diff --git a/deployment/helm/ci/argocd.yaml b/deployment/helm/ci/argocd.yaml new file mode 100644 index 0000000000000000000000000000000000000000..05d3988b32c0063c6b55d3c4fa957e0b205325cd --- /dev/null +++ b/deployment/helm/ci/argocd.yaml @@ -0,0 +1,30 @@ +# ArgoCD Application Definition +source: + repoURL: "{{ .RepoURL }}" + path: "{{ .Path }}" + targetRevision: "{{ .TargetRevision }}" + +applications: + - name: apps-of-apps + namespace: argocd + enabled: true + k8sAPI: https://kubernetes.default.svc + project: my-project + sourcePath: "." + sourceRef: "main" + chartName: "my-name" + ignoreDifferences: + - group: admissionregistration.k8s.io + kind: ValidatingWebhookConfiguration + name: cert-manager-webhook + jsonPointers: + - /webhooks/0/namespaceSelector/matchExpressions/2 + helmValues: + - my_chart/values.yaml # Include values from the Helm chart + + - name: example-app + enabled: true + sourcePath: "." + helmValues: + - my_chart/values.yaml # Include values from the Helm chart + - my_chart/example-values.yaml # Include additional example-specific values diff --git a/deployment/helm/templates/argocd/argo-application.yaml b/deployment/helm/templates/argocd/argo-application.yaml new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/deployment/helm/templates/argocd/argo-project.yaml b/deployment/helm/templates/argocd/argo-project.yaml new file mode 100644 index 0000000000000000000000000000000000000000..e69de29bb2d1d6434b8b29ae775ad8c2e48c5391 diff --git a/deployment/helm/templates/istio/autorization-rules.yaml b/deployment/helm/templates/istio/autorization-rules.yaml new file mode 100644 index 0000000000000000000000000000000000000000..9800b2de4c0401fd41c2a49ca842cfd7cb905a38 --- /dev/null +++ b/deployment/helm/templates/istio/autorization-rules.yaml @@ -0,0 +1,18 @@ +# templates/istio/authorization-rules.yaml +apiVersion: security.istio.io/v1beta1 +kind: AuthorizationPolicy +metadata: + name: { { include "my_chart.fullname" . } } +spec: + selector: + matchLabels: + app.kubernetes.io/name: { { include "my_chart.name" . } } + app.kubernetes.io/instance: { { .Release.Name } } + action: ALLOW + rules: + - from: + - source: + principals: ["cluster.local/ns/default/sa/default"] + to: + - operation: + methods: ["GET"] diff --git a/deployment/helm/templates/istio/gateway.yaml b/deployment/helm/templates/istio/gateway.yaml new file mode 100644 index 0000000000000000000000000000000000000000..65dfaa3545bab83e5064d7f7f7d222d48bdf66e6 --- /dev/null +++ b/deployment/helm/templates/istio/gateway.yaml @@ -0,0 +1,15 @@ +# templates/istio/gateway.yaml +apiVersion: networking.istio.io/v1alpha3 +kind: Gateway +metadata: + name: my-chart-gateway +spec: + selector: + istio: ingressgateway + servers: + - port: + number: 80 + name: http + protocol: HTTP + hosts: + - "*" diff --git a/deployment/helm/templates/istio/virtual-service.yaml b/deployment/helm/templates/istio/virtual-service.yaml new file mode 100644 index 0000000000000000000000000000000000000000..28307d401c7d3232454db523645c09e93977d789 --- /dev/null +++ b/deployment/helm/templates/istio/virtual-service.yaml @@ -0,0 +1,16 @@ +# templates/istio/virtual-service.yaml +apiVersion: networking.istio.io/v1alpha3 +kind: VirtualService +metadata: + name: { { include "my_chart.fullname" . } } +spec: + hosts: + - "*" + gateways: + - my-chart-gateway + http: + - route: + - destination: + host: { { include "my_chart.fullname" . } } + port: + number: 80