add admin backend stuff

This commit is contained in:
Maarten de Waard 2021-09-30 16:03:54 +02:00
parent 4087d1b0d3
commit 82abc9b73d
No known key found for this signature in database
GPG key ID: 1D3E893A657CC8DA
9 changed files with 362 additions and 261 deletions

View file

@ -18,7 +18,8 @@ keywords:
maintainers: maintainers:
- email: info@openappstack.net - email: info@openappstack.net
name: Stackspin name: Stackspin
name: admin-frontend name: admin-panel
sources: sources:
- https://open.greenhost.net/openappstack/admin-frontend/ - https://open.greenhost.net/openappstack/admin-frontend/
- https://open.greenhost.net/openappstack/admin-backend/
version: 0.1.0 version: 0.1.0

View file

@ -2,7 +2,7 @@
{{/* {{/*
Create the name of the service account to use Create the name of the service account to use
*/}} */}}
{{- define "adminFrontend.serviceAccountName" -}} {{- define "adminPanel.serviceAccountName" -}}
{{- if .Values.serviceAccount.create -}} {{- if .Values.serviceAccount.create -}}
{{ default (include "common.names.fullname" .) .Values.serviceAccount.name }} {{ default (include "common.names.fullname" .) .Values.serviceAccount.name }}
{{- else -}} {{- else -}}
@ -13,15 +13,15 @@ Create the name of the service account to use
{{/* {{/*
Return the proper Docker image registry secret names Return the proper Docker image registry secret names
*/}} */}}
{{- define "adminFrontend.imagePullSecrets" -}} {{- define "adminPanel.imagePullSecrets" -}}
{{ include "common.images.pullSecrets" (dict "images" (list .Values.image) "global" .Values.global) }} {{ include "common.images.pullSecrets" (dict "images" (list .Values.image) "global" .Values.global) }}
{{- end -}} {{- end -}}
{{/* {{/*
Return true if a secret object for Admin-frontend should be created Return true if a secret object for Admin-frontend should be created
*/}} */}}
{{- define "adminFrontend.createSecret" -}} {{- define "adminPanel.createSecret" -}}
{{- if or (not .Values.adminFrontend.existingSecret) (and (not .Values.adminFrontend.smtp.existingSecret) .Values.adminFrontend.smtp.password .Values.adminFrontend.smtp.enabled) }} {{- if or (not .Values.adminPanel.existingSecret) (and (not .Values.adminPanel.smtp.existingSecret) .Values.adminPanel.smtp.password .Values.adminPanel.smtp.enabled) }}
{{- true -}} {{- true -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
@ -29,30 +29,30 @@ Return true if a secret object for Admin-frontend should be created
{{/* {{/*
Return the Admin-frontend secret name Return the Admin-frontend secret name
*/}} */}}
{{- define "adminFrontend.secretName" -}} {{- define "adminPanel.secretName" -}}
{{- if .Values.adminFrontend.existingSecret }} {{- if .Values.adminPanel.existingSecret }}
{{- printf "%s" .Values.adminFrontend.existingSecret -}} {{- printf "%s" .Values.adminPanel.existingSecret -}}
{{- else -}} {{- else -}}
{{- printf "%s-adminFrontend" (include "common.names.fullname" .) -}} {{- printf "%s-adminPanel" (include "common.names.fullname" .) -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{/* {{/*
Return the Admin-frontend SMTP secret name Return the Admin-frontend SMTP secret name
*/}} */}}
{{- define "adminFrontend.smtp.secretName" -}} {{- define "adminPanel.smtp.secretName" -}}
{{- if .Values.adminFrontend.smtp.existingSecret }} {{- if .Values.adminPanel.smtp.existingSecret }}
{{- printf "%s" .Values.adminFrontend.smtp.existingSecret -}} {{- printf "%s" .Values.adminPanel.smtp.existingSecret -}}
{{- else -}} {{- else -}}
{{- printf "%s-adminFrontend" (include "common.names.fullname" .) -}} {{- printf "%s-adminPanel" (include "common.names.fullname" .) -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
{{/* {{/*
Return true if Admin-frontend SMTP uses password authentication Return true if Admin-frontend SMTP uses password authentication
*/}} */}}
{{- define "adminFrontend.smtp.password.enabled" -}} {{- define "adminPanel.smtp.password.enabled" -}}
{{- if and (or .Values.adminFrontend.smtp.password .Values.adminFrontend.smtp.existingSecret) .Values.adminFrontend.smtp.enabled }} {{- if and (or .Values.adminPanel.smtp.password .Values.adminPanel.smtp.existingSecret) .Values.adminPanel.smtp.enabled }}
{{- true -}} {{- true -}}
{{- end -}} {{- end -}}
{{- end -}} {{- end -}}
@ -61,7 +61,7 @@ Return true if Admin-frontend SMTP uses password authentication
Get the user defined LoadBalancerIP for this release Get the user defined LoadBalancerIP for this release
Note, returns 127.0.0.1 if using ClusterIP. Note, returns 127.0.0.1 if using ClusterIP.
*/}} */}}
{{- define "adminFrontend.serviceIP" -}} {{- define "adminPanel.serviceIP" -}}
{{- if eq .Values.service.type "ClusterIP" -}} {{- if eq .Values.service.type "ClusterIP" -}}
127.0.0.1 127.0.0.1
{{- else -}} {{- else -}}
@ -73,21 +73,27 @@ Note, returns 127.0.0.1 if using ClusterIP.
Gets the host to be used for this application. Gets the host to be used for this application.
If not using ClusterIP, or if a host or LoadBalancerIP is not defined, the value will be empty If not using ClusterIP, or if a host or LoadBalancerIP is not defined, the value will be empty
*/}} */}}
{{- define "adminFrontend.host" -}} {{- define "adminPanel.host" -}}
{{- $host := .Values.adminFrontend.host | default "" -}} {{- $host := .Values.adminPanel.host | default "" -}}
{{- default (include "adminFrontend.serviceIP" .) $host -}} {{- default (include "adminPanel.serviceIP" .) $host -}}
{{- end -}} {{- end -}}
{{/* {{/*
Return the proper Admin-frontend image name Return the proper Admin-frontend image name
*/}} */}}
{{- define "adminFrontend.image" -}} {{- define "adminFrontend.image" -}}
{{ include "common.images.image" (dict "imageRoot" .Values.image "global" .Values.global) }} {{ include "common.images.image" (dict "imageRoot" .Values.adminFrontend.image "global" .Values.global) }}
{{- end -}}
{{/*
Return the proper Admin-backend image name
*/}}
{{- define "adminBackend.image" -}}
{{ include "common.images.image" (dict "imageRoot" .Values.adminBackend.image "global" .Values.global) }}
{{- end -}} {{- end -}}
{{/* {{/*
Return the proper Storage Class Return the proper Storage Class
*/}} */}}
{{- define "adminFrontend.storageClass" -}} {{- define "adminPanel.storageClass" -}}
{{- include "common.storage.class" (dict "persistence" .Values.persistence "global" .Values.global) -}} {{- include "common.storage.class" (dict "persistence" .Values.persistence "global" .Values.global) -}}
{{- end -}} {{- end -}}

View file

@ -11,22 +11,23 @@ metadata:
{{- end }} {{- end }}
data: data:
{{- $port := .Values.service.port | toString }} {{- $port := .Values.service.port | toString }}
REACT_APP_API_URL: {{ .Values.adminFrontend.reactAppApiUrl }} REACT_APP_API_URL: {{ .Values.adminBackend.host }}{{ .Values.adminBackend.ApiUrl }}
EXTEND_ESLINT: {{ .Values.adminFrontend.extendEslint }} EXTEND_ESLINT: {{ .Values.adminFrontend.extendEslint }}
ADMIN_FRONTEND_HOST: "{{ include "adminFrontend.host" . }}" ADMIN_FRONTEND_HOST: "{{ include "adminFrontend.host" . }}"
ADMIN_BACKEND_HOST: "{{ include "adminBackend.host" . }}"
# Probably needed in the future: # Probably needed in the future:
# ADMIN_FRONTEND_USERNAME: {{ .Values.adminFrontend.username | quote }} # ADMIN_BACKEND_USERNAME: {{ .Values.adminBackend.username | quote }}
# ADMIN_FRONTEND_EMAIL: {{ .Values.adminFrontend.email | quote }} # ADMIN_BACKEND_EMAIL: {{ .Values.adminBackend.email | quote }}
# {{- if .Values.adminFrontend.smtp.enabled }} # {{- if .Values.adminBackend.smtp.enabled }}
# ADMIN_FRONTEND_SMTP_HOST: {{ .Values.adminFrontend.smtp.host | quote }} # ADMIN_BACKEND_SMTP_HOST: {{ .Values.adminBackend.smtp.host | quote }}
# ADMIN_FRONTEND_SMTP_PORT: {{ .Values.adminFrontend.smtp.port | quote }} # ADMIN_BACKEND_SMTP_PORT: {{ .Values.adminBackend.smtp.port | quote }}
# {{- if .Values.adminFrontend.smtp.user }} # {{- if .Values.adminBackend.smtp.user }}
# ADMIN_FRONTEND_SMTP_USER: {{ .Values.adminFrontend.smtp.user | quote }} # ADMIN_BACKEND_SMTP_USER: {{ .Values.adminBackend.smtp.user | quote }}
# {{- end }} # {{- end }}
# {{- if .Values.adminFrontend.smtp.protocol }} # {{- if .Values.adminBackend.smtp.protocol }}
# ADMIN_FRONTEND_SMTP_PROTOCOL: {{ .Values.adminFrontend.smtp.protocol | quote }} # ADMIN_BACKEND_SMTP_PROTOCOL: {{ .Values.adminBackend.smtp.protocol | quote }}
# {{- end }} # {{- end }}
# {{- if .Values.adminFrontend.smtp.auth }} # {{- if .Values.adminBackend.smtp.auth }}
# ADMIN_FRONTEND_SMTP_AUTH: {{ .Values.adminFrontend.smtp.auth | quote }} # ADMIN_BACKEND_SMTP_AUTH: {{ .Values.adminBackend.smtp.auth | quote }}
# {{- end }} # {{- end }}
# {{- end }} # {{- end }}

View file

@ -1,10 +1,10 @@
{{- if (include "adminFrontend.host" .) -}} {{- if and (include "adminFrontend.host" .) (include "adminBackend.host" .) -}}
apiVersion: {{ template "common.capabilities.deployment.apiVersion" . }} apiVersion: {{ template "common.capabilities.deployment.apiVersion" . }}
kind: Deployment kind: Deployment
metadata: metadata:
name: {{ template "common.names.fullname" . }} name: {{ template "common.names.fullname" . }}
labels: {{- include "common.labels.standard" . | nindent 4 }} labels: {{- include "common.labels.standard" . | nindent 4 }}
component: adminFrontend component: adminPanel
{{- if .Values.commonLabels }} {{- if .Values.commonLabels }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }} {{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
{{- end }} {{- end }}
@ -15,14 +15,14 @@ spec:
replicas: {{ .Values.replicaCount }} replicas: {{ .Values.replicaCount }}
selector: selector:
matchLabels: {{- include "common.labels.matchLabels" . | nindent 6 }} matchLabels: {{- include "common.labels.matchLabels" . | nindent 6 }}
component: adminFrontend component: adminPanel
{{- if .Values.updateStrategy }} {{- if .Values.updateStrategy }}
strategy: {{- toYaml .Values.updateStrategy | nindent 4 }} strategy: {{- toYaml .Values.updateStrategy | nindent 4 }}
{{- end }} {{- end }}
template: template:
metadata: metadata:
labels: {{- include "common.labels.standard" . | nindent 8 }} labels: {{- include "common.labels.standard" . | nindent 8 }}
component: adminFrontend component: adminPanel
{{- if .Values.podLabels }} {{- if .Values.podLabels }}
{{- include "common.tplvalues.render" (dict "value" .Values.podLabels "context" $) | nindent 8 }} {{- include "common.tplvalues.render" (dict "value" .Values.podLabels "context" $) | nindent 8 }}
{{- end }} {{- end }}
@ -48,31 +48,12 @@ spec:
{{- if .Values.tolerations }} {{- if .Values.tolerations }}
tolerations: {{- include "common.tplvalues.render" (dict "value" .Values.tolerations "context" $) | nindent 8 }} tolerations: {{- include "common.tplvalues.render" (dict "value" .Values.tolerations "context" $) | nindent 8 }}
{{- end }} {{- end }}
serviceAccountName: {{ include "adminFrontend.serviceAccountName" . }} serviceAccountName: {{ include "adminPanel.serviceAccountName" . }}
securityContext: {{- toYaml .Values.podSecurityContext | nindent 8 }} securityContext: {{- toYaml .Values.podSecurityContext | nindent 8 }}
initContainers: initContainers:
{{- if .Values.initContainers }} {{- if .Values.initContainers }}
{{- include "common.tplvalues.render" (dict "value" .Values.initContainers "context" $) | nindent 8 }} {{- include "common.tplvalues.render" (dict "value" .Values.initContainers "context" $) | nindent 8 }}
{{- end }} {{- end }}
{{- if and .Values.volumePermissions.enabled .Values.persistence.enabled }}
- name: volume-permissions
image: {{ include "adminFrontend.image" . }}
imagePullPolicy: {{ .Values.volumePermissions.image.pullPolicy | quote }}
command:
- sh
- -c
- |
mkdir -p "/bitnami/adminFrontend"
chown -R "adminFrontend:root" "/bitnami/adminFrontend"
securityContext:
runAsUser: 0
{{- if .Values.volumePermissions.resources }}
resources: {{- toYaml .Values.volumePermissions.resources | nindent 12 }}
{{- end }}
volumeMounts:
- name: adminFrontend-data
mountPath: /bitnami/adminFrontend
{{- end }}
containers: containers:
- name: adminFrontend - name: adminFrontend
securityContext: {{- toYaml .Values.adminFrontend.containerSecurityContext | nindent 12 }} securityContext: {{- toYaml .Values.adminFrontend.containerSecurityContext | nindent 12 }}
@ -85,18 +66,6 @@ spec:
args: {{- include "common.tplvalues.render" (dict "value" .Values.adminFrontend.args "context" $) | nindent 12 }} args: {{- include "common.tplvalues.render" (dict "value" .Values.adminFrontend.args "context" $) | nindent 12 }}
{{- end }} {{- end }}
env: env:
- name: ADMIN_FRONTEND_PASSWORD
valueFrom:
secretKeyRef:
name: {{ include "adminFrontend.secretName" . }}
key: adminFrontend-password
{{- if (include "adminFrontend.smtp.password.enabled" .) }}
- name: ADMIN_FRONTEND_SMTP_PASSWORD
valueFrom:
secretKeyRef:
name: {{ include "adminFrontend.smtp.secretName" . }}
key: smtp-password
{{- end }}
{{- if .Values.adminFrontend.extraEnvVars }} {{- if .Values.adminFrontend.extraEnvVars }}
{{- include "common.tplvalues.render" (dict "value" .Values.adminFrontend.extraEnvVars "context" $) | nindent 12 }} {{- include "common.tplvalues.render" (dict "value" .Values.adminFrontend.extraEnvVars "context" $) | nindent 12 }}
{{- end }} {{- end }}
@ -151,6 +120,83 @@ spec:
{{- if .Values.adminFrontend.resources }} {{- if .Values.adminFrontend.resources }}
resources: {{- toYaml .Values.adminFrontend.resources | nindent 12 }} resources: {{- toYaml .Values.adminFrontend.resources | nindent 12 }}
{{- end }} {{- end }}
- name: adminBackend
securityContext: {{- toYaml .Values.adminBackend.containerSecurityContext | nindent 12 }}
image: {{ template "adminBackend.image" . }}
imagePullPolicy: {{ .Values.image.pullPolicy | quote }}
{{- if .Values.adminBackend.command }}
command: {{- include "common.tplvalues.render" (dict "value" .Values.adminBackend.command "context" $) | nindent 12 }}
{{- end }}
{{- if .Values.adminBackend.args }}
args: {{- include "common.tplvalues.render" (dict "value" .Values.adminBackend.args "context" $) | nindent 12 }}
{{- end }}
env:
- name: ADMIN_PANEL_PASSWORD
valueFrom:
secretKeyRef:
name: {{ include "adminBackend.secretName" . }}
key: adminBackend-password
{{- if (include "adminBackend.smtp.password.enabled" .) }}
- name: ADMIN_PANEL_SMTP_PASSWORD
valueFrom:
secretKeyRef:
name: {{ include "adminBackend.smtp.secretName" . }}
key: smtp-password
{{- end }}
{{- if .Values.adminBackend.extraEnvVars }}
{{- include "common.tplvalues.render" (dict "value" .Values.adminBackend.extraEnvVars "context" $) | nindent 12 }}
{{- end }}
envFrom:
- configMapRef:
name: {{ include "common.names.fullname" . }}
{{- if .Values.adminBackend.extraEnvVarsCM }}
- configMapRef:
name: {{ .Values.adminBackend.extraEnvVarsCM }}
{{- end }}
{{- if .Values.adminBackend.extraEnvVarsSecret }}
- secretRef:
name: {{ .Values.adminBackend.extraEnvVarsSecret }}
{{- end }}
ports:
- name: http
containerPort: 3000
protocol: TCP
{{- if .Values.adminBackend.livenessProbe.enabled }}
livenessProbe:
httpGet:
path: /srv/status
port: http
initialDelaySeconds: {{ .Values.adminBackend.livenessProbe.initialDelaySeconds }}
periodSeconds: {{ .Values.adminBackend.livenessProbe.periodSeconds }}
timeoutSeconds: {{ .Values.adminBackend.livenessProbe.timeoutSeconds }}
successThreshold: {{ .Values.adminBackend.livenessProbe.successThreshold }}
failureThreshold: {{ .Values.adminBackend.livenessProbe.failureThreshold }}
{{- else if .Values.adminBackend.customLivenessProbe }}
livenessProbe: {{- include "common.tplvalues.render" (dict "value" .Values.adminBackend.customLivenessProbe "context" $) | nindent 12 }}
{{- end }}
{{- if .Values.adminBackend.readinessProbe.enabled }}
readinessProbe:
httpGet:
path: /srv/status
port: http
initialDelaySeconds: {{ .Values.adminBackend.readinessProbe.initialDelaySeconds }}
periodSeconds: {{ .Values.adminBackend.readinessProbe.periodSeconds }}
timeoutSeconds: {{ .Values.adminBackend.readinessProbe.timeoutSeconds }}
successThreshold: {{ .Values.adminBackend.readinessProbe.successThreshold }}
failureThreshold: {{ .Values.adminBackend.readinessProbe.failureThreshold }}
{{- else if .Values.adminBackend.customReadinessProbe }}
readinessProbe: {{- include "common.tplvalues.render" (dict "value" .Values.adminBackend.customReadinessProbe "context" $) | nindent 12 }}
{{- end }}
volumeMounts:
- name: adminBackend-data
mountPath: /bitnami/adminBackend
subPath: adminBackend
{{- if .Values.adminBackend.extraVolumeMounts }}
{{- include "common.tplvalues.render" (dict "value" .Values.adminBackend.extraVolumeMounts "context" $) | nindent 12 }}
{{- end }}
{{- if .Values.adminBackend.resources }}
resources: {{- toYaml .Values.adminBackend.resources | nindent 12 }}
{{- end }}
{{- if .Values.sidecars }} {{- if .Values.sidecars }}
{{- include "common.tplvalues.render" (dict "value" .Values.sidecars "context" $) | nindent 8 }} {{- include "common.tplvalues.render" (dict "value" .Values.sidecars "context" $) | nindent 8 }}
{{- end }} {{- end }}

View file

@ -1,5 +1,5 @@
# Disabled by default because the current admin panel does not need persistence # Disabled by default because the current admin panel does not need persistence
{{- if and (include "adminFrontend.host" .) .Values.persistence.enabled (not .Values.persistence.existingClaim) }} {{- if and (include "adminPanel.host" .) .Values.persistence.enabled (not .Values.persistence.existingClaim) }}
kind: PersistentVolumeClaim kind: PersistentVolumeClaim
apiVersion: v1 apiVersion: v1
metadata: metadata:
@ -17,7 +17,7 @@ spec:
resources: resources:
requests: requests:
storage: {{ .Values.persistence.size | quote }} storage: {{ .Values.persistence.size | quote }}
{{ include "adminFrontend.storageClass" . }} {{ include "adminPanel.storageClass" . }}
{{- if .Values.persistence.selector }} {{- if .Values.persistence.selector }}
selector: {{- include "common.tplvalues.render" (dict "value" .Values.persistence.selector "context" $) | nindent 4 }} selector: {{- include "common.tplvalues.render" (dict "value" .Values.persistence.selector "context" $) | nindent 4 }}
{{- end -}} {{- end -}}

View file

@ -0,0 +1,23 @@
{{- if (include "adminPanel.createSecret" .) }}
apiVersion: v1
kind: Secret
metadata:
name: {{ template "common.names.fullname" . }}-adminPanel
labels: {{- include "common.labels.standard" . | nindent 4 }}
{{- if .Values.commonLabels }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
{{- end }}
{{- if .Values.commonAnnotations }}
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
{{- end }}
type: Opaque
data:
{{- if and (.Values.adminBackend.password) (not .Values.adminBackend.existingSecret) }}
adminBackend-password: {{ .Values.adminBackend.password | b64enc | quote }}
{{- else if not .Values.adminBackend.existingSecret }}
adminBackend-password: {{ randAlphaNum 10 | b64enc | quote }}
{{- end }}
{{- if and (.Values.adminBackend.smtp.password) (.Values.adminBackend.smtp.enabled) (not .Values.adminBackend.smtp.existingSecret) }}
smtp-password: {{ .Values.adminBackend.smtp.password | b64enc | quote }}
{{- end }}
{{- end }}

View file

@ -1,23 +0,0 @@
{{- if (include "adminFrontend.createSecret" .) }}
apiVersion: v1
kind: Secret
metadata:
name: {{ template "common.names.fullname" . }}-adminFrontend
labels: {{- include "common.labels.standard" . | nindent 4 }}
{{- if .Values.commonLabels }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}
{{- end }}
{{- if .Values.commonAnnotations }}
annotations: {{- include "common.tplvalues.render" ( dict "value" .Values.commonAnnotations "context" $ ) | nindent 4 }}
{{- end }}
type: Opaque
data:
{{- if and (.Values.adminFrontend.password) (not .Values.adminFrontend.existingSecret) }}
adminFrontend-password: {{ .Values.adminFrontend.password | b64enc | quote }}
{{- else if not .Values.adminFrontend.existingSecret }}
adminFrontend-password: {{ randAlphaNum 10 | b64enc | quote }}
{{- end }}
{{- if and (.Values.adminFrontend.smtp.password) (.Values.adminFrontend.smtp.enabled) (not .Values.adminFrontend.smtp.existingSecret) }}
smtp-password: {{ .Values.adminFrontend.smtp.password | b64enc | quote }}
{{- end }}
{{- end }}

View file

@ -2,7 +2,7 @@
apiVersion: v1 apiVersion: v1
kind: ServiceAccount kind: ServiceAccount
metadata: metadata:
name: {{ include "adminFrontend.serviceAccountName" . }} name: {{ include "adminPanel.serviceAccountName" . }}
labels: {{- include "common.labels.standard" . | nindent 4 }} labels: {{- include "common.labels.standard" . | nindent 4 }}
{{- if .Values.commonLabels }} {{- if .Values.commonLabels }}
{{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }} {{- include "common.tplvalues.render" ( dict "value" .Values.commonLabels "context" $ ) | nindent 4 }}

View file

@ -21,10 +21,10 @@ global:
## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set) ## @param kubeVersion Force target Kubernetes version (using Helm capabilities if not set)
## ##
kubeVersion: "" kubeVersion: ""
## @param nameOverride String to partially override adminFrontend.fullname template (will maintain the release name) ## @param nameOverride String to partially override adminPanel.fullname template (will maintain the release name)
## ##
nameOverride: "" nameOverride: ""
## @param fullnameOverride String to fully override adminFrontend.fullname template ## @param fullnameOverride String to fully override adminPanel.fullname template
## ##
fullnameOverride: "" fullnameOverride: ""
## @param commonLabels Labels to be added to all deployed resources ## @param commonLabels Labels to be added to all deployed resources
@ -76,16 +76,23 @@ service:
## @section Discourse parameters ## @section Discourse parameters
## Bitnami Discourse image version ## @param imagePullSecrets Specify docker-registry secret names as an array
## ref: https://hub.docker.com/r/bitnami/adminFrontend/tags/
## @param image.registry Discourse image registry
## @param image.repository Discourse image repository
## @param image.tag Discourse image tag
## @param image.pullPolicy Discourse image pull policy
## @param image.pullSecrets Discourse image pull secrets
## @param image.debug Specify if debug logs should be enabled
## ##
image: imagePullSecrets: []
## Admin frontend configuration parameters
## ref: https://open.greenhost.net/openappstack/admin-frontend
##
adminFrontend:
## Admin frontend image version
## ref: https://hub.docker.com/r/bitnami/adminFrontend/tags/
## @param image.registry Discourse image registry
## @param image.repository Discourse image repository
## @param image.tag Discourse image tag
## @param image.pullPolicy Discourse image pull policy
## @param image.pullSecrets Discourse image pull secrets
## @param image.debug Specify if debug logs should be enabled
##
image:
registry: open.greenhost.net:4567 registry: open.greenhost.net:4567
repository: openappstack/admin-frontend/admin-frontend repository: openappstack/admin-frontend/admin-frontend
tag: 0.1.0 tag: 0.1.0
@ -102,41 +109,11 @@ image:
## - myRegistryKeySecretName ## - myRegistryKeySecretName
## ##
pullSecrets: [] pullSecrets: []
## Set to true if you would like to see extra information on logs
##
debug: false
## @param imagePullSecrets Specify docker-registry secret names as an array
##
imagePullSecrets: []
## Admin frontend configuration parameters
## ref: https://open.greenhost.net/openappstack/admin-frontend
##
adminFrontend:
## @param adminFrontend.reactAppApiUrl URL to the admin-backend API
reactAppApiUrl: "http://oas-api.initdevelopment.com/api/v1"
## @param adminFrontend.extendEslint Whether to read .eslint.json rules ## @param adminFrontend.extendEslint Whether to read .eslint.json rules
extendEslint: false extendEslint: false
## @param adminFrontend.host Discourse host to create application URLs (include the port if =/= 80) ## @param adminFrontend.host Discourse host to create application URLs (include the port if =/= 80)
## ##
host: "" host: ""
## @param adminFrontend.siteName Discourse site name
##
siteName: 'My Site!'
## @param adminFrontend.username Admin user of the application
##
username: user
## @param adminFrontend.password password. WARNING: Minimum length of 10 characters
## Defaults to a random 10-character alphanumeric string if not set
##
password: ""
## @param adminFrontend.existingSecret Name of an existing secret containing the password (ignores previous password)
## The secret should contain the following key:
## adminFrontend-password
##
existingSecret: ""
## @param adminFrontend.email Admin user email of the application
##
email: user@example.com
## @param adminFrontend.command Custom command to override image cmd ## @param adminFrontend.command Custom command to override image cmd
## ##
command: [] command: []
@ -215,30 +192,11 @@ adminFrontend:
## @param adminFrontend.customReadinessProbe Custom readiness probe to execute (when the main one is disabled) ## @param adminFrontend.customReadinessProbe Custom readiness probe to execute (when the main one is disabled)
## ##
customReadinessProbe: {} customReadinessProbe: {}
## Discourse SMTP settings
## @param adminFrontend.smtp.enabled Enable/disable SMTP
## @param adminFrontend.smtp.host SMTP host name
## @param adminFrontend.smtp.port SMTP port number
## @param adminFrontend.smtp.user SMTP account user name
## @param adminFrontend.smtp.password SMTP account password
## @param adminFrontend.smtp.protocol SMTP protocol (Allowed values: tls, ssl)
## @param adminFrontend.smtp.auth SMTP authentication method
## @param adminFrontend.smtp.existingSecret Name of an existing Kubernetes secret. The secret must have the following key configured: `smtp-password`
##
smtp:
enabled: false
host: ""
port: ""
user: ""
password: ""
protocol: ""
auth: ""
existingSecret: ""
## @param adminFrontend.extraEnvVars An array to add extra env vars ## @param adminFrontend.extraEnvVars An array to add extra env vars
## For example: ## For example:
## extraEnvVars: ## extraEnvVars:
## adminFrontend: ## adminFrontend:
## - name: DISCOURSE_ELASTICSEARCH_URL ## - name: ADMIN_PANEL_ELASTICSEARCH_URL
## value: test ## value: test
## ##
extraEnvVars: [] extraEnvVars: []
@ -256,10 +214,183 @@ adminFrontend:
## mountPath: /path/to/ca_cert ## mountPath: /path/to/ca_cert
## ##
extraVolumeMounts: [] extraVolumeMounts: []
## @param adminFrontend.skipInstall Do not run the Discourse installation wizard ## Admin frontend configuration parameters
## Use only in case you are importing an existing database. ## ref: https://open.greenhost.net/openappstack/admin-frontend
##
adminBackend:
## Admin frontend image version
## ref: https://hub.docker.com/r/bitnami/adminFrontend/tags/
## @param image.registry Discourse image registry
## @param image.repository Discourse image repository
## @param image.tag Discourse image tag
## @param image.pullPolicy Discourse image pull policy
## @param image.pullSecrets Discourse image pull secrets
## @param image.debug Specify if debug logs should be enabled
## ##
skipInstall: false image:
registry: open.greenhost.net:4567
repository: openappstack/admin-backend/admin-backend
tag: 0.1.0
## Specify a imagePullPolicy
## Defaults to 'Always' if image tag is 'latest', else set to 'IfNotPresent'
## ref: http://kubernetes.io/docs/user-guide/images/#pre-pulling-images
##
pullPolicy: IfNotPresent
## Optionally specify an array of imagePullSecrets.
## Secrets must be manually created in the namespace.
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/pull-image-private-registry/
## e.g:
## pullSecrets:
## - myRegistryKeySecretName
##
pullSecrets: []
## @param adminBackend.host API host (include the port if =/= 80)
##
host: ""
## @param adminBackend.reactAppApiUrl URL to the admin-backend API
apiUrl: "/api/v1"
## Variables for future use {{{
## @param adminBackend.username Admin user of the application
##
username: user
## @param adminBackend.password password. WARNING: Minimum length of 10 characters
## Defaults to a random 10-character alphanumeric string if not set
##
password: ""
## @param adminBackend.existingSecret Name of an existing secret containing the password (ignores previous password)
## The secret should contain the following key:
## adminBackend-password
##
existingSecret: ""
## @param adminBackend.email Admin user email of the application
##
email: user@example.com
## Admin panel SMTP settings
## @param adminBackend.smtp.enabled Enable/disable SMTP
## @param adminBackend.smtp.host SMTP host name
## @param adminBackend.smtp.port SMTP port number
## @param adminBackend.smtp.user SMTP account user name
## @param adminBackend.smtp.password SMTP account password
## @param adminBackend.smtp.protocol SMTP protocol (Allowed values: tls, ssl)
## @param adminBackend.smtp.auth SMTP authentication method
## @param adminBackend.smtp.existingSecret Name of an existing Kubernetes secret. The secret must have the following key configured: `smtp-password`
##
smtp:
enabled: false
host: ""
port: ""
user: ""
password: ""
protocol: ""
auth: ""
existingSecret: ""
## End variables for future use }}}
## @param adminBackend.command Custom command to override image cmd
##
command: []
## @param adminBackend.args Custom args for the custom command
##
args: []
## @param adminBackend.containerSecurityContext Container security context specification
## Example:
## capabilities:
## drop:
## - ALL
## readOnlyRootFilesystem: true
## runAsNonRoot: true
## runAsUser: 1000
##
containerSecurityContext: {}
## Discourse container's resource requests and limits
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
## We usually recommend not to specify default resources and to leave this as a conscious
## choice for the user. This also increases chances charts run on environments with little
## resources, such as Minikube. If you do want to specify resources, uncomment the following
## lines, adjust them as necessary, and remove the curly braces after 'resources:'.
## @param adminBackend.resources.limits The resources limits for the container
## @param adminBackend.resources.requests The requested resources for the container
##
resources:
## Example:
## limits:
## cpu: 100m
## memory: 128Mi
limits: {}
## Examples:
## requests:
## cpu: 100m
## memory: 128Mi
requests: {}
## Discourse extra options for liveness probe
## WARNING: Discourse installation process may take up some time and
## setting inappropriate values here may lead to pods failure.
## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
## @param adminBackend.livenessProbe.enabled Enable/disable livenessProbe
## @param adminBackend.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated
## @param adminBackend.livenessProbe.periodSeconds How often to perform the probe
## @param adminBackend.livenessProbe.timeoutSeconds When the probe times out
## @param adminBackend.livenessProbe.failureThreshold Minimum consecutive failures for the probe
## @param adminBackend.livenessProbe.successThreshold Minimum consecutive successes for the probe
##
livenessProbe:
enabled: true
initialDelaySeconds: 500
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 6
successThreshold: 1
## Discourse extra options for readiness probe
## WARNING: Discourse installation process may take up some time and
## setting inappropriate values here may lead to pods failure.
## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
## @param adminBackend.readinessProbe.enabled Enable/disable readinessProbe
## @param adminBackend.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated
## @param adminBackend.readinessProbe.periodSeconds How often to perform the probe
## @param adminBackend.readinessProbe.timeoutSeconds When the probe times out
## @param adminBackend.readinessProbe.failureThreshold Minimum consecutive failures for the probe
## @param adminBackend.readinessProbe.successThreshold Minimum consecutive successes for the probe
##
readinessProbe:
enabled: true
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 6
successThreshold: 1
## @param adminBackend.customLivenessProbe Custom liveness probe to execute (when the main one is disabled)
##
customLivenessProbe: {}
## @param adminBackend.customReadinessProbe Custom readiness probe to execute (when the main one is disabled)
##
customReadinessProbe: {}
## @param adminBackend.extraEnvVars An array to add extra env vars
## For example:
## extraEnvVars:
## adminBackend:
## - name: ADMIN_PANEL_ELASTICSEARCH_URL
## value: test
##
extraEnvVars: []
## @param adminBackend.extraEnvVarsCM Array to add extra configmaps
##
extraEnvVarsCM: []
## @param adminBackend.extraEnvVarsSecret Array to add extra environment variables from a secret
##
extraEnvVarsSecret: ""
## @param adminBackend.extraVolumeMounts Additional volume mounts (used along with `extraVolumes`)
## Example: Mount CA file
## extraVolumeMounts
## - name: ca-cert
## subPath: ca_cert
## mountPath: /path/to/ca_cert
##
extraVolumeMounts: []
## @param replicaCount Number of Discourse & Sidekiq replicas ## @param replicaCount Number of Discourse & Sidekiq replicas
## (Note that you will need ReadWriteMany PVCs for this to work properly) ## (Note that you will need ReadWriteMany PVCs for this to work properly)
## ##
@ -325,7 +456,7 @@ persistence:
## @param persistence.enabled Whether to enable persistence based on Persistent Volume Claims ## @param persistence.enabled Whether to enable persistence based on Persistent Volume Claims
## ##
enabled: false enabled: false
## @param persistence.storageClass adminFrontend & sidekiq data Persistent Volume Storage Class ## @param persistence.storageClass adminPanel & sidekiq data Persistent Volume Storage Class
## If defined, storageClassName: <storageClass> ## If defined, storageClassName: <storageClass>
## If set to "-", storageClassName: "", which disables dynamic provisioning ## If set to "-", storageClassName: "", which disables dynamic provisioning
## If undefined (the default) or set to null, no storageClassName spec is ## If undefined (the default) or set to null, no storageClassName spec is
@ -407,93 +538,9 @@ nodeSelector: {}
## ##
tolerations: [] tolerations: []
## @section Sidekiq parameters
sidekiq: ## @section Volume Permissions parameters (currently disabled because there is
## @param sidekiq.containerSecurityContext Container security context specification ## no persistence in the app)
## capabilities:
## drop:
## - ALL
## readOnlyRootFilesystem: true
## runAsNonRoot: true
## runAsUser: 1000
##
containerSecurityContext: {}
## @param sidekiq.command Custom command to override image cmd (evaluated as a template)
##
command: ['/opt/bitnami/scripts/adminFrontend/entrypoint.sh']
## @param sidekiq.args Custom args for the custom command (evaluated as a template)
##
args: ['/opt/bitnami/scripts/adminFrontend-sidekiq/run.sh']
## @param sidekiq.resources Sidekiq container resource requests and limits
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
## We usually recommend not to specify default resources and to leave this as a conscious
## choice for the user. This also increases chances charts run on environments with little
## resources, such as Minikube. If you do want to specify resources, uncomment the following
## lines, adjust them as necessary, and remove the curly braces after 'resources:'.
##
resources: {}
## Sidekiq extra options for liveness probe
## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
## @param sidekiq.livenessProbe.enabled Enable/disable livenessProbe
## @param sidekiq.livenessProbe.initialDelaySeconds Delay before liveness probe is initiated
## @param sidekiq.livenessProbe.periodSeconds How often to perform the probe
## @param sidekiq.livenessProbe.timeoutSeconds When the probe times out
## @param sidekiq.livenessProbe.failureThreshold Minimum consecutive failures for the probe
## @param sidekiq.livenessProbe.successThreshold Minimum consecutive successes for the probe
##
livenessProbe:
enabled: true
initialDelaySeconds: 500
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 6
successThreshold: 1
## Sidekiq extra options for readiness probe
## ref: https://kubernetes.io/docs/concepts/workloads/pods/pod-lifecycle/#container-probes
## @param sidekiq.readinessProbe.enabled Enable/disable readinessProbe
## @param sidekiq.readinessProbe.initialDelaySeconds Delay before readiness probe is initiated
## @param sidekiq.readinessProbe.periodSeconds How often to perform the probe
## @param sidekiq.readinessProbe.timeoutSeconds When the probe times out
## @param sidekiq.readinessProbe.failureThreshold Minimum consecutive failures for the probe
## @param sidekiq.readinessProbe.successThreshold Minimum consecutive successes for the probe
##
readinessProbe:
enabled: true
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 6
successThreshold: 1
## @param sidekiq.customLivenessProbe Custom liveness probe to execute (when the main one is disabled)
##
customLivenessProbe: {}
## @param sidekiq.customReadinessProbe Custom readiness probe to execute (when the main one is disabled)
##
customReadinessProbe: {}
## @param sidekiq.extraEnvVars An array to add extra env vars
## For example:
## extraEnvVars:
## - name: DISCOURSE_ELASTICSEARCH_URL
## value: test
##
extraEnvVars: []
## @param sidekiq.extraEnvVarsCM Array to add extra configmaps
##
extraEnvVarsCM: []
## @param sidekiq.extraEnvVarsSecret Name of the secret that holds extra env vars
##
extraEnvVarsSecret: ""
## @param sidekiq.extraVolumeMounts Additional volume mounts
## Example: Mount CA file
## extraVolumeMounts
## - name: ca-cert
## subPath: ca_cert
## mountPath: /path/to/ca_cert
##
extraVolumeMounts: []
## @section Volume Permissions parameters
## Init containers parameters: ## Init containers parameters:
## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup ## volumePermissions: Change the owner and group of the persistent volume mountpoint to runAsUser:fsGroup
@ -537,7 +584,7 @@ ingress:
certManager: false certManager: false
## @param ingress.hostname Default host for the ingress resource ## @param ingress.hostname Default host for the ingress resource
## ##
hostname: adminFrontend.local hostname: adminPanel.local
## @param ingress.apiVersion Force Ingress API version (automatically detected if not set) ## @param ingress.apiVersion Force Ingress API version (automatically detected if not set)
## ##
apiVersion: "" apiVersion: ""
@ -562,15 +609,15 @@ ingress:
## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record. ## @param ingress.extraHosts The list of additional hostnames to be covered with this ingress record.
## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array ## Most likely the hostname above will be enough, but in the event more hosts are needed, this is an array
## extraHosts: ## extraHosts:
## - name: adminFrontend.local ## - name: adminPanel.local
## path: / ## path: /
extraHosts: [] extraHosts: []
## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record. ## @param ingress.extraTls The tls configuration for additional hostnames to be covered with this ingress record.
## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls ## see: https://kubernetes.io/docs/concepts/services-networking/ingress/#tls
## extraTls: ## extraTls:
## - hosts: ## - hosts:
## - adminFrontend.local ## - adminPanel.local
## secretName: adminFrontend.local-tls ## secretName: adminPanel.local-tls
extraTls: [] extraTls: []
## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets ## @param ingress.secrets If you're providing your own certificates, please use this to add the certificates as secrets
## key and certificate should start with -----BEGIN CERTIFICATE----- or ## key and certificate should start with -----BEGIN CERTIFICATE----- or
@ -582,7 +629,7 @@ ingress:
## It is also possible to create and manage the certificates outside of this helm chart ## It is also possible to create and manage the certificates outside of this helm chart
## Please see README.md for more information ## Please see README.md for more information
## Example: ## Example:
## - name: adminFrontend.local-tls ## - name: adminPanel.local-tls
## key: ## key:
## certificate: ## certificate:
secrets: [] secrets: []