forked from k-space/kube
178 lines
3.5 KiB
YAML
178 lines
3.5 KiB
YAML
|
apiVersion: v1
|
||
|
kind: ServiceAccount
|
||
|
metadata:
|
||
|
name: drone-runner-kube
|
||
|
---
|
||
|
apiVersion: v1
|
||
|
kind: ConfigMap
|
||
|
metadata:
|
||
|
name: application-config
|
||
|
data:
|
||
|
DRONE_DEBUG: "false"
|
||
|
DRONE_TRACE: "false"
|
||
|
DRONE_NAMESPACE_DEFAULT: "drone-execution"
|
||
|
DRONE_RPC_HOST: "drone.k-space.ee"
|
||
|
DRONE_RPC_PROTO: "https"
|
||
|
PLUGIN_MTU: "1300"
|
||
|
DRONE_SECRET_PLUGIN_ENDPOINT: "http://secrets:3000"
|
||
|
---
|
||
|
kind: Role
|
||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||
|
metadata:
|
||
|
name: drone-runner-kube
|
||
|
namespace: "drone-execution"
|
||
|
labels:
|
||
|
app: drone-runner-kube
|
||
|
rules:
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- secrets
|
||
|
verbs:
|
||
|
- create
|
||
|
- delete
|
||
|
- apiGroups:
|
||
|
- ""
|
||
|
resources:
|
||
|
- pods
|
||
|
- pods/log
|
||
|
verbs:
|
||
|
- get
|
||
|
- create
|
||
|
- delete
|
||
|
- list
|
||
|
- watch
|
||
|
- update
|
||
|
---
|
||
|
kind: RoleBinding
|
||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||
|
metadata:
|
||
|
name: drone-runner-kube
|
||
|
namespace: drone-execution
|
||
|
labels:
|
||
|
app: drone-runner-kube
|
||
|
subjects:
|
||
|
- kind: ServiceAccount
|
||
|
name: drone-runner-kube
|
||
|
namespace: drone-execution
|
||
|
roleRef:
|
||
|
kind: Role
|
||
|
name: drone-runner-kube
|
||
|
apiGroup: rbac.authorization.k8s.io
|
||
|
---
|
||
|
apiVersion: v1
|
||
|
kind: Service
|
||
|
metadata:
|
||
|
name: drone-runner-kube
|
||
|
labels:
|
||
|
app: drone-runner-kube
|
||
|
spec:
|
||
|
type: ClusterIP
|
||
|
ports:
|
||
|
- port: 3000
|
||
|
targetPort: http
|
||
|
protocol: TCP
|
||
|
name: http
|
||
|
selector:
|
||
|
app: drone-runner-kube
|
||
|
---
|
||
|
apiVersion: apps/v1
|
||
|
kind: Deployment
|
||
|
metadata:
|
||
|
name: drone-runner-kube
|
||
|
annotations:
|
||
|
keel.sh/policy: force
|
||
|
keel.sh/trigger: poll
|
||
|
keel.sh/pollSchedule: "@midnight"
|
||
|
spec:
|
||
|
replicas: 1
|
||
|
selector:
|
||
|
matchLabels:
|
||
|
app: drone-runner-kube
|
||
|
template:
|
||
|
metadata:
|
||
|
labels:
|
||
|
app: drone-runner-kube
|
||
|
spec:
|
||
|
serviceAccountName: drone-runner-kube
|
||
|
terminationGracePeriodSeconds: 3600
|
||
|
containers:
|
||
|
- name: server
|
||
|
securityContext:
|
||
|
{}
|
||
|
image: drone/drone-runner-kube
|
||
|
imagePullPolicy: Always
|
||
|
ports:
|
||
|
- name: http
|
||
|
containerPort: 3000
|
||
|
protocol: TCP
|
||
|
envFrom:
|
||
|
- configMapRef:
|
||
|
name: application-config
|
||
|
- secretRef:
|
||
|
name: application-secrets
|
||
|
---
|
||
|
apiVersion: apps/v1
|
||
|
kind: Deployment
|
||
|
metadata:
|
||
|
name: drone-kubernetes-secrets
|
||
|
annotations:
|
||
|
keel.sh/policy: force
|
||
|
keel.sh/trigger: poll
|
||
|
keel.sh/pollSchedule: "@midnight"
|
||
|
spec:
|
||
|
replicas: 1
|
||
|
selector:
|
||
|
matchLabels:
|
||
|
app: drone-kubernetes-secrets
|
||
|
template:
|
||
|
metadata:
|
||
|
labels:
|
||
|
app: drone-kubernetes-secrets
|
||
|
spec:
|
||
|
containers:
|
||
|
- name: secrets
|
||
|
image: drone/kubernetes-secrets
|
||
|
imagePullPolicy: Always
|
||
|
ports:
|
||
|
- containerPort: 3000
|
||
|
env:
|
||
|
- name: SECRET_KEY
|
||
|
valueFrom:
|
||
|
secretKeyRef:
|
||
|
name: application-secrets
|
||
|
key: DRONE_SECRET_PLUGIN_TOKEN
|
||
|
---
|
||
|
apiVersion: networking.k8s.io/v1
|
||
|
kind: NetworkPolicy
|
||
|
metadata:
|
||
|
name: drone-kubernetes-secrets
|
||
|
spec:
|
||
|
podSelector:
|
||
|
matchLabels:
|
||
|
app: drone-kubernetes-secrets
|
||
|
policyTypes:
|
||
|
- Ingress
|
||
|
ingress:
|
||
|
- from:
|
||
|
- podSelector:
|
||
|
matchLabels:
|
||
|
app: drone-runner-kube
|
||
|
ports:
|
||
|
- port: 3000
|
||
|
---
|
||
|
# Following should block access to pods in other namespaces, but should permit
|
||
|
# Git checkout, pip install, talking to Traefik via public IP etc
|
||
|
apiVersion: networking.k8s.io/v1
|
||
|
kind: NetworkPolicy
|
||
|
metadata:
|
||
|
name: drone-runner-kube
|
||
|
spec:
|
||
|
podSelector: {}
|
||
|
policyTypes:
|
||
|
- Egress
|
||
|
egress:
|
||
|
- to:
|
||
|
- ipBlock:
|
||
|
cidr: 0.0.0.0/0
|