diff --git a/kubernetes/freshrss.yaml b/kubernetes/freshrss.yaml deleted file mode 100644 index 23a54dc..0000000 --- a/kubernetes/freshrss.yaml +++ /dev/null @@ -1,88 +0,0 @@ -# We can use k3s's local storage provider for the persistent volume. -# https://docs.k3s.io/storage ---- -apiVersion: v1 -kind: ConfigMap -metadata: - name: freshrss-env -data: - TZ: Europe/Amsterdam - CRON_MIN: '2,32' - ADMIN_EMAIL: 'pim@kunis.nl' - ADMIN_PASSWORD: foo - ADMIN_API_PASSWORD: foo - PUBLISHED_PORT: '443' ---- -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: freshrss-data -spec: - accessModes: - - ReadWriteOnce - storageClassName: local-path - resources: - requests: - storage: 1Mi ---- -apiVersion: apps/v1 -kind: Deployment -metadata: - name: freshrss - labels: - app: freshrss -spec: - replicas: 1 - selector: - matchLabels: - app: freshrss - template: - metadata: - labels: - app: freshrss - spec: - containers: - - name: freshrss - image: freshrss/freshrss:edge - ports: - - containerPort: 80 - envFrom: - - configMapRef: - name: freshrss-env - volumeMounts: - - name: freshrss-data - mountPath: /var/www/FreshRSS/data - volumes: - - name: freshrss-data - persistentVolumeClaim: - claimName: freshrss-data ---- -apiVersion: v1 -kind: Service -metadata: - name: freshrss -spec: - selector: - app: freshrss - ports: - - protocol: TCP - port: 80 - targetPort: 80 ---- -apiVersion: networking.k8s.io/v1 -kind: Ingress -metadata: - name: freshrss -spec: - ingressClassName: traefik - rules: - - host: freshrss.k3s.kun.is - http: - paths: - - path: / - pathType: Prefix - backend: - service: - name: freshrss - port: - number: 80 diff --git a/kubernetes/nfs-test.yaml b/kubernetes/nfs-test.yaml deleted file mode 100644 index 2b53aab..0000000 --- a/kubernetes/nfs-test.yaml +++ /dev/null @@ -1,55 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - labels: - app: fedoratest - name: fedoratest -spec: - replicas: 2 - selector: - matchLabels: - app: fedoratest - template: - metadata: - labels: - app: fedoratest - spec: - containers: - - image: registry.fedoraproject.org/fedora:35 - name: fedora - command: ["/bin/bash", "-c", "--"] - args: ["while true; do sleep 30; done;"] - volumeMounts: - # name must match the volume name below - - name: media - mountPath: "/mnt/media" - volumes: - - name: media - persistentVolumeClaim: - claimName: media ---- -apiVersion: v1 -kind: PersistentVolume -metadata: - name: media -spec: - capacity: - storage: 1Mi - accessModes: - - ReadWriteMany - nfs: - server: lewis.hyp - path: "/mnt/data/nfs/media" ---- -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: media -spec: - accessModes: - - ReadWriteMany - storageClassName: "" - resources: - requests: - storage: 1Mi - volumeName: media diff --git a/nix/flake/kubenix/default.nix b/nix/flake/kubenix/default.nix index 0312680..a0f786b 100644 --- a/nix/flake/kubenix/default.nix +++ b/nix/flake/kubenix/default.nix @@ -14,8 +14,6 @@ kubenix.project = "home"; kubernetes = { - # namespace = "kubenix"; - customTypes = { # HACK: These are dummy custom types. # This is needed, because the CRDs imported as a chart are not available as Nix modules. @@ -37,28 +35,12 @@ }; resources = { - # namespaces = { - # kubenix = { }; - - # metallb-system.metadata.labels = { - # "pod-security.kubernetes.io/enforce" = "privileged"; - # "pod-security.kubernetes.io/audit" = "privileged"; - # "pod-security.kubernetes.io/warn" = "privileged"; - # }; - # }; - - ipAddressPools.main = { - # metadata.namespace = "metallb-system"; - spec.addresses = [ "192.168.30.128-192.168.30.200" ]; - }; - - # l2Advertisements.main.metadata.namespace = "metallb-system"; + ipAddressPools.main.spec.addresses = [ "192.168.30.128-192.168.30.200" ]; l2Advertisements.main.metadata = { }; }; helm.releases.metallb = { chart = nixhelm.chartsDerivations.${system}.metallb.metallb; - # namespace = "metallb-system"; includeCRDs = true; }; };