Compare commits
6 Commits
auto/updat
...
manifests
| Author | SHA1 | Date | |
|---|---|---|---|
| 5cd883eecb | |||
| 160e9af84c | |||
| d324336a3b | |||
| d634e417f7 | |||
| a255a60cf1 | |||
| 1afc2b712b |
@@ -41,7 +41,7 @@ rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resourceNames:
|
||||
- argocd-notifications-ntfy
|
||||
- argocd-notifications-secret
|
||||
resources:
|
||||
- secrets
|
||||
verbs:
|
||||
|
||||
@@ -20,8 +20,8 @@ data:
|
||||
connectors:
|
||||
- config:
|
||||
issuer: https://authentik.alexlebens.net/application/o/argocd/
|
||||
clientID: $argocd-oidc-authentik:client
|
||||
clientSecret: $argocd-oidc-authentik:secret
|
||||
clientID: $argocd-oidc-secret:client
|
||||
clientSecret: $argocd-oidc-secret:secret
|
||||
insecureEnableGroups: true
|
||||
scopes:
|
||||
- openid
|
||||
|
||||
@@ -22,7 +22,7 @@ spec:
|
||||
metadata:
|
||||
annotations:
|
||||
checksum/cmd-params: 28bda454bf23a1640b602544df6cb8c4bf480761dceb9a9dbb352a0a570f56cf
|
||||
checksum/cm: 6373746e5f0032d699666641a31e84a7cdc215b4f7e17f0f675058f66cc2f5ae
|
||||
checksum/cm: e8ec80c49fe04086a874935f714e529f8fea42e2cc30f811c41c4bf6946cbe15
|
||||
labels:
|
||||
helm.sh/chart: argo-cd-9.5.2
|
||||
app.kubernetes.io/name: argocd-dex-server
|
||||
|
||||
@@ -45,7 +45,7 @@ spec:
|
||||
- --metrics-port=9001
|
||||
- --namespace=argocd
|
||||
- --argocd-repo-server=argocd-repo-server:8081
|
||||
- --secret-name=argocd-notifications-ntfy
|
||||
- --secret-name=argocd-notifications-secret
|
||||
env:
|
||||
- name: ARGOCD_NOTIFICATIONS_CONTROLLER_LOGLEVEL
|
||||
valueFrom:
|
||||
|
||||
@@ -22,7 +22,7 @@ spec:
|
||||
metadata:
|
||||
annotations:
|
||||
checksum/cmd-params: 28bda454bf23a1640b602544df6cb8c4bf480761dceb9a9dbb352a0a570f56cf
|
||||
checksum/cm: 6373746e5f0032d699666641a31e84a7cdc215b4f7e17f0f675058f66cc2f5ae
|
||||
checksum/cm: e8ec80c49fe04086a874935f714e529f8fea42e2cc30f811c41c4bf6946cbe15
|
||||
labels:
|
||||
helm.sh/chart: argo-cd-9.5.2
|
||||
app.kubernetes.io/name: argocd-repo-server
|
||||
|
||||
@@ -22,7 +22,7 @@ spec:
|
||||
metadata:
|
||||
annotations:
|
||||
checksum/cmd-params: 28bda454bf23a1640b602544df6cb8c4bf480761dceb9a9dbb352a0a570f56cf
|
||||
checksum/cm: 6373746e5f0032d699666641a31e84a7cdc215b4f7e17f0f675058f66cc2f5ae
|
||||
checksum/cm: e8ec80c49fe04086a874935f714e529f8fea42e2cc30f811c41c4bf6946cbe15
|
||||
labels:
|
||||
helm.sh/chart: argo-cd-9.5.2
|
||||
app.kubernetes.io/name: argocd-server
|
||||
|
||||
@@ -0,0 +1,26 @@
|
||||
apiVersion: external-secrets.io/v1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: argocd-gitea-repo-infrastructure-secret
|
||||
namespace: argocd
|
||||
labels:
|
||||
app.kubernetes.io/name: argocd-gitea-repo-infrastructure-secret
|
||||
app.kubernetes.io/instance: argocd
|
||||
app.kubernetes.io/part-of: argocd
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: vault
|
||||
data:
|
||||
- secretKey: type
|
||||
remoteRef:
|
||||
key: /cl01tl/argocd/credentials/repo/infrastructure
|
||||
property: type
|
||||
- secretKey: url
|
||||
remoteRef:
|
||||
key: /cl01tl/argocd/credentials/repo/infrastructure
|
||||
property: url
|
||||
- secretKey: sshPrivateKey
|
||||
remoteRef:
|
||||
key: /cl01tl/argocd/credentials/repo/infrastructure
|
||||
property: sshPrivateKey
|
||||
@@ -1,18 +1,18 @@
|
||||
apiVersion: external-secrets.io/v1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: argocd-notifications-ntfy
|
||||
name: argocd-notifications-secret
|
||||
namespace: argocd
|
||||
labels:
|
||||
app.kubernetes.io/name: argocd/templates/external-secret.yaml
|
||||
app.kubernetes.io/name: argocd-notifications-secret
|
||||
app.kubernetes.io/instance: argocd
|
||||
app.kubernetes.io/part-of: argocd
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: openbao
|
||||
name: vault
|
||||
data:
|
||||
- secretKey: ntfy-token
|
||||
remoteRef:
|
||||
key: /cl01tl/ntfy/users/cl01tl
|
||||
key: /ntfy/user/cl01tl
|
||||
property: token
|
||||
@@ -1,22 +1,22 @@
|
||||
apiVersion: external-secrets.io/v1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: argocd-oidc-authentik
|
||||
name: argocd-oidc-secret
|
||||
namespace: argocd
|
||||
labels:
|
||||
app.kubernetes.io/name: argocd/templates/external-secret.yaml
|
||||
app.kubernetes.io/name: argocd-oidc-secret
|
||||
app.kubernetes.io/instance: argocd
|
||||
app.kubernetes.io/part-of: argocd
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: openbao
|
||||
name: vault
|
||||
data:
|
||||
- secretKey: secret
|
||||
remoteRef:
|
||||
key: /cl01tl/authentik/oidc/argocd
|
||||
key: /authentik/oidc/argocd
|
||||
property: secret
|
||||
- secretKey: client
|
||||
remoteRef:
|
||||
key: /cl01tk/authentik/oidc/argocd
|
||||
key: /authentik/oidc/argocd
|
||||
property: client
|
||||
@@ -42,7 +42,7 @@ rules:
|
||||
- apiGroups:
|
||||
- ""
|
||||
resourceNames:
|
||||
- argocd-notifications-ntfy
|
||||
- argocd-notifications-secret
|
||||
resources:
|
||||
- secrets
|
||||
verbs:
|
||||
|
||||
@@ -23,7 +23,7 @@ spec:
|
||||
metadata:
|
||||
annotations:
|
||||
checksum/cmd-params: 28bda454bf23a1640b602544df6cb8c4bf480761dceb9a9dbb352a0a570f56cf
|
||||
checksum/cm: 6373746e5f0032d699666641a31e84a7cdc215b4f7e17f0f675058f66cc2f5ae
|
||||
checksum/cm: e8ec80c49fe04086a874935f714e529f8fea42e2cc30f811c41c4bf6946cbe15
|
||||
labels:
|
||||
helm.sh/chart: argo-cd-9.5.2
|
||||
app.kubernetes.io/name: argocd-application-controller
|
||||
|
||||
@@ -60,7 +60,7 @@ spec:
|
||||
- env:
|
||||
- name: TZ
|
||||
value: America/Chicago
|
||||
image: ghcr.io/advplyr/audiobookshelf:2.33.1@sha256:a4a5841bba093d81e5f4ad1eaedb4da3fda6dbb2528c552349da50ad1f7ae708
|
||||
image: ghcr.io/advplyr/audiobookshelf:2.33.2@sha256:a44ed89b3e845faa1f7d353f2cc89b2fcd8011737dd14075fa963cf9468da3a5
|
||||
name: main
|
||||
resources:
|
||||
requests:
|
||||
|
||||
@@ -44,7 +44,7 @@ spec:
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
key: key
|
||||
name: authentik-key
|
||||
name: authentik-key-secret
|
||||
- name: AUTHENTIK_POSTGRESQL__HOST
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
|
||||
@@ -45,7 +45,7 @@ spec:
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
key: key
|
||||
name: authentik-key
|
||||
name: authentik-key-secret
|
||||
- name: AUTHENTIK_POSTGRESQL__HOST
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
|
||||
@@ -1,16 +1,16 @@
|
||||
apiVersion: external-secrets.io/v1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: authentik-key
|
||||
name: authentik-key-secret
|
||||
namespace: authentik
|
||||
labels:
|
||||
app.kubernetes.io/name: authentik/templates/external-secret.yaml
|
||||
app.kubernetes.io/name: authentik-key-secret
|
||||
app.kubernetes.io/instance: authentik
|
||||
app.kubernetes.io/part-of: authentik
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: openbao
|
||||
name: vault
|
||||
data:
|
||||
- secretKey: key
|
||||
remoteRef:
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: authentik-tailscale
|
||||
namespace: authentik
|
||||
labels:
|
||||
app.kubernetes.io/name: authentik/templates/ingress.yaml
|
||||
app.kubernetes.io/name: authentik-tailscale
|
||||
app.kubernetes.io/instance: authentik
|
||||
app.kubernetes.io/part-of: authentik
|
||||
tailscale.com/proxy-class: no-metrics
|
||||
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: allow-outpost-cross-namespace-access
|
||||
namespace: authentik
|
||||
labels:
|
||||
app.kubernetes.io/name: authentik/templates/reference-grant.yaml
|
||||
app.kubernetes.io/name: allow-outpost-cross-namespace-access
|
||||
app.kubernetes.io/instance: authentik
|
||||
app.kubernetes.io/part-of: authentik
|
||||
spec:
|
||||
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: backrest-nfs-share
|
||||
namespace: backrest
|
||||
labels:
|
||||
app.kubernetes.io/name: backrest/templates/persistent-volume.yaml
|
||||
app.kubernetes.io/name: backrest-nfs-share
|
||||
app.kubernetes.io/instance: backrest
|
||||
app.kubernetes.io/part-of: backrest
|
||||
spec:
|
||||
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: backrest-nfs-storage
|
||||
namespace: backrest
|
||||
labels:
|
||||
app.kubernetes.io/name: backrest/templates/persistent-volume.yaml
|
||||
app.kubernetes.io/name: backrest-nfs-storage
|
||||
app.kubernetes.io/instance: backrest
|
||||
app.kubernetes.io/part-of: backrest
|
||||
spec:
|
||||
|
||||
@@ -4,11 +4,11 @@ metadata:
|
||||
name: backrest-nfs-share
|
||||
namespace: backrest
|
||||
labels:
|
||||
app.kubernetes.io/name: backrest/templates/persistent-volume-claim.yaml
|
||||
app.kubernetes.io/name: backrest-nfs-share
|
||||
app.kubernetes.io/instance: backrest
|
||||
app.kubernetes.io/part-of: backrest
|
||||
spec:
|
||||
volumeName: backrest/templates/persistent-volume-claim.yaml
|
||||
volumeName: backrest-nfs-share
|
||||
storageClassName: nfs-client
|
||||
accessModes:
|
||||
- ReadWriteMany
|
||||
|
||||
@@ -4,11 +4,11 @@ metadata:
|
||||
name: backrest-nfs-storage
|
||||
namespace: backrest
|
||||
labels:
|
||||
app.kubernetes.io/name: backrest/templates/persistent-volume-claim.yaml
|
||||
app.kubernetes.io/name: backrest-nfs-storage
|
||||
app.kubernetes.io/instance: backrest
|
||||
app.kubernetes.io/part-of: backrest
|
||||
spec:
|
||||
volumeName: backrest/templates/persistent-volume-claim.yaml
|
||||
volumeName: backrest-nfs-storage
|
||||
storageClassName: nfs-client
|
||||
accessModes:
|
||||
- ReadWriteMany
|
||||
|
||||
@@ -68,7 +68,7 @@ spec:
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
key: key
|
||||
name: bazarr-key
|
||||
name: bazarr-key-secret
|
||||
- name: ENABLE_ADDITIONAL_METRICS
|
||||
value: "false"
|
||||
- name: ENABLE_UNKNOWN_QUEUE_ITEMS
|
||||
|
||||
@@ -1,16 +1,16 @@
|
||||
apiVersion: external-secrets.io/v1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: bazarr-key
|
||||
name: bazarr-key-secret
|
||||
namespace: bazarr
|
||||
labels:
|
||||
app.kubernetes.io/name: bazarr/templates/external-secret.yaml
|
||||
app.kubernetes.io/name: bazarr-key-secret
|
||||
app.kubernetes.io/instance: bazarr
|
||||
app.kubernetes.io/part-of: bazarr
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: openbao
|
||||
name: vault
|
||||
data:
|
||||
- secretKey: key
|
||||
remoteRef:
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: bazarr-nfs-storage
|
||||
namespace: bazarr
|
||||
labels:
|
||||
app.kubernetes.io/name: bazarr/templates/persistent-volume.yaml
|
||||
app.kubernetes.io/name: bazarr-nfs-storage
|
||||
app.kubernetes.io/instance: bazarr
|
||||
app.kubernetes.io/part-of: bazarr
|
||||
spec:
|
||||
|
||||
@@ -4,11 +4,11 @@ metadata:
|
||||
name: bazarr-nfs-storage
|
||||
namespace: bazarr
|
||||
labels:
|
||||
app.kubernetes.io/name: bazarr/templates/persistent-volume-claim.yaml
|
||||
app.kubernetes.io/name: bazarr-nfs-storage
|
||||
app.kubernetes.io/instance: bazarr
|
||||
app.kubernetes.io/part-of: bazarr
|
||||
spec:
|
||||
volumeName: bazarr/templates/persistent-volume-claim.yaml
|
||||
volumeName: bazarr-nfs-storage
|
||||
storageClassName: nfs-client
|
||||
accessModes:
|
||||
- ReadWriteMany
|
||||
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: letsencrypt-issuer
|
||||
namespace: cert-manager
|
||||
labels:
|
||||
app.kubernetes.io/name: cert-manager/templates/cluster-issuer.yaml
|
||||
app.kubernetes.io/name: letsencrypt-issuer
|
||||
app.kubernetes.io/instance: cert-manager
|
||||
app.kubernetes.io/part-of: cert-manager
|
||||
spec:
|
||||
|
||||
@@ -4,15 +4,15 @@ metadata:
|
||||
name: cloudflare-api-token
|
||||
namespace: cert-manager
|
||||
labels:
|
||||
app.kubernetes.io/name: cert-manager/templates/external-secret.yaml
|
||||
app.kubernetes.io/name: cloudflare-api-token
|
||||
app.kubernetes.io/instance: cert-manager
|
||||
app.kubernetes.io/part-of: cert-manager
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: openbao
|
||||
name: vault
|
||||
data:
|
||||
- secretKey: api-token
|
||||
remoteRef:
|
||||
key: /cloudflare/alexlebens.net/cl01tl-issuer-certificate
|
||||
key: /cloudflare/alexlebens.net/clusterissuer
|
||||
property: token
|
||||
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: bgp-ip-pool
|
||||
namespace: kube-system
|
||||
labels:
|
||||
app.kubernetes.io/name: cilium/templates/cilium-load-balancer-ip-pool.yaml
|
||||
app.kubernetes.io/name: bgp-ip-pool
|
||||
app.kubernetes.io/instance: cilium
|
||||
app.kubernetes.io/part-of: cilium
|
||||
spec:
|
||||
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: default-ip-pool
|
||||
namespace: kube-system
|
||||
labels:
|
||||
app.kubernetes.io/name: cilium/templates/cilium-load-balancer-ip-pool.yaml
|
||||
app.kubernetes.io/name: default-ip-pool
|
||||
app.kubernetes.io/instance: cilium
|
||||
app.kubernetes.io/part-of: cilium
|
||||
spec:
|
||||
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: hubble
|
||||
namespace: kube-system
|
||||
labels:
|
||||
app.kubernetes.io/name: cilium/templates/http-route.yaml
|
||||
app.kubernetes.io/name: hubble
|
||||
app.kubernetes.io/instance: cilium
|
||||
app.kubernetes.io/part-of: cilium
|
||||
spec:
|
||||
|
||||
@@ -87,12 +87,12 @@ spec:
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
key: client
|
||||
name: dawarich-oidc-authentik
|
||||
name: dawarich-oidc-secret
|
||||
- name: OIDC_CLIENT_SECRET
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
key: secret
|
||||
name: dawarich-oidc-authentik
|
||||
name: dawarich-oidc-secret
|
||||
- name: OIDC_PROVIDER_NAME
|
||||
value: Authentik
|
||||
- name: OIDC_AUTO_REGISTER
|
||||
@@ -107,7 +107,7 @@ spec:
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
key: key
|
||||
name: dawarich-key
|
||||
name: dawarich-key-secret
|
||||
- name: RAILS_LOG_TO_STDOUT
|
||||
value: "true"
|
||||
- name: SELF_HOSTED
|
||||
|
||||
@@ -1,16 +1,16 @@
|
||||
apiVersion: external-secrets.io/v1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: dawarich-key
|
||||
name: dawarich-key-secret
|
||||
namespace: dawarich
|
||||
labels:
|
||||
app.kubernetes.io/name: dawarich/templates/external-secret.yaml
|
||||
app.kubernetes.io/name: dawarich-key-secret
|
||||
app.kubernetes.io/instance: dawarich
|
||||
app.kubernetes.io/part-of: dawarich
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: openbao
|
||||
name: vault
|
||||
data:
|
||||
- secretKey: key
|
||||
remoteRef:
|
||||
@@ -1,22 +1,22 @@
|
||||
apiVersion: external-secrets.io/v1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: dawarich-oidc-authentik
|
||||
name: dawarich-oidc-secret
|
||||
namespace: dawarich
|
||||
labels:
|
||||
app.kubernetes.io/name: dawarich/templates/external-secret.yaml
|
||||
app.kubernetes.io/name: dawarich-oidc-secret
|
||||
app.kubernetes.io/instance: dawarich
|
||||
app.kubernetes.io/part-of: dawarich
|
||||
spec:
|
||||
secretStoreRef:
|
||||
kind: ClusterSecretStore
|
||||
name: openbao
|
||||
name: vault
|
||||
data:
|
||||
- secretKey: client
|
||||
remoteRef:
|
||||
key: /cl01tl/authentik/oidc/dawarich
|
||||
key: /authentik/oidc/dawarich
|
||||
property: client
|
||||
- secretKey: secret
|
||||
remoteRef:
|
||||
key: /cl01tl/authentik/oidc/dawarich
|
||||
key: /authentik/oidc/dawarich
|
||||
property: secret
|
||||
@@ -46,7 +46,7 @@ spec:
|
||||
value: America/Chicago
|
||||
- name: MEDIA_HOST_DIR
|
||||
value: /media
|
||||
image: ghcr.io/frederikemmer/medialyze:0.8.0@sha256:80aa5ce70d8644ce8321f97856a1c0ede5dfeaaba305c514ceefebf89c8985ef
|
||||
image: ghcr.io/frederikemmer/medialyze:0.7.1@sha256:c28cfd5cafe2b34136efaba5ba825440a2160cda3116ecb266454eac07a37e49
|
||||
name: main
|
||||
resources:
|
||||
requests:
|
||||
|
||||
@@ -46,7 +46,7 @@ spec:
|
||||
value: "1000"
|
||||
- name: PGID
|
||||
value: "1000"
|
||||
image: ghcr.io/linuxserver/radarr:6.1.1.10360-ls299@sha256:6f1dda18354ea7f28cead8f6d099fc8222498c3ae165f567d504ed04d70980d7
|
||||
image: ghcr.io/linuxserver/radarr:6.1.1.10360-ls300@sha256:b01097ad2d948c9f5eca39eb60bb529e2e55b0738c4bf7db09383bef0abab59d
|
||||
name: main
|
||||
resources:
|
||||
requests:
|
||||
|
||||
@@ -46,7 +46,7 @@ spec:
|
||||
value: "1000"
|
||||
- name: PGID
|
||||
value: "1000"
|
||||
image: ghcr.io/linuxserver/radarr:6.1.1.10360-ls299@sha256:6f1dda18354ea7f28cead8f6d099fc8222498c3ae165f567d504ed04d70980d7
|
||||
image: ghcr.io/linuxserver/radarr:6.1.1.10360-ls300@sha256:b01097ad2d948c9f5eca39eb60bb529e2e55b0738c4bf7db09383bef0abab59d
|
||||
name: main
|
||||
resources:
|
||||
requests:
|
||||
|
||||
@@ -46,7 +46,7 @@ spec:
|
||||
value: "1000"
|
||||
- name: PGID
|
||||
value: "1000"
|
||||
image: ghcr.io/linuxserver/radarr:6.1.1.10360-ls299@sha256:6f1dda18354ea7f28cead8f6d099fc8222498c3ae165f567d504ed04d70980d7
|
||||
image: ghcr.io/linuxserver/radarr:6.1.1.10360-ls300@sha256:b01097ad2d948c9f5eca39eb60bb529e2e55b0738c4bf7db09383bef0abab59d
|
||||
name: main
|
||||
resources:
|
||||
requests:
|
||||
|
||||
@@ -46,7 +46,7 @@ spec:
|
||||
value: "1000"
|
||||
- name: PGID
|
||||
value: "1000"
|
||||
image: ghcr.io/linuxserver/radarr:6.1.1.10360-ls299@sha256:6f1dda18354ea7f28cead8f6d099fc8222498c3ae165f567d504ed04d70980d7
|
||||
image: ghcr.io/linuxserver/radarr:6.1.1.10360-ls300@sha256:b01097ad2d948c9f5eca39eb60bb529e2e55b0738c4bf7db09383bef0abab59d
|
||||
name: main
|
||||
resources:
|
||||
requests:
|
||||
|
||||
@@ -34,7 +34,7 @@ spec:
|
||||
hostPID: false
|
||||
dnsPolicy: ClusterFirst
|
||||
containers:
|
||||
- image: harbor.alexlebens.net/images/site-documentation:0.27.0@sha256:dafa3c8aa9401009c299bb274d140acc10d8531dd40c8253783b1f8ed8519d76
|
||||
- image: harbor.alexlebens.net/images/site-documentation:0.26.0@sha256:fbd3167788a75a637aef0be6ef32bef685ce4af59f45e955cc6eb57ed8b1fd87
|
||||
name: main
|
||||
resources:
|
||||
requests:
|
||||
|
||||
@@ -34,7 +34,7 @@ spec:
|
||||
hostPID: false
|
||||
dnsPolicy: ClusterFirst
|
||||
containers:
|
||||
- image: harbor.alexlebens.net/images/site-profile:3.18.4@sha256:3fb32ba981a059c1203c8716140bff20cc6484a90ec8694f8ac0604ac456c7f8
|
||||
- image: harbor.alexlebens.net/images/site-profile:3.18.5@sha256:2ad5cbbdbf1011f74c5fa804584236ffea266c37f046f837625af79a97bc0b56
|
||||
name: main
|
||||
resources:
|
||||
requests:
|
||||
|
||||
Reference in New Issue
Block a user