1.79,1.6-1.79,2.73,0,1.94,1.72,3.35,5.17,4.23l11.09,2.73c4.32,1.07,7.79,2.71,10.39,4.94,2.6,2.22,3.9,5.34,3.9,9.35,0,4.58-1.83,8.07-5.5,10.48-3.67,2.41-9.1,3.62-16.31,3.62-8.02,0-14.1-1.54-18.24-4.61Z"/>
|
||||
<path d="M587.56,69.23h14.29v40.04l18.89-18.33h17.48l-23.59,23.03,23.5,24.35h-17.39l-18.89-19.93v19.93h-14.29v-69.09Z"/>
|
||||
</g>
|
||||
</svg>
|
||||
|
After Width: | Height: | Size: 3.5 KiB |
BIN
.opencode/screenshots/01-portal-desktop.png
Normal file
|
After Width: | Height: | Size: 96 KiB |
BIN
.opencode/screenshots/02-dateien-desktop.png
Normal file
|
After Width: | Height: | Size: 232 KiB |
BIN
.opencode/screenshots/03-projekte-desktop.png
Normal file
|
After Width: | Height: | Size: 370 KiB |
BIN
.opencode/screenshots/04-wiki-desktop.png
Normal file
|
After Width: | Height: | Size: 321 KiB |
109
.renovate/config.yaml
Normal file
@@ -0,0 +1,109 @@
|
||||
# SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
---
|
||||
# Platform type of repository
|
||||
platform: "gitlab"
|
||||
|
||||
# Enable onboarding merge request
|
||||
onboarding: false
|
||||
|
||||
# If set to true: keep repository data between runs instead of deleting the data
|
||||
persistRepoData: false
|
||||
|
||||
# Controls Renovate's behavior regarding repository config files such as renovate.json
|
||||
requireConfig: "ignored"
|
||||
|
||||
# List of Repositories
|
||||
# See: https://docs.renovatebot.com/configuration-options/
|
||||
repositories:
|
||||
- repository: "bmi/opendesk/deployment/opendesk"
|
||||
# Set the branch to read current dependency state from, this is especially useful during
|
||||
# renovate setup when looking into your feature branch or when your default branch is
|
||||
# not the one you want to check on.
|
||||
baseBranches: [ "develop" ]
|
||||
# Set a limit for the maximum number of parallel MRs (default 10)
|
||||
prConcurrentLimit: 50
|
||||
# Prefix to use for all branch names created by renovate bot (default: "renovate/")
|
||||
branchPrefix: "renovate/"
|
||||
# Lowercase merge request and commit titles ("never" = leave titles untouched )
|
||||
commitMessageLowerCase: "never"
|
||||
# Commit scope to use if Semantic Commits are enabled (fix(<scope>)...)
|
||||
semanticCommitScope: "renovate"
|
||||
# Commit type to use if Semantic Commits are enabled (default: "chore")
|
||||
semanticCommitType: "chore"
|
||||
# Enable dependency dashboard
|
||||
dependencyDashboard: false
|
||||
# Include package files only within these defined paths
|
||||
includePaths:
|
||||
- "helmfile/environments/default/images.yaml.gotmpl"
|
||||
- "helmfile/environments/default/charts.yaml.gotmpl"
|
||||
customManagers:
|
||||
- customType: "regex"
|
||||
fileMatch:
|
||||
- "helmfile/environments/default/images.yaml.gotmpl"
|
||||
datasourceTemplate: "docker"
|
||||
matchStrings:
|
||||
# yamllint disable rule:line-length rule:quoted-strings
|
||||
- ' providerResponsible: "(?<depType>.+?)"[\s\S]+? upstreamRegistry: "(?<registryUrl>.+?)"[\s\S]+? upstreamRepository: "(?<depName>.+?)"[\s\S]+? tag: "(?<currentValue>[^@]+)@(?<currentDigest>sha256:[a-f0-9]+)"'
|
||||
# yamllint enable rule:line-length rule:quoted-strings
|
||||
- customType: "regex"
|
||||
fileMatch:
|
||||
- "helmfile/environments/default/charts.yaml.gotmpl"
|
||||
datasourceTemplate: "docker"
|
||||
matchStrings:
|
||||
# yamllint disable rule:line-length rule:quoted-strings
|
||||
- ' providerResponsible: "(?<depType>.+?)"[\s\S]+? upstreamRegistry: "(?<registryUrl>.+?)"[\s\S]+? upstreamRepository: "(?<depName>.+?)"[\s\S]+? version: "(?<currentValue>.+?)"'
|
||||
# yamllint enable rule:line-length rule:quoted-strings
|
||||
# Rules for matching packages
|
||||
packageRules:
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "openDesk" ]
|
||||
groupName: "Platform"
|
||||
groupSlug: "platform"
|
||||
branchTopic: "platform"
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "Collabora" ]
|
||||
groupName: "Collabora"
|
||||
groupSlug: "collabora"
|
||||
branchTopic: "collabora"
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "Element" ]
|
||||
groupName: "Element"
|
||||
groupSlug: "element"
|
||||
branchTopic: "element"
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "Nordeck" ]
|
||||
groupName: "Nordeck"
|
||||
groupSlug: "nordeck"
|
||||
branchTopic: "nordeck"
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "Open-Xchange" ]
|
||||
groupName: "Open-Xchange"
|
||||
groupSlug: "openxchange"
|
||||
branchTopic: "openxchang"
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "OpenProject" ]
|
||||
groupName: "OpenProject"
|
||||
groupSlug: "openproject"
|
||||
branchTopic: "openproject"
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "Nextcloud" ]
|
||||
groupName: "nextcloud"
|
||||
branchTopic: "nextcloud"
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "Univention" ]
|
||||
groupName: "Univention"
|
||||
groupSlug: "univention"
|
||||
branchTopic: "univention"
|
||||
- matchDatasources: [ "docker" ]
|
||||
matchDepTypes: [ "XWiki" ]
|
||||
groupName: "XWiki"
|
||||
groupSlug: "xwiki"
|
||||
branchTopic: "xwiki"
|
||||
# Add merge request labels
|
||||
labels:
|
||||
- "renovate"
|
||||
# Enable custom regex manager only
|
||||
enabledManagers:
|
||||
- "custom.regex"
|
||||
...
|
||||
@@ -1,8 +0,0 @@
|
||||
Format: https://www.debian.org/doc/packaging-manuals/copyright-format/1.0/
|
||||
Upstream-Name: openDesk
|
||||
Upstream-Contact: <git+bmi-souveraener-arbeitsplatz-cla-1339-29pr0g9pj4or9yi6wfly6pbhg-issue@opencode.de>
|
||||
Source: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/deployment/sovereign-workplace
|
||||
|
||||
Files: helmfile/environments/default/theme/*
|
||||
Copyright: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
License: Apache-2.0
|
||||
1006
CHANGELOG.md
@@ -1,65 +0,0 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
**Content / Quick navigation**
|
||||
|
||||
[[_TOC_]]
|
||||
|
||||
# Service Components
|
||||
|
||||
Service components are required to operate the SWP. The deployment automation contains a full set of service components in order for the deployment to be self contained. But please be aware that the components are not ment to be used in production scenarios. Check out the service components details to understand how to make use of external services in case you want to setup production environments.
|
||||
|
||||
## Database - MariaDB
|
||||
|
||||
This services is used by:
|
||||
- Nextcloud
|
||||
- Open-Xchange
|
||||
- XWiki
|
||||
|
||||
## Database - PostgreSQL
|
||||
|
||||
This services is used by:
|
||||
- Keycloak
|
||||
- OpenProject
|
||||
|
||||
## Redis
|
||||
|
||||
This service is used by:
|
||||
- Intercom-Service
|
||||
- Nextcloud
|
||||
|
||||
## Postfix
|
||||
|
||||
This service is used by:
|
||||
- Keycloak (e.g. new device login notification)
|
||||
- Nextcloud (e.g. share file notifictions)
|
||||
- Open-Xchange (emails)
|
||||
- OpenProject (general notifications)
|
||||
- UCS (e.g. password reset emails)
|
||||
- XWiki (e.g. change notifications)
|
||||
|
||||
## TURN Server
|
||||
|
||||
This services is used by:
|
||||
- Jitsi
|
||||
|
||||
## NFS
|
||||
|
||||
[remove this as it should be addressed by the RWX prerequsite!?]
|
||||
|
||||
This service is used by
|
||||
- Dovecot
|
||||
- Nextcloud
|
||||
|
||||
## ICAP
|
||||
|
||||
This service is used by
|
||||
- Nextcloud
|
||||
- Open-Xchange
|
||||
|
||||
## Objectstore - MinIO
|
||||
|
||||
This services is used by:
|
||||
- OpenProject (attachment storage)
|
||||
@@ -5,85 +5,32 @@ SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
# Read me first
|
||||
|
||||
Please read the [project's overall CONTRIBUTING.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/CONTRIBUTING.md) first.
|
||||
Please read the [project's entire CONTRIBUTING.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/CONTRIBUTING.md) first.
|
||||
|
||||
# How to contribute?
|
||||
|
||||
When providing contributes to this project, please adhere to the standards and conventions described further down in this document. Doing so please feel free to create merge requests.
|
||||
|
||||
# Standards and conventions
|
||||
|
||||
## Branching
|
||||
|
||||
We use [Github flow](https://docs.github.com/en/get-started/quickstart/github-flow).
|
||||
|
||||
## Verified commits
|
||||
|
||||
We only allow verified commits:
|
||||
- https://docs.gitlab.com/ee/user/project/repository/ssh_signed_commits/
|
||||
- https://docs.gitlab.com/ee/user/project/repository/gpg_signed_commits/
|
||||
- https://docs.gitlab.com/ee/user/project/repository/x509_signed_commits/
|
||||
|
||||
## Approval
|
||||
|
||||
MRs require one approval from the SouvAP devops team with security clearance.
|
||||
|
||||
## Conventional Commits
|
||||
|
||||
See https://www.conventionalcommits.org/en/v1.0.0/#summary for reference.
|
||||
|
||||
Commits that do not adhere to the standard might be rejected.
|
||||
|
||||
```text
|
||||
<type>(<scope>): [path/to/issue#1] <short summary>
|
||||
│ │ │ │
|
||||
│ │ | └─> Summary in present tense, sentence case, with no period at the end
|
||||
│ │ |
|
||||
│ │ └─> Issue reference (optional)
|
||||
│ │
|
||||
│ └─> Commit Scope: helmfile, docs, collabora, intercom-service, ...
|
||||
│
|
||||
└─> Commit Type: chore, ci, docs, feat, fix
|
||||
```
|
||||
Valid commit scopes:
|
||||
- `helmfile`
|
||||
- `ci`
|
||||
- `docs`
|
||||
- `collabora`
|
||||
- `ìntercom-service`
|
||||
- `jitsi`
|
||||
- `keycloak`
|
||||
- `keycloak-bootstrap`
|
||||
- `nextcloud`
|
||||
- `open-xchange`
|
||||
- `openproject`
|
||||
- `provisioning`
|
||||
- `services`
|
||||
- `univention-corporate-container`
|
||||
- `xwiki`
|
||||
|
||||
## Semantic Release
|
||||
|
||||
See https://github.com/semantic-release/semantic-release for reference.
|
||||
|
||||
## Linting
|
||||
|
||||
Following linters must pass:
|
||||
- [yaml-lint](https://github.com/adrienverge/yamllint)
|
||||
- [helm-lint](https://helm.sh/docs/helm/helm_lint/)
|
||||
Please also read the [project's workflow documentation](./docs/developer/workflow.md) for more details on standards like commit
|
||||
messages and branching convention.
|
||||
|
||||
## Helm vs. Operators vs. Manifests
|
||||
|
||||
Due to DVS requirements:
|
||||
|
||||
- we have to use [Helm charts](https://helm.sh/) (that can consist of Manifests).
|
||||
- we should avoid stand alone Manifests.
|
||||
- we should avoid stand-alone Manifests.
|
||||
- we do not use Operators and CRDs.
|
||||
|
||||
In order to align the Helm files from various sources into an unified deployment of the SWP we make use of [Helmfile](https://github.com/helmfile/helmfile).
|
||||
In order to align the Helm files from various sources into the unified deployment of openDesk we make use of
|
||||
[Helmfile](https://github.com/helmfile/helmfile).
|
||||
|
||||
## Tooling
|
||||
|
||||
We should not introduce a new tool without sharing the purpose with the team and let the team decide if the tool should be used.
|
||||
New tools should not be introduced without first discussing it with the team. A proposal is fine, but let the team decide if the tool should
|
||||
be used or not.
|
||||
|
||||
We should avoid adding unnecessary complexity.
|
||||
|
||||
## In doubt? Ask!
|
||||
|
||||
We are always happy to receive contributions, but we also like to discuss technical approaches in order to solve a problem. This helps to ensure
|
||||
a contribution fits the openDesk platform strategy and roadmap, and potentially avoids otherwise wasted time. So when in doubt please [open an issue](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues/new) and start a discussion.
|
||||
|
||||
170
LICENSES/CC-BY-SA-4.0.txt
Normal file
@@ -0,0 +1,170 @@
|
||||
Creative Commons Attribution-ShareAlike 4.0 International
|
||||
|
||||
Creative Commons Corporation (“Creative Commons”) is not a law firm and does not provide legal services or legal advice. Distribution of Creative Commons public licenses does not create a lawyer-client or other relationship. Creative Commons makes its licenses and related information available on an “as-is” basis. Creative Commons gives no warranties regarding its licenses, any material licensed under their terms and conditions, or any related information. Creative Commons disclaims all liability for damages resulting from their use to the fullest extent possible.
|
||||
|
||||
Using Creative Commons Public Licenses
|
||||
|
||||
Creative Commons public licenses provide a standard set of terms and conditions that creators and other rights holders may use to share original works of authorship and other material subject to copyright and certain other rights specified in the public license below. The following considerations are for informational purposes only, are not exhaustive, and do not form part of our licenses.
|
||||
|
||||
Considerations for licensors: Our public licenses are intended for use by those authorized to give the public permission to use material in ways otherwise restricted by copyright and certain other rights. Our licenses are irrevocable. Licensors should read and understand the terms and conditions of the license they choose before applying it. Licensors should also secure all rights necessary before applying our licenses so that the public can reuse the material as expected. Licensors should clearly mark any material not subject to the license. This includes other CC-licensed material, or material used under an exception or limitation to copyright. More considerations for licensors.
|
||||
|
||||
Considerations for the public: By using one of our public licenses, a licensor grants the public permission to use the licensed material under specified terms and conditions. If the licensor’s permission is not necessary for any reason–for example, because of any applicable exception or limitation to copyright–then that use is not regulated by the license. Our licenses grant only permissions under copyright and certain other rights that a licensor has authority to grant. Use of the licensed material may still be restricted for other reasons, including because others have copyright or other rights in the material. A licensor may make special requests, such as asking that all changes be marked or described.
|
||||
|
||||
Although not required by our licenses, you are encouraged to respect those requests where reasonable. More considerations for the public.
|
||||
|
||||
Creative Commons Attribution-ShareAlike 4.0 International Public License
|
||||
|
||||
By exercising the Licensed Rights (defined below), You accept and agree to be bound by the terms and conditions of this Creative Commons Attribution-ShareAlike 4.0 International Public License ("Public License"). To the extent this Public License may be interpreted as a contract, You are granted the Licensed Rights in consideration of Your acceptance of these terms and conditions, and the Licensor grants You such rights in consideration of benefits the Licensor receives from making the Licensed Material available under these terms and conditions.
|
||||
|
||||
Section 1 – Definitions.
|
||||
|
||||
a. Adapted Material means material subject to Copyright and Similar Rights that is derived from or based upon the Licensed Material and in which the Licensed Material is translated, altered, arranged, transformed, or otherwise modified in a manner requiring permission under the Copyright and Similar Rights held by the Licensor. For purposes of this Public License, where the Licensed Material is a musical work, performance, or sound recording, Adapted Material is always produced where the Licensed Material is synched in timed relation with a moving image.
|
||||
|
||||
b. Adapter's License means the license You apply to Your Copyright and Similar Rights in Your contributions to Adapted Material in accordance with the terms and conditions of this Public License.
|
||||
|
||||
c. BY-SA Compatible License means a license listed at creativecommons.org/compatiblelicenses, approved by Creative Commons as essentially the equivalent of this Public License.
|
||||
|
||||
d. Copyright and Similar Rights means copyright and/or similar rights closely related to copyright including, without limitation, performance, broadcast, sound recording, and Sui Generis Database Rights, without regard to how the rights are labeled or categorized. For purposes of this Public License, the rights specified in Section 2(b)(1)-(2) are not Copyright and Similar Rights.
|
||||
|
||||
e. Effective Technological Measures means those measures that, in the absence of proper authority, may not be circumvented under laws fulfilling obligations under Article 11 of the WIPO Copyright Treaty adopted on December 20, 1996, and/or similar international agreements.
|
||||
|
||||
f. Exceptions and Limitations means fair use, fair dealing, and/or any other exception or limitation to Copyright and Similar Rights that applies to Your use of the Licensed Material.
|
||||
|
||||
g. License Elements means the license attributes listed in the name of a Creative Commons Public License. The License Elements of this Public License are Attribution and ShareAlike.
|
||||
|
||||
h. Licensed Material means the artistic or literary work, database, or other material to which the Licensor applied this Public License.
|
||||
|
||||
i. Licensed Rights means the rights granted to You subject to the terms and conditions of this Public License, which are limited to all Copyright and Similar Rights that apply to Your use of the Licensed Material and that the Licensor has authority to license.
|
||||
|
||||
j. Licensor means the individual(s) or entity(ies) granting rights under this Public License.
|
||||
|
||||
k. Share means to provide material to the public by any means or process that requires permission under the Licensed Rights, such as reproduction, public display, public performance, distribution, dissemination, communication, or importation, and to make material available to the public including in ways that members of the public may access the material from a place and at a time individually chosen by them.
|
||||
|
||||
l. Sui Generis Database Rights means rights other than copyright resulting from Directive 96/9/EC of the European Parliament and of the Council of 11 March 1996 on the legal protection of databases, as amended and/or succeeded, as well as other essentially equivalent rights anywhere in the world.
|
||||
|
||||
m. You means the individual or entity exercising the Licensed Rights under this Public License. Your has a corresponding meaning.
|
||||
|
||||
Section 2 – Scope.
|
||||
|
||||
a. License grant.
|
||||
|
||||
1. Subject to the terms and conditions of this Public License, the Licensor hereby grants You a worldwide, royalty-free, non-sublicensable, non-exclusive, irrevocable license to exercise the Licensed Rights in the Licensed Material to:
|
||||
|
||||
A. reproduce and Share the Licensed Material, in whole or in part; and
|
||||
|
||||
B. produce, reproduce, and Share Adapted Material.
|
||||
|
||||
2. Exceptions and Limitations. For the avoidance of doubt, where Exceptions and Limitations apply to Your use, this Public License does not apply, and You do not need to comply with its terms and conditions.
|
||||
|
||||
3. Term. The term of this Public License is specified in Section 6(a).
|
||||
|
||||
4. Media and formats; technical modifications allowed. The Licensor authorizes You to exercise the Licensed Rights in all media and formats whether now known or hereafter created, and to make technical modifications necessary to do so. The Licensor waives and/or agrees not to assert any right or authority to forbid You from making technical modifications necessary to exercise the Licensed Rights, including technical modifications necessary to circumvent Effective Technological Measures. For purposes of this Public License, simply making modifications authorized by this Section 2(a)(4) never produces Adapted Material.
|
||||
|
||||
5. Downstream recipients.
|
||||
|
||||
A. Offer from the Licensor – Licensed Material. Every recipient of the Licensed Material automatically receives an offer from the Licensor to exercise the Licensed Rights under the terms and conditions of this Public License.
|
||||
|
||||
B. Additional offer from the Licensor – Adapted Material. Every recipient of Adapted Material from You automatically receives an offer from the Licensor to exercise the Licensed Rights in the Adapted Material under the conditions of the Adapter’s License You apply.
|
||||
|
||||
C. No downstream restrictions. You may not offer or impose any additional or different terms or conditions on, or apply any Effective Technological Measures to, the Licensed Material if doing so restricts exercise of the Licensed Rights by any recipient of the Licensed Material.
|
||||
|
||||
6. No endorsement. Nothing in this Public License constitutes or may be construed as permission to assert or imply that You are, or that Your use of the Licensed Material is, connected with, or sponsored, endorsed, or granted official status by, the Licensor or others designated to receive attribution as provided in Section 3(a)(1)(A)(i).
|
||||
|
||||
b. Other rights.
|
||||
|
||||
1. Moral rights, such as the right of integrity, are not licensed under this Public License, nor are publicity, privacy, and/or other similar personality rights; however, to the extent possible, the Licensor waives and/or agrees not to assert any such rights held by the Licensor to the limited extent necessary to allow You to exercise the Licensed Rights, but not otherwise.
|
||||
|
||||
2. Patent and trademark rights are not licensed under this Public License.
|
||||
|
||||
3. To the extent possible, the Licensor waives any right to collect royalties from You for the exercise of the Licensed Rights, whether directly or through a collecting society under any voluntary or waivable statutory or compulsory licensing scheme. In all other cases the Licensor expressly reserves any right to collect such royalties.
|
||||
|
||||
Section 3 – License Conditions.
|
||||
|
||||
Your exercise of the Licensed Rights is expressly made subject to the following conditions.
|
||||
|
||||
a. Attribution.
|
||||
|
||||
1. If You Share the Licensed Material (including in modified form), You must:
|
||||
|
||||
A. retain the following if it is supplied by the Licensor with the Licensed Material:
|
||||
|
||||
i. identification of the creator(s) of the Licensed Material and any others designated to receive attribution, in any reasonable manner requested by the Licensor (including by pseudonym if designated);
|
||||
|
||||
ii. a copyright notice;
|
||||
|
||||
iii. a notice that refers to this Public License;
|
||||
|
||||
iv. a notice that refers to the disclaimer of warranties;
|
||||
|
||||
v. a URI or hyperlink to the Licensed Material to the extent reasonably practicable;
|
||||
|
||||
B. indicate if You modified the Licensed Material and retain an indication of any previous modifications; and
|
||||
|
||||
C. indicate the Licensed Material is licensed under this Public License, and include the text of, or the URI or hyperlink to, this Public License.
|
||||
|
||||
2. You may satisfy the conditions in Section 3(a)(1) in any reasonable manner based on the medium, means, and context in which You Share the Licensed Material. For example, it may be reasonable to satisfy the conditions by providing a URI or hyperlink to a resource that includes the required information.
|
||||
|
||||
3. If requested by the Licensor, You must remove any of the information required by Section 3(a)(1)(A) to the extent reasonably practicable.
|
||||
|
||||
b. ShareAlike.In addition to the conditions in Section 3(a), if You Share Adapted Material You produce, the following conditions also apply.
|
||||
|
||||
1. The Adapter’s License You apply must be a Creative Commons license with the same License Elements, this version or later, or a BY-SA Compatible License.
|
||||
|
||||
2. You must include the text of, or the URI or hyperlink to, the Adapter's License You apply. You may satisfy this condition in any reasonable manner based on the medium, means, and context in which You Share Adapted Material.
|
||||
|
||||
3. You may not offer or impose any additional or different terms or conditions on, or apply any Effective Technological Measures to, Adapted Material that restrict exercise of the rights granted under the Adapter's License You apply.
|
||||
|
||||
Section 4 – Sui Generis Database Rights.
|
||||
|
||||
Where the Licensed Rights include Sui Generis Database Rights that apply to Your use of the Licensed Material:
|
||||
|
||||
a. for the avoidance of doubt, Section 2(a)(1) grants You the right to extract, reuse, reproduce, and Share all or a substantial portion of the contents of the database;
|
||||
|
||||
b. if You include all or a substantial portion of the database contents in a database in which You have Sui Generis Database Rights, then the database in which You have Sui Generis Database Rights (but not its individual contents) is Adapted Material, including for purposes of Section 3(b); and
|
||||
|
||||
c. You must comply with the conditions in Section 3(a) if You Share all or a substantial portion of the contents of the database.
|
||||
For the avoidance of doubt, this Section 4 supplements and does not replace Your obligations under this Public License where the Licensed Rights include other Copyright and Similar Rights.
|
||||
|
||||
Section 5 – Disclaimer of Warranties and Limitation of Liability.
|
||||
|
||||
a. Unless otherwise separately undertaken by the Licensor, to the extent possible, the Licensor offers the Licensed Material as-is and as-available, and makes no representations or warranties of any kind concerning the Licensed Material, whether express, implied, statutory, or other. This includes, without limitation, warranties of title, merchantability, fitness for a particular purpose, non-infringement, absence of latent or other defects, accuracy, or the presence or absence of errors, whether or not known or discoverable. Where disclaimers of warranties are not allowed in full or in part, this disclaimer may not apply to You.
|
||||
|
||||
b. To the extent possible, in no event will the Licensor be liable to You on any legal theory (including, without limitation, negligence) or otherwise for any direct, special, indirect, incidental, consequential, punitive, exemplary, or other losses, costs, expenses, or damages arising out of this Public License or use of the Licensed Material, even if the Licensor has been advised of the possibility of such losses, costs, expenses, or damages. Where a limitation of liability is not allowed in full or in part, this limitation may not apply to You.
|
||||
|
||||
c. The disclaimer of warranties and limitation of liability provided above shall be interpreted in a manner that, to the extent possible, most closely approximates an absolute disclaimer and waiver of all liability.
|
||||
|
||||
Section 6 – Term and Termination.
|
||||
|
||||
a. This Public License applies for the term of the Copyright and Similar Rights licensed here. However, if You fail to comply with this Public License, then Your rights under this Public License terminate automatically.
|
||||
|
||||
b. Where Your right to use the Licensed Material has terminated under Section 6(a), it reinstates:
|
||||
|
||||
1. automatically as of the date the violation is cured, provided it is cured within 30 days of Your discovery of the violation; or
|
||||
|
||||
2. upon express reinstatement by the Licensor.
|
||||
|
||||
c. For the avoidance of doubt, this Section 6(b) does not affect any right the Licensor may have to seek remedies for Your violations of this Public License.
|
||||
|
||||
d. For the avoidance of doubt, the Licensor may also offer the Licensed Material under separate terms or conditions or stop distributing the Licensed Material at any time; however, doing so will not terminate this Public License.
|
||||
|
||||
e. Sections 1, 5, 6, 7, and 8 survive termination of this Public License.
|
||||
|
||||
Section 7 – Other Terms and Conditions.
|
||||
|
||||
a. The Licensor shall not be bound by any additional or different terms or conditions communicated by You unless expressly agreed.
|
||||
|
||||
b. Any arrangements, understandings, or agreements regarding the Licensed Material not stated herein are separate from and independent of the terms and conditions of this Public License.
|
||||
|
||||
Section 8 – Interpretation.
|
||||
|
||||
a. For the avoidance of doubt, this Public License does not, and shall not be interpreted to, reduce, limit, restrict, or impose conditions on any use of the Licensed Material that could lawfully be made without permission under this Public License.
|
||||
|
||||
b. To the extent possible, if any provision of this Public License is deemed unenforceable, it shall be automatically reformed to the minimum extent necessary to make it enforceable. If the provision cannot be reformed, it shall be severed from this Public License without affecting the enforceability of the remaining terms and conditions.
|
||||
|
||||
c. No term or condition of this Public License will be waived and no failure to comply consented to unless expressly agreed to by the Licensor.
|
||||
|
||||
d. Nothing in this Public License constitutes or may be interpreted as a limitation upon, or waiver of, any privileges and immunities that apply to the Licensor or You, including from the legal processes of any jurisdiction or authority.
|
||||
|
||||
Creative Commons is not a party to its public licenses. Notwithstanding, Creative Commons may elect to apply one of its public licenses to material it publishes and in those instances will be considered the “Licensor.” Except for the limited purpose of indicating that material is shared under a Creative Commons public license or as otherwise permitted by the Creative Commons policies published at creativecommons.org/policies, Creative Commons does not authorize the use of the trademark “Creative Commons” or any other trademark or logo of Creative Commons without its prior written consent including, without limitation, in connection with any unauthorized modifications to any of its public licenses or any other arrangements, understandings, or agreements concerning use of licensed material. For the avoidance of doubt, this paragraph does not form part of the public licenses.
|
||||
|
||||
Creative Commons may be contacted at creativecommons.org.
|
||||
121
LICENSES/CC0-1.0.txt
Normal file
@@ -0,0 +1,121 @@
|
||||
Creative Commons Legal Code
|
||||
|
||||
CC0 1.0 Universal
|
||||
|
||||
CREATIVE COMMONS CORPORATION IS NOT A LAW FIRM AND DOES NOT PROVIDE
|
||||
LEGAL SERVICES. DISTRIBUTION OF THIS DOCUMENT DOES NOT CREATE AN
|
||||
ATTORNEY-CLIENT RELATIONSHIP. CREATIVE COMMONS PROVIDES THIS
|
||||
INFORMATION ON AN "AS-IS" BASIS. CREATIVE COMMONS MAKES NO WARRANTIES
|
||||
REGARDING THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS
|
||||
PROVIDED HEREUNDER, AND DISCLAIMS LIABILITY FOR DAMAGES RESULTING FROM
|
||||
THE USE OF THIS DOCUMENT OR THE INFORMATION OR WORKS PROVIDED
|
||||
HEREUNDER.
|
||||
|
||||
Statement of Purpose
|
||||
|
||||
The laws of most jurisdictions throughout the world automatically confer
|
||||
exclusive Copyright and Related Rights (defined below) upon the creator
|
||||
and subsequent owner(s) (each and all, an "owner") of an original work of
|
||||
authorship and/or a database (each, a "Work").
|
||||
|
||||
Certain owners wish to permanently relinquish those rights to a Work for
|
||||
the purpose of contributing to a commons of creative, cultural and
|
||||
scientific works ("Commons") that the public can reliably and without fear
|
||||
of later claims of infringement build upon, modify, incorporate in other
|
||||
works, reuse and redistribute as freely as possible in any form whatsoever
|
||||
and for any purposes, including without limitation commercial purposes.
|
||||
These owners may contribute to the Commons to promote the ideal of a free
|
||||
culture and the further production of creative, cultural and scientific
|
||||
works, or to gain reputation or greater distribution for their Work in
|
||||
part through the use and efforts of others.
|
||||
|
||||
For these and/or other purposes and motivations, and without any
|
||||
expectation of additional consideration or compensation, the person
|
||||
associating CC0 with a Work (the "Affirmer"), to the extent that he or she
|
||||
is an owner of Copyright and Related Rights in the Work, voluntarily
|
||||
elects to apply CC0 to the Work and publicly distribute the Work under its
|
||||
terms, with knowledge of his or her Copyright and Related Rights in the
|
||||
Work and the meaning and intended legal effect of CC0 on those rights.
|
||||
|
||||
1. Copyright and Related Rights. A Work made available under CC0 may be
|
||||
protected by copyright and related or neighboring rights ("Copyright and
|
||||
Related Rights"). Copyright and Related Rights include, but are not
|
||||
limited to, the following:
|
||||
|
||||
i. the right to reproduce, adapt, distribute, perform, display,
|
||||
communicate, and translate a Work;
|
||||
ii. moral rights retained by the original author(s) and/or performer(s);
|
||||
iii. publicity and privacy rights pertaining to a person's image or
|
||||
likeness depicted in a Work;
|
||||
iv. rights protecting against unfair competition in regards to a Work,
|
||||
subject to the limitations in paragraph 4(a), below;
|
||||
v. rights protecting the extraction, dissemination, use and reuse of data
|
||||
in a Work;
|
||||
vi. database rights (such as those arising under Directive 96/9/EC of the
|
||||
European Parliament and of the Council of 11 March 1996 on the legal
|
||||
protection of databases, and under any national implementation
|
||||
thereof, including any amended or successor version of such
|
||||
directive); and
|
||||
vii. other similar, equivalent or corresponding rights throughout the
|
||||
world based on applicable law or treaty, and any national
|
||||
implementations thereof.
|
||||
|
||||
2. Waiver. To the greatest extent permitted by, but not in contravention
|
||||
of, applicable law, Affirmer hereby overtly, fully, permanently,
|
||||
irrevocably and unconditionally waives, abandons, and surrenders all of
|
||||
Affirmer's Copyright and Related Rights and associated claims and causes
|
||||
of action, whether now known or unknown (including existing as well as
|
||||
future claims and causes of action), in the Work (i) in all territories
|
||||
worldwide, (ii) for the maximum duration provided by applicable law or
|
||||
treaty (including future time extensions), (iii) in any current or future
|
||||
medium and for any number of copies, and (iv) for any purpose whatsoever,
|
||||
including without limitation commercial, advertising or promotional
|
||||
purposes (the "Waiver"). Affirmer makes the Waiver for the benefit of each
|
||||
member of the public at large and to the detriment of Affirmer's heirs and
|
||||
successors, fully intending that such Waiver shall not be subject to
|
||||
revocation, rescission, cancellation, termination, or any other legal or
|
||||
equitable action to disrupt the quiet enjoyment of the Work by the public
|
||||
as contemplated by Affirmer's express Statement of Purpose.
|
||||
|
||||
3. Public License Fallback. Should any part of the Waiver for any reason
|
||||
be judged legally invalid or ineffective under applicable law, then the
|
||||
Waiver shall be preserved to the maximum extent permitted taking into
|
||||
account Affirmer's express Statement of Purpose. In addition, to the
|
||||
extent the Waiver is so judged Affirmer hereby grants to each affected
|
||||
person a royalty-free, non transferable, non sublicensable, non exclusive,
|
||||
irrevocable and unconditional license to exercise Affirmer's Copyright and
|
||||
Related Rights in the Work (i) in all territories worldwide, (ii) for the
|
||||
maximum duration provided by applicable law or treaty (including future
|
||||
time extensions), (iii) in any current or future medium and for any number
|
||||
of copies, and (iv) for any purpose whatsoever, including without
|
||||
limitation commercial, advertising or promotional purposes (the
|
||||
"License"). The License shall be deemed effective as of the date CC0 was
|
||||
applied by Affirmer to the Work. Should any part of the License for any
|
||||
reason be judged legally invalid or ineffective under applicable law, such
|
||||
partial invalidity or ineffectiveness shall not invalidate the remainder
|
||||
of the License, and in such case Affirmer hereby affirms that he or she
|
||||
will not (i) exercise any of his or her remaining Copyright and Related
|
||||
Rights in the Work or (ii) assert any associated claims and causes of
|
||||
action with respect to the Work, in either case contrary to Affirmer's
|
||||
express Statement of Purpose.
|
||||
|
||||
4. Limitations and Disclaimers.
|
||||
|
||||
a. No trademark or patent rights held by Affirmer are waived, abandoned,
|
||||
surrendered, licensed or otherwise affected by this document.
|
||||
b. Affirmer offers the Work as-is and makes no representations or
|
||||
warranties of any kind concerning the Work, express, implied,
|
||||
statutory or otherwise, including without limitation warranties of
|
||||
title, merchantability, fitness for a particular purpose, non
|
||||
infringement, or the absence of latent or other defects, accuracy, or
|
||||
the present or absence of errors, whether or not discoverable, all to
|
||||
the greatest extent permissible under applicable law.
|
||||
c. Affirmer disclaims responsibility for clearing rights of other persons
|
||||
that may apply to the Work or any use thereof, including without
|
||||
limitation any person's Copyright and Related Rights in the Work.
|
||||
Further, Affirmer disclaims responsibility for obtaining any necessary
|
||||
consents, permissions or other rights required for any use of the
|
||||
Work.
|
||||
d. Affirmer understands and acknowledges that Creative Commons is not a
|
||||
party to this document and has no duty or obligation with respect to
|
||||
this CC0 or use of the Work.
|
||||
198
README-EE.md
Normal file
@@ -0,0 +1,198 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024-2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>openDesk Enterprise Edition</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Overview](#overview)
|
||||
* [Enterprise Features](#enterprise-features)
|
||||
* [CE vs. EE](#ce-vs-ee)
|
||||
* [CE Components](#ce-components)
|
||||
* [EE Components](#ee-components)
|
||||
* [Collabora](#collabora)
|
||||
* [Element](#element)
|
||||
* [Nextcloud](#nextcloud)
|
||||
* [Open-Xchange](#open-xchange)
|
||||
* [OX App Suite](#ox-app-suite)
|
||||
* [OX Dovecot](#ox-dovecot)
|
||||
* [Enabling the Enterprise deployment](#enabling-the-enterprise-deployment)
|
||||
* [Configuring the oD EE deployment for self-hosted installations](#configuring-the-od-ee-deployment-for-self-hosted-installations)
|
||||
* [Registry access](#registry-access)
|
||||
* [License keys](#license-keys)
|
||||
<!-- TOC -->
|
||||
|
||||
# Overview
|
||||
|
||||
openDesk Enterprise Edition is recommended for production use. It receives support and patches from ZenDiS and the suppliers of the components due to the product subscriptions included.
|
||||
|
||||
This document refers to the openDesk Community Edition as "oD CE" and the openDesk Enterprise Edition as "oD EE".
|
||||
|
||||
Please contact [ZenDiS](mailto:opendesk@zendis.de) to get openDesk Enterprise, either as a SaaS offering or for your on-premises installation.
|
||||
|
||||
# Enterprise Features
|
||||
|
||||
oD EE ships the following features for Enterprise use that are not available in oD CE.
|
||||
|
||||
| Component | Enterprise-only Features |
|
||||
| -------------------- | ----------------------------------------------------------------------------------------------------------------- |
|
||||
| **Collabora** | Branding |
|
||||
| | [Automatic load scaling](https://www.collaboraonline.com/collabora-online-controller/) |
|
||||
| **Element** | [AdminBot](https://ems-docs.element.io/books/element-cloud-documentation/page/admin-bot) |
|
||||
| | [GroupSync](https://ems-docs.element.io/books/element-server-suite-classic-documentation-lts-2504/page/setting-up-group-sync-with-the-installer#bkmrk-what-is-group-sync?) |
|
||||
| | [Admin Console](https://ems-docs.element.io/books/element-server-suite-classic-documentation-lts-2504/page/using-the-admin-console) |
|
||||
| **Nextcloud** | Enterprise security patches |
|
||||
| | [Guard app](https://nextcloud.com/features/#guard) |
|
||||
| **Open‑Xchange** | S3 storage |
|
||||
| | Central orchestration of cluster topology, health checks, and configuration |
|
||||
| | Advanced Full-Text Search (FTS) functionality for mailboxes |
|
||||
| **OpenProject**. | [Enterprise addons](https://www.openproject.org/docs/enterprise-guide/) (*Corporate Plan*) |
|
||||
| **XWiki** | [XWiki Pro apps](https://xwiki.com/en/offerings/products/xwiki-pro) |
|
||||
|
||||
# CE vs. EE
|
||||
|
||||
The following table summarizes the differences between oD CE and oD EE.
|
||||
|
||||
| Aspect | Community Edition (CE) | Enterprise Edition (EE) |
|
||||
| -------------------------------- | --------------------------------------- | -------------------------------------------------------------------------- |
|
||||
| **Licensing of core components** | OSS (Apache‑2.0 / GPL, etc.) | Same OSS licenses |
|
||||
| **Closed‑source modules** | None | Collabora (branding), Element (admin tools), Nextcloud (guard app), OX Pro, Dovecot Pro |
|
||||
| **Technical enablement** | Fully public images/charts via openCode | EE‑only registry, license file (`enterprise.yaml`) |
|
||||
| **Support & updates** | Community via openCode, no SLA | SLA‑backed support, patches, 2nd/3rd level |
|
||||
| **Access to source code** | All CE code on openCode | Proprietary modules NOT on openCode |
|
||||
|
||||
|
||||
## CE Components
|
||||
|
||||
The following components are using the same codebase and artifacts for their Community and Enterprise offering:
|
||||
|
||||
- Cryptpad
|
||||
- Jitsi
|
||||
- Notes
|
||||
- Nubus
|
||||
- OpenProject
|
||||
- XWiki
|
||||
|
||||
## EE Components
|
||||
|
||||
This section provides information about the components that have - at least partially - Enterprise-specific artifacts.
|
||||
|
||||
If you want to check in detail which artifacts are specific to openDesk Enterprise and thereby may contain proprietary code, please check the `repository:`
|
||||
values in the image ([1](./helmfile/environments/default/images.yaml.gotmpl) / [2](./helmfile/environments/default-enterprise-overrides/images.yaml.gotmpl))
|
||||
and chart ([1](./helmfile/environments/default/charts.yaml.gotmpl) / [2](./helmfile/environments/default-enterprise-overrides/charts.yaml.gotmpl)) definitions.
|
||||
When a repository path starts with `/zendis`, the artifact is only available in an openDesk Enterprise deployment.
|
||||
|
||||
### Collabora
|
||||
|
||||
- Collabora Online (COOL) container image: Is build from the same public source code as Collabora Development Edition (CODE), only the build configurations might differ. COOL includes a brand package that is not public and its license is not open source.
|
||||
- COOL Controller container image and Helm chart: Source code and chart are using Mozilla Public License Version 2.0, but the source code is not public. It is provided to customers upon request.
|
||||
|
||||
openDesk updates Collabora once a COOL image based on the version pattern `<major>.<minor>.<patch>.3+.<build>` was made available. This happens usually at the same time the CODE image with `<major>.<minor>.<patch>.2+.<build>` is made available.
|
||||
|
||||
### Element
|
||||
|
||||
- AdminBot and GroupSync container image: 100% closed source
|
||||
- Admin Console container image: 100% closed source, though ~65% of the total runtime code is from the [matrix-bot-sdk](https://github.com/turt2live/matrix-bot-sdk/)
|
||||
|
||||
### Nextcloud
|
||||
|
||||
- Nextcloud Enterprise: openDesk uses the Nextcloud Enterprise to the build Nextcloud container image for oD EE. The Nextcloud EE codebase might contain EE exclusive (longterm support) security patches, plus the Guard app, that is not publicly available, while it is AGPL-3.0 licensed.
|
||||
|
||||
openDesk updates the Nextcloud images for openDesk CE and EE in parallel, therefore we will not upgrade to a new major Nextcloud release before the related Nextcloud Enterprise release is available. When patches are released exclusively for Nextcloud Enterprise, they are made available also exclusively in oD EE.
|
||||
|
||||
### Open-Xchange
|
||||
|
||||
#### OX App Suite
|
||||
|
||||
- OX App Suite Core Middleware container image: The amount of code, that is not open source and has a proprietary license, is <10%.
|
||||
- OX App Suite Pro Helm chart: It is not publicly available, though it is "just" an umbrella chart re-using the publicly available charts referencing the EE images, so it has <10% prorietary content.
|
||||
|
||||
openDesk updates OX App Suite in oD CE and EE always to the same release version. Only the App Suíte Pro Helm chart has the same versioning as the actual App Suite release, the chart used in oD CE has a different versioning scheme.
|
||||
|
||||
#### OX Dovecot
|
||||
|
||||
- Dovecot Pro container image: Dovecot Pro is based on the open source components Dovecot and Pigeonhole but extended by modules providing additional functionality like obox2, cluster, cluster controller and dovecot fts. The additional modules make up about 15% of the overall Dovecot Pro code and are subject to a closed source license.
|
||||
|
||||
openDesk aims to keep Dovecot's shared codebases in sync between oD CE and EE, though the versioning between the releases differs (CE: 2.x, EE: 3.y).
|
||||
|
||||
Dovecot Pro requires two additional environment variables:
|
||||
|
||||
- `DOVECOT_CRYPT_PRIVATE_KEY`
|
||||
- `DOVECOT_CRYPT_PUBLIC_KEY`
|
||||
|
||||
These variables must contain the base64 encoded strings of the private and public
|
||||
key. These keys can be generated with the following commands:
|
||||
|
||||
- Private Key: `openssl genpkey -algorithm X25519 -out private.pem && cat private.pem | base64 -w0`
|
||||
- Public Key: `openssl pkey -in private.pem -out public.pem -pubout && cat public.pem | base64 -w0`
|
||||
|
||||
|
||||
# Enabling the Enterprise deployment
|
||||
|
||||
To enable the oD EE deployment you must set the environment variable `OPENDESK_ENTERPRISE` to any value that does not evaluate to boolean *false* for [Helm flow control](https://helm.sh/docs/chart_template_guide/control_structures/#ifelse), e.g. `"true"`, `"yes"` or `"1"`:
|
||||
|
||||
```shell
|
||||
OPENDESK_ENTERPRISE=true
|
||||
```
|
||||
|
||||
> **Note**
|
||||
> Upgrading from oD CE to EE is currently not supported, especially due to the fact it requires a migration
|
||||
> from Dovecot 2.x (standard storage) to Dovecot Pro 3.x (S3).
|
||||
|
||||
# Configuring the oD EE deployment for self-hosted installations
|
||||
|
||||
## Registry access
|
||||
|
||||
With openDesk EE you get access to the related artifact registry owned by ZenDiS.
|
||||
|
||||
Three steps are required to access the registry - for step 1 and 2 you can set some variables. Below, you can define `<your_name_for_the_secret>` freely, like `enterprise-secret`, as long as it consistent in step 1 and 3.
|
||||
|
||||
```shell
|
||||
NAMESPACE=<your_namespace>
|
||||
NAME_FOR_THE_SECRET=<your_name_for_the_secret>
|
||||
YOUR_ENTERPRISE_REGISTRY_USERNAME=<your_registry_credential_username>
|
||||
YOUR_ENTERPRISE_REGISTRY_PASSWORD=<your_registry_credential_password>
|
||||
```
|
||||
|
||||
1. Add your registry credentials as a secret to the namespace you want to deploy openDesk to. Do not forget to create the namespace if it does not exist yet (`kubectl create namespace ${NAMESPACE}`).
|
||||
|
||||
```shell
|
||||
kubectl create secret --namespace "${NAMESPACE}" \
|
||||
docker-registry "${NAME_FOR_THE_SECRET}" \
|
||||
--docker-server "registry.opencode.de" \
|
||||
--docker-username "${YOUR_ENTERPRISE_REGISTRY_USERNAME}" \
|
||||
--docker-password "${YOUR_ENTERPRISE_REGISTRY_PASSWORD}" \
|
||||
--dry-run=client -o yaml | kubectl apply -f -
|
||||
```
|
||||
|
||||
2. Docker login to the registry to access Helm charts for local deployments:
|
||||
|
||||
```shell
|
||||
docker login registry.opencode.de -u ${YOUR_ENTERPRISE_REGISTRY_USERNAME} -p ${YOUR_ENTERPRISE_REGISTRY_PASSWORD}
|
||||
```
|
||||
|
||||
3. Reference the secret from step #1 in the deployment as well as the registry itself for `images` and `helm` charts:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
imagePullSecrets:
|
||||
- "<your_name_for_the_secret>"
|
||||
repositories:
|
||||
image:
|
||||
registryOpencodeDeEnterprise: "registry.opencode.de"
|
||||
helm:
|
||||
registryOpencodeDeEnterprise: "registry.opencode.de"
|
||||
```
|
||||
|
||||
## License keys
|
||||
|
||||
Some applications require license information for their Enterprise features to be enabled. With the aforementioned registry credentials you will also receive a file called [`enterprise.yaml`](./helmfile/environments/default/enterprise_keys.yaml.gotmpl) containing the relevant license keys.
|
||||
|
||||
Please place the file next your other `.yaml.gotmpl` file(s) that configure your deployment.
|
||||
|
||||
Details regarding the scope/limitation of the component's licenses:
|
||||
|
||||
- Nextcloud: Enterprise license to enable [Nextcloud Enterprise](https://nextcloud.com/de/enterprise/) specific features, can be used across multiple installations until the licensed number of users is reached.
|
||||
- OpenProject: Domain specific enterprise license to enable [OpenProject's Enterprise feature set](https://www.openproject.org/enterprise-edition/), domain matching can use regular expressions.
|
||||
- XWiki: Deployment specific enterprise license (key pair) to activate the [XWiki Pro](https://xwiki.com/en/offerings/products/xwiki-pro) apps. *Caution! XWiki needs these license keys as one-line strings. Multi-line strings result in installation failure*
|
||||
179
README.md
@@ -1,106 +1,137 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||

|
||||
|
||||
openDesk is a Kubernetes based, open-source and cloud-native digital workplace suite provided by the "Projektgruppe für
|
||||
Aufbau ZenDiS" of Germany's Federal Ministry of the Interior.
|
||||
|
||||
It features:
|
||||
- Fully integrated Identity Management (Univention, Keycloak)
|
||||
- File storage (Nextcloud)
|
||||
- Weboffice (Collabora)
|
||||
- Videoconference (Jitsi)
|
||||
- Encrypted Chat (Synapse, Element)
|
||||
- Groupware (OX Appsuite)
|
||||
- Wiki (XWiki)
|
||||
- Notes and Diagrams (Cryptpad, Draw.io)
|
||||
|
||||
openDesk integrates these components and is working towards a seamless user experience.
|
||||
|
||||
While not all components are perfectly shaped for the execution inside containers, one of the project objectives is to
|
||||
align the applications with the best practises regarding container design and operations.
|
||||
|
||||
This documentation aims to give you all that is needed to set up your own instance of the openDesk.
|
||||
Basic knowledge of Kubernetes and Devops is required though.
|
||||
<h1>openDesk Deployment Automation</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Active development notice](#active-development-notice)
|
||||
* [Feedback](#feedback)
|
||||
* [Overview](#overview)
|
||||
* [Upgrades](#upgrades)
|
||||
* [Requirements](#requirements)
|
||||
* [Getting started](#getting-started)
|
||||
* [Advanced customization](#advanced-customization)
|
||||
* [Architecture](#architecture)
|
||||
* [Testing](#testing)
|
||||
* [Permissions](#permissions)
|
||||
* [Releases](#releases)
|
||||
* [Components](#components)
|
||||
* [Data Storage](#data-storage)
|
||||
* [Feedback](#feedback)
|
||||
* [Development](#development)
|
||||
* [License](#license)
|
||||
* [Copyright](#copyright)
|
||||
<!-- TOC -->
|
||||
|
||||
# Active development notice
|
||||
openDesk will face breaking changes in the near future without upgrade paths before
|
||||
[technical release](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases
|
||||
v1.0.0 is reached.
|
||||
# Overview
|
||||
|
||||
While most components support upgrades, major configuration or component changes may occur, therefore we recommend
|
||||
at the moment always installing from scratch.
|
||||
openDesk is a Kubernetes-based, open-source and cloud-native digital workplace suite provided by the
|
||||
*Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH*.
|
||||
|
||||
Components that are going to be replaced soon are:
|
||||
- the UCS dev container monolith will be substituted by multiple Univention Management Stack containers,
|
||||
- the Nextcloud community container is going to be replaced by an openDesk specific Nextcloud distroless container and
|
||||
- Dovecot Community is going to be replaced by a Dovecot container tailored for the needs of the public sector.
|
||||
For production use, the [openDesk Enterprise Edition](./README-EE.md) is recommended.
|
||||
|
||||
In the next months, we not only expect upstream updates of the functional components within their feature scope, but we
|
||||
are also going to address operational issues like monitoring and network policies.
|
||||
openDesk currently features the following functional main components:
|
||||
|
||||
Of course, further development also includes enhancing the documentation.
|
||||
| Function | Functional Component | License | Component<br/>Version | Upstream Documentation |
|
||||
|----------------------|-----------------------------|----------------------------------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------|---------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Chat | Element ft. Nordeck widgets | AGPL-3.0-or-later (Element Web), AGPL-3.0-only (Synapse), | [1.11.89](https://github.com/element-hq/element-web/releases/tag/v1.11.89) | [For the most recent release](https://element.io/user-guide) |
|
||||
| Chat widgets | Nordeck widgets | Apache-2.0 | | [For the most recent release](https://nordeck.net/element-widgets) |
|
||||
| Collaborative notes | Notes (aka Docs) | MIT | [3.2.1](https://github.com/suitenumerique/docs/releases/tag/v3.2.1) | Online documentation/welcome document available in installed application |
|
||||
| Diagram editor | CryptPad ft. diagrams.net | AGPL-3.0-only | [2024.9.0](https://github.com/cryptpad/cryptpad/releases/tag/2024.9.0) | [For the most recent release](https://docs.cryptpad.org/en/) |
|
||||
| File management | Nextcloud | AGPL-3.0-or-later | [31.0.6](https://nextcloud.com/de/changelog/#31-0-6) | [Nextcloud 31](https://docs.nextcloud.com/) |
|
||||
| Groupware | OX App Suite | GPL-2.0-only (backend), AGPL-3.0-or-later (frontend) | [8.39](https://documentation.open-xchange.com/appsuite/releases/8.39/) | Online documentation available from within the installed application; [Additional resources](https://documentation.open-xchange.com/) |
|
||||
| Knowledge management | XWiki | LGPL-2.1-or-later | [16.10.5](https://www.xwiki.org/xwiki/bin/view/ReleaseNotes/Data/XWiki/16.10.5/) | [For the most recent release](https://www.xwiki.org/xwiki/bin/view/Documentation) |
|
||||
| Portal & IAM | Nubus | AGPL-3.0-or-later | [1.12.0](https://docs.software-univention.de/nubus-kubernetes-release-notes/1.x/en/1.12.html#version-1-12-0-2025-07-31) | [Univention's documentation website](https://docs.software-univention.de/n/en/nubus.html) |
|
||||
| Project management | OpenProject | GPL-3.0-only | [16.2.1](https://www.openproject.org/docs/release-notes/16-2-1/) | [For the most recent release](https://www.openproject.org/docs/user-guide/) |
|
||||
| Videoconferencing | Jitsi | Apache-2.0 | [2.0.9955](https://github.com/jitsi/jitsi-meet/releases/tag/stable%2Fjitsi-meet_9955) | [For the most recent release](https://jitsi.github.io/handbook/docs/category/user-guide/) |
|
||||
| Weboffice | Collabora | MPL-2.0 | [25.04.4](https://www.collaboraoffice.com/code-25-04-release-notes/) | Online documentation available from within the installed application; [Additional resources](https://sdk.collaboraonline.com/) |
|
||||
|
||||
While not all components are perfectly designed for the execution inside containers, one of the project's objectives is to
|
||||
align the applications with best practices regarding container design and operations.
|
||||
|
||||
This documentation aims to give you all that is needed to set up your own instance of the openDesk.
|
||||
|
||||
Basic knowledge of Kubernetes and DevOps processes is required though.
|
||||
|
||||
# Upgrades
|
||||
|
||||
You want to upgrade an existing openDesk installation?
|
||||
|
||||
⟶ Visit our detailed documentation about [Updates & Upgrades](./docs/migrations.md).
|
||||
|
||||
# Requirements
|
||||
|
||||
You want to understand what is required to install openDesk yourself?
|
||||
|
||||
⟶ Visit our [Requirements](./docs/requirements.md) overview.
|
||||
|
||||
# Getting started
|
||||
|
||||
You would like to install openDesk in your own infrastructure?
|
||||
|
||||
⟶ Visit our detailed [Getting started guide](./docs/getting-started.md).
|
||||
|
||||
# Advanced customization
|
||||
|
||||
- [Enhanced Configuration](./docs/enhanced-configuration.md)
|
||||
- [External services](./docs/external-services.md)
|
||||
- [Security](./docs/security.md)
|
||||
- [Scaling](./docs/scaling.md)
|
||||
- [Monitoring](./docs/monitoring.md)
|
||||
- [Theming](./docs/theming.md)
|
||||
|
||||
# Architecture
|
||||
|
||||
More information on openDesk's architecture can be found in our [architecture documentation](./docs/architecture.md).
|
||||
|
||||
# Testing
|
||||
|
||||
openDesk is continuously tested to ensure it meets high quality standards. Read how we test in openDesk in our [testing concept](./docs/testing.md).
|
||||
|
||||
# Permissions
|
||||
|
||||
Find out more about the permission system in the [roles & permissions concept](./docs/permissions.md)
|
||||
|
||||
# Releases
|
||||
|
||||
openDesk implements a defined [release and patch management process](./docs/releases.md) to ensure stability and security.
|
||||
|
||||
All technical releases are created using [Semantic Versioning](https://semver.org/).
|
||||
|
||||
Gitlab provides an
|
||||
[overview on the releases](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/releases)
|
||||
of this project.
|
||||
|
||||
Please find a list of the artifacts related to the release either in the source code archive attached to the release or
|
||||
in the files from the release's git-tag:
|
||||
- `./helmfile/environments/default/images.yaml.gotmpl`
|
||||
- `./helmfile/environments/default/charts.yaml.gotmpl`
|
||||
|
||||
Find more information in our [Workflow documentation](./docs/developer/workflow.md).
|
||||
|
||||
# Data Storage
|
||||
|
||||
More information about different data storages used within openDesk are described in the
|
||||
[Data Storage documentation](./docs/data-storage.md).
|
||||
|
||||
# Feedback
|
||||
|
||||
We love to get feedback from you!
|
||||
Related to the deployment / contents of this repository,
|
||||
please use the [issues within this project](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/issues).
|
||||
|
||||
For feedback related to the deployment / contents of this repository,
|
||||
please use the [issues within this project](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/issues).
|
||||
|
||||
If you want to address other topics, please check the section
|
||||
["Rückmeldungen und Beteiligung" of the Infos' project OVERVIEW.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung).
|
||||
["Rückmeldungen und Beteiligung" in the OVERVIEW.md](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/OVERVIEW.md#rückmeldungen-und-beteiligung) of the [openDesk Info Repository](https://gitlab.opencode.de/bmi/opendesk/info).
|
||||
|
||||
# Requirements
|
||||
|
||||
⟶ Visit our detailed [Requirements](docs/requirements.md) overview.
|
||||
|
||||
# Getting started
|
||||
|
||||
⟶ Visit our detailed [Getting started](docs/getting-started.md) guide.
|
||||
|
||||
# Advanced customization
|
||||
|
||||
- [External services](docs/external-services.md)
|
||||
- [Security](docs/security.md)
|
||||
- [Scaling](docs/scaling.md)
|
||||
- [Monitoring](docs/monitoring.md)
|
||||
- [Theming](docs/theming.md)
|
||||
|
||||
# Releases
|
||||
|
||||
All technical releases are created using [Semantic Versioning](https://semver.org/lang/de/).
|
||||
|
||||
Gitlab provides an
|
||||
[overview on the releases](https://gitlab.opencode.de/bmi/opendesk/deployment/sovereign-workplace/-/releases)
|
||||
of this project.
|
||||
|
||||
The following release artefacts are provided beside the default source code assets:
|
||||
- `chart-index.json`: An overview of all Helm charts used by the release.
|
||||
- `image-index.json`: An overview of all container images used by the release.
|
||||
|
||||
# Components
|
||||
|
||||
⟶ Visit our detailed [Component](docs/getting-started.md) docs.
|
||||
# Development
|
||||
|
||||
If you want to join or contribute to the development of openDesk please read the [Development guide](./docs/developer/development.md).
|
||||
|
||||
# License
|
||||
|
||||
This project uses the following license: Apache-2.0
|
||||
|
||||
# Copyright
|
||||
Copyright (C) 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
|
||||
Copyright (C) 2024-2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
|
||||
39
REUSE.toml
Normal file
@@ -0,0 +1,39 @@
|
||||
# SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
version = 1
|
||||
|
||||
[[annotations]]
|
||||
path = "cspell.json"
|
||||
SPDX-FileCopyrightText = "2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH"
|
||||
SPDX-License-Identifier = "Apache-2.0"
|
||||
|
||||
[[annotations]]
|
||||
path = "helmfile/files/gpg-pubkeys/*"
|
||||
SPDX-FileCopyrightText = "2023 Bundesministerium des Innern und für Heimat, PG ZenDiS \"Projektgruppe für Aufbau ZenDiS\""
|
||||
SPDX-License-Identifier = "CC0-1.0"
|
||||
|
||||
[[annotations]]
|
||||
path = "helmfile/files/theme/**"
|
||||
SPDX-FileCopyrightText = "2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH"
|
||||
SPDX-License-Identifier = "Apache-2.0"
|
||||
|
||||
[[annotations]]
|
||||
path = "docs/architecture/apis_images/*"
|
||||
SPDX-FileCopyrightText = "2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH"
|
||||
SPDX-License-Identifier = "Apache-2.0"
|
||||
|
||||
[[annotations]]
|
||||
path = ".opencode/openDesk-logo-rgb-color.svg"
|
||||
SPDX-FileCopyrightText = "2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH"
|
||||
SPDX-License-Identifier = "CC-BY-SA-4.0"
|
||||
|
||||
[[annotations]]
|
||||
path = ".opencode/screenshots/*"
|
||||
SPDX-FileCopyrightText = "2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH"
|
||||
SPDX-License-Identifier = "CC-BY-SA-4.0"
|
||||
|
||||
[[annotations]]
|
||||
path = ".gitlab/merge_request_templates/*.md"
|
||||
SPDX-FileCopyrightText = "2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH"
|
||||
SPDX-License-Identifier = "Apache-2.0"
|
||||
86
cspell.json
Normal file
@@ -0,0 +1,86 @@
|
||||
{
|
||||
"version": "0.2",
|
||||
"ignorePaths": [],
|
||||
"dictionaryDefinitions": [],
|
||||
"dictionaries": [],
|
||||
"words": [
|
||||
"Addressbooks",
|
||||
"AppSuite",
|
||||
"Arbeitsplatz",
|
||||
"Aufbau",
|
||||
"bootstrap",
|
||||
"Bundesministerium",
|
||||
"Ceph",
|
||||
"clamav",
|
||||
"CNCF",
|
||||
"Collabora",
|
||||
"commandline",
|
||||
"configurability",
|
||||
"containerd",
|
||||
"Coturn",
|
||||
"cryptpad",
|
||||
"databasename",
|
||||
"Digitale",
|
||||
"DMARC",
|
||||
"explorative",
|
||||
"Filepicker",
|
||||
"filestore",
|
||||
"Gitflow",
|
||||
"gotmpl",
|
||||
"Grundschutz",
|
||||
"hadolint",
|
||||
"Heimat",
|
||||
"helmfile",
|
||||
"helmfiles",
|
||||
"homeserver",
|
||||
"IBAC",
|
||||
"ICAP",
|
||||
"IMAPS",
|
||||
"Innern",
|
||||
"Jitsi",
|
||||
"kcadmin",
|
||||
"Keycloak",
|
||||
"Kubescape",
|
||||
"kubespray",
|
||||
"Kyverno",
|
||||
"letsencrypt",
|
||||
"localpart",
|
||||
"Minio",
|
||||
"NATS",
|
||||
"Nextcloud",
|
||||
"nindent",
|
||||
"Nordeck",
|
||||
"Nubus",
|
||||
"Öffentlichen",
|
||||
"OIDC",
|
||||
"opencode",
|
||||
"openDesk",
|
||||
"OpenProject",
|
||||
"Otterize",
|
||||
"Projektgruppe",
|
||||
"psql",
|
||||
"pubkeys",
|
||||
"RDBMS",
|
||||
"seccomp",
|
||||
"selfsigned",
|
||||
"slapadd",
|
||||
"slapcat",
|
||||
"SMTPS",
|
||||
"Souveräne",
|
||||
"Souveränität",
|
||||
"templating",
|
||||
"trashbin",
|
||||
"truststore",
|
||||
"Univention",
|
||||
"Velero",
|
||||
"Verwaltung",
|
||||
"Videokonferenz",
|
||||
"Weboffice",
|
||||
"Xchange",
|
||||
"xwiki",
|
||||
"Zentrum",
|
||||
"analysed"
|
||||
],
|
||||
"ignoreWords": [],
|
||||
"import": []
|
||||
}
|
||||
46
dev/README.md
Normal file
@@ -0,0 +1,46 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Tools for local development</h1>
|
||||
|
||||
* [charts-local.py](#charts-localpy)
|
||||
* [Commandline parameter](#commandline-parameter)
|
||||
* [`--match <your_string>`](#--match-your_string)
|
||||
* [`--revert`](#--revert)
|
||||
* [`--branch` (deprecated)](#--branch-deprecated)
|
||||
|
||||
# charts-local.py
|
||||
|
||||
This script helps you with cloning/pulling Helm charts and referencing them directly in the openDesk
|
||||
Helmfile deployment for comfortable local test and development. The charts will be cloned/pulled into a directory
|
||||
created next to the `opendesk` repo containing this documentation and the `charts-local.py` script.
|
||||
|
||||
The name of the directory containing the charts is based on the (currently) selected branch of the openDesk
|
||||
repo prefixed with `charts-`.
|
||||
|
||||
The script will create `.bak` copies of the helmfiles that have been touched that can easily be reverted to
|
||||
using the `--revert` option.
|
||||
|
||||
Run the script with `-h` to get information about the script's parameter on commandline.
|
||||
|
||||
## Commandline parameter
|
||||
|
||||
### `--match <your_string>`
|
||||
|
||||
Will only fetch repos or pull images for charts which name matches `<your_string>`.
|
||||
|
||||
### `--revert`
|
||||
|
||||
Reverts the changes in the helmfiles pointing to the local Helm charts by copying the backup files created by the
|
||||
scripts itself back to their original location.
|
||||
|
||||
### `--branch` (deprecated)
|
||||
|
||||
Optional parameter: Defines a branch for the `opendesk` repo to work with. The script will create the branch if it
|
||||
does not exist yet. Otherwise it will switch to defined branch.
|
||||
|
||||
If parameter is omitted the current branch of the `opendesk` repo will be used.
|
||||
|
||||
As this parameter was used rarely, we might remove the support in a later version.
|
||||
198
dev/charts-local.py
Executable file
@@ -0,0 +1,198 @@
|
||||
#!/usr/bin/env python3
|
||||
# SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
import os.path
|
||||
import logging
|
||||
import yaml
|
||||
import sys
|
||||
import shutil
|
||||
import subprocess
|
||||
import configargparse
|
||||
|
||||
from pathlib import Path
|
||||
from git import Repo
|
||||
|
||||
p = configargparse.ArgParser()
|
||||
p.add('--branch', env_var='CHART_DEV_BRANCH', help='The branch you want to work with. Will be created by the script if it does not exist yet.')
|
||||
p.add('--git_hostname', env_var='GIT_HOSTNAME', default='git@gitlab.opencode.de', help='Set the hostname for the chart git checkouts.')
|
||||
p.add('--revert', default=False, action='store_true', help='Set this parameter if you want to revert the referencing of the local helm chart checkout paths in the helmfiles.')
|
||||
p.add('--match', default='', help="Clone/pull only charts that contain the given string in their name.")
|
||||
p.add('--loglevel', env_var='LOGLEVEL', default='DEBUG', help='Set the loglevel: DEBUG, INFO, WARNING, ERROR, CRITICAL-')
|
||||
options = p.parse_args()
|
||||
|
||||
script_path = os.path.dirname(os.path.realpath(__file__))
|
||||
# some static definitions
|
||||
log_path = script_path+'/../logs'
|
||||
charts_yaml = script_path+'/../helmfile/environments/default/charts.yaml.gotmpl'
|
||||
base_repo_path = script_path+'/..'
|
||||
base_helmfile = base_repo_path+'/helmfile_generic.yaml.gotmpl'
|
||||
helmfile_backup_extension = '.bak'
|
||||
|
||||
Path(log_path).mkdir(parents=True, exist_ok=True)
|
||||
|
||||
logFormatter = logging.Formatter("%(asctime)s %(levelname)-5.5s %(message)s")
|
||||
rootLogger = logging.getLogger()
|
||||
rootLogger.setLevel(options.loglevel)
|
||||
|
||||
fileHandler = logging.FileHandler("{0}/{1}.log".format(log_path, os.path.basename(__file__)))
|
||||
fileHandler.setFormatter(logFormatter)
|
||||
rootLogger.addHandler(fileHandler)
|
||||
|
||||
consoleHandler = logging.StreamHandler()
|
||||
consoleHandler.setFormatter(logFormatter)
|
||||
rootLogger.addHandler(consoleHandler)
|
||||
|
||||
logging.debug(f"Working with relative paths from script location: {script_path}")
|
||||
logging.debug(f"Log directory: {log_path}")
|
||||
logging.debug(f"charts.yaml.gotmpl: {charts_yaml}")
|
||||
|
||||
|
||||
def create_or_switch_branch_base_repo():
|
||||
base_repo = Repo(path=base_repo_path)
|
||||
current_branch = base_repo.active_branch.name
|
||||
if not options.branch:
|
||||
branch = current_branch
|
||||
logging.debug(f"No branch specified on commandline, working with current branch: {current_branch}")
|
||||
else:
|
||||
branch = options.branch
|
||||
if branch in base_repo.branches:
|
||||
if branch != current_branch:
|
||||
logging.debug(f"Selected {branch} already exists, switching.")
|
||||
# ToDo: Graceful handle: "Please commit your changes or stash them before you switch branches."
|
||||
base_repo.git.switch(branch)
|
||||
else:
|
||||
logging.debug(f"Already on selected brach {branch}")
|
||||
else:
|
||||
logging.debug(f"Creating branch {branch} and switching")
|
||||
base_repo.git.branch(branch)
|
||||
base_repo.git.switch(branch)
|
||||
return branch
|
||||
|
||||
def create_path_if_not_exists(path):
|
||||
if os.path.isdir(path):
|
||||
logging.warning(f"Path {path} already exists.")
|
||||
else:
|
||||
logging.debug(f"creating directory {path}.")
|
||||
Path(path).mkdir(parents=True, exist_ok=True)
|
||||
|
||||
def clone_charts_locally(branch, charts):
|
||||
charts_path = script_path+'/../../charts-'+branch.replace('/', '_')
|
||||
charts_dict = {}
|
||||
doublette_dict = {}
|
||||
create_path_if_not_exists(charts_path)
|
||||
|
||||
for chart in charts['charts']:
|
||||
tag = charts['charts'][chart]['version']
|
||||
repository = charts['charts'][chart]['repository']
|
||||
registry = charts['charts'][chart]['registry']
|
||||
name = charts['charts'][chart]['name']
|
||||
logging.debug(f"Working on {chart} / tag {tag} / repo {repository}")
|
||||
chart_local_path = charts_path+'/'+name
|
||||
if not options.match in name:
|
||||
logging.info(f"Chart name {name} does not match {options.match} - skipping...")
|
||||
continue
|
||||
elif registry == '':
|
||||
logging.info("Empty registry definition - skipping...")
|
||||
continue
|
||||
if os.path.isdir(chart_local_path):
|
||||
logging.debug(f"Found pre-existing {chart_local_path} skipping clone/pull, but will still reference chart in Helmfile...")
|
||||
charts_dict[chart] = chart_local_path
|
||||
git_url = options.git_hostname+':'+repository
|
||||
doublette_dict[git_url] = chart_local_path
|
||||
continue
|
||||
elif 'opendesk/components/platform-development/charts' in repository:
|
||||
logging.info("Cloning the charts repo")
|
||||
git_url = options.git_hostname+':'+repository
|
||||
if git_url in doublette_dict:
|
||||
logging.debug(f"{chart} located at {git_url} is already checked out to {doublette_dict[git_url]}")
|
||||
charts_dict[chart] = doublette_dict[git_url]
|
||||
else:
|
||||
logging.debug(f"Cloning into {chart_local_path}")
|
||||
Repo.clone_from(git_url, chart_local_path)
|
||||
chart_repo = Repo(path=chart_local_path)
|
||||
chart_repo.git.checkout('v'+charts['charts'][chart]['version'])
|
||||
doublette_dict[git_url] = chart_local_path
|
||||
charts_dict[chart] = chart_local_path
|
||||
else:
|
||||
logging.info("Pulling the chart")
|
||||
helm_command = f"helm pull oci://{registry}/{repository}/{name} --version {tag} --untar --destination {charts_path}"
|
||||
logging.debug(f"CLI command: {helm_command}")
|
||||
try:
|
||||
subprocess.check_output(helm_command, shell = True)
|
||||
except subprocess.CalledProcessError:
|
||||
sys.exit(f"! CLI command '{helm_command}' failed")
|
||||
charts_dict[chart] = chart_local_path
|
||||
return charts_dict
|
||||
|
||||
def grep_yaml(file):
|
||||
with open(file, 'r') as file:
|
||||
content = ''
|
||||
for line in file.readlines():
|
||||
if not '{{' in line:
|
||||
content += line
|
||||
return yaml.safe_load(content)
|
||||
|
||||
|
||||
def get_child_helmfiles():
|
||||
child_helmfiles = []
|
||||
root_helmfile = grep_yaml(base_helmfile)
|
||||
for entry in root_helmfile['helmfiles']:
|
||||
child_helmfiles.append(base_repo_path+'/'+entry['path'])
|
||||
return child_helmfiles
|
||||
|
||||
|
||||
def process_the_helmfiles(charts_dict, charts):
|
||||
chart_def_prefix = ' chart: "'
|
||||
child_helmfiles = get_child_helmfiles()
|
||||
for child_helmfile in child_helmfiles:
|
||||
child_helmfile_updated = False
|
||||
output = []
|
||||
with open(child_helmfile, 'r') as file:
|
||||
for line in file:
|
||||
if chart_def_prefix in line:
|
||||
for chart_ident in charts_dict:
|
||||
if '.Values.charts.'+chart_ident+'.name' in line:
|
||||
logging.debug(f"found match with {chart_ident} in {line.strip()}")
|
||||
line = charts_dict[chart_ident]
|
||||
if os.path.isdir(line+'/charts/'+charts['charts'][chart_ident]['name']):
|
||||
line += '/charts/'+charts['charts'][chart_ident]['name']
|
||||
elif not os.path.isdir(line):
|
||||
sys.exit(f"! Did not find directory to reference in Helmfile: '{line}'")
|
||||
line = chart_def_prefix+line+'" # replaced by local-dev script'+"\n"
|
||||
child_helmfile_updated = True
|
||||
break
|
||||
output.append(line)
|
||||
if child_helmfile_updated:
|
||||
child_helmfile_backup = child_helmfile+helmfile_backup_extension
|
||||
if os.path.isfile(child_helmfile_backup):
|
||||
logging.debug("backup {child_helmfile_backup} already exists, will not create a new one.")
|
||||
else:
|
||||
logging.debug(f"creating backup {child_helmfile_backup}.")
|
||||
shutil.copy2(child_helmfile, child_helmfile_backup)
|
||||
logging.debug(f"Updating {child_helmfile}")
|
||||
with open(child_helmfile, 'w') as file:
|
||||
file.writelines(output)
|
||||
|
||||
|
||||
def revert_the_helmfiles():
|
||||
child_helmfiles = get_child_helmfiles()
|
||||
for child_helmfile in child_helmfiles:
|
||||
child_helmfile_backup = child_helmfile+helmfile_backup_extension
|
||||
if os.path.isfile(child_helmfile_backup):
|
||||
logging.debug(f"Reverting {child_helmfile} from backup {child_helmfile_backup}")
|
||||
os.rename(child_helmfile_backup, child_helmfile)
|
||||
else:
|
||||
logging.debug(f"Did not found the backup file {child_helmfile_backup}")
|
||||
|
||||
##
|
||||
## Main program
|
||||
##
|
||||
if options.revert:
|
||||
revert_the_helmfiles()
|
||||
else:
|
||||
branch = create_or_switch_branch_base_repo()
|
||||
with open(charts_yaml, 'r') as file:
|
||||
charts = yaml.safe_load(file)
|
||||
charts_dict = clone_charts_locally(branch, charts)
|
||||
process_the_helmfiles(charts_dict, charts)
|
||||
6
dev/requirements.txt
Normal file
@@ -0,0 +1,6 @@
|
||||
# SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
configargparse
|
||||
pyyaml
|
||||
GitPython
|
||||
452
docs/architecture.md
Normal file
@@ -0,0 +1,452 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Architecture</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Overview](#overview)
|
||||
* [Nubus (IAM)](#nubus-iam)
|
||||
* [Authentication](#authentication)
|
||||
* [Identity data flows](#identity-data-flows)
|
||||
* [OpenID Connect (OIDC)](#openid-connect-oidc)
|
||||
* [Keycloak](#keycloak)
|
||||
* [Keycloak Extensions](#keycloak-extensions)
|
||||
* [OpenLDAP](#openldap)
|
||||
* [Authorization](#authorization)
|
||||
* [LDAP group synchronization](#ldap-group-synchronization)
|
||||
* [Provisioning](#provisioning)
|
||||
* [OX Connector](#ox-connector)
|
||||
* [SCIM](#scim)
|
||||
* [Component integration](#component-integration)
|
||||
* [Intercom Service / Silent login](#intercom-service--silent-login)
|
||||
* [Central contacts](#central-contacts)
|
||||
* [Central navigation](#central-navigation)
|
||||
* [Filepicker](#filepicker)
|
||||
* [Newsfeed](#newsfeed)
|
||||
* [(OpenProject) File store](#openproject-file-store)
|
||||
* [Applications vs. services](#applications-vs-services)
|
||||
* [Collabora (weboffice)](#collabora-weboffice)
|
||||
* [CryptPad Online (diagrams)](#cryptpad-online-diagrams)
|
||||
* [Element/Synapse (chat \& call)](#elementsynapse-chat--call)
|
||||
* [Jitsi (video conferencing)](#jitsi-video-conferencing)
|
||||
* [Nextcloud (files)](#nextcloud-files)
|
||||
* [Nubus (identity and access management / portal)](#nubus-identity-and-access-management--portal)
|
||||
* [OpenProject (project management)](#openproject-project-management)
|
||||
* [OX App Suite (groupware) with OX Dovecot (mail backend)](#ox-app-suite-groupware-with-ox-dovecot-mail-backend)
|
||||
* [XWiki (knowledge management)](#xwiki-knowledge-management)
|
||||
* [Application specific user accounts](#application-specific-user-accounts)
|
||||
* [Footnotes](#footnotes)
|
||||
<!-- TOC -->
|
||||
|
||||
openDesk is designed as a [Kubernetes](https://kubernetes.io) deployment.
|
||||
|
||||
It consists of a set of [Helm charts](https://helm.sh/) orchestrated by [Helmfile](https://github.com/helmfile/helmfile).
|
||||
|
||||
openDesk includes functional applications, like file management, chat, and email. Other services such
|
||||
as databases and object storage are included for evaluation purposes only. In production, you must provide
|
||||
these services yourself.
|
||||
|
||||
# Overview
|
||||
|
||||
The following diagram shows a high-level overview of openDesk.
|
||||
|
||||
```mermaid
|
||||
flowchart TD
|
||||
A(User) -->|Log In| B[Keycloak]
|
||||
subgraph Nubus
|
||||
B -->C[Portal]
|
||||
B -->|User Directory| OpenLDAP
|
||||
end
|
||||
C -->|Manage Files| NC[fa:fa-file Nextcloud]
|
||||
C -->|Chat & Call| EL[fa:fa-comments Element]
|
||||
C -->|Send/Receive E-Mails| OXE[fa:fa-envelope OX App Suite]
|
||||
C -->|Manage Appointments| OXC[fa:fa-calendar OX App Suite]
|
||||
NC -->|Edit Office Documents| CO[fa:fa-file-word Collabora Online]
|
||||
NC -->|Edit diagram.net Documents| CP[fa:fa-chart-diagram CryptPad]
|
||||
C -->|Manage Tasks| OP[fa:fa-diagram-project OpenProject]
|
||||
C -->|Store Knowledge| XW[fa:fa-book XWiki]
|
||||
C -->|Meet People| JI[fa:fa-video Jitsi]
|
||||
```
|
||||
|
||||
openDesk includes a portal that allows navigation to the respective application. The portal is part of the
|
||||
Identity and Access Management (IAM) application shipped with openDesk: *Nubus*. Nubus includes OpenLDAP
|
||||
for storing users, groups, and permissions, and Keycloak for single sign-on with LDAP user federation
|
||||
configured to use the aforementioned OpenLDAP.
|
||||
|
||||
When the user is authenticated by Keycloak, the portal shows the applications the user is permitted to access.
|
||||
|
||||
The user can now access applications and use the corresponding functionality without the need to authenticate
|
||||
again. This is implemented using the OpenID Connect (OIDC) protocol.
|
||||
|
||||
# Nubus (IAM)
|
||||
|
||||
[Nubus](https://www.univention.de/products/nubus/) is a specialized IAM platform developed by Univention GmbH
|
||||
to centralize and simplify identity management in IT environments. It is typically used in contexts where
|
||||
user authentication, role-based access control, and integration with multiple systems are essential.
|
||||
|
||||
In openDesk, Nubus serves the following purposes:
|
||||
|
||||
1. Identity Provider (IdP)
|
||||
|
||||
Nubus acts as the central IdP in a federated authentication system, issuing and managing authentication tokens for applications.
|
||||
|
||||
2. Access Control Layer
|
||||
|
||||
As a gateway, Nubus ensures that only authorized users can access specific systems, services, or APIs, enforcing RBAC policies.
|
||||
|
||||
3. Integration Hub
|
||||
|
||||
Links applications by synchronizing identity and access data across them, ensuring consistency.
|
||||
|
||||
4. User Provisioning
|
||||
|
||||
Automates the process of creating, updating, and deactivating user accounts across integrated systems based on organizational workflows.
|
||||
|
||||
5. IAM Administration
|
||||
|
||||
The user, group and permission information which is stored in Nubus' OpenLDAP service is managed by IAM Admin(s)
|
||||
using a stripped down version of the [UMC (Univention Management Console)](https://docs.software-univention.de/manual/5.0/de/central-management-umc/umc.html).
|
||||
|
||||
6. Frontend Integration Authentication
|
||||
|
||||
A specialized component - the Intercom Service - acts according to the Backend-for-Frontend pattern when it comes to certain integration use cases, for example, ones that require the frontend of one application to call the API of another service, that also has the need for user authentication. See [Component integration](#component-integration) for more details.
|
||||
|
||||
7. Portal
|
||||
|
||||
Nubus provides a Portal component for users to access the connected applications. This component also includes self-service possibilities e.g. for password resetting.
|
||||
|
||||
For additional information, refer to the [Nubus for Kubernetes Architecture Manual](https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/index.html).
|
||||
|
||||
# Authentication
|
||||
|
||||
openDesk uses the OpenID Connect (OIDC) protocol for authentication and authorization.
|
||||
|
||||
## Identity data flows
|
||||
|
||||
An overview of
|
||||
- components that consume the LDAP service.
|
||||
- The components access the LDAP using a component-specific LDAP search account.
|
||||
- components using Univention Keycloak as an identity provider (IdP).
|
||||
- The components should use OAuth2 / OIDC flows if not otherwise denoted.
|
||||
- All components have a client configured in Keycloak.
|
||||
|
||||
Some components trust others to handle authentication for them.
|
||||
|
||||
```mermaid
|
||||
flowchart TD
|
||||
K[IdP]-->L[LDAP]
|
||||
N[Nextcloud]-->L
|
||||
O[OpenProject] --> L
|
||||
A[OX AppSuite]-->L
|
||||
D[OX Dovecot]-->L
|
||||
P[Portal/Admin]-->L
|
||||
X[XWiki]-->L
|
||||
A-->K
|
||||
N-->K
|
||||
D-->K
|
||||
O-->K
|
||||
X-->K
|
||||
P-->|SAML|K
|
||||
E[Element]-->K
|
||||
J[Jitsi]-->K
|
||||
I[IntercomService]-->K
|
||||
C[Collabora]-->N
|
||||
R[CryptPad]-->N
|
||||
F[Postfix]-->D
|
||||
```
|
||||
|
||||
## OpenID Connect (OIDC)
|
||||
|
||||
[OIDC](https://openid.net/developers/how-connect-works/) is an identity layer on top of the OAuth 2.0 protocol, allowing clients (Relying Party (RP)) to verify the identity of end-users based on the authentication performed by an authorization server (OpenID Provider (OP)). In openDesk, Keycloak serves as the OIDC provider, managing user authentication and issuing tokens for secure access to applications.
|
||||
|
||||
The following sequence diagram shows an OIDC flow of a user logging into openDesk's project management application. In openDesk, applications such as OpenProject take the role of the OIDC Relying Party, whereas Keycloak acts as the OIDC provider and OpenLDAP as the IdP.
|
||||
|
||||
```mermaid
|
||||
sequenceDiagram
|
||||
autonumber
|
||||
participant Browser as Browser
|
||||
participant OpenProject as OpenProject<br/>OIDC Relying Party
|
||||
participant Keycloak as Keycloak<br>OIDC Provider
|
||||
participant LDAP as OpenLDAP<br>IdP
|
||||
Browser->>OpenProject: GET https://projects.domain.tld
|
||||
OpenProject-->>Browser: Redirect to OIDC provider authentication form (with request)
|
||||
Browser->>Keycloak: Authenticate with username/password, optionally 2FA
|
||||
Keycloak->>LDAP: Retrieve/update user information
|
||||
LDAP->>Keycloak: Return user info
|
||||
Keycloak-->>Browser: 302 Redirect https://projects.domain.tld/callback?[...]
|
||||
Browser->>OpenProject: GET https://projects.domain.tld/callback?[...]
|
||||
OpenProject->>Keycloak: POST https://id.domain.tld/oauth/token
|
||||
Keycloak-->>OpenProject: Return JSON with token, signature
|
||||
OpenProject->>OpenProject: Verify token signature valid, signed by Provider
|
||||
OpenProject-->>Browser: 302 Redirect https://projects.domain.tld
|
||||
Note over Browser: User is authenticated
|
||||
```
|
||||
|
||||
> **Note:**<br>
|
||||
> Nubus' Portal and UMC still use [SAML 2.0](https://www.oasis-open.org/standard/saml/) to authenticate users. However, Nubus will switch to OIDC in an upcoming release, eliminating the use of SAML in openDesk altogether.
|
||||
|
||||
## Keycloak
|
||||
|
||||
[Keycloak](https://www.keycloak.org/) is an open-source identity and access management solution for web based applications and services. It provides features such as single sign-on, multi-factor authentication, user federation, and centralized user management.
|
||||
|
||||
In openDesk, Keycloak serves as the [OIDC provider](#openid-connect-oidc), handling user authentication and issuing tokens for secure access to applications.
|
||||
|
||||
For more information, see the [Keycloak Documentation](https://www.keycloak.org/documentation).
|
||||
|
||||
## Keycloak Extensions
|
||||
|
||||
Part of Nubus are the [Keycloak Extensions](https://docs.software-univention.de/nubus-kubernetes-operation/1.0/en/configuration/keycloak-extensions.html) which are used for:
|
||||
|
||||
- Login brute force protection: Blocking authentication requests upon too many failed attempts from a device or IP. _The available [CAPTCHA](https://en.wikipedia.org/wiki/CAPTCHA) option is deactivated in openDesk._
|
||||
- New device notification: Sending the user an email after successful login from a new device.
|
||||
|
||||
To address these use cases, the Keycloak Extensions act as a proxy to Keycloak.
|
||||
|
||||
## OpenLDAP
|
||||
|
||||
[OpenLDAP](https://www.openldap.org) is an open-source implementation of the Lightweight Directory Access Protocol (LDAP) that provides a central repository for user and group information. In openDesk, OpenLDAP is used as the user directory to store user and group data, and also manages access control policies across the applications.
|
||||
|
||||
# Authorization
|
||||
|
||||
## LDAP group synchronization
|
||||
|
||||
LDAP group synchronization ensures that user group memberships are consistent across the applications in openDesk that make use of the IAM group information. Nubus uses OpenLDAP to store and manage user groups, which are synchronized with integrated applications to enforce access control policies.
|
||||
|
||||
Keycloak LDAP groups are available to the following applications, however, none of the applications support nested groups. This means that users must be direct members of a group, as members of subgroups will be ignored.
|
||||
- Files / Nextcloud: Reads all groups that are enabled for Nextcloud, twice a day. Determined by the setting `background_sync_interval` in the `user_ldap` app.
|
||||
- Knowledge Management / XWiki: Reads all groups that are enabled for XWiki use, once daily during the night. Based on the jobs `LDAP Group Import Job` and `Mapped groups daily updater` that are accessible to admin users in `/bin/view/Scheduler`.
|
||||
- Project Management / OpenProject: Reads all groups that are enabled for OpenProject, [hourly](https://www.openproject.org/docs/system-admin-guide/authentication/ldap-connections/ldap-group-synchronization/#create-a-synchronized-group).
|
||||
- Webmail / OX AppSuite: Requires a webmail user to be a part of a group before the group is actively provisioned to OX AppSuite.
|
||||
|
||||
# Provisioning
|
||||
|
||||
Part of the already mentioned Nubus IAM is a [provisioning service](https://docs.software-univention.de/nubus-kubernetes-architecture/0.5/en/components/provisioning-service.html).
|
||||
|
||||
Besides the Nubus internal user of the provisioning service, the OX AppSuite is currently the only openDesk application that is getting data actively provisioned to it. This is in contrast to the norm, where applications fetch the required information from the LDAP themselves.
|
||||
|
||||
## OX Connector
|
||||
|
||||
As the OX AppSuite is using an application specific format to get e.g. users provisioned, there is also a specific connector component that links the provisioning service to the OX AppSuite, it is called the [OX Connector](https://docs.software-univention.de/manual/5.0/de/mail/ox-connector.html).
|
||||
|
||||
The [OX SOAP API](https://oxpedia.org/wiki/index.php?title=Open-Xchange_Provisioning_using_SOAP) is used by the OX Connector to synchronize information about the follow OX AppSuite objects:
|
||||
- Contexts
|
||||
- Functional Mailboxes
|
||||
- Groups
|
||||
- (Managed) Resources
|
||||
- Users
|
||||
|
||||
To find out more, see [Roles & Permissions](./docs/permissions.md).
|
||||
|
||||
## SCIM
|
||||
|
||||
[System for Cross-domain Identity Management](https://scim.cloud) (SCIM) is an open standard for automating the exchange of user identity information between identity domains or IT systems. SCIM is designed to make user provisioning and management easier by providing a standardized way to manage user identities in cloud-based applications and services.
|
||||
|
||||
In openDesk, SCIM will be used in the future to automate the process of creating, updating, and deactivating user accounts across the applications. This ensures that user data is consistent across all applications, reducing the administrative overhead and potential for errors.
|
||||
|
||||
> **Note:**<br>
|
||||
> SCIM support is planned in openDesk for 2025.
|
||||
|
||||
# Component integration
|
||||
|
||||
Important, especially from the end user perspective, are the functional integrations between the different openDesk applications.
|
||||
|
||||
```mermaid
|
||||
flowchart TD
|
||||
OX-AppSuite_Frontend-->|Silent Login, Filepicker, Central Navigation|Intercom_Service
|
||||
Element-->|Silent Login, Central Navigation|Intercom_Service
|
||||
Intercom_Service-->|Silent Login, Token Exchange|IdP
|
||||
Intercom_Service-->|Filepicker|Nextcloud
|
||||
Intercom_Service-->|Central Navigations|Portal
|
||||
Intercom_Service-->|Newsfeed|XWiki
|
||||
OX-AppSuite_Backend-->|Filepicker|Nextcloud
|
||||
OX-AppSuite_Backend-->|Videoconferences|Element
|
||||
Nextcloud-->|Central Navigation|Portal
|
||||
OpenProject-->|Central Navigation|Portal
|
||||
OpenProject-->|File Store|Nextcloud
|
||||
XWiki-->|Central Navigation|Portal
|
||||
Nextcloud-->|Central Contacts|OX-AppSuite_Backend
|
||||
OX-AppSuite_Frontend-->|Filepicker|OX-AppSuite_Backend
|
||||
Portal-->|Newsfeed|Intercom_Service
|
||||
```
|
||||
|
||||
Details can be found in the upstream documentation that is linked in the respective sections.
|
||||
|
||||
## Intercom Service / Silent login
|
||||
|
||||
The Intercom Service is deployed in the context of Nubus. Its role is to enable cross-application integration
|
||||
based on the user's browser interaction, as handling authentication when the frontend of an application has to call
|
||||
the API from another application is often challenging.
|
||||
|
||||
To establish a session with the Intercom Service, applications can use the silent login feature within an iframe.
|
||||
|
||||
Currently, only OX AppSuite and Element are using the frontend-based integration.
|
||||
|
||||
**Links:**
|
||||
- [Intercom Service upstream documentation](https://docs.software-univention.de/intercom-service/latest/index.html).
|
||||
|
||||
## Central contacts
|
||||
|
||||
OX App Suite is responsible for managing contacts in openDesk. Therefore, Nextcloud's PHP backend is using the OX AppSuite's middleware Contacts API to
|
||||
- create a new contact in the user's contacts folder when a file is shared with an unknown email address.
|
||||
- retrieve contacts from the user's contacts folder to support search-as-you-type when starting to share a file.
|
||||
|
||||
**Links:**
|
||||
- Currently used [OX Contacts API (deprecated)](https://documentation.open-xchange.com/components/middleware/http/8/index.html#!Contacts).
|
||||
- New [OX Addressbooks API](https://documentation.open-xchange.com/components/middleware/http/8/index.html#!Addressbooks) the Central Contacts integration will switch to.
|
||||
|
||||
## Central navigation
|
||||
|
||||
Central navigation is based on an API endpoint in the Nubus portal that returns a JSON containing the portal's contents for
|
||||
a given user. The response from the API endpoint is used in the openDesk applications to render the central navigation.
|
||||
|
||||
The API can be called by
|
||||
- frontend services through the Intercom Service's `/navigation.json` endpoint.
|
||||
- backend services directly at the portal's `/univention/portal/navigation.json` endpoint.
|
||||
|
||||
The central navigation expects the API caller to present a shared secret for authentication and the username for whom the portal
|
||||
contents should be returned for.
|
||||
|
||||
A `curl` based request returning the navigation contents looks like this:
|
||||
|
||||
```
|
||||
curl 'https://portal.<DOMAIN>/univention/portal/navigation.json?base=https%3A//portal.<DOMAIN>&language=de-DE' -u "<USERNAME>:<SHARED_SECRET>"
|
||||
```
|
||||
|
||||
## Filepicker
|
||||
|
||||
The Nextcloud Filepicker is integrated into the OX AppSuite, supporting the following use cases within the respective openDesk instance's Nextcloud:
|
||||
- Attach files from Nextcloud to emails.
|
||||
- Create and add links to Nextcloud files into emails.
|
||||
- Save attachments from emails into Nextcloud.
|
||||
- Attach files from Nextcloud to calendar entries.
|
||||
|
||||
The Filepicker uses frontend and backend-based integration:
|
||||
- For frontend-based integration, the OX AppSuite frontend uses the Intercom Service.
|
||||
- Backend-based integration is coming from the OX AppSuite middleware. The middleware communicates directly with Nextcloud
|
||||
when attaching a file to an email or storing a file in Nextcloud to avoid passing these files through the user's browser.
|
||||
|
||||
**Links:**
|
||||
- [OX AppSuite Nextcloud Integration upstream documentation](https://gitlab.open-xchange.com/extensions/nextcloud-integration/-/tree/main/documentation).
|
||||
|
||||
## Newsfeed
|
||||
|
||||
The portal renders a newsfeed based on entries of a predefined openDesk blog in XWiki. It accesses the required XWiki
|
||||
service through the Intercom Service's `/wiki` endpoint, in combination with the previously described silent login.
|
||||
|
||||
**Links:**
|
||||
- [XWiki Blog feature](https://extensions.xwiki.org/xwiki/bin/view/Extension/Blog%20Application)
|
||||
|
||||
## (OpenProject) File store
|
||||
|
||||
While OpenProject allows you to attach files to work packages directly, it is often preferred that the files are
|
||||
stored within Nextcloud or to link an existing file from your openDesk Nextcloud to a work package.
|
||||
|
||||
Therefore, openDesk pre-configures the trust between the openDesk instance's OpenProject and Nextcloud during the `openproject-boostrap` deployment step. As a prerequisite for that, openDesk's Nextcloud contains the `integration_openproject` app.
|
||||
|
||||
The file store must still be enabled per project in OpenProject's project admin section.
|
||||
|
||||
**Links:**
|
||||
- [OpenProject's documentation on Nextcloud integration](https://www.openproject.org/docs/system-admin-guide/integrations/nextcloud/)
|
||||
- [OpenProject Integration Nextcloud app](https://apps.nextcloud.com/apps/integration_openproject)
|
||||
|
||||
# Applications vs. services
|
||||
|
||||
openDesk consists of a variety of open-source projects, please find an overview below:
|
||||
|
||||
| Name | Description | Type |
|
||||
| --------------------- | -------------------------------- | ----------- |
|
||||
| Certificates | TLS certificates | Service |
|
||||
| ClamAV (Distributed) | Antivirus engine | Service |
|
||||
| ClamAV (Simple) | Antivirus engine | Service |
|
||||
| Collabora | Weboffice | Application |
|
||||
| CryptPad | diagrams.net editor | Application |
|
||||
| dkimpy-milter | DKIM milter for Postfix | Service |
|
||||
| Element | Secure communications platform | Application |
|
||||
| Jitsi | Videoconferencing | Application |
|
||||
| MariaDB | Database | Service |
|
||||
| Memcached | Cache database | Service |
|
||||
| MinIO | Object storage | Service |
|
||||
| Nextcloud | File share | Application |
|
||||
| Nubus (UMS) | Identity management & portal | Application |
|
||||
| OpenProject | Project management | Application |
|
||||
| OX Appsuite & Dovecot | Groupware with IMAP mail backend | Application |
|
||||
| Postfix | MTA | Service |
|
||||
| PostgreSQL | Database | Service |
|
||||
| Redis | Cache database | Service |
|
||||
| XWiki | Knowledge management | Application |
|
||||
|
||||
The end user focussed components are called applications and provide the functional scope of openDesk, please find separate paragraphs on each of the applications below.
|
||||
|
||||
Other components are of type "Service", these are used for development and evaluation purposes only, they need to be replaced in production deployments.
|
||||
|
||||
For the APIs / Protocols supported by the applications, please read the [apis.md](./docs/architecture/apis.md).
|
||||
|
||||
## Collabora (weboffice)
|
||||
|
||||
[Collabora](https://www.collaboraonline.com) is a powerful online document editing suite.
|
||||
|
||||
In openDesk, Collabora is used for editing Office documents such as rich texts, spreadsheets and presentations.
|
||||
|
||||
## CryptPad Online (diagrams)
|
||||
|
||||
[CryptPad](https://cryptpad.org/) is a collaborative editor framework supporting end-to-end encryption.
|
||||
|
||||
In openDesk, CryptPad is for editing diagrams.net documents.
|
||||
|
||||
## Element/Synapse (chat & call)
|
||||
|
||||
[Element Web](https://github.com/element-hq/element-web) is the web frontend for [Synapse](https://github.com/element-hq/synapse), the reference implementation of the sovereign and secure [Matrix protocol](https://matrix.org).
|
||||
|
||||
In openDesk, Element is used for chat and direct audio & video calling.
|
||||
|
||||
## Jitsi (video conferencing)
|
||||
|
||||
[Jitsi](https://jitsi.org) is an open-source video conferencing solution that allows users to hold secure video meetings.
|
||||
|
||||
In openDesk, Jitsi is used for video conferencing and online meetings. It integrates with other applications to provide seamless communication capabilities.
|
||||
|
||||
[Jigasi](https://github.com/jitsi/jigasi) (Jitsi's SIP component) also allows joining the meeting via phone call if an external SIP server and SIP trunk are provided.
|
||||
|
||||
## Nextcloud (files)
|
||||
|
||||
[Nextcloud](https://nextcloud.com) is a file storage and sync platform with powerful collaboration capabilities with desktop, mobile and web interfaces.
|
||||
|
||||
## Nubus (identity and access management / portal)
|
||||
|
||||
[Nubus](https://www.univention.com/products/nubus/) is a unified Identity & Access Management, providing you with full control and digital sovereignty over your IAM processes and data.
|
||||
|
||||
In openDesk, Nubus provides the management required for users, groups and other IAM objects, as well as the portal, the Identity provider for Single Sign-On and federation scenarios.
|
||||
|
||||
## OpenProject (project management)
|
||||
|
||||
[OpenProject](https://www.openproject.org) is a project management tool that supports agile project management, team collaboration, issue tracking, and more.
|
||||
|
||||
## OX App Suite (groupware) with OX Dovecot (mail backend)
|
||||
|
||||
[OX App Suite](https://www.open-xchange.com/products/ox-app-suite) is a groupware application using [OX Dovecot](https://www.dovecot.org/) as its backend mail store.
|
||||
|
||||
In openDesk, OX App Suite is used for email, calendar, address book and personal task management.
|
||||
|
||||
## XWiki (knowledge management)
|
||||
|
||||
[XWiki](https://www.xwiki.org) is an open-source wiki platform for knowledge management and collaboration.
|
||||
|
||||
# Application specific user accounts
|
||||
|
||||
While the IAM manages users centrally, some applications come with local accounts for administrative purposes:
|
||||
|
||||
| Application | Account name | Purpose | Password |
|
||||
| ------------ | --------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------ |
|
||||
| Collabora | `collabora-internal-admin` | To access the Collabora admin dashboard | `secrets.collabora.adminPassword` |
|
||||
| Element | `uvs` | The account for the "User Verification Service". It is used by Jitsi integrated into Element. | `secrets.matrixUserVerificationService.password` |
|
||||
| | `meeting-bot` | Used by the Nordeck Meeting-Bot to manage meeting rooms in Synapse. | `secrets.matrixNeoDateFixBot.password` |
|
||||
| Nextcloud | `nextcloud` | Bootstrap the Nextcloud fileshare for OpenProject with `opendesk-openproject-bootstrap` job[^1]. | `secrets.nextcloud.adminPassword` |
|
||||
| OX App Suite | `admin` | OX Connector to provision context, users, groups etc. | `secrets.oxAppsuite.adminPassword` |
|
||||
| OpenProject | set in `secrets.openproject.apiAdminUsername` | Bootstrap the Nextcloud fileshare for OpenProject with `opendesk-openproject-bootstrap` job[^1]. | `secrets.openproject.apiAdminPassword` |
|
||||
| XWiki | `superadmin` | Only available with `debug.enabled: true`, can be used for interactive login using `/bin/view/Main/?oidc.skipped=true`. | `secrets.xwiki.superadminpassword` |
|
||||
|
||||
# Footnotes
|
||||
|
||||
[^1]: We are working on a new approach to provision the OpenProject filestore, therefore the accounts are planned to be deactivated/removed with openDesk 1.2.
|
||||
960
docs/architecture/apis.md
Normal file
@@ -0,0 +1,960 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>openDesk APIs</h1>
|
||||
|
||||
This chapter presents APIs available in openDesk, grouped by application.
|
||||
|
||||
<!-- TOC -->
|
||||
* [IAM - Nubus](#iam---nubus)
|
||||
* [UMC Python API](#umc-python-api)
|
||||
* [UMC store API](#umc-store-api)
|
||||
* [IntercomService (ICS) API](#intercomservice-ics-api)
|
||||
* [High-level Listener modules API](#high-level-listener-modules-api)
|
||||
* [UDM Simple API](#udm-simple-api)
|
||||
* [UDM REST API](#udm-rest-api)
|
||||
* [UCR Python API](#ucr-python-api)
|
||||
* [Identity Store and Directory Service (LDAP)](#identity-store-and-directory-service-ldap)
|
||||
* [Nubus Provisioning Service](#nubus-provisioning-service)
|
||||
* [Nubus Authorization Service](#nubus-authorization-service)
|
||||
* [Groupware - OX AppSuite / OX Dovecot](#groupware---ox-appsuite--ox-dovecot)
|
||||
* [Usage of APIs within openDesk](#usage-of-apis-within-opendesk)
|
||||
* [HTTP API](#http-api)
|
||||
* [SOAP API](#soap-api)
|
||||
* [REST API](#rest-api)
|
||||
* [CardDAV](#carddav)
|
||||
* [CalDAV](#caldav)
|
||||
* [IMAP](#imap)
|
||||
* [POP3](#pop3)
|
||||
* [Files - Nextcloud](#files---nextcloud)
|
||||
* [Usage of APIs within openDesk](#usage-of-apis-within-opendesk-1)
|
||||
* [OCS API](#ocs-api)
|
||||
* [Notifications API](#notifications-api)
|
||||
* [Activity API](#activity-api)
|
||||
* [Remote wipe API](#remote-wipe-api)
|
||||
* [WebDAV](#webdav)
|
||||
* [CalDAV / CardDAV](#caldav--carddav)
|
||||
* [Weboffice - Collabora](#weboffice---collabora)
|
||||
* [PostMessage API](#postmessage-api)
|
||||
* [Conversion API](#conversion-api)
|
||||
* [Project management - OpenProject](#project-management---openproject)
|
||||
* [HATEOAS API](#hateoas-api)
|
||||
* [BCF API](#bcf-api)
|
||||
* [Video Conferencing - Jitsi](#video-conferencing---jitsi)
|
||||
* [IFrame API](#iframe-api)
|
||||
* [lib-jitsi-meet API](#lib-jitsi-meet-api)
|
||||
* [Jitsi Meet React SDK](#jitsi-meet-react-sdk)
|
||||
* [Chat - Element](#chat---element)
|
||||
* [Matrix Application Service API](#matrix-application-service-api)
|
||||
* [Matrix Client-Server API](#matrix-client-server-api)
|
||||
* [Matrix Server-Server API](#matrix-server-server-api)
|
||||
* [Matrix Push Gateway API](#matrix-push-gateway-api)
|
||||
* [Matrix Identity Service API](#matrix-identity-service-api)
|
||||
* [Matrix React SDK Module API](#matrix-react-sdk-module-api)
|
||||
* [Matrix Widget API](#matrix-widget-api)
|
||||
* [NeoBoard Data Model API](#neoboard-data-model-api)
|
||||
* [NeoDateFix REST API](#neodatefix-rest-api)
|
||||
* [Knowledge management - XWiki](#knowledge-management---xwiki)
|
||||
* [REST API](#rest-api-1)
|
||||
* [Scripting API](#scripting-api)
|
||||
* [Java API](#java-api)
|
||||
* [JavaScript API](#javascript-api)
|
||||
<!-- TOC -->
|
||||
|
||||
# IAM - Nubus
|
||||
|
||||

|
||||
[Source](https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/overview/components.html#overview-components-fig)
|
||||
|
||||
## UMC Python API
|
||||
|
||||

|
||||
[Source](https://docs.software-univention.de/developer-reference/latest/en/umc/architecture.html#umc-api)
|
||||
|
||||
| Name | UMC Python API |
|
||||
| ------------------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | |
|
||||
| Versioning | |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | Nubus UMC |
|
||||
| Transport protocol | |
|
||||
| Usage within component | |
|
||||
| Usage within openDesk | |
|
||||
| Usage for external integration | |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | [Univention Management Console Protocol (UMCP)](https://docs.software-univention.de/ucs-python-api/univention.management.console.protocol.html). Format consisting of a single header line, one empty line and the body. The body can be JSON. |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.software-univention.de/ucs-python-api/modules.html |
|
||||
|
||||
## UMC store API
|
||||
|
||||
| Name | UMC store API (also named UMC JavaScript API or Dojo/UMC JavaScript API) |
|
||||
| ------------------------------ | ---------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Encapsulate and ease the access to JavaScript module data |
|
||||
| Versioning | |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | Nubus UMC |
|
||||
| Transport protocol | |
|
||||
| Usage within component | |
|
||||
| Usage within openDesk | |
|
||||
| Usage for external integration | |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.software-univention.de/developer-reference/latest/en/umc/local-system-module.html#umc-store-api |
|
||||
|
||||
## IntercomService (ICS) API
|
||||
|
||||
| Name | IntercomService API |
|
||||
| ------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Encapsulate and ease the access to module data from JavaScript |
|
||||
| Versioning | |
|
||||
| Authentication | IdP based SSO |
|
||||
| In openDesk provided by | Nubus UMC |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | |
|
||||
| Usage within openDesk | The ICS implements the BFF pattern for various openDesk inter-component integrations, see [components.md](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/develop/docs/components.md#component-integration) |
|
||||
| Usage for external integration | |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Depends on the integration use case. |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.software-univention.de/intercom-service/latest/architecture.html |
|
||||
|
||||
## High-level Listener modules API
|
||||
|
||||
| Name | High-level Listener modules API |
|
||||
| ------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Dispatching of LDAP events. |
|
||||
| Versioning | |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | Univention Event Processing |
|
||||
| Transport protocol | |
|
||||
| Usage within component | The listener mechanism is used to dispatch events from the LDAP to the Nubus provisioning service. It should be replaced with another approach in the future. |
|
||||
| Usage within openDesk | The ICS implements the BFF pattern for various openDesk inter-component integrations, see also [components.md](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/develop/docs/components.md#component-integration) |
|
||||
| Usage for external integration | |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Depends on the integration use case. |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.software-univention.de/developer-reference/latest/en/listener/api.html |
|
||||
|
||||
More details on the Nubus provisioning service can be found here: https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/components/provisioning-service.html
|
||||
|
||||
## UDM Simple API
|
||||
|
||||

|
||||
[Source](https://docs.software-univention.de/architecture/latest/en/services/udm.html#architecture-model-udm)
|
||||
|
||||
| Name | UDM Simple API |
|
||||
| ------------------------------ | ------------------------------------------------------------------- |
|
||||
| Purpose | Allows use of capability and objects directly in Python programs. |
|
||||
| Versioning | |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | Univention Directory Manager |
|
||||
| Transport protocol | |
|
||||
| Usage within component | Allows to use UDM capability and objects directly in Python programs. UDM Simple API provides Python modules and classes below `univention.udm.*` |
|
||||
| Usage within openDesk | |
|
||||
| Usage for external integration | |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Depends on the integration use case. |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.software-univention.de/ucs-python-api/univention.udm.html#module-univention.udm. |
|
||||
|
||||
## UDM REST API
|
||||
|
||||
| Name | UDM REST API |
|
||||
| ------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------ |
|
||||
| Purpose | Inspect, modify, create and delete objects through HTTP requests. |
|
||||
| Versioning | |
|
||||
| Authentication | Basic Auth |
|
||||
| In openDesk provided by | Univention Directory Manager |
|
||||
| Transport protocol | HTTP() |
|
||||
| Usage within component | The Nubus bootstrapping process makes use of the API. |
|
||||
| Usage within openDesk | |
|
||||
| Usage for external integration | The [openDesk User Importer](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/user-import) utilizes the API. |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Depends on the integration use case. |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.software-univention.de/nubus-kubernetes-customization/latest/en/api/udm-rest.html |
|
||||
|
||||
## UCR Python API
|
||||
|
||||

|
||||
[Source](https://docs.software-univention.de/architecture/latest/en/services/ucr.html#services-ucr-architecture-model)
|
||||
|
||||
| Name | UCR Python API |
|
||||
| ------------------------------ | --------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Offers a programming interface for components and other Python programs. |
|
||||
| Versioning | |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | Nubus |
|
||||
| Transport protocol | |
|
||||
| Usage within component | The Nubus bootstrapping process makes use of the API. |
|
||||
| Usage within openDesk | |
|
||||
| Usage for external integration | |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.software-univention.de/developer-reference/latest/en/ucr/usage.html#using-ucr-from-python |
|
||||
|
||||
## Identity Store and Directory Service (LDAP)
|
||||
|
||||

|
||||
[Source](https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/components/identity-store.html#component-identity-store-figure)
|
||||
|
||||
| Name | Identity Store and Directory Service (LDAP) |
|
||||
| ------------------------------ | ------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Read access to Nubus LDAP |
|
||||
| Versioning | n/a |
|
||||
| Authentication | LDAP user auth |
|
||||
| In openDesk provided by | Nubus openLDAP |
|
||||
| Transport protocol | LDAP |
|
||||
| Usage within component | Data backend for Nubus |
|
||||
| Usage within openDesk | Used by multiple applications to access user/group data, e.g. Nextcloud Server, OpenProject, OX AppSuite backend, XWiki |
|
||||
| Usage for external integration | Not recommended |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | LDAP |
|
||||
| Supported standards | LDAP |
|
||||
| Documentation | https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/components/identity-store.html#component-identity-store-directory-service |
|
||||
|
||||
## Nubus Provisioning Service
|
||||
|
||||

|
||||
[Source](https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/components/provisioning-service.html#component-provisioning-service-complete-figure)
|
||||
|
||||
| Name | Nubus Proisioning Service |
|
||||
| ------------- | --------------------------------------------------------------------------------------------------- |
|
||||
| Documentation | https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/components/provisioning-service.html |
|
||||
|
||||
## Nubus Authorization Service
|
||||
|
||||

|
||||
[Source](https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/overview/interfaces-protocols.html#authorization-service)
|
||||
|
||||
| Name | Nubus Authorization Service |
|
||||
| ------------- | --------------------------------------------------------------------------------------------------- |
|
||||
| Documentation | https://docs.software-univention.de/nubus-kubernetes-architecture/latest/en/overview/interfaces-protocols.html#authorization-service |
|
||||
|
||||
# Groupware - OX AppSuite / OX Dovecot
|
||||
|
||||

|
||||
|
||||

|
||||
|
||||
## Usage of APIs within openDesk
|
||||
|
||||
The following are the APIs used by the Groupware application:
|
||||
|
||||
| Used by | Accessed component | Service | Purpose | Message format |
|
||||
| ------------------------------ | ------------------ | ------------------ | ----------------------------------------------------------- | -------------------------------- |
|
||||
| AppSuite Middleware | Keycloak | Authentication | Single sign-on / sign-out | OIDC |
|
||||
| Dovecot | Keycloak | Authentication | Authenticate user | OIDC |
|
||||
| AppSuite Frontend (in Browser) | Intercom Service | Silent Login | Establish Intercom Service session | |
|
||||
| AppSuite Frontend (in Browser) | Intercom Service | Central Navigation | Retrieve content for openDesk Navigation drop-down | JSON |
|
||||
| AppSuite Frontend (in Browser) | Intercom Service | Element Bot | Manage (CUD) meetings in Element | Custom JSON (based on iCalender) |
|
||||
| AppSuite Frontend (in Browser) | Intercom Service | Filepicker | Read/write contents from/to Nextcloud or create share links | WebDAV & Nextcloud API |
|
||||
| AppSuite Middleware | Nextcloud | Filepicker | Read/write files from/to Nextcloud | WebDAV & Nextcloud API |
|
||||
| AppSuite Middleware | Element Bot | Element Bot | Update/delete meetings in Element | Custom JSON (based on iCalender) |
|
||||
| AppSuite Middleware | LDAP | Address book | Search for global contacts and retrieve contact details | LDAP |
|
||||
| Dovecot | LDAP | Data retrieval | Retrieve necessary user details to handle mailboxes | LDAP |
|
||||
|
||||
## HTTP API
|
||||
|
||||

|
||||
|
||||
| Name | HTTP API |
|
||||
| ------------------------------ | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Login, accessing email, contacts, calendar, tasks, configs, email filtering, task automation, workflow automation, etc – most of the AppSuite's functionality that is available to the user through the Web-UI. |
|
||||
| Versioning | No API-specific versioning. The version can be considered identical to the OX App Suite version, which is contained in the URL of the online API documentation. |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | OX AppSuite Middleware |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | Used by OX Web-UI (Frontend) |
|
||||
| Usage within openDesk | - Nextcloud uses the SearchAPI to synchronize contacts<br>- Nordeck Meeting bot synchronizes OX meeting changes applied in Element. |
|
||||
| Usage for external integration | Not used at the moment, but is the recommended way to integrate with OX AppSuite. |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON based, AppSuite specific format |
|
||||
| Supported standards | iCal, defined by RFC, fully implemented |
|
||||
| Documentation | https://documentation.open-xchange.com/components/middleware/http/8/index.html |
|
||||
|
||||
## SOAP API
|
||||
|
||||
| Name | SOAP API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Management of users, groups, contexts, resources. |
|
||||
| Versioning | n/a |
|
||||
| Authentication | Basic Auth |
|
||||
| In openDesk provided by | OX AppSuite Middleware |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | OX Connector synchronizes the state of the objects (users, groups etc.) managed in the LDAP. |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | XML based, exactly following the format of Java RMI. |
|
||||
| Supported standards | SOAP |
|
||||
| Documentation | https://software.open-xchange.com/products/appsuite/doc/SOAP/admin/OX-Admin-SOAP.html |
|
||||
|
||||
> **Note**:
|
||||
> You will find a catalogue of the available services including links to the respective URLs at `/webservices/` within the AppSuite host of your openDesk installation, e.g. https://webmail.myopendesk.tld/webservices/
|
||||
|
||||
## REST API
|
||||
|
||||
| Name | REST API |
|
||||
| ------------------------------ |-----------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Purpose | Delivers services in the following functional groups:<br>- *Admin*: Interface for provisioning and other administrative operations<br>- *Advertisement*: The advertisement module<br>- *Health*: The health-check module<br>- *InternetFreeBusy*: Servlet for requesting free busy data<br>- *Metrics*: The metrics module<br>- *Preliminary*: This module contains preliminary endpoints which may change in the future<br>- *Push*: The push module<br>- *Userfeedback*: The user feedback module |
|
||||
| Versioning | No API-specific versioning. The version can be considered identical to the OX App Suite version, which is contained in the URL of the online API documentation. |
|
||||
| Authentication | Basic Auth |
|
||||
| In openDesk provided by | OX AppSuite Middleware |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | Push module is used by OX Frontend. |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | - Email Body RFC 822 is used by Push<br>- Prometheus format is used by Metrics API<br>- API iCal format is used by InternetFreeBusy |
|
||||
| Supported standards | SOAP |
|
||||
| Documentation | https://documentation.open-xchange.com/components/middleware/rest/8/index.html |
|
||||
## CardDAV
|
||||
|
||||
| Name | CardDAV |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Designed for rich clients. Synchronization of contact entries in both directions (i.e. as a server and as a client); vCard import and export are available via OX HTTP API |
|
||||
| Versioning | Yes, API version is specific to the version of the underlying protocol |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | OX AppSuite Middleware |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | vCard, defined by RFC, fully implemented |
|
||||
| Supported standards | |
|
||||
| Documentation | https://documentation.open-xchange.com/8/middleware/miscellaneous/caldav_carddav.html |
|
||||
|
||||
## CalDAV
|
||||
|
||||
| Name | CalDAV |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Designed for rich clients. Synchronization of contact entries in both directions (i.e. as a server and as a client); vCard import and export are available via OX HTTP API |
|
||||
| Versioning | Yes, API version is specific to the version of the underlying protocol |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | OX AppSuite Middleware |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | iCal, defined by RFC, fully implemented |
|
||||
| Supported standards | iTIP, iMIP |
|
||||
| Documentation | https://documentation.open-xchange.com/8/middleware/miscellaneous/caldav_carddav.html |
|
||||
|
||||
## IMAP
|
||||
|
||||
| Name | IMAP |
|
||||
| ------------------------------ |--------------------------------------------------------------------------------------|
|
||||
| Purpose | Used for retrieval of emails, designed for rich clients |
|
||||
| Versioning | Yes, API version is specific to the version of the underlying protocol |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | OX Dovecot |
|
||||
| Transport protocol | TCP |
|
||||
| Usage within component | Used by OX AppSuite middleware to read/write mail and folders |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | Can be used by local IMAP clients (e.g. Thunderbird) |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | RFC 9051 |
|
||||
| Supported standards | IMAP |
|
||||
| Documentation | https://www.rfc-editor.org/rfc/rfc9051 |
|
||||
|
||||
## POP3
|
||||
|
||||
| Name | POP3 |
|
||||
| ------------------------------ |------------------------------------------------------------------------|
|
||||
| Purpose | Used for retrieval of emails, designed for rich clients |
|
||||
| Versioning | Yes, API version is specific to the version of the underlying protocol |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | OX Dovecot |
|
||||
| Transport protocol | TCP |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | Can be used by local POP3 clients (e.g. Thunderbird) |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | RFC 1939 |
|
||||
| Supported standards | IMAP |
|
||||
| Documentation | https://www.rfc-editor.org/rfc/rfc1939 |
|
||||
|
||||
# Files - Nextcloud
|
||||
|
||||

|
||||
|
||||
## Usage of APIs within openDesk
|
||||
|
||||
The following are the APIs used by the Files application:
|
||||
|
||||
| Used by | Accessed component | Service | Purpose | Message format |
|
||||
| ---------------- | ---------------------- | ---------------------- | -------------------------------------------------- | -------------- |
|
||||
| Nextcloud Server | Keycloak | Authentication | Single sign-on / sign-out | OIDC |
|
||||
| Nextcloud Server | Nubus Portal | Central Navigation | Retrieve content for openDesk Navigation drop-down | JSON |
|
||||
| Nextcloud Server | OX AppSuite Middleware | OX HTTP API (Contacts) | Reading/writing personal contacts | JSON |
|
||||
| Nextcloud Server | Nubus | LDAP | Read users and groups data | LDAP |
|
||||
|
||||
## OCS API
|
||||
|
||||
| Name | OCS API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Obtain and/or manage user status, user preferences, shares, sharees, recommendations. API is likely to be extended to other use cases in the future. Nextcloud apps can extend the functionality of OCS API by providing new endpoints |
|
||||
| Versioning | Identical to component release version |
|
||||
| Authentication | Basic Auth or by passing a set of valid session cookies |
|
||||
| In openDesk provided by | Nextcloud Server |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | Filepicker uses the API to create share links. |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Requests in JSON, responses in JSON or XML |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.nextcloud.com/server/latest/developer_manual/client_apis/OCS/index.html |
|
||||
|
||||
## Notifications API
|
||||
|
||||
| Name | Notifications API |
|
||||
| ------------------------------ | --------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Fetch notifications |
|
||||
| Versioning | See linked documentation (which also names the version), address via URL path, e.g. `/ocs/v2.php/apps/notifications/api/v2` |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | Nextcloud Server |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Requests in JSON, responses in JSON or XML |
|
||||
| Supported standards | |
|
||||
| Documentation | https://github.com/nextcloud/notifications/blob/master/docs/ocs-endpoint-v2.md |
|
||||
| | |
|
||||
|
||||
## Activity API
|
||||
|
||||
| Name | Activity API |
|
||||
| ------------------------------ |----------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Purpose | Obtaining the list of actions initiated by or involving a specific user (files created, shared, deleted etc and other activities reported by apps) |
|
||||
| Versioning | Identical to component release version |
|
||||
| Authentication | See linked documentation (which also names the version), address via URL path, e.g. `/ocs/v2.php/apps/activity/api/v2` |
|
||||
| In openDesk provided by | Nextcloud Server |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Requests in JSON, responses in JSON or XML |
|
||||
| Supported standards | |
|
||||
| Documentation | https://github.com/nextcloud/activity/blob/master/docs/endpoint-v2.md |
|
||||
|
||||
## Remote wipe API
|
||||
|
||||
| Name | Remote wipe API |
|
||||
| ------------------------------ |--------------------------------------------------------------------------------------------|
|
||||
| Purpose | Used to wipe storage remotely (e.g. on a lost device) |
|
||||
| Versioning | Identical to component release version |
|
||||
| Authentication | Login flow token |
|
||||
| In openDesk provided by | Nextcloud Server |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | |
|
||||
| Documentation | https://docs.nextcloud.com/server/latest/developer_manual/client_apis/RemoteWipe/index.html |
|
||||
|
||||
## WebDAV
|
||||
|
||||
| Name | WebDAV |
|
||||
| ------------------------------ |-----------------------------------------------------------------------------------------|
|
||||
| Purpose | Accessing files and folders, conducting searches |
|
||||
| Versioning | Identical to component release version |
|
||||
| Authentication | Basic Auth or by passing a set of valid session cookies |
|
||||
| In openDesk provided by | Nextcloud Server |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | Used by OX AppSuite to get/put files (attachments) |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Requests in JSON, responses in JSON or XML |
|
||||
| Supported standards | RFC4918 |
|
||||
| Documentation | https://docs.nextcloud.com/server/latest/developer_manual/client_apis/WebDAV/index.html |
|
||||
|
||||
## CalDAV / CardDAV
|
||||
|
||||
CalDAV and CardDAV APIs are available in Nextcloud, but as openDesk uses OX AppSuite for Calendar and Contacts these Nextcloud APIs do not provide relevant data in openDesk.
|
||||
|
||||
# Weboffice - Collabora
|
||||
|
||||
The following are the APIs used by the Weboffice application:
|
||||
|
||||
| Used by | Accessed component | Service | Purpose | Message format |
|
||||
| --------- | ------------------ | ----------------- | ------------------------------------------- | -------------- |
|
||||
| Collabora | Nextcloud | Document handling | Retrieve, store and manage office documents | WOPI |
|
||||
|
||||
Collabora is integrated with Nextcloud to read/write Office documents from/to Nextcloud. The integration uses the Web
|
||||
Application Open Interface ([WOPI](https://learn.microsoft.com/en-us/openspecs/office_protocols/ms-wopi/6a8bb410-68ad-47e4-9dc3-6cf29c6b046b)) protocol.
|
||||
|
||||
Nextcloud acts as the WOPI server whereas Collabora Online is the WOPI client.
|
||||
|
||||
```mermaid
|
||||
sequenceDiagram
|
||||
autonumber
|
||||
Browser->>Nextcloud: Open document "digital-strategy.odt"<br>(which is fileid=123456)
|
||||
Nextcloud-->>Browser: "Use COOL server to open document online<br>URL is https://office.domain.tld/?open"
|
||||
Browser->>Collabora: GET "https://office.domain.tld/?open&file=https://files.domain.tld/index.php/apps/richdocuments/wopi/files/123456"
|
||||
Collabora-->>Nextcloud: GET https://files.domain.tld/index.php/apps/richdocuments/wopi/files
|
||||
Nextcloud-->>Browser: Edit document "digital-strategy.odt" (fileid=123456)
|
||||
```
|
||||
|
||||
|
||||
## PostMessage API
|
||||
|
||||
| Name | PostMessage API |
|
||||
| ------------------------------ |---------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Purpose | Interact with parent frame when Collabora browser part is enclosed in one, mostly based on WOPI specification with few extensions/modifications |
|
||||
| Versioning | N/A |
|
||||
| Authentication | CSP rules protect unauthorized communication. In practice, the editor is embedded in an iframe and can communicate only with the iframe's parent. |
|
||||
| In openDesk provided by | Collabora |
|
||||
| Transport protocol | HTTP |
|
||||
| Usage within component | N/A |
|
||||
| Usage within openDesk | Query the number of users in a document, query supported export formats, manage sessions, manage actions like save, insert image, print etc. |
|
||||
| Usage for external integration | In openDesk Collabora Online is integrated with Nextcloud but other integrations exist and are possible, see the documentation. |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | [WOPI](https://learn.microsoft.com/en-us/openspecs/office_protocols/ms-wopi/6a8bb410-68ad-47e4-9dc3-6cf29c6b046b) |
|
||||
| Documentation | https://sdk.collaboraonline.com/docs/postmessage_api.html |
|
||||
|
||||
## Conversion API
|
||||
|
||||
| Name | Conversion API |
|
||||
| ------------------------------ | ------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Convert files between various file formats (e.g. to pdf, png, txt, or between OOXML and ODF etc.) |
|
||||
| Versioning | N/A |
|
||||
| Authentication | The `convert-to` endpoint is restricted to allowed host addresses that can be set in the configuration. |
|
||||
| In openDesk provided by | Collabora |
|
||||
| Transport protocol | HTTP (REST API) |
|
||||
| Usage within component | N/A |
|
||||
| Usage within openDesk | To generate thumbnails in Nextcloud for supported document types. |
|
||||
| Usage for external integration | It is possible to set up Collabora Online as a general document converter service. |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | Text based, see the documentation |
|
||||
| Supported standards | N/A |
|
||||
| Documentation | https://sdk.collaboraonline.com/docs/conversion_api.html |
|
||||
|
||||
# Project management - OpenProject
|
||||
|
||||
The following are the APIs used by the Project management application:
|
||||
|
||||
| Used by | Accessed component | Service | Purpose | Message format |
|
||||
| --------------- | ------------------ | ------------------ | -------------------------------------------------- | -------------- |
|
||||
| OpenProject-web | Keycloak | Authentication | Single sign-on / sign-out | OIDC |
|
||||
| OpenProject-web | Nubus Portal | Central Navigation | Retrieve content for openDesk Navigation drop-down | JSON |
|
||||
| OpenProject-web | Nextcloud | Various | Integration of Nextcloud as OpenProject filestore | JSON |
|
||||
| OpenProject-web | Nubus | LDAP | Read users and groups data | LDAP |
|
||||
|
||||
## HATEOAS API
|
||||
|
||||
| Name | HATEOAS (Hyperimages as the Engine of Application State) API |
|
||||
| ------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Provides access for the frontend client of OpenProject and for third party use, i.e.:<br>- CRUD work packages, projects, time logging, users, queries (work package filters), and all related objects<br>- READ notifications, activities per work package<br>- READ capabilities (allowed actions of users throughout projects) does not address |
|
||||
| Versioning | URL based versioning scheme, e.g. `/api/v3/spec.json` |
|
||||
| Authentication | OAuth2, session based authentication, and basic auth |
|
||||
| In openDesk provided by | OpenProject |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | OpenProject Web-UI |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | [HAL](https://en.wikipedia.org/wiki/Hypertext_Application_Language) + JSON |
|
||||
| Supported standards | REST, [HATEOAS](https://en.wikipedia.org/wiki/HATEOAS) |
|
||||
| Documentation | https://www.openproject.org/docs/api/introduction/ |
|
||||
|
||||
**Additional Information:**
|
||||
|
||||
*What does it not do that developers should know about?*
|
||||
- CRUD custom fields, time reports, wikis and wiki pages
|
||||
- Aggregated filterable activities/changes
|
||||
|
||||
*What are the typical use cases?*
|
||||
- It powers all angular frontend components in OpenProject, mainly the work package table/view, boards, team planner etc., and supports all common use cases
|
||||
|
||||
*How does it work? (What do users need to know about architecture an internal components?)*
|
||||
- HAL is a standard to define resources with embedding and links between them
|
||||
- HAL contains action links depending on the user’s permissions, allows permitted actions to be derived from object keys in json
|
||||
|
||||
*What knowledge should the developer have before using the API?*
|
||||
- Knowledge of REST
|
||||
- (Optional) Knowledge of HAL standard
|
||||
|
||||
*Are there any extensions or APIs in (or planned for) development that users should know about?*
|
||||
- Signaling to receive only selected attributes/nested resources from the API for performance improvements
|
||||
|
||||
## BCF API
|
||||
|
||||
| Name | BCF API |
|
||||
| ------------------------------ |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Purpose | Implementation of a subset of [BCF](https://en.wikipedia.org/wiki/BIM_Collaboration_Format) standard for [BIM](https://en.wikipedia.org/wiki/Building_information_modeling) projects |
|
||||
| Versioning | URL based versioning scheme, e.g. `/api/bcf/2.1` |
|
||||
| Authentication | OAuth2 |
|
||||
| In openDesk provided by | OpenProject |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | [BCF 2.1](https://github.com/buildingSMART/BCF-API/blob/release_2_1/README.md) |
|
||||
| Documentation | https://www.openproject.org/docs/api/bcf-rest-api/ |
|
||||
|
||||
# Video Conferencing - Jitsi
|
||||
|
||||
## IFrame API
|
||||
|
||||
| Name | IFrame API |
|
||||
| ------------------------------ |--------------------------------------------------------------------------|
|
||||
| Purpose | Embed Jitsi video conferencing features into existing applications/sites |
|
||||
| Versioning | Identical to the Jitsi release version |
|
||||
| Authentication | Optional (JWT-based authentication in openDesk context) |
|
||||
| In openDesk provided by | Jitsi-Web |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | Used by Element (Chat Web-UI) |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | |
|
||||
| Supported standards | |
|
||||
| Documentation | https://jitsi.github.io/handbook/docs/dev-guide/dev-guide-iframe/ |
|
||||
|
||||
## lib-jitsi-meet API
|
||||
|
||||
| Name | lib-jitsi-meet API |
|
||||
| ------------------------------ | ---------------------------------------------------------------------- |
|
||||
| Purpose | Create Jitsi video conferences with a custom GUI |
|
||||
| Versioning | Identical to the Jitsi release |
|
||||
| Authentication | not required |
|
||||
| In openDesk provided by | Jitsi-Web |
|
||||
| Transport protocol | none (it works as a library) |
|
||||
| Usage within component | Used by Jitsi itself |
|
||||
| Usage within openDesk | Used by Jitsi itself |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | |
|
||||
| Supported standards | |
|
||||
| Documentation | https://jitsi.github.io/handbook/docs/dev-guide/dev-guide-ljm-api/ |
|
||||
|
||||
## Jitsi Meet React SDK
|
||||
|
||||
> **Note**<br>
|
||||
> Additional SDKs can be found at https://jitsi.github.io/handbook/docs/category/sdks/
|
||||
|
||||
| Name | Meet React SDK |
|
||||
| ------------------------------ | ------------------------------------------------------------------- |
|
||||
| Purpose | Embed Jitsi video conferencing into apps using React |
|
||||
| Versioning | https://github.com/jitsi/jitsi-meet-react-sdk/releases |
|
||||
| Authentication | not required |
|
||||
| In openDesk provided by | Jitsi |
|
||||
| Transport protocol | none (it works as a module) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | |
|
||||
| Supported standards | |
|
||||
| Documentation | https://jitsi.github.io/handbook/docs/dev-guide/dev-guide-react-sdk |
|
||||
|
||||
# Chat - Element
|
||||
|
||||
While Jitsi is available as standalone videoconferencing in openDesk, it is also used in [Element as videoconferencing backend](https://github.com/element-hq/element-web/blob/develop/docs/jitsi.md).
|
||||
|
||||
```mermaid
|
||||
---
|
||||
config:
|
||||
class:
|
||||
hideEmptyMembersBox: true
|
||||
---
|
||||
classDiagram
|
||||
class CommunicationService["Communication Service"] {
|
||||
<<interface>>
|
||||
}
|
||||
|
||||
class MxChat["Element Matrix Chat"] {
|
||||
<<interface>>
|
||||
}
|
||||
class JitsiVideoConference["Jitsi Video Conference"] {
|
||||
<<interface>>
|
||||
}
|
||||
|
||||
CommunicationService <|.. MxChat
|
||||
CommunicationService <|.. JitsiVideoConference
|
||||
MxChat <-- JitsiVideoConference
|
||||
|
||||
class MxAppServiceApi["Matrix Application Service API"]
|
||||
class MxClientServerApi["Matrix Client Server API"]
|
||||
class MxServerServerApi["Matrix Server Server API"]
|
||||
class MxPushGatewayApi["Matrix Push Gateway API"]
|
||||
class MxIdentityServiceApi["Matrix Identity Service API"]
|
||||
class MxRtc["Matrix RTC"]
|
||||
class MxElementWebModuleApi["Matrix React SDK Module API"]
|
||||
class MxWidgetApi["Matrix Widget API"]
|
||||
class NeoBoardDataModelApi["NeoBoard Data Model API"]
|
||||
class NeoDateFixRestApi["NeoDateFix REST API"]
|
||||
|
||||
MxChat *-- MxAppServiceApi
|
||||
MxChat *-- MxClientServerApi
|
||||
MxChat *-- MxServerServerApi
|
||||
MxChat *-- MxPushGatewayApi
|
||||
MxChat *-- MxIdentityServiceApi
|
||||
MxChat *-- MxRtc
|
||||
MxChat *-- MxElementWebModuleApi
|
||||
MxChat *-- MxWidgetApi
|
||||
|
||||
class JitsiIframeApi["Jitsi iFrame API"]
|
||||
class JitsiMeetApi["Jitsi Meet API"]
|
||||
class JitsiMeetReactSdk["Jitsi Meet React SDK"]
|
||||
|
||||
JitsiVideoConference *-- JitsiIframeApi
|
||||
JitsiVideoConference *-- JitsiMeetApi
|
||||
JitsiVideoConference *-- JitsiMeetReactSdk
|
||||
```
|
||||
|
||||
The following are the APIs used by the Chat application:
|
||||
|
||||
| Used by | Accessed component | Service | Purpose | Message format |
|
||||
| --------------- | ------------------ | ------------------ | -------------------------------------------------- | -------------- |
|
||||
| Element/Synapse | Keycloak | Authentication | Single sign-on / sign-out | OIDC |
|
||||
| OpenProject-web | Intercom Service | Central Navigation | Retrieve content for openDesk Navigation drop-down | JSON |
|
||||
|
||||
## Matrix Application Service API
|
||||
|
||||
| Name | Matrix Application Service API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Implementation of custom server-side behavior in Matrix (e.g. gateways, filters, extensible hooks) |
|
||||
| Versioning | URL based with version bumps on breaking changes (e.g. `/_matrix/app/v1`) |
|
||||
| Authentication | HTTP-Authorization header with Bearer token |
|
||||
| In openDesk provided by | Synapse |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | Nordeck Widgets |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | [Matrix](https://spec.matrix.org/latest/application-service-api/) |
|
||||
| Documentation | [Synapse](https://element-hq.github.io/synapse/latest/) is the reference implementation of the Matrix protocol, see standard for API details |
|
||||
|
||||
## Matrix Client-Server API
|
||||
|
||||
| Name | Matrix Client-Server API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Send messages, control rooms and synchronize conversation history, JSON objects over HTTP |
|
||||
| Versioning | URL based with version bumps on breaking changes (e.g. `/_matrix/client/v3`) |
|
||||
| Authentication | HTTP-Authorization header with Bearer token |
|
||||
| In openDesk provided by | Synapse |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | Used by Element (Chat Web-UI) |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | [Matrix](https://spec.matrix.org/latest/client-server-api/) |
|
||||
| Documentation | [Synapse](https://element-hq.github.io/synapse/latest/) is the reference implementation of the Matrix protocol, see standard for API details |
|
||||
|
||||
## Matrix Server-Server API
|
||||
|
||||
| Name | Matrix Server-Server API |
|
||||
| ------------------------------ |----------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Purpose | Communication between Matrix servers (also known as FederationAPIs) |
|
||||
| Versioning | URL based with version bumps on breaking changes (e.g. `/_matrix/federation/v2`) |
|
||||
| Authentication | HTTP-Authorization header with Bearer token |
|
||||
| In openDesk provided by | Synapse |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | Used when federation with other Matrix instances is enabled |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | [Matrix](https://spec.matrix.org/latest/client-server-api/) |
|
||||
| Documentation | [Synapse](https://element-hq.github.io/synapse/latest/) is the reference implementation of the Matrix protocol, see standard for API details |
|
||||
|
||||
## Matrix Push Gateway API
|
||||
|
||||
| Name | Matrix Push Gateway API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Distribute notifications from the homeserver to clients (push) |
|
||||
| Versioning | URL based with version bumps on breaking changes (e.g. `/_matrix/push/v2`) |
|
||||
| Authentication | |
|
||||
| In openDesk provided by | Synapse |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | Used by Element (Chat Web-UI) |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | [Matrix](https://spec.matrix.org/latest/push-gateway-api/) |
|
||||
| Documentation | [Synapse](https://element-hq.github.io/synapse/latest/) is the reference implementation of the Matrix protocol, see standard for API details |
|
||||
|
||||
## Matrix Identity Service API
|
||||
|
||||
| Name | Matrix Identity Service API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Validate, store, and answer questions about the identities of users |
|
||||
| Versioning | URL based with version bumps on breaking changes (e.g. `/_matrix/identity/v2`) |
|
||||
| Authentication | HTTP-Authorization header with Bearer token |
|
||||
| In openDesk provided by | Synapse |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | none |
|
||||
| Usage within openDesk | |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | [Matrix](https://spec.matrix.org/latest/identity-service-api/) |
|
||||
| Documentation | [Synapse](https://element-hq.github.io/synapse/latest/) is the reference implementation of the Matrix protocol, see standard for API details |
|
||||
|
||||
## Matrix React SDK Module API
|
||||
|
||||
| Name | Matrix React SDK Module API |
|
||||
| ------------------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | The module system in Element Web is a way to add or modify functionality of Element Web itself, bundled at compile time for the app. |
|
||||
| Versioning | [Releases in the Git repository](https://github.com/matrix-org/matrix-react-sdk-module-api/releases); [Dependency in `package.json` in Element (Chat Web-UI)](https://github.com/element-hq/element-web/blob/develop/package.json) |
|
||||
| Authentication | n/a - used as a library |
|
||||
| In openDesk provided by | Element (Chat Web-UI) |
|
||||
| Transport protocol | n/a - used as a library |
|
||||
| Usage within component | [Element (Chat-Web-UI) Modules](https://github.com/nordeck/element-web-modules/) |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | n/a - uses as a library |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | n/a - used as a library |
|
||||
| Supported standards | n/a - Element (Chat Web-UI) specific |
|
||||
| Documentation | [Element (Chat Web-UI) Documentation](https://github.com/element-hq/element-web/blob/develop/docs/modules.md); [matrix-react-sdk-module-api Git repository](https://github.com/matrix-org/matrix-react-sdk-module-api) |
|
||||
|
||||
## Matrix Widget API
|
||||
|
||||
| Name | Matrix Widget API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Matrix Widgets are HTML and Javascript content / applications that can be embedded within, and communicate with Matrix clients. |
|
||||
| Versioning | n/a |
|
||||
| Authentication | Widgets request capabilities. They must be confirmed by a user or by the [Widget Lifecycle Module](https://github.com/nordeck/element-web-modules/blob/main/packages/element-web-widget-lifecycle-module/README.md). |
|
||||
| In openDesk provided by | Element (Chat Web-UI) |
|
||||
| Transport protocol | [HTML window.postMessage API](https://developer.mozilla.org/en-US/docs/Web/API/Window/postMessage) |
|
||||
| Usage within component | [NeoDateFix](https://github.com/nordeck/matrix-meetings/), [NeoBoard](https://github.com/nordeck/matrix-neoboard), [NeoChoice](https://github.com/nordeck/matrix-poll) |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | [Matrix - MSC2764](https://github.com/matrix-org/matrix-spec-proposals/pull/2764) |
|
||||
| Documentation | [Matrix - MSC2764](https://github.com/matrix-org/matrix-spec-proposals/pull/2764) |
|
||||
|
||||
## NeoBoard Data Model API
|
||||
|
||||
| Name | NeoBoard Data Model API |
|
||||
| ------------------------------ | ------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | The NeoBoard data model can be used to generate whiteboard documents. |
|
||||
| Versioning | `version` field in the [NeoBoard data model](https://github.com/nordeck/matrix-neoboard/blob/main/docs/model/export-format.md#fields) |
|
||||
| Authentication | n/a |
|
||||
| In openDesk provided by | [NeoBoard](https://github.com/nordeck/matrix-neoboard) |
|
||||
| Transport protocol | n/a |
|
||||
| Usage within component | [NeoBoard](https://github.com/nordeck/matrix-neoboard) |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | n/a |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | n/a |
|
||||
| Documentation | [NeoBoard data model](https://github.com/nordeck/matrix-neoboard/tree/main/docs/model) |
|
||||
|
||||
## NeoDateFix REST API
|
||||
|
||||
| Name | NeoDateFix REST API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Can be used to query and set up NeoDateFix Matrix meetings. |
|
||||
| Versioning | Path segment in the [Meetings Bot API](https://github.com/nordeck/matrix-meetings/blob/main/docs/data-model.md#http-api) |
|
||||
| Authentication | n/a |
|
||||
| In openDesk provided by | [NeoDateFix](https://github.com/nordeck/matrix-meetings) |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | [NeoDateFix](https://github.com/nordeck/matrix-meetings) |
|
||||
| Usage within openDesk | Used by OX to sync calendar entries to NeoDateFix |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | n/a |
|
||||
| Message protocol | JSON |
|
||||
| Supported standards | n/a |
|
||||
| Documentation | [NeoDateFix ADR001](https://github.com/nordeck/matrix-meetings/blob/main/docs/adrs/adr001-use-the-widget-api-to-interact-with-the-meetings-bot.md) |
|
||||
|
||||
# Knowledge management - XWiki
|
||||
|
||||
The following are the APIs used by the Knowledge management application:
|
||||
|
||||
| Used by | Accessed component | Service | Purpose | Message format |
|
||||
| ------- | ------------------ | ------------------ | -------------------------------------------------- | -------------- |
|
||||
| Xwiki | Keycloak | Authentication | Single sign-on / sign-out | OIDC |
|
||||
| Xwiki | Nubus Portal | Central Navigation | Retrieve content for openDesk Navigation drop-down | JSON |
|
||||
| Xwiki | Nubus | LDAP | Read users and groups data | LDAP |
|
||||
|
||||
## REST API
|
||||
|
||||
| Name | REST API |
|
||||
| ------------------------------ |------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
||||
| Purpose | Perform low-level actions, e.g. interact with XWiki stored data |
|
||||
| Versioning | |
|
||||
| Authentication | Anonymous or username/password on each request (stateless) |
|
||||
| In openDesk provided by | XWiki |
|
||||
| Transport protocol | HTTP(S) |
|
||||
| Usage within component | |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | JSON/XML |
|
||||
| Supported standards | |
|
||||
| Documentation | - https://www.xwiki.org/xwiki/bin/view/Documentation/UserGuide/Features/XWikiRESTfulAPI<br>- https://github.com/xwiki/xwiki-platform/blob/master/xwiki-platform-core/xwiki-platform-rest/xwiki-platform-rest-model/src/main/resources/xwiki.rest.model.xsd |
|
||||
|
||||
## Scripting API
|
||||
|
||||
| Name | Scripting API |
|
||||
| ------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Feature-rich API to access any module, use any functionality, modify existing functionality; allows definition of new REST API endpoints - API scope is identical to Java API |
|
||||
| Versioning | |
|
||||
| Authentication | Performed in the context of an (authenticated) user or anonymously - permissions (scripting rights, programming rights) of that context apply |
|
||||
| In openDesk provided by | XWiki |
|
||||
| Transport protocol | |
|
||||
| Usage within component | |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | Not supported |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | |
|
||||
| Supported standards | |
|
||||
| Documentation | https://extensions.xwiki.org/xwiki/bin/view/Extension/Scripting%20Documentation%20Application |
|
||||
|
||||
## Java API
|
||||
|
||||
| Name | Java API |
|
||||
| ------------------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Feature-rich API to access any module, use any functionality, modify existing functionality; allows definition of new REST API endpoints - API scope is identical to Scripting API |
|
||||
| Versioning | |
|
||||
| Authentication | Performed in the context of an (authenticated) user or anonymously - but without the permission check (in contrast to the Scripting API) |
|
||||
| In openDesk provided by | XWiki |
|
||||
| Transport protocol | |
|
||||
| Usage within component | |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | |
|
||||
| Supported standards | |
|
||||
| Documentation | https://www.xwiki.org/xwiki/bin/view/Documentation/DevGuide/API/ |
|
||||
|
||||
## JavaScript API
|
||||
|
||||
| Name | JavaScript API |
|
||||
| ------------------------------ | -------------------------------------------------------------------------------------------- |
|
||||
| Purpose | Include dynamic components in XWiki/web pages |
|
||||
| Versioning | |
|
||||
| Authentication | Performed in the context of an (authenticated) user or anonymously |
|
||||
| In openDesk provided by | Jitsi |
|
||||
| Transport protocol | |
|
||||
| Usage within component | |
|
||||
| Usage within openDesk | none |
|
||||
| Usage for external integration | none |
|
||||
| Parallel access | Allowed |
|
||||
| Message protocol | |
|
||||
| Supported standards | |
|
||||
| Documentation | https://www.xwiki.org/xwiki/bin/view/Documentation/DevGuide/FrontendResources/JavaScriptAPI/ |
|
||||
BIN
docs/architecture/apis_images/Files-api.png
Normal file
|
After Width: | Height: | Size: 69 KiB |
BIN
docs/architecture/apis_images/Groupware-api-http-usage.png
Normal file
|
After Width: | Height: | Size: 10 KiB |
BIN
docs/architecture/apis_images/Groupware-api-usage.png
Normal file
|
After Width: | Height: | Size: 39 KiB |
BIN
docs/architecture/apis_images/Groupware-api.png
Normal file
|
After Width: | Height: | Size: 21 KiB |
|
After Width: | Height: | Size: 189 KiB |
|
After Width: | Height: | Size: 411 KiB |
BIN
docs/architecture/apis_images/IAM-ics-api-use.png
Normal file
|
After Width: | Height: | Size: 41 KiB |
|
After Width: | Height: | Size: 186 KiB |
BIN
docs/architecture/apis_images/IAM-overview.png
Normal file
|
After Width: | Height: | Size: 76 KiB |
|
After Width: | Height: | Size: 143 KiB |
260
docs/architecture/apis_images/IAM-ucr-architecture.svg
Normal file
|
After Width: | Height: | Size: 118 KiB |
BIN
docs/architecture/apis_images/IAM-ucr.png
Normal file
|
After Width: | Height: | Size: 18 KiB |
183
docs/architecture/apis_images/IAM-udm-architecture.svg
Normal file
|
After Width: | Height: | Size: 80 KiB |
BIN
docs/architecture/apis_images/IAM-udm.png
Normal file
|
After Width: | Height: | Size: 21 KiB |
BIN
docs/architecture/apis_images/IAM-umc-architecture.png
Normal file
|
After Width: | Height: | Size: 14 KiB |
276
docs/baseline-requirements.md
Normal file
@@ -0,0 +1,276 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Baseline Requirements</h1>
|
||||
|
||||
* [Preamble / Scope](#preamble--scope)
|
||||
* [Software bill of materials (SBOMs)](#software-bill-of-materials-sboms)
|
||||
* [Artifact SBOMs](#artifact-sboms)
|
||||
* [Source code SBOMs](#source-code-sboms)
|
||||
* [License compliance](#license-compliance)
|
||||
* [Software supply chain security](#software-supply-chain-security)
|
||||
* [Container architectural basics](#container-architectural-basics)
|
||||
* [Security](#security)
|
||||
* [IT-Grundschutz](#it-grundschutz)
|
||||
* [Accessibility](#accessibility)
|
||||
* [Data protection](#data-protection)
|
||||
* [Functionality and features](#functionality-and-features)
|
||||
* [Non-overlapping](#non-overlapping)
|
||||
* [User lifecycle](#user-lifecycle)
|
||||
* [Pull: LDAP](#pull-ldap)
|
||||
* [Push: Provisioning](#push-provisioning)
|
||||
* [Authentication](#authentication)
|
||||
* [Top bar](#top-bar)
|
||||
* [Look and feel](#look-and-feel)
|
||||
* [Central navigation](#central-navigation)
|
||||
* [Functional administration](#functional-administration)
|
||||
* [Theming](#theming)
|
||||
* [Central user profile](#central-user-profile)
|
||||
* [Footnotes](#footnotes)
|
||||
|
||||
# Preamble / Scope
|
||||
|
||||
This document lays out the requirements for open-source products that should become part of openDesk.
|
||||
|
||||
As this is a comprehensive set of requirements most new components will not adhere to all of them.
|
||||
|
||||
This document can be used to assess the status and possible gaps for a component which might itself be the basis for a decision if a component should be integrated into openDesk by working on closing the identified gaps.
|
||||
|
||||
> **Note**<br>
|
||||
> Even an already integrated application might not adhere to all aspects of the documented requirements yet.
|
||||
> Closing the gaps for existing applications therefore is an openDesk priority.
|
||||
|
||||
# Software bill of materials (SBOMs)
|
||||
|
||||
openDesk is looking into options for in-depth SBOM creation first for container images and later for source code. It is still expected by the suppliers to provide artifact and source code SBOMs in a standardized manner, ideally in the openCode preferred [SPDX 2.2.1](https://spdx.org/rdf/ontology/spdx-2-2-1/) format.
|
||||
|
||||
**Reference:** https://gitlab.opencode.de/bmi/opendesk/deployment/SBOM/-/tree/main/sboms/0.5.74
|
||||
|
||||
## Artifact SBOMs
|
||||
|
||||
There are various free tools like [syft](https://github.com/anchore/syft) available to generate SBOMs for container images. It is expected that this kind of artifact SBOMs is provided (and signed) for all containers delivered to be integrated into openDesk.
|
||||
|
||||
**Reference:** As part of [openDesk's standard CI](https://gitlab.opencode.de/bmi/opendesk/tooling/gitlab-config) a container image SBOM is derived from the container's content and gets signed. Both artifacts (SBOM and signature) are placed next to the image in the related registry ([e.g.](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/semantic-release/container_registry/827)).
|
||||
|
||||
## Source code SBOMs
|
||||
|
||||
Today's software development platforms like GitLab or GitHub provide dependency list/graph features that are the basis for your source code SBOMs. These features are usually based on analysis of language-specific package manager dependency definition files. As part of a supplier's software development process, it is expected that source code SBOMs are at least created on the level of the already defined software dependencies within the source code tree of the component.
|
||||
|
||||
**Reference:** Currently we do not have source code SBOMs in place.
|
||||
|
||||
# License compliance
|
||||
|
||||
All parts of openDesk Community Edition must be open source with source code (also) published or at least publishable on openCode.
|
||||
|
||||
openCode provides some boundaries when it comes to open source license compliance openDesk has to adhere to:
|
||||
|
||||
- The components must be published under a license listed in the [openCode license allow list](https://opencode.de/de/wissen/rechtssichere-nutzung/open-source-lizenzen).
|
||||
- Delivered artifacts (container images) must contain only components licensed under the aforementioned allow list. A container must not contain any artifact using a license from the [openCode license block list](https://opencode.de/de/wissen/rechtssichere-nutzung/open-source-lizenzen#3.-Negativliste-aller-nicht-freigegebenen-Lizenzen).
|
||||
|
||||
Deviations from the above requirements must be documented in the openDesk license deviation report.
|
||||
|
||||
**Reference:** https://gitlab.opencode.de/bmi/opendesk/deployment/SBOM/-/blob/main/sboms/openDesk%20Deviation%20Report-0.5.74.md
|
||||
|
||||
# Software supply chain security
|
||||
|
||||
ZenDiS plans to provide secured key storage as a service on openCode.
|
||||
|
||||
openDesk is going to implement [SLSA v1.0](https://slsa.dev/spec/v1.0/).
|
||||
|
||||
The minimum requirement for all of openDesk's functional components is that all component artifacts (i.e. container images, Helm charts) are signed and their signature can be verified based on the ZenDiS-provided secure key store.
|
||||
|
||||
**Reference:** The [openDesk standard CI](https://gitlab.opencode.de/bmi/opendesk/tooling/gitlab-config) ensures that each container image being built and each Helm chart being released is signed. In the case of container images, the related SBOMs are signed as well.
|
||||
|
||||
# Container architectural basics
|
||||
|
||||
Note: openDesk is operated as a Kubernetes (K8s) workload.
|
||||
|
||||
openDesk applications should adhere to best practices for K8s application/container design. While there are dozens of documents about these best practices please use them as references:
|
||||
- https://cloud.google.com/architecture/best-practices-for-building-containers
|
||||
- https://cloud.google.com/architecture/best-practices-for-operating-containers
|
||||
|
||||
As some applications were initially created years before K8s was introduced they naturally might take different approaches.
|
||||
|
||||
You will find below some of the most common best practice requirements, some of which are auto-tested as part of the openDesk deployment automation:
|
||||
|
||||
- Containers come with readiness and liveness probes.
|
||||
- Containers are stateless and immutable (read-only root file system), state should be placed into a database (or similar).
|
||||
- Allow horizontal scaling (auto-scaling is of course nice to have).
|
||||
- Provide resource requests and limits (we do not want to limit CPU though).
|
||||
- Provide application-specific monitoring endpoints and expose the health of the application.
|
||||
- Write your logs to STDOUT/STDERR and ideally provide JSON-based logs.
|
||||
- Use one service per container (microservice pattern).
|
||||
- Minimize the footprint of your container e.g. removing unnecessary tools, ideally providing a distroless container.
|
||||
- Allow restrictive setting of the security contexts (see [security-context.md](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/main/docs/security-context.md) for reference).
|
||||
- Support for external secrets.
|
||||
- Support for externally provided/self-signed certificates.
|
||||
|
||||
**Reference:** Some of these requirements are tested and/or documented within the deployment automation:
|
||||
- CI executed Kyverno tests: https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/tree/main/.kyverno/policies
|
||||
- Generated documentation regarding security contexts: https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/main/docs/security-context.md
|
||||
|
||||
# Security
|
||||
|
||||
openDesk should be compliant with the "Deutsche Verwaltungscloud Strategie" (DVS). While this is a moving target it references some already established standards like the BSI's [IT-Grundschutz](https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Standards-und-Zertifizierung/IT-Grundschutz/IT-Grundschutz-Kompendium/it-grundschutz-kompendium_node.html) and [C5](https://www.bsi.bund.de/DE/Themen/Unternehmen-und-Organisationen/Informationen-und-Empfehlungen/Empfehlungen-nach-Angriffszielen/Cloud-Computing/Kriterienkatalog-C5/C5_AktuelleVersion/C5_AktuelleVersion_node.html). These standards address hundreds of requirements which are published at the given links. So here's just a summary to understand the approach of the broadest requirements from IT-Grundschutz.
|
||||
|
||||
**Reference:** [Deutsche Verwaltungscloud-Strategie – Rahmenwerk der Zielarchitektur](https://www.cio.bund.de/SharedDocs/downloads/Webs/CIO/DE/cio-bund/steuerung-it-bund/beschluesse_cio-board/2023_11_Beschluss_CIO_Board_DVS_Rahmenwerk_Anlage.pdf)
|
||||
|
||||
## IT-Grundschutz
|
||||
|
||||
The IT-Grundschutz catalog knowns a lot of modules ("Bausteine"), but not all of them apply to all components, as there are some related to hardware or some just relevant for the operator while openDesk is "just" the software platform. The first step for an IT-Grundschutz evaluation of a component (or the platform as a whole) requires defining which modules are applicable. Other modules apply to all components e.g. [APP.4.4 Kubernetes](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/IT-GS-Kompendium_Einzel_PDFs_2023/06_APP_Anwendungen/APP_4_4_Kubernetes_Edition_2023.pdf), [SYS.1.6 Containerisierung](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/IT-GS-Kompendium_Einzel_PDFs_2023/07_SYS_IT_Systeme/SYS_1_6_Containerisierung_Edition_2023.pdf) and [CON.2 Datenschutz](https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Grundschutz/IT-GS-Kompendium_Einzel_PDFs_2023/03_CON_Konzepte_und_Vorgehensweisen/CON_2_Datenschutz_Edition_2023.pdf).
|
||||
|
||||
Within each module are multiple requirements ("Anforderungen") that are usually composed of multiple partial requirements ("Teilanforderungen"). Each requirement has a given category:
|
||||
- B for basic ("Basis") - the requirement must be fulfilled.
|
||||
- S for standard ("Standard") - the requirement should also be fulfilled, if not there must be a good reason why it is not the case that does not tamper the security of the overall system. There is only a defined amount of deviations allowed for standard requirements.
|
||||
- H for high ("Hoch") - in certain scenarios you have extended security requirements, in that case, the high requirements must be fulfilled. openDesk is working towards making that possible.
|
||||
|
||||
Different requirements address different roles in IT-Grundschutz.
|
||||
|
||||
- Supplier: processes & product (component -> e.g. Open-Xchange, OpenProject)
|
||||
- Provider: processes & product (platform -> openDesk)
|
||||
- Operator: processes & product (service)
|
||||
- Customer: processes.
|
||||
|
||||
As a supplier of an openDesk component, you will focus on the "Supplier" requirements, while the outcome (your product) must enable the Provider to fulfill the requirements that lay with its responsibility for the openDesk platform. Operators use openDesk to provide a service, therefore the openDesk platform must enable an Operator to fulfill the related requirements. Finally, the service must enable the customer to align with the scope of the IT-Grundschutz catalog. So it will happen that a requirement from e.g. the customer level needs a specific capability by the product (Supplier's responsibility), a defined core configuration from the platform (Provider's responsibility), or a certain service setup from the Operator.
|
||||
|
||||
We are aware that IT-Grundschutz is a complex topic and are working towards a streamlined process to reduce overhead as much as possible and ensure to maximize the use of synergies.
|
||||
|
||||
**Reference:** https://gitlab.opencode.de/bmi/opendesk/documentation/it-grundschutz
|
||||
|
||||
# Accessibility
|
||||
|
||||
Accessibility is a key requirement for software that is being used in the public sector. Therefore the products of the suppliers are expected to adhere to the relevant standards.
|
||||
|
||||
Please find more context about the topic on the [website of the German CIO](https://www.cio.bund.de/Webs/CIO/DE/digitaler-wandel/it-barrierefreiheit/vorgaben-und-richtlinien/vorgaben-und-richtlinien-node.html) followed by a more detailed look at the actual accessibility standard [WCAG 2.1](https://www.barrierefreiheit-dienstekonsolidierung.bund.de/Webs/PB/DE/gesetze-und-richtlinien/wcag/wcag-artikel.html).
|
||||
|
||||
Each vendor must provide a certificate that their product - or the parts of the product relevant for openDesk - complies with at least WCAG 2.1 AA or [BITV 2.0](https://www.bundesfachstelle-barrierefreiheit.de/DE/Fachwissen/Informationstechnik/EU-Webseitenrichtlinie/BGG-und-BITV-2-0/Die-neue-BITV-2-0/die-neue-bitv-2-0_node.html). As the certification and related product improvements are time-consuming the focus of openDesk is that a supplier provides a plan and certification partner (contract) that shows the supplier is working towards the certification. While the aforementioned standard states the priority is the "A" level requirements, the "AA" level must be met at the end of the process.
|
||||
|
||||
> **Note**<br>
|
||||
> Please keep in mind that WCAG 2.2 and 3.0 are work in progress. If you already work on accessibility improvements you might want to take these standards already into consideration.
|
||||
|
||||
**Reference:** In the past the [accessibility evaluations](https://gitlab.opencode.de/bmi/opendesk/info/-/tree/main/24.03/Barrierefreiheit) have been executed by Dataport. But they do not do certifications.
|
||||
|
||||
# Data protection
|
||||
|
||||
Each component must be able to operate according to the [EU's General Data Protection Regulation (GDPR)](https://gdpr.eu/). This requires some key messages to be answered when it comes to personal data[^1]:
|
||||
|
||||
- Who are the affected data subjects?
|
||||
- What personal data (attributes) from the subjects is being processed?
|
||||
- Who is the controller and processor of the subject's data?
|
||||
- Which processing activities involve which data attributes?
|
||||
- How can the data be deleted?
|
||||
- Are personal data-related activities traceable?
|
||||
- How can data be provided uniformly to affected people?
|
||||
- What does a data privacy-friendly configuration look like?
|
||||
|
||||
While this can be answered by each component that will be in the spotlight for the suppliers, we also need an aligned overall picture for openDesk that at least has the platform-specific user lifecycle and cross-application interfaces in focus.
|
||||
|
||||
Note: The topics of availability, integrity, and confidentiality of personal data are also being addressed by the IT-Grundschutz module "CON.2". It has to be ensured that it is not in contradiction to what is being done in the general area of data protection.
|
||||
|
||||
**Reference:** https://gitlab.opencode.de/bmi/opendesk/documentation/datenschutz
|
||||
|
||||
# Functionality and features
|
||||
|
||||
## Non-overlapping
|
||||
|
||||
To avoid having functionality twice in openDesk it might be required to disable certain functionality within a component. There needs to be an assessment for each new component if it has overlapping functionality and how to deal with that.
|
||||
|
||||
**Reference:** The contact management from Nextcloud is done in OX, so Nextcloud has its internal contact management disabled, as well as most of the Nextcloud Talk functionality, due to the presence of Element and Jitsi.
|
||||
|
||||
## User lifecycle
|
||||
|
||||
With a central Identity- and Access Management (IAM) also the user lifecycle (ULC) that addresses account create-update-delete actions with support for "inactive" accounts must be harmonized within the platform.
|
||||
|
||||
The focus is to have all the account information in all applications including the account's state, profile picture ([reference](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/issues/27)) and - where required - the user's group memberships. This cannot be done purely by pushing that data through OIDC claims when a user logs in to an application therefore two ways of managing an account are applicable and described in the following subchapters.
|
||||
|
||||
> **Note**<br>
|
||||
> Allowing ad hoc updates of account data through OIDC claims during login is still encouraged.
|
||||
|
||||
### Pull: LDAP
|
||||
|
||||
Applications can access the IAM's LDAP to access all data necessary for managing their part of the ULC.
|
||||
|
||||
**Reference:** Most applications use LDAP access as per https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/main/docs/components.md?ref_type=heads#identity-data-flows
|
||||
|
||||
> **Note**<br>
|
||||
> The direct access to LDAP is going to be deprecated for most use cases. openDesk is looking into active provisioning of the user/group data into the applications using [SCIM](https://scim.cloud/).
|
||||
|
||||
### Push: Provisioning
|
||||
|
||||
Some applications require active provisioning of the centrally maintained IAM data. As the actual provisioning is part of the openDesk provisioning framework it is necessary to define the ULC flow regarding its different states to get a matching provisioning connector implemented. This is done collaboratively between the supplier and openDesk product management.
|
||||
|
||||
**Reference:** New applications will make use of the [provisioning framework](https://gitlab.opencode.de/bmi/opendesk/component-code/crossfunctional/univention/ums-provisioning-api). At the moment to only active (push) provisioned component is OX AppSuite fed by the [OX-connector](https://github.com/univention/ox-connector/tree/ucs5.0).
|
||||
|
||||
## Authentication
|
||||
|
||||
The central IdP ensures the single sign-on and logout workflows. As standard openDesk uses [Open ID Connect](https://openid.net/). It can be configured to provide additional user information from the IAM when required by a component.
|
||||
|
||||
Minimum requirements regarding the OIDC support in an application besides the actual login flow:
|
||||
|
||||
- Back-channel logout: [OIDC Back-Channel Logout](https://openid.net/specs/openid-connect-backchannel-1_0.html) must be supported by the components unless there is a significant reason why it technically cannot be supported, in that case [OIDC Front-Channel Logout](https://openid.net/specs/openid-connect-frontchannel-1_0.html) is the alternative.
|
||||
- IdP Session Refresh: Ensure that your application regularly checks the IdP session for its validity and invalidates the local session when there is no longer an IdP session.
|
||||
|
||||
**Reference:** Most applications are directly connected to the IdP and are using OIDC: https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/main/docs/architecture.md#identity-data-flows
|
||||
|
||||
## Top bar
|
||||
|
||||
The top bar of all applications should provide a common UX.
|
||||
|
||||
### Look and feel
|
||||
|
||||
The current status is subject to review, but the basics will most likely stay the same. Ensure that the top bar can be customized (or adheres to a given openDesk standard) in various settings:
|
||||
|
||||
- Size (height) of the bar.
|
||||
- Foreground and -background colors, including hover/active.
|
||||
- Size and color of the bar's bottom line.
|
||||
- Logo position, size, and link including the link's target.
|
||||
- Icon position and size of the central navigation.
|
||||
- Ideally have the user's menu on the right-hand side of the top bar using the user's profile picture.
|
||||
- Have the search option/bar as the leftmost option in the right content section of the top bar or even allow the search bar to be rendered in the center of the top bar.
|
||||
|
||||
**Reference:** This is available in current deployments, see e.g. Nextcloud, Open-Xchange, and XWiki.
|
||||
|
||||
### Central navigation
|
||||
|
||||
From the top bar, the user can access the central navigation. A menu that gets its contents from the portal, rending the categories and (sub-)applications available to the logged-in user.
|
||||
|
||||
When implementing the central navigation into an application there are two options to access the user's data from the portal:
|
||||
|
||||
- Frontend-based: Issuing an IFrame-based silent login against the intercom service (ICS) to get a session with the ICS, followed by a request for the JSON containing the user's central navigation contents through the ICS.
|
||||
- Backend-based: Requesting the JSON using a backend call to the portal providing the user's name and a shared secret.
|
||||
|
||||
**Reference:** This is available in current deployments in all applications except for Jitsi, Collabora, and CryptPad.
|
||||
|
||||
## Functional administration
|
||||
|
||||
While applications usually support technical and functional administration the technical part should be in the responsibility of the operator and is usually done at (re)deployment time. Therefore the administrative tasks within an application should be limited to functional administration.
|
||||
|
||||
Example for "technical administration":
|
||||
- Configuring the SMTP relay for an application to send out emails.
|
||||
|
||||
Example of "functional administration":
|
||||
- Creating and maintaining users and groups.
|
||||
|
||||
**Reference:** OpenProject took the approach that all settings pre-defined in the deployment are still rendered in the admin section of OpenProject, but can not be changed.
|
||||
|
||||
## Theming
|
||||
|
||||
Theming should be controlled with the deployment and affect all components that support branding options.
|
||||
|
||||
**Reference:** https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/issues/27
|
||||
|
||||
## Central user profile
|
||||
|
||||
The user profile is maintained centrally, therefore the applications should make use of that central data and not allow local editing of the data within the application except for data that is required by the application and cannot be provided by the central IAM.
|
||||
|
||||
The data can still be rendered but must not be tampered with in any way within an openDesk application outside of the IAM, as it would either cause inconsistent data within the platform or the changed data being overwritten, which is at least unexpected by the user.
|
||||
|
||||
The user's preferred language and theme (light/dark) are also selected in the IAM's portal and the setting should be respected in all applications.
|
||||
|
||||
**Reference:** No reference yet.
|
||||
|
||||
# Footnotes
|
||||
|
||||
^1: For definitions see [GDPR Article 4](https://gdpr.eu/article-4-definitions/).
|
||||
43
docs/ci.md
@@ -1,43 +0,0 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
<h1>CI/CD</h1>
|
||||
|
||||
This page will cover openDesk automation via Gitlab CI.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Deployment](#deployment)
|
||||
* [Tests](#tests)
|
||||
<!-- TOC -->
|
||||
|
||||
## Deployment
|
||||
|
||||
The project includes a `.gitlab-ci.yml` that allows you to execute the deployment from a Gitlab instance of your choice.
|
||||
|
||||
|
||||
When starting the pipeline through the Gitlab UI, you will be queried for some variables plus the following ones:
|
||||
|
||||
- `DOMAIN` = The domain to deploy to.
|
||||
- `ISTIO_DOMAIN` = istio.`DOMAIN`
|
||||
- `NAMESPACE`: Defines into which namespace of your K8s cluster the SWP will be installed
|
||||
- `MASTER_PASSWORD_WEB_VAR`: Overwrites value of `MASTER_PASSWORD`
|
||||
|
||||
Based on your input, the following variables will be set:
|
||||
- `MASTER_PASSWORD` = `MASTER_PASSWORD_WEB_VAR`. If `MASTER_PASSWORD_WEB_VAR`
|
||||
is not set, the default for `MASTER_PASSWORD` will be used, unless you set
|
||||
`MASTER_PASSWORD` as a masked CI/CD variable in Gitlab to supersede the default.
|
||||
|
||||
You might want to set credential variables in the Gitlab project at `Settings` > `CI/CD` > `Variables`.
|
||||
|
||||
|
||||
## Tests
|
||||
|
||||
The gitlab-ci pipeline contains a job named `run-tests` that can trigger a test suite pipeline on another gitlab project.
|
||||
The `DEPLOY_`-variables are used to determine which components should be tested.
|
||||
In order for the trigger to work, the variable `TESTS_PROJECT_URL` has to be set on this gitlab project's CI variables
|
||||
that can be found at `Settings` -> `CI/CD` -> `Variables`. The variable should have this format:
|
||||
`<domain of gitlab>/api/v4/projects/<id>`.
|
||||
|
||||
If the branch of the test pipeline is not `main` this can be set with the .gitlab-ci.yml variable
|
||||
`TESTS_BRANCH` while creating a new pipeline.
|
||||
@@ -1,178 +0,0 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
<h1>Components</h1>
|
||||
|
||||
This section covers the internal system requirements as well as external service requirements for productive use.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Overview](#overview)
|
||||
* [Component integration](#component-integration)
|
||||
* [Intercom Service (ICS)](#intercom-service-ics)
|
||||
* [Filepicker](#filepicker)
|
||||
* [Central Navigation](#central-navigation)
|
||||
* [(Read & write) Central contacts](#read--write-central-contacts)
|
||||
* [OpenProject Filestore](#openproject-filestore)
|
||||
* [Identity data flows](#identity-data-flows)
|
||||
* [Provisioning](#provisioning)
|
||||
* [Component specific documentation](#component-specific-documentation)
|
||||
* [Links to component docs](#links-to-component-docs)
|
||||
<!-- TOC -->
|
||||
|
||||
## Overview
|
||||
|
||||
openDesk consists out of a variety of open-source projects. Here is a list with the description and type.
|
||||
|
||||
Components of type `Eval` are used for development and evaluation purposes only,
|
||||
they need to be replaced in production deployments.
|
||||
|
||||
| Component | Description | Type |
|
||||
|-----------------------------|--------------------------------|------------|
|
||||
| Certificates | TLS certificates | Eval |
|
||||
| ClamAV (Distributed) | Antivirus engine | Eval |
|
||||
| ClamAV (Simple) | Antivirus engine | Eval |
|
||||
| Collabora | Weboffice | Functional |
|
||||
| CryptPad | Weboffice | Functional |
|
||||
| Dovecot | Mail backend | Functional |
|
||||
| Element | Secure communications platform | Functional |
|
||||
| Intercom Service | Cross service data exchange | Functional |
|
||||
| Jitsi | Videoconferencing | Functional |
|
||||
| Keycloak | Identity Provider | Functional |
|
||||
| MariaDB | Database | Eval |
|
||||
| Memcached | Cache Database | Eval |
|
||||
| MinIO | Object Storage | Eval |
|
||||
| Nextcloud | File share | Functional |
|
||||
| OpenProject | Project management | Functional |
|
||||
| OX Appsuite | Groupware | Functional |
|
||||
| Provisioning | Backend provisioning | Functional |
|
||||
| Postfix | MTA | Eval |
|
||||
| PostgreSQL | Database | Eval |
|
||||
| Redis | Cache Database | Eval |
|
||||
| Univention Corporate Server | Identity Management & Portal | Functional |
|
||||
| Univention Management Stack | Identity Management & Portal | Eval |
|
||||
| XWiki | Knowledgebase | Functional |
|
||||
|
||||
## Component integration
|
||||
|
||||
Some use cases require inter component integration.
|
||||
|
||||
```mermaid
|
||||
flowchart TD
|
||||
OXAppSuiteFrontend-->|SilentLogin, Filepicker, CentralNavigation|IntercomService
|
||||
IntercomService-->|SilentLogin, TokenExchange|Keycloak
|
||||
IntercomService-->|Filepicker|Nextcloud
|
||||
IntercomService-->|CentralNavigation|Portal
|
||||
OXAppSuiteBackend-->|Filepicker|Nextcloud
|
||||
Nextcloud-->|CentralNavigation|Portal
|
||||
OpenProject-->|CentralNavigation|Portal
|
||||
XWiki-->|CentralNavigation|Portal
|
||||
Nextcloud-->|CentralContacts|OXAppSuiteBackend
|
||||
OXAppSuiteFrontend-->|Filepicker|OXAppSuiteBackend
|
||||
```
|
||||
|
||||
### Intercom Service (ICS)
|
||||
|
||||
The UCS Intercom Service's role is to enable cross-application integration based on browser interaction.
|
||||
Handling authentication when the frontend of an application is using the API from another application is often a
|
||||
challenge.
|
||||
For more details on the ICS please refer to its own [doc](./components/intercom-service.md).
|
||||
|
||||
To establish a session with the Intercom Service, the application that wants to use the ICS must initiate a silent
|
||||
login.
|
||||
|
||||
Currently only OX AppSuite is using the frontend-based integration, and therefore it is right now the only consumer of
|
||||
the ICS API.
|
||||
|
||||
### Filepicker
|
||||
|
||||
The Nextcloud filepicker which is integrated into the OX AppSuite allows you to add attachments or links to files from
|
||||
and saving attachments to Nextcloud.
|
||||
|
||||
The filepicker is using frontend and backend based integration.
|
||||
Frontend-based integration means that OX AppSuite in the browser is communicating with ICS.
|
||||
While using backend-based integration, OX AppSuite middleware is communicating with Nextcloud, which is especially used
|
||||
when adding a file to an email or storing a file into Nextcloud.
|
||||
|
||||
### Central Navigation
|
||||
|
||||
Central navigation is based on an API endpoint in the portal that provides the contents of the portal for a user to
|
||||
allow components to render the menu showing all available SWP applications for the user.
|
||||
|
||||
### (Read & write) Central contacts
|
||||
|
||||
Open-Xchange App Suite is used to manage contacts within openDesk. There is an API in the AppSuite that is being used by
|
||||
Nextcloud to lookup contacts as well as to create contacts. This is maybe done when a file is shared with a not yet
|
||||
available personal contact.
|
||||
|
||||
### OpenProject Filestore
|
||||
|
||||
By default, Nextcloud is a configured option for storing attachments in OpenProject.
|
||||
The Filestore can be enabled on a per-project level in OpenProject's project admin section.
|
||||
|
||||
|
||||
## Identity data flows
|
||||
|
||||
An overview of
|
||||
- components that consume the LDAP service. Mostly by using a dedicated LDAP search account.
|
||||
- components using Keycloak as identity provider. If not otherwise denoted based on the OAuth2 / OIDC flows.
|
||||
|
||||
Some components trust others to handle authentication for them.
|
||||
|
||||
```mermaid
|
||||
flowchart TD
|
||||
K[Keycloak]-->L[LDAP]
|
||||
N[Nextcloud]-->L
|
||||
O[OpenProject] --> L
|
||||
A[OX AppSuite]-->L
|
||||
D[OX Dovecot]-->L
|
||||
P[Portal/Admin]-->L
|
||||
X[XWiki]-->|in 2023|L
|
||||
A-->K
|
||||
N-->K
|
||||
D-->K
|
||||
O-->K
|
||||
X-->K
|
||||
P-->|SAML|K
|
||||
E[Element]-->K
|
||||
J[Jitsi]-->K
|
||||
I[IntercomService]-->K
|
||||
C[Collabora]-->N
|
||||
R[CryptPad]-->N
|
||||
F[Postfix]-->D
|
||||
```
|
||||
|
||||
## Provisioning
|
||||
|
||||
Currently, active provisioning is only done for OX AppSuite. The OX-Connector is synchronizing, creating, modifying and
|
||||
deleting activities for the following objects to the OX AppSuite using the AppSuite's SOAP API:
|
||||
|
||||
- Contexts
|
||||
- Users
|
||||
- Groups
|
||||
- Functional Mailboxes
|
||||
- Resources
|
||||
|
||||
## Component specific documentation
|
||||
|
||||
We want to provide more information per component in separate, component-specific markdown file.
|
||||
To establish a common view on the components, we are going to cover various aspects:
|
||||
|
||||
- **Component overview**: Shall provide a quick introduction including the components prerequisites and subcomponents (f.e. pods).
|
||||
- **Resources**: Will contain a link to the component upstream documentation, the helm chart and image locations.
|
||||
- **Operational Capabilities**
|
||||
- **Install**: The components install within the SWP.
|
||||
- **Restart**: Deleting and restarting pods works seamlessly.
|
||||
- **Update**: Redeploying the component with a different configuration works as expected. The component makes use of the updates configuration afterwards.
|
||||
- **Upgrade**: Component allows upgrading existing deployments with more current versions of itself.
|
||||
- **Secrets**: The component uses K8s secrets.
|
||||
- **Logging**: Only logging to STDOUT, no logs inside the container.
|
||||
- **Monitoring**: Application provides based on kube-prometheus-stack CRD: ServiceMonitor and PrometheusRule. Optional: Grafana Dashboard.
|
||||
- **Scale**: If supported (as we use community products) the component should be manually scalable. Optional: Autoscaling.
|
||||
- **Network policies**: Deny by default, allow application related traffic.
|
||||
- **Uninstall**: Documented and working complete uninstallation of the component.
|
||||
- **Debugging**: Some helpful information when it comes to debugging a component, e.g. setting log level.
|
||||
|
||||
## Links to component docs
|
||||
|
||||
- [Intercom-Service](./components/intercom-service.md)
|
||||
@@ -1,43 +0,0 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
**Content / Quick navigation**
|
||||
|
||||
[[_TOC_]]
|
||||
|
||||
# Component overview
|
||||
|
||||
The Intercom Service (ICS) is used to address integrational use cases where the frontend of one application has to call APIs from another application.
|
||||
|
||||
# Resources
|
||||
|
||||
- External documentation: https://docs.software-univention.de/intercom-service/latest/index.html
|
||||
- Helm chart: https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/components/charts/sovereign-workplace-intercom-service
|
||||
- Image: not yet published on Open CoDE, image will be provided through external artifactory.
|
||||
|
||||
# Operational Capabilities
|
||||
|
||||
## Install
|
||||
|
||||
## Restart
|
||||
|
||||
## Update
|
||||
|
||||
## Upgrade
|
||||
|
||||
## Secrets
|
||||
|
||||
## Logging
|
||||
|
||||
## Monitoring
|
||||
|
||||
## Scale
|
||||
|
||||
## Network policies
|
||||
|
||||
## Uninstall
|
||||
|
||||
# Debugging
|
||||
|
||||
ICS does not have a debug level option yet. But please refer to the most current documentation of the component. You just want to look into the standard log output of the component.
|
||||
123
docs/data-storage.md
Normal file
@@ -0,0 +1,123 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Application Data Storages</h1>
|
||||
|
||||
To provide a feasible backup and restore concept, a thorough overview of all openDesk
|
||||
applications and their related data storages (ephemeral & persistent) is provided in the
|
||||
following subsection.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Overview](#overview)
|
||||
* [Details](#details)
|
||||
<!-- TOC -->
|
||||
|
||||
# Overview
|
||||
|
||||
The provided diagram shows all relevant openDesk applications on the left and
|
||||
their utilized data storages on the right. For more detailed information about each
|
||||
application refer to the table in [Details](#details).
|
||||
|
||||
```mermaid
|
||||
---
|
||||
config:
|
||||
sankey:
|
||||
showValues: false
|
||||
linkColor: target
|
||||
---
|
||||
sankey-beta
|
||||
|
||||
ClamAV,PersistentVolume,1
|
||||
|
||||
Dovecot,PersistentVolume,1
|
||||
|
||||
Element/Synapse,PostgreSQL,1
|
||||
Element/Synapse,PersistentVolume,1
|
||||
|
||||
Intercom-Service,Redis,1
|
||||
|
||||
Jitsi,PersistentVolume,1
|
||||
|
||||
Nextcloud,PostgreSQL,1
|
||||
Nextcloud,S3,1
|
||||
Nextcloud,Redis,1
|
||||
|
||||
Nubus,PostgreSQL,1
|
||||
Nubus,S3,1
|
||||
Nubus,PersistentVolume,1
|
||||
Nubus,Memcached,1
|
||||
|
||||
OpenProject,PostgreSQL,1
|
||||
OpenProject,S3,1
|
||||
OpenProject,PersistentVolume,1
|
||||
OpenProject,Memcached,1
|
||||
|
||||
Open-Xchange,MariaDB,1
|
||||
Open-Xchange,PersistentVolume,1
|
||||
Open-Xchange,Redis,1
|
||||
|
||||
Postfix,PersistentVolume,1
|
||||
|
||||
XWiki,PostgreSQL,1
|
||||
XWiki,PersistentVolume,1
|
||||
```
|
||||
|
||||
# Details
|
||||
|
||||
| Application | Data Storage | Backup | Content | (Default) Identifier | Details |
|
||||
|----------------------|--------------|----------|-----------------------------------------------------------------------------------|------------------------------------------------|-----------------------------------------------------------------------------------------------------------|
|
||||
| **ClamAV** | PVC | No | ClamAV Database | `clamav-database-clamav-simple-0` | `/var/lib/clamav` |
|
||||
| **Dovecot** | PVC | Yes | openDesk CE only: User mail directories | `dovecot` | `/srv/mail` |
|
||||
| | S3 | Yes | openDesk EE only: User mail | `dovecot` | `dovecot` |
|
||||
| | Cassandra | Yes | openDesk EE only: Metadata and ACLs | `dovecot_dictmap`, `dovecot_acl` |
|
||||
| **Element/Synapse** | PostgreSQL | Yes | Application's main database | `matrix` | |
|
||||
| | PVC | Yes | Attachments | `media-opendesk-synapse-0` | `/media` |
|
||||
| | | Yes | Sync and state data | `matrix-neodatefix-bot` | `/app/storage` |
|
||||
| **Intercom-Service** | Redis | No | Shared session data | | |
|
||||
| **Jitsi** | PVC | Optional | Meeting recordings (feature not enabled in openDesk) | `prosody-data-jitsi-prosody-0` | `/config/data` |
|
||||
| **Nextcloud** | PostgreSQL | Yes | Application's main database Meta-Data | `nextcloud` | |
|
||||
| | S3 | Yes | The Nextcloud managed user files | `nextcloud` | |
|
||||
| | Redis | No | Distributed caching, as well as transactional file locking | | |
|
||||
| **Nubus** | PostgreSQL | Yes | Main database for Nubus' IdP Keycloak | `keycloak` | |
|
||||
| | | Yes | Login actions and device-fingerprints | `keycloak_extensions` | |
|
||||
| | | Optional | Store of the temporary password reset token | `selfservice` | |
|
||||
| | | No | Notification features are not used in openDesk 1.1 | `notificationsapi` | |
|
||||
| | | No | Guardian features are currently not used in openDesk 1.1 | `guardianmanagementapi` | |
|
||||
| | S3 | No | Static files for Portal | `ums` | |
|
||||
| | PVC | Yes | openLDAP database (primary R/W Pods), when restore select the one from the leader | `shared-data-ums-ldap-server-primary-0` | `/var/lib/univention-ldap` |
|
||||
| | | Yes | openLDAP process data | `shared-run-ums-ldap-server-primary-0` | `/var/run/slapd` |
|
||||
| | | No | openLDAP database (secondary R/O Pods), secondaries can sync from the primary | `shared-data-ums-ldap-server-secondary-0` | `/var/lib/univention-ldap` |
|
||||
| | | No | openLDAP process data | `shared-run-ums-ldap-server-secondary-0` | `/var/run/slapd` |
|
||||
| | | Yes | The state of the listener | `data-ums-provisioning-udm-listener-0` | `/var/log/univention`<br>`/var/lib/univention-ldap/schema/id`<br>`/var/lib/univention-directory-listener` |
|
||||
| | | No | Cache | `group-membership-cache-ums-portal-consumer-0` | `/usr/share/univention-group-membership-cache/caches` |
|
||||
| | | Yes | Queued provisioning objects | `nats-data-ums-provisioning-nats-0` | `/data` |
|
||||
| | Memcached | No | Cache for UMC Server | | |
|
||||
| **OpenProject** | PostgreSQL | Yes | Application's main database | `openproject` | |
|
||||
| | S3 | Yes | Attachments, custom styles | `openproject` | |
|
||||
| | Memcached | No | Cache | | |
|
||||
| | PVC | No | PVC backed `emptyDir` as K8s cannot set the sticky bit on standard emptyDirs | `openproject-<web/worker>-*-tmp` | `/tmp` |
|
||||
| | | No | PVC backed `emptyDir` as K8s cannot set the sticky bit on standard emptyDirs | `openproject-<web/worker>-app-*-tmp` | `/app/tmp` |
|
||||
| **Open-Xchange** | MariaDB | Yes | Application's control database to coordiate dynamically created ones | `configdb` | |
|
||||
| | | Yes | Dynamically creates databases of schema `PRIMARYDB_n`containing multiple contexts | `PRIMARYDB_*` | |
|
||||
| | | Yes | OX Guard related settings | `oxguard*` | |
|
||||
| | S3 | Yes | Attachments of meetings, contacts and tasks | `openxchange` | |
|
||||
| | Redis | Optional | Cache, session related data, distributed maps | | |
|
||||
| | PVC | Yes | OX Connector: OXAPI access details | `ox-connector-appcenter-ox-connector-0` | `/var/lib/univention-appcenter/apps/ox-connector` |
|
||||
| | | Yes | OX Connector: Application's meta data | `ox-connector-ox-contexts-ox-connector-0` | `/etc/ox-secrets` |
|
||||
| **Postfix** | PVC | Yes | Mail spool | `postfix` | `/var/spool/postfix` |
|
||||
| **XWiki** | PostgreSQL | Yes | Application's main database | `xwiki` | |
|
||||
| | PVC | Yes | Attachments | `xwiki-data-xwiki-0` | `/usr/local/xwiki/data` |
|
||||
|
||||
Additionally, the following persistent volumes are mounted by Pods that serve as a data storage for the applications mentioned above.
|
||||
|
||||
These services are not ment for production use, so you can ignore these as you surely backup your production services instead.
|
||||
|
||||
| Service | Pod | Volume Name | PVC | MountPath | Comment |
|
||||
|------------|------------------|--------------|-----------------------------|-----------------------|------------------|
|
||||
| MariaDB | `mariadb-*` | `data` | `data-mariadb-0` | `/var/lib/mysql` | |
|
||||
| MinIO | `minio-*-*` | `data` | `minio` | `/bitnami/minio/data` | |
|
||||
| PostgreSQL | `postgresql-*` | `data` | `data-postgresql-0` | `/mnt/postgresql` | |
|
||||
| Redis | `redis-master-*` | `redis-data` | `redis-data-redis-master-0` | `/data` | |
|
||||
| Cassandra | `cassandra-*` | `data` | `data-cassandra-*` | `/bitnami/cassandra` | openDesk EE only |
|
||||
225
docs/debugging.md
Normal file
@@ -0,0 +1,225 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Debugging</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Disclaimer](#disclaimer)
|
||||
* [Enable debugging](#enable-debugging)
|
||||
* [Adding containers to a pod for debugging purposes](#adding-containers-to-a-pod-for-debugging-purposes)
|
||||
* [Adding a container to a pod/deployment - Dev/Test only](#adding-a-container-to-a-poddeployment---devtest-only)
|
||||
* [Temporary/ephemeral containers](#temporaryephemeral-containers)
|
||||
* [Components](#components)
|
||||
* [Helmfile](#helmfile)
|
||||
* [MariaDB](#mariadb)
|
||||
* [Nextcloud](#nextcloud)
|
||||
* [OpenProject](#openproject)
|
||||
* [PostgreSQL](#postgresql)
|
||||
* [Keycloak](#keycloak)
|
||||
* [Setting the log level](#setting-the-log-level)
|
||||
* [Accessing the Keycloak admin console](#accessing-the-keycloak-admin-console)
|
||||
<!-- TOC -->
|
||||
|
||||
# Disclaimer
|
||||
|
||||
This document collects information on how to go about debugging an openDesk deployment.
|
||||
|
||||
It will be extended over time as we deal with debugging cases.
|
||||
|
||||
We for sure do not want to reinvent the wheel, so we might link to external sources that contain helpful
|
||||
information where available.
|
||||
|
||||
> **Warning**<br>
|
||||
> You should never enable the debug option in production environments! By looking up `debug.enabled` in the deployment, you
|
||||
will find the various places changes are applied when enabling debugging. So, outside of development and test
|
||||
environments, you should use them thoughtfully and carefully if needed.
|
||||
|
||||
# Enable debugging
|
||||
|
||||
Check the openDesk [`debug.yaml.gotmpl`](../helmfile/environments/default/debug.yaml.gotmpl) and configure it for your deployment
|
||||
```
|
||||
debug:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
This will result in:
|
||||
- setting most component's log level to debug
|
||||
- making the Keycloak admin console available by default at `https://id.<your_domain>/admin/`
|
||||
- ingress for `http://minio-console.<your_domain>` being configured
|
||||
|
||||
> **Note**<br>
|
||||
> When enabling debug mode and updating your deployment, you must manually delete all jobs before updating. In debug mode, we keep the jobs, and some job fields are immutable, leading to a deployment failure.
|
||||
|
||||
> **Note**<br>
|
||||
> All containers should write their log output to STDOUT; if you find (valuable) logs inside a container which were not in STDOUT, please let us know!
|
||||
|
||||
# Adding containers to a pod for debugging purposes
|
||||
|
||||
During testing or development, you may need to execute tools, browse, or even change things in the filesystem of another container.
|
||||
|
||||
This can be a challenge the more security-hardened the container images are because there are no debugging tools available, and sometimes, there is not even a shell.
|
||||
|
||||
Adding a container to a Pod can ease the pain.
|
||||
|
||||
Below are some brief notes on debugging openDesk by adding debug containers. Of course, there are many more detailed resources out there.
|
||||
|
||||
## Adding a container to a pod/deployment - Dev/Test only
|
||||
|
||||
You can add a container by editing and updating an existing deployment, which is quite comfortable with tools like [Lens](https://k8slens.dev/).
|
||||
|
||||
- Select the container you want to use as a debugging container; in the example below, it is `registry.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-debugging-image:latest`.
|
||||
- Ensure the `shareProcessNamespace` option is enabled for the Pod.
|
||||
- Reference the selected container within the `containers` array of the deployment.
|
||||
- If you want to access another container's filesystem, ensure both containers' user/group settings match.
|
||||
- Save & update the deployment.
|
||||
|
||||
The following example can be used to debug the `openDesk-Nextcloud-PHP` container; if you want to modify files, remember to set `readOnlyRootFilesystem` to `true` on the PHP container.
|
||||
|
||||
```yaml
|
||||
shareProcessNamespace: true
|
||||
containers:
|
||||
- name: debugging
|
||||
image: registry.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-debugging-image:latest
|
||||
command: ["/bin/bash", "-c", "while true; do echo 'This is a temporary container for debugging'; sleep 5 ; done"]
|
||||
securityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
privileged: false
|
||||
runAsUser: 65532
|
||||
runAsGroup: 65532
|
||||
runAsNonRoot: true
|
||||
readOnlyRootFilesystem: false
|
||||
allowPrivilegeEscalation: false
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
```
|
||||
|
||||
- After the deployment has been reloaded, open the shell of the debugging container.
|
||||
- When you've succeeded, you will see the processes of both/all containers in the Pod when executing `ps aux`.
|
||||
- To access other containers' filesystems, select the PID of a process from the other container and do a `cd /proc/<selected_process_id>/root`.
|
||||
|
||||
## Temporary/ephemeral containers
|
||||
|
||||
An interesting read from which we picked most of the details below from: https://iximiuz.com/en/posts/kubernetes-ephemeral-containers/
|
||||
|
||||
Sometimes, you do not want to add a container permanently to your existing deployment. In that case, you could use [ephemeral containers](https://kubernetes.io/docs/concepts/workloads/pods/ephemeral-containers/).
|
||||
|
||||
For the commands further down this section, we need to set some environment variables first:
|
||||
- `NAMESPACE`: The namespace in which the Pod you want to inspect is running.
|
||||
- `DEPLOYMENT_NAME`: The deployment's name responsible for spawning the Pod you want to inspect within the aforementioned namespace.
|
||||
- `POD_NAME`: The name of the Pod you want to inspect within the aforementioned namespace.
|
||||
- `EPH_CONTAINER_NAME`: The name of your debugging container, "debugging" seems obvious.
|
||||
- `DEBUG_IMAGE`: The image you want to use for debugging purposes.
|
||||
|
||||
e.g.
|
||||
|
||||
```shell
|
||||
export NAMESPACE=my_test_deployment
|
||||
export DEPLOYMENT_NAME=opendesk-nextcloud-php
|
||||
export POD_NAME=opendesk-nextcloud-php-6686d47cfb-7642f
|
||||
export EPH_CONTAINER_NAME=debugging
|
||||
export DEBUG_IMAGE=registry.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-debugging-image:latest
|
||||
```
|
||||
|
||||
You still need to ensure that your deployment supports process namespace sharing:
|
||||
|
||||
```shell
|
||||
kubectl -n ${NAMESPACE} patch deployment ${DEPLOYMENT_NAME} --patch '
|
||||
spec:
|
||||
template:
|
||||
spec:
|
||||
shareProcessNamespace: true'
|
||||
```
|
||||
|
||||
Now, you can add the ephemeral container with:
|
||||
```shell
|
||||
kubectl -n ${NAMESPACE} debug -it --attach=false -c ${EPH_CONTAINER_NAME} --image={DEBUG_IMAGE} ${POD_NAME}
|
||||
```
|
||||
and open its interactive terminal with
|
||||
```shell
|
||||
kubectl -n ${NAMESPACE} attach -it -c ${EPH_CONTAINER_NAME} ${POD_NAME}
|
||||
```
|
||||
|
||||
# Components
|
||||
|
||||
## Helmfile
|
||||
|
||||
When refactoring the Helmfile structure, you want to ensure that there are no unintended edits by executing e.g. `diff` and
|
||||
comparing the output of Helmfile from before and after the change by calling:
|
||||
|
||||
```shell
|
||||
helmfile template -e dev >output_to_compare.yaml
|
||||
```
|
||||
|
||||
## MariaDB
|
||||
|
||||
When using the openDesk bundled MariaDB, you can explore the database(s) using the MariaDB interactive terminal from the Pod's command line: `mariadb -u root -p`. On the password prompt, provide the value for `MARIADB_ROOT_PASSWORD` which can be found in the Pod's environment.
|
||||
|
||||
While you will find all the details for the CLI tool in the [MariaDB documentation](https://mariadb.com/kb/en/mariadb-command-line-client/), some commonly used commands are:
|
||||
|
||||
- `help`: Get help on the psql command set
|
||||
- `show databases`: Lists all databases
|
||||
- `use <databasename>`: Connect to `<databasename>`
|
||||
- `show tables`: Lists tables within the currently connected database
|
||||
- `quit`: Quit the client
|
||||
|
||||
## Nextcloud
|
||||
|
||||
`occ` is the CLI for Nextcloud; all the details can be found in the [upstream documentation](https://docs.nextcloud.com/server/latest/admin_manual/configuration_server/occ_command.html).
|
||||
|
||||
You can run occ commands in the `opendesk-nextcloud-aio` pod like this: `php /var/www/html/occ config:list`
|
||||
|
||||
## OpenProject
|
||||
|
||||
OpenProject is a Ruby on Rails application. Therefore, you can make use of the Rails console from the Pod's command line `bundle exec rails console`
|
||||
and run debug code like this:
|
||||
|
||||
```
|
||||
uri = URI('https://nextcloud.url/apps/integration_openproject/check-config')
|
||||
Net::HTTP.start(uri.host, uri.port,
|
||||
:use_ssl => uri.scheme == 'https') do |http|
|
||||
request = Net::HTTP::Get.new uri
|
||||
response = http.request request # Net::HTTPResponse object
|
||||
end
|
||||
```
|
||||
|
||||
## PostgreSQL
|
||||
|
||||
Using the openDesk bundled PostgreSQL, you can explore database(s) using the PostgreSQL interactive terminal from the Pod's command line: `psql -U postgres`.
|
||||
|
||||
While you will find all details about the cli tool `psql` in the [PostgreSQL documentation](https://www.postgresql.org/docs/current/app-psql.html)), some commonly used commands are:
|
||||
|
||||
- `\?`: Get help on the psql command set
|
||||
- `\l`: Lists all databases
|
||||
- `\c <databasename>`: Connect to `<databasename>`
|
||||
- `\dt`: List (describe) tables within the currently connected database
|
||||
- `\q`: Quit the client
|
||||
|
||||
## Keycloak
|
||||
|
||||
### Setting the log level
|
||||
|
||||
Keycloak is the gateway to integrate other authentication management systems or applications. It is undesirable to enable debug mode for the whole platform if you just need to look into Keycloak.
|
||||
|
||||
Enabling debugging mode for Keycloak can easily be achieved in two steps:
|
||||
|
||||
1. Updating the value for `KC_LOG_LEVEL` in the related configmap `ums-keycloak`.
|
||||
```shell
|
||||
export NAMESPACE=<your_namespace>
|
||||
export CONFIGMAP_NAME=ums-keycloak
|
||||
kubectl patch -n ${NAMESPACE} configmap ${CONFIGMAP_NAME} --type merge -p '{"data":{"KC_LOG_LEVEL":"DEBUG"}}'
|
||||
```
|
||||
|
||||
2. Restart the Keycloak Pod(s).
|
||||
|
||||
> **Note**<br>
|
||||
> Because the `ums-keycloak-extensions-handler` is sending frequent requests (one per second) to Keycloak for retrieval of the Keycloak event history, you might want to stop/remove the deployment while debugging/analysing Keycloak to not get your debug output spammed by these requests.
|
||||
|
||||
### Accessing the Keycloak admin console
|
||||
|
||||
Deployments set to `debug.enable: true` expose the Keycloak admin console at `http://id.<your_opendesk_domain>/admin/`. This can also be achieved by updating the Ingress `ums-keycloak-extensions-proxy` with an additional path that allows access to `/admin/`.
|
||||
|
||||
The admin console login is using the default Keycloak admin account `kcadmin` and the password from the secret `ums-opendesk-keycloak-credentials`.
|
||||
39
docs/developer/ci.md
Normal file
@@ -0,0 +1,39 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>CI/CD</h1>
|
||||
|
||||
This page covers openDesk deployment automation via Gitlab CI.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Deployment](#deployment)
|
||||
* [Tests](#tests)
|
||||
<!-- TOC -->
|
||||
|
||||
# Deployment
|
||||
|
||||
The project includes a `.gitlab-ci.yml` that allows you to execute the deployment from a GitLab instance of your choice.
|
||||
|
||||
When starting the pipeline through the GitLab UI, you will be queried for some variables, including the following:
|
||||
|
||||
- `DOMAIN`: The primary domain for your deployment, making the openDesk services available, e.g., as `https://portal.DOMAIN`.
|
||||
- `MAIL_DOMAIN` (optional): The domain for the users' email addresses; it defaults to `DOMAIN`.
|
||||
- `MATRIX_DOMAIN` (optional): The domain for the users' Matrix IDs; it defaults to `DOMAIN`.
|
||||
- `NAMESPACE`: Namespace of your K8s cluster openDesk will be installed.
|
||||
- `MASTER_PASSWORD_WEB_VAR`: Overwrites value of `MASTER_PASSWORD`.
|
||||
|
||||
You might want to set credential variables in the GitLab project at `Settings` > `CI/CD` > `Variables`, the values of which can then be hidden from output logs.
|
||||
|
||||
# Tests
|
||||
|
||||
The GitLab CI pipeline contains a job named `run-tests` that can trigger a test suite pipeline on another GitLab project.
|
||||
For the trigger to work, the variable `TESTS_PROJECT_URL` has to be set on this GitLab project's CI variables,
|
||||
which can be found at `Settings` -> `CI/CD` -> `Variables`. The variable should have this format:
|
||||
`<domain of gitlab>/api/v4/projects/<id>`.
|
||||
To select the current test suite, use the variable `TESTS_TESTSET`. Default: `Smoke`.
|
||||
If the branch of the test pipeline is not `main`, this can be set with the `.gitlab-ci.yml` variable
|
||||
`TESTS_BRANCH` while creating a new pipeline.
|
||||
|
||||
The variable `testprofile` within the job is set to `Namespace`, which tells the e2e tests to use environment-specific settings that will be read from the cluster and namespace-specific file which is found in the project internal `opendesk-env` repository.
|
||||
161
docs/developer/development.md
Normal file
@@ -0,0 +1,161 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Developing openDesk deployment automation</h1>
|
||||
|
||||
Active development on the deployment is currently only available to project members.
|
||||
However, contributions are possible using the [CLA](https://gitlab.opencode.de/bmi/opendesk/info/-/blob/main/CONTRIBUTING.md?ref_type=heads) process.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Overview](#overview)
|
||||
* [Default branch, `develop` and other branches](#default-branch-develop-and-other-branches)
|
||||
* [External artifacts - `charts.yaml.gotmpl` and `images.yaml.gotmpl`](#external-artifacts---chartsyamlgotmpl-and-imagesyamlgotmpl)
|
||||
* [Linting](#linting)
|
||||
* [Disable linting selectively](#disable-linting-selectively)
|
||||
* [Renovate](#renovate)
|
||||
* [Mirroring](#mirroring)
|
||||
* [Get new artifacts mirrored](#get-new-artifacts-mirrored)
|
||||
* [Creating new charts/images](#creating-new-chartsimages)
|
||||
<!-- TOC -->
|
||||
|
||||
# Overview
|
||||
|
||||
The following sketch provides a high-level overview to get a basic understanding of the deployment-relevant
|
||||
structure of this repository. Understanding that structure is vital if you want to contribute to
|
||||
developing the openDesk platform.
|
||||
|
||||
```mermaid
|
||||
flowchart TD
|
||||
J[helmfile.yaml.gotmpl\nor a helmfile outside of this repository]-->A
|
||||
J-->K[./helmfile/environemnts/*your_environment*/values.yaml.gotmpl\nor another environment values file]
|
||||
A[./helmfile_generic.yaml.gotmpl]-->B[./helmfile/apps/*all_configured_apps*/helmfile.yaml.gotmpl\nReferences the relevant app Helm\ncharts using details from 'charts.yaml.gotmpl']
|
||||
B-->C[./values-*all_configured_components*.yaml.gotmpl\nValues to template the charts\nwith references to the `images.yaml.gotmpl`]
|
||||
A-->D[./helmfile/environments/default/*\nwith just some examples below]
|
||||
D-->F[charts.yaml.gotmpl]
|
||||
D-->G[images.yaml.gotmpl]
|
||||
D-->H[global.*]
|
||||
D-->I[secrets.yaml.gotmpl\nreplicas.yaml.gotmpl\nresources.yaml.gotmpl\n...]
|
||||
A-->|overwrite defaults with your\ndeployment/environment specific values|E[./helmfile/environments/default/values.yaml.gotmpl]
|
||||
```
|
||||
|
||||
The `helmfile.yaml.gotmpl` file in the root folder is the foundation
|
||||
for the entire deployment. It references the `helmfile_generic.yaml.gotmpl`
|
||||
file, which includes app-specific `helmfile.yaml.gotmpl` files and
|
||||
global values files located in `./environments/default`.
|
||||
|
||||
`helmfile.yaml.gotmpl` also refers to three predefined environments: `dev`,
|
||||
`test`, and `prod`.
|
||||
|
||||
The `helmfile_generic.yaml.gotmpl` file is designed to be referenced from
|
||||
external repositories, where custom environments may be defined. An
|
||||
example is demonstrated in the `helmfile.yaml.gotmpl` file.
|
||||
|
||||
Before you investigate any app-specific configuration, it is recommended that you review the contents of `./helmfile/environments/default` to understand what configuration details are set there, as the app deployments reference them.
|
||||
|
||||
# Default branch, `develop` and other branches
|
||||
|
||||
The `main` branch is configured to be the default branch, as visitors to the project on openCode should see that
|
||||
branch by default.
|
||||
|
||||
Please use the `develop` branch to diverge your branch(es) from. See the [workflow guide](./docs/developer/workflow.md)
|
||||
for more details on naming conventions.
|
||||
|
||||
# External artifacts - `charts.yaml.gotmpl` and `images.yaml.gotmpl`
|
||||
|
||||
The `charts.yaml.gotmpl` and `images.yaml.gotmpl` files are the central place to reference any external artifacts used for the deployment.
|
||||
|
||||
Besides the deployment automation itself, some tools work with the contents of the files:
|
||||
|
||||
- **Linting**: Ensures consistency of the file contents for the other tools.
|
||||
- **Renovate**: Automatically create MRs that update the components to their latest version.
|
||||
- **Mirror**: Mirror artifacts to openCode.
|
||||
|
||||
Please find details on these tools below.
|
||||
|
||||
## Linting
|
||||
|
||||
In the project's CI, there is a step dedicated to lint the two yaml files, as we want them to be in
|
||||
- alphabetical order regarding the components
|
||||
- logical order regarding the non-commented lines (registry > repository > tag).
|
||||
|
||||
In the linting step, the [openDesk CI CLI](https://gitlab.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli) is used to apply the
|
||||
aforementioned sorting, and the result is compared with the unsorted version. If there is a delta, the linting fails, and you can fix it by running the CLI tool locally, verifying and applying the result to your branch.
|
||||
|
||||
> **Note**<br>
|
||||
> Please ensure that in component blocks, you use comments only at the beginning of the block or at its end. Ideally, you stick
|
||||
with the many available examples in the yaml files.
|
||||
|
||||
Example:
|
||||
```yaml
|
||||
synapse:
|
||||
# providerCategory: "Supplier"
|
||||
# providerResponsible: "Element"
|
||||
# upstreamRegistry: "https://registry-1.docker.io"
|
||||
# upstreamRepository: "matrixdotorg/synapse"
|
||||
# upstreamMirrorTagFilterRegEx: '^v(\d+)\.(\d+)\.(\d+)$'
|
||||
# upstreamMirrorStartFrom: ["1", "91", "2"]
|
||||
registry: "registry.opencode.de"
|
||||
repository: "BMI/opendesk/components/supplier/element/images-mirror/synapse"
|
||||
tag: "v1.91.2@sha256:1d19508db417bb2b911c8e086bd3dc3b719ee75c6f6194d58af59b4c32b11322"
|
||||
```
|
||||
|
||||
### Disable linting selectively
|
||||
|
||||
If you follow the "push early, push often" paradigm to save your work to the central Git instance, or you just fix a typo in
|
||||
existing documentation, you can avoid the CI and its linting being executed, as it might not offer additional value.
|
||||
|
||||
GitLab offers two options to skip the CI on a commit/push:
|
||||
- Add `[ci skip]` to your commit message ([details](https://docs.gitlab.com/ee/ci/pipelines/#skip-a-pipeline)).
|
||||
**Note:** The string has to be removed before merging your feature branch into `develop`.
|
||||
- Use the related git push option `git push -o ci.skip` ([details](https://docs.gitlab.com/ee/user/project/push_options.html#push-options-for-gitlab-cicd)).
|
||||
|
||||
## Renovate
|
||||
|
||||
Uses a regular expression to match the values of the following attributes:
|
||||
|
||||
- `# upstreamRegistry` *required*: Attribute's value must be prefixed with `https://` for Renovate.
|
||||
- `# upstreamRepository` *required*
|
||||
- `tag` *required*
|
||||
|
||||
Checks for newer versions of the given artifact and creates an MR containing the newest version's tag (and digest).
|
||||
|
||||
## Mirroring
|
||||
|
||||
- See also: https://gitlab.opencode.de/bmi/opendesk/tooling/oci-pull-mirror
|
||||
|
||||
> **Note:**<br>
|
||||
> The mirror is scheduled to run every hour at 42 minutes past the hour.
|
||||
|
||||
openDesk strives to make all relevant artifacts available on openCode so there is a mirroring process
|
||||
configured to pull artifacts that do not originate from openCode into projects called `*-Mirror` within the
|
||||
[openDesk Components section](https://gitlab.opencode.de/bmi/opendesk/components).
|
||||
|
||||
The mirror script takes the information on what artifacts to mirror from the annotation inside the two yaml files:
|
||||
- `# upstreamRegistry` *required*: To identify the source registry
|
||||
- `# upstreamRegistryCredentialId`: *optional*: In case the source registry is not public, the access credentials have to be specified as environment variables and contain the value of this key in their name, so you want to specify the key in uppercase:
|
||||
- `MIRROR_CREDENTIALS_SRC_<upstreamRegistryCredentialId>_USERNAME`
|
||||
- `MIRROR_CREDENTIALS_SRC_<upstreamRegistryCredentialId>_PASSWORD`
|
||||
- `# upstreamRepository` *required*: To identify the source repository
|
||||
- `# upstreamMirrorTagFilterRegEx` *required*: If this annotation is set, the mirror for the component will be activated. Only tags that match the given regular expression will be mirrored. **Note:** You must use single quotes for this attribute's value if you use backslash leading regex notation like `\d`.
|
||||
- `# upstreamMirrorStartFrom` *optional*: Array of numeric values in case you want to mirror only artifacts beginning with a specific version. You must use capturing group
|
||||
in `# upstreamMirrorTagFilterRegEx` to identify the single numeric elements of the version within the tag and use per capturing group (left to right) one numeric array
|
||||
element here to define the version the mirror should start with.
|
||||
|
||||
### Get new artifacts mirrored
|
||||
|
||||
If you want new images or charts mirrored that are not yet included in one of the yaml files, you can add them in your branch, including the aforementioned mirror annotations, and ask somebody from the platform development team to trigger the mirror's CI based on your branch.
|
||||
|
||||
Once your branch is merged into develop, your artifacts are mirrored hourly.
|
||||
|
||||
# Creating new charts/images
|
||||
|
||||
When you create new Helm charts, please check out the
|
||||
[openDesk Best Practices](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-best-practises)
|
||||
for Helm charts.
|
||||
|
||||
You may also want to make use of our [standard CI](https://gitlab.opencode.de/bmi/opendesk/tooling/gitlab-config) to
|
||||
quickly get Helm charts and container images that are signed, linted, scanned, and released.
|
||||
Check out the `.gitlab-ci.yaml` files in the project's [Charts](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts) or [Images](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images) to get an idea just how little you need to do by yourself.
|
||||
391
docs/developer/workflow.md
Normal file
@@ -0,0 +1,391 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Technical development and release workflow</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Scope](#scope)
|
||||
* [Roles and responsibilities](#roles-and-responsibilities)
|
||||
* [Deployment automation](#deployment-automation)
|
||||
* [openDesk technical component classes](#opendesk-technical-component-classes)
|
||||
* [Functional vs. service components](#functional-vs-service-components)
|
||||
* [Origins](#origins)
|
||||
* [Reference CI for creating Images and Helm charts (gitlab-config)](#reference-ci-for-creating-images-and-helm-charts-gitlab-config)
|
||||
* [Licensing](#licensing)
|
||||
* [Development workflow](#development-workflow)
|
||||
* [Disclaimer](#disclaimer)
|
||||
* [Workflow](#workflow)
|
||||
* [Branching concept](#branching-concept)
|
||||
* [Standard Quality Gate (SQG)](#standard-quality-gate-sqg)
|
||||
* [Branch workflows](#branch-workflows)
|
||||
* [`main`](#main)
|
||||
* [`develop`](#develop)
|
||||
* [`docs`](#docs)
|
||||
* [`fix`](#fix)
|
||||
* [`feat`](#feat)
|
||||
* [Branch names](#branch-names)
|
||||
* [Commit messages / Conventional Commits](#commit-messages--conventional-commits)
|
||||
* [Verified commits](#verified-commits)
|
||||
* [Footnotes](#footnotes)
|
||||
<!-- TOC -->
|
||||
|
||||
# Scope
|
||||
|
||||
This document covers the development of a technical release, thereby addressing:
|
||||
- the development and branching concept for the openDesk deployment automation
|
||||
- the related quality gates
|
||||
- the creation of technical releases
|
||||
|
||||
It does not cover additional artifacts that might be related to a functional release.
|
||||
|
||||
# Roles and responsibilities
|
||||
|
||||
The following section provides a high-level view of the involved parties in the openDesk context and their responsibilities:
|
||||
|
||||
- **Open source product suppliers**
|
||||
- Focus areas
|
||||
- Development of upstream products
|
||||
- Development of integrative functionality relevant to openDesk and others
|
||||
- Providing source code and the artifacts required to install openDesk to openCode
|
||||
- Hand over to _openDesk platform development_
|
||||
- Helm charts
|
||||
- Container images
|
||||
- Documentation
|
||||
- **openDesk platform development**
|
||||
- Focus areas
|
||||
- Integration of the supplier's artifacts, addressing basic operational needs
|
||||
- Implementation of services required (e.g. persistence layer) to develop and test openDesk
|
||||
- Implementation of the required quality gates (QG)
|
||||
- Ensuring the quality gates are passed
|
||||
- Hand over to _Operator_
|
||||
- Deployment automation
|
||||
- **Operator**
|
||||
- Focus areas
|
||||
- Provide production-grade services (e.g. persistence layer) to operate openDesk
|
||||
- Rollout, operate, and support openDesk
|
||||
- Further develop the deployment automation to meet extended operational requirements, ideally providing these developments upstream to the openDesk platform development in order to have them included as standard in the future.
|
||||
- The operator can either use a self-operated Kubernetes cluster to deploy openDesk or make use of a managed Kubernetes offering from a **Cloud Provider**
|
||||
|
||||
# Deployment automation
|
||||
|
||||
The openDesk deployment automation is the core outcome of the platform development process.
|
||||
|
||||
The openDesk platform development team created and maintains the deployment automation, which allows interested parties to deploy openDesk onto their cloud infrastructure with a low barrier to entry. The core technology for the automation is [Helm](https://helm.sh/), which is orchestrated using [Helmfile](https://github.com/helmfile/helmfile). Of course, this deployment is also used by the suppliers and the platform team in everyday work.
|
||||
|
||||
Please find the deployment automation, including its documentation, in the following project: https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk
|
||||
|
||||
The automation supports Gitlab CI/CD, local execution, and triggering the Helmfile deployment for the whole platform or single applications.
|
||||
|
||||
## openDesk technical component classes
|
||||
|
||||
The below rendering in [class diagram](https://en.wikipedia.org/wiki/Class_diagram) notation shows the three component classes openDesk consists of. In each of these:
|
||||
- the first section below the name of the class shows the required **characteristics** of each component of the given class
|
||||
- the second section shows the **methods** like linting that must be applied to that class's artifacts
|
||||
|
||||
> **Note**<br>
|
||||
> The methods prefixed with '-' are not yet available in `gitlab-config`. You will learn about them later.
|
||||
|
||||
```mermaid
|
||||
classDiagram
|
||||
Images <|-- Helm_charts
|
||||
Images <|-- Helmfile_based_deployment_automation
|
||||
Helm_charts <|-- Helmfile_based_deployment_automation
|
||||
class Images{
|
||||
SBOM
|
||||
SBOM signature
|
||||
Image signature
|
||||
reuseLint()
|
||||
CVE analysis()
|
||||
hadolint()
|
||||
Malware scan()
|
||||
}
|
||||
class Helm_charts{
|
||||
HelmDocs
|
||||
Helm chart signature
|
||||
reuseLint()
|
||||
KubeLinter()
|
||||
YamlLint()
|
||||
-Kubescape()
|
||||
}
|
||||
class Helmfile_based_deployment_automation{
|
||||
reuseLint()
|
||||
YamlLint()
|
||||
-markdownlint()
|
||||
}
|
||||
```
|
||||
|
||||
## Functional vs. service components
|
||||
|
||||
The focus of openDesk is to provide an integrated and functional productivity platform based on the involved suppliers' functional components (products). These functional components usually rely on specific service components, e.g. database services for persistence. When running openDesk in production, the operator is responsible for providing these production-grade services. For evaluation and development purposes, the openDesk deployment automation includes these services.
|
||||
|
||||
Find the list of functional and service components in the [archictecture documentation](./docs/architecture.md).
|
||||
|
||||
## Origins
|
||||
|
||||
The openDesk platform consolidates the technical components from various origins:
|
||||
|
||||
1) *Supplier* for functional components: Provide their upstream product, sometimes including openDesk-specific builds or extensions and product deployment (Helm charts).
|
||||
2) *Third-party upstream* for service components: The platform development team tries to use as many community upstream components as possible for the services they have to provide within openDesk.
|
||||
3) *Platform development* filling the gap: Some suppliers might not provide Helm charts or images for their products that fit the needs of openDesk, and some third-party upstream components are not built to fit into openDesk. In such cases, the platform development team creates its own Helm charts and images.
|
||||
|
||||
## Reference CI for creating Images and Helm charts (gitlab-config)
|
||||
|
||||
As mentioned in the chapter "Origins" above, the openDesk platform development also creates images and Helm charts when needed.
|
||||
|
||||
For that purpose openDesk provides a [GitLab CI-based reference implementation](https://gitlab.opencode.de/bmi/souveraener_arbeitsplatz/tooling/gitlab-config) called `gitlab-config` to achieve the required characteristics and apply the necessary methods including releasing the artifacts based on [Semantic Release](https://github.com/semantic-release/semantic-release#readme) into the GitLab container registry.
|
||||
|
||||
## Licensing
|
||||
|
||||
As a standard, the openDesk platform development team uses [reuse.software](https://reuse.software/) wherever possible to annotate license and copyright information.
|
||||
|
||||
openDesk uses Apache 2.0 as the license for their work. A typical reuse copyright and license header looks like this:
|
||||
```
|
||||
# SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
```
|
||||
The way to mark the license header as a comment differs between the various file types. Please find matching examples for all types across the [deployment automation repository](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk).
|
||||
|
||||
> **Note**<br>
|
||||
> If a `SPDX-FileCopyrightText` already exists with the copyright owner described above but with a past year (e.g. 2024), please update this copyright header line to cover (up to and including) the current year, e.g. `2024-2025`.
|
||||
|
||||
> **Note**<br>
|
||||
> If line(s) with `SPDX-FileCopyrightText` containing a different copyright owner exist in the file you are working on, do not replace existing one(s), but rather add another header above these.
|
||||
|
||||
## Development workflow
|
||||
|
||||
### Disclaimer
|
||||
|
||||
openDesk consists only of community products, so there is no SLA related to service updates or backport of critical security fixes. This has two consequences:
|
||||
- In production scenarios, you should replace the community versions of the functional components with supported, SLA-backed paid versions.
|
||||
- openDesk aims to update to the community components' latest available releases continually; therefore, we have rolling technical releases.
|
||||
|
||||
### Workflow
|
||||
|
||||
This chapter describes the deployment automation's development workflow. The suppliers have their own development processes and workflows. While we aim to always update to the most recent community version(s) available, openDesk also sponsors the development done by the suppliers. As the openDesk team has to take a closer look at these sponsored features, they are referred to as *supplier deliverables* within the platform development workflow.
|
||||
|
||||
#### Branching concept
|
||||
|
||||
The picture below uses Gitflow notation to give an overview of the different types of development flows.
|
||||
|
||||
The basic facts for the flow are:
|
||||
- When the `develop` branch is merged into `main`, a technical release is created (except when the merge commit(s) are of type `chore` or `docs`).
|
||||
- Changes that will be applied to openDesk have to branch off from `develop`; we call these branches *feature* branches.
|
||||
- Developers can create sub-branches from their feature branch(es) as needed.
|
||||
- When a *feature* branch gets pushed a Merge Request in `Draft` state is automatically created.
|
||||
- We know three types of *feature* branches:
|
||||
- `docs`: Includes only documentation changes.
|
||||
- `fix`: Maintenance of the openDesk software components and minor configurational changes.
|
||||
- `feat`: All changes that do not fall into the two categories above, especially:
|
||||
- supplier deliverables
|
||||
- configuration changes that have a significant impact on openDesk users or require migrations
|
||||
- The *QG* entries in the workflow refer to quality gates that are explained in more detail later.
|
||||
- All merges into `develop` or `main` require two approvals from the platform development team[^1]. Those approving must ensure that the defined quality gates have been successfully passed.
|
||||
|
||||
```mermaid
|
||||
gitGraph
|
||||
commit id: "QA 'nightly main'"
|
||||
commit id: " "
|
||||
branch "develop"
|
||||
checkout "develop"
|
||||
commit id: "QA 'nightly develop'"
|
||||
commit id: " "
|
||||
branch "docs"
|
||||
checkout "docs"
|
||||
commit id: "Documentation commits" type: HIGHLIGHT
|
||||
checkout "develop"
|
||||
merge "docs"
|
||||
checkout "main"
|
||||
merge "develop" tag: "No release"
|
||||
checkout "develop"
|
||||
commit id: " "
|
||||
branch "fix"
|
||||
checkout "fix"
|
||||
commit id: "Maintenance commits" type: HIGHLIGHT
|
||||
commit id: "QG 'fix'" type: REVERSE
|
||||
checkout "develop"
|
||||
merge "fix"
|
||||
commit id: "QA 'release merge'" type: REVERSE
|
||||
checkout "main"
|
||||
merge "develop" tag: "Patch or minor release"
|
||||
checkout "develop"
|
||||
commit id: " "
|
||||
branch "feat"
|
||||
checkout "feat"
|
||||
commit id: "Feature commits" type: HIGHLIGHT
|
||||
commit id: "QG 'feat'" type: REVERSE
|
||||
commit id: "Manual Feature QA" type: REVERSE
|
||||
commit id: "Develop Tests"
|
||||
commit id: "Documentation"
|
||||
checkout "develop"
|
||||
merge "feat"
|
||||
commit id: "QA 'release merge' " type: REVERSE
|
||||
checkout "main"
|
||||
merge "develop" tag: "Minor or major release"
|
||||
checkout "develop"
|
||||
checkout "main"
|
||||
commit id: " "
|
||||
commit id: "Manual Functional Release Activities" type: HIGHLIGHT
|
||||
commit id: " "
|
||||
```
|
||||
|
||||
#### Standard Quality Gate (SQG)
|
||||
|
||||
The Standard Quality Gate addresses quality assurance steps that should be executed within each of the mentioned quality gates in the workflow.
|
||||
|
||||
1. Linting
|
||||
- Blocking
|
||||
- Licensing: [reuse](https://github.com/fsfe/reuse-tool)
|
||||
- openDesk specific: Especially `images.yaml.gotmpl` and `charts.yaml.gotmpl`, find more details in [development.md](./docs/developer/development.md).
|
||||
- Non-Blocking
|
||||
- Security: [Kyverno policy check](../.kyverno) addressing some IT-Grundschutz requirements
|
||||
- Formal: Yaml
|
||||
2. Deploy the full openDesk stack from scratch:
|
||||
- All deployment steps must be successful (green)
|
||||
- All tests from the end-to-end test set must be successful
|
||||
3. Update deployment of the full openDesk stack and apply the quality measures from the step #1:
|
||||
- Deploy the current merge target baseline (`develop` or `main`)
|
||||
- Update deploy from your QA branch into the instance from the previous step
|
||||
4. No showstopper found regarding:
|
||||
- SBOM compliance[^2]
|
||||
- Malware check
|
||||
- CVE check[^3]
|
||||
- Kubescape scan[^3]
|
||||
|
||||
Steps #1 to #3 from above are executed as GitLab CI and documented within GitLab.
|
||||
|
||||
Step #4 is focused on security and has not been fully implemented yet. Its main objective is to check for regressions. That step is just the second step of a security check and monitoring chain, as shown below. While some checks can be executed against static artifacts (e.g., container images), others might require an up-and-running instance. These are specifically located in the third step below, which has not yet been implemented.
|
||||
|
||||
```mermaid
|
||||
flowchart TD
|
||||
A[<u><b>Container image</b></u>
|
||||
checks during build time
|
||||
e.g. based on openDesk
|
||||
reference implementation 'gitlab-config'.
|
||||
>> Can the artifact be integrated? <<
|
||||
] -->|integrate artifacts| B[<u><b>Deployment automation</b></u> SQG
|
||||
based on GitLab CI, during
|
||||
technical release process.
|
||||
>> Can the platform be released? <<
|
||||
]
|
||||
B-->|release| C[<u><b>openDesk release</b></u> monitoring
|
||||
on a regular e.g. daily or live basis.
|
||||
>> Do we need to fix something? <<
|
||||
]
|
||||
```
|
||||
|
||||
#### Branch workflows
|
||||
|
||||
This section will explain the workflow for each branch type based on the Gitflow picture from above.
|
||||
|
||||
##### `main`
|
||||
|
||||
- `QA 'nightly main'`: Execute the SQG based on the most recent release. The upgrade test environment should be a long-standing environment that only gets built from scratch with the previous technical release when something breaks the environment.
|
||||
Merge points: We are using the [Semantic Release convention](https://github.com/semantic-release/semantic-release), which is based on the [Semantic Versioning (SemVer) notation](https://semver.org), to automatically create technical releases on the merge points.
|
||||
- "No release": When a merge from `develop` includes only changes from `docs` branches, the merge into `main` will only consist of `docs` or `chore` commits. That merge will generate no new release.
|
||||
- "Patch or minor release": When changes from `fix` branches get merged, these might contain `fix` or `feat` commits, causing a new technical release to be built with an updated version on the Patch or Minor level.
|
||||
- "Minor or major release": When changes from `feat` branches get merged, these might contain `feat` commits even with breaking changes, causing a technical release to be built with an updated version on the Minor or Major level.
|
||||
- "Manual Functional Release Activities": Technical releases are loosely coupled to functional releases. The additional activities for a functional release select an existing technical release as a basis to generate the artifacts required for a functional release, for example:
|
||||
- Conduct additional manual explorative and regression tests.
|
||||
- Perform checks like IT Grundschutz, Accessibility, or Data Protection.
|
||||
|
||||
##### `develop`
|
||||
|
||||
- `QA 'nightly develop'`: Follows the same approach as `QA 'nightly main'` - execute the SQG based on the head revision of the `develop` branch.
|
||||
- `QA 'release merge'`: The Merge Request for this merge has to be created manually by members of the platform development team. It should document:
|
||||
- That the SQG was successfully executed upon the to-be merged state - it could be done explicitly or based on a `QA 'nightly develop'`
|
||||
- In case of `fix` changes that usually have no test automation, Changes have been verified by a member of the platform development team.
|
||||
- That the changes have been reviewed by at least two members of the platform development team, giving their approval on the Merge Request.
|
||||
- Merge points (from `docs`, `fix`, and `feat` branches): No additional activity on these merge points as the QA is ensured before the merge in the aforementioned branch types.
|
||||
|
||||
##### `docs`
|
||||
|
||||
Branches of type `docs` only contain the commits themselves and have to adhere to the workflow basic fact that: All merges into `develop` or `main` require two approvals from the platform development team.
|
||||
|
||||
##### `fix`
|
||||
|
||||
Besides the actual changes being committed in an `fix` branch, there is only the:
|
||||
- `QG 'fix'`: Besides validating the actual change, the branch's owner has to ensure the successful execution of the SQG.
|
||||
|
||||
##### `feat`
|
||||
|
||||
This branch type requires the most activities on top of the actual development:
|
||||
- `QG 'feat'`: The branch owner has to validate the implemented functionality and ensure the SQG is passed successfully.
|
||||
- `Manual Feature QA`:
|
||||
- This is the interface between the platform development workflow and the supplier work package workflow.
|
||||
- The openDesk QA team validates the change, ideally based on the acceptance criteria defined in the supplier's work package definition.
|
||||
- QA passes on the feedback to the developer/supplier if improvements are needed.
|
||||
- Test cases for the feature's test automation are defined if the QA was successful.
|
||||
- QA should also evaluate if there is a need for end-user documentation of the feature.
|
||||
- `Develop Test`: The test cases are implemented by the openDesk platform development and added to the openDesk end-to-end test suite.
|
||||
- `Documentation`: When required, the documentation team has to update the end-user documentation.
|
||||
|
||||
#### Branch names
|
||||
|
||||
Branches created from the `develop` branch have to adhere to the following notation: `<responsible_developer>/<type>_<details>`:
|
||||
|
||||
- `<responsible_developer>`: Something that makes you identifiable as the owner of the branch, e.g. the first letter of your first name followed by your family name.
|
||||
- `<type>`: From the list of branch types explained above:
|
||||
- `docs`
|
||||
- `fix`
|
||||
- `feat`
|
||||
- `<details>`: A very short note about what is going to happen in the branch and ideally what component is affected from the following list of components:
|
||||
- `helmfile`
|
||||
- `ci`
|
||||
- `docs`
|
||||
- `collabora`
|
||||
- `cryptpad`
|
||||
- `element`
|
||||
- `jitsi`
|
||||
- `nextcloud`
|
||||
- `nubus`
|
||||
- `open-xchange`
|
||||
- `openproject`
|
||||
- `services`
|
||||
- `xwiki`
|
||||
|
||||
Example: `tmueller/fix_jitsi_theming`.
|
||||
|
||||
> **Note**<br>
|
||||
> The above naming convention has yet to be enforced, but please ensure you use it.
|
||||
|
||||
#### Commit messages / Conventional Commits
|
||||
|
||||
Commit messages must adhere to the [Conventional Commit standard](https://www.conventionalcommits.org/en/v1.0.0/#summary). Commits that do not adhere to the standard get rejected by either [Gitlab push rules](https://docs.gitlab.com/ee/user/project/repository/push_rules.html) or the CI.
|
||||
|
||||
> **Note**<br>
|
||||
> The first letter after the `: ` must be uppercase.
|
||||
|
||||
```text
|
||||
<type>(<scope>): <Short summary> [path/to/issue#1]
|
||||
│ │ │ │
|
||||
│ │ | └─> Issue reference (optional)
|
||||
│ │ |
|
||||
│ │ └─> Summary in present tense, sentence case, with no period at the end
|
||||
│ │
|
||||
│ └─> Commit Scope: helmfile, docs, collabora, nextcloud, open-xchange, etc.
|
||||
│
|
||||
└─> Commit Type: chore, ci, docs, feat, fix
|
||||
```
|
||||
|
||||
Example: `fix(open-xchange): Bump to 8.26 to heal issue with functional mailbox provisioning.`
|
||||
|
||||
> **Note**<br>
|
||||
> The commit messages are an essential part of the [technical releases](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/releases) as the release notes are generated from these messages.
|
||||
|
||||
#### Verified commits
|
||||
|
||||
We only allow verified commits; please read on about the options you have to make your commits verified:
|
||||
- https://docs.gitlab.com/user/project/repository/signed_commits/ssh/
|
||||
- https://docs.gitlab.com/user/project/repository/signed_commits/gpg/
|
||||
- https://docs.gitlab.com/user/project/repository/signed_commits/x509/
|
||||
|
||||
# Footnotes
|
||||
|
||||
[^1]: These approval rules are not available in the GitLab Free Tier, which is one of the main reasons why deployment automation is not developed on openCode.
|
||||
|
||||
[^2]: The SBOM process is executed asynchronously with the development process and tests the most current technical release from the `main` branch. The process still needs to be fully automated.
|
||||
|
||||
[^3]: The quality gate needs to be implemented primarily when identifying regressions.
|
||||
17
docs/enhanced-configuration.md
Normal file
@@ -0,0 +1,17 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Enhanced configuration use cases for openDesk</h1>
|
||||
|
||||
# Overview
|
||||
|
||||
The following enhanced configuration use cases are described in their respective documents:
|
||||
|
||||
- [Separate mail & Matrix domain](./enhanced-configuration/separate-mail-matrix-domain.md)
|
||||
- [Federation with external identity provider](./enhanced-configuration/idp-federation.md)
|
||||
- [Matrix federation](./enhanced-configuration/matrix-federation.md)
|
||||
- [Groupware migration from M365 to openDesk](./enhanced-configuration/groupware-migration.md)
|
||||
- [Self-signed certificate and custom Certificate Authority (CA)](./enhanced-configuration/self-signed-certificates.md)
|
||||
- [GitOps deployments using Argo CD](./enhanced-configuration/gitops.md)
|
||||
60
docs/enhanced-configuration/gitops.md
Normal file
@@ -0,0 +1,60 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>GitOps Deployment</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Considerations](#considerations)
|
||||
* [ArgoCD](#argocd)
|
||||
* [Option 1: Use YAML manifests](#option-1-use-yaml-manifests)
|
||||
* [Option 2: Helmfile plugin](#option-2-helmfile-plugin)
|
||||
<!-- TOC -->
|
||||
|
||||
The recommended deployment method for openDesk is via Helmfile. This can be done "by hand", via CI/CD (Gitlab) or using
|
||||
the [GitOps](https://about.gitlab.com/topics/gitops/) approach with tools like [Argo CD](https://argoproj.github.io/cd/).
|
||||
|
||||
This documentation will use Argo CD to explain how to deploy openDesk GitOps-style.
|
||||
|
||||
# Considerations
|
||||
|
||||
- openDesk consists of multiple applications which have to be deployed in order.
|
||||
- During upgrades, migrations have to run before and after applications.
|
||||
|
||||
# ArgoCD
|
||||
|
||||
We are continuously improving our Argo CD support, please share you experience with Argo CD deployments e.g. by [creating
|
||||
a ticket](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/issues).
|
||||
|
||||
There are two options to deploy openDesk via Argo CD described in the following sections.
|
||||
|
||||
## Option 1: Use YAML manifests
|
||||
|
||||
This option requires a preprocessing step before using Argo CD. This step requires you to compile the Helmfile based
|
||||
deployment into Kubernetes YAML manifest, to do so you need to execute the helmfile binary:
|
||||
|
||||
```shell
|
||||
helmfile template > opendesk.yaml
|
||||
```
|
||||
|
||||
References:
|
||||
- [Helmfile CLI documentation](https://helmfile.readthedocs.io/en/latest/#cli-reference)
|
||||
- [Generate K8s YAML Manifests for openDesk](https://gitlab.opencode.de/bmi/opendesk/deployment/options/generate-k8s-yaml-manifests)
|
||||
|
||||
Afterwards, you can use the resulting manifests within a standard Argo CD workflow.
|
||||
|
||||
> **Note**<br>
|
||||
> When creating the Argo CD application based on the resulting manifests, you must not use the `Automated Sync Policy`
|
||||
> offered by Argo CD, as you have to manually ensure the applications are updated in the required sequence.
|
||||
|
||||
## Option 2: Helmfile plugin
|
||||
|
||||
It is possible to deploy openDesk via Argo CD with the community developed
|
||||
[Helmfile plugin](https://github.com/travisghansen/argo-cd-helmfile).
|
||||
|
||||
You can find an example for this approach in the
|
||||
[Argo CD Deployments](https://gitlab.opencode.de/bmi/opendesk/deployment/options/argocd-deploy) repository.
|
||||
It contains an example Helm chart (`opendesk-parent`) to create Argo CD Applications via a Helm chart (`opendesk`)
|
||||
according to `app of apps pattern`. It uses sync waves to ensure the deployment matches requirements and the update sequence
|
||||
for openDesk is satisfied.
|
||||
224
docs/enhanced-configuration/groupware-migration.md
Normal file
@@ -0,0 +1,224 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Migration from M365 with audriga migration service and master authentication</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Prerequisites](#prerequisites)
|
||||
* [Prepare M365 tenant for access](#prepare-m365-tenant-for-access)
|
||||
* [Provisioning user accounts in openDesk](#provisioning-user-accounts-in-opendesk)
|
||||
* [Deploy openDesk with master authentication](#deploy-opendesk-with-master-authentication)
|
||||
* [Migration configuration](#migration-configuration)
|
||||
* [Select the source provider and configure your openDesk instance](#select-the-source-provider-and-configure-your-opendesk-instance)
|
||||
* [Adding accounts](#adding-accounts)
|
||||
* [Add user accounts individually](#add-user-accounts-individually)
|
||||
* [Add multiple user accounts via CSV file](#add-multiple-user-accounts-via-csv-file)
|
||||
* [Start the migration](#start-the-migration)
|
||||
* [Monitor migration status](#monitor-migration-status)
|
||||
* [Appendix](#appendix)
|
||||
* [Validating master authentication](#validating-master-authentication)
|
||||
<!-- TOC -->
|
||||
|
||||
Most organizations already have email accounts on various platforms that need to be migrated to openDesk. This document describes the migration from M365 accounts to openDesk using the [audriga Migration Service](https://www.audriga.com) in combination with the master authentication option in openDesk. Other source platforms are also supported, and their migrations work in a similar manner.
|
||||
|
||||
The migration can be configured on audriga's self-service website, accessed with most common web browsers (e.g. IE, Firefox, Safari or Chrome). No software needs to be installed on your machine. The service connects to your mailbox similarly to what your email client does. Emails, attachments, folders, and, depending on the source systems, contacts, tasks, notes, and calendar data are copied to your destination account. See [M365 to OX Migration Guide](https://audriga.com/fileadmin/guides/en/MS365-OX.pdf) for the scope and limitations of the process.
|
||||
|
||||
The data in the source mailbox will not be deleted or altered. To configure a migration, only three simple steps in audriga's self-service portal have to be completed. After the migration has started, its status can be continuously monitored on the website.
|
||||
|
||||
It may not be possible to complete especially large or complex migrations with only this guide. If you identify issues related to I/O, bandwidth, time constraints, or anything else that makes the migration more complicated than you are comfortable handling on your own using the self-service, please contact [audriga's support](mailto:support@audriga.com).
|
||||
|
||||
# Prerequisites
|
||||
|
||||
## Prepare M365 tenant for access
|
||||
|
||||
The following instructions provide information on how to authenticate Microsoft 365 / Exchange Online accounts in the audriga migration service with "modern authentication" using a service account without the need to provide a username and password for each mailbox that will be migrated.
|
||||
|
||||
You will have to select an existing user account that will be used as a service account for the migration. You have to register the audriga application and create an M365 email group known only to you, as described in the following steps:
|
||||
|
||||
***1. Select one account to serve as a service account***
|
||||
|
||||
Please note that the account that shall serve as the service account requires a Microsoft 365/Exchange online license (mailbox).
|
||||
|
||||
> **Note**<br>
|
||||
> If you want to designate your admin account as a service account, you have to provide the admin with a license.
|
||||
|
||||
***2. Register the audriga app in your tenant***
|
||||
|
||||
To register the audriga app in your tenant, log into your admin account and access the following URL:
|
||||
|
||||
https://login.microsoftonline.com/organizations/v2.0/adminconsent?client_id=3cd27a72-a19e-4945-9715-fc24d940428f&redirect_uri=https://umzug.audriga.com/SMESwitchWebApp/oauth_complete.jsp&scope=https://outlook.office.com/.default
|
||||
|
||||
- Accept the App "audriga CloudMovr migration"
|
||||
- You will be redirected to an audriga page, which you can close - it does not require additional interaction.
|
||||
|
||||
> **Note**<br>
|
||||
> The audriga application is created under the "Enterprise application" tab in the AzureAD console.
|
||||
|
||||
***3. Create a "secret" group in the M365 tenant***
|
||||
|
||||
Create a "secret" group in the customer tenant.
|
||||
|
||||
- Go to <https://aad.portal.azure.com> > Azure Active Directory > Groups > New Group
|
||||
- Choose a group name and group email address that includes the word "audriga" in lowercase ("Audriga" will not work), like *audriga-migration@your-maildomain.tld*
|
||||
- Choose the group type "Microsoft 365"
|
||||
- Appoint your service account (see 1.) as the owner of this group
|
||||
|
||||
|
||||
## Provisioning user accounts in openDesk
|
||||
|
||||
In openDesk, you have to have all user accounts with mailboxes pre-defined before running the migration. You can either manually create your accounts using an IAM administrator or use the [user import tool](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/user-import) to batch import user accounts to your openDesk deployment.
|
||||
|
||||
## Deploy openDesk with master authentication
|
||||
|
||||
With openDesk 1.0 Enterprise, you can set openDesk's email components (OX AppSuite and OX Dovecot) to master authentication mode to run the migration as described in this document using the following two settings for your deployment. This is NOT available in openDesk Community deployments:
|
||||
|
||||
```
|
||||
secrets:
|
||||
oxAppSuite:
|
||||
migrationsMasterPassword: "your_temporary_master_password"
|
||||
functional:
|
||||
migration:
|
||||
oxAppSuite:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
1. You must specify a master password, it will be referenced later in this document.
|
||||
2. You need to enable the actual master authentication mode.
|
||||
|
||||
To validate the master authentication mode please read the appendix section at the end of the document.
|
||||
|
||||
Updating your deployment with these settings will allow you to continue with the migration scenario. Once the migration is completed, you can remove `secrets.oxAppSuite.migrationsMasterPassword` and need to turn off the migration mode by setting `functional.migration.oxAppSuite.enabled` to `false` or removing that setting, as `false` is the default before you update your deployment once again.
|
||||
|
||||
> **Note**<br>
|
||||
> For the changes to take effect, it is sufficient to re-deploy the `open-xchange` component alone. But you have to restart the Dovecot Pod(s) manually when switching to/from the master authentication mode for the changes to take effect.
|
||||
|
||||
> **Note**<br>
|
||||
> While in master authentication mode, regular users cannot log in to the webmail module of openDesk or access the mail using IMAP, as it is not recommended that users interact with the target mail infrastructure during the migration scenario described in this document.
|
||||
|
||||
# Migration configuration
|
||||
|
||||
The migration is configured in 3 steps using the [audriga migration self-service](https://umzug.audriga.com/SMESwitchWebApp/?client=groupware).
|
||||
|
||||
Ensure you meet the prerequisites. For example, this document does not support using the standard username/password-based authentication option for M365.
|
||||
|
||||
## Select the source provider and configure your openDesk instance
|
||||
|
||||
Choose [Microsoft 365 / Exchange Online (Admin)](https://umzug.audriga.com/SMESwitchWebApp/?client=groupware#src=onmicrosoft.com) as your current provider.
|
||||
|
||||
> **Note**<br>
|
||||
> You may need to start typing in "Microsoft Office 365/Exchange Online" for it to appear in the list.
|
||||
|
||||
Configure openDesk as your destination server:
|
||||
- Select "Configure provider or server" in the provider selection box of the migration application.
|
||||
- In the following dialog, select "Open-Xchange" as protocol.
|
||||
- On the tab "IMAP"
|
||||
- For "Mailserver (host name or IP address)" enter your IMAP host, e.g. "webmail.your-opendesk-domain.tld".
|
||||
- If your IMAP server is not running on default port 993, enter your nonstandard IMAP port under Details -> Port.
|
||||
- Press check.
|
||||
- On the tab "Open-Xchange"
|
||||
- Set the hostname of your OX AppSuite installation, e.g. "webmail.your-opendesk-domain.tld".
|
||||
- Press check.
|
||||
- If you receive a green checkmark on both tabs, click "Save". Otherwise, check your settings until you get the green checkmark.
|
||||
|
||||
## Adding accounts
|
||||
|
||||
You can add accounts one by one, which seems only feasible for test scenarios, or when you migrate a handful of mailboxes, or you can add accounts using CSV upload. Both options are described in the following subsections.
|
||||
|
||||
### Add user accounts individually
|
||||
|
||||
By default, you will enter the "Add Mailbox" tab where you can add individual accounts for M365:
|
||||
|
||||
```
|
||||
Username: enter the username of the service account, e.g. eva@your-maildomain.tld
|
||||
Password: enter the particular group email address, e.g. audriga-migration@your-maildomain.tld
|
||||
Details -> mailbox: enter the user's mailbox you want to migrate, e.g. pia@your-maildomain.tld
|
||||
```
|
||||
|
||||
On the openDesk site, please provide:
|
||||
```
|
||||
Username: enter the username of the mailbox you want to migrate to, e.g. pia@your-maildomain.tld
|
||||
Password: enter the master password
|
||||
```
|
||||
|
||||
Click on check to verify the credentials. If the data is correct, a green checkmark will appear. A red cross will be displayed if the credentials need to be corrected.
|
||||
|
||||
After checking and confirming, you can use the same procedure to add further mailboxes.
|
||||
|
||||
Alternatively, you can add multiple accounts via CSV upload. More info on that below.
|
||||
|
||||
### Add multiple user accounts via CSV file
|
||||
|
||||
Prepare a CSV file with all necessary information. Unsurprisingly, this is the same information as described in the "Add User Accounts Individually" section above.
|
||||
|
||||
The CSV requires the following column order with a closing semicolon after the last value - but no headline is expected; the first line must be your migration data already:
|
||||
```
|
||||
M365ServiceAccount;M365GroupEmailAddress;M365Mailbox;openDeskMailbox;openDeskMasterPassword;
|
||||
```
|
||||
|
||||
Example CSV:
|
||||
```
|
||||
eva@your-maildomain.tld;audriga-migration@your-maildomain.tld;eva@your-maildomain.tld;eva;YourMasterPassword;
|
||||
eva@your-maildomain.tld;audriga-migration@your-maildomain.tld;max@your-maildomain.tld;max;YourMasterPassword;
|
||||
eva@your-maildomain.tld;audriga-migration@your-maildomain.tld;pia@your-maildomain.tld;pia;YourMasterPassword;
|
||||
eva@your-maildomain.tld;audriga-migration@your-maildomain.tld;ida@your-maildomain.tld;ida;YourMasterPassword;
|
||||
```
|
||||
|
||||
Select the "Add multiple accounts" tab to configure up to 50 user accounts by uploading a CSV file. If you need to migrate more accounts, you can execute the migration multiple times.
|
||||
|
||||
Click "Check" and save afterwards.
|
||||
|
||||
## Start the migration
|
||||
|
||||
You will see a summary of the migration, including the number of accounts and the amount of data. Even if the analysis of the source accounts has not yet been completed, you can proceed.
|
||||
|
||||
Ensure you have a valid voucher; otherwise, you must complete the payment process.
|
||||
|
||||
Press "Start Migration" to proceed.
|
||||
|
||||
## Monitor migration status
|
||||
|
||||
The migration process may take some time to start. For large amounts of data, it may take a couple of hours.
|
||||
|
||||
Click on "Details" to get further information about the migration.
|
||||
|
||||
You can access a detailed log for each account by clicking "Protocol" on the right-hand side. Here, you can see detected duplicates or encountered errors (e.g., if emails cannot be transferred due to your provider's size limitations).
|
||||
|
||||
You will receive status emails for the migration job's submission and start, as well as when the migration job is finished. The emails are sent to the email address you have entered during the configuration. Those emails include a link to the status website so you can easily track and monitor your migration. Once the migration has been started, you can safely close the status website and shut down your computer; the migration will continue. You can re-open the status website anytime.
|
||||
|
||||
# Appendix
|
||||
|
||||
## Validating master authentication
|
||||
|
||||
Below are details in case you want to verify master authentication for Dovecot and OX AppSuite.
|
||||
|
||||
Set a few variables first:
|
||||
|
||||
```shell
|
||||
export MIG_DOMAIN=your-opendesk-domain.tld
|
||||
export MIG_WEBMAIL_HOST=webmail
|
||||
export MIG_USERNAME=eva
|
||||
export MIG_MASTER_PASSWORD=YourMasterPassword
|
||||
export MIG_IMAP_PORT=31123
|
||||
```
|
||||
|
||||
Ensure that you have defined a (your) default context for the migration where the account (in this example `eva`) can be found. The following should be executed in OX App Suite's `open-xchange-core-mw-default-0` container, in the example we set the default context to `1`:
|
||||
|
||||
```shell
|
||||
/opt/open-xchange/sbin/changecontext -c 1 -L defaultcontext -A $MASTER_ADMIN_USER -P $MASTER_ADMIN_PW
|
||||
```
|
||||
|
||||
With the preparation from above you should be able to successfully authenticate to both components:
|
||||
|
||||
**OX App Suite**
|
||||
|
||||
```shell
|
||||
curl -X POST -d "name=${MIG_USERNAME}&password=${MIG_MASTER_PASSWORD}" "https://${MIG_WEBMAIL_HOST}.${MIG_DOMAIN}/appsuite/api/login?action=login"
|
||||
```
|
||||
|
||||
**Dovecot**
|
||||
|
||||
```shell
|
||||
echo "a001 LOGIN ${MIG_USERNAME} ${MIG_MASTER_PASSWORD}" | openssl s_client -ign_eof -connect ${MIG_DOMAIN}:${MIG_IMAP_PORT}
|
||||
```
|
||||
186
docs/enhanced-configuration/idp-federation.md
Normal file
@@ -0,0 +1,186 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Federation with external identity provider (IdP)</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [References](#references)
|
||||
* [Prerequisites](#prerequisites)
|
||||
* [User accounts](#user-accounts)
|
||||
* [External IdP with OIDC](#external-idp-with-oidc)
|
||||
* [Example configuration](#example-configuration)
|
||||
* [Versions](#versions)
|
||||
* [Example values](#example-values)
|
||||
* [Keycloak admin console access](#keycloak-admin-console-access)
|
||||
* [Your organizations IdP](#your-organizations-idp)
|
||||
* [Separate realm](#separate-realm)
|
||||
* [OIDC Client](#oidc-client)
|
||||
* [openDesk IdP](#opendesk-idp)
|
||||
<!-- TOC -->
|
||||
|
||||
Most organizations already have an Identity and Access Management (IAM) system with an identity provider (IdP) for single sign-on (SSO) to internal or external web applications.
|
||||
|
||||
This document helps in setting up your organization's IdP and openDesk to enable IdP federation.
|
||||
|
||||
# References
|
||||
|
||||
We would like to list successful IdP federation scenarios:
|
||||
|
||||
| External IdP | openDesk versions tested |
|
||||
|---------------------------------------------------------------------|--------------------------|
|
||||
| [EU Login](https://webgate.ec.europa.eu/cas/userdata/myAccount.cgi) | v0.9.0, v1.2.0 |
|
||||
| [ProConnect](https://www.proconnect.gouv.fr/) | v0.9.0 |
|
||||
|
||||
> If you have successfully federated using another External IdP, please let us know so we can update the list above.
|
||||
|
||||
# Prerequisites
|
||||
|
||||
## User accounts
|
||||
|
||||
In addition to the configuration, it is required that user accounts with the same name exist within openDesk. While this prerequisite is outside the scope of this document, the following approaches are feasible:
|
||||
|
||||
- Manual user management
|
||||
- A lightweight option to test your IdP federation setup or if you have only a small number of users to manage.
|
||||
- Create and maintain your user(s) in openDesk and ensure the username in your IAM and openDesk is identical.
|
||||
- User import
|
||||
- If you need to create more than just a couple of test accounts, you can use the [openDesk User Importer](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/user-import) that utilizes the UDM REST API for user account creation.
|
||||
- Downsides: Managing groups and deleting accounts needs to be done manually.
|
||||
- Automated Pre-provisioning:
|
||||
- Pre-provisioning users and groups, including de-provisioning (deleting) accounts, is the best practice to ensure that openDesk is in sync with your organization's IAM.
|
||||
- There are at least two ways of implementing the pre-provisioning:
|
||||
- UDM REST API:
|
||||
- Build a provisioning solution using the [UDM REST API](https://docs.software-univention.de/developer-reference/5.0/en/udm/rest-api.html).
|
||||
- The API gives you complete control over the contents of the IAM to create, update, or delete users and groups.
|
||||
- Nubus Directory Importer:
|
||||
- It is based on a Python one-way directory synchronization for users and groups.
|
||||
- Please find more details in the [upstream product's documentation](https://docs.software-univention.de/nubus-kubernetes-operation/latest/en/howto-connect-external-iam.html).
|
||||
- Ad-hoc provisioning (AHP)
|
||||
- This feature is currently unavailable in openDesk's Keycloak, but Univention plans to make it available in the future.
|
||||
- Ad-hoc provisioning creates a user account on the fly during a user's first login.
|
||||
- While ad-hoc provisioning is an excellent approach for a quick start with openDesk, it has various downsides:
|
||||
- Users are created after their first login, so you cannot find your colleagues in the openDesk apps unless they have already logged in once.
|
||||
- A user account would never be deactivated or deleted in openDesk.
|
||||
- Group memberships are not transferred.
|
||||
|
||||
## External IdP with OIDC
|
||||
|
||||
This document focuses on the OIDC federation between an external IdP and the openDesk IdP. It uses the OpenID Connect (OIDC) protocol, so your external IdP must support OIDC.
|
||||
|
||||
# Example configuration
|
||||
|
||||
The following section explains how to configure the IdP federation manually in an example upstream IdP and in openDesk.
|
||||
|
||||
With openDesk 1.4.0 IdP federation has to be enabled as part of the deployment using the `functional.authentication.ssoFederation` section, see [`functional.yaml.gotmpl`](../../helmfile/environments/default/functional.yaml.gotmpl) for reference.
|
||||
|
||||
You can use the description below to configure and test the federation that can be exported and used as part of the deployment afterwards, e.g. with the following commands from within the Keycloak Pod:
|
||||
|
||||
```shell
|
||||
# Set the variables according to your deployment first, below are just example values.
|
||||
export FEDERATION_IDP_ALIAS=sso-federation-idp
|
||||
export NAMESPACE=example_namespace
|
||||
export CLUSTER_NETWORKING_DOMAIN=svc.cluster.local
|
||||
# Authenticate with Keycloak
|
||||
/opt/keycloak/bin/kcadm.sh config credentials --server http://ums-keycloak.${NAMESPACE}.${CLUSTER_NETWORKING_DOMAIN}:8080 --realm master --user ${KEYCLOAK_ADMIN} --password ${KEYCLOAK_ADMIN_PASSWORD}
|
||||
# Request details of IdP configuration
|
||||
/opt/keycloak/bin/kcadm.sh get identity-provider/instances/${FEDERATION_IDP_ALIAS} -r opendesk
|
||||
```
|
||||
|
||||
## Versions
|
||||
|
||||
The example was tested with openDesk v0.7.0 using its integrated Keycloak v24.0.3. As external IdP, we also used an openDesk deployment of the same version, but created a separate realm for proper configuration separation.
|
||||
|
||||
## Example values
|
||||
|
||||
The following values are used in this example documentation. Please ensure when you come across such a value, even if it is part of a URL hostname or path, that you adapt it where needed to your setup:
|
||||
|
||||
- `idp.organization.tld`: hostname for your organization's IdP.
|
||||
- `id.opendesk.tld`: hostname for the openDesk IdP, so openDesk is deployed at `opendesk.tld`.
|
||||
- `fed-test-idp-realm`: realm name for your organization's IdP.
|
||||
- `opendesk-federation-client`: OIDC client for the openDesk federation defined in your organization's IdP.
|
||||
- `sso-federation-idp`: Identifier of your organization IdP's configuration within the openDesk Keycloak.
|
||||
- `sso-federation-flow`: Identifier of the required additional login flow to be created and referenced in the openDesk Keycloak.
|
||||
|
||||
## Keycloak admin console access
|
||||
|
||||
To access the Keycloak admin console in an openDesk deployment, you must add a route for `/admin` to the Keycloak ingress. This is done automatically if you deploy openDesk with `debug.enabled: true`, but beware that this will also cause a lot of log output across all openDesk pods.
|
||||
|
||||
The admin console will be available at:
|
||||
- Organization's IdP: https://idp.organization.tld/admin/master/console/
|
||||
- openDesk IdP: https://id.opendesk.tld/admin/master/console/
|
||||
|
||||
For the following configuration steps, log in with user `kcadmin` and grab the password from the `ums-keycloak` pod's `KEYCLOAK_ADMIN_PASSWORD` variable.
|
||||
|
||||
## Your organizations IdP
|
||||
|
||||
In this example, we use the Keycloak of another openDesk instance to simulate your organization's IdP. However, URL paths differ if you use another product.
|
||||
|
||||
Please let us know about your experiences or any differences you encountered.
|
||||
|
||||
### Separate realm
|
||||
|
||||
To not interfere with an existing configuration for our test scenario, we create a separate realm:
|
||||
|
||||
- `Create realm` (from the realm selection drop-down menu in the left upper corner)
|
||||
- *Realm name*: `fed-test-idp-realm`
|
||||
- `Create`
|
||||
|
||||
### OIDC Client
|
||||
|
||||
If you just created the `fed-test-idp-realm`, you are already in the admin screen for the realm; if not, use the realm selection drop-down menu in the upper left corner to switch to the realm.
|
||||
|
||||
- *Clients* > *Create Client*
|
||||
- Client create wizard page 1:
|
||||
- *Client type*: `OpenID Connect`
|
||||
- *Client-ID*: `opendesk-federation-client`
|
||||
- *Name*: `openDesk @ your organization` (this is the descriptive text of the client that might show up in your IdP's UI and therefore should explain what the client is used for)
|
||||
- Client create wizard page 2:
|
||||
- *Client authentication*: `On`
|
||||
- *Authorization*: `Off` (default)
|
||||
- *Authentication flow*: leave defaults
|
||||
- `Standard flow`
|
||||
- `Direct access grants`
|
||||
- Client create wizard page 3:
|
||||
- *Valid Redirect URLs*: `https://id.opendesk.tld/realms/opendesk/broker/sso-federation-idp/endpoint`
|
||||
- When completed with *Save*, you get to the detailed client configuration that also needs some updates:
|
||||
- Tab *Settings* > Section *Logout settings*
|
||||
- *Front channel logout*: `Off`
|
||||
- *Back channel logout URL*: `https://id.opendesk.tld/realms/opendesk/protocol/openid-connect/logout/backchannel-logout`
|
||||
- Tab *Credentials*
|
||||
- Copy the *Client Secret* and the *Client-ID* as we need them to configure the openDesk IdP.
|
||||
|
||||
## openDesk IdP
|
||||
|
||||
> **Note**
|
||||
> While manual configuration is possible, an SSO federation can also be configured as part of the deployment.
|
||||
> Check `functional.authentication.ssoFederation` section from the `functional.yaml.gotmpl` for details.
|
||||
|
||||
The following configuration is taking place in the Keycloak realm `opendesk`.
|
||||
|
||||
- *Authentication* > *Create flow*
|
||||
- *Name*: `sso-federation-flow`
|
||||
- *Flow type*: `Basic flow`
|
||||
- *Create*
|
||||
- *Add execution*: Add `Detect existing broker user` and set it to `Required`
|
||||
- *Add step*: `Automatically set existing user` and set it to `Required`
|
||||
|
||||
- *Identity providers* > *User-defined* > *OpenID Connect 1.0*
|
||||
- *Alias*: `sso-federation-idp` (used in our example)
|
||||
- *Display Name*: A descriptive Name, in case you do not forcefully redirect the user to the IdP, that name is shown on the login screen for manual selection.
|
||||
- *Use discovery endpoint*: `On` (default)
|
||||
- *Discovery endpoint*: `https://idp.organization.tld/realms/fed-test-idp-realm/.well-known/openid-configuration` - this URL may look different if you do not use Keycloak or a different Keycloak version as IdP in your organization
|
||||
- You will get an error if the IdP metadata cannot be auto-discovered.
|
||||
- If everything is fine, you can review the discovered metadata for your IdP by clicking on *Show metadata*.
|
||||
- *Client authentication*: `Client secret sent as post` (default)
|
||||
- *Client ID*: Use the client ID you took from your organization's IdP config (`opendesk-federation-client` in this example)
|
||||
- *Client Secret*: Use the secret you took from your organization's IdP config
|
||||
- When completed with *Add*, you get to the detailed IdP configuration which at least needs the following update:
|
||||
- *First login flow override*: `sso-federation-flow`
|
||||
- Depending on your organizations IdP and process preferences, additional configuration may be required
|
||||
|
||||
- In case you want to forcefully redirect all users to your organization's IdP (disabling login with local openDesk accounts):
|
||||
- *Authentication* > `2fa-browser`
|
||||
- Click on the cogwheel next to the *Identity Provider Re-director*
|
||||
- *Alias*: `sso-federation-idp`
|
||||
- *Default Identity Provider*: `sso-federation-idp`
|
||||
59
docs/enhanced-configuration/matrix-federation.md
Normal file
@@ -0,0 +1,59 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Matrix federation</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Example configuration](#example-configuration)
|
||||
* [Disable federation](#disable-federation)
|
||||
* [Separate Matrix domain](#separate-matrix-domain)
|
||||
<!-- TOC -->
|
||||
|
||||
The Element chat application and its server component Synapse are based on the Matrix protocol,
|
||||
which supports federation with other Matrix servers, allowing communication with the users with accounts on these servers.
|
||||
|
||||
By default, you can chat with users who have an account within your openDesk installation and federate with other
|
||||
matrix-based servers.
|
||||
Federation support can be turned off.
|
||||
|
||||
# Example configuration
|
||||
|
||||
The following values are used in this example documentation.
|
||||
Please ensure when you come across such a value,
|
||||
even if it is part of a URL hostname or path, that you adapt it where needed to your setup:
|
||||
|
||||
- `opendesk.domain.tld`: the mandatory `DOMAIN` setting for your deployment resulting in
|
||||
`https://chat.opendesk.domain.tld` for access to the Element chat.
|
||||
- `my_organization.tld`: an optional alternative domain used for mail and/or Matrix.
|
||||
It is also set to `opendesk.domain.tld` if not used.
|
||||
|
||||
## Disable federation
|
||||
|
||||
The following setting can turn off federation:
|
||||
|
||||
```yaml
|
||||
functional:
|
||||
externalServices:
|
||||
matrix:
|
||||
federation:
|
||||
enabled: false
|
||||
```
|
||||
|
||||
## Separate Matrix domain
|
||||
|
||||
If you want to federate with other Matrix instances and use a separate Matrix domain, you need to provide a JSON file for
|
||||
the Matrix domain to use delegation. It is not part of your openDesk deployment.
|
||||
|
||||
Domain path: `https://my_organization.tld/.well-known/matrix/server`
|
||||
|
||||
Content:
|
||||
```JSON
|
||||
{
|
||||
"m.server": "matrix-federation.opendesk.domain.tld:443"
|
||||
}
|
||||
```
|
||||
|
||||
More detailed information can be found in the Matrix/Synapse documentation:
|
||||
[Matrix Delegation](https://element-hq.github.io/synapse/latest/delegate.html)
|
||||
111
docs/enhanced-configuration/self-signed-certificates.md
Normal file
@@ -0,0 +1,111 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Self-signed certificates and custom Certificate Authority (CA)</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Configuration](#configuration)
|
||||
* [Option 1: Bring Your Own Certificate](#option-1-bring-your-own-certificate)
|
||||
* [Option 2a: Use cert-manager.io with auto-generated namespace based root-certificate](#option-2a-use-cert-managerio-with-auto-generated-namespace-based-root-certificate)
|
||||
* [Option 2b: Use cert-manager.io with a pre-defined or shared root-certificate](#option-2b-use-cert-managerio-with-a-pre-defined-or-shared-root-certificate)
|
||||
<!-- TOC -->
|
||||
|
||||
This document covers:
|
||||
* Deploying openDesk into an environment with custom public key infrastructure (PKI) that is usually not part of
|
||||
public certificate authority chains
|
||||
* deploying openDesk into a local cluster without ACME challenge
|
||||
|
||||
# Configuration
|
||||
|
||||
There are two options to address these use case:
|
||||
|
||||
## Option 1: Bring Your Own Certificate
|
||||
|
||||
This option is useful when you have your own PKI in your environment which is also trusted by all clients that should
|
||||
access openDesk.
|
||||
|
||||
1. Disable cert-manager.io certificate resource creation:
|
||||
|
||||
```yaml
|
||||
certificates:
|
||||
enabled: false
|
||||
```
|
||||
|
||||
2. Enable mount of self-signed certificates:
|
||||
|
||||
```yaml
|
||||
certificate:
|
||||
selfSigned: true
|
||||
```
|
||||
|
||||
3. Create a Kubernetes secret named `opendesk-certificates-tls` of type `kubernetes.io/tls` containing either a valid
|
||||
wildcard certificate or a certificate with [all required subdomains](../../helmfile/environments/default/global.yaml.gotmpl)
|
||||
set as SANs (Subject Alternative Name).
|
||||
|
||||
4. Create a Kubernetes secret with name `opendesk-certificates-ca-tls` of type `kubernetes.io/tls` containing the custom
|
||||
CA certificate as X.509 encoded (`ca.crt`) and as jks trust store (`truststore.jks`).
|
||||
|
||||
5. Create a Kubernetes secret with name `opendesk-certificates-keystore-jks` with key `password` and as value the jks
|
||||
trust store password.
|
||||
|
||||
## Option 2a: Use cert-manager.io with auto-generated namespace based root-certificate
|
||||
|
||||
This option is useful when you do not have a trusted certificate available and can't fetch a certificate from
|
||||
Let’s Encrypt. It will result in a cert-manager managed root certificate in the namespace you deploy openDesk into.
|
||||
|
||||
1. Create self-signed cert-manager.io Cluster Issuer:
|
||||
```yaml
|
||||
apiVersion: "cert-manager.io/v1"
|
||||
kind: "ClusterIssuer"
|
||||
metadata:
|
||||
name: "selfsigned-issuer"
|
||||
spec:
|
||||
selfSigned: {}
|
||||
```
|
||||
|
||||
2. Enable mount and creation of self-signed certificates:
|
||||
```yaml
|
||||
certificate:
|
||||
issuerRef:
|
||||
name: "selfsigned-issuer"
|
||||
selfSigned: true
|
||||
```
|
||||
|
||||
## Option 2b: Use cert-manager.io with a pre-defined or shared root-certificate
|
||||
|
||||
Use this approach if you like to use a pre-created CA root certificate that can be "shared" (as copy) between
|
||||
multiple namespaces in a cluster.
|
||||
|
||||
1. Create self-signed cert-manager.io Cluster Issuer root certificate the same way as in *Option 2a*.
|
||||
|
||||
2. Create the root certificate for the previously created CA, in the example it is placed into the namespace `cert-manager`.
|
||||
```yaml
|
||||
apiVersion: cert-manager.io/v1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: opendesk-root
|
||||
namespace: cert-manager
|
||||
spec:
|
||||
isCA: true
|
||||
commonName: opendesk.eu
|
||||
secretName: opendesk-root-cert-secret
|
||||
subject:
|
||||
organizations: [ "openDesk cluster root certificate organization" ]
|
||||
privateKey:
|
||||
algorithm: ECDSA
|
||||
size: 256
|
||||
issuerRef:
|
||||
name: selfsigned-issuer
|
||||
kind: ClusterIssuer
|
||||
group: cert-manager.io
|
||||
duration: 87600h # 10y
|
||||
renewBefore: 87599h
|
||||
```
|
||||
|
||||
3. Copy this certificates secret into all namespaces you want to make use of the certificate in.
|
||||
|
||||
4. Create an issuer resource in all namespaces you want to make use of the certificate in.
|
||||
|
||||
>The latter two steps are part of the `env-start:` section within [`.gitlab-ci.yml`](../../.gitlab-ci.yml).
|
||||
98
docs/enhanced-configuration/separate-mail-matrix-domain.md
Normal file
@@ -0,0 +1,98 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Separate domains for mail and or Matrix </h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Example configuration](#example-configuration)
|
||||
* [Mail domain](#mail-domain)
|
||||
* [Matrix domain](#matrix-domain)
|
||||
* [DNS](#dns)
|
||||
* [Webserver](#webserver)
|
||||
* [Content Security Policy](#content-security-policy)
|
||||
* [.well-known](#well-known)
|
||||
<!-- TOC -->
|
||||
|
||||
As communication over mail and chat can go beyond the borders of your openDesk installation, you may want to use different domains for the mail and/or Matrix.
|
||||
|
||||
# Example configuration
|
||||
|
||||
The following values are used in this example documentation. Please ensure when you come across such a value, even if it is part of a URL hostname or path, that you adapt it where needed to your setup:
|
||||
|
||||
- `opendesk.domain.tld`: the mandatory `DOMAIN` setting for your deployment resulting in `https://mail.opendesk.domain.tld` to access emails and `https://chat.opendesk.domain.tld` to access the Element chat that is based on the Matrix protocol.
|
||||
- `my_organization.tld`: the alternative domain used for mail and/or Matrix.
|
||||
|
||||
## Mail domain
|
||||
|
||||
By default, all email addresses in openDesk are created based on the `DOMAIN` you specified for your deployment. In our example, the users have `<username>@opendesk.domain.tld` as their mail addresses. In case you prefer the users to send and receive emails with another domain, you can set that one using the optional `MAIL_DOMAIN` in the deployment:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
mailDomain: "my_organization.tld"
|
||||
```
|
||||
|
||||
or via environment variable
|
||||
|
||||
```shell
|
||||
export MAIL_DOMAIN=my_organization.tld
|
||||
```
|
||||
|
||||
Of course, this requires the domain's MX record to point to the mail host for your openDesk deployment. You can optionally add the SPF and DMARC records.
|
||||
|
||||
| Record name | Type | Value |
|
||||
| -------------------------- | ---- | ------------------------------------------------ |
|
||||
| my_organization.tld | MX | `10 mail.opendesk.domain.tld` |
|
||||
| my_organization.tld | TXT | `v=spf1 +a +mx +a:mail.opendesk.domain.tld ~all` |
|
||||
| _dmarc.my_organization.tld | TXT | `v=DMARC1; p=quarantine` |
|
||||
|
||||
## Matrix domain
|
||||
|
||||
Similar to the specific domain for email addresses, you may want to specify a domain that differs from your deployment's default `DOMAIN` to define your user's Matrix IDs. Use the `MATRIX_DOMAIN` to do so:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
matrixDomain: "my_organization.tld"
|
||||
```
|
||||
|
||||
or via environment variable
|
||||
|
||||
```shell
|
||||
export MATRIX_DOMAIN=my_organization.tld
|
||||
```
|
||||
|
||||
### DNS
|
||||
|
||||
The following changes apply to the standard DNS:
|
||||
|
||||
| Record name | Type | Value | Comment |
|
||||
| -------------------------------- | ---- | -------------------------------------- | -------------------------------------------------------------------------------------- |
|
||||
| _matrix._tcp.my_organization.tld | SRV | `1 10 PORT matrix.opendesk.domain.tld` | `PORT` is your NodePort/LoadBalancer port of the `opendesk-synapse-federation` service |
|
||||
|
||||
*Note:* `matrix.opendesk.domain.tld` in the "Value" column can also be the IP address synapse TLS port listens to.
|
||||
|
||||
### Webserver
|
||||
|
||||
#### Content Security Policy
|
||||
|
||||
The `my_organization.tld` webserver should add `*.opendesk.domain.tld` to its CSP header.
|
||||
|
||||
#### .well-known
|
||||
|
||||
If you want to use other Matrix clients,
|
||||
e.g., Element Messenger for [iOS](https://apps.apple.com/de/app/element-messenger/id1083446067)
|
||||
or [Android](https://play.google.com/store/apps/details?id=im.vector.app),
|
||||
you need to create a JSON file with the following contents that is served from
|
||||
`https://my_organization.tld/.well-known/matrix/client`:
|
||||
|
||||
```json
|
||||
{
|
||||
"m.homeserver": {
|
||||
"base_url": "https://matrix.opendesk.domain.tld"
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
The above configuration ensures clients know where to find the Matrix protocol endpoint when users specify `my_organization.tld`
|
||||
as their homeserver.
|
||||
@@ -5,63 +5,137 @@ SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
<h1>External services</h1>
|
||||
|
||||
This document will cover the additional configuration to use external services like databases, caches or buckets.
|
||||
This document will cover the additional configuration for external services like databases, caches, or buckets.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Database](#database)
|
||||
* [Cache](#cache)
|
||||
* [Database](#database)
|
||||
* [Object storage](#object-storage)
|
||||
* [Cache](#cache)
|
||||
* [Footnotes](#footnotes)
|
||||
<!-- TOC -->
|
||||
|
||||
## Database
|
||||
# Database
|
||||
|
||||
When deploying this suite to production, you need to configure the applications to use your production grade database
|
||||
When deploying this suite to production, you need to configure the applications to use your production-grade database
|
||||
service.
|
||||
|
||||
| Component | Name | Type | Parameter | Key | Default |
|
||||
|-------------|--------------------|------------|-----------|----------------------------------------|----------------------------|
|
||||
| Element | Synapse | PostgreSQL | | | |
|
||||
| | | | Name | `databases.synapse.name` | `matrix` |
|
||||
| | | | Host | `databases.synapse.host` | `postgresql` |
|
||||
| | | | Port | `databases.synapse.port` | `5432` |
|
||||
| | | | Username | `databases.synapse.username` | `matrix_user` |
|
||||
| | | | Password | `databases.synapse.password` | |
|
||||
| Keycloak | Keycloak | PostgreSQL | | | |
|
||||
| | | | Name | `databases.keycloak.name` | `keycloak` |
|
||||
| | | | Host | `databases.keycloak.host` | `postgresql` |
|
||||
| | | | Port | `databases.keycloak.port` | `5432` |
|
||||
| | | | Username | `databases.keycloak.username` | `keycloak_user` |
|
||||
| | | | Password | `databases.keycloak.password` | |
|
||||
| | Keycloak Extension | PostgreSQL | | | |
|
||||
| | | | Name | `databases.keycloakExtension.name` | `keycloak_extensions` |
|
||||
| | | | Host | `databases.keycloakExtension.host` | `postgresql` |
|
||||
| | | | Port | `databases.keycloakExtension.port` | `5432` |
|
||||
| | | | Username | `databases.keycloakExtension.username` | `keycloak_extensions_user` |
|
||||
| | | | Password | `databases.keycloakExtension.password` | |
|
||||
| Nextcloud | Nextcloud | MariaDB | | | |
|
||||
| | | | Name | `databases.nextcloud.name` | `nextcloud` |
|
||||
| | | | Host | `databases.nextcloud.host` | `mariadb` |
|
||||
| | | | Username | `databases.nextcloud.username` | `nextcloud_user` |
|
||||
| | | | Password | `databases.nextcloud.password` | |
|
||||
| OpenProject | OpenProject | PostgreSQL | | | |
|
||||
| | | | Name | `databases.openproject.name` | `openproject` |
|
||||
| | | | Host | `databases.openproject.host` | `postgresql` |
|
||||
| | | | Port | `databases.openproject.port` | `5432` |
|
||||
| | | | Username | `databases.openproject.username` | `openproject_user` |
|
||||
| | | | Password | `databases.openproject.password` | |
|
||||
| OX Appsuite | OX Appsuite | MariaDB | | | |
|
||||
| | | | Name | `databases.oxAppsuite.name` | `CONFIGDB` |
|
||||
| | | | Host | `databases.oxAppsuite.host` | `mariadb` |
|
||||
| | | | Username | `databases.oxAppsuite.username` | `root` |
|
||||
| | | | Password | `databases.oxAppsuite.password` | |
|
||||
| XWiki | XWiki | MariaDB | | | |
|
||||
| | | | Name | `databases.xwiki.name` | `xwiki` |
|
||||
| | | | Host | `databases.xwiki.host` | `mariadb` |
|
||||
| | | | Username | `databases.xwiki.username` | `xwiki_user` |
|
||||
| | | | Password | `databases.xwiki.password` | |
|
||||
> **Note**<br>
|
||||
> openDesk supports PostgreSQL as alternative database backend for Nextcloud and XWiki. PostgreSQL is likely to become the preferred option/default in the future should MariaDB become deprecated. This would cause migration[^1] to be necessary if you do not select PostgreSQL for new installations.
|
||||
|
||||
## Cache
|
||||
| Component | Name | Parameter | Key | Default |
|
||||
| ------------------ | ------------------ | --------- | --------------------------------------------- | ---------------------------- |
|
||||
| Element | Synapse | | | |
|
||||
| | | Type | `databases.synapse.type` | `postgresql` |
|
||||
| | | Name | `databases.synapse.name` | `matrix` |
|
||||
| | | Host | `databases.synapse.host` | `postgresql` |
|
||||
| | | Port | `databases.synapse.port` | `5432` |
|
||||
| | | Username | `databases.synapse.username` | `matrix_user` |
|
||||
| | | Password | `databases.synapse.password` | |
|
||||
| Nubus | Guardian Mgmt API | | | |
|
||||
| | | Type | `databases.umsGuardianManagementApi.type` | `postgresql` |
|
||||
| | | Name | `databases.umsGuardianManagementApi.name` | `guardianmanagementapi` |
|
||||
| | | Host | `databases.umsGuardianManagementApi.host` | `postgresql` |
|
||||
| | | Port | `databases.umsGuardianManagementApi.port` | `5432` |
|
||||
| | | Username | `databases.umsGuardianManagementApi.username` | `guardianmanagementapi_user` |
|
||||
| | | Password | `databases.umsGuardianManagementApi.password` | |
|
||||
| | Keycloak | | | |
|
||||
| | | Type | `databases.keycloak.type` | `postgresql` |
|
||||
| | | Name | `databases.keycloak.name` | `keycloak` |
|
||||
| | | Host | `databases.keycloak.host` | `postgresql` |
|
||||
| | | Port | `databases.keycloak.port` | `5432` |
|
||||
| | | Username | `databases.keycloak.username` | `keycloak_user` |
|
||||
| | | Password | `databases.keycloak.password` | |
|
||||
| | Keycloak Extension | | | |
|
||||
| | | Type | `databases.keycloakExtension.type` | `postgresql` |
|
||||
| | | Name | `databases.keycloakExtension.name` | `keycloak_extensions` |
|
||||
| | | Host | `databases.keycloakExtension.host` | `postgresql` |
|
||||
| | | Port | `databases.keycloakExtension.port` | `5432` |
|
||||
| | | Username | `databases.keycloakExtension.username` | `keycloak_extensions_user` |
|
||||
| | | Password | `databases.keycloakExtension.password` | |
|
||||
| | Notifications API | | | |
|
||||
| | | Type | `databases.umsNotificationsApi.type` | `postgresql` |
|
||||
| | | Name | `databases.umsNotificationsApi.name` | `notificationsapi` |
|
||||
| | | Host | `databases.umsNotificationsApi.host` | `postgresql` |
|
||||
| | | Port | `databases.umsNotificationsApi.port` | `5432` |
|
||||
| | | Username | `databases.umsNotificationsApi.username` | `notificationsapi_user` |
|
||||
| | | Password | `databases.umsNotificationsApi.password` | |
|
||||
| | Self Service | | | |
|
||||
| | | Type | `databases.umsSelfservice.type` | `postgresql` |
|
||||
| | | Name | `databases.umsSelfservice.name` | `selfservice` |
|
||||
| | | Host | `databases.umsSelfservice.host` | `postgresql` |
|
||||
| | | Port | `databases.umsSelfservice.port` | `5432` |
|
||||
| | | Username | `databases.umsSelfservice.username` | `selfservice_user` |
|
||||
| | | Password | `databases.umsSelfservice.password` | |
|
||||
| Nextcloud | Nextcloud | | | |
|
||||
| | | Type | `databases.nextcloud.type` | `postgresql` |
|
||||
| | | Name | `databases.nextcloud.name` | `nextcloud` |
|
||||
| | | Host | `databases.nextcloud.host` | `postgresql` |
|
||||
| | | Port | `databases.nextcloud.port` | `5432` |
|
||||
| | | Username | `databases.nextcloud.username` | `nextcloud_user` |
|
||||
| | | Password | `databases.nextcloud.password` | |
|
||||
| Notes | Notes | | | |
|
||||
| | | Type | `databases.notes.type` | `postgresql` |
|
||||
| | | Name | `databases.notes.name` | `notes` |
|
||||
| | | Host | `databases.notes.host` | `postgresql` |
|
||||
| | | Port | `databases.notes.port` | `5432` |
|
||||
| | | Username | `databases.notes.username` | `notes_user` |
|
||||
| | | Password | `databases.notes.password` | |
|
||||
| OpenProject | OpenProject | | | |
|
||||
| | | Type | `databases.openproject.type` | `postgresql` |
|
||||
| | | Name | `databases.openproject.name` | `openproject` |
|
||||
| | | Host | `databases.openproject.host` | `postgresql` |
|
||||
| | | Port | `databases.openproject.port` | `5432` |
|
||||
| | | Username | `databases.openproject.username` | `openproject_user` |
|
||||
| | | Password | `databases.openproject.password` | |
|
||||
| OX App Suite[^2] | OX App Suite | | | |
|
||||
| | | Type | `databases.oxAppSuite.type` | `mariadb` |
|
||||
| | | Name | `databases.oxAppSuite.name` | `openxchange` |
|
||||
| | | Host | `databases.oxAppSuite.host` | `mariadb` |
|
||||
| | | Port | `databases.oxAppSuite.port` | `3306` |
|
||||
| | | Username | `databases.oxAppSuite.username` | `root` |
|
||||
| | | Password | `databases.oxAppSuite.password` | |
|
||||
| OX Dovecot Pro[^3] | ACLs | | | |
|
||||
| | | Type | `databases.dovecotACL.type` | `cassandra` |
|
||||
| | | Name | `databases.dovecotACL.name` | `dovecot_acl` |
|
||||
| | | Host | `databases.dovecotACL.host` | `cassandra` |
|
||||
| | | Port | `databases.dovecotACL.port` | `9042` |
|
||||
| | | Username | `databases.dovecotACL.username` | `dovecot_acl_user` |
|
||||
| | | Password | `databases.dovecotACL.password` | |
|
||||
| | Dictmap | | | |
|
||||
| | | Type | `databases.dovecotDictmap.type` | `cassandra` |
|
||||
| | | Name | `databases.dovecotDictmap.name` | `dovecot_dictmap` |
|
||||
| | | Host | `databases.dovecotDictmap.host` | `cassandra` |
|
||||
| | | Port | `databases.dovecotDictmap.port` | `9042` |
|
||||
| | | Username | `databases.dovecotDictmap.username` | `dovecot_dictmap_user` |
|
||||
| | | Password | `databases.dovecotDictmap.password` | |
|
||||
| XWiki[^4] | XWiki | | | |
|
||||
| | | Type | `databases.xwiki.type` | `postgresql` |
|
||||
| | | Name | `databases.xwiki.name` | `xwiki` |
|
||||
| | | Host | `databases.xwiki.host` | `postgresql` |
|
||||
| | | Port | `databases.xwiki.port` | `5432` |
|
||||
| | | Username | `databases.xwiki.username` | `xwiki_user` |
|
||||
| | | Password | `databases.xwiki.password` | |
|
||||
|
||||
When deploying this suite to production, you need to configure the applications to use your production grade cache
|
||||
# Object storage
|
||||
|
||||
When deploying this suite to production, you need to configure the applications to use your production-grade object
|
||||
storage service.
|
||||
|
||||
| Component | Name | Parameter | Key | Default |
|
||||
|-------------|-------------|-----------------|------------------------------------------|--------------------|
|
||||
| OpenProject | OpenProject | | | |
|
||||
| | | Backend | `objectstores.openproject.backend` | `minio` |
|
||||
| | | Bucket | `objectstores.openproject.bucket` | `openproject` |
|
||||
| | | Endpoint | `objectstores.openproject.endpoint` | |
|
||||
| | | Provider | `objectstores.openproject.provider` | `AWS` |
|
||||
| | | Region | `objectstores.openproject.region` | |
|
||||
| | | Secret | `objectstores.openproject.secret` | |
|
||||
| | | Username | `objectstores.openproject.username` | `openproject_user` |
|
||||
| | | Use IAM profile | `objectstores.openproject.useIAMProfile` | |
|
||||
|
||||
# Cache
|
||||
|
||||
When deploying this suite to production, you need to configure the applications to use your production-grade cache
|
||||
service.
|
||||
|
||||
| Component | Name | Type | Parameter | Key | Default |
|
||||
@@ -75,3 +149,20 @@ service.
|
||||
| OpenProject | OpenProject | Memcached | | | |
|
||||
| | | | Host | `cache.openproject.host` | `memcached` |
|
||||
| | | | Port | `cache.openproject.port` | `11211` |
|
||||
| UMS | Self Service | Memcached | | | |
|
||||
| | | | Host | `cache.umsSelfservice.host` | `memcached` |
|
||||
| | | | Port | `cache.umsSelfservice.port` | `11211` |
|
||||
|
||||
# Footnotes
|
||||
|
||||
[^1] The upstream product documentation provides some valuable information regarding database migrations:
|
||||
- Nextcloud: https://docs.nextcloud.com/server/latest/admin_manual/configuration_database/db_conversion.html
|
||||
- XWiki:
|
||||
- https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Backup#HUsingtheXWikiExportfeature
|
||||
- https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/ImportExport
|
||||
|
||||
[^2] OX App Suite only supports MariaDB and requires root access, as it manages its databases itself.
|
||||
|
||||
[^3] openDesk Enterprise only.
|
||||
|
||||
[^4] XWiki requires root access when using MariaDB due to the fact that sub-wikis use separate databases that are managed by XWiki. When using PostgreSQL with XWiki no root user is required as the sub-wikis are managed within multiple schemas within a single database.
|
||||
|
||||
36
docs/functional.md
Normal file
@@ -0,0 +1,36 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Functional configuration</h1>
|
||||
|
||||
This document addresses the available functional configuration options of an openDesk deployment.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Supported functional configuration](#supported-functional-configuration)
|
||||
* [Customization of functional options](#customization-of-functional-options)
|
||||
<!-- TOC -->
|
||||
|
||||
## Supported functional configuration
|
||||
|
||||
While the openDesk applications allow a wide range of configuration options, only a small subset of them are supported by openDesk. This subset can be found in [`helmfile/environments/default/functional.yaml.gotmpl`](../helmfile/environments/default/functional.yaml.gotmpl)
|
||||
|
||||
The following categories are available. Each category contains a set of options to tailor your openDesk deployment to your needs. Please find the actual options including inline documentation in [`functional.yaml.gotmpl`](../helmfile/environments/default/functional.yaml.gotmpl) itself.
|
||||
|
||||
* Administrative options (`functional.admin.*`): Options affecting the IAM administrator role (users that are member of the LDAP group `Domain Admins`) of openDesk.
|
||||
* Authentication options (`functional.authentication.*`): Authentication related settings, e.g. define additional [OIDC](https://en.wikipedia.org/wiki/OpenID#OpenID_Connect_(OIDC)) clients or scopes.
|
||||
* External Services options (`functional.externalServices.*`): Settings controlling externally available services like APIs.
|
||||
* Filestore options (`functional.filestore.*`): Configuration options for the filestore component of openDesk, like default storage quota or file sharing options.
|
||||
* Data Protection options (`functional.dataProtection.*`): Data protection related settings.
|
||||
* Portal options (`functional.portal.*`): Options to customize the openDesk portal, e.g. if the login dialog should be enforced.
|
||||
* Chat options (`functional.chat.*`): Configuration options for the chat component of openDesk.
|
||||
* Migration options (`functional.migration.*`): Helpful setting(s) for migration scenarios.
|
||||
* Groupware options (`functional.groupware.*`): Options to customize Open-Xchange and mail settings, e.g. mail quota.
|
||||
|
||||
## Customization of functional options
|
||||
|
||||
In case the options from [`functional.yaml.gotmpl`](../helmfile/environments/default/functional.yaml.gotmpl) are not sufficient, you might want to look into [`customization.yaml.gotmpl`](../helmfile/environments/default/customization.yaml.gotmpl). The customizations give you control over all templating that is being done in openDesk, but be aware it is an unsupported approach, so in case you have a strong need for customizations, please let us know by opening a ticket. We will check if it is a use case that can be supported by implementing it as part of the aforementioned [`functional.yaml.gotmpl`](../helmfile/environments/default/functional.yaml.gotmpl).
|
||||
|
||||
> **Note<br>**
|
||||
> You can not directly template your own values in the structure found in [`customization.yaml.gotmpl`](../helmfile/environments/default/customization.yaml.gotmpl), rather, you need to reference your custom value files to overwrite the openDesk defaults. In the app specific `helmfile-child.yaml.gotmpl` files, the openDesk value files are referenced first, then afterwards, the files you define in the customizations are read.
|
||||
@@ -3,59 +3,81 @@ SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG Ze
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Getting stated</h1>
|
||||
<h1>Getting started</h1>
|
||||
|
||||
This documentation should enable you to create your own evaluation instance of openDesk on your Kubernetes cluster.
|
||||
This documentation lets you create an openDesk evaluation instance on your Kubernetes cluster.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Requirements](#requirements)
|
||||
* [Customize environment](#customize-environment)
|
||||
* [Domain](#domain)
|
||||
* [Requirements](#requirements)
|
||||
* [Customize environment](#customize-environment)
|
||||
* [DNS](#dns)
|
||||
* [Domain](#domain)
|
||||
* [Apps](#apps)
|
||||
* [Private OCI registry](#private-oci-registry)
|
||||
* [Private Helm registry](#private-helm-registry)
|
||||
* [Cluster capabilities](#cluster-capabilities)
|
||||
* [Service](#service)
|
||||
* [Networking](#networking)
|
||||
* [Ingress](#ingress)
|
||||
* [Container runtime](#container-runtime)
|
||||
* [Volumes](#volumes)
|
||||
* [Connectivity](#connectivity)
|
||||
* [Mail/SMTP configuration](#mailsmtp-configuration)
|
||||
* [TURN configuration](#turn-configuration)
|
||||
* [Certificate issuer](#certificate-issuer)
|
||||
* [Password seed](#password-seed)
|
||||
* [Private registries](#private-registries)
|
||||
* [Cluster capabilities](#cluster-capabilities)
|
||||
* [Service](#service)
|
||||
* [Networking](#networking)
|
||||
* [Ingress](#ingress)
|
||||
* [Container runtime](#container-runtime)
|
||||
* [Volumes](#volumes)
|
||||
* [Customize deployment](#customize-deployment)
|
||||
* [Connectivity](#connectivity)
|
||||
* [Ports](#ports)
|
||||
* [Web-based user interface](#web-based-user-interface)
|
||||
* [Mail clients](#mail-clients)
|
||||
* [Mail/SMTP configuration](#mailsmtp-configuration)
|
||||
* [TURN configuration](#turn-configuration)
|
||||
* [Certificate issuer](#certificate-issuer)
|
||||
* [Password seed](#password-seed)
|
||||
* [Install](#install)
|
||||
* [Install single app](#install-single-app)
|
||||
* [Install single release/chart](#install-single-releasechart)
|
||||
* [Access deployment](#access-deployment)
|
||||
* [Uninstall](#uninstall)
|
||||
* [Install single app](#install-single-app)
|
||||
* [Install single release/chart](#install-single-releasechart)
|
||||
* [Access deployment](#access-deployment)
|
||||
* [Using from external repository](#using-from-external-repository)
|
||||
* [Uninstall](#uninstall)
|
||||
<!-- TOC -->
|
||||
|
||||
Thanks for looking into the openDesk Getting started guide. This documents covers essentials configuration steps to
|
||||
deploy openDesk onto your kubernetes infrastructure.
|
||||
Thanks for looking into the openDesk Getting Started guide. This document covers essential configuration steps to
|
||||
deploy openDesk onto your Kubernetes infrastructure.
|
||||
|
||||
## Requirements
|
||||
# Requirements
|
||||
|
||||
Detailed system requirements are covered on [requirements](requirements.md) page.
|
||||
Detailed system requirements are covered on the [requirements](./docs/requirements.md) page.
|
||||
|
||||
## Customize environment
|
||||
# Customize environment
|
||||
|
||||
Before deploying openDesk, you have to configure the deployment to suit your environment.
|
||||
To keep your deployment up to date, we recommend customizing in `dev`, `test` or `prod` and not in `default` environment
|
||||
Before deploying openDesk, you must configure the deployment to fit your environment.
|
||||
To keep your deployment up to date, we recommend customizing in `dev`, `test`, or `prod` and not in `default` environment
|
||||
files.
|
||||
|
||||
> All configuration options and their default values can be found in files at `helmfile/environments/default/`
|
||||
> All configuration options and their default values can be found in files at [`helmfile/environments/default/`](../helmfile/environments/default/)
|
||||
|
||||
For the following guide, we will use `dev` as environment, where variables can be set in
|
||||
`helmfile/environments/dev/values.yaml`.
|
||||
For the following guide, we will use `dev` as environment where variables can be set in
|
||||
`helmfile/environments/dev/values.yaml.gotmpl`.
|
||||
|
||||
### Domain
|
||||
## DNS
|
||||
|
||||
The deployment is designed to deploy each app under a subdomains. For your convenience, we recommend to create a
|
||||
`*.domain.tld` A-Record to your cluster ingress controller, otherwise you need to create an A-Record for each subdomain.
|
||||
The deployment is designed to deploy each application/service under a dedicated subdomain.
|
||||
For your convenience, we recommend creating a `*.domain.tld` A-Record for your cluster Ingress Controller; otherwise, you must create an A-Record for each subdomain.
|
||||
|
||||
A list of all subdomains can be found in `helmfile/environments/default/global.yaml`.
|
||||
| Record name | Type | Value | Additional information |
|
||||
|-------------------------------|------|----------------------------------------------------|-------------------------------------------------------------------|
|
||||
| *.domain.tld | A | IPv4 address of your Ingress Controller | |
|
||||
| *.domain.tld | AAAA | IPv6 address of your Ingress Controller | |
|
||||
| mail.domain.tld | A | IPv4 address of your postfix NodePort/LoadBalancer | Optional, mail should directly be delivered to openDesk's Postfix |
|
||||
| mail.domain.tld | AAAA | IPv6 address of your postfix NodePort/LoadBalancer | Optional, mail should directly be delivered to openDesk's Postfix |
|
||||
| domain.tld | MX | `10 mail.domain.tld` | |
|
||||
| domain.tld | TXT | `v=spf1 +a +mx +a:mail.domain.tld ~all` | Optional, use proper MTA record if present |
|
||||
| _dmarc.domain.tld | TXT | `v=DMARC1; p=quarantine` | Optional |
|
||||
| default._domainkey.domain.tld | TXT | `v=DKIM1; k=rsa; h=sha256; ...` | Optional, DKIM settings |
|
||||
| _caldavs._tcp.domain.tld | SRV | 10 1 443 dav.domain.tld. | Optional, CalDav auto discovery |
|
||||
| _caldav._tcp.domain.tld | SRV | 10 1 80 dav.domain.tld. | Optional, CalDav auto discovery |
|
||||
| _carddavs._tcp.domain.tld | SRV | 10 1 443 dav.domain.tld. | Optional, CardDav auto discovery |
|
||||
| _carddav._tcp.domain.tld | SRV | 10 1 80 dav.domain.tld. | Optional, CardDav auto discovery |
|
||||
|
||||
## Domain
|
||||
|
||||
A list of all subdomains can be found in `helmfile/environments/default/global.yaml.gotmpl`.
|
||||
|
||||
All subdomains can be customized. For example, _Nextcloud_ can be changed to `files.domain.tld` in `dev` environment:
|
||||
|
||||
@@ -65,110 +87,106 @@ global:
|
||||
nextcloud: "files"
|
||||
```
|
||||
|
||||
The domain have to be set either via `dev` environment
|
||||
The domain has to be set either via `dev` environment:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
domain: "my.open.desk"
|
||||
istio:
|
||||
domain: "istio.my.open.desk"
|
||||
domain: "domain.tld"
|
||||
```
|
||||
|
||||
or via environment variable
|
||||
or alternatively via environment variable:
|
||||
|
||||
```shell
|
||||
export DOMAIN=my.open.desk
|
||||
export ISTIO_DOMAIN=istio.my.open.desk
|
||||
```
|
||||
|
||||
When you configure each subdomain individually, you can set `global.domain` and `istio.domain` to the same value.
|
||||
|
||||
Istio is only used for Open-Xchange Appsuite 8, when you don't want to install it, you can disable Istio:
|
||||
|
||||
```yaml
|
||||
istio:
|
||||
enabled: false
|
||||
oxAppsuite:
|
||||
enabled: false
|
||||
export DOMAIN=domain.tld
|
||||
```
|
||||
|
||||
### Apps
|
||||
|
||||
All available apps and their default value can be found in `helmfile/environments/default/workplace.yaml`.
|
||||
Depending on your ideal openDesk deployment, you may wish to disable or enable certain apps.
|
||||
All available apps and their default values are located in `helmfile/environments/default/opendesk_main.yaml.gotmpl`.
|
||||
|
||||
| Component | Name | Default | Description |
|
||||
|-----------------------------|-------------------------------------|---------|--------------------------------|
|
||||
| Certificates | `certificates.enabled` | `true` | TLS certificates |
|
||||
| ClamAV (Distributed) | `clamavDistributed.enabled` | `false` | Antivirus engine |
|
||||
| ClamAV (Simple) | `clamavSimple.enabled` | `true` | Antivirus engine |
|
||||
| Collabora | `collabora.enabled` | `true` | Weboffice |
|
||||
| CryptPad | `cryptpad.enabled` | `true` | Weboffice |
|
||||
| Dovecot | `dovecot.enabled` | `true` | Mail backend |
|
||||
| Element | `element.enabled` | `true` | Secure communications platform |
|
||||
| Intercom Service | `intercom.enabled` | `true` | Cross service data exchange |
|
||||
| Jitsi | `jitsi.enabled` | `true` | Videoconferencing |
|
||||
| Keycloak | `keycloak.enabled` | `true` | Identity Provider |
|
||||
| MariaDB | `mariadb.enabled` | `true` | Database |
|
||||
| Memcached | `memcached.enabled` | `true` | Cache Database |
|
||||
| MinIO | `minio.enabled` | `true` | Object Storage |
|
||||
| Nextcloud | `nextcloud.enabled` | `true` | File share |
|
||||
| OpenProject | `openproject.enabled` | `true` | Project management |
|
||||
| OX Appsuite | `oxAppsuite.enabled` | `true` | Groupware |
|
||||
| Provisioning | `oxConnector.enabled` | `true` | Backend provisioning |
|
||||
| Postfix | `postfix.enabled` | `true` | MTA |
|
||||
| PostgreSQL | `postgresql.enabled` | `true` | Database |
|
||||
| Redis | `redis.enabled` | `true` | Cache Database |
|
||||
| Univention Corporate Server | `univentionCorporateServer.enabled` | `true` | Identity Management & Portal |
|
||||
| Univention Management Stack | `univentionManagementStack.enabled` | `false` | Identity Management & Portal |
|
||||
| XWiki | `xwiki.enabled` | `true` | Knowledgebase |
|
||||
| Component | Name | Default | Description |
|
||||
| -------------------- | --------------------------- | ------- | ------------------------------ |
|
||||
| Certificates | `apps.certificates.enabled` | `true` | TLS certificates |
|
||||
| ClamAV (Distributed) | `apps.clamavDistributed.enabled` | `false` | Antivirus engine |
|
||||
| ClamAV (Simple) | `apps.clamavSimple.enabled` | `true` | Antivirus engine |
|
||||
| Collabora | `apps.collabora.enabled` | `true` | Weboffice |
|
||||
| CryptPad | `apps.cryptpad.enabled` | `true` | Weboffice |
|
||||
| dkimpy | `apps.dkimpy.enabled` | `false` | Postfix milter for DKIM |
|
||||
| Dovecot | `apps.dovecot.enabled` | `true` | Mail backend |
|
||||
| Element | `apps.element.enabled` | `true` | Secure communications platform |
|
||||
| Home | `apps.home.enabled` | `true` | Base domain portal redirect |
|
||||
| Jitsi | `apps.jitsi.enabled` | `true` | Videoconferencing |
|
||||
| MariaDB | `apps.mariadb.enabled` | `true` | Database |
|
||||
| Memcached | `apps.memcached.enabled` | `true` | Cache Database |
|
||||
| MinIO | `apps.minio.enabled` | `true` | Object Storage |
|
||||
| Nextcloud | `apps.nextcloud.enabled` | `true` | File share |
|
||||
| Nubus | `apps.nubus.enabled` | `true` | Identity Management & Portal |
|
||||
| OpenProject | `apps.openproject.enabled` | `true` | Project management |
|
||||
| OX App Suite | `apps.oxAppSuite.enabled` | `true` | Groupware |
|
||||
| Postfix | `apps.postfix.enabled` | `true` | MTA |
|
||||
| PostgreSQL | `apps.postgresql.enabled` | `true` | Database |
|
||||
| Redis | `apps.redis.enabled` | `true` | Cache Database |
|
||||
| XWiki | `apps.xwiki.enabled` | `true` | Knowledge management |
|
||||
|
||||
Exemplary, Jitsi can be disabled like:
|
||||
For example, Jitsi can be disabled like this:
|
||||
|
||||
```yaml
|
||||
jitsi:
|
||||
enabled: false
|
||||
apps:
|
||||
jitsi:
|
||||
enabled: false
|
||||
```
|
||||
|
||||
### Private OCI registry
|
||||
## Private registries
|
||||
|
||||
By default, all OCI artifacts are proxied via the project's container registry, which should get replaced soon by the
|
||||
OCI registries provided by Open CoDE.
|
||||
By default, Helm charts and container images are fetched from OCI registries. These registries can be found in most cases
|
||||
in the [openDesk/component section on openCode](https://gitlab.opencode.de/bmi/opendesk/components).
|
||||
|
||||
You also can set your own registry by:
|
||||
For untouched upstream artifacts that do not belong to a functional component's core, we use upstream registries
|
||||
like Docker Hub.
|
||||
|
||||
Doing a test deployment will be fine with this setup. In case you want to deploy multiple times a day
|
||||
and fetch from the same IP address, you might run into rate limits at Docker Hub. In that case, and in case you
|
||||
prefer the use of a private image registry, you can configure these in
|
||||
[your target environment](../helmfile/environments/dev/values.yaml.gotmpl.sample) by setting
|
||||
- `global.imageRegistry` for a private image registry and
|
||||
- `global.helmRegistry` for a private Helm chart registry.
|
||||
|
||||
```yaml
|
||||
global:
|
||||
imageRegistry: "external-registry.souvap-univention.de/sovereign-workplace"
|
||||
imageRegistry: "my_private_registry.domain.tld"
|
||||
```
|
||||
|
||||
or via environments variable:
|
||||
alternatively, you can use an environment variable:
|
||||
|
||||
```shell
|
||||
export PRIVATE_IMAGE_REGISTRY_URL=external-registry.souvap-univention.de/sovereign-workplace
|
||||
export PRIVATE_IMAGE_REGISTRY_URL=my_private_registry.domain.tld
|
||||
```
|
||||
|
||||
If authentication is required, you can reference imagePullSecrets as following:
|
||||
or for more granular control over repository overrides per registry (rewrites):
|
||||
|
||||
```yaml
|
||||
repositories:
|
||||
image:
|
||||
dockerHub: "my_private_registry.domain.tld/docker.io/"
|
||||
registryOpencodeDe: "my_private_registry.domain.tld/registry.opencode.de/"
|
||||
```
|
||||
|
||||
If authentication is required, you can reference `imagePullSecrets` as follows:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
imagePullSecrets:
|
||||
- "external-registry"
|
||||
```
|
||||
|
||||
### Private Helm registry
|
||||
## Cluster capabilities
|
||||
|
||||
Some apps use Chart Museum style helm registries. You can use your own registry by setting this environment variable:
|
||||
### Service
|
||||
|
||||
```shell
|
||||
export PRIVATE_CHART_REPOSITORY_URL=charts.open.desk
|
||||
```
|
||||
|
||||
### Cluster capabilities
|
||||
|
||||
#### Service
|
||||
|
||||
Some apps, like Jitsi or Dovecot, require HTTP and external TCP connections.
|
||||
Some apps, like Jitsi and Dovecot, require HTTP and external TCP connections.
|
||||
These apps create a Kubernetes service object.
|
||||
You can configure, whether `NodePort` (for on-premise), `LoadBalancer` (for cloud) or `ClusterIP` (to disable) should be
|
||||
You can configure whether `NodePort` (for on-premises), `LoadBalancer` (for cloud), or `ClusterIP` (to disable) should be
|
||||
used:
|
||||
|
||||
```yaml
|
||||
@@ -177,9 +195,9 @@ cluster:
|
||||
type: "NodePort"
|
||||
```
|
||||
|
||||
#### Networking
|
||||
### Networking
|
||||
|
||||
If your cluster has not the default `cluster.local` domain configured, you need to provide the domain via:
|
||||
If your cluster does not have the default `cluster.local` domain configured, you need to provide the domain via:
|
||||
|
||||
```yaml
|
||||
cluster:
|
||||
@@ -187,28 +205,45 @@ cluster:
|
||||
domain: "acme.internal"
|
||||
```
|
||||
|
||||
If your cluster has not the default `10.0.0.0/8` CIDR configured, you need to provide the CIDR via:
|
||||
If your cluster does not have the default `10.0.0.0/8` CIDR configured, you need to provide the CIDR via the following:
|
||||
|
||||
```yaml
|
||||
cluster:
|
||||
networking:
|
||||
cidr: "127.0.0.0/8"
|
||||
cidr:
|
||||
- "127.0.0.0/8"
|
||||
```
|
||||
|
||||
#### Ingress
|
||||
If your load balancer / reverse proxy IPs are not already included in the above `cidr` you need to
|
||||
explicitly configure their related IPs or IP ranges:
|
||||
|
||||
By default, the `ingressClassName` is empty to choose your default ingress controller, you may want to customize it by
|
||||
setting:
|
||||
```yaml
|
||||
cluster:
|
||||
networking:
|
||||
incomingCIDR:
|
||||
- "172.16.0.0/12"
|
||||
```
|
||||
|
||||
### Ingress
|
||||
|
||||
The default value for the `ingressClassName` in openDesk is set to `nginx`. This prevents fallback to the
|
||||
cluster’s default ingress class, since the Helm charts used by openDesk components are not consistently aligned in
|
||||
how they handle a missing or empty `ingressClassName`. In case you are using a non-standard `ingressClassName` for
|
||||
your `ingress-nginx` controller you have to configure it as follows:
|
||||
|
||||
```yaml
|
||||
ingress:
|
||||
ingressClassName: "cilium"
|
||||
ingressClassName: "nginx"
|
||||
```
|
||||
|
||||
#### Container runtime
|
||||
> **Note**<br>
|
||||
> Currently, the only supported ingress controller is `ingress-nginx`
|
||||
> (see [requirements.md](./docs/requirements.md) for reference).
|
||||
|
||||
Some apps require specific configuration for container runtimes. You can set your container runtime like `cri-o`,
|
||||
`containerd` or `docker` by:
|
||||
### Container runtime
|
||||
|
||||
Some apps require specific configurations for the container runtime. You can set your container runtime like `cri-o`,
|
||||
`containerd` or `docker` by using the following attribute:
|
||||
|
||||
```yaml
|
||||
cluster:
|
||||
@@ -216,18 +251,8 @@ cluster:
|
||||
engine: "containerd"
|
||||
```
|
||||
|
||||
#### Volumes
|
||||
|
||||
When your cluster has a `ReadWriteMany` volume provisioner, you can benefit from distributed or scaling of apps. By
|
||||
default, only `ReadWriteOnce` is enabled. To enable `ReadWriteMany` you can set:
|
||||
|
||||
```yaml
|
||||
cluster:
|
||||
persistence:
|
||||
readWriteMany: true
|
||||
```
|
||||
|
||||
The **StorageClass** can be set by:
|
||||
### Volumes
|
||||
The StorageClass must be set using the following attribute:
|
||||
|
||||
```yaml
|
||||
persistence:
|
||||
@@ -236,12 +261,52 @@ persistence:
|
||||
RWO: "my-read-write-once-class"
|
||||
```
|
||||
|
||||
### Connectivity
|
||||
`RWX` is optional and requires that your cluster has a `ReadWriteMany` volume provisioner. If you can make use
|
||||
of it, it largely benefits the distribution and scaling of apps. By default, only `ReadWriteOnce` is enabled.
|
||||
To enable `ReadWriteMany` you can use the following attribute:
|
||||
|
||||
#### Mail/SMTP configuration
|
||||
```yaml
|
||||
cluster:
|
||||
persistence:
|
||||
readWriteMany: true
|
||||
```
|
||||
|
||||
To use the full potential of the openDesk, you need to set up an SMTP Smarthost/Relay which allows to send emails from
|
||||
the whole subdomain.
|
||||
## Customize deployment
|
||||
|
||||
While openDesk configures the applications with meaningful defaults, you can check [functional.md](./docs/functional.md) if you want to change these defaults to better match your use case.
|
||||
|
||||
## Connectivity
|
||||
|
||||
### Ports
|
||||
|
||||
> **Note**<br>
|
||||
> If you use `NodePort` for service exposure, you must check your deployment for the actual ports and ensure they are opened where necessary.
|
||||
|
||||
#### Web-based user interface
|
||||
|
||||
To use the openDesk functionality with its web-based user interface, you need to expose the following ports publicly:
|
||||
|
||||
| Component | Description | Port | Type |
|
||||
| ------------------ | ----------------------- | ----: | ---: |
|
||||
| openDesk | Kubernetes Ingress | 80 | TCP |
|
||||
| openDesk | Kubernetes Ingress | 443 | TCP |
|
||||
| Jitsi Video Bridge | ICE Port for video data | 10000 | UDP |
|
||||
|
||||
#### Mail clients
|
||||
|
||||
To connect with mail clients like [Thunderbird](https://www.thunderbird.net/), the following ports need to be publicly exposed:
|
||||
|
||||
| Component | Description | Port | Type |
|
||||
| ------------------ | ----------------------- | ----: | ---: |
|
||||
| Dovecot | IMAPS | 993 | TCP |
|
||||
| | POP3S | 995 | TCP |
|
||||
| Postfix | SMTP | 25 | TCP |
|
||||
| | SMTPS | 587 | TCP |
|
||||
|
||||
### Mail/SMTP configuration
|
||||
|
||||
To use the full potential of the openDesk, you need to set up an SMTP relay that allows sending emails from
|
||||
the whole subdomain. The following attribute can be set:
|
||||
|
||||
```yaml
|
||||
smtp:
|
||||
@@ -250,9 +315,24 @@ smtp:
|
||||
password: "secret"
|
||||
```
|
||||
|
||||
#### TURN configuration
|
||||
Enabling DKIM signing of emails helps to reduce spam and increases trust.
|
||||
openDesk ships dkimpy-milter as Postfix milter for signing emails. The following attributes can be set:
|
||||
|
||||
Some components (Jitsi, Element) use for direct communication a TURN server. You can configure your own TURN server with
|
||||
```yaml
|
||||
apps:
|
||||
dkimpy:
|
||||
enabled: true
|
||||
smtp:
|
||||
dkim:
|
||||
key:
|
||||
value: "HzZs08QF1O7UiAkcM9T3U7rePPECtSFvWZIvyKqdg8E="
|
||||
selector: "default"
|
||||
useED25519: true # when false, RSA is used
|
||||
```
|
||||
|
||||
### TURN configuration
|
||||
|
||||
Some components (Jitsi, Element) use a TURN server for direct communication. You can configure your own TURN server with
|
||||
these options:
|
||||
|
||||
```yaml
|
||||
@@ -267,18 +347,19 @@ turn:
|
||||
port: "5349"
|
||||
```
|
||||
|
||||
#### Certificate issuer
|
||||
### Certificate issuer
|
||||
|
||||
As mentioned in [requirements](requirements.md#certificate-management) you can provide your own valid certificate. A TLS
|
||||
secret with name `opendesk-certificates-tls` needs to be present in application namespace. For deployment, you can
|
||||
disable `Certificate` resource creation by:
|
||||
As mentioned in [requirements](requirements.md#certificate-management), you can provide your own valid certificate. A TLS type
|
||||
secret named `opendesk-certificates-tls` must be present in the application namespace. For deployment, you can
|
||||
turn off `Certificate` resource creation with:
|
||||
|
||||
```yaml
|
||||
certificates:
|
||||
enabled: false
|
||||
apps:
|
||||
certificates:
|
||||
enabled: false
|
||||
```
|
||||
|
||||
If you want to leverage the `cert-manager.io` to handle certificates, like `Let's encrypt`, you need to provide the
|
||||
If you want to leverage `cert-manager.io` to handle certificates, like `Let's encrypt`, you need to provide the
|
||||
configured cluster issuer:
|
||||
|
||||
```yaml
|
||||
@@ -287,25 +368,37 @@ certificate:
|
||||
name: "letsencrypt-prod"
|
||||
```
|
||||
|
||||
Additionally, it is possible to request wildcard certificates by:
|
||||
Additionally, it is possible to request wildcard certificates with:
|
||||
|
||||
```yaml
|
||||
certificate:
|
||||
wildcard: true
|
||||
```
|
||||
|
||||
### Password seed
|
||||
## Password seed
|
||||
|
||||
All secrets are generated from a single master password via Master Password (algorithm).
|
||||
To prevent others from using your openDesk instance, we highly recommend setting an individual master password via:
|
||||
All secrets are generated from a master password via [Master Password (algorithm)](https://en.wikipedia.org/wiki/Master_Password_(algorithm)).
|
||||
To prevent others from using your openDesk instance, you must set your individual master password via:
|
||||
|
||||
```shell
|
||||
export MASTER_PASSWORD="openDesk"
|
||||
export MASTER_PASSWORD="your_individual_master_password"
|
||||
```
|
||||
|
||||
> **Note**<br>
|
||||
> Currently a [documented](https://docs.software-univention.de/nubus-kubernetes-operation/1.x/en/configuration/nats.html#configure-the-secrets) upstream [bug](https://forge.univention.org/bugzilla/show_bug.cgi?id=58357) causes a failure when passwords/secrets beginning with certain numbers are using for the Nubus subcomponent NATS.
|
||||
> With openDesk 1.6.0 an update-aware workaround was implemented that prefixes the affected secrets in the openDesk included `secrets.yaml.gotmpl` that derives all secrets from the previously mentioned `MASTER_PASSWORD`.
|
||||
> If you are using externally provided passwords/secrets make sure that none of the ones listed below are starting with a number:
|
||||
>
|
||||
> - `secrets.nubus.provisioning.api.natsPassword`
|
||||
> - `secrets.nubus.provisioning.dispatcherNatsPassword`
|
||||
> - `secrets.nubus.provisioning.prefillNatsPassword`
|
||||
> - `secrets.nubus.provisioning.udmListenerNatsPassword`
|
||||
> - `secrets.nubus.provisioning.udmTransformerNatsPassword`
|
||||
> - `secrets.nats.natsAdminPassword`
|
||||
|
||||
## Install
|
||||
|
||||
After setting your environment specific values in `dev` environment, you can start deployment by:
|
||||
After setting your environment-specific values in `dev` environment, you can start deployment by:
|
||||
|
||||
```shell
|
||||
helmfile apply -e dev -n <NAMESPACE> [-l <label>] [--suppress-diff]
|
||||
@@ -318,80 +411,93 @@ helmfile apply -e dev -n <NAMESPACE> [-l <label>] [--suppress-diff]
|
||||
- `-l <label>`: Label selector
|
||||
- `--suppress-diff`: Disable diff printing
|
||||
|
||||
### Install single app
|
||||
## Install single app
|
||||
|
||||
You can also install or upgrade only a single app like Collabora, either by label selector:
|
||||
You can also install or upgrade only a single app like Collabora, either by using a label selector:
|
||||
|
||||
```shell
|
||||
helmfile apply -e dev -n <NAMESPACE> -l component=collabora
|
||||
```
|
||||
|
||||
or by switching into the apps' directory (faster):
|
||||
or by switching to the apps' directory (faster) and install or upgrade from there directly:
|
||||
|
||||
```shell
|
||||
cd helmfile/apps/collabora
|
||||
helmfile apply -e dev -n <NAMESPACE>
|
||||
```
|
||||
|
||||
### Install single release/chart
|
||||
## Install single release/chart
|
||||
|
||||
Instead of iteration through all services, you can also deploy a single release like mariadb by:
|
||||
Instead of iterating through all services, you can also deploy a single release like `mariadb` by executing the following:
|
||||
|
||||
```shell
|
||||
helmfile apply -e dev -n <NAMESPACE> -l name=mariadb
|
||||
```
|
||||
|
||||
## Access deployment
|
||||
# Access deployment
|
||||
|
||||
When all apps are successfully deployed and pod status' went to `Running` or `Succeeded`, you can navigate to
|
||||
When all apps are successfully deployed, and their Pod status is `Running` or `Succeeded`, you can navigate to
|
||||
|
||||
```text
|
||||
https://portal.domain.tld
|
||||
```
|
||||
|
||||
If you change the subdomain of `univentionCorporateServer` or `univentionManagementStack`, you need to replace `portal`
|
||||
by your specified subdomain.
|
||||
If you change the subdomain of `nubus`, you must replace the subdomain of `portal` with the same subdomain.
|
||||
|
||||
**Credentials:**
|
||||
|
||||
openDesk deploys with the standard user account `Administrator`, the password for which can be retrieved as follows:
|
||||
|
||||
```shell
|
||||
# Replace with your namespace
|
||||
NAMESPACE=your-namespace
|
||||
# Set your namespace
|
||||
NAMESPACE=<your_namespace>
|
||||
|
||||
# Get UCS container, which contains passwords as env var.
|
||||
CONTAINER=$(kubectl -n ${NAMESPACE} get po -l app.kubernetes.io/name=univention-corporate-container -o jsonpath='{.items[0].metadata.name}')
|
||||
# $ kubectl -n ${NAMESPACE} get po -l app.kubernetes.io/name=univention-corporate-container
|
||||
#
|
||||
# NAME READY STATUS RESTARTS AGE
|
||||
# univention-corporate-container-8665c6f8b7-nlhc6 1/1 Running 0 10m
|
||||
|
||||
|
||||
# Password of `default.user`
|
||||
kubectl -n ${NAMESPACE} get po ${CONTAINER} -o=jsonpath='{.spec.containers[0].env[?(@.name=="DEFAULT_ACCOUNT_USER_PASSWORD")].value}'
|
||||
# 40615..............................e9e2f
|
||||
|
||||
# Password of `default.admin`
|
||||
kubectl -n ${NAMESPACE} get po ${CONTAINER} -o=jsonpath='{.spec.containers[0].env[?(@.name=="DEFAULT_ACCOUNT_ADMIN_PASSWORD")].value}'
|
||||
# bdbbb..............................04db6
|
||||
# Get password for IAM "Administrator" account
|
||||
kubectl -n ${NAMESPACE} get secret ums-nubus-credentials -o jsonpath='{.data.administrator_password}' | base64 -d
|
||||
```
|
||||
|
||||
Now you can log in with obtained credentials:
|
||||
Using the aforementioned account, you can either create new accounts manually or make use of the
|
||||
[openDesk User Importer](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/user-import/)
|
||||
script or container.
|
||||
|
||||
| Username | Password | Description |
|
||||
|-----------------|--------------------------------------------|------------------|
|
||||
| `default.user` | `40615..............................e9e2f` | Application user |
|
||||
| `default.admin` | `bdbbb..............................04db6` | Administrator |
|
||||
In the following snippet, after defining the values of the first three lines and executing the command,
|
||||
you get two accounts, `default` and `default-admin`:
|
||||
|
||||
## Uninstall
|
||||
```shell
|
||||
ADMINISTRATOR_PASSWORD=<your_administrator_password_see_above>
|
||||
DOMAIN=<your_domain>
|
||||
DEFAULT_USERS_PASSWORD=<password_for_the_created_default_accounts>
|
||||
docker run --rm registry.opencode.de/bmi/opendesk/components/platform-development/images/user-import:3.0.0 \
|
||||
./user_import_udm_rest_api.py \
|
||||
--import_domain ${DOMAIN} \
|
||||
--udm_api_password ${ADMINISTRATOR_PASSWORD} \
|
||||
--set_default_password ${DEFAULT_USERS_PASSWORD} \
|
||||
--import_filename template.ods \
|
||||
--create_admin_accounts True
|
||||
```
|
||||
|
||||
You can uninstall the deployment by:
|
||||
## Using from external repository
|
||||
|
||||
Referring to `./helmfile_generic.yaml.gotmpl` from an external
|
||||
directory or repository is possible. The `helmfile.yaml.gotmpl` that refers to
|
||||
`./helmfile_generic.yaml.gotmpl` may define custom environments. These custom
|
||||
environments may overwrite specific configuration values. These
|
||||
configuration values are:
|
||||
|
||||
* `global.domain`
|
||||
* `global.helmRegistry`
|
||||
* `global.master_password`
|
||||
|
||||
# Uninstall
|
||||
|
||||
You can uninstall the deployment by executing the following:
|
||||
|
||||
```shell
|
||||
helmfile destroy -n <NAMESPACE>
|
||||
```
|
||||
|
||||
> **Note**
|
||||
> Not all Jobs, PersistentVolumeClaims or Certificates are deleted; you have to delete them manually
|
||||
> **Note**<br>
|
||||
> Not all Jobs, PersistentVolumeClaims, or Certificates are deleted; you have to delete them manually
|
||||
|
||||
**'Sledgehammer destroy'** - for fast development turn-around times (at your own risk):
|
||||
|
||||
@@ -406,7 +512,8 @@ done
|
||||
# Delete leftover resources
|
||||
kubectl delete pvc --all --namespace ${NAMESPACE};
|
||||
kubectl delete jobs --all --namespace ${NAMESPACE};
|
||||
kubectl delete configmaps --all --namespace ${NAMESPACE};
|
||||
```
|
||||
|
||||
> **Warning**
|
||||
> Without specifying or empty `--namespace` flag, cluster-wide components get deleted!
|
||||
> **Warning**<br>
|
||||
> Without specifying a `--namespace` flag, or by leaving it empty, cluster-wide components will get deleted!
|
||||
|
||||
940
docs/migrations.md
Normal file
@@ -0,0 +1,940 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024-2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Updates & Upgrades</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Disclaimer](#disclaimer)
|
||||
* [Deprecation warnings](#deprecation-warnings)
|
||||
* [Automated migrations - Overview and mandatory upgrade path](#automated-migrations---overview-and-mandatory-upgrade-path)
|
||||
* [Manual checks/actions](#manual-checksactions)
|
||||
* [v1.7.0+](#v170)
|
||||
* [Pre-upgrade to v1.7.0+](#pre-upgrade-to-v170)
|
||||
* [Helmfile fix: Ensure enterprise overrides apply when deploying from project root](#helmfile-fix-ensure-enterprise-overrides-apply-when-deploying-from-project-root)
|
||||
* [Replace Helm chart: New Notes Helm chart with support for self-signed deployments](#replace-helm-chart-new-notes-helm-chart-with-support-for-self-signed-deployments)
|
||||
* [Post-upgrade to v1.7.0+](#post-upgrade-to-v170)
|
||||
* [Upstream fix: Provisioning of functional mailboxes](#upstream-fix-provisioning-of-functional-mailboxes)
|
||||
* [v1.6.0+](#v160)
|
||||
* [Pre-upgrade to v1.6.0+](#pre-upgrade-to-v160)
|
||||
* [Upstream constraint: Nubus' external secrets](#upstream-constraint-nubus-external-secrets)
|
||||
* [Helmfile new secret: `secrets.minio.openxchangeUser`](#helmfile-new-secret-secretsminioopenxchangeuser)
|
||||
* [Helmfile new object storage: `objectstores.openxchange.*`](#helmfile-new-object-storage-objectstoresopenxchange)
|
||||
* [OX App Suite fix-up: Using S3 as storage for non mail attachments (pre-upgrade)](#ox-app-suite-fix-up-using-s3-as-storage-for-non-mail-attachments-pre-upgrade)
|
||||
* [Post-upgrade to v1.6.0+](#post-upgrade-to-v160)
|
||||
* [OX App Suite fix-up: Using S3 as storage for non mail attachments (post-upgrade)](#ox-app-suite-fix-up-using-s3-as-storage-for-non-mail-attachments-post-upgrade)
|
||||
* [v1.4.0+](#v140)
|
||||
* [Pre-upgrade to v1.4.0+](#pre-upgrade-to-v140)
|
||||
* [Helmfile new feature: `functional.authentication.ssoFederation`](#helmfile-new-feature-functionalauthenticationssofederation)
|
||||
* [Helmfile cleanup: `global.additionalMailDomains` as list](#helmfile-cleanup-globaladditionalmaildomains-as-list)
|
||||
* [v1.2.0+](#v120)
|
||||
* [Pre-upgrade to v1.2.0+](#pre-upgrade-to-v120)
|
||||
* [Helmfile cleanup: Do not configure OX provisioning when no OX installed](#helmfile-cleanup-do-not-configure-ox-provisioning-when-no-ox-installed)
|
||||
* [Helmfile new default: PostgreSQL for XWiki and Nextcloud](#helmfile-new-default-postgresql-for-xwiki-and-nextcloud)
|
||||
* [v1.1.2+](#v112)
|
||||
* [Pre-upgrade to v1.1.2+](#pre-upgrade-to-v112)
|
||||
* [Helmfile feature update: App settings wrapped in `apps.` element](#helmfile-feature-update-app-settings-wrapped-in-apps-element)
|
||||
* [v1.1.1+](#v111)
|
||||
* [Pre-upgrade to v1.1.1](#pre-upgrade-to-v111)
|
||||
* [Helmfile feature update: Component specific `storageClassName`](#helmfile-feature-update-component-specific-storageclassname)
|
||||
* [Helmfile new secret: `secrets.nubus.masterpassword`](#helmfile-new-secret-secretsnubusmasterpassword)
|
||||
* [v1.1.0+](#v110)
|
||||
* [Pre-upgrade to v1.1.0](#pre-upgrade-to-v110)
|
||||
* [Helmfile cleanup: Restructured `/helmfile/files/theme` folder](#helmfile-cleanup-restructured-helmfilefilestheme-folder)
|
||||
* [Helmfile cleanup: Consistent use of `*.yaml.gotmpl`](#helmfile-cleanup-consistent-use-of-yamlgotmpl)
|
||||
* [Helmfile cleanup: Prefixing certain app directories with `opendesk-`](#helmfile-cleanup-prefixing-certain-app-directories-with-opendesk-)
|
||||
* [Helmfile cleanup: Splitting external services and openDesk services](#helmfile-cleanup-splitting-external-services-and-opendesk-services)
|
||||
* [Helmfile cleanup: Streamlining `openxchange` and `oxAppSuite` attribute names](#helmfile-cleanup-streamlining-openxchange-and-oxappsuite-attribute-names)
|
||||
* [Helmfile feature update: Dicts to define `customization.release`](#helmfile-feature-update-dicts-to-define-customizationrelease)
|
||||
* [openDesk defaults (new): Enforce login](#opendesk-defaults-new-enforce-login)
|
||||
* [openDesk defaults (changed): Jitsi room history enabled](#opendesk-defaults-changed-jitsi-room-history-enabled)
|
||||
* [External requirements: Redis 7.4](#external-requirements-redis-74)
|
||||
* [Post-upgrade to v1.1.0+](#post-upgrade-to-v110)
|
||||
* [XWiki fix-ups](#xwiki-fix-ups)
|
||||
* [v1.1.0](#v110-1)
|
||||
* [Pre-upgrade to v1.1.0](#pre-upgrade-to-v110-1)
|
||||
* [Configuration Cleanup: Removal of unnecessary OX-Profiles in Nubus](#configuration-cleanup-removal-of-unnecessary-ox-profiles-in-nubus)
|
||||
* [Configuration Cleanup: Updated `global.imagePullSecrets`](#configuration-cleanup-updated-globalimagepullsecrets)
|
||||
* [Changed openDesk defaults: Matrix presence status disabled](#changed-opendesk-defaults-matrix-presence-status-disabled)
|
||||
* [Changed openDesk defaults: Matrix ID](#changed-opendesk-defaults-matrix-id)
|
||||
* [Changed openDesk defaults: File-share configurability](#changed-opendesk-defaults-file-share-configurability)
|
||||
* [Changed openDesk defaults: Updated default subdomains in `global.hosts`](#changed-opendesk-defaults-updated-default-subdomains-in-globalhosts)
|
||||
* [Changed openDesk defaults: Dedicated group for access to the UDM REST API](#changed-opendesk-defaults-dedicated-group-for-access-to-the-udm-rest-api)
|
||||
* [Post-upgrade to v1.0.0+](#post-upgrade-to-v100)
|
||||
* [Configuration Improvement: Separate user permission for using Video Conference component](#configuration-improvement-separate-user-permission-for-using-video-conference-component)
|
||||
* [Optional Cleanup](#optional-cleanup)
|
||||
* [Automated migrations - Details](#automated-migrations---details)
|
||||
* [v1.6.0+ (automated)](#v160-automated)
|
||||
* [v1.6.0+ migrations-post](#v160-migrations-post)
|
||||
* [v1.2.0+ (automated)](#v120-automated)
|
||||
* [v1.2.0+ migrations-pre](#v120-migrations-pre)
|
||||
* [v1.2.0+ migrations-post](#v120-migrations-post)
|
||||
* [v1.1.0+ (automated)](#v110-automated)
|
||||
* [v1.0.0+ (automated)](#v100-automated)
|
||||
* [Related components and artifacts](#related-components-and-artifacts)
|
||||
* [Development](#development)
|
||||
<!-- TOC -->
|
||||
|
||||
# Disclaimer
|
||||
|
||||
Starting with openDesk 1.0, we aim to offer hassle-free updates/upgrades.
|
||||
|
||||
Therefore, openDesk contains automated migrations between versions which reduces the need for manual interaction.
|
||||
|
||||
These automated migrations have limitations in the sense that they require a certain openDesk version to be installed, effectively resulting in a forced upgrade path. This is highlighted in the section [Automated migrations](#automated-migrations).
|
||||
|
||||
Manual checks and possible activities are also required by openDesk updates, they are described in the section [Manual update steps](#manual-update-steps).
|
||||
|
||||
> **Note**<br>
|
||||
> Please be sure to _thoroughly_ read / follow the requirements before you update / upgrade.
|
||||
|
||||
> **Known limitations**<br>
|
||||
> We assume that the PV reclaim policy is set to `delete`, resulting in PVs getting deleted as soon as the related PVC is deleted; we will not address explicit deletion for PVs.
|
||||
|
||||
# Deprecation warnings
|
||||
|
||||
We cannot hold back all migrations as some are required e.g. due to a change in a specific component that we want/need to update, we try to bundle others only with major releases.
|
||||
|
||||
This section provides an overview of potential changes to be part of the next major release (openDesk 2.0).
|
||||
|
||||
- `functional.portal.link*` (see `functional.yaml.gotmpl` for details) are going to be moved into the `theme.*` tree, we are also going to move the icons used for the links currently found under `theme.imagery.portalEntries` in this step.
|
||||
- We will explicitly set the [database schema configuration](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Configuration/#HConfigurethenamesofdatabaseschemas) for XWiki to avoid the use of the `public` schema.
|
||||
- `persistance.storages.oxConnector.storageClassName` and `persistance.storages.nubusUdmListener.storageClassName` will be templated in Helmfile requiring you to template them explicitly if their current default values differs from the global value set in `persistence.storageClassNames.RWO`.
|
||||
- The currently used Helm chart for Notes will be replaced requiring some config updates.
|
||||
|
||||
# Automated migrations - Overview and mandatory upgrade path
|
||||
|
||||
The following table gives an overview of the mandatory upgrade path of openDesk, required in order for the automated migrations to work as expected.
|
||||
|
||||
To upgrade existing deployments, you cannot skip any version mentioned in the column *Mandatory version*. When a version number is not fully defined (e.g. `v1.1.x`), you can install any version matching that constraint.
|
||||
|
||||
| Mandatory version |
|
||||
| ----------------- |
|
||||
| v1.5.0 |
|
||||
| v1.1.x |
|
||||
| v1.0.0 |
|
||||
| v0.9.0 |
|
||||
| v0.8.1 |
|
||||
<!-- | 1.x.x | add the entry to the table as soon as we get new migration requiring that the former migration was executed -->
|
||||
|
||||
> **Note**<br>
|
||||
> Be sure to check out the table in the release version you are going to install, and not the currently installed version.
|
||||
|
||||
If you would like more details about the automated migrations, please read section [Automated migrations - Details](#automated-migrations---details).
|
||||
|
||||
# Manual checks/actions
|
||||
|
||||
## v1.7.0+
|
||||
|
||||
### Pre-upgrade to v1.7.0+
|
||||
|
||||
### Helmfile fix: Ensure enterprise overrides apply when deploying from project root
|
||||
|
||||
**Target group:** All openDesk Enterprise deployments initiated from the project root using `helmfile_generic.yaml.gotmpl`
|
||||
|
||||
Previously, the default values referenced in `helmfile_generic.yaml.gotmpl` did not include the necessary Enterprise overrides from `helmfile/environment/default-ee-overrides/`.
|
||||
|
||||
As a result, when deploying openDesk Enterprise Edition from the project root, the correct Enterprise charts and images for Collabora, Nextcloud, OpenXchange, and Dovecot were not applied. This issue does not affect deployments started at the component level (e.g., `helmfile/apps/collabora`).
|
||||
|
||||
Please verify that your deployment uses the correct Enterprise charts and images. If not, migrate to the Enterprise versions before upgrading to openDesk EE v1.7.0.
|
||||
|
||||
#### Replace Helm chart: New Notes Helm chart with support for self-signed deployments
|
||||
|
||||
**Target group:** All deployments that set `app.notes.enabled: true` (default is `false`).
|
||||
|
||||
We replaced the Helm Chart used for the Notes (aka "Impress") deployment. If you have enabled Notes in your deployment, you must manually uninstall the old chart before upgrading to openDesk v1.7.0.
|
||||
|
||||
```shell
|
||||
helm uninstall -n <your_namespace> impress
|
||||
```
|
||||
|
||||
In case you are using `annotation.notes` they have to be moved into one of the remaining dicts, see [`annotations.yaml.gotmpl`](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/develop/helmfile/environments/default/annotations.yaml.gotmpl) for details:
|
||||
|
||||
```yaml
|
||||
annotation:
|
||||
notesBackend: {}
|
||||
notesFrontend: {}
|
||||
notesYProvider: {}
|
||||
```
|
||||
|
||||
### Post-upgrade to v1.7.0+
|
||||
|
||||
#### Upstream fix: Provisioning of functional mailboxes
|
||||
|
||||
**Target group:** Deployments with OX App Suite that make use of IAM maintained functional mailboxes.
|
||||
|
||||
The update of OX Connector included in openDesk 1.7.0 fixes an issue with the provisioning of IAM maintained functional mailboxes. If your deployment makes use of these mailboxes it is recommended to trigger a full sync of the OX App Suite provisioning by recreating the OX Connector's provisioning subscription using calls to the provisioning API that is temporary port-forwarded in the example below:
|
||||
|
||||
```shell
|
||||
export NAMESPACE=<your_namespace>
|
||||
export SUBSCRIPTION_NAME=ox-connector
|
||||
export SUBSCRIPTION_SECRET_NAME=ums-provisioning-ox-credentials
|
||||
export TEMPORARY_CONSUMER_JSON=$(mktemp)
|
||||
export PROVISIONING_API_POD_NAME=$(kubectl -n ${NAMESPACE} get pods --no-headers -o custom-columns=":metadata.name" | grep ums-provisioning-api | tr -d '\n')
|
||||
kubectl -n ${NAMESPACE} port-forward ${PROVISIONING_API_POD_NAME} 7777:7777 &
|
||||
export PROVISIONING_PORT_FORWARD_PID=$!
|
||||
sleep 10
|
||||
kubectl -n ${NAMESPACE} get secret ${SUBSCRIPTION_SECRET_NAME} -o json | jq '.data | map_values(@base64d)' | jq -r '."ox-connector.json"' > ${TEMPORARY_CONSUMER_JSON}.json
|
||||
export PROVISIONING_ADMIN_PASSWORD=$(kubectl -n ${NAMESPACE} get secret ums-provisioning-api-admin -o jsonpath='{.data.password}' | base64 --decode)
|
||||
# Delete the current subscription
|
||||
curl -o - -u "admin:${PROVISIONING_ADMIN_PASSWORD}" -X DELETE http://localhost:7777/v1/subscriptions/${SUBSCRIPTION_NAME}
|
||||
# Recreate the subscription
|
||||
curl -u "admin:${PROVISIONING_ADMIN_PASSWORD}" -H 'Content-Type: application/json' -d @${TEMPORARY_CONSUMER_JSON}.json http://localhost:7777/v1/subscriptions
|
||||
kill ${PROVISIONING_PORT_FORWARD_PID}
|
||||
rm ${TEMPORARY_CONSUMER_JSON}
|
||||
```
|
||||
|
||||
## v1.6.0+
|
||||
|
||||
### Pre-upgrade to v1.6.0+
|
||||
|
||||
#### Upstream constraint: Nubus' external secrets
|
||||
|
||||
**Target group:** Operators that use external secrets for Nubus.
|
||||
|
||||
> **Note**<br>
|
||||
> External Secrets are not yet a supported feature. We are working on making it available in 2025, though it is possible to make use of the support for external secrets within single applications using the openDesk [customization](../helmfile/environments/default/customization.yaml.gotmpl) options.
|
||||
|
||||
Please ensure you read the [Nubus 1.10.0 "Migration steps" section](https://docs.software-univention.de/nubus-kubernetes-release-notes/1.x/en/changelog.html#v1-10-0-migration-steps) with focus on the paragraph "Operators that make use of the following UDM Listener secrets variables" and act accordingly.
|
||||
|
||||
#### Helmfile new secret: `secrets.minio.openxchangeUser`
|
||||
|
||||
**Target group:** All existing deployments that have OX App Suite enabled and that use externally defined secrets in combination with openDesk provided MinIO object storage.
|
||||
|
||||
For OX App Suite to access the object storage a new secret has been introduced.
|
||||
|
||||
It is declared in [`secrets.yaml.gotmpl`](../helmfile/environments/default/secrets.yaml.gotmpl) by the key: `secrets.minio.openxchangeUser`. If you define your own secrets, please ensure that you provide a value for this secret as well, otherwise the aforementioned secret will be derived from the `MASTER_PASSWORD`.
|
||||
|
||||
#### Helmfile new object storage: `objectstores.openxchange.*`
|
||||
|
||||
**Target group:** All deployments that use an external object storage.
|
||||
|
||||
For OX App Suite's newly introduced filestore you have to configure a new object storage (bucket). When you are using
|
||||
an external object storage you did this already for all the entries in
|
||||
[`objectstores.yaml.gotmpl`](../helmfile/environments/default/objectstores.yaml.gotmpl). Where we now introduced
|
||||
`objectstores.openxchange` section that you also need to provide you external configuration for.
|
||||
|
||||
#### OX App Suite fix-up: Using S3 as storage for non mail attachments (pre-upgrade)
|
||||
|
||||
**Target group:** All existing deployments that have OX App Suite enabled.
|
||||
|
||||
With openDesk 1.6.0 OX App Suite persists the attachments on contact, calendar or task objects in object storage.
|
||||
|
||||
To enable the use of this new filestore backend existing deployments must execute the following steps.
|
||||
|
||||
Preparation:
|
||||
- Ensure your `kubeconfig` is pointing to the cluster that is running your deployment.
|
||||
- Identify/create a e.g. local temporary directory that can keep the attachments while upgrading openDesk.
|
||||
- Set some environment variables to prepare running the documented commands:
|
||||
|
||||
```shell
|
||||
export ATTACHMENT_TEMP_DIR=<your_temporary_directory_for_the_attachments>
|
||||
export NAMESPACE=<your_namespace>
|
||||
```
|
||||
|
||||
1. Copy the existing attachments from all `open-xchange-core-mw-default-*` Pods to the identified directory, example for `open-xchange-core-mw-default-0`:
|
||||
```shell
|
||||
kubectl cp -n ${NAMESPACE} open-xchange-core-mw-default-0:/opt/open-xchange/ox-filestore ${ATTACHMENT_TEMP_DIR}
|
||||
```
|
||||
2. Run the upgrade.
|
||||
3. Continue with the [related post-upgrade steps](#ox-app-suite-fix-up-using-s3-as-storage-for-non-mail-attachments-post-upgrade)
|
||||
|
||||
### Post-upgrade to v1.6.0+
|
||||
|
||||
#### OX App Suite fix-up: Using S3 as storage for non mail attachments (post-upgrade)
|
||||
|
||||
**Target group:** All existing deployments having OX App Suite enabled.
|
||||
|
||||
Continued from the [related pre-upgrade section](#ox-app-suite-fix-up-using-s3-as-storage-for-non-mail-attachments-pre-upgrade).
|
||||
|
||||
1. Copy the attachments back from your temporary directory into `open-xchange-core-mw-default-0`.
|
||||
```shell
|
||||
kubectl cp -n ${NAMESPACE} ${ATTACHMENT_TEMP_DIR}/* open-xchange-core-mw-default-0:/opt/open-xchange/ox-filestore
|
||||
```
|
||||
2. Ideally you verify the files have been copied as expected checking the target directory in the `open-xchange-core-mw-default-0` Pod. All the following commands are for execution within the aforementioned Pod.
|
||||
3. Get the `id` of the new object storage based OX filestore, using the following command in the first line of the following block. In the shown example output the `id` for the new filestore would be `10` as the filestore can be identified by its path value `s3://ox-filestore-s3`, the `id` of the existing filestore would be `3` identified by the corresponding path `/opt/open-xchange/ox-filestore`:
|
||||
```shell
|
||||
/opt/open-xchange/sbin/listfilestore -A $MASTER_ADMIN_USER -P $MASTER_ADMIN_PW
|
||||
id path size reserved used max-entities cur-entities
|
||||
3 /opt/open-xchange/ox-filestore 100000 200 5 5000 1
|
||||
10 s3://ox-filestore-s3 100000 0 0 5000 0
|
||||
```
|
||||
4. Get the list of your OX contexts IDs (`cid` column in the output of the `listcontext` command), as the next step needs to be executed per OX context. Most installation will just have a single OX context (`1`).
|
||||
```shell
|
||||
/opt/open-xchange/sbin/listcontext -A $MASTER_ADMIN_USER -P $MASTER_ADMIN_PW
|
||||
cid fid fname enabled qmax qused name lmappings
|
||||
1 3 1_ctx_store true 5 1 1,context1
|
||||
```
|
||||
5. For each of your OX contexts IDs run the final filestore migration command and you will get output like this: `context 1 to filestore 10 scheduled as job 1`:
|
||||
```shell
|
||||
/opt/open-xchange/sbin/movecontextfilestore -A $MASTER_ADMIN_USER -P $MASTER_ADMIN_PW -f <your_s3_filestore_id_from_step_3> -c <your_context_id_from_step_4>
|
||||
```
|
||||
6. Depending on the size of your filestore, moving the contexts will take some time. You can check the status of a context's jobs with the command below. When the job status is `Done` you can also doublecheck that everything worked as expected by running the `listfilestore` command from step #3 and should see that the filestore is no longer used.
|
||||
```shell
|
||||
/opt/open-xchange/sbin/jobcontrol -A $MASTER_ADMIN_USER -P $MASTER_ADMIN_PW -c <your_context_id_from_step_4> -l
|
||||
ID Type of Job Status Further Information
|
||||
1 movefilestore Done move context 1 to filestore 10
|
||||
```
|
||||
7. Finally you can unregister the old filestore:
|
||||
```shell
|
||||
/opt/open-xchange/sbin/unregisterfilestore -A $MASTER_ADMIN_USER -P $MASTER_ADMIN_PW -i <your_old_filestore_id_from_step_3>
|
||||
```
|
||||
|
||||
## v1.4.0+
|
||||
|
||||
### Pre-upgrade to v1.4.0+
|
||||
|
||||
#### Helmfile new feature: `functional.authentication.ssoFederation`
|
||||
|
||||
**Target group:** Deployments that make use of IdP federation as described in [`idp-federation.md`](./enhanced-configuration/idp-federation.md).
|
||||
|
||||
Please ensure to configure your IdP federation config details as part of `functional.authentication.ssoFederation`. You can find more details in the "Example configuration" section of [`idp-federation.md`](./enhanced-configuration/idp-federation.md).
|
||||
|
||||
#### Helmfile cleanup: `global.additionalMailDomains` as list
|
||||
|
||||
**Target group:** Installations that have set `global.additionalMailDomains`.
|
||||
|
||||
The `additionalMailDomains` had to be defined as a comma separated string. That now needs to change into a list of domains.
|
||||
|
||||
For example the following config:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
additionalMailDomains: "sub1.maildomain.de,sub2.maildomain.de"
|
||||
```
|
||||
|
||||
Needs to change to:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
additionalMailDomains:
|
||||
- "sub1.maildomain.de"
|
||||
- "sub2.maildomain.de"
|
||||
```
|
||||
|
||||
## v1.2.0+
|
||||
|
||||
### Pre-upgrade to v1.2.0+
|
||||
|
||||
#### Helmfile cleanup: Do not configure OX provisioning when no OX installed
|
||||
|
||||
**Target group:** Installations that have no OX App Suite installed.
|
||||
|
||||
With openDesk 1.2.0 the OX provisioning consumer will not be registered when there is no OX installed.
|
||||
|
||||
We do not remove the consumer for existing installations, if you want to do that for your existing installation please perform the following steps:
|
||||
|
||||
```shell
|
||||
export NAMESPACE=<your_namespace>
|
||||
kubectl -n ${NAMESPACE} exec -it ums-provisioning-nats-0 -c nats-box -- sh -c 'nats consumer rm stream:ox-connector durable_name:ox-connector --user=admin --password=${NATS_PASSWORD} --force'
|
||||
kubectl -n ${NAMESPACE} exec -it ums-provisioning-nats-0 -c nats-box -- sh -c 'nats stream rm stream:ox-connector --user=admin --password=${NATS_PASSWORD} --force'
|
||||
kubectl -n ${NAMESPACE} delete secret ums-provisioning-ox-credentials-test
|
||||
```
|
||||
|
||||
#### Helmfile new default: PostgreSQL for XWiki and Nextcloud
|
||||
|
||||
**Target group:** All upgrade installations that do not already use the previous optional PostgreSQL database backend for Nextcloud and XWiki.
|
||||
|
||||
openDesk now uses PostgreSQL as default database backend for Nextcloud and XWiki.
|
||||
|
||||
When upgrading existing instances you likely want to keep the current database backend (MariaDB).
|
||||
|
||||
**Use case A:** You use your own external database services, if not see "Use case B" further down.
|
||||
|
||||
You just have to add the new `type` attribute and set it to `mariadb`:
|
||||
|
||||
```yaml
|
||||
databases:
|
||||
nextcloud:
|
||||
type: "mariadb"
|
||||
xwiki:
|
||||
type: "mariadb"
|
||||
```
|
||||
|
||||
**Use case B:** You use the openDesk supplied database services.
|
||||
|
||||
Ensure you set the following attributes before upgrading, this includes the aforementioned `type` attribute.
|
||||
|
||||
```yaml
|
||||
databases:
|
||||
nextcloud:
|
||||
type: "mariadb"
|
||||
host: "mariadb"
|
||||
port: 3306
|
||||
xwiki:
|
||||
type: "mariadb"
|
||||
host: "mariadb"
|
||||
port: 3306
|
||||
username: "root"
|
||||
```
|
||||
|
||||
In case you are planning to migrate an existing instance from MariaDB to PostgreSQL please check the upstream documentation for details:
|
||||
|
||||
- Nextcloud database migration: https://docs.nextcloud.com/server/latest/admin_manual/configuration_database/db_conversion.html
|
||||
- XWiki:
|
||||
- https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Backup#HUsingtheXWikiExportfeature
|
||||
- https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/ImportExport
|
||||
|
||||
## v1.1.2+
|
||||
|
||||
### Pre-upgrade to v1.1.2+
|
||||
|
||||
#### Helmfile feature update: App settings wrapped in `apps.` element
|
||||
|
||||
We now require [Helmfile v1.0.0-rc.8](https://github.com/helmfile/helmfile/releases/tag/v1.0.0-rc.8) for the deployment. This enables openDesk to lay the foundation for some significant cleanups where the information from the different apps, especially their `enabled` state, is needed.
|
||||
|
||||
Therefore, it was necessary to introduce the `apps` level in [`opendesk_main.yaml.gotmpl`](../helmfile/environments/default/opendesk_main.yaml.gotmpl).
|
||||
|
||||
If you have a deployment where you specify settings found in the aforementioned file, specifically to disable or enable components, please ensure you insert the top-level attribute `apps` as shown in the following example.
|
||||
|
||||
The following configuration:
|
||||
|
||||
```yaml
|
||||
certificates:
|
||||
enabled: false
|
||||
notes:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
Needs to be changed to:
|
||||
|
||||
```yaml
|
||||
apps:
|
||||
certificates:
|
||||
enabled: false
|
||||
notes:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
## v1.1.1+
|
||||
|
||||
### Pre-upgrade to v1.1.1
|
||||
|
||||
#### Helmfile feature update: Component specific `storageClassName`
|
||||
|
||||
With openDesk 1.1.1 we support component specific `storageClassName` definitions beside the global ones. For this, we had to adapt the structure found in `persistence.yaml.gotmpl` to achieve this in a clean manner.
|
||||
|
||||
If you have set custom `persistence.size.*`-values for your deployment, please continue reading as you need to adapt your `persistence` settings to the new structure.
|
||||
|
||||
When comparing the [old v1.1.0 structure](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/v1.1.0/helmfile/environments/default/persistence.yaml.gotmpl) with the [new one](https://gitlab.opencode.de/bmi/opendesk/deployment/opendesk/-/blob/v1.1.1/helmfile/environments/default/persistence.yaml.gotmpl), you will spot these changes:
|
||||
|
||||
- We replaced `persistence.size` with `persistence.storages`.
|
||||
- Below each component you can define now the `size` and the optional component specific `storageClassName`.
|
||||
- We streamlined the structure of the components by placing them on the same level, as beforehand, Nubus had an additional level of nesting.
|
||||
|
||||
The following configuration:
|
||||
|
||||
```yaml
|
||||
persistence:
|
||||
size:
|
||||
synapse: "1Gi"
|
||||
```
|
||||
|
||||
Needs to be changed to:
|
||||
|
||||
```yaml
|
||||
persistence:
|
||||
storages:
|
||||
synapse:
|
||||
size: "1Gi"
|
||||
```
|
||||
|
||||
Or for the Nubus related entries, the following:
|
||||
|
||||
```yaml
|
||||
persistence:
|
||||
size:
|
||||
nubus:
|
||||
ldapServerData: "1Gi"
|
||||
```
|
||||
|
||||
Needs to be changed to:
|
||||
|
||||
```yaml
|
||||
persistence:
|
||||
storages:
|
||||
nubusLdapServerData:
|
||||
size: "1Gi"
|
||||
```
|
||||
|
||||
#### Helmfile new secret: `secrets.nubus.masterpassword`
|
||||
|
||||
A not yet templated secret was discovered in the Nubus deployment. It is now declared in [`secrets.yaml.gotmpl`](../helmfile/environments/default/secrets.yaml.gotmpl) and can be defined using: `secrets.nubus.masterpassword`. If you define your own secrets, please be sure this new secret is set to the same value as the `MASTER_PASSWORD` environment variable used in your deployment.
|
||||
|
||||
## v1.1.0+
|
||||
|
||||
### Pre-upgrade to v1.1.0
|
||||
|
||||
#### Helmfile cleanup: Restructured `/helmfile/files/theme` folder
|
||||
|
||||
If you make use of the [theme folder](../helmfile/files/theme/) or the [`theme.yaml.gotmpl`](../helmfile/environments/default/theme.yaml.gotmpl), e.g. to apply your own imagery, please ensure you adhere to the new structure of the folder and the yaml-file.
|
||||
|
||||
#### Helmfile cleanup: Consistent use of `*.yaml.gotmpl`
|
||||
|
||||
In v1.0.0 the files in [`/helmfile/environments/default`](../helmfile/environments/default/) had mixed file extensions.
|
||||
Now we have streamlined this and consistently use the `*.yaml.gotmpl` file extension.
|
||||
|
||||
This change likely requires manual action in two situations:
|
||||
|
||||
1. You are referencing our upstream files from the aforementioned directory, e.g. in your Argo CD deployment. If so, please update your references to use the filenames with the new extension.
|
||||
2. You have custom files containing configuration information that are simply named `*.yaml`. If so, please rename them to `*.yaml.gotmpl`.
|
||||
|
||||
#### Helmfile cleanup: Prefixing certain app directories with `opendesk-`
|
||||
|
||||
To make it more obvious that some elements from within the [`apps`](../helmfile/apps/) directory are solely
|
||||
provided by openDesk, we have prefixed these app directories with `opendesk-`.
|
||||
|
||||
Affected are the following directories, here listed directly with the new prefix:
|
||||
|
||||
- [`./helmfile/apps/opendesk-migrations-pre`](../helmfile/apps/opendesk-migrations-pre)
|
||||
- [`./helmfile/apps/opendesk-migrations-post`](../helmfile/apps/opendesk-migrations-post)
|
||||
- [`./helmfile/apps/opendesk-openproject-bootstrap`](../helmfile/apps/opendesk-openproject-bootstrap)
|
||||
|
||||
The described changes most likely require manual action in the following situation:
|
||||
|
||||
- You are referencing our upstream files e.g. in your Argo CD deployment. If so, please update your references to use the new directory names.
|
||||
|
||||
#### Helmfile cleanup: Splitting external services and openDesk services
|
||||
|
||||
In v1.0.0 there was a directory `/helmfile/apps/services` that was intended to contain all the services an operator had to provide externally for production deployments.
|
||||
|
||||
As some services that are actually part of openDesk snuck in there, we had to split the directory into two separate ones:
|
||||
|
||||
- [`./helmfile/apps/opendesk-services`](../helmfile/apps/opendesk-services)
|
||||
- [`./helmfile/apps/services-external`](../helmfile/apps/services-external)
|
||||
|
||||
The described changes most likely require manual action in the following situation:
|
||||
|
||||
- You are referencing our upstream files e.g. in your Argo CD deployment. If so, please update your references to use the new directory names.
|
||||
|
||||
#### Helmfile cleanup: Streamlining `openxchange` and `oxAppSuite` attribute names
|
||||
|
||||
We have updated some attribute names within the Open-Xchange / OX App Suite to be consistent within our Helmfile
|
||||
deployment. This change also aligns us with the actual brand names, as well as our rule of thumb for brand based
|
||||
attribute names[^1].
|
||||
|
||||
In case you are using any of the customizations below, the (`WAS`) values, please update to the (`NOW`) values:
|
||||
|
||||
```
|
||||
WAS: oxAppsuite: ...
|
||||
NOW: oxAppSuite: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: cache.oxAppsuite: ...
|
||||
NOW: cache.oxAppSuite: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: charts.openXchangeAppSuite: ...
|
||||
NOW: charts.oxAppSuite: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: charts.openXchangeAppSuiteBootstrap: ...
|
||||
NOW: charts.oxAppSuiteBootstrap: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: customization.release.openXchange: ...
|
||||
NOW: customization.release.openxchange: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: customization.release.opendeskOpenXchangeBootstrap: ...
|
||||
NOW: customization.release.opendeskOpenxchangeBootstrap: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: databases.oxAppsuite: ...
|
||||
NOW: databases.oxAppSuite: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: ingress.parameters.openXchangeAppSuite: ...
|
||||
NOW: ingress.parameters.oxAppSuite: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: ingress.bodyTimeout.openXchangeAppSuite: ...
|
||||
NOW: ingress.bodyTimeout.oxAppSuite: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: migration.oxAppsuite: ...
|
||||
NOW: migration.oxAppSuite: ...
|
||||
```
|
||||
|
||||
```
|
||||
WAS: secrets.oxAppsuite: ...
|
||||
NOW: secrets.oxAppSuite: ...
|
||||
```
|
||||
|
||||
#### Helmfile feature update: Dicts to define `customization.release`
|
||||
|
||||
If you make use of the `customization.release` option, you have to switch to a dictionary based definition of customization files, for example:
|
||||
|
||||
The following:
|
||||
|
||||
```yaml
|
||||
customization:
|
||||
release:
|
||||
collaboraOnline: "./my_custom_templating.yaml.gotmpl"
|
||||
```
|
||||
|
||||
Needs to be changed to:
|
||||
|
||||
```yaml
|
||||
customization:
|
||||
release:
|
||||
collaboraOnline:
|
||||
file1: "./my_custom_templating.yaml.gotmpl"
|
||||
```
|
||||
|
||||
You can freely choose the `file1` dictionary key used in the example above, but it should start with a letter.
|
||||
|
||||
#### openDesk defaults (new): Enforce login
|
||||
|
||||
Users accessing the openDesk portal are now automatically redirected to the login screen per default.
|
||||
|
||||
In case you want to keep the previous behavior you need to set the following `functional` flag:
|
||||
|
||||
```yaml
|
||||
functional:
|
||||
portal:
|
||||
enforceLogin: false
|
||||
```
|
||||
|
||||
#### openDesk defaults (changed): Jitsi room history enabled
|
||||
|
||||
The default to store the Jitsi room history in the local storage of a user's browser has changed.
|
||||
|
||||
It is now enabled and therefore stored by default.
|
||||
|
||||
To preserve the v1.0.0 behavior of not storing the room history you have to explicitly configure it:
|
||||
|
||||
```yaml
|
||||
functional:
|
||||
dataProtection:
|
||||
jitsiRoomHistory:
|
||||
enabled: false
|
||||
```
|
||||
|
||||
#### External requirements: Redis 7.4
|
||||
|
||||
The update from openDesk v1.0.0 contains Redis 7.4.1, like the other openDesk bundled services, the bundled Redis is not meant to be used in production.
|
||||
|
||||
Please ensure the Redis you are using is updated to at least version 7.4 to support the requirement of OX App Suite.
|
||||
|
||||
### Post-upgrade to v1.1.0+
|
||||
|
||||
#### XWiki fix-ups
|
||||
|
||||
Unfortunately XWiki does not upgrade itself as expected. The bug has been reported and the supplier is aware. The following additional steps are required:
|
||||
|
||||
1. To enforce re-indexing of the now fixed full-text search, access the XWiki Pod and run the following commands to delete two search related directories:
|
||||
```
|
||||
rm -rf /usr/local/xwiki/data/store/solr/search_9
|
||||
rm -rf /usr/local/xwiki/data/cache/solr/search_9
|
||||
```
|
||||
> The pod will need to be restarted for the changes to take effect.
|
||||
|
||||
2. This is necessary if the openDesk single sign-on no longer works, and you get a standard XWiki login dialogue instead:
|
||||
- Find the XWiki ConfigMap `xwiki-init-scripts` and locate in the `entrypoint` key the lines beginning with `xwiki_replace_or_add "/usr/local/xwiki/data/xwiki.cfg"`
|
||||
- Before those lines, add the following line while setting `<YOUR_TEMPORARY_SUPERADMIN_PASSWORD>` to a value you are happy with:
|
||||
```
|
||||
xwiki_replace_or_add "/usr/local/xwiki/data/xwiki.cfg" 'xwiki.superadminpassword' '<YOUR_TEMPORARY_SUPERADMIN_PASSWORD>'
|
||||
```
|
||||
- Restart the XWiki Pod.
|
||||
- Access XWiki's web UI and login with `superadmin` and the password you set above.
|
||||
- Once XWiki UI is fully rendered, remove the line with the temporary `superadmin` password from the aforementioned ConfigMap.
|
||||
- Restart the XWiki Pod.
|
||||
|
||||
You should have now a fully functional XWiki instance with single sign-on and full-text search.
|
||||
|
||||
## v1.1.0
|
||||
|
||||
### Pre-upgrade to v1.1.0
|
||||
|
||||
#### Configuration Cleanup: Removal of unnecessary OX-Profiles in Nubus
|
||||
|
||||
> **Warning**<br>
|
||||
> The upgrade will fail if you do not address this section in your current deployment.
|
||||
|
||||
The update will remove unnecessary OX-Profiles in Nubus, so long as these profiles are in use.
|
||||
|
||||
So please ensure that only the following two supported profiles are assigned to your users:
|
||||
- `opendesk_standard`: "opendesk Standard"
|
||||
- `none`: "Login disabled"
|
||||
|
||||
You can review and update other accounts as follows:
|
||||
- Login as IAM admin.
|
||||
- Open the user module.
|
||||
- Open the extended search by clicking the funnel (DE: "Trichter") icon next to the search input field.
|
||||
- Open the "Property" (DE: "Eigenschaft") list and select "OX Access" (DE: "OX-Berechtigung").
|
||||
- Enter an asterisk (*) in the input field next to the list.
|
||||
- Start the search by clicking once more on the funnel icon.
|
||||
- Sort the result list for the "OX Access" column.
|
||||
- Edit every user that has a value different to `opendesk_standard` or `none`:
|
||||
- Open the user.
|
||||
- Go to section "OX App Suite".
|
||||
- Change the value in the dropdown "OX Access" to either:
|
||||
- "openDesk Standard" if the user should be able to use the Groupware module.
|
||||
- "Login disabled" if the user should not use the Groupware module.
|
||||
- Update the user account with the green "SAVE" button at the top of the page.
|
||||
|
||||
#### Configuration Cleanup: Updated `global.imagePullSecrets`
|
||||
|
||||
Without using a custom container image registry, you can pull all the openDesk images without authentication.
|
||||
Thus defining non-existent imagePullSecrets creates unnecessary errors, so we removed them.
|
||||
|
||||
You can keep the current settings by setting the `external-registry` in your custom environment values:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
imagePullSecrets:
|
||||
- "external-registry"
|
||||
```
|
||||
|
||||
#### Changed openDesk defaults: Matrix presence status disabled
|
||||
|
||||
Show other user's Matrix presence status is now disabled by default to comply with data protection requirements.
|
||||
|
||||
To enable it or keep the v0.9.0 default, please set:
|
||||
|
||||
```yaml
|
||||
functional:
|
||||
dataProtection:
|
||||
matrixPresence:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
#### Changed openDesk defaults: Matrix ID
|
||||
|
||||
Until v0.9.0 openDesk used the LDAP entryUUID of a user to generate the user's Matrix ID. Due to restrictions of the
|
||||
Matrix protocol, an update to a Matrix ID is not possible. Therefore, it was technically convenient to use the UUID
|
||||
as they are immutable (see https://en.wikipedia.org/wiki/Universally_unique_identifier for more details on UUIDs.)
|
||||
|
||||
From the user experience perspective, that was a flawed approach, so from openDesk 1.0 onwards, by default, the openDesk login username is used to define the `localpart` of the Matrix ID.
|
||||
|
||||
For existing installations: The changed setting only affects users who log in to Element for the first time. Existing
|
||||
user accounts will not be harmed. If you want existing users to get new Matrix IDs based on the new setting, you
|
||||
must update their external ID in Synapse and deactivate the old user afterward. The user will get a completely new
|
||||
Matrix account, losing their existing contacts, chats, and rooms.
|
||||
|
||||
The following Admin API calls are helpful:
|
||||
- `GET /_synapse/admin/v2/users/@<entryuuid>:<matrixdomain>` get the user's existing external_id (auth_provider: "oidc")
|
||||
- `PUT /_synapse/admin/v2/users/@<entryuuid>:<matrixdomain>` update user's external_id with JSON payload:
|
||||
`{ "external_ids": [ { "auth_provider": "oidc", "external_id": "<old_id>+deprecated" } ] }`
|
||||
- `POST /_synapse/admin/v1/deactivate/@<entryuuid>:<matrixdomain>` deactivate old user with JSON payload:
|
||||
`{ "erase": true }`
|
||||
|
||||
For more details, check the Admin API documentation:
|
||||
https://element-hq.github.io/synapse/latest/usage/administration/admin_api/index.html
|
||||
|
||||
You can enforce the old standard with the following setting:
|
||||
```yaml
|
||||
functional:
|
||||
chat:
|
||||
matrix:
|
||||
profile:
|
||||
useImmutableIdentifierForLocalpart: true
|
||||
```
|
||||
|
||||
#### Changed openDesk defaults: File-share configurability
|
||||
|
||||
We now provide some configurability regarding the sharing capabilities of the Nextcloud component.
|
||||
|
||||
See the settings under `functional.filestore` in [functional.yaml](../helmfile/environments/default/functional.yaml).
|
||||
|
||||
For the following settings, the default in openDesk 1.0 has changed, so you might want to update
|
||||
the settings for your deployment to keep its current behavior:
|
||||
|
||||
```yaml
|
||||
functional:
|
||||
filestore:
|
||||
sharing:
|
||||
external:
|
||||
enabled: true
|
||||
expiry:
|
||||
activeByDefault: false
|
||||
```
|
||||
|
||||
#### Changed openDesk defaults: Updated default subdomains in `global.hosts`
|
||||
|
||||
We have streamlined the subdomain names in openDesk to be more user-friendly and to avoid the use of specific
|
||||
product names.
|
||||
|
||||
This results in the following changes to the default subdomain naming:
|
||||
|
||||
- **collabora**: `collabora` → `office`
|
||||
- **cryptpad**: `cryptpad` → `pad`
|
||||
- **minioApi**: `minio` → `objectstore`
|
||||
- **minioConsole**: `minio-console` → `objectstore-ui`
|
||||
- **nextcloud**: `fs` → `files`
|
||||
- **openproject**: `project` → `projects`
|
||||
|
||||
Existing deployments should keep the old subdomains because URL/link changes are not supported through all components.
|
||||
|
||||
If you have not already defined the entire `global.hosts` dictionary in your custom environments values, please set it
|
||||
to the defaults that were used before the upgrade:
|
||||
|
||||
```yaml
|
||||
global:
|
||||
hosts:
|
||||
collabora: "collabora"
|
||||
cryptpad: "cryptpad"
|
||||
element: "chat"
|
||||
intercomService: "ics"
|
||||
jitsi: "meet"
|
||||
keycloak: "id"
|
||||
matrixNeoBoardWidget: "matrix-neoboard-widget"
|
||||
matrixNeoChoiceWidget: "matrix-neochoice-widget"
|
||||
matrixNeoDateFixBot: "matrix-neodatefix-bot"
|
||||
matrixNeoDateFixWidget: "matrix-neodatefix-widget"
|
||||
minioApi: "minio"
|
||||
minioConsole: "minio-console"
|
||||
nextcloud: "fs"
|
||||
openproject: "project"
|
||||
openxchange: "webmail"
|
||||
synapse: "matrix"
|
||||
synapseFederation: "matrix-federation"
|
||||
univentionManagementStack: "portal"
|
||||
whiteboard: "whiteboard"
|
||||
xwiki: "wiki"
|
||||
```
|
||||
|
||||
In case you would like to update an existing deployment to use the new hostnames, you would be doing so at your own risk, so please consider the following:
|
||||
|
||||
- Some of your user's bookmarks and links will stop working.
|
||||
- Portal links will get updated automatically.
|
||||
- The update of the OpenProject <-> Nextcloud file integration needs to be updated manually as follows:
|
||||
- Use an account with functional admin permissions for both Nextcloud and OpenProject
|
||||
- In Nextcloud: *Administration* > *Files* > *External file storages* > Select `Nextcloud at [your_domain]`
|
||||
- Edit *Details* - *General Information* - *Storage provider* and update the *hostname* to `files.<your_domain>`
|
||||
- In OpenProject: *Administration* > *OpenProject* > *OpenProject server*
|
||||
- Update the *OpenProject host* to `projects.<your_domain>`
|
||||
|
||||
#### Changed openDesk defaults: Dedicated group for access to the UDM REST API
|
||||
|
||||
Prerequisite: You allow the use of the [IAM's API](https://docs.software-univention.de/developer-reference/5.0/en/udm/rest-api.html)
|
||||
with the following setting:
|
||||
|
||||
```yaml
|
||||
functional:
|
||||
externalServices:
|
||||
nubus:
|
||||
udmRestApi:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
With v0.9.0, all members of the group "Domain Admins" could successfully authenticate with the API.
|
||||
|
||||
With openDesk 1.0, we introduced a specific group for permission to use the API: `IAM API - Full Access`.
|
||||
|
||||
The IAM admin account `Administrator` is the only member of this group by default.
|
||||
|
||||
If you need other accounts to use the API, please assign them to the aforementioned group.
|
||||
|
||||
### Post-upgrade to v1.0.0+
|
||||
|
||||
#### Configuration Improvement: Separate user permission for using Video Conference component
|
||||
|
||||
With openDesk 1.0 the user permission for authenticated access to the Chat and Video Conference components was split into two separate permissions.
|
||||
|
||||
Therefore, the newly added *Video Conference* permission has to be added to users that should have continued access to the component.
|
||||
|
||||
This can be done as IAM admin:
|
||||
- Open the *user* module.
|
||||
- Select all users that should get the permission for *Video Conference* using the checkbox left of the users' entry.
|
||||
- In top bar of the user table click on *Edit*.
|
||||
- Select the *openDesk* section from the left-hand menu.
|
||||
- Check the checkbox for *Video Conference* and the directly below check box for *Overwrite*.
|
||||
- Click on the green *Save* button at the top of the screen to apply the change.
|
||||
|
||||
> **Hint**<br>
|
||||
> If you have a lot of users and want to update (almost) all them, you can select all users by clicking the checkbox in the user's table header and then de-selecting the users you do not want to update.
|
||||
|
||||
#### Optional Cleanup
|
||||
|
||||
We do not execute possible cleanup steps as part of the migrations POST stage. So you might want to remove the unclaimed PVCs after a successful upgrade:
|
||||
|
||||
```shell
|
||||
NAMESPACE=<your_namespace>
|
||||
kubectl -n ${NAMESPACE} delete pvc shared-data-ums-ldap-server-0
|
||||
kubectl -n ${NAMESPACE} delete pvc shared-run-ums-ldap-server-0
|
||||
kubectl -n ${NAMESPACE} delete pvc ox-connector-ox-contexts-ox-connector-0
|
||||
```
|
||||
|
||||
# Automated migrations - Details
|
||||
|
||||
## v1.6.0+ (automated)
|
||||
|
||||
> **Note**<br>
|
||||
> Details can be found in [run_5.py](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-migrations/-/blob/main/odmigs-python/odmigs_runs/run_5.py).
|
||||
|
||||
### v1.6.0+ migrations-post
|
||||
|
||||
Restarting the StatefulSets `ums-provisioning-nats` and `ox-connector` due to a workaround applied on the NATS secrets, see the "Notes" segment of the ["Password seed" heading in getting-started.md](./docs/getting-started.md#password-seed)
|
||||
|
||||
> **Note**<br>
|
||||
> This change aims to prevent authentication failures with NATS in some Pods, which can lead to errors such as: `wait-for-nats Unavailable, waiting 2 seconds. Error: nats: 'Authorization Violation'`.
|
||||
|
||||
## v1.2.0+ (automated)
|
||||
|
||||
> **Note**<br>
|
||||
> Details can be found in [run_4.py](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-migrations/-/blob/main/odmigs-python/odmigs_runs/run_4.py).
|
||||
|
||||
### v1.2.0+ migrations-pre
|
||||
|
||||
- Delete PVC `group-membership-cache-ums-portal-consumer-0`: With the upgrade the Nubus Portal Consumer no longer requires to be executed with root privileges. The PVC contains files that require root permission to access them, therefore the PVC gets deleted (and re-created) during the upgrade.
|
||||
- Delete StatefulSet `ums-portal-consumer`: A bug was fixed in the templating of the Portal Consumer's PVC causing the values in `persistence.storages.nubusPortalConsumer.*` to be ignored. As these values are immutable, we had to delete the whole StatefulSet.
|
||||
|
||||
### v1.2.0+ migrations-post
|
||||
|
||||
- Restarting Deployment `ums-provisioning-udm-transformer` and StatefulSet `ums-provisioning-udm-listener` as well as deleting the Nubus Provisioning consumer `durable_name:incoming` on stream `stream:incoming`: Due to a bug in Nubus 1.7.0 the `incoming` stream was blocked after the upgrade, the aforementioned measures unblock the stream.
|
||||
|
||||
## v1.1.0+ (automated)
|
||||
|
||||
With openDesk v1.1.0 the IAM stack supports HA LDAP primary as well as scalable LDAP secondary pods.
|
||||
|
||||
openDesk's automated migrations takes care of this upgrade requirement described here for
|
||||
[Nubus 1.5.1](https://docs.software-univention.de/nubus-kubernetes-release-notes/1.5.1/en/changelog.html#migrate-existing-ldap-server-to-mirror-mode-readiness),
|
||||
creating the config map with the mentioned label.
|
||||
|
||||
> **Note**<br>
|
||||
> Details can be found in [run_3.py](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-migrations/-/blob/main/odmigs-python/odmigs_runs/run_3.py).
|
||||
|
||||
## v1.0.0+ (automated)
|
||||
|
||||
The `migrations-pre` and `migrations-post` jobs in the openDesk deployment address the automated migration tasks.
|
||||
|
||||
The permissions required to execute the migrations can be found in the migration's Helm chart [`role.yaml'](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-migrations/-/blob/v1.3.5/charts/opendesk-migrations/templates/role.yaml?ref_type=tags#L29).
|
||||
|
||||
> **Note**<br>
|
||||
> Details can be found in [run_2.py](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-migrations/-/blob/main/odmigs-python/odmigs_runs/run_3.py).
|
||||
|
||||
## Related components and artifacts
|
||||
|
||||
openDesk comes with two upgrade steps as part of the deployment; they can be found in the folder [/helmfile/apps](../helmfile/apps/) along with all other components:
|
||||
|
||||
- `migrations-pre`: Is the very first app that gets deployed.
|
||||
- `migrations-post`: Is the last app that gets deployed.
|
||||
|
||||
Both migrations must be deployed exclusively at their first/last position and not parallel with other components.
|
||||
|
||||
The status of the upgrade migrations is tracked in the ConfigMap `migrations-status`, more details can be found in the [README.md of the related container image](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-migrations/README.md).
|
||||
|
||||
## Development
|
||||
|
||||
When a new upgrade migration is required, ensure to address the following list:
|
||||
|
||||
- Update the generated release version file [`global.generated.yaml.gotmpl`](../helmfile/environments/default/global.generated.yaml.gotmpl) at least on the patch level to test the upgrade in your feature branch and trigger it in the `develop` branch after the feature branch was merged. During the release process, the value is overwritten by the release's version number.
|
||||
- You have to implement the migration logic as a runner script in the [`opendesk-migrations`](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-migrations) image. Please find more instructions in the linked repository.
|
||||
- You most likely have to update the [`opendesk-migrations` Helm chart](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-migrations) within the `rules` section of the [`role.yaml`](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-migrations/-/blob/main/charts/opendesk-migrations/templates/role.yaml) to provide the permissions required for the execution of your migration's logic.
|
||||
- You must set the runner's ID you want to execute in the [migrations.yaml.gotmpl](../helmfile/shared/migrations.yaml.gotmpl). See also the `migrations.*` section of [the Helm chart's README.md](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-migrations/-/blob/main/charts/opendesk-migrations/README.md).
|
||||
- Update the [`charts.yaml.gotmpl`](../helmfile/environments/default/charts.yaml.gotmpl) and [`images.yaml.gotmpl`](../helmfile/environments/default/images.yaml.gotmpl) to reflect the newer releases of the `opendesk-migrations` Helm chart and container image.
|
||||
|
||||
[^1]: We do not follow a brand name's specific spelling when it comes to upper and lower case and only use new word
|
||||
uppercase when names consist of multiple, space divided words.
|
||||
@@ -5,36 +5,35 @@ SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
<h1>Monitoring</h1>
|
||||
|
||||
This document will cover how you can enable observability with Prometheus based monitoring and Grafana dashboards, as
|
||||
well as the overall status of monitoring integration.
|
||||
This document will cover how you can enable observability with Prometheus-based monitoring and Grafana dashboards as
|
||||
well as the overall status of the monitoring integration.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Technology](#technology)
|
||||
* [Defaults](#defaults)
|
||||
* [Metrics](#metrics)
|
||||
* [Alerts](#alerts)
|
||||
* [Dashboards for Grafana](#dashboards-for-grafana)
|
||||
* [Components](#components)
|
||||
* [Technology](#technology)
|
||||
* [Defaults](#defaults)
|
||||
* [Metrics](#metrics)
|
||||
* [Alerts](#alerts)
|
||||
* [Dashboards for Grafana](#dashboards-for-grafana)
|
||||
* [Component overview](#component-overview)
|
||||
<!-- TOC -->
|
||||
|
||||
## Technology
|
||||
# Technology
|
||||
|
||||
We provide integration into the Prometheus based monitoring.
|
||||
Together with
|
||||
[kube-prometheus-stack](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack) you
|
||||
easily leverage the full potential of open-source cloud-native observability stack.
|
||||
openDesk includes integration with Prometheus-based monitoring.
|
||||
|
||||
Before enabling the following options, you need to install the respective CRDs from the kube-prometheus-stack
|
||||
repository or prometheus operator.
|
||||
Together with [kube-prometheus-stack](https://github.com/prometheus-community/helm-charts/tree/main/charts/kube-prometheus-stack), you can easily leverage the full potential of the open-source cloud-native observability stack.
|
||||
|
||||
## Defaults
|
||||
Before enabling the following options, you need to install the respective custom resource definitions (CRDs) from the kube-prometheus-stack
|
||||
repository or Prometheus operator.
|
||||
|
||||
# Defaults
|
||||
|
||||
All configurable options and their defaults can be found in
|
||||
[`monitoring.yaml`](../helmfile/environments/default/monitoring.yaml).
|
||||
[`monitoring.yaml.gotmpl`](../helmfile/environments/default/monitoring.yaml.gotmpl).
|
||||
|
||||
## Metrics
|
||||
# Metrics
|
||||
|
||||
To deploy podMonitor and serviceMonitor custom resources, enable it by:
|
||||
To deploy `podMonitor` and `serviceMonitor` custom resources, enable it by:
|
||||
|
||||
```yaml
|
||||
prometheus:
|
||||
@@ -44,9 +43,12 @@ prometheus:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
## Alerts
|
||||
# Alerts
|
||||
|
||||
Some helm-charts provide a default set of prometheusRules for alerting, enable it by:
|
||||
openDesk ships with a set of Prometheus alerting rules that are specific to the operation of openDesk.
|
||||
Some of these are created by our partners while others are defined in [opendesk-alerts](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-alerts).
|
||||
|
||||
All alert rules are deployed as [PrometheusRule](https://prometheus-operator.dev/docs/api-reference/api/#monitoring.coreos.com/v1.PrometheusRule) and can be enabled like this:
|
||||
|
||||
```yaml
|
||||
prometheus:
|
||||
@@ -54,9 +56,9 @@ prometheus:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
## Dashboards for Grafana
|
||||
# Dashboards for Grafana
|
||||
|
||||
To deploy optional ConfigMaps with Grafana dashboards, enable it by:
|
||||
To deploy optional Grafana dashboards with ConfigMaps, enable the functionality with:
|
||||
|
||||
```yaml
|
||||
grafana:
|
||||
@@ -64,8 +66,11 @@ grafana:
|
||||
enabled: true
|
||||
```
|
||||
|
||||
## Components
|
||||
| Component | Metrics (pod- or serviceMonitor) | Alerts (prometheusRule) | Dashboard (Grafana) |
|
||||
|:----------|-----------------------------------|-------------------------|---------------------|
|
||||
| Collabora | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
||||
| Nextcloud | :white_check_mark: | :x: | :x: |
|
||||
Please find further details in the [related Helm chart](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/charts/opendesk-dashboards).
|
||||
|
||||
# Component overview
|
||||
|
||||
| Component | Metrics (pod- or serviceMonitor) | Alerts (prometheusRule) | Dashboard (Grafana) |
|
||||
|:----------|----------------------------------|-------------------------|---------------------|
|
||||
| Collabora | :white_check_mark: | :white_check_mark: | :white_check_mark: |
|
||||
| Nextcloud | :white_check_mark: | :x: | :x: |
|
||||
|
||||
202
docs/permissions.md
Normal file
@@ -0,0 +1,202 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Roles & Permissions</h1>
|
||||
|
||||
openDesk uses role-based access control (RBAC) to manage permissions. This system ensures that users have access only to the resources necessary for their role.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Identity and Access Management (IAM)](#identity-and-access-management-iam)
|
||||
* [Permissions](#permissions)
|
||||
* [Roles](#roles)
|
||||
* [Application usage](#application-usage)
|
||||
* [Application administration](#application-administration)
|
||||
* [Groups](#groups)
|
||||
* [Global groups](#global-groups)
|
||||
* [Application groups](#application-groups)
|
||||
* [Standard access to applications](#standard-access-to-applications)
|
||||
* [Administrative access to applications](#administrative-access-to-applications)
|
||||
* [Custom groups](#custom-groups)
|
||||
* [Assigning roles/groups and permissions](#assigning-rolesgroups-and-permissions)
|
||||
* [Predefined roles/user templates](#predefined-rolesuser-templates)
|
||||
* [*openDesk User*](#opendesk-user)
|
||||
* [*openDesk Administrator*](#opendesk-administrator)
|
||||
* [Managing permissions](#managing-permissions)
|
||||
* [Hierarchies and delegation](#hierarchies-and-delegation)
|
||||
* [Audit/Logging](#auditlogging)
|
||||
* [Reporting](#reporting)
|
||||
* [Delegation](#delegation)
|
||||
* [Regular review](#regular-review)
|
||||
* [Applications](#applications)
|
||||
* [Roles/Groups](#rolesgroups)
|
||||
<!-- TOC -->
|
||||
|
||||
# Identity and Access Management (IAM)
|
||||
|
||||
Within openDesk's Identity and Access Management component, Nubus, openDesk user accounts are managed, as well as some core roles and permissions.
|
||||
|
||||
## Permissions
|
||||
|
||||
A permission represents a specific authorization that defines an action a user is allowed to perform on a resource.
|
||||
|
||||
As openDesk consists of multiple applications, each application may have different needs regarding its fine-grained internal permissions. Usually these permissions are manged within each component.
|
||||
|
||||
The high-level permissions required to access the application, as well as group membership of users is managed in the IAM.
|
||||
|
||||
## Roles
|
||||
|
||||
Roles are defined sets of permissions that can be assigned to users. Each role corresponds to a specific set of tasks and responsibilities within the system. In openDesk's IAM, two roles are defined by default:
|
||||
|
||||
- **openDesk Administrator**: Manages openDesk-global settings, such as users and groups.
|
||||
- **openDesk User**: Can log in to openDesk to make use of defined openDesk applications.
|
||||
|
||||
> **Note**<br>
|
||||
> Although it is not enforced by openDesk, it is strongly recommended that a user account is not granted both roles at the same time. This is to maintain the separation of duties.
|
||||
|
||||
### Application usage
|
||||
|
||||
To access and use applications in openDesk and to address [the principle of least privilege](https://en.wikipedia.org/wiki/Principle_of_least_privilege), a user needs to have the necessary permissions set. openDesk defines the following permissions to access applications:
|
||||
|
||||
- **Groupware**: Use email, calendar, and address book applications.
|
||||
- **Chat**: Use the chat application.
|
||||
- **Knowledge Management**: Use the wiki application.
|
||||
- **Project Management**: Use the project management application.
|
||||
- **File Sharing**: Use the file sharing application.
|
||||
- **Video Conference**: Use the video conferencing application.
|
||||
|
||||
### Application administration
|
||||
|
||||
For applications that provide application-specific administrative settings, openDesk defines the following permissions:
|
||||
|
||||
- **Knowledge Management Admin**: Manage the wiki application.
|
||||
- **Project Management Admin**: Manage the project management application settings.
|
||||
- **File Sharing Admin**: Manage the file sharing administrative settings.
|
||||
|
||||
## Groups
|
||||
|
||||
Groups help with clustering users with similar responsibilities and make it easier to assign roles or permissions. It is often the case that a group maps directly to a role.
|
||||
|
||||
openDesk includes predefined groups. Please see below.
|
||||
|
||||
### Global groups
|
||||
|
||||
- **Domain Users**: Members of this group are *openDesk Users*.
|
||||
- **Domain Admins**: Members of this group are *openDesk IAM Administrators*. By default, this group has two-factor authentication (2FA) enabled.
|
||||
- **2fa-users**: Members of this group that are forced to use two-factor authentication (2FA).
|
||||
- **IAM API - Full Access**: Members of this group have full (read and write) access to the IAM's REST API.
|
||||
|
||||
### Application groups
|
||||
|
||||
When editing a user in the IAM, you can select if a user can access or get elevated admin permission for a specific application within the "openDesk" tab. The selection is stored as an attribute on the user object, but in other applications, it is helpful to also expose this information as a group membership. Therefore, openDesk comes with the following [groups](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-nubus/-/blob/main/udm/udm-data-loader/63-groups.yaml).
|
||||
|
||||
To easily identify these groups, all of them are prefixed with `managed-by-Attribute-`.
|
||||
|
||||
> **Note**<br>
|
||||
> The membership of these groups is automatically managed based on the user's attributes from the "openDesk" tab. Any changes directly to the groups will be overwritten, so please always use the "openDesk" tab of the respective user. The IAM supports editing user attributes across multiple accounts simultaneously.
|
||||
|
||||
#### Standard access to applications
|
||||
|
||||
Unless a user is a member of a group, the respective application is not shown in the portal.
|
||||
|
||||
> **Note**<br>
|
||||
> In openDesk's identity provider, the required OIDC claims to access an application are only granted when the respective group membership is available. This means that even if a user who is not a member of an application group knows the link to the application and calls it directly, the single sign-on will be unsuccessful.
|
||||
|
||||
- **managed-by-Attribute-Groupware**: Members of this group have access to the groupware applications.
|
||||
- **managed-by-Attribute-Fileshare**: Members of this group have access to the file sharing application.
|
||||
- **managed-by-Attribute-Projectmanagement**: Members of this group have access to the project management application.
|
||||
- **managed-by-Attribute-Knowledgemanagement**: Members of this group have access to the wiki application.
|
||||
- **managed-by-Attribute-Livecollaboration**: Members of this group have access to the chat application.
|
||||
- **managed-by-Attribute-Videoconference**: Members of this group have access to the video conferencing application.
|
||||
|
||||
#### Administrative access to applications
|
||||
|
||||
Within some applications it is possible to grant users elevated permissions, these are also primarily managed by attributes from the "openDesk" tab when editing a user, but are also automatically mapped to the following groups:
|
||||
|
||||
- **managed-by-Attribute-FileshareAdmin**: Members of this group can administrate the file sharing application.
|
||||
- **managed-by-Attribute-ProjectmanagementAdmin**: Members of this group can administrate the project management application.
|
||||
- **managed-by-Attribute-KnowledgemanagementAdmin**: Members of this group can administrate the wiki application.
|
||||
|
||||
### Custom groups
|
||||
|
||||
While openDesk ships with predefined groups, additional groups can be [created](https://docs.opendesk.eu/administration/gruppen/) by an *IAM Administrator*.
|
||||
|
||||
## Assigning roles/groups and permissions
|
||||
|
||||
Users get roles assigned based on their responsibilities and the tasks they need to perform. This assignment can be done by an admin through the [administration portal](https://docs.opendesk.eu/administration/).
|
||||
|
||||
## Predefined roles/user templates
|
||||
|
||||
openDesk defines [templates](https://gitlab.opencode.de/bmi/opendesk/components/platform-development/images/opendesk-nubus/-/blob/main/udm/udm-data-loader/65-usertemplate.yaml) for the *User* and *Administrator* roles. The templates can be used by an *openDesk Administrator* to create users with these roles using the [administration portal](https://docs.opendesk.eu/administration/).
|
||||
|
||||
> **Note**<br>
|
||||
> Additional/custom templates can be created using the UDM REST API.
|
||||
|
||||
### *openDesk User*
|
||||
|
||||
The *openDesk User* template sets the primary group to *Domain Users* and initially sets the following permissions:
|
||||
|
||||
- **Groupware**: Enabled
|
||||
- **Chat**: Enabled
|
||||
- **Knowledge Management**: Enabled
|
||||
- **Project Management**: Enabled
|
||||
- **File Sharing**: Enabled
|
||||
- **Video Conference**: Enabled
|
||||
- **Knowledge Management Admin**: Disabled
|
||||
- **Project Management Admin**: Disabled
|
||||
- **File Sharing Admin**: Disabled
|
||||
|
||||
### *openDesk Administrator*
|
||||
|
||||
The *openDesk Administrator* template sets the primary group to *Domain Admins* and initially sets the following permissions:
|
||||
|
||||
- **Groupware**: Disabled
|
||||
- **Chat**: Disabled
|
||||
- **Knowledge Management**: Disabled
|
||||
- **Project Management**: Disabled
|
||||
- **File Sharing**: Disabled
|
||||
- **Video Conference**: Disabled
|
||||
- **Knowledge Management Admin**: Disabled
|
||||
- **Project Management Admin**: Disabled
|
||||
- **File Sharing Admin**: Disabled
|
||||
|
||||
## Managing permissions
|
||||
|
||||
*Administrators* can manage permissions of *Users* using the [administration portal](https://docs.opendesk.eu/administration/).
|
||||
|
||||
By using roles and permissions, openDesk ensures that users have the appropriate level of access, enhancing both security and efficiency.
|
||||
|
||||
## Hierarchies and delegation
|
||||
|
||||
The IAM allows for the nesting of groups, for example, a group can be both assigned to members and other groups, or just groups.
|
||||
|
||||
## Audit/Logging
|
||||
|
||||
Univention is about to provide audit logging which brings the idea of the [UCS based directory logger](https://docs.software-univention.de/manual/5.0/en/domain-ldap/ldap-directory.html#audit-proof-logging-of-ldap-changes) to Nubus. openDesk will offer this feature as soon as it is made available in Nubus.
|
||||
|
||||
## Reporting
|
||||
|
||||
The IAM webinterface supports the export of reports on users and groups, which are the essential objects when it comes to permissions. These data exports can be subjected to custom data analysis.
|
||||
|
||||
## Delegation
|
||||
|
||||
Currently, the temporary assignment of roles is not supported. Role membership must be managed at the time of granting / revoking the membership.
|
||||
|
||||
## Regular review
|
||||
|
||||
While the overall role and permission setup must be checked by the customer, including the respective custom roles, the openDesk team constantly challenges and improves role and permission management, for example, addressing the need for a distinct "support" role.
|
||||
|
||||
# Applications
|
||||
|
||||
Managing all application permissions within the IAM would require a superset of permissions to be available in the IAM. This would lead to a high level of administrative complexity. Instead, the application specific permissions are usually managed within an application itself and mapped to roles/groups that are managed in the IAM.
|
||||
|
||||
## Roles/Groups
|
||||
|
||||
Within IAM groups, the visibility of openDesk applications can be configured. Like with users, this is done in the "openDesk" tab of the [group administration](https://docs.opendesk.eu/administration/gruppen/).
|
||||
|
||||
> **Note**<br>
|
||||
> Currently the openDesk applications do not support nested groups. As a result only direct group memberships of users are processed in the application.<br>
|
||||
> The plan is to enable the openDesk applications to either support nested groups or to actively provision users into an application while resolving the nested group memberships for the application.
|
||||
|
||||
Within an application, each available group can have a set of application specific permissions assigned.
|
||||
122
docs/releases.md
Normal file
@@ -0,0 +1,122 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Release management</h1>
|
||||
|
||||
This document outlines the release and patch management strategy for **openDesk**, ensuring that all updates, patches, and new releases are systematically **planned, tested, documented**, and **reliably deployed** into production. The process is designed to align with operational planning requirements and maintain system stability and security.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Release cycle](#release-cycle)
|
||||
* [Release types](#release-types)
|
||||
* [Release schedule](#release-schedule)
|
||||
* [Upgrades](#upgrades)
|
||||
* [Patch management process](#patch-management-process)
|
||||
* [Patch identification \& prioritization](#patch-identification--prioritization)
|
||||
* [Patch workflow](#patch-workflow)
|
||||
* [Communication plan](#communication-plan)
|
||||
* [Announcement channels](#announcement-channels)
|
||||
* [Timing of communications](#timing-of-communications)
|
||||
* [Documentation requirements](#documentation-requirements)
|
||||
* [Compliance \& review](#compliance--review)
|
||||
<!-- TOC -->
|
||||
|
||||
# Release cycle
|
||||
|
||||
openDesk follows a structured release cycle to ensure predictability and reliability:
|
||||
|
||||
## Release types
|
||||
|
||||
| Type | Frequency | Content |
|
||||
|----------------|---------------|---------------------------------------------------------------|
|
||||
| **Major** | Annually (Q3) | Large feature sets, architecture changes, breaking changes |
|
||||
| **Minor** | Monthly | New features, enhancements, may contain breaking changes or refactors (clearly flagged in the notes) |
|
||||
| **Patch** | On demand | Bug fixes, security updates, minor improvements, no intended breaking changes |
|
||||
|
||||
> **Note:** openDesk does **not** guarantee that minor releases are 100% backward‑compatible. When a breaking change is unavoidable it is announced in the release notes under a dedicated header **“Breaking Changes”** and a migration guide is provided.
|
||||
|
||||
## Release schedule
|
||||
|
||||
- **Major releases** are scheduled for **Q3 each year**, with planning beginning in Q1.
|
||||
- **Minor releases** occur **monthly on Mondays**, typically **around 10:00 AM** local time.
|
||||
- Each minor release follows a **4-week cycle**.
|
||||
- **Week 1–3**: Active development of new features and improvements.
|
||||
- **End of Week 3**: **Feature freeze** is enforced to allow stabilization and testing.
|
||||
- **Week 4**: Final testing, approvals, and preparation for release.
|
||||
- At the **end of Week 4**, a new minor version is released, and a new cycle begins.
|
||||
- **Patch releases** are created **on demand**, based on criticality and urgency.
|
||||
|
||||
## Upgrades
|
||||
|
||||
- openDesk does not guarantee an in‑place upgrade between two major versions. Always consult the release notes and plan appropriate migration efforts.
|
||||
- Even within the same major line, skipping multiple monthly minor versions is not guaranteed to work without intermediate upgrade steps.
|
||||
- All breaking changes, including those in monthly minor releases, are highlighted in the release notes under Breaking Changes.
|
||||
- Additional, non‑binding migration hints are collected in `migrations.md`
|
||||
|
||||
# Patch management process
|
||||
|
||||
A standardized process ensures patches are developed, prioritized, and deployed efficiently.
|
||||
|
||||
## Patch identification & prioritization
|
||||
|
||||
Patches are categorized by severity and urgency:
|
||||
|
||||
| Priority Level | Criteria |
|
||||
|----------------|--------------------------------------------------------------------------|
|
||||
| **Critical** | Security vulnerabilities, system outages, data loss risks |
|
||||
| **High** | Major bugs affecting multiple users, performance degradation |
|
||||
| **Medium** | Functional bugs with workarounds, minor usability issues |
|
||||
| **Low** | Cosmetic issues, documentation updates |
|
||||
|
||||
## Patch workflow
|
||||
|
||||
The following steps define the patch workflow from issue identification to post-deployment review. This process ensures consistent quality and minimal disruption to users:
|
||||
|
||||
1. **Identification**: Potential issues are detected through automated monitoring, internal testing, audits, or user reports submitted via the support ticketing system.
|
||||
2. **Assessment**: The product and engineering teams triage the issue, determine severity based on business and user impact, and prioritize it within the patch queue.
|
||||
3. **Development**: A fix is implemented on a dedicated feature or hotfix branch, adhering to coding standards and version control protocols.
|
||||
4. **Testing**: All patches undergo automated unit and integration tests, as well as manual QA validation in a staging environment that closely mirrors production.
|
||||
5. **Approval**: Once tested, the patch must be approved by the product owner or a designated release manager, with proper documentation and change control entries.
|
||||
6. **Deployment**: The patch is rolled out using CI/CD pipelines during predefined deployment windows or as soon as possible for critical issues.
|
||||
7. **Post-deployment review**: After deployment, the fix is verified in production, and monitoring tools are used to detect regressions or unintended side effects.
|
||||
|
||||
This workflow ensures that patches are handled with the same level of discipline as planned releases, supporting both reliability and agility.
|
||||
|
||||
# Communication plan
|
||||
|
||||
A lightweight approach reduces manual effort while maintaining transparency.
|
||||
|
||||
## Announcement channels
|
||||
|
||||
| Channel | Audience | Purpose | Owner |
|
||||
|---------|----------|---------|-------|
|
||||
| **openCode Changelog** | Community & EE | Primary source of truth for every release | DevOps |
|
||||
| **Account‑Manager Mail / Ticket** | Enterprise customers | Targeted information & upgrade advice | Customer Success |
|
||||
|
||||
## Timing of communications
|
||||
|
||||
| Release Type | What | When |
|
||||
|--------------|------|------|
|
||||
| **Major** | Roadmap entry + migration highlights | 4 weeks before release |
|
||||
| | Final confirmation | 1 week before release |
|
||||
| **Minor** | Changelog entry (draft) | Immediately after feature freeze (end of week 3) |
|
||||
| | EE mail/ticket | 2 business days before deployment |
|
||||
| **Patch** | Changelog entry | Right after production deploy |
|
||||
| | EE mail/ticket (only if impacted) | Within 1 business day |
|
||||
|
||||
Community users consume information via openCode; Enterprise customers get an additional nudge via their account manager – **no mass mailings are sent manually**.
|
||||
|
||||
# Documentation requirements
|
||||
|
||||
Each release (major, minor, or patch) must include:
|
||||
|
||||
- **Release notes** outlining new features, fixes, and known issues
|
||||
- **Change logs** with commit references and affected components
|
||||
- **Test reports** confirming QA coverage and results
|
||||
- **Deployment checklist** reviewed and approved by the product owner
|
||||
|
||||
# Compliance & review
|
||||
|
||||
- The release process is reviewed **bi-annually** to incorporate feedback and evolving requirements
|
||||
- Emergency patches (e.g., zero-day security issues) may bypass the standard schedule but must be documented post-deployment
|
||||
@@ -1,105 +1,144 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2024-2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Requirements</h1>
|
||||
|
||||
This section covers the internal system requirements as well as external service requirements for productive use.
|
||||
This section covers the internal system requirements and external service requirements for productive use.
|
||||
|
||||
<!-- TOC -->
|
||||
* [TL;DR;](#tldr)
|
||||
* [Hardware](#hardware)
|
||||
* [Kubernetes](#kubernetes)
|
||||
* [Ingress controller](#ingress-controller)
|
||||
* [Volume provisioner](#volume-provisioner)
|
||||
* [Certificate management](#certificate-management)
|
||||
* [External services](#external-services)
|
||||
* [Deployment](#deployment)
|
||||
* [tl;dr](#tldr)
|
||||
* [Hardware](#hardware)
|
||||
* [Kubernetes](#kubernetes)
|
||||
* [Ingress controller](#ingress-controller)
|
||||
* [Supported controllers](#supported-controllers)
|
||||
* [Minimal configuration](#minimal-configuration)
|
||||
* [Volume provisioner](#volume-provisioner)
|
||||
* [Certificate management](#certificate-management)
|
||||
* [External services](#external-services)
|
||||
* [Deployment](#deployment)
|
||||
* [Footnotes](#footnotes)
|
||||
<!-- TOC -->
|
||||
|
||||
## TL;DR;
|
||||
openDesk is a Kubernetes only solution and requires an existing Kubernetes (K8s) cluster.
|
||||
# tl;dr
|
||||
|
||||
- K8s cluster >= 1.24, [CNCF Certified Kubernetes Distro](https://www.cncf.io/certification/software-conformance/)
|
||||
openDesk is a Kubernetes-only solution and requires an existing Kubernetes (K8s) cluster.
|
||||
|
||||
- K8s cluster >= v1.24, [CNCF Certified Kubernetes distribution](https://www.cncf.io/certification/software-conformance/)
|
||||
- Domain and DNS Service
|
||||
- Ingress controller (supported are nginx-ingress, HAProxy)
|
||||
- [Helm](https://helm.sh/) >= v3.9.0
|
||||
- [Helmfile](https://helmfile.readthedocs.io/en/latest/) >= **v0.157.0**
|
||||
- [HelmDiff](https://github.com/databus23/helm-diff) >= 3.6.0
|
||||
- Volume provisioner supporting RWO (read-write-once)
|
||||
- Ingress controller (Ingress NGINX) >= [4.11.5/1.11.5](https://github.com/kubernetes/ingress-nginx/releases)
|
||||
- [Helm](https://helm.sh/) >= v3.17.3, but not v3.18.0[^1]
|
||||
- [Helmfile](https://helmfile.readthedocs.io/en/latest/) >= v1.0.0
|
||||
- [HelmDiff](https://github.com/databus23/helm-diff) >= v3.11.0
|
||||
- Volume provisioner supporting RWO (read-write-once)[^2]
|
||||
- Certificate handling with [cert-manager](https://cert-manager.io/)
|
||||
- [Istio](https://istio.io/) is currently required to deploy and operate OX AppSuite8
|
||||
|
||||
## Hardware
|
||||
**Additional openDesk Enterprise requirements**
|
||||
- [OpenKruise](https://openkruise.io/)[^3] >= v1.6
|
||||
|
||||
The following minimal requirements are thought for initial evaluation deployment:
|
||||
# Hardware
|
||||
|
||||
| Spec | Value |
|
||||
|------|------------------------------------------------------|
|
||||
| CPU | 8 Cores of x64 or x86 CPU (ARM is not supported yet) |
|
||||
| RAM | 16 GB, recommended 32 GB |
|
||||
| Disk | HDD or SSD, >10 GB |
|
||||
The following minimum requirements are intended for initial evaluation deployment:
|
||||
|
||||
## Kubernetes
|
||||
| Spec | Value |
|
||||
|------|-------------------------------------------------------|
|
||||
| CPU | 12 Cores of x64 or x86 CPU (ARM is not supported yet) |
|
||||
| RAM | 32 GB, more recommended |
|
||||
| Disk | HDD or SSD, >10 GB |
|
||||
|
||||
Any self-hosted or managed K8s cluster >= 1.24 listed in
|
||||
[CNCF Certified Kubernetes Distros](https://www.cncf.io/certification/software-conformance/) should be supported.
|
||||
# Kubernetes
|
||||
|
||||
Any self-hosted or managed K8s cluster >= v1.24 listed in
|
||||
[CNCF Certified Kubernetes distributions](https://www.cncf.io/certification/software-conformance/) should be supported.
|
||||
|
||||
The deployment is tested against [kubespray](https://github.com/kubernetes-sigs/kubespray) based clusters.
|
||||
|
||||
> **Note:** The deployment is not tested against OpenShift.
|
||||
> **Note**<br>
|
||||
> The deployment is not tested against OpenShift.
|
||||
|
||||
## Ingress controller
|
||||
# Ingress controller
|
||||
|
||||
The deployment is intended to use only over HTTPS via a configured FQDN, therefor it is required to have a proper
|
||||
configured ingress controller deployed.
|
||||
The deployment is intended to be used only over HTTPS via a configured FQDN, therefore it is required to have a properly
|
||||
configured ingress controller deployed in your cluster.
|
||||
|
||||
**Maintained controllers:**
|
||||
- [NGINX Ingress Controller](https://github.com/nginxinc/kubernetes-ingress)
|
||||
- [HAProxy Kubernetes Ingress Controller](https://github.com/haproxytech/kubernetes-ingress)
|
||||
## Supported controllers
|
||||
|
||||
**Community Supported:**
|
||||
- [Ingress NGINX Controller](https://github.com/kubernetes/ingress-nginx)
|
||||
|
||||
When you want to use Open-Xchange Appsuite 8, you need to deploy and configure additionally [Istio](https://istio.io/)
|
||||
> **Note**<br>
|
||||
> The platform development team is evaluating the use of [Gateway API](https://gateway-api.sigs.k8s.io/).
|
||||
|
||||
## Volume provisioner
|
||||
**Compatibility with Ingress NGINX >= 1.12.0**
|
||||
|
||||
Initial evaluation deployment requires a `ReadWriteOnce` volume provisioner. For local deployment a local- or hostPath-
|
||||
With the release 1.12.0 Ingress NGINX introduced new security default settings, which are incompatible with current openDesk releases. If you want to use Ingress-NGINX >= 1.12.0 the following settings have to be set:
|
||||
```
|
||||
controller.config.annotations-risk-level=Critical
|
||||
controller.config.strict-validate-path-type=false
|
||||
```
|
||||
See the [`annotations-risk-level` documentation](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#annotations-risk-level) and [`strict-validate-path-type` documentation](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#strict-validate-path-type) for details.
|
||||
|
||||
> **Important Note**<br>
|
||||
> Ensure to install at least Ingress NGINX 1.11.5 or 1.12.1 due to [security issues](https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities) in earlier versions.
|
||||
|
||||
## Minimal configuration
|
||||
|
||||
Several components in openDesk make use of snippet annotations, which are disabled by default. Please enable them using the following configuration:
|
||||
```
|
||||
controller.allowSnippetAnnotations=true
|
||||
controller.admissionWebhooks.allowSnippetAnnotations=true
|
||||
```
|
||||
See the [`allowSnippetAnnotations` documentation](https://kubernetes.github.io/ingress-nginx/user-guide/nginx-configuration/configmap/#allow-snippet-annotations) for context.
|
||||
|
||||
# Volume provisioner
|
||||
|
||||
Initial evaluation deployment requires a `ReadWriteOnce` volume provisioner. For local deployment, a local- or hostPath-
|
||||
provisioner is sufficient.
|
||||
|
||||
> **Note:** Some components requiring a `ReadWriteMany` volume provisioner for distributed mode or scaling.
|
||||
> **Note**<br>
|
||||
> Some components require a `ReadWriteMany` volume provisioner for distributed mode or horizontal scaling.
|
||||
|
||||
## Certificate management
|
||||
# Certificate management
|
||||
|
||||
This deployment leverages [cert-manager](https://cert-manager.io/) to generate valid certificates. This is **optional**,
|
||||
but a secret containing a valid TLS certificate is required.
|
||||
|
||||
Only `Certificate` resources will be deployed, the `cert-manager` including its CRD must be installed prior to this or
|
||||
openDesk certificate management disabled.
|
||||
Only `Certificate` resources will be deployed; the `cert-manager`, including its CRD must be installed before this or
|
||||
openDesk certificate management is switched off.
|
||||
|
||||
## External services
|
||||
# External services
|
||||
|
||||
Evaluation the openDesk deployment does not require any external service to start, but features may be limited.
|
||||
For the development and evaluation of openDesk, we bundle some services. Be aware that for production
|
||||
deployments, you need to make use of your own production-grade services; see the
|
||||
[external-services.md](./external-services.md) for configuration details.
|
||||
|
||||
|
||||
| Group | Type | Version | Tested against |
|
||||
|----------|---------------------|---------|-----------------------|
|
||||
| Cache | Memached | `1.6.x` | Memached |
|
||||
| | Redis | `7.x.x` | Redis |
|
||||
| Database | MariaDB | `10.x` | MariaDB |
|
||||
| Group | Type | Version | Tested against |
|
||||
|----------|---------------------|---------|-----------------------|
|
||||
| Cache | Memcached | `1.6.x` | Memcached |
|
||||
| | Redis | `7.x.x` | Redis |
|
||||
| Database | Cassandra[^3] | `5.0.x` | Cassandra |
|
||||
| | MariaDB | `10.x` | MariaDB |
|
||||
| | PostgreSQL | `15.x` | PostgreSQL |
|
||||
| Mail | Mail Transfer Agent | | Postfix |
|
||||
| | PKI/CI (SMIME) | | |
|
||||
| | PKI/CI (S/MIME) | | |
|
||||
| Security | AntiVirus/ICAP | | ClamAV |
|
||||
| Storage | K8s ReadWriteOnce | | Ceph / Cloud specific |
|
||||
| | K8s ReadWriteMany | | Ceph / NFS |
|
||||
| | Object Storage | | MinIO |
|
||||
| Voice | TURN | | Coturn |
|
||||
|
||||
## Deployment
|
||||
# Deployment
|
||||
|
||||
The deployment of each individual component is [Helm](https://helm.sh/) based. The 35+ Helm charts are configured and
|
||||
The deployment of each component is [Helm](https://helm.sh/) based. The 35+ Helm charts are configured and
|
||||
templated via [Helmfile](https://helmfile.readthedocs.io/en/latest/) to provide a streamlined deployment experience.
|
||||
|
||||
Helmfile requires [HelmDiff](https://github.com/databus23/helm-diff) to compare desired against deployed state.
|
||||
Helmfile requires [HelmDiff](https://github.com/databus23/helm-diff) to compare the desired state against the deployed state.
|
||||
|
||||
# Footnotes
|
||||
|
||||
[^1]: Due to a [Helm bug](https://github.com/helm/helm/issues/30890) Helm 3.18.0 is not supported.
|
||||
|
||||
[^2]: Due to [restrictions on Kubernetes `emptyDir`](https://github.com/kubernetes/kubernetes/pull/130277) you need a volume provisioner that has sticky bit support, otherwise the OpenProject seeder job will fail.
|
||||
|
||||
[^3]: Required for Dovecot Pro as part of openDesk Enterprise Edition.
|
||||
|
||||
@@ -1,52 +1,39 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-FileCopyrightText: 2023 Bundesministerium des Innern und für Heimat, PG ZenDiS "Projektgruppe für Aufbau ZenDiS"
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
|
||||
<h1>Scaling</h1>
|
||||
|
||||
This document should cover the abilities to scale apps.
|
||||
This document covers the possibilities to scale the applications in openDesk.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Replicas](#replicas)
|
||||
<!-- TOC -->
|
||||
It provides rough benchmarks for configuring your own environment across various scale levels.
|
||||
In production, resource demands are primarily driven by actual usage patterns and system load, especially the number of concurrently active users.
|
||||
Consequently, we strongly recommend implementing monitoring and logging solutions to detect usage trends and enable timely intervention when needed.
|
||||
|
||||
## Replicas
|
||||
| Application | Recommendation | Note(s) |
|
||||
| ------------ | -------------- | ------- |
|
||||
| Collabora | - 1 vCPU per 15 active users <br/> - 50 MB RAM per active user <br/> - 1 MBit/s per 10 active users | - |
|
||||
| Element | Per 10k users with values for federation activated / federation deactivated:<br/><br/> Homeserver:<br/> - 15 / 10 vCPU<br/> - 12 / 8 GB RAM<br/><br/>Postgres:<br/> - 10 / 4 vCPU<br/> - 32 / 16 GB RAM | Required hardware resources are impacted by whether or not federation is being used |
|
||||
| Cryptpad | No large-scale deployments seen, minimum requirements: <br/> - 2 vCPU <br/> - 2 GB RAM <br/> - 20 GB storage (depending on planned usage) | Most of the computation is done client-side |
|
||||
| Jitsi | Jitsi-Meet server: <br/> - 4 vCPU <br/> - 8 GB RAM <br/> <br/> For every 200 concurrent users one JVB with: <br/> - 8 vCPU <br/> - 8 GB RAM <br/><br/> Network bandwidth: <br/> - 1 GBit/s - 10 GBit/s small deployments <br/> - 10 Gbit/s *per bridge* large deployments<br/> | JVB network bandwidth calculation depends on the stream resolution (HD vs. 4k). |
|
||||
| Nextcloud | Up to 5k / more than 5k users: <br/> - 4 to 20 Nextcloud AIO Pods with 8 vCPUs and 32 / 64 GB RAM each <br/> - 2 / 4 DB servers with 8 / 16 vCPUs and 64 / 128 GB RAM each, plus DB load balancer | - |
|
||||
| OpenProject | - 4-6 vCPU per ~500 users <br/> - 6-8 GB per ~500 users <br/> - +20-50 GB storage per ~500 users, depending on workload and attachment storage[^1] <br/><br/> - Web Workers: +4 per ~500 users <br/> - Background Workers: +1-2 multithreaded workers per ~500 users, depending on workload | These values are guidelines and should be adjusted based on actual monitoring of resource usage. Scaling should prioritize CPU and RAM, prioritize scaling Web Workers first, followed by Background Workers and Disk Space as needed. |
|
||||
| Open-Xchange | For ~200 users (64 concurrent users to App Suite & 128 users to Dovecot): <br/> - 10 vCPU <br/> - 58 GB RAM <br/> - 660 GB storage | - |
|
||||
| XWiki | Advise for small instances: <br> - 4 vCPU <br/> - 6 GB RAM | - |
|
||||
|
||||
The Replicas can be increased of almost any component, but is only effective for high-availability or load-balancing for
|
||||
apps with a check-mark in `Scaling (effective)` column.
|
||||
[^1]: Nextcloud is configured for attachment storage as well.
|
||||
|
||||
Verified positive effects are marke with a check-mark in `Scaling (verified)` column, apps which are not yet tested are
|
||||
marked with a gear.
|
||||
# Upstream information
|
||||
|
||||
While scaling services horizontally is the ideal solution, information about vertical scaling is helpful
|
||||
when defining the application's resources, see [`resources.yaml.gotmpl`](../helmfile/environments/default/resources.yaml.gotmpl) for references.
|
||||
|
||||
| Component | Name | Scaling (effective) | Scaling (verified) |
|
||||
|-------------|------------------------------------------|:-------------------:|:------------------:|
|
||||
| ClamAV | `replicas.clamav` | :white_check_mark: | :white_check_mark: |
|
||||
| | `replicas.clamd` | :white_check_mark: | :white_check_mark: |
|
||||
| | `replicas.freshclam` | :x: | :x: |
|
||||
| | `replicas.icap` | :white_check_mark: | :white_check_mark: |
|
||||
| | `replicas.milter` | :white_check_mark: | :white_check_mark: |
|
||||
| Collabora | `replicas.collabora` | :white_check_mark: | :gear: |
|
||||
| CryptPad | `replicas.cryptpad` | :white_check_mark: | :gear: |
|
||||
| Dovecot | `replicas.dovecot` | :x: | :gear: |
|
||||
| Element | `replicas.element` | :white_check_mark: | :white_check_mark: |
|
||||
| | `replicas.matrixNeoBoardWidget` | :white_check_mark: | :gear: |
|
||||
| | `replicas.matrixNeoChoiceWidget` | :white_check_mark: | :gear: |
|
||||
| | `replicas.matrixNeoDateFixBot` | :white_check_mark: | :gear: |
|
||||
| | `replicas.matrixNeoDateFixWidget` | :white_check_mark: | :gear: |
|
||||
| | `replicas.matrixUserVerificationService` | :white_check_mark: | :gear: |
|
||||
| | `replicas.synapse` | :x: | :gear: |
|
||||
| | `replicas.synapseWeb` | :white_check_mark: | :white_check_mark: |
|
||||
| | `replicas.wellKnown` | :white_check_mark: | :white_check_mark: |
|
||||
| Jitsi | `replicas.jibri` | :white_check_mark: | :gear: |
|
||||
| | `replicas.jicofo` | :white_check_mark: | :gear: |
|
||||
| | `replicas.jitsi ` | :white_check_mark: | :gear: |
|
||||
| | `replicas.jitsiKeycloakAdapter` | :white_check_mark: | :gear: |
|
||||
| | `replicas.jvb ` | :x: | :x: |
|
||||
| Keycloak | `replicas.keycloak` | :white_check_mark: | :gear: |
|
||||
| Minio | `replicas.minioDistributed` | :white_check_mark: | :white_check_mark: |
|
||||
| Nextcloud | `replicas.nextcloud` | :white_check_mark: | :gear: |
|
||||
| OpenProject | `replicas.openproject` | :white_check_mark: | :gear: |
|
||||
| Postfix | `replicas.postfix` | :x: | :gear: |
|
||||
| XWiki | `replicas.xwiki` | :white_check_mark: | :gear: |
|
||||
Linked below is documentation related to scaling for upstream applications, where publically available:
|
||||
|
||||
- [Collabora Online Technical Documentation](https://mautic.collaboraoffice.com/asset/60:collabora-online-technical-information-pdf)
|
||||
- [OpenProject System Requirements](https://www.openproject.org/docs/installation-and-operations/system-requirements/)
|
||||
- [XWiki Performance](https://www.xwiki.org/xwiki/bin/view/Documentation/AdminGuide/Performances/)
|
||||
- [Element Requirements and Recommendations](https://ems-docs.element.io/books/element-server-suite-documentation-lts-2404/page/requirements-and-recommendations)
|
||||
- [Jitsi DevOps Guide (scalable setup)](https://jitsi.github.io/handbook/docs/devops-guide/devops-guide-scalable/), [Jitsi Meet Needs](https://jitsi.github.io/handbook/docs/devops-guide/devops-guide-requirements/)
|
||||
|
||||
233
docs/security-context.md
Normal file
@@ -0,0 +1,233 @@
|
||||
<!--
|
||||
SPDX-FileCopyrightText: 2025 Zentrum für Digitale Souveränität der Öffentlichen Verwaltung (ZenDiS) GmbH
|
||||
SPDX-License-Identifier: Apache-2.0
|
||||
-->
|
||||
<h1>Kubernetes Security Context</h1>
|
||||
|
||||
<!-- TOC -->
|
||||
* [Container Security Context](#container-security-context)
|
||||
* [allowPrivilegeEscalation](#allowprivilegeescalation)
|
||||
* [capabilities](#capabilities)
|
||||
* [privileged](#privileged)
|
||||
* [runAsUser](#runasuser)
|
||||
* [runAsGroup](#runasgroup)
|
||||
* [seccompProfile](#seccompprofile)
|
||||
* [readOnlyRootFilesystem](#readonlyrootfilesystem)
|
||||
* [runAsNonRoot](#runasnonroot)
|
||||
* [Status quo](#status-quo)
|
||||
<!-- TOC -->
|
||||
|
||||
# Container Security Context
|
||||
|
||||
|
||||
The containerSecurityContext is the most important security-related section because it has the highest precedence and restricts the container to its minimal privileges.
|
||||
|
||||
## allowPrivilegeEscalation
|
||||
|
||||
|
||||
Privilege escalation (such as via set-user-ID or set-group-ID file mode) should not be allowed (Linux only) at any time.
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
```
|
||||
|
||||
## capabilities
|
||||
|
||||
|
||||
Containers must drop ALL capabilities, and are only permitted to add back the `NET_BIND_SERVICE` capability (Linux only).
|
||||
|
||||
|
||||
**Optimal:**
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- "ALL"
|
||||
```
|
||||
|
||||
|
||||
**Allowed:**
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
capabilities:
|
||||
drop:
|
||||
- "ALL"
|
||||
add:
|
||||
- "NET_BIND_SERVICE"
|
||||
```
|
||||
|
||||
## privileged
|
||||
|
||||
|
||||
Privileged Pods eliminate most security mechanisms and must be disallowed.
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
privileged: false
|
||||
```
|
||||
|
||||
## runAsUser
|
||||
|
||||
|
||||
Containers should set a user id >= 1000 and never use 0 (root) as user.
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
runAsUser: 1000
|
||||
```
|
||||
|
||||
## runAsGroup
|
||||
|
||||
|
||||
Containers should set a group id >= 1000 and never use 0 (root) as user.
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
runAsGroup: 1000
|
||||
```
|
||||
|
||||
## seccompProfile
|
||||
|
||||
|
||||
The seccompProfile must be explicitly set to one of the allowed values. An unconfined profile and the complete absence of the profile are prohibited.
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
seccompProfile:
|
||||
type: "RuntimeDefault"
|
||||
```
|
||||
|
||||
|
||||
or
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
seccompProfile:
|
||||
type: "Localhost"
|
||||
```
|
||||
|
||||
## readOnlyRootFilesystem
|
||||
|
||||
|
||||
Containers should have an immutable file systems, so that attackers can not modify application code or download malicious code.
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
readOnlyRootFilesystem: true
|
||||
```
|
||||
|
||||
## runAsNonRoot
|
||||
|
||||
|
||||
Containers must be required to run as non-root users.
|
||||
|
||||
```yaml
|
||||
containerSecurityContext:
|
||||
runAsNonRoot: true
|
||||
```
|
||||
|
||||
# Status quo
|
||||
|
||||
|
||||
openDesk aims to ensure that all security relevant settings are explicitly templated and comply with security recommendations.
|
||||
|
||||
|
||||
The rendered manifests are also validated against Kyverno [policies](/.kyverno/policies) in CI to ensure that the provided values inside openDesk are properly templated by the Helm charts.
|
||||
|
||||
|
||||
This list gives you an overview of templated security settings and if they comply with security standards:
|
||||
|
||||
|
||||
- **yes**: Value is set to `true`
|
||||
- **no**: Value is set to `false`
|
||||
- **n/a**: Not explicitly templated in openDesk; default is used.
|
||||
|
||||
| process | status | allowPrivilegeEscalation | privileged | readOnlyRootFilesystem | runAsNonRoot | runAsUser | runAsGroup | seccompProfile | capabilities |
|
||||
| ------- | ------ | ------------------------ | ---------- | ---------------------- | ------------ | --------- | ---------- | -------------- | ------------ |
|
||||
| **collabora**/collabora-online | :x: | yes | no | no | yes | 1001 | 1001 | yes | no ["CHOWN","FOWNER","SYS_CHROOT"] |
|
||||
| **cryptpad**/cryptpad | :x: | no | no | no | yes | 4001 | 4001 | yes | yes |
|
||||
| **element**/matrix-neoboard-widget | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **element**/matrix-neochoice-widget | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **element**/matrix-neodatefix-bot | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **element**/matrix-neodatefix-bot-bootstrap | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **element**/matrix-neodatefix-widget | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **element**/opendesk-element | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **element**/opendesk-matrix-user-verification-service | :x: | no | no | no | yes | 1000 | 1000 | yes | yes |
|
||||
| **element**/opendesk-matrix-user-verification-service-bootstrap | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **element**/opendesk-synapse | :white_check_mark: | no | no | yes | yes | 10991 | 10991 | yes | yes |
|
||||
| **element**/opendesk-synapse-web | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **element**/opendesk-well-known | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **jitsi**/jitsi | :white_check_mark: | no | no | yes | yes | 1993 | 1993 | yes | yes |
|
||||
| **jitsi**/jitsi/jitsi/jibri | :x: | n/a | n/a | n/a | n/a | n/a | n/a | n/a | no ["SYS_ADMIN"] |
|
||||
| **jitsi**/jitsi/jitsi/jicofo | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||
| **jitsi**/jitsi/jitsi/jigasi | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||
| **jitsi**/jitsi/jitsi/jvb | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||
| **jitsi**/jitsi/jitsi/prosody | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||
| **jitsi**/jitsi/jitsi/web | :x: | no | no | no | no | 0 | 0 | yes | no |
|
||||
| **jitsi**/jitsi/patchJVB | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **nextcloud**/opendesk-nextcloud-management | :x: | no | no | no | yes | 101 | 101 | yes | yes |
|
||||
| **nextcloud**/opendesk-nextcloud-notifypush | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **nextcloud**/opendesk-nextcloud/aio | :white_check_mark: | no | no | yes | yes | 101 | 101 | yes | yes |
|
||||
| **nextcloud**/opendesk-nextcloud/exporter | :white_check_mark: | no | no | yes | yes | 65532 | 65532 | yes | yes |
|
||||
| **notes**/impress/backend | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **notes**/impress/frontend | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **notes**/impress/y-provider | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **nubus**/intercom-service | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/intercom-service/provisioning | :x: | n/a | n/a | n/a | n/a | n/a | n/a | yes | no |
|
||||
| **nubus**/opendesk-keycloak-bootstrap | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/keycloak | :x: | no | n/a | no | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusKeycloakBootstrap | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusKeycloakExtensions/handler | :x: | n/a | n/a | n/a | n/a | n/a | n/a | yes | no |
|
||||
| **nubus**/ums/nubusKeycloakExtensions/proxy | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusLdapNotifier | :x: | no | n/a | yes | yes | 101 | 102 | yes | yes |
|
||||
| **nubus**/ums/nubusNotificationsApi | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusPortalConsumer | :x: | n/a | n/a | n/a | n/a | n/a | n/a | yes | no |
|
||||
| **nubus**/ums/nubusPortalFrontend | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusPortalServer | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusProvisioning | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusProvisioning/nats | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusSelfServiceConsumer | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusStackDataUms | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusUdmListener | :x: | no | n/a | yes | yes | 102 | 65534 | yes | yes |
|
||||
| **nubus**/ums/nubusUdmRestApi | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusUmcGateway | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **nubus**/ums/nubusUmcServer | :x: | no | n/a | yes | yes | 999 | 999 | yes | yes |
|
||||
| **open-xchange**/dovecot | :x: | no | n/a | yes | n/a | n/a | n/a | yes | no ["CHOWN","DAC_OVERRIDE","KILL","NET_BIND_SERVICE","SETGID","SETUID","SYS_CHROOT"] |
|
||||
| **open-xchange**/open-xchange/appsuite/core-documentconverter | :x: | no | no | no | yes | 987 | 1000 | yes | yes |
|
||||
| **open-xchange**/open-xchange/appsuite/core-guidedtours | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **open-xchange**/open-xchange/appsuite/core-imageconverter | :x: | no | no | no | yes | 987 | 1000 | yes | yes |
|
||||
| **open-xchange**/open-xchange/appsuite/core-mw/gotenberg | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **open-xchange**/open-xchange/appsuite/core-ui | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **open-xchange**/open-xchange/appsuite/core-ui-middleware | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **open-xchange**/open-xchange/appsuite/core-user-guide | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **open-xchange**/open-xchange/appsuite/guard-ui | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **open-xchange**/open-xchange/nextcloud-integration-ui | :x: | no | no | no | yes | 1000 | 1000 | yes | yes |
|
||||
| **open-xchange**/open-xchange/public-sector-ui | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **open-xchange**/opendesk-open-xchange-bootstrap | :x: | no | n/a | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **open-xchange**/postfix-ox | :x: | yes | yes | yes | no | 0 | 0 | yes | no |
|
||||
| **opendesk-migrations-post**/opendesk-migrations-post | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **opendesk-migrations-pre**/opendesk-migrations-pre | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **opendesk-openproject-bootstrap**/opendesk-openproject-bootstrap | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **opendesk-services**/opendesk-static-files | :x: | no | n/a | yes | yes | 101 | 101 | yes | yes |
|
||||
| **openproject**/openproject | :white_check_mark: | no | no | yes | yes | 1000 | 1000 | yes | yes |
|
||||
| **services-external**/cassandra | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **services-external**/clamav | :x: | no | no | yes | no | 0 | 0 | yes | no |
|
||||
| **services-external**/clamav-simple | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||
| **services-external**/clamav/clamd | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||
| **services-external**/clamav/freshclam | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||
| **services-external**/clamav/icap | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||
| **services-external**/clamav/milter | :white_check_mark: | no | no | yes | yes | 100 | 101 | yes | yes |
|
||||
| **services-external**/mariadb | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **services-external**/memcached | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **services-external**/minio | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **services-external**/opendesk-dkimpy-milter | :x: | yes | no | yes | yes | 1000 | 1000 | yes | no |
|
||||
| **services-external**/postfix | :x: | yes | yes | yes | no | 0 | 0 | yes | no |
|
||||
| **services-external**/postgresql | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **services-external**/redis/master | :white_check_mark: | no | no | yes | yes | 1001 | 1001 | yes | yes |
|
||||
| **xwiki**/xwiki | :x: | no | no | no | yes | 100 | 101 | yes | yes |
|
||||
|
||||
|
||||
This file is auto-generated by [openDesk CI CLI](https://gitlab.opencode.de/bmi/opendesk/tooling/opendesk-ci-cli)
|
||||
109
docs/security.md
@@ -5,88 +5,47 @@ SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
<h1>Security</h1>
|
||||
|
||||
This document should cover the current status of security measurements.
|
||||
This document covers the current status of security measures.
|
||||
|
||||
<!-- TOC -->
|
||||
* [Helm Chart Trust Chain](#helm-chart-trust-chain)
|
||||
* [Kubernetes Security Enforcements](#kubernetes-security-enforcements)
|
||||
* [Helm chart trust chain](#helm-chart-trust-chain)
|
||||
* [Kubernetes security enforcements](#kubernetes-security-enforcements)
|
||||
* [Network policies](#network-policies)
|
||||
<!-- TOC -->
|
||||
|
||||
## Helm Chart Trust Chain
|
||||
# Helm chart trust chain
|
||||
|
||||
Helm Charts which are released via openDesk CI/CD process are always signed. The public GPG keys are present in
|
||||
`pubkey.gpg` file and are validated during helmfile installation.
|
||||
Helm charts are signed and validated against GPG keys in `helmfile/files/gpg-pubkeys`.
|
||||
|
||||
| Repository | OCI | Verifiable |
|
||||
|--------------------------------------|:---:|:------------------:|
|
||||
| bitnami-repo (openDesk build) | yes | :white_check_mark: |
|
||||
| clamav-repo | yes | :white_check_mark: |
|
||||
| collabora-online-repo | no | :x: |
|
||||
| cryptpad-online-repo | no | :x: |
|
||||
| intercom-service-repo | yes | :white_check_mark: |
|
||||
| istio-resources-repo | yes | :white_check_mark: |
|
||||
| jitsi-repo | yes | :white_check_mark: |
|
||||
| keycloak-extensions-repo | no | :x: |
|
||||
| keycloak-theme-repo | yes | :white_check_mark: |
|
||||
| mariadb-repo | yes | :white_check_mark: |
|
||||
| nextcloud-repo | no | :x: |
|
||||
| opendesk-certificates-repo | yes | :white_check_mark: |
|
||||
| opendesk-dovecot-repo | yes | :white_check_mark: |
|
||||
| opendesk-element-repo | yes | :white_check_mark: |
|
||||
| opendesk-keycloak-bootstrap-repo | yes | :white_check_mark: |
|
||||
| opendesk-nextcloud-bootstrap-repo | yes | :white_check_mark: |
|
||||
| opendesk-open-xchange-bootstrap-repo | yes | :white_check_mark: |
|
||||
| openproject-repo | no | :x: |
|
||||
| openxchange-repo | yes | :x: |
|
||||
| ox-connector-repo | no | :x: |
|
||||
| postfix-repo | yes | :white_check_mark: |
|
||||
| postgresql-repo | yes | :white_check_mark: |
|
||||
| univention-corporate-container-repo | yes | :white_check_mark: |
|
||||
| ums-repo | no | :x: |
|
||||
| xwiki-repo | no | :x: |
|
||||
For more details on Chart validation, please visit: https://helm.sh/docs/topics/provenance/
|
||||
|
||||
## Kubernetes Security Enforcements
|
||||
All charts except the ones mentioned below are verifiable:
|
||||
|
||||
This list gives you an overview of default security settings and if they comply with security standards:
|
||||
| Repository | Verifiable |
|
||||
|-------------------|:----------:|
|
||||
| open-xchange-repo | no |
|
||||
|
||||
# Kubernetes security enforcements
|
||||
|
||||
| Component | Process | = | allowPrivilegeEscalation (`false`) | capabilities (`drop: ALL`) | seccompProfile (`RuntimeDefault`) | readOnlyRootFilesystem (`true`) | runAsNonRoot (`true`) | runAsUser | runAsGroup | fsGroup |
|
||||
|--------------|----------------------------|:------------------:|:----------------------------------:|:----------------------------------------------------------------------------------------------------------------------------------------------:|:---------------------------------:|:-------------------------------:|:---------------------:|:---------:|:----------:|:-------:|
|
||||
| ClamAV | clamd | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||
| | freshclam | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||
| | icap | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||
| | milter | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 100 | 101 | 101 |
|
||||
| Collabora | collabora | :x: | :x: | :x: (`CHOWN`, `DAC_OVERRIDE`, `FOWNER`, `FSETID`, `KILL`, `SETGID`, `SETUID`, `SETPCAP`, `NET_BIND_SERVICE`, `NET_RAW`, `SYS_CHROOT`, `MKNOD`) | :white_check_mark: | :x: | :white_check_mark: | 100 | 101 | 100 |
|
||||
| CryptPad | npm | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 4001 | 4001 | 4001 |
|
||||
| Dovecot | dovecot | :x: | :white_check_mark: | :x: (`CHOWN`, `DAC_OVERRIDE`, `NET_BIND_SERVICE`, `SETGID`, `SETUID`, `SYS_CHROOT`) | :white_check_mark: | :white_check_mark: | :x: | - | - | 1000 |
|
||||
| Element | element | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||
| | synapse | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 10991 | - | 10991 |
|
||||
| | synapseWeb | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||
| | wellKnown | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 101 | 101 | 101 |
|
||||
| Jitsi | jibri | :x: | :x: | :x: (`SYS_ADMIN`) | :white_check_mark: | :x: | :x: | - | - | - |
|
||||
| | jicofo | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||
| | jitsiKeycloakAdapter | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1993 | 1993 | - |
|
||||
| | jvb | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||
| | prosody | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||
| | web | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||
| Keycloak | keycloak | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||
| | keycloakConfigCli | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||
| | keycloakExtensionHandler | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | keycloakExtensionProxy | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| MariaDB | mariadb | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||
| Memcached | memcached | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | - | 1001 |
|
||||
| Postfix | postfix | :x: | :x: | :x: | :white_check_mark: | :x: | :x: | - | - | 101 |
|
||||
| Open-Xchange | core-documentconverter | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 987 | 1000 | - |
|
||||
| | core-guidedtours | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | core-imageconverter | :x: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :x: | :white_check_mark: | 987 | 1000 | - |
|
||||
| | core-mw-default | :x: | :x: | :x: | :x: | :x: | :x: | - | - | - |
|
||||
| | core-ui | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | core-ui-middleware | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | core-ui-middleware-updater | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | core-user-guide | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | gotenberg | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | guard-ui | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | nextlcoud-integration-ui | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| | public-sector-ui | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1000 | 1000 | - |
|
||||
| OpenProject | openproject | :x: | :white_check_mark: | :x: | :white_check_mark: | :x: | :x: | - | - | - |
|
||||
| PostgreSQL | postgresql | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | :white_check_mark: | 1001 | 1001 | 1001 |
|
||||
This list gives you an overview of default security settings and whether they comply with security standards:
|
||||
|
||||
⟶ Visit our generated detailed [Security Context](./docs/security-context.md) overview.
|
||||
|
||||
# Network policies
|
||||
|
||||
Kubernetes network policies are an essential measure to secure your Kubernetes apps and clusters.
|
||||
When applied, they restrict traffic to your services.
|
||||
`NetworkPolicy` resources protect other deployments in your cluster or other services in your deployment from getting compromised when another
|
||||
component is compromised.
|
||||
|
||||
We ship a default set of Otterize `ClientIntents` via
|
||||
[Otterize intents operator](https://github.com/otterize/intents-operator) which translates intent-based access control
|
||||
(IBAC) into Kubernetes native network policies.
|
||||
|
||||
This requires the Otterize intents operator to be installed.
|
||||
|
||||
```yaml
|
||||
security:
|
||||
otterizeIntents:
|
||||
enabled: true
|
||||
```
|
||||
|
||||