Update 3 files

- /internalproxy/templates/heimdall.yaml
- /internalproxy/templates/unraid-ingress.yaml
- /internalproxy/templates/argocd.yaml
This commit is contained in:
2023-04-16 12:16:35 +00:00
parent 6c8c3aa159
commit db8d803d9b
3 changed files with 56 additions and 62 deletions

View File

@@ -36,7 +36,6 @@ apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: argocd-tls
namespace: argocd
spec:
secretName: argocd-tls
issuerRef:

View File

@@ -27,42 +27,44 @@ subsets:
---
apiVersion: networking.k8s.io/v1
kind: Ingress
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
name: heimdall-ingress
annotations:
kubernetes.io/ingress.class: nginx
cert-manager.io/cluster-issuer: letsencrypt-production
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
nginx.ingress.kubernetes.io/auth-url: |-
http://ak-outpost-authentik-embedded-outpost.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/nginx
nginx.ingress.kubernetes.io/auth-signin: |-
https://heimdall.durp.info/outpost.goauthentik.io/start?rd=$escaped_request_uri
nginx.ingress.kubernetes.io/auth-response-headers: |-
Set-Cookie,X-authentik-username,X-authentik-groups,X-authentik-email,X-authentik-name,X-authentik-uid
nginx.ingress.kubernetes.io/auth-snippet: |
proxy_set_header X-Forwarded-Host $http_host;
spec:
rules:
- host: heimdall.durp.info
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: heimdall
port:
number: 8443
- path: /outpost.goauthentik.io
pathType: Prefix
backend:
service:
name: ak-outpost-authentik-embedded-outpost
port:
number: 9000
entryPoints:
- websecure
routes:
- match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/`)
middlewares:
- name: whitelist
namespace: traefik
- name: authentik-proxy-provider
namespace: traefik
kind: Rule
services:
- name: heimdall
port: 8200
- match: Host(`heimdall.internal.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
kind: Rule
services:
- name: ak-outpost-authentik-embedded-outpost
namespace: authentik
port: 9000
tls:
- hosts:
- heimdall.durp.info
secretName: heimdall-tls
secretName: heimdall-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: heimdall-tls
spec:
secretName: heimdall-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "heimdall.internal.durp.info"
dnsNames:
- "heimdall.internal.durp.info"

View File

@@ -27,31 +27,6 @@ subsets:
---
#apiVersion: networking.k8s.io/v1
#kind: Ingress
#metadata:
# name: unraid-ingress
# annotations:
# kubernetes.io/ingress.class: nginx
# cert-manager.io/cluster-issuer: letsencrypt-production
# nginx.ingress.kubernetes.io/whitelist-source-range: "192.168.0.0/16"
# nginx.ingress.kubernetes.io/backend-protocol: "HTTPS"
#spec:
# rules:
# - host: unraid.internal.durp.info
# http:
# paths:
# - path: /
# pathType: Prefix
# backend:
# service:
# name: unraid
# port:
# number: 443
# tls:
# - hosts:
# - unraid.internal.durp.info
# secretName: unraid-tls
apiVersion: traefik.containo.us/v1alpha1
kind: IngressRoute
metadata:
@@ -63,10 +38,28 @@ spec:
- websecure
routes:
- match: Host(`unraid.internal.durp.info`)
middlewares:
- name: whitelist
namespace: traefik
kind: Rule
services:
- name: unraid
port: 443
scheme: https
tls:
secretName: unraid-tls
secretName: unraid-tls
---
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: unraid-tls
spec:
secretName: unraid-tls
issuerRef:
name: letsencrypt-production
kind: ClusterIssuer
commonName: "unraid.internal.durp.info"
dnsNames:
- "unraid.internal.durp.info"