From 79fea80fd2e535a29395d362a3c1ba302a871809 Mon Sep 17 00:00:00 2001 From: aggarwalakshun Date: Sun, 28 Dec 2025 07:54:12 +0530 Subject: [PATCH] add ingress, pvc, secrets, svc, and deployment for code-server --- .../tools/code-server/code-server-ingress.yml | 27 ++++++++++ .../tools/code-server/code-server-pvc.yml | 14 ++++++ .../code-server-secrets-sealed.yml | 15 ++++++ .../tools/code-server/code-server-svc.yml | 13 +++++ .../ipv6/tools/code-server/code-server.yml | 49 +++++++++++++++++++ 5 files changed, 118 insertions(+) create mode 100644 clusters/ipv6/tools/code-server/code-server-ingress.yml create mode 100644 clusters/ipv6/tools/code-server/code-server-pvc.yml create mode 100644 clusters/ipv6/tools/code-server/code-server-secrets-sealed.yml create mode 100644 clusters/ipv6/tools/code-server/code-server-svc.yml create mode 100644 clusters/ipv6/tools/code-server/code-server.yml diff --git a/clusters/ipv6/tools/code-server/code-server-ingress.yml b/clusters/ipv6/tools/code-server/code-server-ingress.yml new file mode 100644 index 0000000..90e9d1d --- /dev/null +++ b/clusters/ipv6/tools/code-server/code-server-ingress.yml @@ -0,0 +1,27 @@ +--- +apiVersion: networking.k8s.io/v1 +kind: Ingress +metadata: + name: code-server-ingress + namespace: tools + annotations: + cert-manager.io/cluster-issuer: letsencrypt-cloudflare + traefik.ingress.kubernetes.io/router.middlewares: tools-authelia@kubernetescrd + traefik.ingress.kubernetes.io/router.entrypoints: websecure +spec: + ingressClassName: traefik + tls: + - hosts: + - vs.akshun-lab.cc + secretName: code-server-tls + rules: + - host: vs.akshun-lab.cc + http: + paths: + - path: / + pathType: Prefix + backend: + service: + name: code-server-service + port: + number: 8443 diff --git a/clusters/ipv6/tools/code-server/code-server-pvc.yml b/clusters/ipv6/tools/code-server/code-server-pvc.yml new file mode 100644 index 0000000..187db40 --- /dev/null +++ b/clusters/ipv6/tools/code-server/code-server-pvc.yml @@ -0,0 +1,14 @@ +--- +apiVersion: v1 +kind: PersistentVolumeClaim +metadata: + name: code-server-longhorn + namespace: tools +spec: + accessModes: + - ReadWriteOnce + volumeMode: Filesystem + resources: + requests: + storage: 1Gi + storageClassName: longhorn diff --git a/clusters/ipv6/tools/code-server/code-server-secrets-sealed.yml b/clusters/ipv6/tools/code-server/code-server-secrets-sealed.yml new file mode 100644 index 0000000..b4105db --- /dev/null +++ b/clusters/ipv6/tools/code-server/code-server-secrets-sealed.yml @@ -0,0 +1,15 @@ +--- +apiVersion: bitnami.com/v1alpha1 +kind: SealedSecret +metadata: + name: code-server-secrets + namespace: tools +spec: + encryptedData: + PASSWORD: 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 + SUDO_PASSWORD: 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 + template: + metadata: + name: code-server-secrets + namespace: tools + type: Opaque diff --git a/clusters/ipv6/tools/code-server/code-server-svc.yml b/clusters/ipv6/tools/code-server/code-server-svc.yml new file mode 100644 index 0000000..b839786 --- /dev/null +++ b/clusters/ipv6/tools/code-server/code-server-svc.yml @@ -0,0 +1,13 @@ +--- +apiVersion: v1 +kind: Service +metadata: + name: code-server-service + namespace: tools +spec: + selector: + app: code-server + ports: + - port: 8448 + targetPort: 8443 + protocol: TCP diff --git a/clusters/ipv6/tools/code-server/code-server.yml b/clusters/ipv6/tools/code-server/code-server.yml new file mode 100644 index 0000000..e83080d --- /dev/null +++ b/clusters/ipv6/tools/code-server/code-server.yml @@ -0,0 +1,49 @@ +--- +apiVersion: apps/v1 +kind: Deployment +metadata: + name: code-server + namespace: tools +spec: + strategy: + type: Recreate + replicas: 1 + selector: + matchLabels: + app: code-server + template: + metadata: + labels: + app: code-server + spec: + containers: + - name: code-server + image: lscr.io/linuxserver/code-server:4.107.0 + ports: + - containerPort: 8443 + env: + - name: PUID + value: "1000" + - name: PGID + value: "1000" + - name: TZ + value: "Asia/Kolkata" + - name: PASSWORD + valueFrom: + secretKeyRef: + name: code-server-secrets + key: PASSWORD + - name: SUDO_PASSWORD + valueFrom: + secretKeyRef: + name: code-server-secrets + key: SUDO_PASSWORD + - name: DEFAULT_WORKSPACE + value: "/config/workspace" + volumeMounts: + - name: code-server + mountPath: /config + volumes: + - name: code-server + persistentVolumeClaim: + claimName: code-server-longhorn -- 2.49.1