Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mmz-srf/passbolt-helm
Passbolt Kubernetes Helm Charts
https://github.com/mmz-srf/passbolt-helm
chart helm helm-chart kubernetes passbolt password password-manager
Last synced: 4 days ago
JSON representation
Passbolt Kubernetes Helm Charts
- Host: GitHub
- URL: https://github.com/mmz-srf/passbolt-helm
- Owner: mmz-srf
- License: apache-2.0
- Archived: true
- Created: 2020-07-07T07:04:09.000Z (over 4 years ago)
- Default Branch: master
- Last Pushed: 2023-08-24T09:07:09.000Z (about 1 year ago)
- Last Synced: 2024-08-01T13:34:55.952Z (3 months ago)
- Topics: chart, helm, helm-chart, kubernetes, passbolt, password, password-manager
- Language: Mustache
- Homepage:
- Size: 267 KB
- Stars: 18
- Watchers: 11
- Forks: 13
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-ccamel - mmz-srf/passbolt-helm - Passbolt Kubernetes Helm Charts (Mustache)
README
# Passbolt Kubernetes Helm Charts
> **Warning**
>
> This Repository is marked **deprecated** in favor of the official Passbolt charts.
>
> https://github.com/passbolt/charts-passbolt[![GitHub license](https://img.shields.io/github/license/mmz-srf/passbolt-helm)](https://github.com/mmz-srf/passbolt-helm/blob/master/LICENSE)
![GitHub issues](https://img.shields.io/badge/kubernetes-v1.19-green)
[![GitHub issues](https://img.shields.io/github/issues/mmz-srf/passbolt-helm)](https://github.com/mmz-srf/passbolt-helm/issues)## Quick start
Clone this repository:
```
git clone [email protected]:mmz-srf/passbolt-helm.git
cd passbolt-helm
```Update helm dependencies:
```
helm dep build .
```Before deploying this chart, you must define some secrets:
* passbolt GPG server keys
* passbolt JWT keys for mobileYou can generate them with this script:
```
bash generate-secrets.sh
```A `values-fingerprint.yaml` file will be created containing GPG keys fingerprint.
> If you are a PRO user
> * put your subscription key in `secrets/pro-license/subscription_key.txt` file.
> * Set passbolt.config.license.enabled to true in values.yaml
> * Set a [pro image tag](https://hub.docker.com/r/passbolt/passbolt/tags?page=1&name=pro) in values.yamlReview values.yaml file, especially the `ingress.hosts.host` for passbolt domain name then deploy passbolt in your cluster
Always review passbolt configuration options it self.
Especially their environment variables https://help.passbolt.com/configure/environment/reference### non-HA mode
This mode will deploy the [passbolt container](https://github.com/passbolt/passbolt_docker/tree/master) and a mysql database (mariadb)
> *values-fingerprint.yaml* is a file automatically created by [generate-secrets.sh](generate-secrets.sh) script and contains your GPG server fingerprint.
```
helm install passbolt . --values values-fingerprint.yaml
```### HA mode
If you are interested with HA deployment, take care of the `passbolt.config.php.session.redis.service` setting. It is the first pod name by default of the xxx-redis-headless service where xxx is your helm release name (passbolt by default in the below helm command).
If your helm release name is **pblt**, replace **passbolt-redis-node-0.passbolt-redis-headless** with **pblt-redis-node-0.pblt-redis-headless**
While the database is not yet initialized, the replicaCount of passbolt-helm deployment must be set to 1. Once the database initialized, you can scale passbolt deployment to more than 1 replica.
If you want to import your passwords from keepass or csv, it is recommended to scale to 1. Database concurrency is not well managed while importing.
HA Mode uses MariaDB Galera cluster and Redis cluster.
You must have at least 3 worker nodes.
If you are ok with the above points, review the values-ha.yaml file and deploy the HA mode with:
```
helm upgrade --install passbolt . --values values-ha.yaml --values values-fingerprint.yaml
```## Parameters
For more parameters you should have a look at ...
- the [values.yaml](values.yaml) file of this helm chart
- the [values.yaml](https://github.com/helm/charts/blob/master/stable/mariadb/values.yaml) file of the mariadb helm chart, when enabled
- the [values.yaml](https://github.com/bitnami/charts/blob/master/bitnami/mariadb-galera/values.yaml) file of the mariadb-galera helm chart, when enabled
- the [values.yaml](https://github.com/bitnami/charts/blob/master/bitnami/redis/values.yaml) file of the redis helm chart, when enabled
- the [environment variables](https://github.com/passbolt/passbolt_docker/tree/master) of the passbolt docker image.### General
| Parameter | Description | Default |
|--------------------|--------------------------------------|---------------------------|
| `replicaCount` | How many replicas should be deployed | `1` |
| `image.repository` | Passbolt image repositorys | `"passbolt/passbolt"` |
| `image.tag` | Passbolt image tag | `"latest"` |
| `image.pullPolicy` | Image pull policy | `IfNotPresent` |
| `imagePullSecrets` | Image pull secrets | `[]` |
| `nameOverride` | Name override | `""` |
| `fullnameOverride` | Full name override | `""` |
| `service.type` | Service type | `ClusterIP` |
| `service.port` | Service port | `80` |
| `ingress.enabled` | Enable ingress | `true` |
| `ingress.host` | Ingress host | `passbolt.yourdomain.com` |### Passbolt
| Parameter | Description | Default |
|------------------------------------------------------|----------------------------------------------------------------------------------------------------------------------|-------------------------------------|
| `passbolt.config.debug` | Enable/Disable debug output in passbolt image | `false` |
| `passbolt.config.registration` | Enable/Disable user can register | `false` |
| `passbolt.config.salt` | Salt. Generate: ```openssl rand -base64 32``` | `"your salt"` |
| `passbolt.config.gpgServerKeyFingerprint` | The GPG server key fingerprint. See [GPG key generation](#gpg-key-generation) | `"your gpg server key fingerprint"` |
| `passbolt.config.serverkey` | The GPG server key. If set the key will not be read from [file](secrets/gpg/serverkey.asc) | ` ` |
| `passbolt.config.serverkey_private` | The GPG private server key. If set the private key will not be read from [file](secrets/gpg/serverkey_private.asc) | ` ` |
| `passbolt.config.jwtkey` | The JWT key. If set the key will not be read from [file](secrets/jwt/jwt.key) | ` ` |
| `passbolt.config.jwtcert` | The JWT certificate. If set the cert will not be read from [file](secrets/jwt/jwt.pem) | ` ` |
| `passbolt.config.license.enabled` | Set true if you own a license key. Add the license key in [secrets/pro-license/license](secrets/pro-license/license) | `false` |
| `passbolt.config.license.key` | The license key. If set the license key will not be read from [file](secrets/pro-license/license). | `false` |
| `passbolt.config.php.max_execution_time` | PHP Max execution time | `300` |
| `passbolt.config.php.memory_limit` | PHP Memory Limit | `512M` |
| `passbolt.config.php.post_max_size` | PHP post max size | `24M` |
| `passbolt.config.php.upload_max_filesize` | PHP upload max filesize | `24M` |
| `passbolt.config.php.pm_value` | PHP-FPM pm_value | `dynamic` |
| `passbolt.config.php.pm.max_children` | PHP-FPM pm.max_children | `40` |
| `passbolt.config.php.pm.start_servers` | PHP-FPM pm.start_servers | `16` |
| `passbolt.config.php.pm.min_spare_servers` | PHP-FPM pm.min_spare_servers | `8` |
| `passbolt.config.php.pm.max_spare_servers` | PHP-FPM pm.max_spare_servers | `16` |
| `passbolt.config.php.pm.process_idle_timeout` | PHP-FPM pm.process_idle_timeout | `10s` |
| `passbolt.config.php.pm.max_requests` | PHP-FPM pm.max_requests | `500` |
| `passbolt.config.php.session.lifetime` | Lifetime of your user sessions in seconds | `3600` |
| `passbolt.config.php.session.redis.enabled` | Enable this if you want to provide your own redis as a session backend | `false` |
| `passbolt.config.php.session.redis.service` | The URL of your redis endpoint, only useful if enabled | `redis` |
| `passbolt.config.plugins.exportenabled` | Enable export plugin | `true` |
| `passbolt.config.plugins.importenabled` | Enable import plugin | `true` |
| `passbolt.config.plugins.ssoenabled` | Enable SSO plugin | `true` |
| `passbolt.config.email.enabled` | Enable/Disable sending emails transport | `false` |
| `passbolt.config.email.from` | From email address | `you@localhost` |
| `passbolt.config.email.from_name` | From Name | `Your Sender Name` |
| `passbolt.config.email.host` | Email server hostname | `localhost` |
| `passbolt.config.email.port` | Email server port | `25` |
| `passbolt.config.email.timeout` | Email server timeout | `30` |
| `passbolt.config.email.username` | Username for email server auth | `username` |
| `passbolt.config.email.password` | Password for email server auth | `password` |
| `passbolt.config.livenessProbe.failureThreshold` | failureThreshold for livenessProbe | `3` |
| `passbolt.config.livenessProbe.successThreshold` | successThreshold for livenessProbe | `1` |
| `passbolt.config.livenessProbe.periodSeconds` | periodSeconds for livenessProbe | `10` |
| `passbolt.config.livenessProbe.initialDelaySeconds` | initialDelaySeconds for livenessProbe | `60` |
| `passbolt.config.livenessProbe.timeoutSeconds` | timeoutSeconds for livenessProbe | `10` |
| `passbolt.config.readinessProbe.failureThreshold` | failureThreshold for readinessProbe | `3` |
| `passbolt.config.readinessProbe.successThreshold` | successThreshold for readinessProbe | `1` |
| `passbolt.config.readinessProbe.periodSeconds` | periodSeconds for readinessProbe | `10` |
| `passbolt.config.readinessProbe.initialDelaySeconds` | initialDelaySeconds for readinessProbe | `60` |
| `passbolt.config.readinessProbe.timeoutSeconds` | timeoutSeconds for readinessProbe | `10` |### Database
| Parameter | Description | Default |
|-----------------------|---------------------------------------------------|------------|
| `mariadb.enabled` | Set to false to use an existing external database | `true` |
| `mariadb.db.host` | Name of the passbolt database | `passbolt` |
| `mariadb.db.name` | Name of the passbolt database | `passbolt` |
| `mariadb.db.user` | Username of the passbolt user | `passbolt` |
| `mariadb.db.password` | Passwort for the passbold database user | `passbolt` |## GPG key generation
1. Create GPG config file gpg-server-key.conf with the following content
%echo Generating a basic OpenPGP key
Key-Type: RSA
Key-Length: 4096
Subkey-Type: RSA
Subkey-Length: 4096
Name-Email: [email protected]
Name-Real: Joe Tester
Expire-Date: 0
%echo done2. Create GPG keys
:warning: do not set a password, since passbolt won't start :warning:
gpg --gen-key --batch gpg-server-key.conf
3. List GPG keys
gpg --list-secret-keys --keyid-format LONG
You will need this to export it and in your values.yaml to validate the keys.
4. Export keys
KEY_ID=
gpg --armor --export $KEY_ID > serverkey.asc
gpg --armor --export-secret-keys $KEY_ID > serverkey_private.asc:warning: Copy the serverkey.asc and serverkey_private.asc files to secrets/gpg.
## JWT key generation
1. Create a private key
openssl genrsa -out secrets/jwt/jwt.key 4096
2. Extract the public key
openssl rsa -in secrets/jwt/jwt.key -outform PEM -pubout -out secrets/jwt/jwt.pem
### Usage
1. Create custom values.yaml
2. Create gpg and jwt keys
3. Execute:
```
helm install \
-f values.yaml \
--set-file passbolt.config.serverkey=./secrets/gpg/serverkey.asc \
--set-file passbolt.config.serverkey_private=./secrets/gpg/serverkey_private.asc \
--set-file passbolt.config.jwtkey=./secrets/jwt/jwt.key \
--set-file passbolt.config.jwtcert=./secrets/jwt/jwt.pem \
passbolt ../passbolt-helm/## Create first passbolt admin user
root@passbolt-passbolt-app:/var/www/passbolt# su -m -c "bin/cake passbolt register_user -u [email protected] -f Admin -l Istrator -r admin" -s /bin/sh www-data
## Mail testing
```
kubectl run mailpit --image=anatomicjc/mailpit
kubectl expose pod mailpit --port 1025 --name mailpit
kubectl port-forward mailpit 8025
```