2762 lines
91 KiB
YAML
2762 lines
91 KiB
YAML
apiVersion: postgresql.cnpg.io/v1
|
|
kind: Cluster
|
|
metadata:
|
|
name: gitea-postgresql-18-cluster
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: postgres-18-cluster-7.9.1
|
|
app.kubernetes.io/name: gitea-postgresql-18
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "7.9.1"
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
instances: 3
|
|
imageName: "ghcr.io/cloudnative-pg/postgresql:18.3-standard-trixie"
|
|
imagePullPolicy: IfNotPresent
|
|
postgresUID: 26
|
|
postgresGID: 26
|
|
storage:
|
|
size: 10Gi
|
|
storageClass: local-path
|
|
walStorage:
|
|
size: 2Gi
|
|
storageClass: local-path
|
|
resources:
|
|
limits:
|
|
hugepages-2Mi: 256Mi
|
|
requests:
|
|
cpu: 200m
|
|
memory: 1Gi
|
|
affinity:
|
|
enablePodAntiAffinity: true
|
|
topologyKey: kubernetes.io/hostname
|
|
primaryUpdateMethod: switchover
|
|
primaryUpdateStrategy: unsupervised
|
|
logLevel: info
|
|
enableSuperuserAccess: false
|
|
enablePDB: true
|
|
postgresql:
|
|
parameters:
|
|
hot_standby_feedback: "on"
|
|
max_slot_wal_keep_size: 2000MB
|
|
shared_buffers: 128MB
|
|
monitoring:
|
|
enablePodMonitor: true
|
|
disableDefaultQueries: false
|
|
plugins:
|
|
- name: barman-cloud.cloudnative-pg.io
|
|
enabled: true
|
|
isWALArchiver: true
|
|
parameters:
|
|
barmanObjectName: "gitea-postgresql-18-backup-garage-local"
|
|
serverName: "gitea-postgresql-18-backup-1"
|
|
bootstrap:
|
|
recovery:
|
|
database: app
|
|
source: gitea-postgresql-18-backup-1
|
|
externalClusters:
|
|
- name: gitea-postgresql-18-backup-1
|
|
plugin:
|
|
name: barman-cloud.cloudnative-pg.io
|
|
enabled: true
|
|
isWALArchiver: false
|
|
parameters:
|
|
barmanObjectName: "gitea-postgresql-18-recovery"
|
|
serverName: gitea-postgresql-18-backup-1
|
|
---
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: gitea-gitea-actions-act-runner-config
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: gitea-actions-0.0.3
|
|
app: gitea-actions
|
|
app.kubernetes.io/name: gitea-actions
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "0.261.3"
|
|
version: "0.261.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
data:
|
|
config.yaml: |
|
|
log:
|
|
level: debug
|
|
cache:
|
|
enabled: true
|
|
runner:
|
|
labels:
|
|
- "ubuntu-latest:docker://harbor.alexlebens.net/proxy-hub.docker/gitea/runner-images:ubuntu-24.04"
|
|
- "ubuntu-js:docker://harbor.alexlebens.net/proxy-ghcr.io/catthehacker/ubuntu:js-24.04"
|
|
- "ubuntu-24.04:docker://harbor.alexlebens.net/proxy-hub.docker/gitea/runner-images:ubuntu-24.04"
|
|
- "ubuntu-22.04:docker://harbor.alexlebens.net/proxy-hub.docker/gitea/runner-images:ubuntu-22.04"
|
|
---
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: gitea-meilisearch-environment
|
|
labels:
|
|
helm.sh/chart: meilisearch-0.27.0
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "v1.38.0"
|
|
app.kubernetes.io/component: search-engine
|
|
app.kubernetes.io/part-of: meilisearch
|
|
app.kubernetes.io/managed-by: Helm
|
|
data:
|
|
MEILI_ENV: "production"
|
|
MEILI_EXPERIMENTAL_DUMPLESS_UPGRADE: "true"
|
|
MEILI_NO_ANALYTICS: "true"
|
|
MEILI_EXPERIMENTAL_ENABLE_METRICS: "true"
|
|
---
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: gitea-valkey-init-scripts
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
data:
|
|
init.sh: |-
|
|
#!/bin/sh
|
|
set -eu
|
|
|
|
# Default config paths
|
|
VALKEY_CONFIG=${VALKEY_CONFIG_PATH:-/data/conf/valkey.conf}
|
|
|
|
LOGFILE="/data/init.log"
|
|
DATA_DIR="/data/conf"
|
|
|
|
# Logging function (outputs to stderr and file)
|
|
log() {
|
|
echo "$(date) $1" | tee -a "$LOGFILE" >&2
|
|
}
|
|
|
|
# Clean old log if requested
|
|
if [ "${KEEP_OLD_LOGS:-false}" != "true" ]; then
|
|
rm -f "$LOGFILE"
|
|
fi
|
|
|
|
if [ -f "$LOGFILE" ]; then
|
|
log "Detected restart of this instance ($HOSTNAME)"
|
|
fi
|
|
|
|
log "Creating configuration in $DATA_DIR..."
|
|
mkdir -p "$DATA_DIR"
|
|
rm -f "$VALKEY_CONFIG"
|
|
|
|
|
|
# Base valkey.conf
|
|
log "Generating base valkey.conf"
|
|
{
|
|
echo "port 6379"
|
|
echo "protected-mode no"
|
|
echo "bind * -::*"
|
|
echo "dir /data"
|
|
} >>"$VALKEY_CONFIG"
|
|
# Replica mode configuration
|
|
log "Configuring replication mode"
|
|
|
|
# Use POD_INDEX from Kubernetes metadata
|
|
POD_INDEX=${POD_INDEX:-0}
|
|
IS_MASTER=false
|
|
|
|
# Check if this is pod-0 (master)
|
|
if [ "$POD_INDEX" = "0" ]; then
|
|
IS_MASTER=true
|
|
log "This pod (index $POD_INDEX) is configured as MASTER"
|
|
else
|
|
log "This pod (index $POD_INDEX) is configured as REPLICA"
|
|
fi
|
|
|
|
# Configure replica settings
|
|
if [ "$IS_MASTER" = "false" ]; then
|
|
MASTER_HOST="gitea-valkey-0.gitea-valkey-headless.gitea.svc.cluster.local"
|
|
MASTER_PORT="6379"
|
|
|
|
log "Configuring replica to follow master at $MASTER_HOST:$MASTER_PORT"
|
|
|
|
{
|
|
echo ""
|
|
echo "# Replica Configuration"
|
|
echo "replicaof $MASTER_HOST $MASTER_PORT"
|
|
echo "replica-announce-ip gitea-valkey-$POD_INDEX.gitea-valkey-headless.gitea.svc.cluster.local"
|
|
} >>"$VALKEY_CONFIG"
|
|
fi
|
|
|
|
# Append extra configs if present
|
|
if [ -f /usr/local/etc/valkey/valkey.conf ]; then
|
|
log "Appending /usr/local/etc/valkey/valkey.conf"
|
|
cat /usr/local/etc/valkey/valkey.conf >>"$VALKEY_CONFIG"
|
|
fi
|
|
if [ -d /extravalkeyconfigs ]; then
|
|
log "Appending files in /extravalkeyconfigs/"
|
|
cat /extravalkeyconfigs/* >>"$VALKEY_CONFIG"
|
|
fi
|
|
---
|
|
apiVersion: v1
|
|
kind: ConfigMap
|
|
metadata:
|
|
name: gitea-valkey-renovate-init-scripts
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
data:
|
|
init.sh: |-
|
|
#!/bin/sh
|
|
set -eu
|
|
|
|
# Default config paths
|
|
VALKEY_CONFIG=${VALKEY_CONFIG_PATH:-/data/conf/valkey.conf}
|
|
|
|
LOGFILE="/data/init.log"
|
|
DATA_DIR="/data/conf"
|
|
|
|
# Logging function (outputs to stderr and file)
|
|
log() {
|
|
echo "$(date) $1" | tee -a "$LOGFILE" >&2
|
|
}
|
|
|
|
# Clean old log if requested
|
|
if [ "${KEEP_OLD_LOGS:-false}" != "true" ]; then
|
|
rm -f "$LOGFILE"
|
|
fi
|
|
|
|
if [ -f "$LOGFILE" ]; then
|
|
log "Detected restart of this instance ($HOSTNAME)"
|
|
fi
|
|
|
|
log "Creating configuration in $DATA_DIR..."
|
|
mkdir -p "$DATA_DIR"
|
|
rm -f "$VALKEY_CONFIG"
|
|
|
|
|
|
# Base valkey.conf
|
|
log "Generating base valkey.conf"
|
|
{
|
|
echo "port 6379"
|
|
echo "protected-mode no"
|
|
echo "bind * -::*"
|
|
echo "dir /data"
|
|
} >>"$VALKEY_CONFIG"
|
|
|
|
# Append extra configs if present
|
|
if [ -f /usr/local/etc/valkey/valkey.conf ]; then
|
|
log "Appending /usr/local/etc/valkey/valkey.conf"
|
|
cat /usr/local/etc/valkey/valkey.conf >>"$VALKEY_CONFIG"
|
|
fi
|
|
if [ -d /extravalkeyconfigs ]; then
|
|
log "Appending files in /extravalkeyconfigs/"
|
|
cat /extravalkeyconfigs/* >>"$VALKEY_CONFIG"
|
|
fi
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: gitea-cloudflared
|
|
labels:
|
|
app.kubernetes.io/controller: main
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: cloudflared
|
|
app.kubernetes.io/version: 2026.3.0
|
|
helm.sh/chart: cloudflared-2.4.0
|
|
namespace: gitea
|
|
spec:
|
|
revisionHistoryLimit: 3
|
|
replicas: 1
|
|
strategy:
|
|
type: Recreate
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/controller: main
|
|
app.kubernetes.io/name: cloudflared
|
|
app.kubernetes.io/instance: gitea
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/controller: main
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/name: cloudflared
|
|
spec:
|
|
enableServiceLinks: false
|
|
serviceAccountName: default
|
|
automountServiceAccountToken: true
|
|
hostIPC: false
|
|
hostNetwork: false
|
|
hostPID: false
|
|
dnsPolicy: ClusterFirst
|
|
containers:
|
|
- args:
|
|
- tunnel
|
|
- --protocol
|
|
- http2
|
|
- --no-autoupdate
|
|
- run
|
|
- --token
|
|
- $(CF_MANAGED_TUNNEL_TOKEN)
|
|
env:
|
|
- name: CF_MANAGED_TUNNEL_TOKEN
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: cf-tunnel-token
|
|
name: gitea-cloudflared-secret
|
|
image: cloudflare/cloudflared:2026.3.0
|
|
imagePullPolicy: IfNotPresent
|
|
name: main
|
|
resources:
|
|
requests:
|
|
cpu: 10m
|
|
memory: 128Mi
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: gitea-valkey-renovate
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
replicas: 1
|
|
strategy:
|
|
type: RollingUpdate
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
annotations:
|
|
checksum/initconfig: f77fc408ed818f9e2bd789f0e95a4172
|
|
spec:
|
|
automountServiceAccountToken: false
|
|
serviceAccountName: gitea-valkey-renovate
|
|
securityContext:
|
|
fsGroup: 1000
|
|
runAsGroup: 1000
|
|
runAsUser: 1000
|
|
initContainers:
|
|
- name: gitea-valkey-renovate-init
|
|
image: docker.io/valkey/valkey:9.0.3
|
|
imagePullPolicy: IfNotPresent
|
|
securityContext:
|
|
capabilities:
|
|
drop:
|
|
- ALL
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: true
|
|
runAsUser: 1000
|
|
command: ["/scripts/init.sh"]
|
|
volumeMounts:
|
|
- name: valkey-data
|
|
mountPath: /data
|
|
- name: scripts
|
|
mountPath: /scripts
|
|
containers:
|
|
- name: gitea-valkey-renovate
|
|
image: docker.io/valkey/valkey:9.0.3
|
|
imagePullPolicy: IfNotPresent
|
|
command: ["valkey-server"]
|
|
args: ["/data/conf/valkey.conf"]
|
|
securityContext:
|
|
capabilities:
|
|
drop:
|
|
- ALL
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: true
|
|
runAsUser: 1000
|
|
env:
|
|
- name: VALKEY_LOGLEVEL
|
|
value: "notice"
|
|
ports:
|
|
- name: tcp
|
|
containerPort: 6379
|
|
protocol: TCP
|
|
startupProbe:
|
|
exec:
|
|
command: ["sh", "-c", "valkey-cli ping"]
|
|
livenessProbe:
|
|
exec:
|
|
command: ["sh", "-c", "valkey-cli ping"]
|
|
resources:
|
|
requests:
|
|
cpu: 10m
|
|
memory: 128Mi
|
|
volumeMounts:
|
|
- name: valkey-data
|
|
mountPath: /data
|
|
- name: metrics
|
|
image: ghcr.io/oliver006/redis_exporter:v1.82.0
|
|
imagePullPolicy: "IfNotPresent"
|
|
ports:
|
|
- name: metrics
|
|
containerPort: 9121
|
|
startupProbe:
|
|
tcpSocket:
|
|
port: metrics
|
|
livenessProbe:
|
|
tcpSocket:
|
|
port: metrics
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /
|
|
port: metrics
|
|
resources:
|
|
requests:
|
|
cpu: 10m
|
|
memory: 64M
|
|
env:
|
|
- name: REDIS_ALIAS
|
|
value: gitea-valkey-renovate
|
|
volumes:
|
|
- name: scripts
|
|
configMap:
|
|
name: gitea-valkey-renovate-init-scripts
|
|
defaultMode: 0555
|
|
- name: valkey-data
|
|
persistentVolumeClaim:
|
|
claimName: gitea-valkey-renovate
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: Deployment
|
|
metadata:
|
|
name: gitea
|
|
namespace: gitea
|
|
annotations:
|
|
labels:
|
|
helm.sh/chart: gitea-12.5.0
|
|
app: gitea
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "1.25.5"
|
|
version: "1.25.5"
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
replicas: 3
|
|
strategy:
|
|
type: RollingUpdate
|
|
rollingUpdate:
|
|
maxUnavailable: 0
|
|
maxSurge: 100%
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
checksum/config: 878b6957d244540764fe2218a124d9617a7d00acd64d1837f28805cdc5881739
|
|
checksum/oauth_0: 03073bf48e66f48f622bd02092a5f93bfd06dbcb5fd833aded3b0d40980be93d
|
|
labels:
|
|
helm.sh/chart: gitea-12.5.0
|
|
app: gitea
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "1.25.5"
|
|
version: "1.25.5"
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
securityContext:
|
|
fsGroup: 1000
|
|
initContainers:
|
|
- name: init-directories
|
|
image: "registry.hub.docker.com/gitea/gitea:1.25.5-rootless"
|
|
imagePullPolicy: IfNotPresent
|
|
command:
|
|
- "/usr/sbinx/init_directory_structure.sh"
|
|
env:
|
|
- name: GITEA_APP_INI
|
|
value: /data/gitea/conf/app.ini
|
|
- name: GITEA_CUSTOM
|
|
value: /data/gitea
|
|
- name: GITEA_WORK_DIR
|
|
value: /data
|
|
- name: GITEA_TEMP
|
|
value: /tmp/gitea
|
|
volumeMounts:
|
|
- name: init
|
|
mountPath: /usr/sbinx
|
|
- name: temp
|
|
mountPath: /tmp
|
|
- name: data
|
|
mountPath: /data
|
|
- mountPath: /data/gitea/public/assets/css
|
|
name: gitea-themes-storage
|
|
readOnly: false
|
|
securityContext: {}
|
|
resources:
|
|
limits: {}
|
|
requests:
|
|
cpu: 100m
|
|
memory: 128Mi
|
|
- name: init-app-ini
|
|
image: "registry.hub.docker.com/gitea/gitea:1.25.5-rootless"
|
|
imagePullPolicy: IfNotPresent
|
|
command:
|
|
- "/usr/sbinx/config_environment.sh"
|
|
env:
|
|
- name: GITEA_APP_INI
|
|
value: /data/gitea/conf/app.ini
|
|
- name: GITEA_CUSTOM
|
|
value: /data/gitea
|
|
- name: GITEA_WORK_DIR
|
|
value: /data
|
|
- name: GITEA_TEMP
|
|
value: /tmp/gitea
|
|
- name: TMP_EXISTING_ENVS_FILE
|
|
value: /tmp/existing-envs
|
|
- name: ENV_TO_INI_MOUNT_POINT
|
|
value: /env-to-ini-mounts
|
|
- name: GITEA__DATABASE__HOST
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: host
|
|
name: gitea-postgresql-18-cluster-app
|
|
- name: GITEA__DATABASE__NAME
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: dbname
|
|
name: gitea-postgresql-18-cluster-app
|
|
- name: GITEA__DATABASE__USER
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: user
|
|
name: gitea-postgresql-18-cluster-app
|
|
- name: GITEA__DATABASE__PASSWD
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: password
|
|
name: gitea-postgresql-18-cluster-app
|
|
- name: GITEA__INDEXER__ISSUE_INDEXER_CONN_STR
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: ISSUE_INDEXER_CONN_STR
|
|
name: gitea-meilisearch-master-key-secret
|
|
volumeMounts:
|
|
- name: config
|
|
mountPath: /usr/sbinx
|
|
- name: temp
|
|
mountPath: /tmp
|
|
- name: data
|
|
mountPath: /data
|
|
- name: inline-config-sources
|
|
mountPath: /env-to-ini-mounts/inlines/
|
|
- mountPath: /data/gitea/public/assets/css
|
|
name: gitea-themes-storage
|
|
readOnly: false
|
|
securityContext: {}
|
|
resources:
|
|
limits: {}
|
|
requests:
|
|
cpu: 100m
|
|
memory: 128Mi
|
|
- name: configure-gitea
|
|
image: "registry.hub.docker.com/gitea/gitea:1.25.5-rootless"
|
|
command:
|
|
- "/usr/sbinx/configure_gitea.sh"
|
|
imagePullPolicy: IfNotPresent
|
|
securityContext:
|
|
runAsUser: 1000
|
|
env:
|
|
- name: GITEA_APP_INI
|
|
value: /data/gitea/conf/app.ini
|
|
- name: GITEA_CUSTOM
|
|
value: /data/gitea
|
|
- name: GITEA_WORK_DIR
|
|
value: /data
|
|
- name: GITEA_TEMP
|
|
value: /tmp/gitea
|
|
- name: HOME
|
|
value: /data/gitea/git
|
|
- name: GITEA_OAUTH_KEY_0
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: key
|
|
name: gitea-oidc-secret
|
|
- name: GITEA_OAUTH_SECRET_0
|
|
valueFrom:
|
|
secretKeyRef:
|
|
key: secret
|
|
name: gitea-oidc-secret
|
|
- name: GITEA_ADMIN_USERNAME
|
|
value: "gitea_admin"
|
|
- name: GITEA_ADMIN_PASSWORD
|
|
value: "r8sA8CPHD9!bt6d"
|
|
- name: GITEA_ADMIN_PASSWORD_MODE
|
|
value: keepUpdated
|
|
volumeMounts:
|
|
- name: init
|
|
mountPath: /usr/sbinx
|
|
- name: temp
|
|
mountPath: /tmp
|
|
- name: data
|
|
mountPath: /data
|
|
- mountPath: /data/gitea/public/assets/css
|
|
name: gitea-themes-storage
|
|
readOnly: false
|
|
resources:
|
|
limits: {}
|
|
requests:
|
|
cpu: 100m
|
|
memory: 128Mi
|
|
terminationGracePeriodSeconds: 60
|
|
containers:
|
|
- name: gitea
|
|
image: "registry.hub.docker.com/gitea/gitea:1.25.5-rootless"
|
|
imagePullPolicy: IfNotPresent
|
|
env:
|
|
- name: SSH_LISTEN_PORT
|
|
value: "22"
|
|
- name: SSH_PORT
|
|
value: "22"
|
|
- name: GITEA_APP_INI
|
|
value: /data/gitea/conf/app.ini
|
|
- name: GITEA_CUSTOM
|
|
value: /data/gitea
|
|
- name: GITEA_WORK_DIR
|
|
value: /data
|
|
- name: GITEA_TEMP
|
|
value: /tmp/gitea
|
|
- name: TMPDIR
|
|
value: /tmp/gitea
|
|
- name: HOME
|
|
value: /data/gitea/git
|
|
ports:
|
|
- name: ssh
|
|
containerPort: 22
|
|
- name: http
|
|
containerPort: 3000
|
|
- name: profiler
|
|
containerPort: 6060
|
|
livenessProbe:
|
|
failureThreshold: 10
|
|
initialDelaySeconds: 200
|
|
periodSeconds: 10
|
|
successThreshold: 1
|
|
tcpSocket:
|
|
port: http
|
|
timeoutSeconds: 1
|
|
readinessProbe:
|
|
failureThreshold: 3
|
|
initialDelaySeconds: 5
|
|
periodSeconds: 10
|
|
successThreshold: 1
|
|
tcpSocket:
|
|
port: http
|
|
timeoutSeconds: 1
|
|
resources: {}
|
|
securityContext: {}
|
|
volumeMounts:
|
|
- name: temp
|
|
mountPath: /tmp
|
|
- name: data
|
|
mountPath: /data
|
|
- mountPath: /data/gitea/public/assets/css
|
|
name: gitea-themes-storage
|
|
readOnly: true
|
|
volumes:
|
|
- name: init
|
|
secret:
|
|
secretName: gitea-init
|
|
defaultMode: 110
|
|
- name: config
|
|
secret:
|
|
secretName: gitea
|
|
defaultMode: 110
|
|
- name: gitea-themes-storage
|
|
persistentVolumeClaim:
|
|
claimName: gitea-themes-storage
|
|
- name: inline-config-sources
|
|
secret:
|
|
secretName: gitea-inline-config
|
|
- name: temp
|
|
emptyDir: {}
|
|
- name: data
|
|
persistentVolumeClaim:
|
|
claimName: gitea-shared-storage
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-admin-secret
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-admin-secret
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
data:
|
|
- secretKey: username
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/auth/admin
|
|
metadataPolicy: None
|
|
property: username
|
|
- secretKey: password
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/auth/admin
|
|
metadataPolicy: None
|
|
property: password
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-cloudflared-secret
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: cloudflared-2.4.0
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "2.4.0"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: gitea-cloudflared-secret
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
data:
|
|
- secretKey: cf-tunnel-token
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cloudflare/tunnels/gitea
|
|
metadataPolicy: None
|
|
property: token
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-meilisearch-master-key-secret
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-meilisearch-master-key-secret
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
target:
|
|
template:
|
|
mergePolicy: Merge
|
|
engineVersion: v2
|
|
data:
|
|
ISSUE_INDEXER_CONN_STR: "http://:{{ .MEILI_MASTER_KEY }}@gitea-meilisearch.gitea:7700/"
|
|
data:
|
|
- secretKey: MEILI_MASTER_KEY
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/meilisearch
|
|
metadataPolicy: None
|
|
property: MEILI_MASTER_KEY
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-oidc-secret
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-oidc-secret
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
data:
|
|
- secretKey: secret
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /authentik/oidc/gitea
|
|
metadataPolicy: None
|
|
property: secret
|
|
- secretKey: key
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /authentik/oidc/gitea
|
|
metadataPolicy: None
|
|
property: client
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-postgresql-18-backup-garage-local-secret
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: postgres-18-cluster-7.9.1
|
|
app.kubernetes.io/name: gitea-postgresql-18
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "7.9.1"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: gitea-postgresql-18-backup-garage-local-secret
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
data:
|
|
- secretKey: ACCESS_REGION
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/postgres-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_REGION
|
|
- secretKey: ACCESS_KEY_ID
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/postgres-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_KEY_ID
|
|
- secretKey: ACCESS_SECRET_KEY
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/postgres-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_SECRET_KEY
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-postgresql-18-recovery-secret
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: postgres-18-cluster-7.9.1
|
|
app.kubernetes.io/name: gitea-postgresql-18
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "7.9.1"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: gitea-postgresql-18-recovery-secret
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
data:
|
|
- secretKey: ACCESS_REGION
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/postgres-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_REGION
|
|
- secretKey: ACCESS_KEY_ID
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/postgres-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_KEY_ID
|
|
- secretKey: ACCESS_SECRET_KEY
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/postgres-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_SECRET_KEY
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-renovate-secret
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-renovate-secret
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
data:
|
|
- secretKey: RENOVATE_ENDPOINT
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/renovate
|
|
metadataPolicy: None
|
|
property: RENOVATE_ENDPOINT
|
|
- secretKey: RENOVATE_GIT_AUTHOR
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/renovate
|
|
metadataPolicy: None
|
|
property: RENOVATE_GIT_AUTHOR
|
|
- secretKey: RENOVATE_TOKEN
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/renovate
|
|
metadataPolicy: None
|
|
property: RENOVATE_TOKEN
|
|
- secretKey: RENOVATE_GIT_PRIVATE_KEY
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/renovate
|
|
metadataPolicy: None
|
|
property: id_rsa
|
|
- secretKey: RENOVATE_GITHUB_COM_TOKEN
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /github/gitea-cl01tl
|
|
metadataPolicy: None
|
|
property: token
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-renovate-ssh-secret
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-renovate-ssh-secret
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
data:
|
|
- secretKey: config
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/renovate
|
|
metadataPolicy: None
|
|
property: ssh_config
|
|
- secretKey: id_rsa
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/renovate
|
|
metadataPolicy: None
|
|
property: id_rsa
|
|
- secretKey: id_rsa.pub
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/renovate
|
|
metadataPolicy: None
|
|
property: id_rsa.pub
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-runner-secret
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-runner-secret
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
data:
|
|
- secretKey: token
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /cl01tl/gitea/runner
|
|
metadataPolicy: None
|
|
property: token
|
|
---
|
|
apiVersion: external-secrets.io/v1
|
|
kind: ExternalSecret
|
|
metadata:
|
|
name: gitea-shared-storage-backup-secret-local
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: volsync-target-storage-0.8.0
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "0.8.0"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: gitea-shared-storage-backup-secret-local
|
|
spec:
|
|
secretStoreRef:
|
|
kind: ClusterSecretStore
|
|
name: vault
|
|
target:
|
|
template:
|
|
mergePolicy: Merge
|
|
engineVersion: v2
|
|
data:
|
|
RESTIC_REPOSITORY: "{{ .BUCKET_ENDPOINT }}/gitea/gitea-shared-storage"
|
|
data:
|
|
- secretKey: BUCKET_ENDPOINT
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /volsync/restic/garage-local
|
|
metadataPolicy: None
|
|
property: BUCKET_ENDPOINT
|
|
- secretKey: RESTIC_PASSWORD
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /volsync/restic/garage-local
|
|
metadataPolicy: None
|
|
property: RESTIC_PASSWORD
|
|
- secretKey: AWS_DEFAULT_REGION
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/volsync-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_REGION
|
|
- secretKey: AWS_ACCESS_KEY_ID
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/volsync-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_KEY_ID
|
|
- secretKey: AWS_SECRET_ACCESS_KEY
|
|
remoteRef:
|
|
conversionStrategy: Default
|
|
decodingStrategy: None
|
|
key: /garage/home-infra/volsync-backups
|
|
metadataPolicy: None
|
|
property: ACCESS_SECRET_KEY
|
|
---
|
|
apiVersion: gateway.networking.k8s.io/v1
|
|
kind: HTTPRoute
|
|
metadata:
|
|
name: gitea
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
parentRefs:
|
|
- group: gateway.networking.k8s.io
|
|
kind: Gateway
|
|
name: traefik-gateway
|
|
namespace: traefik
|
|
hostnames:
|
|
- gitea.alexlebens.net
|
|
rules:
|
|
- matches:
|
|
- path:
|
|
type: PathPrefix
|
|
value: /
|
|
backendRefs:
|
|
- group: ''
|
|
kind: Service
|
|
name: gitea-http
|
|
port: 3000
|
|
weight: 100
|
|
---
|
|
apiVersion: networking.k8s.io/v1
|
|
kind: Ingress
|
|
metadata:
|
|
name: gitea-tailscale
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-tailscale
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
tailscale.com/proxy-class: no-metrics
|
|
annotations:
|
|
tailscale.com/experimental-forward-cluster-traffic-via-ingress: "true"
|
|
spec:
|
|
ingressClassName: tailscale
|
|
tls:
|
|
- hosts:
|
|
- gitea-cl01tl
|
|
secretName: gitea-cl01tl
|
|
rules:
|
|
- host: gitea-cl01tl
|
|
http:
|
|
paths:
|
|
- path: /
|
|
pathType: ImplementationSpecific
|
|
backend:
|
|
service:
|
|
name: gitea-http
|
|
port:
|
|
name: http
|
|
---
|
|
apiVersion: v1
|
|
kind: Namespace
|
|
metadata:
|
|
name: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
pod-security.kubernetes.io/audit: privileged
|
|
pod-security.kubernetes.io/enforce: privileged
|
|
pod-security.kubernetes.io/warn: privileged
|
|
---
|
|
apiVersion: barmancloud.cnpg.io/v1
|
|
kind: ObjectStore
|
|
metadata:
|
|
name: gitea-postgresql-18-backup-garage-local
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: postgres-18-cluster-7.9.1
|
|
app.kubernetes.io/name: gitea-postgresql-18
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "7.9.1"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: gitea-postgresql-18-backup-garage-local
|
|
spec:
|
|
retentionPolicy: 7d
|
|
instanceSidecarConfiguration:
|
|
env:
|
|
- name: AWS_REQUEST_CHECKSUM_CALCULATION
|
|
value: when_required
|
|
- name: AWS_RESPONSE_CHECKSUM_VALIDATION
|
|
value: when_required
|
|
configuration:
|
|
destinationPath: s3://postgres-backups/cl01tl/gitea/gitea-postgresql-18-cluster
|
|
endpointURL: http://garage-main.garage:3900
|
|
s3Credentials:
|
|
accessKeyId:
|
|
name: gitea-postgresql-18-backup-garage-local-secret
|
|
key: ACCESS_KEY_ID
|
|
secretAccessKey:
|
|
name: gitea-postgresql-18-backup-garage-local-secret
|
|
key: ACCESS_SECRET_KEY
|
|
region:
|
|
name: gitea-postgresql-18-backup-garage-local-secret
|
|
key: ACCESS_REGION
|
|
---
|
|
apiVersion: barmancloud.cnpg.io/v1
|
|
kind: ObjectStore
|
|
metadata:
|
|
name: "gitea-postgresql-18-recovery"
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: postgres-18-cluster-7.9.1
|
|
app.kubernetes.io/name: gitea-postgresql-18
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "7.9.1"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: "gitea-postgresql-18-recovery"
|
|
spec:
|
|
configuration:
|
|
destinationPath: s3://postgres-backups/cl01tl/gitea/gitea-postgresql-18-cluster
|
|
endpointURL: http://garage-main.garage:3900
|
|
wal:
|
|
compression: snappy
|
|
maxParallel: 1
|
|
data:
|
|
compression: snappy
|
|
jobs: 1
|
|
s3Credentials:
|
|
accessKeyId:
|
|
name: gitea-postgresql-18-recovery-secret
|
|
key: ACCESS_KEY_ID
|
|
secretAccessKey:
|
|
name: gitea-postgresql-18-recovery-secret
|
|
key: ACCESS_SECRET_KEY
|
|
region:
|
|
name: gitea-postgresql-18-recovery-secret
|
|
key: ACCESS_REGION
|
|
---
|
|
kind: PersistentVolumeClaim
|
|
apiVersion: v1
|
|
metadata:
|
|
name: gitea-meilisearch
|
|
labels:
|
|
helm.sh/chart: meilisearch-0.27.0
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "v1.38.0"
|
|
app.kubernetes.io/component: search-engine
|
|
app.kubernetes.io/part-of: meilisearch
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
accessModes:
|
|
- "ReadWriteOnce"
|
|
resources:
|
|
requests:
|
|
storage: "5Gi"
|
|
storageClassName: "ceph-block"
|
|
---
|
|
kind: PersistentVolumeClaim
|
|
apiVersion: v1
|
|
metadata:
|
|
name: gitea-shared-storage
|
|
namespace: gitea
|
|
annotations:
|
|
helm.sh/resource-policy: keep
|
|
labels: {}
|
|
spec:
|
|
accessModes:
|
|
- ReadWriteMany
|
|
volumeMode: Filesystem
|
|
storageClassName: "ceph-filesystem"
|
|
resources:
|
|
requests:
|
|
storage: 40Gi
|
|
---
|
|
apiVersion: v1
|
|
kind: PersistentVolumeClaim
|
|
metadata:
|
|
name: gitea-themes-storage
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-themes-storage
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
volumeMode: Filesystem
|
|
storageClassName: ceph-filesystem
|
|
accessModes:
|
|
- ReadWriteMany
|
|
resources:
|
|
requests:
|
|
storage: 1Gi
|
|
---
|
|
apiVersion: v1
|
|
kind: PersistentVolumeClaim
|
|
metadata:
|
|
name: gitea-valkey-renovate
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
accessModes:
|
|
- ReadWriteOnce
|
|
volumeMode: Filesystem
|
|
resources:
|
|
requests:
|
|
storage: 1Gi
|
|
storageClassName: ceph-block
|
|
---
|
|
apiVersion: v1
|
|
kind: Pod
|
|
metadata:
|
|
name: gitea-meilisearch-test-connection
|
|
labels:
|
|
app.kubernetes.io/name: meilisearch
|
|
helm.sh/chart: meilisearch-0.27.0
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/managed-by: Helm
|
|
annotations:
|
|
"helm.sh/hook": test-success
|
|
spec:
|
|
containers:
|
|
- name: wget
|
|
image: busybox
|
|
command: ['wget']
|
|
args: ['--spider', '--timeout=5', 'gitea-meilisearch:7700']
|
|
restartPolicy: Never
|
|
---
|
|
apiVersion: v1
|
|
kind: Pod
|
|
metadata:
|
|
name: "gitea-test-connection"
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: gitea-12.5.0
|
|
app: gitea
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "1.25.5"
|
|
version: "1.25.5"
|
|
app.kubernetes.io/managed-by: Helm
|
|
annotations:
|
|
"helm.sh/hook": test-success
|
|
spec:
|
|
containers:
|
|
- name: wget
|
|
image: "busybox:latest"
|
|
command: ['wget']
|
|
args: ['gitea-http:3000']
|
|
restartPolicy: Never
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: PodMonitor
|
|
metadata:
|
|
name: gitea-valkey-renovate
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/part-of: valkey
|
|
app.kubernetes.io/component: podmonitor
|
|
spec:
|
|
podMetricsEndpoints:
|
|
- port: metrics
|
|
interval: 30s
|
|
namespaceSelector:
|
|
matchNames:
|
|
- gitea
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: PodMonitor
|
|
metadata:
|
|
name: gitea-valkey
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/part-of: valkey
|
|
app.kubernetes.io/component: podmonitor
|
|
spec:
|
|
podMetricsEndpoints:
|
|
- port: metrics
|
|
interval: 30s
|
|
namespaceSelector:
|
|
matchNames:
|
|
- gitea
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: PrometheusRule
|
|
metadata:
|
|
name: gitea-postgresql-18-alert-rules
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: postgres-18-cluster-7.9.1
|
|
app.kubernetes.io/name: gitea-postgresql-18
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "7.9.1"
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
groups:
|
|
- name: cloudnative-pg/gitea-postgresql-18
|
|
rules:
|
|
- alert: CNPGClusterBackendsWaitingWarning
|
|
annotations:
|
|
summary: CNPG Cluster a backend is waiting for longer than 5 minutes.
|
|
description: |-
|
|
Pod {{ $labels.pod }}
|
|
has been waiting for longer than 5 minutes
|
|
expr: |
|
|
cnpg_backends_waiting_total{namespace="gitea"} > 300
|
|
for: 1m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterDatabaseDeadlockConflictsWarning
|
|
annotations:
|
|
summary: CNPG Cluster has over 10 deadlock conflicts.
|
|
description: |-
|
|
There are over 10 deadlock conflicts in
|
|
{{ $labels.pod }}
|
|
expr: |
|
|
cnpg_pg_stat_database_deadlocks{namespace="gitea"} > 10
|
|
for: 1m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterHACritical
|
|
annotations:
|
|
summary: CNPG Cluster has no standby replicas!
|
|
description: |-
|
|
CloudNativePG Cluster "{{`{{`}} $labels.job {{`}}`}}" has no ready standby replicas. Your cluster at a severe
|
|
risk of data loss and downtime if the primary instance fails.
|
|
|
|
The primary instance is still online and able to serve queries, although connections to the `-ro` endpoint
|
|
will fail. The `-r` endpoint os operating at reduced capacity and all traffic is being served by the main.
|
|
|
|
This can happen during a normal fail-over or automated minor version upgrades in a cluster with 2 or less
|
|
instances. The replaced instance may need some time to catch-up with the cluster primary instance.
|
|
|
|
This alarm will be always trigger if your cluster is configured to run with only 1 instance. In this
|
|
case you may want to silence it.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterHACritical.md
|
|
expr: |
|
|
max by (job) (cnpg_pg_replication_streaming_replicas{namespace="gitea"} - cnpg_pg_replication_is_wal_receiver_up{namespace="gitea"}) < 1
|
|
for: 5m
|
|
labels:
|
|
severity: critical
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterHAWarning
|
|
annotations:
|
|
summary: CNPG Cluster less than 2 standby replicas.
|
|
description: |-
|
|
CloudNativePG Cluster "{{`{{`}} $labels.job {{`}}`}}" has only {{`{{`}} $value {{`}}`}} standby replicas, putting
|
|
your cluster at risk if another instance fails. The cluster is still able to operate normally, although
|
|
the `-ro` and `-r` endpoints operate at reduced capacity.
|
|
|
|
This can happen during a normal fail-over or automated minor version upgrades. The replaced instance may
|
|
need some time to catch-up with the cluster primary instance.
|
|
|
|
This alarm will be constantly triggered if your cluster is configured to run with less than 3 instances.
|
|
In this case you may want to silence it.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterHAWarning.md
|
|
expr: |
|
|
max by (job) (cnpg_pg_replication_streaming_replicas{namespace="gitea"} - cnpg_pg_replication_is_wal_receiver_up{namespace="gitea"}) < 2
|
|
for: 5m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterHighConnectionsCritical
|
|
annotations:
|
|
summary: CNPG Instance maximum number of connections critical!
|
|
description: |-
|
|
CloudNativePG Cluster "gitea/gitea-postgresql-18-cluster" instance {{`{{`}} $labels.pod {{`}}`}} is using {{`{{`}} $value {{`}}`}}% of
|
|
the maximum number of connections.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterHighConnectionsCritical.md
|
|
expr: |
|
|
sum by (pod) (cnpg_backends_total{namespace="gitea", pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}) / max by (pod) (cnpg_pg_settings_setting{name="max_connections", namespace="gitea", pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}) * 100 > 95
|
|
for: 5m
|
|
labels:
|
|
severity: critical
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterHighConnectionsWarning
|
|
annotations:
|
|
summary: CNPG Instance is approaching the maximum number of connections.
|
|
description: |-
|
|
CloudNativePG Cluster "gitea/gitea-postgresql-18-cluster" instance {{`{{`}} $labels.pod {{`}}`}} is using {{`{{`}} $value {{`}}`}}% of
|
|
the maximum number of connections.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterHighConnectionsWarning.md
|
|
expr: |
|
|
sum by (pod) (cnpg_backends_total{namespace="gitea", pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}) / max by (pod) (cnpg_pg_settings_setting{name="max_connections", namespace="gitea", pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}) * 100 > 80
|
|
for: 5m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterHighReplicationLag
|
|
annotations:
|
|
summary: CNPG Cluster high replication lag
|
|
description: |-
|
|
CloudNativePG Cluster "gitea/gitea-postgresql-18-cluster" is experiencing a high replication lag of
|
|
{{`{{`}} $value {{`}}`}}ms.
|
|
|
|
High replication lag indicates network issues, busy instances, slow queries or suboptimal configuration.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterHighReplicationLag.md
|
|
expr: |
|
|
max(cnpg_pg_replication_lag{namespace="gitea",pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}) * 1000 > 1000
|
|
for: 5m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterInstancesOnSameNode
|
|
annotations:
|
|
summary: CNPG Cluster instances are located on the same node.
|
|
description: |-
|
|
CloudNativePG Cluster "gitea/gitea-postgresql-18-cluster" has {{`{{`}} $value {{`}}`}}
|
|
instances on the same node {{`{{`}} $labels.node {{`}}`}}.
|
|
|
|
A failure or scheduled downtime of a single node will lead to a potential service disruption and/or data loss.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterInstancesOnSameNode.md
|
|
expr: |
|
|
count by (node) (kube_pod_info{namespace="gitea", pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}) > 1
|
|
for: 5m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterLongRunningTransactionWarning
|
|
annotations:
|
|
summary: CNPG Cluster query is taking longer than 5 minutes.
|
|
description: |-
|
|
CloudNativePG Cluster Pod {{ $labels.pod }}
|
|
is taking more than 5 minutes (300 seconds) for a query.
|
|
expr: |-
|
|
cnpg_backends_max_tx_duration_seconds{namespace="gitea"} > 300
|
|
for: 1m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterLowDiskSpaceCritical
|
|
annotations:
|
|
summary: CNPG Instance is running out of disk space!
|
|
description: |-
|
|
CloudNativePG Cluster "gitea/gitea-postgresql-18-cluster" is running extremely low on disk space. Check attached PVCs!
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterLowDiskSpaceCritical.md
|
|
expr: |
|
|
max(max by(persistentvolumeclaim) (1 - kubelet_volume_stats_available_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"} / kubelet_volume_stats_capacity_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"})) > 0.9 OR
|
|
max(max by(persistentvolumeclaim) (1 - kubelet_volume_stats_available_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$-wal"} / kubelet_volume_stats_capacity_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$-wal"})) > 0.9 OR
|
|
max(sum by (namespace,persistentvolumeclaim) (kubelet_volume_stats_used_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$-tbs.*"})
|
|
/
|
|
sum by (namespace,persistentvolumeclaim) (kubelet_volume_stats_capacity_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$-tbs.*"})
|
|
*
|
|
on(namespace, persistentvolumeclaim) group_left(volume)
|
|
kube_pod_spec_volumes_persistentvolumeclaims_info{pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}
|
|
) > 0.9
|
|
for: 5m
|
|
labels:
|
|
severity: critical
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterLowDiskSpaceWarning
|
|
annotations:
|
|
summary: CNPG Instance is running out of disk space.
|
|
description: |-
|
|
CloudNativePG Cluster "gitea/gitea-postgresql-18-cluster" is running low on disk space. Check attached PVCs.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterLowDiskSpaceWarning.md
|
|
expr: |
|
|
max(max by(persistentvolumeclaim) (1 - kubelet_volume_stats_available_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"} / kubelet_volume_stats_capacity_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"})) > 0.7 OR
|
|
max(max by(persistentvolumeclaim) (1 - kubelet_volume_stats_available_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$-wal"} / kubelet_volume_stats_capacity_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$-wal"})) > 0.7 OR
|
|
max(sum by (namespace,persistentvolumeclaim) (kubelet_volume_stats_used_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$-tbs.*"})
|
|
/
|
|
sum by (namespace,persistentvolumeclaim) (kubelet_volume_stats_capacity_bytes{namespace="gitea", persistentvolumeclaim=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$-tbs.*"})
|
|
*
|
|
on(namespace, persistentvolumeclaim) group_left(volume)
|
|
kube_pod_spec_volumes_persistentvolumeclaims_info{pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}
|
|
) > 0.7
|
|
for: 5m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterOffline
|
|
annotations:
|
|
summary: CNPG Cluster has no running instances!
|
|
description: |-
|
|
CloudNativePG Cluster "gitea/gitea-postgresql-18-cluster" has no ready instances.
|
|
|
|
Having an offline cluster means your applications will not be able to access the database, leading to
|
|
potential service disruption and/or data loss.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterOffline.md
|
|
expr: |
|
|
(count(cnpg_collector_up{namespace="gitea",pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"}) OR on() vector(0)) == 0
|
|
for: 5m
|
|
labels:
|
|
severity: critical
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterPGDatabaseXidAgeWarning
|
|
annotations:
|
|
summary: CNPG Cluster has a number of transactions from the frozen XID to the current one.
|
|
description: |-
|
|
Over 300,000,000 transactions from frozen xid
|
|
on pod {{ $labels.pod }}
|
|
expr: |
|
|
cnpg_pg_database_xid_age{namespace="gitea"} > 300000000
|
|
for: 1m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterPGReplicationWarning
|
|
annotations:
|
|
summary: CNPG Cluster standby is lagging behind the primary.
|
|
description: |-
|
|
Standby is lagging behind by over 300 seconds (5 minutes)
|
|
expr: |
|
|
cnpg_pg_replication_lag{namespace="gitea"} > 300
|
|
for: 1m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterReplicaFailingReplicationWarning
|
|
annotations:
|
|
summary: CNPG Cluster has a replica is failing to replicate.
|
|
description: |-
|
|
Replica {{ $labels.pod }}
|
|
is failing to replicate
|
|
expr: |
|
|
cnpg_pg_replication_in_recovery{namespace="gitea"} > cnpg_pg_replication_is_wal_receiver_up{namespace="gitea"}
|
|
for: 1m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
- alert: CNPGClusterZoneSpreadWarning
|
|
annotations:
|
|
summary: CNPG Cluster instances in the same zone.
|
|
description: |-
|
|
CloudNativePG Cluster "gitea/gitea-postgresql-18-cluster" has instances in the same availability zone.
|
|
|
|
A disaster in one availability zone will lead to a potential service disruption and/or data loss.
|
|
runbook_url: https://github.com/cloudnative-pg/charts/blob/main/charts/cluster/docs/runbooks/CNPGClusterZoneSpreadWarning.md
|
|
expr: |
|
|
3 > count(count by (label_topology_kubernetes_io_zone) (kube_pod_info{namespace="gitea", pod=~"gitea-postgresql-18-cluster-([1-9][0-9]*)$"} * on(node,instance) group_left(label_topology_kubernetes_io_zone) kube_node_labels)) < 3
|
|
for: 5m
|
|
labels:
|
|
severity: warning
|
|
namespace: gitea
|
|
cnpg_cluster: gitea-postgresql-18-cluster
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: PrometheusRule
|
|
metadata:
|
|
name: gitea-valkey-renovate
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/part-of: valkey
|
|
spec:
|
|
groups:
|
|
- name: gitea-valkey-renovate
|
|
rules:
|
|
- alert: ValkeyDown
|
|
annotations:
|
|
description: Valkey instance {{ $labels.instance }} is down.
|
|
summary: Valkey instance {{ $labels.instance }} down
|
|
expr: |
|
|
redis_up{service="gitea-valkey-renovate-metrics"} == 0
|
|
for: 2m
|
|
labels:
|
|
severity: error
|
|
- alert: ValkeyMemoryHigh
|
|
annotations:
|
|
description: |
|
|
Valkey instance {{ $labels.instance }} is using {{ $value }}% of its available memory.
|
|
summary: Valkey instance {{ $labels.instance }} is using too much memory
|
|
expr: |
|
|
redis_memory_used_bytes{service="gitea-valkey-renovate-metrics"} * 100
|
|
/
|
|
redis_memory_max_bytes{service="gitea-valkey-renovate-metrics"}
|
|
> 90 <= 100
|
|
for: 2m
|
|
labels:
|
|
severity: error
|
|
- alert: ValkeyKeyEviction
|
|
annotations:
|
|
description: |
|
|
Valkey instance {{ $labels.instance }} has evicted {{ $value }} keys in the last 5 minutes.
|
|
summary: Valkey instance {{ $labels.instance }} has evicted keys
|
|
expr: |
|
|
increase(redis_evicted_keys_total{service="gitea-valkey-renovate-metrics"}[5m]) > 0
|
|
for: 1s
|
|
labels:
|
|
severity: error
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: PrometheusRule
|
|
metadata:
|
|
name: gitea-valkey
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/part-of: valkey
|
|
spec:
|
|
groups:
|
|
- name: gitea-valkey
|
|
rules:
|
|
- alert: ValkeyDown
|
|
annotations:
|
|
description: Valkey instance {{ $labels.instance }} is down.
|
|
summary: Valkey instance {{ $labels.instance }} down
|
|
expr: |
|
|
redis_up{service="gitea-valkey-metrics"} == 0
|
|
for: 2m
|
|
labels:
|
|
severity: error
|
|
- alert: ValkeyMemoryHigh
|
|
annotations:
|
|
description: |
|
|
Valkey instance {{ $labels.instance }} is using {{ $value }}% of its available memory.
|
|
summary: Valkey instance {{ $labels.instance }} is using too much memory
|
|
expr: |
|
|
redis_memory_used_bytes{service="gitea-valkey-metrics"} * 100
|
|
/
|
|
redis_memory_max_bytes{service="gitea-valkey-metrics"}
|
|
> 90 <= 100
|
|
for: 2m
|
|
labels:
|
|
severity: error
|
|
- alert: ValkeyKeyEviction
|
|
annotations:
|
|
description: |
|
|
Valkey instance {{ $labels.instance }} has evicted {{ $value }} keys in the last 5 minutes.
|
|
summary: Valkey instance {{ $labels.instance }} has evicted keys
|
|
expr: |
|
|
increase(redis_evicted_keys_total{service="gitea-valkey-metrics"}[5m]) > 0
|
|
for: 1s
|
|
labels:
|
|
severity: error
|
|
---
|
|
apiVersion: volsync.backube/v1alpha1
|
|
kind: ReplicationSource
|
|
metadata:
|
|
name: gitea-shared-storage-backup-source-local
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: volsync-target-storage-0.8.0
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "0.8.0"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: gitea-shared-storage-backup
|
|
spec:
|
|
sourcePVC: gitea-shared-storage
|
|
trigger:
|
|
schedule: 0 0 7 * * *
|
|
restic:
|
|
pruneIntervalDays: 3
|
|
repository: gitea-shared-storage-backup-secret-local
|
|
retain:
|
|
daily: 1
|
|
hourly: 1
|
|
monthly: 0
|
|
weekly: 3
|
|
yearly: 0
|
|
moverSecurityContext:
|
|
fsGroup: 1000
|
|
fsGroupChangePolicy: OnRootMismatch
|
|
runAsGroup: 1000
|
|
runAsUser: 1000
|
|
copyMethod: Snapshot
|
|
storageClassName: ceph-filesystem
|
|
volumeSnapshotClassName: ceph-filesystem-snapshot
|
|
cacheCapacity: 10Gi
|
|
---
|
|
apiVersion: postgresql.cnpg.io/v1
|
|
kind: ScheduledBackup
|
|
metadata:
|
|
name: "gitea-postgresql-18-scheduled-backup-live-backup"
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: postgres-18-cluster-7.9.1
|
|
app.kubernetes.io/name: gitea-postgresql-18
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
app.kubernetes.io/version: "7.9.1"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/name: "gitea-postgresql-18-scheduled-backup-live-backup"
|
|
spec:
|
|
immediate: true
|
|
suspend: false
|
|
schedule: "0 0 7 * * *"
|
|
backupOwnerReference: self
|
|
cluster:
|
|
name: gitea-postgresql-18-cluster
|
|
method: plugin
|
|
pluginConfiguration:
|
|
name: barman-cloud.cloudnative-pg.io
|
|
parameters:
|
|
barmanObjectName: "gitea-postgresql-18-backup-garage-local"
|
|
---
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: gitea-init
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: gitea-12.5.0
|
|
app: gitea
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "1.25.5"
|
|
version: "1.25.5"
|
|
app.kubernetes.io/managed-by: Helm
|
|
type: Opaque
|
|
stringData:
|
|
configure_gpg_environment.sh: |
|
|
#!/usr/bin/env bash
|
|
set -eu
|
|
|
|
gpg --batch --import "$TMP_RAW_GPG_KEY"
|
|
init_directory_structure.sh: |-
|
|
#!/usr/bin/env bash
|
|
|
|
set -euo pipefail
|
|
# BEGIN: initPreScript
|
|
wget https://github.com/catppuccin/gitea/releases/latest/download/catppuccin-gitea.tar.gz;
|
|
tar -xvzf catppuccin-gitea.tar.gz -C /data/gitea/public/assets/css;
|
|
rm catppuccin-gitea.tar.gz;
|
|
# END: initPreScript
|
|
mkdir -pv /data/git/.ssh
|
|
chmod -Rv 700 /data/git/.ssh
|
|
[ ! -d /data/gitea/conf ] && mkdir -pv /data/gitea/conf
|
|
|
|
# prepare temp directory structure
|
|
mkdir -pv "${GITEA_TEMP}"
|
|
chmod -v ug+rwx "${GITEA_TEMP}"
|
|
configure_gitea.sh: "#!/usr/bin/env bash\n\nset -euo pipefail\n\necho '==== BEGIN GITEA CONFIGURATION ===='\n\n{ # try\n gitea migrate\n} || { # catch\n echo \"Gitea migrate might fail due to database connection...This init-container will try again in a few seconds\"\n exit 1\n}\nfunction configure_admin_user() {\n local full_admin_list=$(gitea admin user list --admin)\n local actual_user_table=''\n\n # We might have distorted output due to warning logs, so we have to detect the actual user table by its headline and trim output above that line\n local regex=\"(.*)(ID\\s+Username\\s+Email\\s+IsActive.*)\"\n if [[ \"${full_admin_list}\" =~ $regex ]]; then\n actual_user_table=$(echo \"${BASH_REMATCH[2]}\" | tail -n+2) # tail'ing to drop the table headline\n else\n # This code block should never be reached, as long as the output table header remains the same.\n # If this code block is reached, the regex doesn't match anymore and we probably have to adjust this script.\n\n echo \"ERROR: 'configure_admin_user' was not able to determine the current list of admin users.\"\n echo \" Please review the output of 'gitea admin user list --admin' shown below.\"\n echo \" If you think it is an issue with the Helm Chart provisioning, file an issue at https://gitea.com/gitea/helm-gitea/issues.\"\n echo \"DEBUG: Output of 'gitea admin user list --admin'\"\n echo \"--\"\n echo \"${full_admin_list}\"\n echo \"--\"\n exit 1\n fi\n\n local ACCOUNT_ID=$(echo \"${actual_user_table}\" | grep -E \"\\s+${GITEA_ADMIN_USERNAME}\\s+\" | awk -F \" \" \"{printf \\$1}\")\n if [[ -z \"${ACCOUNT_ID}\" ]]; then\n local -a create_args\n create_args=(--admin --username \"${GITEA_ADMIN_USERNAME}\" --password \"${GITEA_ADMIN_PASSWORD}\" --email \"gitea@local.domain\")\n if [[ \"${GITEA_ADMIN_PASSWORD_MODE}\" = initialOnlyRequireReset ]]; then\n create_args+=(--must-change-password=true)\n else\n create_args+=(--must-change-password=false)\n fi\n echo \"No admin user '${GITEA_ADMIN_USERNAME}' found. Creating now...\"\n gitea admin user create \"${create_args[@]}\"\n echo '...created.'\n else\n if [[ \"${GITEA_ADMIN_PASSWORD_MODE}\" = keepUpdated ]]; then\n echo \"Admin account '${GITEA_ADMIN_USERNAME}' already exist. Running update to sync password...\"\n # See https://gitea.com/gitea/helm-gitea/issues/673\n # --must-change-password argument was added to change-password, defaulting to true, counter to the previous behavior\n # which acted as if it were provided with =false. If the argument is present in this version of gitea, then we\n # should add it to prevent requiring frequent admin password resets.\n local -a change_args\n change_args=(--username \"${GITEA_ADMIN_USERNAME}\" --password \"${GITEA_ADMIN_PASSWORD}\")\n if gitea admin user change-password --help | grep -qF -- '--must-change-password'; then\n change_args+=(--must-change-password=false)\n fi\n gitea admin user change-password \"${change_args[@]}\"\n echo '...password sync done.'\n else\n echo \"Admin account '${GITEA_ADMIN_USERNAME}' already exist, but update mode is set to '${GITEA_ADMIN_PASSWORD_MODE}'. Skipping.\"\n fi\n fi\n}\n\nconfigure_admin_user\n\nfunction configure_ldap() {\n echo 'no ldap configuration... skipping.'\n}\n\nconfigure_ldap\n\nfunction configure_oauth() {\n local OAUTH_NAME='Authentik'\n local full_auth_list=$(gitea admin auth list --vertical-bars)\n local actual_auth_table=''\n\n # We might have distorted output due to warning logs, so we have to detect the actual user table by its headline and trim output above that line\n local regex=\"(.*)(ID\\s+\\|Name\\s+\\|Type\\s+\\|Enabled.*)\"\n if [[ \"${full_auth_list}\" =~ $regex ]]; then\n actual_auth_table=$(echo \"${BASH_REMATCH[2]}\" | tail -n+2) # tail'ing to drop the table headline\n else\n # This code block should never be reached, as long as the output table header remains the same.\n # If this code block is reached, the regex doesn't match anymore and we probably have to adjust this script.\n\n echo \"ERROR: 'configure_oauth' was not able to determine the current list of authentication sources.\"\n echo \" Please review the output of 'gitea admin auth list --vertical-bars' shown below.\"\n echo \" If you think it is an issue with the Helm Chart provisioning, file an issue at https://gitea.com/gitea/helm-gitea/issues.\"\n echo \"DEBUG: Output of 'gitea admin auth list --vertical-bars'\"\n echo \"--\"\n echo \"${full_auth_list}\"\n echo \"--\"\n exit 1\n fi\n\n local AUTH_ID=$(echo \"${actual_auth_table}\" | grep -E \"\\|${OAUTH_NAME}\\s+\\|\" | grep -iE '\\|OAuth2\\s+\\|' | awk -F \" \" \"{print \\$1}\")\n\n if [[ -z \"${AUTH_ID}\" ]]; then\n echo \"No oauth configuration found with name '${OAUTH_NAME}'. Installing it now...\"\n gitea admin auth add-oauth --auto-discover-url \"https://auth.alexlebens.dev/application/o/gitea/.well-known/openid-configuration\" --icon-url \"https://goauthentik.io/img/icon.png\" --key \"${GITEA_OAUTH_KEY_0}\" --name \"Authentik\" --provider \"openidConnect\" --scopes \"email profile\" --secret \"${GITEA_OAUTH_SECRET_0}\" \n echo '...installed.'\n else\n echo \"Existing oauth configuration with name '${OAUTH_NAME}': '${AUTH_ID}'. Running update to sync settings...\"\n gitea admin auth update-oauth --id \"${AUTH_ID}\" --auto-discover-url \"https://auth.alexlebens.dev/application/o/gitea/.well-known/openid-configuration\" --icon-url \"https://goauthentik.io/img/icon.png\" --key \"${GITEA_OAUTH_KEY_0}\" --name \"Authentik\" --provider \"openidConnect\" --scopes \"email profile\" --secret \"${GITEA_OAUTH_SECRET_0}\" \n echo '...sync settings done.'\n fi\n}\n\nconfigure_oauth\n\necho '==== END GITEA CONFIGURATION ===='"
|
|
---
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: gitea-inline-config
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: gitea-12.5.0
|
|
app: gitea
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "1.25.5"
|
|
version: "1.25.5"
|
|
app.kubernetes.io/managed-by: Helm
|
|
type: Opaque
|
|
stringData:
|
|
_generals_: APP_NAME=Gitea
|
|
actions: ENABLED=true
|
|
cache: |-
|
|
ADAPTER=redis
|
|
ENABLED=true
|
|
HOST=redis://gitea-valkey.gitea:6379
|
|
database: |-
|
|
DB_TYPE=postgres
|
|
SCHEMA=public
|
|
explore: REQUIRE_SIGNIN_VIEW=true
|
|
indexer: |-
|
|
ISSUE_INDEXER_ENABLED=true
|
|
ISSUE_INDEXER_TYPE=meilisearch
|
|
REPO_INDEXER_ENABLED=false
|
|
metrics: ENABLED=true
|
|
mirror: DEFAULT_INTERVAL=10m
|
|
oauth2_client: ENABLE_AUTO_REGISTRATION=true
|
|
queue: |-
|
|
CONN_STR=redis://gitea-valkey.gitea:6379
|
|
TYPE=redis
|
|
repo-archive: ENABLED=false
|
|
repository: ROOT=/data/git/gitea-repositories
|
|
security: INSTALL_LOCK=true
|
|
server: |-
|
|
APP_DATA_PATH=/data
|
|
DOMAIN=gitea.alexlebens.dev
|
|
ENABLE_PPROF=true
|
|
HTTP_PORT=3000
|
|
LANDING_PAGE=explore
|
|
LOCAL_ROOT_URL=http://gitea-http.gitea.svc.cluster.local:3000
|
|
PROTOCOL=http
|
|
ROOT_URL=https://gitea.alexlebens.dev
|
|
SSH_DOMAIN=gitea.alexlebens.net
|
|
SSH_LISTEN_PORT=22
|
|
SSH_PORT=22
|
|
START_SSH_SERVER=true
|
|
service: |-
|
|
ALLOW_ONLY_EXTERNAL_REGISTRATION=true
|
|
REGISTER_MANUAL_CONFIRM=true
|
|
SHOW_REGISTRATION_BUTTON=false
|
|
session: |-
|
|
PROVIDER=redis
|
|
PROVIDER_CONFIG=redis://gitea-valkey.gitea:6379
|
|
ui: |-
|
|
DEFAULT_THEME=gitea-auto
|
|
THEMES=gitea-light,gitea-dark,gitea-auto,catppuccin-rosewater-auto,catppuccin-flamingo-auto,catppuccin-pink-auto,catppuccin-mauve-auto,catppuccin-red-auto,catppuccin-maroon-auto,catppuccin-peach-auto,catppuccin-yellow-auto,catppuccin-green-auto,catppuccin-teal-auto,catppuccin-sky-auto,catppuccin-sapphire-auto,catppuccin-blue-auto,catppuccin-lavender-auto,catppuccin-latte-rosewater,catppuccin-latte-flamingo,catppuccin-latte-pink,catppuccin-latte-mauve,catppuccin-latte-red,catppuccin-latte-maroon,catppuccin-latte-peach,catppuccin-latte-yellow,catppuccin-latte-green,catppuccin-latte-teal,catppuccin-latte-sky,catppuccin-latte-sapphire,catppuccin-latte-blue,catppuccin-latte-lavender,catppuccin-frappe-rosewater,catppuccin-frappe-flamingo,catppuccin-frappe-pink,catppuccin-frappe-mauve,catppuccin-frappe-red,catppuccin-frappe-maroon,catppuccin-frappe-peach,catppuccin-frappe-yellow,catppuccin-frappe-green,catppuccin-frappe-teal,catppuccin-frappe-sky,catppuccin-frappe-sapphire,catppuccin-frappe-blue,catppuccin-frappe-lavender,catppuccin-macchiato-rosewater,catppuccin-macchiato-flamingo,catppuccin-macchiato-pink,catppuccin-macchiato-mauve,catppuccin-macchiato-red,catppuccin-macchiato-maroon,catppuccin-macchiato-peach,catppuccin-macchiato-yellow,catppuccin-macchiato-green,catppuccin-macchiato-teal,catppuccin-macchiato-sky,catppuccin-macchiato-sapphire,catppuccin-macchiato-blue,catppuccin-macchiato-lavender,catppuccin-mocha-rosewater,catppuccin-mocha-flamingo,catppuccin-mocha-pink,catppuccin-mocha-mauve,catppuccin-mocha-red,catppuccin-mocha-maroon,catppuccin-mocha-peach,catppuccin-mocha-yellow,catppuccin-mocha-green,catppuccin-mocha-teal,catppuccin-mocha-sky,catppuccin-mocha-sapphire,catppuccin-mocha-blue,catppuccin-mocha-lavender
|
|
webhook: ALLOWED_HOST_LIST=private
|
|
---
|
|
apiVersion: v1
|
|
kind: Secret
|
|
metadata:
|
|
name: gitea
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: gitea-12.5.0
|
|
app: gitea
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "1.25.5"
|
|
version: "1.25.5"
|
|
app.kubernetes.io/managed-by: Helm
|
|
type: Opaque
|
|
stringData:
|
|
config_environment.sh: |
|
|
#!/usr/bin/env bash
|
|
set -euo pipefail
|
|
|
|
function env2ini::log() {
|
|
printf "${1}\n"
|
|
}
|
|
|
|
function env2ini::read_config_to_env() {
|
|
local section="${1}"
|
|
local line="${2}"
|
|
|
|
if [[ -z "${line}" ]]; then
|
|
# skip empty line
|
|
return
|
|
fi
|
|
|
|
# 'xargs echo -n' trims all leading/trailing whitespaces and a trailing new line
|
|
local setting="$(awk -F '=' '{print $1}' <<< "${line}" | xargs echo -n)"
|
|
|
|
if [[ -z "${setting}" ]]; then
|
|
env2ini::log ' ! invalid setting'
|
|
exit 1
|
|
fi
|
|
|
|
local value=''
|
|
local regex="^${setting}(\s*)=(\s*)(.*)"
|
|
if [[ $line =~ $regex ]]; then
|
|
value="${BASH_REMATCH[3]}"
|
|
else
|
|
env2ini::log ' ! invalid setting'
|
|
exit 1
|
|
fi
|
|
|
|
env2ini::log " + '${setting}'"
|
|
|
|
if [[ -z "${section}" ]]; then
|
|
export "GITEA____${setting^^}=${value}" # '^^' makes the variable content uppercase
|
|
return
|
|
fi
|
|
|
|
local masked_section="${section//./_0X2E_}" # '//' instructs to replace all matches
|
|
masked_section="${masked_section//-/_0X2D_}"
|
|
|
|
export "GITEA__${masked_section^^}__${setting^^}=${value}" # '^^' makes the variable content uppercase
|
|
}
|
|
|
|
function env2ini::reload_preset_envs() {
|
|
env2ini::log "Reloading preset envs..."
|
|
|
|
while read -r line; do
|
|
if [[ -z "${line}" ]]; then
|
|
# skip empty line
|
|
return
|
|
fi
|
|
|
|
# 'xargs echo -n' trims all leading/trailing whitespaces and a trailing new line
|
|
local setting="$(awk -F '=' '{print $1}' <<< "${line}" | xargs echo -n)"
|
|
|
|
if [[ -z "${setting}" ]]; then
|
|
env2ini::log ' ! invalid setting'
|
|
exit 1
|
|
fi
|
|
|
|
local value=''
|
|
local regex="^${setting}(\s*)=(\s*)(.*)"
|
|
if [[ $line =~ $regex ]]; then
|
|
value="${BASH_REMATCH[3]}"
|
|
else
|
|
env2ini::log ' ! invalid setting'
|
|
exit 1
|
|
fi
|
|
|
|
env2ini::log " + '${setting}'"
|
|
|
|
export "${setting^^}=${value}" # '^^' makes the variable content uppercase
|
|
done < "$TMP_EXISTING_ENVS_FILE"
|
|
|
|
rm $TMP_EXISTING_ENVS_FILE
|
|
}
|
|
|
|
|
|
function env2ini::process_config_file() {
|
|
local config_file="${1}"
|
|
local section="$(basename "${config_file}")"
|
|
|
|
if [[ $section == '_generals_' ]]; then
|
|
env2ini::log " [ini root]"
|
|
section=''
|
|
else
|
|
env2ini::log " ${section}"
|
|
fi
|
|
|
|
while read -r line; do
|
|
env2ini::read_config_to_env "${section}" "${line}"
|
|
done < <(awk 1 "${config_file}") # Helm .toYaml trims the trailing new line which breaks line processing; awk 1 ... adds it back while reading
|
|
}
|
|
|
|
function env2ini::load_config_sources() {
|
|
local path="${1}"
|
|
|
|
if [[ -d "${path}" ]]; then
|
|
env2ini::log "Processing $(basename "${path}")..."
|
|
|
|
while read -d '' configFile; do
|
|
env2ini::process_config_file "${configFile}"
|
|
done < <(find "${path}" -type l -not -name '..data' -print0)
|
|
|
|
env2ini::log "\n"
|
|
fi
|
|
}
|
|
|
|
function env2ini::generate_initial_secrets() {
|
|
# These environment variables will either be
|
|
# - overwritten with user defined values,
|
|
# - initially used to set up Gitea
|
|
# Anyway, they won't harm existing app.ini files
|
|
|
|
export GITEA__SECURITY__INTERNAL_TOKEN=$(gitea generate secret INTERNAL_TOKEN)
|
|
export GITEA__SECURITY__SECRET_KEY=$(gitea generate secret SECRET_KEY)
|
|
export GITEA__OAUTH2__JWT_SECRET=$(gitea generate secret JWT_SECRET)
|
|
export GITEA__SERVER__LFS_JWT_SECRET=$(gitea generate secret LFS_JWT_SECRET)
|
|
|
|
env2ini::log "...Initial secrets generated\n"
|
|
}
|
|
|
|
# save existing envs prior to script execution. Necessary to keep order of preexisting and custom envs
|
|
env | (grep -e '^GITEA__' || [[ $? == 1 ]]) > $TMP_EXISTING_ENVS_FILE
|
|
|
|
# MUST BE CALLED BEFORE OTHER CONFIGURATION
|
|
env2ini::generate_initial_secrets
|
|
|
|
env2ini::load_config_sources "$ENV_TO_INI_MOUNT_POINT/inlines/"
|
|
env2ini::load_config_sources "$ENV_TO_INI_MOUNT_POINT/additionals/"
|
|
|
|
# load existing envs to override auto generated envs
|
|
env2ini::reload_preset_envs
|
|
|
|
env2ini::log "=== All configuration sources loaded ===\n"
|
|
|
|
# safety to prevent rewrite of secret keys if an app.ini already exists
|
|
if [ -f ${GITEA_APP_INI} ]; then
|
|
env2ini::log 'An app.ini file already exists. To prevent overwriting secret keys, these settings are dropped and remain unchanged:'
|
|
env2ini::log ' - security.INTERNAL_TOKEN'
|
|
env2ini::log ' - security.SECRET_KEY'
|
|
env2ini::log ' - oauth2.JWT_SECRET'
|
|
env2ini::log ' - server.LFS_JWT_SECRET'
|
|
|
|
unset GITEA__SECURITY__INTERNAL_TOKEN
|
|
unset GITEA__SECURITY__SECRET_KEY
|
|
unset GITEA__OAUTH2__JWT_SECRET
|
|
unset GITEA__SERVER__LFS_JWT_SECRET
|
|
fi
|
|
|
|
environment-to-ini -o $GITEA_APP_INI
|
|
assertions: ""
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-http
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: gitea-12.5.0
|
|
app: gitea
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "1.25.5"
|
|
version: "1.25.5"
|
|
app.kubernetes.io/managed-by: Helm
|
|
annotations: {}
|
|
spec:
|
|
type: ClusterIP
|
|
clusterIP: 10.103.160.139
|
|
ports:
|
|
- name: http
|
|
port: 3000
|
|
targetPort:
|
|
selector:
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-meilisearch
|
|
labels:
|
|
helm.sh/chart: meilisearch-0.27.0
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "v1.38.0"
|
|
app.kubernetes.io/component: search-engine
|
|
app.kubernetes.io/part-of: meilisearch
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
type: ClusterIP
|
|
ports:
|
|
- port: 7700
|
|
targetPort: http
|
|
protocol: TCP
|
|
name: http
|
|
selector:
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-ssh
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: gitea-12.5.0
|
|
app: gitea
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "1.25.5"
|
|
version: "1.25.5"
|
|
app.kubernetes.io/managed-by: Helm
|
|
annotations: {}
|
|
spec:
|
|
type: ClusterIP
|
|
clusterIP: 10.103.160.140
|
|
ports:
|
|
- name: ssh
|
|
port: 22
|
|
targetPort: 22
|
|
protocol: TCP
|
|
selector:
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-valkey-headless
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/component: headless
|
|
spec:
|
|
type: ClusterIP
|
|
clusterIP: None
|
|
publishNotReadyAddresses: true
|
|
ports:
|
|
- name: tcp
|
|
port: 6379
|
|
targetPort: tcp
|
|
protocol: TCP
|
|
selector:
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-valkey-metrics
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/component: metrics
|
|
app.kubernetes.io/part-of: valkey
|
|
annotations:
|
|
spec:
|
|
type: ClusterIP
|
|
ports:
|
|
- name: metrics
|
|
port: 9121
|
|
protocol: TCP
|
|
targetPort: metrics
|
|
selector:
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-valkey-read
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/component: read
|
|
spec:
|
|
type: ClusterIP
|
|
ports:
|
|
- name: tcp
|
|
port: 6379
|
|
targetPort: tcp
|
|
protocol: TCP
|
|
selector:
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-valkey-renovate-metrics
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/component: metrics
|
|
app.kubernetes.io/part-of: valkey
|
|
annotations:
|
|
spec:
|
|
type: ClusterIP
|
|
ports:
|
|
- name: metrics
|
|
port: 9121
|
|
protocol: TCP
|
|
targetPort: metrics
|
|
selector:
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-valkey-renovate
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/component: primary
|
|
spec:
|
|
type: ClusterIP
|
|
ports:
|
|
- port: 6379
|
|
targetPort: tcp
|
|
protocol: TCP
|
|
name: tcp
|
|
selector:
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
---
|
|
apiVersion: v1
|
|
kind: Service
|
|
metadata:
|
|
name: gitea-valkey
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/component: primary
|
|
spec:
|
|
type: ClusterIP
|
|
ports:
|
|
- port: 6379
|
|
targetPort: tcp
|
|
protocol: TCP
|
|
name: tcp
|
|
selector:
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
statefulset.kubernetes.io/pod-name: gitea-valkey-0
|
|
---
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
name: gitea-meilisearch
|
|
labels:
|
|
helm.sh/chart: meilisearch-0.27.0
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "v1.38.0"
|
|
app.kubernetes.io/component: search-engine
|
|
app.kubernetes.io/part-of: meilisearch
|
|
app.kubernetes.io/managed-by: Helm
|
|
automountServiceAccountToken: false
|
|
---
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
name: gitea-valkey-renovate
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
automountServiceAccountToken: false
|
|
---
|
|
apiVersion: v1
|
|
kind: ServiceAccount
|
|
metadata:
|
|
name: gitea-valkey
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
automountServiceAccountToken: false
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: ServiceMonitor
|
|
metadata:
|
|
name: gitea-meilisearch
|
|
namespace: gitea
|
|
labels:
|
|
helm.sh/chart: meilisearch-0.27.0
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "v1.38.0"
|
|
app.kubernetes.io/component: search-engine
|
|
app.kubernetes.io/part-of: meilisearch
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
jobLabel: gitea
|
|
namespaceSelector:
|
|
matchNames:
|
|
- gitea
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
endpoints:
|
|
- port: http
|
|
path: /metrics
|
|
interval: 1m
|
|
scrapeTimeout: 10s
|
|
bearerTokenSecret:
|
|
name: gitea-meilisearch-master-key-secret
|
|
key: MEILI_MASTER_KEY
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: ServiceMonitor
|
|
metadata:
|
|
name: gitea-valkey-renovate
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/part-of: valkey
|
|
app.kubernetes.io/component: service-monitor
|
|
spec:
|
|
endpoints:
|
|
- port: metrics
|
|
interval: 30s
|
|
namespaceSelector:
|
|
matchNames:
|
|
- gitea
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: valkey-renovate
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/component: metrics
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: ServiceMonitor
|
|
metadata:
|
|
name: gitea-valkey
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
app.kubernetes.io/part-of: valkey
|
|
app.kubernetes.io/component: service-monitor
|
|
spec:
|
|
endpoints:
|
|
- port: metrics
|
|
interval: 30s
|
|
namespaceSelector:
|
|
matchNames:
|
|
- gitea
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/component: metrics
|
|
---
|
|
apiVersion: monitoring.coreos.com/v1
|
|
kind: ServiceMonitor
|
|
metadata:
|
|
name: gitea
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: gitea
|
|
app.kubernetes.io/instance: gitea
|
|
endpoints:
|
|
- port: http
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
labels:
|
|
helm.sh/chart: gitea-actions-0.0.3
|
|
app: gitea-actions-act-runner
|
|
app.kubernetes.io/name: gitea-actions-act-runner
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "0.261.3"
|
|
version: "0.261.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
annotations:
|
|
name: gitea-gitea-actions-act-runner
|
|
namespace: gitea
|
|
spec:
|
|
replicas: 6
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: gitea-actions-act-runner
|
|
app.kubernetes.io/instance: gitea
|
|
template:
|
|
metadata:
|
|
annotations:
|
|
checksum/config: a40534c6e89cbb91f24a780f8910b70fcfda4b7ff61e88e37ac2c5e14a3768d0
|
|
labels:
|
|
helm.sh/chart: gitea-actions-0.0.3
|
|
app: gitea-actions-act-runner
|
|
app.kubernetes.io/name: gitea-actions-act-runner
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "0.261.3"
|
|
version: "0.261.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
securityContext: {}
|
|
initContainers:
|
|
- name: init-gitea
|
|
image: "busybox:1.37.0"
|
|
command:
|
|
- sh
|
|
- -c
|
|
- |
|
|
echo 'Trying to reach Gitea on http://gitea-http.gitea:3000'
|
|
until timeout 10 wget --no-check-certificate --spider http://gitea-http.gitea:3000; do
|
|
sleep 3
|
|
echo "Trying again in 3 seconds..."
|
|
done
|
|
echo "Gitea has been reached!"
|
|
- name: dind
|
|
image: "docker:28.3.3-dind"
|
|
imagePullPolicy: IfNotPresent
|
|
restartPolicy: Always
|
|
securityContext:
|
|
privileged: true
|
|
startupProbe:
|
|
exec:
|
|
command:
|
|
- /usr/bin/test
|
|
- -S
|
|
- /var/run/docker.sock
|
|
livenessProbe:
|
|
exec:
|
|
command:
|
|
- /usr/bin/test
|
|
- -S
|
|
- /var/run/docker.sock
|
|
resources: {}
|
|
volumeMounts:
|
|
- mountPath: /var/run/
|
|
name: docker-socket
|
|
containers:
|
|
- name: act-runner
|
|
image: "gitea/act_runner:0.2.13"
|
|
imagePullPolicy: IfNotPresent
|
|
workingDir: /data
|
|
env:
|
|
- name: GITEA_RUNNER_REGISTRATION_TOKEN
|
|
valueFrom:
|
|
secretKeyRef:
|
|
name: "gitea-runner-secret"
|
|
key: "token"
|
|
- name: GITEA_INSTANCE_URL
|
|
value: http://gitea-http.gitea:3000
|
|
- name: CONFIG_FILE
|
|
value: /actrunner/config.yaml
|
|
- name: TZ
|
|
value: America/Chicago
|
|
resources: {}
|
|
volumeMounts:
|
|
- mountPath: /actrunner/config.yaml
|
|
name: act-runner-config
|
|
subPath: config.yaml
|
|
- mountPath: /var/run/docker.sock
|
|
name: docker-socket
|
|
subPath: docker.sock
|
|
- mountPath: /data
|
|
name: data-act-runner
|
|
volumes:
|
|
- name: act-runner-config
|
|
configMap:
|
|
name: gitea-gitea-actions-act-runner-config
|
|
- name: docker-socket
|
|
emptyDir: {}
|
|
volumeClaimTemplates:
|
|
- metadata:
|
|
name: data-act-runner
|
|
spec:
|
|
accessModes: ["ReadWriteOnce"]
|
|
resources:
|
|
requests:
|
|
storage: 5Gi
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: gitea-meilisearch
|
|
labels:
|
|
helm.sh/chart: meilisearch-0.27.0
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "v1.38.0"
|
|
app.kubernetes.io/component: search-engine
|
|
app.kubernetes.io/part-of: meilisearch
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
replicas: 1
|
|
serviceName: gitea-meilisearch
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
template:
|
|
metadata:
|
|
labels:
|
|
helm.sh/chart: meilisearch-0.27.0
|
|
app.kubernetes.io/name: meilisearch
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "v1.38.0"
|
|
app.kubernetes.io/component: search-engine
|
|
app.kubernetes.io/part-of: meilisearch
|
|
app.kubernetes.io/managed-by: Helm
|
|
annotations:
|
|
checksum/config: 0e81aef3c5c4f794f40ff655f5b4bff70d6bc136a40828d9fde7eeae61fd23b0
|
|
spec:
|
|
serviceAccountName: gitea-meilisearch
|
|
securityContext:
|
|
fsGroup: 1000
|
|
fsGroupChangePolicy: OnRootMismatch
|
|
runAsGroup: 1000
|
|
runAsNonRoot: true
|
|
runAsUser: 1000
|
|
volumes:
|
|
- name: tmp
|
|
emptyDir: {}
|
|
- name: data
|
|
persistentVolumeClaim:
|
|
claimName: gitea-meilisearch
|
|
containers:
|
|
- name: meilisearch
|
|
image: "getmeili/meilisearch:v1.38.0"
|
|
imagePullPolicy: IfNotPresent
|
|
securityContext:
|
|
allowPrivilegeEscalation: false
|
|
capabilities:
|
|
drop:
|
|
- ALL
|
|
readOnlyRootFilesystem: true
|
|
volumeMounts:
|
|
- name: tmp
|
|
mountPath: /tmp
|
|
- name: data
|
|
mountPath: /meili_data
|
|
envFrom:
|
|
- configMapRef:
|
|
name: gitea-meilisearch-environment
|
|
- secretRef:
|
|
name: gitea-meilisearch-master-key-secret
|
|
ports:
|
|
- name: http
|
|
containerPort: 7700
|
|
protocol: TCP
|
|
startupProbe:
|
|
httpGet:
|
|
path: /health
|
|
port: http
|
|
periodSeconds: 1
|
|
initialDelaySeconds: 1
|
|
failureThreshold: 60
|
|
timeoutSeconds: 1
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /health
|
|
port: http
|
|
periodSeconds: 10
|
|
initialDelaySeconds: 0
|
|
timeoutSeconds: 10
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /health
|
|
port: http
|
|
periodSeconds: 10
|
|
initialDelaySeconds: 0
|
|
timeoutSeconds: 10
|
|
resources:
|
|
requests:
|
|
cpu: 10m
|
|
memory: 128Mi
|
|
---
|
|
apiVersion: apps/v1
|
|
kind: StatefulSet
|
|
metadata:
|
|
name: gitea-valkey
|
|
labels:
|
|
helm.sh/chart: valkey-0.9.3
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/version: "9.0.3"
|
|
app.kubernetes.io/managed-by: Helm
|
|
spec:
|
|
serviceName: gitea-valkey-headless
|
|
replicas: 3
|
|
podManagementPolicy: OrderedReady
|
|
selector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
volumeClaimTemplates:
|
|
- metadata:
|
|
name: valkey-data
|
|
spec:
|
|
accessModes:
|
|
- ReadWriteOnce
|
|
storageClassName: "ceph-block"
|
|
resources:
|
|
requests:
|
|
storage: "10Gi"
|
|
template:
|
|
metadata:
|
|
labels:
|
|
app.kubernetes.io/name: valkey
|
|
app.kubernetes.io/instance: gitea
|
|
annotations:
|
|
checksum/initconfig: "b82939dee80151a39606083af0d5422a"
|
|
spec:
|
|
automountServiceAccountToken: false
|
|
serviceAccountName: gitea-valkey
|
|
securityContext:
|
|
fsGroup: 1000
|
|
runAsGroup: 1000
|
|
runAsUser: 1000
|
|
initContainers:
|
|
- name: gitea-valkey-init
|
|
image: docker.io/valkey/valkey:9.0.3
|
|
imagePullPolicy: IfNotPresent
|
|
securityContext:
|
|
capabilities:
|
|
drop:
|
|
- ALL
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: true
|
|
runAsUser: 1000
|
|
command: ["/scripts/init.sh"]
|
|
env:
|
|
- name: POD_INDEX
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.labels['apps.kubernetes.io/pod-index']
|
|
volumeMounts:
|
|
- name: valkey-data
|
|
mountPath: /data
|
|
- name: scripts
|
|
mountPath: /scripts
|
|
containers:
|
|
- name: gitea-valkey
|
|
image: docker.io/valkey/valkey:9.0.3
|
|
imagePullPolicy: IfNotPresent
|
|
command: ["valkey-server"]
|
|
args: ["/data/conf/valkey.conf"]
|
|
securityContext:
|
|
capabilities:
|
|
drop:
|
|
- ALL
|
|
readOnlyRootFilesystem: true
|
|
runAsNonRoot: true
|
|
runAsUser: 1000
|
|
env:
|
|
- name: POD_INDEX
|
|
valueFrom:
|
|
fieldRef:
|
|
fieldPath: metadata.labels['apps.kubernetes.io/pod-index']
|
|
- name: VALKEY_LOGLEVEL
|
|
value: "notice"
|
|
ports:
|
|
- name: tcp
|
|
containerPort: 6379
|
|
protocol: TCP
|
|
startupProbe:
|
|
exec:
|
|
command: ["sh", "-c", "valkey-cli ping"]
|
|
livenessProbe:
|
|
exec:
|
|
command: ["sh", "-c", "valkey-cli ping"]
|
|
resources:
|
|
requests:
|
|
cpu: 20m
|
|
memory: 256Mi
|
|
volumeMounts:
|
|
- name: valkey-data
|
|
mountPath: /data
|
|
- name: metrics
|
|
image: ghcr.io/oliver006/redis_exporter:v1.82.0
|
|
imagePullPolicy: "IfNotPresent"
|
|
ports:
|
|
- name: metrics
|
|
containerPort: 9121
|
|
startupProbe:
|
|
tcpSocket:
|
|
port: metrics
|
|
livenessProbe:
|
|
tcpSocket:
|
|
port: metrics
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /
|
|
port: metrics
|
|
resources:
|
|
requests:
|
|
cpu: 10m
|
|
memory: 64M
|
|
env:
|
|
- name: REDIS_ALIAS
|
|
value: gitea-valkey
|
|
volumes:
|
|
- name: scripts
|
|
configMap:
|
|
name: gitea-valkey-init-scripts
|
|
defaultMode: 0555
|
|
---
|
|
apiVersion: gateway.networking.k8s.io/v1alpha2
|
|
kind: TCPRoute
|
|
metadata:
|
|
name: gitea-ssh
|
|
namespace: gitea
|
|
labels:
|
|
app.kubernetes.io/name: gitea-ssh
|
|
app.kubernetes.io/instance: gitea
|
|
app.kubernetes.io/part-of: gitea
|
|
spec:
|
|
parentRefs:
|
|
- group: gateway.networking.k8s.io
|
|
kind: Gateway
|
|
name: traefik-gateway
|
|
namespace: traefik
|
|
sectionName: ssh
|
|
rules:
|
|
- backendRefs:
|
|
- group: ''
|
|
kind: Service
|
|
name: gitea-ssh
|
|
port: 22
|
|
weight: 100
|