From 9e0ab565964e19c87ea08338bbbe228e109d352e Mon Sep 17 00:00:00 2001 From: Cocopops16 Date: Mon, 26 May 2025 20:12:11 +0200 Subject: [PATCH] fix gitea and expose it --- gitea/values.yaml | 17 ++++++++++++++--- haproxy/ingress.yaml | 11 +++++++++++ 2 files changed, 25 insertions(+), 3 deletions(-) diff --git a/gitea/values.yaml b/gitea/values.yaml index 3f76779..83687c2 100644 --- a/gitea/values.yaml +++ b/gitea/values.yaml @@ -3,11 +3,22 @@ postgresql: storageClass: csi-cinder-high-speed-gen2 postgresql-ha: enabled: false -redis: +valkey: enabled: true -redis-cluster: +valkey-cluster: enabled: false persistence: enabled: true - storageClass: csi-cinder-high-speed-gen2 \ No newline at end of file + storageClass: csi-cinder-high-speed-gen2 + +gitea: + oauth: + - name: "Keycloak" + provider: "openidConnect" + key: "gitea" + secret: "E2jjlovGQabpWBsHzHWXbQpekMSRZjKP" + autoDiscoverUrl: "https://iam.reault.tech/realms/reault.tech/.well-known/openid-configuration" + config: + server: + ROOT_URL: "https://gitea.reault.tech" \ No newline at end of file diff --git a/haproxy/ingress.yaml b/haproxy/ingress.yaml index ad97180..c25326e 100644 --- a/haproxy/ingress.yaml +++ b/haproxy/ingress.yaml @@ -50,6 +50,16 @@ spec: name: immich-server port: number: 2283 + - host: "gitea.reault.tech" + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: gitea-http + port: + number: 3000 tls: - secretName: reault-tech-cert # cert-manager will store the certificate and key in this secret hosts: @@ -57,3 +67,4 @@ spec: - reault.tech - iam.reault.tech - immich.reault.tech + - gitea.reault.tech