blob: 0d0c273a604ef30065823de23fb18048ec590573 [file] [log] [blame]
Piotr Dobrowolski0572fff2021-02-06 22:23:53 +01001#
2# issues.hackerspace.pl redmine deployment
3#
4# Bootstrap:
5#
6# ns=redmine
Piotr Dobrowolski054c5b42021-02-09 10:05:59 +01007# kubectl -n $ns create secret generic redmine --from-literal=secret_key=$(pwgen 24 1) --from-literal=postgres_password=$(pwgen 32 1) --from-literal=mailing_password=... --from-literal=oidc_secret=...
Piotr Dobrowolski0572fff2021-02-06 22:23:53 +01008#
9# ceph_ns=ceph-waw3; ceph_pool=waw-hdd-redundant-3
10# kubectl -n $ceph_ns get secrets rook-ceph-object-user-${ceph_pool}-object-issues -o json | jq 'del(.metadata.namespace,.metadata.resourceVersion,.metadata.uid) | .metadata.creationTimestamp=null' | kubectl replace -f - -n $ns
11#
12
13local redmine = import "./redmine.libsonnet";
14
15{
16 issues: redmine {
17 cfg+: {
18 namespace: "redmine",
19 domain: "issues.hackerspace.pl",
20
21 storage+: {
22 endpoint: "https://object.ceph-waw3.hswaw.net",
23 bucket: "issues",
24
25 # This is required for redmine_s3 to properly create a bucket
26 region: "us-east-1",
27
28 local rookSecret = "rook-ceph-object-user-waw-hdd-redundant-3-object-issues",
29 accessKey: { secretKeyRef: { name: rookSecret, key: "AccessKey" } },
30 secretKey: { secretKeyRef: { name: rookSecret, key: "SecretKey" } },
31 },
32
33 oidc+: {
34 server: "https://sso.hackerspace.pl",
35 clientID: "70ee2821-2657-4409-a298-98649d1f689f",
36 clientSecret: { secretKeyRef: { name: "redmine", key: "oidc_secret" } },
37 },
Piotr Dobrowolski054c5b42021-02-09 10:05:59 +010038
39 mailing+: {
40 address: "mail.hackerspace.pl",
41 user_name: "issues",
42 domain: "hackerspace.pl",
43 password: { secretKeyRef: { name: "redmine", key: "mailing_password" } },
44 },
Piotr Dobrowolski0572fff2021-02-06 22:23:53 +010045 },
46 },
47}