-
Notifications
You must be signed in to change notification settings - Fork 30
/
Copy pathbitnami-values.yaml
205 lines (192 loc) · 7.12 KB
/
bitnami-values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
## @section LeapfrogAI parameters
## Parameters not defined in the upstream chart that are related to LeapfrogAI's specific configuration
leapfrogai:
package:
host: supabase-kong
name: supabase
component: kong
sso:
clientId: ###ZARF_CONST_EXTERNAL_KEYCLOAK_CLIENT_ID###
redirectUris:
- "https://{{ .Values.leapfrogai.package.host }}.###ZARF_VAR_DOMAIN###/auth/v1/callback"
webOrigins:
- "https://ai.###ZARF_VAR_DOMAIN###"
global:
jwt:
existingSecret: "supabase-bootstrap-jwt"
commonLabels:
sidecar.istio.io/inject: "false"
jwt:
autoGenerate:
resourcesPreset: "none"
podLabels:
sidecar.istio.io/inject: "false"
publicURL: "https://supabase-kong.###ZARF_VAR_DOMAIN###"
auth:
enabled: ###ZARF_VAR_ENABLE_AUTH###
defaultConfig: |
GOTRUE_API_HOST: "0.0.0.0"
GOTRUE_API_PORT: {{ .Values.auth.containerPorts.http | quote }}
API_EXTERNAL_URL: "http://{{ include "supabase.auth.fullname" . }}:{{ .Values.auth.service.ports.http }}"
GOTRUE_SITE_URL: {{ include "supabase.studio.publicURL" . | quote }}
GOTRUE_DISABLE_SIGNUP: "false"
GOTRUE_DB_DRIVER: "postgres"
GOTRUE_DB_MIGRATIONS_PATH: "/opt/bitnami/gotrue/"
GOTRUE_JWT_DEFAULT_GROUP_NAME: "authenticated"
GOTRUE_JWT_ADMIN_ROLES: "service_role"
GOTRUE_JWT_AUD: "authenticated"
GOTRUE_JWT_EXP: "3600"
GOTRUE_EXTERNAL_EMAIL_ENABLED: "true"
GOTRUE_MAILER_AUTOCONFIRM: "true"
GOTRUE_SMTP_ADMIN_EMAIL: "[email protected]"
GOTRUE_SMTP_HOST: "smtp.example.com"
GOTRUE_SMTP_PORT: "587"
GOTRUE_SMTP_SENDER_NAME: "[email protected]"
GOTRUE_EXTERNAL_PHONE_ENABLED: "false"
GOTRUE_SMS_AUTOCONFIRM: "false"
GOTRUE_MAILER_URLPATHS_INVITE: "{{ include "supabase.studio.publicURL" . }}/auth/v1/verify"
GOTRUE_MAILER_URLPATHS_CONFIRMATION: "{{ include "supabase.studio.publicURL" . }}/auth/v1/verify"
GOTRUE_MAILER_URLPATHS_RECOVERY: "{{ include "supabase.studio.publicURL" . }}/auth/v1/verify"
GOTRUE_MAILER_URLPATHS_EMAIL_CHANGE: "{{ include "supabase.studio.publicURL" . }}/auth/v1/verify"
GOTRUE_EXTERNAL_KEYCLOAK_ENABLED: "###ZARF_VAR_ENABLE_EXTERNAL_KEYCLOAK###"
GOTRUE_EXTERNAL_KEYCLOAK_CLIENT_ID: "{{ .Values.leapfrogai.sso.clientId }}"
GOTRUE_EXTERNAL_KEYCLOAK_REDIRECT_URI: "https://{{ .Values.leapfrogai.package.host }}.###ZARF_VAR_DOMAIN###/auth/v1/callback"
GOTRUE_EXTERNAL_KEYCLOAK_URL: "https://sso.###ZARF_VAR_DOMAIN###/realms/uds"
resourcesPreset: "none"
podLabels:
sidecar.istio.io/inject: "false"
extraEnvVars:
- name: GOTRUE_EXTERNAL_KEYCLOAK_SECRET
valueFrom:
secretKeyRef:
name: sso-client-uds-supabase
key: secret
meta:
enabled: ###ZARF_VAR_ENABLE_META###
resourcesPreset: "none"
podLabels:
sidecar.istio.io/inject: "false"
realtime:
enabled: ###ZARF_VAR_ENABLE_REALTIME###
resourcesPreset: "none"
podLabels:
sidecar.istio.io/inject: "false"
extraEnvVars:
- name: APP_NAME
value: "supabase-realtime"
- name: DB_AFTER_CONNECT_QUERY
value: "DO $body$ BEGIN CREATE SCHEMA IF NOT EXISTS _realtime; ALTER SCHEMA _realtime OWNER TO postgres; SET search_path TO _realtime; END $body$;"
- name: DB_ENC_KEY
valueFrom:
secretKeyRef:
name: supabase-realtime-extra
key: dbEncKey
- name: DNS_NODES
value: "supabase-realtime"
args:
- -ec
- |
realtime eval Realtime.Release.migrate && realtime eval 'Realtime.Release.seeds(Realtime.Repo)' && realtime start
rest:
enabled: ###ZARF_VAR_ENABLE_REST###
resourcesPreset: "none"
podLabels:
sidecar.istio.io/inject: "false"
storage:
enabled: ###ZARF_VAR_ENABLE_STORAGE###
resourcesPreset: "none"
podLabels:
sidecar.istio.io/inject: "false"
extraEnvVars:
# FILE_SIZE_LIMIT and UPLOAD_FILE_SIZE_LIMIT do the same thing, Supabase has a primary and fallback variable,
# so we have opted to set both of the variables to the same value.
- name: FILE_SIZE_LIMIT
value: "###ZARF_VAR_MAX_FILE_UPLOAD_SIZE_IN_BYTES###"
- name: UPLOAD_FILE_SIZE_LIMIT
value: "###ZARF_VAR_MAX_FILE_UPLOAD_SIZE_IN_BYTES###"
studio:
enabled: ###ZARF_VAR_ENABLE_STUDIO###
publicURL: "https://ai.###ZARF_VAR_DOMAIN###"
resourcesPreset: "none"
podLabels:
sidecar.istio.io/inject: "false"
volumePermissions:
enabled: ###ZARF_VAR_ENABLE_VOLUME_PERMISSIONS###
resourcesPreset: "none"
psqlImage:
tag: 15.6.1-debian-12-r2
kong:
enabled: ###ZARF_VAR_ENABLE_KONG###
initContainers: |
- name: render-kong-declarative-conf
image: '{{ include "kong.image" . }}'
command:
- /bin/bash
args:
- -ec
- |
#!/bin/bash
. /opt/bitnami/scripts/liblog.sh
# We need to generate it in the tmp folder to ensure that we have write permissions
info "Rendering Supabase declarative config template"
render-template /bitnami/kong/declarative-template/kong.yml.tpl > "/bitnami/kong/declarative-conf/kong.yml"
volumeMounts:
- name: declarative-conf-template
mountPath: /bitnami/kong/declarative-template/
- name: rendered-declarative-conf
mountPath: /bitnami/kong/declarative-conf/
{{- if .Values.containerSecurityContext.enabled }}
securityContext: {{- omit .Values.containerSecurityContext "enabled" | toYaml | nindent 6 }}
{{- end }}
env:
- name: SUPABASE_DASHBOARD_USERNAME
value: '###ZARF_CONST_DASHBOARD_USERNAME###'
- name: SUPABASE_DASHBOARD_PASSWORD
valueFrom:
secretKeyRef:
name: supabase-dashboard-secret
key: password
- name: SUPABASE_ANON_KEY
valueFrom:
secretKeyRef:
name: '{{ include "supabase.jwt.secretName" . }}'
key: '{{ include "supabase.jwt.anonSecretKey" . }}'
- name: SUPABASE_SERVICE_KEY
valueFrom:
secretKeyRef:
name: '{{ include "supabase.jwt.secretName" . }}'
key: '{{ include "supabase.jwt.serviceSecretKey" . }}'
podLabels:
sidecar.istio.io/inject: "false"
kong:
extraEnvVars:
- name: KONG_DECLARATIVE_CONFIG
value: "/bitnami/kong/declarative-conf/kong.yml"
- name: KONG_DNS_ORDER
value: LAST,A,CNAME
- name: KONG_PLUGINS
value: request-transformer,cors,key-auth,acl,basic-auth
resourcesPreset: "none"
livenessProbe:
timeoutSeconds: 40
readinessProbe:
timeoutSeconds: 40
service:
type: ClusterIP
postgresql:
enabled: ###ZARF_VAR_ENABLE_POSTGRES###
image:
tag: 15.6.1-debian-12-r2
debug: true
primary:
extendedConfiguration: |
wal_level = logical
resourcesPreset: "none"
podLabels:
sidecar.istio.io/inject: "false"
commonAnnotations:
helm.sh/resource-policy: keep
## @param postgresql.postgresqlSharedPreloadLibraries Set the shared_preload_libraries parameter in postgresql.conf
## Setting an empty value in order to force the default extensions of supabase-postgres
##
postgresqlSharedPreloadLibraries: "pg_stat_statements, pg_stat_monitor, pgaudit, plpgsql, plpgsql_check, pg_cron, pg_net, pgsodium, timescaledb, auto_explain, vector"