mirror of
https://gitlab.durp.info/durfy/homelab/gitops.git
synced 2026-05-09 08:41:30 -05:00
Update 3 files
- /internalproxy/templates/heimdall.yaml - /internalproxy/templates/unraid-ingress.yaml - /internalproxy/templates/argocd.yaml
This commit is contained in:
parent
6c8c3aa159
commit
db8d803d9b
3 changed files with 56 additions and 62 deletions
|
|
@ -36,7 +36,6 @@ apiVersion: cert-manager.io/v1
|
||||||
kind: Certificate
|
kind: Certificate
|
||||||
metadata:
|
metadata:
|
||||||
name: argocd-tls
|
name: argocd-tls
|
||||||
namespace: argocd
|
|
||||||
spec:
|
spec:
|
||||||
secretName: argocd-tls
|
secretName: argocd-tls
|
||||||
issuerRef:
|
issuerRef:
|
||||||
|
|
|
||||||
|
|
@ -27,42 +27,44 @@ subsets:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: networking.k8s.io/v1
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
kind: Ingress
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
name: heimdall-ingress
|
name: heimdall-ingress
|
||||||
annotations:
|
|
||||||
kubernetes.io/ingress.class: nginx
|
|
||||||
cert-manager.io/cluster-issuer: letsencrypt-production
|
|
||||||
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
|
|
||||||
nginx.ingress.kubernetes.io/auth-url: |-
|
|
||||||
http://ak-outpost-authentik-embedded-outpost.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx
|
|
||||||
nginx.ingress.kubernetes.io/auth-signin: |-
|
|
||||||
https://heimdall.durp.info/outpost.goauthentik.io/start?rd=$escaped_request_uri
|
|
||||||
nginx.ingress.kubernetes.io/auth-response-headers: |-
|
|
||||||
Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid
|
|
||||||
nginx.ingress.kubernetes.io/auth-snippet: |
|
|
||||||
proxy_set_header X-Forwarded-Host $http_host;
|
|
||||||
spec:
|
spec:
|
||||||
rules:
|
entryPoints:
|
||||||
- host: heimdall.durp.info
|
- websecure
|
||||||
http:
|
routes:
|
||||||
paths:
|
- match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/`)
|
||||||
- path: /
|
middlewares:
|
||||||
pathType: Prefix
|
- name: whitelist
|
||||||
backend:
|
namespace: traefik
|
||||||
service:
|
- name: authentik-proxy-provider
|
||||||
name: heimdall
|
namespace: traefik
|
||||||
port:
|
kind: Rule
|
||||||
number: 8443
|
services:
|
||||||
- path: /outpost.goauthentik.io
|
- name: heimdall
|
||||||
pathType: Prefix
|
port: 8200
|
||||||
backend:
|
- match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||||
service:
|
kind: Rule
|
||||||
name: ak-outpost-authentik-embedded-outpost
|
services:
|
||||||
port:
|
- name: ak-outpost-authentik-embedded-outpost
|
||||||
number: 9000
|
namespace: authentik
|
||||||
|
port: 9000
|
||||||
tls:
|
tls:
|
||||||
- hosts:
|
secretName: heimdall-tls
|
||||||
- heimdall.durp.info
|
|
||||||
secretName: heimdall-tls
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: heimdall-tls
|
||||||
|
spec:
|
||||||
|
secretName: heimdall-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "heimdall.internal.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "heimdall.internal.durp.info"
|
||||||
|
|
@ -27,31 +27,6 @@ subsets:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
#apiVersion: networking.k8s.io/v1
|
|
||||||
#kind: Ingress
|
|
||||||
#metadata:
|
|
||||||
# name: unraid-ingress
|
|
||||||
# annotations:
|
|
||||||
# kubernetes.io/ingress.class: nginx
|
|
||||||
# cert-manager.io/cluster-issuer: letsencrypt-production
|
|
||||||
# nginx.ingress.kubernetes.io/whitelist-source-range: "192.168.0.0/16"
|
|
||||||
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
|
|
||||||
#spec:
|
|
||||||
# rules:
|
|
||||||
# - host: unraid.internal.durp.info
|
|
||||||
# http:
|
|
||||||
# paths:
|
|
||||||
# - path: /
|
|
||||||
# pathType: Prefix
|
|
||||||
# backend:
|
|
||||||
# service:
|
|
||||||
# name: unraid
|
|
||||||
# port:
|
|
||||||
# number: 443
|
|
||||||
# tls:
|
|
||||||
# - hosts:
|
|
||||||
# - unraid.internal.durp.info
|
|
||||||
# secretName: unraid-tls
|
|
||||||
apiVersion: traefik.containo.us/v1alpha1
|
apiVersion: traefik.containo.us/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
|
|
@ -63,6 +38,9 @@ spec:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`unraid.internal.durp.info`)
|
- match: Host(`unraid.internal.durp.info`)
|
||||||
|
middlewares:
|
||||||
|
- name: whitelist
|
||||||
|
namespace: traefik
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: unraid
|
- name: unraid
|
||||||
|
|
@ -70,3 +48,18 @@ spec:
|
||||||
scheme: https
|
scheme: https
|
||||||
tls:
|
tls:
|
||||||
secretName: unraid-tls
|
secretName: unraid-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: unraid-tls
|
||||||
|
spec:
|
||||||
|
secretName: unraid-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "unraid.internal.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "unraid.internal.durp.info"
|
||||||
Loading…
Add table
Add a link
Reference in a new issue