Forgejo Helm chart
Find a file
2025-02-16 19:31:34 +00:00
.forgejo ci(deps): update dependency kubectl to v1.32.2 (main) (#1100) 2025-02-13 14:27:31 +00:00
.husky build!: use pnpm 2024-02-07 12:46:49 +01:00
.vscode ci(deps): update dependency helm-unittest to v0.7.2 (main) (#1078) 2025-01-27 23:42:23 +00:00
ci ci: drop forgejo v8 and v9 testing 2025-01-16 10:30:39 +01:00
docs chore: add prettier linting 2023-12-06 14:32:09 +01:00
e2e ci: add chart testing (#111) 2023-12-06 13:09:34 +00:00
templates fix(config): mask special chars in setting keys 2025-02-12 10:58:28 +01:00
tools build: fix changelog generation 2024-11-01 16:10:12 +01:00
unittests feat!: ports are now referenced by name 2025-01-16 11:28:19 +01:00
.editorconfig ci: add more tests 2023-12-06 14:15:20 +01:00
.gitignore build!: use pnpm 2024-02-07 12:46:49 +01:00
.helmignore build!: use pnpm 2024-02-07 12:46:49 +01:00
.lintstagedrc.json build!: use pnpm 2024-02-07 12:46:49 +01:00
.markdownlint.yaml chore: fix lint settings 2024-02-07 11:46:40 +01:00
.markdownlintignore build!: use pnpm 2024-02-07 12:46:49 +01:00
.node-version chore(deps): update node.js to v22.14.0 (main) (#1096) 2025-02-11 11:41:09 +00:00
.npmrc build!: use pnpm 2024-02-07 12:46:49 +01:00
.prettierignore build!: use pnpm 2024-02-07 12:46:49 +01:00
.prettierrc.json docs: fix readme 2023-12-06 12:05:14 +01:00
.yamllint Format all files with prettier VSCode plugin and add yamllint in CI (#413) 2023-03-29 05:18:23 +08:00
artifacthub-repo.yml feat: publish to code.forgejo.org/forgejo-helm/forgejo 2024-05-30 12:41:10 +02:00
artifacthub.config.json chore: add prettier linting 2023-12-06 14:32:09 +01:00
Chart.lock fix(deps): update subcharts (main) (#1093) 2025-02-10 00:07:40 +00:00
Chart.yaml fix(deps): update subcharts (main) (#1093) 2025-02-10 00:07:40 +00:00
CONTRIBUTING.md feat!: merge upstream changes 2023-12-06 11:40:55 +01:00
LICENSE chore: add forgejo authors to license file (#716) 2024-08-09 15:51:48 +00:00
Makefile feat: merge upstream change week 2024-31 (#688) 2024-07-31 11:02:10 +00:00
package.json chore(deps): update dependency conventional-changelog-core to v9 2025-02-16 19:31:34 +00:00
pnpm-lock.yaml chore(deps): update dependency conventional-changelog-core to v9 2025-02-16 19:31:34 +00:00
README.md docs: Converge values.yaml and README (#1065) 2025-01-23 13:37:04 +00:00
renovate.json chore(renovate): optimize k3s config 2024-09-25 10:11:49 +02:00
values.yaml docs: Converge values.yaml and README (#1065) 2025-01-23 13:37:04 +00:00

Forgejo Helm Chart

Forgejo is a community managed lightweight code hosting solution written in Go. It is published under the MIT license.

Introduction

This Helm chart is based on the Gitea chart. Yet it takes a completely different approach in providing a database and cache with dependencies. Additionally, this chart allows to provide LDAP and admin user configuration with values.

Update and versioning policy

The Forgejo helm chart versioning does not follow Forgejo's versioning. The latest chart version can be looked up in https://code.forgejo.org/forgejo-helm/-/packages/container/forgejo or in the repository releases.

The chart aims to follow Forgejo's releases closely. There might be times when the chart is behind the latest Forgejo release. This might be caused by different reasons, most often due to time constraints of the maintainers (remember, all work here is done voluntarily in the spare time of people). If you're eager to use the latest Forgejo version earlier than this chart catches up, then change the tag in values.yaml to the latest Forgejo version. This is due to Forgejo not strictly following semantic versioning as breaking changes do not increase the major version. I.e., "minor" version bumps are considered "major". Yet most often no issues will be encountered and the chart maintainers aim to communicate early/upfront if this would be the case.

Dependencies

Forgejo can be run with an external database and cache. This chart provides those dependencies, which can be enabled, or disabled via configuration.

HA Dependencies

These dependencies are enabled by default:

Non-HA Dependencies

Alternatively, the following non-HA replacements are available:

Dependency Versioning

Updates of sub-charts will be incorporated into the Gitea chart as they are released. The reasoning behind this is that new users of the chart will start with the most recent sub-chart dependency versions.

Note If you want to stay on an older appVersion of a sub-chart dependency (e.g. PostgreSQL), you need to override the image tag in your values.yaml file. In fact, we recommend to do so right from the start to be independent of major sub-chart dependency changes as they are released. There is no need to update to every new PostgreSQL major version - you can happily skip some and do larger updates when you are ready for them.

We recommend to use a rolling tag like :<majorVersion>-debian-<debian major version> to incorporate minor and patch updates for the respective major version as they are released. Alternatively you can also use a versioning helper tool like renovate.

Please double-check the image repository and available tags in the sub-chart:

and look up the image tag which fits your needs on Dockerhub.

Installing

helm install forgejo oci://code.forgejo.org/forgejo-helm/forgejo

In case you want to supply values, you can reference a values.yaml file:

helm install forgejo -f values.yaml oci://code.forgejo.org/forgejo-helm/forgejo

When upgrading, please refer to the Upgrading section at the bottom of this document for major and breaking changes.

High Availability

This chart supports running Forgejo and it's dependencies in HA mode. Care must be taken for production use as not all implementation details of Forgejo core are officially HA-ready yet.

Deploying a HA-ready Forgejo instance requires some effort including using HA-ready dependencies. See the HA Setup document for more details.

Configuration

Forgejo offers lots of configuration options. Every value described in the Cheat Sheet can be set as a Helm value. Configuration sections map to (lowercased) YAML blocks, while the keys themselves remain in all caps.

gitea:
  config:
    # values in the DEFAULT section
    # (https://forgejo.org/docs/latest/admin/config-cheat-sheet/#overall-default)
    # are un-namespaced
    #
    APP_NAME: 'Forgejo: Git with a cup of tea'
    #
    # https://forgejo.org/docs/latest/admin/config-cheat-sheet/#repository-repository
    repository:
      ROOT: '~/gitea-repositories'
    #
    # https://forgejo.org/docs/latest/admin/config-cheat-sheet/#repository---pull-request-repositorypull-request
    repository.pull-request:
      WORK_IN_PROGRESS_PREFIXES: 'WIP:,[WIP]:'

Default Configuration

This chart will set a few defaults in the Forgejo configuration based on the service and ingress settings. All defaults can be overwritten in gitea.config.

INSTALL_LOCK is always set to true because the configuration in this helm chart makes any configuration via installer superfluous.

All default settings are made directly in the generated app.ini, not in the Values.

Database defaults

If a database subchart is enabled, the database configuration is set automatically. For example, PostgreSQL will appear in the app.ini as:

[database]
DB_TYPE = postgres
HOST = RELEASE-NAME-postgresql.default.svc.cluster.local:5432
NAME = gitea
PASSWD = gitea
USER = gitea

Server defaults

The server defaults are a bit more complex. If ingress is enabled, the ROOT_URL, DOMAIN and SSH_DOMAIN will be set accordingly. HTTP_PORT always defaults to 3000 as well as SSH_PORT to 22.

[server]
APP_DATA_PATH = /data
DOMAIN = git.example.com
HTTP_PORT = 3000
PROTOCOL = http
ROOT_URL = http://git.example.com
SSH_DOMAIN = git.example.com
SSH_LISTEN_PORT = 22
SSH_PORT = 22
ENABLE_PPROF = false

Metrics defaults

The Prometheus /metrics endpoint is disabled by default.

[metrics]
ENABLED = false

Rootless Defaults

If .Values.image.rootless: true, then the following will occur. In case you use .Values.image.fullOverride, check that this works in your image:

  • $HOME becomes /data/gitea/git

    see deployment.yaml template inside (init-)container "env" declarations

  • START_SSH_SERVER: true (Unless explicity overwritten by gitea.config.server.START_SSH_SERVER)

    see _helpers.tpl in gitea.inline_configuration.defaults.server definition

  • SSH_LISTEN_PORT: 2222 (Unless explicity overwritten by gitea.config.server.SSH_LISTEN_PORT)

    see _helpers.tpl in gitea.inline_configuration.defaults.server definition

  • SSH_LOG_LEVEL environment variable is not injected into the container

    see deployment.yaml template inside container "env" declarations

Session, Cache and Queue

The session, cache and queue settings are set to use the built-in Redis Cluster sub-chart dependency. If Redis Cluster is disabled, the chart will fall back to the Gitea defaults which use "memory" for session and cache and "level" for queue.

While these will work and even not cause immediate issues after startup, they are not recommended for production use. Reasons being that a single pod will take on all the work for session and cache tasks in its available memory. It is likely that the pod will run out of memory or will face substantial memory spikes, depending on the workload. External tools such as redis-cluster or memcached handle these workloads much better.

Single-Pod Configurations

If HA is not needed/desired, the following configurations can be used to deploy a single-pod Forgejo instance.

  1. For a production-ready single-pod Forgejo instance without external dependencies (using the chart dependency postgresql and redis):

    values.yml
    redis-cluster:
      enabled: false
    redis:
      enabled: true
    postgresql:
      enabled: true
    postgresql-ha:
      enabled: false
    
    persistence:
      enabled: true
    
    gitea:
      config:
        database:
          DB_TYPE: postgres
        indexer:
          ISSUE_INDEXER_TYPE: bleve
          REPO_INDEXER_ENABLED: true
    
  2. For a minimal DEV installation (using the built-in sqlite DB instead of Postgres):

    This will result in a single-pod Forgejo instance without any dependencies and persistence. Do not use this configuration for production use.

    values.yml
    redis-cluster:
      enabled: false
    redis:
      enabled: false
    postgresql:
      enabled: false
    postgresql-ha:
      enabled: false
    
    persistence:
      enabled: false
    
    gitea:
      config:
        database:
          DB_TYPE: sqlite3
        session:
          PROVIDER: memory
        cache:
          ADAPTER: memory
        queue:
          TYPE: level
    

Additional app.ini settings

The generic section cannot be defined that way.

Some settings inside app.ini (like passwords or whole authentication configurations) must be considered sensitive and therefore should not be passed via plain text inside the values.yaml file. In times of GitOps the values.yaml could be stored in a Git repository where sensitive data should never be accessible.

The Helm Chart supports this approach and let the user define custom sources like Kubernetes Secrets to be loaded as environment variables during app.ini creation or update.

gitea:
  additionalConfigSources:
    - secret:
        secretName: gitea-app-ini-oauth
    - configMap:
        name: gitea-app-ini-plaintext

This would mount the two additional volumes (oauth and some-additionals) from different sources to the init container where the app.ini gets updated. All files mounted that way will be read and converted to environment variables and then added to the app.ini using environment-to-ini.

The key of such additional source represents the section inside the app.ini. The value for each key can be multiline ini-like definitions.

In example, the referenced gitea-app-ini-plaintext could look like this.

apiVersion: v1
kind: ConfigMap
metadata:
  name: gitea-app-ini-plaintext
data:
  session: |
    PROVIDER=memory
    SAME_SITE=strict    
  cron.archive_cleanup: |
    ENABLED=true    

Or when using a Kubernetes secret, having the same data structure:

apiVersion: v1
kind: Secret
metadata:
  name: gitea-security-related-configuration
type: Opaque
stringData:
  security: |
    PASSWORD_COMPLEXITY=off    
  session: |
    SAME_SITE=strict    

User defined environment variables in app.ini

Users are able to define their own environment variables, which are loaded into the containers. We also support interacting directly with the generated app.ini.

To inject self defined variables into the app.ini a certain format needs to be honored. This is described in detail on the env-to-ini page.

Environment variables need to be prefixed with FORGEJO.

For example a database setting needs to have the following format:

gitea:
  config:
    database:
      HOST: my.own.host
  additionalConfigFromEnvs:
    - name: FORGEJO__DATABASE__PASSWD
      valueFrom:
        secretKeyRef:
          name: postgres-secret
          key: password

Priority (highest to lowest) for defining app.ini variables:

  1. Environment variables prefixed with FORGEJO

  2. Additional config sources

  3. Values defined in gitea.config

External Database

A supported external databasecan be used instead of the built-in PostgreSQL. In fact, it is highly recommended to use an external database to ensure a stable Forgejo installation longterm.

If an external database is used, no matter which type, make sure to set postgresql.enabled to false to disable the use of the built-in PostgreSQL.

gitea:
  config:
    database:
      DB_TYPE: mysql # supported values are mysql, postgres, mssql, sqlite3
      HOST: <mysql HOST>
      NAME: gitea
      USER: root
      PASSWD: gitea
      SCHEMA: gitea

postgresql:
  enabled: false

Ports and external url

By default port 3000 is used for web traffic and 22 for ssh. Those can be changed:

service:
  http:
    port: 3000
  ssh:
    port: 22

This helm chart automatically configures the clone urls to use the correct ports. You can change these ports by hand using the gitea.config dict. However you should know what you're doing.

SSH and Ingress

If you're using ingress and want to use SSH, keep in mind, that ingress is not able to forward SSH Ports. You will need a LoadBalancer like metallb and a setting in your ssh service annotations.

service:
  ssh:
    annotations:
      metallb.io/allow-shared-ip: test

SSH on crio based kubernetes cluster

If you use crio as container runtime it is not possible to read from a remote repository. You should get an error message like this:

$ git clone git@k8s-demo.internal:admin/test.git
Cloning into 'test'...
Connection reset by 192.168.179.217 port 22
fatal: Could not read from remote repository.

Please make sure you have the correct access rights
and the repository exists.

To solve this problem add the capability SYS_CHROOT to the securityContext. More about this issue here.

Cache

The cache handling is done via redis-cluster (via the bitnami chart) by default. This deployment is HA-ready but can also be used for single-pod deployments. By default, 6 replicas are deployed for a working redis-cluster deployment. Many cloud providers offer a managed redis service, which can be used instead of the built-in redis-cluster.

redis-cluster:
  enabled: true

Persistence

Forgejo will be deployed as a deployment. By simply enabling the persistence and setting the storage class according to your cluster everything else will be taken care of. The following example will create a PVC as a part of the deployment.

Please note, that an empty storageClass in the persistence will result in kubernetes using your default storage class.

If you want to use your own storage class define it as follows:

persistence:
  enabled: true
  storageClass: myOwnStorageClass

If you want to manage your own PVC you can simply pass the PVC name to the chart.

persistence:
  enabled: true
  claimName: MyAwesomeGiteaClaim

In case that persistence has been disabled it will simply use an empty dir volume.

PostgreSQL handles the persistence in the exact same way. You can interact with the postgres settings as displayed in the following example:

postgresql:
  persistence:
    enabled: true
    claimName: MyAwesomeGiteaPostgresClaim

Admin User

This chart enables you to create a default admin user. It is also possible to update the password for this user by upgrading or redeploying the chart. You cannot use admin as username.

gitea:
  admin:
    username: 'MyAwesomeForgejoAdmin'
    password: 'AReallyAwesomeForgejoPassword'
    email: 'forge@jo.com'

You can also use an existing Secret to configure the admin user:

apiVersion: v1
kind: Secret
metadata:
  name: gitea-admin-secret
type: Opaque
stringData:
  username: MyAwesomeGiteaAdmin
  password: AReallyAwesomeGiteaPassword
gitea:
  admin:
    existingSecret: gitea-admin-secret

To delete the admin user, set username or password to an empty value and delete the user in the UI.

Whether you use the existing Secret or specify a username and password directly, there are three modes for how the admin user password is created or set.

  • keepUpdated (the default) will set the admin user password, and reset it to the defined value every time the pod is recreated.
  • initialOnlyNoReset will set the admin user password when creating it, but never try to update the password.
  • initialOnlyRequireReset will set the admin user password when creating it, never update it, and require that the password be changed at the initial login.

These modes can be set like the following:

gitea:
  admin:
    passwordMode: initialOnlyRequireReset

LDAP Settings

Like the admin user the LDAP settings can be updated. All LDAP values from https://forgejo.org/docs/latest/admin/command-line/#admin are available.

Multiple LDAP sources can be configured with additional LDAP list items.

gitea:
  ldap:
    - name: MyAwesomeGiteaLdap
      securityProtocol: unencrypted
      host: '127.0.0.1'
      port: '389'
      userSearchBase: ou=Users,dc=example,dc=com
      userFilter: sAMAccountName=%s
      adminFilter: CN=Admin,CN=Group,DC=example,DC=com
      emailAttribute: mail
      bindDn: CN=ldap read,OU=Spezial,DC=example,DC=com
      bindPassword: JustAnotherBindPw
      usernameAttribute: CN
      publicSSHKeyAttribute: publicSSHKey

You can also use an existing secret to set the bindDn and bindPassword:

apiVersion: v1
kind: Secret
metadata:
  name: gitea-ldap-secret
type: Opaque
stringData:
  bindDn: CN=ldap read,OU=Spezial,DC=example,DC=com
  bindPassword: JustAnotherBindPw
gitea:
  ldap:
    - existingSecret: gitea-ldap-secret

⚠️ Some options are just flags and therefore don't have any values. If they are defined in gitea.ldap configuration, they will be passed to the Forgejo CLI without any value. Affected options:

  • notActive
  • skipTlsVerify
  • allowDeactivateAll
  • synchronizeUsers
  • attributesInBind

OAuth2 Settings

Like the admin user, OAuth2 settings can be updated and disabled but not deleted. Deleting OAuth2 settings has to be done in the UI. All OAuth2 values are available.

Multiple OAuth2 sources can be configured with additional OAuth list items.

gitea:
  oauth:
    - name: 'MyAwesomeGiteaOAuth'
      provider: 'openidConnect'
      key: 'hello'
      secret: 'world'
      autoDiscoverUrl: 'https://gitea.example.com/.well-known/openid-configuration'
      #useCustomUrls:
      #customAuthUrl:
      #customTokenUrl:
      #customProfileUrl:
      #customEmailUrl:

You can also use an existing secret to set the key and secret:

apiVersion: v1
kind: Secret
metadata:
  name: gitea-oauth-secret
type: Opaque
stringData:
  key: hello
  secret: world
gitea:
  oauth:
    - name: 'MyAwesomeGiteaOAuth'
      existingSecret: gitea-oauth-secret

Compatibility with OCP (OKD or OpenShift)

Normally OCP is automatically detected and the compatibility mode set accordingly. To enforce the OCP compatibility mode use the following configuration:

global:
  compatibility:
    openshift:
      adaptSecurityContext: force

An OCP route to access Forgejo can be enabled with the following config:

route:
  enabled: true

Configure commit signing

When using the rootless image, the GPG key folder is not persistent by default. If you want commits by Forgejo (e.g. initial commit) to be signed, you need to provide a signing key:

signing:
  enabled: false
  gpgHome: /data/git/.gnupg

By default this section is disabled to maintain backwards compatibility.

Regardless of the used container image the signing object allows to specify a private GPG key. Either using the signing.privateKey to define the key inline, or referring to an existing secret containing the key data with signing.existingSecret.

apiVersion: v1
kind: Secret
metadata:
  name: custom-gitea-gpg-key
type: Opaque
stringData:
  privateKey: |-
    -----BEGIN PGP PRIVATE KEY BLOCK-----
    ...
    -----END PGP PRIVATE KEY BLOCK-----    
signing:
  existingSecret: custom-gitea-gpg-key

To use the GPG key, Forgejo needs to be configured accordingly. A detailed description can be found in the documentation.

Metrics and profiling

A Prometheus /metrics endpoint on the HTTP_PORT and pprof profiling endpoints on port 6060 can be enabled under gitea. Beware that the metrics endpoint is exposed via the ingress, manage access using ingress annotations for example.

To deploy the ServiceMonitor, you first need to ensure that you have deployed prometheus-operator and its CRDs.

gitea:
  metrics:
    enabled: true
    serviceMonitor:
      enabled: true

  config:
    server:
      ENABLE_PPROF: true

Pod annotations

Annotations can be added to the Forgejo pod.

gitea:
  podAnnotations: {}

Themes

Custom themes can be added via k8s secrets and referencing them in values.yaml.

The http provider is useful here.

extraVolumes:
  - name: gitea-themes
    secret:
      secretName: gitea-themes

extraVolumeMounts:
  - name: gitea-themes
    readOnly: true
    mountPath: '/data/gitea/public/assets/css'

The secret can be created via terraform:

resource "kubernetes_secret" "gitea-themes" {
  metadata {
    name      = "gitea-themes"
    namespace = "gitea"
  }

  data = {
    "my-theme.css"      = data.http.gitea-theme-light.body
    "my-theme-dark.css" = data.http.gitea-theme-dark.body
    "my-theme-auto.css" = data.http.gitea-theme-auto.body
  }

  type = "Opaque"
}


data "http" "gitea-theme-light" {
  url = "<raw theme url>"

  request_headers = {
    Accept = "application/json"
  }
}

data "http" "gitea-theme-dark" {
  url = "<raw theme url>"

  request_headers = {
    Accept = "application/json"
  }
}

data "http" "gitea-theme-auto" {
  url = "<raw theme url>"

  request_headers = {
    Accept = "application/json"
  }
}

or natively via kubectl:

kubectl create secret generic gitea-themes --from-file={{FULL-PATH-TO-CSS}} --namespace gitea

Renovate

To be able to use a digest value which is automatically updated by Renovate a customManager is required. Here's an examplary values.yml definition which makes use of a digest:

image:
  registry: code.forgejo.org
  repository: forgejo/forgejo
  tag: 1.20.2-0
  digest: sha256:f597c14a403c2fdee9a62dae8bae29d6442f7b2cc85872cc9bb535a24cb1630e

By default Renovate adds digest after the tag. To comply with the Forgejo helm chart definition of the digest parameter, a "customManagers" definition is required:

"customManagers": [
  {
    "customType": "regex",
    "description": "Apply an explicit gitea digest field match",
    "fileMatch": ["values\\.ya?ml"],
    "matchStrings": ["(?<depName>forgejo\\/forgejo)\\n(?<indentation>\\s+)tag: (?<currentValue>[^@].*?)\\n\\s+digest: (?<currentDigest>sha256:[a-f0-9]+)"],
    "datasourceTemplate": "docker",
    "packageNameTemplate": "code.forgejo.org/{{depName}}",
    "autoReplaceStringTemplate": "{{depName}}\n{{indentation}}tag: {{newValue}}\n{{indentation}}digest: {{#if newDigest}}{{{newDigest}}}{{else}}{{{currentDigest}}}{{/if}}"
  }
]

Parameters

Global

Name Description Value
global.imageRegistry global image registry override ""
global.imagePullSecrets global image pull secrets override; can be extended by imagePullSecrets []
global.storageClass global storage class override ""
global.hostAliases global hostAliases which will be added to the pod's hosts files []
namespaceOverride String to fully override common.names.namespace ""
replicaCount number of replicas for the deployment 1

strategy

Name Description Value
strategy.type strategy type RollingUpdate
strategy.rollingUpdate.maxSurge maxSurge 100%
strategy.rollingUpdate.maxUnavailable maxUnavailable 0
clusterDomain cluster domain cluster.local

Image

Name Description Value
image.registry image registry, e.g. gcr.io,docker.io code.forgejo.org
image.repository Image to start for this pod forgejo/forgejo
image.tag Visit: Image tag. Defaults to appVersion within Chart.yaml. ""
image.digest Image digest. Allows to pin the given image tag. Useful for having control over mutable tags like latest ""
image.pullPolicy Image pull policy IfNotPresent
image.rootless Wether or not to pull the rootless version of Forgejo true
image.fullOverride Completely overrides the image registry, path/image, tag and digest. Adjust image.rootless accordingly and review Rootless defaults. ""
imagePullSecrets Secret to use for pulling the image []

Security

Name Description Value
podSecurityContext.fsGroup Set the shared file system group for all containers in the pod. 1000
containerSecurityContext Security context {}
securityContext Run init and Forgejo containers as a specific securityContext {}
podDisruptionBudget Pod disruption budget {}

Service

Name Description Value
service.http.type Kubernetes service type for web traffic ClusterIP
service.http.port Port number for web traffic 3000
service.http.clusterIP ClusterIP setting for http autosetup for deployment nil
service.http.loadBalancerIP LoadBalancer IP setting nil
service.http.nodePort NodePort for http service nil
service.http.externalTrafficPolicy If service.http.type is NodePort or LoadBalancer, set this to Local to enable source IP preservation nil
service.http.externalIPs External IPs for service nil
service.http.ipFamilyPolicy HTTP service dual-stack policy nil
service.http.ipFamilies HTTP service dual-stack familiy selection,for dual-stack parameters see official kubernetes dual-stack concept documentation. nil
service.http.loadBalancerSourceRanges Source range filter for http loadbalancer []
service.http.annotations HTTP service annotations {}
service.http.labels HTTP service additional labels {}
service.http.loadBalancerClass Loadbalancer class nil
service.ssh.type Kubernetes service type for ssh traffic ClusterIP
service.ssh.port Port number for ssh traffic 22
service.ssh.clusterIP ClusterIP setting for ssh autosetup for deployment nil
service.ssh.loadBalancerIP LoadBalancer IP setting nil
service.ssh.nodePort NodePort for ssh service nil
service.ssh.externalTrafficPolicy If service.ssh.type is NodePort or LoadBalancer, set this to Local to enable source IP preservation nil
service.ssh.externalIPs External IPs for service nil
service.ssh.ipFamilyPolicy SSH service dual-stack policy nil
service.ssh.ipFamilies SSH service dual-stack familiy selection,for dual-stack parameters see official kubernetes dual-stack concept documentation. nil
service.ssh.hostPort HostPort for ssh service nil
service.ssh.loadBalancerSourceRanges Source range filter for ssh loadbalancer []
service.ssh.annotations SSH service annotations {}
service.ssh.labels SSH service additional labels {}
service.ssh.loadBalancerClass Loadbalancer class nil

Ingress

Name Description Value
ingress.enabled Enable ingress false
ingress.className Ingress class name nil
ingress.annotations Ingress annotations {}
ingress.hosts[0].host Default Ingress host git.example.com
ingress.hosts[0].paths[0].path Default Ingress path /
ingress.hosts[0].paths[0].pathType Ingress path type Prefix
ingress.tls Ingress tls settings []

Route

Name Description Value
route.enabled Enable route false
route.annotations Route annotations {}
route.host Host to use for the route (will be assigned automatically by OKD / OpenShift is not defined) nil
route.wildcardPolicy Wildcard policy if any for the route, currently only 'Subdomain' or 'None' is allowed. nil
route.tls.termination termination type (see OKD documentation) edge
route.tls.insecureEdgeTerminationPolicy the desired behavior for insecure connections to a route (e.g. with http) Redirect
route.tls.existingSecret the name of a predefined secret of type kubernetes.io/tls with both key (tls.crt and tls.key) set accordingly (if defined attributes 'certificate', 'caCertificate' and 'privateKey' are ignored) nil
route.tls.certificate PEM encoded single certificate nil
route.tls.privateKey PEM encoded private key nil
route.tls.caCertificate PEM encoded CA certificate or chain that issued the certificate nil
route.tls.destinationCACertificate PEM encoded CA certificate used to verify the authenticity of final end point when 'termination' is set to 'passthrough' (ignored otherwise) nil

deployment

Name Description Value
resources Kubernetes resources {}
schedulerName Use an alternate scheduler, e.g. "stork" ""
nodeSelector NodeSelector for the deployment {}
tolerations Tolerations for the deployment []
affinity Affinity for the deployment {}
topologySpreadConstraints TopologySpreadConstraints for the deployment []
dnsConfig dnsConfig for the deployment {}
priorityClassName priorityClassName for the deployment ""
deployment.env Additional environment variables to pass to containers []
deployment.terminationGracePeriodSeconds How long to wait until forcefully kill the pod 60
deployment.labels Labels for the deployment {}
deployment.annotations Annotations for the Forgejo deployment to be created {}

ServiceAccount

Name Description Value
serviceAccount.create Enable the creation of a ServiceAccount false
serviceAccount.name Name of the created ServiceAccount, defaults to release name. Can also link to an externally provided ServiceAccount that should be used. ""
serviceAccount.automountServiceAccountToken Enable/disable auto mounting of the service account token false
serviceAccount.imagePullSecrets Image pull secrets, available to the ServiceAccount []
serviceAccount.annotations Custom annotations for the ServiceAccount {}
serviceAccount.labels Custom labels for the ServiceAccount {}

Persistence

Name Description Value
persistence.enabled Enable persistent storage true
persistence.create Whether to create the persistentVolumeClaim for shared storage true
persistence.mount Whether the persistentVolumeClaim should be mounted (even if not created) true
persistence.claimName Use an existing claim to store repository information gitea-shared-storage
persistence.size Size for persistence to store repo information 10Gi
persistence.accessModes AccessMode for persistence ["ReadWriteOnce"]
persistence.labels Labels for the persistence volume claim to be created {}
persistence.annotations.helm.sh/resource-policy Resource policy for the persistence volume claim keep
persistence.storageClass Name of the storage class to use nil
persistence.subPath Subdirectory of the volume to mount at nil
persistence.volumeName Name of persistent volume in PVC ""
extraVolumes Additional volumes to mount to the Forgejo deployment []
extraContainerVolumeMounts Mounts that are only mapped into the Forgejo runtime/main container, to e.g. override custom templates. []
extraInitVolumeMounts Mounts that are only mapped into the init-containers. Can be used for additional preconfiguration. []
extraVolumeMounts DEPRECATED Additional volume mounts for init containers and the Forgejo main container []

Init

Name Description Value
initPreScript Bash shell script copied verbatim to the start of the init-container. ""
initContainers.resources.limits initContainers.limits Kubernetes resource limits for init containers {}
initContainers.resources.requests.cpu initContainers.requests.cpu Kubernetes cpu resource limits for init containers 100m
initContainers.resources.requests.memory initContainers.requests.memory Kubernetes memory resource limits for init containers 128Mi

Signing

Name Description Value
signing.enabled Enable commit/action signing false
signing.gpgHome GPG home directory /data/git/.gnupg
signing.privateKey Inline private GPG key for signed internal Git activity ""
signing.existingSecret Use an existing secret to store the value of signing.privateKey ""

Gitea

Name Description Value
gitea.admin.username Username for the Forgejo admin user gitea_admin
gitea.admin.existingSecret Use an existing secret to store admin user credentials nil
gitea.admin.password Password for the Forgejo admin user r8sA8CPHD9!bt6d
gitea.admin.email Email for the Forgejo admin user gitea@local.domain
gitea.admin.passwordMode Mode for how to set/update the admin user password. Options are: initialOnlyNoReset, initialOnlyRequireReset, and keepUpdated keepUpdated
gitea.metrics.enabled Enable Forgejo metrics false
gitea.metrics.serviceMonitor.enabled Enable Forgejo metrics service monitor false
gitea.metrics.serviceMonitor.namespace Namespace in which Prometheus is running ""
gitea.ldap LDAP configuration []
gitea.oauth OAuth configuration []
gitea.additionalConfigSources Additional configuration from secret or configmap []
gitea.additionalConfigFromEnvs Additional configuration sources from environment variables []
gitea.podAnnotations Annotations for the Forgejo pod {}
gitea.ssh.logLevel Configure OpenSSH's log level. Only available for root-based Forgejo image. INFO

app.ini overrides

Every value described in the Cheat Sheet can be set as a Helm value. Configuration sections map to (lowercased) YAML blocks, while the keys themselves remain in all caps.

Name Description Value
gitea.config.APP_NAME Application name, used in the page title Forgejo: Beyond coding. We forge.
gitea.config.RUN_MODE Application run mode, affects performance and debugging: dev or prod prod
gitea.config.repository General repository settings {}
gitea.config.cors Cross-origin resource sharing settings {}
gitea.config.ui User interface settings {}
gitea.config.markdown Markdown parser settings {}
gitea.config.server General server settings {}
gitea.config.database Database configuration (only necessary with an externally managed DB). {}
gitea.config.indexer Settings for what content is indexed and how {}
gitea.config.queue Job queue configuration {}
gitea.config.admin Admin user settings {}
gitea.config.security Site security settings {}
gitea.config.camo Settings for the camo media proxy server (disabled by default) {}
gitea.config.openid Configuration for authentication with OpenID (disabled by default) {}
gitea.config.oauth2_client OAuth2 client settings {}
gitea.config.service Configuration for miscellaneous Forgejo services {}
gitea.config.ssh.minimum_key_sizes SSH minimum key sizes {}
gitea.config.webhook Webhook settings {}
gitea.config.mailer Mailer configuration (disabled by default) {}
gitea.config.email.incoming Configuration for handling incoming mail (disabled by default) {}
gitea.config.cache Cache configuration {}
gitea.config.session Session/cookie handling {}
gitea.config.picture User avatar settings {}
gitea.config.project Project board defaults {}
gitea.config.attachment Issue and PR attachment configuration {}
gitea.config.log Logging configuration {}
gitea.config.cron Cron job configuration {}
gitea.config.git Global settings for Git {}
gitea.config.metrics Settings for the Prometheus endpoint (disabled by default) {}
gitea.config.api Settings for the Swagger API documentation endpoints {}
gitea.config.oauth2 Settings for the OAuth2 provider {}
gitea.config.i18n Internationalization settings {}
gitea.config.markup Configuration for advanced markup processors {}
gitea.config.highlight.mapping File extension to language mapping overrides for syntax highlighting {}
gitea.config.time Locale settings {}
gitea.config.migrations Settings for Git repository migrations {}
gitea.config.federation Federation configuration {}
gitea.config.packages Package registry settings {}
gitea.config.mirror Configuration for repository mirroring {}
gitea.config.lfs Large File Storage configuration {}
gitea.config.repo-avatar Repository avatar storage configuration {}
gitea.config.avatar User/org avatar storage configuration {}
gitea.config.storage General storage settings {}
gitea.config.proxy Proxy configuration (disabled by default) {}
gitea.config.actions Configuration for Forgejo Actions {}
gitea.config.other Uncategorized configuration options {}

LivenessProbe

Name Description Value
gitea.livenessProbe.enabled Enable liveness probe true
gitea.livenessProbe.tcpSocket.port Port to probe for liveness http
gitea.livenessProbe.initialDelaySeconds Initial delay before liveness probe is initiated 200
gitea.livenessProbe.timeoutSeconds Timeout for liveness probe 1
gitea.livenessProbe.periodSeconds Period for liveness probe 10
gitea.livenessProbe.successThreshold Success threshold for liveness probe 1
gitea.livenessProbe.failureThreshold Failure threshold for liveness probe 10

ReadinessProbe

Name Description Value
gitea.readinessProbe.enabled Enable readiness probe true
gitea.readinessProbe.httpGet.path Path to probe for readiness /api/healthz
gitea.readinessProbe.httpGet.port Port to probe for readiness http
gitea.readinessProbe.initialDelaySeconds Initial delay before readiness probe is initiated 5
gitea.readinessProbe.timeoutSeconds Timeout for readiness probe 1
gitea.readinessProbe.periodSeconds Period for readiness probe 10
gitea.readinessProbe.successThreshold Success threshold for readiness probe 1
gitea.readinessProbe.failureThreshold Failure threshold for readiness probe 3

StartupProbe

Name Description Value
gitea.startupProbe.enabled Enable startup probe false
gitea.startupProbe.tcpSocket.port Port to probe for startup http
gitea.startupProbe.initialDelaySeconds Initial delay before startup probe is initiated 60
gitea.startupProbe.timeoutSeconds Timeout for startup probe 1
gitea.startupProbe.periodSeconds Period for startup probe 10
gitea.startupProbe.successThreshold Success threshold for startup probe 1
gitea.startupProbe.failureThreshold Failure threshold for startup probe 10

Redis® Cluster

Redis® Cluster is loaded as a dependency from Bitnami if enabled in the values. Full configuration options are available on their website. Redis cluster and Redis cannot be enabled at the same time.

Name Description Value
redis-cluster.enabled Enable redis cluster true
redis-cluster.usePassword Whether to use password authentication false
redis-cluster.cluster.nodes Number of redis cluster master nodes 3
redis-cluster.cluster.replicas Number of redis cluster master node replicas 0

Redis®

Redis® is loaded as a dependency from Bitnami if enabled in the values. Full configuration options are available on their website. Redis and Redis cluster cannot be enabled at the same time.

Name Description Value
redis.enabled Enable redis standalone or replicated false
redis.architecture Whether to use standalone or replication standalone
redis.global.redis.password Required password changeme
redis.master.count Number of Redis master instances to deploy 1

PostgreSQL HA

PostgreSQL HA is loaded as a dependency from Bitnami if enabled in the values. Full configuration options are available on their website.

Name Description Value
postgresql-ha.enabled Enable PostgreSQL HA chart true
postgresql-ha.postgresql.password Password for the gitea user (overrides auth.password) changeme4
postgresql-ha.global.postgresql.database Name for a custom database to create (overrides auth.database) gitea
postgresql-ha.global.postgresql.username Name for a custom user to create (overrides auth.username) gitea
postgresql-ha.global.postgresql.password Name for a custom password to create (overrides auth.password) gitea
postgresql-ha.postgresql.repmgrPassword Repmgr Password changeme2
postgresql-ha.postgresql.postgresPassword postgres Password changeme1
postgresql-ha.pgpool.adminPassword pgpool adminPassword changeme3
postgresql-ha.service.ports.postgresql PostgreSQL service port (overrides service.ports.postgresql) 5432
postgresql-ha.primary.persistence.size PVC Storage Request for PostgreSQL HA volume 10Gi

PostgreSQL

PostgreSQL is loaded as a dependency from Bitnami if enabled in the values. Full configuration options are available on their website.

Name Description Value
postgresql.enabled Enable PostgreSQL false
postgresql.global.postgresql.auth.password Password for the gitea user (overrides auth.password) gitea
postgresql.global.postgresql.auth.database Name for a custom database to create (overrides auth.database) gitea
postgresql.global.postgresql.auth.username Name for a custom user to create (overrides auth.username) gitea
postgresql.global.postgresql.service.ports.postgresql PostgreSQL service port (overrides service.ports.postgresql) 5432
postgresql.primary.persistence.size PVC Storage Request for PostgreSQL volume 10Gi

Advanced

Name Description Value
checkDeprecation Whether to run this basic validation check. true
test.enabled Whether to use test-connection Pod. true
test.image.name Image name for the wget container used in the test-connection Pod. busybox
test.image.tag Image tag for the wget container used in the test-connection Pod. latest
extraDeploy Array of extra objects to deploy with the release. []

Contributing

Expected workflow is: Fork -> Patch -> Push -> Pull Request

See CONTRIBUTORS GUIDE for details.

Hop into our Matrix room if you have any questions or want to get involved.

Upgrading

This section lists major and breaking changes of each Helm Chart version. Please read them carefully to upgrade successfully, especially the change of the default database backend! If you miss this, blindly upgrading may delete your Postgres instance and you may lose your data!

To v11

PostgreSQL and PostgreSQL HA are now using PostgreSQL v17. Please read PostgresSQL upgrade guide before upgrading.

You need Forgejo v10+ to use this Helm Chart version. Forgejo v9 is now EOL.

ClusterIP is now emtpy instead of None for http and ssh service. Unsupported api versions for Ingress and PodDisruptionBudget are removed. Ingress and Service are now using named ports. The ReadinessProbe is now using the /api/healthz endpoint.

To v10

You need Forgejo v9+ to use this Helm Chart version. Forgejo v8 is now EOL.

To v9

Namespaces for all resources are now set to common.names.namespace by default.

To v8

You need Forgejo v8+ to use this Helm Chart version. Use the v7 Helm Chart for Forgejo v7.

To v7

The Forgejo docker image is pulled from code.forgejo.org instead of codeberg.org.

To v6

You need Forgejo v7+ to use this Helm Chart version. Use the v5 Helm Chart for Forgejo v1.21.