Compare commits

...

11 Commits

Author SHA1 Message Date
Gitea Actions Bot 4dde5bf38b Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Failing after 21s
Generated by CI/CD workflow on 2026-05-05 13:31:40

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-05 13:31:40 +00:00
Ultradesu 37c77a899d Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 16s
Auto-update README / Generate README and Create MR (push) Successful in 19s
Check with kubeconform / lint (push) Successful in 29s
2026-05-05 14:31:10 +01:00
Ultradesu f84f4ff972 Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 9s
Check with kubeconform / lint (push) Successful in 10s
Auto-update README / Generate README and Create MR (push) Successful in 23s
2026-05-05 14:29:58 +01:00
Ultradesu 897498eedb Fixed gitea runner
Auto-update README / Generate README and Create MR (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 18s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 11m46s
2026-05-05 14:28:00 +01:00
Ultradesu 6202f0f24c Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 9s
Check with kubeconform / lint (push) Successful in 6s
Auto-update README / Generate README and Create MR (push) Successful in 11s
2026-05-05 14:26:32 +01:00
Ultradesu 1746d210b1 Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 9s
Check with kubeconform / lint (push) Successful in 11s
Auto-update README / Generate README and Create MR (push) Successful in 13s
2026-05-05 14:23:31 +01:00
Ultradesu 8ee4d7ebbf Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 31s
Check with kubeconform / lint (push) Failing after 34s
Auto-update README / Generate README and Create MR (push) Failing after 12m53s
2026-05-05 14:01:46 +01:00
Ultradesu ad7fce508f Fixed gitea runner
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 23s
Auto-update README / Generate README and Create MR (push) Failing after 26s
Check with kubeconform / lint (push) Failing after 34s
2026-05-05 13:46:52 +01:00
ab 204f794b5d Update k8s/apps/gitea/deployment.yaml
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 31s
Check with kubeconform / lint (push) Has been cancelled
Auto-update README / Generate README and Create MR (push) Failing after 25s
2026-05-05 12:42:45 +00:00
ab 5a7e32336e Update k8s/apps/gitea/deployment.yaml
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Failing after 30s
Check with kubeconform / lint (push) Failing after 34s
Auto-update README / Generate README and Create MR (push) Failing after 31s
2026-05-05 12:41:57 +00:00
Ultradesu d3ee23c3de Added oauth2 proxy
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 15s
Check with kubeconform / lint (push) Successful in 16s
Auto-update README / Generate README and Create MR (push) Successful in 13s
2026-05-04 18:25:42 +01:00
3 changed files with 29 additions and 47 deletions
+6
View File
@@ -17,9 +17,12 @@ ArgoCD homelab project
| **cert-manager** | [![cert-manager](https://ag.hexor.cy/api/badge?name=cert-manager&revision=true)](https://ag.hexor.cy/applications/argocd/cert-manager) | | **cert-manager** | [![cert-manager](https://ag.hexor.cy/api/badge?name=cert-manager&revision=true)](https://ag.hexor.cy/applications/argocd/cert-manager) |
| **external-secrets** | [![external-secrets](https://ag.hexor.cy/api/badge?name=external-secrets&revision=true)](https://ag.hexor.cy/applications/argocd/external-secrets) | | **external-secrets** | [![external-secrets](https://ag.hexor.cy/api/badge?name=external-secrets&revision=true)](https://ag.hexor.cy/applications/argocd/external-secrets) |
| **gpu** | [![gpu](https://ag.hexor.cy/api/badge?name=gpu&revision=true)](https://ag.hexor.cy/applications/argocd/gpu) | | **gpu** | [![gpu](https://ag.hexor.cy/api/badge?name=gpu&revision=true)](https://ag.hexor.cy/applications/argocd/gpu) |
| **kanidm** | [![kanidm](https://ag.hexor.cy/api/badge?name=kanidm&revision=true)](https://ag.hexor.cy/applications/argocd/kanidm) |
| **keycloak** | [![keycloak](https://ag.hexor.cy/api/badge?name=keycloak&revision=true)](https://ag.hexor.cy/applications/argocd/keycloak) |
| **kube-system-custom** | [![kube-system-custom](https://ag.hexor.cy/api/badge?name=kube-system-custom&revision=true)](https://ag.hexor.cy/applications/argocd/kube-system-custom) | | **kube-system-custom** | [![kube-system-custom](https://ag.hexor.cy/api/badge?name=kube-system-custom&revision=true)](https://ag.hexor.cy/applications/argocd/kube-system-custom) |
| **kubernetes-dashboard** | [![kubernetes-dashboard](https://ag.hexor.cy/api/badge?name=kubernetes-dashboard&revision=true)](https://ag.hexor.cy/applications/argocd/kubernetes-dashboard) | | **kubernetes-dashboard** | [![kubernetes-dashboard](https://ag.hexor.cy/api/badge?name=kubernetes-dashboard&revision=true)](https://ag.hexor.cy/applications/argocd/kubernetes-dashboard) |
| **longhorn** | [![longhorn](https://ag.hexor.cy/api/badge?name=longhorn&revision=true)](https://ag.hexor.cy/applications/argocd/longhorn) | | **longhorn** | [![longhorn](https://ag.hexor.cy/api/badge?name=longhorn&revision=true)](https://ag.hexor.cy/applications/argocd/longhorn) |
| **oauth2-proxy** | [![oauth2-proxy](https://ag.hexor.cy/api/badge?name=oauth2-proxy&revision=true)](https://ag.hexor.cy/applications/argocd/oauth2-proxy) |
| **postgresql** | [![postgresql](https://ag.hexor.cy/api/badge?name=postgresql&revision=true)](https://ag.hexor.cy/applications/argocd/postgresql) | | **postgresql** | [![postgresql](https://ag.hexor.cy/api/badge?name=postgresql&revision=true)](https://ag.hexor.cy/applications/argocd/postgresql) |
| **prom-stack** | [![prom-stack](https://ag.hexor.cy/api/badge?name=prom-stack&revision=true)](https://ag.hexor.cy/applications/argocd/prom-stack) | | **prom-stack** | [![prom-stack](https://ag.hexor.cy/api/badge?name=prom-stack&revision=true)](https://ag.hexor.cy/applications/argocd/prom-stack) |
| **system-upgrade** | [![system-upgrade](https://ag.hexor.cy/api/badge?name=system-upgrade&revision=true)](https://ag.hexor.cy/applications/argocd/system-upgrade) | | **system-upgrade** | [![system-upgrade](https://ag.hexor.cy/api/badge?name=system-upgrade&revision=true)](https://ag.hexor.cy/applications/argocd/system-upgrade) |
@@ -62,9 +65,12 @@ ArgoCD homelab project
| **sonarr-stack** | [![sonarr-stack](https://ag.hexor.cy/api/badge?name=sonarr-stack&revision=true)](https://ag.hexor.cy/applications/argocd/sonarr-stack) | | **sonarr-stack** | [![sonarr-stack](https://ag.hexor.cy/api/badge?name=sonarr-stack&revision=true)](https://ag.hexor.cy/applications/argocd/sonarr-stack) |
| **stirling-pdf** | [![stirling-pdf](https://ag.hexor.cy/api/badge?name=stirling-pdf&revision=true)](https://ag.hexor.cy/applications/argocd/stirling-pdf) | | **stirling-pdf** | [![stirling-pdf](https://ag.hexor.cy/api/badge?name=stirling-pdf&revision=true)](https://ag.hexor.cy/applications/argocd/stirling-pdf) |
| **syncthing** | [![syncthing](https://ag.hexor.cy/api/badge?name=syncthing&revision=true)](https://ag.hexor.cy/applications/argocd/syncthing) | | **syncthing** | [![syncthing](https://ag.hexor.cy/api/badge?name=syncthing&revision=true)](https://ag.hexor.cy/applications/argocd/syncthing) |
| **teamspeak** | [![teamspeak](https://ag.hexor.cy/api/badge?name=teamspeak&revision=true)](https://ag.hexor.cy/applications/argocd/teamspeak) |
| **tg-bots** | [![tg-bots](https://ag.hexor.cy/api/badge?name=tg-bots&revision=true)](https://ag.hexor.cy/applications/argocd/tg-bots) | | **tg-bots** | [![tg-bots](https://ag.hexor.cy/api/badge?name=tg-bots&revision=true)](https://ag.hexor.cy/applications/argocd/tg-bots) |
| **vaultwarden** | [![vaultwarden](https://ag.hexor.cy/api/badge?name=vaultwarden&revision=true)](https://ag.hexor.cy/applications/argocd/vaultwarden) | | **vaultwarden** | [![vaultwarden](https://ag.hexor.cy/api/badge?name=vaultwarden&revision=true)](https://ag.hexor.cy/applications/argocd/vaultwarden) |
| **vpn** | [![vpn](https://ag.hexor.cy/api/badge?name=vpn&revision=true)](https://ag.hexor.cy/applications/argocd/vpn) | | **vpn** | [![vpn](https://ag.hexor.cy/api/badge?name=vpn&revision=true)](https://ag.hexor.cy/applications/argocd/vpn) |
| **web-petting** | [![web-petting](https://ag.hexor.cy/api/badge?name=web-petting&revision=true)](https://ag.hexor.cy/applications/argocd/web-petting) |
| **wedding** | [![wedding](https://ag.hexor.cy/api/badge?name=wedding&revision=true)](https://ag.hexor.cy/applications/argocd/wedding) |
| **xandikos** | [![xandikos](https://ag.hexor.cy/api/badge?name=xandikos&revision=true)](https://ag.hexor.cy/applications/argocd/xandikos) | | **xandikos** | [![xandikos](https://ag.hexor.cy/api/badge?name=xandikos&revision=true)](https://ag.hexor.cy/applications/argocd/xandikos) |
</td> </td>
+22 -17
View File
@@ -70,7 +70,7 @@ kind: Deployment
metadata: metadata:
name: gitea-runner name: gitea-runner
spec: spec:
replicas: 1 replicas: 2
selector: selector:
matchLabels: matchLabels:
app: gitea-runner app: gitea-runner
@@ -79,11 +79,19 @@ spec:
labels: labels:
app: gitea-runner app: gitea-runner
spec: spec:
dnsConfig:
options:
- name: ndots
value: "2"
tolerations: tolerations:
- key: workload - key: workload
operator: Equal operator: Equal
value: desktop value: desktop
effect: NoSchedule effect: NoSchedule
- key: workload
operator: Equal
value: ai
effect: NoSchedule
volumes: volumes:
- name: docker-sock - name: docker-sock
hostPath: hostPath:
@@ -93,6 +101,12 @@ spec:
emptyDir: emptyDir:
sizeLimit: 30Gi sizeLimit: 30Gi
affinity: affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchLabels:
app: gitea-runner
topologyKey: kubernetes.io/hostname
nodeAffinity: nodeAffinity:
preferredDuringSchedulingIgnoredDuringExecution: preferredDuringSchedulingIgnoredDuringExecution:
- weight: 100 - weight: 100
@@ -102,6 +116,7 @@ spec:
operator: In operator: In
values: values:
- uk-desktop.tail2fe2d.ts.net - uk-desktop.tail2fe2d.ts.net
- ai.tail2fe2d.ts.net
- weight: 50 - weight: 50
preference: preference:
matchExpressions: matchExpressions:
@@ -109,22 +124,7 @@ spec:
operator: In operator: In
values: values:
- home.homenet - home.homenet
- weight: 30
preference:
matchExpressions:
- key: kubernetes.io/hostname
operator: In
values:
- master.tail2fe2d.ts.net
- weight: 10
preference:
matchExpressions:
- key: kubernetes.io/hostname
operator: In
values:
- it.tail2fe2d.ts.net - it.tail2fe2d.ts.net
- ch.tail2fe2d.ts.net
- us.tail2fe2d.ts.net
containers: containers:
- name: gitea-runner - name: gitea-runner
image: gitea/act_runner:nightly image: gitea/act_runner:nightly
@@ -144,13 +144,18 @@ spec:
mountPath: /data mountPath: /data
env: env:
- name: GITEA_INSTANCE_URL - name: GITEA_INSTANCE_URL
#value: "http://gitea.gitea.svc.cluster.local"
value: "https://gt.hexor.cy" value: "https://gt.hexor.cy"
- name: GITEA_RUNNER_REGISTRATION_TOKEN - name: GITEA_RUNNER_REGISTRATION_TOKEN
valueFrom: valueFrom:
secretKeyRef: secretKeyRef:
name: gitea-runner-act-runner-secrets name: gitea-runner-act-runner-secrets
key: token key: token
- name: NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
- name: GITEA_RUNNER_NAME - name: GITEA_RUNNER_NAME
value: "k8s-runner" value: "$(NODE_NAME)"
- name: GITEA_RUNNER_LABELS - name: GITEA_RUNNER_LABELS
value: "ubuntu-latest:docker://ghcr.io/catthehacker/ubuntu:act-latest,ubuntu-22.04:docker://ghcr.io/catthehacker/ubuntu:act-22.04,ubuntu-20.04:docker://ghcr.io/catthehacker/ubuntu:act-20.04" value: "ubuntu-latest:docker://ghcr.io/catthehacker/ubuntu:act-latest,ubuntu-22.04:docker://ghcr.io/catthehacker/ubuntu:act-22.04,ubuntu-20.04:docker://ghcr.io/catthehacker/ubuntu:act-20.04"
+1 -30
View File
@@ -5,7 +5,7 @@ metadata:
name: keycloak-auth name: keycloak-auth
spec: spec:
forwardAuth: forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80/oauth2/auth address: http://oauth2-proxy.oauth2-proxy.svc:80
trustForwardHeader: true trustForwardHeader: true
authResponseHeaders: authResponseHeaders:
- X-Auth-Request-User - X-Auth-Request-User
@@ -13,29 +13,6 @@ spec:
- X-Auth-Request-Groups - X-Auth-Request-Groups
--- ---
apiVersion: traefik.io/v1alpha1 apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth-redirect
spec:
errors:
status:
- "401"
service:
name: oauth2-proxy-redirect
port: 80
query: /oauth2/sign_in?rd={url}
---
apiVersion: v1
kind: Service
metadata:
name: oauth2-proxy-redirect
spec:
type: ExternalName
externalName: oauth2-proxy.oauth2-proxy.svc.cluster.local
ports:
- port: 80
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute kind: IngressRoute
metadata: metadata:
name: secret-reader name: secret-reader
@@ -45,16 +22,10 @@ spec:
entryPoints: entryPoints:
- websecure - websecure
routes: routes:
- match: Host(`secret-reader.hexor.cy`) && PathPrefix(`/oauth2/`)
kind: Rule
services:
- name: oauth2-proxy-redirect
port: 80
- match: Host(`secret-reader.hexor.cy`) - match: Host(`secret-reader.hexor.cy`)
kind: Rule kind: Rule
middlewares: middlewares:
- name: keycloak-auth - name: keycloak-auth
- name: keycloak-auth-redirect
services: services:
- name: secret-reader - name: secret-reader
port: 80 port: 80