Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions charts/gluu-all-in-one/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -238,9 +238,9 @@ Kubernetes: `>=v1.22.0-0`
| configmap.cnSqlDbUser | string | `"gluu"` | SQL database username. |
| configmap.cnSqlSslCaCert | string | `""` | Base64-encoded string of CA certificate used to sign client/server certificate of MySQL/PostgreSQL server. Required if using client cert authentication. |
| configmap.cnSqlSslClientCert | string | `""` | Base64-encoded string of client certificate signed by CA. Required if using client cert authentication. |
| configmap.cnSqlSslClientKey | string | `""` | Base64-encoded string of client key signed by CA. Required if using client cert authentication. |
| configmap.cnSqlSslEnabled | bool | `false` | Enforce connection to SQL database using SSL. |
| configmap.cnSqlSslMode | string | `""` | Mode when connecting to SQL database using SSL. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`. |
| configmap.cnSqlSslClientKey | string | `""` | Base64-encoded client private key corresponding to the client certificate. Required if using client cert authentication. We advise to not commit real private keys in values.yaml. |
| configmap.cnSqlSslEnabled | bool | `false` | Enable SSL connection to SQL database. |
| configmap.cnSqlSslMode | string | `""` | Mode used to connect to SQL database using SSL if cnSqlSslEnabled is set to true. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`. |
| configmap.cnSqldbUserPassword | string | `"Test1234#"` | SQL password injected the secrets . |
| configmap.cnVaultAddr | string | `"http://localhost:8200"` | Base URL of Vault. |
| configmap.cnVaultAppRolePath | string | `"approle"` | Path to Vault AppRole. |
Expand Down
11 changes: 10 additions & 1 deletion charts/gluu-all-in-one/templates/deployment.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,6 +39,9 @@ spec:
{{- end }}
{{- end }}
spec:
securityContext:
fsGroup: 1000
fsGroupChangePolicy: OnRootMismatch
{{- with .Values.image.pullSecrets }}
imagePullSecrets:
{{- toYaml . | nindent 8 }}
Expand Down Expand Up @@ -136,12 +139,15 @@ spec:
- name: {{ .Release.Name }}-sql-ssl-ca-cert
mountPath: /etc/certs/sql_cacert.pem
subPath: sql_cacert.pem
readOnly: true
- name: {{ .Release.Name }}-sql-ssl-client-cert
mountPath: /etc/certs/sql_client_cert.pem
subPath: sql_client_cert.pem
readOnly: true
- name: {{ .Release.Name }}-sql-ssl-client-key
mountPath: /etc/certs/sql_client_key.pem
subPath: sql_client_key.pem
readOnly: true
{{- end }}
livenessProbe:
{{- toYaml .Values.livenessProbe | nindent 10 }}
Expand Down Expand Up @@ -178,19 +184,22 @@ spec:
- name: {{ .Release.Name }}-sql-ssl-ca-cert
secret:
secretName: {{ .Release.Name }}-sql-ssl
optional: true
items:
- key: sql_cacert.pem
path: sql_cacert.pem
- name: {{ .Release.Name }}-sql-ssl-client-cert
secret:
secretName: {{ .Release.Name }}-sql-ssl
optional: true
items:
- key: sql_client_cert.pem
path: sql_client_cert.pem
- name: {{ .Release.Name }}-sql-ssl-client-key
secret:
secretName: {{ .Release.Name }}-sql-ssl
defaultMode: 0640
optional: true
defaultMode: 0440
items:
- key: sql_client_key.pem
path: sql_client_key.pem
Expand Down
2 changes: 1 addition & 1 deletion charts/gluu-all-in-one/templates/secret.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -73,7 +73,7 @@ metadata:
{{- if .Values.additionalAnnotations }}
{{ toYaml .Values.additionalAnnotations | indent 4 }}
{{- end }}
{{- if .Values.config.customAnnotations.secret }}
{{- if .Values.customAnnotations.secret }}
{{ toYaml .Values.customAnnotations.secret | indent 4 }}
{{- end }}
{{- end }}
Expand Down
6 changes: 3 additions & 3 deletions charts/gluu-all-in-one/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -53,15 +53,15 @@ configmap:
cnSqlDbTimezone: UTC
# -- SQL password injected the secrets .
cnSqldbUserPassword: Test1234#
# -- Enforce connection to SQL database using SSL.
# -- Enable SSL connection to SQL database.
cnSqlSslEnabled: false
# -- Mode when connecting to SQL database using SSL. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`.
# -- Mode used to connect to SQL database using SSL if cnSqlSslEnabled is set to true. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`.
cnSqlSslMode: ""
# -- Base64-encoded string of CA certificate used to sign client/server certificate of MySQL/PostgreSQL server. Required if using client cert authentication.
cnSqlSslCaCert: ""
# -- Base64-encoded string of client certificate signed by CA. Required if using client cert authentication.
cnSqlSslClientCert: ""
# -- Base64-encoded string of client key signed by CA. Required if using client cert authentication.
# -- Base64-encoded client private key corresponding to the client certificate. Required if using client cert authentication. We advise to not commit real private keys in values.yaml.
cnSqlSslClientKey: ""
# -- Cache type. `NATIVE_PERSISTENCE`, `REDIS`. or `IN_MEMORY`. Defaults to `NATIVE_PERSISTENCE` .
cnCacheType: NATIVE_PERSISTENCE
Expand Down
11 changes: 8 additions & 3 deletions charts/gluu/README.md

Large diffs are not rendered by default.

6 changes: 3 additions & 3 deletions charts/gluu/charts/config/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,9 +61,9 @@ Kubernetes: `>=v1.21.0-0`
| configmap.cnSqlDbUser | string | `"gluu"` | SQL database username. |
| configmap.cnSqlSslCaCert | string | `""` | Base64-encoded string of CA certificate used to sign client/server certificate of MySQL/PostgreSQL server. Required if using client cert authentication. |
| configmap.cnSqlSslClientCert | string | `""` | Base64-encoded string of client certificate signed by CA. Required if using client cert authentication. |
| configmap.cnSqlSslClientKey | string | `""` | Base64-encoded string of client key signed by CA. Required if using client cert authentication. |
| configmap.cnSqlSslEnabled | bool | `false` | Enforce connection to SQL database using SSL. |
| configmap.cnSqlSslMode | string | `""` | Mode when connecting to SQL database using SSL. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`. |
| configmap.cnSqlSslClientKey | string | `""` | Base64-encoded client private key corresponding to the client certificate. Required if using client cert authentication. We advise to not commit real private keys in values.yaml. |
| configmap.cnSqlSslEnabled | bool | `false` | Enable SSL connection to SQL database. |
| configmap.cnSqlSslMode | string | `""` | Mode used to connect to SQL database using SSL if cnSqlSslEnabled is set to true. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`. |
| configmap.cnSqldbUserPassword | string | `"Test1234#"` | SQL password injected in the secrets. |
| configmap.cnVaultAddr | string | `"http://localhost:8200"` | Base URL of Vault. |
| configmap.cnVaultAppRolePath | string | `"approle"` | Path to Vault AppRole. |
Expand Down
11 changes: 10 additions & 1 deletion charts/gluu/charts/config/templates/load-init-config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,6 +27,9 @@ spec:
APP_NAME: configurator
app: {{ .Release.Name }}-{{ include "config.name" . }}-init-load
spec:
securityContext:
fsGroup: 1000
fsGroupChangePolicy: OnRootMismatch
{{- with .Values.image.pullSecrets }}
imagePullSecrets:
{{- toYaml . | nindent 8 }}
Expand Down Expand Up @@ -54,19 +57,22 @@ spec:
- name: {{ .Release.Name }}-sql-ssl-ca-cert
secret:
secretName: {{ .Release.Name }}-sql-ssl
optional: true
items:
- key: sql_cacert.pem
path: sql_cacert.pem
- name: {{ .Release.Name }}-sql-ssl-client-cert
secret:
secretName: {{ .Release.Name }}-sql-ssl
optional: true
items:
- key: sql_client_cert.pem
path: sql_client_cert.pem
- name: {{ .Release.Name }}-sql-ssl-client-key
secret:
secretName: {{ .Release.Name }}-sql-ssl
defaultMode: 0640
optional: true
defaultMode: 0440
items:
- key: sql_client_key.pem
path: sql_client_key.pem
Expand Down Expand Up @@ -97,12 +103,15 @@ spec:
- name: {{ .Release.Name }}-sql-ssl-ca-cert
mountPath: /etc/certs/sql_cacert.pem
subPath: sql_cacert.pem
readOnly: true
- name: {{ .Release.Name }}-sql-ssl-client-cert
mountPath: /etc/certs/sql_client_cert.pem
subPath: sql_client_cert.pem
readOnly: true
- name: {{ .Release.Name }}-sql-ssl-client-key
mountPath: /etc/certs/sql_client_key.pem
subPath: sql_client_key.pem
readOnly: true
{{- end }}
envFrom:
- configMapRef:
Expand Down
6 changes: 3 additions & 3 deletions charts/gluu/charts/config/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -31,15 +31,15 @@ configmap:
cnSqlDbTimezone: UTC
# -- SQL password injected in the secrets.
cnSqldbUserPassword: Test1234#
# -- Enforce connection to SQL database using SSL.
# -- Enable SSL connection to SQL database.
cnSqlSslEnabled: false
# -- Mode when connecting to SQL database using SSL. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`.
# -- Mode used to connect to SQL database using SSL if cnSqlSslEnabled is set to true. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`.
cnSqlSslMode: ""
# -- Base64-encoded string of CA certificate used to sign client/server certificate of MySQL/PostgreSQL server. Required if using client cert authentication.
cnSqlSslCaCert: ""
# -- Base64-encoded string of client certificate signed by CA. Required if using client cert authentication.
cnSqlSslClientCert: ""
# -- Base64-encoded string of client key signed by CA. Required if using client cert authentication.
# -- Base64-encoded client private key corresponding to the client certificate. Required if using client cert authentication. We advise to not commit real private keys in values.yaml.
cnSqlSslClientKey: ""
# -- Cache type. `NATIVE_PERSISTENCE`, `REDIS`. or `IN_MEMORY`. Defaults to `NATIVE_PERSISTENCE` .
cnCacheType: NATIVE_PERSISTENCE
Expand Down
8 changes: 4 additions & 4 deletions charts/gluu/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -363,15 +363,15 @@ config:
cnSqlDbTimezone: UTC
# -- SQL password injected the secrets .
cnSqldbUserPassword: Test1234#
# -- Enforce connection to SQL database using SSL.
# -- Enable SSL connection to SQL database.
cnSqlSslEnabled: false
# -- Mode when connecting to SQL database using SSL. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`.
# -- Mode used to connect to SQL database using SSL if cnSqlSslEnabled is set to true. If using MySQL, choose one of `PREFERRED`, `REQUIRED`, `VERIFY_CA`, or `VERIFY_IDENTITY`. If using PostgreSQL, choose one of `allow`, `prefer`, `require`, `verify-ca`, or `verify-full`.
cnSqlSslMode: ""
# -- Base64-encoded string of CA certificate used to sign client/server certificate of MySQL/PostgreSQL server. Required if using client cert authentication.
cnSqlSslCaCert: ""
# -- Base64-encoded string of client certificate signed by CA. Required if using client cert authentication.
cnSqlSslClientCert: ""
# -- Base64-encoded string of client key signed by CA. Required if using client cert authentication.
# -- Base64-encoded client private key corresponding to the client certificate. Required if using client cert authentication. We advise to not commit real private keys in values.yaml.
cnSqlSslClientKey: ""
# -- Cache type. `NATIVE_PERSISTENCE`, `REDIS`. or `IN_MEMORY`. Defaults to `NATIVE_PERSISTENCE` .
cnCacheType: NATIVE_PERSISTENCE
Expand Down Expand Up @@ -913,7 +913,7 @@ global:
adminUiServiceName: admin-ui
ingress:
# -- Enable Admin UI endpoints in either istio or nginx ingress depending on users choice
adminUiEnabled: false
adminUiEnabled: true
# -- Admin UI ingress resource labels. key app is taken.
adminUiLabels: { }
# -- Admin UI ingress resource additional annotations.
Expand Down
Loading