style: format YAMLs to fix yamllint

This commit is contained in:
Khue Doan 2021-12-26 12:36:14 +07:00
parent 1c9ab6b36e
commit bde8724284
50 changed files with 258 additions and 255 deletions

View File

@ -16,5 +16,5 @@ spec:
app: blog
spec:
containers:
- name: blog
image: registry.khuedoan.com/blog:latest
- name: blog
image: registry.khuedoan.com/blog:latest

View File

@ -3,22 +3,22 @@ kind: Ingress
metadata:
name: blog
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
external-dns.alpha.kubernetes.io/target: "homelab-tunnel.khuedoan.com"
external-dns.alpha.kubernetes.io/cloudflare-proxied: "true"
cert-manager.io/cluster-issuer: letsencrypt-prod
external-dns.alpha.kubernetes.io/target: homelab-tunnel.khuedoan.com
external-dns.alpha.kubernetes.io/cloudflare-proxied: 'true'
spec:
ingressClassName: nginx
rules:
- host: &host blog.khuedoan.com
http:
paths:
- pathType: ImplementationSpecific
backend:
service:
name: blog
port:
name: http
- host: &host blog.khuedoan.com
http:
paths:
- pathType: ImplementationSpecific
backend:
service:
name: blog
port:
name: http
tls:
- hosts:
- *host
secretName: blog-tls-certificate
- hosts:
- *host
secretName: blog-tls-certificate

View File

@ -2,6 +2,6 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- deployment.yaml
- service.yaml
- ingress.yaml
- deployment.yaml
- service.yaml
- ingress.yaml

View File

@ -9,7 +9,7 @@ spec:
selector:
app: blog
ports:
- name: http
protocol: TCP
port: 80
targetPort: 80
- name: http
protocol: TCP
port: 80
targetPort: 80

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: hajimari
version: 0.0.0
dependencies:
- name: hajimari
version: 1.2.0
repository: https://hajimari.io
- name: hajimari
version: 1.2.0
repository: https://hajimari.io

View File

@ -1,5 +1,5 @@
hajimari:
image: # TODO remove this https://github.com/toboshii/hajimari/blob/main/charts/hajimari/values.yaml
image: # TODO remove this https://github.com/toboshii/hajimari/blob/main/charts/hajimari/values.yaml
tag: v0.2.0
env:
TZ: Asia/Ho_Chi_Minh
@ -12,13 +12,13 @@ hajimari:
enabled: true
ingressClassName: nginx
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: &host home.khuedoan.com
paths:
- path: /
pathType: Prefix
- host: &host home.khuedoan.com
paths:
- path: /
pathType: Prefix
tls:
- secretName: hajimari-tls-certificate
hosts:
- *host
- secretName: hajimari-tls-certificate
hosts:
- *host

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: jellyfin
version: 0.0.0
dependencies:
- name: jellyfin
version: 9.2.0
repository: https://k8s-at-home.com/charts/
- name: jellyfin
version: 9.2.0
repository: https://k8s-at-home.com/charts/

View File

@ -4,13 +4,13 @@ jellyfin:
enabled: true
ingressClassName: nginx
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: &host jellyfin.khuedoan.com
paths:
- path: /
pathType: Prefix
- host: &host jellyfin.khuedoan.com
paths:
- path: /
pathType: Prefix
tls:
- secretName: jellyfin-tls-certificate
hosts:
- *host
- secretName: jellyfin-tls-certificate
hosts:
- *host

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: paperless
version: 0.0.0
dependencies:
- name: paperless
version: 8.0.0
repository: https://k8s-at-home.com/charts/
- name: paperless
version: 8.0.0
repository: https://k8s-at-home.com/charts/

View File

@ -4,13 +4,13 @@ paperless:
enabled: true
ingressClassName: nginx
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: &host paperless.khuedoan.com
paths:
- path: /
pathType: Prefix
- host: &host paperless.khuedoan.com
paths:
- path: /
pathType: Prefix
tls:
- secretName: paperless-tls-certificate
hosts:
- *host
- secretName: paperless-tls-certificate
hosts:
- *host

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: seafile
version: 0.0.0
dependencies:
- name: seafile
version: 1.2.0
repository: https://k8s-at-home.com/charts
- name: seafile
version: 1.2.0
repository: https://k8s-at-home.com/charts

View File

@ -4,15 +4,15 @@ seafile:
enabled: true
ingressClassName: nginx
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: &host seafile.khuedoan.com
paths:
- path: /
pathType: Prefix
- host: &host seafile.khuedoan.com
paths:
- path: /
pathType: Prefix
tls:
- secretName: seafile-tls-certificate
hosts:
- *host
- secretName: seafile-tls-certificate
hosts:
- *host
mariadb:
enabled: true

View File

@ -3,7 +3,7 @@ kind: ConfigMap
metadata:
name: argocd-cm
data:
users.anonymous.enabled: "true"
users.anonymous.enabled: 'true'
resource.customizations.health.argoproj.io_Application: |
hs = {}
hs.status = "Progressing"

View File

@ -6,7 +6,7 @@ spec:
template:
spec:
containers:
- name: argocd-server
command:
- argocd-server
- --insecure
- name: argocd-server
command:
- argocd-server
- --insecure

View File

@ -3,23 +3,23 @@ kind: Ingress
metadata:
name: argocd-server
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
external-dns.alpha.kubernetes.io/target: "homelab-tunnel.khuedoan.com"
external-dns.alpha.kubernetes.io/cloudflare-proxied: "true"
cert-manager.io/cluster-issuer: letsencrypt-prod
external-dns.alpha.kubernetes.io/target: homelab-tunnel.khuedoan.com
external-dns.alpha.kubernetes.io/cloudflare-proxied: 'true'
spec:
ingressClassName: nginx
rules:
- host: argocd.khuedoan.com
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: argocd-server
port:
name: http
- host: argocd.khuedoan.com
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: argocd-server
port:
name: http
tls:
- hosts:
- argocd.khuedoan.com
secretName: argocd-secret
- hosts:
- argocd.khuedoan.com
secretName: argocd-secret

View File

@ -2,14 +2,14 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- namespace.yaml
- https://raw.githubusercontent.com/argoproj/argo-cd/v2.2.0-rc1/manifests/install.yaml # TODO switch back to stable
- https://raw.githubusercontent.com/argoproj-labs/applicationset/master/manifests/install.yaml # TODO switch back to stable
- ingress.yaml
- namespace.yaml
- https://raw.githubusercontent.com/argoproj/argo-cd/v2.2.0-rc1/manifests/install.yaml # TODO switch back to stable
- https://raw.githubusercontent.com/argoproj-labs/applicationset/master/manifests/install.yaml # TODO switch back to stable
- ingress.yaml
patches:
- path: argocd-server-deployment-patch.yaml
- path: argocd-cm-patch.yaml
- path: argocd-rbac-cm-patch.yaml
- path: argocd-server-deployment-patch.yaml
- path: argocd-cm-patch.yaml
- path: argocd-rbac-cm-patch.yaml
namespace: argocd

View File

@ -4,11 +4,11 @@ metadata:
name: apps
spec:
generators:
- git:
repoURL: https://github.com/khuedoan/homelab.git
revision: master
directories:
- path: apps/*
- git:
repoURL: https://github.com/khuedoan/homelab.git
revision: master
directories:
- path: apps/*
template:
metadata:
name: '{{path.basename}}'
@ -25,4 +25,4 @@ spec:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true
- CreateNamespace=true

View File

@ -4,11 +4,11 @@ metadata:
name: bootstrap
spec:
generators:
- git:
repoURL: https://github.com/khuedoan/homelab.git
revision: master
directories:
- path: bootstrap/*
- git:
repoURL: https://github.com/khuedoan/homelab.git
revision: master
directories:
- path: bootstrap/*
template:
metadata:
name: '{{path.basename}}'

View File

@ -2,9 +2,9 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- bootstrap.yaml
- system.yaml
- platform.yaml
- apps.yaml
- bootstrap.yaml
- system.yaml
- platform.yaml
- apps.yaml
namespace: argocd

View File

@ -4,11 +4,11 @@ metadata:
name: platform
spec:
generators:
- git:
repoURL: https://github.com/khuedoan/homelab.git
revision: master
directories:
- path: platform/*
- git:
repoURL: https://github.com/khuedoan/homelab.git
revision: master
directories:
- path: platform/*
template:
metadata:
name: '{{path.basename}}'
@ -25,4 +25,4 @@ spec:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true
- CreateNamespace=true

View File

@ -4,11 +4,11 @@ metadata:
name: system
spec:
generators:
- git:
repoURL: https://github.com/khuedoan/homelab.git
revision: master
directories:
- path: system/*
- git:
repoURL: https://github.com/khuedoan/homelab.git
revision: master
directories:
- path: system/*
template:
metadata:
name: '{{path.basename}}'
@ -25,4 +25,4 @@ spec:
prune: true
selfHeal: true
syncOptions:
- CreateNamespace=true
- CreateNamespace=true

View File

@ -3,15 +3,15 @@
vars_prompt:
- name: cloudflare_email
prompt: Enter Cloudflare email
private: no
private: false
- name: cloudflare_api_key
prompt: Enter Cloudflare API Key (sensitive)
- name: cloudflare_account_id
prompt: Enter Cloudflare account ID
private: no
private: false
- name: b2_application_key_id
prompt: Enter Backblaze application key ID
private: no
private: false
- name: b2_application_key
prompt: Enter Backblaze application key (sensitive)
tasks:

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: authentik
version: 0.0.0
dependencies:
- name: authentik
version: 4.0.3
repository: https://charts.goauthentik.io
- name: authentik
version: 4.0.3
repository: https://charts.goauthentik.io

View File

@ -1,23 +1,23 @@
authentik:
authentik:
secret_key: "dontjudgemethisisjustfortesting" # TODO
secret_key: dontjudgemethisisjustfortesting # TODO
postgresql:
password: &postgresql_password "IKnowThisIsNotASecurePasswordJust4Testing" # TODO
password: &postgresql_password IKnowThisIsNotASecurePasswordJust4Testing # TODO
ingress:
enabled: true
ingressClassName: nginx
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: &host authentik.khuedoan.com
paths:
- path: "/"
pathType: Prefix
- host: &host authentik.khuedoan.com
paths:
- path: /
pathType: Prefix
tls:
- secretName: authentik-tls-certificate
hosts:
- *host
- secretName: authentik-tls-certificate
hosts:
- *host
postgresql:
enabled: true

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: gitea
version: 0.0.0
dependencies:
- name: gitea
version: 5.0.0
repository: https://dl.gitea.io/charts/
- name: gitea
version: 5.0.0
repository: https://dl.gitea.io/charts/

View File

@ -3,22 +3,22 @@ gitea:
enabled: true
className: nginx
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
external-dns.alpha.kubernetes.io/target: "homelab-tunnel.khuedoan.com"
external-dns.alpha.kubernetes.io/cloudflare-proxied: "true"
cert-manager.io/cluster-issuer: letsencrypt-prod
external-dns.alpha.kubernetes.io/target: homelab-tunnel.khuedoan.com
external-dns.alpha.kubernetes.io/cloudflare-proxied: 'true'
hosts:
- host: &host git.khuedoan.com
paths:
- path: /
pathType: Prefix
tls:
- secretName: gitea-tls-certificate
hosts:
- *host
- secretName: gitea-tls-certificate
hosts:
- *host
gitea:
admin:
# existingSecret: gitea-admin-secret
password: asdfasdfasdf # TODO yes I know this is just for testing
password: asdfasdfasdf # TODO yes I know this is just for testing
config:
server:
LANDING_PAGE: explore

View File

@ -4,20 +4,20 @@ metadata:
name: tekton-dashboard
namespace: tekton-pipelines
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
spec:
ingressClassName: nginx
rules:
- host: &host tekton.khuedoan.com
http:
paths:
- pathType: ImplementationSpecific
backend:
service:
name: tekton-dashboard
port:
name: http
- host: &host tekton.khuedoan.com
http:
paths:
- pathType: ImplementationSpecific
backend:
service:
name: tekton-dashboard
port:
name: http
tls:
- hosts:
- *host
secretName: tekton-tls-certificate
- hosts:
- *host
secretName: tekton-tls-certificate

View File

@ -2,18 +2,18 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
# Pipeline
- https://storage.googleapis.com/tekton-releases/pipeline/latest/release.yaml
# Triggers
- https://storage.googleapis.com/tekton-releases/triggers/latest/release.yaml
- https://storage.googleapis.com/tekton-releases/triggers/latest/interceptors.yaml
# Dashboard
- https://storage.googleapis.com/tekton-releases/dashboard/latest/tekton-dashboard-release.yaml
# Additional
- ingress.yaml
- cluster-role-binding.yaml
- service-account.yaml
# Tasks
- https://raw.githubusercontent.com/tektoncd/catalog/main/task/git-clone/0.5/git-clone.yaml
- https://raw.githubusercontent.com/tektoncd/catalog/main/task/kaniko/0.5/kaniko.yaml
- https://raw.githubusercontent.com/tektoncd/catalog/main/task/pull-request/0.1/pull-request.yaml
# Pipeline
- https://storage.googleapis.com/tekton-releases/pipeline/latest/release.yaml
# Triggers
- https://storage.googleapis.com/tekton-releases/triggers/latest/release.yaml
- https://storage.googleapis.com/tekton-releases/triggers/latest/interceptors.yaml
# Dashboard
- https://storage.googleapis.com/tekton-releases/dashboard/latest/tekton-dashboard-release.yaml
# Additional
- ingress.yaml
- cluster-role-binding.yaml
- service-account.yaml
# Tasks
- https://raw.githubusercontent.com/tektoncd/catalog/main/task/git-clone/0.5/git-clone.yaml
- https://raw.githubusercontent.com/tektoncd/catalog/main/task/kaniko/0.5/kaniko.yaml
- https://raw.githubusercontent.com/tektoncd/catalog/main/task/pull-request/0.1/pull-request.yaml

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: trow
version: 0.0.0
dependencies:
- name: trow
version: 0.3.3
repository: https://trow.io
- name: trow
version: 0.3.3
repository: https://trow.io

View File

@ -14,16 +14,16 @@ trow:
proxyDockerHub: false
ingress:
enabled: false # TODO https://github.com/ContainerSolutions/trow/issues/282
enabled: false # TODO https://github.com/ContainerSolutions/trow/issues/282
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: &host registry.khuedoan.com
paths:
- "/"
- host: &host registry.khuedoan.com
paths:
- /
tls:
- secretName: trow-tls-certificate
hosts:
- *host
- secretName: trow-tls-certificate
hosts:
- *host
volumeClaim:
storageClassName: longhorn

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: vault
version: 0.0.0
dependencies:
- name: vault
version: 0.17.1
repository: https://helm.releases.hashicorp.com
- name: vault
version: 0.17.1
repository: https://helm.releases.hashicorp.com

View File

@ -6,12 +6,12 @@ vault:
enabled: true
ingressClassName: nginx
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- host: &host vault.khuedoan.com
- host: &host vault.khuedoan.com
tls:
- secretName: vault-tls-certificate
hosts:
- *host
- secretName: vault-tls-certificate
hosts:
- *host
dev:
enabled: true # TODO disable vault dev mode
enabled: true # TODO disable vault dev mode

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: cert-manager
version: 0.0.0
dependencies:
- name: cert-manager
version: 1.6.1
repository: https://charts.jetstack.io
- name: cert-manager
version: 1.6.1
repository: https://charts.jetstack.io

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: cloudflared
version: 0.0.0
dependencies:
- name: cloudflared
version: 0.1.7
repository: https://khuedoan.github.io/charts
- name: cloudflared
version: 0.1.7
repository: https://khuedoan.github.io/charts

View File

@ -1,10 +1,10 @@
cloudflared:
tunnel: homelab
ingress:
# It is safe to put a wildcard here
# Please see https://homelab.khuedoan.com/reference/faq.html#is-it-safe-to-use-wildcard-in-cloudflare-tunnel-ingress-config
- hostname: "*.khuedoan.com"
service: https://ingress-nginx-controller.ingress-nginx
originRequest:
noTLSVerify: true
- service: http_status:404
# It is safe to put a wildcard here
# Please see https://homelab.khuedoan.com/reference/faq.html#is-it-safe-to-use-wildcard-in-cloudflare-tunnel-ingress-config
- hostname: '*.khuedoan.com'
service: https://ingress-nginx-controller.ingress-nginx
originRequest:
noTLSVerify: true
- service: http_status:404

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: descheduler
version: 0.0.0
dependencies:
- name: descheduler
version: 0.22.0
repository: https://kubernetes-sigs.github.io/descheduler/
- name: descheduler
version: 0.22.0
repository: https://kubernetes-sigs.github.io/descheduler/

View File

@ -0,0 +1 @@

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: external-dns
version: 0.0.0
dependencies:
- name: external-dns
version: 1.6.0
repository: https://kubernetes-sigs.github.io/external-dns/
- name: external-dns
version: 1.6.0
repository: https://kubernetes-sigs.github.io/external-dns/

View File

@ -1,10 +1,10 @@
external-dns:
provider: cloudflare
env:
- name: CF_API_TOKEN
valueFrom:
secretKeyRef:
name: cloudflare-api-token
key: value
- name: CF_API_TOKEN
valueFrom:
secretKeyRef:
name: cloudflare-api-token
key: value
extraArgs:
- --annotation-filter=external-dns.alpha.kubernetes.io/exclude notin (true)
- --annotation-filter=external-dns.alpha.kubernetes.io/exclude notin (true)

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: ingress-nginx
version: 0.0.0
dependencies:
- name: ingress-nginx
version: 4.0.8
repository: https://kubernetes.github.io/ingress-nginx
- name: ingress-nginx
version: 4.0.8
repository: https://kubernetes.github.io/ingress-nginx

View File

@ -3,4 +3,4 @@ ingress-nginx:
admissionWebhooks:
timeoutSeconds: 30
tcp:
22: "gitea/gitea-ssh:22"
22: gitea/gitea-ssh:22

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: k8up
version: 0.0.0
dependencies:
- name: k8up
version: 2.0.2
repository: https://charts.appuio.ch
- name: k8up
version: 2.0.2
repository: https://charts.appuio.ch

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: loki
version: 0.0.0
dependencies:
- name: loki-stack
version: 2.5.0
repository: https://grafana.github.io/helm-charts
- name: loki-stack
version: 2.5.0
repository: https://grafana.github.io/helm-charts

View File

@ -0,0 +1 @@

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: longhorn
version: 0.0.0
dependencies:
- name: longhorn
version: 1.2.2
repository: https://charts.longhorn.io
- name: longhorn
version: 1.2.2
repository: https://charts.longhorn.io

View File

@ -0,0 +1 @@

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: metallb
version: 0.0.0
dependencies:
- name: metallb
version: 0.11.0
repository: https://metallb.github.io/metallb
- name: metallb
version: 0.11.0
repository: https://metallb.github.io/metallb

View File

@ -1,8 +1,8 @@
metallb:
configInline:
address-pools:
- name: default
protocol: layer2
addresses:
# TODO (optimize) Use metal values for MetalLB values
- 192.168.1.150-192.168.1.180
- name: default
protocol: layer2
addresses:
# TODO (optimize) Use metal values for MetalLB values
- 192.168.1.150-192.168.1.180

View File

@ -2,6 +2,6 @@ apiVersion: v2
name: kube-prometheus-stack
version: 0.0.0
dependencies:
- name: kube-prometheus-stack
version: 21.0.3
repository: https://prometheus-community.github.io/helm-charts
- name: kube-prometheus-stack
version: 21.0.3
repository: https://prometheus-community.github.io/helm-charts

View File

@ -4,14 +4,14 @@ kube-prometheus-stack:
enabled: true
ingressClassName: nginx
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
cert-manager.io/cluster-issuer: letsencrypt-prod
hosts:
- &host grafana.khuedoan.com
- &host grafana.khuedoan.com
tls:
- secretName: grafana-general-tls
hosts:
- *host
- secretName: grafana-general-tls
hosts:
- *host
additionalDataSources:
- name: Loki
type: loki
url: http://loki.loki:3100
- name: Loki
type: loki
url: http://loki.loki:3100