70 lines
1.6 KiB
YAML

# gitea-bitnami values.yaml
ingress:
enabled: true
className: traefik
annotations:
traefik.ingress.kubernetes.io/router.entrypoints: websecure
traefik.ingress.kubernetes.io/router.tls: "true"
hostname: git.dvirlabs.com
extraHosts: []
tls: []
pathType: ImplementationSpecific
postgresql-ha:
enabled: false
postgresql:
enabled: true
auth:
username: gitea
password: gitea
database: gitea
primary:
persistence:
size: 10Gi
tolerations:
- key: "node.kubernetes.io/disk-pressure"
operator: "Exists"
effect: "NoSchedule"
namespaceOverride: dev-tools
persistence:
enabled: true
size: 5Gi
accessModes:
- ReadWriteOnce
gitea:
admin:
username: "admin"
password: "admin1234"
email: "dvirlabs@gmail.com"
config:
APP_NAME: "Gitea"
SERVER__ROOT_URL: "https://git.dvirlabs.com"
SERVICE__REGISTER_EMAIL_CONFIRM: "false"
SERVICE__DISABLE_REGISTRATION: "false"
SERVICE__REQUIRE_SIGNIN_VIEW: "false"
MAILER__ENABLED: "false"
OAUTH2_CLIENT__0__NAME: Keycloak
OAUTH2_CLIENT__0__PROVIDER: openidConnect
OAUTH2_CLIENT__0__KEY: gitea
OAUTH2_CLIENT__0__SECRET: gIA3YXhesiyIbKkMMtasCVTd7CvUyLwA
OAUTH2_CLIENT__0__AUTO_DISCOVER_URL: https://keycloak.dvirlabs.com/realms/lab/.well-known/openid-configuration
OAUTH2_CLIENT__0__SCOPES: openid profile email
OAUTH2_CLIENT__0__GROUP_CLAIM_NAME: groups
OAUTH2_CLIENT__0__ADMIN_GROUP: gitea-admins
OAUTH2_CLIENT__0__RESTRICTED_GROUP: gitea-users
service:
type: ClusterIP
readinessProbe:
enabled: false
namespace:
enabled: false