Skip to content
This repository was archived by the owner on Nov 26, 2025. It is now read-only.
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
25 changes: 24 additions & 1 deletion charts/opencloud/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -252,7 +252,7 @@ This will prepend `my-registry.com/` to all image references in the chart. For e
| `opencloud.insecure` | Insecure mode (for self-signed certificates) | `true` |
| `opencloud.existingSecret` | Name of the existing secret | `` |
| `opencloud.adminPassword` | Admin password | `admin` |
| `opencloud.createDemoUsers` | Create demo users | `false` |
| `opencloud.demoUsers.enabled` | Create demo users in OpenCloud and Keycloak (alan, dennis, lynn, margaret, mary). **WARNING**: Demo users have hardcoded passwords and should never be used in production! | `false` |
| `opencloud.resources` | CPU/Memory resource requests/limits | `{}` |
| `opencloud.persistence.enabled` | Enable persistence | `true` |
| `opencloud.persistence.size` | Size of the persistent volume | `10Gi` |
Expand Down Expand Up @@ -347,6 +347,29 @@ keycloak:

**Note**: If `keycloak.internal.enabled` is `true`, the `global.oidc.issuer` should be left empty to not override the generated issuer URL.

#### User Management

When `opencloud.demoUsers.enabled` is set to `false` (default for production), you need to manually create users in Keycloak:

1. **Access Keycloak Admin Console**:
- URL: `https://[your-keycloak-domain]/admin/`
- Login with Keycloak admin credentials (from `keycloak.internal.adminUser/adminPassword`)

2. **Create Users in the openCloud Realm**:
- Switch to the "openCloud" realm (dropdown in top-left corner)
- Navigate to Users → Add User
- Create users and set passwords in the Credentials tab

3. **Assign Roles**:
- Available roles in the openCloud realm:
- `opencloudAdmin` - Full administrative access
- `opencloudSpaceAdmin` - Space administration capabilities
- `opencloudUser` - Regular user access
- `opencloudGuest` - Guest access
- Assign roles in the Role Mappings tab for each user

**WARNING**: The demo users (when `demoUsers.enabled: true`) have hardcoded passwords and should NEVER be used in production environments. They are intended for development and testing only.

### PostgreSQL Settings

| Parameter | Description | Default |
Expand Down
8 changes: 6 additions & 2 deletions charts/opencloud/files/keycloak/opencloud-realm.json.gotmpl
Original file line number Diff line number Diff line change
Expand Up @@ -485,7 +485,9 @@
"webAuthnPolicyPasswordlessAvoidSameAuthenticatorRegister" : false,
"webAuthnPolicyPasswordlessAcceptableAaguids" : [ ],
"webAuthnPolicyPasswordlessExtraOrigins" : [ ],
"users" : [ {
"users" : [
{{- if .Values.opencloud.demoUsers.enabled }}
{
"id" : "0ab77e6d-23b4-4ba3-9843-a3b3efdcfc53",
"username" : "admin",
"firstName" : "Admin",
Expand Down Expand Up @@ -622,7 +624,9 @@
"realmRoles" : [ "default-roles-opencloud", "opencloudUser" ],
"notBefore" : 0,
"groups" : [ "/bible-readers", "/users" ]
} ],
}
{{- end }}
],
"scopeMappings" : [ {
"clientScope" : "offline_access",
"roles" : [ "offline_access" ]
Expand Down
2 changes: 1 addition & 1 deletion charts/opencloud/templates/opencloud/deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -278,7 +278,7 @@ spec:
key: adminPassword
# Demo users
- name: IDM_CREATE_DEMO_USERS
value: {{ .Values.opencloud.createDemoUsers | quote }}
value: {{ .Values.opencloud.demoUsers.enabled | quote }}
{{- if .Values.opencloud.nats.external.enabled }}
# Use the external nats as the service registry
- name: MICRO_REGISTRY_ADDRESS
Expand Down
5 changes: 4 additions & 1 deletion charts/opencloud/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -435,7 +435,10 @@ opencloud:
adminPassword: admin

# Create demo users
createDemoUsers: false
# Demo users configuration
demoUsers:
# Enable demo users (WARNING: Only for development/testing, NOT for production!)
enabled: false
# Additional services to start
additionalServices: []
# Services to exclude from starting
Expand Down