├── .codecov.yml ├── .dockerignore ├── .github ├── ISSUE_TEMPLATE │ ├── architecture_question.yml │ ├── bug_report.yml │ ├── config.yml │ ├── feature_request.yml │ └── governance_discussion.yml └── workflows │ ├── build-and-publish.yml │ ├── helm-chart-releaser.yml │ ├── lint.yml │ ├── test-upgrade.yml │ └── tests.yml ├── .gitignore ├── .golangci.yml ├── CODE_OF_CONDUCT.md ├── CONTRIBUTING.md ├── Dockerfile ├── LICENSE.md ├── MAINTAINERS ├── Makefile ├── PROJECT ├── README.md ├── charts ├── 0.0.1 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── config │ │ │ ├── bitbucket-configuration.yaml │ │ │ ├── github-configuration.yaml │ │ │ └── gitlab-configuration.yaml │ │ ├── controller │ │ │ ├── auth_proxy_service.yaml │ │ │ └── manager.yaml │ │ ├── crd │ │ │ ├── syngit.syngit.io_remotesyncer.yaml │ │ │ ├── syngit.syngit.io_remoteuser.yaml │ │ │ └── syngit.syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── auth_proxy_client_clusterrole.yaml │ │ │ │ ├── auth_proxy_role.yaml │ │ │ │ ├── auth_proxy_role_binding.yaml │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer.yaml │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.0.2 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── config │ │ │ ├── bitbucket-configuration.yaml │ │ │ ├── github-configuration.yaml │ │ │ └── gitlab-configuration.yaml │ │ ├── controller │ │ │ ├── auth_proxy_service.yaml │ │ │ └── manager.yaml │ │ ├── crd │ │ │ ├── syngit.syngit.io_remotesyncer.yaml │ │ │ ├── syngit.syngit.io_remoteuser.yaml │ │ │ └── syngit.syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── auth_proxy_client_clusterrole.yaml │ │ │ │ ├── auth_proxy_role.yaml │ │ │ │ ├── auth_proxy_role_binding.yaml │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.0.3 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── config │ │ │ ├── bitbucket-configuration.yaml │ │ │ ├── github-configuration.yaml │ │ │ └── gitlab-configuration.yaml │ │ ├── controller │ │ │ ├── auth_proxy_service.yaml │ │ │ └── manager.yaml │ │ ├── crd │ │ │ ├── syngit.syngit.io_remotesyncer.yaml │ │ │ ├── syngit.syngit.io_remoteuser.yaml │ │ │ └── syngit.syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── auth_proxy_client_clusterrole.yaml │ │ │ │ ├── auth_proxy_role.yaml │ │ │ │ ├── auth_proxy_role_binding.yaml │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.0.4 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── config │ │ │ ├── bitbucket-configuration.yaml │ │ │ ├── github-configuration.yaml │ │ │ └── gitlab-configuration.yaml │ │ ├── controller │ │ │ ├── auth_proxy_service.yaml │ │ │ └── manager.yaml │ │ ├── crd │ │ │ ├── syngit.syngit.io_remotesyncer.yaml │ │ │ ├── syngit.syngit.io_remoteuser.yaml │ │ │ └── syngit.syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── auth_proxy_client_clusterrole.yaml │ │ │ │ ├── auth_proxy_role.yaml │ │ │ │ ├── auth_proxy_role_binding.yaml │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.0.5 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── config │ │ │ ├── bitbucket-configuration.yaml │ │ │ ├── github-configuration.yaml │ │ │ └── gitlab-configuration.yaml │ │ ├── controller │ │ │ ├── auth_proxy_service.yaml │ │ │ └── manager.yaml │ │ ├── crd │ │ │ ├── syngit.syngit.io_remotesyncer.yaml │ │ │ ├── syngit.syngit.io_remoteuser.yaml │ │ │ └── syngit.syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── auth_proxy_client_clusterrole.yaml │ │ │ │ ├── auth_proxy_role.yaml │ │ │ │ ├── auth_proxy_role_binding.yaml │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.1.0 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── auth_proxy_service.yaml │ │ │ └── manager.yaml │ │ ├── crd │ │ │ ├── syngit.syngit.io_remotesyncer.yaml │ │ │ ├── syngit.syngit.io_remoteuser.yaml │ │ │ └── syngit.syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── auth_proxy_client_clusterrole.yaml │ │ │ │ ├── auth_proxy_role.yaml │ │ │ │ ├── auth_proxy_role_binding.yaml │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.1.1 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── auth_proxy_service.yaml │ │ │ └── manager.yaml │ │ ├── crd │ │ │ ├── syngit.syngit.io_remotesyncer.yaml │ │ │ ├── syngit.syngit.io_remoteuser.yaml │ │ │ └── syngit.syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── auth_proxy_client_clusterrole.yaml │ │ │ │ ├── auth_proxy_role.yaml │ │ │ │ ├── auth_proxy_role_binding.yaml │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.2.0 │ ├── Chart.yaml │ ├── templates │ │ ├── api-group-conversion │ │ │ ├── api-group-conversion-job-rbac.yaml │ │ │ └── api-group-conversion-job.yaml │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── auth_proxy_service.yaml │ │ │ └── manager.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ ├── syngit.io_remoteuserbinding.yaml │ │ │ ├── syngit.syngit.io_remotesyncer.yaml │ │ │ ├── syngit.syngit.io_remoteuser.yaml │ │ │ └── syngit.syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── auth_proxy_client_clusterrole.yaml │ │ │ │ ├── auth_proxy_role.yaml │ │ │ │ ├── auth_proxy_role_binding.yaml │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.2.1 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.3.0 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.3.1 │ ├── Chart.yaml │ ├── templates │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhook.yaml │ └── values.yaml ├── 0.3.2 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.3.3 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── rub-migration │ │ │ ├── rub-migration-job.yaml │ │ │ └── rub-migration-rbac.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.3.4 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.3.5 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.0 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── rsy-migration │ │ │ ├── rsy-migration-job.yaml │ │ │ └── rsy-migration-rbac.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.1 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── rsy-migration │ │ │ ├── rsy-migration-job.yaml │ │ │ └── rsy-migration-rbac.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.2 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.3 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.4 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.5 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── post-migration │ │ │ ├── post-migration-rbac.yaml │ │ │ └── post-migration.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.6 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── post-migration │ │ │ ├── post-migration-rbac.yaml │ │ │ └── post-migration.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.7 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── post-migration │ │ │ ├── post-migration-rbac.yaml │ │ │ └── post-migration.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml ├── 0.4.8 │ ├── Chart.yaml │ ├── templates │ │ ├── NOTES.txt │ │ ├── certmanager │ │ │ └── certificate.yaml │ │ ├── controller │ │ │ ├── manager.yaml │ │ │ └── metrics_service.yaml │ │ ├── crd │ │ │ ├── syngit.io_remotesyncer.yaml │ │ │ ├── syngit.io_remotetargets.yaml │ │ │ ├── syngit.io_remoteuser.yaml │ │ │ └── syngit.io_remoteuserbinding.yaml │ │ ├── default │ │ │ └── excluded-fields-cm.yaml │ │ ├── monitoring │ │ │ └── monitor.yaml │ │ ├── network-policy │ │ │ ├── allow-metrics-traffic.yaml │ │ │ └── allow-webhook-traffic.yaml │ │ ├── post-migration │ │ │ ├── post-migration-rbac.yaml │ │ │ └── post-migration.yaml │ │ ├── providers │ │ │ ├── provider-github-controller.yaml │ │ │ ├── provider-gitlab-controller.yaml │ │ │ ├── provider-leader_election_role.yaml │ │ │ ├── providers-leader_election_role_binding.yaml │ │ │ ├── providers-role.yaml │ │ │ ├── providers-role_binding.yaml │ │ │ └── providers-service_account.yaml │ │ ├── rbac │ │ │ ├── controller │ │ │ │ ├── leader_election_role.yaml │ │ │ │ ├── leader_election_role_binding.yaml │ │ │ │ ├── role.yaml │ │ │ │ ├── role_binding.yaml │ │ │ │ └── service_account.yaml │ │ │ └── end-user │ │ │ │ ├── remotesyncer_editor_role.yaml │ │ │ │ ├── remotesyncer_viewer_role.yaml │ │ │ │ ├── remoteuser_editor_role.yaml │ │ │ │ ├── remoteuser_viewer_role.yaml │ │ │ │ ├── remoteuserbinding_editor_role.yaml │ │ │ │ └── remoteuserbinding_viewer_role.yaml │ │ ├── startupcheck │ │ │ ├── startupcheck-job.yaml │ │ │ └── startupcheck-rbac.yaml │ │ └── webhook │ │ │ ├── webhook-service.yaml │ │ │ └── webhooks.yaml │ └── values.yaml └── release_config.yml ├── cmd └── main.go ├── config ├── certmanager │ ├── certificate.yaml │ ├── kustomization.yaml │ └── kustomizeconfig.yaml ├── crd │ ├── bases │ │ ├── syngit.io_remotesyncers.yaml │ │ ├── syngit.io_remotetargets.yaml │ │ ├── syngit.io_remoteuserbindings.yaml │ │ └── syngit.io_remoteusers.yaml │ ├── kustomization.yaml │ ├── kustomizeconfig.yaml │ └── patches │ │ ├── cainjection_in_remotesyncers.yaml │ │ ├── cainjection_in_remotetargets.yaml │ │ ├── cainjection_in_remoteuserbindings.yaml │ │ ├── cainjection_in_remoteusers.yaml │ │ ├── webhook_in_remotesyncers.yaml │ │ ├── webhook_in_remotetargets.yaml │ │ ├── webhook_in_remoteuserbindings.yaml │ │ └── webhook_in_remoteusers.yaml ├── default │ ├── kustomization.yaml │ ├── manager_metrics_patch.yaml │ ├── manager_webhook_patch.yaml │ ├── metrics_service.yaml │ └── webhookcainjection_patch.yaml ├── local │ ├── deploy │ │ ├── kustomization.yaml │ │ ├── service.yaml │ │ └── webhook │ │ │ ├── kustomization.yaml │ │ │ └── secret.yaml │ └── run │ │ ├── kustomization.yaml │ │ └── webhook │ │ └── kustomization.yaml ├── manager │ ├── kustomization.yaml │ ├── manager.yaml │ └── manager_namespace.yaml ├── network-policy │ ├── allow-metrics-traffic.yaml │ ├── allow-webhook-traffic.yaml │ └── kustomization.yaml ├── prometheus │ ├── kustomization.yaml │ └── monitor.yaml ├── rbac │ ├── auth_proxy_client_clusterrole.yaml │ ├── auth_proxy_role.yaml │ ├── auth_proxy_role_binding.yaml │ ├── auth_proxy_service.yaml │ ├── kustomization.yaml │ ├── leader_election_role.yaml │ ├── leader_election_role_binding.yaml │ ├── remotesyncer_editor_role.yaml │ ├── remotesyncer_viewer_role.yaml │ ├── remotetarget_editor_role.yaml │ ├── remotetarget_viewer_role.yaml │ ├── remoteuser_editor_role.yaml │ ├── remoteuser_viewer_role.yaml │ ├── remoteuserbinding_editor_role.yaml │ ├── remoteuserbinding_viewer_role.yaml │ ├── role.yaml │ ├── role_binding.yaml │ └── service_account.yaml ├── samples │ ├── github.com-conf.yaml │ ├── gitlab.com-conf.yaml │ ├── kustomization.yaml │ ├── syngit_v1beta1_remotesyncer.yaml │ ├── syngit_v1beta1_remoteuser.yaml │ ├── syngit_v1beta1_remoteuserbinding.yaml │ ├── syngit_v1beta2_remotesyncer.yaml │ ├── syngit_v1beta2_remoteuser.yaml │ ├── syngit_v1beta2_remoteuserbinding.yaml │ ├── syngit_v1beta3_remotesyncer.yaml │ ├── syngit_v1beta3_remotetarget.yaml │ ├── syngit_v1beta3_remoteuser.yaml │ ├── syngit_v1beta3_remoteuserbinding.yaml │ ├── v1alpha1 │ │ ├── syngit_v1alpha1_remotesyncer.yaml │ │ ├── syngit_v1alpha1_remotesyncer2.yaml │ │ ├── syngit_v1alpha1_remoteuser.yaml │ │ └── syngit_v1alpha1_remoteuserbinding.yaml │ ├── v1alpha2 │ │ ├── syngit_v2alpha2_remotesyncer2.yaml │ │ ├── syngit_v2alpha2_remoteuser2.yaml │ │ └── syngit_v2alpha2_remoteuserbinding.yaml │ ├── v1alpha3 │ │ ├── syngit_v3alpha3_remotesyncer.yaml │ │ ├── syngit_v3alpha3_remoteuser.yaml │ │ └── syngit_v3alpha3_remoteuserbinding.yaml │ └── v1alpha4 │ │ ├── syngit_v1alpha4_remotesyncer.yaml │ │ ├── syngit_v1alpha4_remoteuser.yaml │ │ └── syngit_v1alpha4_remoteuserbinding.yaml └── webhook │ ├── dynamic-webhook.yaml │ ├── kustomization.yaml │ ├── kustomizeconfig.yaml │ ├── manifests.yaml │ └── service.yaml ├── go.mod ├── go.sum ├── hack ├── boilerplate.go.txt ├── tests │ ├── reset_test.sh │ └── run_one_test.sh └── webhooks │ ├── cert-injector.sh │ ├── cleanup-injector.sh │ ├── deploy │ └── inject-for-deploy.sh │ ├── gen-temp-certs.sh │ └── run │ └── inject-for-run.sh ├── img ├── gif-syngit-commitapply.gif ├── gif-syngit-commitonly.gif ├── icon.png ├── large-icon.png ├── logo.png ├── mini-icon.png └── wiki │ ├── conception │ ├── commitapply-proxy.png │ ├── commitonly-proxy.png │ ├── controller-ports.png │ ├── controller-process.png │ ├── full-gitops-lifecycle.png │ ├── handle-configmap-commitapply.png │ ├── handle-configmap-commitonly.png │ ├── reconcile-remotesyncer.png │ ├── reconcile-remoteuser.png │ ├── remote-git-server-configuration-inheritance.png │ ├── remoteuserbinding.png │ └── syngit-objects-architecture.png │ ├── contribute │ ├── main-webhooks-diff.png │ ├── storage-version-diff.png │ ├── syngit-package-diff.png │ └── webhook-version-diff.png │ └── usage │ ├── demo-configmap-excluded-fields.png │ └── demo-configmap-full-fiels.png ├── internal ├── controller │ ├── remotesyncer_controller.go │ ├── remotesyncer_controller_test.go │ ├── remotetarget_controller.go │ ├── remotetarget_controller_test.go │ ├── remoteuser_controller.go │ ├── remoteuser_controller_test.go │ ├── remoteuserbinding_controller.go │ ├── remoteuserbinding_controller_test.go │ └── suite_test.go ├── interceptor │ ├── dynamic_webhook_handlers.go │ ├── git_pusher.go │ ├── repo_retiever.go │ └── webhook_request_checker.go ├── patterns │ └── v1beta3 │ │ ├── patterns_types.go │ │ ├── remotesyncer_userspecificremover_pattern.go │ │ ├── remotesyncers_oneormanybranches.go │ │ ├── remoteuser_association.go │ │ ├── remoteuser_searchremotetarget.go │ │ ├── remoteuser_userspecific_pattern.go │ │ └── utils.go └── webhook │ ├── v1beta2 │ ├── remotesyncer_rules_permissions.go │ ├── remotesyncer_webhook.go │ ├── remotesyncer_webhook_test.go │ ├── remoteuser_association_webhook.go │ ├── remoteuser_secrets_permissions.go │ ├── remoteuser_webhook.go │ ├── remoteuser_webhook_test.go │ ├── remoteuserbinding_permissions.go │ ├── remoteuserbinding_webhook.go │ ├── remoteuserbinding_webhook_test.go │ └── webhook_suite_test.go │ └── v1beta3 │ ├── remotesyncer_pattern_target_webhook.go │ ├── remotesyncer_rules_permissions.go │ ├── remotesyncer_webhook.go │ ├── remotesyncer_webhook_test.go │ ├── remotetarget_webhook.go │ ├── remotetarget_webhook_test.go │ ├── remoteuser_pattern_association_webhook.go │ ├── remoteuser_secrets_permissions.go │ ├── remoteuser_webhook.go │ ├── remoteuser_webhook_test.go │ ├── remoteuserbinding_permissions.go │ ├── remoteuserbinding_webhook.go │ ├── remoteuserbinding_webhook_test.go │ └── webhook_suite_test.go ├── pkg ├── api │ ├── v1alpha1 │ │ ├── groupversion_info.go │ │ ├── remotesyncer_types.go │ │ ├── remotesyncer_webhook.go │ │ ├── remotesyncer_webhook_test.go │ │ ├── remoteuser_types.go │ │ ├── remoteuser_webhook.go │ │ ├── remoteuser_webhook_test.go │ │ ├── remoteuserbinding_types.go │ │ ├── webhook_suite_test.go │ │ └── zz_generated.deepcopy.go │ ├── v1alpha2 │ │ ├── groupversion_info.go │ │ ├── remotesyncer_types.go │ │ ├── remotesyncer_webhook.go │ │ ├── remotesyncer_webhook_test.go │ │ ├── remoteuser_types.go │ │ ├── remoteuser_webhook.go │ │ ├── remoteuser_webhook_test.go │ │ ├── remoteuserbinding_types.go │ │ ├── webhook_suite_test.go │ │ └── zz_generated.deepcopy.go │ ├── v1alpha3 │ │ ├── groupversion_info.go │ │ ├── remotesyncer_types.go │ │ ├── remotesyncer_webhook.go │ │ ├── remotesyncer_webhook_test.go │ │ ├── remoteuser_types.go │ │ ├── remoteuser_webhook.go │ │ ├── remoteuser_webhook_test.go │ │ ├── remoteuserbinding_types.go │ │ ├── webhook_suite_test.go │ │ └── zz_generated.deepcopy.go │ ├── v1alpha4 │ │ ├── groupversion_info.go │ │ ├── remotesyncer_types.go │ │ ├── remotesyncer_webhook.go │ │ ├── remotesyncer_webhook_test.go │ │ ├── remoteuser_types.go │ │ ├── remoteuser_webhook.go │ │ ├── remoteuser_webhook_test.go │ │ ├── remoteuserbinding_types.go │ │ ├── remoteuserbinding_webhook.go │ │ ├── remoteuserbinding_webhook_test.go │ │ ├── webhook_suite_test.go │ │ └── zz_generated.deepcopy.go │ ├── v1beta1 │ │ ├── groupversion_info.go │ │ ├── remotesyncer_conversion.go │ │ ├── remotesyncer_types.go │ │ ├── remotesyncer_webhook.go │ │ ├── remotesyncer_webhook_test.go │ │ ├── remoteuser_conversion.go │ │ ├── remoteuser_types.go │ │ ├── remoteuser_webhook.go │ │ ├── remoteuser_webhook_test.go │ │ ├── remoteuserbinding_conversion.go │ │ ├── remoteuserbinding_types.go │ │ ├── remoteuserbinding_webhook.go │ │ ├── remoteuserbinding_webhook_test.go │ │ ├── webhook_suite_test.go │ │ └── zz_generated.deepcopy.go │ ├── v1beta2 │ │ ├── groupversion_info.go │ │ ├── remotesyncer_conversion.go │ │ ├── remotesyncer_types.go │ │ ├── remoteuser_conversion.go │ │ ├── remoteuser_types.go │ │ ├── remoteuserbinding_conversion.go │ │ ├── remoteuserbinding_types.go │ │ └── zz_generated.deepcopy.go │ └── v1beta3 │ │ ├── groupversion_info.go │ │ ├── remotesyncer_conversion.go │ │ ├── remotesyncer_types.go │ │ ├── remotetarget_conversion.go │ │ ├── remotetarget_types.go │ │ ├── remoteuser_conversion.go │ │ ├── remoteuser_types.go │ │ ├── remoteuserbinding_conversion.go │ │ ├── remoteuserbinding_types.go │ │ └── zz_generated.deepcopy.go └── utils │ ├── ca-finder.go │ ├── conditions.go │ ├── errors.go │ ├── parser.go │ ├── remotetarget-references.go │ ├── sanitizer.go │ └── webhooks.go └── test ├── e2e ├── build │ ├── 01_webhook_servers_test.go │ ├── e2e_suite_test.go │ └── samples │ │ ├── sample_configmap.yaml │ │ ├── syngit_v1beta2_remotesyncer.yaml │ │ └── syngit_v1beta3_remotesyncer.yaml ├── e2e_test.go ├── helm │ ├── install │ │ ├── 01_webhook_servers_test.go │ │ └── e2e_suite_test.go │ └── upgrade │ │ ├── 01_webhook_servers_test.go │ │ └── e2e_suite_test.go └── syngit │ ├── 01_setup_remoteusers_test.go │ ├── 02_commitonly_cm_test.go │ ├── 03_commitapply_cm_test.go │ ├── 04_excludedfields_test.go │ ├── 05_defaultuser_test.go │ ├── 06_objects_lifecycle_test.go │ ├── 07_bypass_subject_test.go │ ├── 08_webhook_rbac_test.go │ ├── 09_multi_remotesyncer_test.go │ ├── 10_remoteuser_secret_access_test.go │ ├── 11_remoteuserbinding_permissions_test.go │ ├── 12_remoteuserbinding_managed_test.go │ ├── 13_remotesyncer_tls_test.go │ ├── 14_remoteuserbinding_cross_user_test.go │ ├── 15_conversion_webhook_test.go │ ├── 16_wrong_reference_value_test.go │ ├── 17_remoteuserbinding_selector_test.go │ ├── 18_cluster_default_excludedfields_test.go │ ├── 19_remotetarget_same_repo_branch_test.go │ ├── 20_objects_without_annotations_test.go │ ├── 21_remotetarget_one_different_branch_test.go │ ├── 22_remotetarget_multiple_different_branch_test.go │ ├── 23_remotetarger_selector._test.go │ ├── 24_remotesyncers_scope_remotetarget_test.go │ ├── 25_remotetarget_fastforward_merge_test.go │ ├── 26_remotetarget_hardreset_merge_test.go │ ├── 27_remotetarget_fastforward_hardreset_merge_test.go │ ├── 28_remoteuser_created_after_test.go │ ├── 29_pattern_remove_test.go │ └── e2e_suite_test.go └── utils ├── .env ├── custom-client.go ├── gitea.go ├── gitea ├── add-collaborator.sh ├── delete-gitea-repos.sh ├── gitea-gen-cert.sh ├── helm-values-jupyter.yaml ├── helm-values-saturn.yaml ├── launch-gitea-setup.sh ├── reset-gitea-repos.sh ├── setup-gitea-bind-platform1.sh ├── setup-gitea-bind-platform2.sh ├── setup-gitea-install.sh ├── setup-gitea-repos.sh └── setup-gitea-users.sh ├── mock-users.go ├── syngit.go └── utils.go /.codecov.yml: -------------------------------------------------------------------------------- 1 | coverage: 2 | status: 3 | project: false 4 | patch: false -------------------------------------------------------------------------------- /.dockerignore: -------------------------------------------------------------------------------- 1 | # More info: https://docs.docker.com/engine/reference/builder/#dockerignore-file 2 | # Ignore build and test binaries. 3 | bin/ 4 | -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/config.yml: -------------------------------------------------------------------------------- 1 | blank_issues_enabled: false 2 | contact_links: 3 | - name: Damien Dassieu 4 | about: If you need help or support, please request help here dassieu.damien@gmail.com -------------------------------------------------------------------------------- /.github/ISSUE_TEMPLATE/governance_discussion.yml: -------------------------------------------------------------------------------- 1 | 2 | name: Roadmap/Governance discussion 3 | description: Suggest a change about the roadmap or the governance 4 | title: "[GD]: " 5 | body: 6 | - type: dropdown 7 | attributes: 8 | label: Discussion subject 9 | multiple: false 10 | options: 11 | - Details needed 12 | - Change versionning on the roadmap 13 | - Reorder feature on the roadmap 14 | - Governance change proposal 15 | validations: 16 | required: true 17 | - type: textarea 18 | attributes: 19 | label: Give more details about the discussion subject 20 | validations: 21 | required: true 22 | -------------------------------------------------------------------------------- /.github/workflows/lint.yml: -------------------------------------------------------------------------------- 1 | name: Lint 2 | 3 | on: 4 | push: 5 | pull_request: 6 | 7 | jobs: 8 | lint: 9 | name: Lint the code 10 | permissions: {} 11 | runs-on: ubuntu-latest 12 | steps: 13 | - name: Clone the code 14 | uses: actions/checkout@v4.2.2 15 | 16 | - name: Setup Go 17 | uses: actions/setup-go@v5.2.0 18 | with: 19 | go-version: '1.23.3' 20 | 21 | - name: Run linter 22 | uses: golangci/golangci-lint-action@971e284b6050e8a5849b72094c50ab08da042db8 #v6.1.1 23 | with: 24 | version: v1.62.2 25 | args: --timeout=5m 26 | -------------------------------------------------------------------------------- /CODE_OF_CONDUCT.md: -------------------------------------------------------------------------------- 1 | # Code of Conduct 2 | 3 | We follow the [CNCF Code of Conduct](https://github.com/cncf/foundation/blob/main/code-of-conduct.md). 4 | 5 | Please contact dassieu.damien@gmail.com in order to report violations of the Code of Conduct. -------------------------------------------------------------------------------- /CONTRIBUTING.md: -------------------------------------------------------------------------------- 1 | # Contributing guidelines 2 | 3 | Please refer to [this](https://github.com/syngit-org/syngit/wiki/%F0%9F%A4%9D-Contribute) wiki page. 4 | -------------------------------------------------------------------------------- /MAINTAINERS: -------------------------------------------------------------------------------- 1 | Damien Dassieu @damsien -------------------------------------------------------------------------------- /charts/0.0.1/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.0.1 6 | appVersion: 0.0.1 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/config/bitbucket-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.bitbucket true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: bitbucket.org 6 | data: 7 | authenticationEndpoint: https://api.bitbucket.org/2.0/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.1/templates/config/github-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.github true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: github.com 6 | data: 7 | authenticationEndpoint: https://api.github.com/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.1/templates/config/gitlab-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.gitlab true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: gitlab.com 6 | data: 7 | authenticationEndpoint: https://gitlab.com/api/v4/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.1/templates/controller/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: v1 4 | kind: Service 5 | metadata: 6 | labels: 7 | control-plane: controller-manager 8 | app.kubernetes.io/name: service 9 | app.kubernetes.io/instance: controller-manager-metrics-service 10 | app.kubernetes.io/component: kube-rbac-proxy 11 | app.kubernetes.io/created-by: {{ .Release.Name }} 12 | app.kubernetes.io/part-of: {{ .Release.Name }} 13 | name: {{ .Release.Name }}-controller-manager-metrics-service 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | {{- end }} 23 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/rbac/controller/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | # {{- if eq .Values.controller.rbacProxy.enable true }} 2 | # --- 3 | # apiVersion: rbac.authorization.k8s.io/v1 4 | # kind: ClusterRole 5 | # metadata: 6 | # labels: 7 | # app.kubernetes.io/name: clusterrole 8 | # app.kubernetes.io/instance: metrics-reader 9 | # app.kubernetes.io/component: kube-rbac-proxy 10 | # app.kubernetes.io/created-by: {{ .Release.Name }} 11 | # app.kubernetes.io/part-of: {{ .Release.Name }} 12 | # name: {{ .Release.Name }}-metrics-reader 13 | # rules: 14 | # - nonResourceURLs: 15 | # - "/metrics" 16 | # verbs: 17 | # - get 18 | # {{- end }} 19 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/rbac/controller/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: proxy-role 9 | app.kubernetes.io/component: kube-rbac-proxy 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-proxy-role 13 | rules: 14 | - apiGroups: 15 | - authentication.k8s.io 16 | resources: 17 | - tokenreviews 18 | verbs: 19 | - create 20 | - apiGroups: 21 | - authorization.k8s.io 22 | resources: 23 | - subjectaccessreviews 24 | verbs: 25 | - create 26 | {{- end }} 27 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/rbac/end-user/remotesyncer.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to view remotesyncers. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remotesyncer-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remotesyncer-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remotesyncers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remotesyncers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuser-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuser-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.1/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.2/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.0.2 6 | appVersion: 0.0.2 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.0.2/templates/config/bitbucket-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.bitbucket true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: bitbucket.org 6 | data: 7 | authenticationEndpoint: https://api.bitbucket.org/2.0/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.2/templates/config/github-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.github true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: github.com 6 | data: 7 | authenticationEndpoint: https://api.github.com/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.2/templates/config/gitlab-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.gitlab true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: gitlab.com 6 | data: 7 | authenticationEndpoint: https://gitlab.com/api/v4/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.2/templates/controller/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: v1 4 | kind: Service 5 | metadata: 6 | labels: 7 | control-plane: controller-manager 8 | app.kubernetes.io/name: service 9 | app.kubernetes.io/instance: controller-manager-metrics-service 10 | app.kubernetes.io/component: kube-rbac-proxy 11 | app.kubernetes.io/created-by: {{ .Release.Name }} 12 | app.kubernetes.io/part-of: {{ .Release.Name }} 13 | name: {{ .Release.Name }}-controller-manager-metrics-service 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | {{- end }} 23 | -------------------------------------------------------------------------------- /charts/0.0.2/templates/rbac/controller/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | # {{- if eq .Values.controller.rbacProxy.enable true }} 2 | # --- 3 | # apiVersion: rbac.authorization.k8s.io/v1 4 | # kind: ClusterRole 5 | # metadata: 6 | # labels: 7 | # app.kubernetes.io/name: clusterrole 8 | # app.kubernetes.io/instance: metrics-reader 9 | # app.kubernetes.io/component: kube-rbac-proxy 10 | # app.kubernetes.io/created-by: {{ .Release.Name }} 11 | # app.kubernetes.io/part-of: {{ .Release.Name }} 12 | # name: {{ .Release.Name }}-metrics-reader 13 | # rules: 14 | # - nonResourceURLs: 15 | # - "/metrics" 16 | # verbs: 17 | # - get 18 | # {{- end }} 19 | -------------------------------------------------------------------------------- /charts/0.0.2/templates/rbac/controller/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: proxy-role 9 | app.kubernetes.io/component: kube-rbac-proxy 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-proxy-role 13 | rules: 14 | - apiGroups: 15 | - authentication.k8s.io 16 | resources: 17 | - tokenreviews 18 | verbs: 19 | - create 20 | - apiGroups: 21 | - authorization.k8s.io 22 | resources: 23 | - subjectaccessreviews 24 | verbs: 25 | - create 26 | {{- end }} 27 | -------------------------------------------------------------------------------- /charts/0.0.2/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.2/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.2/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.0.2/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.2/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.3/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.0.3 6 | appVersion: 0.0.3 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.0.3/templates/config/bitbucket-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.bitbucket true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: bitbucket.org 6 | data: 7 | authenticationEndpoint: https://api.bitbucket.org/2.0/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.3/templates/config/github-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.github true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: github.com 6 | data: 7 | authenticationEndpoint: https://api.github.com/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.3/templates/config/gitlab-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.gitlab true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: gitlab.com 6 | data: 7 | authenticationEndpoint: https://gitlab.com/api/v4/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.3/templates/controller/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: v1 4 | kind: Service 5 | metadata: 6 | labels: 7 | control-plane: controller-manager 8 | app.kubernetes.io/name: service 9 | app.kubernetes.io/instance: controller-manager-metrics-service 10 | app.kubernetes.io/component: kube-rbac-proxy 11 | app.kubernetes.io/created-by: {{ .Release.Name }} 12 | app.kubernetes.io/part-of: {{ .Release.Name }} 13 | name: {{ .Release.Name }}-controller-manager-metrics-service 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | {{- end }} 23 | -------------------------------------------------------------------------------- /charts/0.0.3/templates/rbac/controller/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | # {{- if eq .Values.controller.rbacProxy.enable true }} 2 | # --- 3 | # apiVersion: rbac.authorization.k8s.io/v1 4 | # kind: ClusterRole 5 | # metadata: 6 | # labels: 7 | # app.kubernetes.io/name: clusterrole 8 | # app.kubernetes.io/instance: metrics-reader 9 | # app.kubernetes.io/component: kube-rbac-proxy 10 | # app.kubernetes.io/created-by: {{ .Release.Name }} 11 | # app.kubernetes.io/part-of: {{ .Release.Name }} 12 | # name: {{ .Release.Name }}-metrics-reader 13 | # rules: 14 | # - nonResourceURLs: 15 | # - "/metrics" 16 | # verbs: 17 | # - get 18 | # {{- end }} 19 | -------------------------------------------------------------------------------- /charts/0.0.3/templates/rbac/controller/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: proxy-role 9 | app.kubernetes.io/component: kube-rbac-proxy 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-proxy-role 13 | rules: 14 | - apiGroups: 15 | - authentication.k8s.io 16 | resources: 17 | - tokenreviews 18 | verbs: 19 | - create 20 | - apiGroups: 21 | - authorization.k8s.io 22 | resources: 23 | - subjectaccessreviews 24 | verbs: 25 | - create 26 | {{- end }} 27 | -------------------------------------------------------------------------------- /charts/0.0.3/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.3/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.3/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.0.3/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.3/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.4/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.0.4 6 | appVersion: 0.0.4 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.0.4/templates/config/bitbucket-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.bitbucket true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: bitbucket.org 6 | data: 7 | authenticationEndpoint: https://api.bitbucket.org/2.0/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.4/templates/config/github-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.github true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: github.com 6 | data: 7 | authenticationEndpoint: https://api.github.com/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.4/templates/config/gitlab-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.gitlab true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: gitlab.com 6 | data: 7 | authenticationEndpoint: https://gitlab.com/api/v4/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.4/templates/controller/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: v1 4 | kind: Service 5 | metadata: 6 | labels: 7 | control-plane: controller-manager 8 | app.kubernetes.io/name: service 9 | app.kubernetes.io/instance: controller-manager-metrics-service 10 | app.kubernetes.io/component: kube-rbac-proxy 11 | app.kubernetes.io/created-by: {{ .Release.Name }} 12 | app.kubernetes.io/part-of: {{ .Release.Name }} 13 | name: {{ .Release.Name }}-controller-manager-metrics-service 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | {{- end }} 23 | -------------------------------------------------------------------------------- /charts/0.0.4/templates/rbac/controller/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | # {{- if eq .Values.controller.rbacProxy.enable true }} 2 | # --- 3 | # apiVersion: rbac.authorization.k8s.io/v1 4 | # kind: ClusterRole 5 | # metadata: 6 | # labels: 7 | # app.kubernetes.io/name: clusterrole 8 | # app.kubernetes.io/instance: metrics-reader 9 | # app.kubernetes.io/component: kube-rbac-proxy 10 | # app.kubernetes.io/created-by: {{ .Release.Name }} 11 | # app.kubernetes.io/part-of: {{ .Release.Name }} 12 | # name: {{ .Release.Name }}-metrics-reader 13 | # rules: 14 | # - nonResourceURLs: 15 | # - "/metrics" 16 | # verbs: 17 | # - get 18 | # {{- end }} 19 | -------------------------------------------------------------------------------- /charts/0.0.4/templates/rbac/controller/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: proxy-role 9 | app.kubernetes.io/component: kube-rbac-proxy 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-proxy-role 13 | rules: 14 | - apiGroups: 15 | - authentication.k8s.io 16 | resources: 17 | - tokenreviews 18 | verbs: 19 | - create 20 | - apiGroups: 21 | - authorization.k8s.io 22 | resources: 23 | - subjectaccessreviews 24 | verbs: 25 | - create 26 | {{- end }} 27 | -------------------------------------------------------------------------------- /charts/0.0.4/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.4/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.4/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.0.4/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.4/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.5/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.0.5 6 | appVersion: 0.0.5 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.0.5/templates/config/bitbucket-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.bitbucket true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: bitbucket.org 6 | data: 7 | authenticationEndpoint: https://api.bitbucket.org/2.0/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.5/templates/config/github-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.github true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: github.com 6 | data: 7 | authenticationEndpoint: https://api.github.com/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.5/templates/config/gitlab-configuration.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.configuration.gitlab true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: gitlab.com 6 | data: 7 | authenticationEndpoint: https://gitlab.com/api/v4/user 8 | {{- end }} -------------------------------------------------------------------------------- /charts/0.0.5/templates/controller/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: v1 4 | kind: Service 5 | metadata: 6 | labels: 7 | control-plane: controller-manager 8 | app.kubernetes.io/name: service 9 | app.kubernetes.io/instance: controller-manager-metrics-service 10 | app.kubernetes.io/component: kube-rbac-proxy 11 | app.kubernetes.io/created-by: {{ .Release.Name }} 12 | app.kubernetes.io/part-of: {{ .Release.Name }} 13 | name: {{ .Release.Name }}-controller-manager-metrics-service 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | {{- end }} 23 | -------------------------------------------------------------------------------- /charts/0.0.5/templates/rbac/controller/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | # {{- if eq .Values.controller.rbacProxy.enable true }} 2 | # --- 3 | # apiVersion: rbac.authorization.k8s.io/v1 4 | # kind: ClusterRole 5 | # metadata: 6 | # labels: 7 | # app.kubernetes.io/name: clusterrole 8 | # app.kubernetes.io/instance: metrics-reader 9 | # app.kubernetes.io/component: kube-rbac-proxy 10 | # app.kubernetes.io/created-by: {{ .Release.Name }} 11 | # app.kubernetes.io/part-of: {{ .Release.Name }} 12 | # name: {{ .Release.Name }}-metrics-reader 13 | # rules: 14 | # - nonResourceURLs: 15 | # - "/metrics" 16 | # verbs: 17 | # - get 18 | # {{- end }} 19 | -------------------------------------------------------------------------------- /charts/0.0.5/templates/rbac/controller/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: proxy-role 9 | app.kubernetes.io/component: kube-rbac-proxy 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-proxy-role 13 | rules: 14 | - apiGroups: 15 | - authentication.k8s.io 16 | resources: 17 | - tokenreviews 18 | verbs: 19 | - create 20 | - apiGroups: 21 | - authorization.k8s.io 22 | resources: 23 | - subjectaccessreviews 24 | verbs: 25 | - create 26 | {{- end }} 27 | -------------------------------------------------------------------------------- /charts/0.0.5/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.5/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.0.5/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.0.5/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.0.5/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.1.0/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.1.0 6 | appVersion: 0.1.0 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.1.0/templates/controller/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: v1 4 | kind: Service 5 | metadata: 6 | labels: 7 | control-plane: controller-manager 8 | app.kubernetes.io/name: service 9 | app.kubernetes.io/instance: controller-manager-metrics-service 10 | app.kubernetes.io/component: kube-rbac-proxy 11 | app.kubernetes.io/created-by: {{ .Release.Name }} 12 | app.kubernetes.io/part-of: {{ .Release.Name }} 13 | name: {{ .Release.Name }}-controller-manager-metrics-service 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | {{- end }} 23 | -------------------------------------------------------------------------------- /charts/0.1.0/templates/rbac/controller/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | # {{- if eq .Values.controller.rbacProxy.enable true }} 2 | # --- 3 | # apiVersion: rbac.authorization.k8s.io/v1 4 | # kind: ClusterRole 5 | # metadata: 6 | # labels: 7 | # app.kubernetes.io/name: clusterrole 8 | # app.kubernetes.io/instance: metrics-reader 9 | # app.kubernetes.io/component: kube-rbac-proxy 10 | # app.kubernetes.io/created-by: {{ .Release.Name }} 11 | # app.kubernetes.io/part-of: {{ .Release.Name }} 12 | # name: {{ .Release.Name }}-metrics-reader 13 | # rules: 14 | # - nonResourceURLs: 15 | # - "/metrics" 16 | # verbs: 17 | # - get 18 | # {{- end }} 19 | -------------------------------------------------------------------------------- /charts/0.1.0/templates/rbac/controller/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: proxy-role 9 | app.kubernetes.io/component: kube-rbac-proxy 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-proxy-role 13 | rules: 14 | - apiGroups: 15 | - authentication.k8s.io 16 | resources: 17 | - tokenreviews 18 | verbs: 19 | - create 20 | - apiGroups: 21 | - authorization.k8s.io 22 | resources: 23 | - subjectaccessreviews 24 | verbs: 25 | - create 26 | {{- end }} 27 | -------------------------------------------------------------------------------- /charts/0.1.0/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.1.0/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.1.0/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.1.0/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.1.0/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.1.1/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.1.1 6 | appVersion: 0.1.1 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.1.1/templates/controller/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: v1 4 | kind: Service 5 | metadata: 6 | labels: 7 | control-plane: controller-manager 8 | app.kubernetes.io/name: service 9 | app.kubernetes.io/instance: controller-manager-metrics-service 10 | app.kubernetes.io/component: kube-rbac-proxy 11 | app.kubernetes.io/created-by: {{ .Release.Name }} 12 | app.kubernetes.io/part-of: {{ .Release.Name }} 13 | name: {{ .Release.Name }}-controller-manager-metrics-service 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | {{- end }} 23 | -------------------------------------------------------------------------------- /charts/0.1.1/templates/rbac/controller/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | # {{- if eq .Values.controller.rbacProxy.enable true }} 2 | # --- 3 | # apiVersion: rbac.authorization.k8s.io/v1 4 | # kind: ClusterRole 5 | # metadata: 6 | # labels: 7 | # app.kubernetes.io/name: clusterrole 8 | # app.kubernetes.io/instance: metrics-reader 9 | # app.kubernetes.io/component: kube-rbac-proxy 10 | # app.kubernetes.io/created-by: {{ .Release.Name }} 11 | # app.kubernetes.io/part-of: {{ .Release.Name }} 12 | # name: {{ .Release.Name }}-metrics-reader 13 | # rules: 14 | # - nonResourceURLs: 15 | # - "/metrics" 16 | # verbs: 17 | # - get 18 | # {{- end }} 19 | -------------------------------------------------------------------------------- /charts/0.1.1/templates/rbac/controller/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: proxy-role 9 | app.kubernetes.io/component: kube-rbac-proxy 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-proxy-role 13 | rules: 14 | - apiGroups: 15 | - authentication.k8s.io 16 | resources: 17 | - tokenreviews 18 | verbs: 19 | - create 20 | - apiGroups: 21 | - authorization.k8s.io 22 | resources: 23 | - subjectaccessreviews 24 | verbs: 25 | - create 26 | {{- end }} 27 | -------------------------------------------------------------------------------- /charts/0.1.1/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.1.1/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.1.1/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.1.1/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.1.1/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.2.0/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.2.0 6 | appVersion: 0.2.0 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/controller/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: v1 4 | kind: Service 5 | metadata: 6 | labels: 7 | control-plane: controller-manager 8 | app.kubernetes.io/name: service 9 | app.kubernetes.io/instance: controller-manager-metrics-service 10 | app.kubernetes.io/component: kube-rbac-proxy 11 | app.kubernetes.io/created-by: {{ .Release.Name }} 12 | app.kubernetes.io/part-of: {{ .Release.Name }} 13 | name: {{ .Release.Name }}-controller-manager-metrics-service 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | {{- end }} 23 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/rbac/controller/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | # {{- if eq .Values.controller.rbacProxy.enable true }} 2 | # --- 3 | # apiVersion: rbac.authorization.k8s.io/v1 4 | # kind: ClusterRole 5 | # metadata: 6 | # labels: 7 | # app.kubernetes.io/name: clusterrole 8 | # app.kubernetes.io/instance: metrics-reader 9 | # app.kubernetes.io/component: kube-rbac-proxy 10 | # app.kubernetes.io/created-by: {{ .Release.Name }} 11 | # app.kubernetes.io/part-of: {{ .Release.Name }} 12 | # name: {{ .Release.Name }}-metrics-reader 13 | # rules: 14 | # - nonResourceURLs: 15 | # - "/metrics" 16 | # verbs: 17 | # - get 18 | # {{- end }} 19 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/rbac/controller/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.controller.rbacProxy.enable true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: proxy-role 9 | app.kubernetes.io/component: kube-rbac-proxy 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-proxy-role 13 | rules: 14 | - apiGroups: 15 | - authentication.k8s.io 16 | resources: 17 | - tokenreviews 18 | verbs: 19 | - create 20 | - apiGroups: 21 | - authorization.k8s.io 22 | resources: 23 | - subjectaccessreviews 24 | verbs: 25 | - create 26 | {{- end }} 27 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/rbac/end-user/remotesyncer_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to view remotesyncers. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remotesyncers-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remotesyncers-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remotesyncers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remotesyncers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.2.0/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.2.1/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.2.1 6 | appVersion: 0.2.1 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.2.1/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.2.1/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: controller-manager-sa 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.2.1/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.2.1/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.2.1/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.2.1/templates/rbac/end-user/remotesyncer_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to view remotesyncers. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remotesyncers-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remotesyncers-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remotesyncers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remotesyncers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.2.1/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.2.1/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.3.0/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.3.0 6 | appVersion: 0.3.0 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.3.0/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.3.0/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: controller-manager-sa 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.0/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.0/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.0/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.3.0/templates/rbac/end-user/remotesyncer_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to view remotesyncers. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remotesyncers-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remotesyncers-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remotesyncers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remotesyncers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.3.0/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.3.0/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.3.1/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.3.1 6 | appVersion: 0.3.1 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.3.1/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.3.1/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: controller-manager-sa 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.1/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: leader-election-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.1/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: manager-rolebinding 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.1/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: controller-manager-sa 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.3.1/templates/rbac/end-user/remotesyncer_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to view remotesyncers. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remotesyncers-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remotesyncers-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remotesyncers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remotesyncers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.3.1/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: gitremote-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-gitremote-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remoteusers 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remoteusers/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.3.1/templates/rbac/end-user/remoteuserbinding_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuserbinding-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-remoteuserbinding-viewer-role 12 | rules: 13 | - apiGroups: 14 | - syngit.io 15 | resources: 16 | - remoteuserbindings 17 | verbs: 18 | - get 19 | - list 20 | - watch 21 | - apiGroups: 22 | - syngit.io 23 | resources: 24 | - remoteuserbindings/status 25 | verbs: 26 | - get 27 | -------------------------------------------------------------------------------- /charts/0.3.2/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.3.2 6 | appVersion: 0.3.2 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.3.2/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.3.2/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.3.2/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.2/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.2/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.2/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.3.2/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.2/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.3.3/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.3.3 6 | appVersion: 0.3.3 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.3.3/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.3.3/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.3.3/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.3/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.3/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.3/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.3.3/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.3/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.3.4/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.3.4 6 | appVersion: 0.3.4 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.3.4/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.3.4/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.3.4/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.4/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.4/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.4/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.3.4/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.4/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.3.5/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.3.5 6 | appVersion: 0.3.5 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.3.5/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.3.5/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.3.5/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.5/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.5/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.3.5/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.3.5/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.3.5/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.0/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.4.0 6 | appVersion: 0.4.0 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.4.0/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.0/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.0/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.0/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.0/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.0/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.0/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.0/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.0/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.1/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources onto git 4 | type: application 5 | version: 0.4.1 6 | appVersion: 0.4.1 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.4.1/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.1/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.1/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.1/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.1/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.1/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.1/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.1/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.1/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.2/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources to git 4 | type: application 5 | version: 0.4.2 6 | appVersion: 0.4.2 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/mini-icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.4.2/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.2/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.2/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.2/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.2/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.2/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.2/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.2/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.2/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.3/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources to git 4 | type: application 5 | version: 0.4.3 6 | appVersion: 0.4.3 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/mini-icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.4.3/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.3/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.3/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.3/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.3/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.3/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.3/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.3/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.3/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.4/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources to git 4 | type: application 5 | version: 0.4.4 6 | appVersion: 0.4.4 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/mini-icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.4.4/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.4/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.4/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.4/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.4/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.4/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.4/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.4/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.4/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.5/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources to git 4 | type: application 5 | version: 0.4.5 6 | appVersion: 0.4.5 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/mini-icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.4.5/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.5/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.5/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.5/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.5/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.5/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.5/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.5/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.5/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.6/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources to git 4 | type: application 5 | version: 0.4.6 6 | appVersion: 0.4.6 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/mini-icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.4.6/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.6/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.6/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.6/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.6/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.6/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.6/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.6/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.6/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.7/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources to git 4 | type: application 5 | version: 0.4.7 6 | appVersion: 0.4.7 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/mini-icon.png 9 | maintainers: 10 | - email: dassieu.damien@gmail.com 11 | name: Damien 12 | -------------------------------------------------------------------------------- /charts/0.4.7/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.7/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.7/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.7/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.7/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.7/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.7/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.7/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.7/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/0.4.8/Chart.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v2 2 | name: syngit 3 | description: An operator to push resources to git 4 | type: application 5 | version: 0.4.8 6 | appVersion: 0.4.8 7 | home: https://github.com/syngit-org/syngit 8 | icon: https://raw.githubusercontent.com/syngit-org/syngit/main/img/mini-icon.png 9 | dependencies: 10 | - name: cert-manager 11 | condition: certmanager.dependency.enabled 12 | repository: https://charts.jetstack.io 13 | version: ~v1.17 14 | maintainers: 15 | - email: dassieu.damien@gmail.com 16 | name: Damien 17 | -------------------------------------------------------------------------------- /charts/0.4.8/templates/NOTES.txt: -------------------------------------------------------------------------------- 1 | syngit {{ .Chart.AppVersion }} has been deployed successfully! 2 | 3 | Information on the usage of the operator can be found here: 4 | https://github.com/syngit-org/syngit/wiki/📖-Usage 5 | 6 | More information about Syngit on the wiki: 7 | https://github.com/syngit-org/syngit/wiki -------------------------------------------------------------------------------- /charts/0.4.8/templates/controller/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: {{ .Release.Namespace }} 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /charts/0.4.8/templates/default/excluded-fields-cm.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.config.defaultExcludedFields.enabled true }} 2 | apiVersion: v1 3 | kind: ConfigMap 4 | metadata: 5 | name: default-excluded-fields 6 | namespace: {{ .Release.Namespace }} 7 | labels: 8 | syngit.io/cluster-default-excluded-fields: "true" 9 | data: 10 | excludedFields: | 11 | - metadata.annotations.[kubectl.kubernetes.io/last-applied-configuration] 12 | - metadata.creationTimestamp 13 | - metadata.generateName 14 | - metadata.generation 15 | - metadata.managedFields 16 | - metadata.resourceVersion 17 | - metadata.uid 18 | - status 19 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.8/templates/providers/providers-service_account.yaml: -------------------------------------------------------------------------------- 1 | {{- if or (eq .Values.providers.github.enabled true) (eq .Values.providers.gitlab.enabled true) }} 2 | --- 3 | apiVersion: v1 4 | kind: ServiceAccount 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: serviceaccount 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }}-providers 12 | name: {{ .Release.Name }}-providers-controller-manager 13 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.8/templates/rbac/controller/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: RoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: rolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: {{ .Release.Name }}-leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.8/templates/rbac/controller/role_binding.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRoleBinding 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrolebinding 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: {{ .Release.Name }}-manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: {{ .Release.Name }}-controller-manager 19 | namespace: {{ .Release.Namespace }} 20 | -------------------------------------------------------------------------------- /charts/0.4.8/templates/rbac/controller/service_account.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: v1 3 | kind: ServiceAccount 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: serviceaccount 7 | app.kubernetes.io/instance: {{ .Release.Name }} 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: {{ .Release.Name }} 10 | app.kubernetes.io/part-of: {{ .Release.Name }} 11 | name: {{ .Release.Name }}-controller-manager 12 | -------------------------------------------------------------------------------- /charts/0.4.8/templates/rbac/end-user/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | {{- if eq .Values.installEndUserRoles true }} 2 | --- 3 | apiVersion: rbac.authorization.k8s.io/v1 4 | kind: ClusterRole 5 | metadata: 6 | labels: 7 | app.kubernetes.io/name: clusterrole 8 | app.kubernetes.io/instance: {{ .Release.Name }} 9 | app.kubernetes.io/component: rbac 10 | app.kubernetes.io/created-by: {{ .Release.Name }} 11 | app.kubernetes.io/part-of: {{ .Release.Name }} 12 | name: {{ .Release.Name }}-gitremote-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | {{- end }} -------------------------------------------------------------------------------- /charts/0.4.8/templates/webhook/webhook-service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: {{ .Release.Name }} 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: {{ .Release.Name }} 9 | app.kubernetes.io/part-of: {{ .Release.Name }} 10 | name: syngit-webhook-service 11 | spec: 12 | ports: 13 | - port: 443 14 | protocol: TCP 15 | targetPort: 9443 16 | selector: 17 | control-plane: controller-manager -------------------------------------------------------------------------------- /charts/release_config.yml: -------------------------------------------------------------------------------- 1 | release-name-template: "v{{ .Version }}" -------------------------------------------------------------------------------- /config/certmanager/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - certificate.yaml 3 | 4 | configurations: 5 | - kustomizeconfig.yaml 6 | -------------------------------------------------------------------------------- /config/certmanager/kustomizeconfig.yaml: -------------------------------------------------------------------------------- 1 | # This configuration is for teaching kustomize how to update name ref substitution 2 | nameReference: 3 | - kind: Issuer 4 | group: cert-manager.io 5 | fieldSpecs: 6 | - kind: Certificate 7 | group: cert-manager.io 8 | path: spec/issuerRef/name 9 | -------------------------------------------------------------------------------- /config/crd/kustomizeconfig.yaml: -------------------------------------------------------------------------------- 1 | # This file is for teaching kustomize how to substitute name and namespace reference in CRD 2 | nameReference: 3 | - kind: Service 4 | version: v1 5 | fieldSpecs: 6 | - kind: CustomResourceDefinition 7 | version: v1 8 | group: apiextensions.k8s.io 9 | path: spec/conversion/webhook/clientConfig/service/name 10 | 11 | namespace: 12 | - kind: CustomResourceDefinition 13 | version: v1 14 | group: apiextensions.k8s.io 15 | path: spec/conversion/webhook/clientConfig/service/namespace 16 | create: false 17 | 18 | varReference: 19 | - path: metadata/annotations 20 | -------------------------------------------------------------------------------- /config/crd/patches/cainjection_in_remotesyncers.yaml: -------------------------------------------------------------------------------- 1 | # The following patch adds a directive for certmanager to inject CA into the CRD 2 | apiVersion: apiextensions.k8s.io/v1 3 | kind: CustomResourceDefinition 4 | metadata: 5 | annotations: 6 | cert-manager.io/inject-ca-from: CERTIFICATE_NAMESPACE/CERTIFICATE_NAME 7 | name: remotesyncers.syngit.syngit.io 8 | -------------------------------------------------------------------------------- /config/crd/patches/cainjection_in_remotetargets.yaml: -------------------------------------------------------------------------------- 1 | # The following patch adds a directive for certmanager to inject CA into the CRD 2 | apiVersion: apiextensions.k8s.io/v1 3 | kind: CustomResourceDefinition 4 | metadata: 5 | annotations: 6 | cert-manager.io/inject-ca-from: CERTIFICATE_NAMESPACE/CERTIFICATE_NAME 7 | name: remotetargets.syngit.syngit.io 8 | -------------------------------------------------------------------------------- /config/crd/patches/cainjection_in_remoteuserbindings.yaml: -------------------------------------------------------------------------------- 1 | # The following patch adds a directive for certmanager to inject CA into the CRD 2 | apiVersion: apiextensions.k8s.io/v1 3 | kind: CustomResourceDefinition 4 | metadata: 5 | annotations: 6 | cert-manager.io/inject-ca-from: CERTIFICATE_NAMESPACE/CERTIFICATE_NAME 7 | name: remoteuserbindings.syngit.syngit.io 8 | -------------------------------------------------------------------------------- /config/crd/patches/cainjection_in_remoteusers.yaml: -------------------------------------------------------------------------------- 1 | # The following patch adds a directive for certmanager to inject CA into the CRD 2 | apiVersion: apiextensions.k8s.io/v1 3 | kind: CustomResourceDefinition 4 | metadata: 5 | annotations: 6 | cert-manager.io/inject-ca-from: CERTIFICATE_NAMESPACE/CERTIFICATE_NAME 7 | name: remoteusers.syngit.syngit.io 8 | -------------------------------------------------------------------------------- /config/crd/patches/webhook_in_remotesyncers.yaml: -------------------------------------------------------------------------------- 1 | # The following patch enables a conversion webhook for the CRD 2 | apiVersion: apiextensions.k8s.io/v1 3 | kind: CustomResourceDefinition 4 | metadata: 5 | name: remotesyncers.syngit.io 6 | spec: 7 | conversion: 8 | strategy: Webhook 9 | webhook: 10 | clientConfig: 11 | service: 12 | namespace: system 13 | name: webhook-service 14 | path: /convert 15 | conversionReviewVersions: 16 | - v1 17 | -------------------------------------------------------------------------------- /config/crd/patches/webhook_in_remotetargets.yaml: -------------------------------------------------------------------------------- 1 | # The following patch enables a conversion webhook for the CRD 2 | apiVersion: apiextensions.k8s.io/v1 3 | kind: CustomResourceDefinition 4 | metadata: 5 | name: remotetargets.syngit.io 6 | spec: 7 | conversion: 8 | strategy: Webhook 9 | webhook: 10 | clientConfig: 11 | service: 12 | namespace: system 13 | name: webhook-service 14 | path: /convert 15 | conversionReviewVersions: 16 | - v1 17 | -------------------------------------------------------------------------------- /config/crd/patches/webhook_in_remoteuserbindings.yaml: -------------------------------------------------------------------------------- 1 | # The following patch enables a conversion webhook for the CRD 2 | apiVersion: apiextensions.k8s.io/v1 3 | kind: CustomResourceDefinition 4 | metadata: 5 | name: remoteuserbindings.syngit.io 6 | spec: 7 | conversion: 8 | strategy: Webhook 9 | webhook: 10 | clientConfig: 11 | service: 12 | namespace: system 13 | name: webhook-service 14 | path: /convert 15 | conversionReviewVersions: 16 | - v1 17 | -------------------------------------------------------------------------------- /config/crd/patches/webhook_in_remoteusers.yaml: -------------------------------------------------------------------------------- 1 | # The following patch enables a conversion webhook for the CRD 2 | apiVersion: apiextensions.k8s.io/v1 3 | kind: CustomResourceDefinition 4 | metadata: 5 | name: remoteusers.syngit.io 6 | spec: 7 | conversion: 8 | strategy: Webhook 9 | webhook: 10 | clientConfig: 11 | service: 12 | namespace: system 13 | name: webhook-service 14 | path: /convert 15 | conversionReviewVersions: 16 | - v1 17 | -------------------------------------------------------------------------------- /config/default/manager_metrics_patch.yaml: -------------------------------------------------------------------------------- 1 | # This patch adds the args to allow exposing the metrics endpoint using HTTPS 2 | - op: add 3 | path: /spec/template/spec/containers/0/args/0 4 | value: --metrics-bind-address=:8443 5 | -------------------------------------------------------------------------------- /config/default/manager_webhook_patch.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: apps/v1 2 | kind: Deployment 3 | metadata: 4 | name: controller-manager 5 | namespace: system 6 | spec: 7 | template: 8 | spec: 9 | containers: 10 | - name: manager 11 | ports: 12 | - containerPort: 9443 13 | name: webhook-server 14 | protocol: TCP 15 | volumeMounts: 16 | - mountPath: /tmp/k8s-webhook-server/serving-certs 17 | name: cert 18 | readOnly: true 19 | volumes: 20 | - name: cert 21 | secret: 22 | defaultMode: 420 23 | secretName: syngit-webhook-server-cert 24 | -------------------------------------------------------------------------------- /config/default/metrics_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/managed-by: kustomize 8 | name: controller-manager-metrics-service 9 | namespace: system 10 | spec: 11 | ports: 12 | - name: https 13 | port: 8443 14 | protocol: TCP 15 | targetPort: 8443 16 | selector: 17 | control-plane: controller-manager 18 | -------------------------------------------------------------------------------- /config/local/deploy/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - crd 3 | - webhook 4 | - service.yaml 5 | 6 | namespace: syngit 7 | 8 | namePrefix: syngit- 9 | -------------------------------------------------------------------------------- /config/local/deploy/service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: webhook-service 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: syngit 9 | app.kubernetes.io/part-of: syngit 10 | app.kubernetes.io/managed-by: kustomize 11 | name: webhook-service 12 | namespace: system 13 | spec: 14 | ports: 15 | - port: 443 16 | protocol: TCP 17 | targetPort: 9443 18 | selector: 19 | control-plane: controller-manager 20 | -------------------------------------------------------------------------------- /config/local/deploy/webhook/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - webhook.yaml 3 | - secret.yaml -------------------------------------------------------------------------------- /config/local/deploy/webhook/secret.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Secret 3 | metadata: 4 | name: webhook-server-cert 5 | namespace: system 6 | type: kubernetes.io/tls 7 | data: 8 | tls.crt: 9 | tls.key: 10 | -------------------------------------------------------------------------------- /config/local/run/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - crd 3 | - webhook -------------------------------------------------------------------------------- /config/local/run/webhook/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - webhook.yaml -------------------------------------------------------------------------------- /config/manager/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - manager_namespace.yaml 3 | - manager.yaml 4 | apiVersion: kustomize.config.k8s.io/v1beta1 5 | kind: Kustomization 6 | images: 7 | - name: controller 8 | newName: local/syngit-controller 9 | newTag: dev 10 | -------------------------------------------------------------------------------- /config/manager/manager_namespace.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Namespace 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: namespace 7 | app.kubernetes.io/instance: system 8 | app.kubernetes.io/component: manager 9 | app.kubernetes.io/created-by: operator 10 | app.kubernetes.io/part-of: operator 11 | app.kubernetes.io/managed-by: kustomize 12 | name: system -------------------------------------------------------------------------------- /config/network-policy/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - allow-webhook-traffic.yaml 3 | - allow-metrics-traffic.yaml 4 | -------------------------------------------------------------------------------- /config/prometheus/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - monitor.yaml 3 | -------------------------------------------------------------------------------- /config/rbac/auth_proxy_client_clusterrole.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: rbac.authorization.k8s.io/v1 2 | kind: ClusterRole 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: clusterrole 6 | app.kubernetes.io/instance: metrics-reader 7 | app.kubernetes.io/component: kube-rbac-proxy 8 | app.kubernetes.io/created-by: syngit 9 | app.kubernetes.io/part-of: syngit 10 | app.kubernetes.io/managed-by: kustomize 11 | name: metrics-reader 12 | rules: 13 | - nonResourceURLs: 14 | - "/metrics" 15 | verbs: 16 | - get 17 | -------------------------------------------------------------------------------- /config/rbac/auth_proxy_role.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: rbac.authorization.k8s.io/v1 2 | kind: ClusterRole 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: clusterrole 6 | app.kubernetes.io/instance: proxy-role 7 | app.kubernetes.io/component: kube-rbac-proxy 8 | app.kubernetes.io/created-by: syngit 9 | app.kubernetes.io/part-of: syngit 10 | app.kubernetes.io/managed-by: kustomize 11 | name: proxy-role 12 | rules: 13 | - apiGroups: 14 | - authentication.k8s.io 15 | resources: 16 | - tokenreviews 17 | verbs: 18 | - create 19 | - apiGroups: 20 | - authorization.k8s.io 21 | resources: 22 | - subjectaccessreviews 23 | verbs: 24 | - create 25 | -------------------------------------------------------------------------------- /config/rbac/auth_proxy_role_binding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: rbac.authorization.k8s.io/v1 2 | kind: ClusterRoleBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: clusterrolebinding 6 | app.kubernetes.io/instance: proxy-rolebinding 7 | app.kubernetes.io/component: kube-rbac-proxy 8 | app.kubernetes.io/created-by: syngit 9 | app.kubernetes.io/part-of: syngit 10 | app.kubernetes.io/managed-by: kustomize 11 | name: proxy-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: proxy-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: controller-manager 19 | namespace: system 20 | -------------------------------------------------------------------------------- /config/rbac/auth_proxy_service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | control-plane: controller-manager 6 | app.kubernetes.io/name: service 7 | app.kubernetes.io/instance: controller-manager-metrics-service 8 | app.kubernetes.io/component: kube-rbac-proxy 9 | app.kubernetes.io/created-by: syngit 10 | app.kubernetes.io/part-of: syngit 11 | app.kubernetes.io/managed-by: kustomize 12 | name: controller-manager-metrics-service 13 | namespace: system 14 | spec: 15 | ports: 16 | - name: https 17 | port: 8443 18 | protocol: TCP 19 | targetPort: https 20 | selector: 21 | control-plane: controller-manager 22 | -------------------------------------------------------------------------------- /config/rbac/leader_election_role_binding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: rbac.authorization.k8s.io/v1 2 | kind: RoleBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: rolebinding 6 | app.kubernetes.io/instance: leader-election-rolebinding 7 | app.kubernetes.io/component: rbac 8 | app.kubernetes.io/created-by: syngit 9 | app.kubernetes.io/part-of: syngit 10 | app.kubernetes.io/managed-by: kustomize 11 | name: leader-election-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: Role 15 | name: leader-election-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: controller-manager 19 | namespace: system 20 | -------------------------------------------------------------------------------- /config/rbac/remotesyncer_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to view remotesyncers. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remotesyncer-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: syngit 10 | app.kubernetes.io/part-of: syngit 11 | app.kubernetes.io/managed-by: kustomize 12 | name: remotesyncer-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.syngit.io 16 | resources: 17 | - remotesyncers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.syngit.io 24 | resources: 25 | - remotesyncers/status 26 | verbs: 27 | - get 28 | -------------------------------------------------------------------------------- /config/rbac/remotetarget_editor_role.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to edit remotetargets. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: syngit 7 | app.kubernetes.io/managed-by: kustomize 8 | name: remotetarget-editor-role 9 | rules: 10 | - apiGroups: 11 | - syngit.io 12 | resources: 13 | - remotetargets 14 | verbs: 15 | - create 16 | - delete 17 | - get 18 | - list 19 | - patch 20 | - update 21 | - watch 22 | - apiGroups: 23 | - syngit.io 24 | resources: 25 | - remotetargets/status 26 | verbs: 27 | - get 28 | -------------------------------------------------------------------------------- /config/rbac/remotetarget_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to view remotetargets. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: syngit 7 | app.kubernetes.io/managed-by: kustomize 8 | name: remotetarget-viewer-role 9 | rules: 10 | - apiGroups: 11 | - syngit.io 12 | resources: 13 | - remotetargets 14 | verbs: 15 | - get 16 | - list 17 | - watch 18 | - apiGroups: 19 | - syngit.io 20 | resources: 21 | - remotetargets/status 22 | verbs: 23 | - get 24 | -------------------------------------------------------------------------------- /config/rbac/remoteuser_viewer_role.yaml: -------------------------------------------------------------------------------- 1 | # permissions for end users to view remoteusers. 2 | apiVersion: rbac.authorization.k8s.io/v1 3 | kind: ClusterRole 4 | metadata: 5 | labels: 6 | app.kubernetes.io/name: clusterrole 7 | app.kubernetes.io/instance: remoteuser-viewer-role 8 | app.kubernetes.io/component: rbac 9 | app.kubernetes.io/created-by: syngit 10 | app.kubernetes.io/part-of: syngit 11 | app.kubernetes.io/managed-by: kustomize 12 | name: remoteuser-viewer-role 13 | rules: 14 | - apiGroups: 15 | - syngit.syngit.io 16 | resources: 17 | - remoteusers 18 | verbs: 19 | - get 20 | - list 21 | - watch 22 | - apiGroups: 23 | - syngit.syngit.io 24 | resources: 25 | - remoteusers/status 26 | verbs: 27 | - get 28 | -------------------------------------------------------------------------------- /config/rbac/role_binding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: rbac.authorization.k8s.io/v1 2 | kind: ClusterRoleBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: clusterrolebinding 6 | app.kubernetes.io/instance: manager-rolebinding 7 | app.kubernetes.io/component: rbac 8 | app.kubernetes.io/created-by: syngit 9 | app.kubernetes.io/part-of: syngit 10 | app.kubernetes.io/managed-by: kustomize 11 | name: manager-rolebinding 12 | roleRef: 13 | apiGroup: rbac.authorization.k8s.io 14 | kind: ClusterRole 15 | name: manager-role 16 | subjects: 17 | - kind: ServiceAccount 18 | name: controller-manager 19 | namespace: system 20 | -------------------------------------------------------------------------------- /config/rbac/service_account.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: ServiceAccount 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: serviceaccount 6 | app.kubernetes.io/instance: controller-manager-sa 7 | app.kubernetes.io/component: rbac 8 | app.kubernetes.io/created-by: syngit 9 | app.kubernetes.io/part-of: syngit 10 | app.kubernetes.io/managed-by: kustomize 11 | name: controller-manager 12 | namespace: system 13 | -------------------------------------------------------------------------------- /config/samples/github.com-conf.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: ConfigMap 3 | metadata: 4 | name: github.com 5 | namespace: syngit-system 6 | data: 7 | authenticationEndpoint: https://api.github.com/user -------------------------------------------------------------------------------- /config/samples/gitlab.com-conf.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | data: 3 | authenticationEndpoint: https://gitlab.com/api/v4/user 4 | kind: ConfigMap 5 | metadata: 6 | name: gitlab.com 7 | namespace: syngit-system 8 | -------------------------------------------------------------------------------- /config/samples/kustomization.yaml: -------------------------------------------------------------------------------- 1 | ## Append samples of your project ## 2 | resources: 3 | - syngit_v1beta1_remoteuser.yaml 4 | - syngit_v1beta1_remoteuserbinding.yaml 5 | - syngit_v1beta1_remotesyncer.yaml 6 | - syngit_v1beta2_remotesyncer.yaml 7 | - syngit_v1beta2_remoteuserbinding.yaml 8 | - syngit_v1beta2_remoteuser.yaml 9 | - syngit_v1beta3_remoteuser.yaml 10 | - syngit_v1beta3_remoteuserbinding.yaml 11 | - syngit_v1beta3_remotesyncer.yaml 12 | - syngit_v1beta3_remotetarget.yaml 13 | #+kubebuilder:scaffold:manifestskustomizesamples 14 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta1_remotesyncer.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1beta1 2 | kind: RemoteSyncer 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remotesyncer 6 | app.kubernetes.io/instance: remotesyncer-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remotesyncer-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta1_remoteuser.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1beta1 2 | kind: RemoteUser 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuser 6 | app.kubernetes.io/instance: remoteuser-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuser-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta1_remoteuserbinding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1beta1 2 | kind: RemoteUserBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuserbinding 6 | app.kubernetes.io/instance: remoteuserbinding-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuserbinding-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta2_remotesyncer.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1beta2 2 | kind: RemoteSyncer 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remotesyncer 6 | app.kubernetes.io/instance: remotesyncer-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remotesyncer-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta2_remoteuser.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1beta2 2 | kind: RemoteUser 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuser 6 | app.kubernetes.io/instance: remoteuser-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuser-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta2_remoteuserbinding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1beta2 2 | kind: RemoteUserBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuserbinding 6 | app.kubernetes.io/instance: remoteuserbinding-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuserbinding-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta3_remotesyncer.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.io/v1beta3 2 | kind: RemoteSyncer 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: syngit 6 | app.kubernetes.io/managed-by: kustomize 7 | name: remotesyncer-sample 8 | spec: 9 | # TODO(user): Add fields here 10 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta3_remotetarget.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.io/v1beta3 2 | kind: RemoteTarget 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: syngit 6 | app.kubernetes.io/managed-by: kustomize 7 | name: remotetarget-sample 8 | spec: 9 | # TODO(user): Add fields here 10 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta3_remoteuser.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.io/v1beta3 2 | kind: RemoteUser 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: syngit 6 | app.kubernetes.io/managed-by: kustomize 7 | name: remoteuser-sample 8 | spec: 9 | # TODO(user): Add fields here 10 | -------------------------------------------------------------------------------- /config/samples/syngit_v1beta3_remoteuserbinding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.io/v1beta3 2 | kind: RemoteUserBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: syngit 6 | app.kubernetes.io/managed-by: kustomize 7 | name: remoteuserbinding-sample 8 | spec: 9 | # TODO(user): Add fields here 10 | -------------------------------------------------------------------------------- /config/samples/v1alpha1/syngit_v1alpha1_remoteuser.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha1 2 | kind: RemoteUser 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuser 6 | app.kubernetes.io/instance: remoteuser-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuser-sample 11 | namespace: test 12 | spec: 13 | gitBaseDomainFQDN: "gitlab.com" 14 | testAuthentication: true 15 | email: "" 16 | secretRef: 17 | name: secret-basic-auth 18 | -------------------------------------------------------------------------------- /config/samples/v1alpha1/syngit_v1alpha1_remoteuserbinding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha1 2 | kind: RemoteUserBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuserbinding 6 | app.kubernetes.io/instance: remoteuserbinding-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuserbinding-sample 11 | namespace: test 12 | spec: 13 | subject: 14 | kind: User 15 | name: kubernetes-admin 16 | remoteRefs: 17 | - name: remoteuser-sample 18 | #- name: another-one 19 | #- name: remoteuser-sample2 20 | -------------------------------------------------------------------------------- /config/samples/v1alpha2/syngit_v2alpha2_remotesyncer2.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha2 2 | kind: RemoteSyncer 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remotesyncer 6 | app.kubernetes.io/instance: remotesyncer-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remotesyncer-sample 11 | namespace: test 12 | spec: 13 | -------------------------------------------------------------------------------- /config/samples/v1alpha2/syngit_v2alpha2_remoteuser2.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha2 2 | kind: RemoteUser 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuser 6 | app.kubernetes.io/instance: remoteuser-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuser-sample2 11 | namespace: test 12 | spec: 13 | -------------------------------------------------------------------------------- /config/samples/v1alpha2/syngit_v2alpha2_remoteuserbinding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha2 2 | kind: RemoteUserBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuserbinding 6 | app.kubernetes.io/instance: remoteuserbinding-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuserbinding-sample 11 | namespace: test 12 | spec: 13 | -------------------------------------------------------------------------------- /config/samples/v1alpha3/syngit_v3alpha3_remotesyncer.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha3 2 | kind: RemoteSyncer 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remotesyncer 6 | app.kubernetes.io/instance: remotesyncer-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remotesyncer-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/v1alpha3/syngit_v3alpha3_remoteuser.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha3 2 | kind: RemoteUser 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuser 6 | app.kubernetes.io/instance: remoteuser-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuser-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/v1alpha3/syngit_v3alpha3_remoteuserbinding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha3 2 | kind: RemoteUserBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuserbinding 6 | app.kubernetes.io/instance: remoteuserbinding-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuserbinding-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/v1alpha4/syngit_v1alpha4_remotesyncer.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha4 2 | kind: RemoteSyncer 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remotesyncer 6 | app.kubernetes.io/instance: remotesyncer-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remotesyncer-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/v1alpha4/syngit_v1alpha4_remoteuser.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha4 2 | kind: RemoteUser 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuser 6 | app.kubernetes.io/instance: remoteuser-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuser-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/samples/v1alpha4/syngit_v1alpha4_remoteuserbinding.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.syngit.io/v1alpha4 2 | kind: RemoteUserBinding 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: remoteuserbinding 6 | app.kubernetes.io/instance: remoteuserbinding-sample 7 | app.kubernetes.io/part-of: syngit 8 | app.kubernetes.io/managed-by: kustomize 9 | app.kubernetes.io/created-by: syngit 10 | name: remoteuserbinding-sample 11 | spec: 12 | # TODO(user): Add fields here 13 | -------------------------------------------------------------------------------- /config/webhook/dynamic-webhook.yaml: -------------------------------------------------------------------------------- 1 | --- 2 | apiVersion: admissionregistration.k8s.io/v1 3 | kind: ValidatingWebhookConfiguration 4 | metadata: 5 | name: dynamic-remotesyncer-webhook 6 | webhooks: [] -------------------------------------------------------------------------------- /config/webhook/kustomization.yaml: -------------------------------------------------------------------------------- 1 | resources: 2 | - dynamic-webhook.yaml 3 | - manifests.yaml 4 | - service.yaml 5 | 6 | configurations: 7 | - kustomizeconfig.yaml 8 | -------------------------------------------------------------------------------- /config/webhook/service.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: Service 3 | metadata: 4 | labels: 5 | app.kubernetes.io/name: service 6 | app.kubernetes.io/instance: webhook-service 7 | app.kubernetes.io/component: webhook 8 | app.kubernetes.io/created-by: syngit 9 | app.kubernetes.io/part-of: syngit 10 | app.kubernetes.io/managed-by: kustomize 11 | name: webhook-service 12 | namespace: system 13 | spec: 14 | ports: 15 | - port: 443 16 | protocol: TCP 17 | targetPort: 9443 18 | selector: 19 | control-plane: controller-manager 20 | -------------------------------------------------------------------------------- /hack/boilerplate.go.txt: -------------------------------------------------------------------------------- 1 | /* 2 | Copyright 2024. 3 | 4 | Licensed under the Apache License, Version 2.0 (the "License"); 5 | you may not use this file except in compliance with the License. 6 | You may obtain a copy of the License at 7 | 8 | http://www.apache.org/licenses/LICENSE-2.0 9 | 10 | Unless required by applicable law or agreed to in writing, software 11 | distributed under the License is distributed on an "AS IS" BASIS, 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | See the License for the specific language governing permissions and 14 | limitations under the License. 15 | */ -------------------------------------------------------------------------------- /hack/tests/reset_test.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | DIRECTORY="test/e2e/syngit" 4 | 5 | # Iterate through the files in the directory 6 | for FILE in "$DIRECTORY"/*.ignore; do 7 | # Check if there are any matching files 8 | if [ -e "$FILE" ]; then 9 | # Remove the ".ignore" suffix 10 | NEW_NAME="${FILE%.ignore}" 11 | mv "$FILE" "$NEW_NAME" 12 | fi 13 | done 14 | -------------------------------------------------------------------------------- /hack/webhooks/cleanup-injector.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | if [ "$#" -ne 1 ]; then 4 | echo "Usage: $0 " 5 | exit 1 6 | fi 7 | 8 | CERT_DIR=$1 9 | 10 | rm -rf config/local/run/webhook/webhook.yaml 11 | rm -rf config/local/run/crd 12 | rm -rf config/local/deploy/webhook/webhook.yaml 13 | rm -rf config/local/deploy/crd 14 | rm -rf $CERT_DIR -------------------------------------------------------------------------------- /hack/webhooks/deploy/inject-for-deploy.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | if [ "$#" -ne 2 ]; then 4 | echo "Usage: $0 " 5 | exit 1 6 | fi 7 | 8 | LOCAL_PATH=config/local/deploy 9 | CERT_DIR=$1 10 | WEBHOOK_PATH=$2 11 | 12 | cp $WEBHOOK_PATH/service.yaml $LOCAL_PATH/service.yaml 13 | 14 | cp $LOCAL_PATH/webhook/secret.yaml $LOCAL_PATH/webhook/secret.yaml.bak 15 | 16 | server_crt_base64=$(cat ${CERT_DIR}/tls.crt | base64 | tr -d '\n') 17 | server_key_base64=$(cat ${CERT_DIR}/tls.key | base64 | tr -d '\n') 18 | 19 | # Update the Secret 20 | sed -i -e "/tls.crt:/c\ tls.crt: $server_crt_base64" \ 21 | -e "/tls.key:/c\ tls.key: $server_key_base64" $LOCAL_PATH/webhook/secret.yaml 22 | 23 | -------------------------------------------------------------------------------- /img/gif-syngit-commitapply.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/gif-syngit-commitapply.gif -------------------------------------------------------------------------------- /img/gif-syngit-commitonly.gif: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/gif-syngit-commitonly.gif -------------------------------------------------------------------------------- /img/icon.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/icon.png -------------------------------------------------------------------------------- /img/large-icon.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/large-icon.png -------------------------------------------------------------------------------- /img/logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/logo.png -------------------------------------------------------------------------------- /img/mini-icon.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/mini-icon.png -------------------------------------------------------------------------------- /img/wiki/conception/commitapply-proxy.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/commitapply-proxy.png -------------------------------------------------------------------------------- /img/wiki/conception/commitonly-proxy.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/commitonly-proxy.png -------------------------------------------------------------------------------- /img/wiki/conception/controller-ports.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/controller-ports.png -------------------------------------------------------------------------------- /img/wiki/conception/controller-process.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/controller-process.png -------------------------------------------------------------------------------- /img/wiki/conception/full-gitops-lifecycle.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/full-gitops-lifecycle.png -------------------------------------------------------------------------------- /img/wiki/conception/handle-configmap-commitapply.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/handle-configmap-commitapply.png -------------------------------------------------------------------------------- /img/wiki/conception/handle-configmap-commitonly.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/handle-configmap-commitonly.png -------------------------------------------------------------------------------- /img/wiki/conception/reconcile-remotesyncer.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/reconcile-remotesyncer.png -------------------------------------------------------------------------------- /img/wiki/conception/reconcile-remoteuser.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/reconcile-remoteuser.png -------------------------------------------------------------------------------- /img/wiki/conception/remote-git-server-configuration-inheritance.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/remote-git-server-configuration-inheritance.png -------------------------------------------------------------------------------- /img/wiki/conception/remoteuserbinding.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/remoteuserbinding.png -------------------------------------------------------------------------------- /img/wiki/conception/syngit-objects-architecture.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/conception/syngit-objects-architecture.png -------------------------------------------------------------------------------- /img/wiki/contribute/main-webhooks-diff.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/contribute/main-webhooks-diff.png -------------------------------------------------------------------------------- /img/wiki/contribute/storage-version-diff.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/contribute/storage-version-diff.png -------------------------------------------------------------------------------- /img/wiki/contribute/syngit-package-diff.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/contribute/syngit-package-diff.png -------------------------------------------------------------------------------- /img/wiki/contribute/webhook-version-diff.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/contribute/webhook-version-diff.png -------------------------------------------------------------------------------- /img/wiki/usage/demo-configmap-excluded-fields.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/usage/demo-configmap-excluded-fields.png -------------------------------------------------------------------------------- /img/wiki/usage/demo-configmap-full-fiels.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/syngit-org/syngit/0c99ec1d77091ab59c0e6a6ca80a5c5e2bd9a7ed/img/wiki/usage/demo-configmap-full-fiels.png -------------------------------------------------------------------------------- /pkg/api/v1beta3/remotesyncer_conversion.go: -------------------------------------------------------------------------------- 1 | /* 2 | Copyright 2024. 3 | 4 | Licensed under the Apache License, Version 2.0 (the "License"); 5 | you may not use this file except in compliance with the License. 6 | You may obtain a copy of the License at 7 | 8 | http://www.apache.org/licenses/LICENSE-2.0 9 | 10 | Unless required by applicable law or agreed to in writing, software 11 | distributed under the License is distributed on an "AS IS" BASIS, 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | See the License for the specific language governing permissions and 14 | limitations under the License. 15 | */ 16 | 17 | package v1beta3 18 | 19 | func (*RemoteSyncer) Hub() {} 20 | -------------------------------------------------------------------------------- /pkg/api/v1beta3/remotetarget_conversion.go: -------------------------------------------------------------------------------- 1 | /* 2 | Copyright 2024. 3 | 4 | Licensed under the Apache License, Version 2.0 (the "License"); 5 | you may not use this file except in compliance with the License. 6 | You may obtain a copy of the License at 7 | 8 | http://www.apache.org/licenses/LICENSE-2.0 9 | 10 | Unless required by applicable law or agreed to in writing, software 11 | distributed under the License is distributed on an "AS IS" BASIS, 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | See the License for the specific language governing permissions and 14 | limitations under the License. 15 | */ 16 | 17 | package v1beta3 18 | 19 | func (*RemoteTarget) Hub() {} 20 | -------------------------------------------------------------------------------- /pkg/api/v1beta3/remoteuser_conversion.go: -------------------------------------------------------------------------------- 1 | /* 2 | Copyright 2024. 3 | 4 | Licensed under the Apache License, Version 2.0 (the "License"); 5 | you may not use this file except in compliance with the License. 6 | You may obtain a copy of the License at 7 | 8 | http://www.apache.org/licenses/LICENSE-2.0 9 | 10 | Unless required by applicable law or agreed to in writing, software 11 | distributed under the License is distributed on an "AS IS" BASIS, 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | See the License for the specific language governing permissions and 14 | limitations under the License. 15 | */ 16 | 17 | package v1beta3 18 | 19 | func (*RemoteUser) Hub() {} 20 | -------------------------------------------------------------------------------- /pkg/api/v1beta3/remoteuserbinding_conversion.go: -------------------------------------------------------------------------------- 1 | /* 2 | Copyright 2024. 3 | 4 | Licensed under the Apache License, Version 2.0 (the "License"); 5 | you may not use this file except in compliance with the License. 6 | You may obtain a copy of the License at 7 | 8 | http://www.apache.org/licenses/LICENSE-2.0 9 | 10 | Unless required by applicable law or agreed to in writing, software 11 | distributed under the License is distributed on an "AS IS" BASIS, 12 | WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. 13 | See the License for the specific language governing permissions and 14 | limitations under the License. 15 | */ 16 | 17 | package v1beta3 18 | 19 | func (*RemoteUserBinding) Hub() {} 20 | -------------------------------------------------------------------------------- /pkg/utils/sanitizer.go: -------------------------------------------------------------------------------- 1 | package utils 2 | 3 | import ( 4 | "crypto/sha256" 5 | "encoding/hex" 6 | "regexp" 7 | "strings" 8 | ) 9 | 10 | func Sanitize(input string) string { 11 | h := sha256.Sum256([]byte(input)) 12 | return hex.EncodeToString(h[:])[:12] 13 | } 14 | 15 | func SoftSanitize(input string) string { 16 | const validPattern = `^[a-z0-9]([-a-z0-9]*[a-z0-9])?(\.[a-z0-9]([-a-z0-9]*[a-z0-9])?)*$` 17 | validRegex := regexp.MustCompile(validPattern) 18 | 19 | if validRegex.MatchString(input) { 20 | return input 21 | } 22 | 23 | allowedChars := regexp.MustCompile(`[^a-z0-9\.-]`) 24 | sanitized := allowedChars.ReplaceAllString(strings.ToLower(input), "-") 25 | return sanitized 26 | } 27 | -------------------------------------------------------------------------------- /test/e2e/build/samples/sample_configmap.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: v1 2 | kind: ConfigMap 3 | metadata: 4 | name: test 5 | data: 6 | my-data: test1 -------------------------------------------------------------------------------- /test/e2e/build/samples/syngit_v1beta2_remotesyncer.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.io/v1beta2 2 | kind: RemoteSyncer 3 | metadata: 4 | name: remotesyncer-sample 5 | spec: 6 | remoteRepository: "https://git-fake-server.com/fake-repo.git" 7 | defaultBranch: main 8 | processMode: CommitOnly 9 | pushMode: SameBranch 10 | defaultUnauthorizedUserMode: Block 11 | scopedResources: 12 | rules: 13 | - apiGroups: [""] 14 | apiVersions: ["v1"] 15 | resources: ["configmaps"] 16 | operations: ["CREATE"] 17 | 18 | -------------------------------------------------------------------------------- /test/e2e/build/samples/syngit_v1beta3_remotesyncer.yaml: -------------------------------------------------------------------------------- 1 | apiVersion: syngit.io/v1beta3 2 | kind: RemoteSyncer 3 | metadata: 4 | name: remotesyncer-sample 5 | spec: 6 | remoteRepository: "https://git-fake-server.com/fake-repo.git" 7 | defaultBranch: main 8 | strategy: CommitOnly 9 | targetStrategy: OneTarget 10 | defaultUnauthorizedUserMode: Block 11 | scopedResources: 12 | rules: 13 | - apiGroups: [""] 14 | apiVersions: ["v1"] 15 | resources: ["configmaps"] 16 | operations: ["CREATE"] 17 | 18 | -------------------------------------------------------------------------------- /test/utils/.env: -------------------------------------------------------------------------------- 1 | # Set variables 2 | CLUSTER_NAME="syngit-dev-cluster" 3 | 4 | HELM_RELEASE_NAME="gitea" # Helm release name for Gitea 5 | SERVICE_NAME="gitea-http" # Name of the Kubernetes service for Gitea 6 | ADMIN_USERNAME="syngituser" # Admin username 7 | ADMIN_PASSWORD="syngit_password" # Admin password 8 | ADMIN_EMAIL="syngit@example.com" # Admin email 9 | 10 | SANJI_USERNAME="sanji" 11 | CHOPPER_USERNAME="chopper-jb" 12 | LUFFY_USERNAME="luffy-jbg-sb" 13 | BROOK_USERNAME="brook-jbg-sb" 14 | 15 | PLATFORM1="jupyter" 16 | PLATFORM2="saturn" 17 | REPO1="merry" 18 | REPO2="sunny" 19 | 20 | GITEA_TEMP_CERT_DIR="/tmp/gitea-certs" -------------------------------------------------------------------------------- /test/utils/gitea/reset-gitea-repos.sh: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | set -a 3 | . test/utils/.env 4 | set +a 5 | 6 | export PREFIXED_PATH=./test/utils/gitea 7 | 8 | export NAMESPACE="$PLATFORM1" 9 | $PREFIXED_PATH/delete-gitea-repos.sh 10 | $PREFIXED_PATH/setup-gitea-repos.sh 11 | 12 | export NAMESPACE="$PLATFORM2" 13 | $PREFIXED_PATH/delete-gitea-repos.sh 14 | $PREFIXED_PATH/setup-gitea-repos.sh 15 | 16 | # Bind gitea user 17 | export NAMESPACE="$PLATFORM1" 18 | $PREFIXED_PATH/setup-gitea-bind-platform1.sh 19 | export NAMESPACE="$PLATFORM2" 20 | $PREFIXED_PATH/setup-gitea-bind-platform2.sh -------------------------------------------------------------------------------- /test/utils/gitea/setup-gitea-install.sh: -------------------------------------------------------------------------------- 1 | 2 | 3 | # Install Gitea using Helm with a NodePort service 4 | helm install $HELM_RELEASE_NAME gitea-charts/gitea --version 10.6.0 -n $NAMESPACE -f $VALUES_FILE --create-namespace > /dev/null 5 | 6 | # Wait for the Gitea Pod to be ready 7 | kubectl wait --for=condition=ready pod -l app.kubernetes.io/name=gitea -n $NAMESPACE --timeout=300s > /dev/null 8 | --------------------------------------------------------------------------------