diff --git a/bundles/k3d-slim-dev/README.md b/bundles/k3d-slim-dev/README.md index 453816ca2..e56b0a279 100644 --- a/bundles/k3d-slim-dev/README.md +++ b/bundles/k3d-slim-dev/README.md @@ -14,9 +14,51 @@ The k3d uds-dev-stack provides: - [MetalLB](https://metallb.universe.tf/) - Provides type: LoadBalancer for cluster resources and Istio Gateways - [HAProxy](https://www.haproxy.org/) - Utilizes k3d host port mapping to bind ports 80 and 443, facilitating local FQDN-based routing through ACLs to MetalLB load balancer backends for Istio Gateways serving *.uds.dev, keycloak.uds.dev, and *.admin.uds.dev. -## Configuration +## Available Overrides +### Package: uds-k3d +##### uds-dev-stack (minio) +| Variable | Description | Path | +|----------|-------------|------| +| `BUCKETS` | Set Minio Buckets | buckets | +| `SVCACCTS` | Minio Service Accounts | svcaccts | +| `USERS` | Minio Users | users | +| `POLICIES` | Minio policies | policies | -### Minio + +### Package: core + +##### istio-admin-gateway (uds-istio-config) +| Variable | Description | Path | +|----------|-------------|------| +| `ADMIN_TLS_CERT` | The TLS cert for the admin gateway (must be base64 encoded) | tls.cert | +| `ADMIN_TLS_KEY` | The TLS key for the admin gateway (must be base64 encoded) | tls.key | + +##### istio-tenant-gateway (uds-istio-config) +| Variable | Description | Path | +|----------|-------------|------| +| `TENANT_TLS_CERT` | The TLS cert for the tenant gateway (must be base64 encoded) | tls.cert | +| `TENANT_TLS_KEY` | The TLS key for the tenant gateway (must be base64 encoded) | tls.key | + +##### istio-tenant-gateway (gateway) +| Variable | Description | Path | +|----------|-------------|------| +| `TENANT_SERVICE_PORTS` | The ports that are exposed from the tenant gateway LoadBalancer (useful for non-HTTP(S) traffic) | service.ports | + +##### keycloak (keycloak) +| Variable | Description | Path | +|----------|-------------|------| +| `INSECURE_ADMIN_PASSWORD_GENERATION` | Generate an insecure admin password for dev/test | `insecureAdminPasswordGeneration.enabled` | +| `KEYCLOAK_HA` | Enable Keycloak HA | `autoscaling.enabled` | +| `KEYCLOAK_PG_USERNAME` | Keycloak Postgres username | `postgresql.username` | +| `KEYCLOAK_PG_PASSWORD` | Keycloak Postgres password | `postgresql.password` | +| `KEYCLOAK_PG_DATABASE` | Keycloak Postgres database | `postgresql.database` | +| `KEYCLOAK_PG_HOST` | Keycloak Postgres host | `postgresql.host` | +| `KEYCLOAK_DEVMODE` | Enables Keycloak dev mode | `devMode` | + + +## Override Examples: + +### Minio Customization You can customize the Minio setup at deploy time via your ```uds-config.yaml```. diff --git a/bundles/k3d-slim-dev/uds-bundle.yaml b/bundles/k3d-slim-dev/uds-bundle.yaml index 98e9ed010..10ac3f9f5 100644 --- a/bundles/k3d-slim-dev/uds-bundle.yaml +++ b/bundles/k3d-slim-dev/uds-bundle.yaml @@ -55,6 +55,11 @@ packages: - name: TENANT_TLS_KEY description: "The TLS key for the tenant gateway (must be base64 encoded)" path: tls.key + gateway: + variables: + - name: TENANT_SERVICE_PORTS + description: "The ports that are exposed from the tenant gateway LoadBalancer (useful for non-HTTP(S) traffic)" + path: "service.ports" keycloak: keycloak: variables: diff --git a/bundles/k3d-standard/README.md b/bundles/k3d-standard/README.md index efc2f2eea..866378a5b 100644 --- a/bundles/k3d-standard/README.md +++ b/bundles/k3d-standard/README.md @@ -43,6 +43,22 @@ This bundle is used for demonstration, development, and testing of UDS Core. In | `TENANT_TLS_CERT` | The TLS cert for the tenant gateway (must be base64 encoded) | tls.cert | | `TENANT_TLS_KEY` | The TLS key for the tenant gateway (must be base64 encoded) | tls.key | +##### istio-tenant-gateway (gateway) +| Variable | Description | Path | +|----------|-------------|------| +| `TENANT_SERVICE_PORTS` | The ports that are exposed from the tenant gateway LoadBalancer (useful for non-HTTP(S) traffic) | service.ports | + +##### keycloak (keycloak) +| Variable | Description | Path | +|----------|-------------|------| +| `INSECURE_ADMIN_PASSWORD_GENERATION` | Generate an insecure admin password for dev/test | `insecureAdminPasswordGeneration.enabled` | +| `KEYCLOAK_HA` | Enable Keycloak HA | `autoscaling.enabled` | +| `KEYCLOAK_PG_USERNAME` | Keycloak Postgres username | `postgresql.username` | +| `KEYCLOAK_PG_PASSWORD` | Keycloak Postgres password | `postgresql.password` | +| `KEYCLOAK_PG_DATABASE` | Keycloak Postgres database | `postgresql.database` | +| `KEYCLOAK_PG_HOST` | Keycloak Postgres host | `postgresql.host` | +| `KEYCLOAK_DEVMODE` | Enables Keycloak dev mode | `devMode` | + ## Override Examples: diff --git a/bundles/k3d-standard/uds-bundle.yaml b/bundles/k3d-standard/uds-bundle.yaml index 62f6fa77b..bc6445118 100644 --- a/bundles/k3d-standard/uds-bundle.yaml +++ b/bundles/k3d-standard/uds-bundle.yaml @@ -94,6 +94,11 @@ packages: - name: TENANT_TLS_KEY description: "The TLS key for the tenant gateway (must be base64 encoded)" path: tls.key + gateway: + variables: + - name: TENANT_SERVICE_PORTS + description: "The ports that are exposed from the tenant gateway LoadBalancer (useful for non-HTTP(S) traffic)" + path: "service.ports" keycloak: keycloak: variables: