Compare commits
6 Commits
b47fe8f66b
...
09026d6812
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
09026d6812 | ||
|
|
24991fce90 | ||
|
|
65a59d2d0c | ||
|
|
85fb620e39 | ||
|
|
b56e02d2ed | ||
|
|
15cb2ce903 |
@@ -44,4 +44,23 @@ uninstall:
|
|||||||
set -euo pipefail
|
set -euo pipefail
|
||||||
just env::check
|
just env::check
|
||||||
|
|
||||||
kubectl get namespace metallb-system &>/dev/null && kubectl delete ns metallb-system
|
kubectl get namespace metallb-system &>/dev/null && kubectl delete ns metallb-system
|
||||||
|
|
||||||
|
test-deployment:
|
||||||
|
#!/bin/bash
|
||||||
|
set -euo pipefail
|
||||||
|
just env::check
|
||||||
|
|
||||||
|
kubectl apply -f test-deployment.yaml
|
||||||
|
|
||||||
|
echo "Test deployment created. You can check the service with 'kubectl get svc nginx -o wide -n test'."
|
||||||
|
|
||||||
|
echo "To clean up, run 'just test-deployment-cleanup'."
|
||||||
|
|
||||||
|
test-deployment-cleanup:
|
||||||
|
#!/bin/bash
|
||||||
|
set -euo pipefail
|
||||||
|
just env::check
|
||||||
|
|
||||||
|
kubectl delete -f test-deployment.yaml
|
||||||
|
echo "Test deployment and service deleted."
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ spec:
|
|||||||
name: cloudflare-cluster-issuer
|
name: cloudflare-cluster-issuer
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- schnipo.k8s.schnrbs.work
|
- schnipo.{{.Env.EXTERNAL_DOMAIN}}
|
||||||
43
Test-Deployment/dishes-deployment.yaml
Normal file
43
Test-Deployment/dishes-deployment.yaml
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: dishes
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: dish-schnipo
|
||||||
|
namespace: dishes
|
||||||
|
labels:
|
||||||
|
app: dishes
|
||||||
|
spec:
|
||||||
|
replicas: 3
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: dishes
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: dishes
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: dish-schnipo
|
||||||
|
image: bschnorbus/dish-schnipo
|
||||||
|
ports:
|
||||||
|
- containerPort: 8080
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: dish-schnipo
|
||||||
|
namespace: dishes
|
||||||
|
spec:
|
||||||
|
type: ClusterIP
|
||||||
|
selector:
|
||||||
|
app: dishes
|
||||||
|
ports:
|
||||||
|
- port: 80
|
||||||
|
targetPort: 8080
|
||||||
|
protocol: TCP
|
||||||
@@ -7,10 +7,12 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`schnipo.k8s.schnrbs.work`)
|
- match: Host(`schnipo.{{.Env.EXTERNAL_DOMAIN}}`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: schnipo
|
- name: schnipo
|
||||||
port: 8080
|
port: 80
|
||||||
|
targetPort: 8080
|
||||||
tls:
|
tls:
|
||||||
secretName: schnipo-certificate-secret
|
secretName: schnipo-certificate-secret
|
||||||
|
|
||||||
@@ -9,4 +9,4 @@ spec:
|
|||||||
name: cloudflare-cluster-issuer
|
name: cloudflare-cluster-issuer
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- nginx-test.k8s.schnrbs.work
|
- nginx-test.{{.Env.EXTERNAL_DOMAIN}}
|
||||||
43
Test-Deployment/nginx-deployment.yaml
Normal file
43
Test-Deployment/nginx-deployment.yaml
Normal file
@@ -0,0 +1,43 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Namespace
|
||||||
|
metadata:
|
||||||
|
name: test
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: nginx
|
||||||
|
namespace: test
|
||||||
|
labels:
|
||||||
|
app: nginx
|
||||||
|
spec:
|
||||||
|
replicas: 3
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: nginx
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: nginx
|
||||||
|
spec:
|
||||||
|
containers:
|
||||||
|
- name: nginx
|
||||||
|
image: nginx:latest
|
||||||
|
ports:
|
||||||
|
- containerPort: 80
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: nginx
|
||||||
|
namespace: test
|
||||||
|
spec:
|
||||||
|
type: LoadBalancer
|
||||||
|
selector:
|
||||||
|
app: nginx
|
||||||
|
ports:
|
||||||
|
- port: 80
|
||||||
|
targetPort: 80
|
||||||
|
protocol: TCP
|
||||||
@@ -7,10 +7,10 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`nginx-test.k8s.schnrbs.work`)
|
- match: Host(`nginx-test.{{.Env.EXTERNAL_DOMAIN}}`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: nginx
|
- name: nginx
|
||||||
port: 80
|
port: 80
|
||||||
tls:
|
tls:
|
||||||
secretName: nginx-certificate-secret
|
secretName: nginx-certificate-secret
|
||||||
@@ -7,7 +7,7 @@ metadata:
|
|||||||
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
||||||
spec:
|
spec:
|
||||||
rules:
|
rules:
|
||||||
- host: nginx-test.k8s.schnrbs.work
|
- host: nginx-test.int.schnrbs.work
|
||||||
http:
|
http:
|
||||||
paths:
|
paths:
|
||||||
- path: /
|
- path: /
|
||||||
@@ -19,5 +19,5 @@ spec:
|
|||||||
number: 80
|
number: 80
|
||||||
tls:
|
tls:
|
||||||
- hosts:
|
- hosts:
|
||||||
- nginx-test.k8s.schnrbs.work
|
- nginx-test.int.schnrbs.work
|
||||||
secretName: nginx-certificate-secret
|
secretName: nginx-certificate-secret
|
||||||
@@ -4,7 +4,7 @@
|
|||||||
helm repo add traefik https://helm.traefik.io/traefik
|
helm repo add traefik https://helm.traefik.io/traefik
|
||||||
|
|
||||||
|
|
||||||
helm install traefik traefik/traefik --namespace traefik --create-namespace --values traefik-values.yaml
|
helm install traefik traefik/traefik --namespace traefik --create-namespace --values traefik-values.yaml
|
||||||
|
|
||||||
|
|
||||||
## Cert-Manager
|
## Cert-Manager
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ metadata:
|
|||||||
name: cloudflare-cluster-issuer
|
name: cloudflare-cluster-issuer
|
||||||
spec:
|
spec:
|
||||||
acme:
|
acme:
|
||||||
email: hello@schnorbus.net
|
email: {{ .Env.ACME_EMAIL }}
|
||||||
server: https://acme-v02.api.letsencrypt.org/directory
|
server: https://acme-v02.api.letsencrypt.org/directory
|
||||||
privateKeySecretRef:
|
privateKeySecretRef:
|
||||||
name: cloudflare-acme-key
|
name: cloudflare-acme-key
|
||||||
@@ -5,4 +5,4 @@ metadata:
|
|||||||
namespace: cert-manager
|
namespace: cert-manager
|
||||||
type: Opaque
|
type: Opaque
|
||||||
stringData:
|
stringData:
|
||||||
api-token: DgU4SMUpQVAoS8IisGxnSQCUI7PbclhvegdqF9I1
|
api-token: {{ .Env.CLOUDFLARE_API_TOKEN }}
|
||||||
62
Traefik/justfile
Normal file
62
Traefik/justfile
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
set fallback:=true
|
||||||
|
|
||||||
|
export CERT_MANAGER_NAMESPACE := env("CERT_MANAGER_NAMESPACE", "cert-manager")
|
||||||
|
export TRAEFIK_NAMESPACE := env("TRAEFIK_NAMESPACE", "traefik")
|
||||||
|
|
||||||
|
add-helm-repos:
|
||||||
|
helm repo add traefik https://helm.traefik.io/traefik --force-update
|
||||||
|
helm repo add jetstack https://charts.jetstack.io --force-update
|
||||||
|
helm repo update
|
||||||
|
|
||||||
|
install:
|
||||||
|
#!/bin/bash
|
||||||
|
set -euo pipefail
|
||||||
|
just env::check
|
||||||
|
|
||||||
|
just add-helm-repos
|
||||||
|
|
||||||
|
helm upgrade traefik traefik/traefik \
|
||||||
|
--install \
|
||||||
|
--cleanup-on-fail \
|
||||||
|
--namespace ${TRAEFIK_NAMESPACE} \
|
||||||
|
--create-namespace \
|
||||||
|
--values traefik-values.yaml
|
||||||
|
|
||||||
|
helm upgrade cert-manager jetstack/cert-manager \
|
||||||
|
--install \
|
||||||
|
--cleanup-on-fail \
|
||||||
|
--namespace ${CERT_MANAGER_NAMESPACE} \
|
||||||
|
--create-namespace \
|
||||||
|
--values cert-manager-values.yaml
|
||||||
|
|
||||||
|
uninstall:
|
||||||
|
#!/bin/bash
|
||||||
|
set -euo pipefail
|
||||||
|
just env::check
|
||||||
|
|
||||||
|
helm uninstall traefik --namespace ${TRAEFIK_NAMESPACE} || true
|
||||||
|
helm uninstall cert-manager --namespace ${CERT_MANAGER_NAMESPACE} || true
|
||||||
|
|
||||||
|
setup-cluster-issuer:
|
||||||
|
#!/bin/bash
|
||||||
|
set -euo pipefail
|
||||||
|
just env::check
|
||||||
|
gomplate -f cert-manager-issuer-secret-gomplate.yaml | kubectl apply -f -
|
||||||
|
gomplate -f cert-manager-cluster-issuer-gomplate.yaml | kubectl apply -f -
|
||||||
|
|
||||||
|
# Get status of cert-manager components
|
||||||
|
status:
|
||||||
|
#!/bin/bash
|
||||||
|
set -euo pipefail
|
||||||
|
echo "=== cert-manager Components Status ==="
|
||||||
|
echo ""
|
||||||
|
echo "Namespace: ${CERT_MANAGER_NAMESPACE}"
|
||||||
|
echo ""
|
||||||
|
echo "Pods:"
|
||||||
|
kubectl get pods -n ${CERT_MANAGER_NAMESPACE}
|
||||||
|
echo ""
|
||||||
|
echo "Services:"
|
||||||
|
kubectl get services -n ${CERT_MANAGER_NAMESPACE}
|
||||||
|
echo ""
|
||||||
|
echo "CRDs:"
|
||||||
|
kubectl get crd | grep cert-manager.io
|
||||||
@@ -11,5 +11,5 @@ ingressRoute:
|
|||||||
dashboard:
|
dashboard:
|
||||||
enabled: true
|
enabled: true
|
||||||
entryPoints: [web, websecure]
|
entryPoints: [web, websecure]
|
||||||
matchRule: Host(`traefik-dashboard.k8s.schnrbs.work`)
|
matchRule: Host(`traefik-dashboard.{{ .Env.EXTERNAL_DOMAIN }}`)
|
||||||
|
|
||||||
3
env/env.local.gomplate
vendored
3
env/env.local.gomplate
vendored
@@ -4,3 +4,6 @@ K8S_MASTER_NODE_NAME={{ .Env.K8S_MASTER_NODE_NAME }}
|
|||||||
SERVER_IP={{ .Env.SERVER_IP }}
|
SERVER_IP={{ .Env.SERVER_IP }}
|
||||||
AGENT_IP={{ .Env.AGENT_IP }}
|
AGENT_IP={{ .Env.AGENT_IP }}
|
||||||
METALLB_ADDRESS_RANGE={{ .Env.METALLB_ADDRESS_RANGE }}
|
METALLB_ADDRESS_RANGE={{ .Env.METALLB_ADDRESS_RANGE }}
|
||||||
|
CLOUDFLARE_API_TOKEN={{ .Env.CLOUDFLARE_API_TOKEN}}
|
||||||
|
ACME_EMAIL={{ .Env.ACME_EMAIL}}
|
||||||
|
EXTERNAL_DOMAIN={{ .Env.EXTERNAL_DOMAIN }}
|
||||||
|
|||||||
30
env/justfile
vendored
30
env/justfile
vendored
@@ -90,6 +90,36 @@ setup:
|
|||||||
fi
|
fi
|
||||||
done
|
done
|
||||||
|
|
||||||
|
while [ -z "${CLOUDFLARE_API_TOKEN}" ]; do
|
||||||
|
if ! CLOUDFLARE_API_TOKEN=$(
|
||||||
|
gum input --prompt="Cloudflare API Token: " \
|
||||||
|
--width=100 --placeholder="API Token" --password
|
||||||
|
); then
|
||||||
|
echo "Setup cancelled." >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
while [ -z "${ACME_EMAIL}" ]; do
|
||||||
|
if ! ACME_EMAIL=$(
|
||||||
|
gum input --prompt="ACME Email for Cert-Manager: " \
|
||||||
|
--width=100 --placeholder="Email"
|
||||||
|
); then
|
||||||
|
echo "Setup cancelled." >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
while [ -z "${EXTERNAL_DOMAIN}" ]; do
|
||||||
|
if ! EXTERNAL_DOMAIN=$(
|
||||||
|
gum input --prompt="External Domain: " \
|
||||||
|
--width=100 --placeholder="Domain"
|
||||||
|
); then
|
||||||
|
echo "Setup cancelled." >&2
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
echo "Generating .env.local file..."
|
||||||
rm -f ../.env.local
|
rm -f ../.env.local
|
||||||
gomplate -f env.local.gomplate -o ../.env.local
|
gomplate -f env.local.gomplate -o ../.env.local
|
||||||
|
|||||||
Reference in New Issue
Block a user