TrueChartsClone/charts/enterprise/authelia/templates/common.yaml

78 lines
2.4 KiB
YAML
Raw Normal View History

BREAKING CHANGE refactor: port all enterprise apps to new common and add apps (#7738) * use new common * more porting and add notes.txt * portals * add vaultwarden and authelia to enterprise * some changes * authelia porting * fix grafana * fixup metallb * more * traefik * some initial blocky work * fixes * more work on enterprise train * containers * labels * no message * some more fixes * update questions for new enterprise apps * something * remove postgresql dependency from enterprise train apps * fix some traefik bugs * remove prometheus affinities for now * authelia postgresql fixes * bump and fix install test errors * bump common for probe fixes * fix questions * more questions fixes * add some metrics improvements * some more fixes * whoops * some authelia fixes * fix blocky and authelia * bump common for postgresql fixes * hmm * bump common * bump redis to disable double manifest loading * dont enc secrets for authelia * traefik, blocky and authelia fixes * traefik caps on protocols * bump redis for password fixes * ensure roles are clusterwide * ok * redis/common bumps * remove blocky webui and change config location * whoops * redis fix * more blocky tryouts * authelia whoops * bump blocky version * disable prometheus controller * oops * bump common on prometheus for custom service selector labels * rename prometheus selector labels on service * damn * more work * blocky 100 tryout * blocky root tryout * fix blocky config and remove fsgroup * dont drop caps * Update common.yaml Signed-off-by: Kjeld Schouten-Lebbing <kjeld@schouten-lebbing.nl> * Update values.yaml Signed-off-by: Kjeld Schouten-Lebbing <kjeld@schouten-lebbing.nl> * Update values.yaml Signed-off-by: Kjeld Schouten-Lebbing <kjeld@schouten-lebbing.nl> * revert update for blocky * use old-style mount for blocky * put update back for blocky * add initial postgresl query log support * hmm * small lint * bump common --------- Signed-off-by: Kjeld Schouten-Lebbing <kjeld@schouten-lebbing.nl> Co-authored-by: Stavros kois <s.kois@outlook.com> Co-authored-by: Stavros Kois <47820033+stavros-k@users.noreply.github.com>
2023-03-04 07:42:14 -05:00
{{/* Make sure all variables are set properly */}}
{{- include "tc.v1.common.loader.init" . }}
{{/* Render configmap for authelia */}}
{{- $configmapPaths := include "authelia.configmap.paths" . | fromYaml -}}
{{- if $configmapPaths -}}
{{- $_ := set .Values.configmap "authelia-paths" $configmapPaths -}}
{{- end -}}
{{- $configmapFile := include "authelia.configmap.configfile" . | fromYaml -}}
{{- if $configmapFile -}}
{{- $_ := set .Values.configmap "authelia-configfile" $configmapFile -}}
{{- end -}}
{{/* Render secrets for authelia */}}
{{- $secret := include "authelia.secrets" . | fromYaml -}}
{{- if $secret -}}
{{- $_ := set .Values.secret "authelia-secrets" $secret -}}
{{- end -}}
{{/* Append the general configMap volume to the volumes */}}
{{- define "authelia.configmapVolume" -}}
enabled: true
mountPath: /configuration.yaml
subPath: configuration.yaml
readOnly: true
type: "configmap"
objectName: authelia-configfile
{{- end -}}
{{/* Append the general secret volumes to the volumes */}}
{{- define "authelia.secretVolumes" -}}
enabled: true
mountPath: "/secrets"
readOnly: true
type: "secret"
objectName: authelia-secrets
items:
- key: "JWT_TOKEN"
path: JWT_TOKEN
- key: "SESSION_ENCRYPTION_KEY"
path: SESSION_ENCRYPTION_KEY
- key: "ENCRYPTION_KEY"
path: ENCRYPTION_KEY
- key: "STORAGE_PASSWORD"
path: STORAGE_PASSWORD
{{- if .Values.authentication_backend.ldap.enabled }}
- key: "LDAP_PASSWORD"
path: LDAP_PASSWORD
{{- end }}
{{- if and .Values.notifier.smtp.enabled .Values.notifier.smtp.plain_password }}
BREAKING CHANGE refactor: port all enterprise apps to new common and add apps (#7738) * use new common * more porting and add notes.txt * portals * add vaultwarden and authelia to enterprise * some changes * authelia porting * fix grafana * fixup metallb * more * traefik * some initial blocky work * fixes * more work on enterprise train * containers * labels * no message * some more fixes * update questions for new enterprise apps * something * remove postgresql dependency from enterprise train apps * fix some traefik bugs * remove prometheus affinities for now * authelia postgresql fixes * bump and fix install test errors * bump common for probe fixes * fix questions * more questions fixes * add some metrics improvements * some more fixes * whoops * some authelia fixes * fix blocky and authelia * bump common for postgresql fixes * hmm * bump common * bump redis to disable double manifest loading * dont enc secrets for authelia * traefik, blocky and authelia fixes * traefik caps on protocols * bump redis for password fixes * ensure roles are clusterwide * ok * redis/common bumps * remove blocky webui and change config location * whoops * redis fix * more blocky tryouts * authelia whoops * bump blocky version * disable prometheus controller * oops * bump common on prometheus for custom service selector labels * rename prometheus selector labels on service * damn * more work * blocky 100 tryout * blocky root tryout * fix blocky config and remove fsgroup * dont drop caps * Update common.yaml Signed-off-by: Kjeld Schouten-Lebbing <kjeld@schouten-lebbing.nl> * Update values.yaml Signed-off-by: Kjeld Schouten-Lebbing <kjeld@schouten-lebbing.nl> * Update values.yaml Signed-off-by: Kjeld Schouten-Lebbing <kjeld@schouten-lebbing.nl> * revert update for blocky * use old-style mount for blocky * put update back for blocky * add initial postgresl query log support * hmm * small lint * bump common --------- Signed-off-by: Kjeld Schouten-Lebbing <kjeld@schouten-lebbing.nl> Co-authored-by: Stavros kois <s.kois@outlook.com> Co-authored-by: Stavros Kois <47820033+stavros-k@users.noreply.github.com>
2023-03-04 07:42:14 -05:00
- key: "SMTP_PASSWORD"
path: SMTP_PASSWORD
{{- end }}
- key: "REDIS_PASSWORD"
path: REDIS_PASSWORD
{{- if .Values.redisProvider.high_availability.enabled}}
- key: "REDIS_SENTINEL_PASSWORD"
path: REDIS_SENTINEL_PASSWORD
{{- end }}
{{- if .Values.duo_api.enabled }}
- key: "DUO_API_KEY"
path: DUO_API_KEY
{{- end }}
{{- if .Values.identity_providers.oidc.enabled }}
- key: "OIDC_PRIVATE_KEY"
path: OIDC_PRIVATE_KEY
- key: "OIDC_HMAC_SECRET"
path: OIDC_HMAC_SECRET
{{- end }}
{{- end -}}
{{- $_ := set .Values.persistence "authelia-configfile" (include "authelia.configmapVolume" . | fromYaml) -}}
{{- $_ := set .Values.persistence "authelia-secrets" (include "authelia.secretVolumes" . | fromYaml) -}}
{{/* Render the templates */}}
{{ include "tc.v1.common.loader.apply" . }}