Daily Prune
Signed-off-by: TrueCharts-Bot <bot@truecharts.org>
This commit is contained in:
parent
ccf45319ee
commit
86a0106999
|
@ -1,99 +0,0 @@
|
||||||
**Important:**
|
|
||||||
*for the complete changelog, please refer to the website*
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.2](https://github.com/truecharts/charts/compare/authelia-15.1.1...authelia-15.1.2) (2023-04-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7907](https://github.com/truecharts/charts/issues/7907))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.1](https://github.com/truecharts/charts/compare/authelia-15.1.0...authelia-15.1.1) (2023-04-05)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common to 32 on enterprise charts
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.0](https://github.com/truecharts/charts/compare/authelia-15.0.13...authelia-15.1.0) (2023-03-22)
|
|
||||||
|
|
||||||
### Feat
|
|
||||||
|
|
||||||
- allow for NTP failure by default ([#7824](https://github.com/truecharts/charts/issues/7824))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.13](https://github.com/truecharts/charts/compare/authelia-15.0.12...authelia-15.0.13) (2023-03-19)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common and deps on enterprise train ([#7819](https://github.com/truecharts/charts/issues/7819))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.12](https://github.com/truecharts/charts/compare/authelia-15.0.11...authelia-15.0.12) (2023-03-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump dependencies and release 2 replica default
|
|
||||||
|
|
||||||
### Feat
|
|
||||||
|
|
||||||
- replicas2 part 2
|
|
||||||
- run 2 replica's with rolling updates
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.11](https://github.com/truecharts/charts/compare/authelia-15.0.10...authelia-15.0.11) (2023-03-08)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.10](https://github.com/truecharts/charts/compare/authelia-15.0.9...authelia-15.0.10) (2023-03-08)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- indent priv key ([#7770](https://github.com/truecharts/charts/issues/7770))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.9](https://github.com/truecharts/charts/compare/authelia-15.0.8...authelia-15.0.9) (2023-03-08)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- cleanup secret a bit ([#7768](https://github.com/truecharts/charts/issues/7768))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.8](https://github.com/truecharts/charts/compare/authelia-15.0.7...authelia-15.0.8) (2023-03-07)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- fix broken fetching of old values on authelia ([#7764](https://github.com/truecharts/charts/issues/7764))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.7](https://github.com/truecharts/charts/compare/authelia-15.0.6...authelia-15.0.7) (2023-03-07)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- prevent encryption key resets
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.6](https://github.com/truecharts/charts/compare/authelia-15.0.5...authelia-15.0.6) (2023-03-07)
|
|
||||||
|
|
|
@ -1,43 +0,0 @@
|
||||||
apiVersion: v2
|
|
||||||
appVersion: "4.37.5"
|
|
||||||
dependencies:
|
|
||||||
- name: common
|
|
||||||
repository: https://library-charts.truecharts.org
|
|
||||||
version: 12.3.0
|
|
||||||
- condition: redis.enabled
|
|
||||||
name: redis
|
|
||||||
repository: https://deps.truecharts.org
|
|
||||||
version: 6.0.19
|
|
||||||
deprecated: false
|
|
||||||
description: Authelia is a Single Sign-On Multi-Factor portal for web apps
|
|
||||||
home: https://truecharts.org/charts/enterprise/authelia
|
|
||||||
icon: https://truecharts.org/img/hotlink-ok/chart-icons/authelia.png
|
|
||||||
keywords:
|
|
||||||
- authelia
|
|
||||||
- authentication
|
|
||||||
- login
|
|
||||||
- SSO
|
|
||||||
- Authentication
|
|
||||||
- Security
|
|
||||||
- Two-Factor
|
|
||||||
- U2F
|
|
||||||
- YubiKey
|
|
||||||
- Push Notifications
|
|
||||||
- LDAP
|
|
||||||
kubeVersion: ">=1.16.0-0"
|
|
||||||
maintainers:
|
|
||||||
- email: info@truecharts.org
|
|
||||||
name: TrueCharts
|
|
||||||
url: https://truecharts.org
|
|
||||||
name: authelia
|
|
||||||
sources:
|
|
||||||
- https://github.com/truecharts/charts/tree/master/charts/enterprise/authelia
|
|
||||||
- https://github.com/authelia/chartrepo
|
|
||||||
- https://github.com/authelia/authelia
|
|
||||||
type: application
|
|
||||||
version: 15.1.2
|
|
||||||
annotations:
|
|
||||||
truecharts.org/catagories: |
|
|
||||||
- security
|
|
||||||
truecharts.org/SCALE-support: "true"
|
|
||||||
truecharts.org/grade: U
|
|
|
@ -1,106 +0,0 @@
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Parameters
|
|
||||||
|
|
||||||
Licensor: The TrueCharts Project, it's owner and it's contributors
|
|
||||||
Licensed Work: The TrueCharts "Cert-Manager" Helm Chart
|
|
||||||
Additional Use Grant: You may use the licensed work in production, as long
|
|
||||||
as it is directly sourced from a TrueCharts provided
|
|
||||||
official repository, catalog or source. You may also make private
|
|
||||||
modification to the directly sourced licenced work,
|
|
||||||
when used in production.
|
|
||||||
|
|
||||||
The following cases are, due to their nature, also
|
|
||||||
defined as 'production use' and explicitly prohibited:
|
|
||||||
- Bundling, including or displaying the licensed work
|
|
||||||
with(in) another work intended for production use,
|
|
||||||
with the apparent intend of facilitating and/or
|
|
||||||
promoting production use by third parties in
|
|
||||||
violation of this license.
|
|
||||||
|
|
||||||
Change Date: 2050-01-01
|
|
||||||
|
|
||||||
Change License: 3-clause BSD license
|
|
||||||
|
|
||||||
For information about alternative licensing arrangements for the Software,
|
|
||||||
please contact: legal@truecharts.org
|
|
||||||
|
|
||||||
Notice
|
|
||||||
|
|
||||||
The Business Source License (this document, or the “License”) is not an Open
|
|
||||||
Source license. However, the Licensed Work will eventually be made available
|
|
||||||
under an Open Source License, as stated in this License.
|
|
||||||
|
|
||||||
License text copyright (c) 2017 MariaDB Corporation Ab, All Rights Reserved.
|
|
||||||
“Business Source License” is a trademark of MariaDB Corporation Ab.
|
|
||||||
|
|
||||||
-----------------------------------------------------------------------------
|
|
||||||
|
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Terms
|
|
||||||
|
|
||||||
The Licensor hereby grants you the right to copy, modify, create derivative
|
|
||||||
works, redistribute, and make non-production use of the Licensed Work. The
|
|
||||||
Licensor may make an Additional Use Grant, above, permitting limited
|
|
||||||
production use.
|
|
||||||
|
|
||||||
Effective on the Change Date, or the fourth anniversary of the first publicly
|
|
||||||
available distribution of a specific version of the Licensed Work under this
|
|
||||||
License, whichever comes first, the Licensor hereby grants you rights under
|
|
||||||
the terms of the Change License, and the rights granted in the paragraph
|
|
||||||
above terminate.
|
|
||||||
|
|
||||||
If your use of the Licensed Work does not comply with the requirements
|
|
||||||
currently in effect as described in this License, you must purchase a
|
|
||||||
commercial license from the Licensor, its affiliated entities, or authorized
|
|
||||||
resellers, or you must refrain from using the Licensed Work.
|
|
||||||
|
|
||||||
All copies of the original and modified Licensed Work, and derivative works
|
|
||||||
of the Licensed Work, are subject to this License. This License applies
|
|
||||||
separately for each version of the Licensed Work and the Change Date may vary
|
|
||||||
for each version of the Licensed Work released by Licensor.
|
|
||||||
|
|
||||||
You must conspicuously display this License on each original or modified copy
|
|
||||||
of the Licensed Work. If you receive the Licensed Work in original or
|
|
||||||
modified form from a third party, the terms and conditions set forth in this
|
|
||||||
License apply to your use of that work.
|
|
||||||
|
|
||||||
Any use of the Licensed Work in violation of this License will automatically
|
|
||||||
terminate your rights under this License for the current and all other
|
|
||||||
versions of the Licensed Work.
|
|
||||||
|
|
||||||
This License does not grant you any right in any trademark or logo of
|
|
||||||
Licensor or its affiliates (provided that you may use a trademark or logo of
|
|
||||||
Licensor as expressly required by this License).
|
|
||||||
|
|
||||||
TO THE EXTENT PERMITTED BY APPLICABLE LAW, THE LICENSED WORK IS PROVIDED ON
|
|
||||||
AN “AS IS” BASIS. LICENSOR HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS,
|
|
||||||
EXPRESS OR IMPLIED, INCLUDING (WITHOUT LIMITATION) WARRANTIES OF
|
|
||||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND
|
|
||||||
TITLE.
|
|
||||||
|
|
||||||
MariaDB hereby grants you permission to use this License’s text to license
|
|
||||||
your works, and to refer to it using the trademark “Business Source License”,
|
|
||||||
as long as you comply with the Covenants of Licensor below.
|
|
||||||
|
|
||||||
Covenants of Licensor
|
|
||||||
|
|
||||||
In consideration of the right to use this License’s text and the “Business
|
|
||||||
Source License” name and trademark, Licensor covenants to MariaDB, and to all
|
|
||||||
other recipients of the licensed work to be provided by Licensor:
|
|
||||||
|
|
||||||
1. To specify as the Change License the GPL Version 2.0 or any later version,
|
|
||||||
or a license that is compatible with GPL Version 2.0 or a later version,
|
|
||||||
where “compatible” means that software provided under the Change License can
|
|
||||||
be included in a program with software provided under GPL Version 2.0 or a
|
|
||||||
later version. Licensor may specify additional Change Licenses without
|
|
||||||
limitation.
|
|
||||||
|
|
||||||
2. To either: (a) specify an additional grant of rights to use that does not
|
|
||||||
impose any additional restriction on the right granted in this License, as
|
|
||||||
the Additional Use Grant; or (b) insert the text “None”.
|
|
||||||
|
|
||||||
3. To specify a Change Date.
|
|
||||||
|
|
||||||
4. Not to modify this License in any other way.
|
|
|
@ -1,27 +0,0 @@
|
||||||
# README
|
|
||||||
|
|
||||||
## General Info
|
|
||||||
|
|
||||||
TrueCharts can be installed as both *normal* Helm Charts or as Apps on TrueNAS SCALE.
|
|
||||||
However only installations using the TrueNAS SCALE Apps system are supported.
|
|
||||||
|
|
||||||
For more information about this App, please check the docs on the TrueCharts [website](https://truecharts.org/charts/enterprise/)
|
|
||||||
|
|
||||||
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/charts/issues/new/choose)**
|
|
||||||
|
|
||||||
|
|
||||||
## Support
|
|
||||||
|
|
||||||
- Please check our [quick-start guides for TrueNAS SCALE](https://truecharts.org/manual/SCALE%20Apps/Important-MUST-READ).
|
|
||||||
- See the [Website](https://truecharts.org)
|
|
||||||
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
|
|
||||||
- Open a [issue](https://github.com/truecharts/charts/issues/new/choose)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
## Sponsor TrueCharts
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
||||||
|
|
||||||
*All Rights Reserved - The TrueCharts Project*
|
|
|
@ -1,9 +0,0 @@
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.2](https://github.com/truecharts/charts/compare/authelia-15.1.1...authelia-15.1.2) (2023-04-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7907](https://github.com/truecharts/charts/issues/7907))
|
|
||||||
|
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
Authelia is a Single Sign-On Multi-Factor portal for web apps
|
|
||||||
|
|
||||||
This App is supplied by TrueCharts, for more information visit the manual: [https://truecharts.org/charts/enterprise/authelia](https://truecharts.org/charts/enterprise/authelia)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
Binary file not shown.
Binary file not shown.
|
@ -1,630 +0,0 @@
|
||||||
image:
|
|
||||||
repository: tccr.io/truecharts/authelia
|
|
||||||
pullPolicy: IfNotPresent
|
|
||||||
tag: 4.37.5@sha256:76a4617539534cec140fd98a12f721b878524f2df3a3653f3df8ff2b7eaab586
|
|
||||||
|
|
||||||
workload:
|
|
||||||
main:
|
|
||||||
replicas: 2
|
|
||||||
strategy: RollingUpdate
|
|
||||||
podSpec:
|
|
||||||
containers:
|
|
||||||
main:
|
|
||||||
command: ["authelia"]
|
|
||||||
args: ["--config=/configuration.yaml"]
|
|
||||||
envFrom:
|
|
||||||
- configMapRef:
|
|
||||||
name: authelia-paths
|
|
||||||
probes:
|
|
||||||
liveness:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
readiness:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
startup:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
service:
|
|
||||||
main:
|
|
||||||
ports:
|
|
||||||
main:
|
|
||||||
port: 9091
|
|
||||||
targetPort: 9091
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
config:
|
|
||||||
enabled: true
|
|
||||||
mountPath: "/config"
|
|
||||||
|
|
||||||
cnpg:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
user: authelia
|
|
||||||
database: authelia
|
|
||||||
|
|
||||||
# Enabled redis
|
|
||||||
# ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/redis
|
|
||||||
redis:
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
domain: example.com
|
|
||||||
|
|
||||||
##
|
|
||||||
## Server Configuration
|
|
||||||
##
|
|
||||||
server:
|
|
||||||
##
|
|
||||||
## Port sets the configured port for the daemon, service, and the probes.
|
|
||||||
## Default is 9091 and should not need to be changed.
|
|
||||||
##
|
|
||||||
port: 9091
|
|
||||||
|
|
||||||
## Buffers usually should be configured to be the same value.
|
|
||||||
## Explanation at https://www.authelia.com/docs/configuration/server.html
|
|
||||||
## Read buffer size adjusts the server's max incoming request size in bytes.
|
|
||||||
## Write buffer size does the same for outgoing responses.
|
|
||||||
read_buffer_size: 4096
|
|
||||||
write_buffer_size: 4096
|
|
||||||
## Set the single level path Authelia listens on.
|
|
||||||
## Must be alphanumeric chars and should not contain any slashes.
|
|
||||||
path: ""
|
|
||||||
|
|
||||||
log:
|
|
||||||
## Level of verbosity for logs: info, debug, trace.
|
|
||||||
level: trace
|
|
||||||
|
|
||||||
## Format the logs are written as: json, text.
|
|
||||||
format: text
|
|
||||||
|
|
||||||
## TODO: Statefulness check should check if this is set, and the configMap should enable it.
|
|
||||||
## File path where the logs will be written. If not set logs are written to stdout.
|
|
||||||
# file_path: /config/authelia.log
|
|
||||||
|
|
||||||
## Default redirection URL
|
|
||||||
##
|
|
||||||
## If user tries to authenticate without any referer, Authelia does not know where to redirect the user to at the end
|
|
||||||
## of the authentication process. This parameter allows you to specify the default redirection URL Authelia will use
|
|
||||||
## in such a case.
|
|
||||||
##
|
|
||||||
## Note: this parameter is optional. If not provided, user won't be redirected upon successful authentication.
|
|
||||||
## Default is https://www.<domain> (value at the top of the values.yaml).
|
|
||||||
default_redirection_url: ""
|
|
||||||
# default_redirection_url: https://example.com
|
|
||||||
|
|
||||||
theme: light
|
|
||||||
|
|
||||||
##
|
|
||||||
## TOTP Configuration
|
|
||||||
##
|
|
||||||
## Parameters used for TOTP generation
|
|
||||||
totp:
|
|
||||||
## The issuer name displayed in the Authenticator application of your choice
|
|
||||||
## See: https://github.com/google/google-authenticator/wiki/Key-Uri-Format for more info on issuer names
|
|
||||||
## Defaults to <domain>.
|
|
||||||
issuer: ""
|
|
||||||
## The period in seconds a one-time password is current for. Changing this will require all users to register
|
|
||||||
## their TOTP applications again. Warning: before changing period read the docs link below.
|
|
||||||
period: 30
|
|
||||||
## The skew controls number of one-time passwords either side of the current one that are valid.
|
|
||||||
## Warning: before changing skew read the docs link below.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/one-time-password.html#period-and-skew to read the documentation.
|
|
||||||
skew: 1
|
|
||||||
|
|
||||||
##
|
|
||||||
## Duo Push API Configuration
|
|
||||||
##
|
|
||||||
## Parameters used to contact the Duo API. Those are generated when you protect an application of type
|
|
||||||
## "Partner Auth API" in the management panel.
|
|
||||||
duo_api:
|
|
||||||
enabled: false
|
|
||||||
hostname: api-123456789.example.com
|
|
||||||
integration_key: ABCDEF
|
|
||||||
plain_api_key: ""
|
|
||||||
|
|
||||||
## NTP settings
|
|
||||||
|
|
||||||
ntp:
|
|
||||||
address: "time.cloudflare.com:123"
|
|
||||||
version: 4
|
|
||||||
max_desync: 3s
|
|
||||||
disable_startup_check: false
|
|
||||||
disable_failure: true
|
|
||||||
|
|
||||||
##
|
|
||||||
## Authentication Backend Provider Configuration
|
|
||||||
##
|
|
||||||
## Used for verifying user passwords and retrieve information such as email address and groups users belong to.
|
|
||||||
##
|
|
||||||
## The available providers are: `file`, `ldap`. You must use one and only one of these providers.
|
|
||||||
authentication_backend:
|
|
||||||
## Disable both the HTML element and the API for reset password functionality
|
|
||||||
disable_reset_password: false
|
|
||||||
|
|
||||||
## The amount of time to wait before we refresh data from the authentication backend. Uses duration notation.
|
|
||||||
## To disable this feature set it to 'disable', this will slightly reduce security because for Authelia, users will
|
|
||||||
## always belong to groups they belonged to at the time of login even if they have been removed from them in LDAP.
|
|
||||||
## To force update on every request you can set this to '0' or 'always', this will increase processor demand.
|
|
||||||
## See the below documentation for more information.
|
|
||||||
## Duration Notation docs: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
## Refresh Interval docs: https://www.authelia.com/docs/configuration/authentication/ldap.html#refresh-interval
|
|
||||||
refresh_interval: 5m
|
|
||||||
|
|
||||||
## LDAP backend configuration.
|
|
||||||
##
|
|
||||||
## This backend allows Authelia to be scaled to more
|
|
||||||
## than one instance and therefore is recommended for
|
|
||||||
## production.
|
|
||||||
ldap:
|
|
||||||
## Enable LDAP Backend.
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
## The LDAP implementation, this affects elements like the attribute utilised for resetting a password.
|
|
||||||
## Acceptable options are as follows:
|
|
||||||
## - 'activedirectory' - For Microsoft Active Directory.
|
|
||||||
## - 'custom' - For custom specifications of attributes and filters.
|
|
||||||
## This currently defaults to 'custom' to maintain existing behaviour.
|
|
||||||
##
|
|
||||||
## Depending on the option here certain other values in this section have a default value, notably all of the
|
|
||||||
## attribute mappings have a default value that this config overrides, you can read more about these default values
|
|
||||||
## at https://www.authelia.com/docs/configuration/authentication/ldap.html#defaults
|
|
||||||
implementation: activedirectory
|
|
||||||
|
|
||||||
## The url to the ldap server. Format: <scheme>://<address>[:<port>].
|
|
||||||
## Scheme can be ldap or ldaps in the format (port optional).
|
|
||||||
url: ldap://openldap.default.svc.cluster.local
|
|
||||||
|
|
||||||
## Connection Timeout.
|
|
||||||
timeout: 5s
|
|
||||||
|
|
||||||
## Use StartTLS with the LDAP connection.
|
|
||||||
start_tls: false
|
|
||||||
|
|
||||||
tls:
|
|
||||||
## Server Name for certificate validation (in case it's not set correctly in the URL).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for either Secure LDAP or LDAP StartTLS.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
## The base dn for every LDAP query.
|
|
||||||
base_dn: DC=example,DC=com
|
|
||||||
|
|
||||||
## The attribute holding the username of the user. This attribute is used to populate the username in the session
|
|
||||||
## information. It was introduced due to #561 to handle case insensitive search queries. For you information,
|
|
||||||
## Microsoft Active Directory usually uses 'sAMAccountName' and OpenLDAP usually uses 'uid'. Beware that this
|
|
||||||
## attribute holds the unique identifiers for the users binding the user and the configuration stored in database.
|
|
||||||
## Therefore only single value attributes are allowed and the value must never be changed once attributed to a user
|
|
||||||
## otherwise it would break the configuration for that user. Technically, non-unique attributes like 'mail' can also
|
|
||||||
## be used but we don't recommend using them, we instead advise to use the attributes mentioned above
|
|
||||||
## (sAMAccountName and uid) to follow https://www.ietf.org/rfc/rfc2307.txt.
|
|
||||||
username_attribute: ""
|
|
||||||
|
|
||||||
## An additional dn to define the scope to all users.
|
|
||||||
additional_users_dn: OU=Users
|
|
||||||
|
|
||||||
## The users filter used in search queries to find the user profile based on input filled in login form.
|
|
||||||
## Various placeholders are available in the user filter:
|
|
||||||
## - {input} is a placeholder replaced by what the user inputs in the login form.
|
|
||||||
## - {username_attribute} is a mandatory placeholder replaced by what is configured in `username_attribute`.
|
|
||||||
## - {mail_attribute} is a placeholder replaced by what is configured in `mail_attribute`.
|
|
||||||
## - DON'T USE - {0} is an alias for {input} supported for backward compatibility but it will be deprecated in later
|
|
||||||
## versions, so please don't use it.
|
|
||||||
##
|
|
||||||
## Recommended settings are as follows:
|
|
||||||
## - Microsoft Active Directory: (&({username_attribute}={input})(objectCategory=person)(objectClass=user))
|
|
||||||
## - OpenLDAP:
|
|
||||||
## - (&({username_attribute}={input})(objectClass=person))
|
|
||||||
## - (&({username_attribute}={input})(objectClass=inetOrgPerson))
|
|
||||||
##
|
|
||||||
## To allow sign in both with username and email, one can use a filter like
|
|
||||||
## (&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))
|
|
||||||
users_filter: ""
|
|
||||||
|
|
||||||
## An additional dn to define the scope of groups.
|
|
||||||
additional_groups_dn: OU=Groups
|
|
||||||
|
|
||||||
## The groups filter used in search queries to find the groups of the user.
|
|
||||||
## - {input} is a placeholder replaced by what the user inputs in the login form.
|
|
||||||
## - {username} is a placeholder replace by the username stored in LDAP (based on `username_attribute`).
|
|
||||||
## - {dn} is a matcher replaced by the user distinguished name, aka, user DN.
|
|
||||||
## - {username_attribute} is a placeholder replaced by what is configured in `username_attribute`.
|
|
||||||
## - {mail_attribute} is a placeholder replaced by what is configured in `mail_attribute`.
|
|
||||||
## - DON'T USE - {0} is an alias for {input} supported for backward compatibility but it will be deprecated in later
|
|
||||||
## versions, so please don't use it.
|
|
||||||
## - DON'T USE - {1} is an alias for {username} supported for backward compatibility but it will be deprecated in
|
|
||||||
## later version, so please don't use it.
|
|
||||||
##
|
|
||||||
## If your groups use the `groupOfUniqueNames` structure use this instead:
|
|
||||||
## (&(uniquemember={dn})(objectclass=groupOfUniqueNames))
|
|
||||||
groups_filter: ""
|
|
||||||
|
|
||||||
## The attribute holding the name of the group
|
|
||||||
group_name_attribute: ""
|
|
||||||
|
|
||||||
## The attribute holding the mail address of the user. If multiple email addresses are defined for a user, only the
|
|
||||||
## first one returned by the LDAP server is used.
|
|
||||||
mail_attribute: ""
|
|
||||||
|
|
||||||
## The attribute holding the display name of the user. This will be used to greet an authenticated user.
|
|
||||||
display_name_attribute: ""
|
|
||||||
|
|
||||||
## The username of the admin user.
|
|
||||||
user: CN=Authelia,DC=example,DC=com
|
|
||||||
plain_password: ""
|
|
||||||
|
|
||||||
##
|
|
||||||
## File (Authentication Provider)
|
|
||||||
##
|
|
||||||
## With this backend, the users database is stored in a file which is updated when users reset their passwords.
|
|
||||||
## Therefore, this backend is meant to be used in a dev environment and not in production since it prevents Authelia
|
|
||||||
## to be scaled to more than one instance. The options under 'password' have sane defaults, and as it has security
|
|
||||||
## implications it is highly recommended you leave the default values. Before considering changing these settings
|
|
||||||
## please read the docs page below:
|
|
||||||
## https://www.authelia.com/docs/configuration/authentication/file.html#password-hash-algorithm-tuning
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
file:
|
|
||||||
enabled: true
|
|
||||||
path: /config/users_database.yml
|
|
||||||
password:
|
|
||||||
algorithm: argon2id
|
|
||||||
iterations: 1
|
|
||||||
key_length: 32
|
|
||||||
salt_length: 16
|
|
||||||
memory: 1024
|
|
||||||
parallelism: 8
|
|
||||||
|
|
||||||
##
|
|
||||||
## Access Control Configuration
|
|
||||||
##
|
|
||||||
## Access control is a list of rules defining the authorizations applied for one resource to users or group of users.
|
|
||||||
##
|
|
||||||
## If 'access_control' is not defined, ACL rules are disabled and the 'bypass' rule is applied, i.e., access is allowed
|
|
||||||
## to anyone. Otherwise restrictions follow the rules defined.
|
|
||||||
##
|
|
||||||
## Note: One can use the wildcard * to match any subdomain.
|
|
||||||
## It must stand at the beginning of the pattern. (example: *.mydomain.com)
|
|
||||||
##
|
|
||||||
## Note: You must put patterns containing wildcards between simple quotes for the YAML to be syntactically correct.
|
|
||||||
##
|
|
||||||
## Definition: A 'rule' is an object with the following keys: 'domain', 'subject', 'policy' and 'resources'.
|
|
||||||
##
|
|
||||||
## - 'domain' defines which domain or set of domains the rule applies to.
|
|
||||||
##
|
|
||||||
## - 'subject' defines the subject to apply authorizations to. This parameter is optional and matching any user if not
|
|
||||||
## provided. If provided, the parameter represents either a user or a group. It should be of the form
|
|
||||||
## 'user:<username>' or 'group:<groupname>'.
|
|
||||||
##
|
|
||||||
## - 'policy' is the policy to apply to resources. It must be either 'bypass', 'one_factor', 'two_factor' or 'deny'.
|
|
||||||
##
|
|
||||||
## - 'resources' is a list of regular expressions that matches a set of resources to apply the policy to. This parameter
|
|
||||||
## is optional and matches any resource if not provided.
|
|
||||||
##
|
|
||||||
## Note: the order of the rules is important. The first policy matching (domain, resource, subject) applies.
|
|
||||||
access_control:
|
|
||||||
## Default policy can either be 'bypass', 'one_factor', 'two_factor' or 'deny'. It is the policy applied to any
|
|
||||||
## resource if there is no policy to be applied to the user.
|
|
||||||
default_policy: deny
|
|
||||||
|
|
||||||
networks: []
|
|
||||||
# networks:
|
|
||||||
# - name: private
|
|
||||||
# networks:
|
|
||||||
# - 10.0.0.0/8
|
|
||||||
# - 172.16.0.0/12
|
|
||||||
# - 192.168.0.0/16
|
|
||||||
# - name: vpn
|
|
||||||
# networks:
|
|
||||||
# - 10.9.0.0/16
|
|
||||||
|
|
||||||
rules: []
|
|
||||||
# rules:
|
|
||||||
# - domain: public.example.com
|
|
||||||
# policy: bypass
|
|
||||||
# - domain: "*.example.com"
|
|
||||||
# policy: bypass
|
|
||||||
# methods:
|
|
||||||
# - OPTIONS
|
|
||||||
# - domain: secure.example.com
|
|
||||||
# policy: one_factor
|
|
||||||
# networks:
|
|
||||||
# - private
|
|
||||||
# - vpn
|
|
||||||
# - 192.168.1.0/24
|
|
||||||
# - 10.0.0.1
|
|
||||||
# - domain:
|
|
||||||
# - secure.example.com
|
|
||||||
# - private.example.com
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: singlefactor.example.com
|
|
||||||
# policy: one_factor
|
|
||||||
# - domain: "mx2.mail.example.com"
|
|
||||||
# subject: "group:admins"
|
|
||||||
# policy: deny
|
|
||||||
# - domain: "*.example.com"
|
|
||||||
# subject:
|
|
||||||
# - "group:admins"
|
|
||||||
# - "group:moderators"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: dev.example.com
|
|
||||||
# resources:
|
|
||||||
# - "^/groups/dev/.*$"
|
|
||||||
# subject: "group:dev"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: dev.example.com
|
|
||||||
# resources:
|
|
||||||
# - "^/users/john/.*$"
|
|
||||||
# subject:
|
|
||||||
# - ["group:dev", "user:john"]
|
|
||||||
# - "group:admins"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: "{user}.example.com"
|
|
||||||
# policy: bypass
|
|
||||||
|
|
||||||
##
|
|
||||||
## Session Provider Configuration
|
|
||||||
##
|
|
||||||
## The session cookies identify the user once logged in.
|
|
||||||
## The available providers are: `memory`, `redis`. Memory is the provider unless redis is defined.
|
|
||||||
session:
|
|
||||||
## The name of the session cookie. (default: authelia_session).
|
|
||||||
name: authelia_session
|
|
||||||
|
|
||||||
## Sets the Cookie SameSite value. Possible options are none, lax, or strict.
|
|
||||||
## Please read https://www.authelia.com/docs/configuration/session.html#same_site
|
|
||||||
same_site: lax
|
|
||||||
|
|
||||||
## The time in seconds before the cookie expires and session is reset.
|
|
||||||
expiration: 1h
|
|
||||||
|
|
||||||
## The inactivity time in seconds before the session is reset.
|
|
||||||
inactivity: 5m
|
|
||||||
|
|
||||||
## The remember me duration.
|
|
||||||
## Value is in seconds, or duration notation. Value of 0 disables remember me.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
## Longer periods are considered less secure because a stolen cookie will last longer giving attackers more time to
|
|
||||||
## spy or attack. Currently the default is 1M or 1 month.
|
|
||||||
remember_me_duration: 1M
|
|
||||||
|
|
||||||
##
|
|
||||||
## Redis Provider
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
## The redis connection details
|
|
||||||
redisProvider:
|
|
||||||
port: 6379
|
|
||||||
|
|
||||||
## Optional username to be used with authentication.
|
|
||||||
# username: authelia
|
|
||||||
username: ""
|
|
||||||
|
|
||||||
## This is the Redis DB Index https://redis.io/commands/select (sometimes referred to as database number, DB, etc).
|
|
||||||
database_index: 0
|
|
||||||
|
|
||||||
## The maximum number of concurrent active connections to Redis.
|
|
||||||
maximum_active_connections: 8
|
|
||||||
|
|
||||||
## The target number of idle connections to have open ready for work. Useful when opening connections is slow.
|
|
||||||
minimum_idle_connections: 0
|
|
||||||
|
|
||||||
## The Redis TLS configuration. If defined will require a TLS connection to the Redis instance(s).
|
|
||||||
tls:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
## Server Name for certificate validation (in case you are using the IP or non-FQDN in the host option).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for the connection.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
## The Redis HA configuration options.
|
|
||||||
## This provides specific options to Redis Sentinel, sentinel_name must be defined (Master Name).
|
|
||||||
high_availability:
|
|
||||||
enabled: false
|
|
||||||
enabledSecret: false
|
|
||||||
## Sentinel Name / Master Name
|
|
||||||
sentinel_name: mysentinel
|
|
||||||
|
|
||||||
## The additional nodes to pre-seed the redis provider with (for sentinel).
|
|
||||||
## If the host in the above section is defined, it will be combined with this list to connect to sentinel.
|
|
||||||
## For high availability to be used you must have either defined; the host above or at least one node below.
|
|
||||||
nodes: []
|
|
||||||
# nodes:
|
|
||||||
# - host: sentinel-0.databases.svc.cluster.local
|
|
||||||
# port: 26379
|
|
||||||
# - host: sentinel-1.databases.svc.cluster.local
|
|
||||||
# port: 26379
|
|
||||||
|
|
||||||
## Choose the host with the lowest latency.
|
|
||||||
route_by_latency: false
|
|
||||||
|
|
||||||
## Choose the host randomly.
|
|
||||||
route_randomly: false
|
|
||||||
|
|
||||||
##
|
|
||||||
## Regulation Configuration
|
|
||||||
##
|
|
||||||
## This mechanism prevents attackers from brute forcing the first factor. It bans the user if too many attempts are done
|
|
||||||
## in a short period of time.
|
|
||||||
regulation:
|
|
||||||
## The number of failed login attempts before user is banned. Set it to 0 to disable regulation.
|
|
||||||
max_retries: 3
|
|
||||||
|
|
||||||
## The time range during which the user can attempt login before being banned. The user is banned if the
|
|
||||||
## authentication failed 'max_retries' times in a 'find_time' seconds window. Find Time accepts duration notation.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
find_time: 2m
|
|
||||||
|
|
||||||
## The length of time before a banned user can login again. Ban Time accepts duration notation.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
ban_time: 5m
|
|
||||||
|
|
||||||
##
|
|
||||||
## Storage Provider Configuration
|
|
||||||
##
|
|
||||||
## The available providers are: `local`, `mysql`, `postgres`. You must use one and only one of these providers.
|
|
||||||
storage:
|
|
||||||
##
|
|
||||||
## PostgreSQL (Storage Provider)
|
|
||||||
##
|
|
||||||
postgres:
|
|
||||||
port: 5432
|
|
||||||
database: authelia
|
|
||||||
username: authelia
|
|
||||||
sslmode: disable
|
|
||||||
timeout: 5s
|
|
||||||
|
|
||||||
##
|
|
||||||
## Notification Provider
|
|
||||||
##
|
|
||||||
##
|
|
||||||
## Notifications are sent to users when they require a password reset, a u2f registration or a TOTP registration.
|
|
||||||
## The available providers are: filesystem, smtp. You must use one and only one of these providers.
|
|
||||||
notifier:
|
|
||||||
## You can disable the notifier startup check by setting this to true.
|
|
||||||
disable_startup_check: false
|
|
||||||
|
|
||||||
##
|
|
||||||
## File System (Notification Provider)
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
filesystem:
|
|
||||||
enabled: true
|
|
||||||
filename: /config/notification.txt
|
|
||||||
|
|
||||||
##
|
|
||||||
## SMTP (Notification Provider)
|
|
||||||
##
|
|
||||||
## Use a SMTP server for sending notifications. Authelia uses the PLAIN or LOGIN methods to authenticate.
|
|
||||||
## [Security] By default Authelia will:
|
|
||||||
## - force all SMTP connections over TLS including unauthenticated connections
|
|
||||||
## - use the disable_require_tls boolean value to disable this requirement
|
|
||||||
## (only works for unauthenticated connections)
|
|
||||||
## - validate the SMTP server x509 certificate during the TLS handshake against the hosts trusted certificates
|
|
||||||
## (configure in tls section)
|
|
||||||
smtp:
|
|
||||||
enabled: false
|
|
||||||
enabledSecret: false
|
|
||||||
host: smtp.mail.svc.cluster.local
|
|
||||||
port: 25
|
|
||||||
timeout: 5s
|
|
||||||
username: test
|
|
||||||
plain_password: test
|
|
||||||
sender: admin@example.com
|
|
||||||
## HELO/EHLO Identifier. Some SMTP Servers may reject the default of localhost.
|
|
||||||
identifier: localhost
|
|
||||||
## Subject configuration of the emails sent.
|
|
||||||
## {title} is replaced by the text from the notifier
|
|
||||||
subject: "[Authelia] {title}"
|
|
||||||
## This address is used during the startup check to verify the email configuration is correct.
|
|
||||||
## It's not important what it is except if your email server only allows local delivery.
|
|
||||||
startup_check_address: test@authelia.com
|
|
||||||
disable_require_tls: false
|
|
||||||
disable_html_emails: false
|
|
||||||
|
|
||||||
tls:
|
|
||||||
## Server Name for certificate validation (in case you are using the IP or non-FQDN in the host option).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for either StartTLS or SMTPS.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
identity_providers:
|
|
||||||
oidc:
|
|
||||||
## Enables this in the config map. Currently in beta stage.
|
|
||||||
## See https://www.authelia.com/docs/configuration/identity-providers/oidc.html#roadmap
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
access_token_lifespan: 1h
|
|
||||||
authorize_code_lifespan: 1m
|
|
||||||
id_token_lifespan: 1h
|
|
||||||
refresh_token_lifespan: 90m
|
|
||||||
|
|
||||||
enable_client_debug_messages: false
|
|
||||||
|
|
||||||
## SECURITY NOTICE: It's not recommended changing this option, and highly discouraged to have it below 8 for
|
|
||||||
## security reasons.
|
|
||||||
minimum_parameter_entropy: 8
|
|
||||||
|
|
||||||
clients: []
|
|
||||||
# clients:
|
|
||||||
# -
|
|
||||||
## The ID is the OpenID Connect ClientID which is used to link an application to a configuration.
|
|
||||||
# id: myapp
|
|
||||||
|
|
||||||
## The description to show to users when they end up on the consent screen. Defaults to the ID above.
|
|
||||||
# description: My Application
|
|
||||||
|
|
||||||
## The client secret is a shared secret between Authelia and the consumer of this client.
|
|
||||||
# secret: apple123
|
|
||||||
|
|
||||||
## Sets the client to public. This should typically not be set, please see the documentation for usage.
|
|
||||||
# public: false
|
|
||||||
|
|
||||||
## The policy to require for this client; one_factor or two_factor.
|
|
||||||
# authorization_policy: two_factor
|
|
||||||
|
|
||||||
## Configures the consent mode; auto, explicit or implicit
|
|
||||||
# consent_mode: auto
|
|
||||||
|
|
||||||
## Audience this client is allowed to request.
|
|
||||||
# audience: []
|
|
||||||
|
|
||||||
## Scopes this client is allowed to request.
|
|
||||||
# scopes:
|
|
||||||
# - openid
|
|
||||||
# - profile
|
|
||||||
# - email
|
|
||||||
# - groups
|
|
||||||
|
|
||||||
## Redirect URI's specifies a list of valid case-sensitive callbacks for this client.
|
|
||||||
# redirect_uris:
|
|
||||||
# - https://oidc.example.com/oauth2/callback
|
|
||||||
|
|
||||||
## Grant Types configures which grants this client can obtain.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# grant_types:
|
|
||||||
# - refresh_token
|
|
||||||
# - authorization_code
|
|
||||||
|
|
||||||
## Response Types configures which responses this client can be sent.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# response_types:
|
|
||||||
# - code
|
|
||||||
|
|
||||||
## Response Modes configures which response modes this client supports.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# response_modes:
|
|
||||||
# - form_post
|
|
||||||
# - query
|
|
||||||
# - fragment
|
|
||||||
|
|
||||||
## The algorithm used to sign userinfo endpoint responses for this client, either none or RS256.
|
|
||||||
# userinfo_signing_algorithm: none
|
|
||||||
|
|
||||||
portal:
|
|
||||||
open:
|
|
||||||
enabled: true
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1 +0,0 @@
|
||||||
{{- include "tc.v1.common.lib.chart.notes" $ -}}
|
|
|
@ -1,254 +0,0 @@
|
||||||
{{/* Define the configmap */}}
|
|
||||||
{{- define "authelia.configmap.paths" -}}
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
AUTHELIA_SERVER_DISABLE_HEALTHCHECK: "true"
|
|
||||||
AUTHELIA_JWT_SECRET_FILE: "/secrets/JWT_TOKEN"
|
|
||||||
AUTHELIA_SESSION_SECRET_FILE: "/secrets/SESSION_ENCRYPTION_KEY"
|
|
||||||
AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE: "/secrets/ENCRYPTION_KEY"
|
|
||||||
AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE: "/secrets/STORAGE_PASSWORD"
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE: "/secrets/LDAP_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.notifier.smtp.enabled }}
|
|
||||||
AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE: "/secrets/SMTP_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
AUTHELIA_SESSION_REDIS_PASSWORD_FILE: "/secrets/REDIS_PASSWORD"
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled }}
|
|
||||||
AUTHELIA_SESSION_REDIS_HIGH_AVAILABILITY_SENTINEL_PASSWORD_FILE: "/secrets/REDIS_SENTINEL_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
AUTHELIA_DUO_API_SECRET_KEY_FILE: "/secrets/DUO_API_KEY"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
AUTHELIA_IDENTITY_PROVIDERS_OIDC_HMAC_SECRET_FILE: "/secrets/OIDC_HMAC_SECRET"
|
|
||||||
AUTHELIA_IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY_FILE: "/secrets/OIDC_PRIVATE_KEY"
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- define "authelia.configmap.configfile" -}}
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
configuration.yaml: |
|
|
||||||
---
|
|
||||||
theme: {{ default "light" .Values.theme }}
|
|
||||||
default_redirection_url: {{ default (printf "https://www.%s" .Values.domain) .Values.default_redirection_url }}
|
|
||||||
ntp:
|
|
||||||
address: {{ default "time.cloudflare.com:123" .Values.ntp.address }}
|
|
||||||
version: {{ default 4 .Values.ntp.version }}
|
|
||||||
max_desync: {{ default "3s" .Values.ntp.max_desync }}
|
|
||||||
disable_startup_check: {{ default false .Values.ntp.disable_startup_check }}
|
|
||||||
disable_failure: {{ default true .Values.ntp.disable_failure }}
|
|
||||||
server:
|
|
||||||
host: 0.0.0.0
|
|
||||||
port: {{ default 9091 .Values.server.port }}
|
|
||||||
{{- if not (eq "" (default "" .Values.server.path)) }}
|
|
||||||
path: {{ .Values.server.path }}
|
|
||||||
{{- end }}
|
|
||||||
buffers:
|
|
||||||
write: {{ default 4096 .Values.server.write_buffer_size }}
|
|
||||||
read: {{ default 4096 .Values.server.read_buffer_size }}
|
|
||||||
enable_pprof: {{ default false .Values.server.enable_pprof }}
|
|
||||||
enable_expvars: {{ default false .Values.server.enable_expvars }}
|
|
||||||
log:
|
|
||||||
level: {{ default "info" .Values.log.level }}
|
|
||||||
format: {{ default "text" .Values.log.format }}
|
|
||||||
{{- if not (eq "" (default "" .Values.log.file_path)) }}
|
|
||||||
file_path: {{ .Values.log.file_path }}
|
|
||||||
keep_stdout: true
|
|
||||||
{{- end }}
|
|
||||||
totp:
|
|
||||||
issuer: {{ default .Values.domain .Values.totp.issuer }}
|
|
||||||
period: {{ default 30 .Values.totp.period }}
|
|
||||||
skew: {{ default 1 .Values.totp.skew }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
duo_api:
|
|
||||||
hostname: {{ .Values.duo_api.hostname }}
|
|
||||||
integration_key: {{ .Values.duo_api.integration_key }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $auth := .Values.authentication_backend }}
|
|
||||||
authentication_backend:
|
|
||||||
password_reset:
|
|
||||||
disable: {{ $auth.disable_reset_password }}
|
|
||||||
{{- if $auth.file.enabled }}
|
|
||||||
file:
|
|
||||||
path: {{ $auth.file.path }}
|
|
||||||
password: {{ toYaml $auth.file.password | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.enabled }}
|
|
||||||
ldap:
|
|
||||||
implementation: {{ default "custom" $auth.ldap.implementation }}
|
|
||||||
url: {{ $auth.ldap.url }}
|
|
||||||
timeout: {{ default "5s" $auth.ldap.timeout }}
|
|
||||||
start_tls: {{ $auth.ldap.start_tls }}
|
|
||||||
tls:
|
|
||||||
{{- if hasKey $auth.ldap.tls "server_name" }}
|
|
||||||
server_name: {{ default $auth.ldap.host $auth.ldap.tls.server_name }}
|
|
||||||
{{- end }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $auth.ldap.tls.minimum_version }}
|
|
||||||
skip_verify: {{ default false $auth.ldap.tls.skip_verify }}
|
|
||||||
{{- if $auth.ldap.base_dn }}
|
|
||||||
base_dn: {{ $auth.ldap.base_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.username_attribute }}
|
|
||||||
username_attribute: {{ $auth.ldap.username_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.additional_users_dn }}
|
|
||||||
additional_users_dn: {{ $auth.ldap.additional_users_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.users_filter }}
|
|
||||||
users_filter: {{ $auth.ldap.users_filter }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.additional_groups_dn }}
|
|
||||||
additional_groups_dn: {{ $auth.ldap.additional_groups_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.groups_filter }}
|
|
||||||
groups_filter: {{ $auth.ldap.groups_filter }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.group_name_attribute }}
|
|
||||||
group_name_attribute: {{ $auth.ldap.group_name_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.mail_attribute }}
|
|
||||||
mail_attribute: {{ $auth.ldap.mail_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.display_name_attribute }}
|
|
||||||
display_name_attribute: {{ $auth.ldap.display_name_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
user: {{ $auth.ldap.user }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $session := .Values.session }}
|
|
||||||
session:
|
|
||||||
name: {{ default "authelia_session" $session.name }}
|
|
||||||
domain: {{ required "A valid .Values.domain entry required!" $.Values.domain }}
|
|
||||||
same_site: {{ default "lax" $session.same_site }}
|
|
||||||
expiration: {{ default "1M" $session.expiration }}
|
|
||||||
inactivity: {{ default "5m" $session.inactivity }}
|
|
||||||
remember_me_duration: {{ default "1M" $session.remember_me_duration }}
|
|
||||||
{{- end }}
|
|
||||||
redis:
|
|
||||||
host: {{ .Values.redis.creds.plain }}
|
|
||||||
{{- with $redis := .Values.redisProvider }}
|
|
||||||
port: {{ default 6379 $redis.port }}
|
|
||||||
{{- if not (eq $redis.username "") }}
|
|
||||||
username: {{ $redis.username }}
|
|
||||||
{{- end }}
|
|
||||||
maximum_active_connections: {{ default 8 $redis.maximum_active_connections }}
|
|
||||||
minimum_idle_connections: {{ default 0 $redis.minimum_idle_connections }}
|
|
||||||
{{- if $redis.tls.enabled }}
|
|
||||||
tls:
|
|
||||||
server_name: {{ $redis.tls.server_name }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $redis.tls.minimum_version }}
|
|
||||||
skip_verify: {{ $redis.tls.skip_verify }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $redis.high_availability.enabled }}
|
|
||||||
high_availability:
|
|
||||||
sentinel_name: {{ $redis.high_availability.sentinel_name }}
|
|
||||||
{{- if $redis.high_availability.nodes }}
|
|
||||||
nodes: {{ toYaml $redis.high_availability.nodes | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
route_by_latency: {{ $redis.high_availability.route_by_latency }}
|
|
||||||
route_randomly: {{ $redis.high_availability.route_randomly }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
regulation: {{ toYaml .Values.regulation | nindent 6 }}
|
|
||||||
storage:
|
|
||||||
postgres:
|
|
||||||
host: {{ $.Values.cnpg.main.creds.host }}
|
|
||||||
{{- with $storage := .Values.storage }}
|
|
||||||
port: {{ default 5432 $storage.postgres.port }}
|
|
||||||
database: {{ default "authelia" $storage.postgres.database }}
|
|
||||||
username: {{ default "authelia" $storage.postgres.username }}
|
|
||||||
timeout: {{ default "5s" $storage.postgres.timeout }}
|
|
||||||
ssl:
|
|
||||||
mode: {{ default "disable" $storage.postgres.sslmode }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $notifier := .Values.notifier }}
|
|
||||||
notifier:
|
|
||||||
disable_startup_check: {{ $.Values.notifier.disable_startup_check }}
|
|
||||||
{{- if $notifier.filesystem.enabled }}
|
|
||||||
filesystem:
|
|
||||||
filename: {{ $notifier.filesystem.filename }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $notifier.smtp.enabled }}
|
|
||||||
smtp:
|
|
||||||
host: {{ $notifier.smtp.host }}
|
|
||||||
port: {{ default 25 $notifier.smtp.port }}
|
|
||||||
timeout: {{ default "5s" $notifier.smtp.timeout }}
|
|
||||||
{{- with $notifier.smtp.username }}
|
|
||||||
username: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
sender: {{ $notifier.smtp.sender }}
|
|
||||||
identifier: {{ $notifier.smtp.identifier }}
|
|
||||||
subject: {{ $notifier.smtp.subject | quote }}
|
|
||||||
startup_check_address: {{ $notifier.smtp.startup_check_address }}
|
|
||||||
disable_require_tls: {{ $notifier.smtp.disable_require_tls }}
|
|
||||||
disable_html_emails: {{ $notifier.smtp.disable_html_emails }}
|
|
||||||
tls:
|
|
||||||
server_name: {{ default $notifier.smtp.host $notifier.smtp.tls.server_name }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $notifier.smtp.tls.minimum_version }}
|
|
||||||
skip_verify: {{ default false $notifier.smtp.tls.skip_verify }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
identity_providers:
|
|
||||||
oidc:
|
|
||||||
access_token_lifespan: {{ default "1h" .Values.identity_providers.oidc.access_token_lifespan }}
|
|
||||||
authorize_code_lifespan: {{ default "1m" .Values.identity_providers.oidc.authorize_code_lifespan }}
|
|
||||||
id_token_lifespan: {{ default "1h" .Values.identity_providers.oidc.id_token_lifespan }}
|
|
||||||
refresh_token_lifespan: {{ default "90m" .Values.identity_providers.oidc.refresh_token_lifespan }}
|
|
||||||
enable_client_debug_messages: {{ default false .Values.identity_providers.oidc.enable_client_debug_messages }}
|
|
||||||
minimum_parameter_entropy: {{ default 8 .Values.identity_providers.oidc.minimum_parameter_entropy }}
|
|
||||||
{{- if gt (len .Values.identity_providers.oidc.clients) 0 }}
|
|
||||||
clients:
|
|
||||||
{{- range $client := .Values.identity_providers.oidc.clients }}
|
|
||||||
- id: {{ $client.id }}
|
|
||||||
description: {{ default $client.id $client.description }}
|
|
||||||
secret: {{ default (randAlphaNum 128) $client.secret }}
|
|
||||||
{{- if $client.public }}
|
|
||||||
public: {{ $client.public }}
|
|
||||||
{{- end }}
|
|
||||||
authorization_policy: {{ default "two_factor" $client.authorization_policy }}
|
|
||||||
consent_mode: {{ default "auto" $client.consent_mode}}
|
|
||||||
redirect_uris:
|
|
||||||
{{- range $client.redirect_uris }}
|
|
||||||
- {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $client.audience }}
|
|
||||||
audience: {{ toYaml $client.audience | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
scopes: {{ toYaml (default (list "openid" "profile" "email" "groups") $client.scopes) | nindent 10 }}
|
|
||||||
grant_types: {{ toYaml (default (list "refresh_token" "authorization_code") $client.grant_types) | nindent 10 }}
|
|
||||||
response_types: {{ toYaml (default (list "code") $client.response_types) | nindent 10 }}
|
|
||||||
{{- if $client.response_modes }}
|
|
||||||
response_modes: {{ toYaml $client.response_modes | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
userinfo_signing_algorithm: {{ default "none" $client.userinfo_signing_algorithm }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
access_control:
|
|
||||||
{{- if (eq (len .Values.access_control.rules) 0) }}
|
|
||||||
{{- if (eq .Values.access_control.default_policy "bypass") }}
|
|
||||||
default_policy: one_factor
|
|
||||||
{{- else if (eq .Values.access_control.default_policy "deny") }}
|
|
||||||
default_policy: two_factor
|
|
||||||
{{- else }}
|
|
||||||
default_policy: {{ .Values.access_control.default_policy }}
|
|
||||||
{{- end }}
|
|
||||||
{{- else }}
|
|
||||||
default_policy: {{ .Values.access_control.default_policy }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if (eq (len .Values.access_control.networks) 0) }}
|
|
||||||
networks: []
|
|
||||||
{{- else }}
|
|
||||||
networks: {{ toYaml .Values.access_control.networks | nindent 6 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if (eq (len .Values.access_control.rules) 0) }}
|
|
||||||
rules: []
|
|
||||||
{{- else }}
|
|
||||||
rules: {{ toYaml .Values.access_control.rules | nindent 6 }}
|
|
||||||
{{- end }}
|
|
||||||
...
|
|
||||||
{{- end -}}
|
|
|
@ -1,53 +0,0 @@
|
||||||
{{/* Define the secrets */}}
|
|
||||||
{{- define "authelia.secrets" -}}
|
|
||||||
{{- $basename := include "tc.v1.common.lib.chart.names.fullname" $ -}}
|
|
||||||
{{- $fetchname := printf "%s-authelia-secrets" $basename -}}
|
|
||||||
|
|
||||||
{{/* Initialize all keys */}}
|
|
||||||
{{- $oidckey := genPrivateKey "rsa" }}
|
|
||||||
{{- $oidcsecret := randAlphaNum 32 }}
|
|
||||||
{{- $jwtsecret := randAlphaNum 50 }}
|
|
||||||
{{- $sessionsecret := randAlphaNum 50 }}
|
|
||||||
{{- $encryptionkey := randAlphaNum 100 }}
|
|
||||||
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
{{ with (lookup "v1" "Secret" .Release.Namespace $fetchname) }}
|
|
||||||
{{/* Get previous values and decode */}}
|
|
||||||
{{ $sessionsecret = (index .data "SESSION_ENCRYPTION_KEY") | b64dec }}
|
|
||||||
{{ $jwtsecret = (index .data "JWT_TOKEN") | b64dec }}
|
|
||||||
{{ $encryptionkey = (index .data "ENCRYPTION_KEY") | b64dec }}
|
|
||||||
|
|
||||||
{{/* Check if those keys ever existed. as OIDC is optional */}}
|
|
||||||
{{ if and (hasKey .data "OIDC_PRIVATE_KEY") (hasKey .data "OIDC_HMAC_SECRET") }}
|
|
||||||
{{ $oidckey = (index .data "OIDC_PRIVATE_KEY") | b64dec }}
|
|
||||||
{{ $oidcsecret = (index .data "OIDC_HMAC_SECRET") | b64dec }}
|
|
||||||
{{ end }}
|
|
||||||
{{ end }}
|
|
||||||
SESSION_ENCRYPTION_KEY: {{ $sessionsecret }}
|
|
||||||
JWT_TOKEN: {{ $jwtsecret }}
|
|
||||||
ENCRYPTION_KEY: {{ $encryptionkey }}
|
|
||||||
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
LDAP_PASSWORD: {{ .Values.authentication_backend.ldap.plain_password }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- if and .Values.notifier.smtp.enabled .Values.notifier.smtp.plain_password }}
|
|
||||||
SMTP_PASSWORD: {{ .Values.notifier.smtp.plain_password }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
DUO_API_KEY: {{ .Values.duo_api.plain_api_key }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
STORAGE_PASSWORD: {{ $.Values.cnpg.main.creds.password | trimAll "\"" }}
|
|
||||||
|
|
||||||
REDIS_PASSWORD: {{ .Values.redis.creds.redisPassword | trimAll "\"" }}
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled }}
|
|
||||||
REDIS_SENTINEL_PASSWORD: {{ .Values.redis.sentinelPassword | trimAll "\"" }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
OIDC_PRIVATE_KEY: |
|
|
||||||
{{- $oidckey | nindent 4 }}
|
|
||||||
OIDC_HMAC_SECRET: {{ $oidcsecret }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,77 +0,0 @@
|
||||||
{{/* Make sure all variables are set properly */}}
|
|
||||||
{{- include "tc.v1.common.loader.init" . }}
|
|
||||||
|
|
||||||
{{/* Render configmap for authelia */}}
|
|
||||||
{{- $configmapPaths := include "authelia.configmap.paths" . | fromYaml -}}
|
|
||||||
{{- if $configmapPaths -}}
|
|
||||||
{{- $_ := set .Values.configmap "authelia-paths" $configmapPaths -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- $configmapFile := include "authelia.configmap.configfile" . | fromYaml -}}
|
|
||||||
{{- if $configmapFile -}}
|
|
||||||
{{- $_ := set .Values.configmap "authelia-configfile" $configmapFile -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Render secrets for authelia */}}
|
|
||||||
{{- $secret := include "authelia.secrets" . | fromYaml -}}
|
|
||||||
{{- if $secret -}}
|
|
||||||
{{- $_ := set .Values.secret "authelia-secrets" $secret -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Append the general configMap volume to the volumes */}}
|
|
||||||
{{- define "authelia.configmapVolume" -}}
|
|
||||||
enabled: true
|
|
||||||
mountPath: /configuration.yaml
|
|
||||||
subPath: configuration.yaml
|
|
||||||
readOnly: true
|
|
||||||
type: "configmap"
|
|
||||||
objectName: authelia-configfile
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Append the general secret volumes to the volumes */}}
|
|
||||||
{{- define "authelia.secretVolumes" -}}
|
|
||||||
enabled: true
|
|
||||||
mountPath: "/secrets"
|
|
||||||
readOnly: true
|
|
||||||
type: "secret"
|
|
||||||
objectName: authelia-secrets
|
|
||||||
items:
|
|
||||||
- key: "JWT_TOKEN"
|
|
||||||
path: JWT_TOKEN
|
|
||||||
- key: "SESSION_ENCRYPTION_KEY"
|
|
||||||
path: SESSION_ENCRYPTION_KEY
|
|
||||||
- key: "ENCRYPTION_KEY"
|
|
||||||
path: ENCRYPTION_KEY
|
|
||||||
- key: "STORAGE_PASSWORD"
|
|
||||||
path: STORAGE_PASSWORD
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
- key: "LDAP_PASSWORD"
|
|
||||||
path: LDAP_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
{{- if and .Values.notifier.smtp.enabled .Values.notifier.smtp.plain_password }}
|
|
||||||
- key: "SMTP_PASSWORD"
|
|
||||||
path: SMTP_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
- key: "REDIS_PASSWORD"
|
|
||||||
path: REDIS_PASSWORD
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled}}
|
|
||||||
- key: "REDIS_SENTINEL_PASSWORD"
|
|
||||||
path: REDIS_SENTINEL_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
- key: "DUO_API_KEY"
|
|
||||||
path: DUO_API_KEY
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
- key: "OIDC_PRIVATE_KEY"
|
|
||||||
path: OIDC_PRIVATE_KEY
|
|
||||||
- key: "OIDC_HMAC_SECRET"
|
|
||||||
path: OIDC_HMAC_SECRET
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- $_ := set .Values.persistence "authelia-configfile" (include "authelia.configmapVolume" . | fromYaml) -}}
|
|
||||||
{{- $_ := set .Values.persistence "authelia-secrets" (include "authelia.secretVolumes" . | fromYaml) -}}
|
|
||||||
|
|
||||||
{{/* Render the templates */}}
|
|
||||||
{{ include "tc.v1.common.loader.apply" . }}
|
|
|
@ -1,99 +0,0 @@
|
||||||
**Important:**
|
|
||||||
*for the complete changelog, please refer to the website*
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.3](https://github.com/truecharts/charts/compare/authelia-15.1.2...authelia-15.1.3) (2023-04-11)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7929](https://github.com/truecharts/charts/issues/7929))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.2](https://github.com/truecharts/charts/compare/authelia-15.1.1...authelia-15.1.2) (2023-04-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7907](https://github.com/truecharts/charts/issues/7907))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.1](https://github.com/truecharts/charts/compare/authelia-15.1.0...authelia-15.1.1) (2023-04-05)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common to 32 on enterprise charts
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.0](https://github.com/truecharts/charts/compare/authelia-15.0.13...authelia-15.1.0) (2023-03-22)
|
|
||||||
|
|
||||||
### Feat
|
|
||||||
|
|
||||||
- allow for NTP failure by default ([#7824](https://github.com/truecharts/charts/issues/7824))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.13](https://github.com/truecharts/charts/compare/authelia-15.0.12...authelia-15.0.13) (2023-03-19)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common and deps on enterprise train ([#7819](https://github.com/truecharts/charts/issues/7819))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.12](https://github.com/truecharts/charts/compare/authelia-15.0.11...authelia-15.0.12) (2023-03-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump dependencies and release 2 replica default
|
|
||||||
|
|
||||||
### Feat
|
|
||||||
|
|
||||||
- replicas2 part 2
|
|
||||||
- run 2 replica's with rolling updates
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.11](https://github.com/truecharts/charts/compare/authelia-15.0.10...authelia-15.0.11) (2023-03-08)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.10](https://github.com/truecharts/charts/compare/authelia-15.0.9...authelia-15.0.10) (2023-03-08)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- indent priv key ([#7770](https://github.com/truecharts/charts/issues/7770))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.9](https://github.com/truecharts/charts/compare/authelia-15.0.8...authelia-15.0.9) (2023-03-08)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- cleanup secret a bit ([#7768](https://github.com/truecharts/charts/issues/7768))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.8](https://github.com/truecharts/charts/compare/authelia-15.0.7...authelia-15.0.8) (2023-03-07)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- fix broken fetching of old values on authelia ([#7764](https://github.com/truecharts/charts/issues/7764))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.7](https://github.com/truecharts/charts/compare/authelia-15.0.6...authelia-15.0.7) (2023-03-07)
|
|
||||||
|
|
|
@ -1,43 +0,0 @@
|
||||||
apiVersion: v2
|
|
||||||
appVersion: "4.37.5"
|
|
||||||
dependencies:
|
|
||||||
- name: common
|
|
||||||
repository: https://library-charts.truecharts.org
|
|
||||||
version: 12.4.3
|
|
||||||
- condition: redis.enabled
|
|
||||||
name: redis
|
|
||||||
repository: https://deps.truecharts.org
|
|
||||||
version: 6.0.20
|
|
||||||
deprecated: false
|
|
||||||
description: Authelia is a Single Sign-On Multi-Factor portal for web apps
|
|
||||||
home: https://truecharts.org/charts/enterprise/authelia
|
|
||||||
icon: https://truecharts.org/img/hotlink-ok/chart-icons/authelia.png
|
|
||||||
keywords:
|
|
||||||
- authelia
|
|
||||||
- authentication
|
|
||||||
- login
|
|
||||||
- SSO
|
|
||||||
- Authentication
|
|
||||||
- Security
|
|
||||||
- Two-Factor
|
|
||||||
- U2F
|
|
||||||
- YubiKey
|
|
||||||
- Push Notifications
|
|
||||||
- LDAP
|
|
||||||
kubeVersion: ">=1.16.0-0"
|
|
||||||
maintainers:
|
|
||||||
- email: info@truecharts.org
|
|
||||||
name: TrueCharts
|
|
||||||
url: https://truecharts.org
|
|
||||||
name: authelia
|
|
||||||
sources:
|
|
||||||
- https://github.com/truecharts/charts/tree/master/charts/enterprise/authelia
|
|
||||||
- https://github.com/authelia/chartrepo
|
|
||||||
- https://github.com/authelia/authelia
|
|
||||||
type: application
|
|
||||||
version: 15.1.3
|
|
||||||
annotations:
|
|
||||||
truecharts.org/catagories: |
|
|
||||||
- security
|
|
||||||
truecharts.org/SCALE-support: "true"
|
|
||||||
truecharts.org/grade: U
|
|
|
@ -1,106 +0,0 @@
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Parameters
|
|
||||||
|
|
||||||
Licensor: The TrueCharts Project, it's owner and it's contributors
|
|
||||||
Licensed Work: The TrueCharts "Cert-Manager" Helm Chart
|
|
||||||
Additional Use Grant: You may use the licensed work in production, as long
|
|
||||||
as it is directly sourced from a TrueCharts provided
|
|
||||||
official repository, catalog or source. You may also make private
|
|
||||||
modification to the directly sourced licenced work,
|
|
||||||
when used in production.
|
|
||||||
|
|
||||||
The following cases are, due to their nature, also
|
|
||||||
defined as 'production use' and explicitly prohibited:
|
|
||||||
- Bundling, including or displaying the licensed work
|
|
||||||
with(in) another work intended for production use,
|
|
||||||
with the apparent intend of facilitating and/or
|
|
||||||
promoting production use by third parties in
|
|
||||||
violation of this license.
|
|
||||||
|
|
||||||
Change Date: 2050-01-01
|
|
||||||
|
|
||||||
Change License: 3-clause BSD license
|
|
||||||
|
|
||||||
For information about alternative licensing arrangements for the Software,
|
|
||||||
please contact: legal@truecharts.org
|
|
||||||
|
|
||||||
Notice
|
|
||||||
|
|
||||||
The Business Source License (this document, or the “License”) is not an Open
|
|
||||||
Source license. However, the Licensed Work will eventually be made available
|
|
||||||
under an Open Source License, as stated in this License.
|
|
||||||
|
|
||||||
License text copyright (c) 2017 MariaDB Corporation Ab, All Rights Reserved.
|
|
||||||
“Business Source License” is a trademark of MariaDB Corporation Ab.
|
|
||||||
|
|
||||||
-----------------------------------------------------------------------------
|
|
||||||
|
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Terms
|
|
||||||
|
|
||||||
The Licensor hereby grants you the right to copy, modify, create derivative
|
|
||||||
works, redistribute, and make non-production use of the Licensed Work. The
|
|
||||||
Licensor may make an Additional Use Grant, above, permitting limited
|
|
||||||
production use.
|
|
||||||
|
|
||||||
Effective on the Change Date, or the fourth anniversary of the first publicly
|
|
||||||
available distribution of a specific version of the Licensed Work under this
|
|
||||||
License, whichever comes first, the Licensor hereby grants you rights under
|
|
||||||
the terms of the Change License, and the rights granted in the paragraph
|
|
||||||
above terminate.
|
|
||||||
|
|
||||||
If your use of the Licensed Work does not comply with the requirements
|
|
||||||
currently in effect as described in this License, you must purchase a
|
|
||||||
commercial license from the Licensor, its affiliated entities, or authorized
|
|
||||||
resellers, or you must refrain from using the Licensed Work.
|
|
||||||
|
|
||||||
All copies of the original and modified Licensed Work, and derivative works
|
|
||||||
of the Licensed Work, are subject to this License. This License applies
|
|
||||||
separately for each version of the Licensed Work and the Change Date may vary
|
|
||||||
for each version of the Licensed Work released by Licensor.
|
|
||||||
|
|
||||||
You must conspicuously display this License on each original or modified copy
|
|
||||||
of the Licensed Work. If you receive the Licensed Work in original or
|
|
||||||
modified form from a third party, the terms and conditions set forth in this
|
|
||||||
License apply to your use of that work.
|
|
||||||
|
|
||||||
Any use of the Licensed Work in violation of this License will automatically
|
|
||||||
terminate your rights under this License for the current and all other
|
|
||||||
versions of the Licensed Work.
|
|
||||||
|
|
||||||
This License does not grant you any right in any trademark or logo of
|
|
||||||
Licensor or its affiliates (provided that you may use a trademark or logo of
|
|
||||||
Licensor as expressly required by this License).
|
|
||||||
|
|
||||||
TO THE EXTENT PERMITTED BY APPLICABLE LAW, THE LICENSED WORK IS PROVIDED ON
|
|
||||||
AN “AS IS” BASIS. LICENSOR HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS,
|
|
||||||
EXPRESS OR IMPLIED, INCLUDING (WITHOUT LIMITATION) WARRANTIES OF
|
|
||||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND
|
|
||||||
TITLE.
|
|
||||||
|
|
||||||
MariaDB hereby grants you permission to use this License’s text to license
|
|
||||||
your works, and to refer to it using the trademark “Business Source License”,
|
|
||||||
as long as you comply with the Covenants of Licensor below.
|
|
||||||
|
|
||||||
Covenants of Licensor
|
|
||||||
|
|
||||||
In consideration of the right to use this License’s text and the “Business
|
|
||||||
Source License” name and trademark, Licensor covenants to MariaDB, and to all
|
|
||||||
other recipients of the licensed work to be provided by Licensor:
|
|
||||||
|
|
||||||
1. To specify as the Change License the GPL Version 2.0 or any later version,
|
|
||||||
or a license that is compatible with GPL Version 2.0 or a later version,
|
|
||||||
where “compatible” means that software provided under the Change License can
|
|
||||||
be included in a program with software provided under GPL Version 2.0 or a
|
|
||||||
later version. Licensor may specify additional Change Licenses without
|
|
||||||
limitation.
|
|
||||||
|
|
||||||
2. To either: (a) specify an additional grant of rights to use that does not
|
|
||||||
impose any additional restriction on the right granted in this License, as
|
|
||||||
the Additional Use Grant; or (b) insert the text “None”.
|
|
||||||
|
|
||||||
3. To specify a Change Date.
|
|
||||||
|
|
||||||
4. Not to modify this License in any other way.
|
|
|
@ -1,27 +0,0 @@
|
||||||
# README
|
|
||||||
|
|
||||||
## General Info
|
|
||||||
|
|
||||||
TrueCharts can be installed as both *normal* Helm Charts or as Apps on TrueNAS SCALE.
|
|
||||||
However only installations using the TrueNAS SCALE Apps system are supported.
|
|
||||||
|
|
||||||
For more information about this App, please check the docs on the TrueCharts [website](https://truecharts.org/charts/enterprise/)
|
|
||||||
|
|
||||||
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/charts/issues/new/choose)**
|
|
||||||
|
|
||||||
|
|
||||||
## Support
|
|
||||||
|
|
||||||
- Please check our [quick-start guides for TrueNAS SCALE](https://truecharts.org/manual/SCALE%20Apps/Important-MUST-READ).
|
|
||||||
- See the [Website](https://truecharts.org)
|
|
||||||
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
|
|
||||||
- Open a [issue](https://github.com/truecharts/charts/issues/new/choose)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
## Sponsor TrueCharts
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
||||||
|
|
||||||
*All Rights Reserved - The TrueCharts Project*
|
|
|
@ -1,9 +0,0 @@
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.3](https://github.com/truecharts/charts/compare/authelia-15.1.2...authelia-15.1.3) (2023-04-11)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7929](https://github.com/truecharts/charts/issues/7929))
|
|
||||||
|
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
Authelia is a Single Sign-On Multi-Factor portal for web apps
|
|
||||||
|
|
||||||
This App is supplied by TrueCharts, for more information visit the manual: [https://truecharts.org/charts/enterprise/authelia](https://truecharts.org/charts/enterprise/authelia)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
Binary file not shown.
Binary file not shown.
|
@ -1,630 +0,0 @@
|
||||||
image:
|
|
||||||
repository: tccr.io/truecharts/authelia
|
|
||||||
pullPolicy: IfNotPresent
|
|
||||||
tag: 4.37.5@sha256:76a4617539534cec140fd98a12f721b878524f2df3a3653f3df8ff2b7eaab586
|
|
||||||
|
|
||||||
workload:
|
|
||||||
main:
|
|
||||||
replicas: 2
|
|
||||||
strategy: RollingUpdate
|
|
||||||
podSpec:
|
|
||||||
containers:
|
|
||||||
main:
|
|
||||||
command: ["authelia"]
|
|
||||||
args: ["--config=/configuration.yaml"]
|
|
||||||
envFrom:
|
|
||||||
- configMapRef:
|
|
||||||
name: authelia-paths
|
|
||||||
probes:
|
|
||||||
liveness:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
readiness:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
startup:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
service:
|
|
||||||
main:
|
|
||||||
ports:
|
|
||||||
main:
|
|
||||||
port: 9091
|
|
||||||
targetPort: 9091
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
config:
|
|
||||||
enabled: true
|
|
||||||
mountPath: "/config"
|
|
||||||
|
|
||||||
cnpg:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
user: authelia
|
|
||||||
database: authelia
|
|
||||||
|
|
||||||
# Enabled redis
|
|
||||||
# ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/redis
|
|
||||||
redis:
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
domain: example.com
|
|
||||||
|
|
||||||
##
|
|
||||||
## Server Configuration
|
|
||||||
##
|
|
||||||
server:
|
|
||||||
##
|
|
||||||
## Port sets the configured port for the daemon, service, and the probes.
|
|
||||||
## Default is 9091 and should not need to be changed.
|
|
||||||
##
|
|
||||||
port: 9091
|
|
||||||
|
|
||||||
## Buffers usually should be configured to be the same value.
|
|
||||||
## Explanation at https://www.authelia.com/docs/configuration/server.html
|
|
||||||
## Read buffer size adjusts the server's max incoming request size in bytes.
|
|
||||||
## Write buffer size does the same for outgoing responses.
|
|
||||||
read_buffer_size: 4096
|
|
||||||
write_buffer_size: 4096
|
|
||||||
## Set the single level path Authelia listens on.
|
|
||||||
## Must be alphanumeric chars and should not contain any slashes.
|
|
||||||
path: ""
|
|
||||||
|
|
||||||
log:
|
|
||||||
## Level of verbosity for logs: info, debug, trace.
|
|
||||||
level: trace
|
|
||||||
|
|
||||||
## Format the logs are written as: json, text.
|
|
||||||
format: text
|
|
||||||
|
|
||||||
## TODO: Statefulness check should check if this is set, and the configMap should enable it.
|
|
||||||
## File path where the logs will be written. If not set logs are written to stdout.
|
|
||||||
# file_path: /config/authelia.log
|
|
||||||
|
|
||||||
## Default redirection URL
|
|
||||||
##
|
|
||||||
## If user tries to authenticate without any referer, Authelia does not know where to redirect the user to at the end
|
|
||||||
## of the authentication process. This parameter allows you to specify the default redirection URL Authelia will use
|
|
||||||
## in such a case.
|
|
||||||
##
|
|
||||||
## Note: this parameter is optional. If not provided, user won't be redirected upon successful authentication.
|
|
||||||
## Default is https://www.<domain> (value at the top of the values.yaml).
|
|
||||||
default_redirection_url: ""
|
|
||||||
# default_redirection_url: https://example.com
|
|
||||||
|
|
||||||
theme: light
|
|
||||||
|
|
||||||
##
|
|
||||||
## TOTP Configuration
|
|
||||||
##
|
|
||||||
## Parameters used for TOTP generation
|
|
||||||
totp:
|
|
||||||
## The issuer name displayed in the Authenticator application of your choice
|
|
||||||
## See: https://github.com/google/google-authenticator/wiki/Key-Uri-Format for more info on issuer names
|
|
||||||
## Defaults to <domain>.
|
|
||||||
issuer: ""
|
|
||||||
## The period in seconds a one-time password is current for. Changing this will require all users to register
|
|
||||||
## their TOTP applications again. Warning: before changing period read the docs link below.
|
|
||||||
period: 30
|
|
||||||
## The skew controls number of one-time passwords either side of the current one that are valid.
|
|
||||||
## Warning: before changing skew read the docs link below.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/one-time-password.html#period-and-skew to read the documentation.
|
|
||||||
skew: 1
|
|
||||||
|
|
||||||
##
|
|
||||||
## Duo Push API Configuration
|
|
||||||
##
|
|
||||||
## Parameters used to contact the Duo API. Those are generated when you protect an application of type
|
|
||||||
## "Partner Auth API" in the management panel.
|
|
||||||
duo_api:
|
|
||||||
enabled: false
|
|
||||||
hostname: api-123456789.example.com
|
|
||||||
integration_key: ABCDEF
|
|
||||||
plain_api_key: ""
|
|
||||||
|
|
||||||
## NTP settings
|
|
||||||
|
|
||||||
ntp:
|
|
||||||
address: "time.cloudflare.com:123"
|
|
||||||
version: 4
|
|
||||||
max_desync: 3s
|
|
||||||
disable_startup_check: false
|
|
||||||
disable_failure: true
|
|
||||||
|
|
||||||
##
|
|
||||||
## Authentication Backend Provider Configuration
|
|
||||||
##
|
|
||||||
## Used for verifying user passwords and retrieve information such as email address and groups users belong to.
|
|
||||||
##
|
|
||||||
## The available providers are: `file`, `ldap`. You must use one and only one of these providers.
|
|
||||||
authentication_backend:
|
|
||||||
## Disable both the HTML element and the API for reset password functionality
|
|
||||||
disable_reset_password: false
|
|
||||||
|
|
||||||
## The amount of time to wait before we refresh data from the authentication backend. Uses duration notation.
|
|
||||||
## To disable this feature set it to 'disable', this will slightly reduce security because for Authelia, users will
|
|
||||||
## always belong to groups they belonged to at the time of login even if they have been removed from them in LDAP.
|
|
||||||
## To force update on every request you can set this to '0' or 'always', this will increase processor demand.
|
|
||||||
## See the below documentation for more information.
|
|
||||||
## Duration Notation docs: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
## Refresh Interval docs: https://www.authelia.com/docs/configuration/authentication/ldap.html#refresh-interval
|
|
||||||
refresh_interval: 5m
|
|
||||||
|
|
||||||
## LDAP backend configuration.
|
|
||||||
##
|
|
||||||
## This backend allows Authelia to be scaled to more
|
|
||||||
## than one instance and therefore is recommended for
|
|
||||||
## production.
|
|
||||||
ldap:
|
|
||||||
## Enable LDAP Backend.
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
## The LDAP implementation, this affects elements like the attribute utilised for resetting a password.
|
|
||||||
## Acceptable options are as follows:
|
|
||||||
## - 'activedirectory' - For Microsoft Active Directory.
|
|
||||||
## - 'custom' - For custom specifications of attributes and filters.
|
|
||||||
## This currently defaults to 'custom' to maintain existing behaviour.
|
|
||||||
##
|
|
||||||
## Depending on the option here certain other values in this section have a default value, notably all of the
|
|
||||||
## attribute mappings have a default value that this config overrides, you can read more about these default values
|
|
||||||
## at https://www.authelia.com/docs/configuration/authentication/ldap.html#defaults
|
|
||||||
implementation: activedirectory
|
|
||||||
|
|
||||||
## The url to the ldap server. Format: <scheme>://<address>[:<port>].
|
|
||||||
## Scheme can be ldap or ldaps in the format (port optional).
|
|
||||||
url: ldap://openldap.default.svc.cluster.local
|
|
||||||
|
|
||||||
## Connection Timeout.
|
|
||||||
timeout: 5s
|
|
||||||
|
|
||||||
## Use StartTLS with the LDAP connection.
|
|
||||||
start_tls: false
|
|
||||||
|
|
||||||
tls:
|
|
||||||
## Server Name for certificate validation (in case it's not set correctly in the URL).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for either Secure LDAP or LDAP StartTLS.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
## The base dn for every LDAP query.
|
|
||||||
base_dn: DC=example,DC=com
|
|
||||||
|
|
||||||
## The attribute holding the username of the user. This attribute is used to populate the username in the session
|
|
||||||
## information. It was introduced due to #561 to handle case insensitive search queries. For you information,
|
|
||||||
## Microsoft Active Directory usually uses 'sAMAccountName' and OpenLDAP usually uses 'uid'. Beware that this
|
|
||||||
## attribute holds the unique identifiers for the users binding the user and the configuration stored in database.
|
|
||||||
## Therefore only single value attributes are allowed and the value must never be changed once attributed to a user
|
|
||||||
## otherwise it would break the configuration for that user. Technically, non-unique attributes like 'mail' can also
|
|
||||||
## be used but we don't recommend using them, we instead advise to use the attributes mentioned above
|
|
||||||
## (sAMAccountName and uid) to follow https://www.ietf.org/rfc/rfc2307.txt.
|
|
||||||
username_attribute: ""
|
|
||||||
|
|
||||||
## An additional dn to define the scope to all users.
|
|
||||||
additional_users_dn: OU=Users
|
|
||||||
|
|
||||||
## The users filter used in search queries to find the user profile based on input filled in login form.
|
|
||||||
## Various placeholders are available in the user filter:
|
|
||||||
## - {input} is a placeholder replaced by what the user inputs in the login form.
|
|
||||||
## - {username_attribute} is a mandatory placeholder replaced by what is configured in `username_attribute`.
|
|
||||||
## - {mail_attribute} is a placeholder replaced by what is configured in `mail_attribute`.
|
|
||||||
## - DON'T USE - {0} is an alias for {input} supported for backward compatibility but it will be deprecated in later
|
|
||||||
## versions, so please don't use it.
|
|
||||||
##
|
|
||||||
## Recommended settings are as follows:
|
|
||||||
## - Microsoft Active Directory: (&({username_attribute}={input})(objectCategory=person)(objectClass=user))
|
|
||||||
## - OpenLDAP:
|
|
||||||
## - (&({username_attribute}={input})(objectClass=person))
|
|
||||||
## - (&({username_attribute}={input})(objectClass=inetOrgPerson))
|
|
||||||
##
|
|
||||||
## To allow sign in both with username and email, one can use a filter like
|
|
||||||
## (&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))
|
|
||||||
users_filter: ""
|
|
||||||
|
|
||||||
## An additional dn to define the scope of groups.
|
|
||||||
additional_groups_dn: OU=Groups
|
|
||||||
|
|
||||||
## The groups filter used in search queries to find the groups of the user.
|
|
||||||
## - {input} is a placeholder replaced by what the user inputs in the login form.
|
|
||||||
## - {username} is a placeholder replace by the username stored in LDAP (based on `username_attribute`).
|
|
||||||
## - {dn} is a matcher replaced by the user distinguished name, aka, user DN.
|
|
||||||
## - {username_attribute} is a placeholder replaced by what is configured in `username_attribute`.
|
|
||||||
## - {mail_attribute} is a placeholder replaced by what is configured in `mail_attribute`.
|
|
||||||
## - DON'T USE - {0} is an alias for {input} supported for backward compatibility but it will be deprecated in later
|
|
||||||
## versions, so please don't use it.
|
|
||||||
## - DON'T USE - {1} is an alias for {username} supported for backward compatibility but it will be deprecated in
|
|
||||||
## later version, so please don't use it.
|
|
||||||
##
|
|
||||||
## If your groups use the `groupOfUniqueNames` structure use this instead:
|
|
||||||
## (&(uniquemember={dn})(objectclass=groupOfUniqueNames))
|
|
||||||
groups_filter: ""
|
|
||||||
|
|
||||||
## The attribute holding the name of the group
|
|
||||||
group_name_attribute: ""
|
|
||||||
|
|
||||||
## The attribute holding the mail address of the user. If multiple email addresses are defined for a user, only the
|
|
||||||
## first one returned by the LDAP server is used.
|
|
||||||
mail_attribute: ""
|
|
||||||
|
|
||||||
## The attribute holding the display name of the user. This will be used to greet an authenticated user.
|
|
||||||
display_name_attribute: ""
|
|
||||||
|
|
||||||
## The username of the admin user.
|
|
||||||
user: CN=Authelia,DC=example,DC=com
|
|
||||||
plain_password: ""
|
|
||||||
|
|
||||||
##
|
|
||||||
## File (Authentication Provider)
|
|
||||||
##
|
|
||||||
## With this backend, the users database is stored in a file which is updated when users reset their passwords.
|
|
||||||
## Therefore, this backend is meant to be used in a dev environment and not in production since it prevents Authelia
|
|
||||||
## to be scaled to more than one instance. The options under 'password' have sane defaults, and as it has security
|
|
||||||
## implications it is highly recommended you leave the default values. Before considering changing these settings
|
|
||||||
## please read the docs page below:
|
|
||||||
## https://www.authelia.com/docs/configuration/authentication/file.html#password-hash-algorithm-tuning
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
file:
|
|
||||||
enabled: true
|
|
||||||
path: /config/users_database.yml
|
|
||||||
password:
|
|
||||||
algorithm: argon2id
|
|
||||||
iterations: 1
|
|
||||||
key_length: 32
|
|
||||||
salt_length: 16
|
|
||||||
memory: 1024
|
|
||||||
parallelism: 8
|
|
||||||
|
|
||||||
##
|
|
||||||
## Access Control Configuration
|
|
||||||
##
|
|
||||||
## Access control is a list of rules defining the authorizations applied for one resource to users or group of users.
|
|
||||||
##
|
|
||||||
## If 'access_control' is not defined, ACL rules are disabled and the 'bypass' rule is applied, i.e., access is allowed
|
|
||||||
## to anyone. Otherwise restrictions follow the rules defined.
|
|
||||||
##
|
|
||||||
## Note: One can use the wildcard * to match any subdomain.
|
|
||||||
## It must stand at the beginning of the pattern. (example: *.mydomain.com)
|
|
||||||
##
|
|
||||||
## Note: You must put patterns containing wildcards between simple quotes for the YAML to be syntactically correct.
|
|
||||||
##
|
|
||||||
## Definition: A 'rule' is an object with the following keys: 'domain', 'subject', 'policy' and 'resources'.
|
|
||||||
##
|
|
||||||
## - 'domain' defines which domain or set of domains the rule applies to.
|
|
||||||
##
|
|
||||||
## - 'subject' defines the subject to apply authorizations to. This parameter is optional and matching any user if not
|
|
||||||
## provided. If provided, the parameter represents either a user or a group. It should be of the form
|
|
||||||
## 'user:<username>' or 'group:<groupname>'.
|
|
||||||
##
|
|
||||||
## - 'policy' is the policy to apply to resources. It must be either 'bypass', 'one_factor', 'two_factor' or 'deny'.
|
|
||||||
##
|
|
||||||
## - 'resources' is a list of regular expressions that matches a set of resources to apply the policy to. This parameter
|
|
||||||
## is optional and matches any resource if not provided.
|
|
||||||
##
|
|
||||||
## Note: the order of the rules is important. The first policy matching (domain, resource, subject) applies.
|
|
||||||
access_control:
|
|
||||||
## Default policy can either be 'bypass', 'one_factor', 'two_factor' or 'deny'. It is the policy applied to any
|
|
||||||
## resource if there is no policy to be applied to the user.
|
|
||||||
default_policy: deny
|
|
||||||
|
|
||||||
networks: []
|
|
||||||
# networks:
|
|
||||||
# - name: private
|
|
||||||
# networks:
|
|
||||||
# - 10.0.0.0/8
|
|
||||||
# - 172.16.0.0/12
|
|
||||||
# - 192.168.0.0/16
|
|
||||||
# - name: vpn
|
|
||||||
# networks:
|
|
||||||
# - 10.9.0.0/16
|
|
||||||
|
|
||||||
rules: []
|
|
||||||
# rules:
|
|
||||||
# - domain: public.example.com
|
|
||||||
# policy: bypass
|
|
||||||
# - domain: "*.example.com"
|
|
||||||
# policy: bypass
|
|
||||||
# methods:
|
|
||||||
# - OPTIONS
|
|
||||||
# - domain: secure.example.com
|
|
||||||
# policy: one_factor
|
|
||||||
# networks:
|
|
||||||
# - private
|
|
||||||
# - vpn
|
|
||||||
# - 192.168.1.0/24
|
|
||||||
# - 10.0.0.1
|
|
||||||
# - domain:
|
|
||||||
# - secure.example.com
|
|
||||||
# - private.example.com
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: singlefactor.example.com
|
|
||||||
# policy: one_factor
|
|
||||||
# - domain: "mx2.mail.example.com"
|
|
||||||
# subject: "group:admins"
|
|
||||||
# policy: deny
|
|
||||||
# - domain: "*.example.com"
|
|
||||||
# subject:
|
|
||||||
# - "group:admins"
|
|
||||||
# - "group:moderators"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: dev.example.com
|
|
||||||
# resources:
|
|
||||||
# - "^/groups/dev/.*$"
|
|
||||||
# subject: "group:dev"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: dev.example.com
|
|
||||||
# resources:
|
|
||||||
# - "^/users/john/.*$"
|
|
||||||
# subject:
|
|
||||||
# - ["group:dev", "user:john"]
|
|
||||||
# - "group:admins"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: "{user}.example.com"
|
|
||||||
# policy: bypass
|
|
||||||
|
|
||||||
##
|
|
||||||
## Session Provider Configuration
|
|
||||||
##
|
|
||||||
## The session cookies identify the user once logged in.
|
|
||||||
## The available providers are: `memory`, `redis`. Memory is the provider unless redis is defined.
|
|
||||||
session:
|
|
||||||
## The name of the session cookie. (default: authelia_session).
|
|
||||||
name: authelia_session
|
|
||||||
|
|
||||||
## Sets the Cookie SameSite value. Possible options are none, lax, or strict.
|
|
||||||
## Please read https://www.authelia.com/docs/configuration/session.html#same_site
|
|
||||||
same_site: lax
|
|
||||||
|
|
||||||
## The time in seconds before the cookie expires and session is reset.
|
|
||||||
expiration: 1h
|
|
||||||
|
|
||||||
## The inactivity time in seconds before the session is reset.
|
|
||||||
inactivity: 5m
|
|
||||||
|
|
||||||
## The remember me duration.
|
|
||||||
## Value is in seconds, or duration notation. Value of 0 disables remember me.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
## Longer periods are considered less secure because a stolen cookie will last longer giving attackers more time to
|
|
||||||
## spy or attack. Currently the default is 1M or 1 month.
|
|
||||||
remember_me_duration: 1M
|
|
||||||
|
|
||||||
##
|
|
||||||
## Redis Provider
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
## The redis connection details
|
|
||||||
redisProvider:
|
|
||||||
port: 6379
|
|
||||||
|
|
||||||
## Optional username to be used with authentication.
|
|
||||||
# username: authelia
|
|
||||||
username: ""
|
|
||||||
|
|
||||||
## This is the Redis DB Index https://redis.io/commands/select (sometimes referred to as database number, DB, etc).
|
|
||||||
database_index: 0
|
|
||||||
|
|
||||||
## The maximum number of concurrent active connections to Redis.
|
|
||||||
maximum_active_connections: 8
|
|
||||||
|
|
||||||
## The target number of idle connections to have open ready for work. Useful when opening connections is slow.
|
|
||||||
minimum_idle_connections: 0
|
|
||||||
|
|
||||||
## The Redis TLS configuration. If defined will require a TLS connection to the Redis instance(s).
|
|
||||||
tls:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
## Server Name for certificate validation (in case you are using the IP or non-FQDN in the host option).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for the connection.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
## The Redis HA configuration options.
|
|
||||||
## This provides specific options to Redis Sentinel, sentinel_name must be defined (Master Name).
|
|
||||||
high_availability:
|
|
||||||
enabled: false
|
|
||||||
enabledSecret: false
|
|
||||||
## Sentinel Name / Master Name
|
|
||||||
sentinel_name: mysentinel
|
|
||||||
|
|
||||||
## The additional nodes to pre-seed the redis provider with (for sentinel).
|
|
||||||
## If the host in the above section is defined, it will be combined with this list to connect to sentinel.
|
|
||||||
## For high availability to be used you must have either defined; the host above or at least one node below.
|
|
||||||
nodes: []
|
|
||||||
# nodes:
|
|
||||||
# - host: sentinel-0.databases.svc.cluster.local
|
|
||||||
# port: 26379
|
|
||||||
# - host: sentinel-1.databases.svc.cluster.local
|
|
||||||
# port: 26379
|
|
||||||
|
|
||||||
## Choose the host with the lowest latency.
|
|
||||||
route_by_latency: false
|
|
||||||
|
|
||||||
## Choose the host randomly.
|
|
||||||
route_randomly: false
|
|
||||||
|
|
||||||
##
|
|
||||||
## Regulation Configuration
|
|
||||||
##
|
|
||||||
## This mechanism prevents attackers from brute forcing the first factor. It bans the user if too many attempts are done
|
|
||||||
## in a short period of time.
|
|
||||||
regulation:
|
|
||||||
## The number of failed login attempts before user is banned. Set it to 0 to disable regulation.
|
|
||||||
max_retries: 3
|
|
||||||
|
|
||||||
## The time range during which the user can attempt login before being banned. The user is banned if the
|
|
||||||
## authentication failed 'max_retries' times in a 'find_time' seconds window. Find Time accepts duration notation.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
find_time: 2m
|
|
||||||
|
|
||||||
## The length of time before a banned user can login again. Ban Time accepts duration notation.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
ban_time: 5m
|
|
||||||
|
|
||||||
##
|
|
||||||
## Storage Provider Configuration
|
|
||||||
##
|
|
||||||
## The available providers are: `local`, `mysql`, `postgres`. You must use one and only one of these providers.
|
|
||||||
storage:
|
|
||||||
##
|
|
||||||
## PostgreSQL (Storage Provider)
|
|
||||||
##
|
|
||||||
postgres:
|
|
||||||
port: 5432
|
|
||||||
database: authelia
|
|
||||||
username: authelia
|
|
||||||
sslmode: disable
|
|
||||||
timeout: 5s
|
|
||||||
|
|
||||||
##
|
|
||||||
## Notification Provider
|
|
||||||
##
|
|
||||||
##
|
|
||||||
## Notifications are sent to users when they require a password reset, a u2f registration or a TOTP registration.
|
|
||||||
## The available providers are: filesystem, smtp. You must use one and only one of these providers.
|
|
||||||
notifier:
|
|
||||||
## You can disable the notifier startup check by setting this to true.
|
|
||||||
disable_startup_check: false
|
|
||||||
|
|
||||||
##
|
|
||||||
## File System (Notification Provider)
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
filesystem:
|
|
||||||
enabled: true
|
|
||||||
filename: /config/notification.txt
|
|
||||||
|
|
||||||
##
|
|
||||||
## SMTP (Notification Provider)
|
|
||||||
##
|
|
||||||
## Use a SMTP server for sending notifications. Authelia uses the PLAIN or LOGIN methods to authenticate.
|
|
||||||
## [Security] By default Authelia will:
|
|
||||||
## - force all SMTP connections over TLS including unauthenticated connections
|
|
||||||
## - use the disable_require_tls boolean value to disable this requirement
|
|
||||||
## (only works for unauthenticated connections)
|
|
||||||
## - validate the SMTP server x509 certificate during the TLS handshake against the hosts trusted certificates
|
|
||||||
## (configure in tls section)
|
|
||||||
smtp:
|
|
||||||
enabled: false
|
|
||||||
enabledSecret: false
|
|
||||||
host: smtp.mail.svc.cluster.local
|
|
||||||
port: 25
|
|
||||||
timeout: 5s
|
|
||||||
username: test
|
|
||||||
plain_password: test
|
|
||||||
sender: admin@example.com
|
|
||||||
## HELO/EHLO Identifier. Some SMTP Servers may reject the default of localhost.
|
|
||||||
identifier: localhost
|
|
||||||
## Subject configuration of the emails sent.
|
|
||||||
## {title} is replaced by the text from the notifier
|
|
||||||
subject: "[Authelia] {title}"
|
|
||||||
## This address is used during the startup check to verify the email configuration is correct.
|
|
||||||
## It's not important what it is except if your email server only allows local delivery.
|
|
||||||
startup_check_address: test@authelia.com
|
|
||||||
disable_require_tls: false
|
|
||||||
disable_html_emails: false
|
|
||||||
|
|
||||||
tls:
|
|
||||||
## Server Name for certificate validation (in case you are using the IP or non-FQDN in the host option).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for either StartTLS or SMTPS.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
identity_providers:
|
|
||||||
oidc:
|
|
||||||
## Enables this in the config map. Currently in beta stage.
|
|
||||||
## See https://www.authelia.com/docs/configuration/identity-providers/oidc.html#roadmap
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
access_token_lifespan: 1h
|
|
||||||
authorize_code_lifespan: 1m
|
|
||||||
id_token_lifespan: 1h
|
|
||||||
refresh_token_lifespan: 90m
|
|
||||||
|
|
||||||
enable_client_debug_messages: false
|
|
||||||
|
|
||||||
## SECURITY NOTICE: It's not recommended changing this option, and highly discouraged to have it below 8 for
|
|
||||||
## security reasons.
|
|
||||||
minimum_parameter_entropy: 8
|
|
||||||
|
|
||||||
clients: []
|
|
||||||
# clients:
|
|
||||||
# -
|
|
||||||
## The ID is the OpenID Connect ClientID which is used to link an application to a configuration.
|
|
||||||
# id: myapp
|
|
||||||
|
|
||||||
## The description to show to users when they end up on the consent screen. Defaults to the ID above.
|
|
||||||
# description: My Application
|
|
||||||
|
|
||||||
## The client secret is a shared secret between Authelia and the consumer of this client.
|
|
||||||
# secret: apple123
|
|
||||||
|
|
||||||
## Sets the client to public. This should typically not be set, please see the documentation for usage.
|
|
||||||
# public: false
|
|
||||||
|
|
||||||
## The policy to require for this client; one_factor or two_factor.
|
|
||||||
# authorization_policy: two_factor
|
|
||||||
|
|
||||||
## Configures the consent mode; auto, explicit or implicit
|
|
||||||
# consent_mode: auto
|
|
||||||
|
|
||||||
## Audience this client is allowed to request.
|
|
||||||
# audience: []
|
|
||||||
|
|
||||||
## Scopes this client is allowed to request.
|
|
||||||
# scopes:
|
|
||||||
# - openid
|
|
||||||
# - profile
|
|
||||||
# - email
|
|
||||||
# - groups
|
|
||||||
|
|
||||||
## Redirect URI's specifies a list of valid case-sensitive callbacks for this client.
|
|
||||||
# redirect_uris:
|
|
||||||
# - https://oidc.example.com/oauth2/callback
|
|
||||||
|
|
||||||
## Grant Types configures which grants this client can obtain.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# grant_types:
|
|
||||||
# - refresh_token
|
|
||||||
# - authorization_code
|
|
||||||
|
|
||||||
## Response Types configures which responses this client can be sent.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# response_types:
|
|
||||||
# - code
|
|
||||||
|
|
||||||
## Response Modes configures which response modes this client supports.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# response_modes:
|
|
||||||
# - form_post
|
|
||||||
# - query
|
|
||||||
# - fragment
|
|
||||||
|
|
||||||
## The algorithm used to sign userinfo endpoint responses for this client, either none or RS256.
|
|
||||||
# userinfo_signing_algorithm: none
|
|
||||||
|
|
||||||
portal:
|
|
||||||
open:
|
|
||||||
enabled: true
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1 +0,0 @@
|
||||||
{{- include "tc.v1.common.lib.chart.notes" $ -}}
|
|
|
@ -1,254 +0,0 @@
|
||||||
{{/* Define the configmap */}}
|
|
||||||
{{- define "authelia.configmap.paths" -}}
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
AUTHELIA_SERVER_DISABLE_HEALTHCHECK: "true"
|
|
||||||
AUTHELIA_JWT_SECRET_FILE: "/secrets/JWT_TOKEN"
|
|
||||||
AUTHELIA_SESSION_SECRET_FILE: "/secrets/SESSION_ENCRYPTION_KEY"
|
|
||||||
AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE: "/secrets/ENCRYPTION_KEY"
|
|
||||||
AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE: "/secrets/STORAGE_PASSWORD"
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE: "/secrets/LDAP_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.notifier.smtp.enabled }}
|
|
||||||
AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE: "/secrets/SMTP_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
AUTHELIA_SESSION_REDIS_PASSWORD_FILE: "/secrets/REDIS_PASSWORD"
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled }}
|
|
||||||
AUTHELIA_SESSION_REDIS_HIGH_AVAILABILITY_SENTINEL_PASSWORD_FILE: "/secrets/REDIS_SENTINEL_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
AUTHELIA_DUO_API_SECRET_KEY_FILE: "/secrets/DUO_API_KEY"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
AUTHELIA_IDENTITY_PROVIDERS_OIDC_HMAC_SECRET_FILE: "/secrets/OIDC_HMAC_SECRET"
|
|
||||||
AUTHELIA_IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY_FILE: "/secrets/OIDC_PRIVATE_KEY"
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- define "authelia.configmap.configfile" -}}
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
configuration.yaml: |
|
|
||||||
---
|
|
||||||
theme: {{ default "light" .Values.theme }}
|
|
||||||
default_redirection_url: {{ default (printf "https://www.%s" .Values.domain) .Values.default_redirection_url }}
|
|
||||||
ntp:
|
|
||||||
address: {{ default "time.cloudflare.com:123" .Values.ntp.address }}
|
|
||||||
version: {{ default 4 .Values.ntp.version }}
|
|
||||||
max_desync: {{ default "3s" .Values.ntp.max_desync }}
|
|
||||||
disable_startup_check: {{ default false .Values.ntp.disable_startup_check }}
|
|
||||||
disable_failure: {{ default true .Values.ntp.disable_failure }}
|
|
||||||
server:
|
|
||||||
host: 0.0.0.0
|
|
||||||
port: {{ default 9091 .Values.server.port }}
|
|
||||||
{{- if not (eq "" (default "" .Values.server.path)) }}
|
|
||||||
path: {{ .Values.server.path }}
|
|
||||||
{{- end }}
|
|
||||||
buffers:
|
|
||||||
write: {{ default 4096 .Values.server.write_buffer_size }}
|
|
||||||
read: {{ default 4096 .Values.server.read_buffer_size }}
|
|
||||||
enable_pprof: {{ default false .Values.server.enable_pprof }}
|
|
||||||
enable_expvars: {{ default false .Values.server.enable_expvars }}
|
|
||||||
log:
|
|
||||||
level: {{ default "info" .Values.log.level }}
|
|
||||||
format: {{ default "text" .Values.log.format }}
|
|
||||||
{{- if not (eq "" (default "" .Values.log.file_path)) }}
|
|
||||||
file_path: {{ .Values.log.file_path }}
|
|
||||||
keep_stdout: true
|
|
||||||
{{- end }}
|
|
||||||
totp:
|
|
||||||
issuer: {{ default .Values.domain .Values.totp.issuer }}
|
|
||||||
period: {{ default 30 .Values.totp.period }}
|
|
||||||
skew: {{ default 1 .Values.totp.skew }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
duo_api:
|
|
||||||
hostname: {{ .Values.duo_api.hostname }}
|
|
||||||
integration_key: {{ .Values.duo_api.integration_key }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $auth := .Values.authentication_backend }}
|
|
||||||
authentication_backend:
|
|
||||||
password_reset:
|
|
||||||
disable: {{ $auth.disable_reset_password }}
|
|
||||||
{{- if $auth.file.enabled }}
|
|
||||||
file:
|
|
||||||
path: {{ $auth.file.path }}
|
|
||||||
password: {{ toYaml $auth.file.password | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.enabled }}
|
|
||||||
ldap:
|
|
||||||
implementation: {{ default "custom" $auth.ldap.implementation }}
|
|
||||||
url: {{ $auth.ldap.url }}
|
|
||||||
timeout: {{ default "5s" $auth.ldap.timeout }}
|
|
||||||
start_tls: {{ $auth.ldap.start_tls }}
|
|
||||||
tls:
|
|
||||||
{{- if hasKey $auth.ldap.tls "server_name" }}
|
|
||||||
server_name: {{ default $auth.ldap.host $auth.ldap.tls.server_name }}
|
|
||||||
{{- end }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $auth.ldap.tls.minimum_version }}
|
|
||||||
skip_verify: {{ default false $auth.ldap.tls.skip_verify }}
|
|
||||||
{{- if $auth.ldap.base_dn }}
|
|
||||||
base_dn: {{ $auth.ldap.base_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.username_attribute }}
|
|
||||||
username_attribute: {{ $auth.ldap.username_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.additional_users_dn }}
|
|
||||||
additional_users_dn: {{ $auth.ldap.additional_users_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.users_filter }}
|
|
||||||
users_filter: {{ $auth.ldap.users_filter }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.additional_groups_dn }}
|
|
||||||
additional_groups_dn: {{ $auth.ldap.additional_groups_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.groups_filter }}
|
|
||||||
groups_filter: {{ $auth.ldap.groups_filter }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.group_name_attribute }}
|
|
||||||
group_name_attribute: {{ $auth.ldap.group_name_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.mail_attribute }}
|
|
||||||
mail_attribute: {{ $auth.ldap.mail_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.display_name_attribute }}
|
|
||||||
display_name_attribute: {{ $auth.ldap.display_name_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
user: {{ $auth.ldap.user }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $session := .Values.session }}
|
|
||||||
session:
|
|
||||||
name: {{ default "authelia_session" $session.name }}
|
|
||||||
domain: {{ required "A valid .Values.domain entry required!" $.Values.domain }}
|
|
||||||
same_site: {{ default "lax" $session.same_site }}
|
|
||||||
expiration: {{ default "1M" $session.expiration }}
|
|
||||||
inactivity: {{ default "5m" $session.inactivity }}
|
|
||||||
remember_me_duration: {{ default "1M" $session.remember_me_duration }}
|
|
||||||
{{- end }}
|
|
||||||
redis:
|
|
||||||
host: {{ .Values.redis.creds.plain }}
|
|
||||||
{{- with $redis := .Values.redisProvider }}
|
|
||||||
port: {{ default 6379 $redis.port }}
|
|
||||||
{{- if not (eq $redis.username "") }}
|
|
||||||
username: {{ $redis.username }}
|
|
||||||
{{- end }}
|
|
||||||
maximum_active_connections: {{ default 8 $redis.maximum_active_connections }}
|
|
||||||
minimum_idle_connections: {{ default 0 $redis.minimum_idle_connections }}
|
|
||||||
{{- if $redis.tls.enabled }}
|
|
||||||
tls:
|
|
||||||
server_name: {{ $redis.tls.server_name }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $redis.tls.minimum_version }}
|
|
||||||
skip_verify: {{ $redis.tls.skip_verify }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $redis.high_availability.enabled }}
|
|
||||||
high_availability:
|
|
||||||
sentinel_name: {{ $redis.high_availability.sentinel_name }}
|
|
||||||
{{- if $redis.high_availability.nodes }}
|
|
||||||
nodes: {{ toYaml $redis.high_availability.nodes | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
route_by_latency: {{ $redis.high_availability.route_by_latency }}
|
|
||||||
route_randomly: {{ $redis.high_availability.route_randomly }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
regulation: {{ toYaml .Values.regulation | nindent 6 }}
|
|
||||||
storage:
|
|
||||||
postgres:
|
|
||||||
host: {{ $.Values.cnpg.main.creds.host }}
|
|
||||||
{{- with $storage := .Values.storage }}
|
|
||||||
port: {{ default 5432 $storage.postgres.port }}
|
|
||||||
database: {{ default "authelia" $storage.postgres.database }}
|
|
||||||
username: {{ default "authelia" $storage.postgres.username }}
|
|
||||||
timeout: {{ default "5s" $storage.postgres.timeout }}
|
|
||||||
ssl:
|
|
||||||
mode: {{ default "disable" $storage.postgres.sslmode }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $notifier := .Values.notifier }}
|
|
||||||
notifier:
|
|
||||||
disable_startup_check: {{ $.Values.notifier.disable_startup_check }}
|
|
||||||
{{- if $notifier.filesystem.enabled }}
|
|
||||||
filesystem:
|
|
||||||
filename: {{ $notifier.filesystem.filename }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $notifier.smtp.enabled }}
|
|
||||||
smtp:
|
|
||||||
host: {{ $notifier.smtp.host }}
|
|
||||||
port: {{ default 25 $notifier.smtp.port }}
|
|
||||||
timeout: {{ default "5s" $notifier.smtp.timeout }}
|
|
||||||
{{- with $notifier.smtp.username }}
|
|
||||||
username: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
sender: {{ $notifier.smtp.sender }}
|
|
||||||
identifier: {{ $notifier.smtp.identifier }}
|
|
||||||
subject: {{ $notifier.smtp.subject | quote }}
|
|
||||||
startup_check_address: {{ $notifier.smtp.startup_check_address }}
|
|
||||||
disable_require_tls: {{ $notifier.smtp.disable_require_tls }}
|
|
||||||
disable_html_emails: {{ $notifier.smtp.disable_html_emails }}
|
|
||||||
tls:
|
|
||||||
server_name: {{ default $notifier.smtp.host $notifier.smtp.tls.server_name }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $notifier.smtp.tls.minimum_version }}
|
|
||||||
skip_verify: {{ default false $notifier.smtp.tls.skip_verify }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
identity_providers:
|
|
||||||
oidc:
|
|
||||||
access_token_lifespan: {{ default "1h" .Values.identity_providers.oidc.access_token_lifespan }}
|
|
||||||
authorize_code_lifespan: {{ default "1m" .Values.identity_providers.oidc.authorize_code_lifespan }}
|
|
||||||
id_token_lifespan: {{ default "1h" .Values.identity_providers.oidc.id_token_lifespan }}
|
|
||||||
refresh_token_lifespan: {{ default "90m" .Values.identity_providers.oidc.refresh_token_lifespan }}
|
|
||||||
enable_client_debug_messages: {{ default false .Values.identity_providers.oidc.enable_client_debug_messages }}
|
|
||||||
minimum_parameter_entropy: {{ default 8 .Values.identity_providers.oidc.minimum_parameter_entropy }}
|
|
||||||
{{- if gt (len .Values.identity_providers.oidc.clients) 0 }}
|
|
||||||
clients:
|
|
||||||
{{- range $client := .Values.identity_providers.oidc.clients }}
|
|
||||||
- id: {{ $client.id }}
|
|
||||||
description: {{ default $client.id $client.description }}
|
|
||||||
secret: {{ default (randAlphaNum 128) $client.secret }}
|
|
||||||
{{- if $client.public }}
|
|
||||||
public: {{ $client.public }}
|
|
||||||
{{- end }}
|
|
||||||
authorization_policy: {{ default "two_factor" $client.authorization_policy }}
|
|
||||||
consent_mode: {{ default "auto" $client.consent_mode}}
|
|
||||||
redirect_uris:
|
|
||||||
{{- range $client.redirect_uris }}
|
|
||||||
- {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $client.audience }}
|
|
||||||
audience: {{ toYaml $client.audience | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
scopes: {{ toYaml (default (list "openid" "profile" "email" "groups") $client.scopes) | nindent 10 }}
|
|
||||||
grant_types: {{ toYaml (default (list "refresh_token" "authorization_code") $client.grant_types) | nindent 10 }}
|
|
||||||
response_types: {{ toYaml (default (list "code") $client.response_types) | nindent 10 }}
|
|
||||||
{{- if $client.response_modes }}
|
|
||||||
response_modes: {{ toYaml $client.response_modes | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
userinfo_signing_algorithm: {{ default "none" $client.userinfo_signing_algorithm }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
access_control:
|
|
||||||
{{- if (eq (len .Values.access_control.rules) 0) }}
|
|
||||||
{{- if (eq .Values.access_control.default_policy "bypass") }}
|
|
||||||
default_policy: one_factor
|
|
||||||
{{- else if (eq .Values.access_control.default_policy "deny") }}
|
|
||||||
default_policy: two_factor
|
|
||||||
{{- else }}
|
|
||||||
default_policy: {{ .Values.access_control.default_policy }}
|
|
||||||
{{- end }}
|
|
||||||
{{- else }}
|
|
||||||
default_policy: {{ .Values.access_control.default_policy }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if (eq (len .Values.access_control.networks) 0) }}
|
|
||||||
networks: []
|
|
||||||
{{- else }}
|
|
||||||
networks: {{ toYaml .Values.access_control.networks | nindent 6 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if (eq (len .Values.access_control.rules) 0) }}
|
|
||||||
rules: []
|
|
||||||
{{- else }}
|
|
||||||
rules: {{ toYaml .Values.access_control.rules | nindent 6 }}
|
|
||||||
{{- end }}
|
|
||||||
...
|
|
||||||
{{- end -}}
|
|
|
@ -1,53 +0,0 @@
|
||||||
{{/* Define the secrets */}}
|
|
||||||
{{- define "authelia.secrets" -}}
|
|
||||||
{{- $basename := include "tc.v1.common.lib.chart.names.fullname" $ -}}
|
|
||||||
{{- $fetchname := printf "%s-authelia-secrets" $basename -}}
|
|
||||||
|
|
||||||
{{/* Initialize all keys */}}
|
|
||||||
{{- $oidckey := genPrivateKey "rsa" }}
|
|
||||||
{{- $oidcsecret := randAlphaNum 32 }}
|
|
||||||
{{- $jwtsecret := randAlphaNum 50 }}
|
|
||||||
{{- $sessionsecret := randAlphaNum 50 }}
|
|
||||||
{{- $encryptionkey := randAlphaNum 100 }}
|
|
||||||
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
{{ with (lookup "v1" "Secret" .Release.Namespace $fetchname) }}
|
|
||||||
{{/* Get previous values and decode */}}
|
|
||||||
{{ $sessionsecret = (index .data "SESSION_ENCRYPTION_KEY") | b64dec }}
|
|
||||||
{{ $jwtsecret = (index .data "JWT_TOKEN") | b64dec }}
|
|
||||||
{{ $encryptionkey = (index .data "ENCRYPTION_KEY") | b64dec }}
|
|
||||||
|
|
||||||
{{/* Check if those keys ever existed. as OIDC is optional */}}
|
|
||||||
{{ if and (hasKey .data "OIDC_PRIVATE_KEY") (hasKey .data "OIDC_HMAC_SECRET") }}
|
|
||||||
{{ $oidckey = (index .data "OIDC_PRIVATE_KEY") | b64dec }}
|
|
||||||
{{ $oidcsecret = (index .data "OIDC_HMAC_SECRET") | b64dec }}
|
|
||||||
{{ end }}
|
|
||||||
{{ end }}
|
|
||||||
SESSION_ENCRYPTION_KEY: {{ $sessionsecret }}
|
|
||||||
JWT_TOKEN: {{ $jwtsecret }}
|
|
||||||
ENCRYPTION_KEY: {{ $encryptionkey }}
|
|
||||||
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
LDAP_PASSWORD: {{ .Values.authentication_backend.ldap.plain_password }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- if and .Values.notifier.smtp.enabled .Values.notifier.smtp.plain_password }}
|
|
||||||
SMTP_PASSWORD: {{ .Values.notifier.smtp.plain_password }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
DUO_API_KEY: {{ .Values.duo_api.plain_api_key }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
STORAGE_PASSWORD: {{ $.Values.cnpg.main.creds.password | trimAll "\"" }}
|
|
||||||
|
|
||||||
REDIS_PASSWORD: {{ .Values.redis.creds.redisPassword | trimAll "\"" }}
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled }}
|
|
||||||
REDIS_SENTINEL_PASSWORD: {{ .Values.redis.sentinelPassword | trimAll "\"" }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
OIDC_PRIVATE_KEY: |
|
|
||||||
{{- $oidckey | nindent 4 }}
|
|
||||||
OIDC_HMAC_SECRET: {{ $oidcsecret }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,77 +0,0 @@
|
||||||
{{/* Make sure all variables are set properly */}}
|
|
||||||
{{- include "tc.v1.common.loader.init" . }}
|
|
||||||
|
|
||||||
{{/* Render configmap for authelia */}}
|
|
||||||
{{- $configmapPaths := include "authelia.configmap.paths" . | fromYaml -}}
|
|
||||||
{{- if $configmapPaths -}}
|
|
||||||
{{- $_ := set .Values.configmap "authelia-paths" $configmapPaths -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- $configmapFile := include "authelia.configmap.configfile" . | fromYaml -}}
|
|
||||||
{{- if $configmapFile -}}
|
|
||||||
{{- $_ := set .Values.configmap "authelia-configfile" $configmapFile -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Render secrets for authelia */}}
|
|
||||||
{{- $secret := include "authelia.secrets" . | fromYaml -}}
|
|
||||||
{{- if $secret -}}
|
|
||||||
{{- $_ := set .Values.secret "authelia-secrets" $secret -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Append the general configMap volume to the volumes */}}
|
|
||||||
{{- define "authelia.configmapVolume" -}}
|
|
||||||
enabled: true
|
|
||||||
mountPath: /configuration.yaml
|
|
||||||
subPath: configuration.yaml
|
|
||||||
readOnly: true
|
|
||||||
type: "configmap"
|
|
||||||
objectName: authelia-configfile
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Append the general secret volumes to the volumes */}}
|
|
||||||
{{- define "authelia.secretVolumes" -}}
|
|
||||||
enabled: true
|
|
||||||
mountPath: "/secrets"
|
|
||||||
readOnly: true
|
|
||||||
type: "secret"
|
|
||||||
objectName: authelia-secrets
|
|
||||||
items:
|
|
||||||
- key: "JWT_TOKEN"
|
|
||||||
path: JWT_TOKEN
|
|
||||||
- key: "SESSION_ENCRYPTION_KEY"
|
|
||||||
path: SESSION_ENCRYPTION_KEY
|
|
||||||
- key: "ENCRYPTION_KEY"
|
|
||||||
path: ENCRYPTION_KEY
|
|
||||||
- key: "STORAGE_PASSWORD"
|
|
||||||
path: STORAGE_PASSWORD
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
- key: "LDAP_PASSWORD"
|
|
||||||
path: LDAP_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
{{- if and .Values.notifier.smtp.enabled .Values.notifier.smtp.plain_password }}
|
|
||||||
- key: "SMTP_PASSWORD"
|
|
||||||
path: SMTP_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
- key: "REDIS_PASSWORD"
|
|
||||||
path: REDIS_PASSWORD
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled}}
|
|
||||||
- key: "REDIS_SENTINEL_PASSWORD"
|
|
||||||
path: REDIS_SENTINEL_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
- key: "DUO_API_KEY"
|
|
||||||
path: DUO_API_KEY
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
- key: "OIDC_PRIVATE_KEY"
|
|
||||||
path: OIDC_PRIVATE_KEY
|
|
||||||
- key: "OIDC_HMAC_SECRET"
|
|
||||||
path: OIDC_HMAC_SECRET
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- $_ := set .Values.persistence "authelia-configfile" (include "authelia.configmapVolume" . | fromYaml) -}}
|
|
||||||
{{- $_ := set .Values.persistence "authelia-secrets" (include "authelia.secretVolumes" . | fromYaml) -}}
|
|
||||||
|
|
||||||
{{/* Render the templates */}}
|
|
||||||
{{ include "tc.v1.common.loader.apply" . }}
|
|
|
@ -1,99 +0,0 @@
|
||||||
**Important:**
|
|
||||||
*for the complete changelog, please refer to the website*
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.4](https://github.com/truecharts/charts/compare/authelia-15.1.3...authelia-15.1.4) (2023-04-13)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7966](https://github.com/truecharts/charts/issues/7966))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.3](https://github.com/truecharts/charts/compare/authelia-15.1.2...authelia-15.1.3) (2023-04-11)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7929](https://github.com/truecharts/charts/issues/7929))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.2](https://github.com/truecharts/charts/compare/authelia-15.1.1...authelia-15.1.2) (2023-04-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7907](https://github.com/truecharts/charts/issues/7907))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.1](https://github.com/truecharts/charts/compare/authelia-15.1.0...authelia-15.1.1) (2023-04-05)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common to 32 on enterprise charts
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.0](https://github.com/truecharts/charts/compare/authelia-15.0.13...authelia-15.1.0) (2023-03-22)
|
|
||||||
|
|
||||||
### Feat
|
|
||||||
|
|
||||||
- allow for NTP failure by default ([#7824](https://github.com/truecharts/charts/issues/7824))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.13](https://github.com/truecharts/charts/compare/authelia-15.0.12...authelia-15.0.13) (2023-03-19)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common and deps on enterprise train ([#7819](https://github.com/truecharts/charts/issues/7819))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.12](https://github.com/truecharts/charts/compare/authelia-15.0.11...authelia-15.0.12) (2023-03-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump dependencies and release 2 replica default
|
|
||||||
|
|
||||||
### Feat
|
|
||||||
|
|
||||||
- replicas2 part 2
|
|
||||||
- run 2 replica's with rolling updates
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.11](https://github.com/truecharts/charts/compare/authelia-15.0.10...authelia-15.0.11) (2023-03-08)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.10](https://github.com/truecharts/charts/compare/authelia-15.0.9...authelia-15.0.10) (2023-03-08)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- indent priv key ([#7770](https://github.com/truecharts/charts/issues/7770))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.9](https://github.com/truecharts/charts/compare/authelia-15.0.8...authelia-15.0.9) (2023-03-08)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- cleanup secret a bit ([#7768](https://github.com/truecharts/charts/issues/7768))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.0.8](https://github.com/truecharts/charts/compare/authelia-15.0.7...authelia-15.0.8) (2023-03-07)
|
|
||||||
|
|
|
@ -1,43 +0,0 @@
|
||||||
apiVersion: v2
|
|
||||||
appVersion: "4.37.5"
|
|
||||||
dependencies:
|
|
||||||
- name: common
|
|
||||||
repository: https://library-charts.truecharts.org
|
|
||||||
version: 12.4.6
|
|
||||||
- condition: redis.enabled
|
|
||||||
name: redis
|
|
||||||
repository: https://deps.truecharts.org
|
|
||||||
version: 6.0.21
|
|
||||||
deprecated: false
|
|
||||||
description: Authelia is a Single Sign-On Multi-Factor portal for web apps
|
|
||||||
home: https://truecharts.org/charts/enterprise/authelia
|
|
||||||
icon: https://truecharts.org/img/hotlink-ok/chart-icons/authelia.png
|
|
||||||
keywords:
|
|
||||||
- authelia
|
|
||||||
- authentication
|
|
||||||
- login
|
|
||||||
- SSO
|
|
||||||
- Authentication
|
|
||||||
- Security
|
|
||||||
- Two-Factor
|
|
||||||
- U2F
|
|
||||||
- YubiKey
|
|
||||||
- Push Notifications
|
|
||||||
- LDAP
|
|
||||||
kubeVersion: ">=1.16.0-0"
|
|
||||||
maintainers:
|
|
||||||
- email: info@truecharts.org
|
|
||||||
name: TrueCharts
|
|
||||||
url: https://truecharts.org
|
|
||||||
name: authelia
|
|
||||||
sources:
|
|
||||||
- https://github.com/truecharts/charts/tree/master/charts/enterprise/authelia
|
|
||||||
- https://github.com/authelia/chartrepo
|
|
||||||
- https://github.com/authelia/authelia
|
|
||||||
type: application
|
|
||||||
version: 15.1.4
|
|
||||||
annotations:
|
|
||||||
truecharts.org/catagories: |
|
|
||||||
- security
|
|
||||||
truecharts.org/SCALE-support: "true"
|
|
||||||
truecharts.org/grade: U
|
|
|
@ -1,106 +0,0 @@
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Parameters
|
|
||||||
|
|
||||||
Licensor: The TrueCharts Project, it's owner and it's contributors
|
|
||||||
Licensed Work: The TrueCharts "Cert-Manager" Helm Chart
|
|
||||||
Additional Use Grant: You may use the licensed work in production, as long
|
|
||||||
as it is directly sourced from a TrueCharts provided
|
|
||||||
official repository, catalog or source. You may also make private
|
|
||||||
modification to the directly sourced licenced work,
|
|
||||||
when used in production.
|
|
||||||
|
|
||||||
The following cases are, due to their nature, also
|
|
||||||
defined as 'production use' and explicitly prohibited:
|
|
||||||
- Bundling, including or displaying the licensed work
|
|
||||||
with(in) another work intended for production use,
|
|
||||||
with the apparent intend of facilitating and/or
|
|
||||||
promoting production use by third parties in
|
|
||||||
violation of this license.
|
|
||||||
|
|
||||||
Change Date: 2050-01-01
|
|
||||||
|
|
||||||
Change License: 3-clause BSD license
|
|
||||||
|
|
||||||
For information about alternative licensing arrangements for the Software,
|
|
||||||
please contact: legal@truecharts.org
|
|
||||||
|
|
||||||
Notice
|
|
||||||
|
|
||||||
The Business Source License (this document, or the “License”) is not an Open
|
|
||||||
Source license. However, the Licensed Work will eventually be made available
|
|
||||||
under an Open Source License, as stated in this License.
|
|
||||||
|
|
||||||
License text copyright (c) 2017 MariaDB Corporation Ab, All Rights Reserved.
|
|
||||||
“Business Source License” is a trademark of MariaDB Corporation Ab.
|
|
||||||
|
|
||||||
-----------------------------------------------------------------------------
|
|
||||||
|
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Terms
|
|
||||||
|
|
||||||
The Licensor hereby grants you the right to copy, modify, create derivative
|
|
||||||
works, redistribute, and make non-production use of the Licensed Work. The
|
|
||||||
Licensor may make an Additional Use Grant, above, permitting limited
|
|
||||||
production use.
|
|
||||||
|
|
||||||
Effective on the Change Date, or the fourth anniversary of the first publicly
|
|
||||||
available distribution of a specific version of the Licensed Work under this
|
|
||||||
License, whichever comes first, the Licensor hereby grants you rights under
|
|
||||||
the terms of the Change License, and the rights granted in the paragraph
|
|
||||||
above terminate.
|
|
||||||
|
|
||||||
If your use of the Licensed Work does not comply with the requirements
|
|
||||||
currently in effect as described in this License, you must purchase a
|
|
||||||
commercial license from the Licensor, its affiliated entities, or authorized
|
|
||||||
resellers, or you must refrain from using the Licensed Work.
|
|
||||||
|
|
||||||
All copies of the original and modified Licensed Work, and derivative works
|
|
||||||
of the Licensed Work, are subject to this License. This License applies
|
|
||||||
separately for each version of the Licensed Work and the Change Date may vary
|
|
||||||
for each version of the Licensed Work released by Licensor.
|
|
||||||
|
|
||||||
You must conspicuously display this License on each original or modified copy
|
|
||||||
of the Licensed Work. If you receive the Licensed Work in original or
|
|
||||||
modified form from a third party, the terms and conditions set forth in this
|
|
||||||
License apply to your use of that work.
|
|
||||||
|
|
||||||
Any use of the Licensed Work in violation of this License will automatically
|
|
||||||
terminate your rights under this License for the current and all other
|
|
||||||
versions of the Licensed Work.
|
|
||||||
|
|
||||||
This License does not grant you any right in any trademark or logo of
|
|
||||||
Licensor or its affiliates (provided that you may use a trademark or logo of
|
|
||||||
Licensor as expressly required by this License).
|
|
||||||
|
|
||||||
TO THE EXTENT PERMITTED BY APPLICABLE LAW, THE LICENSED WORK IS PROVIDED ON
|
|
||||||
AN “AS IS” BASIS. LICENSOR HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS,
|
|
||||||
EXPRESS OR IMPLIED, INCLUDING (WITHOUT LIMITATION) WARRANTIES OF
|
|
||||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND
|
|
||||||
TITLE.
|
|
||||||
|
|
||||||
MariaDB hereby grants you permission to use this License’s text to license
|
|
||||||
your works, and to refer to it using the trademark “Business Source License”,
|
|
||||||
as long as you comply with the Covenants of Licensor below.
|
|
||||||
|
|
||||||
Covenants of Licensor
|
|
||||||
|
|
||||||
In consideration of the right to use this License’s text and the “Business
|
|
||||||
Source License” name and trademark, Licensor covenants to MariaDB, and to all
|
|
||||||
other recipients of the licensed work to be provided by Licensor:
|
|
||||||
|
|
||||||
1. To specify as the Change License the GPL Version 2.0 or any later version,
|
|
||||||
or a license that is compatible with GPL Version 2.0 or a later version,
|
|
||||||
where “compatible” means that software provided under the Change License can
|
|
||||||
be included in a program with software provided under GPL Version 2.0 or a
|
|
||||||
later version. Licensor may specify additional Change Licenses without
|
|
||||||
limitation.
|
|
||||||
|
|
||||||
2. To either: (a) specify an additional grant of rights to use that does not
|
|
||||||
impose any additional restriction on the right granted in this License, as
|
|
||||||
the Additional Use Grant; or (b) insert the text “None”.
|
|
||||||
|
|
||||||
3. To specify a Change Date.
|
|
||||||
|
|
||||||
4. Not to modify this License in any other way.
|
|
|
@ -1,27 +0,0 @@
|
||||||
# README
|
|
||||||
|
|
||||||
## General Info
|
|
||||||
|
|
||||||
TrueCharts can be installed as both *normal* Helm Charts or as Apps on TrueNAS SCALE.
|
|
||||||
However only installations using the TrueNAS SCALE Apps system are supported.
|
|
||||||
|
|
||||||
For more information about this App, please check the docs on the TrueCharts [website](https://truecharts.org/charts/enterprise/)
|
|
||||||
|
|
||||||
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/charts/issues/new/choose)**
|
|
||||||
|
|
||||||
|
|
||||||
## Support
|
|
||||||
|
|
||||||
- Please check our [quick-start guides for TrueNAS SCALE](https://truecharts.org/manual/SCALE%20Apps/Important-MUST-READ).
|
|
||||||
- See the [Website](https://truecharts.org)
|
|
||||||
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
|
|
||||||
- Open a [issue](https://github.com/truecharts/charts/issues/new/choose)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
## Sponsor TrueCharts
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
||||||
|
|
||||||
*All Rights Reserved - The TrueCharts Project*
|
|
|
@ -1,9 +0,0 @@
|
||||||
|
|
||||||
|
|
||||||
## [authelia-15.1.4](https://github.com/truecharts/charts/compare/authelia-15.1.3...authelia-15.1.4) (2023-04-13)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7966](https://github.com/truecharts/charts/issues/7966))
|
|
||||||
|
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
Authelia is a Single Sign-On Multi-Factor portal for web apps
|
|
||||||
|
|
||||||
This App is supplied by TrueCharts, for more information visit the manual: [https://truecharts.org/charts/enterprise/authelia](https://truecharts.org/charts/enterprise/authelia)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
Binary file not shown.
Binary file not shown.
|
@ -1,630 +0,0 @@
|
||||||
image:
|
|
||||||
repository: tccr.io/truecharts/authelia
|
|
||||||
pullPolicy: IfNotPresent
|
|
||||||
tag: 4.37.5@sha256:76a4617539534cec140fd98a12f721b878524f2df3a3653f3df8ff2b7eaab586
|
|
||||||
|
|
||||||
workload:
|
|
||||||
main:
|
|
||||||
replicas: 2
|
|
||||||
strategy: RollingUpdate
|
|
||||||
podSpec:
|
|
||||||
containers:
|
|
||||||
main:
|
|
||||||
command: ["authelia"]
|
|
||||||
args: ["--config=/configuration.yaml"]
|
|
||||||
envFrom:
|
|
||||||
- configMapRef:
|
|
||||||
name: authelia-paths
|
|
||||||
probes:
|
|
||||||
liveness:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
readiness:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
startup:
|
|
||||||
type: http
|
|
||||||
path: "/api/health"
|
|
||||||
|
|
||||||
service:
|
|
||||||
main:
|
|
||||||
ports:
|
|
||||||
main:
|
|
||||||
port: 9091
|
|
||||||
targetPort: 9091
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
config:
|
|
||||||
enabled: true
|
|
||||||
mountPath: "/config"
|
|
||||||
|
|
||||||
cnpg:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
user: authelia
|
|
||||||
database: authelia
|
|
||||||
|
|
||||||
# Enabled redis
|
|
||||||
# ... for more options see https://github.com/tccr.io/truecharts/charts/tree/master/tccr.io/truecharts/redis
|
|
||||||
redis:
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
domain: example.com
|
|
||||||
|
|
||||||
##
|
|
||||||
## Server Configuration
|
|
||||||
##
|
|
||||||
server:
|
|
||||||
##
|
|
||||||
## Port sets the configured port for the daemon, service, and the probes.
|
|
||||||
## Default is 9091 and should not need to be changed.
|
|
||||||
##
|
|
||||||
port: 9091
|
|
||||||
|
|
||||||
## Buffers usually should be configured to be the same value.
|
|
||||||
## Explanation at https://www.authelia.com/docs/configuration/server.html
|
|
||||||
## Read buffer size adjusts the server's max incoming request size in bytes.
|
|
||||||
## Write buffer size does the same for outgoing responses.
|
|
||||||
read_buffer_size: 4096
|
|
||||||
write_buffer_size: 4096
|
|
||||||
## Set the single level path Authelia listens on.
|
|
||||||
## Must be alphanumeric chars and should not contain any slashes.
|
|
||||||
path: ""
|
|
||||||
|
|
||||||
log:
|
|
||||||
## Level of verbosity for logs: info, debug, trace.
|
|
||||||
level: trace
|
|
||||||
|
|
||||||
## Format the logs are written as: json, text.
|
|
||||||
format: text
|
|
||||||
|
|
||||||
## TODO: Statefulness check should check if this is set, and the configMap should enable it.
|
|
||||||
## File path where the logs will be written. If not set logs are written to stdout.
|
|
||||||
# file_path: /config/authelia.log
|
|
||||||
|
|
||||||
## Default redirection URL
|
|
||||||
##
|
|
||||||
## If user tries to authenticate without any referer, Authelia does not know where to redirect the user to at the end
|
|
||||||
## of the authentication process. This parameter allows you to specify the default redirection URL Authelia will use
|
|
||||||
## in such a case.
|
|
||||||
##
|
|
||||||
## Note: this parameter is optional. If not provided, user won't be redirected upon successful authentication.
|
|
||||||
## Default is https://www.<domain> (value at the top of the values.yaml).
|
|
||||||
default_redirection_url: ""
|
|
||||||
# default_redirection_url: https://example.com
|
|
||||||
|
|
||||||
theme: light
|
|
||||||
|
|
||||||
##
|
|
||||||
## TOTP Configuration
|
|
||||||
##
|
|
||||||
## Parameters used for TOTP generation
|
|
||||||
totp:
|
|
||||||
## The issuer name displayed in the Authenticator application of your choice
|
|
||||||
## See: https://github.com/google/google-authenticator/wiki/Key-Uri-Format for more info on issuer names
|
|
||||||
## Defaults to <domain>.
|
|
||||||
issuer: ""
|
|
||||||
## The period in seconds a one-time password is current for. Changing this will require all users to register
|
|
||||||
## their TOTP applications again. Warning: before changing period read the docs link below.
|
|
||||||
period: 30
|
|
||||||
## The skew controls number of one-time passwords either side of the current one that are valid.
|
|
||||||
## Warning: before changing skew read the docs link below.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/one-time-password.html#period-and-skew to read the documentation.
|
|
||||||
skew: 1
|
|
||||||
|
|
||||||
##
|
|
||||||
## Duo Push API Configuration
|
|
||||||
##
|
|
||||||
## Parameters used to contact the Duo API. Those are generated when you protect an application of type
|
|
||||||
## "Partner Auth API" in the management panel.
|
|
||||||
duo_api:
|
|
||||||
enabled: false
|
|
||||||
hostname: api-123456789.example.com
|
|
||||||
integration_key: ABCDEF
|
|
||||||
plain_api_key: ""
|
|
||||||
|
|
||||||
## NTP settings
|
|
||||||
|
|
||||||
ntp:
|
|
||||||
address: "time.cloudflare.com:123"
|
|
||||||
version: 4
|
|
||||||
max_desync: 3s
|
|
||||||
disable_startup_check: false
|
|
||||||
disable_failure: true
|
|
||||||
|
|
||||||
##
|
|
||||||
## Authentication Backend Provider Configuration
|
|
||||||
##
|
|
||||||
## Used for verifying user passwords and retrieve information such as email address and groups users belong to.
|
|
||||||
##
|
|
||||||
## The available providers are: `file`, `ldap`. You must use one and only one of these providers.
|
|
||||||
authentication_backend:
|
|
||||||
## Disable both the HTML element and the API for reset password functionality
|
|
||||||
disable_reset_password: false
|
|
||||||
|
|
||||||
## The amount of time to wait before we refresh data from the authentication backend. Uses duration notation.
|
|
||||||
## To disable this feature set it to 'disable', this will slightly reduce security because for Authelia, users will
|
|
||||||
## always belong to groups they belonged to at the time of login even if they have been removed from them in LDAP.
|
|
||||||
## To force update on every request you can set this to '0' or 'always', this will increase processor demand.
|
|
||||||
## See the below documentation for more information.
|
|
||||||
## Duration Notation docs: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
## Refresh Interval docs: https://www.authelia.com/docs/configuration/authentication/ldap.html#refresh-interval
|
|
||||||
refresh_interval: 5m
|
|
||||||
|
|
||||||
## LDAP backend configuration.
|
|
||||||
##
|
|
||||||
## This backend allows Authelia to be scaled to more
|
|
||||||
## than one instance and therefore is recommended for
|
|
||||||
## production.
|
|
||||||
ldap:
|
|
||||||
## Enable LDAP Backend.
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
## The LDAP implementation, this affects elements like the attribute utilised for resetting a password.
|
|
||||||
## Acceptable options are as follows:
|
|
||||||
## - 'activedirectory' - For Microsoft Active Directory.
|
|
||||||
## - 'custom' - For custom specifications of attributes and filters.
|
|
||||||
## This currently defaults to 'custom' to maintain existing behaviour.
|
|
||||||
##
|
|
||||||
## Depending on the option here certain other values in this section have a default value, notably all of the
|
|
||||||
## attribute mappings have a default value that this config overrides, you can read more about these default values
|
|
||||||
## at https://www.authelia.com/docs/configuration/authentication/ldap.html#defaults
|
|
||||||
implementation: activedirectory
|
|
||||||
|
|
||||||
## The url to the ldap server. Format: <scheme>://<address>[:<port>].
|
|
||||||
## Scheme can be ldap or ldaps in the format (port optional).
|
|
||||||
url: ldap://openldap.default.svc.cluster.local
|
|
||||||
|
|
||||||
## Connection Timeout.
|
|
||||||
timeout: 5s
|
|
||||||
|
|
||||||
## Use StartTLS with the LDAP connection.
|
|
||||||
start_tls: false
|
|
||||||
|
|
||||||
tls:
|
|
||||||
## Server Name for certificate validation (in case it's not set correctly in the URL).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for either Secure LDAP or LDAP StartTLS.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
## The base dn for every LDAP query.
|
|
||||||
base_dn: DC=example,DC=com
|
|
||||||
|
|
||||||
## The attribute holding the username of the user. This attribute is used to populate the username in the session
|
|
||||||
## information. It was introduced due to #561 to handle case insensitive search queries. For you information,
|
|
||||||
## Microsoft Active Directory usually uses 'sAMAccountName' and OpenLDAP usually uses 'uid'. Beware that this
|
|
||||||
## attribute holds the unique identifiers for the users binding the user and the configuration stored in database.
|
|
||||||
## Therefore only single value attributes are allowed and the value must never be changed once attributed to a user
|
|
||||||
## otherwise it would break the configuration for that user. Technically, non-unique attributes like 'mail' can also
|
|
||||||
## be used but we don't recommend using them, we instead advise to use the attributes mentioned above
|
|
||||||
## (sAMAccountName and uid) to follow https://www.ietf.org/rfc/rfc2307.txt.
|
|
||||||
username_attribute: ""
|
|
||||||
|
|
||||||
## An additional dn to define the scope to all users.
|
|
||||||
additional_users_dn: OU=Users
|
|
||||||
|
|
||||||
## The users filter used in search queries to find the user profile based on input filled in login form.
|
|
||||||
## Various placeholders are available in the user filter:
|
|
||||||
## - {input} is a placeholder replaced by what the user inputs in the login form.
|
|
||||||
## - {username_attribute} is a mandatory placeholder replaced by what is configured in `username_attribute`.
|
|
||||||
## - {mail_attribute} is a placeholder replaced by what is configured in `mail_attribute`.
|
|
||||||
## - DON'T USE - {0} is an alias for {input} supported for backward compatibility but it will be deprecated in later
|
|
||||||
## versions, so please don't use it.
|
|
||||||
##
|
|
||||||
## Recommended settings are as follows:
|
|
||||||
## - Microsoft Active Directory: (&({username_attribute}={input})(objectCategory=person)(objectClass=user))
|
|
||||||
## - OpenLDAP:
|
|
||||||
## - (&({username_attribute}={input})(objectClass=person))
|
|
||||||
## - (&({username_attribute}={input})(objectClass=inetOrgPerson))
|
|
||||||
##
|
|
||||||
## To allow sign in both with username and email, one can use a filter like
|
|
||||||
## (&(|({username_attribute}={input})({mail_attribute}={input}))(objectClass=person))
|
|
||||||
users_filter: ""
|
|
||||||
|
|
||||||
## An additional dn to define the scope of groups.
|
|
||||||
additional_groups_dn: OU=Groups
|
|
||||||
|
|
||||||
## The groups filter used in search queries to find the groups of the user.
|
|
||||||
## - {input} is a placeholder replaced by what the user inputs in the login form.
|
|
||||||
## - {username} is a placeholder replace by the username stored in LDAP (based on `username_attribute`).
|
|
||||||
## - {dn} is a matcher replaced by the user distinguished name, aka, user DN.
|
|
||||||
## - {username_attribute} is a placeholder replaced by what is configured in `username_attribute`.
|
|
||||||
## - {mail_attribute} is a placeholder replaced by what is configured in `mail_attribute`.
|
|
||||||
## - DON'T USE - {0} is an alias for {input} supported for backward compatibility but it will be deprecated in later
|
|
||||||
## versions, so please don't use it.
|
|
||||||
## - DON'T USE - {1} is an alias for {username} supported for backward compatibility but it will be deprecated in
|
|
||||||
## later version, so please don't use it.
|
|
||||||
##
|
|
||||||
## If your groups use the `groupOfUniqueNames` structure use this instead:
|
|
||||||
## (&(uniquemember={dn})(objectclass=groupOfUniqueNames))
|
|
||||||
groups_filter: ""
|
|
||||||
|
|
||||||
## The attribute holding the name of the group
|
|
||||||
group_name_attribute: ""
|
|
||||||
|
|
||||||
## The attribute holding the mail address of the user. If multiple email addresses are defined for a user, only the
|
|
||||||
## first one returned by the LDAP server is used.
|
|
||||||
mail_attribute: ""
|
|
||||||
|
|
||||||
## The attribute holding the display name of the user. This will be used to greet an authenticated user.
|
|
||||||
display_name_attribute: ""
|
|
||||||
|
|
||||||
## The username of the admin user.
|
|
||||||
user: CN=Authelia,DC=example,DC=com
|
|
||||||
plain_password: ""
|
|
||||||
|
|
||||||
##
|
|
||||||
## File (Authentication Provider)
|
|
||||||
##
|
|
||||||
## With this backend, the users database is stored in a file which is updated when users reset their passwords.
|
|
||||||
## Therefore, this backend is meant to be used in a dev environment and not in production since it prevents Authelia
|
|
||||||
## to be scaled to more than one instance. The options under 'password' have sane defaults, and as it has security
|
|
||||||
## implications it is highly recommended you leave the default values. Before considering changing these settings
|
|
||||||
## please read the docs page below:
|
|
||||||
## https://www.authelia.com/docs/configuration/authentication/file.html#password-hash-algorithm-tuning
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
file:
|
|
||||||
enabled: true
|
|
||||||
path: /config/users_database.yml
|
|
||||||
password:
|
|
||||||
algorithm: argon2id
|
|
||||||
iterations: 1
|
|
||||||
key_length: 32
|
|
||||||
salt_length: 16
|
|
||||||
memory: 1024
|
|
||||||
parallelism: 8
|
|
||||||
|
|
||||||
##
|
|
||||||
## Access Control Configuration
|
|
||||||
##
|
|
||||||
## Access control is a list of rules defining the authorizations applied for one resource to users or group of users.
|
|
||||||
##
|
|
||||||
## If 'access_control' is not defined, ACL rules are disabled and the 'bypass' rule is applied, i.e., access is allowed
|
|
||||||
## to anyone. Otherwise restrictions follow the rules defined.
|
|
||||||
##
|
|
||||||
## Note: One can use the wildcard * to match any subdomain.
|
|
||||||
## It must stand at the beginning of the pattern. (example: *.mydomain.com)
|
|
||||||
##
|
|
||||||
## Note: You must put patterns containing wildcards between simple quotes for the YAML to be syntactically correct.
|
|
||||||
##
|
|
||||||
## Definition: A 'rule' is an object with the following keys: 'domain', 'subject', 'policy' and 'resources'.
|
|
||||||
##
|
|
||||||
## - 'domain' defines which domain or set of domains the rule applies to.
|
|
||||||
##
|
|
||||||
## - 'subject' defines the subject to apply authorizations to. This parameter is optional and matching any user if not
|
|
||||||
## provided. If provided, the parameter represents either a user or a group. It should be of the form
|
|
||||||
## 'user:<username>' or 'group:<groupname>'.
|
|
||||||
##
|
|
||||||
## - 'policy' is the policy to apply to resources. It must be either 'bypass', 'one_factor', 'two_factor' or 'deny'.
|
|
||||||
##
|
|
||||||
## - 'resources' is a list of regular expressions that matches a set of resources to apply the policy to. This parameter
|
|
||||||
## is optional and matches any resource if not provided.
|
|
||||||
##
|
|
||||||
## Note: the order of the rules is important. The first policy matching (domain, resource, subject) applies.
|
|
||||||
access_control:
|
|
||||||
## Default policy can either be 'bypass', 'one_factor', 'two_factor' or 'deny'. It is the policy applied to any
|
|
||||||
## resource if there is no policy to be applied to the user.
|
|
||||||
default_policy: deny
|
|
||||||
|
|
||||||
networks: []
|
|
||||||
# networks:
|
|
||||||
# - name: private
|
|
||||||
# networks:
|
|
||||||
# - 10.0.0.0/8
|
|
||||||
# - 172.16.0.0/12
|
|
||||||
# - 192.168.0.0/16
|
|
||||||
# - name: vpn
|
|
||||||
# networks:
|
|
||||||
# - 10.9.0.0/16
|
|
||||||
|
|
||||||
rules: []
|
|
||||||
# rules:
|
|
||||||
# - domain: public.example.com
|
|
||||||
# policy: bypass
|
|
||||||
# - domain: "*.example.com"
|
|
||||||
# policy: bypass
|
|
||||||
# methods:
|
|
||||||
# - OPTIONS
|
|
||||||
# - domain: secure.example.com
|
|
||||||
# policy: one_factor
|
|
||||||
# networks:
|
|
||||||
# - private
|
|
||||||
# - vpn
|
|
||||||
# - 192.168.1.0/24
|
|
||||||
# - 10.0.0.1
|
|
||||||
# - domain:
|
|
||||||
# - secure.example.com
|
|
||||||
# - private.example.com
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: singlefactor.example.com
|
|
||||||
# policy: one_factor
|
|
||||||
# - domain: "mx2.mail.example.com"
|
|
||||||
# subject: "group:admins"
|
|
||||||
# policy: deny
|
|
||||||
# - domain: "*.example.com"
|
|
||||||
# subject:
|
|
||||||
# - "group:admins"
|
|
||||||
# - "group:moderators"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: dev.example.com
|
|
||||||
# resources:
|
|
||||||
# - "^/groups/dev/.*$"
|
|
||||||
# subject: "group:dev"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: dev.example.com
|
|
||||||
# resources:
|
|
||||||
# - "^/users/john/.*$"
|
|
||||||
# subject:
|
|
||||||
# - ["group:dev", "user:john"]
|
|
||||||
# - "group:admins"
|
|
||||||
# policy: two_factor
|
|
||||||
# - domain: "{user}.example.com"
|
|
||||||
# policy: bypass
|
|
||||||
|
|
||||||
##
|
|
||||||
## Session Provider Configuration
|
|
||||||
##
|
|
||||||
## The session cookies identify the user once logged in.
|
|
||||||
## The available providers are: `memory`, `redis`. Memory is the provider unless redis is defined.
|
|
||||||
session:
|
|
||||||
## The name of the session cookie. (default: authelia_session).
|
|
||||||
name: authelia_session
|
|
||||||
|
|
||||||
## Sets the Cookie SameSite value. Possible options are none, lax, or strict.
|
|
||||||
## Please read https://www.authelia.com/docs/configuration/session.html#same_site
|
|
||||||
same_site: lax
|
|
||||||
|
|
||||||
## The time in seconds before the cookie expires and session is reset.
|
|
||||||
expiration: 1h
|
|
||||||
|
|
||||||
## The inactivity time in seconds before the session is reset.
|
|
||||||
inactivity: 5m
|
|
||||||
|
|
||||||
## The remember me duration.
|
|
||||||
## Value is in seconds, or duration notation. Value of 0 disables remember me.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
## Longer periods are considered less secure because a stolen cookie will last longer giving attackers more time to
|
|
||||||
## spy or attack. Currently the default is 1M or 1 month.
|
|
||||||
remember_me_duration: 1M
|
|
||||||
|
|
||||||
##
|
|
||||||
## Redis Provider
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
## The redis connection details
|
|
||||||
redisProvider:
|
|
||||||
port: 6379
|
|
||||||
|
|
||||||
## Optional username to be used with authentication.
|
|
||||||
# username: authelia
|
|
||||||
username: ""
|
|
||||||
|
|
||||||
## This is the Redis DB Index https://redis.io/commands/select (sometimes referred to as database number, DB, etc).
|
|
||||||
database_index: 0
|
|
||||||
|
|
||||||
## The maximum number of concurrent active connections to Redis.
|
|
||||||
maximum_active_connections: 8
|
|
||||||
|
|
||||||
## The target number of idle connections to have open ready for work. Useful when opening connections is slow.
|
|
||||||
minimum_idle_connections: 0
|
|
||||||
|
|
||||||
## The Redis TLS configuration. If defined will require a TLS connection to the Redis instance(s).
|
|
||||||
tls:
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
## Server Name for certificate validation (in case you are using the IP or non-FQDN in the host option).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for the connection.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
## The Redis HA configuration options.
|
|
||||||
## This provides specific options to Redis Sentinel, sentinel_name must be defined (Master Name).
|
|
||||||
high_availability:
|
|
||||||
enabled: false
|
|
||||||
enabledSecret: false
|
|
||||||
## Sentinel Name / Master Name
|
|
||||||
sentinel_name: mysentinel
|
|
||||||
|
|
||||||
## The additional nodes to pre-seed the redis provider with (for sentinel).
|
|
||||||
## If the host in the above section is defined, it will be combined with this list to connect to sentinel.
|
|
||||||
## For high availability to be used you must have either defined; the host above or at least one node below.
|
|
||||||
nodes: []
|
|
||||||
# nodes:
|
|
||||||
# - host: sentinel-0.databases.svc.cluster.local
|
|
||||||
# port: 26379
|
|
||||||
# - host: sentinel-1.databases.svc.cluster.local
|
|
||||||
# port: 26379
|
|
||||||
|
|
||||||
## Choose the host with the lowest latency.
|
|
||||||
route_by_latency: false
|
|
||||||
|
|
||||||
## Choose the host randomly.
|
|
||||||
route_randomly: false
|
|
||||||
|
|
||||||
##
|
|
||||||
## Regulation Configuration
|
|
||||||
##
|
|
||||||
## This mechanism prevents attackers from brute forcing the first factor. It bans the user if too many attempts are done
|
|
||||||
## in a short period of time.
|
|
||||||
regulation:
|
|
||||||
## The number of failed login attempts before user is banned. Set it to 0 to disable regulation.
|
|
||||||
max_retries: 3
|
|
||||||
|
|
||||||
## The time range during which the user can attempt login before being banned. The user is banned if the
|
|
||||||
## authentication failed 'max_retries' times in a 'find_time' seconds window. Find Time accepts duration notation.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
find_time: 2m
|
|
||||||
|
|
||||||
## The length of time before a banned user can login again. Ban Time accepts duration notation.
|
|
||||||
## See: https://www.authelia.com/docs/configuration/index.html#duration-notation-format
|
|
||||||
ban_time: 5m
|
|
||||||
|
|
||||||
##
|
|
||||||
## Storage Provider Configuration
|
|
||||||
##
|
|
||||||
## The available providers are: `local`, `mysql`, `postgres`. You must use one and only one of these providers.
|
|
||||||
storage:
|
|
||||||
##
|
|
||||||
## PostgreSQL (Storage Provider)
|
|
||||||
##
|
|
||||||
postgres:
|
|
||||||
port: 5432
|
|
||||||
database: authelia
|
|
||||||
username: authelia
|
|
||||||
sslmode: disable
|
|
||||||
timeout: 5s
|
|
||||||
|
|
||||||
##
|
|
||||||
## Notification Provider
|
|
||||||
##
|
|
||||||
##
|
|
||||||
## Notifications are sent to users when they require a password reset, a u2f registration or a TOTP registration.
|
|
||||||
## The available providers are: filesystem, smtp. You must use one and only one of these providers.
|
|
||||||
notifier:
|
|
||||||
## You can disable the notifier startup check by setting this to true.
|
|
||||||
disable_startup_check: false
|
|
||||||
|
|
||||||
##
|
|
||||||
## File System (Notification Provider)
|
|
||||||
##
|
|
||||||
## Important: Kubernetes (or HA) users must read https://www.authelia.com/docs/features/statelessness.html
|
|
||||||
##
|
|
||||||
filesystem:
|
|
||||||
enabled: true
|
|
||||||
filename: /config/notification.txt
|
|
||||||
|
|
||||||
##
|
|
||||||
## SMTP (Notification Provider)
|
|
||||||
##
|
|
||||||
## Use a SMTP server for sending notifications. Authelia uses the PLAIN or LOGIN methods to authenticate.
|
|
||||||
## [Security] By default Authelia will:
|
|
||||||
## - force all SMTP connections over TLS including unauthenticated connections
|
|
||||||
## - use the disable_require_tls boolean value to disable this requirement
|
|
||||||
## (only works for unauthenticated connections)
|
|
||||||
## - validate the SMTP server x509 certificate during the TLS handshake against the hosts trusted certificates
|
|
||||||
## (configure in tls section)
|
|
||||||
smtp:
|
|
||||||
enabled: false
|
|
||||||
enabledSecret: false
|
|
||||||
host: smtp.mail.svc.cluster.local
|
|
||||||
port: 25
|
|
||||||
timeout: 5s
|
|
||||||
username: test
|
|
||||||
plain_password: test
|
|
||||||
sender: admin@example.com
|
|
||||||
## HELO/EHLO Identifier. Some SMTP Servers may reject the default of localhost.
|
|
||||||
identifier: localhost
|
|
||||||
## Subject configuration of the emails sent.
|
|
||||||
## {title} is replaced by the text from the notifier
|
|
||||||
subject: "[Authelia] {title}"
|
|
||||||
## This address is used during the startup check to verify the email configuration is correct.
|
|
||||||
## It's not important what it is except if your email server only allows local delivery.
|
|
||||||
startup_check_address: test@authelia.com
|
|
||||||
disable_require_tls: false
|
|
||||||
disable_html_emails: false
|
|
||||||
|
|
||||||
tls:
|
|
||||||
## Server Name for certificate validation (in case you are using the IP or non-FQDN in the host option).
|
|
||||||
server_name: ""
|
|
||||||
|
|
||||||
## Skip verifying the server certificate (to allow a self-signed certificate).
|
|
||||||
## In preference to setting this we strongly recommend you add the public portion of the certificate to the
|
|
||||||
## certificates directory which is defined by the `certificates_directory` option at the top of the config.
|
|
||||||
skip_verify: false
|
|
||||||
|
|
||||||
## Minimum TLS version for either StartTLS or SMTPS.
|
|
||||||
minimum_version: TLS1.2
|
|
||||||
|
|
||||||
identity_providers:
|
|
||||||
oidc:
|
|
||||||
## Enables this in the config map. Currently in beta stage.
|
|
||||||
## See https://www.authelia.com/docs/configuration/identity-providers/oidc.html#roadmap
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
access_token_lifespan: 1h
|
|
||||||
authorize_code_lifespan: 1m
|
|
||||||
id_token_lifespan: 1h
|
|
||||||
refresh_token_lifespan: 90m
|
|
||||||
|
|
||||||
enable_client_debug_messages: false
|
|
||||||
|
|
||||||
## SECURITY NOTICE: It's not recommended changing this option, and highly discouraged to have it below 8 for
|
|
||||||
## security reasons.
|
|
||||||
minimum_parameter_entropy: 8
|
|
||||||
|
|
||||||
clients: []
|
|
||||||
# clients:
|
|
||||||
# -
|
|
||||||
## The ID is the OpenID Connect ClientID which is used to link an application to a configuration.
|
|
||||||
# id: myapp
|
|
||||||
|
|
||||||
## The description to show to users when they end up on the consent screen. Defaults to the ID above.
|
|
||||||
# description: My Application
|
|
||||||
|
|
||||||
## The client secret is a shared secret between Authelia and the consumer of this client.
|
|
||||||
# secret: apple123
|
|
||||||
|
|
||||||
## Sets the client to public. This should typically not be set, please see the documentation for usage.
|
|
||||||
# public: false
|
|
||||||
|
|
||||||
## The policy to require for this client; one_factor or two_factor.
|
|
||||||
# authorization_policy: two_factor
|
|
||||||
|
|
||||||
## Configures the consent mode; auto, explicit or implicit
|
|
||||||
# consent_mode: auto
|
|
||||||
|
|
||||||
## Audience this client is allowed to request.
|
|
||||||
# audience: []
|
|
||||||
|
|
||||||
## Scopes this client is allowed to request.
|
|
||||||
# scopes:
|
|
||||||
# - openid
|
|
||||||
# - profile
|
|
||||||
# - email
|
|
||||||
# - groups
|
|
||||||
|
|
||||||
## Redirect URI's specifies a list of valid case-sensitive callbacks for this client.
|
|
||||||
# redirect_uris:
|
|
||||||
# - https://oidc.example.com/oauth2/callback
|
|
||||||
|
|
||||||
## Grant Types configures which grants this client can obtain.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# grant_types:
|
|
||||||
# - refresh_token
|
|
||||||
# - authorization_code
|
|
||||||
|
|
||||||
## Response Types configures which responses this client can be sent.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# response_types:
|
|
||||||
# - code
|
|
||||||
|
|
||||||
## Response Modes configures which response modes this client supports.
|
|
||||||
## It's not recommended to configure this unless you know what you're doing.
|
|
||||||
# response_modes:
|
|
||||||
# - form_post
|
|
||||||
# - query
|
|
||||||
# - fragment
|
|
||||||
|
|
||||||
## The algorithm used to sign userinfo endpoint responses for this client, either none or RS256.
|
|
||||||
# userinfo_signing_algorithm: none
|
|
||||||
|
|
||||||
portal:
|
|
||||||
open:
|
|
||||||
enabled: true
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1 +0,0 @@
|
||||||
{{- include "tc.v1.common.lib.chart.notes" $ -}}
|
|
|
@ -1,254 +0,0 @@
|
||||||
{{/* Define the configmap */}}
|
|
||||||
{{- define "authelia.configmap.paths" -}}
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
AUTHELIA_SERVER_DISABLE_HEALTHCHECK: "true"
|
|
||||||
AUTHELIA_JWT_SECRET_FILE: "/secrets/JWT_TOKEN"
|
|
||||||
AUTHELIA_SESSION_SECRET_FILE: "/secrets/SESSION_ENCRYPTION_KEY"
|
|
||||||
AUTHELIA_STORAGE_ENCRYPTION_KEY_FILE: "/secrets/ENCRYPTION_KEY"
|
|
||||||
AUTHELIA_STORAGE_POSTGRES_PASSWORD_FILE: "/secrets/STORAGE_PASSWORD"
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_PASSWORD_FILE: "/secrets/LDAP_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.notifier.smtp.enabled }}
|
|
||||||
AUTHELIA_NOTIFIER_SMTP_PASSWORD_FILE: "/secrets/SMTP_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
AUTHELIA_SESSION_REDIS_PASSWORD_FILE: "/secrets/REDIS_PASSWORD"
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled }}
|
|
||||||
AUTHELIA_SESSION_REDIS_HIGH_AVAILABILITY_SENTINEL_PASSWORD_FILE: "/secrets/REDIS_SENTINEL_PASSWORD"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
AUTHELIA_DUO_API_SECRET_KEY_FILE: "/secrets/DUO_API_KEY"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
AUTHELIA_IDENTITY_PROVIDERS_OIDC_HMAC_SECRET_FILE: "/secrets/OIDC_HMAC_SECRET"
|
|
||||||
AUTHELIA_IDENTITY_PROVIDERS_OIDC_ISSUER_PRIVATE_KEY_FILE: "/secrets/OIDC_PRIVATE_KEY"
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- define "authelia.configmap.configfile" -}}
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
configuration.yaml: |
|
|
||||||
---
|
|
||||||
theme: {{ default "light" .Values.theme }}
|
|
||||||
default_redirection_url: {{ default (printf "https://www.%s" .Values.domain) .Values.default_redirection_url }}
|
|
||||||
ntp:
|
|
||||||
address: {{ default "time.cloudflare.com:123" .Values.ntp.address }}
|
|
||||||
version: {{ default 4 .Values.ntp.version }}
|
|
||||||
max_desync: {{ default "3s" .Values.ntp.max_desync }}
|
|
||||||
disable_startup_check: {{ default false .Values.ntp.disable_startup_check }}
|
|
||||||
disable_failure: {{ default true .Values.ntp.disable_failure }}
|
|
||||||
server:
|
|
||||||
host: 0.0.0.0
|
|
||||||
port: {{ default 9091 .Values.server.port }}
|
|
||||||
{{- if not (eq "" (default "" .Values.server.path)) }}
|
|
||||||
path: {{ .Values.server.path }}
|
|
||||||
{{- end }}
|
|
||||||
buffers:
|
|
||||||
write: {{ default 4096 .Values.server.write_buffer_size }}
|
|
||||||
read: {{ default 4096 .Values.server.read_buffer_size }}
|
|
||||||
enable_pprof: {{ default false .Values.server.enable_pprof }}
|
|
||||||
enable_expvars: {{ default false .Values.server.enable_expvars }}
|
|
||||||
log:
|
|
||||||
level: {{ default "info" .Values.log.level }}
|
|
||||||
format: {{ default "text" .Values.log.format }}
|
|
||||||
{{- if not (eq "" (default "" .Values.log.file_path)) }}
|
|
||||||
file_path: {{ .Values.log.file_path }}
|
|
||||||
keep_stdout: true
|
|
||||||
{{- end }}
|
|
||||||
totp:
|
|
||||||
issuer: {{ default .Values.domain .Values.totp.issuer }}
|
|
||||||
period: {{ default 30 .Values.totp.period }}
|
|
||||||
skew: {{ default 1 .Values.totp.skew }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
duo_api:
|
|
||||||
hostname: {{ .Values.duo_api.hostname }}
|
|
||||||
integration_key: {{ .Values.duo_api.integration_key }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $auth := .Values.authentication_backend }}
|
|
||||||
authentication_backend:
|
|
||||||
password_reset:
|
|
||||||
disable: {{ $auth.disable_reset_password }}
|
|
||||||
{{- if $auth.file.enabled }}
|
|
||||||
file:
|
|
||||||
path: {{ $auth.file.path }}
|
|
||||||
password: {{ toYaml $auth.file.password | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.enabled }}
|
|
||||||
ldap:
|
|
||||||
implementation: {{ default "custom" $auth.ldap.implementation }}
|
|
||||||
url: {{ $auth.ldap.url }}
|
|
||||||
timeout: {{ default "5s" $auth.ldap.timeout }}
|
|
||||||
start_tls: {{ $auth.ldap.start_tls }}
|
|
||||||
tls:
|
|
||||||
{{- if hasKey $auth.ldap.tls "server_name" }}
|
|
||||||
server_name: {{ default $auth.ldap.host $auth.ldap.tls.server_name }}
|
|
||||||
{{- end }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $auth.ldap.tls.minimum_version }}
|
|
||||||
skip_verify: {{ default false $auth.ldap.tls.skip_verify }}
|
|
||||||
{{- if $auth.ldap.base_dn }}
|
|
||||||
base_dn: {{ $auth.ldap.base_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.username_attribute }}
|
|
||||||
username_attribute: {{ $auth.ldap.username_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.additional_users_dn }}
|
|
||||||
additional_users_dn: {{ $auth.ldap.additional_users_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.users_filter }}
|
|
||||||
users_filter: {{ $auth.ldap.users_filter }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.additional_groups_dn }}
|
|
||||||
additional_groups_dn: {{ $auth.ldap.additional_groups_dn }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.groups_filter }}
|
|
||||||
groups_filter: {{ $auth.ldap.groups_filter }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.group_name_attribute }}
|
|
||||||
group_name_attribute: {{ $auth.ldap.group_name_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.mail_attribute }}
|
|
||||||
mail_attribute: {{ $auth.ldap.mail_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $auth.ldap.display_name_attribute }}
|
|
||||||
display_name_attribute: {{ $auth.ldap.display_name_attribute }}
|
|
||||||
{{- end }}
|
|
||||||
user: {{ $auth.ldap.user }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $session := .Values.session }}
|
|
||||||
session:
|
|
||||||
name: {{ default "authelia_session" $session.name }}
|
|
||||||
domain: {{ required "A valid .Values.domain entry required!" $.Values.domain }}
|
|
||||||
same_site: {{ default "lax" $session.same_site }}
|
|
||||||
expiration: {{ default "1M" $session.expiration }}
|
|
||||||
inactivity: {{ default "5m" $session.inactivity }}
|
|
||||||
remember_me_duration: {{ default "1M" $session.remember_me_duration }}
|
|
||||||
{{- end }}
|
|
||||||
redis:
|
|
||||||
host: {{ .Values.redis.creds.plain }}
|
|
||||||
{{- with $redis := .Values.redisProvider }}
|
|
||||||
port: {{ default 6379 $redis.port }}
|
|
||||||
{{- if not (eq $redis.username "") }}
|
|
||||||
username: {{ $redis.username }}
|
|
||||||
{{- end }}
|
|
||||||
maximum_active_connections: {{ default 8 $redis.maximum_active_connections }}
|
|
||||||
minimum_idle_connections: {{ default 0 $redis.minimum_idle_connections }}
|
|
||||||
{{- if $redis.tls.enabled }}
|
|
||||||
tls:
|
|
||||||
server_name: {{ $redis.tls.server_name }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $redis.tls.minimum_version }}
|
|
||||||
skip_verify: {{ $redis.tls.skip_verify }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $redis.high_availability.enabled }}
|
|
||||||
high_availability:
|
|
||||||
sentinel_name: {{ $redis.high_availability.sentinel_name }}
|
|
||||||
{{- if $redis.high_availability.nodes }}
|
|
||||||
nodes: {{ toYaml $redis.high_availability.nodes | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
route_by_latency: {{ $redis.high_availability.route_by_latency }}
|
|
||||||
route_randomly: {{ $redis.high_availability.route_randomly }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
regulation: {{ toYaml .Values.regulation | nindent 6 }}
|
|
||||||
storage:
|
|
||||||
postgres:
|
|
||||||
host: {{ $.Values.cnpg.main.creds.host }}
|
|
||||||
{{- with $storage := .Values.storage }}
|
|
||||||
port: {{ default 5432 $storage.postgres.port }}
|
|
||||||
database: {{ default "authelia" $storage.postgres.database }}
|
|
||||||
username: {{ default "authelia" $storage.postgres.username }}
|
|
||||||
timeout: {{ default "5s" $storage.postgres.timeout }}
|
|
||||||
ssl:
|
|
||||||
mode: {{ default "disable" $storage.postgres.sslmode }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $notifier := .Values.notifier }}
|
|
||||||
notifier:
|
|
||||||
disable_startup_check: {{ $.Values.notifier.disable_startup_check }}
|
|
||||||
{{- if $notifier.filesystem.enabled }}
|
|
||||||
filesystem:
|
|
||||||
filename: {{ $notifier.filesystem.filename }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $notifier.smtp.enabled }}
|
|
||||||
smtp:
|
|
||||||
host: {{ $notifier.smtp.host }}
|
|
||||||
port: {{ default 25 $notifier.smtp.port }}
|
|
||||||
timeout: {{ default "5s" $notifier.smtp.timeout }}
|
|
||||||
{{- with $notifier.smtp.username }}
|
|
||||||
username: {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
sender: {{ $notifier.smtp.sender }}
|
|
||||||
identifier: {{ $notifier.smtp.identifier }}
|
|
||||||
subject: {{ $notifier.smtp.subject | quote }}
|
|
||||||
startup_check_address: {{ $notifier.smtp.startup_check_address }}
|
|
||||||
disable_require_tls: {{ $notifier.smtp.disable_require_tls }}
|
|
||||||
disable_html_emails: {{ $notifier.smtp.disable_html_emails }}
|
|
||||||
tls:
|
|
||||||
server_name: {{ default $notifier.smtp.host $notifier.smtp.tls.server_name }}
|
|
||||||
minimum_version: {{ default "TLS1.2" $notifier.smtp.tls.minimum_version }}
|
|
||||||
skip_verify: {{ default false $notifier.smtp.tls.skip_verify }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
identity_providers:
|
|
||||||
oidc:
|
|
||||||
access_token_lifespan: {{ default "1h" .Values.identity_providers.oidc.access_token_lifespan }}
|
|
||||||
authorize_code_lifespan: {{ default "1m" .Values.identity_providers.oidc.authorize_code_lifespan }}
|
|
||||||
id_token_lifespan: {{ default "1h" .Values.identity_providers.oidc.id_token_lifespan }}
|
|
||||||
refresh_token_lifespan: {{ default "90m" .Values.identity_providers.oidc.refresh_token_lifespan }}
|
|
||||||
enable_client_debug_messages: {{ default false .Values.identity_providers.oidc.enable_client_debug_messages }}
|
|
||||||
minimum_parameter_entropy: {{ default 8 .Values.identity_providers.oidc.minimum_parameter_entropy }}
|
|
||||||
{{- if gt (len .Values.identity_providers.oidc.clients) 0 }}
|
|
||||||
clients:
|
|
||||||
{{- range $client := .Values.identity_providers.oidc.clients }}
|
|
||||||
- id: {{ $client.id }}
|
|
||||||
description: {{ default $client.id $client.description }}
|
|
||||||
secret: {{ default (randAlphaNum 128) $client.secret }}
|
|
||||||
{{- if $client.public }}
|
|
||||||
public: {{ $client.public }}
|
|
||||||
{{- end }}
|
|
||||||
authorization_policy: {{ default "two_factor" $client.authorization_policy }}
|
|
||||||
consent_mode: {{ default "auto" $client.consent_mode}}
|
|
||||||
redirect_uris:
|
|
||||||
{{- range $client.redirect_uris }}
|
|
||||||
- {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $client.audience }}
|
|
||||||
audience: {{ toYaml $client.audience | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
scopes: {{ toYaml (default (list "openid" "profile" "email" "groups") $client.scopes) | nindent 10 }}
|
|
||||||
grant_types: {{ toYaml (default (list "refresh_token" "authorization_code") $client.grant_types) | nindent 10 }}
|
|
||||||
response_types: {{ toYaml (default (list "code") $client.response_types) | nindent 10 }}
|
|
||||||
{{- if $client.response_modes }}
|
|
||||||
response_modes: {{ toYaml $client.response_modes | nindent 10 }}
|
|
||||||
{{- end }}
|
|
||||||
userinfo_signing_algorithm: {{ default "none" $client.userinfo_signing_algorithm }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
access_control:
|
|
||||||
{{- if (eq (len .Values.access_control.rules) 0) }}
|
|
||||||
{{- if (eq .Values.access_control.default_policy "bypass") }}
|
|
||||||
default_policy: one_factor
|
|
||||||
{{- else if (eq .Values.access_control.default_policy "deny") }}
|
|
||||||
default_policy: two_factor
|
|
||||||
{{- else }}
|
|
||||||
default_policy: {{ .Values.access_control.default_policy }}
|
|
||||||
{{- end }}
|
|
||||||
{{- else }}
|
|
||||||
default_policy: {{ .Values.access_control.default_policy }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if (eq (len .Values.access_control.networks) 0) }}
|
|
||||||
networks: []
|
|
||||||
{{- else }}
|
|
||||||
networks: {{ toYaml .Values.access_control.networks | nindent 6 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if (eq (len .Values.access_control.rules) 0) }}
|
|
||||||
rules: []
|
|
||||||
{{- else }}
|
|
||||||
rules: {{ toYaml .Values.access_control.rules | nindent 6 }}
|
|
||||||
{{- end }}
|
|
||||||
...
|
|
||||||
{{- end -}}
|
|
|
@ -1,53 +0,0 @@
|
||||||
{{/* Define the secrets */}}
|
|
||||||
{{- define "authelia.secrets" -}}
|
|
||||||
{{- $basename := include "tc.v1.common.lib.chart.names.fullname" $ -}}
|
|
||||||
{{- $fetchname := printf "%s-authelia-secrets" $basename -}}
|
|
||||||
|
|
||||||
{{/* Initialize all keys */}}
|
|
||||||
{{- $oidckey := genPrivateKey "rsa" }}
|
|
||||||
{{- $oidcsecret := randAlphaNum 32 }}
|
|
||||||
{{- $jwtsecret := randAlphaNum 50 }}
|
|
||||||
{{- $sessionsecret := randAlphaNum 50 }}
|
|
||||||
{{- $encryptionkey := randAlphaNum 100 }}
|
|
||||||
|
|
||||||
enabled: true
|
|
||||||
data:
|
|
||||||
{{ with (lookup "v1" "Secret" .Release.Namespace $fetchname) }}
|
|
||||||
{{/* Get previous values and decode */}}
|
|
||||||
{{ $sessionsecret = (index .data "SESSION_ENCRYPTION_KEY") | b64dec }}
|
|
||||||
{{ $jwtsecret = (index .data "JWT_TOKEN") | b64dec }}
|
|
||||||
{{ $encryptionkey = (index .data "ENCRYPTION_KEY") | b64dec }}
|
|
||||||
|
|
||||||
{{/* Check if those keys ever existed. as OIDC is optional */}}
|
|
||||||
{{ if and (hasKey .data "OIDC_PRIVATE_KEY") (hasKey .data "OIDC_HMAC_SECRET") }}
|
|
||||||
{{ $oidckey = (index .data "OIDC_PRIVATE_KEY") | b64dec }}
|
|
||||||
{{ $oidcsecret = (index .data "OIDC_HMAC_SECRET") | b64dec }}
|
|
||||||
{{ end }}
|
|
||||||
{{ end }}
|
|
||||||
SESSION_ENCRYPTION_KEY: {{ $sessionsecret }}
|
|
||||||
JWT_TOKEN: {{ $jwtsecret }}
|
|
||||||
ENCRYPTION_KEY: {{ $encryptionkey }}
|
|
||||||
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
LDAP_PASSWORD: {{ .Values.authentication_backend.ldap.plain_password }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- if and .Values.notifier.smtp.enabled .Values.notifier.smtp.plain_password }}
|
|
||||||
SMTP_PASSWORD: {{ .Values.notifier.smtp.plain_password }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
DUO_API_KEY: {{ .Values.duo_api.plain_api_key }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
STORAGE_PASSWORD: {{ $.Values.cnpg.main.creds.password | trimAll "\"" }}
|
|
||||||
|
|
||||||
REDIS_PASSWORD: {{ .Values.redis.creds.redisPassword | trimAll "\"" }}
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled }}
|
|
||||||
REDIS_SENTINEL_PASSWORD: {{ .Values.redis.sentinelPassword | trimAll "\"" }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
OIDC_PRIVATE_KEY: |
|
|
||||||
{{- $oidckey | nindent 4 }}
|
|
||||||
OIDC_HMAC_SECRET: {{ $oidcsecret }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,77 +0,0 @@
|
||||||
{{/* Make sure all variables are set properly */}}
|
|
||||||
{{- include "tc.v1.common.loader.init" . }}
|
|
||||||
|
|
||||||
{{/* Render configmap for authelia */}}
|
|
||||||
{{- $configmapPaths := include "authelia.configmap.paths" . | fromYaml -}}
|
|
||||||
{{- if $configmapPaths -}}
|
|
||||||
{{- $_ := set .Values.configmap "authelia-paths" $configmapPaths -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- $configmapFile := include "authelia.configmap.configfile" . | fromYaml -}}
|
|
||||||
{{- if $configmapFile -}}
|
|
||||||
{{- $_ := set .Values.configmap "authelia-configfile" $configmapFile -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Render secrets for authelia */}}
|
|
||||||
{{- $secret := include "authelia.secrets" . | fromYaml -}}
|
|
||||||
{{- if $secret -}}
|
|
||||||
{{- $_ := set .Values.secret "authelia-secrets" $secret -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Append the general configMap volume to the volumes */}}
|
|
||||||
{{- define "authelia.configmapVolume" -}}
|
|
||||||
enabled: true
|
|
||||||
mountPath: /configuration.yaml
|
|
||||||
subPath: configuration.yaml
|
|
||||||
readOnly: true
|
|
||||||
type: "configmap"
|
|
||||||
objectName: authelia-configfile
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Append the general secret volumes to the volumes */}}
|
|
||||||
{{- define "authelia.secretVolumes" -}}
|
|
||||||
enabled: true
|
|
||||||
mountPath: "/secrets"
|
|
||||||
readOnly: true
|
|
||||||
type: "secret"
|
|
||||||
objectName: authelia-secrets
|
|
||||||
items:
|
|
||||||
- key: "JWT_TOKEN"
|
|
||||||
path: JWT_TOKEN
|
|
||||||
- key: "SESSION_ENCRYPTION_KEY"
|
|
||||||
path: SESSION_ENCRYPTION_KEY
|
|
||||||
- key: "ENCRYPTION_KEY"
|
|
||||||
path: ENCRYPTION_KEY
|
|
||||||
- key: "STORAGE_PASSWORD"
|
|
||||||
path: STORAGE_PASSWORD
|
|
||||||
{{- if .Values.authentication_backend.ldap.enabled }}
|
|
||||||
- key: "LDAP_PASSWORD"
|
|
||||||
path: LDAP_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
{{- if and .Values.notifier.smtp.enabled .Values.notifier.smtp.plain_password }}
|
|
||||||
- key: "SMTP_PASSWORD"
|
|
||||||
path: SMTP_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
- key: "REDIS_PASSWORD"
|
|
||||||
path: REDIS_PASSWORD
|
|
||||||
{{- if .Values.redisProvider.high_availability.enabled}}
|
|
||||||
- key: "REDIS_SENTINEL_PASSWORD"
|
|
||||||
path: REDIS_SENTINEL_PASSWORD
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.duo_api.enabled }}
|
|
||||||
- key: "DUO_API_KEY"
|
|
||||||
path: DUO_API_KEY
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.identity_providers.oidc.enabled }}
|
|
||||||
- key: "OIDC_PRIVATE_KEY"
|
|
||||||
path: OIDC_PRIVATE_KEY
|
|
||||||
- key: "OIDC_HMAC_SECRET"
|
|
||||||
path: OIDC_HMAC_SECRET
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{- $_ := set .Values.persistence "authelia-configfile" (include "authelia.configmapVolume" . | fromYaml) -}}
|
|
||||||
{{- $_ := set .Values.persistence "authelia-secrets" (include "authelia.secretVolumes" . | fromYaml) -}}
|
|
||||||
|
|
||||||
{{/* Render the templates */}}
|
|
||||||
{{ include "tc.v1.common.loader.apply" . }}
|
|
|
@ -1,99 +0,0 @@
|
||||||
**Important:**
|
|
||||||
*for the complete changelog, please refer to the website*
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.16](https://github.com/truecharts/charts/compare/traefik-17.0.15...traefik-17.0.16) (2023-04-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7907](https://github.com/truecharts/charts/issues/7907))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.15](https://github.com/truecharts/charts/compare/traefik-17.0.14...traefik-17.0.15) (2023-04-07)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update container image tccr.io/truecharts/traefik to v2.9.9 ([#7883](https://github.com/truecharts/charts/issues/7883))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.14](https://github.com/truecharts/charts/compare/traefik-17.0.13...traefik-17.0.14) (2023-04-05)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common to 32 on enterprise charts
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.13](https://github.com/truecharts/charts/compare/traefik-17.0.12...traefik-17.0.13) (2023-03-25)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.12](https://github.com/truecharts/charts/compare/traefik-17.0.11...traefik-17.0.12) (2023-03-19)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common and deps on enterprise train ([#7819](https://github.com/truecharts/charts/issues/7819))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.11](https://github.com/truecharts/charts/compare/traefik-17.0.10...traefik-17.0.11) (2023-03-19)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- fix portal button ([#7811](https://github.com/truecharts/charts/issues/7811))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.10](https://github.com/truecharts/charts/compare/traefik-17.0.9...traefik-17.0.10) (2023-03-11)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- bump to get metrics working
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.9](https://github.com/truecharts/charts/compare/traefik-17.0.8...traefik-17.0.9) (2023-03-11)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- bump to release fix for new service monitor
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.8](https://github.com/truecharts/charts/compare/traefik-17.0.7...traefik-17.0.8) (2023-03-11)
|
|
||||||
|
|
||||||
### Feat
|
|
||||||
|
|
||||||
- generate a service monitor ([#7785](https://github.com/truecharts/charts/issues/7785))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.7](https://github.com/truecharts/charts/compare/traefik-17.0.6...traefik-17.0.7) (2023-03-07)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- actually fix labels ([#7763](https://github.com/truecharts/charts/issues/7763))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.6](https://github.com/truecharts/charts/compare/traefik-17.0.5...traefik-17.0.6) (2023-03-07)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- misc fixes from common and prometheus storageclass patch ([#7762](https://github.com/truecharts/charts/issues/7762))
|
|
||||||
|
|
||||||
|
|
|
@ -1,31 +0,0 @@
|
||||||
apiVersion: v2
|
|
||||||
appVersion: "2.9.9"
|
|
||||||
dependencies:
|
|
||||||
- name: common
|
|
||||||
repository: https://library-charts.truecharts.org
|
|
||||||
version: 12.3.0
|
|
||||||
deprecated: false
|
|
||||||
description: Traefik is a flexible reverse proxy and Ingress Provider.
|
|
||||||
home: https://truecharts.org/charts/enterprise/traefik
|
|
||||||
icon: https://truecharts.org/img/hotlink-ok/chart-icons/traefik.png
|
|
||||||
keywords:
|
|
||||||
- traefik
|
|
||||||
- ingress
|
|
||||||
kubeVersion: ">=1.16.0-0"
|
|
||||||
maintainers:
|
|
||||||
- email: info@truecharts.org
|
|
||||||
name: TrueCharts
|
|
||||||
url: https://truecharts.org
|
|
||||||
name: traefik
|
|
||||||
sources:
|
|
||||||
- https://github.com/truecharts/charts/tree/master/charts/enterprise/traefik
|
|
||||||
- https://github.com/traefik/traefik
|
|
||||||
- https://github.com/traefik/traefik-helm-chart
|
|
||||||
- https://traefik.io/
|
|
||||||
type: application
|
|
||||||
version: 17.0.16
|
|
||||||
annotations:
|
|
||||||
truecharts.org/catagories: |
|
|
||||||
- network
|
|
||||||
truecharts.org/SCALE-support: "true"
|
|
||||||
truecharts.org/grade: U
|
|
|
@ -1,106 +0,0 @@
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Parameters
|
|
||||||
|
|
||||||
Licensor: The TrueCharts Project, it's owner and it's contributors
|
|
||||||
Licensed Work: The TrueCharts "Traefik" Helm Chart
|
|
||||||
Additional Use Grant: You may use the licensed work in production, as long
|
|
||||||
as it is directly sourced from a TrueCharts provided
|
|
||||||
official repository, catalog or source. You may also make private
|
|
||||||
modification to the directly sourced licenced work,
|
|
||||||
when used in production.
|
|
||||||
|
|
||||||
The following cases are, due to their nature, also
|
|
||||||
defined as 'production use' and explicitly prohibited:
|
|
||||||
- Bundling, including or displaying the licensed work
|
|
||||||
with(in) another work intended for production use,
|
|
||||||
with the apparent intend of facilitating and/or
|
|
||||||
promoting production use by third parties in
|
|
||||||
violation of this license.
|
|
||||||
|
|
||||||
Change Date: 2050-01-01
|
|
||||||
|
|
||||||
Change License: 3-clause BSD license
|
|
||||||
|
|
||||||
For information about alternative licensing arrangements for the Software,
|
|
||||||
please contact: legal@truecharts.org
|
|
||||||
|
|
||||||
Notice
|
|
||||||
|
|
||||||
The Business Source License (this document, or the “License”) is not an Open
|
|
||||||
Source license. However, the Licensed Work will eventually be made available
|
|
||||||
under an Open Source License, as stated in this License.
|
|
||||||
|
|
||||||
License text copyright (c) 2017 MariaDB Corporation Ab, All Rights Reserved.
|
|
||||||
“Business Source License” is a trademark of MariaDB Corporation Ab.
|
|
||||||
|
|
||||||
-----------------------------------------------------------------------------
|
|
||||||
|
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Terms
|
|
||||||
|
|
||||||
The Licensor hereby grants you the right to copy, modify, create derivative
|
|
||||||
works, redistribute, and make non-production use of the Licensed Work. The
|
|
||||||
Licensor may make an Additional Use Grant, above, permitting limited
|
|
||||||
production use.
|
|
||||||
|
|
||||||
Effective on the Change Date, or the fourth anniversary of the first publicly
|
|
||||||
available distribution of a specific version of the Licensed Work under this
|
|
||||||
License, whichever comes first, the Licensor hereby grants you rights under
|
|
||||||
the terms of the Change License, and the rights granted in the paragraph
|
|
||||||
above terminate.
|
|
||||||
|
|
||||||
If your use of the Licensed Work does not comply with the requirements
|
|
||||||
currently in effect as described in this License, you must purchase a
|
|
||||||
commercial license from the Licensor, its affiliated entities, or authorized
|
|
||||||
resellers, or you must refrain from using the Licensed Work.
|
|
||||||
|
|
||||||
All copies of the original and modified Licensed Work, and derivative works
|
|
||||||
of the Licensed Work, are subject to this License. This License applies
|
|
||||||
separately for each version of the Licensed Work and the Change Date may vary
|
|
||||||
for each version of the Licensed Work released by Licensor.
|
|
||||||
|
|
||||||
You must conspicuously display this License on each original or modified copy
|
|
||||||
of the Licensed Work. If you receive the Licensed Work in original or
|
|
||||||
modified form from a third party, the terms and conditions set forth in this
|
|
||||||
License apply to your use of that work.
|
|
||||||
|
|
||||||
Any use of the Licensed Work in violation of this License will automatically
|
|
||||||
terminate your rights under this License for the current and all other
|
|
||||||
versions of the Licensed Work.
|
|
||||||
|
|
||||||
This License does not grant you any right in any trademark or logo of
|
|
||||||
Licensor or its affiliates (provided that you may use a trademark or logo of
|
|
||||||
Licensor as expressly required by this License).
|
|
||||||
|
|
||||||
TO THE EXTENT PERMITTED BY APPLICABLE LAW, THE LICENSED WORK IS PROVIDED ON
|
|
||||||
AN “AS IS” BASIS. LICENSOR HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS,
|
|
||||||
EXPRESS OR IMPLIED, INCLUDING (WITHOUT LIMITATION) WARRANTIES OF
|
|
||||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND
|
|
||||||
TITLE.
|
|
||||||
|
|
||||||
MariaDB hereby grants you permission to use this License’s text to license
|
|
||||||
your works, and to refer to it using the trademark “Business Source License”,
|
|
||||||
as long as you comply with the Covenants of Licensor below.
|
|
||||||
|
|
||||||
Covenants of Licensor
|
|
||||||
|
|
||||||
In consideration of the right to use this License’s text and the “Business
|
|
||||||
Source License” name and trademark, Licensor covenants to MariaDB, and to all
|
|
||||||
other recipients of the licensed work to be provided by Licensor:
|
|
||||||
|
|
||||||
1. To specify as the Change License the GPL Version 2.0 or any later version,
|
|
||||||
or a license that is compatible with GPL Version 2.0 or a later version,
|
|
||||||
where “compatible” means that software provided under the Change License can
|
|
||||||
be included in a program with software provided under GPL Version 2.0 or a
|
|
||||||
later version. Licensor may specify additional Change Licenses without
|
|
||||||
limitation.
|
|
||||||
|
|
||||||
2. To either: (a) specify an additional grant of rights to use that does not
|
|
||||||
impose any additional restriction on the right granted in this License, as
|
|
||||||
the Additional Use Grant; or (b) insert the text “None”.
|
|
||||||
|
|
||||||
3. To specify a Change Date.
|
|
||||||
|
|
||||||
4. Not to modify this License in any other way.
|
|
|
@ -1,27 +0,0 @@
|
||||||
# README
|
|
||||||
|
|
||||||
## General Info
|
|
||||||
|
|
||||||
TrueCharts can be installed as both *normal* Helm Charts or as Apps on TrueNAS SCALE.
|
|
||||||
However only installations using the TrueNAS SCALE Apps system are supported.
|
|
||||||
|
|
||||||
For more information about this App, please check the docs on the TrueCharts [website](https://truecharts.org/charts/enterprise/)
|
|
||||||
|
|
||||||
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/charts/issues/new/choose)**
|
|
||||||
|
|
||||||
|
|
||||||
## Support
|
|
||||||
|
|
||||||
- Please check our [quick-start guides for TrueNAS SCALE](https://truecharts.org/manual/SCALE%20Apps/Important-MUST-READ).
|
|
||||||
- See the [Website](https://truecharts.org)
|
|
||||||
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
|
|
||||||
- Open a [issue](https://github.com/truecharts/charts/issues/new/choose)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
## Sponsor TrueCharts
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
||||||
|
|
||||||
*All Rights Reserved - The TrueCharts Project*
|
|
|
@ -1,9 +0,0 @@
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.16](https://github.com/truecharts/charts/compare/traefik-17.0.15...traefik-17.0.16) (2023-04-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7907](https://github.com/truecharts/charts/issues/7907))
|
|
||||||
|
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
Traefik is a flexible reverse proxy and Ingress Provider.
|
|
||||||
|
|
||||||
This App is supplied by TrueCharts, for more information visit the manual: [https://truecharts.org/charts/enterprise/traefik](https://truecharts.org/charts/enterprise/traefik)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
Binary file not shown.
|
@ -1,417 +0,0 @@
|
||||||
image:
|
|
||||||
repository: tccr.io/truecharts/traefik
|
|
||||||
# defaults to appVersion
|
|
||||||
tag: 2.9.9@sha256:4b9750e70b54df2a0c39c3262fe2963815a0304b7982fb8f80d0782a8e8021fa
|
|
||||||
pullPolicy: IfNotPresent
|
|
||||||
|
|
||||||
workload:
|
|
||||||
main:
|
|
||||||
replicas: 2
|
|
||||||
strategy: RollingUpdate
|
|
||||||
podSpec:
|
|
||||||
containers:
|
|
||||||
main:
|
|
||||||
args: []
|
|
||||||
probes:
|
|
||||||
# -- Liveness probe configuration
|
|
||||||
# @default -- See below
|
|
||||||
liveness:
|
|
||||||
# -- sets the probe type when not using a custom probe
|
|
||||||
# @default -- "TCP"
|
|
||||||
type: tcp
|
|
||||||
# -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used
|
|
||||||
# @default -- "/"
|
|
||||||
# path: "/ping"
|
|
||||||
|
|
||||||
# -- Redainess probe configuration
|
|
||||||
# @default -- See below
|
|
||||||
readiness:
|
|
||||||
# -- sets the probe type when not using a custom probe
|
|
||||||
# @default -- "TCP"
|
|
||||||
type: tcp
|
|
||||||
# -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used
|
|
||||||
# @default -- "/"
|
|
||||||
# path: "/ping"
|
|
||||||
|
|
||||||
# -- Startup probe configuration
|
|
||||||
# @default -- See below
|
|
||||||
startup:
|
|
||||||
# -- sets the probe type when not using a custom probe
|
|
||||||
# @default -- "TCP"
|
|
||||||
type: tcp
|
|
||||||
# -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used
|
|
||||||
# @default -- "/"
|
|
||||||
# path: "/ping"
|
|
||||||
|
|
||||||
# -- Options for all pods
|
|
||||||
# Can be overruled per pod
|
|
||||||
podOptions:
|
|
||||||
automountServiceAccountToken: true
|
|
||||||
|
|
||||||
# -- Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x
|
|
||||||
ingressClass:
|
|
||||||
# true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12
|
|
||||||
enabled: false
|
|
||||||
isDefaultClass: false
|
|
||||||
# Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1"
|
|
||||||
fallbackApiVersion: ""
|
|
||||||
|
|
||||||
# -- Create an IngressRoute for the dashboard
|
|
||||||
ingressRoute:
|
|
||||||
dashboard:
|
|
||||||
enabled: true
|
|
||||||
# Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class)
|
|
||||||
annotations: {}
|
|
||||||
# Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels)
|
|
||||||
labels: {}
|
|
||||||
#
|
|
||||||
# -- Configure providers
|
|
||||||
providers:
|
|
||||||
kubernetesCRD:
|
|
||||||
enabled: true
|
|
||||||
namespaces:
|
|
||||||
[]
|
|
||||||
# - "default"
|
|
||||||
kubernetesIngress:
|
|
||||||
enabled: true
|
|
||||||
# labelSelector: environment=production,method=traefik
|
|
||||||
namespaces:
|
|
||||||
[]
|
|
||||||
# - "default"
|
|
||||||
# IP used for Kubernetes Ingress endpoints
|
|
||||||
publishedService:
|
|
||||||
enabled: true
|
|
||||||
# Published Kubernetes Service to copy status from. Format: namespace/servicename
|
|
||||||
# By default this Traefik service
|
|
||||||
# pathOverride: ""
|
|
||||||
|
|
||||||
# -- Logs
|
|
||||||
# https://docs.traefik.io/observability/logs/
|
|
||||||
logs:
|
|
||||||
# Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on).
|
|
||||||
general:
|
|
||||||
# By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO.
|
|
||||||
level: ERROR
|
|
||||||
# -- Set the format of General Logs to be either Common Log Format or JSON. For more information: https://doc.traefik.io/traefik/observability/logs/#format
|
|
||||||
format: common
|
|
||||||
access:
|
|
||||||
# To enable access logs
|
|
||||||
enabled: false
|
|
||||||
# To write the logs in an asynchronous fashion, specify a bufferingSize option.
|
|
||||||
# This option represents the number of log lines Traefik will keep in memory before writing
|
|
||||||
# them to the selected output. In some cases, this option can greatly help performances.
|
|
||||||
# bufferingSize: 100
|
|
||||||
# Filtering https://docs.traefik.io/observability/access-logs/#filtering
|
|
||||||
filters:
|
|
||||||
{}
|
|
||||||
# statuscodes: "200,300-302"
|
|
||||||
# retryattempts: true
|
|
||||||
# minduration: 10ms
|
|
||||||
# Fields
|
|
||||||
# https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers
|
|
||||||
fields:
|
|
||||||
general:
|
|
||||||
defaultmode: keep
|
|
||||||
names:
|
|
||||||
{}
|
|
||||||
# Examples:
|
|
||||||
# ClientUsername: drop
|
|
||||||
headers:
|
|
||||||
defaultmode: drop
|
|
||||||
names:
|
|
||||||
{}
|
|
||||||
# Examples:
|
|
||||||
# User-Agent: redact
|
|
||||||
# Authorization: drop
|
|
||||||
# Content-Type: keep
|
|
||||||
# -- Set the format of Access Logs to be either Common Log Format or JSON. For more information: https://doc.traefik.io/traefik/observability/access-logs/#format
|
|
||||||
format: common
|
|
||||||
|
|
||||||
metrics:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
type: servicemonitor
|
|
||||||
endpoints:
|
|
||||||
- port: metrics
|
|
||||||
path: /metrics
|
|
||||||
targetSelector: metrics
|
|
||||||
|
|
||||||
globalArguments:
|
|
||||||
- "--global.checknewversion"
|
|
||||||
|
|
||||||
##
|
|
||||||
# -- Additional arguments to be passed at Traefik's binary
|
|
||||||
# All available options available on https://docs.traefik.io/reference/static-configuration/cli/
|
|
||||||
## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"`
|
|
||||||
additionalArguments:
|
|
||||||
- "--serverstransport.insecureskipverify=true"
|
|
||||||
- "--providers.kubernetesingress.allowexternalnameservices=true"
|
|
||||||
|
|
||||||
# -- TLS Options to be created as TLSOption CRDs
|
|
||||||
# https://doc.traefik.io/tccr.io/truecharts/https/tls/#tls-options
|
|
||||||
# Example:
|
|
||||||
tlsOptions:
|
|
||||||
default:
|
|
||||||
sniStrict: false
|
|
||||||
minVersion: VersionTLS12
|
|
||||||
curvePreferences:
|
|
||||||
- CurveP521
|
|
||||||
- CurveP384
|
|
||||||
cipherSuites:
|
|
||||||
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
|
||||||
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
|
|
||||||
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
|
|
||||||
- TLS_AES_128_GCM_SHA256
|
|
||||||
- TLS_AES_256_GCM_SHA384
|
|
||||||
- TLS_CHACHA20_POLY1305_SHA256
|
|
||||||
|
|
||||||
# -- Options for the main traefik service, where the entrypoints traffic comes from
|
|
||||||
# from.
|
|
||||||
service:
|
|
||||||
main:
|
|
||||||
type: LoadBalancer
|
|
||||||
ports:
|
|
||||||
main:
|
|
||||||
port: 9000
|
|
||||||
targetPort: 9000
|
|
||||||
protocol: http
|
|
||||||
# -- Forwarded Headers should never be enabled on Main entrypoint
|
|
||||||
forwardedHeaders:
|
|
||||||
enabled: false
|
|
||||||
# -- Proxy Protocol should never be enabled on Main entrypoint
|
|
||||||
proxyProtocol:
|
|
||||||
enabled: false
|
|
||||||
tcp:
|
|
||||||
enabled: true
|
|
||||||
type: LoadBalancer
|
|
||||||
ports:
|
|
||||||
web:
|
|
||||||
enabled: true
|
|
||||||
port: 9080
|
|
||||||
protocol: http
|
|
||||||
redirectTo: websecure
|
|
||||||
# Options: Empty, 0 (ingore), or positive int
|
|
||||||
# redirectPort:
|
|
||||||
# -- Configure (Forwarded Headers)[https://doc.traefik.io/traefik/routing/entrypoints/#forwarded-headers] Support
|
|
||||||
forwardedHeaders:
|
|
||||||
enabled: false
|
|
||||||
# -- List of trusted IP and CIDR references
|
|
||||||
trustedIPs: []
|
|
||||||
# -- Trust all forwarded headers
|
|
||||||
insecureMode: false
|
|
||||||
# -- Configure (Proxy Protocol Headers)[https://doc.traefik.io/traefik/routing/entrypoints/#proxyprotocol] Support
|
|
||||||
proxyProtocol:
|
|
||||||
enabled: false
|
|
||||||
# -- Only IPs in trustedIPs will lead to remote client address replacement
|
|
||||||
trustedIPs: []
|
|
||||||
# -- Trust every incoming connection
|
|
||||||
insecureMode: false
|
|
||||||
websecure:
|
|
||||||
enabled: true
|
|
||||||
port: 9443
|
|
||||||
protocol: https
|
|
||||||
# -- Configure (Forwarded Headers)[https://doc.traefik.io/traefik/routing/entrypoints/#forwarded-headers] Support
|
|
||||||
forwardedHeaders:
|
|
||||||
enabled: false
|
|
||||||
# -- List of trusted IP and CIDR references
|
|
||||||
trustedIPs: []
|
|
||||||
# -- Trust all forwarded headers
|
|
||||||
insecureMode: false
|
|
||||||
# -- Configure (Proxy Protocol Headers)[https://doc.traefik.io/traefik/routing/entrypoints/#proxyprotocol] Support
|
|
||||||
proxyProtocol:
|
|
||||||
enabled: false
|
|
||||||
# -- Only IPs in trustedIPs will lead to remote client address replacement
|
|
||||||
trustedIPs: []
|
|
||||||
# -- Trust every incoming connection
|
|
||||||
insecureMode: false
|
|
||||||
# tcpexample:
|
|
||||||
# enabled: true
|
|
||||||
# targetPort: 9443
|
|
||||||
# protocol: tcp
|
|
||||||
# tls:
|
|
||||||
# enabled: false
|
|
||||||
# # this is the name of a TLSOption definition
|
|
||||||
# options: ""
|
|
||||||
# certResolver: ""
|
|
||||||
# domains: []
|
|
||||||
# # - main: example.com
|
|
||||||
# # sans:
|
|
||||||
# # - foo.example.com
|
|
||||||
# # - bar.example.com
|
|
||||||
metrics:
|
|
||||||
enabled: true
|
|
||||||
type: ClusterIP
|
|
||||||
ports:
|
|
||||||
metrics:
|
|
||||||
enabled: true
|
|
||||||
port: 9180
|
|
||||||
targetPort: 9180
|
|
||||||
protocol: http
|
|
||||||
# -- Forwarded Headers should never be enabled on Metrics entrypoint
|
|
||||||
forwardedHeaders:
|
|
||||||
enabled: false
|
|
||||||
# -- Proxy Protocol should never be enabled on Metrics entrypoint
|
|
||||||
proxyProtocol:
|
|
||||||
enabled: false
|
|
||||||
# udp:
|
|
||||||
# enabled: false
|
|
||||||
|
|
||||||
# -- Whether Role Based Access Control objects like roles and rolebindings should be created
|
|
||||||
rbac:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
primary: true
|
|
||||||
clusterWide: true
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- ""
|
|
||||||
resources:
|
|
||||||
- services
|
|
||||||
- endpoints
|
|
||||||
- secrets
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- extensions
|
|
||||||
- networking.k8s.io
|
|
||||||
resources:
|
|
||||||
- ingresses
|
|
||||||
- ingressclasses
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- extensions
|
|
||||||
- networking.k8s.io
|
|
||||||
resources:
|
|
||||||
- ingresses/status
|
|
||||||
verbs:
|
|
||||||
- update
|
|
||||||
- apiGroups:
|
|
||||||
- traefik.containo.us
|
|
||||||
resources:
|
|
||||||
- ingressroutes
|
|
||||||
- ingressroutetcps
|
|
||||||
- ingressrouteudps
|
|
||||||
- middlewares
|
|
||||||
- middlewaretcps
|
|
||||||
- tlsoptions
|
|
||||||
- tlsstores
|
|
||||||
- traefikservices
|
|
||||||
- serverstransports
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
|
|
||||||
# -- The service account the pods will use to interact with the Kubernetes API
|
|
||||||
serviceAccount:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
primary: true
|
|
||||||
|
|
||||||
# -- SCALE Middleware Handlers
|
|
||||||
middlewares:
|
|
||||||
basicAuth: []
|
|
||||||
# - name: basicauthexample
|
|
||||||
# users:
|
|
||||||
# - username: testuser
|
|
||||||
# password: testpassword
|
|
||||||
forwardAuth: []
|
|
||||||
# - name: forwardAuthexample
|
|
||||||
# address: https://auth.example.com/
|
|
||||||
# authResponseHeaders:
|
|
||||||
# - X-Secret
|
|
||||||
# - X-Auth-User
|
|
||||||
# authRequestHeaders:
|
|
||||||
# - "Accept"
|
|
||||||
# - "X-CustomHeader"
|
|
||||||
# authResponseHeadersRegex: "^X-"
|
|
||||||
# trustForwardHeader: true
|
|
||||||
chain: []
|
|
||||||
# - name: chainname
|
|
||||||
# middlewares:
|
|
||||||
# - name: compress
|
|
||||||
redirectScheme: []
|
|
||||||
# - name: redirectSchemeName
|
|
||||||
# scheme: https
|
|
||||||
# permanent: true
|
|
||||||
rateLimit: []
|
|
||||||
# - name: rateLimitName
|
|
||||||
# average: 300
|
|
||||||
# burst: 200
|
|
||||||
redirectRegex: []
|
|
||||||
# - name: redirectRegexName
|
|
||||||
# regex: putregexhere
|
|
||||||
# replacement: replacementurlhere
|
|
||||||
# permanent: false
|
|
||||||
stripPrefixRegex: []
|
|
||||||
# - name: stripPrefixRegexName
|
|
||||||
# regex: []
|
|
||||||
ipWhiteList: []
|
|
||||||
# - name: ipWhiteListName
|
|
||||||
# sourceRange: []
|
|
||||||
# ipStrategy:
|
|
||||||
# depth: 2
|
|
||||||
# excludedIPs: []
|
|
||||||
themeParkVersion: v1.3.0
|
|
||||||
themePark: []
|
|
||||||
# - name: themeParkName
|
|
||||||
# -- Supported apps, lower case name
|
|
||||||
# -- https://docs.theme-park.dev/themes
|
|
||||||
# app: appnamehere
|
|
||||||
# -- Supported themes, lower case name
|
|
||||||
# -- https://docs.theme-park.dev/themes/APPNAMEHERE
|
|
||||||
# -- https://docs.theme-park.dev/community-themes
|
|
||||||
# theme: themenamehere
|
|
||||||
# -- https://theme-park.dev or a self hosted url
|
|
||||||
# baseUrl: https://theme-park.dev
|
|
||||||
realIPVersion: v1.0.3
|
|
||||||
# Sets X-Real-Ip with an IP from the X-Forwarded-For or
|
|
||||||
# Cf-Connecting-Ip (If from Cloudflare)
|
|
||||||
# Evaluation of those headers will go from last to first
|
|
||||||
realIP: []
|
|
||||||
# - name: realIPName
|
|
||||||
# -- The real IP will be the first one that is
|
|
||||||
# -- not included in any of the CIDRs passed here
|
|
||||||
# excludedNetworks:
|
|
||||||
# - 1.1.1.1/24
|
|
||||||
addPrefix: []
|
|
||||||
# - name: addPrefixName
|
|
||||||
# prefix: "/foo"
|
|
||||||
geoBlockVersion: v0.2.4
|
|
||||||
geoBlock: []
|
|
||||||
# -- https://github.com/PascalMinder/geoblock
|
|
||||||
# - name: geoBlockName
|
|
||||||
# allowLocalRequests: true
|
|
||||||
# logLocalRequests: false
|
|
||||||
# logAllowedRequests: false
|
|
||||||
# logApiRequests: false
|
|
||||||
# api: https://get.geojs.io/v1/ip/country/{ip}
|
|
||||||
# apiTimeoutMs: 500
|
|
||||||
# cacheSize: 25
|
|
||||||
# forceMonthlyUpdate: true
|
|
||||||
# allowUnknownCountries: false
|
|
||||||
# unknownCountryApiResponse: nil
|
|
||||||
# blackListMode: false
|
|
||||||
# countries:
|
|
||||||
# - RU
|
|
||||||
|
|
||||||
portalhook:
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
plugins:
|
|
||||||
enabled: true
|
|
||||||
mountPath: "/plugins-storage"
|
|
||||||
type: emptyDir
|
|
||||||
|
|
||||||
portal:
|
|
||||||
open:
|
|
||||||
enabled: true
|
|
||||||
path: /dashboard/
|
|
||||||
override:
|
|
||||||
protocol: http
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1 +0,0 @@
|
||||||
{{- include "tc.v1.common.lib.chart.notes" $ -}}
|
|
|
@ -1,182 +0,0 @@
|
||||||
{{/* Define the args */}}
|
|
||||||
{{- define "traefik.args" -}}
|
|
||||||
args:
|
|
||||||
{{/* merge all ports */}}
|
|
||||||
{{- $ports := dict }}
|
|
||||||
{{- range $.Values.service }}
|
|
||||||
{{- range $name, $value := .ports }}
|
|
||||||
{{- $_ := set $ports $name $value }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{/* start of actual arguments */}}
|
|
||||||
{{- with .Values.globalArguments }}
|
|
||||||
{{- range . }}
|
|
||||||
- {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $config := $ports }}
|
|
||||||
{{- if $config }}
|
|
||||||
{{- if or ( eq $config.protocol "http" ) ( eq $config.protocol "https" ) ( eq $config.protocol "tcp" ) }}
|
|
||||||
{{- $_ := set $config "protocol" "tcp" }}
|
|
||||||
{{- end }}
|
|
||||||
- "--entryPoints.{{$name}}.address=:{{ $config.port }}/{{ default "tcp" $config.protocol | lower }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
- "--api.dashboard=true"
|
|
||||||
- "--ping=true"
|
|
||||||
{{- if .Values.traefikMetrics }}
|
|
||||||
{{- if .Values.traefikMetrics.datadog }}
|
|
||||||
- "--metrics.datadog=true"
|
|
||||||
- "--metrics.datadog.address={{ .Values.traefikMetrics.datadog.address }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.traefikMetrics.influxdb }}
|
|
||||||
- "--metrics.influxdb=true"
|
|
||||||
- "--metrics.influxdb.address={{ .Values.traefikMetrics.influxdb.address }}"
|
|
||||||
- "--metrics.influxdb.protocol={{ .Values.traefikMetrics.influxdb.protocol }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.traefikMetrics.statsd }}
|
|
||||||
- "--metrics.statsd=true"
|
|
||||||
- "--metrics.statsd.address={{ .Values.traefikMetrics.statsd.address }}"
|
|
||||||
{{- if or .Values.traefikMetrics.prometheus }}
|
|
||||||
- "--metrics.prometheus=true"
|
|
||||||
- "--metrics.prometheus.entrypoint=metrics"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if or .Values.metrics.main.enabled }}
|
|
||||||
- "--metrics.prometheus=true"
|
|
||||||
- "--metrics.prometheus.entrypoint=metrics"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.providers.kubernetesCRD.enabled }}
|
|
||||||
- "--providers.kubernetescrd"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.providers.kubernetesIngress.enabled }}
|
|
||||||
- "--providers.kubernetesingress"
|
|
||||||
{{- if .Values.providers.kubernetesIngress.publishedService.enabled }}
|
|
||||||
- "--providers.kubernetesingress.ingressendpoint.publishedservice={{ template "providers.kubernetesIngress.publishedServicePath" . }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.providers.kubernetesIngress.labelSelector }}
|
|
||||||
- "--providers.kubernetesingress.labelSelector={{ .Values.providers.kubernetesIngress.labelSelector }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if and .Values.rbac.enabled .Values.rbac.namespaced }}
|
|
||||||
{{- if .Values.providers.kubernetesCRD.enabled }}
|
|
||||||
- "--providers.kubernetescrd.namespaces={{ template "providers.kubernetesCRD.namespaces" . }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.providers.kubernetesIngress.enabled }}
|
|
||||||
- "--providers.kubernetesingress.namespaces={{ template "providers.kubernetesIngress.namespaces" . }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.ingressClass.enabled }}
|
|
||||||
- "--providers.kubernetesingress.ingressclass={{ .Release.Name }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- range $entrypoint, $config := $ports }}
|
|
||||||
{{/* add args for proxyProtocol support */}}
|
|
||||||
{{- if $config.proxyProtocol }}
|
|
||||||
{{- if $config.proxyProtocol.enabled }}
|
|
||||||
{{- if $config.proxyProtocol.insecureMode }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.proxyProtocol.insecure"
|
|
||||||
{{- end }}
|
|
||||||
{{- if not ( empty $config.proxyProtocol.trustedIPs ) }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.proxyProtocol.trustedIPs={{ join "," $config.proxyProtocol.trustedIPs }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{/* add args for forwardedHeaders support */}}
|
|
||||||
{{- if $config.forwardedHeaders.enabled }}
|
|
||||||
{{- if not ( empty $config.forwardedHeaders.trustedIPs ) }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.forwardedHeaders.trustedIPs={{ join "," $config.forwardedHeaders.trustedIPs }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if $config.forwardedHeaders.insecureMode }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.forwardedHeaders.insecure"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{/* end forwardedHeaders configuration */}}
|
|
||||||
{{- if $config.redirectTo }}
|
|
||||||
{{- $toPort := index $ports $config.redirectTo }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $toPort.port }}"
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https"
|
|
||||||
{{- else if $config.redirectPort }}
|
|
||||||
{{ if gt $config.redirectPort 0.0 }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $config.redirectPort }}"
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if or ( $config.tls ) ( eq $config.protocol "https" ) }}
|
|
||||||
{{- if or ( $config.tls.enabled ) ( eq $config.protocol "https" ) }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls=true"
|
|
||||||
{{- if $config.tls.options }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls.options={{ $config.tls.options }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if $config.tls.certResolver }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls.certResolver={{ $config.tls.certResolver }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if $config.tls.domains }}
|
|
||||||
{{- range $index, $domain := $config.tls.domains }}
|
|
||||||
{{- if $domain.main }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].main={{ $domain.main }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if $domain.sans }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].sans={{ join "," $domain.sans }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with .Values.logs }}
|
|
||||||
- "--log.format={{ .general.format }}"
|
|
||||||
{{- if ne .general.level "ERROR" }}
|
|
||||||
- "--log.level={{ .general.level | upper }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .access.enabled }}
|
|
||||||
- "--accesslog=true"
|
|
||||||
- "--accesslog.format={{ .access.format }}"
|
|
||||||
{{- if .access.bufferingsize }}
|
|
||||||
- "--accesslog.bufferingsize={{ .access.bufferingsize }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .access.filters }}
|
|
||||||
{{- if .access.filters.statuscodes }}
|
|
||||||
- "--accesslog.filters.statuscodes={{ .access.filters.statuscodes }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .access.filters.retryattempts }}
|
|
||||||
- "--accesslog.filters.retryattempts"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .access.filters.minduration }}
|
|
||||||
- "--accesslog.filters.minduration={{ .access.filters.minduration }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
- "--accesslog.fields.defaultmode={{ .access.fields.general.defaultmode }}"
|
|
||||||
{{- range $fieldname, $fieldaction := .access.fields.general.names }}
|
|
||||||
- "--accesslog.fields.names.{{ $fieldname }}={{ $fieldaction }}"
|
|
||||||
{{- end }}
|
|
||||||
- "--accesslog.fields.headers.defaultmode={{ .access.fields.headers.defaultmode }}"
|
|
||||||
{{- range $fieldname, $fieldaction := .access.fields.headers.names }}
|
|
||||||
- "--accesslog.fields.headers.names.{{ $fieldname }}={{ $fieldaction }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{/* theme.park */}}
|
|
||||||
{{- if .Values.middlewares.themePark }}
|
|
||||||
- "--experimental.plugins.traefik-themepark.modulename=github.com/packruler/traefik-themepark"
|
|
||||||
- "--experimental.plugins.traefik-themepark.version={{ .Values.middlewares.themeParkVersion }}"
|
|
||||||
{{- end }}
|
|
||||||
{{/* End of theme.park */}}
|
|
||||||
{{/* GeoBlock */}}
|
|
||||||
{{- if .Values.middlewares.geoBlock }}
|
|
||||||
- "--experimental.plugins.GeoBlock.modulename=github.com/PascalMinder/geoblock"
|
|
||||||
- "--experimental.plugins.GeoBlock.version={{ .Values.middlewares.geoBlockVersion }}"
|
|
||||||
{{- end }}
|
|
||||||
{{/* End of GeoBlock */}}
|
|
||||||
{{/* RealIP */}}
|
|
||||||
{{- if .Values.middlewares.realIP }}
|
|
||||||
- "--experimental.plugins.traefik-real-ip.modulename=github.com/soulbalz/traefik-real-ip"
|
|
||||||
- "--experimental.plugins.traefik-real-ip.version={{ .Values.middlewares.realIPVersion }}"
|
|
||||||
{{- end }}
|
|
||||||
{{/* End of RealIP */}}
|
|
||||||
{{- with .Values.additionalArguments }}
|
|
||||||
{{- range . }}
|
|
||||||
- {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,22 +0,0 @@
|
||||||
{{/*
|
|
||||||
Construct the path for the providers.kubernetesingress.ingressendpoint.publishedservice.
|
|
||||||
By convention this will simply use the <namespace>/<service-name> to match the name of the
|
|
||||||
service generated.
|
|
||||||
Users can provide an override for an explicit service they want bound via `.Values.providers.kubernetesIngress.publishedService.pathOverride`
|
|
||||||
*/}}
|
|
||||||
{{- define "providers.kubernetesIngress.publishedServicePath" -}}
|
|
||||||
{{- $fullName := include "tc.v1.common.lib.chart.names.fullname" . -}}
|
|
||||||
{{- $defServiceName := printf "%s/%s-tcp" .Release.Namespace $fullName -}}
|
|
||||||
{{- $servicePath := default $defServiceName .Values.providers.kubernetesIngress.publishedService.pathOverride }}
|
|
||||||
{{- print $servicePath | trimSuffix "-" -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
Construct a comma-separated list of whitelisted namespaces
|
|
||||||
*/}}
|
|
||||||
{{- define "providers.kubernetesIngress.namespaces" -}}
|
|
||||||
{{- default .Release.Namespace (join "," .Values.providers.kubernetesIngress.namespaces) }}
|
|
||||||
{{- end -}}
|
|
||||||
{{- define "providers.kubernetesCRD.namespaces" -}}
|
|
||||||
{{- default .Release.Namespace (join "," .Values.providers.kubernetesCRD.namespaces) }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,24 +0,0 @@
|
||||||
{{/* Define the ingressClass */}}
|
|
||||||
{{- define "traefik.ingressClass" -}}
|
|
||||||
---
|
|
||||||
{{ if .Values.ingressClass.enabled }}
|
|
||||||
{{- if .Capabilities.APIVersions.Has "networking.k8s.io/v1/IngressClass" }}
|
|
||||||
apiVersion: networking.k8s.io/v1
|
|
||||||
{{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1/IngressClass" }}
|
|
||||||
apiVersion: networking.k8s.io/v1beta1
|
|
||||||
{{- else if or (eq .Values.ingressClass.fallbackApiVersion "v1beta1") (eq .Values.ingressClass.fallbackApiVersion "v1") }}
|
|
||||||
apiVersion: {{ printf "networking.k8s.io/%s" .Values.ingressClass.fallbackApiVersion }}
|
|
||||||
{{- else }}
|
|
||||||
{{- fail "\n\n ERROR: You must have at least networking.k8s.io/v1beta1 to use ingressClass" }}
|
|
||||||
{{- end }}
|
|
||||||
kind: IngressClass
|
|
||||||
metadata:
|
|
||||||
annotations:
|
|
||||||
ingressclass.kubernetes.io/is-default-class: {{ .Values.ingressClass.isDefaultClass | quote }}
|
|
||||||
labels:
|
|
||||||
{{- include "tc.v1.common.lib.metadata.allLabels" . | nindent 4 }}
|
|
||||||
name: {{ .Release.Name }}
|
|
||||||
spec:
|
|
||||||
controller: traefik.io/ingress-controller
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
|
@ -1,34 +0,0 @@
|
||||||
{{/* Define the ingressRoute */}}
|
|
||||||
{{- define "traefik.ingressRoute" -}}
|
|
||||||
{{ if .Values.ingressRoute.dashboard.enabled }}
|
|
||||||
|
|
||||||
{{- $ingressRouteLabels := .Values.ingressRoute.dashboard.labels -}}
|
|
||||||
{{- $ingressRouteAnnotations := .Values.ingressRoute.dashboard.annotations -}}
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: IngressRoute
|
|
||||||
metadata:
|
|
||||||
name: {{ include "tc.v1.common.lib.chart.names.fullname" . }}-dashboard
|
|
||||||
{{- $labels := (mustMerge ($ingressRouteLabels | default dict) (include "tc.v1.common.lib.metadata.allLabels" $ | fromYaml)) -}}
|
|
||||||
{{- with (include "tc.v1.common.lib.metadata.render" (dict "rootCtx" $ "labels" $labels) | trim) }}
|
|
||||||
labels:
|
|
||||||
{{- . | nindent 4 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- $annotations := (mustMerge ($ingressRouteAnnotations | default dict) (include "tc.v1.common.lib.metadata.allAnnotations" $ | fromYaml)) -}}
|
|
||||||
{{- with (include "tc.v1.common.lib.metadata.render" (dict "rootCtx" $ "annotations" $annotations) | trim) }}
|
|
||||||
annotations:
|
|
||||||
{{- . | nindent 4 }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
spec:
|
|
||||||
entryPoints:
|
|
||||||
- main
|
|
||||||
routes:
|
|
||||||
- match: PathPrefix(`/dashboard`) || PathPrefix(`/api`)
|
|
||||||
kind: Rule
|
|
||||||
services:
|
|
||||||
- name: api@internal
|
|
||||||
kind: TraefikService
|
|
||||||
{{ end }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,26 +0,0 @@
|
||||||
{{/* Define the portalHook */}}
|
|
||||||
{{- define "traefik.portalhook" -}}
|
|
||||||
{{- if .Values.portalhook.enabled }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: v1
|
|
||||||
kind: ConfigMap
|
|
||||||
metadata:
|
|
||||||
name: portalhook
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
data:
|
|
||||||
{{- $ports := dict }}
|
|
||||||
{{- range $.Values.service }}
|
|
||||||
{{- range $name, $value := .ports }}
|
|
||||||
{{- $_ := set $ports $name $value }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $value := $ports }}
|
|
||||||
{{ $name }}: {{ $value.port | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,12 +0,0 @@
|
||||||
{{/* Define the tlsOptions */}}
|
|
||||||
{{- define "traefik.tlsOptions" -}}
|
|
||||||
{{- range $name, $config := .Values.tlsOptions }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: TLSOption
|
|
||||||
metadata:
|
|
||||||
name: {{ $name }}
|
|
||||||
spec:
|
|
||||||
{{- toYaml $config | nindent 2 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,23 +0,0 @@
|
||||||
{{/* Make sure all variables are set properly */}}
|
|
||||||
{{- include "tc.v1.common.loader.init" . }}
|
|
||||||
|
|
||||||
{{- $newArgs := (include "traefik.args" . | fromYaml) }}
|
|
||||||
{{- $_ := set .Values "newArgs" $newArgs -}}
|
|
||||||
{{- $mergedargs := concat $.Values.workload.main.podSpec.containers.main.args .Values.newArgs.args }}
|
|
||||||
{{- $_ := set $.Values.workload.main.podSpec.containers.main "args" $mergedargs -}}
|
|
||||||
|
|
||||||
{{- include "traefik.portalhook" . }}
|
|
||||||
{{- include "traefik.tlsOptions" . }}
|
|
||||||
{{- include "traefik.ingressRoute" . }}
|
|
||||||
{{- include "traefik.ingressClass" . }}
|
|
||||||
|
|
||||||
{{- with .Values.ingress -}}
|
|
||||||
{{- with .main -}}
|
|
||||||
{{- if .enabled -}}
|
|
||||||
{{- $_ := set $.Values.portal.open.override "protocol" "https" -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Render the templates */}}
|
|
||||||
{{ include "tc.v1.common.loader.apply" . }}
|
|
|
@ -1,17 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $index, $middlewareData := .Values.middlewares.addPrefix }}
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
addPrefix:
|
|
||||||
prefix: {{ $middlewareData.prefix }}
|
|
||||||
{{- end }}
|
|
|
@ -1,62 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: compress
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
compress: {}
|
|
||||||
---
|
|
||||||
# Here, an average of 300 requests per second is allowed.
|
|
||||||
# In addition, a burst of 200 requests is allowed.
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: basic-ratelimit
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
rateLimit:
|
|
||||||
average: 600
|
|
||||||
burst: 400
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: basic-secure-headers
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
headers:
|
|
||||||
accessControlAllowMethods:
|
|
||||||
- GET
|
|
||||||
- OPTIONS
|
|
||||||
- HEAD
|
|
||||||
- PUT
|
|
||||||
accessControlMaxAge: 100
|
|
||||||
stsSeconds: 63072000
|
|
||||||
# stsIncludeSubdomains: false
|
|
||||||
# stsPreload: false
|
|
||||||
forceSTSHeader: true
|
|
||||||
contentTypeNosniff: true
|
|
||||||
browserXssFilter: true
|
|
||||||
referrerPolicy: same-origin
|
|
||||||
customRequestHeaders:
|
|
||||||
X-Forwarded-Proto: "https"
|
|
||||||
customResponseHeaders:
|
|
||||||
server: ''
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: chain-basic
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
chain:
|
|
||||||
middlewares:
|
|
||||||
- name: basic-ratelimit
|
|
||||||
- name: basic-secure-headers
|
|
||||||
- name: compress
|
|
|
@ -1,34 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.basicAuth }}
|
|
||||||
---
|
|
||||||
{{- $users := list }}
|
|
||||||
{{ range $index, $userdata := $middlewareData.users }}
|
|
||||||
{{ $users = append $users ( htpasswd $userdata.username $userdata.password ) }}
|
|
||||||
{{ end }}
|
|
||||||
|
|
||||||
apiVersion: v1
|
|
||||||
kind: Secret
|
|
||||||
metadata:
|
|
||||||
name: {{printf "%v-%v" $middlewareData.name "secret" }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
type: Opaque
|
|
||||||
stringData:
|
|
||||||
users: |
|
|
||||||
{{- range $index, $user := $users }}
|
|
||||||
{{ printf "%s" $user }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
# Declaring the user list
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
basicAuth:
|
|
||||||
secret: {{printf "%v-%v" $middlewareData.name "secret" }}
|
|
||||||
{{ end }}
|
|
|
@ -1,21 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.chain }}
|
|
||||||
|
|
||||||
---
|
|
||||||
# Declaring the user list
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
chain:
|
|
||||||
middlewares:
|
|
||||||
{{ range $index, $middleware := .middlewares }}
|
|
||||||
- name: {{ printf "%v-%v@%v" $namespace $middleware "kubernetescrd" }}
|
|
||||||
{{ end }}
|
|
||||||
{{ end }}
|
|
|
@ -1,34 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.forwardAuth }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
forwardAuth:
|
|
||||||
address: {{ $middlewareData.address }}
|
|
||||||
{{- with $middlewareData.authResponseHeaders }}
|
|
||||||
authResponseHeaders:
|
|
||||||
{{- toYaml . | nindent 4 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with $middlewareData.authRequestHeaders }}
|
|
||||||
authRequestHeaders:
|
|
||||||
{{- toYaml . | nindent 4 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $middlewareData.authResponseHeadersRegex }}
|
|
||||||
authResponseHeadersRegex: {{ $middlewareData.authResponseHeadersRegex }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $middlewareData.trustForwardHeader }}
|
|
||||||
trustForwardHeader: true
|
|
||||||
{{- end }}
|
|
||||||
{{- with $middlewareData.tls }}
|
|
||||||
tls:
|
|
||||||
insecureSkipVerify: {{ .insecureSkipVerify | default false }}
|
|
||||||
{{- end }}
|
|
||||||
{{ end }}
|
|
|
@ -1,35 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $index, $middlewareData := .Values.middlewares.geoBlock }}
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
plugin:
|
|
||||||
GeoBlock:
|
|
||||||
allowLocalRequests: {{ $middlewareData.allowLocalRequests }}
|
|
||||||
logLocalRequests: {{ $middlewareData.logLocalRequests }}
|
|
||||||
logAllowedRequests: {{ $middlewareData.logAllowedRequests }}
|
|
||||||
logApiRequests: {{ $middlewareData.logApiRequests }}
|
|
||||||
api: {{ $middlewareData.api }}
|
|
||||||
apiTimeoutMs: {{ $middlewareData.apiTimeoutMs }}
|
|
||||||
cacheSize: {{ $middlewareData.cacheSize }}
|
|
||||||
forceMonthlyUpdate: {{ $middlewareData.forceMonthlyUpdate }}
|
|
||||||
allowUnknownCountries: {{ $middlewareData.allowUnknownCountries }}
|
|
||||||
unknownCountryApiResponse: {{ $middlewareData.unknownCountryApiResponse }}
|
|
||||||
blackListMode: {{ $middlewareData.blackListMode }}
|
|
||||||
{{- if not $middlewareData.countries }}
|
|
||||||
{{- fail "You have to define at least one country..." }}
|
|
||||||
{{- end }}
|
|
||||||
countries:
|
|
||||||
{{- range $middlewareData.countries }}
|
|
||||||
- {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
|
@ -1,33 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.ipWhiteList }}
|
|
||||||
|
|
||||||
---
|
|
||||||
# Declaring the user list
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
ipWhiteList:
|
|
||||||
sourceRange:
|
|
||||||
{{- range $middlewareData.sourceRange }}
|
|
||||||
- {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $middlewareData.ipStrategy }}
|
|
||||||
ipStrategy:
|
|
||||||
{{- if $middlewareData.ipStrategy.depth }}
|
|
||||||
depth: {{ $middlewareData.ipStrategy.depth }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if $middlewareData.ipStrategy.excludedIPs }}
|
|
||||||
excludedIPs:
|
|
||||||
{{- range $middlewareData.ipStrategy.excludedIPs }}
|
|
||||||
- {{ . }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{ end }}
|
|
|
@ -1,19 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.rateLimit }}
|
|
||||||
|
|
||||||
---
|
|
||||||
# Declaring the user list
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
rateLimit:
|
|
||||||
average: {{ $middlewareData.average }}
|
|
||||||
burst: {{ $middlewareData.burst }}
|
|
||||||
{{ end }}
|
|
|
@ -1,21 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $index, $middlewareData := .Values.middlewares.realIP }}
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
plugin:
|
|
||||||
traefik-real-ip:
|
|
||||||
excludednets:
|
|
||||||
{{- range $middlewareData.excludedNetworks }}
|
|
||||||
- {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
|
@ -1,19 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.redirectScheme }}
|
|
||||||
|
|
||||||
---
|
|
||||||
# Declaring the user list
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
redirectScheme:
|
|
||||||
scheme: {{ $middlewareData.scheme }}
|
|
||||||
permanent: {{ $middlewareData.permanent }}
|
|
||||||
{{ end }}
|
|
|
@ -1,20 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.redirectRegex }}
|
|
||||||
|
|
||||||
---
|
|
||||||
# Declaring the user list
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
redirectRegex:
|
|
||||||
regex: {{ $middlewareData.regex | quote }}
|
|
||||||
replacement: {{ $middlewareData.replacement | quote }}
|
|
||||||
permanent: {{ $middlewareData.permanent }}
|
|
||||||
{{ end }}
|
|
|
@ -1,20 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.stripPrefixRegex }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
stripPrefixRegex:
|
|
||||||
regex:
|
|
||||||
{{- range $middlewareData.regex }}
|
|
||||||
- {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{ end }}
|
|
|
@ -1,29 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: tc-opencors-chain
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
chain:
|
|
||||||
middlewares:
|
|
||||||
- name: basic-ratelimit
|
|
||||||
- name: tc-opencors-headers
|
|
||||||
- name: compress
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: tc-closedcors-chain
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
chain:
|
|
||||||
middlewares:
|
|
||||||
- name: basic-ratelimit
|
|
||||||
- name: tc-closedcors-headers
|
|
||||||
- name: compress
|
|
|
@ -1,62 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: tc-opencors-headers
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
headers:
|
|
||||||
accessControlAllowHeaders:
|
|
||||||
- '*'
|
|
||||||
accessControlAllowMethods:
|
|
||||||
- GET
|
|
||||||
- OPTIONS
|
|
||||||
- HEAD
|
|
||||||
- PUT
|
|
||||||
- POST
|
|
||||||
accessControlAllowOriginList:
|
|
||||||
- '*'
|
|
||||||
accessControlMaxAge: 100
|
|
||||||
browserXssFilter: true
|
|
||||||
contentTypeNosniff: true
|
|
||||||
customRequestHeaders:
|
|
||||||
X-Forwarded-Proto: https
|
|
||||||
customResponseHeaders:
|
|
||||||
server: ""
|
|
||||||
forceSTSHeader: true
|
|
||||||
referrerPolicy: same-origin
|
|
||||||
sslForceHost: true
|
|
||||||
sslRedirect: true
|
|
||||||
stsSeconds: 63072000
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: tc-closedcors-headers
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
headers:
|
|
||||||
accessControlAllowMethods:
|
|
||||||
- GET
|
|
||||||
- OPTIONS
|
|
||||||
- HEAD
|
|
||||||
- PUT
|
|
||||||
accessControlMaxAge: 100
|
|
||||||
sslRedirect: true
|
|
||||||
stsSeconds: 63072000
|
|
||||||
# stsIncludeSubdomains: false
|
|
||||||
# stsPreload: false
|
|
||||||
forceSTSHeader: true
|
|
||||||
contentTypeNosniff: true
|
|
||||||
browserXssFilter: true
|
|
||||||
sslForceHost: true
|
|
||||||
referrerPolicy: same-origin
|
|
||||||
customRequestHeaders:
|
|
||||||
X-Forwarded-Proto: "https"
|
|
||||||
customResponseHeaders:
|
|
||||||
server: ''
|
|
|
@ -1,25 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: tc-nextcloud-redirectregex-dav
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
redirectRegex:
|
|
||||||
regex: "https://(.*)/.well-known/(card|cal)dav"
|
|
||||||
replacement: "https://${1}/remote.php/dav/"
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: tc-nextcloud-chain
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
chain:
|
|
||||||
middlewares:
|
|
||||||
- name: tc-nextcloud-redirectregex-dav
|
|
|
@ -1,26 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $index, $middlewareData := .Values.middlewares.themePark }}
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
plugin:
|
|
||||||
traefik-themepark:
|
|
||||||
app: {{ $middlewareData.appName }}
|
|
||||||
theme: {{ $middlewareData.themeName }}
|
|
||||||
baseUrl: {{ $middlewareData.baseUrl }}
|
|
||||||
{{- if $middlewareData.addons }}
|
|
||||||
addons:
|
|
||||||
{{- range $middlewareData.addons }}
|
|
||||||
- {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
|
@ -1,99 +0,0 @@
|
||||||
**Important:**
|
|
||||||
*for the complete changelog, please refer to the website*
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.17](https://github.com/truecharts/charts/compare/traefik-17.0.16...traefik-17.0.17) (2023-04-11)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7929](https://github.com/truecharts/charts/issues/7929))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.16](https://github.com/truecharts/charts/compare/traefik-17.0.15...traefik-17.0.16) (2023-04-09)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7907](https://github.com/truecharts/charts/issues/7907))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.15](https://github.com/truecharts/charts/compare/traefik-17.0.14...traefik-17.0.15) (2023-04-07)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update container image tccr.io/truecharts/traefik to v2.9.9 ([#7883](https://github.com/truecharts/charts/issues/7883))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.14](https://github.com/truecharts/charts/compare/traefik-17.0.13...traefik-17.0.14) (2023-04-05)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common to 32 on enterprise charts
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.13](https://github.com/truecharts/charts/compare/traefik-17.0.12...traefik-17.0.13) (2023-03-25)
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.12](https://github.com/truecharts/charts/compare/traefik-17.0.11...traefik-17.0.12) (2023-03-19)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- bump common and deps on enterprise train ([#7819](https://github.com/truecharts/charts/issues/7819))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.11](https://github.com/truecharts/charts/compare/traefik-17.0.10...traefik-17.0.11) (2023-03-19)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- fix portal button ([#7811](https://github.com/truecharts/charts/issues/7811))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.10](https://github.com/truecharts/charts/compare/traefik-17.0.9...traefik-17.0.10) (2023-03-11)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- bump to get metrics working
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.9](https://github.com/truecharts/charts/compare/traefik-17.0.8...traefik-17.0.9) (2023-03-11)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- bump to release fix for new service monitor
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.8](https://github.com/truecharts/charts/compare/traefik-17.0.7...traefik-17.0.8) (2023-03-11)
|
|
||||||
|
|
||||||
### Feat
|
|
||||||
|
|
||||||
- generate a service monitor ([#7785](https://github.com/truecharts/charts/issues/7785))
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.7](https://github.com/truecharts/charts/compare/traefik-17.0.6...traefik-17.0.7) (2023-03-07)
|
|
||||||
|
|
||||||
### Fix
|
|
||||||
|
|
||||||
- actually fix labels ([#7763](https://github.com/truecharts/charts/issues/7763))
|
|
||||||
|
|
||||||
|
|
|
@ -1,31 +0,0 @@
|
||||||
apiVersion: v2
|
|
||||||
appVersion: "2.9.9"
|
|
||||||
dependencies:
|
|
||||||
- name: common
|
|
||||||
repository: https://library-charts.truecharts.org
|
|
||||||
version: 12.4.3
|
|
||||||
deprecated: false
|
|
||||||
description: Traefik is a flexible reverse proxy and Ingress Provider.
|
|
||||||
home: https://truecharts.org/charts/enterprise/traefik
|
|
||||||
icon: https://truecharts.org/img/hotlink-ok/chart-icons/traefik.png
|
|
||||||
keywords:
|
|
||||||
- traefik
|
|
||||||
- ingress
|
|
||||||
kubeVersion: ">=1.16.0-0"
|
|
||||||
maintainers:
|
|
||||||
- email: info@truecharts.org
|
|
||||||
name: TrueCharts
|
|
||||||
url: https://truecharts.org
|
|
||||||
name: traefik
|
|
||||||
sources:
|
|
||||||
- https://github.com/truecharts/charts/tree/master/charts/enterprise/traefik
|
|
||||||
- https://github.com/traefik/traefik
|
|
||||||
- https://github.com/traefik/traefik-helm-chart
|
|
||||||
- https://traefik.io/
|
|
||||||
type: application
|
|
||||||
version: 17.0.17
|
|
||||||
annotations:
|
|
||||||
truecharts.org/catagories: |
|
|
||||||
- network
|
|
||||||
truecharts.org/SCALE-support: "true"
|
|
||||||
truecharts.org/grade: U
|
|
|
@ -1,106 +0,0 @@
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Parameters
|
|
||||||
|
|
||||||
Licensor: The TrueCharts Project, it's owner and it's contributors
|
|
||||||
Licensed Work: The TrueCharts "Traefik" Helm Chart
|
|
||||||
Additional Use Grant: You may use the licensed work in production, as long
|
|
||||||
as it is directly sourced from a TrueCharts provided
|
|
||||||
official repository, catalog or source. You may also make private
|
|
||||||
modification to the directly sourced licenced work,
|
|
||||||
when used in production.
|
|
||||||
|
|
||||||
The following cases are, due to their nature, also
|
|
||||||
defined as 'production use' and explicitly prohibited:
|
|
||||||
- Bundling, including or displaying the licensed work
|
|
||||||
with(in) another work intended for production use,
|
|
||||||
with the apparent intend of facilitating and/or
|
|
||||||
promoting production use by third parties in
|
|
||||||
violation of this license.
|
|
||||||
|
|
||||||
Change Date: 2050-01-01
|
|
||||||
|
|
||||||
Change License: 3-clause BSD license
|
|
||||||
|
|
||||||
For information about alternative licensing arrangements for the Software,
|
|
||||||
please contact: legal@truecharts.org
|
|
||||||
|
|
||||||
Notice
|
|
||||||
|
|
||||||
The Business Source License (this document, or the “License”) is not an Open
|
|
||||||
Source license. However, the Licensed Work will eventually be made available
|
|
||||||
under an Open Source License, as stated in this License.
|
|
||||||
|
|
||||||
License text copyright (c) 2017 MariaDB Corporation Ab, All Rights Reserved.
|
|
||||||
“Business Source License” is a trademark of MariaDB Corporation Ab.
|
|
||||||
|
|
||||||
-----------------------------------------------------------------------------
|
|
||||||
|
|
||||||
Business Source License 1.1
|
|
||||||
|
|
||||||
Terms
|
|
||||||
|
|
||||||
The Licensor hereby grants you the right to copy, modify, create derivative
|
|
||||||
works, redistribute, and make non-production use of the Licensed Work. The
|
|
||||||
Licensor may make an Additional Use Grant, above, permitting limited
|
|
||||||
production use.
|
|
||||||
|
|
||||||
Effective on the Change Date, or the fourth anniversary of the first publicly
|
|
||||||
available distribution of a specific version of the Licensed Work under this
|
|
||||||
License, whichever comes first, the Licensor hereby grants you rights under
|
|
||||||
the terms of the Change License, and the rights granted in the paragraph
|
|
||||||
above terminate.
|
|
||||||
|
|
||||||
If your use of the Licensed Work does not comply with the requirements
|
|
||||||
currently in effect as described in this License, you must purchase a
|
|
||||||
commercial license from the Licensor, its affiliated entities, or authorized
|
|
||||||
resellers, or you must refrain from using the Licensed Work.
|
|
||||||
|
|
||||||
All copies of the original and modified Licensed Work, and derivative works
|
|
||||||
of the Licensed Work, are subject to this License. This License applies
|
|
||||||
separately for each version of the Licensed Work and the Change Date may vary
|
|
||||||
for each version of the Licensed Work released by Licensor.
|
|
||||||
|
|
||||||
You must conspicuously display this License on each original or modified copy
|
|
||||||
of the Licensed Work. If you receive the Licensed Work in original or
|
|
||||||
modified form from a third party, the terms and conditions set forth in this
|
|
||||||
License apply to your use of that work.
|
|
||||||
|
|
||||||
Any use of the Licensed Work in violation of this License will automatically
|
|
||||||
terminate your rights under this License for the current and all other
|
|
||||||
versions of the Licensed Work.
|
|
||||||
|
|
||||||
This License does not grant you any right in any trademark or logo of
|
|
||||||
Licensor or its affiliates (provided that you may use a trademark or logo of
|
|
||||||
Licensor as expressly required by this License).
|
|
||||||
|
|
||||||
TO THE EXTENT PERMITTED BY APPLICABLE LAW, THE LICENSED WORK IS PROVIDED ON
|
|
||||||
AN “AS IS” BASIS. LICENSOR HEREBY DISCLAIMS ALL WARRANTIES AND CONDITIONS,
|
|
||||||
EXPRESS OR IMPLIED, INCLUDING (WITHOUT LIMITATION) WARRANTIES OF
|
|
||||||
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NON-INFRINGEMENT, AND
|
|
||||||
TITLE.
|
|
||||||
|
|
||||||
MariaDB hereby grants you permission to use this License’s text to license
|
|
||||||
your works, and to refer to it using the trademark “Business Source License”,
|
|
||||||
as long as you comply with the Covenants of Licensor below.
|
|
||||||
|
|
||||||
Covenants of Licensor
|
|
||||||
|
|
||||||
In consideration of the right to use this License’s text and the “Business
|
|
||||||
Source License” name and trademark, Licensor covenants to MariaDB, and to all
|
|
||||||
other recipients of the licensed work to be provided by Licensor:
|
|
||||||
|
|
||||||
1. To specify as the Change License the GPL Version 2.0 or any later version,
|
|
||||||
or a license that is compatible with GPL Version 2.0 or a later version,
|
|
||||||
where “compatible” means that software provided under the Change License can
|
|
||||||
be included in a program with software provided under GPL Version 2.0 or a
|
|
||||||
later version. Licensor may specify additional Change Licenses without
|
|
||||||
limitation.
|
|
||||||
|
|
||||||
2. To either: (a) specify an additional grant of rights to use that does not
|
|
||||||
impose any additional restriction on the right granted in this License, as
|
|
||||||
the Additional Use Grant; or (b) insert the text “None”.
|
|
||||||
|
|
||||||
3. To specify a Change Date.
|
|
||||||
|
|
||||||
4. Not to modify this License in any other way.
|
|
|
@ -1,27 +0,0 @@
|
||||||
# README
|
|
||||||
|
|
||||||
## General Info
|
|
||||||
|
|
||||||
TrueCharts can be installed as both *normal* Helm Charts or as Apps on TrueNAS SCALE.
|
|
||||||
However only installations using the TrueNAS SCALE Apps system are supported.
|
|
||||||
|
|
||||||
For more information about this App, please check the docs on the TrueCharts [website](https://truecharts.org/charts/enterprise/)
|
|
||||||
|
|
||||||
**This chart is not maintained by the upstream project and any issues with the chart should be raised [here](https://github.com/truecharts/charts/issues/new/choose)**
|
|
||||||
|
|
||||||
|
|
||||||
## Support
|
|
||||||
|
|
||||||
- Please check our [quick-start guides for TrueNAS SCALE](https://truecharts.org/manual/SCALE%20Apps/Important-MUST-READ).
|
|
||||||
- See the [Website](https://truecharts.org)
|
|
||||||
- Check our [Discord](https://discord.gg/tVsPTHWTtr)
|
|
||||||
- Open a [issue](https://github.com/truecharts/charts/issues/new/choose)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
## Sponsor TrueCharts
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
||||||
|
|
||||||
*All Rights Reserved - The TrueCharts Project*
|
|
|
@ -1,9 +0,0 @@
|
||||||
|
|
||||||
|
|
||||||
## [traefik-17.0.17](https://github.com/truecharts/charts/compare/traefik-17.0.16...traefik-17.0.17) (2023-04-11)
|
|
||||||
|
|
||||||
### Chore
|
|
||||||
|
|
||||||
- update helm general non-major ([#7929](https://github.com/truecharts/charts/issues/7929))
|
|
||||||
|
|
||||||
|
|
|
@ -1,8 +0,0 @@
|
||||||
Traefik is a flexible reverse proxy and Ingress Provider.
|
|
||||||
|
|
||||||
This App is supplied by TrueCharts, for more information visit the manual: [https://truecharts.org/charts/enterprise/traefik](https://truecharts.org/charts/enterprise/traefik)
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
TrueCharts can only exist due to the incredible effort of our staff.
|
|
||||||
Please consider making a [donation](https://truecharts.org/sponsor) or contributing back to the project any way you can!
|
|
Binary file not shown.
|
@ -1,417 +0,0 @@
|
||||||
image:
|
|
||||||
repository: tccr.io/truecharts/traefik
|
|
||||||
# defaults to appVersion
|
|
||||||
tag: 2.9.9@sha256:4b9750e70b54df2a0c39c3262fe2963815a0304b7982fb8f80d0782a8e8021fa
|
|
||||||
pullPolicy: IfNotPresent
|
|
||||||
|
|
||||||
workload:
|
|
||||||
main:
|
|
||||||
replicas: 2
|
|
||||||
strategy: RollingUpdate
|
|
||||||
podSpec:
|
|
||||||
containers:
|
|
||||||
main:
|
|
||||||
args: []
|
|
||||||
probes:
|
|
||||||
# -- Liveness probe configuration
|
|
||||||
# @default -- See below
|
|
||||||
liveness:
|
|
||||||
# -- sets the probe type when not using a custom probe
|
|
||||||
# @default -- "TCP"
|
|
||||||
type: tcp
|
|
||||||
# -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used
|
|
||||||
# @default -- "/"
|
|
||||||
# path: "/ping"
|
|
||||||
|
|
||||||
# -- Redainess probe configuration
|
|
||||||
# @default -- See below
|
|
||||||
readiness:
|
|
||||||
# -- sets the probe type when not using a custom probe
|
|
||||||
# @default -- "TCP"
|
|
||||||
type: tcp
|
|
||||||
# -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used
|
|
||||||
# @default -- "/"
|
|
||||||
# path: "/ping"
|
|
||||||
|
|
||||||
# -- Startup probe configuration
|
|
||||||
# @default -- See below
|
|
||||||
startup:
|
|
||||||
# -- sets the probe type when not using a custom probe
|
|
||||||
# @default -- "TCP"
|
|
||||||
type: tcp
|
|
||||||
# -- If a HTTP probe is used (default for HTTP/HTTPS services) this path is used
|
|
||||||
# @default -- "/"
|
|
||||||
# path: "/ping"
|
|
||||||
|
|
||||||
# -- Options for all pods
|
|
||||||
# Can be overruled per pod
|
|
||||||
podOptions:
|
|
||||||
automountServiceAccountToken: true
|
|
||||||
|
|
||||||
# -- Use ingressClass. Ignored if Traefik version < 2.3 / kubernetes < 1.18.x
|
|
||||||
ingressClass:
|
|
||||||
# true is not unit-testable yet, pending https://github.com/rancher/helm-unittest/pull/12
|
|
||||||
enabled: false
|
|
||||||
isDefaultClass: false
|
|
||||||
# Use to force a networking.k8s.io API Version for certain CI/CD applications. E.g. "v1beta1"
|
|
||||||
fallbackApiVersion: ""
|
|
||||||
|
|
||||||
# -- Create an IngressRoute for the dashboard
|
|
||||||
ingressRoute:
|
|
||||||
dashboard:
|
|
||||||
enabled: true
|
|
||||||
# Additional ingressRoute annotations (e.g. for kubernetes.io/ingress.class)
|
|
||||||
annotations: {}
|
|
||||||
# Additional ingressRoute labels (e.g. for filtering IngressRoute by custom labels)
|
|
||||||
labels: {}
|
|
||||||
#
|
|
||||||
# -- Configure providers
|
|
||||||
providers:
|
|
||||||
kubernetesCRD:
|
|
||||||
enabled: true
|
|
||||||
namespaces:
|
|
||||||
[]
|
|
||||||
# - "default"
|
|
||||||
kubernetesIngress:
|
|
||||||
enabled: true
|
|
||||||
# labelSelector: environment=production,method=traefik
|
|
||||||
namespaces:
|
|
||||||
[]
|
|
||||||
# - "default"
|
|
||||||
# IP used for Kubernetes Ingress endpoints
|
|
||||||
publishedService:
|
|
||||||
enabled: true
|
|
||||||
# Published Kubernetes Service to copy status from. Format: namespace/servicename
|
|
||||||
# By default this Traefik service
|
|
||||||
# pathOverride: ""
|
|
||||||
|
|
||||||
# -- Logs
|
|
||||||
# https://docs.traefik.io/observability/logs/
|
|
||||||
logs:
|
|
||||||
# Traefik logs concern everything that happens to Traefik itself (startup, configuration, events, shutdown, and so on).
|
|
||||||
general:
|
|
||||||
# By default, the level is set to ERROR. Alternative logging levels are DEBUG, PANIC, FATAL, ERROR, WARN, and INFO.
|
|
||||||
level: ERROR
|
|
||||||
# -- Set the format of General Logs to be either Common Log Format or JSON. For more information: https://doc.traefik.io/traefik/observability/logs/#format
|
|
||||||
format: common
|
|
||||||
access:
|
|
||||||
# To enable access logs
|
|
||||||
enabled: false
|
|
||||||
# To write the logs in an asynchronous fashion, specify a bufferingSize option.
|
|
||||||
# This option represents the number of log lines Traefik will keep in memory before writing
|
|
||||||
# them to the selected output. In some cases, this option can greatly help performances.
|
|
||||||
# bufferingSize: 100
|
|
||||||
# Filtering https://docs.traefik.io/observability/access-logs/#filtering
|
|
||||||
filters:
|
|
||||||
{}
|
|
||||||
# statuscodes: "200,300-302"
|
|
||||||
# retryattempts: true
|
|
||||||
# minduration: 10ms
|
|
||||||
# Fields
|
|
||||||
# https://docs.traefik.io/observability/access-logs/#limiting-the-fieldsincluding-headers
|
|
||||||
fields:
|
|
||||||
general:
|
|
||||||
defaultmode: keep
|
|
||||||
names:
|
|
||||||
{}
|
|
||||||
# Examples:
|
|
||||||
# ClientUsername: drop
|
|
||||||
headers:
|
|
||||||
defaultmode: drop
|
|
||||||
names:
|
|
||||||
{}
|
|
||||||
# Examples:
|
|
||||||
# User-Agent: redact
|
|
||||||
# Authorization: drop
|
|
||||||
# Content-Type: keep
|
|
||||||
# -- Set the format of Access Logs to be either Common Log Format or JSON. For more information: https://doc.traefik.io/traefik/observability/access-logs/#format
|
|
||||||
format: common
|
|
||||||
|
|
||||||
metrics:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
type: servicemonitor
|
|
||||||
endpoints:
|
|
||||||
- port: metrics
|
|
||||||
path: /metrics
|
|
||||||
targetSelector: metrics
|
|
||||||
|
|
||||||
globalArguments:
|
|
||||||
- "--global.checknewversion"
|
|
||||||
|
|
||||||
##
|
|
||||||
# -- Additional arguments to be passed at Traefik's binary
|
|
||||||
# All available options available on https://docs.traefik.io/reference/static-configuration/cli/
|
|
||||||
## Use curly braces to pass values: `helm install --set="additionalArguments={--providers.kubernetesingress.ingressclass=traefik-internal,--log.level=DEBUG}"`
|
|
||||||
additionalArguments:
|
|
||||||
- "--serverstransport.insecureskipverify=true"
|
|
||||||
- "--providers.kubernetesingress.allowexternalnameservices=true"
|
|
||||||
|
|
||||||
# -- TLS Options to be created as TLSOption CRDs
|
|
||||||
# https://doc.traefik.io/tccr.io/truecharts/https/tls/#tls-options
|
|
||||||
# Example:
|
|
||||||
tlsOptions:
|
|
||||||
default:
|
|
||||||
sniStrict: false
|
|
||||||
minVersion: VersionTLS12
|
|
||||||
curvePreferences:
|
|
||||||
- CurveP521
|
|
||||||
- CurveP384
|
|
||||||
cipherSuites:
|
|
||||||
- TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256
|
|
||||||
- TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
|
|
||||||
- TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305
|
|
||||||
- TLS_AES_128_GCM_SHA256
|
|
||||||
- TLS_AES_256_GCM_SHA384
|
|
||||||
- TLS_CHACHA20_POLY1305_SHA256
|
|
||||||
|
|
||||||
# -- Options for the main traefik service, where the entrypoints traffic comes from
|
|
||||||
# from.
|
|
||||||
service:
|
|
||||||
main:
|
|
||||||
type: LoadBalancer
|
|
||||||
ports:
|
|
||||||
main:
|
|
||||||
port: 9000
|
|
||||||
targetPort: 9000
|
|
||||||
protocol: http
|
|
||||||
# -- Forwarded Headers should never be enabled on Main entrypoint
|
|
||||||
forwardedHeaders:
|
|
||||||
enabled: false
|
|
||||||
# -- Proxy Protocol should never be enabled on Main entrypoint
|
|
||||||
proxyProtocol:
|
|
||||||
enabled: false
|
|
||||||
tcp:
|
|
||||||
enabled: true
|
|
||||||
type: LoadBalancer
|
|
||||||
ports:
|
|
||||||
web:
|
|
||||||
enabled: true
|
|
||||||
port: 9080
|
|
||||||
protocol: http
|
|
||||||
redirectTo: websecure
|
|
||||||
# Options: Empty, 0 (ingore), or positive int
|
|
||||||
# redirectPort:
|
|
||||||
# -- Configure (Forwarded Headers)[https://doc.traefik.io/traefik/routing/entrypoints/#forwarded-headers] Support
|
|
||||||
forwardedHeaders:
|
|
||||||
enabled: false
|
|
||||||
# -- List of trusted IP and CIDR references
|
|
||||||
trustedIPs: []
|
|
||||||
# -- Trust all forwarded headers
|
|
||||||
insecureMode: false
|
|
||||||
# -- Configure (Proxy Protocol Headers)[https://doc.traefik.io/traefik/routing/entrypoints/#proxyprotocol] Support
|
|
||||||
proxyProtocol:
|
|
||||||
enabled: false
|
|
||||||
# -- Only IPs in trustedIPs will lead to remote client address replacement
|
|
||||||
trustedIPs: []
|
|
||||||
# -- Trust every incoming connection
|
|
||||||
insecureMode: false
|
|
||||||
websecure:
|
|
||||||
enabled: true
|
|
||||||
port: 9443
|
|
||||||
protocol: https
|
|
||||||
# -- Configure (Forwarded Headers)[https://doc.traefik.io/traefik/routing/entrypoints/#forwarded-headers] Support
|
|
||||||
forwardedHeaders:
|
|
||||||
enabled: false
|
|
||||||
# -- List of trusted IP and CIDR references
|
|
||||||
trustedIPs: []
|
|
||||||
# -- Trust all forwarded headers
|
|
||||||
insecureMode: false
|
|
||||||
# -- Configure (Proxy Protocol Headers)[https://doc.traefik.io/traefik/routing/entrypoints/#proxyprotocol] Support
|
|
||||||
proxyProtocol:
|
|
||||||
enabled: false
|
|
||||||
# -- Only IPs in trustedIPs will lead to remote client address replacement
|
|
||||||
trustedIPs: []
|
|
||||||
# -- Trust every incoming connection
|
|
||||||
insecureMode: false
|
|
||||||
# tcpexample:
|
|
||||||
# enabled: true
|
|
||||||
# targetPort: 9443
|
|
||||||
# protocol: tcp
|
|
||||||
# tls:
|
|
||||||
# enabled: false
|
|
||||||
# # this is the name of a TLSOption definition
|
|
||||||
# options: ""
|
|
||||||
# certResolver: ""
|
|
||||||
# domains: []
|
|
||||||
# # - main: example.com
|
|
||||||
# # sans:
|
|
||||||
# # - foo.example.com
|
|
||||||
# # - bar.example.com
|
|
||||||
metrics:
|
|
||||||
enabled: true
|
|
||||||
type: ClusterIP
|
|
||||||
ports:
|
|
||||||
metrics:
|
|
||||||
enabled: true
|
|
||||||
port: 9180
|
|
||||||
targetPort: 9180
|
|
||||||
protocol: http
|
|
||||||
# -- Forwarded Headers should never be enabled on Metrics entrypoint
|
|
||||||
forwardedHeaders:
|
|
||||||
enabled: false
|
|
||||||
# -- Proxy Protocol should never be enabled on Metrics entrypoint
|
|
||||||
proxyProtocol:
|
|
||||||
enabled: false
|
|
||||||
# udp:
|
|
||||||
# enabled: false
|
|
||||||
|
|
||||||
# -- Whether Role Based Access Control objects like roles and rolebindings should be created
|
|
||||||
rbac:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
primary: true
|
|
||||||
clusterWide: true
|
|
||||||
rules:
|
|
||||||
- apiGroups:
|
|
||||||
- ""
|
|
||||||
resources:
|
|
||||||
- services
|
|
||||||
- endpoints
|
|
||||||
- secrets
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- extensions
|
|
||||||
- networking.k8s.io
|
|
||||||
resources:
|
|
||||||
- ingresses
|
|
||||||
- ingressclasses
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
- apiGroups:
|
|
||||||
- extensions
|
|
||||||
- networking.k8s.io
|
|
||||||
resources:
|
|
||||||
- ingresses/status
|
|
||||||
verbs:
|
|
||||||
- update
|
|
||||||
- apiGroups:
|
|
||||||
- traefik.containo.us
|
|
||||||
resources:
|
|
||||||
- ingressroutes
|
|
||||||
- ingressroutetcps
|
|
||||||
- ingressrouteudps
|
|
||||||
- middlewares
|
|
||||||
- middlewaretcps
|
|
||||||
- tlsoptions
|
|
||||||
- tlsstores
|
|
||||||
- traefikservices
|
|
||||||
- serverstransports
|
|
||||||
verbs:
|
|
||||||
- get
|
|
||||||
- list
|
|
||||||
- watch
|
|
||||||
|
|
||||||
# -- The service account the pods will use to interact with the Kubernetes API
|
|
||||||
serviceAccount:
|
|
||||||
main:
|
|
||||||
enabled: true
|
|
||||||
primary: true
|
|
||||||
|
|
||||||
# -- SCALE Middleware Handlers
|
|
||||||
middlewares:
|
|
||||||
basicAuth: []
|
|
||||||
# - name: basicauthexample
|
|
||||||
# users:
|
|
||||||
# - username: testuser
|
|
||||||
# password: testpassword
|
|
||||||
forwardAuth: []
|
|
||||||
# - name: forwardAuthexample
|
|
||||||
# address: https://auth.example.com/
|
|
||||||
# authResponseHeaders:
|
|
||||||
# - X-Secret
|
|
||||||
# - X-Auth-User
|
|
||||||
# authRequestHeaders:
|
|
||||||
# - "Accept"
|
|
||||||
# - "X-CustomHeader"
|
|
||||||
# authResponseHeadersRegex: "^X-"
|
|
||||||
# trustForwardHeader: true
|
|
||||||
chain: []
|
|
||||||
# - name: chainname
|
|
||||||
# middlewares:
|
|
||||||
# - name: compress
|
|
||||||
redirectScheme: []
|
|
||||||
# - name: redirectSchemeName
|
|
||||||
# scheme: https
|
|
||||||
# permanent: true
|
|
||||||
rateLimit: []
|
|
||||||
# - name: rateLimitName
|
|
||||||
# average: 300
|
|
||||||
# burst: 200
|
|
||||||
redirectRegex: []
|
|
||||||
# - name: redirectRegexName
|
|
||||||
# regex: putregexhere
|
|
||||||
# replacement: replacementurlhere
|
|
||||||
# permanent: false
|
|
||||||
stripPrefixRegex: []
|
|
||||||
# - name: stripPrefixRegexName
|
|
||||||
# regex: []
|
|
||||||
ipWhiteList: []
|
|
||||||
# - name: ipWhiteListName
|
|
||||||
# sourceRange: []
|
|
||||||
# ipStrategy:
|
|
||||||
# depth: 2
|
|
||||||
# excludedIPs: []
|
|
||||||
themeParkVersion: v1.3.0
|
|
||||||
themePark: []
|
|
||||||
# - name: themeParkName
|
|
||||||
# -- Supported apps, lower case name
|
|
||||||
# -- https://docs.theme-park.dev/themes
|
|
||||||
# app: appnamehere
|
|
||||||
# -- Supported themes, lower case name
|
|
||||||
# -- https://docs.theme-park.dev/themes/APPNAMEHERE
|
|
||||||
# -- https://docs.theme-park.dev/community-themes
|
|
||||||
# theme: themenamehere
|
|
||||||
# -- https://theme-park.dev or a self hosted url
|
|
||||||
# baseUrl: https://theme-park.dev
|
|
||||||
realIPVersion: v1.0.3
|
|
||||||
# Sets X-Real-Ip with an IP from the X-Forwarded-For or
|
|
||||||
# Cf-Connecting-Ip (If from Cloudflare)
|
|
||||||
# Evaluation of those headers will go from last to first
|
|
||||||
realIP: []
|
|
||||||
# - name: realIPName
|
|
||||||
# -- The real IP will be the first one that is
|
|
||||||
# -- not included in any of the CIDRs passed here
|
|
||||||
# excludedNetworks:
|
|
||||||
# - 1.1.1.1/24
|
|
||||||
addPrefix: []
|
|
||||||
# - name: addPrefixName
|
|
||||||
# prefix: "/foo"
|
|
||||||
geoBlockVersion: v0.2.4
|
|
||||||
geoBlock: []
|
|
||||||
# -- https://github.com/PascalMinder/geoblock
|
|
||||||
# - name: geoBlockName
|
|
||||||
# allowLocalRequests: true
|
|
||||||
# logLocalRequests: false
|
|
||||||
# logAllowedRequests: false
|
|
||||||
# logApiRequests: false
|
|
||||||
# api: https://get.geojs.io/v1/ip/country/{ip}
|
|
||||||
# apiTimeoutMs: 500
|
|
||||||
# cacheSize: 25
|
|
||||||
# forceMonthlyUpdate: true
|
|
||||||
# allowUnknownCountries: false
|
|
||||||
# unknownCountryApiResponse: nil
|
|
||||||
# blackListMode: false
|
|
||||||
# countries:
|
|
||||||
# - RU
|
|
||||||
|
|
||||||
portalhook:
|
|
||||||
enabled: true
|
|
||||||
|
|
||||||
persistence:
|
|
||||||
plugins:
|
|
||||||
enabled: true
|
|
||||||
mountPath: "/plugins-storage"
|
|
||||||
type: emptyDir
|
|
||||||
|
|
||||||
portal:
|
|
||||||
open:
|
|
||||||
enabled: true
|
|
||||||
path: /dashboard/
|
|
||||||
override:
|
|
||||||
protocol: http
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1 +0,0 @@
|
||||||
{{- include "tc.v1.common.lib.chart.notes" $ -}}
|
|
|
@ -1,182 +0,0 @@
|
||||||
{{/* Define the args */}}
|
|
||||||
{{- define "traefik.args" -}}
|
|
||||||
args:
|
|
||||||
{{/* merge all ports */}}
|
|
||||||
{{- $ports := dict }}
|
|
||||||
{{- range $.Values.service }}
|
|
||||||
{{- range $name, $value := .ports }}
|
|
||||||
{{- $_ := set $ports $name $value }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{/* start of actual arguments */}}
|
|
||||||
{{- with .Values.globalArguments }}
|
|
||||||
{{- range . }}
|
|
||||||
- {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $config := $ports }}
|
|
||||||
{{- if $config }}
|
|
||||||
{{- if or ( eq $config.protocol "http" ) ( eq $config.protocol "https" ) ( eq $config.protocol "tcp" ) }}
|
|
||||||
{{- $_ := set $config "protocol" "tcp" }}
|
|
||||||
{{- end }}
|
|
||||||
- "--entryPoints.{{$name}}.address=:{{ $config.port }}/{{ default "tcp" $config.protocol | lower }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
- "--api.dashboard=true"
|
|
||||||
- "--ping=true"
|
|
||||||
{{- if .Values.traefikMetrics }}
|
|
||||||
{{- if .Values.traefikMetrics.datadog }}
|
|
||||||
- "--metrics.datadog=true"
|
|
||||||
- "--metrics.datadog.address={{ .Values.traefikMetrics.datadog.address }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.traefikMetrics.influxdb }}
|
|
||||||
- "--metrics.influxdb=true"
|
|
||||||
- "--metrics.influxdb.address={{ .Values.traefikMetrics.influxdb.address }}"
|
|
||||||
- "--metrics.influxdb.protocol={{ .Values.traefikMetrics.influxdb.protocol }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.traefikMetrics.statsd }}
|
|
||||||
- "--metrics.statsd=true"
|
|
||||||
- "--metrics.statsd.address={{ .Values.traefikMetrics.statsd.address }}"
|
|
||||||
{{- if or .Values.traefikMetrics.prometheus }}
|
|
||||||
- "--metrics.prometheus=true"
|
|
||||||
- "--metrics.prometheus.entrypoint=metrics"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if or .Values.metrics.main.enabled }}
|
|
||||||
- "--metrics.prometheus=true"
|
|
||||||
- "--metrics.prometheus.entrypoint=metrics"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.providers.kubernetesCRD.enabled }}
|
|
||||||
- "--providers.kubernetescrd"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.providers.kubernetesIngress.enabled }}
|
|
||||||
- "--providers.kubernetesingress"
|
|
||||||
{{- if .Values.providers.kubernetesIngress.publishedService.enabled }}
|
|
||||||
- "--providers.kubernetesingress.ingressendpoint.publishedservice={{ template "providers.kubernetesIngress.publishedServicePath" . }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.providers.kubernetesIngress.labelSelector }}
|
|
||||||
- "--providers.kubernetesingress.labelSelector={{ .Values.providers.kubernetesIngress.labelSelector }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if and .Values.rbac.enabled .Values.rbac.namespaced }}
|
|
||||||
{{- if .Values.providers.kubernetesCRD.enabled }}
|
|
||||||
- "--providers.kubernetescrd.namespaces={{ template "providers.kubernetesCRD.namespaces" . }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.providers.kubernetesIngress.enabled }}
|
|
||||||
- "--providers.kubernetesingress.namespaces={{ template "providers.kubernetesIngress.namespaces" . }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if .Values.ingressClass.enabled }}
|
|
||||||
- "--providers.kubernetesingress.ingressclass={{ .Release.Name }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- range $entrypoint, $config := $ports }}
|
|
||||||
{{/* add args for proxyProtocol support */}}
|
|
||||||
{{- if $config.proxyProtocol }}
|
|
||||||
{{- if $config.proxyProtocol.enabled }}
|
|
||||||
{{- if $config.proxyProtocol.insecureMode }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.proxyProtocol.insecure"
|
|
||||||
{{- end }}
|
|
||||||
{{- if not ( empty $config.proxyProtocol.trustedIPs ) }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.proxyProtocol.trustedIPs={{ join "," $config.proxyProtocol.trustedIPs }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{/* add args for forwardedHeaders support */}}
|
|
||||||
{{- if $config.forwardedHeaders.enabled }}
|
|
||||||
{{- if not ( empty $config.forwardedHeaders.trustedIPs ) }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.forwardedHeaders.trustedIPs={{ join "," $config.forwardedHeaders.trustedIPs }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if $config.forwardedHeaders.insecureMode }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.forwardedHeaders.insecure"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{/* end forwardedHeaders configuration */}}
|
|
||||||
{{- if $config.redirectTo }}
|
|
||||||
{{- $toPort := index $ports $config.redirectTo }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $toPort.port }}"
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https"
|
|
||||||
{{- else if $config.redirectPort }}
|
|
||||||
{{ if gt $config.redirectPort 0.0 }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.to=:{{ $config.redirectPort }}"
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.redirections.entryPoint.scheme=https"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- if or ( $config.tls ) ( eq $config.protocol "https" ) }}
|
|
||||||
{{- if or ( $config.tls.enabled ) ( eq $config.protocol "https" ) }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls=true"
|
|
||||||
{{- if $config.tls.options }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls.options={{ $config.tls.options }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if $config.tls.certResolver }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls.certResolver={{ $config.tls.certResolver }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if $config.tls.domains }}
|
|
||||||
{{- range $index, $domain := $config.tls.domains }}
|
|
||||||
{{- if $domain.main }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].main={{ $domain.main }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if $domain.sans }}
|
|
||||||
- "--entrypoints.{{ $entrypoint }}.http.tls.domains[{{ $index }}].sans={{ join "," $domain.sans }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- with .Values.logs }}
|
|
||||||
- "--log.format={{ .general.format }}"
|
|
||||||
{{- if ne .general.level "ERROR" }}
|
|
||||||
- "--log.level={{ .general.level | upper }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .access.enabled }}
|
|
||||||
- "--accesslog=true"
|
|
||||||
- "--accesslog.format={{ .access.format }}"
|
|
||||||
{{- if .access.bufferingsize }}
|
|
||||||
- "--accesslog.bufferingsize={{ .access.bufferingsize }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .access.filters }}
|
|
||||||
{{- if .access.filters.statuscodes }}
|
|
||||||
- "--accesslog.filters.statuscodes={{ .access.filters.statuscodes }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .access.filters.retryattempts }}
|
|
||||||
- "--accesslog.filters.retryattempts"
|
|
||||||
{{- end }}
|
|
||||||
{{- if .access.filters.minduration }}
|
|
||||||
- "--accesslog.filters.minduration={{ .access.filters.minduration }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
- "--accesslog.fields.defaultmode={{ .access.fields.general.defaultmode }}"
|
|
||||||
{{- range $fieldname, $fieldaction := .access.fields.general.names }}
|
|
||||||
- "--accesslog.fields.names.{{ $fieldname }}={{ $fieldaction }}"
|
|
||||||
{{- end }}
|
|
||||||
- "--accesslog.fields.headers.defaultmode={{ .access.fields.headers.defaultmode }}"
|
|
||||||
{{- range $fieldname, $fieldaction := .access.fields.headers.names }}
|
|
||||||
- "--accesslog.fields.headers.names.{{ $fieldname }}={{ $fieldaction }}"
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{/* theme.park */}}
|
|
||||||
{{- if .Values.middlewares.themePark }}
|
|
||||||
- "--experimental.plugins.traefik-themepark.modulename=github.com/packruler/traefik-themepark"
|
|
||||||
- "--experimental.plugins.traefik-themepark.version={{ .Values.middlewares.themeParkVersion }}"
|
|
||||||
{{- end }}
|
|
||||||
{{/* End of theme.park */}}
|
|
||||||
{{/* GeoBlock */}}
|
|
||||||
{{- if .Values.middlewares.geoBlock }}
|
|
||||||
- "--experimental.plugins.GeoBlock.modulename=github.com/PascalMinder/geoblock"
|
|
||||||
- "--experimental.plugins.GeoBlock.version={{ .Values.middlewares.geoBlockVersion }}"
|
|
||||||
{{- end }}
|
|
||||||
{{/* End of GeoBlock */}}
|
|
||||||
{{/* RealIP */}}
|
|
||||||
{{- if .Values.middlewares.realIP }}
|
|
||||||
- "--experimental.plugins.traefik-real-ip.modulename=github.com/soulbalz/traefik-real-ip"
|
|
||||||
- "--experimental.plugins.traefik-real-ip.version={{ .Values.middlewares.realIPVersion }}"
|
|
||||||
{{- end }}
|
|
||||||
{{/* End of RealIP */}}
|
|
||||||
{{- with .Values.additionalArguments }}
|
|
||||||
{{- range . }}
|
|
||||||
- {{ . | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,22 +0,0 @@
|
||||||
{{/*
|
|
||||||
Construct the path for the providers.kubernetesingress.ingressendpoint.publishedservice.
|
|
||||||
By convention this will simply use the <namespace>/<service-name> to match the name of the
|
|
||||||
service generated.
|
|
||||||
Users can provide an override for an explicit service they want bound via `.Values.providers.kubernetesIngress.publishedService.pathOverride`
|
|
||||||
*/}}
|
|
||||||
{{- define "providers.kubernetesIngress.publishedServicePath" -}}
|
|
||||||
{{- $fullName := include "tc.v1.common.lib.chart.names.fullname" . -}}
|
|
||||||
{{- $defServiceName := printf "%s/%s-tcp" .Release.Namespace $fullName -}}
|
|
||||||
{{- $servicePath := default $defServiceName .Values.providers.kubernetesIngress.publishedService.pathOverride }}
|
|
||||||
{{- print $servicePath | trimSuffix "-" -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/*
|
|
||||||
Construct a comma-separated list of whitelisted namespaces
|
|
||||||
*/}}
|
|
||||||
{{- define "providers.kubernetesIngress.namespaces" -}}
|
|
||||||
{{- default .Release.Namespace (join "," .Values.providers.kubernetesIngress.namespaces) }}
|
|
||||||
{{- end -}}
|
|
||||||
{{- define "providers.kubernetesCRD.namespaces" -}}
|
|
||||||
{{- default .Release.Namespace (join "," .Values.providers.kubernetesCRD.namespaces) }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,24 +0,0 @@
|
||||||
{{/* Define the ingressClass */}}
|
|
||||||
{{- define "traefik.ingressClass" -}}
|
|
||||||
---
|
|
||||||
{{ if .Values.ingressClass.enabled }}
|
|
||||||
{{- if .Capabilities.APIVersions.Has "networking.k8s.io/v1/IngressClass" }}
|
|
||||||
apiVersion: networking.k8s.io/v1
|
|
||||||
{{- else if .Capabilities.APIVersions.Has "networking.k8s.io/v1beta1/IngressClass" }}
|
|
||||||
apiVersion: networking.k8s.io/v1beta1
|
|
||||||
{{- else if or (eq .Values.ingressClass.fallbackApiVersion "v1beta1") (eq .Values.ingressClass.fallbackApiVersion "v1") }}
|
|
||||||
apiVersion: {{ printf "networking.k8s.io/%s" .Values.ingressClass.fallbackApiVersion }}
|
|
||||||
{{- else }}
|
|
||||||
{{- fail "\n\n ERROR: You must have at least networking.k8s.io/v1beta1 to use ingressClass" }}
|
|
||||||
{{- end }}
|
|
||||||
kind: IngressClass
|
|
||||||
metadata:
|
|
||||||
annotations:
|
|
||||||
ingressclass.kubernetes.io/is-default-class: {{ .Values.ingressClass.isDefaultClass | quote }}
|
|
||||||
labels:
|
|
||||||
{{- include "tc.v1.common.lib.metadata.allLabels" . | nindent 4 }}
|
|
||||||
name: {{ .Release.Name }}
|
|
||||||
spec:
|
|
||||||
controller: traefik.io/ingress-controller
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
|
@ -1,34 +0,0 @@
|
||||||
{{/* Define the ingressRoute */}}
|
|
||||||
{{- define "traefik.ingressRoute" -}}
|
|
||||||
{{ if .Values.ingressRoute.dashboard.enabled }}
|
|
||||||
|
|
||||||
{{- $ingressRouteLabels := .Values.ingressRoute.dashboard.labels -}}
|
|
||||||
{{- $ingressRouteAnnotations := .Values.ingressRoute.dashboard.annotations -}}
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: IngressRoute
|
|
||||||
metadata:
|
|
||||||
name: {{ include "tc.v1.common.lib.chart.names.fullname" . }}-dashboard
|
|
||||||
{{- $labels := (mustMerge ($ingressRouteLabels | default dict) (include "tc.v1.common.lib.metadata.allLabels" $ | fromYaml)) -}}
|
|
||||||
{{- with (include "tc.v1.common.lib.metadata.render" (dict "rootCtx" $ "labels" $labels) | trim) }}
|
|
||||||
labels:
|
|
||||||
{{- . | nindent 4 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- $annotations := (mustMerge ($ingressRouteAnnotations | default dict) (include "tc.v1.common.lib.metadata.allAnnotations" $ | fromYaml)) -}}
|
|
||||||
{{- with (include "tc.v1.common.lib.metadata.render" (dict "rootCtx" $ "annotations" $annotations) | trim) }}
|
|
||||||
annotations:
|
|
||||||
{{- . | nindent 4 }}
|
|
||||||
{{- end }}
|
|
||||||
|
|
||||||
spec:
|
|
||||||
entryPoints:
|
|
||||||
- main
|
|
||||||
routes:
|
|
||||||
- match: PathPrefix(`/dashboard`) || PathPrefix(`/api`)
|
|
||||||
kind: Rule
|
|
||||||
services:
|
|
||||||
- name: api@internal
|
|
||||||
kind: TraefikService
|
|
||||||
{{ end }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,26 +0,0 @@
|
||||||
{{/* Define the portalHook */}}
|
|
||||||
{{- define "traefik.portalhook" -}}
|
|
||||||
{{- if .Values.portalhook.enabled }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
|
|
||||||
apiVersion: v1
|
|
||||||
kind: ConfigMap
|
|
||||||
metadata:
|
|
||||||
name: portalhook
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
data:
|
|
||||||
{{- $ports := dict }}
|
|
||||||
{{- range $.Values.service }}
|
|
||||||
{{- range $name, $value := .ports }}
|
|
||||||
{{- $_ := set $ports $name $value }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $name, $value := $ports }}
|
|
||||||
{{ $name }}: {{ $value.port | quote }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,12 +0,0 @@
|
||||||
{{/* Define the tlsOptions */}}
|
|
||||||
{{- define "traefik.tlsOptions" -}}
|
|
||||||
{{- range $name, $config := .Values.tlsOptions }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: TLSOption
|
|
||||||
metadata:
|
|
||||||
name: {{ $name }}
|
|
||||||
spec:
|
|
||||||
{{- toYaml $config | nindent 2 }}
|
|
||||||
{{- end }}
|
|
||||||
{{- end -}}
|
|
|
@ -1,23 +0,0 @@
|
||||||
{{/* Make sure all variables are set properly */}}
|
|
||||||
{{- include "tc.v1.common.loader.init" . }}
|
|
||||||
|
|
||||||
{{- $newArgs := (include "traefik.args" . | fromYaml) }}
|
|
||||||
{{- $_ := set .Values "newArgs" $newArgs -}}
|
|
||||||
{{- $mergedargs := concat $.Values.workload.main.podSpec.containers.main.args .Values.newArgs.args }}
|
|
||||||
{{- $_ := set $.Values.workload.main.podSpec.containers.main "args" $mergedargs -}}
|
|
||||||
|
|
||||||
{{- include "traefik.portalhook" . }}
|
|
||||||
{{- include "traefik.tlsOptions" . }}
|
|
||||||
{{- include "traefik.ingressRoute" . }}
|
|
||||||
{{- include "traefik.ingressClass" . }}
|
|
||||||
|
|
||||||
{{- with .Values.ingress -}}
|
|
||||||
{{- with .main -}}
|
|
||||||
{{- if .enabled -}}
|
|
||||||
{{- $_ := set $.Values.portal.open.override "protocol" "https" -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
{{- end -}}
|
|
||||||
|
|
||||||
{{/* Render the templates */}}
|
|
||||||
{{ include "tc.v1.common.loader.apply" . }}
|
|
|
@ -1,17 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{- range $index, $middlewareData := .Values.middlewares.addPrefix }}
|
|
||||||
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
addPrefix:
|
|
||||||
prefix: {{ $middlewareData.prefix }}
|
|
||||||
{{- end }}
|
|
|
@ -1,62 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: compress
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
compress: {}
|
|
||||||
---
|
|
||||||
# Here, an average of 300 requests per second is allowed.
|
|
||||||
# In addition, a burst of 200 requests is allowed.
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: basic-ratelimit
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
rateLimit:
|
|
||||||
average: 600
|
|
||||||
burst: 400
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: basic-secure-headers
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
headers:
|
|
||||||
accessControlAllowMethods:
|
|
||||||
- GET
|
|
||||||
- OPTIONS
|
|
||||||
- HEAD
|
|
||||||
- PUT
|
|
||||||
accessControlMaxAge: 100
|
|
||||||
stsSeconds: 63072000
|
|
||||||
# stsIncludeSubdomains: false
|
|
||||||
# stsPreload: false
|
|
||||||
forceSTSHeader: true
|
|
||||||
contentTypeNosniff: true
|
|
||||||
browserXssFilter: true
|
|
||||||
referrerPolicy: same-origin
|
|
||||||
customRequestHeaders:
|
|
||||||
X-Forwarded-Proto: "https"
|
|
||||||
customResponseHeaders:
|
|
||||||
server: ''
|
|
||||||
---
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: chain-basic
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
chain:
|
|
||||||
middlewares:
|
|
||||||
- name: basic-ratelimit
|
|
||||||
- name: basic-secure-headers
|
|
||||||
- name: compress
|
|
|
@ -1,34 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.basicAuth }}
|
|
||||||
---
|
|
||||||
{{- $users := list }}
|
|
||||||
{{ range $index, $userdata := $middlewareData.users }}
|
|
||||||
{{ $users = append $users ( htpasswd $userdata.username $userdata.password ) }}
|
|
||||||
{{ end }}
|
|
||||||
|
|
||||||
apiVersion: v1
|
|
||||||
kind: Secret
|
|
||||||
metadata:
|
|
||||||
name: {{printf "%v-%v" $middlewareData.name "secret" }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
type: Opaque
|
|
||||||
stringData:
|
|
||||||
users: |
|
|
||||||
{{- range $index, $user := $users }}
|
|
||||||
{{ printf "%s" $user }}
|
|
||||||
{{- end }}
|
|
||||||
---
|
|
||||||
# Declaring the user list
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
basicAuth:
|
|
||||||
secret: {{printf "%v-%v" $middlewareData.name "secret" }}
|
|
||||||
{{ end }}
|
|
|
@ -1,21 +0,0 @@
|
||||||
{{- $values := .Values }}
|
|
||||||
{{- $namespace := ( printf "ix-%s" .Release.Name ) }}
|
|
||||||
{{- if or ( not .Values.ingressClass.enabled ) ( and ( .Values.ingressClass.enabled ) ( .Values.ingressClass.isDefaultClass ) ) }}
|
|
||||||
{{- $namespace = "default" }}
|
|
||||||
{{- end }}
|
|
||||||
{{ range $index, $middlewareData := .Values.middlewares.chain }}
|
|
||||||
|
|
||||||
---
|
|
||||||
# Declaring the user list
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
|
||||||
kind: Middleware
|
|
||||||
metadata:
|
|
||||||
name: {{ $middlewareData.name }}
|
|
||||||
namespace: {{ $namespace }}
|
|
||||||
spec:
|
|
||||||
chain:
|
|
||||||
middlewares:
|
|
||||||
{{ range $index, $middleware := .middlewares }}
|
|
||||||
- name: {{ printf "%v-%v@%v" $namespace $middleware "kubernetescrd" }}
|
|
||||||
{{ end }}
|
|
||||||
{{ end }}
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue