diff --git a/argocd/apps/n8n/values-n8n.new b/argocd/apps/n8n/values-n8n.new new file mode 100644 index 0000000..cb5e47b --- /dev/null +++ b/argocd/apps/n8n/values-n8n.new @@ -0,0 +1,44 @@ +apiVersion: argoproj.io/v1alpha1 +kind: Application +metadata: + name: n8n + finalizers: + - resources-finalizer.argocd.argoproj.io +spec: + project: default + source: + repoURL: 'https://community-charts.github.io/helm-charts' + targetRevision: 1.*.* + chart: n8n + helm: + values: | + binaryData: + s3: + host: "https://sws3.innovation-hub-niedersachsen.de" + bucketName: "n8n" + + + ingress: + enabled: true + ingressClassName: "traefik" + ingress_annotations: + cert-manager.io/cluster-issuer: lets-encrypt + traefik.ingress.kubernetes.io/router.entrypoints: websecure + host: "n8n.innovation-hub-niedersachsen.de" + tls: true + tlsSecret: n8n-tls + path: / + + + destination: + server: 'https://kubernetes.default.svc' + namespace: n8n + syncPolicy: + managedNamespaceMetadata: + labels: + pod-security.kubernetes.io/enforce: "privileged" + automated: + selfHeal: true + prune: true + syncOptions: + - CreateNamespace=true diff --git a/argocd/apps/seaweedfs/admin-s3-secrets.yaml b/argocd/apps/seaweedfs/admin-s3-secrets.yaml index 5339e70..792039b 100644 --- a/argocd/apps/seaweedfs/admin-s3-secrets.yaml +++ b/argocd/apps/seaweedfs/admin-s3-secrets.yaml @@ -21,9 +21,9 @@ stringData: } ], "actions": [ - "Admin", "Read", - "Write" + "Write", + "Admin" ] }, { @@ -35,9 +35,23 @@ stringData: } ], "actions": [ - "Admin", "Read", - "Write" + "Write", + "Admin" + ] + }, + { + "name": "n8n", + "credentials": [ + { + "accessKey": "WPpTwIoSMgrPChsS3rdS", + "secretKey": "C59o3EAhsUKBWj1oiPtiYRq3GhLMFeYDeiMxJ4SW" + } + ], + "actions": [ + "Read", + "Write", + "Admin" ] } ] diff --git a/argocd/apps/seaweedfs/tvetmp b/argocd/apps/seaweedfs/tvetmp new file mode 100644 index 0000000..8781d99 --- /dev/null +++ b/argocd/apps/seaweedfs/tvetmp @@ -0,0 +1,3 @@ +{ + "seaweedfs_s3_config": "{\n \"identities\": [\n {\n \"name\": \"tatort\",\n \"credentials\": [\n {\n \"accessKey\": \"wjpKrmaqXra99rX3D61H\",\n \"secretKey\": \"fTPi0u0FR6Lv9Y9IKydWv6WM0EA5XrsK008HCt9u\"\n }\n ],\n \"actions\": [\n \"Admin\",\n \"Read\",\n \"Write\"\n ]\n },\n {\n \"name\": \"plane\",\n \"credentials\": [\n {\n \"accessKey\": \"a0ccb47cc0994bf51ecd\",\n \"secretKey\": \"0d54ee2f943f2a56b8cafc3afe9cb1e2f9fecac2\"\n }\n ],\n \"actions\": [\n \"Admin\",\n \"Read\",\n \"Write\"\n ]\n }\n ]\n}\n" +}