From 8c0a0e79a08b52d2707d7b0a2f0f7af3d32f2556 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=D0=90=D1=80=D1=82=D0=B5=D0=BC=20=D0=94=D1=80=D0=BE=D0=B7?= =?UTF-8?q?=D0=B4=D0=BE=D0=B2?= Date: Thu, 18 Jul 2024 13:57:58 +0000 Subject: [PATCH] =?UTF-8?q?=D0=9E=D0=B1=D0=BD=D0=BE=D0=B2=D0=B8=D1=82?= =?UTF-8?q?=D1=8C=20yonote-chart/values.yaml?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- yonote-chart/values.yaml | 112 +++++++++++++++++++-------------------- 1 file changed, 56 insertions(+), 56 deletions(-) diff --git a/yonote-chart/values.yaml b/yonote-chart/values.yaml index 40c4fea..3fbb0cf 100644 --- a/yonote-chart/values.yaml +++ b/yonote-chart/values.yaml @@ -95,47 +95,47 @@ yonote-web: memory: 256Mi ingress: + # enabled: true + # ingressClassName: traefik + # hosts: "'*.example.com'" + # annotations: + # cert-manager.io/cluster-issuer: "" + # traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd" + # extraTls: + # - hosts: + # - "'*.example.com'" + # secretName: "'*.example.com'" + enabled: true - ingressClassName: traefik - hosts: "'*.example.com'" + hostname: "'*.example.com'" + ingressClassName: nginx + path: '/' + pathType: Prefix annotations: + nginx.ingress.kubernetes.io/force-ssl-redirect: "true" + nginx.ingress.kubernetes.io/server-snippets: | + location /realtime { + proxy_set_header Upgrade $http_upgrade; + proxy_http_version 1.1; + proxy_set_header X-Forwarded-Host $http_host; + proxy_set_header X-Forwarded-Proto $scheme; + proxy_set_header X-Forwarded-For $remote_addr; + proxy_set_header Host $host; + proxy_set_header Connection "upgrade"; + proxy_cache_bypass $http_upgrade; + } + + nginx.ingress.kubernetes.io/configuration-snippet: | + more_set_headers "Host $http_host"; + more_set_headers "X-Real-IP $remote_addr"; + more_set_headers "X-Forwarded-Proto $scheme"; + more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for"; cert-manager.io/cluster-issuer: "" - traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd" extraTls: - hosts: - "'*.example.com'" secretName: "'*.example.com'" - # enabled: true - # hostname: "'*.example.com'" - # ingressClassName: nginx - # path: '/' - # pathType: Prefix - # annotations: - # nginx.ingress.kubernetes.io/force-ssl-redirect: "true" - # nginx.ingress.kubernetes.io/server-snippets: | - # location /realtime { - # proxy_set_header Upgrade $http_upgrade; - # proxy_http_version 1.1; - # proxy_set_header X-Forwarded-Host $http_host; - # proxy_set_header X-Forwarded-Proto $scheme; - # proxy_set_header X-Forwarded-For $remote_addr; - # proxy_set_header Host $host; - # proxy_set_header Connection "upgrade"; - # proxy_cache_bypass $http_upgrade; - # } - - # nginx.ingress.kubernetes.io/configuration-snippet: | - # more_set_headers "Host $http_host"; - # more_set_headers "X-Real-IP $remote_addr"; - # more_set_headers "X-Forwarded-Proto $scheme"; - # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for"; - # cert-manager.io/cluster-issuer: "" - # extraTls: - # - hosts: - # - "'*.example.com'" - # secretName: "'*.example.com'" - containerPorts: - containerPort: 3000 name: app @@ -224,32 +224,32 @@ minio: enabled: true size: 500Mi - ingress: - enabled: true - hostname: '"s3.example.com"' - annotations: - cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev - traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd" - extraTls: - - hosts: - - s3.example.com - secretName: s3.example.com - # ingress: # enabled: true - # ingressClassName: nginx + # hostname: '"s3.example.com"' # annotations: - # nginx.ingress.kubernetes.io/force-ssl-redirect: "true" - # nginx.ingress.kubernetes.io/configuration-snippet: | - # more_set_headers "Host $http_host"; - # more_set_headers "X-Real-IP $remote_addr"; - # more_set_headers "X-Forwarded-Proto $scheme"; - # more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for"; - # hosts: - # - host: s3.onprem-test.stands.wilix.dev - # paths: - # - path: / - # pathType: ImplementationSpecific + # cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev + # traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd" + # extraTls: + # - hosts: + # - s3.example.com + # secretName: s3.example.com + + ingress: + enabled: true + ingressClassName: nginx + annotations: + nginx.ingress.kubernetes.io/force-ssl-redirect: "true" + nginx.ingress.kubernetes.io/configuration-snippet: | + more_set_headers "Host $http_host"; + more_set_headers "X-Real-IP $remote_addr"; + more_set_headers "X-Forwarded-Proto $scheme"; + more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for"; + hosts: + - host: s3.onprem-test.stands.wilix.dev + paths: + - path: / + pathType: ImplementationSpecific resources: requests: