diff --git a/dmz/authentik/templates/cert.yaml b/dmz/authentik/templates/cert.yaml deleted file mode 100644 index 5c52e76..0000000 --- a/dmz/authentik/templates/cert.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: authentik-tls -spec: - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - secretName: authentik-tls - commonName: "authentik.durp.info" - dnsNames: - - "authentik.durp.info" diff --git a/dmz/authentik/templates/ingress.yaml b/dmz/authentik/templates/ingress.yaml new file mode 100644 index 0000000..f03751e --- /dev/null +++ b/dmz/authentik/templates/ingress.yaml @@ -0,0 +1,62 @@ +apiVersion: cert-manager.io/v1 +kind: Certificate +metadata: + name: authentik-tls +spec: + issuerRef: + name: letsencrypt-production + kind: ClusterIssuer + secretName: authentik-tls + commonName: "authentik.durp.info" + dnsNames: + - "authentik.durp.info" + +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: authentik-ingress +spec: + entryPoints: + - websecure + routes: + - match: Host(`authentik.durp.info`) && PathPrefix(`/`) + kind: Rule + services: + - name: infra-cluster + port: 443 + tls: + secretName: authentik-tls + +--- +kind: Service +apiVersion: v1 +metadata: + name: authentik-external-dns + annotations: + external-dns.alpha.kubernetes.io/hostname: authentik.durp.info +spec: + type: ExternalName + externalName: durp.info + +--- +apiVersion: v1 +kind: Endpoints +metadata: + name: infra-cluster +subsets: + - addresses: + - ip: 192.168.12.130 + ports: + - port: 443 + +--- +apiVersion: v1 +kind: Service +metadata: + name: infra-cluster +spec: + ports: + - protocol: TCP + port: 443 + targetPort: 443 diff --git a/dmz/internalproxy/templates/authentik.yaml b/dmz/internalproxy/templates/authentik.yaml index e1ad61a..328d115 100644 --- a/dmz/internalproxy/templates/authentik.yaml +++ b/dmz/internalproxy/templates/authentik.yaml @@ -1,40 +1,40 @@ -apiVersion: traefik.io/v1alpha1 -kind: IngressRoute -metadata: - name: authentik-ingress -spec: - entryPoints: - - websecure - routes: - - match: Host(`authentik.durp.info`) && PathPrefix(`/`) - kind: Rule - services: - - name: infra-cluster - port: 443 - tls: - secretName: authentik-tls - ---- -apiVersion: cert-manager.io/v1 -kind: Certificate -metadata: - name: authentik-tls -spec: - issuerRef: - name: letsencrypt-production - kind: ClusterIssuer - secretName: authentik-tls - commonName: "authentik.durp.info" - dnsNames: - - "authentik.durp.info" - ---- -kind: Service -apiVersion: v1 -metadata: - name: authentik-external-dns - annotations: - external-dns.alpha.kubernetes.io/hostname: authentik.durp.info -spec: - type: ExternalName - externalName: durp.info +#apiVersion: traefik.io/v1alpha1 +#kind: IngressRoute +#metadata: +# name: authentik-ingress +#spec: +# entryPoints: +# - websecure +# routes: +# - match: Host(`authentik.durp.info`) && PathPrefix(`/`) +# kind: Rule +# services: +# - name: infra-cluster +# port: 443 +# tls: +# secretName: authentik-tls +# +#--- +#apiVersion: cert-manager.io/v1 +#kind: Certificate +#metadata: +# name: authentik-tls +#spec: +# issuerRef: +# name: letsencrypt-production +# kind: ClusterIssuer +# secretName: authentik-tls +# commonName: "authentik.durp.info" +# dnsNames: +# - "authentik.durp.info" +# +#--- +#kind: Service +#apiVersion: v1 +#metadata: +# name: authentik-external-dns +# annotations: +# external-dns.alpha.kubernetes.io/hostname: authentik.durp.info +#spec: +# type: ExternalName +# externalName: durp.info