diff --git a/common/environments.yaml b/common/environments.yaml index c43d5a0..b388f5c 100644 --- a/common/environments.yaml +++ b/common/environments.yaml @@ -23,6 +23,10 @@ environments: enabled: true - istio: enabled: true + - dbOperator: + enabled: true + - monitoring: + enabled: true etersoft: kubeContext: etersoft values: @@ -47,3 +51,7 @@ environments: enabled: false - istio: enabled: false + - dbOperator: + enabled: false + - monitoring: + enabled: false diff --git a/helmfile.yaml.gotmpl b/helmfile.yaml.gotmpl index f24aac9..48b0571 100644 --- a/helmfile.yaml.gotmpl +++ b/helmfile.yaml.gotmpl @@ -19,7 +19,11 @@ helmfiles: values: - kubeContext: "{{ .Environment.KubeContext }}" - {{ toYaml .Environment.Values | nindent 8 }} - - path: ./helmfiles/applications.yaml + - path: ./helmfiles/monitoring.yaml + values: + - kubeContext: "{{ .Environment.KubeContext }}" + - {{ toYaml .Environment.Values | nindent 8 }} + - path: ./helmfiles/{{ .Environment.Name }}-applications.yaml values: - kubeContext: "{{ .Environment.KubeContext }}" - {{ toYaml .Environment.Values | nindent 8 }} diff --git a/installations/applications/helmfile-badhouseplants.yaml b/helmfiles/badhouseplants-applications.yaml similarity index 62% rename from installations/applications/helmfile-badhouseplants.yaml rename to helmfiles/badhouseplants-applications.yaml index 9aa6e24..91e65b3 100644 --- a/installations/applications/helmfile-badhouseplants.yaml +++ b/helmfiles/badhouseplants-applications.yaml @@ -1,21 +1,41 @@ bases: - - ../../common/environments.yaml - - ../../common/templates.yaml + - ../common/templates.yaml repositories: - name: gitea url: https://dl.gitea.io/charts/ + - name: bedag + url: https://bedag.github.io/helm-charts/ + - name: minecraft + url: https://itzg.github.io/minecraft-server-charts/ - name: allangers-charts url: ghcr.io/allanger/allangers-charts oci: true + - name: woodpecker + url: https://woodpecker-ci.org + - name: renovate + url: https://docs.renovatebot.com/helm-charts - name: badhouseplants-helm url: git+https://gitea.badhouseplants.net/badhouseplants/badhouseplants-helm@charts?ref=main - - name: bedag - url: https://bedag.github.io/helm-charts/ - #- name: open-strike - # url: git+https://gitea.badhouseplants.net/badhouseplants/open-strike-2.git@helm?ref=main releases: + - name: app-gitea + chart: gitea/gitea + version: 11.0.1 + namespace: org-badhouseplants + inherit: + - template: env-values + - template: env-secrets + + - name: minecraft + chart: minecraft/minecraft + namespace: games + version: 4.26.1 + inherit: + - template: common-values-tpl + - template: env-values + - template: env-secrets + - name: app-vaultwarden chart: allangers-charts/vaultwarden version: 3.1.1 @@ -57,29 +77,6 @@ releases: - template: env-values - template: env-secrets - - name: server-xray-public - chart: allangers-charts/server-xray - namespace: public-xray - version: 0.6.0 - inherit: - - template: default-env-secrets - - template: default-env-values - - template: ext-tcp-routes - - template: ext-cilium - - template: ext-certificate - - - name: server-xray-public-edge - chart: allangers-charts/server-xray - installed: false - namespace: public-xray - version: 0.6.0 - inherit: - - template: default-env-secrets - - template: default-env-values - - template: ext-tcp-routes - - template: ext-cilium - - template: ext-certificate - - name: memos chart: allangers-charts/memos version: 0.3.0 @@ -96,3 +93,52 @@ releases: keel.sh/policy: force keel.sh/trigger: poll keel.sh/initContainers: 'true' + + - name: server-xray-public-edge + chart: allangers-charts/server-xray + installed: true + namespace: public-xray + version: 0.7.0 + inherit: + - template: env-secrets + - template: env-values + - template: ext-tcp-routes + - template: ext-cilium + - template: ext-certificate + + - name: server-xray-public + chart: allangers-charts/server-xray + namespace: public-xray + version: 0.6.0 + inherit: + - template: env-secrets + - template: env-values + - template: ext-tcp-routes + - template: ext-cilium + - template: ext-certificate + + - name: woodpecker-ci + chart: woodpecker/woodpecker + namespace: pipelines + version: 3.0.7 + inherit: + - template: ext-database + - template: env-values + - template: env-secrets + + - name: renovate-gitea + chart: renovate/renovate + namespace: pipelines + version: 39.251.0 + inherit: + - template: env-values + - template: env-secrets + + - name: renovate-github + chart: renovate/renovate + installed: true + namespace: pipelines + version: 39.251.0 + inherit: + - template: env-values + - template: env-secrets diff --git a/installations/applications/helmfile-etersoft.yaml b/helmfiles/etersoft-applications.yaml similarity index 74% rename from installations/applications/helmfile-etersoft.yaml rename to helmfiles/etersoft-applications.yaml index bc0856b..58a4ea9 100644 --- a/installations/applications/helmfile-etersoft.yaml +++ b/helmfiles/etersoft-applications.yaml @@ -1,6 +1,5 @@ bases: - - ../../common/environments.yaml - - ../../common/templates.yaml + - ../common/templates.yaml repositories: - name: allangers-charts url: ghcr.io/allanger/allangers-charts @@ -10,13 +9,14 @@ repositories: oci: true - name: xray-docs url: git+https://gitea.badhouseplants.net/badhouseplants/xray-docs.git@helm?ref=main + releases: - name: qbittorrent chart: gabe565/qbittorrent version: 0.4.1 namespace: applications inherit: - - template: default-env-values + - template: env-values - template: ext-secret - template: ext-traefik-middleware - name: vaultwardentest @@ -24,19 +24,18 @@ releases: version: 3.1.1 namespace: applications inherit: - - template: default-env-values - - template: default-env-secrets + - template: env-values + - template: env-secrets - name: memos chart: allangers-charts/memos version: 0.3.0 namespace: applications inherit: - - template: default-env-values - + - template: env-values - name: external-service-xray - chart: ../../kustomizations/external-service-xray + chart: ../kustomizations/external-service-xray installed: true namespace: public-xray @@ -45,8 +44,8 @@ releases: namespace: public-xray version: 0.6.0 inherit: - - template: default-env-secrets - - template: default-env-values + - template: env-secrets + - template: env-values - template: ext-tcp-routes - template: ext-cilium - template: ext-certificate @@ -56,4 +55,4 @@ releases: installed: true namespace: public-xray inherit: - - template: default-env-values + - template: env-values diff --git a/installations/monitoring/helmfile.yaml b/helmfiles/monitoring.yaml similarity index 70% rename from installations/monitoring/helmfile.yaml rename to helmfiles/monitoring.yaml index fadc430..e9651de 100644 --- a/installations/monitoring/helmfile.yaml +++ b/helmfiles/monitoring.yaml @@ -1,6 +1,6 @@ bases: - - ../../common/environments.yaml - - ../../common/templates.yaml + - ../common/templates.yaml + repositories: - name: bedag url: https://bedag.github.io/helm-charts/ @@ -8,34 +8,39 @@ repositories: url: https://prometheus-community.github.io/helm-charts - name: grafana url: https://grafana.github.io/helm-charts + releases: - name: prometheus chart: prometheus-community/kube-prometheus-stack namespace: observability + condition: monitoring.enabled version: 70.7.0 inherit: - - template: default-env-values - - template: default-env-secrets + - template: env-values + - template: env-secrets - template: crd-management-hook - name: grafana chart: grafana/grafana namespace: observability + condition: monitoring.enabled version: 8.12.1 installed: true inherit: - - template: default-env-values - - template: default-env-secrets + - template: env-values + - template: env-secrets - name: loki chart: grafana/loki + condition: monitoring.enabled namespace: observability version: 6.29.0 inherit: - - template: default-env-values + - template: env-values - template: ext-secret - template: ext-traefik-middleware - name: promtail chart: grafana/promtail + condition: monitoring.enabled namespace: observability version: 6.16.6 inherit: - - template: default-env-values + - template: env-values diff --git a/installations/pipelines/helmfile.yaml b/helmfiles/pipelines.yaml similarity index 67% rename from installations/pipelines/helmfile.yaml rename to helmfiles/pipelines.yaml index 8c0c024..23e8bca 100644 --- a/installations/pipelines/helmfile.yaml +++ b/helmfiles/pipelines.yaml @@ -1,6 +1,6 @@ bases: - - ../../common/environments.yaml - - ../../common/templates.yaml + - ../common/templates.yaml + repositories: - name: woodpecker url: https://woodpecker-ci.org @@ -8,6 +8,7 @@ repositories: url: https://docs.renovatebot.com/helm-charts - name: bedag url: https://bedag.github.io/helm-charts/ + releases: - name: woodpecker-ci chart: woodpecker/woodpecker @@ -15,20 +16,20 @@ releases: version: 3.0.7 inherit: - template: ext-database - - template: default-env-values - - template: default-env-secrets + - template: env-values + - template: env-secrets - name: renovate-gitea chart: renovate/renovate namespace: pipelines version: 39.251.0 inherit: - - template: default-env-values - - template: default-env-secrets + - template: env-values + - template: env-secrets - name: renovate-github chart: renovate/renovate installed: true namespace: pipelines version: 39.251.0 inherit: - - template: default-env-values - - template: default-env-secrets + - template: env-values + - template: env-secrets diff --git a/helmfiles/platform.yaml b/helmfiles/platform.yaml index 443333d..a1bab18 100644 --- a/helmfiles/platform.yaml +++ b/helmfiles/platform.yaml @@ -46,6 +46,7 @@ releases: chart: argo/argo-cd version: 7.8.23 namespace: argocd + installed: false inherit: - template: env-values - template: env-secrets @@ -83,12 +84,14 @@ releases: - name: db-operator namespace: platform chart: db-operator/db-operator + condition: dbOperator.enabled version: 1.34.0 inherit: - template: common-values-tpl - name: db-instances chart: db-operator/db-instances + condition: dbOperator.enabled namespace: platform needs: - platform/db-operator diff --git a/installations/applications/helmfile.yaml b/installations/applications/helmfile.yaml deleted file mode 100644 index f2b930c..0000000 --- a/installations/applications/helmfile.yaml +++ /dev/null @@ -1,6 +0,0 @@ -bases: - - ../../common/environments.yaml - - ../../common/templates.yaml - -helmfiles: - - ./helmfile-{{ `{{ .Environment.Name }}` }}.yaml diff --git a/installations/games/helmfile.yaml b/installations/games/helmfile.yaml deleted file mode 100644 index d7aa79d..0000000 --- a/installations/games/helmfile.yaml +++ /dev/null @@ -1,20 +0,0 @@ -bases: - - ../../common/environments.yaml - - ../../common/templates.yaml -repositories: - - name: bedag - url: https://bedag.github.io/helm-charts/ - - name: minecraft - url: https://itzg.github.io/minecraft-server-charts/ - - name: allangers-charts - url: ghcr.io/allanger/allangers-charts - oci: true -releases: - - name: minecraft - chart: minecraft/minecraft - namespace: games - version: 4.26.3 - inherit: - - template: ext-tcp-routes - - template: default-env-values - - template: default-env-secrets diff --git a/values/badhouseplants/secrets.grafana.yaml b/values/badhouseplants/observability/grafana/secrets.yaml similarity index 100% rename from values/badhouseplants/secrets.grafana.yaml rename to values/badhouseplants/observability/grafana/secrets.yaml diff --git a/values/badhouseplants/values.grafana.yaml b/values/badhouseplants/observability/grafana/values.yaml similarity index 100% rename from values/badhouseplants/values.grafana.yaml rename to values/badhouseplants/observability/grafana/values.yaml diff --git a/values/badhouseplants/values.loki.yaml b/values/badhouseplants/observability/loki/values.yaml similarity index 100% rename from values/badhouseplants/values.loki.yaml rename to values/badhouseplants/observability/loki/values.yaml diff --git a/values/badhouseplants/secrets.prometheus.yaml b/values/badhouseplants/observability/prometheus/secrets.yaml similarity index 100% rename from values/badhouseplants/secrets.prometheus.yaml rename to values/badhouseplants/observability/prometheus/secrets.yaml diff --git a/values/badhouseplants/values.prometheus.yaml b/values/badhouseplants/observability/prometheus/values.yaml similarity index 100% rename from values/badhouseplants/values.prometheus.yaml rename to values/badhouseplants/observability/prometheus/values.yaml diff --git a/values/badhouseplants/values.promtail.yaml b/values/badhouseplants/observability/promtail/values.yaml similarity index 100% rename from values/badhouseplants/values.promtail.yaml rename to values/badhouseplants/observability/promtail/values.yaml diff --git a/values/badhouseplants/secrets.renovate-gitea.yaml b/values/badhouseplants/pipelines/renovate-gitea/secrets.yaml similarity index 100% rename from values/badhouseplants/secrets.renovate-gitea.yaml rename to values/badhouseplants/pipelines/renovate-gitea/secrets.yaml diff --git a/values/badhouseplants/values.renovate-gitea.yaml b/values/badhouseplants/pipelines/renovate-gitea/values.yaml similarity index 100% rename from values/badhouseplants/values.renovate-gitea.yaml rename to values/badhouseplants/pipelines/renovate-gitea/values.yaml diff --git a/values/badhouseplants/secrets.renovate-github.yaml b/values/badhouseplants/pipelines/renovate-github/secrets.yaml similarity index 100% rename from values/badhouseplants/secrets.renovate-github.yaml rename to values/badhouseplants/pipelines/renovate-github/secrets.yaml diff --git a/values/badhouseplants/values.renovate-github.yaml b/values/badhouseplants/pipelines/renovate-github/values.yaml similarity index 100% rename from values/badhouseplants/values.renovate-github.yaml rename to values/badhouseplants/pipelines/renovate-github/values.yaml diff --git a/values/badhouseplants/secrets.woodpecker-ci.yaml b/values/badhouseplants/pipelines/woodpecker-ci/secrets.yaml similarity index 100% rename from values/badhouseplants/secrets.woodpecker-ci.yaml rename to values/badhouseplants/pipelines/woodpecker-ci/secrets.yaml diff --git a/values/badhouseplants/values.woodpecker-ci.yaml b/values/badhouseplants/pipelines/woodpecker-ci/values.yaml similarity index 100% rename from values/badhouseplants/values.woodpecker-ci.yaml rename to values/badhouseplants/pipelines/woodpecker-ci/values.yaml diff --git a/values/badhouseplants/secrets.server-xray-public-edge.yaml b/values/badhouseplants/public-xray/server-xray-public-edge/secrets.yaml similarity index 100% rename from values/badhouseplants/secrets.server-xray-public-edge.yaml rename to values/badhouseplants/public-xray/server-xray-public-edge/secrets.yaml diff --git a/values/badhouseplants/values.server-xray-public-edge.yaml b/values/badhouseplants/public-xray/server-xray-public-edge/values.yaml similarity index 99% rename from values/badhouseplants/values.server-xray-public-edge.yaml rename to values/badhouseplants/public-xray/server-xray-public-edge/values.yaml index 8b51b19..b95c044 100644 --- a/values/badhouseplants/values.server-xray-public-edge.yaml +++ b/values/badhouseplants/public-xray/server-xray-public-edge/values.yaml @@ -8,7 +8,6 @@ certificate: name: badhouseplants-issuer-http01 dnsNames: - xray-public-edge.badhouseplants.net - - 195.201.249.91 workload: replicas: 1 containers: @@ -85,6 +84,8 @@ ext-cilium: - toEntities: - world egressDeny: + - toEntities: + - cluster - toCIDR: - 93.158.213.92/32 - 93.158.213.92/32 diff --git a/values/badhouseplants/secrets.server-xray-public.yaml b/values/badhouseplants/public-xray/server-xray-public/secrets.yaml similarity index 100% rename from values/badhouseplants/secrets.server-xray-public.yaml rename to values/badhouseplants/public-xray/server-xray-public/secrets.yaml diff --git a/values/badhouseplants/values.server-xray-public.yaml b/values/badhouseplants/public-xray/server-xray-public/values.yaml similarity index 100% rename from values/badhouseplants/values.server-xray-public.yaml rename to values/badhouseplants/public-xray/server-xray-public/values.yaml index 435aaa1..00b4c84 100644 --- a/values/badhouseplants/values.server-xray-public.yaml +++ b/values/badhouseplants/public-xray/server-xray-public/values.yaml @@ -48,14 +48,14 @@ ext-cilium: app.kubernetes.io/instance: server-xray-public app.kubernetes.io/name: server-xray egress: - - toEntities: - - cluster - toPorts: - ports: - port: "53" protocol: ANY - toEntities: - world + - toEntities: + - cluster egressDeny: - toCIDR: - 93.158.213.92/32 diff --git a/values/badhouseplants/secrets.db-instances.yaml b/values/badhouseplants/secrets.db-instances.yaml deleted file mode 100644 index be9f2f2..0000000 --- a/values/badhouseplants/secrets.db-instances.yaml +++ /dev/null @@ -1,29 +0,0 @@ -dbinstances: - postgres16: - secrets: - adminUser: ENC[AES256_GCM,data:uuu/xvwJkHk=,iv:Pk+i8bf7AeeG9wKVh1RDJy7Dt3r5b1UKy4SJijlZfq0=,tag:QO3gwYXAG0sBBuHcKfTNQg==,type:str] - adminPassword: ENC[AES256_GCM,data:tjWATjuJT+C97D4TLQgk55BZOwVv,iv:1MWYtksmrEBQtOdGvtc6MZyLP4yBKA88eIpQ4mZCULM=,tag:3hOlT5n2Wd81ebxeEgW5tw==,type:str] - postgres17: - secrets: - adminUser: ENC[AES256_GCM,data:4w2EItIM++Q=,iv:cQLryeBskm2Y9OlbMFgQEWEBi7z/VxucLWbwZXsRtto=,tag:Ir2Q7KZv/sSDdA1MX/Niqw==,type:str] - adminPassword: ENC[AES256_GCM,data:wHUL2p8CXYwoEFu3ffCCsQO9xn/GqOZ6JPrcHKzy,iv:khoogPPFHSd+4xyp+jf1w0RfOUgrKzAmFjLnisQ8HXU=,tag:GRnkCQ0uOlUt2AiEAceFRQ==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBuL1lwdVNHMm9nZHRld2lO - Rm4xVnVHWG9hNDc1cUVyakxzUU1PcFJhalM4CkNicEdUV2lEYWMwaWNqeGcrQ2p1 - Qmw1b1FzRllqYW85bjF0cmRGcW1MbjQKLS0tIENUcG1oOXFNV3REaFU0aUEyd2k4 - RDgzRmlKT1ArblpOV1plcFpyMnJXZTQKgm8Eaw591+EHZWofXAADTXRHPOdOvdOM - jYne1szB/V9UJz+pmLa10tNgruga+P5yP/j+DGcYrTj0pVh5IJLjTA== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-10-30T19:59:46Z" - mac: ENC[AES256_GCM,data:3KrwiArDx/bPAHbFGgb9BdDVHC+uC1IHp4LZXlYRZzWSKtX1t+ODQVzUW97kigGFG1sx6WXddl/w3XeNOoT9JbS5iPXJQe6KAPleNV50S/oab+U53WeloO8uL68Wrk9v/NwMhCKwE9cCqBBhqk7wCb6N9ivt45mLrUf06L8fok0=,iv:bOWhyIm8FhKtZAZH/78bukkeDp5P4XShSD20mgr4Neo=,tag:RZMx9bi+ZEcLwTzk+Gm8RQ==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/badhouseplants/secrets.funkwhale.yaml b/values/badhouseplants/secrets.funkwhale.yaml deleted file mode 100644 index 9959ea2..0000000 --- a/values/badhouseplants/secrets.funkwhale.yaml +++ /dev/null @@ -1,27 +0,0 @@ -djangoSecret: ENC[AES256_GCM,data:RSajXXpFcUmxBOpT48A=,iv:lIzUF8cgbKVMCOY5G/A4mpaviYwwLRvePj3lrhycLZ8=,tag:OSfyKAXCTHOssx+KkL4+ZA==,type:str] -postgresql: - auth: - password: ENC[AES256_GCM,data:dFSSGPS1shNnJlxGIh9o9zfNVZsKp9Wv8A==,iv:lYxEpS+w+oTW07DPohyZ59UbcFKKtD6r2oSRSS3mw+s=,tag:uqLqzIoE43uS5y9UYVGDJg==,type:str] -redis: - auth: - password: ENC[AES256_GCM,data:hR3tXeU05nfd7IeLvjOR2N1dieai0IFQ9kheuCOJ,iv:2j2oAemd8k5zP3zHTAmIQEQHlU+8VKQ0DqpEXoBBJX0=,tag:gjMJ4z0MCxgYpeEeA9NFPw==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBMc2xxZ1o2Q1RsT2ExNklq - ajZZT0lxczBHTnRNcmNBc2RONk96ZkVZOTJBCm1YbUJ1bG1WTnJJVGJSbXI1cEc2 - bCtSM3lwd3lvNFhlZi9wZ1JyUklFK2sKLS0tIDB5RTBNTjhSeFYrUVZjS0xzZXlS - VmNCRVhmMHZ0aVZXbURWVjZUVnlFck0KA/pMAwMDx3QsT0iF6u9AOoXnGyEIqtc1 - 5iUW96UPhXIK+OyPqCt+07HaAZzavUT/zFSqPdJ3avvY1k3EHMfzBQ== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-10-14T08:08:21Z" - mac: ENC[AES256_GCM,data:kAj/KI4QQnDM4Ya/JQQ1QvjbEpHDkp3gAgtgBjjhyY6khSIlcZpG74YNfpD01dHQqk5/KTF9mKi6P68CKubTKQTF7a7qriwNmHcjg7IShJtSYWmzPCu1PIR2jAQTxCa0ETFbsQ14rhKbxpUeXvTvkx5wuRazXKFIwSjBddpO0b0=,iv:H1GmBgpEoHuMa1XdnmEW5jYP/FZyDty/ul3XSbZ2oEQ=,tag:NSaxPq5/dNizE6o7odoUMg==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/badhouseplants/secrets.gitea.yaml b/values/badhouseplants/secrets.gitea.yaml deleted file mode 100644 index 362888b..0000000 --- a/values/badhouseplants/secrets.gitea.yaml +++ /dev/null @@ -1,50 +0,0 @@ -gitea: - admin: - username: ENC[AES256_GCM,data:u1KcCwDNplU=,iv:s9mWKPTz+8rFKS2RmFPxCGOIPXFHLvLX3v0t+DemDEU=,tag:MmGR2LqDmHw10uJdPe/tSw==,type:str] - password: ENC[AES256_GCM,data:mBhL52UJwOwWpRGRfc5WNAvYwHo=,iv:hGt1kGA2miwzMidwD0AT62oXs1CAwAFpKk3XltqsCz8=,tag:bfhsQxef8cKEes1JkTQw/w==,type:str] - config: - storage: - MINIO_SECRET_ACCESS_KEY: ENC[AES256_GCM,data:5VjeSHLIDvZB/VE7OJ1eqWOnT5NU64om0g==,iv:OFK7MYlb9QfV4ZHIECa3vHG9pBp1TCGSqqUJX3D7uGE=,tag:Ibmihyp3TXarFtr/tDtEEQ==,type:str] - mailer: - PASSWD: ENC[AES256_GCM,data:lIv1/BEEkouDVqNy4u+u7WCY4zz3ow7fWg==,iv:we77bHyHyAYCMxFGG13sE/M+5Tv2VeYfrg9bsa3leec=,tag:TOltFQbhrXMJW5w5x27YjQ==,type:str] - database: - PASSWD: ENC[AES256_GCM,data:a3AV8QMYOxlWiU7G1DRCaOSdHKA=,iv:3ZCwEMo3/3rmGJXgDr/Pw+rNQBU14rUKQ7330otX1qQ=,tag:KjwexsLkYaHsTdXoHwXBJA==,type:str] - session: - PROVIDER_CONFIG: ENC[AES256_GCM,data:nPtmi3wG3+wVkyb+IV832he9rUo2TRRx6cTqvGdVSIZMfcfUvS4rmSH7CQ28OYK6f+WEKs8PkjfrBzEP1mPFHC5eRQfg4ryaqM7eWmHaJipcg4h2nzH9ii6FXyYtmm2zFsTnodOJryEo0T/nMaGhEt7+eylCL+L4,iv:8UFjsAEtMjMqyC9Ib3ipoqpshFrsdE9d3dg7Cewv7dU=,tag:gGVNGk66/Kr/dZ6B3wbD4A==,type:str] - cache: - HOST: ENC[AES256_GCM,data:tXEIBKqGyeuAc/adO6DjcyAAGgcIuwxJ8T0Zsi1xMy3I3gXbzeTG6XwyAesiUoHifoYTpn3wWbf+pIh8KtGFXb58UcEOgHmnADPWALiXKFoZmvtHDL+JEjOjd0tyoskJNf4Oi4BckJDnfpYuMqJW9qcQbsxlB1My,iv:kJ7XRqvUVEGUC9aAPYO+1oZA3QPc/SE9apaeTgLf3wA=,tag:525IBTPiuZIkAxAIiRE35w==,type:str] - queue: - CONN_STR: ENC[AES256_GCM,data:Z1+u7JAcgNXkrO80YC2bMDk5VMyTFRAxDPc75ZPKbaD5+nsWQusvnHTS68rAu/WT21xAFpny7geERIOEZIewpucNoCTlqHVfJu/tsl40qMoBfjEWuwfaRM+AlNaXm5USTXkk+alQ3eJ2KIIhfhY1cd1yohRoKvAd,iv:bmLkzWqR8SwHLgWG6SWdeNr1w0fcZP8qNRlhfQfvJqs=,tag:QY5A8YGy0+3BnWSLBcsK5w==,type:str] - oauth: - - name: ENC[AES256_GCM,data:7KhuIzC/,iv:nn4bNQ1/tBiqjnQxcyocZd0h/54mH+LlRtiAjWuPCOc=,tag:e+55SHN49Q6NzT7KSsh52A==,type:str] - provider: ENC[AES256_GCM,data:+TrDQq3Z,iv:AAwjnHG40IKAkSPO5gzwEC745NH+Y5BgZIiJJ5Z2+AE=,tag:DENE8aAHAG9DZhkPmZWYVQ==,type:str] - key: ENC[AES256_GCM,data:uOY9iM/dAkhGbWSsUbmN5rnbqUY=,iv:BQ3KjcHN1jJG28RkjjhsTgWm+lHmHzYS4/P4Vlp89hs=,tag:HY3fZysu7sCdyoR0TuRd6A==,type:str] - secret: ENC[AES256_GCM,data:5s12mFDJJLPRg/IsypTx/BpvobX0hluTSddTaCQ0SgYjt4lthZDGGg==,iv:ojiXiVQ7BFUNO2ukAK0ygUTu6KVDKu8AMVmHfBw8Ii0=,tag:0zcD8iNT8iutij1C+Hk7Hg==,type:str] - - name: ENC[AES256_GCM,data:S/RV60Bc3/lH,iv:xIG+UJnmkEvuo2mgu904Hdn18BhsOCtWVl/eL6ybcZs=,tag:nFKPEisO3U3hPJZASrytiw==,type:str] - provider: ENC[AES256_GCM,data:eZOq2jNeqLM7BzePXA==,iv:vHhMOtF/mqUorcKSe2djtWKcyc5F2c+udWclcOkxK/A=,tag:6yKwQj/9oDDIdHcRtIgW3A==,type:str] - skip_local_2fa: ENC[AES256_GCM,data:B8ObUg==,iv:mmfGkA+8HK6H3DS+Hl5Hz3s/pwGBoYcXQfJiPiBKYFs=,tag:ErmgC/mcQZJ5sI5eEtLHzg==,type:str] - key: ENC[AES256_GCM,data:+w1/goQ=,iv:cIOxkdP38IaiNZ3dig5xo2kYrXdAwqerojCXcBifYds=,tag:5/+QimbfqpfnaFgFT3gfLg==,type:str] - secret: ENC[AES256_GCM,data:Rg4rEk9j8zZcUCWbm6xmuEbRb107f5HaU8ClbUkXWKnnERkN91QYtSNlAEWfHBk30xmBObm/O2LlypYJWT5wO7LNw4G6q9yv5JaIc7vS1pjicDi2QNxAW89euELdlthFa2fXj4lNlKLgQr8TbC5wpX0oysC261MM9kgjLuTQnw8=,iv:ft8IMPIu2JuzeWdM53qN5kJQQR5Oq9d2yyNbAQdtdY4=,tag:cBMEqmoP3KAuOhuX364hew==,type:str] - autoDiscoverUrl: ENC[AES256_GCM,data:IlykewahSerO46QAqJrvryzHkZONrEDHYBgwq9Nkg1pja9X1l3YaMbsg9DYWUkod/ZlzrGUA8Qyi58WW07chkFDPvy/Cfbp7GZSosr9ZVv7LI7TlpZHxeaA=,iv:rp05dCHRMnysz98G3EbKBZWsBzHrGzSuC6FCr/S8evw=,tag:6UtCbpVoWLbv5W/cB1+qBg==,type:str] - iconUrl: ENC[AES256_GCM,data:Tp16796JFzlYfOSfI+ld+Lf7hCeS74ZDz0kA/I9P3v6G+3LQAUGOtfFTzx5mTsfpP1eQN4HgD2uU3lfLhSozril1qq3AZA==,iv:dQSq+IiRcepUZqLipRr6DOHH7Hg6h45gnr9LH9dWYdU=,tag:zeq3tVobXsOasCkIAw/riw==,type:str] - scopes: ENC[AES256_GCM,data:3qwG8sYZER/p9GgnuA==,iv:hvJvc1pwUgeatq9R8GBde1EQDJunwZBl+cmsqJr1PBY=,tag:ov+WHCFaNaA40PPvOzVPqQ==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBRZ0IxQnpLSmJjTm1jTkI4 - NkhuMUN3RVp0TEFSNHhtTkFvWDFaUXVpUlIwCkxWbkxnQkY2R3g0cUY5VG1Kb251 - VUhYZlNCWC82Z0h3SHpaSnVST2h0WTAKLS0tIHJWR2FuT1ArRFhMWnV4cW9EcnZw - UHpBeWgyN21CUThydi9XdFc2V2c0TTQK38CQDRnFpUmWjyvDGGQ3vQxhBvy2Xva+ - SCd8sJZc/bnVDOEidvV9oxJz4y0nj6RvgzcsU+M99YBJcuV12xPqag== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2025-03-26T11:56:44Z" - mac: ENC[AES256_GCM,data:cc0H+6P0uTl5kpMR0B9o5BP8l1KHjLHdMetPlmNEVQo3NCzm+0SBjGYOqNhr0EG2Gd6RKdsAADrZAwyH+pXA2pmNVdIehDBu4Xncwi8nrUY3gm3jBIG/01H5VLqtZCoLfbqQ4ANHrGhn7JE5bwrXbbmD4t/7E2i7qHLukPj4S8w=,iv:3+llbgLRU2tMr+S2nvyA8hGfCnnWnqprGSW9H3VSCH0=,tag:gzMc8wSjZfa4h0eN3V5Ylw==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.4 diff --git a/values/badhouseplants/secrets.navidrome-private.yaml b/values/badhouseplants/secrets.navidrome-private.yaml deleted file mode 100644 index cd7c52b..0000000 --- a/values/badhouseplants/secrets.navidrome-private.yaml +++ /dev/null @@ -1,28 +0,0 @@ -files: - rclone-config: - enabled: ENC[AES256_GCM,data:3y4DCg==,iv:n+Pfj4j405WR17aY7RbF6lpOQ58ZQmWrH6dgUTQ0jX4=,tag:xbKEnPnASJTl27ch1Hi00g==,type:bool] - sensitive: ENC[AES256_GCM,data:DGby8Q==,iv:nibU4CkdcYlT1F7OkgqE1apUuyJA5M9Vj5x40F9zt3w=,tag:oW+jPP7F1vWY5gf0JyrPdw==,type:bool] - remove: [] - entries: - rclone.conf: - data: ENC[AES256_GCM,data:m4K3yt7no9mnUOzn/iGtaKqBrDXoLCgxEWV8NacXlOvh7c5ngmTmwoxzTaNxbsCQA7dECYb0dFtPvhF33AqgpcbRnqGrK54v8V+NaldQrgT2up4iQfdYA+sh+yNG3QAXU7eOEBvyFctJ+9dEaBII1sF/xFSkcTwrWkQFTQKLDdNIYU9a8ttEysz0cBWWXL3h9Y7C/mBjPdWIhpaf6Z63hy5P0hnYFftZsVM=,iv:qBBk9xMlZl3FriY2oYk4DQB1EKTsl7/qUj4s8naVvts=,tag:tDUKvK8ZuIxVeJjyUUqeXQ==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBxalE3bUtCWmFVejBJMlZq - dUg0U0R2VytsZHZ5QlQ4UGdrRmdsWGhWbEI4Clk1WEZ4U1lEdTJoRVBTbEFXaE1O - TW1wb0dycS9HeWdQcUx3KzJKb2kwTVUKLS0tIDU1bE9JWnp3Q3U4V0pVOGs4Z3Rq - Q1VsM3orOUZmS3lDaFpNN2g0cnllVWMKqZlPfiIFKn8h56gspbbUhpv9RkL5gF73 - NzqtFJJwQOGaD3lk2ocaLLkvywJ/DKNf7JupTWlmggHijId4hmpytw== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-11-20T15:04:15Z" - mac: ENC[AES256_GCM,data:XRmw86oJLHXMAY/SPv6ptQLV1Eocbig6CQSG1SdOO9scMpfgD3tMY43z5aB16DkW+6AG1ti+TS4JRgXKLaSsAmORqRN0yTwGEktiLs0GxhtDvMYwnclj/Cx76WbZyMkgVzCHe7ZsAI+9DrejSFYbB/CzA+8yq1KmMf/L5NWcv7o=,iv:AcYK48ywr2pzNw/HEY5hWOcjdnmnG2/eWp+r/o15Lbk=,tag:HLKLFYFV+7SWUaFYiNUS3g==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/badhouseplants/secrets.postgres.yaml b/values/badhouseplants/secrets.postgres.yaml deleted file mode 100644 index 89b3e48..0000000 --- a/values/badhouseplants/secrets.postgres.yaml +++ /dev/null @@ -1,24 +0,0 @@ -global: - postgresql: - auth: - postgresPassword: ENC[AES256_GCM,data:Pb5fkgK3VsPaBD35ng94FHAZuTs=,iv:qYBmZf29+ELL4d+E2QoF2EfxJHBsLfX4OtYdh986iHs=,tag:GfeKbe2JHi50LEwJ1do1qA==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBhZVdxMVVMeU13ZndLMVll - dFFwQzBkaEZSR2p1MElJOHRVVkVVU3NCM2hFClQ1cXJlRGpoa1U0djc2N3NFN1Nz - VHFIODBHd21kMmFBMmlDaDBwN0ViL0kKLS0tIHErVnpLTVJhc2U3S1U3S1huanc5 - bDFRaDB2M1Mxejc5Z1ZNL2xqU0tVWHMKNbZpG4iYQ8BI76Zbv8lbZqpuPX0qFHng - 6iEHF+e5FXk8KoFmELQ0masS/ewO2wRcHH5giISrxigHNutjkWh3Qg== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-10-14T08:08:22Z" - mac: ENC[AES256_GCM,data:A3QpJ+8BIN+6MdtaYkhxqoVrW/v34KZXXjWlPCjwTSKdu0Vf5BTKClyuSm+4Be1sj6kcp6zhEL5mG0DsXRZvhH+/LZqP0kw1BHRxyZ1McFFEQdvfdWz4m9F7SGyebxth6RAK5/RMp901Q1YqWJKxPjwajIGmy5stgBgDetQIOBk=,iv:uyE8wmYCvJzjz7zDas3weWoZj9BpZlpKgzMIAV0eQ4I=,tag:hRDa+xkI0GSZIWIoDg/YIA==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/badhouseplants/secrets.server-xray.yaml b/values/badhouseplants/secrets.server-xray.yaml deleted file mode 100644 index 51e5b87..0000000 --- a/values/badhouseplants/secrets.server-xray.yaml +++ /dev/null @@ -1,28 +0,0 @@ -files: - config: - enabled: ENC[AES256_GCM,data:/u3nZg==,iv:7b3I/wQEw6HWJNQfD98ROcdesLDDpgGOD9vKF0bGPE8=,tag:E58JVYZvX6N4LEp265wTIQ==,type:bool] - sensitive: ENC[AES256_GCM,data:T12sfgI=,iv:aPIfcJ2mOQPjpuFx8yEU3LQ03OJ20Xo+6bnVbinEJAw=,tag:fGoWBpLf2Mi2BubYFm6YsQ==,type:bool] - remove: [] - entries: - config.json: - data: ENC[AES256_GCM,data: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,iv:CQK+hwz5vr7TtKzB45FMiBp62aoWIA46nSaCtKxqSjM=,tag:U+P+8vrqzV4kV2eBrCtVGw==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBPMFkyNXFSbElXS2lqalox - cVRqUUorWlN6ZFlkRE95NmNBY3U2ZU5UQ3pRCkZTYkx3aXFobXRkZ0hkMmxSdnhy - K0ZuYzdTcjZhRVl0WEpmVW5sc1lkb2sKLS0tIGdnNlMzSmdqaURDSlJhQ0NFcUlQ - YzREc3V1OFYxL1hwYlduRVhaZi9NUGMKHDArn+yrYuWg/iFZntwid7GLcwiGBqo7 - 6jkb7alHWw3J0mw5M5q+oOCnFWYw+Lega2OlNxRF2wv9UDtkGguB1g== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-10-30T12:35:21Z" - mac: ENC[AES256_GCM,data:yzKtA1sW6R3TLnXVTPp3v3Agzwil6qxA76dSSP4boyFSgZB5bNe7aJcE7F4kzdXxZuKgAjZBY0zCYZS3br1hyd1dKrjViWJgpnVngWhKiDPG9ecvfX2JbY2id3mb9QZtmZJ/ZB3MzfntN/Vab+ruJGdkN6G7Iv5FLW5boLeRpJc=,iv:rsRSP5dB2Odf9+pjrlthvSKQHIFg6OfvIj/TK6zSyk4=,tag:Bfn2bBG44GH25a/HTdw5Dw==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/badhouseplants/secrets.team-fortress-2.yaml b/values/badhouseplants/secrets.team-fortress-2.yaml deleted file mode 100644 index 5cafb7f..0000000 --- a/values/badhouseplants/secrets.team-fortress-2.yaml +++ /dev/null @@ -1,47 +0,0 @@ -env: - secrets: - sensitive: ENC[AES256_GCM,data:QKu+Xg==,iv:eAP8PIvxGq7UOwNJQnyHOYE+mKLnbjEUrZSFk8uPqyA=,tag:htZqjETH91yEhAX/6Xgl/w==,type:bool] - enabled: ENC[AES256_GCM,data:hGszyg==,iv:xqmXykt3WPrVDwxMNxm6BZhJTbIpD+G8/eQv8MG7HI4=,tag:IJn6m6+hPD4eM1WwTLxLYA==,type:bool] - data: - SRCDS_TOKEN: ENC[AES256_GCM,data:2ilNJSRy8F1kl1GMr2Ad8bnK2ZHbgpDZqPEUfb/0J/0=,iv:0IJeLqOT9m3q2Lief6TLxHqRFJeMr5m6MEClziQfOZ4=,tag:i3czXPc5EhARHYt1HbhHnw==,type:str] - SRCDS_WORKSHOP_AUTHKEY: ENC[AES256_GCM,data:hOUKQ5+qulrM4iqbZhzYM/bU09eB5B4pyLZ0EhbtT+c=,iv:zL82fYER9gA7zVRxoagMad2UNjusSuLVlbGaUrirvbg=,tag:2VDaRFeWo1dci/hQIhS/+w==,type:str] - SRCDS_RCONPW: ENC[AES256_GCM,data:cwvHxhCZ6Wk=,iv:LVklzE2DY5JZH5QTd73f6HERrUVH6+Ee/r+Mo2lVe+8=,tag:yUYF8a25KjUabvOO1nWp8g==,type:str] - SRCDS_PW: ENC[AES256_GCM,data:IxgvQ+tj5Ss=,iv:jYA07esoyKfUfc5fCllehoM+wkjVZOOaEu3g+xNp8tI=,tag:dsgr+UGU/dXuqliiBn8erw==,type:str] -files: - servercfg: - sensitive: ENC[AES256_GCM,data:/2rGjA==,iv:0+CWB1FdaI7e95NlyjZ5sZs9U/7J5JYZx+WcFfj4CQM=,tag:lzO9Gmeoz38gsiYu9eLMsQ==,type:bool] - entries: - server.cfg: - data: ENC[AES256_GCM,data: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,iv:yakHdGa4RzyPeDfbiCZoGTFhnFgxCNcdwUtP1dsGhms=,tag:MyOtEHAfPDmlinQwS8JNQw==,type:str] - motd: - sensitive: ENC[AES256_GCM,data:t5cbqiE=,iv:WwHSfvG5eQURQTVP2KQ9OFvCKw9vqtlzZbEmn/lv+cg=,tag:OuPlOUptQOChYcC1Ept3PA==,type:bool] - enabled: ENC[AES256_GCM,data:4EEw/Q==,iv:cv3ixxGCCn3bLd5RR36ZhdDp1F3s03YIAjmyuDZenkE=,tag:wQi2l6GUI9OklirAlY1gaw==,type:bool] - entries: - motd.txt: - data: ENC[AES256_GCM,data:4zcQEGgc/wIkrJnYBw+ZxkNb7Prnch1zFiMOR0lDDR6/raeY4/e1lEeKGot1ZB98RXzohvZirHCPeQ==,iv:uvIW4dLDP3zWyOTSCIN/hb0GIHtIAEYy97dhCp6Y+b8=,tag:vS7/CXWK5SQu4IjLOXDuGQ==,type:str] - maps: - sensitive: ENC[AES256_GCM,data:7WsG5R0=,iv:HdTgsE4DhX0knJYdXbQ2T9Q21YucYwVM4DrcAhiFyK0=,tag:LqVuR20023UEa1V4AE0LWA==,type:bool] - enabled: ENC[AES256_GCM,data:JPpi+A==,iv:chn+v7RCtEJ+MfEAu66OHc1Nbl6nU3GS+ieTmT7G7dA=,tag:/7tBL/TIPDGvxObE2rAvvQ==,type:bool] - entries: - pl_maps.txt: - data: ENC[AES256_GCM,data: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,iv:+PG9OEQKYZE8dcWtdtXZ6qhsr1P3iTB8XqLVtqHqDgY=,tag:cU1TNcFmarl0e/JtLYPNpg==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAxcXNQRjZCQUpka0RFYXNm - RVRsQU0wWFBKQXpMcGIwZnEwUFJoUkdWL1RJCjhoWTBjSEdwUktINm5XcFQ0TFZ6 - QmxIN0Z1c3hiVGFhNWRwVHRmWUlNR00KLS0tIERJemJTNENXM29xb2d3cVRkRzRZ - Zkg5QUhtM3lLeWZGbCt5WldXRVljemsKT4DIMJfAVRpedIcjUoA1QWz0AoWcwM3T - GEoeTRyzxM/913pQ2TzVfl99ilg+AXJddr/P5Av9NebU5SBRRL0/AA== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-12-07T15:50:40Z" - mac: ENC[AES256_GCM,data:aaQG5T1nOmp8uaC0UDfXRNOsxRc+5D3ctQ1rU3GL3Tzm+xdRNgGI0JNPoihZv3/lkZACGWJe68/y6aEGw14AMMzEjVVw0tvuHdvkVblSBkE9guvkrCzv7uDvbei5Miy0vBpdmTN0AeiQ52l/OYa5Dkb6MhDDDyd6X89dxtAq+P8=,iv:KnDue0Qv/tjNapFeZ91drHi+shXvWjTQJd45mpHPxUI=,tag:ntmZ8u3qCwbjPygLv3PAZw==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.2 diff --git a/values/badhouseplants/secrets.vaultwarden.yaml b/values/badhouseplants/secrets.vaultwarden.yaml deleted file mode 100644 index b9cea47..0000000 --- a/values/badhouseplants/secrets.vaultwarden.yaml +++ /dev/null @@ -1,30 +0,0 @@ -env: - secrets: - enabled: ENC[AES256_GCM,data:Gv3Unw==,iv:pIls2F+alt1LfJIzfto+6YA4ih9KLBAzutd6Nz4uvlI=,tag:HUXRQI+vvN70eMsgNgeltw==,type:bool] - sensitive: ENC[AES256_GCM,data:/trLBA==,iv:w5IV1c7+d971WHLkhbi2jAT4smGUFNQjWXfAHjqMJtQ=,tag:GErKO9Mev/vNI8hVO0OCOg==,type:bool] - data: - SMTP_USERNAME: ENC[AES256_GCM,data:mxHg,iv:fnC9XmPBSoYg/SaezA9I7hUNcK16z0UyB0ujp8dOV/Q=,tag:Ude8TQ+m358upwTHW4g2vA==,type:str] - ADMIN_PASSWORD: ENC[AES256_GCM,data:arONfkxTVCKOrw4ehk1HGG2MOisfo1oZyw==,iv:T/MAUaHaIVL/oAuAMGwB4x4aNWrnjnvNvM7h4cgL0q0=,tag:F/GYyB1ZxFLxC32hKtsnSg==,type:str] - ADMIN_TOKEN: ENC[AES256_GCM,data:eiXun0SKGMichylKuyJPxRkO0nUbCb+ex1ABr4z/IM5CYgbptCW+b+Lw5BQB+Bf0OzcmX3d/GcwrJKXvbjBBelgMUZGXLfShB3M=,iv:git8/iNUeWPxwt/+1NT+rEoYz12hNUGPD6dg+gCyKTs=,tag:M2BqdsoitGIm3GeFBnG9/w==,type:str] - DATABASE_URL: null - SMTP_PASSWORD: ENC[AES256_GCM,data:KdFR+MmZyGsuHsItX8WNy6r5LXWMgUzJjg==,iv:89e34akVX23Nblm2FNd6u7lX2Z/Zigek8gdjdHD1PTE=,tag:BdpfhbsPHB08gfey80w6gw==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA0OElmeTA4K1NZUncvRjI2 - YldLMHVhQVpKSWdwNHh6RnRZZmhSdC9wUlNzCnk5R2xrQzM4MlNxWFZuV0J5aHkv - VlNlSm02d1JQWlFuTG5USmlwQzdXancKLS0tIEFGSDRtc1pmMnVPWGhJR2NBU2xP - a2h1RE5XWmxxb05IZEU3c3VGaXRmeUUKmIgm5Apj8ipz/h8YYiz+ryVFSsjTCXMv - WWDuNLIhxO3inp6QgwWW1PhDjNWAn1uEULckyFAgDOdwp4Tof4A/ZQ== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-11-05T11:05:01Z" - mac: ENC[AES256_GCM,data:Sxc3HM0kCuNNRTn6R9kDWmzx+uJHjXi2245n4EwJBx3faX0WsH5I3ZZfjJl0fKLQJApEaN4i+vu/6fEWIfUrbbHfSLCQQDrj1OpXz0Yz+ett83JY+G41bjgWb316MYvuXp0zFlLsms54jCFMY3aV+ROIDXEGaEYncVwrbIXiJpk=,iv:wHi9wf1iiptgCiDD1yAtBw/xaOfymliihp7RyHg9J0M=,tag:uygWGbkgZyb/KZNCzxyPUg==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/badhouseplants/secrets.woodpecker-agent.yaml b/values/badhouseplants/secrets.woodpecker-agent.yaml deleted file mode 100644 index 32528f6..0000000 --- a/values/badhouseplants/secrets.woodpecker-agent.yaml +++ /dev/null @@ -1,23 +0,0 @@ -env: - WOODPECKER_AGENT_SECRET: ENC[AES256_GCM,data:3z3rdQQVxbTx5muyaLmBamvRJ4TvKV+EVsaFyy3+Ccnn5IQlLFBr3MNWBUg=,iv:EGS92qU3Uy/zIICS7snkYjHQli49izhkYS6LAAGO2U8=,tag:8zMCNnIu+0dh5fYGLQgUtw==,type:str] - WOODPECKER_GITEA_SECRET: ENC[AES256_GCM,data:nuSOHH/+ALl84d5L9kalNwZ3GCstKGn3lHdIu7fiU9Uhw0SHRZk/kOKmzCk=,iv:Ya4UI9T0i+ojzY8VsTiCIq46TfJ+3xqluheWXGkcIJU=,tag:Y4kxqsH/PLTZn9tujrdOGg==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB6L1BQbTJzem5rNnRHRDEv - YVRnZEJEaDlXUnprME1NeW5qZFNNU1hrSERBCkkrdnR1UFhNSXFYZ3pwLzZyOVJ3 - bDNpbWZobUJKTkFPVFc1S3JVa1YwMlUKLS0tIE1lK3RSNXNySnZwRHFaTjczbjZH - dlFMR2xEai9Pc3NZR3h6d29XZ0R4aGMKuXgaEmSVdla8JquLkMKvSYAdE+HFd2P4 - jT3nfL4oFdC5t1vlz7uAX3DtgoDlUF3+x4qxADi6F3N0QILV0DEezA== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-10-14T08:08:22Z" - mac: ENC[AES256_GCM,data:xi2QnnRQFhxs3R0v63g2f40+2t9eaWbOU85ue4s6Wkr7Fdo6jGG5ThUyBlFyqSO+aKGBHBYHHmNVG+gloFw2vhmG2tFloUtj+6vttAV4sxJrK4ixEsb8JHlAdLPTG8h0ILhPaTj5PQLrVF6q9QkJaRMUCa9alAWf8kQI3GLUJeo=,iv:426Eo1NbcjarA2fT7H8Q2DQW3PEBUWKSjgl6lUI2Y0o=,tag:6pU0kjAKskcCvha71mKLSw==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/badhouseplants/secrets.woodpecker-ci-kube.yaml b/values/badhouseplants/secrets.woodpecker-ci-kube.yaml deleted file mode 100644 index 12c7e10..0000000 --- a/values/badhouseplants/secrets.woodpecker-ci-kube.yaml +++ /dev/null @@ -1,23 +0,0 @@ -agent: - env: - WOODPECKER_AGENT_SECRET: ENC[AES256_GCM,data:anLCJ+6tbLehtjm5B+MkQ91FLbYIYWVU7VCQN7pPSBEgo4N6bsaWxVG7kca8aIuRkwItmRSj/ZZqvbsRZa8Deg==,iv:5Trc3lT3zwegVm0NYamIv41TKsOziNga5VuD5t7TV9Q=,tag:3xz6oqWwsW44z15aepWOWA==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBDSnpmYTJBWlVGMlFIV1dG - SjNnZEtUVUx4dWc4N2puUWhPWVZlWHZkQTJFCjA5MCs1Q2R1K0lLS0dJaG1MWTRz - dGZtZW82M2VsZ2RlZHZndUZGdDl3RjAKLS0tIFdqclNXaU9rOU1XbkVieXoyYXIr - SjFSRDhtNDdwZGdFN2FSYjRML2MwTlEKf3SUMrlZN6uuF52MumFx6pn1xU7Dsy1I - VEUs4Io1W4OGRAG0IKme+nMAAQIwWHQFHgKnkhuN8IwpUB/sC4NjOQ== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-10-14T08:08:22Z" - mac: ENC[AES256_GCM,data:2d4yOBSWyQI6Dr0oDsv3Z+Sxuj3/8jlCdArKOpcLWSTKNaRCwXzzBxtv73v7uMjVNsuSkLujgeT3WCeW/oPGrKMVAGYqPAAeb1Gn6dlFeX5hJny9m+jyCByecrbqqy/ADWWy2Hp8yK/WZ+5LDrie6D976MGvdoKD3uIrbJt5za4=,iv:Q4I+Uh8PIy/gKUd8JgtXwHdwzTGd0irUdUQklRcLPDI=,tag:WADvJgqLxXMvBlgKzNWbkQ==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/badhouseplants/secrets.zot-mirror.yaml b/values/badhouseplants/secrets.zot-mirror.yaml deleted file mode 100644 index ff88a50..0000000 --- a/values/badhouseplants/secrets.zot-mirror.yaml +++ /dev/null @@ -1,22 +0,0 @@ -authHeader: ENC[AES256_GCM,data:nmlP0vRoKJRivvwJArnEO26sqIwFtnK5MYVPJBBCmAGCPpe/U00gYu6JET0gPqGV,iv:+GZwWrxoWw0mAZxZdITBLtHgRKYIyaj/NQwHbD8KppA=,tag:MAer3FiaBxyNwJr0BbDtow==,type:str] -_mirror_password: ENC[AES256_GCM,data:W2xy2RMmD4d6N+DNceIgtDGUpygOGEbWgGa9Icsy,iv:YsQfm/EmBYY35q2irlZ2rmzkbJzlFnfgMSEKq0G1I5o=,tag:7rNG02Wm9g8GUXeM4nTHqA==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBPVUlyVFZWcWFuWnEyS2Nv - Tkx6aTZKY1czQ25RTHhKNWNNQ0xIaWJLb1VFCkdoT0RBTW9EWG8zbzYxekdsUEY2 - bE9nQUthV3NCa0kzRnBwZ2U2MWlVNzAKLS0tIFY4RVJDM05ZVmR3NEt5YUlpOWZa - ZVc1bmJnU1o4U3NGaGN0Sk90YTR0ckkK8gmkHty4Gwt4vuVK3xhWWg4h/EgvJULh - Trgn0lzx2pCThg/+82u5J1T/QLXdbbDFFFwGldiMwNjZQfpOmrZpVw== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2025-03-26T21:04:45Z" - mac: ENC[AES256_GCM,data:cTN6wq1m1XtsfNujCfQ4nKtX1Pkc8MFCipUeScDLJUuZZwg4St0h1OkYtYJBWeVSt3CSjjexQpb7Oi9K8wukboIVevaIj0BTT1hkf2ZUFeIV8W62mtftfdRex0yJ/4h1gTZaYBhHEw+qD6r+XvavDs1m22FF5RuF+5qfGUEWA4I=,iv:RsVuXbLVfZSJ7AkIvEdf7H2auFTiqXgpXLe/LbATAo8=,tag:1V5eIiJzjzv4C1JNNf5Quw==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.4 diff --git a/values/badhouseplants/values.argo-badhouseplants.net b/values/badhouseplants/values.argo-badhouseplants.net deleted file mode 100644 index c130530..0000000 --- a/values/badhouseplants/values.argo-badhouseplants.net +++ /dev/null @@ -1,87 +0,0 @@ -applications: {} -# guestbook: -# namespace: argocd -# additionalLabels: {} -# additionalAnnotations: {} -# finalizers: -# - resources-finalizer.argocd.argoproj.io -# project: guestbook -# source: -# repoURL: https://github.com/argoproj/argocd-example-apps.git -# targetRevision: HEAD -# path: guestbook -# directory: -# recurse: true -# # ArgoCD v2.6 or later -# sources: -# - chart: elasticsearch -# repoURL: https://helm.elastic.co -# targetRevision: 8.5.1 -# - repoURL: https://github.com/argoproj/argocd-example-apps.git -# path: guestbook -# targetRevision: HEAD -# destination: -# server: https://kubernetes.default.svc -# namespace: guestbook -# syncPolicy: -# automated: -# prune: false -# selfHeal: false -# syncOptions: -# - CreateNamespace=true -# revisionHistoryLimit: null -# ignoreDifferences: -# - group: apps -# kind: Deployment -# jsonPointers: -# - /spec/replicas -# info: -# - name: url -# value: https://argoproj.github.io/ - -# -- Deploy Argo CD Projects within this helm release -# @default -- `{}` (See [values.yaml]) -## Ref: https://github.com/argoproj/argo-cd/blob/master/docs/operator-manual/ -projects: {} -# guestbook: -# namespace: argocd -# additionalLabels: {} -# additionalAnnotations: {} -# permitOnlyProjectScopedClusters: false -# finalizers: -# - resources-finalizer.argocd.argoproj.io -# description: Example Project -# sourceRepos: -# - '*' -# destinations: -# - namespace: guestbook -# server: https://kubernetes.default.svc -# clusterResourceWhitelist: [] -# clusterResourceBlacklist: [] -# namespaceResourceBlacklist: -# - group: '' -# kind: ResourceQuota -# - group: '' -# kind: LimitRange -# - group: '' -# kind: NetworkPolicy -# orphanedResources: {} -# roles: [] -# namespaceResourceWhitelist: -# - group: 'apps' -# kind: Deployment -# - group: 'apps' -# kind: StatefulSet -# orphanedResources: {} -# roles: [] -# syncWindows: -# - kind: allow -# schedule: '10 1 * * *' -# duration: 1h -# applications: -# - '*-prod' -# manualSync: true -# signatureKeys: -# - keyID: ABCDEF1234567890 -# sourceNamespaces: -# - argocd diff --git a/values/badhouseplants/values.bitwarden.yaml b/values/badhouseplants/values.bitwarden.yaml deleted file mode 100644 index 00e0898..0000000 --- a/values/badhouseplants/values.bitwarden.yaml +++ /dev/null @@ -1,40 +0,0 @@ ---- -image: - repository: vaultwarden/server - tag: 1.28.1 - -istio: - enabled: true - istio: - - name: bitwarden-http - gateway: istio-system/badhouseplants-net - kind: http - hostname: bitwarden.badhouseplants.net - service: bitwarden-vaultwarden - port: 80 - - # pathType is only for k8s >= 1.1= - pathType: Prefix - -env: - SIGNUPS_ALLOWED: false - DOMAIN: "https://bitwarden.badhouseplants.net" - WEB_VAULT_ENABLED: true - -persistence: - enabled: true - accessMode: ReadWriteOnce - size: 800Mi - storageClass: longhorn - -smtp: - host: badhouseplants.net - security: "starttls" - port: 587 - from: bitwarden@badhouseplants.net - fromName: bitwarden - username: - value: overlord@badhouseplants.net - authMechanism: "Plain" - acceptInvalidHostnames: "false" - acceptInvalidCerts: "false" \ No newline at end of file diff --git a/values/badhouseplants/values.cilium.yaml b/values/badhouseplants/values.cilium.yaml deleted file mode 100644 index 5715b7c..0000000 --- a/values/badhouseplants/values.cilium.yaml +++ /dev/null @@ -1,10 +0,0 @@ -operator: - replicas: 1 -endpointRoutes: - # -- Enable use of per endpoint routes instead of routing via - # the cilium_host interface. - enabled: true -ipam: - ciliumNodeUpdateRate: "15s" - operator: - clusterPoolIPv4PodCIDRList: ["192.168.0.0/16"] diff --git a/values/badhouseplants/values.db-instances.yaml b/values/badhouseplants/values.db-instances.yaml deleted file mode 100644 index 6d18c1f..0000000 --- a/values/badhouseplants/values.db-instances.yaml +++ /dev/null @@ -1,21 +0,0 @@ -dbinstances: - postgres16: - monitoring: - enabled: false - adminSecretRef: - Name: postgres16-secret - Namespace: databases - engine: postgres - generic: - host: postgres16-postgresql.databases.svc.cluster.local - port: 5432 - postgres17: - monitoring: - enabled: false - adminSecretRef: - Name: postgres17-secret - Namespace: databases - engine: postgres - generic: - host: postgres17-postgresql.databases.svc.cluster.local - port: 5432 diff --git a/values/badhouseplants/values.funkwhale.yaml b/values/badhouseplants/values.funkwhale.yaml deleted file mode 100644 index 1b0a9b6..0000000 --- a/values/badhouseplants/values.funkwhale.yaml +++ /dev/null @@ -1,72 +0,0 @@ ---- -# ------------------------------------------ -# -- Istio extenstion. Just because I'm -# -- not using ingress nginx -# ------------------------------------------ -istio: - enabled: true - istio: - - name: funkwhale-http - gateway: istio-system/badhouseplants-net - kind: http - hostname: funkwhale.badhouseplants.net - service: funkwhale - port: 80 - -ext-database: - enabled: true - name: funkwhale-postgres16 - instance: postgres16 - -replicaCount: 1 -celery: - worker: - replicaCount: 1 - beat: - resources: - limits: - cpu: 100m - memory: 512Mi - requests: - cpu: 10m - memory: 75Mi -ingress: - enabled: true - annotations: - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - kubernetes.io/ingress.class: traefik - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - host: funkwhale.badhouseplants.net - protocol: http - - tls: - - secretName: funkwhale-tls-secret - hosts: - - funkwhale.badhouseplants.net - -extraEnv: - FUNKWHALE_HOSTNAME: funkwhale.badhouseplants.net - FUNKWHALE_PROTOCOL: https -persistence: - enabled: true - accessMode: ReadWriteMany - size: 10Gi -s3: - enabled: false - -postgresql: - enabled: false - host: postgres16-postgresql.databases.svc.cluster.local - auth: - username: applications-funkwhale-postgres16 - database: applications-funkwhale-postgres16 - -redis: - enabled: false - host: redis-master.databases.svc.cluster.local - auth: - enabled: true - database: 3 diff --git a/values/badhouseplants/values.gitea-archived.yaml b/values/badhouseplants/values.gitea-archived.yaml deleted file mode 100644 index 4977baa..0000000 --- a/values/badhouseplants/values.gitea-archived.yaml +++ /dev/null @@ -1,151 +0,0 @@ -# ------------------------------------------ -# -- Database extension is used to manage -# -- database with db-operator -# ------------------------------------------ -ext-database: - enabled: true - name: gitea-postgres16 - instance: postgres16-gitea - -traefik: - enabled: true - tcpRoutes: - - name: gitea-ssh - service: gitea-archived-ssh - match: HostSNI(`*`) - entrypoint: ssh - port: 22 -# ------------------------------------------ -# -- Kubernetes related values -# ------------------------------------------ -ingress: - enabled: true - annotations: - kubernetes.io/ingress.class: traefik - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - hosts: - - host: git.badhouseplants.net - paths: - - path: / - pathType: Prefix - tls: - - secretName: gitea-tls-secret - hosts: - - git.badhouseplants.net -replicaCount: 1 -clusterDomain: cluster.local - -resources: - limits: - cpu: 512m - memory: 1024Mi - requests: - cpu: 512m - memory: 256Mi - -persistence: - enabled: true - size: 15Gi - accessModes: - - ReadWriteOnce - -# ------------------------------------------ -# -- Main Gitea settings -# ------------------------------------------ -gitea: - metrics: - enabled: true - serviceMonitor: - # -- TODO(@allanger): Enable it once prometheus is configured - enabled: false - config: - database: - DB_TYPE: postgres - HOST: postgres16-gitea-postgresql.databases.svc.cluster.local - NAME: applications-gitea-postgres16 - USER: applications-gitea-postgres16 - APP_NAME: Bad Houseplants Gitea - ui: - meta: - AUTHOR: Bad Houseplants - DESCRIPTION: ...by allanger - repository: - DEFAULT_BRANCH: main - MAX_CREATION_LIMIT: 0 - DISABLED_REPO_UNITS: repo.wiki - service: - DISABLE_REGISTRATION: false - server: - DOMAIN: git.badhouseplants.net - ROOT_URL: https://git.badhouseplants.net - LFS_START_SERVER: true - LANDING_PAGE: explore - START_SSH_SERVER: true - admin: - DISABLE_REGULAR_ORG_CREATION: true - packages: - ENABLED: true - cron: - enabled: true - attachment: - MAX_SIZE: 100 - actions: - ENABLED: true - oauth2_client: - REGISTER_EMAIL_CONFIRM: false - ENABLE_AUTO_REGISTRATION: true - session: - PROVIDER: redis - cache: - ENABLED: true - ADAPTER: redis - queue: - TYPE: redis - mailer: - ENABLED: true - FROM: gitea@badhouseplants.net - PROTOCOL: smtp+startls - SMTP_ADDR: badhouseplants.net - SMTP_PORT: 587 - USER: overlord@badhouseplants.net - indexer: - REPO_INDEXER_ENABLED: true - REPO_INDEXER_PATH: indexers/repos.bleve - MAX_FILE_SIZE: 1048576 - REPO_INDEXER_EXCLUDE: resources/bin/** - picture: - ENABLE_FEDERATED_AVATAR: false -service: - ssh: - type: ClusterIP - port: 22 - clusterIP: -# ------------------------------------------ -# -- Disabled dependencies -# ------------------------------------------ -postgresql-ha: - enabled: false -redis-cluster: - enabled: false - - # extraDeploy: - # - | - # {{- if $.Capabilities.APIVersions.Has "traefik.io/v1alpha1/IngressRouteTCP" }} - # apiVersion: traefik.io/v1alpha1 - # kind: IngressRouteTCP - # metadata: - # name: {{ include "gitea.fullname" . }}-ssh - # spec: - # entryPoints: - # - ssh - # routes: - # - match: HostSNI('*') - # services: - # - name: "{{ include "gitea.fullname" . }}-ssh" - # port: 22 - # nativeLB: true - # {{- end }} diff --git a/values/badhouseplants/values.gitea.yaml b/values/badhouseplants/values.gitea.yaml deleted file mode 100644 index 4a10a2b..0000000 --- a/values/badhouseplants/values.gitea.yaml +++ /dev/null @@ -1,156 +0,0 @@ -# ------------------------------------------ -# -- Database extension is used to manage -# -- database with db-operator -# ------------------------------------------ -ext-database: - enabled: true - name: gitea-postgres16 - instance: postgres16 -traefik: - enabled: true - tcpRoutes: - - name: gitea-ssh - service: gitea-ssh - match: HostSNI(`*`) - entrypoint: ssh - port: 22 -# ------------------------------------------ -# -- Kubernetes related values -# ------------------------------------------ -ingress: - enabled: true - annotations: - kubernetes.io/ingress.class: traefik - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - external-dns.alpha.kubernetes.io/ingress-hostname-source: defined-hosts-only - hosts: - - host: gitea.badhouseplants.net - paths: - - path: / - pathType: Prefix - tls: - - secretName: gitea.badhouseplants.net - hosts: - - gitea.badhouseplants.net -replicaCount: 1 -clusterDomain: cluster.local -resources: - limits: - memory: 1.5Gi - cpu: 1 - requests: - cpu: 1 - memory: 1.5Gi -persistence: - enabled: true - size: 15Gi - accessModes: - - ReadWriteOnce -# ------------------------------------------ -# -- Main Gitea settings -# ------------------------------------------ -gitea: - metrics: - enabled: true - serviceMonitor: - enabled: true - config: - database: - DB_TYPE: postgres - HOST: postgres16-postgresql.databases.svc.cluster.local - NAME: applications-gitea-postgres16 - USER: applications-gitea-postgres16 - APP_NAME: Bad Houseplants Gitea - ui: - meta: - AUTHOR: Bad Houseplants - DESCRIPTION: '...by allanger' - repository: - DEFAULT_BRANCH: main - MAX_CREATION_LIMIT: 0 - DISABLED_REPO_UNITS: repo.wiki - service: - DISABLE_REGISTRATION: false - server: - DOMAIN: gitea.badhouseplants.net - ROOT_URL: https://gitea.badhouseplants.net - LFS_START_SERVER: true - LANDING_PAGE: explore - START_SSH_SERVER: true - ENABLE_PPROF: true - storage: - STORAGE_TYPE: minio - MINIO_ENDPOINT: "s3.badhouseplants.net:443" - MINIO_ACCESS_KEY_ID: gitea - MINIO_BUCKET: gitea - MINIO_LOCATION: us-east-1 - MINIO_USE_SSL: true - admin: - DISABLE_REGULAR_ORG_CREATION: true - packages: - ENABLED: true - cron: - enabled: true - attachment: - MAX_SIZE: 100 - actions: - ENABLED: true - oauth2_client: - REGISTER_EMAIL_CONFIRM: false - ENABLE_AUTO_REGISTRATION: true - session: - PROVIDER: redis - cache: - ENABLED: true - ADAPTER: redis - queue: - TYPE: redis - mailer: - ENABLED: true - FROM: bot@badhouseplants.net - PROTOCOL: smtp+startls - SMTP_ADDR: stalwart.badhouseplants.net - SMTP_PORT: 587 - USER: bot - indexer: - REPO_INDEXER_ENABLED: true - REPO_INDEXER_PATH: indexers/repos.bleve - MAX_FILE_SIZE: 1048576 - REPO_INDEXER_EXCLUDE: resources/bin/** - picture: - ENABLE_FEDERATED_AVATAR: false -service: - ssh: - type: ClusterIP - port: 22 - clusterIP: - -# ------------------------------------------ -# -- Disabled dependencies -# ------------------------------------------ -postgresql-ha: - enabled: false -redis-cluster: - enabled: false - -# extraDeploy: -# - | -# {{- if $.Capabilities.APIVersions.Has "traefik.io/v1alpha1/IngressRouteTCP" }} -# apiVersion: traefik.io/v1alpha1 -# kind: IngressRouteTCP -# metadata: -# name: {{ include "gitea.fullname" . }}-ssh -# spec: -# entryPoints: -# - ssh -# routes: -# - match: HostSNI('*') -# services: -# - name: "{{ include "gitea.fullname" . }}-ssh" -# port: 22 -# nativeLB: true -# {{- end }} diff --git a/values/badhouseplants/values.istio-ingressgateway.yaml b/values/badhouseplants/values.istio-ingressgateway.yaml deleted file mode 100644 index adf24cb..0000000 --- a/values/badhouseplants/values.istio-ingressgateway.yaml +++ /dev/null @@ -1,17 +0,0 @@ -service: - type: LoadBalancer - externalTrafficPolicy: Local - ports: - - name: xray - port: 27015 - protocol: TCP - targetPort: 27015 -podAnnotations: - proxy.istio.io/config: '{"gatewayTopology" : { "numTrustedProxies": 0, "forwardClientCertDetails": SANITIZE } }' -resources: - requests: - cpu: 100m - memory: 128Mi - limits: - cpu: 200m - memory: 1024Mi diff --git a/values/badhouseplants/values.istiod.yaml b/values/badhouseplants/values.istiod.yaml deleted file mode 100644 index e69de29..0000000 diff --git a/values/badhouseplants/values.kyverno.yaml b/values/badhouseplants/values.kyverno.yaml deleted file mode 100644 index 1e9b783..0000000 --- a/values/badhouseplants/values.kyverno.yaml +++ /dev/null @@ -1,2 +0,0 @@ -config: - excludeKyvernoNamespace: false diff --git a/values/badhouseplants/values.local-path-provisioner.yaml b/values/badhouseplants/values.local-path-provisioner.yaml deleted file mode 100644 index d266c87..0000000 --- a/values/badhouseplants/values.local-path-provisioner.yaml +++ /dev/null @@ -1,6 +0,0 @@ -storageClass: - create: true - defaultClass: false - defaultVolumeType: local - reclaimPolicy: Delete - volumeBindingMode: Immediate diff --git a/values/badhouseplants/values.memos.yaml b/values/badhouseplants/values.memos.yaml deleted file mode 100644 index 05251d8..0000000 --- a/values/badhouseplants/values.memos.yaml +++ /dev/null @@ -1,35 +0,0 @@ -shortcuts: - hostname: notes.badhouseplants.net -ext-database: - enabled: true - name: memos-postgres16 - instance: postgres16 - credentials: - MEMOS_DRIVER: postgres - MEMOS_DSN: "{{ .Protocol }}://{{ .Username }}:{{ .Password }}@{{ .Hostname }}:{{ .Port }}/{{ .Database }}?sslmode=disable" -base: - workload: - containers: - memos: - envFrom: - main: {} - raw: - - secretRef: - name: memos-postgres16-creds - -storage: - data: - metadata: - annotations: - volume.kubernetes.io/selected-node: bordeaux - storageClassName: openebs-hostpath -ingress: - main: - metadata: - annotations: - kubernetes.io/ingress.class: traefik - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure diff --git a/values/badhouseplants/values.metallb-resources.yaml b/values/badhouseplants/values.metallb-resources.yaml deleted file mode 100644 index 94b681b..0000000 --- a/values/badhouseplants/values.metallb-resources.yaml +++ /dev/null @@ -1,5 +0,0 @@ -metallb: - enabled: true - ippools: - - name: fuji - addresses: 195.201.249.91-195.201.249.91 diff --git a/values/badhouseplants/values.navidrome-private.yaml b/values/badhouseplants/values.navidrome-private.yaml deleted file mode 100644 index 572503f..0000000 --- a/values/badhouseplants/values.navidrome-private.yaml +++ /dev/null @@ -1,48 +0,0 @@ -shortcuts: - hostname: navidrome.badhouseplants.net -ingress: - main: - annotations: - kubernetes.io/ingress.class: traefik - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure -env: - main: - enabled: true - sensitive: false - remove: [] - data: - ND_MUSICFOLDER: /app/music - ND_DATAFOLDER: /app/data - ND_LOGLEVEL: info - ND_BASEURL: 'https://{{ .Values.shortcuts.hostname }}' -files: - rclone-config: - enabled: true - sensitive: true - remove: [] - entries: - rclone.conf: - data: | - [music-data] - type = s3 - provider = Minio - endpoint = s3.badhouseplants.net - location_constraint = us-west-1 - access_key_id = allanger - secret_access_key = fPN3Nv6yDWVnZ7V7eRZ - rclone-script: - enabled: true - sensitive: false - remove: [] - entries: - rclone-script: - data: | - #!/usr/bin/sh - while true; do - rclone --config /app/rclone.conf sync -P music-data:/music /app/music - sleep 10 - done diff --git a/values/badhouseplants/values.navidrome.yaml b/values/badhouseplants/values.navidrome.yaml deleted file mode 100644 index 3823ea9..0000000 --- a/values/badhouseplants/values.navidrome.yaml +++ /dev/null @@ -1,52 +0,0 @@ -middleware: - enabled: true - middlewares: - - name: navidromeauth - spec: - headers: - customRequestHeaders: - Remote-User: "guest" -shortcuts: - hostname: music.badhouseplants.net -ingress: - main: - annotations: - traefik.ingress.kubernetes.io/router.middlewares: applications-navidromeauth@kubernetescrd - kubernetes.io/ingress.class: traefik - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure -env: - main: - enabled: true - sensitive: false - remove: [] - data: - ND_MUSICFOLDER: /app/music - ND_DATAFOLDER: /app/data - ND_LOGLEVEL: info - ND_BASEURL: 'https://{{ .Values.shortcuts.hostname }}' - ND_REVERSEPROXYUSERHEADER: "Remote-User" - ND_REVERSEPROXYWHITELIST: "0.0.0.0/0" - ND_LASTFM_ENABLED: false - ND_LISTENBRAINZ_ENABLED: false - ND_ENABLEUSEREDITING: false - ND_ENABLEFAVOURITES: false - ND_ENABLESTARRATING: false - ND_ENABLEEXTERNALSERVICES: false - ND_ENABLESHARING: true -files: - rclone-config: - enabled: true - sensitive: false - remove: [] - entries: - rclone.conf: - data: | - [music-data] - type = s3 - provider = Minio - endpoint = s3.badhouseplants.net - location_constraint = us-west-1 diff --git a/values/badhouseplants/values.openvpn.yaml b/values/badhouseplants/values.openvpn.yaml deleted file mode 100644 index 02e7576..0000000 --- a/values/badhouseplants/values.openvpn.yaml +++ /dev/null @@ -1,45 +0,0 @@ -image: - repository: zot.badhouseplants.net/allanger/container-openvpn - # ------------------------------------------ - # -- Istio extenstion. Just because I'm - # -- not using ingress nginx - # ------------------------------------------ - # istio: -# enabled: true -# istio: -# - name: openvpn-tcp-xor -# gateway: istio-system/badhouseplants-vpn -# kind: tcp -# port_match: 1194 -# hostname: "*" -# service: openvpn-xor -# port: 1194 - -# ------------------------------------------ -traefik: - enabled: true - tcpRoutes: - - name: openvpn - service: openvpn - match: HostSNI(`*`) - entrypoint: openvpn - port: 1194 -tcproute: - enabled: false -storage: - size: 128Mi -openvpn: - proto: tcp - host: 195.201.249.91 -easyrsa: - cn: Bad Houseplants - country: Germany - province: NRW - city: Duesseldorf - org: Bad Houseplants - email: allanger@zohomail.com -service: - type: ClusterIP - port: 1194 - targetPort: 1194 - protocol: TCP diff --git a/values/badhouseplants/values.postgres.yaml b/values/badhouseplants/values.postgres.yaml deleted file mode 100644 index e93aee9..0000000 --- a/values/badhouseplants/values.postgres.yaml +++ /dev/null @@ -1,11 +0,0 @@ -architecture: standalone - -auth: - database: postgres - -primary: - persistence: - size: 1Gi - -metrics: - enabled: false diff --git a/values/badhouseplants/values.roles.yaml b/values/badhouseplants/values.roles.yaml deleted file mode 100644 index 16dbaee..0000000 --- a/values/badhouseplants/values.roles.yaml +++ /dev/null @@ -1,24 +0,0 @@ -roles: - - name: xray-admin - namespace: public-xray - kind: Role - rules: - - apiGroups: ["*"] - resources: ["*"] - verbs: ["*"] - namespace: ["public-xray"] -bindings: - - name: woodpecker-ci - namespace: pipelines - kind: ClusterRoleBinding - subjects: - - kind: ServiceAccount - namespace: pipelines - name: woodpecker-ci - roleRef: - kind: ClusterRole - name: cluster-admin - apiGroup: rbac.authorization.k8s.io -sa: - - name: woodpecker-ci - namespace: pipelines diff --git a/values/badhouseplants/values.server-xray.yaml b/values/badhouseplants/values.server-xray.yaml deleted file mode 100644 index a4a156d..0000000 --- a/values/badhouseplants/values.server-xray.yaml +++ /dev/null @@ -1,22 +0,0 @@ -traefik: - enabled: true - tcpRoutes: - - name: server-xray - service: server-xray-xray-https - match: HostSNI(`*`) - entrypoint: xray - port: 443 -shortcuts: - hostname: xray.badhouseplants.net -ingress: - main: - enabled: true - annotations: - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.class: traefik - kubernetes.io/ingress.global-static-ip-name: "" - kubernetes.io/tls-acme: "true" - meta.helm.sh/release-name: xray - meta.helm.sh/release-namespace: xray - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure diff --git a/values/badhouseplants/values.team-fortress-2.yaml b/values/badhouseplants/values.team-fortress-2.yaml deleted file mode 100644 index 038a469..0000000 --- a/values/badhouseplants/values.team-fortress-2.yaml +++ /dev/null @@ -1,40 +0,0 @@ -workload: - kind: Deployment - containers: - tf2: - mounts: - files: - maps: - mode: 420 - path: /home/steam/tf-dedicated/tf/cfg/pl_maps.txt - subPath: pl_maps.txt - motd: - mode: 420 - path: /home/steam/tf-dedicated/tf/cfg/motd.txt - subPath: motd.txt - -traefik: - enabled: true - tcpRoutes: - - name: team-fortress-2 - service: team-fortress-2-tf2-rcon - match: HostSNI(`*`) - entrypoint: tf2-rcon - port: 27015 - udpRoutes: - - name: team-fortress-2 - service: team-fortress-2-tf2 - match: HostSNI(`*`) - entrypoint: tf2-main - port: 27015 - -storage: - data: - size: 16G - -env: - environment: - sensitive: false - data: - SRCDS_STARTMAP: "pl_goldrush" - SRCDS_HOSTNAME: "I hate CS2" diff --git a/values/badhouseplants/values.vaultwarden.yaml b/values/badhouseplants/values.vaultwarden.yaml deleted file mode 100644 index d21888a..0000000 --- a/values/badhouseplants/values.vaultwarden.yaml +++ /dev/null @@ -1,68 +0,0 @@ -shortcuts: - hostname: vault.badhouseplants.net -ext-database: - enabled: true - name: vaultwarden-postgres16 - instance: postgres16 - credentials: - DATABASE_URL: "{{ .Protocol }}://{{ .Username }}:{{ .Password }}@{{ .Hostname }}:{{ .Port }}/{{ .Database }}" -workload: - kind: Deployment - strategy: - type: RollingUpdate - containers: - vaultwarden: - securityContext: {} - mounts: - storage: - data: - path: /app/data/ - envFrom: - - main - - secrets - - secretRef: - name: vaultwarden-postgres16-creds -ingress: - main: - class: traefik - annotations: - kubernetes.io/ingress.class: traefik - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 -storage: - data: - accessModes: - - ReadWriteOnce -env: - main: - enabled: true - sensitive: false - data: - DOMAIN: https://vault.badhouseplants.net - SMTP_HOST: stalwart.badhouseplants.net - SMTP_SECURITY: "starttls" - SMTP_PORT: 587 - SMTP_FROM: vault@badhouseplants.net - SMTP_FROM_NAME: Vault Warden - SMTP_AUTH_MECHANISM: "Plain" - SMTP_ACCEPT_INVALID_HOSTNAMES: "false" - SMTP_ACCEPT_INVALID_CERTS: "false" - SMTP_DEBUG: false - DATA_FOLDER: /app/data/ - ROCKET_PORT: 8080 - SHOW_PASSWORD_HINT: true - SIGNUPS_ALLOWED: false - INVITATIONS_ALLOWED: true - SIGNUPS_DOMAINS_WHITELIST: "*" - SIGNUPS_VERIFY: true - WEB_VAULT_ENABLED: true - LOG_FILE: /app/logs/log.txt - LOG_LEVEL: info - DB_CONNECTION_RETRIES: 10 - DATABASE_MAX_CONNS: 10 - ORG_GROUPS_ENABLED: true - ORG_EVENTS_ENABLED: true - ORG_CREATION_USERS: "" diff --git a/values/badhouseplants/values.woodpecker-ci-kube.yaml b/values/badhouseplants/values.woodpecker-ci-kube.yaml deleted file mode 100644 index 780f63e..0000000 --- a/values/badhouseplants/values.woodpecker-ci-kube.yaml +++ /dev/null @@ -1,16 +0,0 @@ -server: - enabled: false -agent: - enabled: true - extraSecretNamesForEnvFrom: [] - env: - WOODPECKER_SERVER: woodpecker-ci-server:9000 - WOODPECKER_BACKEND_K8S_VOLUME_SIZE: 2Gi - WOODPECKER_BACKEND_K8S_NAMESPACE: pipelines - WOODPECKER_BACKEND_K8S_STORAGE_CLASS: openebs-hostpath - WOODPECKER_FILTER_LABELS: purpose=kubernetes - serviceAccount: - create: true - rbac: - create: true - replicaCount: 1 diff --git a/values/badhouseplants/values.zot-mirror.yaml b/values/badhouseplants/values.zot-mirror.yaml deleted file mode 100644 index 6586b78..0000000 --- a/values/badhouseplants/values.zot-mirror.yaml +++ /dev/null @@ -1,160 +0,0 @@ -image: - repository: ghcr.io/project-zot/zot - tag: v2.1.3-rc4 -ingress: - enabled: true - className: traefik - annotations: - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - pathtype: Prefix - hosts: - - host: registry.badhouseplants.net - paths: - - path: / - tls: - - secretName: registry.badhouseplants.net - hosts: - - registry.badhouseplants.net -service: - type: ClusterIP -persistence: false -pvc: - create: true - lavels: - velero.io/exclude-from-backup: true -mountConfig: true -mountSecret: true -configFiles: - config.json: |- - { - "distSpecVersion": "1.1.1", - "storage": { - "dedupe": true, - "gc": true, - "rootDirectory": "/var/lib/registry", - "retention": { - "dryRun": false, - "delay": "24h", - "policies": [ - { - "repositories": [ - "**" - ], - "deleteReferrers": false, - "deleteUntagged": true, - "keepTags": [ - { - "mostRecentlyPulledCount": 2 - } - ] - } - ] - } - }, - "http": { - "address": "0.0.0.0", - "port": "5000", - "externalUrl": "https://registry.badhouseplants.net", - "auth": { - "htpasswd": { - "path": "/secret/htpasswd" - } - }, - "accessControl": { - "metrics": { - "users": [ - "admin" - ] - }, - "repositories": { - "**": { - "anonymousPolicy": [], - "policies": [ - { - "users": [ - "mirror_user", - "overlord" - ], - "actions": [ - "read", - "create", - "update", - "delete" - ] - } - ] - } - } - } - }, - "log": { - "level": "info" - }, - "extensions": { - "scrub": { - "enable": true - }, - "metrics": { - "enable": true, - "prometheus": { - "path": "/metrics" - } - }, - "mgmt": { - "enable": false - }, - "sync": { - "enable": true, - "registries": [ - { - "urls": [ - "https://docker.io/library", - "https://docker.io" - ], - "content": [ - { - "prefix": "**", - "destination": "/dockerhub" - } - ], - "onDemand": true, - "tlsVerify": true - }, - { - "urls": [ - "https://registry.k8s.io" - ], - "content": [ - { - "prefix": "**", - "destination": "/k8s" - } - ], - "onDemand": true, - "tlsVerify": true - }, - { - "urls": [ - "https://quay.io" - ], - "content": [ - { - "prefix": "**", - "destination": "/quay" - } - ], - "onDemand": true, - "tlsVerify": true - } - ] - } - } - } - -secretFiles: - htpasswd: |- - overlord:$2y$05$RhAeAsFY32y8h0japhT72.SQTPXgHc54RCp4CZ4Udsg2.iQxJVeZ. - mirror_user:$2y$05$PkvVMY04ZGvuGUXkrez7peyXevl63ugFbdxZ.ON1G/Tof/0Uf5vZi diff --git a/values/badhouseplants/values.zot.yaml b/values/badhouseplants/values.zot.yaml deleted file mode 100644 index 597514c..0000000 --- a/values/badhouseplants/values.zot.yaml +++ /dev/null @@ -1,27 +0,0 @@ -image: - repository: ghcr.io/project-zot/zot - tag: v2.1.3-rc4 -ingress: - enabled: true - className: traefik - annotations: - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - pathtype: Prefix - hosts: - - host: zot.badhouseplants.net - paths: - - path: / - tls: - - secretName: zot.badhouseplants.net - hosts: - - zot.badhouseplants.net -service: - type: ClusterIP -persistence: false -pvc: - create: false -mountConfig: true -mountSecret: true diff --git a/values/etersoft/values.memos.yaml b/values/etersoft/applications/memos/values.yaml similarity index 100% rename from values/etersoft/values.memos.yaml rename to values/etersoft/applications/memos/values.yaml diff --git a/values/etersoft/values.qbittorrent.yaml b/values/etersoft/applications/qbittorrent/values.yaml similarity index 100% rename from values/etersoft/values.qbittorrent.yaml rename to values/etersoft/applications/qbittorrent/values.yaml diff --git a/values/etersoft/secrets.vaultwardentest.yaml b/values/etersoft/applications/vaultwardentest/secrets.yaml similarity index 100% rename from values/etersoft/secrets.vaultwardentest.yaml rename to values/etersoft/applications/vaultwardentest/secrets.yaml diff --git a/values/etersoft/values.vaultwardentest.yaml b/values/etersoft/applications/vaultwardentest/values.yaml similarity index 100% rename from values/etersoft/values.vaultwardentest.yaml rename to values/etersoft/applications/vaultwardentest/values.yaml diff --git a/values/etersoft/secrets.server-xray-public.yaml b/values/etersoft/public-xray/server-xray-public/secrets.yaml similarity index 100% rename from values/etersoft/secrets.server-xray-public.yaml rename to values/etersoft/public-xray/server-xray-public/secrets.yaml diff --git a/values/etersoft/values.server-xray-public.yaml b/values/etersoft/public-xray/server-xray-public/values.yaml similarity index 100% rename from values/etersoft/values.server-xray-public.yaml rename to values/etersoft/public-xray/server-xray-public/values.yaml diff --git a/values/etersoft/values.xray-docs.yaml b/values/etersoft/public-xray/xray-docs/values.yaml similarity index 100% rename from values/etersoft/values.xray-docs.yaml rename to values/etersoft/public-xray/xray-docs/values.yaml diff --git a/values/etersoft/secrets.db-instances.yaml b/values/etersoft/secrets.db-instances.yaml deleted file mode 100644 index 0454abb..0000000 --- a/values/etersoft/secrets.db-instances.yaml +++ /dev/null @@ -1,25 +0,0 @@ -dbinstances: - postgres16: - secrets: - adminUser: ENC[AES256_GCM,data:rxSV97yqRDU=,iv:8gqGL14LDS2zKDlImdNPMYYX3J8epZvlytjOfuxSP2I=,tag:s95IsFyLj7oIy5Tm12oJZg==,type:str] - adminPassword: ENC[AES256_GCM,data:VgU22sobeBBdjxhth44Llugp,iv:Y2jTlURdgjc/rpydwu1YCEmZgVkRkuBytQmds2ZO3pk=,tag:Abxa+/m3a3L4xNwEFqqncw==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBubjJWVzg2ZitheWFhUlND - N05nYmlWUzdtVE4xT3NwMnVIbThLam1KQkRFCnA3a2FucS9sdFVHNnBUU285dGZz - dUZvT0xRZ1JLcnNTMVdrSnJBUkJzZW8KLS0tIHJoTlVYVmpjSDJob3RpOG45MEtx - NTBZb2pRNEM5TWJiRUkzWHRyVTdaUmcK9oYd7htT3Wt2HLUFGHQrBfiAfKUaFitr - UcBA/MXGcJt3Wq6Tw8ujNqQbDrftAd+sRWTO8rNqTGK02zXvkmu1sA== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-11-05T10:54:18Z" - mac: ENC[AES256_GCM,data:tvfGmnwG8nJ/1r0OZBjuU3jCSsC4V1DqjqriARti51RA4AsRFodyl1QMbLoaHgwzLLqbe6Xy62n1EU/icgmiEdEbpBZ7kEuyQ0Q9M0mkZgQVrvF126Tdd11ylswO9imSknaWmvnb0nwj0ZV1daOCqF3NCl+HaP0NiTlCy18aP74=,iv:OYvQDBhxTDEmfBWXtcAluGX9sYGVj8Ki3mZXPVvpYwk=,tag:M7VgUVQoxVC63kGJol6DUA==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/etersoft/secrets.external-dns.yaml b/values/etersoft/secrets.external-dns.yaml deleted file mode 100644 index a207d01..0000000 --- a/values/etersoft/secrets.external-dns.yaml +++ /dev/null @@ -1,23 +0,0 @@ -env: - - name: ENC[AES256_GCM,data:I+XVWWOUmm7Cd4mQ,iv:rfUzb5HMPVyNfzkCP2frVDxD+v4lTPzILRifcS3uG6s=,tag:1sXONdAjMZ85S8abMVZM1A==,type:str] - value: ENC[AES256_GCM,data:h8sYBvFfm7uFoklqXE7QLNkikl1ihHz/KN4uYiZlRJBZkiUBbTk/Vg==,iv:/y6RdHVWwwBym5HiBaxEatTWG7I/gNY9ZIaQc4bk9h0=,tag:PytkOjvY3fy6XeLNmGPrXA==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBra0RUWVFDUXN0ejAxemE2 - VFlRcEtLNDJUblA3ZmoyMExPWWpjZzlVYjJzCnZVZDNSbnpjcFRUQ0hOMWxLNUZi - RTg5Z2JVZzVoVFVYSVErcWdnbHVvVVkKLS0tIHdZMjVsc3lHRzlJODRWSEh0Wm8w - M09rOXZ3OHZVUUVlWWIwaTN0Z2RqRmcKe1ny6FJIFwR6Un0HBFZK2KXkzUQA63rU - JR7mpEzr2h2oXxOmyc7HeFFi2R66zendFzfhNcvSlm2L5td2Pnxyxg== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2025-02-16T14:21:42Z" - mac: ENC[AES256_GCM,data:SNHNvmPCt/6Xwd6xoCh5uHF1erhWpTfzEQ/krTvYtByvT7XvDtXjtslJqAa8RkNPl2QV34epWcj/Ff6xud9tvLdAR4Gj4MPJD8WBLUUFul4rvoXfaHyHhSanYmiOhdF0mArE81qsBY918LFS5fdWMrxCNDrHbDtW76KBoLcDUto=,iv:8/ZxjrER1151RGjSdICVjj8ptyQn60SInakqABXWQZE=,tag:/bQsE3TCXoMbXoAF1UErOw==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.4 diff --git a/values/etersoft/secrets.minio-self.yaml b/values/etersoft/secrets.minio-self.yaml deleted file mode 100644 index 9b2f350..0000000 --- a/values/etersoft/secrets.minio-self.yaml +++ /dev/null @@ -1,38 +0,0 @@ -rootPassword: ENC[AES256_GCM,data:4rs7judCzIEqSRfGi8HLmzVftOinmHRAGA==,iv:t6bRBgKOQ+kGn9v0tixllqyeyEWuQTzBMLq36rixY8o=,tag:SZuW/gvFFI+nn/vtKSmc0w==,type:str] -users: - - accessKey: ENC[AES256_GCM,data:wJ+sB2Jlt84=,iv:lrhvu5BfIRl6kmmVp/SzDHkS7KlZ/bB8Al5hKUOzmNY=,tag:XuC2cM6Twl/KaOPbEphgWw==,type:str] - secretKey: ENC[AES256_GCM,data:n5SSGB1AhxZm2uOrdW5kVLbUid8sACwyQw==,iv:hrMcDAWiXz14Q6Wf+bnxxJxFLL1QJBEr0JjWqTPBLN0=,tag:vekhUJFpIv4QmXFTuupOOA==,type:str] - policy: ENC[AES256_GCM,data:javfx3iMs44=,iv:naNJLTEs62JDgUgKWSRcCclsslJZkiazyJ0iyhTO3cM=,tag:7yOHyC0BfV/41zWDd0m4sg==,type:str] - - accessKey: ENC[AES256_GCM,data:oRP+H3vA,iv:N6XQ34NYrCfFci5dw6nQroc/tqByz4ilnQCDh4ZKL5A=,tag:2UFZDLdjBUN0HqRLXh87lw==,type:str] - secretKey: ENC[AES256_GCM,data:LPzli0O0ePL2vghWNsf07P41G3+aXUdBUQ==,iv:vu/TI1jU9/m30DegKxUAaObUq9FyB1IXUB1vqL5kKoI=,tag:1Ar6MNR5pTCzeBlH7yl2hQ==,type:str] - policy: ENC[AES256_GCM,data:gj1EGs4L,iv:N9J+yXcG3fLyg7dPlICi7tdTk6OPLpVpC0IFprfbGaM=,tag:65lRXTg0R76y23QXNLD5pA==,type:str] -oidc: - enabled: ENC[AES256_GCM,data:ar/fBw==,iv:rs1ESCu8noZhU5nKkU6HS+qysYGQfFXo96uliAY+9xw=,tag:MvgSVLelQSlk1Swx47+s6g==,type:bool] - configUrl: ENC[AES256_GCM,data:195i1omIYscB5Qo+p+S0LBEI0CAHMaVz8smR7c4l57Yw05R4GfBJR16DswMgoF8FC+UFBlp46/WFYA5f1CZIlaVFipqBTYeEflDGQ59IJWVUo9Apw06Hfw43HrLC7POQL3w=,iv:x9WmZvzI3Gkf+2BMdIVkL/UxK6hIHJPVgOOVyDoPQHk=,tag:euHGWXq5PNLj55XuU3amGQ==,type:str] - clientId: ENC[AES256_GCM,data:DGIVa81hjIMmotzffms=,iv:mtuMKY07CKQD7GMyKJkUs3sQdbwnXCm3n78cfyxIvIY=,tag:sRQJXhOY4LPTry6TMtoqcg==,type:str] - clientSecret: ENC[AES256_GCM,data:HaRln7Az/+lP/01RFtlTCLSReAQ2OYxRlmQ3LSi9r1tVWZD501RaCif9/68BIOnhGUFGbZPobbRWOfQDULycXHdqK5nms5S0YOFNOwxUCPkttlljZ3fyw157lmFGUrivzMjWpIp5clqoWtIWE71q3UDJ95FoOBjG0HRtFoDo4d4=,iv:73/N0JSCwLd//HHOIjuPkHCY5lKtEuRahx93lG8Bipo=,tag:Tltx2XXeJYGQczCvb7rqBA==,type:str] - claimName: ENC[AES256_GCM,data:AnMUWTj8,iv:6tV4XKIT+utrSIbUVGHJVXjPI/i9mJrzki2zC4n+4Dc=,tag:iHnClGYFTHpUry/x/wZuTg==,type:str] - redirectUri: ENC[AES256_GCM,data:F30Q9PQvXb+bmkNib2/END1/E/my3kOo8RTvoN+/OJMCz/nDRR6lgoA3LYHXh88=,iv:47dIKSJW/5xQdmASUiPOfHo7193LfAQ/R/F+saAzSWg=,tag:SLREgi2vBl5mvh0J1K3nCw==,type:str] - comment: ENC[AES256_GCM,data:t/1OqmIDiudE536CpZUYIgIq9gI=,iv:uwzrEwQUO+eVpCTYYXHjfdnJmKm/mEwre7zTtbwO0Q0=,tag:J/vmOjueOqdUq8Kuq5Ke6Q==,type:str] - claimPrefix: "" - scopes: ENC[AES256_GCM,data:wqLHN7dmjg4Tly8wOIm/3zZyzx1Mw3NLNqpl,iv:p1iC127avWNcGV8Qj9WLFeAZTrZokF467nAqSwEe43k=,tag:SilNPiK+t2xvgvuTfQwhFQ==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA1cWJpMDFLTHZlTlZPMW8r - ZFpqM3VnM3dQeThqb1pOdHlVbHkyeVo1ZlFvCmhDV01rZklMME12NVl4YmthWEd4 - RndOYkgwSkwwaGhMNE1NZVFxaWZnbXcKLS0tIENqa0RwR3B1MEk0cjJhbkIxdW1W - bFRMQm9QOFRQaFVpaFpqMmdjRTAvODAKhhEOX3d51JWmAYMZdT2LZpkLkuCOcpEz - 8sfofHVU+5gCOTZj6fTvIm0wvnVC7lmTaRkZBEKnuPavjTDfXKluGQ== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2025-02-01T18:57:37Z" - mac: ENC[AES256_GCM,data:JzgKhfxs3QI6um/3xFlik6B7vgWAcIoswucE0j6h4Z7smHgP+FuuJxXEeqJQaAhSGEQnm7XhJRoJ3HfIaPK87D8cU8g0GeOOQMF2ZZL5gQ3YxWDsI5g9HayoCYqRQHd6uq4x6zGKQ+zodnHBBQnujnDWwOykfyANav6eloW5tnI=,iv:jkxc313m9KCoUjdHfUqpwLzFJe6bmSlM4kGdqEsUbMw=,tag:SDEnSkv8jB/RfUGj4zX+4w==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.4 diff --git a/values/etersoft/secrets.minio.yaml b/values/etersoft/secrets.minio.yaml deleted file mode 100644 index 4dbffdc..0000000 --- a/values/etersoft/secrets.minio.yaml +++ /dev/null @@ -1,38 +0,0 @@ -rootPassword: ENC[AES256_GCM,data:kxg0YirkjeeTaKueH1G4RijoLjLGxHJP2w==,iv:FM83CGAl7E/xEh9k+GPy/z5apxlAb6/HEhznGcUcu64=,tag:Obw7iPuQltcaWwjZfAh7xQ==,type:str] -users: - - accessKey: ENC[AES256_GCM,data:h01uNoYYTNs=,iv:YkdniZm4pFzcEa+MfXazBClz6RrnYjzAh+3IbnVE0nQ=,tag:SFZ8HnM8N99CNLvEnWBXqA==,type:str] - secretKey: ENC[AES256_GCM,data:sr33gCJYEd2k7bbZNHKVgvOmUN235YJoUg==,iv:hGFkM9cS0cv+GOWpxn1YPjDJBqSZl3RHRrUM9TQt0A0=,tag:Uu7ItlGDxayQhG9vmSNp/Q==,type:str] - policy: ENC[AES256_GCM,data:QPL12F5ZWVI=,iv:wXBHgWlI6kFvGH6rp5pLEEcT7S2i58K3Pwa4D4407ks=,tag:JckGYguaJfvHK/sgSuKICQ==,type:str] - - accessKey: ENC[AES256_GCM,data:oJrvlRNB,iv:RTYdPqj5Q77NvJIUsRw7PA/7yhZ1YzjRWCYfvshXoCU=,tag:5gtdnE9cIUvZWWpQsO+2oA==,type:str] - secretKey: ENC[AES256_GCM,data:nZGlehkE2OhNjXLZk/4syI/xKRGmRmzltw==,iv:24Q/OVU2Rtz5ZmUcgJ6ZsOfXv97PXHL9456C5ccsVAA=,tag:xbU/qLleiUwUBzB1dU6/Ew==,type:str] - policy: ENC[AES256_GCM,data:eC7ZPjG/,iv:cEbFEZygJ7ntGA174A3p/RXhjK1QFVY1ldLiZFsaJ8M=,tag:cknvoIX5NONoni1mInssgg==,type:str] -oidc: - enabled: ENC[AES256_GCM,data:ZzHQSw==,iv:pAM6Sg5FOqk3OevwXxNz6+HoA+S9JKn3qXKBrvtQOjw=,tag:jIjUzOpsDTrmWXnVQZvOLQ==,type:bool] - configUrl: ENC[AES256_GCM,data:wM3MMDLR0hD0moLuOJbVV0FXEAcRpGQCiWZHIRfaer5WzSAnQH/8/PVkOnFy16uzsAf1IFbQIOjaXDw1alv3WxczIKpfXiR8mfNI013fCs+tURdOPCSdziQf9G1+sar9/Fs=,iv:95nxS+kP5Ml3WWbN6kGQxH0E/hLDUMp664OrQVZhH80=,tag:0PvfH+J9SQGwBJ/Kh7zgCA==,type:str] - clientId: ENC[AES256_GCM,data:UlETcj+fUPFDh2thR2Q=,iv:EF5QHrfstIqT5MYvrkQkUtcquG9SIsruYKSaR9adz5E=,tag:/yYOxzIIgoCRqsFSHyQanw==,type:str] - clientSecret: ENC[AES256_GCM,data:elh+rgMPMxJ3Tf+ufv4FBVQRBY+HeWbaSz4Mjx+CQIGzVBYDw2TaImgZbdIN7X+tVRdKjBUad7Bd4VUZoZt8kIacT4usJRQC9qErhMjnuT+OGzq6mSpXMztAzbGpL76L44S893sRkUkVwDpA6p4vqPSe5vMiaXZZAANIrhIDcRo=,iv:FIr6pRpJ3FlRchQs2Hg25bJu4HFYSy9HFiDhOPDPang=,tag:0pWGuHVwrlm11SqFKYj5ag==,type:str] - claimName: ENC[AES256_GCM,data:EOYQcSX7,iv:7ELctRaFlUmE/I9ExsLjMSCOrwLyTrJt5RQeDMqcZXI=,tag:CAEcRcWu0jkHxIdWFwoQvA==,type:str] - redirectUri: ENC[AES256_GCM,data:ek2cRHXtOCy9yNRrCyW6GFULz9ql7vzFIYc/7OBBlqQZmzMVEiNJ0B8Wej5TELIJ+do=,iv:IMr3J6Vcs7mT+agAcwaV8av7PUuOtvCdvLOOIKYwN2U=,tag:hLgtwpqtgsyoIF574C8UYA==,type:str] - comment: ENC[AES256_GCM,data:io98WZF69zRwoaDz1WXgb3gJ+Ac=,iv:Uw3p8734k25N+GZhQQ225Ye5mJInR4LcJ9LPcppEsgY=,tag:hvx6FxcwajTmC4gQGErWmQ==,type:str] - claimPrefix: "" - scopes: ENC[AES256_GCM,data:mK8Vczvi5SSVPW6k9pLx2aOaXUdfujXE1G77,iv:M8TxsGfsnvdRyBo94JitBnx366MuRY5Q6vLNmCs0hp8=,tag:YaobqJvS7u6B9x0MN5VMzA==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBFYlFwMzFCaG8wbk5ZcDI4 - OU93MVNoZGNyL0h0WFhRM254eDF6Y2FkZjMwClJEcHNZcFVlaTB4eDlsMm5QaEYy - NE0rd3EzUytaVEc5Y3I0MUpJWnI1NkUKLS0tIHBlS1dKMG9kcXpJSHMzbDhXcGJx - OXIvTU1uSVFXenF5QU82VHFta3ZmS0UK86P5geFl4PEMgKqBW2AlQfyTjT84TRfE - NjjFcpeFsUa3GoSm+NHxjzXbEEWkQsVsLWqS48IAPhOiICyWPwiznA== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2025-02-20T16:42:14Z" - mac: ENC[AES256_GCM,data:DyBFmjgWcRCkEEpuDUL2M4w6DcJ+YiVaUZcCuHReTKZRuE0BcYn8TCKYqaILKM4B0ClLK4aYH194ZNysEMDoAVDnLaTWPa3as8dW8mwpeaPmV80CbnKsRLMajwWJi7T8LBYrHaSSZx8eCRHvXFaB3u8B7t31vmzwutlpu5BKQqc=,iv:RzcPzF0rrSVZNSuG/Juv/gFtSdPqgImU+jO0Z3oQVzQ=,tag:KkEecRrbBDImiTBhn4T0pQ==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.4 diff --git a/values/etersoft/secrets.nrodionov.yaml b/values/etersoft/secrets.nrodionov.yaml deleted file mode 100644 index 0c2349a..0000000 --- a/values/etersoft/secrets.nrodionov.yaml +++ /dev/null @@ -1,26 +0,0 @@ -wordpressPassword: ENC[AES256_GCM,data:gcJ3cydOr0yTA/LbD6ecBn5cPzqceyGxvvQH/W4K,iv:rBoZO+SfjZlL0I0J3s9vWeg4LZd5M8O8INtODtFGHYM=,tag:xqpU75vR+U93UsFc4Qpuyg==,type:str] -wordpressEmail: ENC[AES256_GCM,data:dO1PeBajNORU6K3JeRvg/EQufCtbviYVhhZR,iv:nyvjhPcikx9EBRfofw525PIK9Kgp2tFWiHS711YtAT4=,tag:9hajAZ6VPJvg8VX+kv+P/A==,type:str] -mariadb: - auth: - rootPassword: ENC[AES256_GCM,data:eb9XO3OtvYsD8kgirYMhLQZIVOc1N9stv0P84Z7e,iv:6gymI9CWLmNOfpB0e9ZyjV5mXenwYdhHqV2MrHEGr3Q=,tag:3MSws+HfC1inlYk4rKOdGA==,type:str] - password: ENC[AES256_GCM,data:KLwfn3vmMcysP4xA2KYSHXnw3Rq7ptqmrA7TRCCN,iv:gjFaO3TJwGhIh3tKH0WbZHaT4FKDMbU8rNF2hLg2If8=,tag:dMNOks45rnK3x+pwYnCn6A==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBZcmVNaGF1eWtQWEZ4QnE1 - eWN1aTBZamR4NHRjMlBjQi9DSnF6YTVaT2c0CkxMRGVNbGI0K1crMitUTkxHeGlz - K282Rk9wendTZGYrZTVqWDl2d0F0TVEKLS0tIDhYMFZGaWFkQ255M2d1OHNuNGJ3 - anVBYy9lc2ZFQURTeHdIdS9Gd3gvblEKevHz9jiGV2gEMdR5qaFQqDaufIY1Ue5j - ihj+iVufhdX28NoHGn7dNa8ffqsHC0eNWmkTfICrjMjJyZdpkthZsw== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-11-16T19:02:14Z" - mac: ENC[AES256_GCM,data:AIzxbuL/cmtwyAOKMZ6WaNtNW9tTFZ5TgqqNQat+4aahbhybFvGawKpchKqHaW5aqnwnKj+9wRo+STHGeDp58F/Y+aMvTQAloRt1X3nFtWJpmJmBI61hDl4EnU3r+vBTC7j/+9einH3WaRwntHLnF7NfeF7G8BFqvfYoHN0UFtM=,iv:LChRlRifjAW8ZPCtsgERmklZIh1hBYTwghv6JRi2l/o=,tag:+znn7DO+JaXe1+FXN637Kw==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/etersoft/secrets.postgres16.yaml b/values/etersoft/secrets.postgres16.yaml deleted file mode 100644 index e1f8bbe..0000000 --- a/values/etersoft/secrets.postgres16.yaml +++ /dev/null @@ -1,24 +0,0 @@ -global: - postgresql: - auth: - postgresPassword: ENC[AES256_GCM,data:4RQkD5bHyjMQjofzrmB3V45q,iv:JlD23SAhnU5Q+0xl3TAdOdkXJPTG+Awx7qRe8cH1HFo=,tag:KSnUQi0U2ydpigAgoZxFsg==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBJR1hzTUV3TzRFaHNTN3Fj - Tkh0TW1VNng0WkZNdXdsOVozMDZ5T25uQmgwCkhSWXViUkNsZnExV0c5UXFsd2R4 - ZjNYYUFDbnpYYkRQbHdQUDA3cHBxa28KLS0tIFR4MGVWK2o1TFZlQ1FRbkIza3F6 - UWc5NzVMVkQ4UDNlSzRidWNzSnFWWkkKfnTaKxZoBFCj2l4QfI/BvG0eGOFX/seF - DcpofYlg0hQFRSavqRjidLri1rzpOCdKlWh/h0nIRDFA7O55Q8QAnQ== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-11-05T10:53:47Z" - mac: ENC[AES256_GCM,data:ugdm5oICFj1nZtkUNdfamjuGjMOz8bWTKIsaOND31alQsTuvnHNT/GrVIKkiAwgXbP71nH8ecmv3Ossq/tt8OxpG5Hu5v3s1Dgl8fXNCRt8cR0INGJyeDYc9l1WDugNkNRhRV96udmDJewompcIxqPYECwfZHXYiWA7HMyIdlDk=,iv:1PgLX53dbD4JfpLnszMgH/pQBXvUimgJYZsw3leerBo=,tag:O5KBMenIG7/J5o+kiU/mGg==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/etersoft/secrets.server-xray-public-bridge.yaml b/values/etersoft/secrets.server-xray-public-bridge.yaml deleted file mode 100644 index 3df4b43..0000000 --- a/values/etersoft/secrets.server-xray-public-bridge.yaml +++ /dev/null @@ -1,34 +0,0 @@ -files: - config: - enabled: ENC[AES256_GCM,data:drdZww==,iv:jh5+vrgWBJmhDlj5lr4n1ToMKx3+bMZKVAfryIcW/K8=,tag:tsk6G93ipjSclrGbuLF4hA==,type:bool] - sensitive: ENC[AES256_GCM,data:S00eT44=,iv:/dJPVWEb7IzoqnThBwou+tDcrIsqS6IIJ3DAnSvY9vE=,tag:I4ZjRcZ/lYcnxdR2ljfoJw==,type:bool] - remove: [] - entries: - config.json: - data: ENC[AES256_GCM,data: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,iv:MQALOg44Y3NJ7KWo5DRatApVE3wT2XY+PCszU2E5hJ4=,tag:2TtUCfHw73vVH65SeYwirw==,type:str] - config.json.bak: - data: ENC[AES256_GCM,data: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,iv:SRxWqsV6hMiH5JDmgIoSQOu8OthJ8RrdM3IvWdFX0/I=,tag:Mh7g+PkFvJbXZt420lfkGw==,type:str] -sops: - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBTb0NuSjlzdnk0djRVanFG - UC81eHljcmxHNUVUM0RyQytoYVlXaUFCd2lZCmpjVURRNlhIMWhJci9Hd3k4cVY1 - UVUvelZ5eHZ6N2I4cjErMWVrRnBndXMKLS0tIHR6SGpwNytuR0VhNzRGaDFDV3pL - Tkx3L2lROXJTbmNBNXcxUk1wZGRBUG8K+i3ZAW//m3RoKcjgdvV/ffJrbJOYinNl - Qhi0uLpKNpCnsc6+HmQB6c31mwT+uKHITsV791Z1E7Ger0db+I9GOw== - -----END AGE ENCRYPTED FILE----- - - recipient: age17fyzv5mezck364lvyepp9pa3tnjn7jvsgcpykhhz2smnxyq6fdusvl7waf - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBSUm9abk96TjNiVkdWbER0 - b3VNUlFseEgxN0YwWk1kVkFxVjdPUWdYWW5VCjNiRzNPa0FHV2ZhODJvUXdmME91 - NnNrVktuNDgyKzh4K3dhWCtKTFVhV0kKLS0tIE4xWVlkanZVTmJLdnZCYkdzWXpH - OC9uS3c1TzZob1g1M3cya25jaVZzRVUKSSLxzw+E4a4611CPNGcYxxea05HTxSso - 2N0zjiUNwY2XHu5xPsmxboo0w26rmWBi8r8lwsB4MABAmG9FeDb3cw== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2025-04-06T18:33:31Z" - mac: ENC[AES256_GCM,data:ScTs08HdqBA4esJ4SNRg+JGSTtuN2z2uy1wq235wzXPt+ECFbbRBHPyQekznSqV/nSdnxcgfBnl6JzGuh/TZH4jboa48mpWMfeeLw+KgWqNw14mEXg8VAujEkfpvgPdbzxgPJ/3o94qxLgqRl3+DAiyLd+ugq8tZwHanej55ves=,iv:EddNoMF1IXgUizWP1YulXuPqYImAlRFIajGE8jmmQyc=,tag:Z2Q527nYBfkbbh3H6F1J3w==,type:str] - unencrypted_suffix: _unencrypted - version: 3.10.1 diff --git a/values/etersoft/secrets.tf-ocloud.yaml b/values/etersoft/secrets.tf-ocloud.yaml deleted file mode 100644 index 0be9235..0000000 --- a/values/etersoft/secrets.tf-ocloud.yaml +++ /dev/null @@ -1,44 +0,0 @@ -env: - main: - enabled: ENC[AES256_GCM,data:VwkiWw==,iv:OPPJaoVzQ4Y8/UbBMWu8tYjRnMRH/15syfTe34tb1mA=,tag:U9RM/c79pbeprPsyUd9HKA==,type:bool] - sensitive: ENC[AES256_GCM,data:eeE37Q==,iv:IsqWwo9L/kgexztNWZ/wSf9pNXtuW/btsPuCfSWyr4A=,tag:uXjfuFT0yJPtOGBX/Ab6DA==,type:bool] - data: - AWS_ACCESS_KEY_ID: ENC[AES256_GCM,data:MziPbSmnpuWH,iv:+IJXuvmNvWjs/hHNTQXWhrpj7LVx7asvKJXoAyI+YBA=,tag:er8nqrsd1hZPledJzVYicg==,type:str] - AWS_SECRET_ACCESS_KEY: ENC[AES256_GCM,data:GDKniDmhYc/Nm7I4Ts4V+DGyZ4d1KURwPg==,iv:JNRm3EsEKPas6xJx94LUaPg+6EEv0xYZxLE6krqxLXU=,tag:wzp5Szzrv4IT3HZTnadycg==,type:str] -files: - ocloudkey: - entries: - key.pem: - data: ENC[AES256_GCM,data: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,iv:cXgBPtQhbhx5GlC5dr5jTKjmjsnYPUNou/89WMZLQWg=,tag:YVCvICRqp3fq5q+cr3r7/A==,type:str] - publickey: - entries: - public-key: - data: ENC[AES256_GCM,data:BN2vLLzL4qVhLHrHjMAz3XZnumftvIIWow5TLnyss8QQrkemdOCyyVJ7mWqAdnFhs52t0b3wSN8qj+SQ+ALieYE3hZYZEDXcEMI3nMIOAI80fxaBEsSTPtMK9idBPN1UQ5gYrlhg,iv:KBospErD3mvdlz5gRSSSfs2kA+QXNbDw7WlNT5P5tXM=,tag:rXmw9Aqrjnxi68ftb3CthQ==,type:str] - privatekey: - entries: - ssh-key: - data: ENC[AES256_GCM,data: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,iv:z5gTaOEBz+6iQRwbQSnKD4MO0OkOks3xZ56Ok7AP1pg=,tag:vHr+q9t0s2ZNqh+CN4azCg==,type:str] - tfvars: - entries: - terraform.tfvars: - data: ENC[AES256_GCM,data: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,iv:od/aU8SKCfZB7wRcQ+pIH3hLIFS9peMGeIOk4vLErI4=,tag:gTm7JS6sgK440dImagT9xw==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAzWDZYeCtRQ3pEZHVrdnU4 - cjBsSnNNTUhRQnAzekFVY1cycmVEMXZnMlZVClZ0dEdRazVxRGVaTWR3TlBWUlJv - eTUxTkpKSjN5V2RyMklUa2dWNlZPbmMKLS0tIDNkZGlBVVJQZlBPR0hQRElsV2t1 - QlAwZGFKNFN3dDRDYUlxaldQTEN1UEUKj/8BcTvOmpu+/FSGtDI9vEPzAX1OG9nY - L5Lq66OoH8e9GG/iye21PrIXbpDWNF/p4jQDMlDtMY8YefNbaoeevQ== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2024-10-16T17:23:51Z" - mac: ENC[AES256_GCM,data:TEOv6k9fgpXvUxniF8FLbuRHnLP5JAyMEUghaIOYfPqmyvxcxFBItlNLmancFkT/cYmqrSqKJzJkefXxebaLzbUf3DbXyu8jlTjMwnzZWfwpJqPHdkcrxneJJhpPWBgD0lQlnN5XK9OvRe3mApwHYimNksZd9JPi05TXzWOyfng=,iv:AXLBegPqI/4wsfaYSWO6aGxR1zZeBb4RylE9N1L4zIg=,tag:W0w0QSjHBRfjWOZU2qex+w==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.1 diff --git a/values/etersoft/secrets.zot-mirror.yaml b/values/etersoft/secrets.zot-mirror.yaml deleted file mode 100644 index ff88a50..0000000 --- a/values/etersoft/secrets.zot-mirror.yaml +++ /dev/null @@ -1,22 +0,0 @@ -authHeader: ENC[AES256_GCM,data:nmlP0vRoKJRivvwJArnEO26sqIwFtnK5MYVPJBBCmAGCPpe/U00gYu6JET0gPqGV,iv:+GZwWrxoWw0mAZxZdITBLtHgRKYIyaj/NQwHbD8KppA=,tag:MAer3FiaBxyNwJr0BbDtow==,type:str] -_mirror_password: ENC[AES256_GCM,data:W2xy2RMmD4d6N+DNceIgtDGUpygOGEbWgGa9Icsy,iv:YsQfm/EmBYY35q2irlZ2rmzkbJzlFnfgMSEKq0G1I5o=,tag:7rNG02Wm9g8GUXeM4nTHqA==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age1vzkv97n2p7gfkw8dyx8ctz2kumattz89th2jq47zyjyrarmnssysdkw9v8 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBPVUlyVFZWcWFuWnEyS2Nv - Tkx6aTZKY1czQ25RTHhKNWNNQ0xIaWJLb1VFCkdoT0RBTW9EWG8zbzYxekdsUEY2 - bE9nQUthV3NCa0kzRnBwZ2U2MWlVNzAKLS0tIFY4RVJDM05ZVmR3NEt5YUlpOWZa - ZVc1bmJnU1o4U3NGaGN0Sk90YTR0ckkK8gmkHty4Gwt4vuVK3xhWWg4h/EgvJULh - Trgn0lzx2pCThg/+82u5J1T/QLXdbbDFFFwGldiMwNjZQfpOmrZpVw== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2025-03-26T21:04:45Z" - mac: ENC[AES256_GCM,data:cTN6wq1m1XtsfNujCfQ4nKtX1Pkc8MFCipUeScDLJUuZZwg4St0h1OkYtYJBWeVSt3CSjjexQpb7Oi9K8wukboIVevaIj0BTT1hkf2ZUFeIV8W62mtftfdRex0yJ/4h1gTZaYBhHEw+qD6r+XvavDs1m22FF5RuF+5qfGUEWA4I=,iv:RsVuXbLVfZSJ7AkIvEdf7H2auFTiqXgpXLe/LbATAo8=,tag:1V5eIiJzjzv4C1JNNf5Quw==,type:str] - pgp: [] - unencrypted_suffix: _unencrypted - version: 3.9.4 diff --git a/values/etersoft/values.cert-manager.yaml b/values/etersoft/values.cert-manager.yaml deleted file mode 100644 index 6ca8f3c..0000000 --- a/values/etersoft/values.cert-manager.yaml +++ /dev/null @@ -1,22 +0,0 @@ -crds: - enabled: true -resources: - requests: - cpu: 30m - memory: 100Mi - limits: - memory: 100Mi -cainjector: - resources: - requests: - cpu: 20m - memory: 150Mi - limits: - memory: 150Mi -webhook: - resources: - requests: - cpu: 50m - memory: 150Mi - limits: - memory: 150Mi diff --git a/values/etersoft/values.cilium.yaml b/values/etersoft/values.cilium.yaml deleted file mode 100644 index 00ab2c7..0000000 --- a/values/etersoft/values.cilium.yaml +++ /dev/null @@ -1,8 +0,0 @@ -operator: - replicas: 1 -endpointRoutes: - enabled: true -ipam: - ciliumNodeUpdateRate: "15s" - operator: - clusterPoolIPv4PodCIDRList: ["192.168.0.0/16"] diff --git a/values/etersoft/values.coredns.yaml b/values/etersoft/values.coredns.yaml deleted file mode 100644 index 04d2b02..0000000 --- a/values/etersoft/values.coredns.yaml +++ /dev/null @@ -1,32 +0,0 @@ -service: - clusterIP: 10.43.0.10 - -servers: - - zones: - - zone: . - port: 53 - plugins: - - name: errors - # Serves a /health endpoint on :8080, required for livenessProbe - - name: health - configBlock: |- - lameduck 5s - # Serves a /ready endpoint on :8181, required for readinessProbe - - name: ready - # Required to query kubernetes API for data - - name: kubernetes - parameters: cluster.local in-addr.arpa ip6.arpa - configBlock: |- - pods insecure - fallthrough in-addr.arpa ip6.arpa - ttl 30 - # Serves a /metrics endpoint on :9153, required for serviceMonitor - - name: prometheus - parameters: 0.0.0.0:9153 - - name: forward - parameters: . 1.1.1.1 1.0.0.1 - - name: cache - parameters: 30 - - name: loop - - name: reload - - name: loadbalance diff --git a/values/etersoft/values.db-instances.yaml b/values/etersoft/values.db-instances.yaml deleted file mode 100644 index 143523d..0000000 --- a/values/etersoft/values.db-instances.yaml +++ /dev/null @@ -1,11 +0,0 @@ -dbinstances: - postgres16: - monitoring: - enabled: false - adminSecretRef: - Name: postgres16-secret - Namespace: databases - engine: postgres - generic: - host: postgres16-postgresql.databases.svc.cluster.local - port: 5432 diff --git a/values/etersoft/values.external-dns.yaml b/values/etersoft/values.external-dns.yaml deleted file mode 100644 index e20711b..0000000 --- a/values/etersoft/values.external-dns.yaml +++ /dev/null @@ -1,13 +0,0 @@ -provider: - name: cloudflare -domainFilters: - - badhouseplants.net -policy: sync -txtOwnerId: eter -txtPrefix: eter-ext-dns- -logFormat: json -logLevel: info -sources: - - service - - ingress - - crd diff --git a/values/etersoft/values.metallb-resources.yaml b/values/etersoft/values.metallb-resources.yaml deleted file mode 100644 index 5c77cf7..0000000 --- a/values/etersoft/values.metallb-resources.yaml +++ /dev/null @@ -1,5 +0,0 @@ -metallb: - enabled: true - ippools: - - name: etersoft - addresses: 91.232.225.63-91.232.225.63 diff --git a/values/etersoft/values.metallb.yaml b/values/etersoft/values.metallb.yaml deleted file mode 100644 index be5fae1..0000000 --- a/values/etersoft/values.metallb.yaml +++ /dev/null @@ -1,71 +0,0 @@ -controller: - enabled: true - logLevel: warn - image: - repository: quay.io/metallb/controller - tag: - pullPolicy: - strategy: - type: RollingUpdate - securityContext: - runAsNonRoot: true - # nobody - runAsUser: 65534 - fsGroup: 65534 - resources: - requests: - cpu: 20m - memory: 100Mi - limits: - memory: 100Mi - livenessProbe: - enabled: true - failureThreshold: 3 - initialDelaySeconds: 10 - periodSeconds: 10 - successThreshold: 1 - timeoutSeconds: 3 - readinessProbe: - enabled: true - failureThreshold: 3 - initialDelaySeconds: 10 - periodSeconds: 10 - successThreshold: 1 - timeoutSeconds: 3 - -speaker: - enabled: true - logLevel: warn - tolerateMaster: true - image: - repository: quay.io/metallb/speaker - tag: - pullPolicy: - securityContext: {} - resources: - requests: - cpu: 100m - memory: 250Mi - limits: - memory: 250Mi - livenessProbe: - enabled: true - failureThreshold: 3 - initialDelaySeconds: 10 - periodSeconds: 10 - successThreshold: 1 - timeoutSeconds: 3 - readinessProbe: - enabled: true - failureThreshold: 3 - initialDelaySeconds: 10 - periodSeconds: 10 - successThreshold: 1 - timeoutSeconds: 3 - startupProbe: - enabled: true - failureThreshold: 30 - periodSeconds: 5 -crds: - enabled: true - validationFailurePolicy: Fail diff --git a/values/etersoft/values.minio-self.yaml b/values/etersoft/values.minio-self.yaml deleted file mode 100644 index e6657f5..0000000 --- a/values/etersoft/values.minio-self.yaml +++ /dev/null @@ -1,119 +0,0 @@ -ingress: - enabled: true - ingressClassName: traefik - annotations: - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/issuer: my-ca-issuer - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - path: / - hosts: - - s3eself.badhouseplants.net - tls: - - secretName: s3eself.badhouseplants.net - hosts: - - s3eself.badhouseplants.net -consoleIngress: - enabled: true - ingressClassName: traefik - annotations: - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/issuer: my-ca-issuer - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - path: / - hosts: - - min.self.badhouseplants.net - tls: - - secretName: min.self.badhouseplants.net - hosts: - - min.eself.badhouseplants.net -rootUser: "overlord" -replicas: 1 -mode: standalone -environment: - MINIO_SERVER_URL: "https://s3eself.badhouseplants.net" -tls: - enabled: false - certSecret: "" - publicCrt: public.crt - privateKey: private.key -persistence: - annotations: - volume.kubernetes.io/selected-node: yekaterinburg - storageClass: local-path - enabled: true - accessMode: ReadWriteOnce - size: 60Gi -service: - type: ClusterIP - clusterIP: ~ - port: "9000" -consoleService: - type: ClusterIP - clusterIP: ~ - port: "9001" -resources: - requests: - memory: 2Gi -buckets: - - name: velero - policy: none - purge: false - versioning: false - - name: xray-public - policy: download - purge: false - versioning: false -metrics: - serviceMonitor: - enabled: false - public: true - additionalLabels: {} -policies: - - name: allanger - statements: - - resources: - - "arn:aws:s3:::*" - actions: - - "s3:*" - - resources: [] - actions: - - "admin:*" - - resources: [] - actions: - - "kms:*" - - name: velero - statements: - - resources: - - "arn:aws:s3:::velero" - actions: - - "s3:*" - - resources: - - "arn:aws:s3:::velero/*" - actions: - - "s3:*" - - name: Admins - statements: - - resources: - - "arn:aws:s3:::*" - actions: - - "s3:*" - - resources: [] - actions: - - "admin:*" - - resources: [] - actions: - - "kms:*" - - name: DevOps - statements: - - resources: - - "arn:aws:s3:::badhouseplants-net" - actions: - - "s3:*" - - resources: - - "arn:aws:s3:::badhouseplants-net/*" - actions: - - "s3:*" diff --git a/values/etersoft/values.minio.yaml b/values/etersoft/values.minio.yaml deleted file mode 100644 index 1f53d67..0000000 --- a/values/etersoft/values.minio.yaml +++ /dev/null @@ -1,119 +0,0 @@ -ingress: - enabled: true - ingressClassName: traefik - annotations: - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - path: / - hosts: - - s3.ru.badhouseplants.net - tls: - - secretName: s3.ru.badhouseplants.net - hosts: - - s3.ru.badhouseplants.net -consoleIngress: - enabled: true - ingressClassName: traefik - annotations: - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - path: / - hosts: - - minio.ru.badhouseplants.net - tls: - - secretName: minio.ru.badhouseplants.net - hosts: - - minio.ru.badhouseplants.net -rootUser: "overlord" -replicas: 1 -mode: standalone -environment: - MINIO_SERVER_URL: "https://s3.ru.badhouseplants.net" -tls: - enabled: false - certSecret: "" - publicCrt: public.crt - privateKey: private.key -persistence: - annotations: - volume.kubernetes.io/selected-node: yekaterinburg - storageClass: local-path - enabled: true - accessMode: ReadWriteOnce - size: 60Gi -service: - type: ClusterIP - clusterIP: ~ - port: "9000" -consoleService: - type: ClusterIP - clusterIP: ~ - port: "9001" -resources: - requests: - memory: 2Gi -buckets: - - name: velero - policy: none - purge: false - versioning: false - - name: xray-public - policy: download - purge: false - versioning: false -metrics: - serviceMonitor: - enabled: false - public: true - additionalLabels: {} -policies: - - name: allanger - statements: - - resources: - - "arn:aws:s3:::*" - actions: - - "s3:*" - - resources: [] - actions: - - "admin:*" - - resources: [] - actions: - - "kms:*" - - name: velero - statements: - - resources: - - "arn:aws:s3:::velero" - actions: - - "s3:*" - - resources: - - "arn:aws:s3:::velero/*" - actions: - - "s3:*" - - name: Admins - statements: - - resources: - - "arn:aws:s3:::*" - actions: - - "s3:*" - - resources: [] - actions: - - "admin:*" - - resources: [] - actions: - - "kms:*" - - name: DevOps - statements: - - resources: - - "arn:aws:s3:::badhouseplants-net" - actions: - - "s3:*" - - resources: - - "arn:aws:s3:::badhouseplants-net/*" - actions: - - "s3:*" diff --git a/values/etersoft/values.nrodionov.yaml b/values/etersoft/values.nrodionov.yaml deleted file mode 100644 index f87c96c..0000000 --- a/values/etersoft/values.nrodionov.yaml +++ /dev/null @@ -1,55 +0,0 @@ -ingress: - enabled: true - pathType: ImplementationSpecific - hostname: nrodionov.info - path: / - annotations: - kubernetes.io/ingress.class: traefik - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - tls: true - tlsWwwPrefix: false - selfSigned: false -wordpressBlogName: Николай Николаевич Родионов -wordpressUsername: admin -wordpressFirstName: Nikolai -wordpressLastName: Rodionov -wordpressTablePrefix: wp_ -wordpressScheme: http -existingWordPressConfigurationSecret: "" -resources: - requests: - memory: 300Mi - cpu: 10m -service: - type: ClusterIP - ports: - http: 8080 - https: 8443 - -persistence: - enabled: true - annotations: - volume.kubernetes.io/selected-node: yekaterinburg - accessModes: - - ReadWriteOnce - accessMode: ReadWriteOnce - size: 512Mi - dataSource: {} - existingClaim: "" - selector: {} - -mariadb: - enabled: true - primary: - persistence: - annotations: - volume.kubernetes.io/selected-node: yekaterinburg - enabled: true - storageClass: "" - accessModes: - - ReadWriteOnce - size: 3Gi - diff --git a/values/etersoft/values.openvpn.yaml b/values/etersoft/values.openvpn.yaml deleted file mode 100644 index b809613..0000000 --- a/values/etersoft/values.openvpn.yaml +++ /dev/null @@ -1,47 +0,0 @@ -image: - repository: zot.badhouseplants.net/allanger/container-openvpn - # ------------------------------------------ - # -- Istio extenstion. Just because I'm - # -- not using ingress nginx - # ------------------------------------------ - # istio: -# enabled: true -# istio: -# - name: openvpn-tcp-xor -# gateway: istio-system/badhouseplants-vpn -# kind: tcp -# port_match: 1194 -# hostname: "*" -# service: openvpn-xor -# port: 1194 - -# ------------------------------------------ -traefik: - enabled: true - tcpRoutes: - - name: openvpn - service: openvpn - match: HostSNI(`*`) - entrypoint: openvpn - port: 1194 -tcproute: - enabled: false -storage: - annotations: - volume.kubernetes.io/selected-node: yekaterinburg - size: 128Mi -openvpn: - proto: tcp - host: 91.232.225.63 -easyrsa: - cn: Bad Houseplants - country: Germany - province: Hamburg - city: Hamburg - org: Bad Houseplants - email: allanger@badhouseplants.net.com -service: - type: ClusterIP - port: 1194 - targetPort: 1194 - protocol: TCP diff --git a/values/etersoft/values.postgres16.yaml b/values/etersoft/values.postgres16.yaml deleted file mode 100644 index bfbdf47..0000000 --- a/values/etersoft/values.postgres16.yaml +++ /dev/null @@ -1,36 +0,0 @@ -architecture: standalone - -auth: - database: postgres - -metrics: - enabled: false -primary: - persistence: - size: 2Gi - annotations: - volume.kubernetes.io/selected-node: yekaterinburg - resources: - limits: - ephemeral-storage: 1Gi - memory: 512Mi - requests: - cpu: 512m - ephemeral-storage: 50Mi - memory: 128Mi - podSecurityContext: - enabled: true - fsGroupChangePolicy: Always - sysctls: [] - supplementalGroups: [] - containerSecurityContext: - enabled: true - seLinuxOptions: {} - runAsNonRoot: false - privileged: false - readOnlyRootFilesystem: false - allowPrivilegeEscalation: false - capabilities: - drop: ["ALL"] - seccompProfile: - type: "RuntimeDefault" diff --git a/values/etersoft/values.roles.yaml b/values/etersoft/values.roles.yaml deleted file mode 100644 index 1684f2f..0000000 --- a/values/etersoft/values.roles.yaml +++ /dev/null @@ -1 +0,0 @@ -roles: [] diff --git a/values/etersoft/values.server-xray-public-bridge.yaml b/values/etersoft/values.server-xray-public-bridge.yaml deleted file mode 100644 index 45da110..0000000 --- a/values/etersoft/values.server-xray-public-bridge.yaml +++ /dev/null @@ -1,39 +0,0 @@ -certificate: - enabled: true - certificate: - - name: xray-public-bridge.e.badhouseplants.net - secretName: xray-public-bridge.e.badhouseplants.net - issuer: - kind: ClusterIssuer - name: badhouseplants-issuer-http01 - dnsNames: - - xray-public-bridge.e.badhouseplants.net - - 91.232.225.63 - -traefik: - enabled: true - tcpRoutes: - - name: server-xray-public-bridge - service: server-xray-public-bridge-xray-https - match: HostSNI(`*`) - entrypoint: xray-edge - port: 443 -shortcuts: - hostname: xray-public-bridge.e.badhouseplants.net -ingress: - main: - enabled: true - annotations: - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.class: traefik - kubernetes.io/ingress.global-static-ip-name: "" - kubernetes.io/tls-acme: "true" - meta.helm.sh/release-name: xray - meta.helm.sh/release-namespace: xray - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure -extraVolumes: - certs: - secret: - secretName: xray-public-bridge.e.badhouseplants.net -workload: - replicas: 1 diff --git a/values/etersoft/values.uptime-kuma.yaml b/values/etersoft/values.uptime-kuma.yaml deleted file mode 100644 index 6bdcddc..0000000 --- a/values/etersoft/values.uptime-kuma.yaml +++ /dev/null @@ -1,20 +0,0 @@ -ingress: - enabled: true - annotations: - kubernetes.io/ingress.class: traefik - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - kubernetes.io/ingress.global-static-ip-name: "" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - external-dns.alpha.kubernetes.io/ingress-hostname-source: defined-hosts-only - hosts: - - host: uptime.ru.badhouseplants.net - paths: - - path: / - pathType: ImplementationSpecific - - tls: - - secretName: uptime.ru.badhouseplants.net - hosts: - - uptime.ru.badhouseplants.net diff --git a/values/etersoft/values.zot-mirror.yaml b/values/etersoft/values.zot-mirror.yaml deleted file mode 100644 index 3044281..0000000 --- a/values/etersoft/values.zot-mirror.yaml +++ /dev/null @@ -1,149 +0,0 @@ -image: - repository: ghcr.io/project-zot/zot - tag: v2.1.3-rc4 - -ingress: - enabled: true - className: traefik - annotations: - traefik.ingress.kubernetes.io/router.entrypoints: web,websecure - kubernetes.io/tls-acme: "true" - kubernetes.io/ingress.allow-http: "false" - cert-manager.io/cluster-issuer: badhouseplants-issuer-http01 - pathtype: Prefix - hosts: - - host: registry.ru.badhouseplants.net - paths: - - path: / - tls: - - secretName: registry.ru.badhouseplants.net - hosts: - - registry.ru.badhouseplants.net - -service: - type: ClusterIP -persistence: false -pvc: - create: true - lavels: - velero.io/exclude-from-backup: true -mountConfig: true -mountSecret: true -configFiles: - config.json: |- - { - "distSpecVersion": "1.1.1", - "storage": { - "dedupe": true, - "gc": true, - "rootDirectory": "/var/lib/registry", - "retention": { - "dryRun": false, - "delay": "24h", - "policies": [ - { - "repositories": [ - "**" - ], - "deleteReferrers": false, - "deleteUntagged": true, - "keepTags": [ - { - "mostRecentlyPulledCount": 2 - } - ] - } - ] - } - }, - "http": { - "address": "0.0.0.0", - "port": "5000", - "externalUrl": "https://registry.ru.badhouseplants.net", - "auth": { - "htpasswd": { - "path": "/secret/htpasswd" - } - }, - "accessControl": { - "metrics": { - "users": [ - "admin" - ] - }, - "repositories": { - "**": { - "anonymousPolicy": [], - "policies": [ - { - "users": [ - "mirror_user", - "overlord" - ], - "actions": [ - "read", - "create", - "update", - "delete" - ] - } - ] - } - } - } - }, - "log": { - "level": "info" - }, - "extensions": { - "scrub": { - "enable": true - }, - "metrics": { - "enable": true, - "prometheus": { - "path": "/metrics" - } - }, - "mgmt": { - "enable": false - }, - "sync": { - "enable": true, - "registries": [ - { - "urls": [ - "https://docker.io/library", - "https://docker.io" - ], - "content": [ - { - "prefix": "**", - "destination": "/dockerhub" - } - ], - "onDemand": true, - "tlsVerify": true - }, - { - "urls": [ - "https://registry.k8s.io" - ], - "content": [ - { - "prefix": "**", - "destination": "/k8s" - } - ], - "onDemand": true, - "tlsVerify": true - } - ] - } - } - } - -secretFiles: - htpasswd: |- - overlord:$2y$05$RhAeAsFY32y8h0japhT72.SQTPXgHc54RCp4CZ4Udsg2.iQxJVeZ. - mirror_user:$2y$05$PkvVMY04ZGvuGUXkrez7peyXevl63ugFbdxZ.ON1G/Tof/0Uf5vZi