ingress:
  enabled: false


pod:
  kind: 'Deployment'
  replicas: 1
  extraVolumes:
    - name: config-ldap
      secret:
        secretName: authelia-ldap
    - name: config-oidc
      secret:
        secretName: authelia-oidc
    - name: config-smtp
      secret:
        secretName: authelia-smtp

  extraVolumeMounts:
    - name: config-ldap
      mountPath: /extra-config/ldap.yml
      readOnly: true
    - name: config-oidc
      mountPath: /extra-config/oidc.yml
      readOnly: true
    - name: config-smtp
      mountPath: /extra-config/smtp.yml
      readOnly: true
      

##
## Authelia Config Map Generator
##
configMap:

  # Enable the configMap source for the Authelia config.
  # If this is false you need to provide a volumeMount via PV/PVC or other means that mounts to /config.
  disabled: false
  key: 'configuration.yml'
  # do not use a pre-existing configMap
  # BUT, include sub-maps wich OVERRIDE the values generated by the helm chart
  extraConfigs:
    - /extra-config/ldap.yml
    - /extra-config/oidc.yml
    - /extra-config/smtp.yml
  
  session:
    cookies:
      - name: authelia_session
        domain: auth.kluster.moll.re
  storage:
    encryption_key:
      value: 'authelia-encryption-key'
    local:
      enabled: true
      file: /config/db.sqlite3


##
## Authelia Secret Configuration.
##
secret:

  disabled: false

  existingSecret: ''


certificates:
  # don't use the pre-existing secret
  existingSecret: ''

##
## Authelia Persistence Configuration.
##
## Useful in scenarios where you need persistent storage.
## Auth Provider Use Case: file; we recommend you use the ldap provider instead.
## Storage Provider Use Case: local; we recommend you use the mysql/mariadb or postgres provider instead.
## Configuration Use Case: when you want to manually configure the configuration entirely (set configMap.enabled = false).
##
persistence:
  enabled: true
  storageClass: 'nfs-client'