cleanup
ci / build (push) Waiting to run Details

This commit is contained in:
CJ_Clippy 2024-06-20 21:09:04 -08:00
parent 209eaed6ce
commit a65e923d0f
15 changed files with 1 additions and 953 deletions

View File

@ -1 +0,0 @@
installCRDs: true

View File

@ -1,6 +1,6 @@
name: fp
description: The Galaxy's Best VTuber Hentai Site
version: 0.0.2
version: 0.0.3
apiVersion: v1
keywords:
- fp

View File

@ -1,37 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: capture
namespace: futureporn
spec:
selector:
app.kubernetes.io/name: capture
ports:
- name: capture
port: 80
targetPort: 5566
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: capture
namespace: futureporn
labels:
app: capture
spec:
replicas: 1
selector:
matchLabels:
app: capture
template:
metadata:
labels:
app: capture
spec:
containers:
- name: capture
image: "{{ .Values.capture.imageName }}"
ports:
- containerPort: 5566

View File

@ -1,122 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: echo-deployment
namespace: futureporn
labels:
app.kubernetes.io/name: echo
spec:
replicas: 1
selector:
matchLabels:
app: echo-server
template:
metadata:
labels:
app: echo-server
spec:
containers:
- name: echo-server
resources:
limits:
cpu: 500m
memory: 512Mi
image: jmalloc/echo-server
ports:
- name: http
containerPort: 8080
---
apiVersion: v1
kind: Service
metadata:
name: echo
namespace: futureporn
labels:
app.kubernetes.io/name: echo
spec:
ports:
- name: http
port: 8080
targetPort: http
protocol: TCP
selector:
app: echo-server
# ---
# apiVersion: networking.k8s.io/v1
# kind: Ingress
# metadata:
# name: ngrok
# namespace: futureporn
# annotations:
# kubernetes.io/ingress.class: ngrok
# k8s.ngrok.com/namespace: futureporn
# k8s.ngrok.com/service: ngrok
# spec:
# ingressClassName: ngrok
# tls:
# - secretName: ngrok-tls
# hosts:
# - "{{ .Values.ngrok.hostname }}"
# rules:
# - host: "{{ .Values.ngrok.hostname }}"
# http:
# paths:
# - path: /echo
# pathType: Prefix
# backend:
# service:
# name: echo
# port:
# number: 8080
# - path: /game
# pathType: Prefix
# backend:
# service:
# name: game-2048
# port:
# number: 8080
# - path: /strapi
# pathType: Prefix
# backend:
# service:
# name: strapi
# port:
# number: 1337
# - path: /next
# pathType: Prefix
# backend:
# service:
# name: next
# port:
# number: 3000
# ---
# apiVersion: networking.k8s.io/v1
# kind: Ingress
# metadata:
# name: echo-ing
# namespace: futureporn
# annotations:
# kubernetes.io/ingress.class: nginx
# cert-manager.io/cluster-issuer: letsencrypt-staging
# spec:
# backend:
# serviceName: echo-service
# servicePort: 8080
# tls:
# - secretName: next-tls
# hosts:
# - echo.test
# rules:
# - host: echo.test
# http:
# paths:
# - path: /
# pathType: Prefix
# backend:
# service:
# name: echo-service
# port:
# number: 8080

View File

@ -1,68 +0,0 @@
{{ if eq .Release.Service "Helm" }}
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: external-dns
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: external-dns
rules:
- apiGroups: [""]
resources: ["services","endpoints","pods"]
verbs: ["get","watch","list"]
- apiGroups: ["extensions","networking.k8s.io"]
resources: ["ingresses"]
verbs: ["get","watch","list"]
- apiGroups: [""]
resources: ["nodes"]
verbs: ["list"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: external-dns-viewer
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: external-dns
subjects:
- kind: ServiceAccount
name: external-dns
namespace: futureporn
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: external-dns
spec:
strategy:
type: Recreate
selector:
matchLabels:
app: external-dns
template:
metadata:
labels:
app: external-dns
spec:
serviceAccountName: external-dns
containers:
- name: external-dns
image: registry.k8s.io/external-dns/external-dns:v0.14.1
args:
- --source=ingress
- --domain-filter=sbtp.xyz
- --provider=vultr
env:
- name: VULTR_API_KEY
valueFrom:
secretKeyRef:
name: vultr
key: apiKey
{{ end }}

View File

@ -1,34 +0,0 @@
{{ if eq .Values.managedBy "tilt" }}
---
apiVersion: frp.zufardhiyaulhaq.com/v1alpha1
kind: Client
metadata:
name: client-01
namespace: futureporn
spec:
server:
host: 155.138.254.201
port: 7000
authentication:
token:
secret:
name: frp
key: token
---
apiVersion: frp.zufardhiyaulhaq.com/v1alpha1
kind: Upstream
metadata:
name: echo
namespace: futureporn
spec:
client: client-01
tcp:
host: echo.futureporn.svc.cluster.local
port: 8080
server:
port: 8080
proxyProtocol: v2
{{ end }}

View File

@ -1,34 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: game-2048
namespace: futureporn
spec:
ports:
- name: http
port: 8080
targetPort: 8080
selector:
app: game-2048
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: game-2048
namespace: futureporn
spec:
replicas: 1
selector:
matchLabels:
app: game-2048
template:
metadata:
labels:
app: game-2048
spec:
containers:
- name: backend
image: mendhak/http-https-echo
ports:
- name: http
containerPort: 8080

View File

@ -1,108 +0,0 @@
---
kind: ClusterRole
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: traefik-ingress-controller
rules:
- apiGroups:
- ""
resources:
- services
- endpoints
- secrets
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses
verbs:
- get
- list
- watch
- apiGroups:
- extensions
resources:
- ingresses/status
verbs:
- update
---
kind: ClusterRoleBinding
apiVersion: rbac.authorization.k8s.io/v1beta1
metadata:
name: traefik-ingress-controller
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
name: traefik-ingress-controller
subjects:
- kind: ServiceAccount
name: traefik-ingress-controller
namespace: kube-system
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: traefik-ingress-controller
namespace: kube-system
---
kind: DaemonSet
apiVersion: apps/v1
metadata:
name: traefik-ingress-controller
namespace: kube-system
labels:
k8s-app: traefik-ingress-lb
spec:
selector:
matchLabels:
k8s-app: traefik-ingress-lb
name: traefik-ingress-lb
template:
metadata:
labels:
k8s-app: traefik-ingress-lb
name: traefik-ingress-lb
spec:
serviceAccountName: traefik-ingress-controller
terminationGracePeriodSeconds: 60
containers:
- image: traefik:v1.7
name: traefik-ingress-lb
ports:
- name: http
containerPort: 80
hostPort: 80
- name: admin
containerPort: 8080
hostPort: 8080
securityContext:
capabilities:
drop:
- ALL
add:
- NET_BIND_SERVICE
args:
- --api
- --kubernetes
- --logLevel=INFO
---
kind: Service
apiVersion: v1
metadata:
name: traefik-ingress-service
namespace: kube-system
spec:
selector:
k8s-app: traefik-ingress-lb
ports:
- protocol: TCP
port: 80
name: web
- protocol: TCP
port: 8080
name: admin

View File

@ -1,70 +0,0 @@
{{ if eq .Values.managedBy "Helm" }}
apiVersion: v1
kind: Pod
metadata:
name: ipfs-pod
namespace: default
labels:
app.kubernetes.io/name: ipfs
spec:
containers:
- name: ipfs
image: ipfs/kubo
ports:
- containerPort: 5001
- containerPort: 8080
volumeMounts:
- name: ipfs-pvc
mountPath: /data/ipfs
restartPolicy: OnFailure
volumes:
- name: ipfs-pvc
persistentVolumeClaim:
claimName: ipfs-pvc
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: ipfs
namespace: default
annotations:
meta.helm.sh/release-name: fp
meta.helm.sh/release-namespace: default
labels:
app.kubernetes.io/managed-by: {{ .Values.managedBy }}
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 40Gi
storageClassName: {{ .Values.storageClassName }}
apiVersion: v1
kind: Service
metadata:
name: ipfs-service
namespace: default
annotations:
meta.helm.sh/release-name: fp
meta.helm.sh/release-namespace: default
labels:
app.kubernetes.io/managed-by: {{ .Values.managedBy }}
spec:
selector:
app.kubernetes.io/name: ipfs
ports:
- name: gateway
protocol: TCP
port: 8080
targetPort: 8080
- name: api
protocol: TCP
port: 5001
targetPort: 5001
{{ end }}

View File

@ -1,104 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: link2cid
namespace: futureporn
spec:
selector:
app: link2cid
ports:
- name: http
protocol: TCP
port: 80
targetPort: 3939
- name: https
protocol: TCP
port: 443
targetPort: 3939
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: link2cid
namespace: futureporn
spec:
selector:
matchLabels:
app: link2cid
template:
metadata:
labels:
app: link2cid
spec:
containers:
- image: {{ .Values.link2cid.imageName }}
name: link2cid
ports:
- containerPort: 3939
env:
- name: IPFS_URL
value: http://ipfs-service:5001
- name: PORT
value: '3939'
- name: API_KEY
valueFrom:
secretKeyRef:
name: link2cid
key: apiKey
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: link2cid
namespace: futureporn
annotations:
meta.helm.sh/release-name: fp
meta.helm.sh/release-namespace: futureporn
labels:
app.kubernetes.io/managed-by: {{ .Values.managedBy }}
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 100Gi
storageClassName: {{ .Values.storageClassName }}
{{ if eq .Values.managedBy "Helm" }}
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: link2cid-ingress
namespace: futureporn
annotations:
kubernetes.io/ingress.class: "nginx"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
cert-manager.io/cluster-issuer: "letsencrypt-prod"
spec:
ingressClassName: nginx
secretTemplate:
annotations:
reflector.v1.k8s.emberstack.com/reflection-allowed: "true"
reflector.v1.k8s.emberstack.com/reflection-allowed-namespaces: ""
tls:
- hosts:
- link2cid.sbtp.xyz
secretName: link2cid-tls
rules:
- host: link2cid.sbtp.xyz
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: link2cid
port:
number: 80
{{ end }}

View File

@ -1,47 +0,0 @@
{{ if eq .Values.managedBy "tilt" }}
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: ngrok
namespace: futureporn
annotations:
kubernetes.io/ingress.class: ngrok
k8s.ngrok.com/namespace: futureporn
k8s.ngrok.com/service: ngrok
spec:
ingressClassName: ngrok
rules:
- host: "{{ .Values.ngrok.hostname }}"
http:
paths:
- path: /echo
pathType: Prefix
backend:
service:
name: echo
port:
number: 8080
- path: /next
pathType: Prefix
backend:
service:
name: next
port:
number: 3000
- path: /strapi
pathType: Prefix
backend:
service:
name: strapi
port:
number: 1337
# - path: /snake
# pathType: Prefix
# backend:
# service:
# name: snake
# port:
# number: 8080
{{ end }}

View File

@ -1,65 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: realtime
namespace: futureporn
spec:
selector:
app.kubernetes.io/name: realtime
ports:
- name: realtime
port: 80
targetPort: 5535
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: realtime
namespace: futureporn
labels:
app: realtime
spec:
replicas: 1
selector:
matchLabels:
app: realtime
template:
metadata:
labels:
app: realtime
spec:
containers:
- name: realtime
image: "{{ .Values.realtime.imageName }}"
ports:
- containerPort: 5535
{{ if eq .Values.managedBy "Helm" }}
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: realtime
namespace: futureporn
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-staging
spec:
tls:
- secretName: realtime-tls
hosts:
- realtime.futureporn.net
rules:
- host: realtime.futureporn.net
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: realtime
port:
number: 5535
{{ end }}

View File

@ -1,105 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: scout
namespace: futureporn
spec:
selector:
app.kubernetes.io/name: scout
ports:
- name: web
port: 3000
targetPort: 3000
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: scout
namespace: futureporn
labels:
app: scout
spec:
replicas: 1
selector:
matchLabels:
app: scout
template:
metadata:
labels:
app: scout
spec:
containers:
- name: scout
image: "{{ .Values.scout.imageName }}"
ports:
- containerPort: 5000
env:
- name: PUBSUB_SERVER_URL
value: "{{ .Values.scout.pubsubServerUrl }}"
- name: STRAPI_URL
value: https://strapi.futureporn.svc.cluster.local
- name: SCOUT_RECENTS_TOKEN
valueFrom:
secretKeyRef:
name: scout
key: recentsToken
- name: SCOUT_IMAP_SERVER
valueFrom:
secretKeyRef:
name: scout
key: imapServer
- name: SCOUT_IMAP_PORT
valueFrom:
secretKeyRef:
name: scout
key: imapPort
- name: SCOUT_IMAP_USERNAME
valueFrom:
secretKeyRef:
name: scout
key: imapUsername
- name: SCOUT_IMAP_PASSWORD
valueFrom:
secretKeyRef:
name: scout
key: imapPassword
- name: SCOUT_IMAP_ACCESS_TOKEN
valueFrom:
secretKeyRef:
name: scout
key: imapAccessToken
- name: SCOUT_STRAPI_API_KEY
valueFrom:
secretKeyRef:
name: scout
key: strapiApiKey
{{ if eq .Values.managedBy "Helm" }}
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: scout
namespace: futureporn
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-staging
spec:
tls:
- secretName: scout-tls
hosts:
- scout.sbtp.xyz
rules:
- host: scout.sbtp.xyz
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: scout
port:
number: 3000
{{ end }}

View File

@ -1,35 +0,0 @@
apiVersion: v1
kind: Service
metadata:
name: snake
namespace: futureporn
spec:
ports:
- name: http
port: 8080
targetPort: 8080
selector:
app: snake
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: snake
namespace: futureporn
spec:
replicas: 2
selector:
matchLabels:
app: snake
template:
metadata:
labels:
app: snake
spec:
containers:
- name: snake
image: thoschu/de.schulte360.web.snake
ports:
- name: http
containerPort: 8080

View File

@ -1,122 +0,0 @@
apiVersion: velero.io/v1
kind: BackupStorageLocation
metadata:
name: futureporn-velero-4
namespace: velero
spec:
# Name of the object store plugin to use to connect to this location.
#
# Required.
provider: velero/velero-plugin-for-aws
objectStorage:
# The bucket in which to store backups.
#
# Required.
bucket: futureporn-db-backup
# The prefix within the bucket under which to store backups.
#
# Optional.
prefix: velero
# The credentials intended to be used with this location.
# optional (if not set, default credentials secret is used)
credential:
# Key within the secret data which contains the cloud credentials
key: cloud
# Name of the secret containing the credentials
name: velero
config:
# The AWS region where the bucket is located. Queried from the AWS S3 API if not provided.
#
# Optional if s3ForcePathStyle is false.
region: us-west-000
# Whether to use path-style addressing instead of virtual hosted bucket addressing. Set to "true"
# if using a local storage service like MinIO.
#
# Optional (defaults to "false").
s3ForcePathStyle: "true"
# You can specify the AWS S3 URL here for explicitness, but Velero can already generate it from
# "region" and "bucket". This field is primarily for local storage services like MinIO.
#
# Optional.
# s3Url: "http://minio:9000"
s3Url: "https://s3.us-west-000.backblazeb2.com"
# If specified, use this instead of "s3Url" when generating download URLs (e.g., for logs). This
# field is primarily for local storage services like MinIO.
#
# Optional.
# publicUrl: "https://minio.mycluster.com"
# The name of the server-side encryption algorithm to use for uploading objects, e.g. "AES256".
# If using SSE-KMS and "kmsKeyId" is specified, this field will automatically be set to "aws:kms"
# so does not need to be specified by the user.
#
# Optional.
serverSideEncryption: AES256
# Specify an AWS KMS key ID (formatted per the example) or alias (formatted as "alias/<KMS-key-alias-name>"), or its full ARN
# to enable encryption of the backups stored in S3. Only works with AWS S3 and may require explicitly
# granting key usage rights.
#
# Cannot be used in conjunction with customerKeyEncryptionFile.
#
# Optional.
# kmsKeyId: "502b409c-4da1-419f-a16e-eif453b3i49f"
# Specify the file that contains the SSE-C customer key to enable customer key encryption of the backups
# stored in S3. The referenced file should contain a 32-byte string.
#
# The customerKeyEncryptionFile points to a mounted secret within the velero container.
# Add the below values to the velero cloud-credentials secret:
# customer-key: <your_b64_encoded_32byte_string>
# The default value below points to the already mounted secret.
#
# Cannot be used in conjunction with kmsKeyId.
#
# Optional (defaults to "", which means SSE-C is disabled).
# customerKeyEncryptionFile: "/credentials/customer-key"
# Version of the signature algorithm used to create signed URLs that are used by velero CLI to
# download backups or fetch logs. Possible versions are "1" and "4". Usually the default version
# 4 is correct, but some S3-compatible providers like Quobyte only support version 1.
#
# Optional (defaults to "4").
signatureVersion: "1"
# AWS profile within the credentials file to use for the backup storage location.
#
# Optional (defaults to "default").
profile: "sex"
# Set this to "true" if you do not want to verify the TLS certificate when connecting to the
# object store -- like for self-signed certs with MinIO. This is susceptible to man-in-the-middle
# attacks and is not recommended for production.
#
# Optional (defaults to "false").
insecureSkipTLSVerify: "true"
# Set this to "true" if you want to load the credentials file as a [shared config file](https://docs.aws.amazon.com/sdkref/latest/guide/file-format.html).
# This will have no effect if credentials are not specific for a BSL.
#
# Optional (defaults to "false").
enableSharedConfig: "true"
# Tags that need to be placed on AWS S3 objects.
# For example "Key1=Value1&Key2=Value2"
#
# Optional (defaults to empty "")
tagging: ""
# The checksum algorithm to use for uploading objects to S3.
# The Supported values are "CRC32", "CRC32C", "SHA1", "SHA256".
# If the value is set as empty string "", no checksum will be calculated and attached to
# the request headers.
#
# Optional (defaults to "CRC32")
checksumAlgorithm: "CRC32"