From 93612623e4e5d71b42b1d91511a54f1a54c28a18 Mon Sep 17 00:00:00 2001 From: Danny Bessems Date: Mon, 26 Dec 2022 15:34:08 +0100 Subject: [PATCH] Store WIP services for safekeeping --- .../_archived/Humhub/configMap-Humhub.yml | 29 +++ services/_archived/Humhub/deploy-HumHub.yml | 243 ++++++++++++++++++ .../_archived/Mastodon/configMap-Mastodon.yml | 23 ++ .../_archived/Mastodon/deploy-Mastodon.yml | 225 ++++++++++++++++ .../_archived/Matrix/_namespace-Matrix.yml | 4 + .../_archived/Matrix/configMap-Dendrite.yml | 12 + .../_archived/Matrix/configMap-ElementWeb.yml | 57 ++++ .../_archived/Matrix/deployment-Dendrite.yml | 60 +++++ .../Matrix/deployment-ElementWeb.yml | 36 +++ .../_archived/Matrix/ingressRoute-Matrix.yml | 26 ++ .../Matrix/persistentVolume-Dendrite.yml | 57 ++++ .../Matrix/persistentVolumeClaim-Dendrite.yml | 39 +++ .../Matrix/sealedSecret-SMBSecret.yml | 18 ++ .../_archived/Matrix/service-Dendrite.yml | 19 ++ .../_archived/Matrix/service-ElementWeb.yml | 13 + 15 files changed, 861 insertions(+) create mode 100644 services/_archived/Humhub/configMap-Humhub.yml create mode 100644 services/_archived/Humhub/deploy-HumHub.yml create mode 100644 services/_archived/Mastodon/configMap-Mastodon.yml create mode 100644 services/_archived/Mastodon/deploy-Mastodon.yml create mode 100644 services/_archived/Matrix/_namespace-Matrix.yml create mode 100644 services/_archived/Matrix/configMap-Dendrite.yml create mode 100644 services/_archived/Matrix/configMap-ElementWeb.yml create mode 100644 services/_archived/Matrix/deployment-Dendrite.yml create mode 100644 services/_archived/Matrix/deployment-ElementWeb.yml create mode 100644 services/_archived/Matrix/ingressRoute-Matrix.yml create mode 100644 services/_archived/Matrix/persistentVolume-Dendrite.yml create mode 100644 services/_archived/Matrix/persistentVolumeClaim-Dendrite.yml create mode 100644 services/_archived/Matrix/sealedSecret-SMBSecret.yml create mode 100644 services/_archived/Matrix/service-Dendrite.yml create mode 100644 services/_archived/Matrix/service-ElementWeb.yml diff --git a/services/_archived/Humhub/configMap-Humhub.yml b/services/_archived/Humhub/configMap-Humhub.yml new file mode 100644 index 0000000..dd8eabc --- /dev/null +++ b/services/_archived/Humhub/configMap-Humhub.yml @@ -0,0 +1,29 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: configmap-humhub +data: + HUMHUB_DB_USER: humhub + HUMHUB_DB_PASSWORD: humhub + HUMHUB_DB_HOST: humhub.default.svc.cluster.local + HUMHUB_DB_NAME: humhub + HUMHUB_AUTO_INSTALL: '1' + HUMHUB_PROTO: https + HUMHUB_HOST: st.itch.fyi + HUMHUB_MAILER_SYSTEM_EMAIL_ADDRESS: noreply@st.itch.fyi + HUMHUB_MAILER_SYSTEM_EMAIL_NAME: St.itch + HUMHUB_MAILER_TRANSPORT_TYPE: smtp + HUMHUB_MAILER_HOSTNAME: smtp.sendgrid.net + HUMHUB_MAILER_PORT: '587' + HUMHUB_MAILER_USERNAME: apikey + HUMHUB_MAILER_PASSWORD: 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 + HUMHUB_CACHE_EXPIRE_TIME: '3600' + HUMHUB_CACHE_CLASS: yii\redis\Cache + HUMHUB_QUEUE_CLASS: humhub\modules\queue\driver\Redis + HUMHUB_REDIS_HOSTNAME: humhub.default.svc.cluster.local + HUMHUB_REDIS_PORT: '6379' + HUMHUB_REDIS_PASSWORD: humhub + # Settings for max filesize; should probably be more conservative + PHP_UPLOAD_MAX_FILESIZE: 25M + PHP_POST_MAX_SIZE: 250M + NGINX_CLIENT_MAX_BODY_SIZE: 250M diff --git a/services/_archived/Humhub/deploy-HumHub.yml b/services/_archived/Humhub/deploy-HumHub.yml new file mode 100644 index 0000000..18eb677 --- /dev/null +++ b/services/_archived/Humhub/deploy-HumHub.yml @@ -0,0 +1,243 @@ +apiVersion: v1 +kind: Service +metadata: + name: humhub +spec: + ports: + - protocol: TCP + name: web + port: 80 + - protocol: TCP + name: db + port: 3306 + - protocol: TCP + name: redis + port: 6379 + selector: + app: humhub +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: humhub + labels: + app: humhub +spec: + replicas: 1 + selector: + matchLabels: + app: humhub + strategy: + type: Recreate + template: + metadata: + labels: + app: humhub + spec: + containers: + - name: web + image: bv11-cr01.bessems.eu/proxy/mriedmann/humhub:stable + command: ["/bin/sh"] + args: + - -c + - "sed -e '/\\[::\\]:80/d' -i /etc/nginx/nginx.conf;/docker-entrypoint.sh;supervisord -n -c /etc/supervisord.conf" + envFrom: + - configMapRef: + name: configmap-humhub + ports: + - name: web + containerPort: 80 + volumeMounts: + - mountPath: /var/www/localhost/htdocs/protected/config + name: flexvolsmb-humhub-config + - mountPath: /var/www/localhost/htdocs/protected/modules + name: flexvolsmb-humhub-modules + - mountPath: /var/www/localhost/htdocs/uploads + name: flexvolsmb-humhub-uploads + - name: db + image: bv11-cr01.bessems.eu/proxy/library/mariadb:10.7 + args: + - --innodb-flush-method=fsync + securityContext: + runAsUser: 999 + runAsGroup: 999 + env: + - name: MARIADB_RANDOM_ROOT_PASSWORD + value: 'true' + - name: MARIADB_DATABASE + value: humhub + - name: MARIADB_USER + value: humhub + - name: MARIADB_PASSWORD + value: humhub + ports: + - name: db + containerPort: 3306 + volumeMounts: + - mountPath: /var/lib/mysql + name: flexvolsmb-humhub-db + - name: redis + image: bv11-cr01.bessems.eu/proxy/library/redis:alpine + env: + - name: REDIS_PASSWORD + value: humhub + ports: + - name: redis + containerPort: 6379 + volumes: + - name: flexvolsmb-humhub-config + persistentVolumeClaim: + claimName: flexvolsmb-humhub-config + - name: flexvolsmb-humhub-modules + persistentVolumeClaim: + claimName: flexvolsmb-humhub-modules + - name: flexvolsmb-humhub-uploads + persistentVolumeClaim: + claimName: flexvolsmb-humhub-uploads + - name: flexvolsmb-humhub-db + persistentVolumeClaim: + claimName: flexvolsmb-humhub-db +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: humhub +spec: + entryPoints: + - websecure + routes: + - match: Host(`st.itch.fyi`) + kind: Rule + services: + - name: humhub + port: 80 + middlewares: + - name: security-headers@file + - name: compression@file +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-humhub-db +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-humhub-db + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0755,dir_mode=0755,uid=999,gid=999,iocharset=utf8,nobrl + server: 192.168.11.225 + share: /K3s.Volumes/humhub/db +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-humhub-db +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-humhub-db + resources: + requests: + storage: 1Gi +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-humhub-config +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-humhub-config + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0755,dir_mode=0755,uid=100,gid=101,iocharset=utf8 + server: 192.168.11.225 + share: /K3s.Volumes/humhub/config +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-humhub-config + namespace: default +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-humhub-config + resources: + requests: + storage: 1Gi +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-humhub-modules +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-humhub-modules + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0755,dir_mode=0755,uid=100,gid=101,iocharset=utf8 + server: 192.168.11.225 + share: /K3s.Volumes/humhub/modules +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-humhub-modules + namespace: default +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-humhub-modules + resources: + requests: + storage: 1Gi +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-humhub-uploads +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-humhub-uploads + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0755,dir_mode=0755,uid=100,gid=101,iocharset=utf8 + server: 192.168.11.225 + share: /K3s.Volumes/humhub/uploads +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-humhub-uploads + namespace: default +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-humhub-uploads + resources: + requests: + storage: 1Gi diff --git a/services/_archived/Mastodon/configMap-Mastodon.yml b/services/_archived/Mastodon/configMap-Mastodon.yml new file mode 100644 index 0000000..878e6e9 --- /dev/null +++ b/services/_archived/Mastodon/configMap-Mastodon.yml @@ -0,0 +1,23 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: configmap-mastodon +data: + LOCAL_DOMAIN: st.itch.fyi + REDIS_HOST: mastodon.default.svc.cluster.local + REDIS_PORT: '6379' + #REDIS_URL: redis://mastodon:mastodon@mastodon.default.svc.cluster.local:6379 + DB_HOST: mastodon.default.svc.cluster.local + DB_USER: mastodon + DB_NAME: mastodon + DB_PASS: mastodon + DB_PORT: '5432' + SECRET_KEY_BASE: LFw5jr59QUzhcckkJBV4nq9KRVuZH7AW + OTP_SECRET: cq2nBu9MsRbAr7hhYvj3XFKenhhRsQvW + #VAPID_PRIVATE_KEY: + #VAPID_PUBLIC_KEY: + SMTP_SERVER: smtp.sendgrid.net + SMTP_PORT: '587' + SMTP_LOGIN: apikey + SMTP_PASSWORD: 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 + SMTP_FROM_ADDRESS: Mastodon diff --git a/services/_archived/Mastodon/deploy-Mastodon.yml b/services/_archived/Mastodon/deploy-Mastodon.yml new file mode 100644 index 0000000..7a91f40 --- /dev/null +++ b/services/_archived/Mastodon/deploy-Mastodon.yml @@ -0,0 +1,225 @@ +apiVersion: v1 +kind: Service +metadata: + name: mastodon +spec: + ports: + - protocol: TCP + name: web + port: 3000 + - protocol: TCP + name: api + port: 4000 + - protocol: TCP + name: db + port: 5432 + - protocol: TCP + name: redis + port: 6379 + selector: + app: mastodon +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: mastodon + labels: + app: mastodon +spec: + replicas: 1 + selector: + matchLabels: + app: mastodon + template: + metadata: + labels: + app: mastodon + spec: + containers: + - name: web + image: bv11-cr01.bessems.eu/proxy/tootsuite/mastodon + args: + - bash + - -c + - 'rm -f /mastodon/tmp/pids/server.pid; bundle exec rails db:migrate; bundle exec rails s -p 3000' + envFrom: + - configMapRef: + name: configmap-mastodon + ports: + - name: web + containerPort: 3000 + volumeMounts: + - mountPath: /mastodon/public/system + name: flexvolsmb-mastodon-system + - name: api + image: bv11-cr01.bessems.eu/proxy/tootsuite/mastodon + args: + - node + - ./streaming + envFrom: + - configMapRef: + name: configmap-mastodon + ports: + - name: api + containerPort: 4000 + - name: backend + image: bv11-cr01.bessems.eu/proxy/tootsuite/mastodon + args: + - bundle + - exec + - sidekiq + envFrom: + - configMapRef: + name: configmap-mastodon + volumeMounts: + - mountPath: /mastodon/public/system + name: flexvolsmb-mastodon-system + - name: postgres + image: bv11-cr01.bessems.eu/proxy/library/postgres:14-alpine + env: + - name: POSTGRES_USER + value: mastodon + - name: POSTGRES_PASSWORD + value: mastodon + - name: POSTGRES_DB + value: mastodon + ports: + - name: db + containerPort: 5432 + volumeMounts: + - mountPath: /var/lib/postgresql/data + name: flexvolsmb-mastodon-db + - name: redis + image: bv11-cr01.bessems.eu/proxy/library/redis:alpine +# args: +# - redis-server +# - --requirepass mastodon +# - --appendonly yes + ports: + - name: redis + containerPort: 6379 + volumeMounts: + - name: flexvolsmb-mastodon-redis + mountPath: /data + volumes: + - name: flexvolsmb-mastodon-system + persistentVolumeClaim: + claimName: flexvolsmb-mastodon-system + - name: flexvolsmb-mastodon-db + persistentVolumeClaim: + claimName: flexvolsmb-mastodon-db + - name: flexvolsmb-mastodon-redis + persistentVolumeClaim: + claimName: flexvolsmb-mastodon-redis +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: mastodon +spec: + entryPoints: + - websecure + routes: + - match: Host(`st.itch.fyi`) + kind: Rule + services: + - name: mastodon + port: 3000 + middlewares: + - name: security-headers@file + - name: compression@file +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-mastodon-db +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-mastodon-db + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0600,dir_mode=0700,uid=70,gid=70,iocharset=utf8,nobrl + server: 192.168.11.225 + share: /K3s.Volumes/mastodon/db +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-mastodon-db +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-mastodon-db + resources: + requests: + storage: 1Gi +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-mastodon-redis +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-mastodon-redis + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0700,dir_mode=0700,uid=999,gid=1000,iocharset=utf8,nobrl + server: 192.168.11.225 + share: /K3s.Volumes/mastodon/redis +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-mastodon-redis + namespace: default +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-mastodon-redis + resources: + requests: + storage: 1Gi +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-mastodon-system +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-mastodon-system + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0755,dir_mode=0755,uid=991,gid=991,iocharset=utf8 + server: 192.168.11.225 + share: /K3s.Volumes/mastodon/system +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-mastodon-system + namespace: default +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-mastodon-system + resources: + requests: + storage: 1Gi diff --git a/services/_archived/Matrix/_namespace-Matrix.yml b/services/_archived/Matrix/_namespace-Matrix.yml new file mode 100644 index 0000000..b88de94 --- /dev/null +++ b/services/_archived/Matrix/_namespace-Matrix.yml @@ -0,0 +1,4 @@ +apiVersion: v1 +kind: Namespace +metadata: + name: matrix diff --git a/services/_archived/Matrix/configMap-Dendrite.yml b/services/_archived/Matrix/configMap-Dendrite.yml new file mode 100644 index 0000000..49dca92 --- /dev/null +++ b/services/_archived/Matrix/configMap-Dendrite.yml @@ -0,0 +1,12 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: configmap-dendrite + namespace: matrix +data: + 20-create_db.sh: | + #!/bin/sh + + for db in userapi_accounts mediaapi syncapi roomserver keyserver federationapi appservice mscs; do + createdb -U dendrite -O dendrite dendrite_$db + done diff --git a/services/_archived/Matrix/configMap-ElementWeb.yml b/services/_archived/Matrix/configMap-ElementWeb.yml new file mode 100644 index 0000000..7982795 --- /dev/null +++ b/services/_archived/Matrix/configMap-ElementWeb.yml @@ -0,0 +1,57 @@ +apiVersion: v1 +kind: ConfigMap +metadata: + name: configmap-element + namespace: matrix +data: + config.json: | + { + "default_server_config": { + "m.homeserver": { + "base_url": "https://chat.spamasaurus.com", + "server_name": "Spamasaurus Rex" + }, + "m.identity_server": { + "base_url": "https://vector.im" + } + }, + "disable_custom_urls": false, + "disable_guests": true, + "disable_login_language_selector": false, + "disable_3pid_login": false, + "brand": "Element", + "integrations_ui_url": "https://scalar.vector.im/", + "integrations_rest_url": "https://scalar.vector.im/api", + "integrations_widgets_urls": [ + "https://scalar.vector.im/_matrix/integrations/v1", + "https://scalar.vector.im/api", + "https://scalar-staging.vector.im/_matrix/integrations/v1", + "https://scalar-staging.vector.im/api", + "https://scalar-staging.riot.im/scalar/api" + ], + "bug_report_endpoint_url": "https://element.io/bugreports/submit", + "defaultCountryCode": "GB", + "show_labs_settings": false, + "features": { }, + "default_federate": false, + "default_theme": "dark", + "room_directory": { + "servers": [ + "chat.spamasaurus.com" + ] + }, + "enable_presence_by_hs_url": { + "https://matrix.org": false, + "https://matrix-client.matrix.org": false + }, + "setting_defaults": { + "breadcrumbs": true + }, + "jitsi": { + "preferred_domain": "meet.element.io" + } + } + 99-disable-ipv6.sh: | + #!/bin/sh + + sed -e '/.*\[::\]:80/d' -i /etc/nginx/conf.d/default.conf diff --git a/services/_archived/Matrix/deployment-Dendrite.yml b/services/_archived/Matrix/deployment-Dendrite.yml new file mode 100644 index 0000000..ddb047c --- /dev/null +++ b/services/_archived/Matrix/deployment-Dendrite.yml @@ -0,0 +1,60 @@ +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + labels: + app: dendrite + name: dendrite + namespace: matrix +spec: + strategy: + type: Recreate + replicas: 1 + selector: + matchLabels: + app: dendrite + template: + metadata: + labels: + app: dendrite + spec: + containers: + - image: bv11-cr01.bessems.eu/proxy/library/postgres:14-alpine + name: db + env: + - name: POSTGRES_USER + value: dendrite + - name: POSTGRES_PASSWORD + value: dendrite + ports: + - containerPort: 5432 + name: db + volumeMounts: + - mountPath: /var/lib/postgresql/data + name: flexvolsmb-dendrite-db + - name: configmap-dendrite + mountPath: /docker-entrypoint-initdb.d/20-create_db.sh + subPath: 20-create_db.sh + - image: bv11-cr01.bessems.eu/proxy/matrixdotorg/dendrite-monolith:latest + name: dendrite + ports: + - containerPort: 8008 + name: web + volumeMounts: + - mountPath: /etc/dendrite + name: flexvolsmb-dendrite-config + - mountPath: /var/dendrite/media + name: flexvolsmb-dendrite-media + volumes: + - name: flexvolsmb-dendrite-config + persistentVolumeClaim: + claimName: flexvolsmb-dendrite-config + - name: flexvolsmb-dendrite-db + persistentVolumeClaim: + claimName: flexvolsmb-dendrite-db + - name: flexvolsmb-dendrite-media + persistentVolumeClaim: + claimName: flexvolsmb-dendrite-media + - name: configmap-dendrite + configMap: + name: configmap-dendrite diff --git a/services/_archived/Matrix/deployment-ElementWeb.yml b/services/_archived/Matrix/deployment-ElementWeb.yml new file mode 100644 index 0000000..04f9d87 --- /dev/null +++ b/services/_archived/Matrix/deployment-ElementWeb.yml @@ -0,0 +1,36 @@ +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + labels: + app: element + name: element + namespace: matrix +spec: + replicas: 1 + selector: + matchLabels: + app: element + template: + metadata: + labels: + app: element + spec: + containers: + - image: bv11-cr01.bessems.eu/proxy/vectorim/element-web:latest + name: element + ports: + - containerPort: 80 + name: web + volumeMounts: + - mountPath: /app/config.json + name: configmap-element + subPath: config.json + - name: configmap-element + mountPath: /docker-entrypoint.d/99-disable-ipv6.sh + subPath: 99-disable-ipv6.sh + volumes: + - name: configmap-element + configMap: + name: configmap-element + defaultMode: 0777 diff --git a/services/_archived/Matrix/ingressRoute-Matrix.yml b/services/_archived/Matrix/ingressRoute-Matrix.yml new file mode 100644 index 0000000..b809224 --- /dev/null +++ b/services/_archived/Matrix/ingressRoute-Matrix.yml @@ -0,0 +1,26 @@ +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: matrix + namespace: matrix +spec: + entryPoints: + - websecure + routes: + - match: Host(`chat.spamasaurus.com`) && PathPrefix(`/_matrix`) + kind: Rule + services: + - name: dendrite + port: 8008 + middlewares: + - name: security-headers@file + - name: compression@file + - match: Host(`chat.spamasaurus.com`) + kind: Rule + services: + - name: element + port: 80 + middlewares: + - name: security-headers@file + - name: compression@file diff --git a/services/_archived/Matrix/persistentVolume-Dendrite.yml b/services/_archived/Matrix/persistentVolume-Dendrite.yml new file mode 100644 index 0000000..c86e98b --- /dev/null +++ b/services/_archived/Matrix/persistentVolume-Dendrite.yml @@ -0,0 +1,57 @@ +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-dendrite-config +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-dendrite-config + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0777,dir_mode=0777,iocharset=utf8 + server: 192.168.11.225 + share: /K3s.Volumes/dendrite/config +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-dendrite-db +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-dendrite-db + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0600,dir_mode=0700,uid=70,gid=70,iocharset=utf8,nobrl + server: 192.168.11.225 + share: /K3s.Volumes/dendrite/db +--- +apiVersion: v1 +kind: PersistentVolume +metadata: + name: flexvolsmb-dendrite-media +spec: + capacity: + storage: 1Gi + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-dendrite-media + flexVolume: + driver: mount/smb + secretRef: + name: smb-secret + options: + opts: domain=bessems.eu,file_mode=0777,dir_mode=0777,iocharset=utf8 + server: 192.168.11.225 + share: /K3s.Volumes/dendrite/media diff --git a/services/_archived/Matrix/persistentVolumeClaim-Dendrite.yml b/services/_archived/Matrix/persistentVolumeClaim-Dendrite.yml new file mode 100644 index 0000000..f6d7b4a --- /dev/null +++ b/services/_archived/Matrix/persistentVolumeClaim-Dendrite.yml @@ -0,0 +1,39 @@ +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-dendrite-config + namespace: matrix +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-dendrite-config + resources: + requests: + storage: 1Gi +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-dendrite-db + namespace: matrix +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-dendrite-db + resources: + requests: + storage: 1Gi +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: flexvolsmb-dendrite-media + namespace: matrix +spec: + accessModes: + - ReadWriteMany + storageClassName: flexvolsmb-dendrite-media + resources: + requests: + storage: 1Gi diff --git a/services/_archived/Matrix/sealedSecret-SMBSecret.yml b/services/_archived/Matrix/sealedSecret-SMBSecret.yml new file mode 100644 index 0000000..97b26eb --- /dev/null +++ b/services/_archived/Matrix/sealedSecret-SMBSecret.yml @@ -0,0 +1,18 @@ +apiVersion: bitnami.com/v1alpha1 +kind: SealedSecret +metadata: + creationTimestamp: null + name: smb-secret + namespace: matrix +spec: + encryptedData: + password: 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 + username: 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 + template: + data: null + metadata: + creationTimestamp: null + name: smb-secret + namespace: matrix + type: mount/smb + diff --git a/services/_archived/Matrix/service-Dendrite.yml b/services/_archived/Matrix/service-Dendrite.yml new file mode 100644 index 0000000..bf87649 --- /dev/null +++ b/services/_archived/Matrix/service-Dendrite.yml @@ -0,0 +1,19 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: dendrite + namespace: matrix +spec: + ports: + - protocol: TCP + name: web + port: 8008 + - protocol: TCP + name: db + port: 5432 + - protocol: TCP + name: turn-tcp + port: 3478 + selector: + app: dendrite diff --git a/services/_archived/Matrix/service-ElementWeb.yml b/services/_archived/Matrix/service-ElementWeb.yml new file mode 100644 index 0000000..3457d9c --- /dev/null +++ b/services/_archived/Matrix/service-ElementWeb.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: element + namespace: matrix +spec: + ports: + - protocol: TCP + name: web + port: 80 + selector: + app: element