Compare commits
	
		
			243 Commits
		
	
	
		
			feature/af
			...
			feature/ma
		
	
	| Author | SHA1 | Date | |
|---|---|---|---|
| 563f85bc6b | |||
| 804adb989e | |||
| 721e3e2c72 | |||
| aeb54dd2c5 | |||
| 36aa358613 | |||
| 62d03494e6 | |||
| 645c347667 | |||
| 0287c5eb0e | |||
| eace4c4f28 | |||
| c81bbac2c5 | |||
| 88e9ebc916 | |||
| 06b7b25ef7 | |||
| ee9334e753 | |||
| dc30937c5e | |||
| 4a6d126f8e | |||
| 968303ea38 | |||
| 5148aca7ef | |||
| 3b4b9ae7c5 | |||
| dc59884e66 | |||
| bb133d1061 | |||
| ad9dedb009 | |||
| a44e84b8cb | |||
| 37532f10ce | |||
| 888bd97c97 | |||
| 73feabe55c | |||
| 8fc72e3164 | |||
| 7b392ac739 | |||
| a94389bdcc | |||
| 3fa6e211fd | |||
| acd8c0e26a | |||
| 7e989229ce | |||
| 3d4319377e | |||
| e1024cadba | |||
| 140aca08da | |||
| 39de895f4c | |||
| 0011cdb33a | |||
| a85bbd0400 | |||
| 0be3ea17ca | |||
| 21cef5b45a | |||
| 07c3a0f086 | |||
| 4f3e35acf8 | |||
| b81eee425e | |||
| 1a8f52cc58 | |||
| 4fb7234df8 | |||
| ba4900c257 | |||
| 9f939b16bc | |||
| 173f7a319c | |||
| 284dff3040 | |||
| b4529f52fe | |||
| 6eac191db3 | |||
| ed53eeef71 | |||
| b10aced1e1 | |||
| 6fcd66ff71 | |||
| 60077df128 | |||
| dacb84ee59 | |||
| 40146b69d8 | |||
| 1a3cd7febd | |||
| fad28554bb | |||
| d921738728 | |||
| f012b6979c | |||
| 3bb863dd07 | |||
| 11ab97db50 | |||
| 59bc6540c6 | |||
| fd6e5f50de | |||
| bc0a4186b3 | |||
| 730f8b5121 | |||
| 86911f133f | |||
| de9ac31dbe | |||
| 73b9e609dd | |||
| ae94d3a9a7 | |||
| d077b8fdd8 | |||
| 122e219397 | |||
| 49073861bc | |||
| 7ba629e826 | |||
| 7a872b76f8 | |||
| e5fa3f2072 | |||
| 9d1160208f | |||
| 232952b63e | |||
| 79aee6b145 | |||
| a88968f192 | |||
| 8316e39ff7 | |||
| 61802b7ec0 | |||
| 87ea82b16d | |||
| 2596d698d4 | |||
| f7b046844e | |||
| b0a802bffc | |||
| b1e3288b94 | |||
| 02bb4d9f76 | |||
| 86ac349c5d | |||
| 686525eeff | |||
| 39d351e8a1 | |||
| c152fd117d | |||
| 6958253c96 | |||
| 16074c2026 | |||
| fd00dbf893 | |||
| 513b845de1 | |||
| a96472553b | |||
| 55ef4aa6df | |||
| b0a6e5fa08 | |||
| ab63d1b819 | |||
| f3a1e927ff | |||
| 6f29475d25 | |||
| e988f55ba8 | |||
| bb259be422 | |||
| ac45bb0958 | |||
| e3580c6170 | |||
| a801d8ffa8 | |||
| 53d6029e84 | |||
| 239e2fdf49 | |||
| ae45a87b8a | |||
| 9cabd42c53 | |||
| d45374fe4a | |||
| e350de1a3e | |||
| 8eb64ff444 | |||
| e8b786e210 | |||
| 37dfd07ea9 | |||
| 0f872ec949 | |||
| 3b1ab8e595 | |||
| e35da6fc63 | |||
| da4363262c | |||
| ebc787030f | |||
| 5b2cc939a5 | |||
| f45faf4509 | |||
| 7433dd17f4 | |||
| 055d091447 | |||
| 1aa86ef16c | |||
| dd5e738cab | |||
| 7e5a1afb90 | |||
| 175817190c | |||
| 31141c6ef1 | |||
| e581c3a488 | |||
| 4ce4e816c1 | |||
| f50a2a61fc | |||
| ee6e4f1e32 | |||
| 40454d871f | |||
| e503ae6d30 | |||
| 5233956a09 | |||
| e7118e9182 | |||
| e79da15d16 | |||
| 1bcaafd14e | |||
| 6a10c8a908 | |||
| 7f61158564 | |||
| 2f17e6d47a | |||
| 466d58b26b | |||
| 03f873ecf4 | |||
| 56cca145b4 | |||
| 3ecd55787a | |||
| 45e46cf6e9 | |||
| c19d6d8244 | |||
| c5250c5a45 | |||
| e70c1c9685 | |||
| b5d6f28178 | |||
| 14a54e691d | |||
| d6eb7b8f84 | |||
| 025e0c4ff1 | |||
| d76455787a | |||
| 252b732bd8 | |||
| 93ca89060c | |||
| 8e043fdd58 | |||
| d87b8bcff2 | |||
| 4be1c00592 | |||
| 9b1303d10e | |||
| 36f2596dfb | |||
| abf59c480f | |||
| c521a23a16 | |||
| b646968c16 | |||
| a1afc7d736 | |||
| 799d084471 | |||
| 511ed7e78d | |||
| 0d1d10a103 | |||
| de667a31ad | |||
| ef2b1d393d | |||
| 0402d54fda | |||
| d80dfc35fd | |||
| 9d47443573 | |||
| 806b42874c | |||
| 3c71ac8411 | |||
| c2db5eb712 | |||
| 040771494a | |||
| 57c57b7620 | |||
| a41ec520a2 | |||
| 9057768561 | |||
| db3dc9a8af | |||
| 31a968ef87 | |||
| 9778d796a9 | |||
| 7a44938d6d | |||
| 689038a808 | |||
| 88ca15d995 | |||
| 249b335ccb | |||
| 8c33c50457 | |||
| 4f1cbbabe6 | |||
| 4f4e6bdf13 | |||
| ebbece048e | |||
| 9987aa9d0b | |||
| 14cc093e51 | |||
| 18576ff7f2 | |||
| bee9243407 | |||
| 8223b336ed | |||
| 1fd0da6778 | |||
| 6be344fc8d | |||
| d46ee3894e | |||
| b282f363ce | |||
| 4b494642f5 | |||
| 08c508862f | |||
| 3d63498b25 | |||
| 4ef6b01a92 | |||
| 7cf2c9c479 | |||
| a11f3e24f8 | |||
| adff6180ea | |||
| 99dd81531e | |||
| 4f18adf1da | |||
| 7e3f8a2764 | |||
| 3a94d7a7b7 | |||
| 9f8ae4b0fa | |||
| d53ee0079e | |||
| f844eb8caa | |||
| fb645058ac | |||
| 261790e329 | |||
| 645c8edde7 | |||
| c7b52155ac | |||
| 46a2c8998e | |||
| fbba22cb07 | |||
| f03c76c53b | |||
| c7f5cb8773 | |||
| 206f8e4c50 | |||
| 03df5e4663 | |||
| 72906d205b | |||
| c6f7471ebb | |||
| a3550d10cb | |||
| f22d25b101 | |||
| b7b9afa1a5 | |||
| 835f05866c | |||
| 1aa2e55f22 | |||
| 3c777a92c0 | |||
| 7d893d27ec | |||
| d0fcf951cc | |||
| 1e9959e3d1 | |||
| ce821b6abe | |||
| 1de224ea77 | |||
| 103f4c8a9f | |||
| 124881d3a8 | |||
| 0b5d2a5fe6 | |||
| 332082c9fc | 
							
								
								
									
										6
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										6
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							| @@ -1,6 +0,0 @@ | ||||
| [submodule "infrastructure/external-dns/octodns"] | ||||
| 	path = infrastructure/external-dns/octodns | ||||
| 	url = ssh://git@git.kluster.moll.re:2222/remoll/dns.git | ||||
| [submodule "apps/monitoring/dashboards"] | ||||
| 	path = apps/monitoring/dashboards | ||||
| 	url = ssh://git@git.kluster.moll.re:2222/remoll/grafana-dashboards.git | ||||
| @@ -10,7 +10,7 @@ resources: | ||||
| images: | ||||
|   - name: adguard/adguardhome | ||||
|     newName: adguard/adguardhome | ||||
|     newTag: v0.107.48 | ||||
|     newTag: v0.107.53 | ||||
|  | ||||
| namespace: adguard | ||||
|  | ||||
|   | ||||
							
								
								
									
										42
									
								
								apps/audiobookshelf/deployment.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										42
									
								
								apps/audiobookshelf/deployment.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,42 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: audiobookshelf | ||||
| spec: | ||||
|   replicas: 1 | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: audiobookshelf | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app: audiobookshelf | ||||
|     spec: | ||||
|       containers: | ||||
|         - name: audiobookshelf | ||||
|           image: audiobookshelf | ||||
|           ports: | ||||
|             - containerPort: 80 | ||||
|              | ||||
|           env: | ||||
|           - name: TZ | ||||
|             value: Europe/Berlin | ||||
|           - name: CONFIG_PATH | ||||
|             value: /data/config | ||||
|           - name: METADATA_PATH | ||||
|             value: /data/metadata | ||||
|           volumeMounts: | ||||
|             - name: data | ||||
|               mountPath: /data | ||||
|           resources: | ||||
|             requests: | ||||
|               cpu: "100m" | ||||
|               memory: "200Mi" | ||||
|             limits: | ||||
|               cpu: "2" | ||||
|               memory: "1Gi" | ||||
|       volumes: | ||||
|         - name: data | ||||
|           persistentVolumeClaim: | ||||
|             claimName: audiobookshelf-data | ||||
|  | ||||
							
								
								
									
										17
									
								
								apps/audiobookshelf/ingress.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								apps/audiobookshelf/ingress.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,17 @@ | ||||
| apiVersion: traefik.io/v1alpha1 | ||||
| kind: IngressRoute | ||||
| metadata: | ||||
|   name: audiobookshelf-ingressroute | ||||
|  | ||||
| spec: | ||||
|   entryPoints: | ||||
|     - websecure | ||||
|   routes: | ||||
|   - match: Host(`audiobookshelf.kluster.moll.re`) | ||||
|     kind: Rule | ||||
|     services: | ||||
|     - name: audiobookshelf-web | ||||
|       port: 80 | ||||
|  | ||||
|   tls: | ||||
|     certResolver: default-tls  | ||||
| @@ -1,17 +1,15 @@ | ||||
| apiVersion: kustomize.config.k8s.io/v1beta1 | ||||
| kind: Kustomization | ||||
| 
 | ||||
| namespace: homepage | ||||
| 
 | ||||
| resources:  | ||||
|   - namespace.yaml | ||||
|   - pvc.yaml | ||||
|   - deployment.yaml | ||||
|   - service.yaml | ||||
|   - configmap.yaml | ||||
|   - ingress.yaml | ||||
| 
 | ||||
| namespace: audiobookshelf | ||||
| 
 | ||||
| images: | ||||
|   - name: homepage | ||||
|     newName: ghcr.io/gethomepage/homepage | ||||
|     newTag: v0.8.13 | ||||
|   - name: audiobookshelf | ||||
|     newName: ghcr.io/advplyr/audiobookshelf | ||||
|     newTag: "2.15.0" | ||||
							
								
								
									
										11
									
								
								apps/audiobookshelf/pvc.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										11
									
								
								apps/audiobookshelf/pvc.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,11 @@ | ||||
| kind: PersistentVolumeClaim | ||||
| apiVersion: v1 | ||||
| metadata: | ||||
|   name: audiobookshelf-data | ||||
| spec: | ||||
|   storageClassName: "nfs-client" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: 10Gi | ||||
							
								
								
									
										10
									
								
								apps/audiobookshelf/service.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								apps/audiobookshelf/service.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,10 @@ | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: audiobookshelf-web | ||||
| spec: | ||||
|   selector: | ||||
|     app: audiobookshelf | ||||
|   ports: | ||||
|   - port: 80 | ||||
|     targetPort: 80 | ||||
							
								
								
									
										18
									
								
								apps/dendrite/ingress.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								apps/dendrite/ingress.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,18 @@ | ||||
| apiVersion: traefik.io/v1alpha1 | ||||
| kind: IngressRoute | ||||
| metadata: | ||||
|   name: dendrite-ingressroute | ||||
|  | ||||
| spec: | ||||
|   entryPoints: | ||||
|     - websecure | ||||
|   routes: | ||||
|   - match: Host(`dendrite.kluster.moll.re`) | ||||
|     kind: Rule | ||||
|     services: | ||||
|     - name: dendrite | ||||
|       port: 8008 | ||||
|       # scheme: https | ||||
|  | ||||
|   tls: | ||||
|     certResolver: default-tls  | ||||
							
								
								
									
										16
									
								
								apps/dendrite/kustomization.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								apps/dendrite/kustomization.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,16 @@ | ||||
| apiVersion: kustomize.config.k8s.io/v1beta1 | ||||
| kind: Kustomization | ||||
| resources:  | ||||
|   - namespace.yaml | ||||
|   - postgres.yaml | ||||
|   - postgres-user.secret.yaml | ||||
|   - ingress.yaml | ||||
|  | ||||
| namespace: dendrite | ||||
|  | ||||
| helmCharts: | ||||
|   - name: dendrite | ||||
|     releaseName: dendrite | ||||
|     version: 0.13.5 | ||||
|     valuesFile: values.yaml | ||||
|     repo: https://matrix-org.github.io/dendrite/ | ||||
							
								
								
									
										4
									
								
								apps/dendrite/namespace.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								apps/dendrite/namespace.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,4 @@ | ||||
| apiVersion: v1 | ||||
| kind: Namespace | ||||
| metadata: | ||||
|   name: placeholder | ||||
							
								
								
									
										25
									
								
								apps/dendrite/postgres.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										25
									
								
								apps/dendrite/postgres.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,25 @@ | ||||
| apiVersion: postgresql.cnpg.io/v1 | ||||
| kind: Cluster | ||||
| metadata: | ||||
|   name: dendrite-postgres | ||||
| spec: | ||||
|   instances: 1 | ||||
|   imageName: ghcr.io/cloudnative-pg/postgresql:16.4 | ||||
|   bootstrap: | ||||
|     initdb: | ||||
|       owner: dendrite | ||||
|       database: dendrite | ||||
|       secret: | ||||
|         name: postgres-password | ||||
|  | ||||
|   # Persistent storage configuration | ||||
|   storage: | ||||
|     size: 2Gi | ||||
|     pvcTemplate: | ||||
|       accessModes: | ||||
|         - ReadWriteOnce | ||||
|       resources: | ||||
|         requests: | ||||
|           storage: 2Gi | ||||
|       storageClassName: nfs-client | ||||
|       volumeMode: Filesystem | ||||
							
								
								
									
										287
									
								
								apps/dendrite/values.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										287
									
								
								apps/dendrite/values.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,287 @@ | ||||
|  | ||||
| # signing key to use | ||||
| signing_key: | ||||
|   # -- Create a new signing key, if not exists | ||||
|   create: true | ||||
|  | ||||
| persistence: | ||||
|   jetstream: | ||||
|     # -- PVC Storage Request for the jetstream volume | ||||
|     capacity: "1Gi" | ||||
|     # -- The storage class to use for volume claims. | ||||
|     storageClass: "nfs-client" | ||||
|   media: | ||||
|     # -- PVC Storage Request for the media volume | ||||
|     capacity: "1Gi" | ||||
|     # -- The storage class to use for volume claims. | ||||
|     storageClass: "nfs-client" | ||||
|   search: | ||||
|     # -- PVC Storage Request for the search volume | ||||
|     capacity: "1Gi" | ||||
|     # -- The storage class to use for volume claims. | ||||
|     storageClass: "nfs-client" | ||||
|  | ||||
|  | ||||
|  | ||||
| dendrite_config: | ||||
|   version: 2 | ||||
|   global: | ||||
|     # -- **REQUIRED** Servername for this Dendrite deployment. | ||||
|     server_name: "dendrite.kluster.moll.re" | ||||
|  | ||||
|     # -- The server name to delegate server-server communications to, with optional port | ||||
|     # e.g. localhost:443 | ||||
|     well_known_server_name: "" | ||||
|  | ||||
|     # -- The server name to delegate client-server communications to, with optional port | ||||
|     # e.g. localhost:443 | ||||
|     well_known_client_name: "" | ||||
|  | ||||
|     # -- Lists of domains that the server will trust as identity servers to verify third | ||||
|     # party identifiers such as phone numbers and email addresses. | ||||
|     trusted_third_party_id_servers: | ||||
|       - matrix.org | ||||
|       - vector.im | ||||
|  | ||||
|     # -- The paths and expiry timestamps (as a UNIX timestamp in millisecond precision) | ||||
|     # to old signing keys that were formerly in use on this domain name. These | ||||
|     # keys will not be used for federation request or event signing, but will be | ||||
|     # provided to any other homeserver that asks when trying to verify old events. | ||||
|     old_private_keys: | ||||
|     #  If the old private key file is available: | ||||
|     #  - private_key: old_matrix_key.pem | ||||
|     #    expired_at: 1601024554498 | ||||
|     #  If only the public key (in base64 format) and key ID are known: | ||||
|     #  - public_key: mn59Kxfdq9VziYHSBzI7+EDPDcBS2Xl7jeUdiiQcOnM= | ||||
|     #    key_id: ed25519:mykeyid | ||||
|     #    expired_at: 1601024554498 | ||||
|  | ||||
|     # -- Disable federation. Dendrite will not be able to make any outbound HTTP requests | ||||
|     # to other servers and the federation API will not be exposed. | ||||
|     disable_federation: false | ||||
|  | ||||
|     key_validity_period: 168h0m0s | ||||
|  | ||||
|     database: | ||||
|       # -- The connection string for connections to Postgres. | ||||
|       # This will be set automatically if using the Postgres dependency | ||||
|       connection_string: "postgresql://dendrite:supersecretpassword!@dendrite-postgres-rw/dendrite" | ||||
|       # -- Default database maximum open connections | ||||
|       max_open_conns: 90 | ||||
|       # -- Default database maximum idle connections | ||||
|       max_idle_conns: 5 | ||||
|       # -- Default database maximum lifetime | ||||
|       conn_max_lifetime: -1 | ||||
|  | ||||
|     jetstream: | ||||
|       # -- Persistent directory to store JetStream streams in. | ||||
|       storage_path: "/data/jetstream" | ||||
|       # -- NATS JetStream server addresses if not using internal NATS. | ||||
|       addresses: [] | ||||
|       # -- The prefix for JetStream streams | ||||
|       topic_prefix: "Dendrite" | ||||
|       # -- Keep all data in memory. (**NOTE**: This is overriden in Helm to `false`) | ||||
|       in_memory: false | ||||
|       # -- Disables TLS validation. This should **NOT** be used in production. | ||||
|       disable_tls_validation: true | ||||
|  | ||||
|     cache: | ||||
|       # -- The estimated maximum size for the global cache in bytes, or in terabytes, | ||||
|       # gigabytes, megabytes or kilobytes when the appropriate 'tb', 'gb', 'mb' or | ||||
|       # 'kb' suffix is specified. Note that this is not a hard limit, nor is it a | ||||
|       # memory limit for the entire process. A cache that is too small may ultimately | ||||
|       # provide little or no benefit. | ||||
|       max_size_estimated: 1gb | ||||
|       # -- The maximum amount of time that a cache entry can live for in memory before | ||||
|       # it will be evicted and/or refreshed from the database. Lower values result in | ||||
|       # easier admission of new cache entries but may also increase database load in | ||||
|       # comparison to higher values, so adjust conservatively. Higher values may make | ||||
|       # it harder for new items to make it into the cache, e.g. if new rooms suddenly | ||||
|       # become popular. | ||||
|       max_age: 1h | ||||
|  | ||||
|     report_stats: | ||||
|       # -- Configures phone-home statistics reporting. These statistics contain the server | ||||
|       # name, number of active users and some information on your deployment config. | ||||
|       # We use this information to understand how Dendrite is being used in the wild. | ||||
|       enabled: false | ||||
|  | ||||
|     presence: | ||||
|       # -- Controls whether we receive presence events from other servers | ||||
|       enable_inbound: false | ||||
|       # -- Controls whether we send presence events for our local users to other servers. | ||||
|       # (_May increase CPU/memory usage_) | ||||
|       enable_outbound: false | ||||
|  | ||||
|     server_notices: | ||||
|       # -- Server notices allows server admins to send messages to all users on the server. | ||||
|       enabled: false | ||||
|       # -- The local part for the user sending server notices. | ||||
|       local_part: "_server" | ||||
|       # -- The display name for the user sending server notices. | ||||
|       display_name: "Server Alerts" | ||||
|       # -- The avatar URL (as a mxc:// URL) name for the user sending server notices. | ||||
|       avatar_url: "" | ||||
|       # The room name to be used when sending server notices. This room name will | ||||
|       # appear in user clients. | ||||
|       room_name: "Server Alerts" | ||||
|  | ||||
|     # prometheus metrics | ||||
|     metrics: | ||||
|       # -- Whether or not Prometheus metrics are enabled. | ||||
|       enabled: false | ||||
|       # HTTP basic authentication to protect access to monitoring. | ||||
|       basic_auth: | ||||
|         # -- HTTP basic authentication username | ||||
|         user: "metrics" | ||||
|         # -- HTTP basic authentication password | ||||
|         password: metrics | ||||
|  | ||||
|   app_service_api: | ||||
|     # -- Disable the validation of TLS certificates of appservices. This is | ||||
|     # not recommended in production since it may allow appservice traffic | ||||
|     # to be sent to an insecure endpoint. | ||||
|     disable_tls_validation: false | ||||
|     # -- Appservice config files to load on startup. (**NOTE**: This is overriden by Helm, if a folder `./appservices/` exists) | ||||
|     config_files: [] | ||||
|  | ||||
|   client_api: | ||||
|     # -- Prevents new users from being able to register on this homeserver, except when | ||||
|     # using the registration shared secret below. | ||||
|     registration_disabled: true | ||||
|  | ||||
|     # Prevents new guest accounts from being created. Guest registration is also | ||||
|     # disabled implicitly by setting 'registration_disabled' above. | ||||
|     guests_disabled: true | ||||
|  | ||||
|     # -- If set, allows registration by anyone who knows the shared secret, regardless of | ||||
|     # whether registration is otherwise disabled. | ||||
|     registration_shared_secret: "supersecretpassword" | ||||
|  | ||||
|  | ||||
|     # TURN server information that this homeserver should send to clients. | ||||
|     turn: | ||||
|       # -- Duration for how long users should be considered valid ([see time.ParseDuration](https://pkg.go.dev/time#ParseDuration) for more) | ||||
|       turn_user_lifetime: "24h" | ||||
|       turn_uris: [] | ||||
|       turn_shared_secret: "" | ||||
|       # -- The TURN username | ||||
|       turn_username: "" | ||||
|       # -- The TURN password | ||||
|       turn_password: "" | ||||
|  | ||||
|     rate_limiting: | ||||
|       # -- Enable rate limiting | ||||
|       enabled: true | ||||
|       # -- After how many requests a rate limit should be activated | ||||
|       threshold: 20 | ||||
|       # -- Cooloff time in milliseconds | ||||
|       cooloff_ms: 500 | ||||
|       # -- Users which should be exempt from rate limiting | ||||
|       exempt_user_ids: | ||||
|  | ||||
|   federation_api: | ||||
|     # -- Federation failure threshold. How many consecutive failures that we should | ||||
|     # tolerate when sending federation requests to a specific server. The backoff | ||||
|     # is 2**x seconds, so 1 = 2 seconds, 2 = 4 seconds, 3 = 8 seconds, etc. | ||||
|     # The default value is 16 if not specified, which is circa 18 hours. | ||||
|     send_max_retries: 16 | ||||
|     # -- Disable TLS validation. This should **NOT** be used in production. | ||||
|     disable_tls_validation: false | ||||
|     prefer_direct_fetch: false | ||||
|     # -- Prevents Dendrite from keeping HTTP connections | ||||
|     # open for reuse for future requests. Connections will be closed quicker | ||||
|     # but we may spend more time on TLS handshakes instead. | ||||
|     disable_http_keepalives: false | ||||
|     # -- Perspective keyservers, to use as a backup when direct key fetch | ||||
|     # requests don't succeed. | ||||
|     # @default -- See value.yaml | ||||
|     key_perspectives: | ||||
|       - server_name: matrix.org | ||||
|         keys: | ||||
|           - key_id: ed25519:auto | ||||
|             public_key: Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw | ||||
|           - key_id: ed25519:a_RXGa | ||||
|             public_key: l8Hft5qXKn1vfHrg3p4+W8gELQVo8N13JkluMfmn2sQ | ||||
|  | ||||
|   media_api: | ||||
|     # -- The path to store media files (e.g. avatars) in | ||||
|     base_path: "/data/media_store" | ||||
|     # -- The max file size for uploaded media files | ||||
|     max_file_size_bytes: 10485760 | ||||
|     # Whether to dynamically generate thumbnails if needed. | ||||
|     dynamic_thumbnails: false | ||||
|     # -- The maximum number of simultaneous thumbnail generators to run. | ||||
|     max_thumbnail_generators: 10 | ||||
|     # -- A list of thumbnail sizes to be generated for media content. | ||||
|     # @default -- See value.yaml | ||||
|     thumbnail_sizes: | ||||
|       - width: 32 | ||||
|         height: 32 | ||||
|         method: crop | ||||
|       - width: 96 | ||||
|         height: 96 | ||||
|         method: crop | ||||
|       - width: 640 | ||||
|         height: 480 | ||||
|         method: scale | ||||
|  | ||||
|   sync_api: | ||||
|     # -- This option controls which HTTP header to inspect to find the real remote IP | ||||
|     # address of the client. This is likely required if Dendrite is running behind | ||||
|     # a reverse proxy server. | ||||
|     real_ip_header: X-Real-IP | ||||
|     # -- Configuration for the full-text search engine. | ||||
|     search: | ||||
|       # -- Whether fulltext search is enabled. | ||||
|       enabled: true | ||||
|       # -- The path to store the search index in. | ||||
|       index_path: "/data/search" | ||||
|       # -- The language most likely to be used on the server - used when indexing, to | ||||
|       # ensure the returned results match expectations. A full list of possible languages | ||||
|       # can be found [here](https://github.com/matrix-org/dendrite/blob/76db8e90defdfb9e61f6caea8a312c5d60bcc005/internal/fulltext/bleve.go#L25-L46) | ||||
|       language: "en" | ||||
|  | ||||
|   user_api: | ||||
|     # -- bcrypt cost to use when hashing passwords. | ||||
|     # (ranges from 4-31; 4 being least secure, 31 being most secure; _NOTE: Using a too high value can cause clients to timeout and uses more CPU._) | ||||
|     bcrypt_cost: 10 | ||||
|     # -- OpenID Token lifetime in milliseconds. | ||||
|     openid_token_lifetime_ms: 3600000 | ||||
|     # - Disable TLS validation when hitting push gateways. This should **NOT** be used in production. | ||||
|     push_gateway_disable_tls_validation: false | ||||
|     # -- Rooms to join users to after registration | ||||
|     auto_join_rooms: [] | ||||
|  | ||||
|   # -- Default logging configuration | ||||
|   logging: | ||||
|   - type: std | ||||
|     level: info | ||||
|  | ||||
| postgresql: | ||||
|   # -- Enable and configure postgres as the database for dendrite. | ||||
|   # @default -- See value.yaml | ||||
|   enabled: false | ||||
|  | ||||
| ingress: | ||||
|   # -- Create an ingress for the deployment | ||||
|   enabled: false | ||||
|  | ||||
| service: | ||||
|   type: ClusterIP | ||||
|   port: 8008 | ||||
|  | ||||
| prometheus: | ||||
|   servicemonitor: | ||||
|     # -- Enable ServiceMonitor for Prometheus-Operator for scrape metric-endpoint | ||||
|     enabled: false | ||||
|     # -- Extra Labels on ServiceMonitor for selector of Prometheus Instance | ||||
|     labels: {} | ||||
|   rules: | ||||
|     # -- Enable PrometheusRules for Prometheus-Operator for setup alerting | ||||
|     enabled: false | ||||
|     # -- Extra Labels on PrometheusRules for selector of Prometheus Instance | ||||
|     labels: {} | ||||
|     # -- additional alertrules (no default alertrules are provided) | ||||
|     additionalRules: [] | ||||
|  | ||||
| @@ -13,4 +13,4 @@ namespace: files | ||||
| images: | ||||
|   - name: ocis | ||||
|     newName: owncloud/ocis | ||||
|     newTag: "5.0.3" | ||||
|     newTag: "5.0.8" | ||||
|   | ||||
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							| @@ -13,4 +13,4 @@ resources: | ||||
| images: | ||||
|   - name: actualbudget | ||||
|     newName: actualbudget/actual-server | ||||
|     newTag: 24.5.0 | ||||
|     newTag: 24.10.1 | ||||
|   | ||||
| @@ -15,4 +15,4 @@ resources: | ||||
| images: | ||||
|   - name: homeassistant/home-assistant | ||||
|     newName: homeassistant/home-assistant | ||||
|     newTag: "2024.5" | ||||
|     newTag: "2024.10" | ||||
|   | ||||
| @@ -2,6 +2,8 @@ apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: homeassistant-web | ||||
|   labels: | ||||
|     app: homeassistant | ||||
| spec: | ||||
|   selector: | ||||
|     app: homeassistant | ||||
|   | ||||
| @@ -1,98 +0,0 @@ | ||||
| apiVersion: v1 | ||||
| kind: ConfigMap | ||||
| metadata: | ||||
|   name: config | ||||
|   labels: | ||||
|     app.kubernetes.io/name: homepage | ||||
| data: | ||||
|   kubernetes.yaml: "" #| | ||||
|   #  mode: cluster | ||||
|   settings.yaml: | | ||||
|     title: "Homepage" | ||||
|     background: https://images.unsplash.com/photo-1547327132-5d20850c62b5?q=80&w=3870&auto=format&fit=crop | ||||
|     cardBlur: sm | ||||
|   #settings.yaml: | | ||||
|   #  providers: | ||||
|   #    longhorn: | ||||
|   #      url: https://longhorn.my.network | ||||
|   custom.css: "" | ||||
|   custom.js: "" | ||||
|   bookmarks.yaml: | | ||||
|     - Developer: | ||||
|         - Github: | ||||
|             - abbr: GH | ||||
|               href: https://github.com/moll-re | ||||
|   services.yaml: | | ||||
|     - Media: | ||||
|         - Jellyfin backend: | ||||
|             href: https://media-backend.kluster.moll.re | ||||
|             ping: media-backend.kluster.moll.re | ||||
|         - Jellyfin vue: | ||||
|             href: https://media.kluster.moll.re | ||||
|             ping: media.kluster.moll.re | ||||
|         - Immich: | ||||
|             href: https://immich.kluster.moll.re | ||||
|             ping: immich.kluster.moll.re | ||||
|  | ||||
|     - Productivity: | ||||
|         - OwnCloud: | ||||
|             href: https://ocis.kluster.moll.re | ||||
|             ping: ocis.kluster.moll.re | ||||
|         - ToDo: | ||||
|             href: https://todos.kluster.moll.re | ||||
|             ping: todos.kluster.moll.re | ||||
|         - Finance: | ||||
|             href: https://finance.kluster.moll.re | ||||
|             ping: finance.kluster.moll.re | ||||
|  | ||||
|     - Home: | ||||
|         - Home Assistant: | ||||
|             href: https://home.kluster.moll.re | ||||
|             ping: home.kluster.moll.re | ||||
|         - Grafana: | ||||
|             href: https://grafana.kluster.moll.re | ||||
|             ping: grafana.kluster.moll.re | ||||
|         - Recipes: | ||||
|             href: https://recipes.kluster.moll.re | ||||
|             ping: recipes.kluster.moll.re | ||||
|      | ||||
|     - Infra: | ||||
|         - Gitea: | ||||
|             href: https://git.kluster.moll.re | ||||
|             ping: git.kluster.moll.re | ||||
|         - ArgoCD: | ||||
|             href: https://argocd.kluster.moll.re | ||||
|             ping: argocd.kluster.moll.re | ||||
|  | ||||
|   widgets.yaml: | | ||||
|     # - kubernetes: | ||||
|     #     cluster: | ||||
|     #       show: true | ||||
|     #       cpu: true | ||||
|     #       memory: true | ||||
|     #       showLabel: true | ||||
|     #       label: "cluster" | ||||
|     #     nodes: | ||||
|     #       show: true | ||||
|     #       cpu: true | ||||
|     #       memory: true | ||||
|     #       showLabel: true | ||||
|     - search: | ||||
|         provider: duckduckgo | ||||
|     - openmeteo: | ||||
|         label: Zürich # optional | ||||
|         latitude: 47.24236 | ||||
|         longitude: 8.30439 | ||||
|         units: metric # or imperial | ||||
|         cache: 30 # Time in minutes to cache API responses, to stay within limits | ||||
|         format: # optional, Intl.NumberFormat options | ||||
|             maximumFractionDigits: 1 | ||||
|     - datetime: | ||||
|         locale: de | ||||
|         format: | ||||
|           dateStyle: long | ||||
|           timeStyle: short | ||||
|     - adguard: | ||||
|         url: http://adguard-home-web.adguard-home:3000 | ||||
|  | ||||
|   docker.yaml: "" | ||||
| @@ -1,64 +0,0 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: homepage | ||||
|   labels: | ||||
|     app.kubernetes.io/name: homepage | ||||
| spec: | ||||
|   revisionHistoryLimit: 3 | ||||
|   replicas: 1 | ||||
|   strategy: | ||||
|     type: RollingUpdate | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app.kubernetes.io/name: homepage | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app.kubernetes.io/name: homepage | ||||
|     spec: | ||||
|       # serviceAccountName: homepage | ||||
|       # automountServiceAccountToken: true | ||||
|       dnsPolicy: ClusterFirst | ||||
|       # enableServiceLinks: true | ||||
|       containers: | ||||
|         - name: homepage | ||||
|           image: homepage | ||||
|           imagePullPolicy: Always | ||||
|           ports: | ||||
|             - name: http | ||||
|               containerPort: 3000 | ||||
|               protocol: TCP | ||||
|           volumeMounts: | ||||
|             - mountPath: /app/config/custom.js | ||||
|               name: config | ||||
|               subPath: custom.js | ||||
|             - mountPath: /app/config/custom.css | ||||
|               name: config | ||||
|               subPath: custom.css | ||||
|             - mountPath: /app/config/bookmarks.yaml | ||||
|               name: config | ||||
|               subPath: bookmarks.yaml | ||||
|             - mountPath: /app/config/docker.yaml | ||||
|               name: config | ||||
|               subPath: docker.yaml | ||||
|             - mountPath: /app/config/kubernetes.yaml | ||||
|               name: config | ||||
|               subPath: kubernetes.yaml | ||||
|             - mountPath: /app/config/services.yaml | ||||
|               name: config | ||||
|               subPath: services.yaml | ||||
|             - mountPath: /app/config/settings.yaml | ||||
|               name: config | ||||
|               subPath: settings.yaml | ||||
|             - mountPath: /app/config/widgets.yaml | ||||
|               name: config | ||||
|               subPath: widgets.yaml | ||||
|             - mountPath: /app/config/logs | ||||
|               name: logs | ||||
|       volumes: | ||||
|         - name: config | ||||
|           configMap: | ||||
|             name: config | ||||
|         - name: logs | ||||
|           emptyDir: {} | ||||
| @@ -1,15 +0,0 @@ | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: homepage-web | ||||
|   labels: | ||||
|     app.kubernetes.io/name: homepage | ||||
| spec: | ||||
|   type: ClusterIP | ||||
|   ports: | ||||
|     - port: 3000 | ||||
|       targetPort: http | ||||
|       protocol: TCP | ||||
|       name: http | ||||
|   selector: | ||||
|     app.kubernetes.io/name: homepage | ||||
| @@ -1,24 +1,33 @@ | ||||
| apiVersion: kustomize.config.k8s.io/v1beta1 | ||||
| kind: Kustomization | ||||
| resources:  | ||||
| - namespace.yaml | ||||
| - ingress.yaml | ||||
| - pvc.yaml | ||||
| - postgres.yaml | ||||
| - postgres.sealedsecret.yaml | ||||
|   - namespace.yaml | ||||
|   - ingress.yaml | ||||
|   - pvc.yaml | ||||
|   - postgres.yaml | ||||
|   - postgres.sealedsecret.yaml | ||||
|  | ||||
|  | ||||
| namespace: immich | ||||
|  | ||||
|  | ||||
| helmCharts: | ||||
|   - name: immich | ||||
|     releaseName: immich | ||||
|     version: 0.6.0 | ||||
|     version: 0.8.1 | ||||
|     valuesFile: values.yaml | ||||
|     repo: https://immich-app.github.io/immich-charts | ||||
|  | ||||
|  | ||||
| images: | ||||
|   - name: ghcr.io/immich-app/immich-machine-learning | ||||
|     newTag: v1.103.1 | ||||
|     newTag: v1.117.0 | ||||
|   - name: ghcr.io/immich-app/immich-server | ||||
|     newTag: v1.103.1 | ||||
|     newTag: v1.117.0 | ||||
|  | ||||
|  | ||||
| patches: | ||||
|   - path: patch-redis-pvc.yaml | ||||
|     target: | ||||
|       kind: StatefulSet | ||||
|       name: immich-redis-master | ||||
							
								
								
									
										17
									
								
								apps/immich/patch-redis-pvc.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								apps/immich/patch-redis-pvc.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,17 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: StatefulSet | ||||
| metadata: | ||||
|   name: immich-redis-master | ||||
| spec: | ||||
|   volumeClaimTemplates: | ||||
|   - apiVersion: v1 | ||||
|     kind: PersistentVolumeClaim | ||||
|     metadata: | ||||
|       name: redis-data | ||||
|     spec: | ||||
|       storageClassName: nfs-client | ||||
|       accessModes: | ||||
|         - ReadWriteMany | ||||
|       resources: | ||||
|         requests: | ||||
|           storage: 2Gi | ||||
| @@ -12,18 +12,24 @@ spec: | ||||
|       secret: | ||||
|         name: postgres-password | ||||
|  | ||||
|   # Enable the VECTORS extension | ||||
|       postInitSQL: | ||||
|         - CREATE EXTENSION IF NOT EXISTS "vectors"; | ||||
|  | ||||
|   postgresql: | ||||
|     shared_preload_libraries: | ||||
|       - "vectors.so" | ||||
|  | ||||
|   # Persistent storage configuration | ||||
|   storage: | ||||
|     size: 1Gi | ||||
|     size: 2Gi | ||||
|     pvcTemplate: | ||||
|       storageClassName: "" | ||||
|       accessModes: | ||||
|         - ReadWriteOnce | ||||
|       resources: | ||||
|         requests: | ||||
|           storage: "1Gi" | ||||
|       volumeName: immich-postgres | ||||
|  | ||||
|           storage: 2Gi | ||||
|       storageClassName: nfs-client | ||||
|       volumeMode: Filesystem | ||||
|   monitoring: | ||||
|     enablePodMonitor: true | ||||
|   | ||||
| @@ -1,40 +1,11 @@ | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolume | ||||
| metadata: | ||||
|   name: immich-nfs | ||||
| spec: | ||||
|   capacity: | ||||
|     storage: "50Gi" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   nfs: | ||||
|     path: /kluster/immich | ||||
|     server: 192.168.1.157 | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolumeClaim | ||||
| metadata: | ||||
|   name: immich-nfs | ||||
|   name: data | ||||
| spec: | ||||
|   storageClassName: "" | ||||
|   storageClassName: "nfs-client" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: "50Gi" | ||||
|   volumeName: immich-nfs | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolume | ||||
| metadata: | ||||
|   name: immich-postgres | ||||
| spec: | ||||
|   capacity: | ||||
|     storage: "1Gi" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   nfs: | ||||
|     path: /kluster/immich-postgres | ||||
|     server: 192.168.1.157 | ||||
| # later used by cnpg | ||||
|       storage: "100Gi" | ||||
|   | ||||
| @@ -22,16 +22,19 @@ env: | ||||
|       secretKeyRef: | ||||
|         name: postgres-password | ||||
|         key: password | ||||
|   IMMICH_WEB_URL: '{{ printf "http://%s-web:3000" .Release.Name }}' | ||||
|   IMMICH_MACHINE_LEARNING_URL: '{{ printf "http://%s-machine-learning:3003" .Release.Name }}' | ||||
|   IMMICH_METRICS: true | ||||
|  | ||||
| immich: | ||||
|   metrics: | ||||
|     # Enabling this will create the service monitors needed to monitor immich with the prometheus operator | ||||
|     enabled: true | ||||
|   persistence: | ||||
|     # Main data store for all photos shared between different components. | ||||
|     library: | ||||
|       # Automatically creating the library volume is not supported by this chart | ||||
|       # You have to specify an existing PVC to use | ||||
|       existingClaim: immich-nfs | ||||
|       existingClaim: data | ||||
|  | ||||
| # Dependencies | ||||
|  | ||||
| @@ -52,16 +55,6 @@ server: | ||||
|     main: | ||||
|       enabled: false | ||||
|  | ||||
| microservices: | ||||
|   enabled: true | ||||
|   persistence: | ||||
|     geodata-cache: | ||||
|       enabled: true | ||||
|       size: 1Gi | ||||
|       # Optional: Set this to pvc to avoid downloading the geodata every start. | ||||
|       type: emptyDir | ||||
|       accessMode: ReadWriteMany | ||||
|  | ||||
| machine-learning: | ||||
|   enabled: true | ||||
|   persistence: | ||||
|   | ||||
| @@ -18,6 +18,9 @@ spec: | ||||
|           limits: | ||||
|             memory: "2Gi" | ||||
|             cpu: "2" | ||||
|           requests: | ||||
|             memory: "128Mi" | ||||
|             cpu: "250m" | ||||
|         ports: | ||||
|         - containerPort: 8096 | ||||
|           name: jellyfin | ||||
| @@ -1,24 +1,5 @@ | ||||
| apiVersion: traefik.io/v1alpha1 | ||||
| kind: IngressRoute | ||||
| metadata: | ||||
|   name: jellyfin-vue-ingress | ||||
|   namespace: media | ||||
| spec: | ||||
|   entryPoints: | ||||
|     - websecure | ||||
|   routes: | ||||
|     - match: Host(`media.kluster.moll.re`) | ||||
|       middlewares: | ||||
|         - name: jellyfin-websocket | ||||
|       kind: Rule | ||||
|       services: | ||||
|         - name: jellyfin-web | ||||
|           port: 80 | ||||
|   tls: | ||||
|     certResolver: default-tls | ||||
| --- | ||||
| apiVersion: traefik.io/v1alpha1 | ||||
| kind: IngressRoute | ||||
| metadata: | ||||
|   name: jellyfin-backend-ingress | ||||
|   namespace: media | ||||
| @@ -26,7 +7,7 @@ spec: | ||||
|   entryPoints: | ||||
|     - websecure | ||||
|   routes: | ||||
|     - match: Host(`media-backend.kluster.moll.re`) && !Path(`/metrics`) | ||||
|     - match: Host(`media.kluster.moll.re`) && !Path(`/metrics`) | ||||
|       middlewares: | ||||
|         - name: jellyfin-websocket | ||||
|         - name: jellyfin-server-headers | ||||
|   | ||||
| @@ -1,17 +0,0 @@ | ||||
| apiVersion: monitoring.coreos.com/v1 | ||||
| kind: ServiceMonitor | ||||
| metadata: | ||||
|   name: jellyfin | ||||
|   labels: | ||||
|     metrics: prometheus | ||||
| spec: | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: jellyfin-server-service | ||||
|   endpoints: | ||||
|   - path: /metrics | ||||
|     targetPort: jellyfin | ||||
|  | ||||
| # this exposes metrics on port 8096 as enabled in the jellyfin config | ||||
| # https://jellyfin.org/docs/general/networking/monitoring/ | ||||
| # the metrics are available at /metrics but blocked by the ingress | ||||
| @@ -5,16 +5,11 @@ namespace: media | ||||
| resources:  | ||||
|   - namespace.yaml | ||||
|   - pvc.yaml | ||||
|   - server.deployment.yaml | ||||
|   - server.service.yaml | ||||
|   - web.deployment.yaml | ||||
|   - web.service.yaml | ||||
|   - deployment.yaml | ||||
|   - service.yaml | ||||
|   - ingress.yaml | ||||
|  | ||||
| images: | ||||
|   - name: jellyfin/jellyfin | ||||
|     newName: jellyfin/jellyfin | ||||
|     newTag: 10.9.0 | ||||
|   - name: ghcr.io/jellyfin/jellyfin-vue | ||||
|     newName: ghcr.io/jellyfin/jellyfin-vue | ||||
|     newTag: stable-rc.0.3.1 | ||||
|     newTag: 10.9.11 | ||||
|   | ||||
| @@ -1,27 +0,0 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: jellyfin-web | ||||
| spec: | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: jellyfin-web | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app: jellyfin-web | ||||
|     spec: | ||||
|       containers: | ||||
|       - name: jellyfin-web | ||||
|         image: ghcr.io/jellyfin/jellyfin-vue | ||||
|         resources: | ||||
|           limits: | ||||
|             memory: "128Mi" | ||||
|             cpu: "30m" | ||||
|         ports: | ||||
|         - containerPort: 80 | ||||
|         env: | ||||
|         - name: TZ | ||||
|           value: Europe/Berlin | ||||
|         - name: DEFAULT_SERVERS | ||||
|           value: "https://media-backend.kluster.moll.re" | ||||
| @@ -1,12 +0,0 @@ | ||||
|  | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: jellyfin-web | ||||
| spec: | ||||
|   selector: | ||||
|     app: jellyfin-web | ||||
|   ports: | ||||
|     - protocol: TCP | ||||
|       port: 80 | ||||
|       targetPort: 80 | ||||
							
								
								
									
										16
									
								
								apps/minecraft/curseforge.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								apps/minecraft/curseforge.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,16 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: curseforge-api | ||||
|   namespace: minecraft | ||||
| spec: | ||||
|   encryptedData: | ||||
|     key: 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 | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: curseforge-api | ||||
|       namespace: minecraft | ||||
|     type: Opaque | ||||
| @@ -1,43 +1,41 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| apiVersion: batch/v1 | ||||
| kind: Job | ||||
| metadata: | ||||
|   name: minecraft-server | ||||
|   name: start-server | ||||
| spec: | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: minecraft-server | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app: minecraft-server | ||||
|     spec: | ||||
|       restartPolicy: OnFailure | ||||
|       containers: | ||||
|       - name: minecraft-server | ||||
|         image: minecraft | ||||
|         resources: | ||||
|           limits: | ||||
|             memory: "4000Mi" | ||||
|             cpu: "2500m" | ||||
|             memory: "10000Mi" | ||||
|             cpu: "5" | ||||
|           requests: | ||||
|             memory: "1000Mi" | ||||
|             memory: "1500Mi" | ||||
|             cpu: "500m" | ||||
|         ports: | ||||
|         - containerPort: 25565 | ||||
|         env: | ||||
|         - name: EULA | ||||
|           value: "TRUE" | ||||
|         - name: MODPACK | ||||
|           value: "https://www.curseforge.com/api/v1/mods/711537/files/5076228/download" | ||||
|         - name: TYPE | ||||
|           value: "AUTO_CURSEFORGE" | ||||
|         - name: CF_API_KEY | ||||
|           valueFrom: | ||||
|             secretKeyRef: | ||||
|               name: curseforge-api | ||||
|               key: key | ||||
|         - name: CF_PAGE_URL | ||||
|           value: "https://www.curseforge.com/minecraft/modpacks/vault-hunters-1-18-2/files/5413446" | ||||
|         - name: VERSION | ||||
|           value: "1.18.2" | ||||
|         # - name: VERSION | ||||
|         #   value: "1.16.5" | ||||
|         # - name: MODPACK | ||||
|         #   value: "https://mediafilez.forgecdn.net/files/3602/5/VaultHunters-OfficialModpack-1.12.1-Server.zip" | ||||
|         - name: INIT_MEMORY | ||||
|           value: "1G" | ||||
|         - name: MAX_MEMORY | ||||
|           value: "3G" | ||||
|           value: "8G" | ||||
|         - name: MOTD | ||||
|           value: "VaultHunters baby!" | ||||
|         - name: ENABLE_RCON | ||||
| @@ -46,6 +44,9 @@ spec: | ||||
|           value: "true" | ||||
|         - name: ONLINE_MODE | ||||
|           value: "true" | ||||
|         - name: ENABLE_AUTOSTOP | ||||
|           value: "true" | ||||
|          | ||||
|         volumeMounts: | ||||
|         - name: minecraft-data | ||||
|           mountPath: /data | ||||
| @@ -6,8 +6,10 @@ namespace: minecraft | ||||
| resources: | ||||
|   - namespace.yaml | ||||
|   - pvc.yaml | ||||
|   - deployment.yaml | ||||
|   - job.yaml | ||||
|   - service.yaml | ||||
|   - curseforge.sealedsecret.yaml | ||||
|  | ||||
|  | ||||
| images: | ||||
|   - name: minecraft | ||||
|   | ||||
 Submodule apps/monitoring/dashboards deleted from 984a69be34
									
								
							| @@ -7,8 +7,8 @@ metadata: | ||||
|   namespace: monitoring | ||||
| spec: | ||||
|   encryptedData: | ||||
|     password: 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 | ||||
|     user: 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 | ||||
|     password: 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 | ||||
|     user: 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 | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|   | ||||
							
								
								
									
										16
									
								
								apps/monitoring/grafana-auth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								apps/monitoring/grafana-auth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,16 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: grafana-auth | ||||
|   namespace: monitoring | ||||
| spec: | ||||
|   encryptedData: | ||||
|     client_secret: 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 | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: grafana-auth | ||||
|       namespace: monitoring | ||||
|     type: Opaque | ||||
| @@ -1,25 +0,0 @@ | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolume | ||||
| metadata: | ||||
|   name: grafana-nfs | ||||
| spec: | ||||
|   capacity: | ||||
|     storage: "1Gi" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   nfs: | ||||
|     path: /export/kluster/grafana | ||||
|     server: 192.168.1.157 | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolumeClaim | ||||
| metadata: | ||||
|   name: grafana-nfs | ||||
| spec: | ||||
|   storageClassName: "" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: "1Gi" | ||||
|   volumeName: grafana-nfs | ||||
| @@ -16,6 +16,12 @@ serviceMonitor: | ||||
|   ## | ||||
|   enabled: false | ||||
|  | ||||
| envValueFrom: | ||||
|   AUTH_GRAFANA_CLIENT_SECRET: | ||||
|     secretKeyRef: | ||||
|       name: grafana-auth | ||||
|       key: client_secret | ||||
|  | ||||
| ingress: | ||||
|   enabled: false | ||||
|  | ||||
| @@ -31,7 +37,7 @@ datasources: | ||||
|     datasources: | ||||
|       - name: Thanos | ||||
|         type: prometheus | ||||
|         url: http://thanos-querier.prometheus.svc:9090 | ||||
|         url: http://thanos-querier.prometheus.svc:10902 | ||||
|         isDefault: true | ||||
|       - name: Prometheus | ||||
|         type: prometheus | ||||
| @@ -67,3 +73,21 @@ grafana.ini: | ||||
|   default_theme: dark | ||||
|   unified_alerting: | ||||
|     enabled: false | ||||
|   analytics: | ||||
|     check_for_updates: false | ||||
|   server: | ||||
|     domain: grafana.kluster.moll.re | ||||
|     root_url: https://grafana.kluster.moll.re | ||||
|   auth.generic_oauth: | ||||
|     name: Authelia | ||||
|     enabled: true | ||||
|     allow_sign_up: true | ||||
|     client_id: grafana | ||||
|     client_secret: ${AUTH_GRAFANA_CLIENT_SECRET} | ||||
|     scopes: openid profile email groups | ||||
|     auth_url: https://auth.kluster.moll.re/api/oidc/authorization | ||||
|     token_url: https://auth.kluster.moll.re/api/oidc/token | ||||
|     api_url: https://auth.kluster.moll.re/api/oidc/authorization/userinfo | ||||
|     tls_skip_verify_insecure: true | ||||
|     auto_login: true | ||||
|     use_pkce: true | ||||
| @@ -1,25 +0,0 @@ | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolume | ||||
| metadata: | ||||
|   name: influxdb-nfs | ||||
| spec: | ||||
|   capacity: | ||||
|     storage: "10Gi" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   nfs: | ||||
|     path: /export/kluster/influxdb | ||||
|     server: 192.168.1.157 | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolumeClaim | ||||
| metadata: | ||||
|   name: influxdb-nfs | ||||
| spec: | ||||
|   storageClassName: "" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: "10Gi" | ||||
|   volumeName: influxdb-nfs | ||||
| @@ -1,26 +0,0 @@ | ||||
| ## Create default user through docker entrypoint | ||||
| ## Defaults indicated below | ||||
| ## | ||||
| adminUser: | ||||
|   organization: "influxdata" | ||||
|   bucket: "default" | ||||
|   user: "admin" | ||||
|   retention_policy: "0s" | ||||
|   ## Leave empty to generate a random password and token. | ||||
|   ## Or fill any of these values to use fixed values. | ||||
|   password: "" | ||||
|   token: "" | ||||
|  | ||||
|  | ||||
| ## Persist data to a persistent volume | ||||
| ## | ||||
| persistence: | ||||
|   enabled: true | ||||
|   ## If true will use an existing PVC instead of creating one | ||||
|   useExisting: true | ||||
|   ## Name of existing PVC to be used in the influx deployment | ||||
|   name: influxdb-nfs | ||||
|  | ||||
|  | ||||
| ingress: | ||||
|   enabled: false | ||||
| @@ -5,16 +5,17 @@ namespace: monitoring | ||||
|  | ||||
| resources:  | ||||
|   - namespace.yaml | ||||
|   - grafana.pvc.yaml | ||||
|   # - influxdb.pvc.yaml | ||||
|   - grafana.ingress.yaml | ||||
|   - grafana-admin.sealedsecret.yaml | ||||
|   - dashboards/ | ||||
|   - grafana-auth.sealedsecret.yaml | ||||
|   # grafana dashboards are provisioned from a git repository | ||||
|   # in the initial bootstrap of the app of apps, the git repo won't be available, so this sync will initially fail | ||||
|   - https://git.kluster.moll.re/remoll/grafana-dashboards//?timeout=10&ref=main | ||||
|  | ||||
|  | ||||
| helmCharts: | ||||
|   - releaseName: grafana | ||||
|     name: grafana | ||||
|     repo: https://grafana.github.io/helm-charts | ||||
|     version: 7.3.9 | ||||
|     version: 8.5.4 | ||||
|     valuesFile: grafana.values.yaml | ||||
|   | ||||
| @@ -1,52 +0,0 @@ | ||||
| env: | ||||
|   - name: HOSTNAME | ||||
|     value: "telegraf-speedtest" | ||||
|  | ||||
| service: | ||||
|   enabled: false | ||||
| rbac: | ||||
|   # Specifies whether RBAC resources should be created | ||||
|   create: false | ||||
|  | ||||
| serviceAccount: | ||||
|   # Specifies whether a ServiceAccount should be created | ||||
|   create: false | ||||
|  | ||||
|  | ||||
| ## Exposed telegraf configuration | ||||
| ## For full list of possible values see `/docs/all-config-values.yaml` and `/docs/all-config-values.toml` | ||||
| ## ref: https://docs.influxdata.com/telegraf/v1.1/administration/configuration/ | ||||
| config: | ||||
|   agent: | ||||
|     interval: "2h" | ||||
|     round_interval: true | ||||
|     metric_batch_size: 1000 | ||||
|     metric_buffer_limit: 10000 | ||||
|     collection_jitter: "0s" | ||||
|     flush_interval: "10s" | ||||
|     flush_jitter: "0s" | ||||
|     precision: "" | ||||
|     debug: false | ||||
|     quiet: false | ||||
|     logfile: "" | ||||
|     hostname: "$HOSTNAME" | ||||
|     omit_hostname: false | ||||
|   processors: | ||||
|     - enum: | ||||
|         mapping: | ||||
|           field: "status" | ||||
|           dest: "status_code" | ||||
|           value_mappings: | ||||
|             healthy: 1 | ||||
|             problem: 2 | ||||
|             critical: 3 | ||||
|   outputs: | ||||
|     - influxdb_v2: | ||||
|         urls: | ||||
|           - "http://influxdb-influxdb2.monitoring:80" | ||||
|         token: We64mk4L4bqYCL77x3fAUSYfOse9Kktyf2eBLyrryG9c3-y8PQFiKPIh9EvSWuq78QSQz6hUcsm7XSFR2Zj1MA== | ||||
|         organization: "influxdata" | ||||
|         bucket: "homeassistant" | ||||
|   inputs: | ||||
|     - internet_speed: | ||||
|         enable_file_download: false | ||||
| @@ -13,4 +13,4 @@ resources: | ||||
| images: | ||||
|   - name: binwiederhier/ntfy | ||||
|     newName: binwiederhier/ntfy | ||||
|     newTag: v2.10.0 | ||||
|     newTag: v2.11.0 | ||||
|   | ||||
							
								
								
									
										63
									
								
								apps/paperless/deployment.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										63
									
								
								apps/paperless/deployment.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,63 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: paperless | ||||
| spec: | ||||
|   replicas: 1 | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: paperless | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app: paperless | ||||
|     spec: | ||||
|       containers: | ||||
|         - name: paperless | ||||
|           image: paperless | ||||
|           ports: | ||||
|             - containerPort: 8000 | ||||
|           env: | ||||
|           - name: PAPERLESS_REDIS | ||||
|             value: redis://redis-master:6379 | ||||
|           - name: PAPERLESS_TIME_ZONE | ||||
|             value: Europe/Berlin | ||||
|           - name: PAPERLESS_OCR_LANGUAGE | ||||
|             value: deu+eng+fra | ||||
|           - name: PAPERLESS_URL | ||||
|             value: https://paperless.kluster.moll.re | ||||
|           - name: PAPERLESS_OCR_USER_ARGS | ||||
|             value: '{"invalidate_digital_signatures": true}' | ||||
|           - name: PAPERLESS_SECRET_KEY | ||||
|             valueFrom: | ||||
|               secretKeyRef: | ||||
|                 name: paperless-secret-key | ||||
|                 key: key | ||||
|           - name: PAPERLESS_DATA_DIR | ||||
|             value: /data | ||||
|           - name: PAPERLESS_MEDIA_ROOT | ||||
|             value: /data | ||||
|           - name: PAPERLESS_APPS | ||||
|             value: allauth.socialaccount.providers.openid_connect | ||||
|           - name: PAPERLESS_SOCIALACCOUNT_PROVIDERS | ||||
|             valueFrom: | ||||
|               secretKeyRef: | ||||
|                 name: paperless-oauth | ||||
|                 key: provider-config | ||||
|           # - name: PAPERLESS_DISABLE_REGULAR_LOGIN | ||||
|           #   value: "True" | ||||
|           volumeMounts: | ||||
|             - name: data | ||||
|               mountPath: /data | ||||
|           resources: | ||||
|             requests: | ||||
|               cpu: "100m" | ||||
|               memory: "200Mi" | ||||
|             limits: | ||||
|               cpu: "2" | ||||
|               memory: "1Gi" | ||||
|       volumes: | ||||
|         - name: data | ||||
|           persistentVolumeClaim: | ||||
|             claimName: paperless-data | ||||
|  | ||||
							
								
								
									
										17
									
								
								apps/paperless/ingress.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								apps/paperless/ingress.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,17 @@ | ||||
| apiVersion: traefik.io/v1alpha1 | ||||
| kind: IngressRoute | ||||
| metadata: | ||||
|   name: paperless-ingressroute | ||||
|  | ||||
| spec: | ||||
|   entryPoints: | ||||
|     - websecure | ||||
|   routes: | ||||
|   - match: Host(`paperless.kluster.moll.re`) | ||||
|     kind: Rule | ||||
|     services: | ||||
|     - name: paperless-web | ||||
|       port: 8000 | ||||
|  | ||||
|   tls: | ||||
|     certResolver: default-tls  | ||||
							
								
								
									
										32
									
								
								apps/paperless/kustomization.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										32
									
								
								apps/paperless/kustomization.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,32 @@ | ||||
| apiVersion: kustomize.config.k8s.io/v1beta1 | ||||
| kind: Kustomization | ||||
| resources: | ||||
|   - namespace.yaml | ||||
|   - pvc.yaml | ||||
|   - deployment.yaml | ||||
|   - service.yaml | ||||
|   - ingress.yaml | ||||
|   - paperless-secret-key.sealedsecret.yaml | ||||
|   - paperless-oauth.sealedsecret.yaml | ||||
|  | ||||
| namespace: paperless | ||||
|  | ||||
| images: | ||||
|   - name: paperless | ||||
|     newName: ghcr.io/paperless-ngx/paperless-ngx | ||||
|     newTag: "2.12.1" | ||||
|  | ||||
|  | ||||
| helmCharts: | ||||
|   - name: redis | ||||
|     releaseName: redis | ||||
|     repo: https://charts.bitnami.com/bitnami | ||||
|     version: 20.1.5 | ||||
|     valuesInline: | ||||
|       auth: | ||||
|         enabled: false | ||||
|       replica: | ||||
|         replicaCount: 0 | ||||
|       master: | ||||
|         persistence: | ||||
|           storageClass: "nfs-client" | ||||
							
								
								
									
										4
									
								
								apps/paperless/namespace.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								apps/paperless/namespace.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,4 @@ | ||||
| apiVersion: v1 | ||||
| kind: Namespace | ||||
| metadata: | ||||
|   name: placeholder | ||||
							
								
								
									
										15
									
								
								apps/paperless/paperless-oauth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								apps/paperless/paperless-oauth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,15 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: paperless-oauth | ||||
|   namespace: paperless | ||||
| spec: | ||||
|   encryptedData: | ||||
|     provider-config: AgBI9IcNOfBevjUtIMwNTd0MTnr1WGxMKJ0cPnHzAS3cddmI+LTrkxxdRBuz2PFKTrhJ6/vh/2tiI9FBWMVm/YqTB64drbF3v13GfZMk/9c7W4SFyMoMcoE4xe6gs4SOm1ggTVxWT6O8IQ0gt7+FRUFaiLmwa08dxTkzrT0/zfQfYg+0aV8qS0eCJIrQk/IA1N31RpUoNV5Jl6vF7oE+cKIVyZ6LVMdecmFnuUgU+1qTC7ncgxxhWQekDQXJQnfYpgsQTF5GaHkGV8kvqJOa2Ohnk7MIeQEz5WuiKaXzU1ZMCYq3D8q/kaf/itLLBlL5MQh/hkuksCVG13aWxvulA/zIw3rSDujjZcSrD8LWH6oCMCn8zVcZjYQQBcTKUYEyYNvHLsmm0fOFIkUmFfBOS4WdHhjsBudz+941Wuc2EX5i6eLind7dk6gOlCL1HEyvbQRV6W50T104DQSNHslRG9CIjPh0BueGJ5fiaFoQa/UuM/JI8R/7cv3y5VkCG6j4gax9FVFgZKxPMtOTxB3gKolT25JHPDOqbDo996T4lsmiYRrYShni4JFZ8ALhcr7pKwlg+gVbDVaqMrVaSz1xzTP0MNxPMsojXVLtG3/Zv0/iXSVW4DPY67pFITEbZBWB3bHLvL9MiwKbWNwsDwPUylWkXTTFHsNbuRUnAXhRxcLn43uIv98JFTQcMVl2J9qrYkHm7w0FVImUr3oC+Ny/Z6j89ARposNx27B4FBgW7H7+yWMKRsAObC8cAjBOkBdXue0x5bEl7Al2BRRG7/WUKHXZvTOlvlj7GFTpLOQbPYjnBo8V8h42uOjGbiMLaCeN5sWlMtWD+7mpHV3XGdcGtPAZlIzgpUs2si/XIRNun2oDoUmJhb7YcGmugodcAK9+aYBThIkNU3guXdrM6Vc7CO2RP8PFpKBpcI9pUHgYA8dyYY+TaBqfYGrKFlGgoVcgh6oVkeOuctTX90XkojVFfqkCqab93faMh2pGCGcH4IZ81sdTYeWwNIvz1RGoi9GhUhQU5NfDeUBn2eHdOpfdsf4FkWe0kgE6TBPlQx7GQy56FldIc0G4QA8H8utL3E/MXYrao70ek/GHIxuev1/hzljJDk+5HJz5itBtKiW4s/5j2ZMD7MMBu/voDQW14XEK5pM9EbwmC6kRg6ljXvTlnUVmw1s04iUvIzF/dO6bCgaOEwFPjZj8oZs0dt64Ov+ZPLwTrmezFgHtfh4dyiRgHt4cO/WYFmzzYwd532p2De3JqjHUzT0iQIpkaz4jrF7+fdtDxtj7XgkJIg== | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: paperless-oauth | ||||
|       namespace: paperless | ||||
							
								
								
									
										15
									
								
								apps/paperless/paperless-secret-key.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								apps/paperless/paperless-secret-key.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,15 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: paperless-secret-key | ||||
|   namespace: paperless | ||||
| spec: | ||||
|   encryptedData: | ||||
|     key: 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 | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: paperless-secret-key | ||||
|       namespace: paperless | ||||
							
								
								
									
										11
									
								
								apps/paperless/pvc.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										11
									
								
								apps/paperless/pvc.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,11 @@ | ||||
| kind: PersistentVolumeClaim | ||||
| apiVersion: v1 | ||||
| metadata: | ||||
|   name: paperless-data | ||||
| spec: | ||||
|   storageClassName: "nfs-client" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: 10Gi | ||||
							
								
								
									
										10
									
								
								apps/paperless/service.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								apps/paperless/service.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,10 @@ | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: paperless-web | ||||
| spec: | ||||
|   selector: | ||||
|     app: paperless | ||||
|   ports: | ||||
|   - port: 8000 | ||||
|     targetPort: 8000 | ||||
| @@ -21,12 +21,15 @@ spec: | ||||
|         ports: | ||||
|         - containerPort: 9000 | ||||
|         env: | ||||
|           - name: ALLOW_SIGNUP | ||||
|             value: "true" | ||||
|           - name: TZ | ||||
|             value: Europe/Paris | ||||
|           - name: BASE_URL | ||||
|             value: https://recipes.kluster.moll.re | ||||
|           - name: ALLOW_SIGNUP | ||||
|             value: "true" | ||||
|         envFrom: | ||||
|           - secretRef: | ||||
|               name: mealie-oauth | ||||
|         volumeMounts: | ||||
|         - name: mealie-data | ||||
|           mountPath: /app/data | ||||
|   | ||||
| @@ -6,11 +6,12 @@ namespace: recipes | ||||
| resources: | ||||
|   - namespace.yaml | ||||
|   - deployment.yaml | ||||
|   - mealie-oauth.sealedsecret.yaml | ||||
|   - pvc.yaml | ||||
|   - service.yaml | ||||
|   - ingress.yaml | ||||
|  | ||||
| images: | ||||
|   - name: mealie | ||||
|     newTag: v1.6.0 | ||||
|     newTag: v1.12.0 | ||||
|     newName: ghcr.io/mealie-recipes/mealie | ||||
							
								
								
									
										26
									
								
								apps/recipes/mealie-oauth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										26
									
								
								apps/recipes/mealie-oauth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,26 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: mealie-oauth | ||||
|   namespace: recipes | ||||
| spec: | ||||
|   encryptedData: | ||||
|     OIDC_ADMIN_GROUP: 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 | ||||
|     OIDC_AUTH_ENABLED: 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 | ||||
|     OIDC_AUTO_REDIRECT: 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 | ||||
|     OIDC_CLIENT_ID: AgBQiUtbuXKJABinO8VfjQ+yIj0a4AEvKboHd544CxYdx1OfZd0DZLsKpkowZS+Wl5QiheC/+8HFqsRzzwKas2i4IyOpihhSW/xd6X7XjDtu2Tjwuol1oRel5AmBpBj6Kl6zTvgLbHE+iUaJi7u5f2Pw0w2vXAJWxg9nhOFVEfTVtKaafYqVVXPB1KTqRPzwR5zsTuIZToEx0BvA95yWM5oKRPnjlSLk1vHMBDPqdgUq+7u+7qhj7C+rvhI7nuTOWRk0NzsELBl3AyAg82w0r+I9H7buU8OHPEhVOID//UIc/wL/QuaJNxeFiU+rM6K0CD6MMGQanuUngaEr/ZpEdxe82hGSuaLik2mWfvG4J4328a1bmmTT/JgPPDQW8Xtg68Tsqj9zT4rfaVt/+TttMMgj4oAFkyVLGZkp1sfgIX5zT7gHc0fCusTR5gGNLJ5PmHyqCu9D2jP1ERLRltiyXH6wms8+aACj+wsmo1OKUjmqrtqtAWNwZz2bmOJhhUgkP1mPz4o2LeECjBPPv9uPWkMb67ZUI4+Qp8o7J0SgQt4ZlRqhg04Rh5MxCY9TvbhLxQD5QqTktmGYWo6cDVnIEIKd/XOSG9pBT6bTGsRLicgRxjDwm/0ZU1Y3stI6UhONKYA1HG8rso8ZfRLvDsgp1Zb8tH/GAw+bl2HkOw1DbyFXWeRxau3RPwTym3GYjFgWZhP5ScOu2Rjg | ||||
|     OIDC_CONFIGURATION_URL: AgBiXJGc7WugRqlUE58fVPkkKkka3G39lhajhuR7EQePZ1HdE1D02/XncXgRO0r7C4kPAX3oZ1Uczo0XAMxQxAZye9NNFNei7E4rlc3BTNOOxCc2Uj57DjuqFA74cHcjs0xRCJ1KVMEcGX8zdG85v/qEI9Oru7vQf8YT3giTKNHDZMgeyrbCMFNS0cyXniseMMVIkiX0ky6TfcFdn84bZiqJYwXwnNNzeM/kJe01NvEe3DuvxZTEme8LNkie7CTgaMHfEYeXZWIh+JqkIPW+48uDYe4ojf/Ts9P2jwzf6qW8XyqwlLti0MxoVH6IqbLbJ9JVJZ94WNMm2tcjigD1eSV2klNxXYZefyqqratQpfi7Ou/KXdfs9Reijj7dtfZDOnztVouS7ivBLlufqdxgyJrnQok1MxQloZs602CBPRDE+oSHGh5ean2wbJLqt/Vl9NxcsFZpWI4tazZ0DUhD5pgS4MXoG8D+RXIz4++nfn+XhYhv84vP4VJh6kCF84dKSYDFUKkAMGJSZRDCcs4jaORO/DZLUUnytnOHV8Mo2ypfC9KgETdnbXWT7OcdCQPesABE/l2lN9KDYHxL6DqE3GibmCqE7yk6TOF36pmVeEsECeBkmcl2DpHVu9PRBiwO0YVTGUr9AVmwO3vAR+2LAVHkDmU+jn/e5SFHg2dkEpWDORC7Zn4vZrjy3pmTJdxBthVwTYqmdnWk4uvppyKP2l6MBtaVPqtB35sDuYtLGSFV1FLBJGJueW+Kk2cGbNxJJEEhBUf6ZHCDWLrZEJPN | ||||
|     OIDC_GROUPS_CLAIM: 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 | ||||
|     OIDC_PROVIDER_NAME: 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 | ||||
|     OIDC_REMEMBER_ME: AgARqfhGDWYi0iqE//vNsJfgZBYJklJ7KUUHm3GkD27gNk0JtOobt/RlE3UV4cBGkstjGQkEGldkwshtQk/hAuuu8Qb9PpeDxQOUABAFX7NDcr2hWnDosFSShq724ycY6B63vjzahMBYEGo9tAB07VPy6RtvZDH5EGYcubfSe2GgX/P9VcKq64eO2NkOHJWc1A9cPqQGYqFi3YZkN1yaix7kRW7sL627Slv3nU/yLpFpEwUi9ayzDBCDxfiBZoRZh+Gy4VpD2S0XmTNYgr+uRTmFxEm0gL4qvualqahssswG6x+l6S+KizbLOkhNmLtZ12t166mZLWlzUPQKiJwEiWUK5DfJs2LtZCWyqVko9972df+buaQ4yPEBO212OoM1gF0P0JaTJ7TNzo0hhYxDIBZPIx9RnG7XzqI+sccj/OLQMeyB4p9gbbKHP4YJyyYQTSPK3dHG8BFdfUDyyq1tv5IkzKRHmy48xaumN6KCPsCqrpr8j1XL9oLPGPtDgf9VRjfp01FkTg9ujskxjnfAt6fNw8JThMyRUdInagos8Wh/qxPPV33yN+EvQaooXxq1FhvZtLVAXsErzqXnNbLBmQGx87IpBT4KMpXBWmQ7+XaiFCWXQ2pdXRtwL9IT7c6dtyCpUpYtlVjYuh8L64W8GJuRUjzg6pRbcw0205MFUZfWuOObAHK67K+ChNgzzsCCy4GHVtpp | ||||
|     OIDC_SIGNUP_ENABLED: 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 | ||||
|     OIDC_USER_CLAIM: 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 | ||||
|     OIDC_USER_GROUP: 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 | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: mealie-oauth | ||||
|       namespace: recipes | ||||
|     type: Opaque | ||||
							
								
								
									
										21
									
								
								infrastructure/argocd/argocd-oauth.configmap.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										21
									
								
								infrastructure/argocd/argocd-oauth.configmap.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,21 @@ | ||||
| apiVersion: v1 | ||||
| kind: ConfigMap | ||||
| metadata: | ||||
|   name: argocd-cm | ||||
| data: | ||||
|   url: https://argocd.kluster.moll.re | ||||
|  | ||||
|   oidc.config: | | ||||
|     name: Authelia | ||||
|     issuer: https://auth.kluster.moll.re | ||||
|     clientID: argocd | ||||
|     # If you want to store sensitive data in another Kubernetes Secret, instead of argocd-secret. ArgoCD knows to check the keys under data in your Kubernetes Secret for a corresponding key whenever a value in a configmap or secret starts with $, then your Kubernetes Secret name and : (colon). | ||||
|     clientSecret: $argocd-oauth:client-secret | ||||
|  | ||||
|     skipAudienceCheckWhenTokenHasNoAudience: true | ||||
|  | ||||
|     # Optional set of OIDC scopes to request. If omitted, defaults to: ["openid", "profile", "email", "groups"] | ||||
|     requestedScopes: ["openid", "profile", "email", "groups"] | ||||
|  | ||||
|     # Optional set of OIDC claims to request on the ID token. | ||||
|     requestedIDTokenClaims: {"groups": {"essential": true}} | ||||
							
								
								
									
										16
									
								
								infrastructure/argocd/argocd-oauth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								infrastructure/argocd/argocd-oauth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,16 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: argocd-oauth | ||||
|   namespace: argocd | ||||
| spec: | ||||
|   encryptedData: | ||||
|     client-secret: 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 | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: argocd-oauth | ||||
|       namespace: argocd | ||||
|     type: Opaque | ||||
| @@ -8,8 +8,10 @@ resources: | ||||
|   - ingress.yaml | ||||
|   - argo-apps.application.yaml | ||||
|   - bootstrap-repo.sealedsecret.yaml | ||||
|   - argocd-oauth.sealedsecret.yaml | ||||
|  | ||||
|  | ||||
| patches: | ||||
|   - path: known-hosts.configmap.yaml | ||||
|   - path: argocd.configmap.yaml | ||||
|   - path: argocd-oauth.configmap.yaml | ||||
|   | ||||
							
								
								
									
										16
									
								
								infrastructure/authelia/authelia-ldap.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								infrastructure/authelia/authelia-ldap.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										16
									
								
								infrastructure/authelia/authelia-oidc.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								infrastructure/authelia/authelia-oidc.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
										
											
												File diff suppressed because one or more lines are too long
											
										
									
								
							
							
								
								
									
										16
									
								
								infrastructure/authelia/authelia-smtp.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										16
									
								
								infrastructure/authelia/authelia-smtp.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,16 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: authelia-smtp | ||||
|   namespace: authelia | ||||
| spec: | ||||
|   encryptedData: | ||||
|     smtp.yml: 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 | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: authelia-smtp | ||||
|       namespace: authelia | ||||
|     type: Opaque | ||||
							
								
								
									
										85
									
								
								infrastructure/authelia/authelia.values.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										85
									
								
								infrastructure/authelia/authelia.values.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,85 @@ | ||||
|  | ||||
| ingress: | ||||
|   enabled: false | ||||
|  | ||||
|  | ||||
| pod: | ||||
|   kind: 'Deployment' | ||||
|   replicas: 1 | ||||
|   extraVolumes: | ||||
|     - name: config-ldap | ||||
|       secret: | ||||
|         secretName: authelia-ldap | ||||
|     - name: config-oidc | ||||
|       secret: | ||||
|         secretName: authelia-oidc | ||||
|     - name: config-smtp | ||||
|       secret: | ||||
|         secretName: authelia-smtp | ||||
|  | ||||
|   extraVolumeMounts: | ||||
|     - name: config-ldap | ||||
|       mountPath: /extra-config/ldap.yml | ||||
|       readOnly: true | ||||
|     - name: config-oidc | ||||
|       mountPath: /extra-config/oidc.yml | ||||
|       readOnly: true | ||||
|     - name: config-smtp | ||||
|       mountPath: /extra-config/smtp.yml | ||||
|       readOnly: true | ||||
|        | ||||
|  | ||||
| ## | ||||
| ## Authelia Config Map Generator | ||||
| ## | ||||
| configMap: | ||||
|  | ||||
|   # Enable the configMap source for the Authelia config. | ||||
|   # If this is false you need to provide a volumeMount via PV/PVC or other means that mounts to /config. | ||||
|   disabled: false | ||||
|   key: 'configuration.yml' | ||||
|   # do not use a pre-existing configMap | ||||
|   # BUT, include sub-maps wich OVERRIDE the values generated by the helm chart | ||||
|   extraConfigs: | ||||
|     - /extra-config/ldap.yml | ||||
|     - /extra-config/oidc.yml | ||||
|     - /extra-config/smtp.yml | ||||
|    | ||||
|   session: | ||||
|     cookies: | ||||
|       - name: authelia_session | ||||
|         domain: auth.kluster.moll.re | ||||
|   storage: | ||||
|     encryption_key: | ||||
|       value: 'authelia-encryption-key' | ||||
|     local: | ||||
|       enabled: true | ||||
|       file: /config/db.sqlite3 | ||||
|  | ||||
|  | ||||
| ## | ||||
| ## Authelia Secret Configuration. | ||||
| ## | ||||
| secret: | ||||
|  | ||||
|   disabled: false | ||||
|  | ||||
|   existingSecret: '' | ||||
|  | ||||
|  | ||||
| certificates: | ||||
|   # don't use the pre-existing secret | ||||
|   existingSecret: '' | ||||
|  | ||||
| ## | ||||
| ## Authelia Persistence Configuration. | ||||
| ## | ||||
| ## Useful in scenarios where you need persistent storage. | ||||
| ## Auth Provider Use Case: file; we recommend you use the ldap provider instead. | ||||
| ## Storage Provider Use Case: local; we recommend you use the mysql/mariadb or postgres provider instead. | ||||
| ## Configuration Use Case: when you want to manually configure the configuration entirely (set configMap.enabled = false). | ||||
| ## | ||||
| persistence: | ||||
|   enabled: true | ||||
|   storageClass: 'nfs-client' | ||||
|  | ||||
| @@ -1,16 +1,17 @@ | ||||
| apiVersion: traefik.io/v1alpha1 | ||||
| kind: IngressRoute | ||||
| metadata: | ||||
|   name: homepage-ingressroute | ||||
|   name: authelia-ingressroute | ||||
| 
 | ||||
| spec: | ||||
|   entryPoints: | ||||
|     - websecure | ||||
|   routes: | ||||
|     - match: Host(`start.kluster.moll.re`) | ||||
|     - match: Host(`auth.kluster.moll.re`) | ||||
|       kind: Rule | ||||
|       services: | ||||
|         - name: homepage-web | ||||
|           port: 3000 | ||||
|         - name: authelia | ||||
|           port: 80 | ||||
| 
 | ||||
|   tls: | ||||
|     certResolver: default-tls | ||||
							
								
								
									
										31
									
								
								infrastructure/authelia/kustomization.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								infrastructure/authelia/kustomization.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,31 @@ | ||||
| apiVersion: kustomize.config.k8s.io/v1beta1 | ||||
| kind: Kustomization | ||||
|  | ||||
| namespace: authelia | ||||
|  | ||||
| resources: | ||||
|   - namespace.yaml | ||||
|   # # As a user management tool, we use LDAP, more specifically, ligh ldap | ||||
|   - lldap-credentials.sealedsecret.yaml | ||||
|   - lldap.pvc.yaml | ||||
|   - lldap.deployment.yaml | ||||
|   - lldap.service.yaml | ||||
|   # Authelia itself is installed as a helm chart | ||||
|   - authelia-ldap.sealedsecret.yaml | ||||
|   - authelia-oidc.sealedsecret.yaml | ||||
|   - authelia-smtp.sealedsecret.yaml | ||||
|   - ingress.yaml | ||||
|  | ||||
|  | ||||
| images: | ||||
|   - name: lldap | ||||
|     newName: nitnelave/lldap | ||||
|     newTag: latest | ||||
|  | ||||
|  | ||||
| helmCharts: | ||||
|   - name: authelia | ||||
|     releaseName: authelia | ||||
|     version: 0.9.9 | ||||
|     repo: https://charts.authelia.com | ||||
|     valuesFile: authelia.values.yaml | ||||
							
								
								
									
										18
									
								
								infrastructure/authelia/lldap-credentials.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										18
									
								
								infrastructure/authelia/lldap-credentials.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,18 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: lldap-credentials | ||||
|   namespace: authelia | ||||
| spec: | ||||
|   encryptedData: | ||||
|     base-dn: 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 | ||||
|     jwt-secret: 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 | ||||
|     ldap-user-pass: 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 | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: lldap-credentials | ||||
|       namespace: authelia | ||||
|     type: Opaque | ||||
							
								
								
									
										54
									
								
								infrastructure/authelia/lldap.deployment.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										54
									
								
								infrastructure/authelia/lldap.deployment.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,54 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   labels: | ||||
|     app: lldap | ||||
|   name: lldap | ||||
| spec: | ||||
|   replicas: 1 | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: lldap | ||||
|   strategy: | ||||
|     type: Recreate | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app: lldap | ||||
|     spec: | ||||
|       containers: | ||||
|         - env: | ||||
|             - name: GID | ||||
|               value: "1001" | ||||
|             - name: LLDAP_JWT_SECRET | ||||
|               valueFrom: | ||||
|                 secretKeyRef: | ||||
|                   name: lldap-credentials | ||||
|                   key: jwt-secret | ||||
|             - name: LLDAP_LDAP_BASE_DN | ||||
|               valueFrom: | ||||
|                 secretKeyRef: | ||||
|                   name: lldap-credentials | ||||
|                   key: base-dn | ||||
|             - name: LLDAP_LDAP_USER_PASS | ||||
|               valueFrom: | ||||
|                 secretKeyRef: | ||||
|                   name: lldap-credentials | ||||
|                   key: ldap-user-pass | ||||
|             - name: TZ | ||||
|               value: Europe/Berlin | ||||
|             - name: UID | ||||
|               value: "1001" | ||||
|           image: lldap | ||||
|           name: lldap | ||||
|           ports: | ||||
|             - containerPort: 3890 | ||||
|             - containerPort: 17170 | ||||
|           volumeMounts: | ||||
|             - mountPath: /data | ||||
|               name: lldap-data | ||||
|       restartPolicy: Always | ||||
|       volumes: | ||||
|         - name: lldap-data | ||||
|           persistentVolumeClaim: | ||||
|             claimName: lldap-data | ||||
							
								
								
									
										0
									
								
								infrastructure/authelia/lldap.ingress.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										0
									
								
								infrastructure/authelia/lldap.ingress.yaml
									
									
									
									
									
										Normal file
									
								
							
							
								
								
									
										11
									
								
								infrastructure/authelia/lldap.pvc.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										11
									
								
								infrastructure/authelia/lldap.pvc.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,11 @@ | ||||
| kind: PersistentVolumeClaim | ||||
| apiVersion: v1 | ||||
| metadata: | ||||
|   name: lldap-data | ||||
| spec: | ||||
|   storageClassName: "nfs-client" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: 1Gi | ||||
							
								
								
									
										10
									
								
								infrastructure/authelia/lldap.service.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										10
									
								
								infrastructure/authelia/lldap.service.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,10 @@ | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: lldap | ||||
| spec: | ||||
|   selector: | ||||
|     app: lldap | ||||
|   ports: | ||||
|   - port: 3890 | ||||
|     targetPort: 3890 | ||||
							
								
								
									
										4
									
								
								infrastructure/authelia/namespace.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										4
									
								
								infrastructure/authelia/namespace.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,4 @@ | ||||
| apiVersion: v1 | ||||
| kind: Namespace | ||||
| metadata: | ||||
|   name: placeholder | ||||
| @@ -1,15 +1,8 @@ | ||||
| # How to restore | ||||
| # How to initialize a new target | ||||
| I used multiple targets for backup. Each target needs to be initialized with a repository. | ||||
|  | ||||
| 1.  Port forward the rest api for gcloud | ||||
|     ```bash | ||||
|     kubectl port-forward -n backup service/rclone-gcloud 8000 | ||||
|     ``` | ||||
|  | ||||
| 2. Load the snapshots locally | ||||
|     ```bash | ||||
|     restic -r rest:http://127.0.0.1:8000/kluster mount /mnt/restic | ||||
|     ``` | ||||
|     (The password is in a secret) | ||||
|  | ||||
| 3. Copy relevant files to the correct location on the NAS | ||||
| After the target (bucket or other) is created, run the following command **locally** to initialize the target: | ||||
|  | ||||
| ```bash | ||||
| restic -r <target> init | ||||
| ``` | ||||
|   | ||||
| @@ -0,0 +1,19 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: backblaze-credentials | ||||
|   namespace: backup | ||||
| spec: | ||||
|   encryptedData: | ||||
|     bucket-id: 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 | ||||
|     key-id: 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 | ||||
|     key-secret: AgAQ9GBMK/sXev8MKfCeYYgtf3tW93xvDn2jjTHaO/trAoU2OgWMS3kWKme/E+ONOxVOA3qonHhUgXcWxyut4OgMFJj2yBGRb+TqD+e0fE0KCqAwRKuYhXgFFl5SgAPZiWOAnYIJM16xu5Ci3UbrM8a8QAXAVV9aH3eT5HMF+GeqgSvhEVEQO1C8KOjVkawoqIHmDmr5KUbK4SFnIut+zCz/2HQLApNkZhPUY2whZOZjz4rwMtu2NDu8k08lI3Zl03OAw38rsbcNfZC8KbENsf1vthn5YpVJomcJKp/prgEp+/C64ZexgBWzZysq1WHs96F8R/ZmgD/Hu1Am/VjvHoFrfbLvXYUZzXGhyCBjhSwqcysm08uI5FvCs9F7WGVbYe5M/sYUMMJwLP5iILd2fkodm/+GWgl/p3EzQ76aCH85FqFhL3/9zA69bM8mZUpVG85i2yNJ9HvLe8z2EnZrh4BTgMRod/DsP9qN5NlofP0dJhK4SyXvy6M+ZO2V7CE4ksLvdWWXcJFmzuiG35DC/dQYHu8tcgywYyFVOw6uAetXSVrIzgGSCche1PZ7RKz2N4CqV5eTe6zUAgNPf4IxPne86f2AGKkivh+QcsIqfXkkR4OzcMslaKskkCniKD0IMf2aFHniSWzivi07gk5PYDxjwpa9AM2yUGRXYTcDSZquNXAt4SxE1YLDb5twZ8JyPP1Q884dwJ3+/M1DwTJj4CewO+zhH4MIURfRaGvipwsV | ||||
|     repository-string: AgBuD/n5Pnz2AwkFUR6ChGSPMTahm5fdStTay2dD12g+IJC+zNKGlY96rxy1RRLpGJi9sj5UzqIjWd2ke+BB9Xx3RfNygh+hjQEqwb15Z5w8Vo2j7iNRYdjqm/q/ug337Ycc+p2AAxEaA4GZln+Ujq7Xh0m0mOg58N640A+zuav5Xg8dQvUoO5vrqcx8lKzUwZuEayjubZPOZDtED14bTj8FWp6a8A88PjvH+xX9ZCi+omuplHFD8+iJyHewMaPq8CPxsa90J/jHR0FyEzkPcx3/zxryeodQFSiCtvMEb4TZsABMYGlFWOdJwqTcPvqSLRZH9Emx7NmaapknERxuoozDegl/KYF8GpshizBcHaV2YEPxNFiAcPMAqmLTJc0E8SbtGcWeilVdqz2z0+Ezqs0VL5DRICBVFg+HT01bYg3yL8FYd3dfeXepijXurMJodL+pORy0y6NeS9dSvOTqoGr7mf/SeaXSMG+cdHw1+V88CVozqFgV7yLe3NzoOPSIgjyoHckpprZSZHfYF9bgX4r8tT1vrlZqN/KlBcbyYsexYK9+s866b9rpZppvgYx1I50sWm+bAeMEYrVBy2sm6fAbpb1U+3+j9CICVnJ0E1VRyOCRCvh3ncpCRgDhvXAfZTMujxGWR6m9nAi6ixp6nLx3oWsgnszK0kAoxKoHTFiNGzdpr9M092ziBnjPosmLp4fV/HdmWKlldWMsbo0HkdMmPQlKQXmtzZ09WgeSHRh1T/3rSybzwXfukh1tj1IcVIM= | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: backblaze-credentials | ||||
|       namespace: backup | ||||
|     type: Opaque | ||||
| @@ -1,7 +1,7 @@ | ||||
| apiVersion: batch/v1 | ||||
| kind: CronJob | ||||
| metadata: | ||||
|   name: restic-rclone-gdrive | ||||
|   name: restic-backblaze | ||||
|    | ||||
| spec: | ||||
|   successfulJobsHistoryLimit: 2 | ||||
| @@ -12,7 +12,7 @@ spec: | ||||
|       template: | ||||
|         spec: | ||||
|           restartPolicy: Never | ||||
|           hostname: restic-k3s-pod | ||||
|           hostname: restic-kluster | ||||
|           # used by restic to identify the host | ||||
|           containers: | ||||
|           # run after completion of initContainers | ||||
| @@ -46,14 +46,27 @@ spec: | ||||
|                 name: backup-nfs-access | ||||
|  | ||||
|             env: | ||||
|               - name: RESTIC_REPOSITORY | ||||
|                 value: rest:http://rclone-gcloud:8000/kluster | ||||
|                 # lives in the same namespace | ||||
|               # secrets live in the same namespace as per kustomization.yaml | ||||
|               - name: RESTIC_PASSWORD | ||||
|                 valueFrom: | ||||
|                   secretKeyRef: | ||||
|                     name: restic-gdrive-credentials | ||||
|                     key: restic-password | ||||
|               - name: RESTIC_REPOSITORY | ||||
|                 valueFrom: | ||||
|                   secretKeyRef: | ||||
|                     name: backblaze-credentials | ||||
|                     key: repository-string | ||||
|               - name: AWS_ACCESS_KEY_ID | ||||
|                 valueFrom: | ||||
|                   secretKeyRef: | ||||
|                     name: backblaze-credentials | ||||
|                     key: key-id | ||||
|               - name: AWS_SECRET_ACCESS_KEY | ||||
|                 valueFrom: | ||||
|                   secretKeyRef: | ||||
|                     name: backblaze-credentials | ||||
|                     key: key-secret | ||||
|           volumes: | ||||
|             - name: backup-nfs-access | ||||
|               persistentVolumeClaim: | ||||
|   | ||||
| @@ -1,8 +0,0 @@ | ||||
| ``` | ||||
| k kustomize backup/overlays/backup | k apply -f - | ||||
| > secret/restic-credentials-backup created | ||||
| > cronjob.batch/restic-backblaze-backup created | ||||
| k kustomize backup/overlays/prune | k apply -f - | ||||
| > secret/restic-credentials-prune created | ||||
| > cronjob.batch/restic-backblaze-prune created | ||||
| ``` | ||||
| @@ -13,12 +13,12 @@ patches: | ||||
|   - path: restic-commands.yaml | ||||
|     target: | ||||
|       kind: CronJob | ||||
|       name: restic-rclone-gdrive | ||||
|       name: restic-backblaze | ||||
|   - target: | ||||
|       kind: CronJob | ||||
|       name: restic-rclone-gdrive | ||||
|       name: restic-backblaze | ||||
|       # replace the name of the cronjob | ||||
|     patch: |- | ||||
|       - op: replace | ||||
|         path: /metadata/name | ||||
|         value: restic-gdrive-backup | ||||
|         value: restic-backblaze-backup | ||||
| @@ -1,7 +1,7 @@ | ||||
| apiVersion: batch/v1 | ||||
| kind: CronJob | ||||
| metadata: | ||||
|   name: restic-gdrive-backup | ||||
|   name: restic-backblaze-backup | ||||
| spec: | ||||
|   schedule: "0 2 * * *" | ||||
|   # at 2:00, every day | ||||
| @@ -27,4 +27,4 @@ spec: | ||||
|           - name: ntfy-command-send | ||||
|             env: | ||||
|               - name: OPERATION | ||||
|                 value: "Restic backup to gdrive" | ||||
|                 value: "Restic backup to backblaze" | ||||
| @@ -11,12 +11,12 @@ patches: | ||||
|   - path: restic-commands.yaml | ||||
|     target: | ||||
|       kind: CronJob | ||||
|       name: restic-rclone-gdrive | ||||
|       name: restic-backblaze | ||||
|   - target: | ||||
|       kind: CronJob | ||||
|       name: restic-rclone-gdrive | ||||
|       name: restic-backblaze | ||||
|       # replace the name of the cronjob | ||||
|     patch: |- | ||||
|       - op: replace | ||||
|         path: /metadata/name | ||||
|         value: restic-gdrive-prune | ||||
|         value: restic-backblaze-prune | ||||
| @@ -1,7 +1,7 @@ | ||||
| apiVersion: batch/v1 | ||||
| kind: CronJob | ||||
| metadata: | ||||
|   name: restic-gdrive-prune | ||||
|   name: restic-backblaze-prune | ||||
| spec: | ||||
|   schedule: "0 0 1/15 * *" | ||||
|   # at midnight, the first and 15. of every month | ||||
| @@ -17,13 +17,15 @@ spec: | ||||
|             # RESTIC_ARGS Can be for instance: --verbose --dry-run | ||||
|             # RESTIC_REPOSITORY is set in the secret | ||||
|               - >- | ||||
|                   restic unlock | ||||
|                   && | ||||
|                   restic forget | ||||
|                   -r $(RESTIC_REPOSITORY) | ||||
|                   --verbose=2 | ||||
|                   --keep-daily 7 --keep-weekly 5 | ||||
|                   --keep-daily 7 --keep-weekly 10 | ||||
|                   --prune | ||||
|           containers: | ||||
|           - name: ntfy-command-send | ||||
|             env: | ||||
|               - name: OPERATION | ||||
|                 value: "Restic prune on gdrive" | ||||
|                 value: "Restic prune on backblaze" | ||||
| @@ -8,7 +8,6 @@ resources: | ||||
|   - namespace.yaml | ||||
|   - pvc.yaml | ||||
|   - restic-password.sealedsecret.yaml | ||||
|   - rclone-config.sealedsecret.yaml | ||||
|   - rclone-gcloud.deployment.yaml | ||||
|   - backblaze-credentials.sealedsecret.yaml | ||||
|   - cronjobs-overlays/prune/ | ||||
|   - cronjobs-overlays/backup/ | ||||
|   | ||||
| @@ -1,32 +0,0 @@ | ||||
| apiVersion: batch/v1 | ||||
| kind: CronJob | ||||
| metadata: | ||||
|   name: postgres-backup | ||||
| spec: | ||||
|   # Backup the database every day at 1AM | ||||
|   schedule: "0 1 * * *" | ||||
|   jobTemplate: | ||||
|     spec: | ||||
|       template: | ||||
|         spec: | ||||
|           containers: | ||||
|           - name: postgres-backup | ||||
|             image: postgres:15 | ||||
|             command: ["/bin/sh"] | ||||
|             args: | ||||
|               - '-c' | ||||
|               - 'pg_dumpall -U postgres -h postgres-postgresql.postgres > /backup/backup-$(date +"%m-%d-%Y-%H-%M").sql' | ||||
|             env: | ||||
|             - name: PGPASSWORD | ||||
|               valueFrom: | ||||
|                 secretKeyRef: | ||||
|                   name: postgres-password | ||||
|                   key: password | ||||
|             volumeMounts: | ||||
|             - mountPath: /backup | ||||
|               name: postgres-backup-claim | ||||
|           restartPolicy: Never | ||||
|           volumes: | ||||
|           - name: postgres-backup-claim | ||||
|             persistentVolumeClaim: | ||||
|               claimName: postgres-backup-claim | ||||
| @@ -1,9 +0,0 @@ | ||||
| apiVersion: kustomize.config.k8s.io/v1beta1 | ||||
| kind: Kustomization | ||||
|  | ||||
| namespace: backup | ||||
|  | ||||
| resources: | ||||
|   - postgres.sealedsecret.yaml | ||||
|   - pvc.yaml | ||||
|   - cronjob.yaml | ||||
| @@ -1,21 +0,0 @@ | ||||
| { | ||||
|   "kind": "SealedSecret", | ||||
|   "apiVersion": "bitnami.com/v1alpha1", | ||||
|   "metadata": { | ||||
|     "name": "postgres-password", | ||||
|     "namespace": "backup", | ||||
|     "creationTimestamp": null | ||||
|   }, | ||||
|   "spec": { | ||||
|     "template": { | ||||
|       "metadata": { | ||||
|         "name": "postgres-password", | ||||
|         "namespace": "backup", | ||||
|         "creationTimestamp": null | ||||
|       } | ||||
|     }, | ||||
|     "encryptedData": { | ||||
|       "password": "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" | ||||
|     } | ||||
|   } | ||||
| } | ||||
| @@ -1,27 +0,0 @@ | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolume | ||||
| metadata: | ||||
|   name: pg-backup-data | ||||
| spec: | ||||
|   capacity: | ||||
|     storage: "50Gi" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   nfs: | ||||
|     path: /kluster/pg-backup | ||||
|     server: 192.168.1.157 | ||||
| --- | ||||
| kind: PersistentVolumeClaim | ||||
| apiVersion: v1 | ||||
|  | ||||
| metadata: | ||||
|   name: postgres-backup-claim | ||||
|  | ||||
| spec: | ||||
|   storageClassName: "" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: 10Gi | ||||
|   volumeName: pg-backup-data | ||||
| @@ -1,22 +0,0 @@ | ||||
| { | ||||
|   "kind": "SealedSecret", | ||||
|   "apiVersion": "bitnami.com/v1alpha1", | ||||
|   "metadata": { | ||||
|     "name": "rclone-config-files", | ||||
|     "namespace": "backup", | ||||
|     "creationTimestamp": null | ||||
|   }, | ||||
|   "spec": { | ||||
|     "template": { | ||||
|       "metadata": { | ||||
|         "name": "rclone-config-files", | ||||
|         "namespace": "backup", | ||||
|         "creationTimestamp": null | ||||
|       }, | ||||
|       "type": "Opaque" | ||||
|     }, | ||||
|     "encryptedData": { | ||||
|       "rclone.conf": "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" | ||||
|     } | ||||
|   } | ||||
| } | ||||
| @@ -1,54 +0,0 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: rclone-gcloud | ||||
|  | ||||
| spec: | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: rclone-gcloud | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app: rclone-gcloud | ||||
|     spec: | ||||
|       containers: | ||||
|       - name: rclone | ||||
|         image: rclone/rclone:latest | ||||
|         command: ["/bin/sh", "-c"] | ||||
|         args: # mounted as a secret | ||||
|           # >- strips newlines | ||||
|             # sleep infinity | ||||
|           - >- | ||||
|             rclone | ||||
|             --config /config/rclone.conf | ||||
|             serve restic | ||||
|             --addr :8000 | ||||
|             -v | ||||
|             ETHZ-gdrive:backup | ||||
|  | ||||
|         volumeMounts: | ||||
|           # from secret | ||||
|           - name: rclone-config | ||||
|             mountPath: /config | ||||
|             readOnly: true | ||||
|       volumes: | ||||
|       - name: rclone-config | ||||
|         secret: | ||||
|           secretName: rclone-config-files | ||||
|  | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: rclone-gcloud | ||||
|  | ||||
| spec: | ||||
|   selector: | ||||
|     app: rclone-gcloud | ||||
|   ports: | ||||
|     - protocol: TCP | ||||
|       port: 8000 | ||||
|       targetPort: 8000 | ||||
|  | ||||
|  | ||||
| @@ -11,8 +11,8 @@ resources: | ||||
| images: | ||||
|   - name: octodns | ||||
|     newName: octodns/octodns # has all plugins | ||||
|     newTag: "2024.05" | ||||
|     newTag: "2024.09" | ||||
|  | ||||
|   - name: git | ||||
|     newName: alpine/git | ||||
|     newTag: "2.43.0" | ||||
|     newTag: "v2.45.2" | ||||
 Submodule infrastructure/external-dns/octodns deleted from ba74e801c1
									
								
							
							
								
								
									
										31
									
								
								infrastructure/gitea/README.md
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										31
									
								
								infrastructure/gitea/README.md
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,31 @@ | ||||
| # Using gitea actions | ||||
| The actions deployment allows to use gitea actions from repositories within this instance. | ||||
|  | ||||
| ### Building docker images | ||||
| Docker builds use the kubernetes runner to build the images. For this to work, the pipeline needs to be able to access the kube-api. A service-account is created for this purpose. | ||||
|  | ||||
| To use the correct docker builder use the following action | ||||
| ```yaml | ||||
|     ... | ||||
|  | ||||
|     - name: Create Kubeconfig | ||||
|       run: | | ||||
|         mkdir $HOME/.kube | ||||
|         echo "${{ secrets.BUILDX_KUBECONFIG }}" > $HOME/.kube/config | ||||
|  | ||||
|     - name: Set up Docker Buildx | ||||
|       uses: docker/setup-buildx-action@v3 | ||||
|       with: | ||||
|         driver: kubernetes | ||||
|         driver-opts: | | ||||
|           namespace=act-runner | ||||
|           qemu.install=true | ||||
|  | ||||
|     ... | ||||
|  | ||||
|     - name: Build and push | ||||
|       uses: docker/build-push-action@v5 | ||||
|       with: | ||||
|         context: . | ||||
|         <other config> | ||||
| ``` | ||||
| @@ -1,25 +1,23 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: actions-runner | ||||
|   labels: | ||||
|     app: act-runner | ||||
|   name: act-runner | ||||
| spec: | ||||
|   replicas: 1 | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: actions-runner | ||||
|       app: act-runner | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app: actions-runner | ||||
|         app: act-runner | ||||
|     spec: | ||||
|       hostname: kube-runner | ||||
|       serviceAccountName: actions-runner | ||||
|       restartPolicy: Always | ||||
|       containers: | ||||
|       - name: actions-runner | ||||
|         image: actions-runner | ||||
|         resources: | ||||
|           requests: | ||||
|             memory: "128Mi" | ||||
|             cpu: "500m" | ||||
|       - name: runner | ||||
|         image: vegardit/gitea-act-runner:dind-latest | ||||
|         env: | ||||
|         - name: GITEA_INSTANCE_URL | ||||
|           value: "https://git.kluster.moll.re" | ||||
| @@ -28,12 +26,35 @@ spec: | ||||
|             secretKeyRef: | ||||
|               name: actions-runner-secret | ||||
|               key: runner-token | ||||
|         - name: GITEA_RUNNER_LABELS | ||||
|           value: k8s | ||||
|         - name: ACTIONS_RUNNER_POD_NAME | ||||
|           valueFrom: | ||||
|             fieldRef: | ||||
|               fieldPath: metadata.name | ||||
|         - name: GITEA_RUNNER_UID | ||||
|           value: '1000' | ||||
|         - name: GITEA_RUNNER_GID | ||||
|           value: '1000' | ||||
|         - name: GITEA_RUNNER_JOB_CONTAINER_PRIVILEGED | ||||
|           value: 'true' | ||||
|         securityContext: | ||||
|           privileged: true | ||||
|         volumeMounts: | ||||
|         - name: runner-data | ||||
|           mountPath: /data | ||||
|       volumes: | ||||
|       - name: runner-data | ||||
|         emptyDir: {} | ||||
|  | ||||
|         persistentVolumeClaim: | ||||
|           claimName: runner-data | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolumeClaim | ||||
| metadata: | ||||
|   name: runner-data | ||||
| spec: | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: 5Gi | ||||
|   storageClassName: "nfs-client" | ||||
|   volumeMode: Filesystem | ||||
|   accessModes: | ||||
|     - ReadWriteMany | ||||
|   | ||||
| @@ -1,38 +0,0 @@ | ||||
| apiVersion: v1 | ||||
| kind: ServiceAccount | ||||
| metadata: | ||||
|   name: actions-runner | ||||
| --- | ||||
| apiVersion: rbac.authorization.k8s.io/v1 | ||||
| kind: Role | ||||
| metadata: | ||||
|   name: actions-role | ||||
| rules: | ||||
| - apiGroups: [""] | ||||
|   resources: ["pods"] | ||||
|   verbs: ["get", "list", "create", "delete"] | ||||
| - apiGroups: [""] | ||||
|   resources: ["pods/exec"] | ||||
|   verbs: ["get", "create"] | ||||
| - apiGroups: [""] | ||||
|   resources: ["pods/log"] | ||||
|   verbs: ["get", "list", "watch",] | ||||
| - apiGroups: ["batch"] | ||||
|   resources: ["jobs"] | ||||
|   verbs: ["get", "list", "create", "delete"] | ||||
| - apiGroups: [""] | ||||
|   resources: ["secrets"] | ||||
|   verbs: ["get", "list", "create", "delete"] | ||||
| --- | ||||
| kind: RoleBinding | ||||
| apiVersion: rbac.authorization.k8s.io/v1 | ||||
| metadata: | ||||
|   name: actions-role-binding | ||||
| subjects: | ||||
| - kind: ServiceAccount | ||||
|   name: actions-runner | ||||
|   apiGroup: "" | ||||
| roleRef: | ||||
|   kind: Role | ||||
|   name: actions-role | ||||
|   apiGroup: rbac.authorization.k8s.io | ||||
| @@ -7,7 +7,7 @@ metadata: | ||||
|   namespace: gitea | ||||
| spec: | ||||
|   encryptedData: | ||||
|     runner-token: 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 | ||||
|     runner-token: AgAUU0jMe3bhoaOdqRZjRzvuQyRMagahDQtX2eqoJ78xihMPkL2yK5MZoCbcps2+xq2zSBgtdwA8xAMyVC4aKkeqYaPSlvBcvuGbcEsnGYJB1Fmjqn2CbvF4nbfaio+XMBmhZXW+GiPWmeiID6LhMwZghzVmcLEuqSmBJ0uB203j0wqsz/k9haL5zZ3vZRE0ofNFceDiVE55TrvTBiLQf1H6R9kFSaRRvcuCH8desX3OmkcSZ0PktULM7KElF9pX1gndrbwiEL5XK60KzE9URl2qpTK/mRrN88ZBa6IuX7u7M579yD3d7yS/JgYi2TL8s3Z69v8JF/nF1ha19xJFhEp1iiyS40xo8cuGHbfVzDSExbJ9fQMpG+1w8ZmyiARXT0EMjuz7tBSruKlr21R6lvwyri71Zg6cUKoVcmQlcmEW7Y6TkH4dsOGlpBX2KsLai7ObGgsQePZ7BHaMTEl54omtdsNsQaquElKhhhBVLEGGQgbP/YZ0wT244mgQkjuMLjVxAM1IWsu4THUY16F+bphzw4xYesZTYYCJUpNO3FDvcsyqlMgPlLMnO3CZyt+Y1avrfz/id5eJUxlVFx9y5htzXA1GaBgrnoRkrpv2OVRFIxatASGbbQgqcDIWx3VXfjVF32fnzVUNtiTZ+pvC/UcyAvFZmaZIrdbK42cA85O1FaOThHJg+8rpc4RXWOOiVg8+8BAQUd/c9bdPJeYLavDefaI5O9DZT4UqiQioBCET2yZPIhwm9JBT | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|   | ||||
| @@ -1,84 +0,0 @@ | ||||
| apiVersion: v1 | ||||
| kind: ServiceAccount | ||||
| metadata: | ||||
|   name: drone-runner | ||||
| --- | ||||
| kind: Role | ||||
| apiVersion: rbac.authorization.k8s.io/v1 | ||||
| metadata: | ||||
|   name: drone-runner | ||||
| rules: | ||||
| - apiGroups: | ||||
|   - "" | ||||
|   resources: | ||||
|   - secrets | ||||
|   verbs: | ||||
|   - create | ||||
|   - delete | ||||
| - apiGroups: | ||||
|   - "" | ||||
|   resources: | ||||
|   - pods | ||||
|   - pods/log | ||||
|   verbs: | ||||
|   - get | ||||
|   - create | ||||
|   - delete | ||||
|   - list | ||||
|   - watch | ||||
|   - update | ||||
|  | ||||
| --- | ||||
|  | ||||
| kind: RoleBinding | ||||
| apiVersion: rbac.authorization.k8s.io/v1 | ||||
| metadata: | ||||
|   name: drone-runner | ||||
| subjects: | ||||
| - kind: ServiceAccount | ||||
|   name: drone-runner | ||||
| roleRef: | ||||
|   kind: Role | ||||
|   name: drone-runner | ||||
|   apiGroup: rbac.authorization.k8s.io | ||||
|  | ||||
| --- | ||||
|  | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: drone-runner | ||||
|   labels: | ||||
|     app.kubernetes.io/name: drone-runner | ||||
| spec: | ||||
|   replicas: 1 | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app.kubernetes.io/name: drone-runner | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app.kubernetes.io/name: drone-runner | ||||
|     spec: | ||||
|       serviceAccountName: drone-runner | ||||
|       containers: | ||||
|       - name: runner | ||||
|         image: drone/drone-runner-kube:latest | ||||
|         ports: | ||||
|         - containerPort: 3000 | ||||
|         env: | ||||
|         - name: DRONE_RPC_HOST | ||||
|           value: drone-server:80 | ||||
|         - name: DRONE_RPC_PROTO | ||||
|           value: http | ||||
|         - name: DRONE_RPC_SECRET | ||||
|           valueFrom: | ||||
|             secretKeyRef: | ||||
|               name: drone-server-secret | ||||
|               key: rpc_secret | ||||
|         - name: DRONE_NAMESPACE_DEFAULT | ||||
|           value: gitea | ||||
|         # - name: DRONE_NAMESPACE_RULES | ||||
|         #   value: "drone-runner:*" | ||||
|         - name: DRONE_SERVICE_ACCOUNT_DEFAULT | ||||
|           value: drone-runner | ||||
| @@ -1,117 +0,0 @@ | ||||
| apiVersion: apps/v1 | ||||
| kind: Deployment | ||||
| metadata: | ||||
|   name: drone-server | ||||
|   labels: | ||||
|     app: drone-server | ||||
| spec: | ||||
|   replicas: 1 | ||||
|   selector: | ||||
|     matchLabels: | ||||
|       app: drone-server | ||||
|   template: | ||||
|     metadata: | ||||
|       labels: | ||||
|         app: drone-server | ||||
|     spec: | ||||
|       containers: | ||||
|       - name: drone | ||||
|         image: drone/drone:latest | ||||
|         env: | ||||
|           - name: DRONE_SERVER_PORT # because the deployment is called drone-server, override this var again! | ||||
|             value: ":80" | ||||
|           - name: DRONE_GITEA_SERVER | ||||
|             value: https://git.kluster.moll.re | ||||
|           - name: DRONE_USER_CREATE | ||||
|             value: username:remoll,admin:true | ||||
|           - name: DRONE_GITEA_CLIENT_ID | ||||
|             valueFrom: | ||||
|               secretKeyRef: | ||||
|                 name: drone-server-secret | ||||
|                 key: client_id | ||||
|           - name: DRONE_GITEA_CLIENT_SECRET | ||||
|             valueFrom: | ||||
|               secretKeyRef: | ||||
|                 name: drone-server-secret | ||||
|                 key: client_secret | ||||
|           - name: DRONE_RPC_SECRET | ||||
|             valueFrom: | ||||
|               secretKeyRef: | ||||
|                 name: drone-server-secret | ||||
|                 key: rpc_secret | ||||
|           - name: DRONE_SERVER_HOST | ||||
|             value: drone.kluster.moll.re | ||||
|           - name: DRONE_SERVER_PROTO | ||||
|             value: https | ||||
|         resources: | ||||
|           requests: | ||||
|             memory: "1Gi" | ||||
|             cpu: 1.5 | ||||
|         volumeMounts: | ||||
|         - mountPath: /data | ||||
|           name: drone-data-nfs | ||||
|       volumes: | ||||
|       - name: drone-data-nfs | ||||
|         persistentVolumeClaim: | ||||
|           claimName: drone-data-nfs | ||||
|  | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: Service | ||||
| metadata: | ||||
|   name: drone-server | ||||
|   labels: | ||||
|     app: drone-server | ||||
|  | ||||
| spec: | ||||
|   type: ClusterIP | ||||
|   ports: | ||||
|   - port: 80 | ||||
|     name: http | ||||
|   selector: | ||||
|     app: drone-server | ||||
| --- | ||||
| apiVersion: traefik.io/v1alpha1 | ||||
| kind: IngressRoute | ||||
| metadata: | ||||
|   name: drone-server-ingress | ||||
|  | ||||
| spec: | ||||
|   entryPoints: | ||||
|     - websecure | ||||
|   routes: | ||||
|   - match: Host(`drone.kluster.moll.re`) | ||||
|     kind: Rule | ||||
|     services: | ||||
|     - name: drone-server | ||||
|       port: 80 | ||||
|   tls: | ||||
|     certResolver: default-tls | ||||
|  | ||||
|  | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolume | ||||
| metadata: | ||||
|   name: drone-data-nfs | ||||
| spec: | ||||
|   capacity: | ||||
|     storage: "1Gi" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   nfs: | ||||
|     path: /export/kluster/drone | ||||
|     server: 192.168.1.157 | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolumeClaim | ||||
| metadata: | ||||
|   name: drone-data-nfs | ||||
| spec: | ||||
|   storageClassName: "" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: "1Gi" | ||||
|   volumeName: drone-data-nfs | ||||
| @@ -1,23 +0,0 @@ | ||||
| { | ||||
|   "kind": "SealedSecret", | ||||
|   "apiVersion": "bitnami.com/v1alpha1", | ||||
|   "metadata": { | ||||
|     "name": "drone-server-secret", | ||||
|     "namespace": "gitea", | ||||
|     "creationTimestamp": null | ||||
|   }, | ||||
|   "spec": { | ||||
|     "template": { | ||||
|       "metadata": { | ||||
|         "name": "drone-server-secret", | ||||
|         "namespace": "gitea", | ||||
|         "creationTimestamp": null | ||||
|       } | ||||
|     }, | ||||
|     "encryptedData": { | ||||
|       "client_id": "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", | ||||
|       "client_secret": "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", | ||||
|       "rpc_secret": "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" | ||||
|     } | ||||
|   } | ||||
| } | ||||
							
								
								
									
										17
									
								
								infrastructure/gitea/gitea-oauth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										17
									
								
								infrastructure/gitea/gitea-oauth.sealedsecret.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,17 @@ | ||||
| --- | ||||
| apiVersion: bitnami.com/v1alpha1 | ||||
| kind: SealedSecret | ||||
| metadata: | ||||
|   creationTimestamp: null | ||||
|   name: gitea-oauth | ||||
|   namespace: gitea | ||||
| spec: | ||||
|   encryptedData: | ||||
|     key: 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 | ||||
|     secret: AgBh0QjLGKbQLRsI8imDwlktlUP/kRD/nUQAYWIEkVy6hZU1OWAAexfcwJi6uVIu/s4Wfzlzl7i5ok5WeeVCWDSTFh5Xz8+SNQoio0/xubbNiYCC81y/ZDhwS9CBn74UX1St4eEFeIcRjey+cyeB7vYCRrYO1WvpZFHx8G9KZa8F4Ca9fy07A3HTGEFdm0Of8MfOM/TVGn8pgJLh2KL+VnYbmyAwQp9hd1NlMM2DC5nPW5kkdfMnz9YG7uAMyaL2MkxTynpKvEJeSCWtIXQSuj60+3IGXNAUWOgYVF46vqzsBbQErXCC67tf8TXOo/lCcDZSVluuo50uWqQceuZ2QujrjwSsQiM9ax29mnI9idu7zqT4q2MQ08+HZT0qNKqN/1jYTUwf7j3jLcANQX5VVuY6zDSZ/hDE4sBuuEoisYTFQH2RicElX73BCfXeOHTOmD4R4EiL/Cn546JG+7qjmBLnljqdNwp0Tug0iLAp25IWhsz9FsNhVwEozil6Es5RGjVHrmIp7z61OwQPqyBOxvBXjIKfQjPY9rykl00UF/X34YWltob2qilUVfYnDGQcA/OZ6UNqN2IC6Pj+vlzAqdbElGapGvqhg2w+ErnL1vAl40HLfRiDCmK5s6dOE2eHdvi6lbbwVWtlpeB7BNuFRuf8npZiMfQmtA3x3FF7dcMXiFsPJ8RbTJRQDO9VeaVTAFDnql3eBhUssVKIehywj9m39dfLvDtdRA0= | ||||
|   template: | ||||
|     metadata: | ||||
|       creationTimestamp: null | ||||
|       name: gitea-oauth | ||||
|       namespace: gitea | ||||
|     type: Opaque | ||||
| @@ -1,53 +1,11 @@ | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolume | ||||
| metadata: | ||||
|   name: gitea-data-nfs | ||||
| spec: | ||||
|   capacity: | ||||
|     storage: "10Gi" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   nfs: | ||||
|     path: /export/kluster/gitea/data | ||||
|     server: 192.168.1.157 | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolumeClaim | ||||
| apiVersion: v1 | ||||
| metadata: | ||||
|   name: gitea-data-nfs | ||||
|   name: gitea-data | ||||
| spec: | ||||
|   storageClassName: "" | ||||
|   storageClassName: "nfs-client" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: "10Gi" | ||||
|   volumeName: gitea-data-nfs | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolume | ||||
| metadata: | ||||
|   name: gitea-postgresql-data-nfs | ||||
| spec: | ||||
|   capacity: | ||||
|     storage: "5Gi" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   nfs: | ||||
|     path: /export/kluster/gitea/postgres | ||||
|     server: 192.168.1.157 | ||||
|  | ||||
| --- | ||||
| apiVersion: v1 | ||||
| kind: PersistentVolumeClaim | ||||
| metadata: | ||||
|   name: gitea-postgresql-data-nfs | ||||
| spec: | ||||
|   storageClassName: "" | ||||
|   accessModes: | ||||
|     - ReadWriteOnce | ||||
|   resources: | ||||
|     requests: | ||||
|       storage: "5Gi" | ||||
|   volumeName: gitea-postgresql-data-nfs | ||||
|       storage: 50Gi | ||||
|   | ||||
| @@ -54,17 +54,12 @@ ingress: | ||||
|  | ||||
| ## @param resources Kubernetes resources | ||||
| resources: | ||||
|   {} | ||||
|   # We usually recommend not to specify default resources and to leave this as a conscious | ||||
|   # choice for the user. This also increases chances charts run on environments with little | ||||
|   # resources, such as Minikube. If you do want to specify resources, uncomment the following | ||||
|   # lines, adjust them as necessary, and remove the curly braces after 'resources:'. | ||||
|   # limits: | ||||
|   #   cpu: 100m | ||||
|   #   memory: 128Mi | ||||
|   # requests: | ||||
|   #   cpu: 100m | ||||
|   #   memory: 128Mi | ||||
|   limits: | ||||
|     cpu: 1 | ||||
|     memory: 1Gi | ||||
|   requests: | ||||
|     cpu: 100m | ||||
|     memory: 128Mi | ||||
|  | ||||
|  | ||||
| ## @section Persistence | ||||
| @@ -72,7 +67,7 @@ persistence: | ||||
|   enabled: true | ||||
|   create: false | ||||
|   mount: true | ||||
|   claimName: gitea-data-nfs | ||||
|   claimName: gitea-data | ||||
|  | ||||
|  | ||||
|  | ||||
| @@ -86,6 +81,7 @@ persistence: | ||||
| signing: | ||||
|   enabled: false | ||||
|  | ||||
|      | ||||
| ## @section Gitea | ||||
| # | ||||
| gitea: | ||||
| @@ -119,60 +115,49 @@ gitea: | ||||
|       TYPE: level | ||||
|     indexer: | ||||
|       ISSUE_INDEXER_TYPE: bleve | ||||
|       REPO_INDEXER_ENABLED: true | ||||
|       REPO_INDEXER_ENABLED: false | ||||
|  | ||||
|   oauth: | ||||
|     - name: authelia | ||||
|       provider: openidConnect | ||||
|       autoDiscoverUrl: https://auth.kluster.moll.re/.well-known/openid-configuration | ||||
|       scopes: openid email profile groups | ||||
|       existingSecret: gitea-oauth | ||||
|       required-claim-name: groups | ||||
|       required-claim-value: gitea | ||||
|       admin-group: apps_admin | ||||
|  | ||||
|    | ||||
|  | ||||
|   ## @param gitea.ssh.logLevel Configure OpenSSH's log level. Only available for root-based Gitea image. | ||||
|   ssh: | ||||
|     logLevel: "INFO" | ||||
|   # since we want to reuse the postgres secret, we cannot directly use it in | ||||
|   # additionalConfigSources: | ||||
|   #   - secret: | ||||
|   #       secretName: postgres-password | ||||
|   # but instead set the ENV variables | ||||
|   additionalConfigFromEnvs: | ||||
|     - name: GITEA__DATABASE__DB_TYPE | ||||
|       value: postgres | ||||
|     - name: GITEA__DATABASE__HOST | ||||
|       value: gitea-postgres-rw:5432 | ||||
|     - name: GITEA__DATABASE__NAME | ||||
|       valueFrom: | ||||
|         secretKeyRef: | ||||
|           name: postgres-password | ||||
|           key: database | ||||
|     - name: GITEA__DATABASE__PASSWD | ||||
|       valueFrom: | ||||
|         secretKeyRef: | ||||
|           name: postgres-password | ||||
|           key: password | ||||
|     - name: GITEA__DATABASE__USER | ||||
|       valueFrom: | ||||
|         secretKeyRef: | ||||
|           name: postgres-password | ||||
|           key: username | ||||
|  | ||||
|  | ||||
|  | ||||
| ## @section PostgreSQL | ||||
| # | ||||
| ## @param postgresql.enabled Enable PostgreSQL | ||||
| ## @param postgresql.global.postgresql.auth.password Password for the `gitea` user (overrides `auth.password`) | ||||
| ## @param postgresql.global.postgresql.auth.database Name for a custom database to create (overrides `auth.database`) | ||||
| ## @param postgresql.global.postgresql.auth.username Name for a custom user to create (overrides `auth.username`) | ||||
| ## @param postgresql.global.postgresql.service.ports.postgresql PostgreSQL service port (overrides `service.ports.postgresql`) | ||||
| ## @param postgresql.primary.persistence.size PVC Storage Request for PostgreSQL volume | ||||
| postgresql: | ||||
|   enabled: true | ||||
|   image: | ||||
|     tag: 11 | ||||
|   # diagnosticMode: | ||||
|   #   enabled: true | ||||
|   containerSecurityContext: | ||||
|     runAsUser: 0 | ||||
|   global: | ||||
|     postgresql: | ||||
|       auth: | ||||
|         password: gitea | ||||
|         database: gitea | ||||
|         username: gitea | ||||
|       service: | ||||
|         ports: | ||||
|           postgresql: 5432 | ||||
|   primary: | ||||
|     persistence: | ||||
|       size: 10Gi | ||||
|       existingClaim: gitea-postgresql-data-nfs | ||||
|       # mountPath: /bitnami/postgresql/data | ||||
|  | ||||
|  | ||||
|  | ||||
| redis-cluster: | ||||
|   enabled: false | ||||
|  | ||||
| postgresql-ha: | ||||
|   enabled: false | ||||
|  | ||||
| # By default, removed or moved settings that still remain in a user defined values.yaml will cause Helm to fail running the install/update. | ||||
| # Set it to false to skip this basic validation check. | ||||
| ## @section Advanced | ||||
| ## @param checkDeprecation Set it to false to skip this basic validation check. | ||||
| ## @param test.enabled Set it to false to disable test-connection Pod. | ||||
| ## @param test.image.name Image name for the wget container used in the test-connection Pod. | ||||
| ## @param test.image.tag Image tag for the wget container used in the test-connection Pod. | ||||
| checkDeprecation: true | ||||
| redis-cluster: | ||||
|   enabled: false | ||||
|   | ||||
| @@ -2,29 +2,27 @@ apiVersion: kustomize.config.k8s.io/v1beta1 | ||||
| kind: Kustomization | ||||
| resources: | ||||
|   - namespace.yaml | ||||
|   # postgres values | ||||
|   - postgres-password.sealedsecret.yaml | ||||
|   - postgres.yaml | ||||
|   # gitea values | ||||
|   - gitea.pvc.yaml | ||||
|   - gitea.ingress.yaml | ||||
|   - gitea-oauth.sealedsecret.yaml | ||||
|   - gitea.servicemonitor.yaml | ||||
|   - drone-kube-runner.deployment.yaml | ||||
|   - drone-server.deployment.yaml | ||||
|   - drone-server.sealedsecret.yaml | ||||
|   # actions runner values | ||||
|   - actions.deployment.yaml | ||||
|   - actions.sealedsecret.yaml | ||||
|   - actions.rbac.yaml | ||||
|  | ||||
|  | ||||
|  | ||||
| namespace: gitea | ||||
|  | ||||
| images: | ||||
|   - name: actions-runner | ||||
|     newName: ghcr.io/christopherhx/gitea-actions-runner | ||||
|     newTag: v0.0.11 | ||||
|  | ||||
|  | ||||
| helmCharts: | ||||
|   - name: gitea | ||||
|     namespace: gitea # needs to be set explicitly for svc to be referenced correctly | ||||
|     releaseName: gitea | ||||
|     version: 10.1.4 | ||||
|     version: 10.4.1 | ||||
|     valuesFile: gitea.values.yaml | ||||
|     repo: https://dl.gitea.io/charts/ | ||||
|   | ||||
Some files were not shown because too many files have changed in this diff Show More
		Reference in New Issue
	
	Block a user