diff --git a/charts/traefik-forward-auth/.helmignore b/charts/traefik-forward-auth/.helmignore new file mode 100644 index 00000000..0e8a0eb3 --- /dev/null +++ b/charts/traefik-forward-auth/.helmignore @@ -0,0 +1,23 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*.orig +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ diff --git a/charts/traefik-forward-auth/Chart.yaml b/charts/traefik-forward-auth/Chart.yaml new file mode 100644 index 00000000..54cf4eb4 --- /dev/null +++ b/charts/traefik-forward-auth/Chart.yaml @@ -0,0 +1,19 @@ +apiVersion: v2 +name: traefik-forward-auth +description: A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer +type: application +version: 1.0.0 +appVersion: 2.2.0 +keywords: + - traefik + - traefik-forward-auth + - oauth + - oauth2 + - oidc +home: https://github.com/k8s-at-home/charts/tree/master/charts/traefik-forward-auth +sources: + - https://github.com/thomseddon/traefik-forward-auth + - https://hub.docker.com/r/thomseddon/traefik-forward-auth +maintainers: + - name: DirtyCajunRice + email: nick@cajun.pro diff --git a/charts/traefik-forward-auth/OWNERS b/charts/traefik-forward-auth/OWNERS new file mode 100644 index 00000000..90661f99 --- /dev/null +++ b/charts/traefik-forward-auth/OWNERS @@ -0,0 +1,4 @@ +approvers: +- DirtyCajunRice +reviewers: +- DirtyCajunRice \ No newline at end of file diff --git a/charts/traefik-forward-auth/README.md b/charts/traefik-forward-auth/README.md new file mode 100644 index 00000000..086a9671 --- /dev/null +++ b/charts/traefik-forward-auth/README.md @@ -0,0 +1,44 @@ +# traefik-forward-auth | A minimal forward authentication service that provides OAuth/SSO login and authentication for the traefik reverse proxy/load balancer + +The default values and container images used in this chart will allow for running in a multi-arch cluster (amd64, arm, arm64) + +Chart that +* Adds docker image information leveraging the [official image](https://github.com/thomseddon/traefik-forward-auth) +* Deploys [traefik-forward-auth](https://github.com/thomseddon/traefik-forward-auth) + +## TL;DR +```console +$ helm repo add k8s-at-home https://k8s-at-home.com/charts/ +$ helm install k8s-at-home/traefik-forward-auth +``` + +## Installing the Chart +To install the chart with the release name `traefik-forward-auth`: +```console +helm install traefik-forward-auth k8s-at-home/traefik-forward-auth +``` + +## Uninstalling the Chart +To uninstall the `traefik-forward-auth` deployment: +```console +helm uninstall traefik-forward-auth +``` +The command removes all the Kubernetes components associated with the chart and deletes the release. + +## Configuration + +Read through the [values.yaml](https://github.com/k8s-at-home/charts/blob/master/charts/traefik-forward-auth/values.yaml) +file. It has several commented out suggested values. + +Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example, +```console +helm install traefik-forward-auth \ + --set env.TZ="America/New York" \ + k8s-at-home/traefik-forward-auth +``` + +Alternatively, a YAML file that specifies the values for the above parameters can be provided while installing the chart. +For example, +```console +helm install traefik-forward-auth k8s-at-home/traefik-forward-auth --values values.yaml +``` \ No newline at end of file diff --git a/charts/traefik-forward-auth/ci/ct-values.yaml b/charts/traefik-forward-auth/ci/ct-values.yaml new file mode 100644 index 00000000..f5f9f2c6 --- /dev/null +++ b/charts/traefik-forward-auth/ci/ct-values.yaml @@ -0,0 +1,5 @@ +providers: + google: + enabled: true + clientId: "fakeclientid" + clientSecret: "fakeclientsecret" diff --git a/charts/traefik-forward-auth/templates/NOTES.txt b/charts/traefik-forward-auth/templates/NOTES.txt new file mode 100644 index 00000000..327f1f71 --- /dev/null +++ b/charts/traefik-forward-auth/templates/NOTES.txt @@ -0,0 +1,21 @@ +1. Get the application URL by running these commands: +{{- if .Values.ingress.enabled }} +{{- range $host := .Values.ingress.hosts }} + {{- range .paths }} + http{{ if $.Values.ingress.tls }}s{{ end }}://{{ $host.host }}{{ . }} + {{- end }} +{{- end }} +{{- else if contains "NodePort" .Values.service.type }} + export NODE_PORT=$(kubectl get --namespace {{ .Release.Namespace }} -o jsonpath="{.spec.ports[0].nodePort}" services {{ include "traefik-forward-auth.fullname" . }}) + export NODE_IP=$(kubectl get nodes --namespace {{ .Release.Namespace }} -o jsonpath="{.items[0].status.addresses[0].address}") + echo http://$NODE_IP:$NODE_PORT +{{- else if contains "LoadBalancer" .Values.service.type }} + NOTE: It may take a few minutes for the LoadBalancer IP to be available. + You can watch the status of by running 'kubectl get --namespace {{ .Release.Namespace }} svc -w {{ include "traefik-forward-auth.fullname" . }}' + export SERVICE_IP=$(kubectl get svc --namespace {{ .Release.Namespace }} {{ include "traefik-forward-auth.fullname" . }} --template "{{"{{ range (index .status.loadBalancer.ingress 0) }}{{.}}{{ end }}"}}") + echo http://$SERVICE_IP:{{ .Values.service.port }} +{{- else if contains "ClusterIP" .Values.service.type }} + export POD_NAME=$(kubectl get pods --namespace {{ .Release.Namespace }} -l "app.kubernetes.io/name={{ include "traefik-forward-auth.name" . }},app.kubernetes.io/instance={{ .Release.Name }}" -o jsonpath="{.items[0].metadata.name}") + echo "Visit http://127.0.0.1:8080 to use your application" + kubectl --namespace {{ .Release.Namespace }} port-forward $POD_NAME 8080:80 +{{- end }} diff --git a/charts/traefik-forward-auth/templates/_helpers.tpl b/charts/traefik-forward-auth/templates/_helpers.tpl new file mode 100644 index 00000000..ee69d8a8 --- /dev/null +++ b/charts/traefik-forward-auth/templates/_helpers.tpl @@ -0,0 +1,63 @@ +{{/* vim: set filetype=mustache: */}} +{{/* +Expand the name of the chart. +*/}} +{{- define "traefik-forward-auth.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "traefik-forward-auth.fullname" -}} +{{- if .Values.fullnameOverride }} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- $name := default .Chart.Name .Values.nameOverride }} +{{- if contains $name .Release.Name }} +{{- .Release.Name | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }} +{{- end }} +{{- end }} +{{- end }} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "traefik-forward-auth.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Common labels +*/}} +{{- define "traefik-forward-auth.labels" -}} +helm.sh/chart: {{ include "traefik-forward-auth.chart" . }} +{{ include "traefik-forward-auth.selectorLabels" . }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end }} + +{{/* +Selector labels +*/}} +{{- define "traefik-forward-auth.selectorLabels" -}} +app.kubernetes.io/name: {{ include "traefik-forward-auth.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end }} + +{{/* +Create the name of the service account to use +*/}} +{{- define "traefik-forward-auth.serviceAccountName" -}} +{{- if .Values.serviceAccount.create }} +{{- default (include "traefik-forward-auth.fullname" .) .Values.serviceAccount.name }} +{{- else }} +{{- default "default" .Values.serviceAccount.name }} +{{- end }} +{{- end }} diff --git a/charts/traefik-forward-auth/templates/deployment.yaml b/charts/traefik-forward-auth/templates/deployment.yaml new file mode 100644 index 00000000..0ae1b0d8 --- /dev/null +++ b/charts/traefik-forward-auth/templates/deployment.yaml @@ -0,0 +1,207 @@ +{{- $fullName := include "traefik-forward-auth.fullname" . -}} +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ $fullName }} + labels: + {{- include "traefik-forward-auth.labels" . | nindent 4 }} +spec: + {{- if not .Values.autoscaling.enabled }} + replicas: {{ .Values.replicaCount }} + {{- end }} + selector: + matchLabels: + {{- include "traefik-forward-auth.selectorLabels" . | nindent 6 }} + template: + metadata: + {{- with .Values.podAnnotations }} + annotations: + {{- toYaml . | nindent 8 }} + {{- end }} + labels: + {{- include "traefik-forward-auth.selectorLabels" . | nindent 8 }} + spec: + {{- with .Values.imagePullSecrets }} + imagePullSecrets: + {{- toYaml . | nindent 8 }} + {{- end }} + serviceAccountName: {{ include "traefik-forward-auth.serviceAccountName" . }} + {{- with .Values.podSecurityContext }} + securityContext: + {{- toYaml . | nindent 8 }} + {{- end }} + containers: + - name: {{ .Chart.Name }} + {{- with .Values.securityContext }} + securityContext: + {{- toYaml . | nindent 12 }} + {{- end }} + image: "{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + env: + {{- if .Values.logging.level }} + - name: LOG_LEVEL + value: {{ .Values.logging.level | quote }} + {{- end }} + {{- if .Values.logging.format }} + - name: LOG_FORMAT + value: {{ .Values.logging.format | quote }} + {{- end }} + {{- if .Values.authHost }} + - name: AUTH_HOST + value: {{ .Values.authHost | quote }} + {{- end }} + {{- if .Values.cookie.domain }} + - name: COOKIE_DOMAIN + value: {{ .Values.cookie.domain | quote }} + {{- end }} + {{- if .Values.cookie.insecure }} + - name: INSECURE_COOKIE + value: {{ .Values.cookie.insecure | quote }} + {{- end }} + {{- if .Values.cookie.name }} + - name: COOKIE_NAME + value: {{ .Values.cookie.name | quote }} + {{- end }} + {{- if .Values.cookie.csrfName }} + - name: CSRF_COOKIE_NAME + value: {{ .Values.cookie.csrfName | quote }} + {{- end }} + {{- if .Values.default.action }} + - name: DEFAULT_ACTION + value: {{ .Values.default.action | quote }} + {{- end }} + {{- if .Values.default.provider }} + - name: DEFAULT_PROVIDER + value: {{ .Values.default.provider | quote }} + {{- end }} + {{- if .Values.restrictions.domain }} + - name: DOMAIN + value: {{ .Values.restrictions.domain | quote }} + {{- end }} + {{- if .Values.restrictions.whitelist }} + - name: WHITELIST + value: {{ .Values.restrictions.whitelist | quote }} + {{- end }} + {{- if .Values.lifetime }} + - name: LIFETIME + value: {{ .Values.lifetime | quote }} + {{- end }} + {{- if .Values.logoutRedirect }} + - name: LOGOUT_REDIRECT + value: {{ .Values.logoutRedirect | quote }} + {{- end }} + {{- if .Values.urlPath }} + - name: URL_PATH + value: {{ .Values.urlPath | quote }} + {{- end }} + {{- if ne .Values.secret "-" }} + - name: SECRET + {{- if .Values.secret }} + value: {{ .Values.secret | quote }} + {{- else }} + valueFrom: + secretKeyRef: + name: {{ $fullName }} + key: secret + {{- end }} + {{- with .Values.providers}} + {{- if .google.enabled }} + {{- if .google.clientId }} + - name: PROVIDERS_GOOGLE_CLIENT_ID + value: {{ .google.clientId | quote }} + {{- end }} + {{- if .google.clientSecret }} + - name: PROVIDERS_GOOGLE_CLIENT_SECRET + value: {{ .google.clientSecret | quote }} + {{- end }} + {{- if .google.prompt }} + - name: PROVIDERS_GOOGLE_PROMPT + value: {{ .google.prompt | quote }} + {{- end }} + {{- end }} + {{- if .oidc.enabled }} + {{- if .oidc.clientId }} + - name: PROVIDERS_OIDC_CLIENT_ID + value: {{ .oidc.clientId | quote }} + {{- end }} + {{- if .oidc.clientSecret }} + - name: PROVIDERS_OIDC_CLIENT_SECRET + value: {{ .oidc.clientSecret | quote }} + {{- end }} + {{- if .oidc.issuerUrl }} + - name: PROVIDERS_OIDC_ISSUER_URL + value: {{ .oidc.issuerUrl | quote }} + {{- end }} + {{- if .oidc.resource }} + - name: PROVIDERS_OIDC_RESOURCE + value: {{ .oidc.resource | quote }} + {{- end }} + {{- end }} + {{- if .genericOauth.enabled }} + {{- if .genericOauth.clientId }} + - name: PROVIDERS_GENERIC_OAUTH_CLIENT_ID + value: {{ .genericOauth.clientId | quote }} + {{- end }} + {{- if .genericOauth.clientSecret }} + - name: PROVIDERS_GENERIC_OAUTH_CLIENT_SECRET + value: {{ .genericOauth.clientSecret | quote }} + {{- end }} + {{- if .genericOauth.authUrl }} + - name: PROVIDERS_GENERIC_OAUTH_AUTH_URL + value: {{ .genericOauth.authUrl | quote }} + {{- end }} + {{- if .genericOauth.tokenUrl }} + - name: PROVIDERS_GENERIC_OAUTH_TOKEN_URL + value: {{ .genericOauth.tokenUrl | quote }} + {{- end }} + {{- if .genericOauth.userUrl }} + - name: PROVIDERS_GENERIC_OAUTH_USER_URL + value: {{ .genericOauth.userUrl | quote }} + {{- end }} + {{- if .genericOauth.resource }} + - name: PROVIDERS_GENERIC_OAUTH_RESOURCE + value: {{ .genericOauth.resource | quote }} + {{- end }} + {{- if .genericOauth.scope }} + - name: PROVIDERS_GENERIC_OAUTH_SCOPE + value: {{ .genericOauth.scope | quote }} + {{- end }} + {{- if .genericOauth.tokenStyle }} + - name: PROVIDERS_GENERIC_OAUTH_TOKEN_STYLE + value: {{ .genericOauth.tokenStyle | quote }} + {{- end }} + {{- end }} + {{- end }} + {{- end }} + {{- if .Values.env }} + {{- toYaml .Values.env | nindent 12 }} + {{- end }} + ports: + - name: http + containerPort: 4181 + protocol: TCP + livenessProbe: + httpGet: + path: / + port: http + readinessProbe: + httpGet: + path: / + port: http + {{- with .Values.resources }} + resources: + {{- toYaml . | nindent 12 }} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.affinity }} + affinity: + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} diff --git a/charts/traefik-forward-auth/templates/hpa.yaml b/charts/traefik-forward-auth/templates/hpa.yaml new file mode 100644 index 00000000..ab633a75 --- /dev/null +++ b/charts/traefik-forward-auth/templates/hpa.yaml @@ -0,0 +1,28 @@ +{{- if .Values.autoscaling.enabled }} +apiVersion: autoscaling/v2beta1 +kind: HorizontalPodAutoscaler +metadata: + name: {{ include "traefik-forward-auth.fullname" . }} + labels: + {{- include "traefik-forward-auth.labels" . | nindent 4 }} +spec: + scaleTargetRef: + apiVersion: apps/v1 + kind: Deployment + name: {{ include "traefik-forward-auth.fullname" . }} + minReplicas: {{ .Values.autoscaling.minReplicas }} + maxReplicas: {{ .Values.autoscaling.maxReplicas }} + metrics: + {{- if .Values.autoscaling.targetCPUUtilizationPercentage }} + - type: Resource + resource: + name: cpu + targetAverageUtilization: {{ .Values.autoscaling.targetCPUUtilizationPercentage }} + {{- end }} + {{- if .Values.autoscaling.targetMemoryUtilizationPercentage }} + - type: Resource + resource: + name: memory + targetAverageUtilization: {{ .Values.autoscaling.targetMemoryUtilizationPercentage }} + {{- end }} +{{- end }} diff --git a/charts/traefik-forward-auth/templates/ingress.yaml b/charts/traefik-forward-auth/templates/ingress.yaml new file mode 100644 index 00000000..1b38b891 --- /dev/null +++ b/charts/traefik-forward-auth/templates/ingress.yaml @@ -0,0 +1,46 @@ +{{- if .Values.ingress.enabled -}} + {{- $fullName := include "traefik-forward-auth.fullname" . -}} + {{- $svcPort := .Values.service.port -}} + {{- if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}} +apiVersion: networking.k8s.io/v1beta1 + {{- else -}} +apiVersion: extensions/v1beta1 + {{- end }} +kind: Ingress +metadata: + name: {{ $fullName }} + labels: + {{- include "traefik-forward-auth.labels" . | nindent 4 }} + {{- if or .Values.ingress.annotations (and .Values.middleware.enabled .Values.authHost) }} + annotations: + {{- with .Values.ingress.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} + {{- if and .Values.middleware.enabled .Values.authHost }} + traefik.ingress.kubernetes.io/router.middlewares: {{ .Release.Namespace }}-{{ .Values.middleware.name | default "traefik-forward-auth" }}@kubernetescrd + {{- end }} + {{- end }} +spec: + {{- if .Values.ingress.tls }} + tls: + {{- range .Values.ingress.tls }} + - hosts: + {{- range .hosts }} + - {{ . | quote }} + {{- end }} + secretName: {{ .secretName }} + {{- end }} + {{- end }} + rules: + {{- range .Values.ingress.hosts }} + - host: {{ .host | quote }} + http: + paths: + {{- range .paths }} + - path: {{ . }} + backend: + serviceName: {{ $fullName }} + servicePort: {{ $svcPort }} + {{- end }} + {{- end }} + {{- end }} diff --git a/charts/traefik-forward-auth/templates/middleware.yaml b/charts/traefik-forward-auth/templates/middleware.yaml new file mode 100644 index 00000000..171cc41e --- /dev/null +++ b/charts/traefik-forward-auth/templates/middleware.yaml @@ -0,0 +1,11 @@ +{{- if .Values.middleware.enabled -}} +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: {{ .Values.middleware.name | default "traefik-forward-auth" }} +spec: + forwardAuth: + address: "http://{{ include "traefik-forward-auth.fullname" . }}:{{ .Values.service.port }}" + authResponseHeaders: + - X-Forwarded-User + {{- end }} \ No newline at end of file diff --git a/charts/traefik-forward-auth/templates/secret.yaml b/charts/traefik-forward-auth/templates/secret.yaml new file mode 100644 index 00000000..04f9b9bd --- /dev/null +++ b/charts/traefik-forward-auth/templates/secret.yaml @@ -0,0 +1,11 @@ +{{- if and (ne .Values.secret "-") (not .Values.secret) }} +apiVersion: v1 +kind: Secret +metadata: + name: {{ template "traefik-forward-auth.fullname" . }} + labels: + {{- include "traefik-forward-auth.labels" . | nindent 4 }} +type: Opaque +data: + secret: {{ randAlphaNum 16 | b64enc | quote }} + {{- end }} \ No newline at end of file diff --git a/charts/traefik-forward-auth/templates/service.yaml b/charts/traefik-forward-auth/templates/service.yaml new file mode 100644 index 00000000..9694610a --- /dev/null +++ b/charts/traefik-forward-auth/templates/service.yaml @@ -0,0 +1,22 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ include "traefik-forward-auth.fullname" . }} + labels: + {{- include "traefik-forward-auth.labels" . | nindent 4 }} + {{- with .Values.service.annotations }} + annotations: + {{- toYaml . | nindent 4 }} + {{- end }} +spec: + type: {{ .Values.service.type }} + ports: + - port: {{ .Values.service.port }} + targetPort: http + protocol: TCP + name: http + {{- with .Values.service.additionalSpec }} + {{- toYaml . | nindent 2 }} + {{- end }} + selector: + {{- include "traefik-forward-auth.selectorLabels" . | nindent 4 }} diff --git a/charts/traefik-forward-auth/templates/serviceaccount.yaml b/charts/traefik-forward-auth/templates/serviceaccount.yaml new file mode 100644 index 00000000..295bff53 --- /dev/null +++ b/charts/traefik-forward-auth/templates/serviceaccount.yaml @@ -0,0 +1,12 @@ +{{- if .Values.serviceAccount.create -}} +apiVersion: v1 +kind: ServiceAccount +metadata: + name: {{ include "traefik-forward-auth.serviceAccountName" . }} + labels: + {{- include "traefik-forward-auth.labels" . | nindent 4 }} + {{- with .Values.serviceAccount.annotations }} + annotations: + {{- toYaml . | nindent 4 }} + {{- end }} +{{- end }} diff --git a/charts/traefik-forward-auth/values.yaml b/charts/traefik-forward-auth/values.yaml new file mode 100644 index 00000000..5357ea48 --- /dev/null +++ b/charts/traefik-forward-auth/values.yaml @@ -0,0 +1,145 @@ +# Default values for traefik-forward-auth. +replicaCount: 1 + +image: + repository: thomseddon/traefik-forward-auth + pullPolicy: IfNotPresent + tag: "" + +imagePullSecrets: [] +nameOverride: "" +fullnameOverride: "" + +logging: + # [trace|debug|info|warn|error|fatal|panic] Log level (default: warn) + level: "" + # [text|json|pretty] Log format (default: text) + format: "" +# Single host to use when returning from 3rd party auth +authHost: "" +restrictions: + # Only allow given email domains. (Comma delimited) + domain: "" + # Only allow given email addresses. (Comma delimited) + whitelist: "" +# Lifetime in seconds (default: 43200) +lifetime: "" +cookie: + # Domain(s) to set auth cookie on. (Comma delimited) + domain: "" + # Use insecure cookies + insecure: "" + # Cookie Name (default: _forward_auth) + name: "" + # CSRF Cookie Name (default: _forward_auth_csrf) + csrfName: "" +default: + # [auth|allow] Default action (default: auth) + action: "" + # [google|oidc|generic-oauth] Default provider (default: google) + provider: "" +# URL to redirect to following logout +logoutRedirect: "" +# Callback URL Path (default: /_oauth) +urlPath: "" +# Secret used for signing. If empty, one will be generated. If specifying your own in env use "-" +secret: "" + +middleware: + enabled: false + name: "" +providers: + google: + enabled: false + clientId: "" + clientSecret: "" + prompt: "" + oidc: + enabled: false + issuerUrl: "" + clientId: "" + clientSecret: "" + resource: "" + genericOauth: + enabled: false + authUrl: "" + tokenUrl: "" + userUrl: "" + clientId: "" + clientSecret: "" + scope: "" + tokenStyle: "" + resource: "" + +env: [] + +serviceAccount: + # Specifies whether a service account should be created + create: true + # Annotations to add to the service account + annotations: {} + # The name of the service account to use. + # If not set and create is true, a name is generated using the fullname template + name: "" + +podAnnotations: {} + +podSecurityContext: {} + # fsGroup: 2000 + +securityContext: {} + # capabilities: + # drop: + # - ALL + # readOnlyRootFilesystem: true + # runAsNonRoot: true + # runAsUser: 1000 + +service: + type: ClusterIP + port: 4181 + ## Provide any additional annotations which may be required. This can be used to + ## set the LoadBalancer service type to internal only. + ## ref: https://kubernetes.io/docs/concepts/services-networking/service/#internal-load-balancer + ## + annotations: {} + labels: {} + additionalSpec: {} + +ingress: + enabled: false + annotations: {} + # kubernetes.io/ingress.class: nginx + # kubernetes.io/tls-acme: "true" + hosts: + - host: chart-example.local + paths: [] + tls: [] + # - secretName: chart-example-tls + # hosts: + # - chart-example.local + +resources: {} + # We usually recommend not to specify default resources and to leave this as a conscious + # choice for the user. This also increases chances charts run on environments with little + # resources, such as Minikube. If you do want to specify resources, uncomment the following + # lines, adjust them as necessary, and remove the curly braces after 'resources:'. + # limits: + # cpu: 100m + # memory: 128Mi + # requests: + # cpu: 100m + # memory: 128Mi + +autoscaling: + enabled: false + minReplicas: 1 + maxReplicas: 100 + targetCPUUtilizationPercentage: 80 + # targetMemoryUtilizationPercentage: 80 + +nodeSelector: {} + +tolerations: [] + +affinity: {}