Page MenuHomePhorge

routes.yaml
No OneTemporary

Authored By
Unknown
Size
11 KB
Referenced Files
None
Subscribers
None

routes.yaml

{{- if .Values.openshift -}}
{{- if .Values.openshiftRoutesEnabled -}}
apiVersion: route.openshift.io/v1
kind: Route
metadata:
annotations:
haproxy.router.openshift.io/set-forwarded-headers: never
labels:
app: kolab
app.kubernetes.io/part-of: kolab-app
name: kolab
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
port:
targetPort: webserver
tls:
termination: edge
insecureEdgeTerminationPolicy: Redirect
to:
kind: Service
name: kolab
weight: 100
#Only available from 4.14 on
# httpHeaders:
# actions:
# response:
# - name: Host
# action:
# type: Set
# set:
# value: kolab
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
annotations:
haproxy.router.openshift.io/set-forwarded-headers: never
labels:
app: kolab
app.kubernetes.io/part-of: kolab-app
name: kolab-admin
spec:
subdomain: null
host: admin.{{ template "kolab.websiteDomain" . }}
port:
targetPort: webserver
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: {{ .Values.kolab.adminService }}
weight: 100
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
annotations:
haproxy.router.openshift.io/set-forwarded-headers: never
labels:
app: kolab
app.kubernetes.io/part-of: kolab-app
name: kolab-reseller
spec:
subdomain: null
host: reseller.{{ template "kolab.websiteDomain" . }}
port:
targetPort: webserver
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: {{ .Values.kolab.resellerService }}
weight: 100
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
annotations:
haproxy.router.openshift.io/set-forwarded-headers: never
labels:
app: kolab
app.kubernetes.io/part-of: kolab-app
name: kolab-services
spec:
subdomain: null
host: services.{{ template "kolab.websiteDomain" . }}
port:
targetPort: webserver
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: {{ .Values.kolab.servicesService }}
weight: 100
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
annotations:
haproxy.router.openshift.io/set-forwarded-headers: never
labels:
app: kolab
app.kubernetes.io/part-of: kolab-app
name: mta-sts
spec:
subdomain: null
host: mta-sts.{{ template "kolab.websiteDomain" . }}
port:
targetPort: webserver
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: kolab
weight: 100
{{- range $v := .Values.kolab.additionalFrontends }}
{{- if $v.routeEnabled }}
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
annotations:
haproxy.router.openshift.io/set-forwarded-headers: never
labels:
app: kolab
app.kubernetes.io/part-of: kolab-app
name: kolab-{{ $v.name }}
spec:
subdomain: null
host: {{ $v.domainName }}
port:
targetPort: webserver
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: kolab-{{ $v.name }}
weight: 100
{{- end }}
{{- end }}
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
labels:
app: collabora
app.kubernetes.io/part-of: kolab-app
name: collabora-discovery
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /hosting/discovery
port:
targetPort: collabora
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: collabora
weight: 100
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
labels:
app: collabora
app.kubernetes.io/part-of: kolab-app
name: collabora-loleaflet
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /loleaflet
port:
targetPort: collabora
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: collabora
weight: 100
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
labels:
app: collabora
app.kubernetes.io/part-of: kolab-app
name: collabora-browser
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /browser
port:
targetPort: collabora
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: collabora
weight: 100
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
labels:
app: collabora
app.kubernetes.io/part-of: kolab-app
name: collabora-cool
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /cool
port:
targetPort: collabora
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: collabora
weight: 100
{{- if .Values.roundcube.enabled }}
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: webmail
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /webmail
port:
targetPort: webserver
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: roundcube
weight: 100
wildcardPolicy: None
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: dav
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /dav
port:
{{- if .Values.roundcube.davEnabled }}
targetPort: webserver
{{- else }}
targetPort: http
{{- end }}
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
{{- if .Values.roundcube.davEnabled }}
name: roundcube
{{- else }}
name: imap
{{- end }}
weight: 100
wildcardPolicy: None
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: chwala
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /chwala
port:
targetPort: webserver
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: roundcube
weight: 100
wildcardPolicy: None
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: syncroton
annotations:
haproxy.router.openshift.io/timeout: 910s
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /Microsoft-Server-ActiveSync
port:
targetPort: webserver
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: roundcube
weight: 100
wildcardPolicy: None
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: autodiscover
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /autodiscover/autodiscover.xml
port:
targetPort: webserver
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: roundcube
weight: 100
wildcardPolicy: None
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: autoconfig
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /.well-known/autoconfig
port:
targetPort: webserver
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: roundcube
weight: 100
wildcardPolicy: None
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: caldav-well-known
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /.well-known/caldav
port:
targetPort: webserver
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: roundcube
weight: 100
wildcardPolicy: None
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: carddav-well-known
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /.well-known/carddav
port:
targetPort: webserver
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: roundcube
weight: 100
wildcardPolicy: None
{{- end }}
{{- if and .Values.prometheus.enabled .Values.prometheus.routeEnabled }}
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: prometheus
annotations:
haproxy.router.openshift.io/rewrite-target: /
spec:
subdomain: null
host: {{ .Values.prometheus.hostPrefix }}{{ template "kolab.websiteDomain" . }}
path: /prometheus
port:
targetPort: 9090-tcp
tls:
insecureEdgeTerminationPolicy: Redirect
termination: edge
to:
kind: Service
name: prometheus
weight: 100
wildcardPolicy: None
{{- end }}
{{- if and .Values.loki.enabled .Values.loki.routeEnabled }}
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: loki
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /loki
port:
targetPort: 3100-tcp
tls:
insecureEdgeTerminationPolicy: Allow
termination: edge
to:
kind: Service
name: loki
weight: 100
wildcardPolicy: None
{{- end }}
{{- if and .Values.victorialogs.enabled .Values.victorialogs.routeEnabled }}
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
name: victorialogs
spec:
subdomain: null
host: {{ .Values.victorialogs.hostPrefix }}{{ template "kolab.websiteDomain" . }}
path: /select
port:
targetPort: 9428-tcp
tls:
insecureEdgeTerminationPolicy: Allow
termination: edge
to:
kind: Service
name: victorialogs
weight: 100
wildcardPolicy: None
{{- end }}
{{- if .Values.meet.enabled }}
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
labels:
app: meet
app.kubernetes.io/part-of: kolab-app
name: meet
spec:
subdomain: null
host: {{ template "kolab.websiteDomain" . }}
path: /meetmedia
port:
targetPort: meet-server
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: meet
weight: 100
{{- end }}
{{- if .Values.matrix.enabled }}
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
labels:
app: matrix
app.kubernetes.io/part-of: kolab-app
name: matrix
spec:
subdomain: null
host: "{{ template "kolab.websiteDomain" . }}"
path: /_matrix
port:
targetPort: matrix
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: matrix
weight: 100
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
labels:
app: matrix
app.kubernetes.io/part-of: kolab-app
name: matrix-synapse
spec:
subdomain: null
host: "{{ template "kolab.websiteDomain" . }}"
path: /_synapse
port:
targetPort: matrix
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: matrix
weight: 100
---
apiVersion: route.openshift.io/v1
kind: Route
metadata:
labels:
app: matrix
app.kubernetes.io/part-of: kolab-app
name: matrix-client
spec:
subdomain: null
host: "{{ template "kolab.websiteDomain" . }}"
path: /client
port:
targetPort: matrix
tls:
termination: edge
insecureEdgeTerminationPolicy: Allow
to:
kind: Service
name: matrix
weight: 100
---
kind: Route
apiVersion: route.openshift.io/v1
metadata:
name: element
annotations:
kubernetes.io/tls-acme: 'true'
spec:
subdomain: null
host: "{{ template "kolab.websiteDomain" . }}"
path: /element
to:
kind: Service
name: element
weight: 100
port:
targetPort: webserver
tls:
termination: edge
insecureEdgeTerminationPolicy: Redirect
wildcardPolicy: None
{{- end }}
{{- if .Values.nextcloud.enabled }}
---
kind: Route
apiVersion: route.openshift.io/v1
metadata:
name: nextcloud
annotations:
kubernetes.io/tls-acme: 'true'
spec:
subdomain: null
host: "{{ template "kolab.websiteDomain" . }}"
path: /nextcloud
to:
kind: Service
name: nextcloud
weight: 100
port:
targetPort: webserver
tls:
termination: edge
insecureEdgeTerminationPolicy: Redirect
wildcardPolicy: None
{{- end }}
{{- end }}
{{- end }}

File Metadata

Mime Type
text/plain
Expires
Sat, Apr 4, 3:13 AM (21 h, 4 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
18779934
Default Alt Text
routes.yaml (11 KB)

Event Timeline