Skip to content

Commit

Permalink
chore(vikunja): Disable and swtich to configmap.yaml
Browse files Browse the repository at this point in the history
  • Loading branch information
gavinmcfall committed Sep 5, 2024
1 parent 98f4a01 commit 4fcb475
Show file tree
Hide file tree
Showing 4 changed files with 67 additions and 36 deletions.
2 changes: 1 addition & 1 deletion kubernetes/apps/home/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -9,5 +9,5 @@ resources:
- ./manyfold/ks.yaml
- ./smtp-relay/ks.yaml
- ./thelounge/ks.yaml
- ./vikunja/ks.yaml
# - ./vikunja/ks.yaml
- ./wikijs/ks.yaml
31 changes: 0 additions & 31 deletions kubernetes/apps/home/vikunja/app/config/Caddyfile

This file was deleted.

65 changes: 65 additions & 0 deletions kubernetes/apps/home/vikunja/app/config/configmap.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,65 @@
---
apiVersion: v1
kind: ConfigMap
metadata:
name: vikunja
namespace: default
data:
config.yml: |
auth:
# Local authentication will let users log in and register (if enabled) through the db.
# This is the default auth mechanism and does not require any additional configuration.
local:
# Enable or disable local authentication
enabled: true
# OpenID configuration will allow users to authenticate through a third-party OpenID Connect compatible provider.
# The provider needs to support the `openid`, `profile` and `email` scopes.
# **Note:** Some openid providers (like gitlab) only make the email of the user available through openid claims if they have set it to be publicly visible.
# If the email is not public in those cases, authenticating will fail.
# **Note 2:** The frontend expects to be redirected after authentication by the third party
# to <frontend-url>/auth/openid/<auth key>. Please make sure to configure the redirect url with your third party
# auth service accordingly if you're using the default Vikunja frontend.
# Take a look at the [default config file](https://kolaente.dev/vikunja/api/src/branch/main/config.yml.sample) for more information about how to configure openid authentication.
# openid:
# # Enable or disable OpenID Connect authentication
# enabled: true
# # The url to redirect clients to. Defaults to the configured frontend url. If you're using Vikunja with the official
# # frontend, you don't need to change this value.
# redirecturl: https://tasks.${CLUSTER_DOMAIN}/auth/openid/
# # A list of enabled providers
# providers:
# # The name of the provider as it will appear in the frontend.
# - name: authelia
# # The auth url to send users to if they want to authenticate using OpenID Connect.
# authurl: https://auth.${CLUSTER_DOMAIN}
# # The client ID used to authenticate Vikunja at the OpenID Connect provider.
# clientid: vikunja
# # The client secret used to authenticate Vikunja at the OpenID Connect provider.
# clientsecret: ${VIKUNJA_OAUTH_CLIENT_SECRET}
Caddyfile: |-
{
admin off
auto_https off
}
:8080 {
log {
output stdout
}
@api {
path /api/*
path /.well-known/*
path /dav/*
}
header {
# Remove Server header
-Server
}
# API
handle @api {
reverse_proxy localhost:3456
}
# Filtron
handle {
reverse_proxy localhost:80
}
}
5 changes: 1 addition & 4 deletions kubernetes/apps/home/vikunja/app/kustomization.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -5,12 +5,9 @@ kind: Kustomization
namespace: default
resources:
- ./externalsecret.yaml
- ./config/configmap.yaml
- ./helmrelease.yaml
- ../../../../templates/gatus/external
- ../../../../templates/volsync
configMapGenerator:
- name: vikunja-configmap
files:
- ./config/Caddyfile
generatorOptions:
disableNameSuffixHash: true

0 comments on commit 4fcb475

Please sign in to comment.