Compare commits
19 Commits
a70262505c
...
b600edea4f
Author | SHA1 | Date |
---|---|---|
Mathis | b600edea4f | |
Renovate Bot | c8f12f7ad8 | |
Mathis | baba6323db | |
Mathis | 7a7fc88c6f | |
Mathis | 4c41a50c32 | |
Mathis | fce4044036 | |
Renovate Bot | 95000d3ec0 | |
Renovate Bot | c8602ba269 | |
Renovate Bot | b4fb530c73 | |
Renovate Bot | 4465b7ac0f | |
Renovate Bot | 90dcac8fdc | |
Renovate Bot | f5219b568d | |
Mathis | 9311774b35 | |
Mathis | dbdd1452bf | |
Mathis | ad3516609e | |
Mathis | 86c4255d53 | |
Mathis | f37f961a10 | |
LordMathis | 76bb29e566 | |
LordMathis | 4d48b8355d |
|
@ -7,6 +7,7 @@ resources:
|
|||
- gitea-ingress.yaml
|
||||
- runner-pvc.yaml
|
||||
- runner-deployment.yaml
|
||||
- ./restic
|
||||
|
||||
generators:
|
||||
- secret-generator.yaml
|
||||
|
@ -21,7 +22,7 @@ helmCharts:
|
|||
valuesFile: gitea-values.yaml
|
||||
- name: renovate
|
||||
releaseName: renovate
|
||||
version: 37.163.2
|
||||
version: 37.183.0
|
||||
repo: https://docs.renovatebot.com/helm-charts
|
||||
namespace: gitea
|
||||
valuesFile: renovate-bot-values.yaml
|
||||
|
|
|
@ -0,0 +1,22 @@
|
|||
#!/bin/sh
|
||||
|
||||
# Set up colors
|
||||
GREEN='\033[0;32m'
|
||||
NC='\033[0m'
|
||||
|
||||
echo -e "\n${GREEN}`date` - Starting backup...${NC}\n"
|
||||
|
||||
restic unlock
|
||||
|
||||
# Gitea
|
||||
echo -e "\n${GREEN}`date` - Backing up Gitea...${NC}\n"
|
||||
gitea=$(kubectl get deploy -n gitea -l app=gitea -o name --no-headers=true)
|
||||
kubectl scale -n gitea --replicas=0 $gitea
|
||||
restic backup /gitea
|
||||
restic backup /backup/postgres_backup.dump
|
||||
kubectl scale -n gitea --replicas=1 $gitea
|
||||
|
||||
# Forget and prune
|
||||
echo -e "\n${GREEN}`date` - Running forget and prune...${NC}\n"
|
||||
restic forget --prune --keep-daily 7 --keep-weekly 2
|
||||
echo -e "\n${GREEN}`date` - Backup finished.${NC}\n"
|
|
@ -0,0 +1,58 @@
|
|||
apiVersion: batch/v1
|
||||
kind: CronJob
|
||||
metadata:
|
||||
name: restic-backup-cronjob
|
||||
namespace: gitea
|
||||
spec:
|
||||
schedule: "0 2 * * *" # Cron expression for running daily at 2 AM
|
||||
jobTemplate:
|
||||
spec:
|
||||
template:
|
||||
spec:
|
||||
|
||||
serviceAccountName: restic-sa
|
||||
hostname: restic-cronjob
|
||||
|
||||
volumes:
|
||||
- name: gitea-data
|
||||
persistentVolumeClaim:
|
||||
claimName: gitea-shared-storage
|
||||
- name: restic-backup-vol
|
||||
persistentVolumeClaim:
|
||||
claimName: restic-backup-vol
|
||||
- name: backup-script-vol
|
||||
configMap:
|
||||
name: restic-backup-script
|
||||
|
||||
initContainers:
|
||||
- name: postgres-dump-init
|
||||
image: bitnami/postgresql:15.3.0-debian-11-r24
|
||||
command: ["/bin/sh", "-c"]
|
||||
args: ["pg_dump -h gitea-postgresql -p 5432 -U gitea gitea -Fc > /backup/postgres_backup.dump"]
|
||||
env:
|
||||
- name: PGPASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: gitea-postgresql
|
||||
key: postgres-password
|
||||
volumeMounts:
|
||||
- name: restic-backup-vol
|
||||
mountPath: /backup
|
||||
|
||||
containers:
|
||||
- name: restic-container
|
||||
image: git.namesny.com/cluster/restic:latest
|
||||
imagePullPolicy: Always
|
||||
command: ["/bin/sh", "/app/backup.sh"]
|
||||
envFrom:
|
||||
- secretRef:
|
||||
name: restic-secret
|
||||
volumeMounts:
|
||||
- name: restic-backup-vol
|
||||
mountPath: /backup
|
||||
- name: gitea-data
|
||||
mountPath: /gitea
|
||||
- name: backup-script-vol
|
||||
mountPath: /app
|
||||
|
||||
restartPolicy: OnFailure
|
|
@ -0,0 +1,28 @@
|
|||
apiVersion: v1
|
||||
kind: Pod
|
||||
metadata:
|
||||
name: restic-debug-pod
|
||||
namespace: gitea
|
||||
spec:
|
||||
serviceAccountName: restic-sa
|
||||
volumes:
|
||||
- name: restic-backup-vol
|
||||
persistentVolumeClaim:
|
||||
claimName: restic-backup-vol
|
||||
- name: gitea-data
|
||||
persistentVolumeClaim:
|
||||
claimName: gitea-shared-storage
|
||||
containers:
|
||||
- name: restic-debug
|
||||
image: git.namesny.com/cluster/restic:latest
|
||||
command: ["/bin/sh", "-c"]
|
||||
args: ["sleep infinity"]
|
||||
envFrom:
|
||||
- secretRef:
|
||||
name: restic-secret
|
||||
volumeMounts:
|
||||
- name: restic-backup-vol
|
||||
mountPath: /backup
|
||||
- name: gitea-data
|
||||
mountPath: /gitea
|
||||
|
|
@ -0,0 +1,21 @@
|
|||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
namespace: gitea
|
||||
|
||||
resources:
|
||||
- service-account.yaml
|
||||
- role.yaml
|
||||
- role-binding.yaml
|
||||
- pvc.yaml
|
||||
- debug-pod.yaml
|
||||
- cronjob.yaml
|
||||
|
||||
generators:
|
||||
- secret-generator.yaml
|
||||
|
||||
configMapGenerator:
|
||||
- name: restic-backup-script
|
||||
namespace: gitea
|
||||
files:
|
||||
- ./backup.sh
|
||||
|
|
@ -0,0 +1,12 @@
|
|||
kind: PersistentVolumeClaim
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: restic-backup-vol
|
||||
namespace: gitea
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
resources:
|
||||
requests:
|
||||
storage: 5Gi
|
||||
storageClassName: retain-local-path
|
|
@ -0,0 +1,13 @@
|
|||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: restic-role-binding
|
||||
namespace: gitea
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: restic-sa
|
||||
namespace: gitea
|
||||
roleRef:
|
||||
kind: Role
|
||||
name: restic-role
|
||||
apiGroup: rbac.authorization.k8s.io
|
|
@ -0,0 +1,9 @@
|
|||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: Role
|
||||
metadata:
|
||||
name: restic-role
|
||||
namespace: gitea
|
||||
rules:
|
||||
- apiGroups: ["apps"]
|
||||
resources: ["deployments", "deployments/scale"]
|
||||
verbs: ["get", "list", "update", "patch"]
|
|
@ -0,0 +1,11 @@
|
|||
apiVersion: viaduct.ai/v1
|
||||
kind: ksops
|
||||
metadata:
|
||||
name: restic-secret-generator
|
||||
annotations:
|
||||
config.kubernetes.io/function: |
|
||||
exec:
|
||||
path: ksops
|
||||
files:
|
||||
- ./secret.enc.yaml
|
||||
|
|
@ -0,0 +1,30 @@
|
|||
apiVersion: v1
|
||||
kind: Secret
|
||||
metadata:
|
||||
name: restic-secret
|
||||
namespace: gitea
|
||||
stringData:
|
||||
AWS_ACCESS_KEY_ID: ENC[AES256_GCM,data:IjDw3i+8BIvA816obn5BpQBTkzo=,iv:A/CrhyIm5kljCwvneQziux36O6+SWG5Z9mOlV+mRIXQ=,tag:XVh4X8Xf587nmbDCtgazAg==,type:str]
|
||||
AWS_SECRET_ACCESS_KEY: ENC[AES256_GCM,data:WdfHxdXnPOLvIOecN+WFONAEDr2Sc/r6bKQ/H9KS1BT2C9cj,iv:GCY6MaSEhu9WEsVA23hWN30Ix7x6dz/umNRsQ0jsb8I=,tag:8Qa0dvU3bq+J2S6trBDFDw==,type:str]
|
||||
RESTIC_REPOSITORY: ENC[AES256_GCM,data:FZCqro3fpgQ7NJc+4ORVC2yWdqMNCLd4AjCwdolXgu5uJXq0IQ==,iv:nWttNrSvFpcj1HMOFwZNfJqVUy0esR7fVXlvidp3MlY=,tag:T0HzAZ/w83IFrvap8Gx3gg==,type:str]
|
||||
RESTIC_PASSWORD: ENC[AES256_GCM,data:PjSE4FejVPW8e8e/PDtoSCsuskI=,iv:MTUMYim3obMHaYBEoEJBMEj9GMbaqdbdVV09o3ep/fw=,tag:pQ6vakVWHUdk4F/PwqpgAw==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age:
|
||||
- recipient: age14dgmts59tc2gv2xu9305auvu854n3pfl8vkheqzzqyrygyeequ0sjhl92v
|
||||
enc: |
|
||||
-----BEGIN AGE ENCRYPTED FILE-----
|
||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB2RTlocERzUmtUdnhsNHJk
|
||||
SkNXZFpVdmM5Y1hnQlQzcUg1OUxNYkRiaEFZCi82MW9TbkI2VCtjMDVKYTlWTVBs
|
||||
QVZMekVoT1JSQWRZV3F3SHgxOGR3a2sKLS0tIGJCd21aY05jS0xva2RmclBlQWdl
|
||||
UVZSNm9pRUM3YmFFSWl3NGNUdnZOOGsKIuepNrrdgoNoOMZQ77cIrtwPTL8acahG
|
||||
paE+K2EKa8pqXnAVkxORTkUYRlorKRLjiyalxrDZYsMAbCSrrtfx/A==
|
||||
-----END AGE ENCRYPTED FILE-----
|
||||
lastmodified: "2024-01-30T17:21:08Z"
|
||||
mac: ENC[AES256_GCM,data:mR4vi8WLLiuUY5i7NgIYHfAZcBsQ3u2Cg9TtXcFtwtDAuyy9Xzx07yeR1HC0D+YhiAu+mYAJPmk6jHZsCE2OX26sLTyvEULqDQc71sCgM8dsyl50hoZ2BsbY7o6g8D9Yks+2szuKmlxZ0nN5aHxcf+67+gotzjlBfcmLx+E1TfA=,iv:+9Kv7ZwGoMU0QBTvCgq232nHo+tjoeHTJBdOuOiqpPk=,tag:9VrOFmUFbdiPKSWnt+8z7w==,type:str]
|
||||
pgp: []
|
||||
unencrypted_regex: ^(apiVersion|metadata|kind|type)$
|
||||
version: 3.8.1
|
|
@ -0,0 +1,5 @@
|
|||
apiVersion: v1
|
||||
kind: ServiceAccount
|
||||
metadata:
|
||||
name: restic-sa
|
||||
namespace: gitea
|
|
@ -10,3 +10,4 @@ files:
|
|||
- ./gitea-admin-secret.enc.yaml
|
||||
- ./renovate-bot-secret.enc.yaml
|
||||
- ./runner-secret.enc.yaml
|
||||
|
||||
|
|
Loading…
Reference in New Issue