onprem-deploy/yonote-chart/values.yaml

780 lines
22 KiB
YAML
Raw Normal View History

2024-07-11 12:13:26 +00:00
global:
2024-07-11 14:19:48 +00:00
postgresql:
auth:
database: yonote
username: yonote
2024-07-11 12:13:26 +00:00
yonote:
2024-07-16 07:33:04 +00:00
dbMigrationEnv: production-ssl-disabled # Режим подключения к базе данных при выполнении миграций. При использовании SSL подключения, установите значение `production`
2024-08-09 10:47:23 +00:00
baseListenAddress: onprem-test.stands.wilix.dev
2024-07-11 14:19:48 +00:00
2024-07-11 12:13:26 +00:00
config:
plain:
data:
2024-08-13 07:04:44 +00:00
DEPLOYMENT: hosted
2024-07-16 07:33:04 +00:00
NODE_ENV: production
2024-07-11 12:13:26 +00:00
FORCE_HTTPS: "false"
2024-07-16 07:33:04 +00:00
PGSSLMODE: disable # Отключает SSL подключение к базе данных. Уберите эту строку, если вы используете SSL подключение к PostgreSQL
2024-07-11 14:19:48 +00:00
2024-07-16 07:33:04 +00:00
BIND_HOST: 0.0.0.0 # Хост по умолчанию
PORT: "3000" # Порт по умолчанию
2024-07-11 14:19:48 +00:00
REDIS_URL: redis://yonote-redis-master:6379
2024-07-16 07:33:04 +00:00
DEFAULT_LANGUAGE: ru_RU # Язык по умолчанию
2024-07-11 14:19:48 +00:00
ENABLE_UPDATES: "false"
2024-07-16 13:34:36 +00:00
AI_URL: "1234"
AI_API_KEY: "1234"
2024-08-09 10:47:23 +00:00
WEB_CONCURRENCY: "1"
2024-07-11 14:19:48 +00:00
2024-08-09 10:47:23 +00:00
URL: 'https://app.{{ .Values.global.yonote.baseListenAddress }}' # Базовый url приложения
2024-07-16 07:33:04 +00:00
COLLABORATION_URL: 'wss://app.{{ .Values.global.yonote.baseListenAddress }}' # Cервер, для нормальной работы это не нужно устанавливать
2024-07-11 14:19:48 +00:00
OIDC_DISPLAY_NAME: email
OIDC_SCOPES: openid email
2024-08-09 10:47:23 +00:00
OIDC_CLIENT_ID: yonote-local
OIDC_AUTH_URI: 'https://auth.yonote.ru/realms/yonote-test/protocol/openid-connect/auth'
OIDC_LOGOUT_URI: 'https://auth.yonote.ru/realms/yonote-test/protocol/openid-connect/logout'
OIDC_TOKEN_URI: 'https://auth.yonote.ru/realms/yonote-test/protocol/openid-connect/token'
OIDC_USERINFO_URI: 'https://auth.yonote.ru/realms/yonote-test/protocol/openid-connect/userinfo'
2024-07-11 14:19:48 +00:00
AWS_S3_ACL: private
2024-07-16 13:34:36 +00:00
AWS_S3_UPLOAD_BUCKET_URL: yonote-minio:9000 # Адрес S3 хранилища
AWS_S3_UPLOAD_BUCKET_NAME: yonote-bucket # Имя хранилища
2024-07-11 12:13:26 +00:00
AWS_REGION: ""
2024-07-16 07:33:04 +00:00
AWS_S3_UPLOAD_MAX_SIZE: "226214400" # Максимальный размер хранилища
AWS_S3_FORCE_PATH_STYLE: "false" # Следует ли принудительно использовать URL-адреса стиля пути для объектов S3
2024-07-16 13:34:36 +00:00
S3_PROXY_ENABLED: "false" # Включает или выключает проксирование загрузки/выгрузки файлов на S3 через бэкенд, принимает boolean
S3_MULTIPART_PART_SIZE: "1000" # Настройка размера частей для multipart загрузки на S3 хранилище, принимает число, по умолчанию 1000 (1GB), значение в мегабайтах.
2024-07-11 14:19:48 +00:00
2024-07-16 07:33:04 +00:00
SUBDOMAINS_ENABLED: "true" # Поддержка поддоменов для команд
BASENAME_FOR_SUBDOMAIN: '{{ .Values.global.yonote.baseListenAddress }}' # Имя хоста
NOT_ALLOWED_SUBDOMAINS: app,collaboration,auth,api,dev,docs,doc,admin,test,quota,billing,i,storage,host,updates # Запрещенные поддомены
2024-07-11 14:19:48 +00:00
2024-07-11 12:13:26 +00:00
TELEGRAM_API_URL: https://api.telegram.org
2024-07-11 14:19:48 +00:00
UNSPLASH_API_BASENAME: https://api.unsplash.com
RESERVED_SUBDOMAINS: about,account,admin,advertising,api,app,assets,archive,beta,billing,blog,cache,cdn,code,community,dashboard,developer,developers,forum,help,home,http,https,imap,localhost,mail,marketing,mobile,multiplayer,new,news,newsletter,ns1,ns2,ns3,ns4,password,profile,realtime,sandbox,script,scripts,setup,signin,signup,site,smtp,support,status,static,stats,test,update,updates,ws,wss,web,websockets,www,www1,www2,www3,www4
2024-07-11 12:13:26 +00:00
SMTP_HOST: ""
SMTP_USERNAME: ""
SMTP_FROM_EMAIL: ""
SMTP_REPLY_EMAIL: ""
SMTP_PORT: ""
2024-07-16 07:33:04 +00:00
SMTP_SECURE: "" # connection will be upgraded: https://nodemailer.com/smtp/
2024-07-11 12:13:26 +00:00
SMTP_REQUIRE_TLS: ""
2024-07-11 14:19:48 +00:00
yonote_cron_calendar_events:
cron_enabled: "true"
url: http://yonote-web/api/cron.calendar_events
yonote_cron_task_scheduler:
cron_enabled: "true"
url: http://yonote-web/api/cron.schedule
2024-08-09 10:47:23 +00:00
# ingress:
# enabled: true
# hostname: 'app.onprem-test.stands.wilix.dev'
# ingressClassName: traefik
# path: '/'
# pathType: Prefix
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
# # nginx.ingress.kubernetes.io/configuration-snippet: |
# # more_set_headers "Host $http_host";
# # more_set_headers "X-Real-IP $remote_addr";
# # more_set_headers "X-Forwarded-Proto $scheme";
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
2024-08-13 07:04:44 +00:00
2024-08-09 10:47:23 +00:00
ingress:
enabled: true
name: yonote-ingress
namespace: yonote-onprem
ingressClassName: traefik
2024-08-13 07:04:44 +00:00
# hostname: "*.onprem-test.stands.wilix.dev"
2024-08-09 10:47:23 +00:00
tls:
2024-08-13 07:04:44 +00:00
secretName: "wildcard.onprem-test.stands.wilix.dev"
hosts:
- "*.onprem-test.stands.wilix.dev"
# - "tete.onprem-test.stands.wilix.dev"
# - "dada.onprem-test.stands.wilix.dev"
2024-08-09 10:47:23 +00:00
rules:
2024-08-13 07:04:44 +00:00
- host: "*.onprem-test.stands.wilix.dev"
2024-08-09 10:47:23 +00:00
paths:
- path: /
pathType: Prefix
service:
name: yonote-web
port: 80
- path: /realtime
pathType: Prefix
service:
name: yonote-websockets
port: 80
- path: /whiteboard
pathType: Prefix
service:
name: yonote-whiteboard
port: 80
- path: /collaboration
pathType: Prefix
service:
name: yonote-collaboration
port: 80
2024-08-13 07:04:44 +00:00
# - host: "tete.onprem-test.stands.wilix.dev"
# paths:
# - path: /
# pathType: Prefix
# service:
# name: yonote-web
# port: 80
# - path: /realtime
# pathType: Prefix
# service:
# name: yonote-websockets
# port: 80
# - path: /whiteboard
# pathType: Prefix
# service:
# name: yonote-whiteboard
# port: 80
# - path: /collaboration
# pathType: Prefix
# service:
# name: yonote-collaboration
# port: 80
# - host: "dada.onprem-test.stands.wilix.dev"
# paths:
# - path: /
# pathType: Prefix
# service:
# name: yonote-web
# port: 80
# - path: /realtime
# pathType: Prefix
# service:
# name: yonote-websockets
# port: 80
# - path: /whiteboard
# pathType: Prefix
# service:
# name: yonote-whiteboard
# port: 80
# - path: /collaboration
# pathType: Prefix
# service:
# name: yonote-collaboration
# port: 80
2024-08-09 10:47:23 +00:00
annotations:
cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
2024-08-13 07:04:44 +00:00
2024-07-11 12:13:26 +00:00
yonote-web:
fullnameOverride: yonote-web
nameOverride: yonote-web
name: web
2024-07-11 14:19:48 +00:00
2024-07-11 12:13:26 +00:00
image:
registry: images.updates.yonote.ru
repository: yonote
2024-08-13 07:04:44 +00:00
tag: 1.19.8
2024-07-11 12:13:26 +00:00
pullPolicy: IfNotPresent
2024-07-11 14:19:48 +00:00
2024-07-16 07:33:04 +00:00
command: ["/bin/sh", "-c"]
2024-08-08 10:48:31 +00:00
args: ['IS_COMPILED=true yarn bytenode ./build/server/main.jsc --services=web']
2024-07-11 14:19:48 +00:00
initContainers:
- name: yonote-migration
2024-08-13 07:04:44 +00:00
image: images.updates.yonote.ru/yonote:1.19.8
2024-07-11 14:19:48 +00:00
imagePullPolicy: IfNotPresent
command:
- /bin/sh
- '-c'
- npx sequelize db:migrate
env:
- name: NODE_ENV
value: '{{ .Values.global.yonote.dbMigrationEnv }}' # В настройках для sequelize прописан такой env для запуска миграций без ssl
envFrom:
- configMapRef:
name: yonote-configs
- secretRef:
name: yonote-secrets
2024-07-11 12:13:26 +00:00
resources:
limits:
2024-08-09 10:47:23 +00:00
cpu: 1
memory: 1Gi
2024-07-11 12:13:26 +00:00
requests:
2024-07-11 14:19:48 +00:00
cpu: 200m
memory: 128Mi
containerPorts:
- containerPort: 3000
name: app
protocol: TCP
service:
type: ClusterIP
port: 80
targetPort: app
envFrom:
- configMapRef:
name: yonote-configs
- secretRef:
name: yonote-secrets
2024-08-09 10:47:23 +00:00
# ingress:
# enabled: true
# hostname: 'app.onprem-test.stands.wilix.dev'
# ingressClassName: traefik
# path: '/'
# pathType: Prefix
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
# # nginx.ingress.kubernetes.io/configuration-snippet: |
# # more_set_headers "Host $http_host";
# # more_set_headers "X-Real-IP $remote_addr";
# # more_set_headers "X-Forwarded-Proto $scheme";
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
# extraTls:
# - hosts:
# - "app.onprem-test.stands.wilix.dev"
# secretName: "app.onprem-test.stands.wilix.dev"
2024-07-11 14:19:48 +00:00
podLabels:
redis-client: 'true'
podAnnotations:
checksum/configmap: "{{ toJson .Values.global.yonote.config.plain | sha256sum }}"
checksum/secret: "{{ toJson .Values.global.yonote.config.secret | sha256sum }}"
readinessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
livenessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
yonote-websocket:
fullnameOverride: yonote-websockets
nameOverride: yonote-websockets
name: websockets
image:
registry: images.updates.yonote.ru
repository: yonote
2024-08-13 07:04:44 +00:00
tag: 1.19.8
2024-07-11 14:19:48 +00:00
pullPolicy: IfNotPresent
2024-07-16 07:33:04 +00:00
command: ["/bin/sh", "-c"]
2024-08-08 10:48:31 +00:00
args: ['IS_COMPILED=true yarn bytenode ./build/server/main.jsc --services=websockets']
2024-07-11 14:19:48 +00:00
resources:
limits:
cpu: 250m
memory: 512Mi
requests:
cpu: 50m
memory: 128Mi
checksums: null
envFrom:
- configMapRef:
name: yonote-configs
- secretRef:
name: yonote-secrets
containerPorts:
- containerPort: 3000
name: app
protocol: TCP
service:
type: ClusterIP
port: 80
targetPort: app
2024-08-09 10:47:23 +00:00
# ingress:
# enabled: true
# hostname: 'app.onprem-test.stands.wilix.dev'
# ingressClassName: traefik
# path: '/realtime'
# pathType: Prefix
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
# # nginx.ingress.kubernetes.io/configuration-snippet: |
# # more_set_headers "Host $http_host";
# # more_set_headers "X-Real-IP $remote_addr";
# # more_set_headers "X-Forwarded-Proto $scheme";
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
# extraTls:
# - hosts:
# - "app.onprem-test.stands.wilix.dev"
# secretName: "app.onprem-test.stands.wilix.dev"
2024-07-11 14:19:48 +00:00
podLabels:
redis-client: 'true'
podAnnotations:
checksum/configmap: "{{ toJson .Values.global.yonote.config.plain | sha256sum }}"
checksum/secret: "{{ toJson .Values.global.yonote.config.secret | sha256sum }}"
readinessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
livenessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
yonote-whiteboard:
fullnameOverride: yonote-whiteboard
nameOverride: yonote-whiteboard
name: whiteboard
image:
registry: images.updates.yonote.ru
repository: yonote
2024-08-13 07:04:44 +00:00
tag: 1.19.8
2024-07-11 14:19:48 +00:00
pullPolicy: IfNotPresent
2024-07-16 07:33:04 +00:00
command: ["/bin/sh", "-c"]
2024-08-08 10:48:31 +00:00
args: ['IS_COMPILED=true yarn bytenode ./build/server/main.jsc --services=whiteboard']
2024-07-11 14:19:48 +00:00
resources:
limits:
cpu: 250m
memory: 512Mi
requests:
cpu: 50m
memory: 128Mi
checksums: null
envFrom:
- configMapRef:
name: yonote-configs
- secretRef:
name: yonote-secrets
containerPorts:
- containerPort: 3000
name: app
protocol: TCP
service:
type: ClusterIP
port: 80
targetPort: app
2024-08-09 10:47:23 +00:00
# ingress:
# enabled: true
# hostname: 'app.onprem-test.stands.wilix.dev'
# ingressClassName: traefik
# path: '/whiteboard'
# pathType: Prefix
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
# # nginx.ingress.kubernetes.io/configuration-snippet: |
# # more_set_headers "Host $http_host";
# # more_set_headers "X-Real-IP $remote_addr";
# # more_set_headers "X-Forwarded-Proto $scheme";
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
# extraTls:
# - hosts:
# - "app.onprem-test.stands.wilix.dev"
# secretName: "app.onprem-test.stands.wilix.dev"
2024-07-11 14:19:48 +00:00
podLabels:
redis-client: 'true'
podAnnotations:
checksum/configmap: "{{ toJson .Values.global.yonote.config.plain | sha256sum }}"
checksum/secret: "{{ toJson .Values.global.yonote.config.secret | sha256sum }}"
readinessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
livenessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
yonote-worker:
fullnameOverride: yonote-worker
nameOverride: yonote-worker
name: worker
image:
registry: images.updates.yonote.ru
repository: yonote
2024-08-13 07:04:44 +00:00
tag: 1.19.8
2024-07-11 14:19:48 +00:00
pullPolicy: IfNotPresent
2024-07-16 07:33:04 +00:00
command: ["/bin/sh", "-c"]
2024-08-08 10:48:31 +00:00
args: ['IS_COMPILED=true yarn bytenode ./build/server/main.jsc --services=worker']
2024-07-11 14:19:48 +00:00
resources:
limits:
2024-08-09 10:47:23 +00:00
cpu: 1
2024-07-11 14:19:48 +00:00
memory: 1Gi
requests:
2024-08-09 10:47:23 +00:00
cpu: 50m
memory: 128Mi
2024-07-11 14:19:48 +00:00
checksums: null
2024-07-11 12:13:26 +00:00
containerPorts:
- containerPort: 3000
name: app
protocol: TCP
2024-07-11 14:19:48 +00:00
2024-07-11 12:13:26 +00:00
service:
type: ClusterIP
port: 80
targetPort: app
2024-07-11 14:19:48 +00:00
2024-07-11 12:13:26 +00:00
envFrom:
- configMapRef:
name: yonote-configs
- secretRef:
name: yonote-secrets
podLabels:
redis-client: 'true'
2024-07-11 14:19:48 +00:00
2024-07-11 12:13:26 +00:00
podAnnotations:
checksum/configmap: "{{ toJson .Values.global.yonote.config.plain | sha256sum }}"
checksum/secret: "{{ toJson .Values.global.yonote.config.secret | sha256sum }}"
2024-07-11 14:19:48 +00:00
2024-07-11 12:13:26 +00:00
readinessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
2024-07-11 14:19:48 +00:00
2024-07-11 12:13:26 +00:00
livenessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
2024-07-11 14:19:48 +00:00
yonote-collaboration:
fullnameOverride: yonote-collaboration
nameOverride: yonote-collaboration
name: collaboration
image:
registry: images.updates.yonote.ru
repository: yonote
2024-08-13 07:04:44 +00:00
tag: 1.19.8
2024-07-11 14:19:48 +00:00
pullPolicy: IfNotPresent
2024-07-16 07:33:04 +00:00
command: ["/bin/sh", "-c"]
2024-08-08 10:48:31 +00:00
args: ['IS_COMPILED=true yarn bytenode ./build/server/main.jsc --services=collaboration']
2024-07-11 14:19:48 +00:00
checksums: null
containerPorts:
- containerPort: 3000
name: app
protocol: TCP
service:
type: ClusterIP
port: 80
targetPort: app
2024-08-09 10:47:23 +00:00
# ingress:
# enabled: true
# hostname: 'app.onprem-test.stands.wilix.dev'
# ingressClassName: traefik
# path: '/collaboration'
# pathType: Prefix
# annotations:
# cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
# traefik.ingress.kubernetes.io/router.middlewares: '{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{.Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd'
# # nginx.ingress.kubernetes.io/force-ssl-redirect: "false"
# # nginx.ingress.kubernetes.io/configuration-snippet: |
# # more_set_headers "Host $http_host";
# # more_set_headers "X-Real-IP $remote_addr";
# # more_set_headers "X-Forwarded-Proto $scheme";
# # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for";
# extraTls:
# - hosts:
# - "app.onprem-test.stands.wilix.dev"
# secretName: "app.onprem-test.stands.wilix.dev"
2024-07-11 14:19:48 +00:00
envFrom:
- configMapRef:
name: yonote-configs
- secretRef:
name: yonote-secrets
podLabels:
redis-client: 'true'
podAnnotations:
checksum/configmap: "{{ toJson .Values.global.yonote.config.plain | sha256sum }}"
checksum/secret: "{{ toJson .Values.global.yonote.config.secret | sha256sum }}"
readinessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
livenessProbe:
enabled: true
failureThreshold: 6
initialDelaySeconds: 60
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 5
httpGet:
path: /_health
port: app
yonote-database:
enabled: true
fullnameOverride: yonote-db
nameOverride: db
2024-07-15 06:43:37 +00:00
2024-07-11 14:19:48 +00:00
primary:
persistence:
2024-07-11 21:57:34 +00:00
size: 500Mi
2024-07-11 14:19:48 +00:00
resources:
limits:
cpu: 250m
memory: 512Mi
requests:
cpu: 50m
memory: 256Mi
yonote-redis:
enabled: true
fullnameOverride: yonote-redis
nameOverride: redis
architecture: standalone
2024-07-15 06:43:37 +00:00
2024-07-11 14:19:48 +00:00
auth:
enabled: false
2024-07-15 06:43:37 +00:00
2024-07-11 14:19:48 +00:00
master:
persistence:
2024-07-11 21:57:34 +00:00
size: 200Mi
2024-07-11 14:19:48 +00:00
resources:
limits:
cpu: 250m
memory: 256Mi
requests:
cpu: 50m
2024-07-11 21:57:34 +00:00
memory: 128Mi
2024-07-15 06:43:37 +00:00
minio:
enabled: true
2024-07-16 07:33:04 +00:00
name: minio
2024-07-15 06:43:37 +00:00
fullnameOverride: yonote-minio
nameOverride: minio
accessKey: "minioadmin"
secretKey: "minioadminsecret"
2024-07-11 21:57:34 +00:00
persistence:
2024-07-15 06:43:37 +00:00
enabled: true
2024-07-11 21:57:34 +00:00
size: 500Mi
2024-07-15 06:43:37 +00:00
ingress:
enabled: true
2024-08-09 10:47:23 +00:00
hostname: 's3.onprem-test.stands.wilix.dev'
ingressClassName: traefik
path: '/'
2024-08-13 09:41:30 +00:00
pathType: Prefix
2024-07-15 06:43:37 +00:00
annotations:
2024-08-09 10:47:23 +00:00
kubernetes.io/ingress.class: traefik
cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
extraTls:
- hosts:
- "s3.onprem-test.stands.wilix.dev"
secretName: "s3.onprem-test.stands.wilix.dev"
2024-07-15 06:43:37 +00:00
resources:
requests:
memory: 512Mi
cpu: 250m
limits:
memory: 1Gi
cpu: 500m
buckets:
2024-07-16 13:34:36 +00:00
- name: yonote-bucket
2024-08-14 13:01:50 +00:00
policy: none
2024-08-14 12:38:44 +00:00
keycloak-database:
enabled: true
name: keycloak-database
fullnameOverride: yonote-keycloak-db
nameOverride: db
primary:
persistence:
size: 512Mi
keycloak:
global:
postgresql:
auth:
database: keycloak
username: keycloak
enabled: true
name: yonote-keycloak
fullnameOverride: yonote-keycloak
image:
registry: images.updates.yonote.ru
repository: yonote-keycloak
tag: 19-0.1.1
command:
- /bin/sh
- -c
- /opt/keycloak/bin/kc.sh import --file=/opt/keycloak/data/import/realm-export.json --debug
- /opt/keycloak/bin/kc.sh start
configMaps:
configs:
data:
KEYCLOAK_ADMIN: root
KC_PROXY: edge
KC_HOSTNAME_STRICT: "false"
KC_HOSTNAME_ADMIN: auth.onprem-test.stands.wilix.dev
KC_HOSTNAME: auth.onprem-test.stands.wilix.dev
KC_DB: postgres
KC_DB_URL: jdbc:postgresql://yonote-keycloak-db:5432/keycloak
# KC_DB_URL_DATABASE: keycloak
KC_DB_USERNAME: keycloak
KC_HOSTNAME_STRICT_HTTPS: "false"
KC_HOSTNAME_PATH: "/"
envFrom:
- configMapRef:
name: '{{ template "app.fullname" . }}-configs'
- secretRef:
name: '{{ template "app.fullname" . }}-secrets'
checksums:
- secrets.yaml
- configmaps.yaml
containerPorts:
- containerPort: 8080
name: app
protocol: TCP
resources:
limits:
cpu: 500m
memory: 512Mi
requests:
cpu: 150m
memory: 128Mi
service:
type: ClusterIP
port: 8080
targetPort: 8080
ingress:
enabled: true
hostname: 'auth.onprem-test.stands.wilix.dev'
ingressClassName: traefik
path: '/'
pathType: Prefix
annotations:
kubernetes.io/ingress.class: traefik
cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev
extraTls:
- hosts:
- "auth.onprem-test.stands.wilix.dev"
secretName: "auth.onprem-test.stands.wilix.dev"
# livenessProbe:
# enabled: true
# failureThreshold: 6
# initialDelaySeconds: 60
# periodSeconds: 15
# successThreshold: 1
# timeoutSeconds: 5
# httpGet:
# path: /
# port: app
# readinessProbe:
# enabled: true
# failureThreshold: 6
# initialDelaySeconds: 60
# periodSeconds: 15
# successThreshold: 1
# timeoutSeconds: 5
# httpGet:
# path: /
# port: app