@@ -14,132 +14,132 @@ bundle: {
14
14
}
15
15
chart : {
16
16
name : " opencloud-full "
17
- version : " 2.0.2 "
17
+ version : " 2.0.3 "
18
18
}
19
19
sync : {
20
20
timeout : 5
21
21
createNamespace : true
22
22
}
23
23
helmValues : {
24
24
logging : {
25
- level : " debug "
25
+ level : string @ timoni ( runtime:string:OPENCLOUD_LOGGING_LEVEL )
26
26
}
27
27
externalDomain : string @timoni (runtime:string:EXTERNAL_DOMAIN )
28
28
keycloak : {
29
- enabled : true
29
+ enabled : bool @ timoni ( runtime:bool:KEYCLOAK_ENABLED )
30
30
domain : string @timoni (runtime:string:KEYCLOAK_DOMAIN )
31
31
postgresql : {
32
- password : " keycloak "
32
+ password : string @ timoni ( runtime:string:KEYCLOAK_POSTGRESQL_PASSWORD )
33
33
}
34
34
config : {
35
- adminPassword : " admin "
35
+ adminPassword : string @ timoni ( runtime:string:KEYCLOAK_ADMIN_PASSWORD )
36
36
}
37
37
}
38
38
minio : {
39
- enabled : true
39
+ enabled : bool @ timoni ( runtime:bool:MINIO_ENABLED )
40
40
domain : string @timoni (runtime:string:MINIO_DOMAIN )
41
41
config : {
42
- rootPassword : " opencloud-secret-key "
42
+ rootPassword : string @ timoni ( runtime:string:MINIO_ROOT_PASSWORD )
43
43
}
44
44
}
45
45
onlyoffice : {
46
46
config : {
47
47
coAuthoring : {
48
48
secret : {
49
- inbox : " Dd0SXIe1k9oCfdffgrfNmA0TK1bb1B1d38OFSb "
50
- outbox : " Dd0SXIe1k9oCfdffgrfNmA0TK1bb1B1d38OFSb "
51
- session : " Dd0SXIe1k9oCfdffgrfNmA0TK1bb1B1d38OFSb "
49
+ inbox : string @ timoni ( runtime:string:ONLYOFFICE_INBOX )
50
+ outbox : string @ timoni ( runtime:string:ONLYOFFICE_OUTBOX )
51
+ session : string @ timoni ( runtime:string:ONLYOFFICE_SESSION )
52
52
}
53
53
}
54
54
rabbitmq : {
55
- url : " amqp://guest:Dd0SXIe1k9osdfjkmA0TK1bb1B1d38OFSb@localhost "
55
+ url : string @ timoni ( runtime:string:AMQP_URL )
56
56
}
57
57
}
58
58
}
59
59
ingress : {
60
- enabled : false
61
- ingressClassName : " nginx "
60
+ enabled : bool @ timoni ( runtime:bool:INGRESS_ENABLED )
61
+ ingressClassName : string @ timoni ( runtime:string:INGRESS_CLASS_NAME )
62
62
annotations : {
63
- " nginx.ingress.kubernetes.io/proxy-body-size " : " 1024m "
63
+ " nginx.ingress.kubernetes.io/proxy-body-size " : string @ timoni ( runtime:string:INGRESS_PROXY_BODY_SIZE )
64
64
}
65
65
}
66
66
insecure : {
67
- oidcIdpInsecure : true
68
- ocHttpApiInsecure : true
67
+ oidcIdpInsecure : bool @ timoni ( runtime:bool:OIDC_IDP_INSECURE )
68
+ ocHttpApiInsecure : bool @ timoni ( runtime:bool:OC_HTTP_API_INSECURE )
69
69
}
70
70
secretRefs : {
71
71
ldapSecretRef : " ldap-bind-secrets "
72
72
s3CredentialsSecretRef : " s3secret "
73
73
}
74
74
gateway : {
75
75
httproute : {
76
- enabled : true
76
+ enabled : bool @ timoni ( runtime:bool:GATEWAY_HTTPROUTE_ENABLED )
77
77
}
78
78
}
79
79
features : {
80
80
externalUserManagement : {
81
- enabled : true
82
- adminUUID : " 0ab77e6d-23b4-4ba3-9843-a3b3efdcfc53 "
81
+ enabled : bool @ timoni ( runtime:bool:EXTERNAL_USER_MANAGEMENT_ENABLED )
82
+ adminUUID : string @ timoni ( runtime:string:EXTERNAL_USER_MANAGEMENT_ADMIN_UUID )
83
83
autoprovisionAccounts : {
84
- enabled : true
85
- claimUserName : " sub "
84
+ enabled : bool @ timoni ( runtime:bool:AUTOPROVISION_ACCOUNTS_ENABLED )
85
+ claimUserName : string @ timoni ( runtime:string:AUTOPROVISION_ACCOUNTS_CLAIM_USER_NAME )
86
86
}
87
87
oidc : {
88
88
domain : string @timoni (runtime:string:KEYCLOAK_DOMAIN )
89
89
issuerURI : string @timoni (runtime:string:OIDC_ISSUER_URI )
90
- userIDClaim : " sub "
91
- userIDClaimAttributeMapping : " username "
90
+ userIDClaim : string @ timoni ( runtime:string:OIDC_USER_ID_CLAIM )
91
+ userIDClaimAttributeMapping : string @ timoni ( runtime:string:OIDC_USER_ID_CLAIM_ATTRIBUTE_MAPPING )
92
92
}
93
93
ldap : {
94
- writeable : true
94
+ writeable : bool @ timoni ( runtime:bool:LDAP_WRITEABLE )
95
95
uri : string @timoni (runtime:string:LDAP_URI )
96
- insecure : true
97
- bindDN : " cn=admin,dc=opencloud,dc=eu "
96
+ insecure : bool @ timoni ( runtime:bool:LDAP_INSECURE )
97
+ bindDN : string @ timoni ( runtime:string:LDAP_BIND_DN )
98
98
user : {
99
- userNameMatch : " none "
99
+ userNameMatch : string @ timoni ( runtime:string:LDAP_USER_NAME_MATCH )
100
100
schema : {
101
- id : " openCloudUUID "
101
+ id : string @ timoni ( runtime:string:LDAP_USER_SCHEMA_ID )
102
102
}
103
103
}
104
104
group : {
105
105
schema : {
106
- id : " openCloudUUID "
106
+ id : string @ timoni ( runtime:string:LDAP_GROUP_SCHEMA_ID )
107
107
}
108
108
}
109
109
}
110
110
}
111
111
112
112
appsIntegration : {
113
- enabled : true
113
+ enabled : bool @ timoni ( runtime:bool:APPS_INTEGRATION_ENABLED )
114
114
wopiIntegration : {
115
115
officeSuites : [
116
116
{
117
117
name : " Collabora " ,
118
118
product : " Collabora " ,
119
- enabled : false ,
119
+ enabled : bool @ timoni ( runtime:bool:COLLABORA_ENABLED ) ,
120
120
uri : string @timoni (runtime:string:COLLABORA_URI ),
121
- insecure : true ,
122
- disableProof : false ,
121
+ insecure : bool @ timoni ( runtime:bool:COLLABORA_INSECURE ) ,
122
+ disableProof : bool @ timoni ( runtime:bool:COLLABORA_DISABLE_PROOF ) ,
123
123
iconURI : string @timoni (runtime:string:COLLABORA_ICON_URI ),
124
124
ingress : {
125
- enabled : false
125
+ enabled : bool @ timoni ( runtime:bool:COLLABORA_INGRESS_ENABLED )
126
126
domain : string @timoni (runtime:string:WOPI_INGRESS_DOMAIN )
127
- ingressClassName : " nginx "
127
+ ingressClassName : string @ timoni ( runtime:string:COLLABORA_INGRESS_CLASS_NAME )
128
128
annotations : {
129
- " nginx.ingress.kubernetes.io/proxy-body-size " : " 1024m "
129
+ " nginx.ingress.kubernetes.io/proxy-body-size " : string @ timoni ( runtime:string:COLLABORA_INGRESS_PROXY_BODY_SIZE )
130
130
}
131
131
}
132
132
},
133
133
{
134
134
name : " OnlyOffice " ,
135
135
product : " OnlyOffice " ,
136
- enabled : true ,
136
+ enabled : bool @ timoni ( runtime:bool:ONLYOFFICE_ENABLED ) ,
137
137
uri : string @timoni (runtime:string:ONLYOFFICE_URI ),
138
- insecure : true ,
139
- disableProof : false ,
138
+ insecure : bool @ timoni ( runtime:bool:ONLYOFFICE_INSECURE ) ,
139
+ disableProof : bool @ timoni ( runtime:bool:ONLYOFFICE_DISABLE_PROOF ) ,
140
140
iconURI : string @timoni (runtime:string:ONLYOFFICE_ICON_URI ),
141
141
ingress : {
142
- enabled : false
142
+ enabled : bool @ timoni ( runtime:bool:ONLYOFFICE_INGRESS_ENABLED )
143
143
}
144
144
}
145
145
]
@@ -149,42 +149,42 @@ bundle: {
149
149
services : {
150
150
nats : {
151
151
persistence : {
152
- enabled : true
152
+ enabled : bool @ timoni ( runtime:bool:NATS_PERSISTENCE_ENABLED )
153
153
}
154
154
}
155
155
search : {
156
156
persistence : {
157
- enabled : true
157
+ enabled : bool @ timoni ( runtime:bool:SEARCH_PERSISTENCE_ENABLED )
158
158
}
159
159
extractor : {
160
- type : " tika "
160
+ type : string @ timoni ( runtime:string:SEARCH_EXTRACTOR_TYPE )
161
161
}
162
162
}
163
163
storagesystem : {
164
164
persistence : {
165
- enabled : true
165
+ enabled : bool @ timoni ( runtime:bool:STORAGE_SYSTEM_PERSISTENCE_ENABLED )
166
166
}
167
167
}
168
168
storageusers : {
169
169
persistence : {
170
- enabled : true
170
+ enabled : bool @ timoni ( runtime:bool:STORAGE_USERS_PERSISTENCE_ENABLED )
171
171
}
172
172
storageBackend : {
173
- driver : " decomposeds3 "
173
+ driver : string @ timoni ( runtime:string:STORAGE_USERS_BACKEND_DRIVER )
174
174
}
175
175
}
176
176
thumbnails : {
177
177
persistence : {
178
- enabled : true
178
+ enabled : bool @ timoni ( runtime:bool:THUMBNAILS_PERSISTENCE_ENABLED )
179
179
}
180
180
}
181
181
web : {
182
182
persistence : {
183
- enabled : true
183
+ enabled : bool @ timoni ( runtime:bool:WEB_PERSISTENCE_ENABLED )
184
184
}
185
185
config : {
186
186
oidc : {
187
- webClientID : " web "
187
+ webClientID : string @ timoni ( runtime:string:WEB_OIDC_WEB_CLIENT_ID )
188
188
}
189
189
externalApps : {
190
190
" external-sites " : {
@@ -298,7 +298,7 @@ bundle: {
298
298
}
299
299
idm : {
300
300
persistence : {
301
- enabled : false
301
+ enabled : bool @ timoni ( runtime:bool:IDM_PERSISTENCE_ENABLED )
302
302
}
303
303
}
304
304
}
@@ -325,15 +325,15 @@ bundle: {
325
325
}
326
326
helmValues : {
327
327
" ltb-passwd " : {
328
- enabled : false
328
+ enabled : bool @ timoni ( runtime:bool:OPENLDAP_LTB_PASSWD_ENABLED )
329
329
}
330
330
replication : {
331
- enabled : true
331
+ enabled : bool @ timoni ( runtime:bool:OPENLDAP_REPLICATION_ENABLED )
332
332
}
333
333
global : {
334
334
ldapDomain : string @timoni (runtime:string:LDAP_GLOBAL_DOMAIN )
335
- adminPassword : " admin "
336
- configPassword : " config "
335
+ adminPassword : string @ timoni ( runtime:string:LDAP_ADMIN_PASSWORD )
336
+ configPassword : string @ timoni ( runtime:string:LDAP_CONFIG_PASSWORD )
337
337
}
338
338
customLdifFiles : {
339
339
" opencloud_root.ldif " : """
0 commit comments