Compare commits

..

1 Commits

Author SHA1 Message Date
Gitea Actions Bot f6387bf0b1 Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Failing after 4s
Generated by CI/CD workflow on 2026-05-04 17:13:29

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-04 17:13:29 +00:00
6 changed files with 53 additions and 42 deletions
+17 -22
View File
@@ -70,7 +70,7 @@ kind: Deployment
metadata:
name: gitea-runner
spec:
replicas: 2
replicas: 1
selector:
matchLabels:
app: gitea-runner
@@ -79,19 +79,11 @@ spec:
labels:
app: gitea-runner
spec:
dnsConfig:
options:
- name: ndots
value: "2"
tolerations:
- key: workload
operator: Equal
value: desktop
effect: NoSchedule
- key: workload
operator: Equal
value: ai
effect: NoSchedule
volumes:
- name: docker-sock
hostPath:
@@ -101,12 +93,6 @@ spec:
emptyDir:
sizeLimit: 30Gi
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchLabels:
app: gitea-runner
topologyKey: kubernetes.io/hostname
nodeAffinity:
preferredDuringSchedulingIgnoredDuringExecution:
- weight: 100
@@ -116,7 +102,6 @@ spec:
operator: In
values:
- uk-desktop.tail2fe2d.ts.net
- ai.tail2fe2d.ts.net
- weight: 50
preference:
matchExpressions:
@@ -124,7 +109,22 @@ spec:
operator: In
values:
- home.homenet
- weight: 30
preference:
matchExpressions:
- key: kubernetes.io/hostname
operator: In
values:
- master.tail2fe2d.ts.net
- weight: 10
preference:
matchExpressions:
- key: kubernetes.io/hostname
operator: In
values:
- it.tail2fe2d.ts.net
- ch.tail2fe2d.ts.net
- us.tail2fe2d.ts.net
containers:
- name: gitea-runner
image: gitea/act_runner:nightly
@@ -144,18 +144,13 @@ spec:
mountPath: /data
env:
- name: GITEA_INSTANCE_URL
#value: "http://gitea.gitea.svc.cluster.local"
value: "https://gt.hexor.cy"
- name: GITEA_RUNNER_REGISTRATION_TOKEN
valueFrom:
secretKeyRef:
name: gitea-runner-act-runner-secrets
key: token
- name: NODE_NAME
valueFrom:
fieldRef:
fieldPath: spec.nodeName
- name: GITEA_RUNNER_NAME
value: "$(NODE_NAME)"
value: "k8s-runner"
- name: GITEA_RUNNER_LABELS
value: "ubuntu-latest:docker://ghcr.io/catthehacker/ubuntu:act-latest,ubuntu-22.04:docker://ghcr.io/catthehacker/ubuntu:act-22.04,ubuntu-20.04:docker://ghcr.io/catthehacker/ubuntu:act-20.04"
+1 -13
View File
@@ -1,18 +1,5 @@
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: secret-reader
@@ -26,6 +13,7 @@ spec:
kind: Rule
middlewares:
- name: keycloak-auth
namespace: oauth2-proxy
services:
- name: secret-reader
port: 80
+3 -3
View File
@@ -10,10 +10,10 @@ spec:
template:
type: Opaque
data:
client-id: oauth2-proxy
client-secret: |-
client_id: oauth2-proxy
client_secret: |-
{{ .client_secret }}
cookie-secret: |-
cookie_secret: |-
{{ .cookie_secret }}
data:
- secretKey: client_secret
+1
View File
@@ -4,6 +4,7 @@ kind: Kustomization
resources:
- app.yaml
- external-secrets.yaml
- middleware.yaml
helmCharts:
- name: oauth2-proxy
+14 -3
View File
@@ -1,3 +1,14 @@
# Middleware is deployed per-namespace alongside each IngressRoute
# because Traefik does not allow cross-namespace middleware references.
# See k8s/apps/mtproxy/secret-reader-ingress.yaml for example.
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80/oauth2/auth
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
- Authorization
+17 -1
View File
@@ -1,7 +1,6 @@
replicaCount: 1
config:
existingSecret: oauth2-proxy-creds
configFile: |-
provider = "keycloak-oidc"
provider_display_name = "Keycloak"
@@ -22,6 +21,23 @@ config:
code_challenge_method = "S256"
scope = "openid profile email"
extraEnv:
- name: OAUTH2_PROXY_CLIENT_ID
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: client_id
- name: OAUTH2_PROXY_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: client_secret
- name: OAUTH2_PROXY_COOKIE_SECRET
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: cookie_secret
ingress:
enabled: true
className: traefik