Update 3 files

- /internalproxy/templates/heimdall.yaml
- /internalproxy/templates/unraid-ingress.yaml
- /internalproxy/templates/argocd.yaml
This commit is contained in:
DeveloperDurp 2023-04-16 12:16:35 +00:00
parent 6c8c3aa159
commit db8d803d9b
3 changed files with 56 additions and 62 deletions

View file

@ -36,7 +36,6 @@ apiVersion: cert-manager.io/v1
kind: Certificate kind: Certificate
metadata: metadata:
name: argocd-tls name: argocd-tls
namespace: argocd
spec: spec:
secretName: argocd-tls secretName: argocd-tls
issuerRef: issuerRef:

View file

@ -27,42 +27,44 @@ subsets:
--- ---
apiVersion: networking.k8s.io/v1 apiVersion: traefik.containo.us/v1alpha1
kind: Ingress kind: IngressRoute
metadata: metadata:
name: heimdall-ingress name: heimdall-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
nginx.ingress.kubernetes.io/auth-url: |-
http://ak-outpost-authentik-embedded-outpost.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx
nginx.ingress.kubernetes.io/auth-signin: |-
https://heimdall.durp.info/outpost.goauthentik.io/start?rd=$escaped_request_uri
nginx.ingress.kubernetes.io/auth-response-headers: |-
Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid
nginx.ingress.kubernetes.io/auth-snippet: |
proxy_set_header X-Forwarded-Host $http_host;
spec: spec:
rules: entryPoints:
- host: heimdall.durp.info - websecure
http: routes:
paths: - match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/`)
- path: / middlewares:
pathType: Prefix - name: whitelist
backend: namespace: traefik
service: - name: authentik-proxy-provider
name: heimdall namespace: traefik
port: kind: Rule
number: 8443 services:
- path: /outpost.goauthentik.io - name: heimdall
pathType: Prefix port: 8200
backend: - match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
service: kind: Rule
name: ak-outpost-authentik-embedded-outpost services:
port: - name: ak-outpost-authentik-embedded-outpost
number: 9000 namespace: authentik
port: 9000
tls: tls:
- hosts: secretName: heimdall-tls
- heimdall.durp.info
secretName: heimdall-tls ---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: heimdall-tls
spec:
secretName: heimdall-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "heimdall.internal.durp.info"
dnsNames:
- "heimdall.internal.durp.info"

View file

@ -27,31 +27,6 @@ subsets:
--- ---
#apiVersion: networking.k8s.io/v1
#kind: Ingress
#metadata:
# name: unraid-ingress
# annotations:
# kubernetes.io/ingress.class: nginx
# cert-manager.io/cluster-issuer: letsencrypt-production
# nginx.ingress.kubernetes.io/whitelist-source-range: "192.168.0.0/16"
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
#spec:
# rules:
# - host: unraid.internal.durp.info
# http:
# paths:
# - path: /
# pathType: Prefix
# backend:
# service:
# name: unraid
# port:
# number: 443
# tls:
# - hosts:
# - unraid.internal.durp.info
# secretName: unraid-tls
apiVersion: traefik.containo.us/v1alpha1 apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute kind: IngressRoute
metadata: metadata:
@ -63,6 +38,9 @@ spec:
- websecure - websecure
routes: routes:
- match: Host(`unraid.internal.durp.info`) - match: Host(`unraid.internal.durp.info`)
middlewares:
- name: whitelist
namespace: traefik
kind: Rule kind: Rule
services: services:
- name: unraid - name: unraid
@ -70,3 +48,18 @@ spec:
scheme: https scheme: https
tls: tls:
secretName: unraid-tls secretName: unraid-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: unraid-tls
spec:
secretName: unraid-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "unraid.internal.durp.info"
dnsNames:
- "unraid.internal.durp.info"