prow/oss/cluster/deck.yaml (252 lines of code) (raw):

apiVersion: apps/v1 kind: Deployment metadata: name: deck namespace: default labels: app: deck spec: replicas: 2 selector: matchLabels: app: deck strategy: type: RollingUpdate rollingUpdate: maxSurge: 1 maxUnavailable: 1 template: metadata: labels: app: deck spec: serviceAccountName: deck-public terminationGracePeriodSeconds: 30 containers: - name: deck image: us-central1-docker.pkg.dev/gob-prow/prow-images/deck:v20250423-91b28ca9b args: - --config-path=/etc/config/config.yaml - --job-config-path=/etc/job-config - --spyglass=true - --tide-url=http://tide/ - --hook-url=http://hook:8888/plugin-help - --redirect-http-to=oss.gprow.dev - --rerun-creates-job - --oauth-url=/github-login - --github-token-path=/etc/github/oauth - --github-oauth-config-file=/etc/githuboauth/secret - --github-endpoint=http://ghproxy - --github-endpoint=https://api.github.com - --cookie-secret=/etc/cookie/secret - --plugin-config=/etc/plugins/plugins.yaml env: # Use KUBECONFIG envvar rather than --kubeconfig flag in order to provide multiple configs to merge. - name: KUBECONFIG value: "/etc/kubeconfig/config-20240403:/etc/build-openshift-eng/kubeconfig:/etc/build-cloud-kubernetes-node-management-team/kubeconfig:/etc/build-kpt-config-sync/kubeconfig:/etc/build-compute-image-import/kubeconfig:/etc/build-blueprints/kubeconfig:/etc/build-elcarro/kubeconfig:/etc/gke-gcloud-auth-plugin-based/kubeconfigs.yaml" ports: - name: http containerPort: 8080 - name: metrics containerPort: 9090 volumeMounts: - mountPath: /etc/build-openshift-eng name: build-openshift-eng readOnly: true - mountPath: /etc/build-cloud-kubernetes-node-management-team name: build-cloud-kubernetes-node-management-team readOnly: true - mountPath: /etc/build-kpt-config-sync name: build-kpt-config-sync readOnly: true - mountPath: /etc/build-compute-image-import name: build-compute-image-import readOnly: true - mountPath: /etc/build-blueprints name: build-blueprints readOnly: true - mountPath: /etc/build-elcarro name: build-elcarro readOnly: true - name: oauth-config mountPath: /etc/githuboauth readOnly: true - name: cookie-secret mountPath: /etc/cookie readOnly: true - name: oauth-token mountPath: /etc/github readOnly: true - name: config mountPath: /etc/config readOnly: true - name: job-config mountPath: /etc/job-config readOnly: true - name: plugins mountPath: /etc/plugins readOnly: true - mountPath: /etc/kubeconfig name: kubeconfig readOnly: true - mountPath: /etc/gke-gcloud-auth-plugin-based name: kubeconfigs readOnly: true livenessProbe: httpGet: path: /healthz port: 8081 initialDelaySeconds: 3 periodSeconds: 3 readinessProbe: httpGet: path: /healthz/ready port: 8081 initialDelaySeconds: 10 periodSeconds: 3 timeoutSeconds: 600 volumes: - name: build-openshift-eng secret: defaultMode: 420 secretName: kubeconfig-build-openshift-eng - name: build-cloud-kubernetes-node-management-team secret: defaultMode: 420 secretName: kubeconfig-build-cloud-kubernetes-node-management-team - name: build-kpt-config-sync secret: defaultMode: 420 secretName: kubeconfig-build-kpt-config-sync - name: build-compute-image-import secret: defaultMode: 420 secretName: kubeconfig-build-compute-image-import - name: build-blueprints secret: defaultMode: 420 secretName: kubeconfig-build-blueprints - name: build-elcarro secret: defaultMode: 420 secretName: kubeconfig-build-elcarro - name: oauth-config secret: secretName: github-oauth-config-oss-gprow-dev - name: oauth-token secret: secretName: oauth-token-2 - name: cookie-secret secret: secretName: cookie - name: config configMap: name: config - name: job-config configMap: name: job-config - name: plugins configMap: name: plugins - name: kubeconfig secret: defaultMode: 420 secretName: kubeconfig - name: kubeconfigs configMap: name: kubeconfigs --- apiVersion: v1 kind: Service metadata: labels: app: deck name: deck namespace: default spec: selector: app: deck ports: - name: main port: 80 targetPort: 8080 - name: metrics port: 9090 type: NodePort --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: deck namespace: default roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: "deck" subjects: - kind: ServiceAccount name: "deck-public" namespace: "default" - kind: ServiceAccount name: "deck" namespace: "test-pods" --- apiVersion: v1 kind: ServiceAccount metadata: name: deck-public namespace: default annotations: "iam.gke.io/gcp-service-account": "oss-prow-public-deck@oss-prow.iam.gserviceaccount.com" --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: deck # namespace: not-namespaced, must get pods in other namespaces rules: - apiGroups: - "" resources: - pods/log verbs: - get - apiGroups: - "prow.k8s.io" resources: - prowjobs verbs: - get - list - watch # Required when deck runs with `--rerun-creates-job=true` - create --- kind: ClusterRole apiVersion: rbac.authorization.k8s.io/v1 metadata: name: deck-oauth # namespace: not-namespaced, are we sure? rules: - apiGroups: - authentication.k8s.io resources: - tokenreviews verbs: - create - apiGroups: - authorization.k8s.io resources: - subjectaccessreviews verbs: - create --- kind: ClusterRoleBinding apiVersion: rbac.authorization.k8s.io/v1 metadata: name: deck-oauth namespace: default roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: "deck-oauth" subjects: - kind: ServiceAccount name: "deck" namespace: ci