diff --git a/kube/clusters/biohazard/flux/kustomization.yaml b/kube/clusters/biohazard/flux/kustomization.yaml index 80b3edaa..d1a2379f 100644 --- a/kube/clusters/biohazard/flux/kustomization.yaml +++ b/kube/clusters/biohazard/flux/kustomization.yaml @@ -152,6 +152,7 @@ resources: - ../../../deploy/apps/fava/ - ../../../deploy/apps/maloja/ - ../../../deploy/apps/silverbullet/ + - ../../../deploy/apps/rimgo/ - ../../../deploy/vm/_kubevirt/ #- ../../../deploy/vm/_base/ - ../../../deploy/vm/ad/ diff --git a/kube/deploy/apps/rimgo/app/es.yaml b/kube/deploy/apps/rimgo/app/es.yaml new file mode 100644 index 00000000..5ca5ac0a --- /dev/null +++ b/kube/deploy/apps/rimgo/app/es.yaml @@ -0,0 +1,23 @@ +--- +# yaml-language-server: $schema=https://crds.jank.ing/external-secrets.io/externalsecret_v1beta1.json +apiVersion: external-secrets.io/v1beta1 +kind: ExternalSecret +metadata: + name: &name rimgo-secrets + namespace: rimgo +spec: + refreshInterval: 1m + secretStoreRef: + kind: ClusterSecretStore + name: 1p + dataFrom: + - extract: + key: "Rimgo - ${CLUSTER_NAME}" + target: + creationPolicy: Owner + deletionPolicy: Retain + name: *name + # template: + # type: Opaque + # data: + # age.agekey: '{{ .agekey }}' diff --git a/kube/deploy/apps/rimgo/app/hr.yaml b/kube/deploy/apps/rimgo/app/hr.yaml new file mode 100644 index 00000000..4f28fe8b --- /dev/null +++ b/kube/deploy/apps/rimgo/app/hr.yaml @@ -0,0 +1,110 @@ +--- +# yaml-language-server: $schema=https://raw.githubusercontent.com/bjw-s/helm-charts/app-template-3.7.3/charts/other/app-template/schemas/helmrelease-helm-v2.schema.json +apiVersion: helm.toolkit.fluxcd.io/v2 +kind: HelmRelease +metadata: + name: &app rimgo + namespace: *app +spec: + interval: 5m + chart: + spec: + chart: app-template + version: 3.7.3 + sourceRef: + name: bjw-s + kind: HelmRepository + namespace: flux-system + values: + controllers: + rimgo: + type: deployment + replicas: 1 + pod: + labels: + ingress.home.arpa/nginx-internal: allow + egress.home.arpa/mullvad: allow + containers: + main: + image: &img + repository: codeberg.org/rimgo/rimgo + tag: 1.3.0@sha256:1b279dafa95fd22c908f187049f97391787f67366ee5c47a0e9ce38fdfe97356 + env: &env + TZ: "${CONFIG_TZ}" + PORT: &http 3000 + SECURE: true + HTTP_PROXY: socks5://10.64.0.1:1080 + HTTPS_PROXY: socks5://10.64.0.1:1080 + envFrom: &envFrom + - secretRef: + name: rimgo-secrets + securityContext: &sc + readOnlyRootFilesystem: true + allowPrivilegeEscalation: false + capabilities: + drop: ["ALL"] + resources: + requests: + cpu: "10m" + limits: + cpu: "1" + memory: "512Mi" + probes: + liveness: + enabled: true + readiness: + enabled: true + service: + rimgo: + controller: rimgo + ports: + http: + port: 80 + targetPort: *http + protocol: HTTP + appProtocol: http + ingress: + main: + className: nginx-internal + hosts: + - host: &host "${APP_DNS_RIMGO:=rimgo}" + paths: &paths + - path: / + pathType: Prefix + service: + identifier: rimgo + port: http + tls: + - hosts: [*host] + defaultPodOptions: + automountServiceAccountToken: false + enableServiceLinks: false + hostAliases: + - ip: "${APP_IP_AUTHENTIK:=127.0.0.1}" + hostnames: ["${APP_DNS_AUTHENTIK:=authentik}"] + dnsConfig: + options: + - name: ndots + value: "1" + hostUsers: false + securityContext: + runAsNonRoot: true + runAsUser: &uid 65534 + runAsGroup: *uid + fsGroup: *uid + fsGroupChangePolicy: Always + seccompProfile: { type: "RuntimeDefault" } + topologySpreadConstraints: + - maxSkew: 1 + topologyKey: kubernetes.io/hostname + whenUnsatisfiable: DoNotSchedule + labelSelector: + matchLabels: + app.kubernetes.io/name: "{{ .Release.Name }}" + affinity: + nodeAffinity: + requiredDuringSchedulingIgnoredDuringExecution: + nodeSelectorTerms: + - matchExpressions: + - key: fuckoff.home.arpa/{{ .Release.Name }} + operator: DoesNotExist diff --git a/kube/deploy/apps/rimgo/app/ns.yaml b/kube/deploy/apps/rimgo/app/ns.yaml new file mode 100644 index 00000000..af06c749 --- /dev/null +++ b/kube/deploy/apps/rimgo/app/ns.yaml @@ -0,0 +1,10 @@ +--- +apiVersion: v1 +kind: Namespace +metadata: + name: rimgo + labels: + kustomize.toolkit.fluxcd.io/prune: disabled + pod-security.kubernetes.io/enforce: &ps restricted + pod-security.kubernetes.io/audit: *ps + pod-security.kubernetes.io/warn: *ps diff --git a/kube/deploy/apps/rimgo/ks.yaml b/kube/deploy/apps/rimgo/ks.yaml new file mode 100644 index 00000000..a65f82e4 --- /dev/null +++ b/kube/deploy/apps/rimgo/ks.yaml @@ -0,0 +1,18 @@ +--- +apiVersion: kustomize.toolkit.fluxcd.io/v1 +kind: Kustomization +metadata: + name: rimgo-app + namespace: flux-system + labels: &l + app.kubernetes.io/name: "rimgo" +spec: + targetNamespace: "rimgo" + commonMetadata: + labels: *l + path: ./kube/deploy/apps/rimgo/app + components: + - ../../../core/flux-system/alerts/template/ + dependsOn: + - name: crds + namespace: flux-system diff --git a/kube/deploy/apps/rimgo/kustomization.yaml b/kube/deploy/apps/rimgo/kustomization.yaml new file mode 100644 index 00000000..45bc3673 --- /dev/null +++ b/kube/deploy/apps/rimgo/kustomization.yaml @@ -0,0 +1,6 @@ +--- +apiVersion: kustomize.config.k8s.io/v1beta1 +kind: Kustomization +resources: + # - ns.yaml + - ks.yaml