Просмотр исходного кода

Fixes dublicate cert-manager ressources

Simon Kaiser 3 лет назад
Родитель
Сommit
226b673a51
5 измененных файлов: 68 добавлений и 46 удалений
  1. Двоичные данные
      .DS_Store
  2. 61
    0
      README.md
  3. Двоичные данные
      docs/.DS_Store
  4. 1
    0
      docs/img/logo-k3s.svg
  5. 6
    46
      gitops-kaisers-info/templates/sealed-secrets.yaml

Двоичные данные
.DS_Store Просмотреть файл


+ 61
- 0
README.md Просмотреть файл

@@ -0,0 +1,61 @@
1
+# k8s-kaisers-info
2
+
3
+All services deployed for kaisers.info as GitOps-capable k8s deployment
4
+
5
+## Cluster
6
+### k3s
7
+<img src="docs/img/logo-k3s.svg" width="100" height="100" />
8
+
9
+```
10
+curl -sfL https://get.k3s.io | sh -s - server --disable-local-storage
11
+```
12
+
13
+### Cert-Manager CRDs
14
+```
15
+kubectl apply -f https://github.com/cert-manager/cert-manager/releases/download/v1.8.0/cert-manager.yaml
16
+```
17
+
18
+### ArgoCD
19
+```
20
+helm install -n argocd argo-cd argo/argo-cd --create-namespace
21
+kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj-labs/applicationset/v0.3.0/manifests/install.yaml
22
+// version must fit cert-manager in gitops-kaisers-info
23
+kubectl -n argocd get secret argocd-initial-admin-secret -o jsonpath="{.data.password}" | base64 -d
24
+```
25
+
26
+### Longhorn
27
+```
28
+kubectl apply -f application-longhorn-kaisers-info.yaml
29
+```
30
+### GitOps
31
+```
32
+kubectl apply -f application-gitops-kaisers-info.yaml
33
+```
34
+
35
+## Services
36
+### Services
37
+kubectl apply -f application-services-kaisers-info.yaml
38
+### Nextcloud
39
+kubectl apply -f application-cloud-kaisers-info.yaml
40
+### Wordpress
41
+kubectl apply -f application-blog-kaisers-info.yaml
42
+
43
+
44
+
45
+
46
+
47
+https://artifacthub.io/packages/helm/gitea/gitea
48
+helm repo add gitea https://dl.gitea.io/charts
49
+helm install -n gitea --create-namespace gitea gitea/gitea -f gitea/values.ymal
50
+
51
+https://artifacthub.io/packages/helm/argo/argo-cd
52
+helm repo add argo https://argoproj.github.io/argo-helm
53
+helm install -n argocd --create-namespace argo-cd argo/argo-cd -f argo-cd/values.yaml
54
+
55
+https://artifacthub.io/packages/helm/crossplane/crossplane
56
+helm repo add crossplane-stable https://charts.crossplane.io/stable
57
+helm install -n crossplane --create-namespace crossplane crossplane/crossplane -f crossplane/values.yaml
58
+
59
+https://artifacthub.io/packages/helm/goauthentik/authentik
60
+helm repo add goauthentik https://charts.goauthentik.io/
61
+helm install -n authentik --create-namespace authentik goauthentik/authentik -f authentik/values.yaml

Двоичные данные
docs/.DS_Store Просмотреть файл


+ 1
- 0
docs/img/logo-k3s.svg Просмотреть файл

@@ -0,0 +1 @@
1
+<svg id="Layer_1" data-name="Layer 1" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 287.36395 111.36238"><defs><style>.cls-1{fill:#384745;}.cls-2{fill:#ffc61c;}</style></defs><path class="cls-1" d="M163.81972,30.43153H176.3161V44.57461c0,1.57118-.22411,3.89019-.37392,5.6124h.29962a42.96588,42.96588,0,0,1,3.14237-4.71476l12.34717-15.04072h13.46893L188.73818,50.26131l17.36034,30.67946H191.73134L180.0577,59.76513l-3.7416,4.565V80.94077H163.81972Z"/><path class="cls-1" d="M218.29711,65.07792c-1.34708,4.86336,1.42137,7.93143,5.6118,7.93143,4.71415,0,7.10868-3.74161,7.10868-9.0544,0-5.6867-2.84335-7.85591-6.65986-7.85591a9.07616,9.07616,0,0,0-6.21043,2.39453l-5.3877-5.83773L228.399,39.71h-18.5576v-9.2785h31.054v9.80223L228.92268,50.1115c7.63241-.74783,14.89091,4.26533,14.89091,13.99326,0,10.55128-8.60557,17.73487-19.45586,17.73487-10.251,0-18.85662-6.36024-16.6119-15.266Z"/><path class="cls-1" d="M259.30374,64.33009c-.89765,4.04.67354,8.67926,8.60557,8.67926,5.23727,0,7.03378-2.09491,7.03378-4.86458,0-4.18982-4.191-5.23727-9.12991-7.03256-7.40709-2.54556-16.53638-6.13614-16.53638-16.68741,0-9.42831,7.25849-15.19053,19.60445-14.89091,15.11623.2984,19.38156,9.2042,17.73487,16.91152L275.1672,47.49286c.74905-5.83651-1.34708-9.1299-7.25789-9.1299-3.96571,0-6.211,1.4981-6.211,4.64046,0,4.18982,4.04062,5.46138,8.97949,7.18359,7.633,2.54313,16.68619,5.61241,16.68619,16.087,0,9.05439-6.73416,15.56566-19.90407,15.56566-12.34657,0-20.80233-5.68792-19.08073-16.46209Z"/><path class="cls-2" d="M121.58689,0H14.39255A14.43487,14.43487,0,0,0,0,14.39247V96.96991a14.43487,14.43487,0,0,0,14.39255,14.39247H121.58689a14.43487,14.43487,0,0,0,14.39255-14.39247V14.39247A14.43487,14.43487,0,0,0,121.58689,0ZM57.45811,80.98065,31.29766,96.18344A6.99993,6.99993,0,1,1,24.26348,84.079L50.42393,68.87626a6.99993,6.99993,0,1,1,7.03418,12.10439Zm10.2915-23.16221h-.03145A6.99967,6.99967,0,0,1,60.74893,50.788l.13125-30.13725a7.00056,7.00056,0,0,1,6.99931-6.96958h.03145a6.99991,6.99991,0,0,1,6.96924,7.03042l-.13125,30.13725A7.00056,7.00056,0,0,1,67.74961,57.81844Zm46.2875,35.81006a6.997,6.997,0,0,1-9.56211,2.56211L78.27627,81.06473a6.99994,6.99994,0,1,1,7-12.12421L111.475,84.06639A6.99956,6.99956,0,0,1,114.03711,93.6285Z"/></svg>

+ 6
- 46
gitops-kaisers-info/templates/sealed-secrets.yaml Просмотреть файл

@@ -1,13 +1,13 @@
1 1
 apiVersion: argoproj.io/v1alpha1
2 2
 kind: Application
3 3
 metadata:
4
-  name: cert-manager
4
+  name: sealed-secrets
5 5
   namespace: {{ .Values.spec.namespace }}
6 6
   finalizers:
7 7
   - resources-finalizer.argocd.argoproj.io
8 8
 spec:
9 9
   destination:
10
-    namespace: "cert-manager"
10
+    namespace: "sealed-secrets"
11 11
     name: {{ .Values.spec.destination.name }}
12 12
   project: {{ .Values.spec.project }}
13 13
   syncPolicy:
@@ -15,48 +15,8 @@ spec:
15 15
       prune: true
16 16
       selfHeal: true
17 17
   source:
18
-    chart: "cert-manager"
19
-    repoURL: "https://charts.jetstack.io"
20
-    targetRevision: "1.8.0"
18
+    chart: "sealed-secrets"
19
+    repoURL: "https://charts.bitnami.com/bitnami"
20
+    targetRevision: "1.0.3"
21 21
     helm:
22
-      releaseName: cert-manager
23
----
24
-apiVersion: cert-manager.io/v1
25
-kind: ClusterIssuer
26
-metadata:
27
-  name: "letsencrypt-staging"
28
-  namespace: "cert-manager"
29
-spec:
30
-  acme:
31
-    email: "admin@kaisers.info" # replace this
32
-    privateKeySecretRef:
33
-      name: "staging-issuer-account-key"
34
-    server: "https://acme-staging-v02.api.letsencrypt.org/directory"
35
-    solvers:
36
-      - http01:
37
-          ingress:
38
-            class: "traefik"
39
-            ingressTemplate:
40
-              metadata:
41
-                annotations:
42
-                  kubernetes.io/ingress.class: "traefik"
43
----
44
-apiVersion: cert-manager.io/v1
45
-kind: ClusterIssuer
46
-metadata:
47
-  name: "letsencrypt-prod"
48
-  namespace: "cert-manager"
49
-spec:
50
-  acme:
51
-    email: "admin@kaisers.info" # replace this
52
-    privateKeySecretRef:
53
-      name: "prod-issuer-account-key"
54
-    server: "https://acme-v02.api.letsencrypt.org/directory"
55
-    solvers:
56
-      - http01:
57
-          ingress:
58
-            class: "traefik"
59
-            ingressTemplate:
60
-              metadata:
61
-                annotations:
62
-                  kubernetes.io/ingress.class: "traefik"
22
+      releaseName: sealed-secrets