From a65e923d0fbddf6fd2e037cd2420ca7b8c99460a Mon Sep 17 00:00:00 2001 From: CJ_Clippy Date: Thu, 20 Jun 2024 21:09:04 -0800 Subject: [PATCH] cleanup --- charts/cert-manager/values-prod.yaml | 1 - charts/fp/Chart.yaml | 2 +- charts/fp/templates-staging/capture.yaml | 37 ------ charts/fp/templates-staging/echo.yaml | 122 ------------------ charts/fp/templates-staging/external-dns.yaml | 68 ---------- charts/fp/templates-staging/frp.yaml | 34 ----- charts/fp/templates-staging/game.yaml | 34 ----- .../fp/templates-staging/ingress.yaml.noexec | 108 ---------------- charts/fp/templates-staging/ipfs-service.yaml | 70 ---------- .../fp/templates-staging/link2cid.yaml.noexec | 104 --------------- charts/fp/templates-staging/ngrok.yaml | 47 ------- charts/fp/templates-staging/realtime.yaml | 65 ---------- charts/fp/templates-staging/scout.yaml | 105 --------------- charts/fp/templates-staging/snake.yaml | 35 ----- charts/fp/templates-staging/velero.yaml | 122 ------------------ 15 files changed, 1 insertion(+), 953 deletions(-) delete mode 100644 charts/cert-manager/values-prod.yaml delete mode 100644 charts/fp/templates-staging/capture.yaml delete mode 100644 charts/fp/templates-staging/echo.yaml delete mode 100644 charts/fp/templates-staging/external-dns.yaml delete mode 100644 charts/fp/templates-staging/frp.yaml delete mode 100644 charts/fp/templates-staging/game.yaml delete mode 100644 charts/fp/templates-staging/ingress.yaml.noexec delete mode 100644 charts/fp/templates-staging/ipfs-service.yaml delete mode 100644 charts/fp/templates-staging/link2cid.yaml.noexec delete mode 100644 charts/fp/templates-staging/ngrok.yaml delete mode 100644 charts/fp/templates-staging/realtime.yaml delete mode 100644 charts/fp/templates-staging/scout.yaml delete mode 100644 charts/fp/templates-staging/snake.yaml delete mode 100644 charts/fp/templates-staging/velero.yaml diff --git a/charts/cert-manager/values-prod.yaml b/charts/cert-manager/values-prod.yaml deleted file mode 100644 index 4f8465a..0000000 --- a/charts/cert-manager/values-prod.yaml +++ /dev/null @@ -1 +0,0 @@ -installCRDs: true \ No newline at end of file diff --git a/charts/fp/Chart.yaml b/charts/fp/Chart.yaml index 39c012b..11f6642 100644 --- a/charts/fp/Chart.yaml +++ b/charts/fp/Chart.yaml @@ -1,6 +1,6 @@ name: fp description: The Galaxy's Best VTuber Hentai Site -version: 0.0.2 +version: 0.0.3 apiVersion: v1 keywords: - fp diff --git a/charts/fp/templates-staging/capture.yaml b/charts/fp/templates-staging/capture.yaml deleted file mode 100644 index 633cecb..0000000 --- a/charts/fp/templates-staging/capture.yaml +++ /dev/null @@ -1,37 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: capture - namespace: futureporn -spec: - selector: - app.kubernetes.io/name: capture - ports: - - name: capture - port: 80 - targetPort: 5566 - ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - name: capture - namespace: futureporn - labels: - app: capture -spec: - replicas: 1 - selector: - matchLabels: - app: capture - template: - metadata: - labels: - app: capture - spec: - containers: - - name: capture - image: "{{ .Values.capture.imageName }}" - ports: - - containerPort: 5566 - diff --git a/charts/fp/templates-staging/echo.yaml b/charts/fp/templates-staging/echo.yaml deleted file mode 100644 index 81ee4bf..0000000 --- a/charts/fp/templates-staging/echo.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - name: echo-deployment - namespace: futureporn - labels: - app.kubernetes.io/name: echo -spec: - replicas: 1 - selector: - matchLabels: - app: echo-server - template: - metadata: - labels: - app: echo-server - spec: - containers: - - name: echo-server - resources: - limits: - cpu: 500m - memory: 512Mi - image: jmalloc/echo-server - ports: - - name: http - containerPort: 8080 - ---- -apiVersion: v1 -kind: Service -metadata: - name: echo - namespace: futureporn - labels: - app.kubernetes.io/name: echo -spec: - ports: - - name: http - port: 8080 - targetPort: http - protocol: TCP - selector: - app: echo-server - -# --- -# apiVersion: networking.k8s.io/v1 -# kind: Ingress -# metadata: -# name: ngrok -# namespace: futureporn -# annotations: -# kubernetes.io/ingress.class: ngrok -# k8s.ngrok.com/namespace: futureporn -# k8s.ngrok.com/service: ngrok -# spec: -# ingressClassName: ngrok -# tls: -# - secretName: ngrok-tls -# hosts: -# - "{{ .Values.ngrok.hostname }}" -# rules: -# - host: "{{ .Values.ngrok.hostname }}" -# http: -# paths: -# - path: /echo -# pathType: Prefix -# backend: -# service: -# name: echo -# port: -# number: 8080 -# - path: /game -# pathType: Prefix -# backend: -# service: -# name: game-2048 -# port: -# number: 8080 - # - path: /strapi - # pathType: Prefix - # backend: - # service: - # name: strapi - # port: - # number: 1337 - # - path: /next - # pathType: Prefix - # backend: - # service: - # name: next - # port: - # number: 3000 - -# --- -# apiVersion: networking.k8s.io/v1 -# kind: Ingress -# metadata: -# name: echo-ing -# namespace: futureporn -# annotations: -# kubernetes.io/ingress.class: nginx -# cert-manager.io/cluster-issuer: letsencrypt-staging -# spec: -# backend: -# serviceName: echo-service -# servicePort: 8080 -# tls: -# - secretName: next-tls -# hosts: -# - echo.test -# rules: -# - host: echo.test -# http: -# paths: -# - path: / -# pathType: Prefix -# backend: -# service: -# name: echo-service -# port: -# number: 8080 diff --git a/charts/fp/templates-staging/external-dns.yaml b/charts/fp/templates-staging/external-dns.yaml deleted file mode 100644 index 9ac03cb..0000000 --- a/charts/fp/templates-staging/external-dns.yaml +++ /dev/null @@ -1,68 +0,0 @@ -{{ if eq .Release.Service "Helm" }} - ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - name: external-dns ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: external-dns -rules: -- apiGroups: [""] - resources: ["services","endpoints","pods"] - verbs: ["get","watch","list"] -- apiGroups: ["extensions","networking.k8s.io"] - resources: ["ingresses"] - verbs: ["get","watch","list"] -- apiGroups: [""] - resources: ["nodes"] - verbs: ["list"] ---- -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: external-dns-viewer -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: external-dns -subjects: -- kind: ServiceAccount - name: external-dns - namespace: futureporn - ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - name: external-dns -spec: - strategy: - type: Recreate - selector: - matchLabels: - app: external-dns - template: - metadata: - labels: - app: external-dns - spec: - serviceAccountName: external-dns - containers: - - name: external-dns - image: registry.k8s.io/external-dns/external-dns:v0.14.1 - args: - - --source=ingress - - --domain-filter=sbtp.xyz - - --provider=vultr - env: - - name: VULTR_API_KEY - valueFrom: - secretKeyRef: - name: vultr - key: apiKey - -{{ end }} \ No newline at end of file diff --git a/charts/fp/templates-staging/frp.yaml b/charts/fp/templates-staging/frp.yaml deleted file mode 100644 index 8291fc9..0000000 --- a/charts/fp/templates-staging/frp.yaml +++ /dev/null @@ -1,34 +0,0 @@ -{{ if eq .Values.managedBy "tilt" }} - ---- -apiVersion: frp.zufardhiyaulhaq.com/v1alpha1 -kind: Client -metadata: - name: client-01 - namespace: futureporn -spec: - server: - host: 155.138.254.201 - port: 7000 - authentication: - token: - secret: - name: frp - key: token - ---- -apiVersion: frp.zufardhiyaulhaq.com/v1alpha1 -kind: Upstream -metadata: - name: echo - namespace: futureporn -spec: - client: client-01 - tcp: - host: echo.futureporn.svc.cluster.local - port: 8080 - server: - port: 8080 - proxyProtocol: v2 - -{{ end }} \ No newline at end of file diff --git a/charts/fp/templates-staging/game.yaml b/charts/fp/templates-staging/game.yaml deleted file mode 100644 index 30f5d74..0000000 --- a/charts/fp/templates-staging/game.yaml +++ /dev/null @@ -1,34 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: game-2048 - namespace: futureporn -spec: - ports: - - name: http - port: 8080 - targetPort: 8080 - selector: - app: game-2048 ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - name: game-2048 - namespace: futureporn -spec: - replicas: 1 - selector: - matchLabels: - app: game-2048 - template: - metadata: - labels: - app: game-2048 - spec: - containers: - - name: backend - image: mendhak/http-https-echo - ports: - - name: http - containerPort: 8080 \ No newline at end of file diff --git a/charts/fp/templates-staging/ingress.yaml.noexec b/charts/fp/templates-staging/ingress.yaml.noexec deleted file mode 100644 index eff31c7..0000000 --- a/charts/fp/templates-staging/ingress.yaml.noexec +++ /dev/null @@ -1,108 +0,0 @@ ---- -kind: ClusterRole -apiVersion: rbac.authorization.k8s.io/v1beta1 -metadata: - name: traefik-ingress-controller -rules: - - apiGroups: - - "" - resources: - - services - - endpoints - - secrets - verbs: - - get - - list - - watch - - apiGroups: - - extensions - resources: - - ingresses - verbs: - - get - - list - - watch - - apiGroups: - - extensions - resources: - - ingresses/status - verbs: - - update ---- -kind: ClusterRoleBinding -apiVersion: rbac.authorization.k8s.io/v1beta1 -metadata: - name: traefik-ingress-controller -roleRef: - apiGroup: rbac.authorization.k8s.io - kind: ClusterRole - name: traefik-ingress-controller -subjects: -- kind: ServiceAccount - name: traefik-ingress-controller - namespace: kube-system - - ---- -apiVersion: v1 -kind: ServiceAccount -metadata: - name: traefik-ingress-controller - namespace: kube-system ---- -kind: DaemonSet -apiVersion: apps/v1 -metadata: - name: traefik-ingress-controller - namespace: kube-system - labels: - k8s-app: traefik-ingress-lb -spec: - selector: - matchLabels: - k8s-app: traefik-ingress-lb - name: traefik-ingress-lb - template: - metadata: - labels: - k8s-app: traefik-ingress-lb - name: traefik-ingress-lb - spec: - serviceAccountName: traefik-ingress-controller - terminationGracePeriodSeconds: 60 - containers: - - image: traefik:v1.7 - name: traefik-ingress-lb - ports: - - name: http - containerPort: 80 - hostPort: 80 - - name: admin - containerPort: 8080 - hostPort: 8080 - securityContext: - capabilities: - drop: - - ALL - add: - - NET_BIND_SERVICE - args: - - --api - - --kubernetes - - --logLevel=INFO ---- -kind: Service -apiVersion: v1 -metadata: - name: traefik-ingress-service - namespace: kube-system -spec: - selector: - k8s-app: traefik-ingress-lb - ports: - - protocol: TCP - port: 80 - name: web - - protocol: TCP - port: 8080 - name: admin \ No newline at end of file diff --git a/charts/fp/templates-staging/ipfs-service.yaml b/charts/fp/templates-staging/ipfs-service.yaml deleted file mode 100644 index 27e9cbe..0000000 --- a/charts/fp/templates-staging/ipfs-service.yaml +++ /dev/null @@ -1,70 +0,0 @@ -{{ if eq .Values.managedBy "Helm" }} - -apiVersion: v1 -kind: Pod -metadata: - name: ipfs-pod - namespace: default - labels: - app.kubernetes.io/name: ipfs -spec: - containers: - - name: ipfs - image: ipfs/kubo - ports: - - containerPort: 5001 - - containerPort: 8080 - volumeMounts: - - name: ipfs-pvc - mountPath: /data/ipfs - restartPolicy: OnFailure - volumes: - - name: ipfs-pvc - persistentVolumeClaim: - claimName: ipfs-pvc - - -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: ipfs - namespace: default - annotations: - meta.helm.sh/release-name: fp - meta.helm.sh/release-namespace: default - labels: - app.kubernetes.io/managed-by: {{ .Values.managedBy }} -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 40Gi - storageClassName: {{ .Values.storageClassName }} - - - -apiVersion: v1 -kind: Service -metadata: - name: ipfs-service - namespace: default - annotations: - meta.helm.sh/release-name: fp - meta.helm.sh/release-namespace: default - labels: - app.kubernetes.io/managed-by: {{ .Values.managedBy }} -spec: - selector: - app.kubernetes.io/name: ipfs - ports: - - name: gateway - protocol: TCP - port: 8080 - targetPort: 8080 - - name: api - protocol: TCP - port: 5001 - targetPort: 5001 - -{{ end }} \ No newline at end of file diff --git a/charts/fp/templates-staging/link2cid.yaml.noexec b/charts/fp/templates-staging/link2cid.yaml.noexec deleted file mode 100644 index 7b1e727..0000000 --- a/charts/fp/templates-staging/link2cid.yaml.noexec +++ /dev/null @@ -1,104 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: link2cid - namespace: futureporn -spec: - selector: - app: link2cid - ports: - - name: http - protocol: TCP - port: 80 - targetPort: 3939 - - name: https - protocol: TCP - port: 443 - targetPort: 3939 - - ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - name: link2cid - namespace: futureporn -spec: - selector: - matchLabels: - app: link2cid - template: - metadata: - labels: - app: link2cid - spec: - containers: - - image: {{ .Values.link2cid.imageName }} - name: link2cid - ports: - - containerPort: 3939 - env: - - name: IPFS_URL - value: http://ipfs-service:5001 - - name: PORT - value: '3939' - - name: API_KEY - valueFrom: - secretKeyRef: - name: link2cid - key: apiKey - - ---- -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: link2cid - namespace: futureporn - annotations: - meta.helm.sh/release-name: fp - meta.helm.sh/release-namespace: futureporn - labels: - app.kubernetes.io/managed-by: {{ .Values.managedBy }} -spec: - accessModes: - - ReadWriteOnce - resources: - requests: - storage: 100Gi - storageClassName: {{ .Values.storageClassName }} - - -{{ if eq .Values.managedBy "Helm" }} ---- -apiVersion: networking.k8s.io/v1 -kind: Ingress -metadata: - name: link2cid-ingress - namespace: futureporn - annotations: - kubernetes.io/ingress.class: "nginx" - nginx.ingress.kubernetes.io/ssl-redirect: "true" - cert-manager.io/cluster-issuer: "letsencrypt-prod" -spec: - ingressClassName: nginx - secretTemplate: - annotations: - reflector.v1.k8s.emberstack.com/reflection-allowed: "true" - reflector.v1.k8s.emberstack.com/reflection-allowed-namespaces: "" - tls: - - hosts: - - link2cid.sbtp.xyz - secretName: link2cid-tls - rules: - - host: link2cid.sbtp.xyz - http: - paths: - - path: / - pathType: Prefix - backend: - service: - name: link2cid - port: - number: 80 -{{ end }} diff --git a/charts/fp/templates-staging/ngrok.yaml b/charts/fp/templates-staging/ngrok.yaml deleted file mode 100644 index f987f7d..0000000 --- a/charts/fp/templates-staging/ngrok.yaml +++ /dev/null @@ -1,47 +0,0 @@ -{{ if eq .Values.managedBy "tilt" }} ---- -apiVersion: networking.k8s.io/v1 -kind: Ingress -metadata: - name: ngrok - namespace: futureporn - annotations: - kubernetes.io/ingress.class: ngrok - k8s.ngrok.com/namespace: futureporn - k8s.ngrok.com/service: ngrok -spec: - ingressClassName: ngrok - rules: - - host: "{{ .Values.ngrok.hostname }}" - http: - paths: - - path: /echo - pathType: Prefix - backend: - service: - name: echo - port: - number: 8080 - - path: /next - pathType: Prefix - backend: - service: - name: next - port: - number: 3000 - - path: /strapi - pathType: Prefix - backend: - service: - name: strapi - port: - number: 1337 - # - path: /snake - # pathType: Prefix - # backend: - # service: - # name: snake - # port: - # number: 8080 -{{ end }} - diff --git a/charts/fp/templates-staging/realtime.yaml b/charts/fp/templates-staging/realtime.yaml deleted file mode 100644 index 66d0020..0000000 --- a/charts/fp/templates-staging/realtime.yaml +++ /dev/null @@ -1,65 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: realtime - namespace: futureporn -spec: - selector: - app.kubernetes.io/name: realtime - ports: - - name: realtime - port: 80 - targetPort: 5535 - ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - name: realtime - namespace: futureporn - labels: - app: realtime -spec: - replicas: 1 - selector: - matchLabels: - app: realtime - template: - metadata: - labels: - app: realtime - spec: - containers: - - name: realtime - image: "{{ .Values.realtime.imageName }}" - ports: - - containerPort: 5535 - - -{{ if eq .Values.managedBy "Helm" }} ---- -apiVersion: networking.k8s.io/v1 -kind: Ingress -metadata: - name: realtime - namespace: futureporn -annotations: - kubernetes.io/ingress.class: nginx - cert-manager.io/cluster-issuer: letsencrypt-staging -spec: -tls: - - secretName: realtime-tls - hosts: - - realtime.futureporn.net -rules: - - host: realtime.futureporn.net - http: - paths: - - path: / - pathType: Prefix - backend: - service: - name: realtime - port: - number: 5535 -{{ end }} \ No newline at end of file diff --git a/charts/fp/templates-staging/scout.yaml b/charts/fp/templates-staging/scout.yaml deleted file mode 100644 index 12e9e50..0000000 --- a/charts/fp/templates-staging/scout.yaml +++ /dev/null @@ -1,105 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: scout - namespace: futureporn -spec: - selector: - app.kubernetes.io/name: scout - ports: - - name: web - port: 3000 - targetPort: 3000 - ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - name: scout - namespace: futureporn - labels: - app: scout -spec: - replicas: 1 - selector: - matchLabels: - app: scout - template: - metadata: - labels: - app: scout - spec: - containers: - - name: scout - image: "{{ .Values.scout.imageName }}" - ports: - - containerPort: 5000 - env: - - name: PUBSUB_SERVER_URL - value: "{{ .Values.scout.pubsubServerUrl }}" - - name: STRAPI_URL - value: https://strapi.futureporn.svc.cluster.local - - name: SCOUT_RECENTS_TOKEN - valueFrom: - secretKeyRef: - name: scout - key: recentsToken - - name: SCOUT_IMAP_SERVER - valueFrom: - secretKeyRef: - name: scout - key: imapServer - - name: SCOUT_IMAP_PORT - valueFrom: - secretKeyRef: - name: scout - key: imapPort - - name: SCOUT_IMAP_USERNAME - valueFrom: - secretKeyRef: - name: scout - key: imapUsername - - name: SCOUT_IMAP_PASSWORD - valueFrom: - secretKeyRef: - name: scout - key: imapPassword - - name: SCOUT_IMAP_ACCESS_TOKEN - valueFrom: - secretKeyRef: - name: scout - key: imapAccessToken - - name: SCOUT_STRAPI_API_KEY - valueFrom: - secretKeyRef: - name: scout - key: strapiApiKey - - -{{ if eq .Values.managedBy "Helm" }} ---- -apiVersion: networking.k8s.io/v1 -kind: Ingress -metadata: - name: scout - namespace: futureporn - annotations: - kubernetes.io/ingress.class: nginx - cert-manager.io/cluster-issuer: letsencrypt-staging -spec: -tls: - - secretName: scout-tls - hosts: - - scout.sbtp.xyz -rules: - - host: scout.sbtp.xyz - http: - paths: - - path: / - pathType: Prefix - backend: - service: - name: scout - port: - number: 3000 -{{ end }} \ No newline at end of file diff --git a/charts/fp/templates-staging/snake.yaml b/charts/fp/templates-staging/snake.yaml deleted file mode 100644 index af91585..0000000 --- a/charts/fp/templates-staging/snake.yaml +++ /dev/null @@ -1,35 +0,0 @@ -apiVersion: v1 -kind: Service -metadata: - name: snake - namespace: futureporn -spec: - ports: - - name: http - port: 8080 - targetPort: 8080 - selector: - app: snake - ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - name: snake - namespace: futureporn -spec: - replicas: 2 - selector: - matchLabels: - app: snake - template: - metadata: - labels: - app: snake - spec: - containers: - - name: snake - image: thoschu/de.schulte360.web.snake - ports: - - name: http - containerPort: 8080 \ No newline at end of file diff --git a/charts/fp/templates-staging/velero.yaml b/charts/fp/templates-staging/velero.yaml deleted file mode 100644 index a372b15..0000000 --- a/charts/fp/templates-staging/velero.yaml +++ /dev/null @@ -1,122 +0,0 @@ -apiVersion: velero.io/v1 -kind: BackupStorageLocation -metadata: - name: futureporn-velero-4 - namespace: velero -spec: - # Name of the object store plugin to use to connect to this location. - # - # Required. - provider: velero/velero-plugin-for-aws - - objectStorage: - # The bucket in which to store backups. - # - # Required. - bucket: futureporn-db-backup - - # The prefix within the bucket under which to store backups. - # - # Optional. - prefix: velero - - # The credentials intended to be used with this location. - # optional (if not set, default credentials secret is used) - credential: - # Key within the secret data which contains the cloud credentials - key: cloud - # Name of the secret containing the credentials - name: velero - - config: - # The AWS region where the bucket is located. Queried from the AWS S3 API if not provided. - # - # Optional if s3ForcePathStyle is false. - region: us-west-000 - - # Whether to use path-style addressing instead of virtual hosted bucket addressing. Set to "true" - # if using a local storage service like MinIO. - # - # Optional (defaults to "false"). - s3ForcePathStyle: "true" - - # You can specify the AWS S3 URL here for explicitness, but Velero can already generate it from - # "region" and "bucket". This field is primarily for local storage services like MinIO. - # - # Optional. - # s3Url: "http://minio:9000" - s3Url: "https://s3.us-west-000.backblazeb2.com" - - # If specified, use this instead of "s3Url" when generating download URLs (e.g., for logs). This - # field is primarily for local storage services like MinIO. - # - # Optional. - # publicUrl: "https://minio.mycluster.com" - - # The name of the server-side encryption algorithm to use for uploading objects, e.g. "AES256". - # If using SSE-KMS and "kmsKeyId" is specified, this field will automatically be set to "aws:kms" - # so does not need to be specified by the user. - # - # Optional. - serverSideEncryption: AES256 - - # Specify an AWS KMS key ID (formatted per the example) or alias (formatted as "alias/"), or its full ARN - # to enable encryption of the backups stored in S3. Only works with AWS S3 and may require explicitly - # granting key usage rights. - # - # Cannot be used in conjunction with customerKeyEncryptionFile. - # - # Optional. - # kmsKeyId: "502b409c-4da1-419f-a16e-eif453b3i49f" - - # Specify the file that contains the SSE-C customer key to enable customer key encryption of the backups - # stored in S3. The referenced file should contain a 32-byte string. - # - # The customerKeyEncryptionFile points to a mounted secret within the velero container. - # Add the below values to the velero cloud-credentials secret: - # customer-key: - # The default value below points to the already mounted secret. - # - # Cannot be used in conjunction with kmsKeyId. - # - # Optional (defaults to "", which means SSE-C is disabled). - # customerKeyEncryptionFile: "/credentials/customer-key" - - # Version of the signature algorithm used to create signed URLs that are used by velero CLI to - # download backups or fetch logs. Possible versions are "1" and "4". Usually the default version - # 4 is correct, but some S3-compatible providers like Quobyte only support version 1. - # - # Optional (defaults to "4"). - signatureVersion: "1" - - # AWS profile within the credentials file to use for the backup storage location. - # - # Optional (defaults to "default"). - profile: "sex" - - # Set this to "true" if you do not want to verify the TLS certificate when connecting to the - # object store -- like for self-signed certs with MinIO. This is susceptible to man-in-the-middle - # attacks and is not recommended for production. - # - # Optional (defaults to "false"). - insecureSkipTLSVerify: "true" - - # Set this to "true" if you want to load the credentials file as a [shared config file](https://docs.aws.amazon.com/sdkref/latest/guide/file-format.html). - # This will have no effect if credentials are not specific for a BSL. - # - # Optional (defaults to "false"). - enableSharedConfig: "true" - - # Tags that need to be placed on AWS S3 objects. - # For example "Key1=Value1&Key2=Value2" - # - # Optional (defaults to empty "") - tagging: "" - - # The checksum algorithm to use for uploading objects to S3. - # The Supported values are "CRC32", "CRC32C", "SHA1", "SHA256". - # If the value is set as empty string "", no checksum will be calculated and attached to - # the request headers. - # - # Optional (defaults to "CRC32") - checksumAlgorithm: "CRC32" \ No newline at end of file