@@ -250,6 +250,7 @@ This will prepend `my-registry.com/` to all image references in the chart. For e
250250| ` opencloud.logColor ` | Enable log color | ` false ` |
251251| ` opencloud.logPretty ` | Enable pretty logging | ` false ` |
252252| ` opencloud.insecure ` | Insecure mode (for self-signed certificates) | ` true ` |
253+ | ` opencloud.existingSecret ` | Name of the existing secret | `` |
253254| ` opencloud.adminPassword ` | Admin password | ` admin ` |
254255| ` opencloud.createDemoUsers ` | Create demo users | ` false ` |
255256| ` opencloud.resources ` | CPU/Memory resource requests/limits | ` {} ` |
@@ -261,12 +262,14 @@ This will prepend `my-registry.com/` to all image references in the chart. For e
261262| ` opencloud.smtp.host ` | SMTP host | `` |
262263| ` opencloud.smtp.port ` | SMTP port | ` 587 ` |
263264| ` opencloud.smtp.sender ` | SMTP sender | `` |
265+ | ` opencloud.smtp.existingSecret ` | Name of the existing secret | `` |
264266| ` opencloud.smtp.username ` | SMTP username | `` |
265267| ` opencloud.smtp.password ` | SMTP password | `` |
266268| ` opencloud.smtp.insecure ` | SMTP insecure | ` false ` |
267269| ` opencloud.smtp.authentication ` | SMTP authentication | ` plain ` |
268270| ` opencloud.smtp.encryption ` | SMTP encryption | ` starttls ` |
269271| ` opencloud.storage.s3.internal.enabled ` | Enable internal MinIO instance | ` true ` |
272+ | ` opencloud.storage.s3.internal.existingSecret ` | Name of the existing secret | `` |
270273| ` opencloud.storage.s3.internal.rootUser ` | MinIO root user | ` opencloud ` |
271274| ` opencloud.storage.s3.internal.rootPassword ` | MinIO root password | ` opencloud-secret-key ` |
272275| ` opencloud.storage.s3.internal.bucketName ` | MinIO bucket name | ` opencloud-bucket ` |
@@ -279,6 +282,7 @@ This will prepend `my-registry.com/` to all image references in the chart. For e
279282| ` opencloud.storage.s3.external.enabled ` | Enable external S3 | ` false ` |
280283| ` opencloud.storage.s3.external.endpoint ` | External S3 endpoint URL | ` "" ` |
281284| ` opencloud.storage.s3.external.region ` | External S3 region | ` default ` |
285+ | ` opencloud.storage.s3.external.existingSecret ` | Name of the existing secret | `` |
282286| ` opencloud.storage.s3.external.accessKey ` | External S3 access key | ` "" ` |
283287| ` opencloud.storage.s3.external.secretKey ` | External S3 secret key | ` "" ` |
284288| ` opencloud.storage.s3.external.bucket ` | External S3 bucket | ` "" ` |
@@ -297,6 +301,7 @@ By default the chart deploys an internal keycloak. It can be disabled and replac
297301| ` keycloak.internal.image.tag ` | Keycloak image tag | ` 26.1.4 ` |
298302| ` keycloak.internal.image.pullPolicy ` | Image pull policy | ` IfNotPresent ` |
299303| ` keycloak.internal.replicas ` | Number of replicas | ` 1 ` |
304+ | ` keycloak.internal.existingSecret ` | Name of the existing secret | `` |
300305| ` keycloak.internal.adminUser ` | Admin user | ` admin ` |
301306| ` keycloak.internal.adminPassword ` | Admin password | ` admin ` |
302307| ` keycloak.internal.realm ` | Realm name | ` openCloud ` |
@@ -327,6 +332,7 @@ keycloak:
327332| --------- | ----------- | ------- |
328333| `postgres.enabled` | Enable PostgreSQL | `true` |
329334| `postgres.database` | Database name | `keycloak` |
335+ | `postgres.existingSecret` | Name of the existing secret | `` |
330336| `postgres.user` | Database user | `keycloak` |
331337| `postgres.password` | Database password | `keycloak` |
332338| `postgres.resources` | CPU/Memory resource requests/limits | `{}` |
@@ -349,9 +355,8 @@ keycloak:
349355| `onlyoffice.persistence.enabled` | Enable persistence | `true` |
350356| `onlyoffice.persistence.size` | Size of the persistent volume | `2Gi` |
351357| `onlyoffice.resources` | CPU/Memory resource requests/limits | `{}` |
352- | `onlyoffice.config.coAuthoring.token.enable.request.inbox` | Enable token for incoming requests | `true` |
353- | `onlyoffice.config.coAuthoring.token.enable.request.outbox` | Enable token for outgoing requests | `true` |
354- | `onlyoffice.config.coAuthoring.token.enable.browser` | Enable token for browser requests | `true` |
358+ | `onlyoffice.config.coAuthoring.secret.existingSecret` | Name of the existing secret | `` |
359+ | `onlyoffice.config.coAuthoring.secret.session.string` | Session string for onlyoffice | `` |
355360| `onlyoffice.collaboration.enabled` | Enable collaboration service | `true` |
356361
357362If you use Traefik and enable OnlyOffice, this chart will automatically create a `Middleware`
@@ -369,6 +374,7 @@ This ensures the `X-Forwarded-Proto: https` header is added as required by OnlyO
369374| `collabora.image.repository` | Collabora image repository | `collabora/code` |
370375| `collabora.image.tag` | Collabora image tag | `24.04.13.2.1` |
371376| `collabora.image.pullPolicy` | Image pull policy | `IfNotPresent` |
377+ | `collabora.existingSecret` | Name of the existing secret | `` |
372378| `collabora.adminUser` | Admin user | `admin` |
373379| `collabora.adminPassword` | Admin password | `admin` |
374380| `collabora.ssl.enabled` | Enable SSL | `true` |
@@ -402,7 +408,7 @@ The following HTTPRoutes are created when `httpRoute.enabled` is set to `true`:
402408 - Port : 9200
403409 - Headers : Removes Permissions-Policy header to prevent browser console errors
404410
405- 2. **Keycloak HTTPRoute** (when `keycloak.enabled` is `true`) :
411+ 2. **Keycloak HTTPRoute** (when `keycloak.internal. enabled` is `true`) :
406412 - Hostname : ` global.domain.keycloak`
407413 - Service : ` {{ release-name }}-keycloak`
408414 - Port : 8080
0 commit comments