Skip to content
Snippets Groups Projects
values-local.yaml.example 3.01 KiB
Newer Older
nextcloud:
  nextcloud:
    host: "files.your.domain"

  ingress:
    enabled: true
    annotations:
      # Tell cert-manager to automatically get a TLS certificate
      kubernetes.io/tls-acme: "true"
    hosts:
      - "files.your.domain"
    # This information is important for cert-manager, if you use it.
    tls:
      - hosts:
          - "files.your.domain"
        secretName: files-cert
  # Configure MariaDB chart
      password: CHANGE_ME
      rootPassword: CHANGE_ME
    architecture: standalone
    # Enable persistence
    # primary:
    #   persistence:
    #     ## Enable mariadb persistence using Persistent Volume Claims.
    #     enabled: true
    #     size: 512Mi

  # Creates a kubernetes cronJob object that runs nextcloud's cron.php
  # every 5 minutes (*/5 * * * *)
  # cronjob:
  #   enabled: true

  # persistence:
  #   enabled: true
  #   size: 2Gi
Arie Peterson's avatar
Arie Peterson committed
  server_name: "office.your.domain"
  ingress:
    enabled: true
    hosts:
      - "office.your.domain"
    tls:
      - hosts:
          - "office.your.domain"
        secretName: office-cert
Mark's avatar
Mark committed

# apps controls which apps will be installed and enabled in nextcloud
# apps:
#   - name: sociallogin
#     # apps[0].enabled needs to be set to true if you want to enable login via an external
#     # oauth server. In that case you need to configure all the values in `sociallogin`
#     enabled: false
#   - name: onlyoffice
#     enabled: true
# sociallogin enables login via oAuth/Open-ID Connect
# sociallogin:
#   # Because of how we import these settings, single quotes (') are not allowed
#   # in any of the values below
#   custom_oidc:
#     name: stackspin
#     title: Stackspin
#     # The oAuth server needs to provide the endpoints `/userinfo`,
#     # `/oauth2/token` and `/oauth2/auth` and according to the oauth2 standard it
#     # needs to be accessible via https with valid certificates
#     authorizeUrl: https://sso.stackspin.example.net/oauth2/auth
#     tokenUrl: https://sso.stackspin.example.net/oauth2/token
#     userInfoUrl: https://sso.stackspin.example.net/userinfo
#     logoutUrl: ""
#     # The client name nextcloud will use to communicate with the oAuth server
#     clientId: nextcloud
#     # The password that nextcloud uses when communicating with the oauth server
#     # clientSecret: YouReallyNeedToChangeThis
#     scope: "openid profile email stackspin_roles"
#     # The name of a claim that the nextcloud server can retrieve by querying the
#     # userInfoUrl of the openID Connect server. For every value in the
#     # groups_claim a corresponding group with an `stackspin_` prefix will be created
#     # if they don't exist yet. The user will then be added to those groups.  If
#     # the claim contains the value `admin` the user will be granted admin
#     # privileges.
#     groupsClaim: "stackspin_roles"
#     style: ""
#     defaultGroup: ""
#     groupMapping:
#       admin: admin