Compare commits

..

6 Commits

Author SHA1 Message Date
Gitea Actions Bot a20fffdc53 Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Failing after 15s
Generated by CI/CD workflow on 2026-04-28 23:12:53

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-04-28 23:12:53 +00:00
ab cd73f5c6be Added tolerations to upgrade plans
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 8s
Check with kubeconform / lint (push) Successful in 8s
Auto-update README / Generate README and Create MR (push) Successful in 14s
2026-04-29 02:12:29 +03:00
ab f3ec319b97 Update k8s/core/system-upgrade/plan.yaml
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 6s
Check with kubeconform / lint (push) Successful in 7s
Auto-update README / Generate README and Create MR (push) Successful in 9s
2026-04-28 22:48:27 +00:00
ab d0b7364e9d pin synapse to master
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 7s
Check with kubeconform / lint (push) Successful in 7s
Auto-update README / Generate README and Create MR (push) Successful in 8s
2026-04-28 20:56:21 +03:00
ab 88194e2149 Fix pasarguard ingress
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 7s
Check with kubeconform / lint (push) Successful in 6s
Auto-update README / Generate README and Create MR (push) Successful in 7s
2026-04-28 16:03:08 +03:00
ab 6159e94a64 Update k8s/apps/pasarguard/deployment.yaml
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 7s
Check with kubeconform / lint (push) Successful in 7s
Auto-update README / Generate README and Create MR (push) Successful in 9s
2026-04-21 12:04:48 +00:00
5 changed files with 50 additions and 11 deletions
+8 -8
View File
@@ -60,8 +60,8 @@ synapse:
storage: storage:
size: 20Gi size: 20Gi
maxUploadSize: 100M maxUploadSize: 100M
# nodeSelector: nodeSelector:
# kubernetes.io/hostname: nas.homenet kubernetes.io/hostname: master.tail2fe2d.ts.net
## Matrix Authentication Service ## Matrix Authentication Service
matrixAuthenticationService: matrixAuthenticationService:
@@ -88,24 +88,24 @@ matrixAuthenticationService:
1-oidc: 1-oidc:
configSecret: matrix-oidc-config configSecret: matrix-oidc-config
configSecretKey: mas-oidc.yaml configSecretKey: mas-oidc.yaml
# nodeSelector: nodeSelector:
# kubernetes.io/hostname: nas.homenet kubernetes.io/hostname: master.tail2fe2d.ts.net
## Element Web client ## Element Web client
elementWeb: elementWeb:
enabled: true enabled: true
ingress: ingress:
host: chat.matrix.hexor.cy host: chat.matrix.hexor.cy
# nodeSelector: nodeSelector:
# kubernetes.io/hostname: nas.homenet kubernetes.io/hostname: master.tail2fe2d.ts.net
## Element Admin panel ## Element Admin panel
elementAdmin: elementAdmin:
enabled: true enabled: true
ingress: ingress:
host: admin.matrix.hexor.cy host: admin.matrix.hexor.cy
# nodeSelector: nodeSelector:
# kubernetes.io/hostname: nas.homenet kubernetes.io/hostname: master.tail2fe2d.ts.net
## Well-known delegation on the base domain (host is derived from serverName) ## Well-known delegation on the base domain (host is derived from serverName)
wellKnownDelegation: wellKnownDelegation:
+4 -1
View File
@@ -34,7 +34,7 @@ spec:
mountPath: /templates/subscription mountPath: /templates/subscription
containers: containers:
- name: pasarguard-web - name: pasarguard-web
image: 'pasarguard/panel:v3.0.2' image: 'pasarguard/panel:v3.0.1'
imagePullPolicy: Always imagePullPolicy: Always
envFrom: envFrom:
- secretRef: - secretRef:
@@ -75,6 +75,9 @@ apiVersion: v1
kind: Service kind: Service
metadata: metadata:
name: pasarguard name: pasarguard
annotations:
traefik.ingress.kubernetes.io/service.serversscheme: https
traefik.ingress.kubernetes.io/service.serverstransport: pasarguard-pasarguard-transport@kubernetescrd
spec: spec:
selector: selector:
app: pasarguard app: pasarguard
+31
View File
@@ -0,0 +1,31 @@
---
apiVersion: traefik.io/v1alpha1
kind: ServersTransport
metadata:
name: pasarguard-transport
spec:
insecureSkipVerify: true
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: pasarguard-ingress
annotations:
traefik.ingress.kubernetes.io/router.entrypoints: websecure
spec:
ingressClassName: traefik
rules:
- host: ps.hexor.cy
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: pasarguard
port:
number: 80
tls:
- secretName: pasarguard-tls
hosts:
- ps.hexor.cy
+1
View File
@@ -9,3 +9,4 @@ resources:
- ./certificate.yaml - ./certificate.yaml
- ./configmap-scripts.yaml - ./configmap-scripts.yaml
- ./servicemonitor.yaml - ./servicemonitor.yaml
- ./ingress.yaml
+6 -2
View File
@@ -7,6 +7,8 @@ metadata:
spec: spec:
concurrency: 1 concurrency: 1
cordon: true cordon: true
tolerations:
- operator: Exists
nodeSelector: nodeSelector:
matchExpressions: matchExpressions:
- key: node-role.kubernetes.io/control-plane - key: node-role.kubernetes.io/control-plane
@@ -16,7 +18,7 @@ spec:
serviceAccountName: system-upgrade serviceAccountName: system-upgrade
upgrade: upgrade:
image: rancher/k3s-upgrade image: rancher/k3s-upgrade
version: v1.35.2+k3s1 version: v1.35.4+k3s1
--- ---
# Agent plan # Agent plan
apiVersion: upgrade.cattle.io/v1 apiVersion: upgrade.cattle.io/v1
@@ -27,6 +29,8 @@ metadata:
spec: spec:
concurrency: 1 concurrency: 1
cordon: true cordon: true
tolerations:
- operator: Exists
nodeSelector: nodeSelector:
matchExpressions: matchExpressions:
- key: node-role.kubernetes.io/control-plane - key: node-role.kubernetes.io/control-plane
@@ -39,4 +43,4 @@ spec:
serviceAccountName: system-upgrade serviceAccountName: system-upgrade
upgrade: upgrade:
image: rancher/k3s-upgrade image: rancher/k3s-upgrade
version: v1.35.2+k3s1 version: v1.35.4+k3s1