80 lines
1.4 KiB
YAML
80 lines
1.4 KiB
YAML
image:
|
|
repository: tccr.io/truecharts/nocodb
|
|
tag: 0.97.0@sha256:28396975df9e02d527c12f9df4b7993f9d9b866f11cb2711ed906704024ea738
|
|
pullPolicy: IfNotPresent
|
|
|
|
securityContext:
|
|
readOnlyRootFilesystem: false
|
|
runAsNonRoot: false
|
|
|
|
podSecurityContext:
|
|
runAsUser: 0
|
|
runAsGroup: 0
|
|
|
|
secretEnv:
|
|
AWS_ACCESS_KEY_ID: ""
|
|
AWS_SECRET_ACCESS_KEY: ""
|
|
AWS_BUCKET: ""
|
|
AWS_BUCKET_PATH: ""
|
|
NC_GOOGLE_CLIENT_ID: ""
|
|
NC_GOOGLE_CLIENT_SECRET: ""
|
|
|
|
env:
|
|
NC_MIN: ""
|
|
PORT: "{{ .Values.service.main.ports.main.port }}"
|
|
# User Defined
|
|
NC_PUBLIC_URL: "http://localhost:10226"
|
|
NC_DISABLE_TELE: true
|
|
DISABLE_SPLASH_SCREEN: false
|
|
NC_JWT_EXPIRES_IN: "10h"
|
|
NC_INVITE_ONLY_SIGNUP: false
|
|
NC_DISABLE_CACHE: false
|
|
NC_DISABLE_ERR_REPORT: true
|
|
NC_REQUEST_BODY_SIZE: "1MB"
|
|
NC_EXPORT_MAX_TIMEOUT: 5000
|
|
NC_SENTRY_DSN: ""
|
|
NC_REDIS_URL:
|
|
secretKeyRef:
|
|
name: rediscreds
|
|
key: url
|
|
NC_AUTH_JWT_SECRET:
|
|
secretKeyRef:
|
|
name: nocodb-secrets
|
|
key: NC_AUTH_JWT_SECRET
|
|
|
|
envFrom:
|
|
- configMapRef:
|
|
name: nocodb-configmap
|
|
|
|
probes:
|
|
liveness:
|
|
path: "/dashboard"
|
|
readiness:
|
|
path: "/dashboard"
|
|
startup:
|
|
path: "/dashboard"
|
|
|
|
service:
|
|
main:
|
|
ports:
|
|
main:
|
|
port: 10226
|
|
|
|
persistence:
|
|
data:
|
|
enabled: true
|
|
mountPath: "/usr/app/data"
|
|
|
|
postgresql:
|
|
enabled: true
|
|
existingSecret: "dbcreds"
|
|
postgresqlUsername: nocodb
|
|
postgresqlDatabase: nocodb
|
|
|
|
redis:
|
|
enabled: true
|
|
existingSecret: "rediscreds"
|
|
|
|
portal:
|
|
enabled: true
|