clusters/core/addons/dependency-track/values.yaml (75 lines of code) (raw):
dependency-track:
fullnameOverride: deptrack
nameOverride: deptrack
frontend:
replicaCount: 1
image:
# we override the default image tag here, since the helm chart is a little behind
tag: 4.11.3
apiBaseUrl: "https://deptrack.example.com"
extraEnv:
- name: OIDC_ISSUER
value: "https://keycloak.example.com/auth/realms/shared"
- name: OIDC_CLIENT_ID
value: "deptrack"
- name: OIDC_SCOPE
value: "openid profile email"
- name: OIDC_LOGIN_BUTTON_TEXT
value: "Login with Keycloak"
- name: OIDC_FLOW
value: "code"
resources:
requests:
cpu: 150m
memory: 64Mi
limits:
cpu: 500m
memory: 128Mi
apiServer:
image:
# we override the default image tag here, since the helm chart is a little behind
tag: 4.11.3
# disabled because we use an external PostgreSQL database (PGO)
persistentVolume:
enabled: false
extraEnv:
- name: ALPINE_DATABASE_MODE
value: "external"
- name: ALPINE_DATABASE_URL
value: "jdbc:postgresql://deptrack-primary.dependency-track.svc:5432/deptrack"
- name: ALPINE_DATABASE_DRIVER
value: "org.postgresql.Driver"
- name: ALPINE_DATABASE_USERNAME
value: "deptrack"
- name: ALPINE_DATABASE_PASSWORD
valueFrom:
secretKeyRef:
key: password
name: deptrack-pguser-deptrack
- name: ALPINE_OIDC_ENABLED
value: "true"
- name: ALPINE_OIDC_CLIENT_ID
value: "deptrack"
- name: ALPINE_OIDC_ISSUER
value: "https://keycloak.example.com/auth/realms/shared"
- name: ALPINE_OIDC_USERNAME_CLAIM
value: "preferred_username"
- name: ALPINE_OIDC_USER_PROVISIONING
value: "true"
- name: ALPINE_OIDC_TEAMS_CLAIM
value: "roles"
- name: ALPINE_OIDC_TEAM_SYNCHRONIZATION
value: "true"
resources:
# https://docs.dependencytrack.org/getting-started/deploy-docker/
requests:
cpu: "1"
memory: 768Mi
limits:
cpu: "2"
memory: 4608Mi
ingress:
enabled: true
tls: []
annotations:
kubernetes.io/ingress.class: nginx
# allow large bom.xml uploads:
nginx.ingress.kubernetes.io/proxy-body-size: 10m
hostname: deptrack.example.com
# Configuration for setting up resources in Keycloak to enable OIDC authentication.
# Prerequisite: Ensure that the Keycloak Operator is installed and integrated with Keycloak.
# Refer to the installation guide for the Keycloak Operator:
# https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/keycloak-operator
#
# Additionally, necessary Keycloak resources such as realms, roles, and groups must be created
# to support component functionality. This can be done using the provided add-ons or manually:
# https://github.com/epam/edp-cluster-add-ons/tree/main/clusters/core/addons/kuberocketci-rbac
oidc:
enabled: false