# gitea-bitnami values.yaml ingress: enabled: true className: traefik annotations: traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.tls: "true" hostname: git.dvirlabs.com extraHosts: [] tls: [] pathType: ImplementationSpecific postgresql-ha: enabled: false postgresql: enabled: true auth: username: gitea password: gitea database: gitea primary: persistence: size: 10Gi tolerations: - key: "node.kubernetes.io/disk-pressure" operator: "Exists" effect: "NoSchedule" namespaceOverride: dev-tools persistence: enabled: true size: 5Gi accessModes: - ReadWriteOnce gitea: admin: username: "admin" password: "admin1234" email: "dvirlabs@gmail.com" config: APP_NAME: "Gitea" SERVER__ROOT_URL: "https://git.dvirlabs.com" SERVICE__REGISTER_EMAIL_CONFIRM: "false" SERVICE__DISABLE_REGISTRATION: "false" SERVICE__REQUIRE_SIGNIN_VIEW: "false" MAILER__ENABLED: "false" OAUTH2_CLIENT__0__NAME: Keycloak OAUTH2_CLIENT__0__PROVIDER: openidConnect OAUTH2_CLIENT__0__KEY: gitea OAUTH2_CLIENT__0__SECRET: gIA3YXhesiyIbKkMMtasCVTd7CvUyLwA OAUTH2_CLIENT__0__AUTO_DISCOVER_URL: https://keycloak.dvirlabs.com/realms/lab/.well-known/openid-configuration OAUTH2_CLIENT__0__SCOPES: openid profile email OAUTH2_CLIENT__0__GROUP_CLAIM_NAME: groups OAUTH2_CLIENT__0__ADMIN_GROUP: gitea-admins OAUTH2_CLIENT__0__RESTRICTED_GROUP: gitea-users service: type: ClusterIP readinessProbe: enabled: false namespace: enabled: false