Compare commits
1 Commits
master
...
c9c130e9be
Author | SHA1 | Date | |
---|---|---|---|
c9c130e9be |
@ -1,20 +0,0 @@
|
|||||||
apiVersion: networking.k8s.io/v1
|
|
||||||
kind: Ingress
|
|
||||||
metadata:
|
|
||||||
name: argocd-ingress
|
|
||||||
namespace: argocd
|
|
||||||
annotations:
|
|
||||||
nginx.ingress.kubernetes.io/ssl-redirect: "false"
|
|
||||||
spec:
|
|
||||||
ingressClassName: nginx
|
|
||||||
rules:
|
|
||||||
- host: argocd.marcin00.pl
|
|
||||||
http:
|
|
||||||
paths:
|
|
||||||
- path: /
|
|
||||||
pathType: Prefix
|
|
||||||
backend:
|
|
||||||
service:
|
|
||||||
name: argocd-server
|
|
||||||
port:
|
|
||||||
number: 80
|
|
@ -1,51 +0,0 @@
|
|||||||
# Instrukcje konfiguracji ArgoCD
|
|
||||||
|
|
||||||
## Instalacja:
|
|
||||||
Aby wdrożyć ArgoCD wykonujemy komendy:
|
|
||||||
```
|
|
||||||
kubectl create namespace argocd
|
|
||||||
kubectl apply -n argocd -f https://raw.githubusercontent.com/argoproj/argo-cd/stable/manifests/install.yaml
|
|
||||||
```
|
|
||||||
W celu zalogowania sekret wydobywamy komendą:
|
|
||||||
```
|
|
||||||
kubectl get secret argocd-initial-admin-secret -n argocd -o jsonpath="{.data.password}" | base64 -d
|
|
||||||
```
|
|
||||||
Następnie wdrażamy obiekt Ingress z tego folderu.
|
|
||||||
```
|
|
||||||
kubectl apply -f argocd-ingress.yaml
|
|
||||||
```
|
|
||||||
|
|
||||||
## Jak wyłączyć HTTPS
|
|
||||||
Aby wyłączyć HTTPS w ArgoCD należy otworzyć configmap:
|
|
||||||
```
|
|
||||||
kubectl edit configmap argocd-cmd-params-cm -n argocd
|
|
||||||
```
|
|
||||||
i dodać do configmap następujący tekst:
|
|
||||||
```
|
|
||||||
data:
|
|
||||||
server.insecure: "true"
|
|
||||||
```
|
|
||||||
Aby przeładować serwer zniszcz poda:
|
|
||||||
```
|
|
||||||
kubectl delete pod -n argocd argocd-server-<xxx>
|
|
||||||
```
|
|
||||||
|
|
||||||
## Jak ustawić wartość sekretu dla Webhooka Gitea
|
|
||||||
Zapisujemy sekret do zmiennej środowiskowej GITEA_WEBHOOK_SECRET.
|
|
||||||
Następnie tworzymy sekret za pomocą poniższej komendy
|
|
||||||
```
|
|
||||||
kubectl create secret generic gitea-webhook-secret \
|
|
||||||
--namespace argocd \
|
|
||||||
--from-literal=webhook.secret="$GITEA_WEBHOOK_SECRET" \
|
|
||||||
--type=Opaque \
|
|
||||||
--label=app.kubernetes.io/part-of=argocd \
|
|
||||||
--dry-run=client -o yaml | kubectl apply -f -
|
|
||||||
```
|
|
||||||
Potem modyfikujemy argocd-secret, otwieramy go komendą:
|
|
||||||
```
|
|
||||||
kubectl edit secret argocd-secret -n argocd
|
|
||||||
```
|
|
||||||
dodajemy pod klucz `data` taką oto linię:
|
|
||||||
```
|
|
||||||
webhook.gitea.secret: "$gitea-webhook-secret:webhook.secret"
|
|
||||||
```
|
|
@ -15,14 +15,12 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: agent
|
- name: agent
|
||||||
image: woodpeckerci/woodpecker-agent:v3.8.0
|
image: woodpeckerci/woodpecker-agent:latest
|
||||||
env:
|
env:
|
||||||
- name: WOODPECKER_SERVER
|
- name: WOODPECKER_SERVER
|
||||||
value: "woodpecker-server:9000"
|
value: "woodpecker-server:9000"
|
||||||
- name: WOODPECKER_BACKEND_K8S_POD_ANNOTATIONS_ALLOW_FROM_STEP
|
- name: WOODPECKER_HEALTHCHECK
|
||||||
value: "true"
|
value: "false"
|
||||||
- name: WOODPECKER_BACKEND_K8S_STORAGE_CLASS
|
|
||||||
value: azurefile-csi
|
|
||||||
- name: WOODPECKER_AGENT_SECRET
|
- name: WOODPECKER_AGENT_SECRET
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
@ -13,27 +13,25 @@ spec:
|
|||||||
labels:
|
labels:
|
||||||
app: woodpecker-server
|
app: woodpecker-server
|
||||||
spec:
|
spec:
|
||||||
initContainers:
|
|
||||||
- name: fix-permissions
|
|
||||||
image: busybox
|
|
||||||
command: ["sh", "-c", "chown -R 1000:1000 /var/lib/woodpecker"]
|
|
||||||
volumeMounts:
|
|
||||||
- name: woodpecker-data
|
|
||||||
mountPath: /var/lib/woodpecker
|
|
||||||
securityContext:
|
|
||||||
runAsUser: 0
|
|
||||||
containers:
|
containers:
|
||||||
- name: server
|
- name: server
|
||||||
image: woodpeckerci/woodpecker-server:v3.8.0
|
image: woodpeckerci/woodpecker-server:latest
|
||||||
ports:
|
ports:
|
||||||
- containerPort: 8000
|
- containerPort: 8000
|
||||||
env:
|
env:
|
||||||
|
- name: WOODPECKER_OPEN
|
||||||
|
value: "true"
|
||||||
- name: WOODPECKER_GITEA
|
- name: WOODPECKER_GITEA
|
||||||
value: "true"
|
value: "true"
|
||||||
- name: WOODPECKER_GITEA_URL
|
- name: WOODPECKER_GITEA_URL
|
||||||
value: "https://gitea.marcin00.pl"
|
value: "https://gitea.marcin00.pl"
|
||||||
- name: WOODPECKER_HOST
|
- name: WOODPECKER_HOST
|
||||||
value: "https://woodpecker.marcin00.pl"
|
value: "https://woodpecker.marcin00.pl"
|
||||||
|
- name: WOODPECKER_AGENT_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: woodpecker-secret
|
||||||
|
key: WOODPECKER_AGENT_SECRET
|
||||||
- name: WOODPECKER_GITEA_CLIENT
|
- name: WOODPECKER_GITEA_CLIENT
|
||||||
valueFrom:
|
valueFrom:
|
||||||
secretKeyRef:
|
secretKeyRef:
|
@ -1,17 +0,0 @@
|
|||||||
apiVersion: notification.toolkit.fluxcd.io/v1
|
|
||||||
kind: Receiver
|
|
||||||
metadata:
|
|
||||||
name: gitea-receiver
|
|
||||||
namespace: flux-system
|
|
||||||
spec:
|
|
||||||
type: generic
|
|
||||||
events:
|
|
||||||
- "ping"
|
|
||||||
- "push"
|
|
||||||
secretRef:
|
|
||||||
name: webhook-token
|
|
||||||
resources:
|
|
||||||
- apiVersion: source.toolkit.fluxcd.io/v1
|
|
||||||
kind: GitRepository
|
|
||||||
name: user-microservice-repo
|
|
||||||
namespace: flux-system
|
|
@ -1,7 +0,0 @@
|
|||||||
apiVersion: v1
|
|
||||||
kind: Secret
|
|
||||||
metadata:
|
|
||||||
name: webhook-token
|
|
||||||
namespace: flux-system
|
|
||||||
stringData:
|
|
||||||
token: ${GITEA_WEBHOOK_SECRET}
|
|
@ -1,20 +0,0 @@
|
|||||||
apiVersion: networking.k8s.io/v1
|
|
||||||
kind: Ingress
|
|
||||||
metadata:
|
|
||||||
name: webhook-receiver
|
|
||||||
namespace: flux-system
|
|
||||||
annotations:
|
|
||||||
nginx.ingress.kubernetes.io/backend-protocol: "HTTP"
|
|
||||||
spec:
|
|
||||||
ingressClassName: nginx
|
|
||||||
rules:
|
|
||||||
- host: flux.marcin00.pl
|
|
||||||
http:
|
|
||||||
paths:
|
|
||||||
- path: /
|
|
||||||
pathType: Prefix
|
|
||||||
backend:
|
|
||||||
service:
|
|
||||||
name: webhook-receiver
|
|
||||||
port:
|
|
||||||
number: 80
|
|
@ -1,13 +0,0 @@
|
|||||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
|
||||||
kind: Kustomization
|
|
||||||
metadata:
|
|
||||||
name: user-microservice
|
|
||||||
namespace: flux-system
|
|
||||||
spec:
|
|
||||||
interval: 1m
|
|
||||||
path: ./apps/user-microservice
|
|
||||||
prune: true
|
|
||||||
sourceRef:
|
|
||||||
kind: GitRepository
|
|
||||||
name: user-microservice-repo
|
|
||||||
targetNamespace: user-microservice
|
|
@ -1,10 +0,0 @@
|
|||||||
apiVersion: source.toolkit.fluxcd.io/v1
|
|
||||||
kind: GitRepository
|
|
||||||
metadata:
|
|
||||||
name: user-microservice-repo
|
|
||||||
namespace: flux-system
|
|
||||||
spec:
|
|
||||||
interval: 1m
|
|
||||||
url: https://gitea.marcin00.pl/pikram/user-microservice-deploy.git
|
|
||||||
ref:
|
|
||||||
branch: argoworkflow-fluxcd
|
|
@ -1,23 +0,0 @@
|
|||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: Role
|
|
||||||
metadata:
|
|
||||||
name: woodpecker-ci-role
|
|
||||||
namespace: woodpecker
|
|
||||||
rules:
|
|
||||||
- apiGroups: [""]
|
|
||||||
resources: ["pods", "pods/log", "pods/exec", "pods/status", "persistentvolumeclaims", "secrets"]
|
|
||||||
verbs: ["get", "list", "watch", "create", "delete", "patch", "update"]
|
|
||||||
---
|
|
||||||
apiVersion: rbac.authorization.k8s.io/v1
|
|
||||||
kind: RoleBinding
|
|
||||||
metadata:
|
|
||||||
name: woodpecker-ci-binding
|
|
||||||
namespace: woodpecker
|
|
||||||
subjects:
|
|
||||||
- kind: ServiceAccount
|
|
||||||
name: default
|
|
||||||
namespace: woodpecker
|
|
||||||
roleRef:
|
|
||||||
kind: Role
|
|
||||||
name: woodpecker-ci-role
|
|
||||||
apiGroup: rbac.authorization.k8s.io
|
|
Reference in New Issue
Block a user