Cpte-Boot/k8s/secrets.yaml

77 lines
1.6 KiB
YAML

apiVersion: v1
kind: Secret
metadata:
name: wms-redis-secret
namespace: wms-system
labels:
app: cpte-wms
type: Opaque
stringData:
host: "redis-master.wms-system.svc.cluster.local"
port: "6379"
password: "cpte@redis123"
---
apiVersion: v1
kind: Secret
metadata:
name: wms-mysql-secret
namespace: wms-system
labels:
app: cpte-wms
type: Opaque
stringData:
host: "mysql-primary.wms-system.svc.cluster.local"
port: "3306"
username: "wms_user"
password: "cpte@mysql123"
---
apiVersion: v1
kind: Secret
metadata:
name: wms-minio-secret
namespace: wms-system
labels:
app: cpte-wms
type: Opaque
stringData:
access-key: "minioadmin"
secret-key: "minioadmin123"
endpoint: "http://minio.wms-system.svc.cluster.local:9000"
---
apiVersion: v1
kind: Secret
metadata:
name: wms-tls-secret
namespace: wms-system
labels:
app: cpte-wms
type: kubernetes.io/tls
stringData:
tls.crt: |
# 替换为实际的 TLS 证书内容
# 可以使用 cert-manager 自动管理或使用以下命令创建自签名证书:
# kubectl create secret tls wms-tls-secret --cert=path/to/tls.crt --key=path/to/tls.key -n wms-system
PLACEHOLDER_CERTIFICATE
tls.key: |
PLACEHOLDER_KEY
---
apiVersion: v1
kind: Secret
metadata:
name: wms-docker-registry-secret
namespace: wms-system
labels:
app: cpte-wms
type: kubernetes.io/dockerconfigjson
stringData:
.dockerconfigjson: |
{
"auths": {
"registry.yourcompany.com": {
"username": "wms_deployer",
"password": "YOUR_REGISTRY_PASSWORD",
"auth": "BASE64_ENCODED_CREDENTIALS"
}
}
}