refactor: migrar GitLab → Gitea (aulas 10, 11, 13)

- Aula 10: Gitea + Registry + Actions + Runner (substituiu GitLab)
  - gitea-values.yaml: PostgreSQL standalone, Valkey standalone, ~800Mi RAM
  - setup.sh/cleanup.sh: namespace gitea, Helm gitea-charts/gitea + actions
  - README.md: documentação completa com de→para (GitLab/Harbor/Tekton vs Gitea)

- Aula 11: ArgoCD (GitOps) — removido GitLab Runner (runner vive na aula-10)
  - setup.sh: só ArgoCD, integração SSH com Gitea
  - node-bugado/.gitea/workflows/ci.yml: pipeline convertida

- Aula 13: Container Factory — atualizado para Gitea
  - setup.sh/cleanup.sh: referências GitLab → Gitea
  - pipelines/postgresql/ci.yml: Gitea Actions workflow
  - README.md: conexão com act_runner explicada

- CLAUDE.md: tabela de aulas atualizada
This commit is contained in:
ArgoCD Setup
2026-03-14 01:44:30 -03:00
parent ff7af56c30
commit d380cd8585
35 changed files with 3374 additions and 1202 deletions

View File

@@ -0,0 +1,12 @@
# =============================================================================
# ConfigMap - PostgreSQL Configuration
# =============================================================================
apiVersion: v1
kind: ConfigMap
metadata:
name: postgresql-config
labels:
app: postgresql
data:
# Nome do banco de dados padrão
database: "app"

View File

@@ -0,0 +1,111 @@
# =============================================================================
# Deployment - PostgreSQL (Container Factory)
# =============================================================================
apiVersion: apps/v1
kind: Deployment
metadata:
name: postgresql
labels:
app: postgresql
app.kubernetes.io/name: postgresql
app.kubernetes.io/component: database
spec:
replicas: 1
strategy:
type: Recreate # PostgreSQL não suporta rolling update
selector:
matchLabels:
app: postgresql
template:
metadata:
labels:
app: postgresql
spec:
terminationGracePeriodSeconds: 30
imagePullSecrets:
- name: gitlab-registry
securityContext:
runAsNonRoot: true
runAsUser: 70 # postgres user no Alpine
fsGroup: 70
seccompProfile:
type: RuntimeDefault
containers:
- name: postgresql
# Imagem da Container Factory (eStargz)
image: registry.kube.quest/factory/postgresql:17
imagePullPolicy: IfNotPresent
ports:
- containerPort: 5432
name: postgresql
protocol: TCP
env:
- name: POSTGRES_USER
valueFrom:
secretKeyRef:
name: postgresql-secret
key: username
- name: POSTGRES_PASSWORD
valueFrom:
secretKeyRef:
name: postgresql-secret
key: password
- name: POSTGRES_DB
valueFrom:
configMapKeyRef:
name: postgresql-config
key: database
- name: PGDATA
value: /var/lib/postgresql/data/pgdata
resources:
requests:
memory: "512Mi"
cpu: "100m"
limits:
memory: "1Gi"
cpu: "500m"
volumeMounts:
- name: data
mountPath: /var/lib/postgresql/data
# Liveness: reinicia se PostgreSQL travar
livenessProbe:
exec:
command:
- /bin/sh
- -c
- pg_isready -U $POSTGRES_USER -d $POSTGRES_DB
initialDelaySeconds: 30
periodSeconds: 10
timeoutSeconds: 5
failureThreshold: 6
# Readiness: remove do service se não estiver pronto
readinessProbe:
exec:
command:
- /bin/sh
- -c
- pg_isready -U $POSTGRES_USER -d $POSTGRES_DB
initialDelaySeconds: 5
periodSeconds: 5
timeoutSeconds: 3
failureThreshold: 3
securityContext:
allowPrivilegeEscalation: false
readOnlyRootFilesystem: false
capabilities:
drop:
- ALL
volumes:
- name: data
persistentVolumeClaim:
claimName: postgresql-data

View File

@@ -0,0 +1,17 @@
# =============================================================================
# PersistentVolumeClaim - PostgreSQL Data
# =============================================================================
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: postgresql-data
labels:
app: postgresql
spec:
accessModes:
- ReadWriteOnce
# Hetzner Cloud Volumes (aula-08 CSI)
storageClassName: hcloud-volumes
resources:
requests:
storage: 10Gi

View File

@@ -0,0 +1,24 @@
# =============================================================================
# Secret - PostgreSQL Credentials (Template)
# =============================================================================
#
# IMPORTANTE: Este arquivo é um template.
# O setup.sh gera o secret automaticamente com senha aleatória.
#
# Para criar manualmente:
# kubectl create secret generic postgresql-secret \
# --from-literal=username=postgres \
# --from-literal=password=SUA_SENHA_AQUI \
# -n factory
#
# =============================================================================
apiVersion: v1
kind: Secret
metadata:
name: postgresql-secret
labels:
app: postgresql
type: Opaque
stringData:
username: postgres
password: CHANGE_ME_USE_SETUP_SH

View File

@@ -0,0 +1,18 @@
# =============================================================================
# Service - PostgreSQL
# =============================================================================
apiVersion: v1
kind: Service
metadata:
name: postgresql
labels:
app: postgresql
spec:
type: ClusterIP
ports:
- port: 5432
targetPort: 5432
protocol: TCP
name: postgresql
selector:
app: postgresql

View File

@@ -0,0 +1,131 @@
# =============================================================================
# Pre-pull DaemonSet - Alternativa para Cold Start
# =============================================================================
# Garante que imagens críticas estejam em cache em TODOS os nodes.
# Quando KEDA/Cluster Autoscaler criar pods, imagens já estarão disponíveis.
# =============================================================================
#
# COMO USAR:
# 1. Edite a lista de initContainers com suas imagens
# 2. kubectl apply -f prepull-daemonset.yaml
# 3. Aguarde todos os pods ficarem Ready
# 4. Imagens estarão em cache em todos os nodes
#
# QUANDO USAR:
# - Databases (PostgreSQL, MongoDB) que precisam de 100% dos arquivos
# - Apps que precarregam (n8n, Laravel Octane)
# - Qualquer imagem onde eStargz NÃO ajuda
#
# =============================================================================
apiVersion: apps/v1
kind: DaemonSet
metadata:
name: image-prepuller
namespace: kube-system
labels:
app: image-prepuller
purpose: cold-start-optimization
spec:
selector:
matchLabels:
app: image-prepuller
template:
metadata:
labels:
app: image-prepuller
spec:
# Tolera todos os taints para rodar em TODOS os nodes
tolerations:
- operator: Exists
# InitContainers baixam as imagens e terminam
initContainers:
# ---------------------------------------------------------------------
# PostgreSQL (Container Factory)
# ---------------------------------------------------------------------
- name: prepull-postgresql
image: registry.kube.quest/factory/postgresql:17
command: ["echo", "PostgreSQL image cached"]
imagePullPolicy: Always
resources:
requests:
cpu: 1m
memory: 1Mi
limits:
cpu: 10m
memory: 10Mi
# ---------------------------------------------------------------------
# n8n
# ---------------------------------------------------------------------
- name: prepull-n8n
image: docker.n8n.io/n8nio/n8n:latest
command: ["echo", "n8n image cached"]
imagePullPolicy: Always
resources:
requests:
cpu: 1m
memory: 1Mi
limits:
cpu: 10m
memory: 10Mi
# ---------------------------------------------------------------------
# PostgreSQL Oficial (para clientes)
# ---------------------------------------------------------------------
- name: prepull-postgres-alpine
image: postgres:17-alpine
command: ["echo", "PostgreSQL Alpine image cached"]
imagePullPolicy: Always
resources:
requests:
cpu: 1m
memory: 1Mi
limits:
cpu: 10m
memory: 10Mi
# ---------------------------------------------------------------------
# Redis
# ---------------------------------------------------------------------
- name: prepull-redis
image: redis:7-alpine
command: ["echo", "Redis image cached"]
imagePullPolicy: Always
resources:
requests:
cpu: 1m
memory: 1Mi
limits:
cpu: 10m
memory: 10Mi
# Container principal apenas mantém o DaemonSet vivo
containers:
- name: pause
image: gcr.io/google_containers/pause:3.9
resources:
requests:
cpu: 1m
memory: 1Mi
limits:
cpu: 10m
memory: 10Mi
# Secrets para registries privados
imagePullSecrets:
- name: gitlab-registry
---
# =============================================================================
# Secret para Registry Privado (template)
# =============================================================================
# Crie este secret em kube-system se usar registry privado:
#
# kubectl create secret docker-registry gitlab-registry \
# --namespace=kube-system \
# --docker-server=registry.kube.quest \
# --docker-username=<usuario> \
# --docker-password=<token>
# =============================================================================