Values file
The values.yaml file lets you install IDE Services to a Kubernetes cluster. For details, refer to Install IDE Services in a Kubernetes cluster.
Get values.yaml for IDE Services
Run the following command:
helm show values oci://docker.io/jetbrains/ide-services-helm > values.yaml
Get values.yaml for Code With Me Relay
Run the following command:
helm show values oci://docker.io/jetbrains/code-with-me-relay-helm > values.yaml
Application parameters
The IDE Services Helm chart supports commonly used Kubernetes parameters and application parameters.
- ides.config.javaOpts
If necessary, specify additional Java options to pass to the application container.
- ides.config.additionalEnvs
If necessary, specify additional environmental variables to pass to the application container.
- ides.config.deploymentURL
Specify a public URL to access IDE Services's Web UI. This URL is displayed to the end users in the browser.
- ides.config.allowedOrigins
If necessary, provide a list of CORS origins allowed by the IDE Services Server.
- ides.config.loggingLevel
Set the highest logging level to display in the logs (for root).
You can change the logging level of any package. To disable logging, set
WARN
as a value.- ides.config.intellijPlugin.pluginRepositoryType
Specify the source for obtaining plugins. Possible values:
TBE
: specify this option if you want IDE Services to install plugins from the local plugin repository. Use this option when working in offline mode.MARKETPLACE
: specify this option if you want IDE Services to search for plugins externally on the marketplace.
- ides.config.additionalSecrets
Specify additional secrets in the
key=value
format. Thesuffix
parameter determines the path to the secret content in the file system. ThesecretName
parameter defines the name of an existing user secret. The values from the secret can be used in the application configuration by using placeholders, for instance,${okta.secret}
.Example:
additionalSecrets: - suffix: "okta" secretName: "company-okta-secret"- ides.config.configCustomization
Use this parameter to pass any configurations supported by application.yaml. For more details, refer to Server configuration file.
In case of intersection, the values passed in the
ides.config.configCustomization
property override the existing application configuration. For example, if you configure your database in both theides.config.configCustomization
andides.config.db
properties, the former configuration overrides the latter.
Database
- ides.config.db.host
Specify a PostgreSQL host.
- ides.config.db.database
Specify the name of the PostgreSQL database, to which the IDE Services Server should connect and use.
- ides.config.db.user
Specify a username to connect to the PostgreSQL database.
- ides.config.db.password
Specify a password to connect to the PostgreSQL database.
- ides.config.db.secretName
In case you're using a secret to store database details, specify the secret name.
When creating a secret, use the following format:
apiVersion: v1 kind: Secret type: Opaque metadata: name: <secret-name> data: host: "" database: "" user: "" password: ""
Object storage
- ides.config.storage.secretName
In case you're using a secret to store object storage details, specify the secret name.
When creating a secret, use the following format:
apiVersion: v1 kind: Secret type: Opaque metadata: name: <secret-name> data: bucket: "" url: "" access-key: "" secret-key: "" s3-region: ""apiVersion: v1 kind: Secret type: Opaque metadata: name: <secret-name> data: container: "" connection-string: "" account-name: "" account-key: "" endpoint: "" check-container: true/falseFor more information, refer to Object storage.
- ides.config.storage.type
Defines the object storage type used for the IDE Services Server:
s3
orazure
. Depending on the specified type, you need to set up a connection to the storage of your choice.
S3
- ides.config.storage.s3.url
Specify a URL to access your S3 bucket.
- ides.config.storage.s3.bucket
Specify the name of your S3 bucket.
- ides.config.storage.s3.accessKey
Provide a unique key to access the S3-compatible storage.
- ides.config.storage.s3.secretKey
Provide a secret key to pair with the unique access key.
- ides.config.storage.s3.s3Region
Specify a region that you selected during S3 bucket creation. The default value is
us-east-1
.
Azure
In order to connect to Azure object storage, you need to provide either a connection string or a combination of the account name, key, and endpoint.
- ides.config.storage.azure.connectionString
Provide a connection string to authorize requests to Azure storage.
- ides.config.storage.azure.container
Specify the name of the Azure container to connect.
- ides.config.storage.azure.accountKey
Provide an account key to authorize requests to Azure storage.
- ides.config.storage.azure.accountName
Provide an account name to authorize requests to Azure storage.
- ides.config.storage.azure.endpoint
Provide the blob service endpoint to access the Azure server.
- ides.config.storage.azure.checkContainer
Enables the check that verifies the existence of the specified Azure container on every application start.
Authentication provider
- ides.config.auth.login-url
Provide a URL for logging in via your selected authentication provider.
- ides.config.auth.token-url
Provide a URL for obtaining an authorization token on the side of your authentication provider.
- ides.config.auth.jwt-certs-url
Specify a URL to the JSON Web Key (JWK) set that is used to validate JSON Web Tokens (JWT).
- ides.config.auth.client-id
Specify a public identifier for IDE Services that you set when configuring your authentication provider.
- ides.config.auth.client-secret
Specify a secret for IDE Services that you set when configuring your authentication provider.
- ides.config.auth.required-scopes
Define scopes that will be available to IDE Services when accessing a user account.
- ides.config.auth.root-admin-emails
List emails of users that will receive admin rights.
- ides.config.auth.login-url-prompt-param
Defines whether the user should be prompted with a login dialog. Specify one of the following values:
login
: use this value to show the login dialog to the user.none
: use this value to skip showing the login dialog to the user.
Available for: OneLogin, Microsoft Entra ID.
- ides.config.auth.use-id-token-as-access-token
Allows for using id tokens to authenticate users.
Available for: Google.
- ides.config.auth.secretName
In case you're using a secret to store details of the authentication provider, specify the secret name.
When creating a secret, use the following format:
apiVersion: v1 kind: Secret type: Opaque metadata: name: <secret-name> stringData: auth.yaml: | tbe: auth: <Your OAuth 2.0 configuration>For more information, refer to Authorization and authentication.
- ides.config.auth.saml.enabled
Enables the use of SAML.
- ides.config.auth.saml.sp-id
If necessary, specify a unique identifier for IDE Services, which can be used in requests to an external SAML identity provider.
- ides.config.auth.saml.sp-x509cert
Provide the content of local.crt. This value is used to publish the metadata provided in the certificate.
- ides.config.auth.saml.sp-private-key
Provide the content of local.key. This value is used for generating a signature and decrypting a SAMLResponse.
- ides.config.auth.saml.sso-url
An external endpoint of the SAML identity provider used for Single Sign-On. This value can be obtained from an external IdP configuration.
- ides.config.auth.saml.idp-id
Specify an identifier of the identity provider.
- ides.config.auth.saml.idp-x509cert
Provide the X509 certificate. This value is used to validate signatures of IdP responses.
- ides.config.auth.saml.cert-algorithm
Specify
SHA-256
as a certificate signing algorithm.- ides.config.auth.saml.idp-http-method
Specify the HTTP method type to use in sign-on requests. Possible values:
GET
,POST
.- ides.config.auth.saml.attribute-mapping.email
If the
email
field is named differently on the identity provider's side, specify the field name.- ides.config.auth.saml.attribute-mapping.firstName
If the
firstName
field is named differently on the identity provider's side, specify the field name.- ides.config.auth.saml.attribute-mapping.lastName
If the
lastName
field is named differently on the identity provider's side, specify the field name.- ides.config.auth.saml.attribute-mapping.fullName
If the
fullName
field is named differently on the identity provider's side, specify the field name.- ides.config.auth.saml.internal.token-life
Defines the life period of the JWT token issued by the Internal Authorization Server.
- ides.config.auth.saml.internal.refresh-token-life
Defines the life period of the Refresh JWT token issued by the Internal Authorization Server.
- ides.config.auth.saml.internal.private-key
Provide the content of the private_key_pkcs8.pem file. This is a private key that will be used to sign internal JWT tokens.
- ides.config.auth.saml.internal.public-key
Provide the content of the public_key.pem file. This is a public key that will be used to validate internal JWT tokens.
Offline mode
- ides.config.offlineMode.enabled
Allows running the IDE Services Server in offline mode.
- ides.config.offlineMode.mappingPath
Specify the location of the offline.json file in the object storage.