Commit cba25518 authored by Jonas Waeber's avatar Jonas Waeber
Browse files

Remove obsolete k8s manifests

parent 47340071
apiVersion: v1
kind: ConfigMap
metadata:
name: "api-autodeploy-prod-config-map"
namespace: "memobase"
data:
GITLAB_REGISTRY: "cr.gitlab.switch.ch"
FLASK_ENV: "production"
apiVersion: apps/v1
kind: Deployment
metadata:
name: "api-autodeploy-prod-service"
namespace: memobase
spec:
selector:
matchLabels:
app: "api-autodeploy-prod-app"
replicas: 1
template:
metadata:
labels:
app: "api-autodeploy-prod-app"
group: "api"
environment: "prod"
spec:
serviceAccountName: "api-autodeploy-prod-service-account"
containers:
- name: "api-autodeploy-prod-container"
image: "cr.gitlab.switch.ch/memoriav/memobase-2020/services/autodeploy-service:latest"
imagePullPolicy: "Always"
envFrom:
- configMapRef:
name: "api-autodeploy-prod-config-map"
ports:
- containerPort: 5000
name: http
protocol: TCP
imagePullPolicy: Always
resources:
requests:
cpu: "0.2"
memory: "128Mi"
limits:
cpu: "0.4"
memory: "256Mi"
apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
namespace: "memobase"
name: "api-autodeploy-prod-ingress"
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/rewrite-target: /
spec:
tls:
- hosts:
- "autodeploy.memobase.k8s.unibas.ch"
secretName: "autodeploy.memobase.k8s.unibas.ch-tls"
rules:
- host: "autodeploy.memobase.k8s.unibas.ch"
http:
paths:
- path: /
backend:
serviceName: "api-autodeploy-prod-service"
servicePort: 5000
apiVersion: v1
kind: ServiceAccount
metadata:
name: "api-autodeploy-prod-service-account"
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: "api-autodeploy-prod-role"
namespace: "memobase"
rules:
- apiGroups: ["", "apps", "networking.k8s.io", "rbac.authorization.k8s.io"] # "" indicates the core API group
resources: ["deployments", "pods", "ingresses", "serviceaccounts", "roles", "rolebindings", "services", "secrets", "configmaps", "jobs"]
verbs: ["apply", "get", "list", "create", "watch", "create", "update", "patch", "delete", "bind"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: "api-autodeploy-prod-role-binding"
namespace: "memobase"
subjects:
- kind: ServiceAccount
name: "api-autodeploy-prod-service-account"
namespace: "memobase"
roleRef:
kind: Role
name: "api-autodeploy-prod-role"
apiGroup: rbac.authorization.k8s.io
apiVersion: v1
kind: Service
metadata:
namespace: "memobase"
name: "api-autodeploy-prod"
labels:
app: "api-autodeploy-prod-app"
spec:
ports:
- port: 5000
selector:
app: "api-autodeploy-prod-app"
group: "api"
environment: "prod"
clusterIP: None
apiVersion: v1
kind: ConfigMap
metadata:
name: "api-autodeploy-test-config-map"
namespace: "memobase"
data:
GITLAB_REGISTRY: "cr.gitlab.switch.ch"
FLASK_ENV: "development"
apiVersion: apps/v1
kind: Deployment
metadata:
name: "api-autodeploy-test-service"
namespace: memobase
spec:
selector:
matchLabels:
app: "api-autodeploy-test-app"
replicas: 1
template:
metadata:
labels:
app: "api-autodeploy-test-app"
group: "api"
environment: "test"
spec:
serviceAccountName: "api-autodeploy-test-service-account"
containers:
- name: "api-autodeploy-test-container"
image: "cr.gitlab.switch.ch/memoriav/memobase-2020/services/autodeploy-service:latest"
envFrom:
- configMapRef:
name: "api-autodeploy-test-config-map"
ports:
- containerPort: 5000
name: http
protocol: TCP
imagePullPolicy: Always
resources:
requests:
cpu: "0.2"
memory: "128Mi"
limits:
cpu: "0.4"
memory: "256Mi"
apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
namespace: "memobase"
name: "api-autodeploy-test-ingress"
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/rewrite-target: /
spec:
tls:
- hosts:
- "autodeploy.memobase.k8s.unibas.ch"
secretName: "autodeploy.memobase.k8s.unibas.ch-tls"
rules:
- host: "autodeploy.memobase.k8s.unibas.ch"
http:
paths:
- path: /
backend:
serviceName: "api-autodeploy-test-service"
servicePort: 5000
apiVersion: v1
kind: ServiceAccount
metadata:
name: "api-autodeploy-test-service-account"
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: "api-autodeploy-test-role"
namespace: "memobase"
rules:
- apiGroups: ["", "apps", "networking.k8s.io", "rbac.authorization.k8s.io"] # "" indicates the core API group
resources: ["deployments", "pods", "ingresses", "serviceaccounts", "roles", "rolebindings", "services", "secrets", "configmaps", "jobs"]
verbs: ["apply", "get", "list", "create", "watch", "create", "update", "patch", "delete", "bind"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: "api-autodeploy-test-role-binding"
namespace: "memobase"
subjects:
- kind: ServiceAccount
name: "api-autodeploy-test-service-account"
namespace: "memobase"
roleRef:
kind: Role
name: "api-autodeploy-test-role"
apiGroup: rbac.authorization.k8s.io
apiVersion: v1
kind: Service
metadata:
namespace: "memobase"
name: "api-autodeploy-test"
labels:
app: "api-autodeploy-test-app"
spec:
ports:
- port: 5000
selector:
app: "api-autodeploy-test-app"
group: "api"
environment: "test"
clusterIP: None
Markdown is supported
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment