Compare commits

..

1 Commits

Author SHA1 Message Date
Gitea Actions Bot a8599bf3fb Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Has been skipped
Generated by CI/CD workflow on 2026-05-11 11:57:58

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-11 11:57:58 +00:00
7 changed files with 15 additions and 39 deletions
+1 -1
View File
@@ -1,5 +1,5 @@
--- ---
image: &image 'pasarguard/panel:v4.0.2' image: &image 'pasarguard/panel:v3.1.0'
apiVersion: apps/v1 apiVersion: apps/v1
kind: Deployment kind: Deployment
metadata: metadata:
+1 -4
View File
@@ -6,8 +6,6 @@ metadata:
app: web-petting app: web-petting
spec: spec:
replicas: 1 replicas: 1
strategy:
type: Recreate
selector: selector:
matchLabels: matchLabels:
app: web-petting app: web-petting
@@ -18,14 +16,13 @@ spec:
spec: spec:
nodeSelector: nodeSelector:
kubernetes.io/os: linux kubernetes.io/os: linux
kubernetes.io/hostname: master.tail2fe2d.ts.net
volumes: volumes:
- name: data - name: data
persistentVolumeClaim: persistentVolumeClaim:
claimName: web-petting-data claimName: web-petting-data
containers: containers:
- name: web-petting - name: web-petting
image: ultradesu/web-petting:latest image: ultradesu/web-petting:v0.1.2
imagePullPolicy: Always imagePullPolicy: Always
args: args:
# - "tail" # - "tail"
-13
View File
@@ -20,21 +20,8 @@ spec:
name: web-petting name: web-petting
port: port:
number: 80 number: 80
- host: xn--l1acako8eb.xn--p1ai
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: web-petting
port:
number: 80
tls: tls:
- secretName: web-petting-tls - secretName: web-petting-tls
hosts: hosts:
- pet.hexor.cy - pet.hexor.cy
- secretName: web-petting-murnyanya-tls
hosts:
- xn--l1acako8eb.xn--p1ai
+9 -17
View File
@@ -23,22 +23,14 @@ configs:
admin.enabled: false admin.enabled: false
statusbadge.enabled: true statusbadge.enabled: true
timeout.reconciliation: 60s timeout.reconciliation: 60s
dex.config: | oidc.config: |
connectors: name: Keycloak
- type: oidc issuer: https://auth.hexor.cy/auth/realms/hexor
id: keycloak clientID: $oidc-creds:id
name: Keycloak clientSecret: $oidc-creds:secret
config: requestedScopes: ["openid", "profile", "email", "offline_access"]
issuer: https://auth.hexor.cy/auth/realms/hexor requestedIDTokenClaims: {"groups": {"essential": true}}
clientID: $oidc-creds:id refreshTokenThreshold: 2m
clientSecret: $oidc-creds:secret
insecureEnableGroups: true
scopes:
- openid
- profile
- email
- offline_access
getUserInfo: true
rbac: rbac:
create: true create: true
policy.default: "" policy.default: ""
@@ -72,7 +64,7 @@ dex:
replicas: 1 replicas: 1
nodeSelector: nodeSelector:
<<: *nodeSelector <<: *nodeSelector
enabled: true enabled: false
# Standard Redis disabled because Redis HA is enabled # Standard Redis disabled because Redis HA is enabled
redis: redis:
-2
View File
@@ -35,6 +35,4 @@ spec:
dnsZones: dnsZones:
- "*.hexor.cy" - "*.hexor.cy"
- "hexor.cy" - "hexor.cy"
- "*.xn--l1acako8eb.xn--p1ai"
- "xn--l1acako8eb.xn--p1ai"
+3 -1
View File
@@ -167,7 +167,9 @@ resource "keycloak_openid_client_optional_scopes" "oauth2_app" {
} }
resource "keycloak_group" "oauth2_app" { resource "keycloak_group" "oauth2_app" {
for_each = var.oauth2_applications for_each = {
for k, v in var.oauth2_applications : k => v if length(v.allowed_groups) > 0
}
realm_id = keycloak_realm.hexor.id realm_id = keycloak_realm.hexor.id
name = "app-${each.key}" name = "app-${each.key}"
+1 -1
View File
@@ -23,7 +23,7 @@ oauth2_applications = {
post_logout_redirect_uris = ["https://gt.hexor.cy/*"] post_logout_redirect_uris = ["https://gt.hexor.cy/*"]
} }
ArgoCD = { ArgoCD = {
redirect_uris = ["https://ag.hexor.cy/api/dex/callback"] redirect_uris = ["https://ag.hexor.cy/auth/callback"]
web_origins = ["https://ag.hexor.cy"] web_origins = ["https://ag.hexor.cy"]
post_logout_redirect_uris = ["https://ag.hexor.cy/*"] post_logout_redirect_uris = ["https://ag.hexor.cy/*"]
extra_optional_scopes = ["offline_access"] extra_optional_scopes = ["offline_access"]