k3s-infra/infrastructure/authelia/authelia.values.yaml
2024-10-04 16:06:47 +02:00

84 lines
1.8 KiB
YAML

ingress:
enabled: false
pod:
kind: 'Deployment'
replicas: 1
extraVolumes:
- name: config-ldap
secret:
secretName: authelia-ldap
- name: config-oidc
secret:
secretName: authelia-oidc
extraVolumeMounts:
- name: config-ldap
mountPath: /extra-config/ldap.yml
readOnly: true
- name: config-oidc
mountPath: /extra-config/oidc.yml
readOnly: true
##
## Authelia Config Map Generator
##
configMap:
# Enable the configMap source for the Authelia config.
# If this is false you need to provide a volumeMount via PV/PVC or other means that mounts to /config.
disabled: false
key: 'configuration.yml'
# do not use a pre-existing configMap
# BUT, include sub-maps wich OVERRIDE the values generated by the helm chart
extraConfigs:
- /extra-config/ldap.yml
- /extra-config/oidc.yml
session:
cookies:
- name: authelia_session
domain: auth.kluster.moll.re
storage:
encryption:
key: 'anotherlongerpasswordtomakeyouhappy'
local:
enabled: true
file: /config/db.sqlite3
notifier:
filesystem:
enabled: true
filename: /config/notification.txt
##
## Authelia Secret Configuration.
##
secret:
disabled: false
existingSecret: ''
certificates:
# don't use the pre-existing secret
existingSecret: ''
##
## Authelia Persistence Configuration.
##
## Useful in scenarios where you need persistent storage.
## Auth Provider Use Case: file; we recommend you use the ldap provider instead.
## Storage Provider Use Case: local; we recommend you use the mysql/mariadb or postgres provider instead.
## Configuration Use Case: when you want to manually configure the configuration entirely (set configMap.enabled = false).
##
persistence:
enabled: true
storageClass: 'nfs-client'