Files
gitops/apps/openproject/values.yaml

72 lines
2.0 KiB
YAML

---
openproject:
# 1. Allgemeine Einstellungen (Host)
openproject:
host: "openproject.apps.internal.k3s.stabify.de"
# 2. Ingress
ingress:
enabled: true
ingressClassName: "traefik"
host: "openproject.apps.internal.k3s.stabify.de"
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
traefik.ingress.kubernetes.io/router.entrypoints: websecure
traefik.ingress.kubernetes.io/router.tls: "true"
tls:
secretName: openproject-tls
hosts: openproject.apps.internal.k3s.stabify.de
# 3. Datenbank (PostgreSQL)
postgresql:
enabled: true
auth:
existingSecret: "openproject-db-credentials"
secretKeys:
adminPasswordKey: "postgres-password"
userPasswordKey: "password"
# WICHTIG: 'primary' gehört UNTER 'postgresql', nicht auf Ebene 0!
primary:
persistence:
enabled: true
size: 10Gi
storageClass: "longhorn"
# 4. Datei-Speicher
persistence:
enabled: true
size: 10Gi
accessMode: ReadWriteOnce
storageClass: "longhorn"
# 5. Memcached
memcached:
enabled: true
# OIDC Authentik Provider
oidc:
enabled: true
provider: "openproject"
displayName: "Authentik"
host: "https://auth.apps.k3s.stabify.de"
authorizationEndpoint: "https://auth.apps.k3s.stabify.de/application/o/authorize/"
tokenEndpoint: "https://auth.apps.k3s.stabify.de/application/o/token/"
userinfoEndpoint: "https://auth.apps.k3s.stabify.de/application/o/userinfo/"
endSessionEndpoint: "https://auth.apps.k3s.stabify.de/application/o/openproject/end-session/"
scope: "[openid]"
# Optional attribute mappings from the id token
attribute_map: {}
## To avoid having sensitive credentials in your values.yaml, the preferred way is to
## use an existing secret containing the OIDC compatible access credentials.
## Specify the name of this existing secret here.
existingSecret:
secretKeys:
identifier: "clientId"
secret: "clientSecret"