Files
base-infra/config.yml
Felix Nehrke 20b0ac86f5 Add snappass to the cluster
This change is surprisingly tricky and needed some temporary
workarounds. First, there is no "official" snappass helm chart but I
found one, which does the job and looked good enough. The other problem
is the missing "official" image of snappass. The helm-chart used a
customized image which I didn't want to use, therefore I had to rebuild
a brand new image quickly. This new image is unfortunately not bound to
any repository or pipeline yet, which means that this change needs some
trust for the moment until I've set up the needed repo and CI
structures.

Reference: https://github.com/lmacka/helm-snappass/tree/main
Reference: https://github.com/pinterest/snappass
2025-11-28 22:12:47 +01:00

52 lines
1.7 KiB
YAML

all:
vars:
api_endpoint: "{{ hostvars[groups['server'][0]]['ansible_host'] | default(groups['server'][0]) }}"
cert_manager_state: present
cert_manager_version: v1.18.2
letsencrypt_clusterissuers:
staging:
server: https://acme-staging-v02.api.letsencrypt.org/directory
email: "{{ vault_letsencrypt_issuer_email }}"
prod:
server: https://acme-v02.api.letsencrypt.org/directory
email: "{{ vault_letsencrypt_issuer_email }}"
gitea_chart_version: 12.3.0
gitea_state: present
gitea_host: gitea.nehrke.info
gitea_certificate_issuer: letsencrypt-prod
gitea_image_pull_policy: Always
gitea_image_registry_secret: "{{ vault_gitea_pull_registry_secret | b64encode }}"
gitea_admin_user: "{{ vault_gitea_admin_user }}"
gitea_admin_password: "{{ vault_gitea_admin_password }}"
gitea_admin_email: "{{ vault_gitea_admin_email }}"
concourse_state: present
concourse_chart_version: 19.0.2
concourse_certificate_issuer: letsencrypt-prod
concourse_host: ci.nehrke.info
concourse_local_users: "{{ vault_concourse_local_users }}"
concourse_worker_replicas: 2
snappass_state: present
snappass_host: snappass.nehrke.info
snappass_certificate_issuer: letsencrypt-prod
k3s_cluster:
vars:
ansible_user: root
# note the space between the IPs!
dns_servers: 8.8.8.8 8.8.4.4
agent:
vars:
ansible_ssh_common_args: -o StrictHostKeyChecking=accept-new -o ProxyCommand="ssh -p {{ hostvars[groups['server'][0]]['ansible_port'] }} -W %h:%p -q root@{{ api_endpoint }}"
k3s_version: v1.31.6+k3s1
server:
vars:
ansible_ssh_common_args: '-o StrictHostKeyChecking=accept-new'
k3s_version: v1.31.6+k3s1