From c38262a51b480f4e3e9227e9ed0c216437fbfc85 Mon Sep 17 00:00:00 2001 From: DeveloperDurp Date: Sat, 28 Mar 2026 11:37:45 -0500 Subject: [PATCH] update --- dmz/authentik/templates/ingress.yaml | 62 ----------------- dmz/internalproxy/templates/argocd.yaml | 6 +- dmz/internalproxy/templates/authentik.yaml | 80 +++++++++++----------- 3 files changed, 43 insertions(+), 105 deletions(-) diff --git a/dmz/authentik/templates/ingress.yaml b/dmz/authentik/templates/ingress.yaml index f03751e..e69de29 100644 --- a/dmz/authentik/templates/ingress.yaml +++ b/dmz/authentik/templates/ingress.yaml @@ -1,62 +0,0 @@ -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: authentik-tls -spec: - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - secretName: authentik-tls - commonName: "authentik.durp.info" - dnsNames: - - "authentik.durp.info" - ---- -apiVersion: traefik.io/v1alpha1 -kind: IngressRoute -metadata: - name: authentik-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`authentik.durp.info`) && PathPrefix(`/`) - kind: Rule - services: - - name: infra-cluster - port: 443 - tls: - secretName: authentik-tls - ---- -kind: Service -apiVersion: v1 -metadata: - name: authentik-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: authentik.durp.info -spec: - type: ExternalName - externalName: durp.info - ---- -apiVersion: v1 -kind: Endpoints -metadata: - name: infra-cluster -subsets: - - addresses: - - ip: 192.168.12.130 - ports: - - port: 443 - ---- -apiVersion: v1 -kind: Service -metadata: - name: infra-cluster -spec: - ports: - - protocol: TCP - port: 443 - targetPort: 443 diff --git a/dmz/internalproxy/templates/argocd.yaml b/dmz/internalproxy/templates/argocd.yaml index 20aba48..d817e19 100644 --- a/dmz/internalproxy/templates/argocd.yaml +++ b/dmz/internalproxy/templates/argocd.yaml @@ -7,9 +7,9 @@ spec: - websecure routes: - match: Host(`argocd.infra.durp.info`) - #middlewares: - # - name: whitelist - # namespace: traefik + middlewares: + - name: whitelist + namespace: traefik kind: Rule services: - name: infra-cluster diff --git a/dmz/internalproxy/templates/authentik.yaml b/dmz/internalproxy/templates/authentik.yaml index 328d115..adf9884 100644 --- a/dmz/internalproxy/templates/authentik.yaml +++ b/dmz/internalproxy/templates/authentik.yaml @@ -1,40 +1,40 @@ -#apiVersion: traefik.io/v1alpha1 -#kind: IngressRoute -#metadata: -# name: authentik-ingress -#spec: -# entryPoints: -# - websecure -# routes: -# - match: Host(`authentik.durp.info`) && PathPrefix(`/`) -# kind: Rule -# services: -# - name: infra-cluster -# port: 443 -# tls: -# secretName: authentik-tls -# -#--- -#apiVersion: cert-manager.io/v1 -#kind: Certificate -#metadata: -# name: authentik-tls -#spec: -# issuerRef: -# name: letsencrypt-production -# kind: ClusterIssuer -# secretName: authentik-tls -# commonName: "authentik.durp.info" -# dnsNames: -# - "authentik.durp.info" -# -#--- -#kind: Service -#apiVersion: v1 -#metadata: -# name: authentik-external-dns -# annotations: -# external-dns.alpha.kubernetes.io/hostname: authentik.durp.info -#spec: -# type: ExternalName -# externalName: durp.info +apiVersion: cert-manager.io/v1 +kind: Certificate +metadata: + name: authentik-tls +spec: + issuerRef: + name: letsencrypt-production + kind: ClusterIssuer + secretName: authentik-tls + commonName: "authentik.durp.info" + dnsNames: + - "authentik.durp.info" + +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: authentik-ingress +spec: + entryPoints: + - websecure + routes: + - match: Host(`authentik.durp.info`) && PathPrefix(`/`) + kind: Rule + services: + - name: infra-cluster + port: 443 + tls: + secretName: authentik-tls + +--- +kind: Service +apiVersion: v1 +metadata: + name: authentik-external-dns + annotations: + external-dns.alpha.kubernetes.io/hostname: authentik.durp.info +spec: + type: ExternalName + externalName: durp.info \ No newline at end of file