Commit Graph

8 Commits (d850c42b6b21b6a55d1ac82eabca5ead26fd465f)

Author SHA1 Message Date
radex 7fa38d47b8 personal/radex: add radex stuff
Change-Id: I31e186d71f05375b28a0f4e708cc1caa6147dac2
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1814
2023-12-04 20:34:05 +00:00
radex d45584aa6d kube: clean up SimpleIngress
Rename `target_service` to `target` to mirror Service's `target`; rename `extra_paths` to `extraPaths` to follow the camelCase convention used everywhere except for a few places in kube.upstream (assumed to be a mistake)

Change-Id: Icfcb70ef889e3359bf0391c465034817f4b70cce
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1809
Reviewed-by: q3k <q3k@hackerspace.pl>
2023-12-04 20:33:10 +00:00
radex 99ed6a7abb kube: standardize on a `local ns` convention
A convention is introduced to specify the kube.Namespace object in a deployment as a `local ns` instead of an `ns:` or a `namespace:` for these reasons:

- non-cluster admins cannot create new namespaces, and we've been moving in the direction of specifying objects that require cluster admin permissions to apply (policies, role bindings) in //cluster/kube/k0 instead of in the app jsonnet
- namespace admins CAN delete the namespace, making `kubecfg delete` unexpectedly dangerous (especially if a namespace contains more than just the contents of the file being applied - common with personal namespaces)
- `.Contain()` is a common operation, and it shows up in lines that are pretty long, so `ns.Contain()` is preferable to `app.ns.Contain()` or `service.namespace.Contain()`

Change-Id: Ie4ea825376dbf6faa175179054f3ee3de2253ae0
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1804
Reviewed-by: q3k <q3k@hackerspace.pl>
2023-11-24 20:38:44 +00:00
radex 8b8f3876a9 kube: add target:: convenience field to Service
Change-Id: If69116d93b6074136a36d98973e1aa997e2ebbef
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1802
Reviewed-by: q3k <q3k@hackerspace.pl>
2023-11-24 20:37:48 +00:00
radex f5844311eb */kube: Add kube.SimpleIngress
Change-Id: Iddcac629b9938f228dd93b32e58bb14606d5c6e5
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1745
Reviewed-by: q3k <q3k@hackerspace.pl>
2023-10-28 17:55:48 +00:00
radex e632263635 personal/radex/demo: +bruh
Change-Id: Ie0ed25308284f9a9dea59c456bce77968f59524f
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1569
2023-08-12 15:30:18 +00:00
radex 5e475370be personal/radex/demo: +tls
Change-Id: Ib10633b90256bbe15131326aa69e19fdc6ef21e3
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1568
2023-08-12 15:30:09 +00:00
radex df18c80b1e personal/radex: +demo
Change-Id: I4948a4ebc33c2331ed8def3396f18def234fbd0d
Reviewed-on: https://gerrit.hackerspace.pl/c/hscloud/+/1567
2023-08-12 15:29:48 +00:00