diff --git a/charts/sigi/.helmignore b/charts/sigi/.helmignore new file mode 100644 index 0000000..0e8a0eb --- /dev/null +++ b/charts/sigi/.helmignore @@ -0,0 +1,23 @@ +# Patterns to ignore when building packages. +# This supports shell glob matching, relative path matching, and +# negation (prefixed with !). Only one pattern per line. +.DS_Store +# Common VCS dirs +.git/ +.gitignore +.bzr/ +.bzrignore +.hg/ +.hgignore +.svn/ +# Common backup files +*.swp +*.bak +*.tmp +*.orig +*~ +# Various IDEs +.project +.idea/ +*.tmproj +.vscode/ diff --git a/charts/sigi/v0.1.0/Chart.lock b/charts/sigi/v0.1.0/Chart.lock new file mode 100644 index 0000000..b351582 --- /dev/null +++ b/charts/sigi/v0.1.0/Chart.lock @@ -0,0 +1,6 @@ +dependencies: +- name: postgresql + repository: https://charts.bitnami.com/bitnami + version: 11.6.8 +digest: sha256:ee4247460b887d3cc558f76c85980fe6848624c688b855100d9863bef6830ed0 +generated: "2022-06-24T12:28:18.011798975-03:00" diff --git a/charts/sigi/v0.1.0/Chart.yaml b/charts/sigi/v0.1.0/Chart.yaml new file mode 100644 index 0000000..42daa49 --- /dev/null +++ b/charts/sigi/v0.1.0/Chart.yaml @@ -0,0 +1,24 @@ +apiVersion: v2 +name: sigi +description: Sistema de Informações Gerenciais do Interlegis (SIGI) + +# A chart can be either an 'application' or a 'library' chart. +type: application + +# This is the chart version. This version number should be incremented each time you make changes +# to the chart and its templates, including the app version. +# Versions are expected to follow Semantic Versioning (https://semver.org/) +version: 0.1.0 + +# This is the version number of the application being deployed. This version number should be +# incremented each time you make changes to the application. Versions are not expected to +# follow Semantic Versioning. They should reflect the version the application is using. +appVersion: master + +icon: https://git.interlegis.leg.br/SEIT/rancher-charts/raw/master/images/sigi_interlegis.png + +dependencies: +- name: postgresql + version: 11.6.8 + repository: https://charts.bitnami.com/bitnami + condition: postgresql.internal diff --git a/charts/sigi/v0.1.0/app-readme.md b/charts/sigi/v0.1.0/app-readme.md new file mode 100644 index 0000000..1bfae58 --- /dev/null +++ b/charts/sigi/v0.1.0/app-readme.md @@ -0,0 +1,3 @@ +# Sistema de Informações Gerenciais do Interlegis + +Utilize o formulário abaixo para configurar o SIGI. diff --git a/charts/sigi/v0.1.0/charts/postgresql-11.6.8.tgz b/charts/sigi/v0.1.0/charts/postgresql-11.6.8.tgz new file mode 100644 index 0000000..51bbe89 Binary files /dev/null and b/charts/sigi/v0.1.0/charts/postgresql-11.6.8.tgz differ diff --git a/charts/sigi/v0.1.0/questions.yaml b/charts/sigi/v0.1.0/questions.yaml new file mode 100644 index 0000000..8dc59ce --- /dev/null +++ b/charts/sigi/v0.1.0/questions.yaml @@ -0,0 +1,149 @@ +labels: + io.cattle.role: project +categories: +- Gerencial +questions: +# Informações Básicas +- variable: sigi.hostname + default: "sigi.interlegis.leg.br" + description: "Endereço para acesso ao SIGI" + label: "URL do SIGI" + type: string + group: Básico + required: true +- variable: sigi.adminEmail + default: "sigi@interlegis.leg.br" + description: "SIGI Administrator" + label: Contato + type: string + group: Básico + required: true +- variable: sigi.adminPassword + default: "sigi" + description: "Senha do usuário administrativo do SIGI" + label: Senha Admin + type: password + group: Básico + required: true + +# Ingress +- variable: ingress.tls.enabled + default: true + type: boolean + description: "Habilitar criptografia do protocolo HTTP (HTTPS)?" + label: "Habilitar TLS?" + required: false + group: Ingress + show_subquestion_if: true + subquestions: + - variable: ingress.tls.provider + default: letsencrypt + type: enum + description: "Qual provedor de certificados utilizar?" + label: "Provedor de certificados" + required: false + group: Ingress + options: + - letsencrypt + - aws + +- variable: ingress.class + default: nginx + type: enum + description: "Qual o Ingress Controller?" + label: "Classe Ingress" + required: false + group: Ingress + options: + - nginx + - alb + +# Correio +- variable: sigi.emailSendUser + default: "sigi@interlegis.leg.br" + description: "Remetente dos e-mails enviados pelo SIGI" + label: "Remetente" + type: string + group: Correio + required: false +- variable: sigi.useTls + default: "False" + description: "Usar TLS ao conectar no servidor SMTP?" + label: "Usar TLS" + type: enum + group: Correio + options: + - "True" + - "False" + required: false +- variable: sigi.emailPort + default: 25 + description: "Porta de envio de E-mail (SMTP)" + type: int + label: "Porta SMTP" + required: false + group: Correio +- variable: sigi.emailHost + default: "smtp.interlegis.leg.br" + description: "Servidor de envio de e-mail (SMTP)" + label: "Servidor SMTP" + type: string + group: Correio + required: false + +# PostgreSQL +- variable: postgresql.internal + default: true + description: "Fazer o deploy do Postgres?" + label: "Postgres Interno?" + type: boolean + group: PostgreSQL + required: false +- variable: postgresql.postgresqlPassword + default: "sigi" + description: "Senha do banco de dados Postgres" + label: "Senha do Postgres" + type: password + group: PostgreSQL + required: true + +# Avançado +- variable: sigi.debug + default: "False" + description: "Habilitar mensagens de Debug?" + label: "Debug?" + type: enum + group: Avançado + options: + - "True" + - "False" +- variable: sigi.timeZone + default: "America/Sao_Paulo" + description: "Fuso Horário do SIGI" + type: enum + label: "Fuso" + options: + - "America/Sao_Paulo" + - "America/Fortaleza" + - "America/Belem" + - "America/Araguaina" + - "America/Bahia" + - "America/Boa_Vista" + - "America/Campo_Grande" + - "America/Cuiaba" + - "America/Maceio" + - "America/Manaus" + - "America/Porto_Velho" + - "America/Recife" + - "America/Rio_Branco" + - "America/Sao_Paulo" + required: true + group: Avançado + +- variable: velero.backup.enabled + default: true + type: boolean + label: "Habilitar backup com Velero?" + description: "Criar ou não os objetos para backup com o Velero." + required: false + group: Avançado diff --git a/charts/sigi/v0.1.0/templates/NOTES.txt b/charts/sigi/v0.1.0/templates/NOTES.txt new file mode 100644 index 0000000..53de7bd --- /dev/null +++ b/charts/sigi/v0.1.0/templates/NOTES.txt @@ -0,0 +1,10 @@ +1. Seu SIGI pode ser acessado através da URL: +{{- if .Values.ingress.enabled }} + http{{ if .Values.ingress.tls.enabled }}s{{ end }}://{{ .Values.sigi.hostname }} +{{- end }} +2. Utilize as seguintes credenciais para acesso inicial: + Usuario: sigi + Senha: {{ .Values.sigi.adminPassword }} +3. Usuario de administração do Postgres: + Usuario: sigi + Senha: {{ .Values.postgresql.postgresqlPassword }} diff --git a/charts/sigi/v0.1.0/templates/_helpers.tpl b/charts/sigi/v0.1.0/templates/_helpers.tpl new file mode 100644 index 0000000..6294294 --- /dev/null +++ b/charts/sigi/v0.1.0/templates/_helpers.tpl @@ -0,0 +1,58 @@ +{{/* +Expand the name of the chart. +*/}} +{{- define "sigi.name" -}} +{{- default .Chart.Name .Values.nameOverride | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Create a default fully qualified app name. +We truncate at 63 chars because some Kubernetes name fields are limited to this (by the DNS naming spec). +If release name contains chart name it will be used as a full name. +*/}} +{{- define "sigi.fullname" -}} +{{- if .Values.fullnameOverride }} +{{- .Values.fullnameOverride | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- $name := default .Chart.Name .Values.nameOverride }} +{{- if contains $name .Release.Name }} +{{- .Release.Name | trunc 63 | trimSuffix "-" }} +{{- else }} +{{- printf "%s-%s" .Release.Name $name | trunc 63 | trimSuffix "-" }} +{{- end }} +{{- end }} +{{- end }} + +{{/* +Create chart name and version as used by the chart label. +*/}} +{{- define "sigi.chart" -}} +{{- printf "%s-%s" .Chart.Name .Chart.Version | replace "+" "_" | trunc 63 | trimSuffix "-" }} +{{- end }} + +{{/* +Common labels +*/}} +{{- define "sigi.labels" -}} +helm.sh/chart: {{ include "sigi.chart" . }} +{{ include "sigi.selectorLabels" . }} +{{- if .Chart.AppVersion }} +app.kubernetes.io/version: {{ .Chart.AppVersion | quote }} +{{- end }} +app.kubernetes.io/managed-by: {{ .Release.Service }} +{{- end }} + +{{/* +Selector labels +*/}} +{{- define "sigi.selectorLabels" -}} +app.kubernetes.io/name: {{ include "sigi.name" . }} +app.kubernetes.io/instance: {{ .Release.Name }} +{{- end }} + +{{/* +Create a default fully qualified app name for postgresql. +*/}} +{{- define "postgresql.fullname" -}} +{{- printf "%s-%s" .Release.Name "postgresql" | trunc 63 | trimSuffix "-" -}} +{{- end -}} diff --git a/charts/sigi/v0.1.0/templates/deployment.yaml b/charts/sigi/v0.1.0/templates/deployment.yaml new file mode 100644 index 0000000..06caedc --- /dev/null +++ b/charts/sigi/v0.1.0/templates/deployment.yaml @@ -0,0 +1,134 @@ +apiVersion: apps/v1 +kind: Deployment +metadata: + name: {{ include "sigi.fullname" . }} + labels: + {{- include "sigi.labels" . | nindent 4 }} +spec: +{{- if not .Values.autoscaling.enabled }} + replicas: {{ .Values.replicaCount }} +{{- end }} + selector: + matchLabels: + {{- include "sigi.selectorLabels" . | nindent 6 }} + template: + metadata: + {{- with .Values.podAnnotations }} + annotations: + {{- toYaml . | nindent 8 }} + {{- end }} + labels: + {{- include "sigi.selectorLabels" . | nindent 8 }} + spec: + {{- with .Values.imagePullSecrets }} + imagePullSecrets: + {{- toYaml . | nindent 8 }} + {{- end }} + securityContext: + {{- toYaml .Values.podSecurityContext | nindent 8 }} + containers: + - name: {{ .Chart.Name }} + securityContext: + {{- toYaml .Values.securityContext | nindent 12 }} + image: "{{ .Values.image.repository }}:{{ .Values.image.tag | default .Chart.AppVersion }}" + imagePullPolicy: {{ .Values.image.pullPolicy }} + ports: + - name: http + containerPort: 80 + protocol: TCP + env: + - name: DATABASE_URL + value: {{ printf "postgresql://%s:%s@%s:5432/%s" .Values.postgresql.postgresqlUsername .Values.postgresql.postgresqlPassword (include "postgresql.fullname" .) .Values.postgresql.postgresqlDatabase| quote }} + - name: ADMIN_PASSWORD + value: "{{ .Values.sigi.adminPassword }}" + - name: ADMIN_EMAIL + value: "{{ .Values.sigi.adminEmail }}" + - name: EMAIL_SEND_USER + value: "{{ .Values.sigi.emailSendUser }}" + - name: DEBUG + value: "{{ .Values.sigi.debug }}" + - name: USE_TLS + value: "{{ .Values.sigi.useTls }}" + - name: EMAIL_PORT + value: "{{ .Values.sigi.emailPort }}" + - name: EMAIL_HOST + value: "{{ .Values.sigi.emailHost }}" + - name: TZ + value: "{{ .Values.sigi.timeZone }}" + volumeMounts: +# - mountPath: /var/interlegis/sigi/data +# name: data + - mountPath: /srv/interlegis/sigi/media + name: media + livenessProbe: + httpGet: + path: / + port: http + initialDelaySeconds: 60 + failureThreshold: 3 + periodSeconds: 60 + successThreshold: 1 + timeoutSeconds: 5 + readinessProbe: + httpGet: + path: / + port: http + initialDelaySeconds: 60 + failureThreshold: 3 + periodSeconds: 30 + successThreshold: 1 + timeoutSeconds: 5 + resources: + {{- toYaml .Values.resources | nindent 12 }} + volumes: +# - name: data +# secret: +# defaultMode: 440 +# secretName: {{ include "sigi.fullname" . }}-secretkey + - name: media + {{- if .Values.persistence.enabled }} + persistentVolumeClaim: + claimName: {{ include "sigi.fullname" . }}-media + {{- else }} + emptyDir: {} + {{- end }} + {{- with .Values.nodeSelector }} + nodeSelector: + {{- toYaml . | nindent 8 }} + {{- end }} + affinity: + podAffinity: + preferredDuringSchedulingIgnoredDuringExecution: + - weight: 100 + podAffinityTerm: + labelSelector: + matchExpressions: + - key: app.kubernetes.io/name + operator: In + values: + - {{ include "sigi.name" . }} + - key: app.kubernetes.io/instance + operator: In + values: + - {{ .Release.Name }} + topologyKey: kubernetes.io/hostname + - weight: 50 + podAffinityTerm: + labelSelector: + matchExpressions: + - key: app.kubernetes.io/name + operator: In + values: + - postgresql + - key: app.kubernetes.io/instance + operator: In + values: + - {{ .Release.Name }} + topologyKey: kubernetes.io/hostname + {{- with .Values.affinity }} + {{- toYaml . | nindent 8 }} + {{- end }} + {{- with .Values.tolerations }} + tolerations: + {{- toYaml . | nindent 8 }} + {{- end }} diff --git a/charts/sigi/v0.1.0/templates/hpa.yaml b/charts/sigi/v0.1.0/templates/hpa.yaml new file mode 100644 index 0000000..fc4f821 --- /dev/null +++ b/charts/sigi/v0.1.0/templates/hpa.yaml @@ -0,0 +1,28 @@ +{{- if .Values.autoscaling.enabled }} +apiVersion: autoscaling/v2beta1 +kind: HorizontalPodAutoscaler +metadata: + name: {{ include "sigi.fullname" . }} + labels: + {{- include "sigi.labels" . | nindent 4 }} +spec: + scaleTargetRef: + apiVersion: apps/v1 + kind: Deployment + name: {{ include "sigi.fullname" . }} + minReplicas: {{ .Values.autoscaling.minReplicas }} + maxReplicas: {{ .Values.autoscaling.maxReplicas }} + metrics: + {{- if .Values.autoscaling.targetCPUUtilizationPercentage }} + - type: Resource + resource: + name: cpu + targetAverageUtilization: {{ .Values.autoscaling.targetCPUUtilizationPercentage }} + {{- end }} + {{- if .Values.autoscaling.targetMemoryUtilizationPercentage }} + - type: Resource + resource: + name: memory + targetAverageUtilization: {{ .Values.autoscaling.targetMemoryUtilizationPercentage }} + {{- end }} +{{- end }} diff --git a/charts/sigi/v0.1.0/templates/ingress.yaml b/charts/sigi/v0.1.0/templates/ingress.yaml new file mode 100644 index 0000000..583b3c7 --- /dev/null +++ b/charts/sigi/v0.1.0/templates/ingress.yaml @@ -0,0 +1,57 @@ +{{- if .Values.ingress.enabled -}} +{{- $fullName := include "sigi.fullname" . -}} +{{- $hostName := .Values.sigi.hostname -}} +{{- if semverCompare ">=1.14-0" .Capabilities.KubeVersion.GitVersion -}} +apiVersion: networking.k8s.io/v1beta1 +{{- else -}} +apiVersion: extensions/v1beta1 +{{- end }} +kind: Ingress +metadata: + name: {{ $fullName }} + labels: + {{- include "sigi.labels" . | nindent 4 }} + annotations: + {{- if .Values.ingress.tls.enabled }} + # USE TLS + {{- if contains "letsencrypt" .Values.ingress.tls.provider }} + cert-manager.io/cluster-issuer: "letsencrypt-prod" + {{- end }} + {{- if contains "alb" .Values.ingress.class }} + alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]' + {{- end }} + {{- else }} + # DO NOT USE TLS + {{- if contains "alb" .Values.ingress.class }} + alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}]' + {{- end }} + {{- end }} + {{- if contains "alb" .Values.ingress.class }} + alb.ingress.kubernetes.io/group.name: sigi + alb.ingress.kubernetes.io/scheme: internet-facing + alb.ingress.kubernetes.io/target-type: ip + kubernetes.io/ingress.class: alb + {{- end }} + {{- with .Values.ingress.annotations }} + {{- toYaml . | nindent 4 }} + {{- end }} +spec: + {{- if .Values.ingress.tls.enabled }} + tls: + - hosts: + - "{{ $hostName }}" + secretName: {{ $hostName | replace "." "-" }}-tls + {{- end }} + rules: + - host: "{{ $hostName }}" + http: + paths: + {{- if contains "nginx" .Values.ingress.class }} + - path: / + {{- else }} + - path: /* + {{- end }} + backend: + serviceName: {{ $fullName }} + servicePort: http +{{- end }} diff --git a/charts/sigi/v0.1.0/templates/pvc-media.yaml b/charts/sigi/v0.1.0/templates/pvc-media.yaml new file mode 100644 index 0000000..d122fc0 --- /dev/null +++ b/charts/sigi/v0.1.0/templates/pvc-media.yaml @@ -0,0 +1,21 @@ +{{- if .Values.persistence.enabled }} +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: {{ include "sigi.fullname" . }}-media + labels: + {{- include "sigi.labels" . | nindent 4 }} +spec: + accessModes: + - {{ .Values.persistence.accessMode }} + resources: + requests: + storage: {{ .Values.persistence.size }} +{{- if .Values.persistence.storageClass }} +{{- if (eq "-" .Values.persistence.storageClass) }} + storageClassName: "" +{{- else }} + storageClassName: "{{ .Values.persistence.storageClass }}" +{{- end }} +{{- end }} +{{- end }} diff --git a/charts/sigi/v0.1.0/templates/secretkey.yaml b/charts/sigi/v0.1.0/templates/secretkey.yaml new file mode 100644 index 0000000..6d2336d --- /dev/null +++ b/charts/sigi/v0.1.0/templates/secretkey.yaml @@ -0,0 +1,13 @@ +apiVersion: v1 +kind: Secret +metadata: + name: {{ include "sigi.fullname" . }}-secretkey + labels: + {{- include "sigi.labels" . | nindent 4 }} +type: Opaque +data: +{{- if .Release.IsUpgrade }} + secret.key: {{ index (lookup "v1" "Secret" .Release.Namespace (printf "%s-secretkey" (include "sigi.fullname" .))).data "secret.key" }} +{{ else }} # install operation + secret.key: {{ randAscii 50 | b64enc }} +{{ end }} diff --git a/charts/sigi/v0.1.0/templates/service.yaml b/charts/sigi/v0.1.0/templates/service.yaml new file mode 100644 index 0000000..fc302b8 --- /dev/null +++ b/charts/sigi/v0.1.0/templates/service.yaml @@ -0,0 +1,15 @@ +apiVersion: v1 +kind: Service +metadata: + name: {{ include "sigi.fullname" . }} + labels: + {{- include "sigi.labels" . | nindent 4 }} +spec: + type: {{ .Values.service.type }} + ports: + - port: {{ .Values.service.port }} + targetPort: http + protocol: TCP + name: http + selector: + {{- include "sigi.selectorLabels" . | nindent 4 }} diff --git a/charts/sigi/v0.1.0/templates/velero-schedule-monthly.yaml b/charts/sigi/v0.1.0/templates/velero-schedule-monthly.yaml new file mode 100644 index 0000000..143e21f --- /dev/null +++ b/charts/sigi/v0.1.0/templates/velero-schedule-monthly.yaml @@ -0,0 +1,39 @@ +{{- if .Values.velero.backup.enabled }} +apiVersion: velero.io/v1 +kind: Schedule +metadata: + name: {{ include "sigi.fullname" . }}-monthly + namespace: {{ .Values.velero.namespace }} +spec: + # generate a random backup time between 1 and 5 AM on first day of every month + schedule: {{ mod (randNumeric 2) 60 }} {{ mod (randNumeric 1) 6 }} 1 * * + template: + includedNamespaces: + - {{ .Release.Namespace }} + {{- with .Values.velero.backup.excludedResources }} + excludedResources: + {{- toYaml . | nindent 8 }} + {{- end }} + snapshotVolumes: {{ .Values.velero.backup.snapshotVolumes }} + # every weekday backup is good for the next year (365 days) + ttl: 8760h0m0s + defaultVolumesToRestic: {{ .Values.velero.backup.defaultVolumesToRestic }} + hooks: + resources: + - name: pgdump + includedResources: + - pods + labelSelector: + matchLabels: + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/name: postgresql + pre: + - exec: + command: + - "/bin/bash" + - "-c" + - "PGPASSWORD=$POSTGRES_PASSWORD /opt/bitnami/postgresql/bin/pg_dump -U sigi -d sigi > /bitnami/postgresql/sigi.dump" + timeout: 360s + onError: Continue + useOwnerReferencesInBackup: false +{{- end }} diff --git a/charts/sigi/v0.1.0/templates/velero-schedule-weekdays.yaml b/charts/sigi/v0.1.0/templates/velero-schedule-weekdays.yaml new file mode 100644 index 0000000..9ecf1ae --- /dev/null +++ b/charts/sigi/v0.1.0/templates/velero-schedule-weekdays.yaml @@ -0,0 +1,39 @@ +{{- if .Values.velero.backup.enabled }} +apiVersion: velero.io/v1 +kind: Schedule +metadata: + name: {{ include "sigi.fullname" . }}-weekdays + namespace: {{ .Values.velero.namespace }} +spec: + # generate a random backup time between 1 and 5 AM on weekdays + schedule: {{ mod (randNumeric 2) 60 }} {{ mod (randNumeric 1) 6 }} * * 1-5 + template: + includedNamespaces: + - {{ .Release.Namespace }} + {{- with .Values.velero.backup.excludedResources }} + excludedResources: + {{- toYaml . | nindent 8 }} + {{- end }} + snapshotVolumes: {{ .Values.velero.backup.snapshotVolumes }} + # every weekday backup is good for the next week (7 days) + ttl: 168h0m0s + defaultVolumesToRestic: {{ .Values.velero.backup.defaultVolumesToRestic }} + hooks: + resources: + - name: pgdump + includedResources: + - pods + labelSelector: + matchLabels: + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/name: postgresql + pre: + - exec: + command: + - "/bin/bash" + - "-c" + - "PGPASSWORD=$POSTGRES_PASSWORD /opt/bitnami/postgresql/bin/pg_dump -U sigi -d sigi > /bitnami/postgresql/sigi.dump" + timeout: 360s + onError: Continue + useOwnerReferencesInBackup: false +{{- end }} diff --git a/charts/sigi/v0.1.0/templates/velero-schedule-weekly.yaml b/charts/sigi/v0.1.0/templates/velero-schedule-weekly.yaml new file mode 100644 index 0000000..d0c4fbe --- /dev/null +++ b/charts/sigi/v0.1.0/templates/velero-schedule-weekly.yaml @@ -0,0 +1,39 @@ +{{- if .Values.velero.backup.enabled }} +apiVersion: velero.io/v1 +kind: Schedule +metadata: + name: {{ include "sigi.fullname" . }}-weekly + namespace: {{ .Values.velero.namespace }} +spec: + # generate a random backup time between 1 and 5 AM on sunday + schedule: {{ mod (randNumeric 2) 60 }} {{ mod (randNumeric 1) 6 }} * * 0 + template: + includedNamespaces: + - {{ .Release.Namespace }} + {{- with .Values.velero.backup.excludedResources }} + excludedResources: + {{- toYaml . | nindent 8 }} + {{- end }} + snapshotVolumes: {{ .Values.velero.backup.snapshotVolumes }} + # every sunday backup is good for 30 days (aprox. 1 month) + ttl: 744h0m0s + defaultVolumesToRestic: {{ .Values.velero.backup.defaultVolumesToRestic }} + hooks: + resources: + - name: pgdump + includedResources: + - pods + labelSelector: + matchLabels: + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/name: postgresql + pre: + - exec: + command: + - "/bin/bash" + - "-c" + - "PGPASSWORD=$POSTGRES_PASSWORD /opt/bitnami/postgresql/bin/pg_dump -U sigi -d sigi > /bitnami/postgresql/sigi.dump" + timeout: 360s + onError: Continue + useOwnerReferencesInBackup: false +{{- end }} diff --git a/charts/sigi/v0.1.0/values.yaml b/charts/sigi/v0.1.0/values.yaml new file mode 100644 index 0000000..023bd3d --- /dev/null +++ b/charts/sigi/v0.1.0/values.yaml @@ -0,0 +1,128 @@ +# Default values for sigi. +# This is a YAML-formatted file. +# Declare variables to be passed into your templates. + +replicaCount: 1 + +image: +# registry: porto.interlegis.leg.br + repository: porto.interlegis.leg.br/ilb/sigi + pullPolicy: IfNotPresent + # Overrides the image tag whose default is the chart appVersion. + tag: "" + +imagePullSecrets: [] +nameOverride: "" +fullnameOverride: "" + +serviceAccount: + # Specifies whether a service account should be created + create: true + # Annotations to add to the service account + annotations: {} + # The name of the service account to use. + # If not set and create is true, a name is generated using the fullname template + name: "" + +podAnnotations: {} + +podSecurityContext: {} + # fsGroup: 2000 + +securityContext: {} + # capabilities: + # drop: + # - ALL + # readOnlyRootFilesystem: true + # runAsNonRoot: true + # runAsUser: 1000 + +service: + type: ClusterIP + port: 80 + +persistence: + enabled: true + #storageClass: "" + accessMode: ReadWriteOnce + size: 2Gi + +sigi: + adminPassword: altereme + adminEmail: sigi@interlegis.leg.br + emailSendUser: no-reply@interlegis.leg.br + debug: 'False' + useTls: 'False' + emailPort: 25 + emailHost: mail.interlegis.leg.br + timeZone: 'America/Sao_Paulo' + hostname: 'sigi.interlegis.leg.br' + +ingress: + enabled: true + class: nginx + # nginx - for default nginx ingress controller + # alb - for AWS ALB Load Balancer controller + tls: + enabled: true + provider: letsencrypt + # extra annotations only + annotations: {} + +velero: + namespace: velero + backup: + enabled: true + snapshotVolumes: false + defaultVolumesToRestic: true + # cert-manager objects are usually blocked during backup + excludedResources: + - certificates.cert-manager.io + - orders.acme.cert-manager.io + - certificaterequests.cert-manager.io + - challenges.acme.cert-manager.io + +postgresql: + internal: true + image: +# repository: porto.interlegis.leg.br/bitnami/postgresql +# registry: porto.interlegis.leg.br + registry: docker.io + repository: bitnami/postgresql + tag: 14.4.0-debian-11-r0 + pullPolicy: IfNotPresent + service: + type: ClusterIP + port: 5432 + persistence: + enabled: true + size: 1Gi + postgresqlPassword: sigi + postgresqlUsername: sigi + postgresqlDatabase: sigi + resources: + requests: + cpu: 50m + memory: 64Mi + + +resources: + limits: + cpu: 1000m + memory: 1Gi + requests: + cpu: 150m + memory: 500Mi + +autoscaling: + enabled: false + minReplicas: 1 + maxReplicas: 100 + targetCPUUtilizationPercentage: 80 + # targetMemoryUtilizationPercentage: 80 + +nodeSelector: {} + +tolerations: [] + +affinity: {} diff --git a/images/logo_interlegis.png b/images/logo_interlegis.png new file mode 100644 index 0000000..10c6076 Binary files /dev/null and b/images/logo_interlegis.png differ diff --git a/images/sigi_interlegis.png b/images/sigi_interlegis.png new file mode 100644 index 0000000..1bb1b59 Binary files /dev/null and b/images/sigi_interlegis.png differ