86 lines
1.8 KiB
YAML
86 lines
1.8 KiB
YAML
## Matrix server name - appears in @user:matrix.hexor.cy
|
|
serverName: matrix.hexor.cy
|
|
|
|
## Use letsencrypt cluster issuer for all ingresses
|
|
certManager:
|
|
clusterIssuer: letsencrypt
|
|
|
|
## Global ingress settings
|
|
ingress:
|
|
className: traefik
|
|
annotations:
|
|
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
|
|
|
|
## Disable built-in PostgreSQL - using external database
|
|
postgres:
|
|
enabled: false
|
|
|
|
## Disable components we don't need yet
|
|
matrixRTC:
|
|
enabled: false
|
|
hookshot:
|
|
enabled: false
|
|
haproxy:
|
|
enabled: false
|
|
|
|
## Synapse homeserver
|
|
synapse:
|
|
enabled: true
|
|
postgres:
|
|
host: psql.psql.svc
|
|
port: 5432
|
|
user: synapse
|
|
database: synapse
|
|
sslMode: prefer
|
|
password:
|
|
secret: matrix-postgres-creds
|
|
secretKey: synapse_db_password
|
|
media:
|
|
storage:
|
|
size: 20Gi
|
|
maxUploadSize: 100M
|
|
# nodeSelector:
|
|
# kubernetes.io/hostname: nas.homenet
|
|
|
|
## Matrix Authentication Service
|
|
matrixAuthenticationService:
|
|
enabled: true
|
|
postgres:
|
|
host: psql.psql.svc
|
|
port: 5432
|
|
user: mas
|
|
database: mas
|
|
sslMode: prefer
|
|
password:
|
|
secret: matrix-postgres-creds
|
|
secretKey: mas_db_password
|
|
## Authentik OIDC upstream provider
|
|
additional:
|
|
0-oidc:
|
|
configSecret: matrix-oidc-config
|
|
configSecretKey: mas-oidc.yaml
|
|
# nodeSelector:
|
|
# kubernetes.io/hostname: nas.homenet
|
|
|
|
## Element Web client
|
|
elementWeb:
|
|
enabled: true
|
|
ingress:
|
|
host: chat.hexor.cy
|
|
# nodeSelector:
|
|
# kubernetes.io/hostname: nas.homenet
|
|
|
|
## Element Admin panel
|
|
elementAdmin:
|
|
enabled: true
|
|
ingress:
|
|
host: matrix-admin.hexor.cy
|
|
# nodeSelector:
|
|
# kubernetes.io/hostname: nas.homenet
|
|
|
|
## Well-known delegation on the base domain
|
|
wellKnownDelegation:
|
|
enabled: true
|
|
ingress:
|
|
host: matrix.hexor.cy
|