Compare commits

..

1 Commits

Author SHA1 Message Date
Gitea Actions Bot fe4c90debc Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Successful in 31s
Generated by CI/CD workflow on 2026-05-05 18:06:25

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-05 18:06:25 +00:00
4 changed files with 27 additions and 19 deletions
-1
View File
@@ -13,7 +13,6 @@ permissions:
jobs:
terraform:
name: 'Terraform'
if: false
runs-on: ubuntu-latest
environment: production
+1 -1
View File
@@ -22,7 +22,7 @@ spec:
claimName: web-petting-data
containers:
- name: web-petting
image: ultradesu/web-petting:v0.1.2
image: ultradesu/web-petting:0.1.0
imagePullPolicy: Always
args:
# - "tail"
+9 -17
View File
@@ -1,4 +1,5 @@
alertmanager:
config:
global:
@@ -108,27 +109,18 @@ grafana:
grafana.ini:
auth:
signout_redirect_url: https://auth.hexor.cy/auth/realms/hexor/protocol/openid-connect/logout?post_logout_redirect_uri=https%3A%2F%2Fgf.hexor.cy%2Flogin&client_id=Grafana
oauth_allow_insecure_email_lookup: true
signout_redirect_url: https://idm.hexor.cy/application/o/grafana/end-session/
auth.generic_oauth:
name: Keycloak
name: authentik
enabled: true
scopes: "openid profile email"
allow_sign_up: true
auth_url: https://auth.hexor.cy/auth/realms/hexor/protocol/openid-connect/auth
token_url: https://auth.hexor.cy/auth/realms/hexor/protocol/openid-connect/token
api_url: https://auth.hexor.cy/auth/realms/hexor/protocol/openid-connect/userinfo
email_attribute_path: email
login_attribute_path: preferred_username
name_attribute_path: name
auth_url: https://idm.hexor.cy/application/o/authorize/
token_url: https://idm.hexor.cy/application/o/token/
api_url: https://idm.hexor.cy/application/o/userinfo/
role_attribute_path: >-
contains(groups[*], 'hexor-admin') && 'Admin' ||
contains(groups[*], 'hexor-guest') && 'Viewer' ||
'Viewer'
role_attribute_strict: false
log:
level: debug
filters: "oauth.generic_oauth:debug"
contains(groups, 'Grafana Admin') && 'Admin' ||
contains(groups, 'Grafana Editors') && 'Editor' ||
contains(groups, 'Grafana Viewer') && 'Viewer'
database:
type: postgres
host: psql.psql.svc:5432
@@ -43,6 +43,23 @@ proxy_applications = {
access_groups = ["admins"]
}
"kubernetes-secrets" = {
name = "kubernetes-secrets"
slug = "k8s-secret"
group = "Core"
external_host = "https://pass.hexor.cy"
internal_host = "http://secret-reader.k8s-secret.svc:80"
internal_host_ssl_validation = false
meta_description = ""
skip_path_regex = <<-EOT
/webhook
EOT
meta_icon = "https://img.icons8.com/ios-filled/50/password.png"
mode = "proxy"
outpost = "kubernetes-outpost"
create_group = true
access_groups = ["admins"]
}
"mtproxy-links" = {
name = "mtproxy-links"
slug = "mtproxy-links"