generated from onedr0p/cluster-template
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
chore(vikunja): Disable and swtich to configmap.yaml
- Loading branch information
1 parent
98f4a01
commit 4fcb475
Showing
4 changed files
with
67 additions
and
36 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,65 @@ | ||
--- | ||
apiVersion: v1 | ||
kind: ConfigMap | ||
metadata: | ||
name: vikunja | ||
namespace: default | ||
data: | ||
config.yml: | | ||
auth: | ||
# Local authentication will let users log in and register (if enabled) through the db. | ||
# This is the default auth mechanism and does not require any additional configuration. | ||
local: | ||
# Enable or disable local authentication | ||
enabled: true | ||
# OpenID configuration will allow users to authenticate through a third-party OpenID Connect compatible provider. | ||
# The provider needs to support the `openid`, `profile` and `email` scopes. | ||
# **Note:** Some openid providers (like gitlab) only make the email of the user available through openid claims if they have set it to be publicly visible. | ||
# If the email is not public in those cases, authenticating will fail. | ||
# **Note 2:** The frontend expects to be redirected after authentication by the third party | ||
# to <frontend-url>/auth/openid/<auth key>. Please make sure to configure the redirect url with your third party | ||
# auth service accordingly if you're using the default Vikunja frontend. | ||
# Take a look at the [default config file](https://kolaente.dev/vikunja/api/src/branch/main/config.yml.sample) for more information about how to configure openid authentication. | ||
# openid: | ||
# # Enable or disable OpenID Connect authentication | ||
# enabled: true | ||
# # The url to redirect clients to. Defaults to the configured frontend url. If you're using Vikunja with the official | ||
# # frontend, you don't need to change this value. | ||
# redirecturl: https://tasks.${CLUSTER_DOMAIN}/auth/openid/ | ||
# # A list of enabled providers | ||
# providers: | ||
# # The name of the provider as it will appear in the frontend. | ||
# - name: authelia | ||
# # The auth url to send users to if they want to authenticate using OpenID Connect. | ||
# authurl: https://auth.${CLUSTER_DOMAIN} | ||
# # The client ID used to authenticate Vikunja at the OpenID Connect provider. | ||
# clientid: vikunja | ||
# # The client secret used to authenticate Vikunja at the OpenID Connect provider. | ||
# clientsecret: ${VIKUNJA_OAUTH_CLIENT_SECRET} | ||
Caddyfile: |- | ||
{ | ||
admin off | ||
auto_https off | ||
} | ||
:8080 { | ||
log { | ||
output stdout | ||
} | ||
@api { | ||
path /api/* | ||
path /.well-known/* | ||
path /dav/* | ||
} | ||
header { | ||
# Remove Server header | ||
-Server | ||
} | ||
# API | ||
handle @api { | ||
reverse_proxy localhost:3456 | ||
} | ||
# Filtron | ||
handle { | ||
reverse_proxy localhost:80 | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters