Remove-Bitnami-Dependencies #7

Merged
stuart.armstrong merged 11 commits from Remove-Bitnami-Dependencies into 2.0.0 2025-12-08 11:15:43 +00:00
4 changed files with 91 additions and 102 deletions
Showing only changes of commit ce2e8543cf - Show all commits

View File

@ -1,9 +1,9 @@
apiVersion: v2
name: yonote-chart
version: 1.2.0
version: 1.3.0
description:
Generic application Helm chart.
This chart includes multiple dependencies. The base of this chart is derived from the Dynix app chart.
This chart includes multiple dependencies. The base of this chart is derived from the Dysnix app chart.
maintainers:
- name: Dysnix
email: support@dysnix.com
@ -35,26 +35,26 @@ dependencies:
repository: https://dysnix.github.io/charts
alias: yonote-collaboration
- name: postgresql
version: "11.6.6"
repository: https://charts.bitnami.com/bitnami
- name: postgres
version: "0.3.9"
repository: https://groundhog2k.github.io/helm-charts/
condition: yonoteDatabase.enabled
alias: yonoteDatabase
- name: redis
version: "16.12.1"
repository: https://charts.bitnami.com/bitnami
version: "0.7.0"
repository: https://groundhog2k.github.io/helm-charts/
condition: yonote-redis.enabled
alias: yonote-redis
- name: minio
version: "12.7.0"
repository: https://charts.bitnami.com/bitnami
repository: https://charts.min.io/
condition: minio.enabled
alias: minio
- name: keycloak
version: "14.0.0"
repository: https://charts.bitnami.com/bitnami
- name: keycloakx
version: "1.3.2"
repository: https://codecentric.github.io/helm-charts
condition: keycloak.enabled
alias: keycloak

View File

@ -3,8 +3,8 @@ global:
config:
secret:
stringData:
DATABASE_URL: 'postgres://{{ .Values.yonoteDatabase.global.postgresql.auth.username }}:{{ .Values.yonoteDatabase.global.postgresql.auth.password }}@yonote-database:5432/{{ .Values.yonoteDatabase.global.postgresql.auth.database }}'
POSTGRES_PASSWORD: "{{ .Values.yonoteDatabase.global.postgresql.auth.password }}"
DATABASE_URL: 'postgres://{{ .Values.yonoteDatabase.settings.userDatabase.user }}:{{ .Values.yonoteDatabase.settings.userDatabase.password }}@yonote-database:5432/{{ .Values.yonoteDatabase.settings.userDatabase.database }}'
POSTGRES_PASSWORD: "{{ .Values.yonoteDatabase.settings.superuserPassword.password }}"
AWS_ACCESS_KEY_ID: "{{ .Values.minio.customUser }}" # Ваш идентификатор ключа доступа к AWS.
AWS_SECRET_ACCESS_KEY: "{{ .Values.minio.customAccessKey }}" # Ваш секретный ключ доступа AWS.
OIDC_CLIENT_SECRET: "Kdq8rk5Pv5RW1c5kHXpnyfrmMRzI9xSD" # Секретный ключ клиента для аутентификации по OpenID Connect (OIDC).
@ -23,19 +23,17 @@ global:
# 3) Полученные значения ввести в .env файл (SERVICE_WORKER_PUBLIC_KEY, SERVICE_WORKER_PRIVATE_KEY)
yonoteDatabase:
global:
postgresql:
auth:
settings:
superuserPassword: "QQYw4UjOU"
userDatabase:
password: "wsGZ6kXhr5"
postgresPassword: "QQYw4UjOU"
# yonote-redis: # Если используете auth для redis
# auth:
# password: "12345678"
yonote-redis:
args:
- "--user redis:redis"
minio:
customAccessKey: "qwer-12314q-qwersa"
auth:
#customAccessKey: "qwer-12314q-qwersa"
rootPassword: "qwettaas"
keycloak:

View File

@ -13,22 +13,22 @@ spec:
spec:
containers:
- name: mc-client
image: "docker.io/bitnami/minio-client:2024.8.13-debian-12-r0"
image: "quay.io/minio/mc:RELEASE.2024-12-18T13-15-44Z"
command: ["/bin/sh", "-c"]
args:
- |
until mc alias set myminio http://yonote-minio:9000 {{ .Values.minio.auth.rootUser }} {{ .Values.minio.auth.rootPassword }}; do
until mc alias set myminio http://yonote-minio:9000 {{ .Values.minio.rootUser }} {{ .Values.minio.rootPassword }}; do
echo "Waiting for MinIO to be ready..."
sleep 5
done
echo "MinIO is ready and alias is set."
# Создание пользователя
if ! mc admin user add myminio {{ .Values.minio.customUser }} {{ .Values.minio.customAccessKey }}; then
echo "User {{ .Values.minio.customUser }} already exists or failed to create."
else
echo "User {{ .Values.minio.customUser }} created successfully."
fi
#if ! mc admin user add myminio {{ .Values.minio.customUser }} {{ .Values.minio.customAccessKey }}; then
# echo "User {{ .Values.minio.customUser }} already exists or failed to create."
#else
# echo "User {{ .Values.minio.customUser }} created successfully."
#fi
# Назначение политики для нового пользователя
cat <<EOF > /tmp/minio-user-policy.json

View File

@ -490,18 +490,22 @@ yonote-collaboration:
yonoteDatabase:
enabled: true
global:
postgresql:
auth:
database: "yonote"
username: "yonote"
settings:
# Default postgres
# superuser:
userDatabase:
name: yonote
user: yonote
name: yonote-database
fullnameOverride: yonote-database
nameOverride: yonote-database
primary:
persistence:
size: 5Gi
storage:
requestedSize: 5Gi
#className: ""
resources:
limits:
cpu: 2
@ -510,30 +514,17 @@ yonoteDatabase:
cpu: 500m
memory: 512Mi
extraVolumes:
- name: init-scripts
configMap:
name: postgres-init-scripts
extraVolumeMounts:
- name: init-scripts
mountPath: /docker-entrypoint-initdb.d
readOnly: true
extraScripts:
- name: postgres-init-scripts
yonote-redis:
enabled: true
fullnameOverride: yonote-redis
nameOverride: redis
architecture: standalone
image:
tag: 7.2.0-debian-11-r0
auth:
enabled: false
master:
persistence:
size: 5Gi
storage:
requestedSize: 5Gi
#className: ""
resources:
limits:
cpu: 1
@ -546,43 +537,43 @@ minio:
enabled: true
name: minio
fullnameOverride: yonote-minio
customUser: yonote
#customUser: yonote
nameOverride: yonote-minio
auth:
mode: standalone
rootUser: admin
image:
tag: 2024.8.3-debian-12-r1
users:
- accessKey: console
secretKey: console123
policy: readwrite
persistence:
enabled: true
size: 5Gi
#storageClass: ""
ingress:
enabled: true
hostname: 's3.example.com'
hosts: 's3.example.com'
ingressClassName: traefik
path: '/'
pathType: ImplementationSpecific
annotations:
kubernetes.io/ingress.class: traefik
# cert-manager.io/cluster-issuer: letsencrypt.example.com # Если используете
extraTls:
tls:
- hosts:
- "s3.example.com"
secretName: "you_tls_secret"
apiIngress:
consoleIngress:
enabled: true
hostname: 'api-s3.example.com'
hosts: 'api-s3.example.com'
ingressClassName: traefik
path: '/'
pathType: ImplementationSpecific
servicePort: minio-api
annotations:
kubernetes.io/ingress.class: traefik
# cert-manager.io/cluster-issuer: letsencrypt.example.com # Если используете
extraTls:
tls:
- hosts:
- "api-s3.example.com"
secretName: "api-s3.example.com"