This commit is contained in:
2024-05-09 12:15:27 +02:00
parent 89c17cb483
commit 599d175f82
31 changed files with 830 additions and 866 deletions

View File

@@ -3,7 +3,7 @@ resource "kubectl_manifest" "deploy" {
apiVersion: apps/v1
kind: Deployment
metadata:
name: "${var.component}-${var.instance}"
name: "${var.instance}-${var.component}"
namespace: "${var.namespace}"
labels: ${jsonencode(local.common-labels)}
spec:
@@ -53,7 +53,7 @@ resource "kubectl_manifest" "deploy" {
successThreshold: 1
timeoutSeconds: 1
restartPolicy: Always
serviceAccount: "${var.component}-${var.instance}"
serviceAccountName: "${var.component}-${var.instance}"
serviceAccount: "${var.instance}-${var.component}"
serviceAccountName: "${var.instance}-${var.component}"
EOF
}

View File

@@ -6,36 +6,26 @@ metadata:
name: okd
description: The console is a more friendly kubectl in the form of a single page webapp. It also integrates with other services like monitoring, chargeback, and OLM.
options:
domain_name:
default: your_company.com
examples:
- your_company.com
type: string
ingress_class:
default: traefik
examples:
- traefik
type: string
app_group:
default: infra
examples:
- infra
type: string
issuer:
default: letsencrypt-prod
cluster-admin:
default: false
examples:
- letsencrypt-prod
type: string
sub_domain:
default: okd
examples:
- okd
type: string
- false
type: boolean
domain:
default: your-company
examples:
- your-company
type: string
domain_name:
default: your_company.com
examples:
- your_company.com
type: string
images:
default:
okd:
@@ -75,12 +65,17 @@ options:
type: string
type: object
type: object
managed:
default: false
ingress_class:
default: traefik
examples:
- false
type: boolean
cluster-admin:
- traefik
type: string
issuer:
default: letsencrypt-prod
examples:
- letsencrypt-prod
type: string
managed:
default: false
examples:
- false
@@ -90,10 +85,12 @@ options:
items:
type: string
type: array
sub_domain:
default: okd
examples:
- okd
type: string
dependencies:
- dist: null
category: share
component: authentik-forward
- dist: null
category: core
component: secret-generator

View File

@@ -6,7 +6,7 @@ resource "kubectl_manifest" "okd_sa" {
apiVersion: v1
kind: ServiceAccount
metadata:
name: "${var.component}-${var.instance}"
name: "${var.instance}-${var.component}"
namespace: "${var.namespace}"
labels: ${jsonencode(local.common-labels)}
EOF
@@ -18,7 +18,7 @@ resource "kubectl_manifest" "okd_crb_admin" {
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: "${var.namespace}-${var.component}-${var.instance}"
name: "${var.namespace}-${var.instance}-${var.component}"
labels: ${jsonencode(local.common-labels)}
roleRef:
apiGroup: rbac.authorization.k8s.io
@@ -26,7 +26,7 @@ resource "kubectl_manifest" "okd_crb_admin" {
name: cluster-admin
subjects:
- kind: ServiceAccount
name: "${var.component}-${var.instance}"
name: "${var.instance}-${var.component}"
namespace: "${var.namespace}"
EOF
}
@@ -37,7 +37,7 @@ resource "kubectl_manifest" "okd_roles" {
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: "${var.namespace}-${var.component}-${var.instance}"
name: "${var.namespace}-${var.instance}-${var.component}"
namespace: "${local.sorted-namespaces[count.index]}"
labels: ${jsonencode(local.common-labels)}
rules:
@@ -53,16 +53,16 @@ resource "kubectl_manifest" "okd_role_bindings" {
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: "${var.namespace}-${var.component}-${var.instance}"
name: "${var.namespace}-${var.instance}-${var.component}"
namespace: "${local.sorted-namespaces[count.index]}"
labels: ${jsonencode(local.common-labels)}
subjects:
- kind: ServiceAccount
name: "${var.component}-${var.instance}"
name: "${var.instance}-${var.component}"
namespace: "${var.namespace}"
roleRef:
kind: Role
name: "${var.namespace}-${var.component}-${var.instance}"
name: "${var.namespace}-${var.instance}-${var.component}"
apiGroup: rbac.authorization.k8s.io
EOF
}
@@ -73,7 +73,7 @@ resource "kubectl_manifest" "okd_clusterrole" {
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRole
metadata:
name: "${var.namespace}-${var.component}-${var.instance}-list"
name: "${var.namespace}-${var.instance}-${var.component}-list"
labels: ${jsonencode(local.common-labels)}
rules:
- apiGroups: [""]
@@ -92,16 +92,16 @@ resource "kubectl_manifest" "okd_clusterrole_bindings" {
apiVersion: rbac.authorization.k8s.io/v1
kind: ClusterRoleBinding
metadata:
name: "${var.namespace}-${var.component}-${var.instance}-list"
name: "${var.namespace}-${var.instance}-${var.component}-list"
namespace: "${local.sorted-namespaces[count.index]}"
labels: ${jsonencode(local.common-labels)}
subjects:
- kind: ServiceAccount
name: "${var.component}-${var.instance}"
name: "${var.instance}-${var.component}"
namespace: "${var.namespace}"
roleRef:
kind: ClusterRole
name: "${var.namespace}-${var.component}-${var.instance}-list"
name: "${var.namespace}-${var.instance}-${var.component}-list"
apiGroup: rbac.authorization.k8s.io
EOF
}