Compare commits

..

13 Commits

Author SHA1 Message Date
Gitea Actions Bot 6c2b9bdcb8 Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Failing after 14m24s
Generated by CI/CD workflow on 2026-05-05 13:30:25

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-05 13:30:25 +00:00
Ultradesu f84f4ff972 Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 9s
Check with kubeconform / lint (push) Successful in 10s
Auto-update README / Generate README and Create MR (push) Successful in 23s
2026-05-05 14:29:58 +01:00
Ultradesu 897498eedb Fixed gitea runner
Auto-update README / Generate README and Create MR (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 18s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 11m46s
2026-05-05 14:28:00 +01:00
Ultradesu 6202f0f24c Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 9s
Check with kubeconform / lint (push) Successful in 6s
Auto-update README / Generate README and Create MR (push) Successful in 11s
2026-05-05 14:26:32 +01:00
Ultradesu 1746d210b1 Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 9s
Check with kubeconform / lint (push) Successful in 11s
Auto-update README / Generate README and Create MR (push) Successful in 13s
2026-05-05 14:23:31 +01:00
Ultradesu 8ee4d7ebbf Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 31s
Check with kubeconform / lint (push) Failing after 34s
Auto-update README / Generate README and Create MR (push) Failing after 12m53s
2026-05-05 14:01:46 +01:00
Ultradesu ad7fce508f Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 23s
Auto-update README / Generate README and Create MR (push) Failing after 26s
Check with kubeconform / lint (push) Failing after 34s
2026-05-05 13:46:52 +01:00
ab 204f794b5d Update k8s/apps/gitea/deployment.yaml
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 31s
Check with kubeconform / lint (push) Has been cancelled
Auto-update README / Generate README and Create MR (push) Failing after 25s
2026-05-05 12:42:45 +00:00
ab 5a7e32336e Update k8s/apps/gitea/deployment.yaml
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 30s
Check with kubeconform / lint (push) Failing after 34s
Auto-update README / Generate README and Create MR (push) Failing after 31s
2026-05-05 12:41:57 +00:00
Ultradesu d3ee23c3de Added oauth2 proxy
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 15s
Check with kubeconform / lint (push) Successful in 16s
Auto-update README / Generate README and Create MR (push) Successful in 13s
2026-05-04 18:25:42 +01:00
Ultradesu 0df274c0b2 Added oauth2 proxy
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 14s
Check with kubeconform / lint (push) Successful in 14s
Auto-update README / Generate README and Create MR (push) Successful in 12s
2026-05-04 18:24:04 +01:00
Ultradesu 658ec19ff1 Added oauth2 proxy
Check with kubeconform / lint (push) Successful in 14s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 19s
Auto-update README / Generate README and Create MR (push) Successful in 19s
2026-05-04 18:21:44 +01:00
Ultradesu eb27dcf65b Added oauth2 proxy
Check with kubeconform / lint (push) Successful in 15s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 24s
Auto-update README / Generate README and Create MR (push) Successful in 35s
2026-05-04 18:19:41 +01:00
4 changed files with 34 additions and 33 deletions
+18 -17
View File
@@ -70,7 +70,7 @@ kind: Deployment
metadata:
name: gitea-runner
spec:
replicas: 1
replicas: 2
selector:
matchLabels:
app: gitea-runner
@@ -79,6 +79,10 @@ spec:
labels:
app: gitea-runner
spec:
dnsConfig:
options:
- name: ndots
value: "2"
tolerations:
- key: workload
operator: Equal
@@ -93,6 +97,12 @@ spec:
emptyDir:
sizeLimit: 30Gi
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchLabels:
app: gitea-runner
topologyKey: kubernetes.io/hostname
nodeAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- weight: 100
@@ -102,6 +112,7 @@ spec:
operator: In
values:
- uk-desktop.tail2fe2d.ts.net
- ai.tail2fe2d.ts.net
- weight: 50
preference:
matchExpressions:
@@ -109,22 +120,7 @@ spec:
operator: In
values:
- home.homenet
- weight: 30
preference:
matchExpressions:
- key: kubernetes.io/hostname
operator: In
values:
- master.tail2fe2d.ts.net
- weight: 10
preference:
matchExpressions:
- key: kubernetes.io/hostname
operator: In
values:
- it.tail2fe2d.ts.net
- ch.tail2fe2d.ts.net
- us.tail2fe2d.ts.net
containers:
- name: gitea-runner
image: gitea/act_runner:nightly
@@ -144,13 +140,18 @@ spec:
mountPath: /data
env:
- name: GITEA_INSTANCE_URL
#value: "http://gitea.gitea.svc.cluster.local"
value: "https://gt.hexor.cy"
- name: GITEA_RUNNER_REGISTRATION_TOKEN
valueFrom:
secretKeyRef:
name: gitea-runner-act-runner-secrets
key: token
- name: NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
- name: GITEA_RUNNER_NAME
value: "k8s-runner"
value: "$(NODE_NAME)"
- name: GITEA_RUNNER_LABELS
value: "ubuntu-latest:docker://ghcr.io/catthehacker/ubuntu:act-latest,ubuntu-22.04:docker://ghcr.io/catthehacker/ubuntu:act-22.04,ubuntu-20.04:docker://ghcr.io/catthehacker/ubuntu:act-20.04"
+13 -1
View File
@@ -1,5 +1,18 @@
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: secret-reader
@@ -13,7 +26,6 @@ spec:
kind: Rule
middlewares:
- name: keycloak-auth
namespace: oauth2-proxy
services:
- name: secret-reader
port: 80
-1
View File
@@ -4,7 +4,6 @@ kind: Kustomization
resources:
- app.yaml
- external-secrets.yaml
- middleware.yaml
helmCharts:
- name: oauth2-proxy
+3 -14
View File
@@ -1,14 +1,3 @@
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80/oauth2/auth
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
- Authorization
# Middleware is deployed per-namespace alongside each IngressRoute
# because Traefik does not allow cross-namespace middleware references.
# See k8s/apps/mtproxy/secret-reader-ingress.yaml for example.