feat: Initialize Zastava Webhook service with TLS and Authority authentication
- Added Program.cs to set up the web application with Serilog for logging, health check endpoints, and a placeholder admission endpoint. - Configured Kestrel server to use TLS 1.3 and handle client certificates appropriately. - Created StellaOps.Zastava.Webhook.csproj with necessary dependencies including Serilog and Polly. - Documented tasks in TASKS.md for the Zastava Webhook project, outlining current work and exit criteria for each task.
This commit is contained in:
		
							
								
								
									
										15
									
								
								deploy/helm/stellaops/templates/configmaps.yaml
									
									
									
									
									
										Normal file
									
								
							
							
						
						
									
										15
									
								
								deploy/helm/stellaops/templates/configmaps.yaml
									
									
									
									
									
										Normal file
									
								
							| @@ -0,0 +1,15 @@ | ||||
| {{- $root := . -}} | ||||
| {{- range $name, $cfg := .Values.configMaps }} | ||||
| apiVersion: v1 | ||||
| kind: ConfigMap | ||||
| metadata: | ||||
|   name: {{ include "stellaops.fullname" (dict "root" $root "name" $name) }} | ||||
|   labels: | ||||
|     {{- include "stellaops.labels" (dict "root" $root "name" $name "svc" (dict "class" "config")) | nindent 4 }} | ||||
| data: | ||||
| {{- range $fileName, $content := $cfg.data }} | ||||
|   {{ $fileName }}: | | ||||
| {{ $content | nindent 4 }} | ||||
| {{- end }} | ||||
| --- | ||||
| {{- end }} | ||||
		Reference in New Issue
	
	Block a user