ingress: enabled: false pod: kind: 'Deployment' replicas: 1 extraVolumes: - name: config-ldap secret: secretName: authelia-ldap - name: config-oidc secret: secretName: authelia-oidc - name: config-smtp secret: secretName: authelia-smtp extraVolumeMounts: - name: config-ldap mountPath: /extra-config/ldap.yml readOnly: true - name: config-oidc mountPath: /extra-config/oidc.yml readOnly: true - name: config-smtp mountPath: /extra-config/smtp.yml readOnly: true ## ## Authelia Config Map Generator ## configMap: # Enable the configMap source for the Authelia config. # If this is false you need to provide a volumeMount via PV/PVC or other means that mounts to /config. disabled: false key: 'configuration.yml' # do not use a pre-existing configMap # BUT, include sub-maps wich OVERRIDE the values generated by the helm chart extraConfigs: - /extra-config/ldap.yml - /extra-config/oidc.yml - /extra-config/smtp.yml session: inactivity: '2d' expiration: '7d' remember_me: '1M' cookies: - name: authelia_session domain: auth.kluster.moll.re storage: encryption_key: value: 'authelia-encryption-key' local: enabled: true file: /config/db.sqlite3 ## ## Authelia Secret Configuration. ## secret: disabled: false existingSecret: '' certificates: # don't use the pre-existing secret existingSecret: '' ## ## Authelia Persistence Configuration. ## ## Useful in scenarios where you need persistent storage. ## Auth Provider Use Case: file; we recommend you use the ldap provider instead. ## Storage Provider Use Case: local; we recommend you use the mysql/mariadb or postgres provider instead. ## Configuration Use Case: when you want to manually configure the configuration entirely (set configMap.enabled = false). ## persistence: enabled: true storageClass: 'nfs-client'