continuous deploy - service account and gitea workflow

This commit is contained in:
Márcio Fernandes
2026-03-20 13:36:48 +00:00
parent 23c4b440ee
commit 249b1fb567
22 changed files with 275 additions and 106 deletions

View File

@@ -1 +0,0 @@
.kube/**

2
.devcontainer/.kube/.gitignore vendored Normal file
View File

@@ -0,0 +1,2 @@
**
!.gitignore

View File

@@ -0,0 +1,70 @@
on:
schedule:
- cron: '0 9 * * 0' # every sunday 9 am
push:
branches:
- main
pull_request:
branches:
- main
jobs:
continuous-deploy:
runs-on: ["deploy", "kubectl"]
env:
GITHUB_TEMP: ${{ runner.temp }} # fix missing GITHUB_TEMP on gitea
steps:
- name: Checkout code
uses: actions/checkout@v3
- name: limbo public actions
env:
WORKSPACE: "${{ gitea.workspace }}"
run: |
curl -fsSL https://git.limbosolutions.com/kb/gitea/raw/branch/main/cloud-scripts/setup-limbo-actions.sh | bash 2>&1
# limbo custom actions required https://git.limbosolutions.com/kb/gitea/raw/branch/main
- name: Configure kubectl config
uses: ./.gitea/limbo_actions/kubectl-setup
with:
kube_server: ${{ secrets.HOSTING_KUBE_SERVER }}
kube_ca_base64: ${{ secrets.HOSTING_KUBE_CA_BASE64 }}
kube_token: ${{ secrets.HOSTING_KUBE_TOKEN }}
- name: Deploy
shell: bash
env:
# cron jobs env
MARIADB_USER: ${{ secrets.MARIADB_USER }}
MARIADB_PASSWORD: ${{ secrets.MARIADB_PASSWORD }}
MARIADB_ROOT_PASSWORD: ${{ secrets.MARIADB_ROOT_PASSWORD }}
MARIADB_DATABASE: ${{ secrets.MARIADB_DATABASE }}
PBS_REPOSITORY: ${{ secrets.PBS_REPOSITORY }}
PBS_PASSWORD: ${{ secrets.PBS_PASSWORD }}
PBS_FINGERPRINT: ${{ secrets.PBS_FINGERPRINT }}
run: |
set -euo pipefail
# ensure cleanup always runs
trap 'rm -f \
deploy/app/.env.d/*' EXIT
# setup secrets files
echo "MARIADB_USER=${MARIADB_USER}" >> deploy/app/.env.d/nextcloud-mariadb.env
echo "MARIADB_PASSWORD=${MARIADB_USER}" >> deploy/app/.env.d/nextcloud-mariadb.env
echo "MARIADB_DATABASE=${MARIADB_DATABASE}" >> deploy/app/.env.d/nextcloud-mariadb.env
echo "PBS_REPOSITORY=${PBS_REPOSITORY}" >> deploy/app/.env.d/pbs.env
echo "PBS_PASSWORD=${PBS_PASSWORD}" >> deploy/app/.env.d/pbs.env
echo "PBS_FINGERPRINT=${PBS_FINGERPRINT}" >> deploy/app/.env.d/pbs.env
# enforce secrets files security
chmod 600 deploy/app/.env.d/*
# invoke deploy script
ops-scripts/apply-app.sh

9
.gitignore vendored
View File

@@ -1,5 +1,4 @@
**.env.**
.env
localSettings
archive
tmp/**
**.tmp**
**.cache**
**tmp**
**.cache**

View File

@@ -10,8 +10,9 @@ Using [NextCloud](https://nextcloud.com/)
- [preview generator](#preview-generator)
- [repair tree](#repair-tree)
- [delete file locks](#delete-file-locks)
- [Setup](#setup)
- [Requirements - infra](#requirements---infra)
- [Setup and Deploy](#setup-and-deploy)
- [App](#app)
- [Infra](#infra)
- [mariadb database](#mariadb-database)
## command
@@ -61,21 +62,45 @@ su -s /bin/bash www-data -c "php occ files:repair-tree"
DELETE FROM oc_file_locks WHERE 1;
```
## Setup
## Setup and Deploy
- deploy mariadb
- nextcloud helm chart
### App
**Security context:**
This script is intended to be executed only by lowprivilege deployment identities, such as the **continuousdeploy** ServiceAccount or an application maintainer with equivalent permissions.
```bash
./ops-scripts/apply-app.sh
```
## Requirements - infra
**Responsibilities:**
- Database deployment
- Persistent Volume Claims (storage.limbosolutions.com)
- Nextcloud Helm chart deployment
- Backup job deployment
**Requirements:**
- [infra](#infra)
### Infra
**Security context:**
This script requires elevated clusterlevel permissions and must be executed only by platform maintainers, not by the continuousdeploy identity.
```bash
./ops-scripts/apply-infra.sh
```
**Responsibilities:**
- Ingress controller deployment
- Persistent storage provisioning (storage.limbosolutions.com)
- services accounts:
- Continuous deploy - Deployment RBAC (ServiceAccount + Role + RoleBinding)
## mariadb database
**Connect to maria db:**

3
deploy/app/.env.d/.gitignore vendored Normal file
View File

@@ -0,0 +1,3 @@
**
!.gitignore
!**.example

View File

@@ -0,0 +1,4 @@
MARIADB_USER=????
MARIADB_PASSWORD=????
MARIADB_ROOT_PASSWORD=???
MARIADB_DATABASE=???

View File

@@ -0,0 +1,3 @@
NEXTCLOUD_HOST=????
NEXTCLOUD_USERNAME=????
NEXTCLOUD_PASSWORD=???

View File

@@ -0,0 +1,3 @@
PBS_REPOSITORY=????
PBS_PASSWORD=????
PBS_FINGERPRINT=???

2
deploy/app/.gitignore vendored Normal file
View File

@@ -0,0 +1,2 @@
**.local.**
**.private.**

View File

@@ -6,10 +6,51 @@ image:
replicaCount: 1
livenessProbe:
initialDelaySeconds: 60
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 6
readinessProbe:
initialDelaySeconds: 60
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 12
# ------------------------------------------------------------------------------
# Nextcloud maintenance mode & Kubernetes probes
# ------------------------------------------------------------------------------
# When performing upgrades or running `occ upgrade`, Nextcloud may return 503
# on /status.php until the database migration is complete. During this period,
# Kubernetes will repeatedly kill the pod because the readiness/liveness probes
# fail before the upgrade finishes.
#
# To prevent Kubernetes from terminating the pod during maintenance or upgrades,
# temporarily disable both probes. This allows the container to stay alive long
# enough for you to exec into it and run:
#
# php occ upgrade
#
# After the upgrade completes, reenable the probes.
#
# Example:
#
# livenessProbe:
# enabled: false
#
# readinessProbe:
# enabled: false
# ------------------------------------------------------------------------------
internalDatabase:
enabled: false
mariadb:
enabled: false
externalDatabase:
enabled: true
type: mysql
@@ -19,27 +60,15 @@ externalDatabase:
database: "???"
port: 3306
mariadb:
enabled: false
service:
type: ClusterIP
port: 8080
loadBalancerIP: ""
nodePort:
persistence:
enabled: true
accessMode: ReadWriteOnce
size: 8Gi
nextcloudData:
enabled: true
subPath:
annotations: {}
accessMode: ReadWriteOnce
size: 8Gi
resources:
limits:
cpu: "1"
@@ -55,27 +84,6 @@ resources:
cronjob:
enabled: true
## Cronjob sidecar resource requests and limits
## ref: http://kubernetes.io/docs/user-guide/compute-resources/
##
resources: {}
# Allow configuration of lifecycle hooks
# ref: https://kubernetes.io/docs/tasks/configure-pod-container/attach-handler-lifecycle-event/
lifecycle: {}
# postStartCommand: []
# preStopCommand: []
# Set securityContext parameters. For example, you may need to define runAsNonRoot directive
securityContext: {}
# runAsUser: 33
# runAsGroup: 33
# runAsNonRoot: true
# readOnlyRootFilesystem: true
# The command the cronjob container executes.
command:
- /cron.sh
nextcloud:
extraVolumes:
- name: mf-documents
@@ -139,48 +147,8 @@ nextcloud:
$CONFIG = array (
'maintenance_window_start' => 1,
);
# nextcloud:
# configs:
# logging.config.php: |-
# <?php
# $CONFIG = array (
# 'log_type' => 'file',
# 'logfile' => 'nextcloud.log',
# 'loglevel' => 0,
# 'logdateformat' => 'F d, Y H:i:s'
# );
ingress:
enabled: true
className: traefik
annotations:
kubernetes.io/ingress.class: traefik
cert-manager.io/cluster-issuer: "letsencrypt-prod"
traefik.ingress.kubernetes.io/router.entrypoints: websecure,public-https
# traefik.public-https.redirect.permanent: 'true'
# traefik.public-https.redirect.regex: 'https://(.*)/.well-known/(?:card|cal)dav'
# traefik.public-https.redirect.replacement: 'https://$$1/remote.php/dav'
# traefik.public-https.headers.STSPreload: 'true'
# traefik.public-https.headers.STSSeconds: '15552000'
# traefik.public-https.routers.nextcloud.middlewares: 'nextcloudHeader'
# traefik.web-secure.routers.nextcloud.middlewares: 'nextcloudHeader'
# traefik.websecure.headers.STSPreload: 'true'
# traefik.websecure.headers.STSSeconds: '15552000'
# traefik.websecure.redirect.permanent: 'true'
# traefik.websecure.redirect.regex: 'https://(.*)/.well-known/(?:card|cal)dav'
# traefik.websecure.redirect.replacement: 'https://$$1/remote.php/dav'
# hosts:
# - host: cloud.limbosolutions.com
# paths:
# - path: /
# pathType: Prefix
tls:
- secretName: cloud-limbosolutions-com-secret-tls
hosts:
- "cloud.limbosolutions.com"
enabled: false

View File

@@ -4,16 +4,16 @@ kind: Kustomization
secretGenerator:
- name: nextcloud-mariadb
envs:
- ./.env.d/nextcloud-mariadb.secrets
- ./.env.d/nextcloud-mariadb.env
- name: backup-secret
envs:
- ./.env.d/pbs.secrets
- ./.env.d/pbs.env
resources:
- ./persistent-volumes-claims.yaml
- ./storage-limbosolutions-com/pvc.yaml
- ./mariadb-deploy.yaml
- ./backup-cronjob.yaml
- ./backups/backup-pbs-cronjob.yaml
generatorOptions:
disableNameSuffixHash: true

View File

@@ -3,7 +3,6 @@ apiVersion: v1
kind: Service
metadata:
name: nextcloud-mariadb
namespace: cloud-limbosolutions-com
spec:
clusterIP: None
selector:

View File

@@ -3,7 +3,6 @@ apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mf-documents-limbosolutions-com
namespace: cloud-limbosolutions-com
spec:
storageClassName: storage-limbosolutions-com
volumeName: mf-documents-limbosolutions-com-nextcloud
@@ -18,7 +17,6 @@ apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: media-music-limbosolutions-com
namespace: cloud-limbosolutions-com
spec:
storageClassName: storage-limbosolutions-com
volumeName: media-music-limbosolutions-com-nextcloud
@@ -34,7 +32,6 @@ apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: media-videos-limbosolutions-com
namespace: cloud-limbosolutions-com
spec:
storageClassName: storage-limbosolutions-com
volumeName: media-videos-limbosolutions-com-nextcloud
@@ -50,7 +47,6 @@ apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: media-gaming-limbosolutions-com
namespace: cloud-limbosolutions-com
spec:
storageClassName: storage-limbosolutions-com
volumeName: media-gaming-limbosolutions-com-nextcloud
@@ -66,7 +62,6 @@ apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: it-storage-limbosolutions-com
namespace: cloud-limbosolutions-com
spec:
storageClassName: storage-limbosolutions-com
volumeName: it-storage-limbosolutions-com-nextcloud
@@ -81,10 +76,11 @@ apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mf-gallery-limbosolutions-com
namespace: cloud-limbosolutions-com
spec:
storageClassName: storage-limbosolutions-com
volumeName: mf-gallery-limbosolutions-com-nextcloud
accessModes:
- ReadWriteMany
resources:
@@ -97,7 +93,6 @@ apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: mf-nextcloud-limbosolutions-com
namespace: cloud-limbosolutions-com
spec:
storageClassName: storage-limbosolutions-com
volumeName: mf-nextcloud-limbosolutions-com-nextcloud

View File

@@ -1 +0,0 @@
**.local**.yaml

View File

@@ -0,0 +1,50 @@
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: continuous-deploy
rules:
- apiGroups: [""]
resources: ["pods", "services", "secrets", "configmaps", "persistentvolumeclaims"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
- apiGroups: ["apps"]
resources: ["deployments", "statefulsets"]
verbs: ["get", "watch", "list", "create", "update", "patch", "delete"]
- apiGroups: ["batch"]
resources: ["cronjobs", "jobs"]
verbs: ["get", "list", "watch", "create", "update", "patch", "delete"]
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: continuous-deploy
---
apiVersion: v1
kind: Secret
metadata:
name: continuous-deploy
annotations:
kubernetes.io/service-account.name: continuous-deploy
type: kubernetes.io/service-account-token
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: continuous-deploy
subjects:
- kind: ServiceAccount
name: continuous-deploy
roleRef:
kind: Role
name: continuous-deploy
apiGroup: rbac.authorization.k8s.io

26
deploy/infra/ingress.yaml Normal file
View File

@@ -0,0 +1,26 @@
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: cloud-limbosolutions-com
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod
kubernetes.io/ingress.class: traefik
traefik.ingress.kubernetes.io/router.entrypoints: websecure, public-https
spec:
ingressClassName: traefik
rules:
- host: cloud.limbosolutions.com
http:
paths:
- backend:
service:
name: nextcloud
port:
number: 8080
path: /
pathType: Prefix
tls:
- secretName: cloud-limbosolutions-com-secret-tls
hosts:
- cloud.limbosolutions.com

View File

@@ -2,6 +2,8 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- namespace.yaml
- cd-serviceaccount.yaml
- ingress.yaml
- storage-limbosolutions-com/pv.yaml
generatorOptions:
disableNameSuffixHash: true

View File

@@ -4,12 +4,32 @@ echo "Executing app deploy."
kubectl kustomize deploy/app | kubectl apply -f -
load_env_file() {
local file="$1"
helm repo add nextcloud https://nextcloud.github.io/helm/ 2>/dev/null || true
helm repo update nextcloud
if [ -f "$file" ]; then
echo "Loading environment variables from: $file"
set -a
. "$file"
set +a
else
echo "Skipping missing env file: $file"
fi
}
helm repo add nextcloud https://nextcloud.github.io/helm/ --force-update
load_env_file "deploy/app/.env.d/nextcloud-mariadb.env"
load_env_file "deploy/app/.env.d/nextcloud.env"
helm upgrade --install nextcloud nextcloud/nextcloud \
--values ./deploy/helm/values.yaml \
--values ./deploy/helm/values.local.yaml \
--values ./deploy/app/helm-values.yaml \
--set externalDatabase.user=${MARIADB_USER} \
--set externalDatabase.password=${MARIADB_PASSWORD} \
--set externalDatabase.database=${MARIADB_DATABASE} \
--set nextcloud.host=${NEXTCLOUD_HOST} \
--set nextcloud.username=${NEXTCLOUD_USERNAME} \
--set nextcloud.password=${NEXTCLOUD_PASSWORD} \
--namespace cloud-limbosolutions-com

View File

@@ -2,6 +2,6 @@
set -e
echo "Executing infra deploy."
kubectl kustomize deploy/infra | kubectl apply -f -
kubectl kustomize deploy/infra | kubectl -n cloud-limbosolutions-com apply -f -