global: name: yonote-app postgresql: auth: database: yonote username: yonote yonote: ingress: ingressClassName: nginx dbMigrationEnv: production-ssl-disabled # Режим подключения к базе данных при выполнении миграций. При использовании SSL подключения, установите значение `production` baseListenAddress: example.com config: plain: data: NODE_ENV: production FORCE_HTTPS: "false" PGSSLMODE: disable # Отключает SSL подключение к базе данных. Уберите эту строку, если вы используете SSL подключение к PostgreSQL BIND_HOST: 0.0.0.0 # Хост по умолчанию PORT: "3000" # Порт по умолчанию REDIS_URL: redis://yonote-redis-master:6379 DEFAULT_LANGUAGE: ru_RU # Язык по умолчанию ENABLE_UPDATES: "false" AI_URL: "1234" AI_API_KEY: "1234" URL: 'https://app.{{ .Values.global.yonote.baseListenAddress }}' # Базовый url приложения COLLABORATION_URL: 'wss://app.{{ .Values.global.yonote.baseListenAddress }}' # Cервер, для нормальной работы это не нужно устанавливать OIDC_DISPLAY_NAME: email OIDC_SCOPES: openid email OIDC_CLIENT_ID: yonote OIDC_AUTH_URI: 'https://auth.example.com/realms/yonote/protocol/openid-connect/auth' OIDC_LOGOUT_URI: 'https://auth.example.com/realms/yonote/protocol/openid-connect/logout' OIDC_TOKEN_URI: 'https://auth.example.com/realms/yonote/protocol/openid-connect/token' OIDC_USERINFO_URI: 'https://auth.example.com/realms/yonote/protocol/openid-connect/userinfo' AWS_S3_ACL: private AWS_S3_UPLOAD_BUCKET_URL: http://s3.example.com # Адрес S3 хранилища AWS_S3_UPLOAD_BUCKET_NAME: yonote-bucket # Имя хранилища AWS_REGION: "ru_RU" AWS_S3_UPLOAD_MAX_SIZE: "226214400" # Максимальный размер хранилища AWS_S3_FORCE_PATH_STYLE: "false" # Следует ли принудительно использовать URL-адреса стиля пути для объектов S3 S3_PROXY_ENABLED: "false" # Включает или выключает проксирование загрузки/выгрузки файлов на S3 через бэкенд, принимает boolean S3_MULTIPART_PART_SIZE: "1000" # Настройка размера частей для multipart загрузки на S3 хранилище, принимает число, по умолчанию 1000 (1GB), значение в мегабайтах. SUBDOMAINS_ENABLED: "true" # Поддержка поддоменов для команд BASENAME_FOR_SUBDOMAIN: '{{ .Values.global.yonote.baseListenAddress }}' # Имя хоста NOT_ALLOWED_SUBDOMAINS: app,collaboration,auth,api,dev,docs,doc,admin,test,quota,billing,i,storage,host,updates # Запрещенные поддомены TELEGRAM_API_URL: https://api.telegram.org UNSPLASH_API_BASENAME: https://api.unsplash.com RESERVED_SUBDOMAINS: about,account,admin,advertising,api,app,assets,archive,beta,billing,blog,cache,cdn,code,community,dashboard,developer,developers,forum,help,home,http,https,imap,localhost,mail,marketing,mobile,multiplayer,new,news,newsletter,ns1,ns2,ns3,ns4,password,profile,realtime,sandbox,script,scripts,setup,signin,signup,site,smtp,support,status,static,stats,test,update,updates,ws,wss,web,websockets,www,www1,www2,www3,www4 SMTP_HOST: "" SMTP_USERNAME: "" SMTP_FROM_EMAIL: "" SMTP_REPLY_EMAIL: "" SMTP_PORT: "" SMTP_SECURE: "" # connection will be upgraded: https://nodemailer.com/smtp/ SMTP_REQUIRE_TLS: "" yonote_cron_calendar_events: cron_enabled: "true" url: http://yonote-web/api/cron.calendar_events yonote_cron_task_scheduler: cron_enabled: "true" url: http://yonote-web/api/cron.schedule yonote-web: fullnameOverride: yonote-web nameOverride: yonote-web name: web image: registry: images.updates.yonote.ru repository: yonote tag: 1.19.5 pullPolicy: IfNotPresent resources: limits: cpu: "1" memory: 1Gi requests: cpu: 250m memory: 256Mi # ingress: # enabled: true # ingressClassName: traefik # hosts: "'*.example.com'" # annotations: # cert-manager.io/cluster-issuer: "" # traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd" # extraTls: # - hosts: # - "'*.example.com'" # secretName: "'*.example.com'" ingress: enabled: true hostname: "'*.example.com'" ingressClassName: nginx path: '/' pathType: Prefix annotations: nginx.ingress.kubernetes.io/force-ssl-redirect: "true" nginx.ingress.kubernetes.io/server-snippets: | location /realtime { proxy_set_header Upgrade $http_upgrade; proxy_http_version 1.1; proxy_set_header X-Forwarded-Host $http_host; proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header Host $host; proxy_set_header Connection "upgrade"; proxy_cache_bypass $http_upgrade; } nginx.ingress.kubernetes.io/configuration-snippet: | more_set_headers "Host $http_host"; more_set_headers "X-Real-IP $remote_addr"; more_set_headers "X-Forwarded-Proto $scheme"; more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for"; cert-manager.io/cluster-issuer: "" tls: - hosts: - "'*.example.com'" secretName: "'*.example.com'" containerPorts: - containerPort: 3000 name: app protocol: TCP service: type: ClusterIP port: 80 targetPort: app envFrom: - configMapRef: name: yonote-configs - secretRef: name: yonote-secrets podLabels: redis-client: 'true' podAnnotations: checksum/configmap: "{{ toJson .Values.global.yonote.config.plain | sha256sum }}" checksum/secret: "{{ toJson .Values.global.yonote.config.secret | sha256sum }}" readinessProbe: enabled: true failureThreshold: 6 initialDelaySeconds: 60 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 httpGet: path: /_health port: app livenessProbe: enabled: true failureThreshold: 6 initialDelaySeconds: 60 periodSeconds: 10 successThreshold: 1 timeoutSeconds: 5 httpGet: path: /_health port: app yonote-database: enabled: true fullnameOverride: yonote-db nameOverride: db primary: persistence: size: 500Mi resources: limits: cpu: 250m memory: 512Mi requests: cpu: 50m memory: 256Mi yonote-redis: enabled: true fullnameOverride: yonote-redis nameOverride: redis architecture: standalone auth: enabled: false master: persistence: size: 200Mi resources: limits: cpu: 250m memory: 256Mi requests: cpu: 50m memory: 128Mi minio: enabled: true name: minio fullnameOverride: yonote-minio nameOverride: minio accessKey: "minioadmin" secretKey: "minioadminsecret" persistence: enabled: true size: 500Mi # ingress: # enabled: true # hostname: '"s3.example.com"' # annotations: # cert-manager.io/cluster-issuer: letsencrypt.rancher.wilix.dev # traefik.ingress.kubernetes.io/router.middlewares: "{{ .Release.Namespace }}-redirect-https@kubernetescrd,{{ .Release.Namespace }}-wss-headers@kubernetescrd,kube-system-wilix-office-ipwhitelist@kubernetescrd" # extraTls: # - hosts: # - s3.example.com # secretName: s3.example.com ingress: enabled: true ingressClassName: nginx annotations: nginx.ingress.kubernetes.io/force-ssl-redirect: "true" nginx.ingress.kubernetes.io/configuration-snippet: | more_set_headers "Host $http_host"; more_set_headers "X-Real-IP $remote_addr"; more_set_headers "X-Forwarded-Proto $scheme"; more_set_headers "X-Forwarded-For $proxy_add_x_forwarded_for"; hosts: - host: s3.onprem-test.stands.wilix.dev paths: - path: / pathType: ImplementationSpecific resources: requests: memory: 512Mi cpu: 250m limits: memory: 1Gi cpu: 500m buckets: - name: yonote-bucket policy: none