Files
ocis/tests/config/drone/k8s/values.yaml
Ashim Shrestha d6ab9216b0 [tests-only][full-ci] Test: run ocm test suite over k8s (#11869)
* test: run ocm tests over k8s setup

Signed-off-by: Ashim Shrestha <ashimshrestha2384@gmail.com>

* address review

Signed-off-by: Ashim Shrestha <ashimshrestha2384@gmail.com>

---------

Signed-off-by: Ashim Shrestha <ashimshrestha2384@gmail.com>
2026-02-27 16:26:20 +05:45

185 lines
4.1 KiB
YAML

---
namespaceOverride: ocis
image:
repository: owncloud/ocis-rolling
tag: master
ingress:
enabled: true
ingressClassName: traefik
externalDomain: ocis-server
extraResources:
- |
apiVersion: v1
kind: ConfigMap
metadata:
name: ocmproviders
namespace: {{ template "ocis.namespace" . }}
labels:
{{- include "ocis.labels" . | nindent 8 }}
data:
ocmproviders.json: |
[
{
"name": "ocis",
"full_name": "ocis server",
"organization": "ownCloud",
"domain": "ocis-server",
"homepage": "https://ocis-server",
"services": [
{
"endpoint": {
"type": {
"name": "OCM",
"description": "ownCloud Open Cloud Mesh API"
},
"name": "ocis-server - OCM API",
"path": "https://ocis-server/ocm/",
"is_monitored": true
},
"api_version": "0.0.1",
"host": "https://ocis-server"
}
]
},
{
"name": "federation ocis",
"full_name": "federation ocis server",
"organization": "ownCloud",
"domain": "federation-ocis-server",
"homepage": "https://federation-ocis-server",
"services": [
{
"endpoint": {
"type": {
"name": "OCM",
"description": "federation ownCloud Open Cloud Mesh API"
},
"name": "federation-ocis-server - OCM API",
"path": "https://federation-ocis-server/ocm/",
"is_monitored": true
},
"api_version": "0.0.1",
"host": "https://federation-ocis-server"
}
]
}
]
logging:
level: error
insecure:
oidcIdpInsecure: true
ocisHttpApiInsecure: true
ocmInsecure: true
features:
authapp:
enabled: true
emailNotifications:
enabled: true
smtp:
host: mailpit
port: 1025
sender: 'oCIS <noreply@local.test>'
authentication: none
encryption: none
branding:
enabled: false
virusscan:
enabled: false
infectedFileHandling: delete
policies:
enabled: false
ocm:
enabled: true
providersConfigRef: "ocmproviders"
sharing:
passwordPolicies:
bannedPasswords:
- "password"
- "123"
- "12345678"
- "ownCloud"
- "owncloud-1"
quotas:
default: "1000000000"
max: "0"
http:
cors:
allow_origins: []
csp:
directives:
childSrc:
- "'self'"
connectSrc:
- "'self'"
- "blob: https://raw.githubusercontent.com/owncloud/awesome-ocis/"
defaultSrc:
- "'none'"
fontSrc:
- "'self'"
frameAncestors:
- "'self'"
frameSrc:
- "'self'"
- "data: blob: https://embed.diagrams.net/"
imgSrc:
- "'self'"
- "blob: https://raw.githubusercontent.com/owncloud/awesome-ocis/"
manifestSrc:
- "'self'"
mediaSrc:
- "'self'"
objectSrc:
- "'self'"
- "blob:"
scriptSrc:
- "'self'"
- "'unsafe-inline'"
styleSrc:
- "'self'"
- "'unsafe-inline'"
services:
idm:
persistence:
enabled: true
accessModes:
- ReadWriteOnce
nats:
persistence:
enabled: true
accessModes:
- ReadWriteOnce
storagesystem:
persistence:
enabled: true
accessModes:
- ReadWriteOnce
storageusers:
persistence:
enabled: true
accessModes:
- ReadWriteOnce
ocm:
persistence:
enabled: true
accessModes:
- ReadWriteOnce
thumbnails:
persistence:
enabled: true
accessModes:
- ReadWriteOnce
web:
persistence:
enabled: true
accessModes:
- ReadWriteOnce
antivirus:
events:
consumer:
concurrency: 10
secretRefs:
notificationsSmtpSecretRef: notifications-smtp-secret