mirror of
https://gitlab.com/oecis/charts.git
synced 2024-11-19 13:19:03 +00:00
remove vaultwarden
This commit is contained in:
parent
69ec141244
commit
ac889209f2
1
charts/vaultwarden/.github/FUNDING.yml
vendored
1
charts/vaultwarden/.github/FUNDING.yml
vendored
@ -1 +0,0 @@
|
||||
github: [guerzon]
|
5
charts/vaultwarden/.gitignore
vendored
5
charts/vaultwarden/.gitignore
vendored
@ -1,5 +0,0 @@
|
||||
*.tgz
|
||||
/.idea/*
|
||||
.vscode
|
||||
.DS_Store
|
||||
testing-values.yaml
|
@ -1,21 +0,0 @@
|
||||
# Patterns to ignore when building packages.
|
||||
# This supports shell glob matching, relative path matching, and
|
||||
# negation (prefixed with !). Only one pattern per line.
|
||||
.DS_Store
|
||||
# Common VCS dirs
|
||||
.git/
|
||||
.gitignore
|
||||
.bzr/
|
||||
.bzrignore
|
||||
.hg/
|
||||
.hgignore
|
||||
.svn/
|
||||
# Common backup files
|
||||
*.swp
|
||||
*.bak
|
||||
*.tmp
|
||||
*~
|
||||
# Various IDEs
|
||||
.project
|
||||
.idea/
|
||||
*.tmproj
|
@ -1,33 +0,0 @@
|
||||
|
||||
# Contributing Guide
|
||||
|
||||
## Requirements
|
||||
|
||||
1. Fork this repository, develop, and test your changes.
|
||||
2. Submit a pull request.
|
||||
|
||||
### Technical Requirements
|
||||
|
||||
When submitting a pull request, please ensure that:
|
||||
|
||||
- The PR follow [Helm best practices](https://helm.sh/docs/chart_best_practices/).
|
||||
- Any change to a chart requires a version bump following [semver](https://semver.org/) principles.
|
||||
- The tables of parameters are generated based on the metadata information from the `values.yaml` file, by using [this tool](https://github.com/bitnami-labs/readme-generator-for-helm).
|
||||
|
||||
A quick way to do this is to run the tool via Docker:
|
||||
|
||||
```bash
|
||||
# Clone and build:
|
||||
git clone https://github.com/bitnami-labs/readme-generator-for-helm
|
||||
cd readme-generator-for-helm/
|
||||
docker build -t readme-gen .
|
||||
|
||||
# Run the tool and mount the current project directory.
|
||||
cd <this-project-dir>
|
||||
docker run --rm -d -it --name readmegen -v $(pwd):/mnt readme-gen bash
|
||||
docker exec -it readmegen bash
|
||||
|
||||
# Update the values documentation
|
||||
cd /mnt
|
||||
readme-generator -v values.yaml -r README.md
|
||||
```
|
@ -1,15 +0,0 @@
|
||||
apiVersion: v2
|
||||
name: vaultwarden
|
||||
description: vaultwarden is an unofficial Bitwarden-compatible server written in Rust
|
||||
keywords:
|
||||
- Rust
|
||||
- vaultwarden
|
||||
sources:
|
||||
- https://github.com/guerzon/vaultwarden
|
||||
- https://github.com/dani-garcia/vaultwarden
|
||||
appVersion: 1.24.0
|
||||
maintainers:
|
||||
- name: Lester Guerzon
|
||||
email: lester.guerzon@gmail.com
|
||||
url: https://github.com/guerzon
|
||||
version: 0.8.0
|
@ -1,21 +0,0 @@
|
||||
MIT License
|
||||
|
||||
Copyright (c) 2022 Lester Guerzon
|
||||
|
||||
Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||
of this software and associated documentation files (the "Software"), to deal
|
||||
in the Software without restriction, including without limitation the rights
|
||||
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||
copies of the Software, and to permit persons to whom the Software is
|
||||
furnished to do so, subject to the following conditions:
|
||||
|
||||
The above copyright notice and this permission notice shall be included in all
|
||||
copies or substantial portions of the Software.
|
||||
|
||||
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
||||
SOFTWARE.
|
@ -1,92 +0,0 @@
|
||||
# vaultwarden
|
||||
|
||||
![Version: 0.8.0](https://img.shields.io/badge/Version-0.8.0-informational?style=flat-square) ![AppVersion: 1.24.0](https://img.shields.io/badge/AppVersion-1.24.0-informational?style=flat-square)
|
||||
|
||||
vaultwarden is an unofficial Bitwarden-compatible server written in Rust
|
||||
|
||||
## Maintainers
|
||||
|
||||
| Name | Email | Url |
|
||||
| ---- | ------ | --- |
|
||||
| Lester Guerzon | <lester.guerzon@gmail.com> | <https://github.com/guerzon> |
|
||||
|
||||
## Source Code
|
||||
|
||||
* <https://github.com/guerzon/vaultwarden>
|
||||
* <https://github.com/dani-garcia/vaultwarden>
|
||||
|
||||
## Values
|
||||
|
||||
| Key | Type | Default | Description |
|
||||
|-----|------|---------|-------------|
|
||||
| adminToken.existingSecretKey | string | `"ADMIN_TOKEN"` | |
|
||||
| adminToken.value | string | `"R@ndomToken$tring"` | |
|
||||
| affinity | object | `{}` | |
|
||||
| database.dbName | string | `""` | |
|
||||
| database.host | string | `""` | |
|
||||
| database.password | string | `""` | |
|
||||
| database.port | string | `""` | |
|
||||
| database.type | string | `"default"` | |
|
||||
| database.uriOverride | string | `""` | |
|
||||
| database.username | string | `""` | |
|
||||
| domain | string | `""` | |
|
||||
| fullnameOverride | string | `""` | |
|
||||
| image.pullPolicy | string | `"IfNotPresent"` | |
|
||||
| image.pullSecrets | list | `[]` | |
|
||||
| image.registry | string | `"docker.io"` | |
|
||||
| image.repository | string | `"vaultwarden/server"` | |
|
||||
| image.tag | string | `"1.24.0"` | |
|
||||
| ingress.additionalAnnotations | object | `{}` | |
|
||||
| ingress.class | string | `"nginx"` | |
|
||||
| ingress.enabled | bool | `false` | |
|
||||
| ingress.hostname | string | `"warden.contoso.com"` | |
|
||||
| ingress.nginxAllowList | string | `""` | |
|
||||
| ingress.nginxIngressAnnotations | bool | `true` | |
|
||||
| ingress.path | string | `"/"` | |
|
||||
| ingress.pathType | string | `"ImplementationSpecific"` | |
|
||||
| ingress.pathTypeWs | string | `"ImplementationSpecific"` | |
|
||||
| ingress.pathWs | string | `"/notifications/hub"` | |
|
||||
| ingress.tls | bool | `true` | |
|
||||
| ingress.tlsSecret | string | `""` | |
|
||||
| initContainers | list | `[]` | |
|
||||
| invitationsAllowed | bool | `true` | |
|
||||
| logging.enabled | bool | `false` | |
|
||||
| logging.logfile | string | `"/data/vaultwarden.log"` | |
|
||||
| logging.loglevel | string | `"warn"` | |
|
||||
| nodeSelector | object | `{}` | |
|
||||
| rocket.port | string | `"8080"` | |
|
||||
| rocket.workers | string | `"10"` | |
|
||||
| service.annotations | object | `{}` | |
|
||||
| service.type | string | `"ClusterIP"` | |
|
||||
| serviceAccount.create | bool | `true` | |
|
||||
| serviceAccount.name | string | `"vaultwarden-svc"` | |
|
||||
| showPassHint | string | `"false"` | |
|
||||
| sidecars | list | `[]` | |
|
||||
| signupDomains | string | `"contoso.com"` | |
|
||||
| signupsAllowed | bool | `true` | |
|
||||
| signupsVerify | string | `"true"` | |
|
||||
| smtp.acceptInvalidCerts | string | `"false"` | |
|
||||
| smtp.acceptInvalidHostnames | string | `"false"` | |
|
||||
| smtp.authMechanism | string | `"Plain"` | |
|
||||
| smtp.debug | bool | `false` | |
|
||||
| smtp.from | string | `""` | |
|
||||
| smtp.fromName | string | `""` | |
|
||||
| smtp.host | string | `""` | |
|
||||
| smtp.password.existingSecretKey | string | `"SMTP_PASSWORD"` | |
|
||||
| smtp.password.value | string | `""` | |
|
||||
| smtp.port | int | `25` | |
|
||||
| smtp.security | string | `"starttls"` | |
|
||||
| smtp.username.existingSecretKey | string | `"SMTP_USERNAME"` | |
|
||||
| smtp.username.value | string | `""` | |
|
||||
| storage.class | string | `"default"` | |
|
||||
| storage.dataDir | string | `"/data"` | |
|
||||
| storage.enabled | bool | `false` | |
|
||||
| storage.size | string | `"15Gi"` | |
|
||||
| tolerations | list | `[]` | |
|
||||
| webVaultEnabled | string | `"true"` | |
|
||||
| websocket.address | string | `"0.0.0.0"` | |
|
||||
| websocket.enabled | bool | `true` | |
|
||||
| websocket.port | int | `3012` | |
|
||||
|
||||
----------------------------------------------
|
||||
Autogenerated from chart metadata using [helm-docs v1.11.0](https://github.com/norwoodj/helm-docs/releases/v1.11.0)
|
@ -1,17 +0,0 @@
|
||||
|
||||
domain: "https://vaultwarden.contoso.com"
|
||||
|
||||
ingress:
|
||||
enabled: true
|
||||
hostname: vaultwarden.contoso.com
|
||||
class: "alb"
|
||||
additionalAnnotations:
|
||||
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||
alb.ingress.kubernetes.io/tags: Environment=dev,Team=test
|
||||
alb.ingress.kubernetes.io/certificate-arn: "arn:aws:acm:eu-central-1:ACCOUNT:certificate/LONGID"
|
||||
|
||||
adminToken: "khit9gYQV6ax9LKTTm+s6QbZi5oiuR+3s1PEn9q3IRmCl9IQn7LmBpmFCOYTb7Mr"
|
||||
|
||||
image:
|
||||
pullSecrets:
|
||||
- myRegKey
|
@ -1,7 +0,0 @@
|
||||
** Please be patient while the chart is being deployed **
|
||||
|
||||
Thanks for installing {{ .Chart.Name }}.
|
||||
|
||||
You have named your release: {{ .Release.Name }}.
|
||||
|
||||
Vaultwarden is accessible here: {{ .Values.ingress.hostname }}
|
@ -1,31 +0,0 @@
|
||||
{{/*
|
||||
Return a default application name.
|
||||
*/}}
|
||||
{{- define "vaultwarden.fullname" -}}
|
||||
{{- if .Values.fullnameOverride -}}
|
||||
{{- .Values.fullnameOverride | trunc 20 | trimSuffix "-" -}}
|
||||
{{- else -}}
|
||||
{{- $name := default .Chart.Name .Values.nameOverride -}}
|
||||
{{- if contains $name .Release.Name -}}
|
||||
{{- .Release.Name | trunc 20 | trimSuffix "-" -}}
|
||||
{{- else -}}
|
||||
{{- printf "%s-%s" .Release.Name $name | trunc 20 | trimSuffix "-" -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
{{- end -}}
|
||||
|
||||
{{- define "dbPort" -}}
|
||||
{{- if .Values.database.port }}
|
||||
{{- printf "%s%s" ":" .Values.database.port }}
|
||||
{{- else }}
|
||||
{{- printf "%s" "" }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
|
||||
{{/*
|
||||
Return the database string
|
||||
*/}}
|
||||
{{ define "dbString" }}
|
||||
{{- $var := print .Values.database.type "://" .Values.database.username ":" .Values.database.password "@" .Values.database.host (include "dbPort" . ) "/" .Values.database.dbName }}
|
||||
{{- printf "%s" $var }}
|
||||
{{- end -}}
|
@ -1,45 +0,0 @@
|
||||
apiVersion: v1
|
||||
kind: ConfigMap
|
||||
metadata:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
data:
|
||||
DOMAIN: {{ .Values.domain | quote }}
|
||||
{{- if ne "default" .Values.database.type }}
|
||||
{{- if .Values.database.uriOverride }}
|
||||
DATABASE_URL: {{ .Values.database.uriOverride }}
|
||||
{{- else }}
|
||||
DATABASE_URL: {{ include "dbString" . | quote }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
{{- if and .Values.smtp.host .Values.smtp.from | quote }}
|
||||
SMTP_HOST: {{ .Values.smtp.host | quote }}
|
||||
SMTP_SECURITY: {{ .Values.smtp.security | quote }}
|
||||
SMTP_PORT: {{ .Values.smtp.port | quote }}
|
||||
SMTP_AUTH_MECHANISM: {{ .Values.smtp.authMechanism | quote }}
|
||||
SMTP_FROM: {{ .Values.smtp.from | quote }}
|
||||
SMTP_FROM_NAME: {{ default "Vaultwarden" .Values.smtp.fromName | quote }}
|
||||
SMTP_DEBUG: {{ .Values.smtp.debug | quote }}
|
||||
SMTP_ACCEPT_INVALID_HOSTNAMES: {{ .Values.smtp.acceptInvalidHostnames | quote }}
|
||||
SMTP_ACCEPT_INVALID_CERTS: {{ .Values.smtp.acceptInvalidCerts | quote }}
|
||||
{{- end }}
|
||||
{{- if .Values.websocket.enabled }}
|
||||
WEBSOCKET_ENABLED: "true"
|
||||
WEBSOCKET_ADDRESS: {{ .Values.websocket.address | quote }}
|
||||
WEBSOCKET_PORT: {{ .Values.websocket.port | quote }}
|
||||
{{- end }}
|
||||
DATA_FOLDER: {{ .Values.storage.dataDir | quote }}
|
||||
ROCKET_PORT: {{ .Values.rocket.port | quote }}
|
||||
ROCKET_WORKERS: {{ .Values.rocket.workers | quote }}
|
||||
SHOW_PASSWORD_HINT: {{ .Values.showPassHint | quote }}
|
||||
SIGNUPS_ALLOWED: {{ .Values.signupsAllowed | quote }}
|
||||
INVITATIONS_ALLOWED: {{ .Values.invitationsAllowed | quote }}
|
||||
SIGNUPS_DOMAINS_WHITELIST: {{ .Values.signupDomains | quote }}
|
||||
SIGNUPS_VERIFY: {{ .Values.signupsVerify | quote }}
|
||||
WEB_VAULT_ENABLED: {{ .Values.webVaultEnabled | quote }}
|
||||
{{- if .Values.logging.enabled }}
|
||||
LOG_FILE: {{ .Values.logging.logfile | quote }}
|
||||
LOG_LEVEL: {{ .Values.logging.loglevel | quote }}
|
||||
{{- end }}
|
@ -1,71 +0,0 @@
|
||||
{{- if .Values.ingress.enabled }}
|
||||
{{- $newAPIversion := .Capabilities.APIVersions.Has "networking.k8s.io/v1" }}
|
||||
{{- if $newAPIversion }}
|
||||
apiVersion: networking.k8s.io/v1
|
||||
{{- else }}
|
||||
apiVersion: extensions/v1beta1
|
||||
{{- end }}
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
annotations:
|
||||
ingress.kubernetes.io/rewrite-target: /
|
||||
{{- if .Values.ingress.tls }}
|
||||
ingress.kubernetes.io/ssl-redirect: "true"
|
||||
{{- end }}
|
||||
{{- if .Values.ingress.additionalAnnotations }}
|
||||
{{- toYaml .Values.ingress.additionalAnnotations | nindent 4 }}
|
||||
{{- end }}
|
||||
{{- if .Values.ingress.nginxIngressAnnotations }}
|
||||
nginx.ingress.kubernetes.io/configuration-snippet: |
|
||||
more_set_headers "Request-Id: $req_id";
|
||||
nginx.ingress.kubernetes.io/connection-proxy-header: "keep-alive"
|
||||
nginx.ingress.kubernetes.io/enable-cors: "true"
|
||||
nginx.ingress.kubernetes.io/ssl-redirect: "true"
|
||||
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
|
||||
nginx.ingress.kubernetes.io/limit-connections: "25"
|
||||
nginx.ingress.kubernetes.io/limit-rps: "15"
|
||||
nginx.ingress.kubernetes.io/proxy-body-size: 1024m
|
||||
nginx.ingress.kubernetes.io/proxy-connect-timeout: "10"
|
||||
nginx.ingress.kubernetes.io/proxy-send-timeout: "1800"
|
||||
nginx.ingress.kubernetes.io/proxy-read-timeout: "1800"
|
||||
{{- if .Values.ingress.nginxAllowList }}
|
||||
nginx.ingress.kubernetes.io/whitelist-source-range: {{ .Values.ingress.nginxAllowList }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
spec:
|
||||
{{- if .Values.ingress.class }}
|
||||
ingressClassName: {{ .Values.ingress.class | quote }}
|
||||
{{- end }}
|
||||
{{- if .Values.ingress.tls }}
|
||||
tls:
|
||||
- hosts:
|
||||
- {{ .Values.ingress.hostname | quote }}
|
||||
{{- if eq "nginx" .Values.ingress.class }}
|
||||
secretName: {{ .Values.ingress.tlsSecret }}
|
||||
{{- end }}
|
||||
{{- end }}
|
||||
rules:
|
||||
- host: {{ .Values.ingress.hostname | quote }}
|
||||
http:
|
||||
paths:
|
||||
- path: {{ .Values.ingress.path }}
|
||||
pathType: {{ .Values.ingress.pathType }}
|
||||
backend:
|
||||
service:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
port:
|
||||
name: "http"
|
||||
{{- if .Values.websocket.enabled }}
|
||||
- path: {{ .Values.ingress.pathWs }}
|
||||
pathType: {{ .Values.ingress.pathTypeWs }}
|
||||
backend:
|
||||
service:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
port:
|
||||
name: "websocket"
|
||||
{{- end }}
|
||||
{{- end }}
|
@ -1,48 +0,0 @@
|
||||
{{- if .Values.serviceAccount.create }}
|
||||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: {{ .Values.serviceAccount.name }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
rules:
|
||||
- apiGroups: ["extensions", "apps"]
|
||||
resources: ["deployments"]
|
||||
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
|
||||
- apiGroups: [""]
|
||||
resources: ["pods"]
|
||||
verbs: ["create","delete","get","list","patch","update","watch"]
|
||||
- apiGroups: [""]
|
||||
resources: ["pods/exec"]
|
||||
verbs: ["create","delete","get","list","patch","update","watch"]
|
||||
- apiGroups: [""]
|
||||
resources: ["pods/log"]
|
||||
verbs: ["get","list","watch"]
|
||||
- apiGroups: [""]
|
||||
resources: ["secrets"]
|
||||
verbs: ["get"]
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: Role
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: {{ .Values.serviceAccount.name }}
|
||||
{{- end }}
|
@ -1,18 +0,0 @@
|
||||
{{ if not (and (hasKey .Values.smtp "existingSecret") (hasKey .Values.adminToken "existingSecret")) }}
|
||||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
type: Opaque
|
||||
data:
|
||||
{{- if not (hasKey .Values.smtp "existingSecret") }}
|
||||
SMTP_PASSWORD: {{ .Values.smtp.password.value | b64enc | quote }}
|
||||
SMTP_USERNAME: {{ .Values.smtp.username.value | b64enc | quote }}
|
||||
{{- end }}
|
||||
{{- if not (hasKey .Values.adminToken "existingSecret") }}
|
||||
ADMIN_TOKEN: {{ .Values.adminToken.value | b64enc | quote }}
|
||||
{{- end }}
|
||||
{{ end }}
|
@ -1,26 +0,0 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
{{- if .Values.service.annotations }}
|
||||
annotations:
|
||||
{{- toYaml .Values.service.annotations | nindent 4 }}
|
||||
{{- end }}
|
||||
spec:
|
||||
type: {{ .Values.service.type | quote }}
|
||||
selector:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
ports:
|
||||
- name: "http"
|
||||
port: 80
|
||||
protocol: TCP
|
||||
targetPort: 8080
|
||||
{{- if .Values.websocket.enabled }}
|
||||
- name: "websocket"
|
||||
port: 3012
|
||||
protocol: TCP
|
||||
targetPort: {{ .Values.websocket.port }}
|
||||
{{- end }}
|
@ -1,102 +0,0 @@
|
||||
apiVersion: apps/v1
|
||||
kind: StatefulSet
|
||||
metadata:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
spec:
|
||||
serviceName: vaultwarden
|
||||
replicas: 1
|
||||
selector:
|
||||
matchLabels:
|
||||
app: vaultwarden
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: vaultwarden
|
||||
app.kubernetes.io/component: vaultwarden
|
||||
annotations:
|
||||
checksum/config: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha1sum }}
|
||||
checksum/secret: {{ include (print $.Template.BasePath "/secrets.yaml") . | sha1sum }}
|
||||
spec:
|
||||
{{- if .Values.nodeSelector }}
|
||||
nodeSelector:
|
||||
{{- toYaml .Values.nodeSelector | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.affinity }}
|
||||
affinity:
|
||||
{{- toYaml .Values.affinity | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.tolerations }}
|
||||
tolerations:
|
||||
{{- toYaml .Values.tolerations | nindent 8 }}
|
||||
{{- end }}
|
||||
initContainers:
|
||||
{{- if .Values.initContainers }}
|
||||
{{- toYaml .Values.initContainers | nindent 8 }}
|
||||
{{- end }}
|
||||
containers:
|
||||
- image: {{ .Values.image.registry }}/{{ .Values.image.repository }}:{{ .Values.image.tag }}
|
||||
imagePullPolicy: {{ .Values.image.pullPolicy }}
|
||||
name: vaultwarden
|
||||
envFrom:
|
||||
- configMapRef:
|
||||
name: {{ include "vaultwarden.fullname" . }}
|
||||
env:
|
||||
- name: SMTP_USERNAME
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ default (include "vaultwarden.fullname" .) .Values.smtp.existingSecret }}
|
||||
key: {{ default "SMTP_USERNAME" .Values.smtp.username.existingSecretKey }}
|
||||
- name: SMTP_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ default (include "vaultwarden.fullname" .) .Values.smtp.existingSecret }}
|
||||
key: {{ default "SMTP_PASSWORD" .Values.smtp.password.existingSecretKey }}
|
||||
- name: ADMIN_TOKEN
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: {{ default (include "vaultwarden.fullname" .) .Values.adminToken.existingSecret }}
|
||||
key: {{ default "ADMIN_TOKEN" .Values.adminToken.existingSecretKey }}
|
||||
ports:
|
||||
- containerPort: 8080
|
||||
name: http
|
||||
protocol: TCP
|
||||
- containerPort: {{ .Values.websocket.port }}
|
||||
name: websocket
|
||||
protocol: TCP
|
||||
{{- if .Values.storage.enabled }}
|
||||
volumeMounts:
|
||||
- name: vaultwarden-data
|
||||
mountPath: {{ .Values.storage.dataDir }}
|
||||
{{- end }}
|
||||
resources:
|
||||
limits:
|
||||
cpu: 300m
|
||||
memory: 1Gi
|
||||
requests:
|
||||
cpu: 50m
|
||||
memory: 256Mi
|
||||
{{- if .Values.sidecars }}
|
||||
{{- toYaml .Values.sidecars | nindent 8 }}
|
||||
{{- end }}
|
||||
{{- if .Values.serviceAccount.create }}
|
||||
serviceAccountName: {{ .Values.serviceAccount.name }}
|
||||
{{- end }}
|
||||
{{- if .Values.storage.enabled }}
|
||||
persistentVolumeClaimRetentionPolicy:
|
||||
whenDeleted: Retain
|
||||
whenScaled: Retain
|
||||
volumeClaimTemplates:
|
||||
- metadata:
|
||||
name: vaultwarden-data
|
||||
spec:
|
||||
accessModes:
|
||||
- "ReadWriteOnce"
|
||||
resources:
|
||||
requests:
|
||||
storage: {{ .Values.storage.size }}
|
||||
storageClassName: {{ default "default" .Values.storage.class }}
|
||||
{{- end }}
|
@ -1,282 +0,0 @@
|
||||
|
||||
## @section Vaultwarden settings
|
||||
##
|
||||
image:
|
||||
## @param image.registry Vaultwarden image registry
|
||||
##
|
||||
registry: docker.io
|
||||
## @param image.repository Vaultwarden image repository
|
||||
##
|
||||
repository: vaultwarden/server
|
||||
##
|
||||
## @param image.tag Vaultwarden image tag
|
||||
## Ref: https://hub.docker.com/r/vaultwarden/server/tags
|
||||
##
|
||||
tag: "1.24.0"
|
||||
## @param image.pullPolicy Vaultwarden image pull policy
|
||||
## ref: https://kubernetes.io/docs/user-guide/images/#pre-pulling-images
|
||||
##
|
||||
pullPolicy: IfNotPresent
|
||||
## @param image.pullSecrets Specify docker-registry secret names
|
||||
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
|
||||
## Example:
|
||||
## pullSecrets:
|
||||
## - myRegistryKeySecretName
|
||||
##
|
||||
pullSecrets: []
|
||||
## @param domain Domain name where the application is accessed
|
||||
## Example: https://warden.contoso.com:8443
|
||||
##
|
||||
domain: ""
|
||||
## @param websocket.enabled Enable websocket notifications
|
||||
## @param websocket.address Websocket listen address
|
||||
## @param websocket.port Websocket listen port
|
||||
##
|
||||
websocket:
|
||||
enabled: true
|
||||
address: "0.0.0.0"
|
||||
port: 3012
|
||||
## @param rocket.port Rocket port
|
||||
## @param rocket.workers Rocket number of workers
|
||||
##
|
||||
rocket:
|
||||
port: "8080"
|
||||
workers: "10"
|
||||
## @param webVaultEnabled Enable Web Vault
|
||||
##
|
||||
webVaultEnabled: "true"
|
||||
|
||||
## @section Security settings
|
||||
##
|
||||
## @param adminToken The admin token used for /admin
|
||||
##
|
||||
adminToken:
|
||||
#existingSecret: vaultwarden
|
||||
existingSecretKey: ADMIN_TOKEN
|
||||
value: "R@ndomToken$tring"
|
||||
## @param signupsAllowed By default, anyone who can access your instance can register for a new account.
|
||||
## To disable this, set this parameter to false. Even when signupsAllowed=false, an existing user who is
|
||||
## an organization owner or admin can still invite new users. If you want to disable this as well, set
|
||||
## invitationsAllowed to false. The vaultwarden admin can invite anyone via the admin page, regardless
|
||||
## of any of the restrictions above
|
||||
##
|
||||
## If signupDomains is set, then the value of signupsAllowed is ignored
|
||||
signupsAllowed: true
|
||||
## @param invitationsAllowed Even when registration is disabled, organization administrators or owners can
|
||||
## invite users to join organization. After they are invited, they can register with the invited email even
|
||||
## if signupsAllowed is actually set to false. You can disable this functionality completely by setting
|
||||
## invitationsAllowed env variable to false
|
||||
invitationsAllowed: true
|
||||
## @param signupDomains List of domain names for users allowed to register
|
||||
##
|
||||
signupDomains: "contoso.com"
|
||||
## @param signupsVerify Whether to require account verification for newly-registered users.
|
||||
##
|
||||
signupsVerify: "true"
|
||||
## @param showPassHint Whether a password hint should be shown in the page.
|
||||
##
|
||||
showPassHint: "false"
|
||||
## @param fullnameOverride String to override the application name.
|
||||
##
|
||||
fullnameOverride: ""
|
||||
## @param serviceAccount.create Create a service account
|
||||
## @param serviceAccount.name Name of the service account to create
|
||||
##
|
||||
serviceAccount:
|
||||
create: true
|
||||
name: "vaultwarden-svc"
|
||||
|
||||
## @section Exposure Parameters
|
||||
##
|
||||
|
||||
## Ingress configuration
|
||||
## Refer to the README for some examples
|
||||
##
|
||||
ingress:
|
||||
## @param ingress.enabled Deploy an ingress resource.
|
||||
##
|
||||
enabled: false
|
||||
## @param ingress.class Ingress resource class
|
||||
## The Ingress class to use, e. g. "nginx" for a nginx ingress controller or "alb" for a AWS LB controller.
|
||||
#
|
||||
class: "nginx"
|
||||
## @param ingress.nginxIngressAnnotations Add nginx specific ingress annotations
|
||||
## This annotations are only makes sense for the kubernetes nginx ingress controller (https://kubernetes.github.io/ingress-nginx/)
|
||||
##
|
||||
nginxIngressAnnotations: true
|
||||
## @param ingress.additionalAnnotations Additional annotations for the ingress resource.
|
||||
##
|
||||
additionalAnnotations: {}
|
||||
## @param ingress.tls Enable TLS on the ingress resource.
|
||||
##
|
||||
tls: true
|
||||
## @param ingress.hostname Hostname for the ingress.
|
||||
##
|
||||
hostname: "warden.contoso.com"
|
||||
## @param ingress.path Default application path for the ingress
|
||||
##
|
||||
path: "/"
|
||||
## @param ingress.pathWs Path for the websocket ingress
|
||||
##
|
||||
pathWs: "/notifications/hub"
|
||||
## @param ingress.pathType Path type for the ingress
|
||||
## Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/
|
||||
##
|
||||
pathType: "ImplementationSpecific"
|
||||
## @param ingress.pathTypeWs Path type for the ingress
|
||||
## Ref: https://kubernetes.io/docs/concepts/services-networking/ingress/
|
||||
##
|
||||
pathTypeWs: "ImplementationSpecific"
|
||||
## @param ingress.tlsSecret Kubernetes secret containing the SSL certificate when using the "nginx" class.
|
||||
##
|
||||
tlsSecret: ""
|
||||
## @param ingress.nginxAllowList Comma-separated list of IP addresses and subnets to allow.
|
||||
##
|
||||
nginxAllowList: ""
|
||||
## TODO:
|
||||
## - Add support for using cert-manager.
|
||||
## - Support for multiple TLS hostnames.
|
||||
##
|
||||
|
||||
## Service configuration
|
||||
service:
|
||||
## @param service.type Service type
|
||||
##
|
||||
type: "ClusterIP"
|
||||
## @param service.annotations Additional annotations for the vaultwarden service
|
||||
##
|
||||
annotations: {}
|
||||
|
||||
## @section Database Configuration
|
||||
##
|
||||
database:
|
||||
## @param database.type Database type, either mysql or postgresql
|
||||
## Default is a sqlite database.
|
||||
##
|
||||
type: "default"
|
||||
## @param database.host Database hostname or IP address
|
||||
##
|
||||
host: ""
|
||||
## @param database.port Database port
|
||||
## Default for MySQL is 3306, default for PostgreSQL is 5432
|
||||
port: ""
|
||||
## @param database.username Database username
|
||||
##
|
||||
username: ""
|
||||
## @param database.password Database password
|
||||
##
|
||||
password: ""
|
||||
## @param database.dbName Database name
|
||||
##
|
||||
dbName: ""
|
||||
## @param database.uriOverride Manually specify the DB connection string
|
||||
##
|
||||
uriOverride: ""
|
||||
|
||||
## @section SMTP Configuration
|
||||
##
|
||||
smtp:
|
||||
#existingSecret: vaultwarden
|
||||
## @param smtp.host SMTP host
|
||||
##
|
||||
host: ""
|
||||
## @param smtp.security SMTP Encryption method
|
||||
## Possible values:
|
||||
## - starttls: explicit TLS using ports 587 or 25
|
||||
## - force_tls: implicit TLS using port 465
|
||||
## - off: no encryption, using port 25, unless using STARTTLS
|
||||
##
|
||||
security: "starttls"
|
||||
## @param smtp.port SMTP port
|
||||
##
|
||||
port: 25
|
||||
## @param smtp.from SMTP sender email address
|
||||
## Example: juan.delacruz@gmail.com
|
||||
##
|
||||
from: ""
|
||||
## @param smtp.fromName SMTP sender FROM
|
||||
##
|
||||
fromName: ""
|
||||
## @param smtp.username Username for the SMTP authentication.
|
||||
## Example: juan
|
||||
##
|
||||
username:
|
||||
existingSecretKey: SMTP_USERNAME
|
||||
value: ""
|
||||
## @param smtp.password Password for the SMTP service.
|
||||
##
|
||||
password:
|
||||
existingSecretKey: SMTP_PASSWORD
|
||||
value: ""
|
||||
## @param smtp.authMechanism SMTP authentication mechanism
|
||||
## Possible values: "Plain", "Login", "Xoauth2"
|
||||
## Multiple options need to be separated by a comma. (not tested)
|
||||
##
|
||||
authMechanism: "Plain"
|
||||
## @param smtp.acceptInvalidHostnames Accept Invalid Hostnames
|
||||
##
|
||||
acceptInvalidHostnames: "false"
|
||||
## @param smtp.acceptInvalidCerts Accept Invalid Certificates
|
||||
##
|
||||
acceptInvalidCerts: "false"
|
||||
## @param smtp.debug SMTP debugging
|
||||
##
|
||||
debug: false
|
||||
|
||||
## @section Storage Configuration
|
||||
##
|
||||
storage:
|
||||
## @param storage.enabled Enable configuration for persistent storage
|
||||
##
|
||||
enabled: false
|
||||
## @param storage.size Storage size for /data
|
||||
##
|
||||
size: "15Gi"
|
||||
## @param storage.class Specify the storage class
|
||||
##
|
||||
class: "default"
|
||||
## @param storage.dataDir Specify the data directory
|
||||
##
|
||||
dataDir: "/data"
|
||||
|
||||
## @section Logging Configuration
|
||||
##
|
||||
logging:
|
||||
## @param logging.enabled Enable logging to a file
|
||||
##
|
||||
enabled: false
|
||||
## @param logging.logfile Specify logfile path for output log
|
||||
##
|
||||
logfile: "/data/vaultwarden.log"
|
||||
## @param logging.loglevel Specify the log level
|
||||
##
|
||||
loglevel: "warn"
|
||||
|
||||
## @section Extra containers Configuration
|
||||
##
|
||||
|
||||
## @param initContainers extra init containers for initializing the vaultwarden instance
|
||||
##
|
||||
initContainers: []
|
||||
|
||||
## @param sidecars extra containers running alongside the vaultwarden instance
|
||||
##
|
||||
sidecars: []
|
||||
|
||||
## @section Extra Configuration
|
||||
##
|
||||
|
||||
## @param nodeSelector Node labels for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#nodeselector
|
||||
##
|
||||
nodeSelector: {}
|
||||
|
||||
## @param affinity Affinity for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/assign-pod-node/#affinity-and-anti-affinity
|
||||
##
|
||||
affinity: {}
|
||||
|
||||
## @param tolerations Tolerations for pod assignment
|
||||
## Ref: https://kubernetes.io/docs/concepts/configuration/taint-and-toleration/
|
||||
##
|
||||
tolerations: []
|
Loading…
Reference in New Issue
Block a user