chore: add current provisioning state before migration

This commit is contained in:
Jesús Pérez 2025-09-22 23:11:41 +01:00
parent a9703b4748
commit 50745b0f22
660 changed files with 88126 additions and 0 deletions

View file

@ -0,0 +1,71 @@
if _kys != Undefined and _kys.gitea_adm_usr != Undefined and _kys.gitea_adm_usr.name:
_adm_user = {
name = _kys.gitea_adm_usr.name
password = _kys.gitea_adm_usr.password
email = _kys.gitea_adm_usr.email
}
else:
_adm_user = {
name = ""
password = ""
email = ""
}
if _kys != Undefined and _kys.gitea_db_usr != Undefined and _kys.gitea_db_usr.name:
_db_usr_name = _kys.gitea_db_usr.name
_db_usr_password = _kys.gitea_db_usr.password
else:
_db_usr_name = ""
_db_usr_password = ""
_db_postgres = {
typ = "postgres"
host = "127.0.0.1:5432"
# host = "$network_private_ip:5432"
name = "repo"
user = _db_usr_name
password = _db_usr_password
# charset = "utf8"
# ssl_mode = "disable"
}
#_db_sqlite = {
# typ = "sqlite"
# name = "repo"
# path = "/var/lib/gitea/gitea.db" # Only for sqlite"
#}
taskserv = Gitea_SSH_SSL {
version = "1.22.1"
app_name = "Local Repo CloudNative zone"
# run_user = { name = "gitea" }
adm_user = _adm_user
db = _db_postgres
#db = _db_sqlite
# work_path = "/var/lib/gitea"
# etc_path = "/etc/gitea"
# config_path = "app.ini"
# run_path = "/usr/local/bin/gitea"
http_addr = "$network_private_ip"
# http_port = 3000
root_url = "https://localrepo.cloudnative.zone"
domain = "localrepo.cloudnative.zone"
ssh_domain = "localrepo.cloudnative.zone"
# ssh_port = 2022
# start_ssh_server = True
# builtin_ssh_server_user = "git"
# ssh_root_path = "/home/gitea/.ssh"
certs_path = "/etc/gitea/ssl"
# cert_file = "/etc/gitea/ssl/fullchain.pem"
# key_file = "/etc/gitea/ssl/privkey.pem"
# disable_registration = True
# require_signin_view = False
cdci_user = "devadm"
cdci_group = "devadm"
cdci_user_home = "/home/devadm"
cdci_key = "~/.ssh/id_cdci"
webhook_allowed_hosts_list = "$defaults.priv_cidr_block"
copy_paths = ["repo-ssl|ssl"]
}

View file

@ -0,0 +1,69 @@
_http = OCIRegHTTP {
address = "0.0.0.0",
port = 5000
realm = "zot"
tls = OCIRegTLS {
cert = "/etc/zot/ssl/fullchain.pem",
key = "/etc/zot/ssl/privkey.pem"
}
auth = OCIRegAuth {
htpasswd = OCIRegHtpasswd { path = "/etc/zot/htpasswd" }
failDelay = 5
}
}
_log = OCIRegLog {
level = "debug",
output = "/var/log/zot/zot.log",
audit = "/var/log/zot/zot-audit.log"
}
if _kys != Undefined and _kys.oci_reg_s3.accesskey != Undefined and _kys.oci_reg_s3.accesskey != "":
#if _kys.storageDriver == Undefined:
_oci_config = OCIRegConfig {
storage = OCIRegStorage {
rootDirectory = "/data/zot/"
dedupe = True
storageDriver = OCIRegStorageDriver {
name = "s3",
rootdirectory = "/zot",
region = "europe-1",
bucket = "reg",
secure = True,
regionendpoint ="https://0jgn0-private.upcloudobjects.com"
accesskey = _kys.oci_reg_s3.accesskey,
secretkey = _kys.oci_reg_s3.secretkey,
skipverify = False
}
}
http = _http
log = _log
extensions = OCIRegExtensions {
ui: OCIRegExtUI { enable: True }
# cve not working with S3
# search: OCIRegExtSearch { enable: True }
}
}
else:
_oci_config = OCIRegConfig {
storage = OCIRegStorage {
rootDirectory = "/data/zot/"
gc = True
gcDelay = "1h"
gcInterval = "6h"
}
http = _http
log = _log
extensions = OCIRegExtensions {
ui: OCIRegExtUI { enable: True }
search: OCIRegExtSearch { enable: True }
}
}
taskserv = OCIReg {
version = "2.0.3"
name = "oci-reg"
oci_memory_high = 15
oci_memory_max = 16
copy_paths = ["reg-ssl|ssl", "oci-reg/htpasswd|htpasswd"]
config = _oci_config
}

View file

@ -0,0 +1,5 @@
taskserv = Oras {
version = "1.2.0-beta.1"
name = "oras"
copy_paths = ["oci-reg/zli-cfg|zli-cfg","oci-reg/docker-config|docker-config"]
}