2025-01-27 18:35:04 +01:00
|
|
|
#!/bin/bash
|
|
|
|
|
|
|
|
if [ "$IMAGE_TAG" == "" ]; then
|
|
|
|
echo "Make sure IMAGE_TAG is set"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
if [ "$GPG_PASSPHRASE" == "" ]; then
|
|
|
|
echo "Make sure GPG_PASSPHRASE is set"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
|
2025-03-12 12:57:45 +01:00
|
|
|
IMAGE_NAME=gitea.hottis.de/wn/numbers
|
2025-01-27 18:36:43 +01:00
|
|
|
NAMESPACE=homea
|
2025-01-27 18:35:04 +01:00
|
|
|
DEPLOYMENT_DIR=$PWD/deployment
|
|
|
|
|
|
|
|
pushd $DEPLOYMENT_DIR > /dev/null
|
|
|
|
kubectl create namespace $NAMESPACE \
|
|
|
|
--dry-run=client \
|
|
|
|
-o yaml | \
|
|
|
|
kubectl -f - apply
|
|
|
|
|
2025-01-29 17:28:12 +01:00
|
|
|
# SECRETS_FILE=`mktemp`
|
|
|
|
# gpg --decrypt --passphrase $GPG_PASSPHRASE --yes --batch --homedir /tmp/.gnupg --output $SECRETS_FILE secrets.asc
|
|
|
|
# . $SECRETS_FILE
|
|
|
|
# rm $SECRETS_FILE
|
|
|
|
eval "`cat secrets.asc | /usr/local/bin/decrypt-secrets.sh`"
|
2025-01-27 18:35:04 +01:00
|
|
|
|
2025-03-12 15:43:33 +01:00
|
|
|
kubectl create secret generic numbers \
|
2025-01-27 18:35:04 +01:00
|
|
|
--dry-run=client \
|
|
|
|
-o yaml \
|
|
|
|
--save-config \
|
2025-01-27 18:47:27 +01:00
|
|
|
--from-literal=REDIS_URL="$REDIS_URL" \
|
|
|
|
--from-literal=SECRET_KEY="$SECRET_KEY" \
|
|
|
|
--from-literal=PGPASSWORD="$PGPASSWORD" \
|
|
|
|
--from-literal=PGUSER="$PGUSER" \
|
|
|
|
--from-literal=PGHOST="$PGHOST" \
|
|
|
|
--from-literal=PGSSLMODE="$PGSSLMODE" \
|
|
|
|
--from-literal=PGDATABASE="$PGDATABASE" \
|
2025-01-27 18:56:13 +01:00
|
|
|
--from-literal=OIDC_CLIENT_SECRETS="$OIDC_CLIENT_SECRETS" | \
|
2025-01-27 18:35:04 +01:00
|
|
|
kubectl apply -f - -n $NAMESPACE
|
|
|
|
|
2025-01-27 19:03:21 +01:00
|
|
|
cat $DEPLOYMENT_DIR/deploy-yml.tmpl | \
|
|
|
|
sed -e 's,%IMAGE%,'$IMAGE_NAME':'$IMAGE_TAG','g | \
|
|
|
|
kubectl apply -f - -n $NAMESPACE
|
2025-01-27 18:35:04 +01:00
|
|
|
|
|
|
|
popd > /dev/null
|
|
|
|
|
|
|
|
|