Compare commits
236 Commits
2d00ceda68
...
d52738b696
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
d52738b696 | ||
| fbaa3877a2 | |||
| 89a13d81f1 | |||
| 59a85a10f9 | |||
| d30a36c96e | |||
| 2be3d65620 | |||
| d0ef9e7586 | |||
| 06a0653eec | |||
| 2cd9be813e | |||
| e7b9086247 | |||
| 472f4064f5 | |||
| 687d890733 | |||
| 3575572a65 | |||
| 2cbc329a39 | |||
| 87b1b7dbc2 | |||
| d99920c95c | |||
| 44ded83012 | |||
| 471dcf907d | |||
| 782799f835 | |||
| 7e435f64b8 | |||
| 5efad19546 | |||
| c1b02bf142 | |||
| 8227cbd373 | |||
| 8d1c136ae7 | |||
| 5dd40718b4 | |||
| 1847fa2472 | |||
| b7bfd77883 | |||
| b98d61c5a3 | |||
|
|
418b365e2d | ||
|
|
e653d41331 | ||
|
|
10655e1ad7 | ||
| b3e86011b4 | |||
| f10021899c | |||
| b107d7a5fe | |||
|
|
02a2f4f7c9 | ||
|
|
4bc076a715 | ||
|
|
520a934cd8 | ||
|
|
430c2541e5 | ||
|
|
6f8db8ccdb | ||
|
|
9a6a16dcee | ||
|
|
d10f200c09 | ||
|
|
e0c303c38b | ||
|
|
7b188327c9 | ||
|
|
9715b9ac87 | ||
| 006094410c | |||
| 6a6bccda43 | |||
| 3233a8f769 | |||
| 69963d1c2f | |||
| 2be77594f0 | |||
| d4b0dd3c80 | |||
| 8940086c97 | |||
| b39863dee9 | |||
| b28c7ce8fd | |||
| c8fa9b77ad | |||
| ecd5ca5163 | |||
| 9ded36aa45 | |||
| 3b52a06603 | |||
| ac90414c06 | |||
| 7bcd121e3c | |||
| 0f038a8bb6 | |||
| b3032d2998 | |||
| 74ed1dca43 | |||
| 8fedb4fc9d | |||
| 6b69f85623 | |||
| 4d0a6cc470 | |||
| e3cd02fa7f | |||
| 17c2ada6a8 | |||
| d039f241f6 | |||
| 5ad297f15a | |||
| 46281b59a0 | |||
|
|
66a63be3a2 | ||
|
|
054ee57e6b | ||
|
|
799a8687ca | ||
|
|
b02f5d3727 | ||
|
|
0ef216e92f | ||
|
|
51006b03d1 | ||
|
|
643c89e794 | ||
|
|
29b8753182 | ||
|
|
841e26ba2a | ||
|
|
4d7c1779c3 | ||
| b0f6e8ead5 | |||
| 7c7890933b | |||
| 25664f4df4 | |||
| 6791096b3a | |||
| dcc3ae6aa3 | |||
| 6257d7a1d4 | |||
| 1d167cd62c | |||
| a6037a6cc1 | |||
| 5250e5ad15 | |||
| 355c881597 | |||
| 0d5a699615 | |||
| 0b87aa8630 | |||
| 1f78ec52d3 | |||
| ddd49cc031 | |||
| f31c0bf257 | |||
| 15db2e8d41 | |||
| 3020148e02 | |||
| ab6a5c96b4 | |||
| e9712ad8c6 | |||
| ea049a7ac2 | |||
| 1d3c524887 | |||
|
|
a7be2b0b74 | ||
| 19a8b05fae | |||
| 607e02496a | |||
| 5580b7dfd0 | |||
| bf76abaf83 | |||
| 124da56e0a | |||
| 8d86bd83e3 | |||
| e7f600bb80 | |||
| 0f30f72039 | |||
| febe9fbdf5 | |||
| 72903cb7cc | |||
| 6638751ee8 | |||
| d616df5b1b | |||
| 4dd69bac83 | |||
| 177e6740d5 | |||
| b0e955a8af | |||
| e8665c4379 | |||
| 5a936831f7 | |||
| 756744c379 | |||
| fe2f50f351 | |||
| ced106bf3a | |||
| c14346bb2e | |||
| c6fde4ad40 | |||
| da5f19f9d3 | |||
| 495ddce824 | |||
| 43ef21d99b | |||
| 49abd7fb28 | |||
| 0437fadc15 | |||
| d0f4780b6c | |||
| affd851017 | |||
| c016db260e | |||
| 5cb7ca72d8 | |||
| 7d0e2f4b22 | |||
| f9f1e101a9 | |||
| 977d652d8b | |||
| 302184d655 | |||
| 7b72bb16f7 | |||
| 95386b345a | |||
| cb64c2d05d | |||
| cbadf7ce19 | |||
| 39bf52cae3 | |||
| 362037c198 | |||
| af5f6e1257 | |||
| 0ae3c80a81 | |||
| 9b9f36859f | |||
| 5525c9bba5 | |||
| f4eaa739e9 | |||
| 37fd96179d | |||
|
|
17c3e5dddf | ||
| beef704102 | |||
| 4708a70a34 | |||
| 29661b9bf7 | |||
|
|
a8e7ac07c8 | ||
|
|
fe79c830cb | ||
| cd1abb4cec | |||
|
|
0a1d45d16a | ||
|
|
3acedbfdd2 | ||
|
|
6cbba2abec | ||
|
|
f8d47b89d9 | ||
|
|
72ce4db466 | ||
|
|
5e03a9e40e | ||
| cb821ae051 | |||
|
|
9e4f732d45 | ||
| 065b4787c8 | |||
| 8b498e971d | |||
| 96872dc7b0 | |||
| c5ec227c48 | |||
| 4ae919f070 | |||
| d88e58a5a1 | |||
| 4105842b31 | |||
| f083c707d5 | |||
| ee8c9571b2 | |||
| 4ca9d3150c | |||
| 49e48e7e45 | |||
| 643ec165fc | |||
| 72e6598aae | |||
| e2af26316f | |||
| cdd34130aa | |||
| 95be6528f2 | |||
| 5f3bd1c507 | |||
| 97375239af | |||
| 4ce97eca7a | |||
| 818123fee1 | |||
| bd7adf4065 | |||
| eedb7d8380 | |||
| d506b1964b | |||
| 5e0ce5c39c | |||
| 45af1f9be9 | |||
| 8c27fdce5f | |||
| bff82fd82f | |||
| 960a681b6f | |||
| e6c3dc4357 | |||
| 107dd520b3 | |||
| 263ed8d805 | |||
| 19a1c7ebd3 | |||
| e74142b072 | |||
| 16745c9f2b | |||
| 5d8f11b8ea | |||
| f4e0a20954 | |||
| 596420a053 | |||
| 235806871f | |||
| f81893afee | |||
| 36e8dde91d | |||
| 71340d6b3f | |||
| c5d12501ef | |||
| 3a5a9838b2 | |||
| 9f8dc8f8ed | |||
| 9514ffc44a | |||
| 04da18d4ee | |||
| de5dc93ecf | |||
| d781ccc052 | |||
| 137fbd4822 | |||
| 6ed5b70eaf | |||
| 13435c5f47 | |||
| bf3b202308 | |||
| f9fca17edb | |||
| 721d9be377 | |||
| 0690679d91 | |||
| abab7c70db | |||
| b43d205af3 | |||
| c8dd861c5d | |||
| d6f69b5857 | |||
| f99dbcc533 | |||
| bcc421445c | |||
|
|
ad8f5884e7 | ||
|
|
22d82b0082 | ||
| 16077f4523 | |||
|
|
d35c0757fb | ||
|
|
ab868d0c26 | ||
| d6162f7046 | |||
|
|
9a587d2f75 | ||
|
|
821c206174 | ||
|
|
10168e7534 | ||
|
|
6a26e350d3 | ||
|
|
5c84b0bd26 |
@@ -1 +1,2 @@
|
|||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGhPVgL8gXdRTw0E2FvlOUoUI4vd794nB0nZVIsc+U5M
|
sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIGilcndatMrXg06VxtNKuIo3scoyyXbYX8Z7cOjeA102AAAABHNzaDo= desktop-arch-09-08-2025-yubikey
|
||||||
|
sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAINsbNSZ5Wr+50Ahz+IeZxt6F7gZ6wm1J8uKXQLbdbKFaAAAABHNzaDo= desktop-arch-09-08-2025-yubikeyNano
|
||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: cert-manager
|
- name: cert-manager
|
||||||
repository: https://charts.jetstack.io
|
repository: https://charts.jetstack.io
|
||||||
version: v1.16.3
|
version: v1.17.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: cloudflare-api-token-secret
|
name: cloudflare-api-token-secret
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
repository: https://charts.bitnami.com/bitnami
|
repository: https://charts.bitnami.com/bitnami
|
||||||
version: 8.3.8
|
version: 8.9.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: external-dns-secret
|
name: external-dns-secret
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-secrets
|
- name: external-secrets
|
||||||
repository: https://charts.external-secrets.io
|
repository: https://charts.external-secrets.io
|
||||||
version: 0.13.0
|
version: 0.17.0
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: metallb
|
- name: metallb
|
||||||
repository: https://metallb.github.io/metallb
|
repository: https://metallb.github.io/metallb
|
||||||
version: 0.14.9
|
version: 0.15.2
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
proxmox = {
|
proxmox = {
|
||||||
source = "Telmate/proxmox"
|
source = "Telmate/proxmox"
|
||||||
version = "3.0.1-rc6"
|
version = "3.0.1-rc9"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: traefik
|
- name: traefik
|
||||||
repository: https://traefik.github.io/charts
|
repository: https://traefik.github.io/charts
|
||||||
version: 34.0.0
|
version: 34.5.0
|
||||||
|
|||||||
@@ -8,5 +8,5 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: vault
|
- name: vault
|
||||||
repository: https://helm.releases.hashicorp.com
|
repository: https://helm.releases.hashicorp.com
|
||||||
version: 0.29.1
|
version: 0.30.0
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
metadata:
|
metadata:
|
||||||
name: vault
|
name: vault
|
||||||
|
|||||||
62
dmz/authentik/templates/ingress.yaml
Normal file
62
dmz/authentik/templates/ingress.yaml
Normal file
@@ -0,0 +1,62 @@
|
|||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: authentik-tls
|
||||||
|
spec:
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
secretName: authentik-tls
|
||||||
|
commonName: "authentik.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "authentik.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: traefik.io/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: authentik-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`authentik.durp.info`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: infra-cluster
|
||||||
|
port: 443
|
||||||
|
tls:
|
||||||
|
secretName: authentik-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: authentik-external-dns
|
||||||
|
annotations:
|
||||||
|
external-dns.alpha.kubernetes.io/hostname: authentik.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: durp.info
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Endpoints
|
||||||
|
metadata:
|
||||||
|
name: infra-cluster
|
||||||
|
subsets:
|
||||||
|
- addresses:
|
||||||
|
- ip: 192.168.12.130
|
||||||
|
ports:
|
||||||
|
- port: 443
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: infra-cluster
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- protocol: TCP
|
||||||
|
port: 443
|
||||||
|
targetPort: 443
|
||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: cert-manager
|
- name: cert-manager
|
||||||
repository: https://charts.jetstack.io
|
repository: https://charts.jetstack.io
|
||||||
version: v1.16.3
|
version: v1.17.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: cloudflare-api-token-secret
|
name: cloudflare-api-token-secret
|
||||||
|
|||||||
11
dmz/crowdsec/Chart.yaml
Normal file
11
dmz/crowdsec/Chart.yaml
Normal file
@@ -0,0 +1,11 @@
|
|||||||
|
apiVersion: v2
|
||||||
|
name: crowdsec
|
||||||
|
description: A Helm chart for Kubernetes
|
||||||
|
type: application
|
||||||
|
version: 0.0.1
|
||||||
|
appVersion: 0.0.1
|
||||||
|
|
||||||
|
dependencies:
|
||||||
|
- name: crowdsec
|
||||||
|
repository: https://crowdsecurity.github.io/helm-charts
|
||||||
|
version: 0.19.4
|
||||||
29
dmz/crowdsec/templates/secrets.yaml
Normal file
29
dmz/crowdsec/templates/secrets.yaml
Normal file
@@ -0,0 +1,29 @@
|
|||||||
|
apiVersion: external-secrets.io/v1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: enroll-key
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: enroll-key
|
||||||
|
data:
|
||||||
|
- secretKey: ENROLL_INSTANCE_NAME
|
||||||
|
remoteRef:
|
||||||
|
key: kv/crowdsec/dmz-enroll
|
||||||
|
property: ENROLL_INSTANCE_NAME
|
||||||
|
- secretKey: ENROLL_KEY
|
||||||
|
remoteRef:
|
||||||
|
key: kv/crowdsec/dmz-enroll
|
||||||
|
property: ENROLL_KEY
|
||||||
|
- secretKey: ENROLL_TAGS
|
||||||
|
remoteRef:
|
||||||
|
key: kv/crowdsec/dmz-enroll
|
||||||
|
property: ENROLL_TAGS
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
name: vault
|
||||||
24
dmz/crowdsec/values.yaml
Normal file
24
dmz/crowdsec/values.yaml
Normal file
@@ -0,0 +1,24 @@
|
|||||||
|
crowdsec:
|
||||||
|
#
|
||||||
|
image:
|
||||||
|
repository: registry.durp.info/crowdsecurity/crowdsec
|
||||||
|
pullPolicy: Always
|
||||||
|
|
||||||
|
# for raw logs format: json or cri (docker|containerd)
|
||||||
|
container_runtime: containerd
|
||||||
|
agent:
|
||||||
|
# Specify each pod whose logs you want to process
|
||||||
|
acquisition:
|
||||||
|
# The namespace where the pod is located
|
||||||
|
- namespace: traefik
|
||||||
|
# The pod name
|
||||||
|
podName: traefik-*
|
||||||
|
# as in crowdsec configuration, we need to specify the program name to find a matching parser
|
||||||
|
program: traefik
|
||||||
|
env:
|
||||||
|
- name: COLLECTIONS
|
||||||
|
value: "crowdsecurity/traefik"
|
||||||
|
lapi:
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: enroll-key
|
||||||
@@ -9,4 +9,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
repository: https://charts.bitnami.com/bitnami
|
repository: https://charts.bitnami.com/bitnami
|
||||||
version: 8.3.8
|
version: 8.9.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: external-dns-secret
|
name: external-dns-secret
|
||||||
|
|||||||
@@ -1,6 +1,8 @@
|
|||||||
external-dns:
|
external-dns:
|
||||||
global:
|
global:
|
||||||
imageRegistry: "registry.durp.info"
|
imageRegistry: "registry.durp.info"
|
||||||
|
security:
|
||||||
|
allowInsecureImages: true
|
||||||
|
|
||||||
image:
|
image:
|
||||||
pullPolicy: Always
|
pullPolicy: Always
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-secrets
|
- name: external-secrets
|
||||||
repository: https://charts.external-secrets.io
|
repository: https://charts.external-secrets.io
|
||||||
version: 0.15.0
|
version: 0.17.0
|
||||||
|
|||||||
@@ -1,7 +1,13 @@
|
|||||||
external-secrets:
|
external-secrets:
|
||||||
replicaCount: 3
|
global:
|
||||||
|
security:
|
||||||
|
allowInsecureImages: true
|
||||||
|
|
||||||
|
log:
|
||||||
|
level: debug
|
||||||
|
replicaCount: 1
|
||||||
revisionHistoryLimit: 1
|
revisionHistoryLimit: 1
|
||||||
leaderElect: true
|
leaderElect: false
|
||||||
|
|
||||||
installCRDs: true
|
installCRDs: true
|
||||||
crds:
|
crds:
|
||||||
@@ -27,13 +33,13 @@ external-secrets:
|
|||||||
subPath: vault.pem
|
subPath: vault.pem
|
||||||
readOnly: true
|
readOnly: true
|
||||||
|
|
||||||
resources:
|
# resources:
|
||||||
requests:
|
# requests:
|
||||||
memory: 32Mi
|
# memory: 32Mi
|
||||||
cpu: 10m
|
# cpu: 10m
|
||||||
limits:
|
# limits:
|
||||||
memory: 32Mi
|
# memory: 32Mi
|
||||||
cpu: 10m
|
# cpu: 10m
|
||||||
|
|
||||||
webhook:
|
webhook:
|
||||||
create: false
|
create: false
|
||||||
@@ -55,13 +61,13 @@ external-secrets:
|
|||||||
subPath: vault.pem
|
subPath: vault.pem
|
||||||
readOnly: true
|
readOnly: true
|
||||||
|
|
||||||
resources:
|
# resources:
|
||||||
requests:
|
# requests:
|
||||||
memory: 32Mi
|
# memory: 32Mi
|
||||||
cpu: 10m
|
# cpu: 10m
|
||||||
limits:
|
# limits:
|
||||||
memory: 32Mi
|
# memory: 32Mi
|
||||||
cpu: 10m
|
# cpu: 10m
|
||||||
|
|
||||||
certController:
|
certController:
|
||||||
create: false
|
create: false
|
||||||
|
|||||||
@@ -8,8 +8,8 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: gitlab-runner
|
- name: gitlab-runner
|
||||||
repository: https://charts.gitlab.io/
|
repository: https://charts.gitlab.io/
|
||||||
version: 0.69.0
|
version: 0.77.2
|
||||||
- name: gitlab-runner
|
- name: gitlab-runner
|
||||||
repository: https://charts.gitlab.io/
|
repository: https://charts.gitlab.io/
|
||||||
version: 0.69.0
|
version: 0.77.2
|
||||||
alias: personal
|
alias: personal
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: gitlab-secret
|
name: gitlab-secret
|
||||||
@@ -27,7 +27,7 @@ metadata:
|
|||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: gitlab-secret-personal
|
name: gitlab-secret-personal
|
||||||
|
|||||||
@@ -1,42 +1,40 @@
|
|||||||
apiVersion: traefik.io/v1alpha1
|
#apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
#kind: IngressRoute
|
||||||
metadata:
|
#metadata:
|
||||||
name: authentik-ingress
|
# name: authentik-ingress
|
||||||
spec:
|
#spec:
|
||||||
entryPoints:
|
# entryPoints:
|
||||||
- websecure
|
# - websecure
|
||||||
routes:
|
# routes:
|
||||||
- match: Host(`authentik.durp.info`) && PathPrefix(`/`)
|
# - match: Host(`authentik.durp.info`) && PathPrefix(`/`)
|
||||||
kind: Rule
|
# kind: Rule
|
||||||
services:
|
# services:
|
||||||
- name: infra-cluster
|
# - name: infra-cluster
|
||||||
port: 443
|
# port: 443
|
||||||
tls:
|
# tls:
|
||||||
secretName: authentik-tls
|
# secretName: authentik-tls
|
||||||
|
#
|
||||||
---
|
#---
|
||||||
|
#apiVersion: cert-manager.io/v1
|
||||||
apiVersion: cert-manager.io/v1
|
#kind: Certificate
|
||||||
kind: Certificate
|
#metadata:
|
||||||
metadata:
|
# name: authentik-tls
|
||||||
name: authentik-tls
|
#spec:
|
||||||
spec:
|
# issuerRef:
|
||||||
issuerRef:
|
# name: letsencrypt-production
|
||||||
name: letsencrypt-production
|
# kind: ClusterIssuer
|
||||||
kind: ClusterIssuer
|
# secretName: authentik-tls
|
||||||
secretName: authentik-tls
|
# commonName: "authentik.durp.info"
|
||||||
commonName: "authentik.durp.info"
|
# dnsNames:
|
||||||
dnsNames:
|
# - "authentik.durp.info"
|
||||||
- "authentik.durp.info"
|
#
|
||||||
|
#---
|
||||||
---
|
#kind: Service
|
||||||
|
#apiVersion: v1
|
||||||
kind: Service
|
#metadata:
|
||||||
apiVersion: v1
|
# name: authentik-external-dns
|
||||||
metadata:
|
# annotations:
|
||||||
name: authentik-external-dns
|
# external-dns.alpha.kubernetes.io/hostname: authentik.durp.info
|
||||||
annotations:
|
#spec:
|
||||||
external-dns.alpha.kubernetes.io/hostname: authentik.durp.info
|
# type: ExternalName
|
||||||
spec:
|
# externalName: durp.info
|
||||||
type: ExternalName
|
|
||||||
externalName: durp.info
|
|
||||||
|
|||||||
72
dmz/internalproxy/templates/n8n.yaml
Normal file
72
dmz/internalproxy/templates/n8n.yaml
Normal file
@@ -0,0 +1,72 @@
|
|||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: n8n
|
||||||
|
spec:
|
||||||
|
ports:
|
||||||
|
- name: app
|
||||||
|
port: 5678
|
||||||
|
protocol: TCP
|
||||||
|
targetPort: 5678
|
||||||
|
clusterIP: None
|
||||||
|
type: ClusterIP
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Endpoints
|
||||||
|
metadata:
|
||||||
|
name: n8n
|
||||||
|
subsets:
|
||||||
|
- addresses:
|
||||||
|
- ip: 192.168.20.104
|
||||||
|
ports:
|
||||||
|
- name: app
|
||||||
|
port: 5678
|
||||||
|
protocol: TCP
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: traefik.io/v1alpha1
|
||||||
|
kind: IngressRoute
|
||||||
|
metadata:
|
||||||
|
name: n8n-ingress
|
||||||
|
spec:
|
||||||
|
entryPoints:
|
||||||
|
- websecure
|
||||||
|
routes:
|
||||||
|
- match: Host(`n8n.durp.info`) && PathPrefix(`/`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: n8n
|
||||||
|
port: 5678
|
||||||
|
scheme: http
|
||||||
|
tls:
|
||||||
|
secretName: n8n-tls
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
apiVersion: cert-manager.io/v1
|
||||||
|
kind: Certificate
|
||||||
|
metadata:
|
||||||
|
name: n8n-tls
|
||||||
|
spec:
|
||||||
|
secretName: n8n-tls
|
||||||
|
issuerRef:
|
||||||
|
name: letsencrypt-production
|
||||||
|
kind: ClusterIssuer
|
||||||
|
commonName: "n8n.durp.info"
|
||||||
|
dnsNames:
|
||||||
|
- "n8n.durp.info"
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
kind: Service
|
||||||
|
apiVersion: v1
|
||||||
|
metadata:
|
||||||
|
name: n8n-dns
|
||||||
|
annotations:
|
||||||
|
dns.alpha.kubernetes.io/hostname: n8n.durp.info
|
||||||
|
spec:
|
||||||
|
type: ExternalName
|
||||||
|
externalName: durp.info
|
||||||
@@ -15,7 +15,6 @@ spec:
|
|||||||
secretName: octopus-tls
|
secretName: octopus-tls
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: cert-manager.io/v1
|
apiVersion: cert-manager.io/v1
|
||||||
kind: Certificate
|
kind: Certificate
|
||||||
metadata:
|
metadata:
|
||||||
@@ -30,7 +29,6 @@ spec:
|
|||||||
- "octopus.durp.info"
|
- "octopus.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
kind: Service
|
kind: Service
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
metadata:
|
metadata:
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: ollama-secret
|
name: ollama-secret
|
||||||
|
|||||||
@@ -12,7 +12,6 @@ spec:
|
|||||||
type: ClusterIP
|
type: ClusterIP
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
kind: Endpoints
|
kind: Endpoints
|
||||||
metadata:
|
metadata:
|
||||||
@@ -26,7 +25,6 @@ subsets:
|
|||||||
protocol: TCP
|
protocol: TCP
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: traefik.io/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: IngressRoute
|
kind: IngressRoute
|
||||||
metadata:
|
metadata:
|
||||||
@@ -37,6 +35,9 @@ spec:
|
|||||||
routes:
|
routes:
|
||||||
- match: Host(`registry.durp.info`) && PathPrefix(`/`)
|
- match: Host(`registry.durp.info`) && PathPrefix(`/`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
|
middlewares:
|
||||||
|
- name: whitelist
|
||||||
|
namespace: traefik
|
||||||
services:
|
services:
|
||||||
- name: registry
|
- name: registry
|
||||||
port: 5000
|
port: 5000
|
||||||
@@ -44,7 +45,6 @@ spec:
|
|||||||
secretName: registry-tls
|
secretName: registry-tls
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: cert-manager.io/v1
|
apiVersion: cert-manager.io/v1
|
||||||
kind: Certificate
|
kind: Certificate
|
||||||
metadata:
|
metadata:
|
||||||
@@ -59,13 +59,12 @@ spec:
|
|||||||
- "registry.durp.info"
|
- "registry.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
#kind: Service
|
||||||
kind: Service
|
#apiVersion: v1
|
||||||
apiVersion: v1
|
#metadata:
|
||||||
metadata:
|
# name: registry-external-dns
|
||||||
name: registry-external-dns
|
# annotations:
|
||||||
annotations:
|
# external-dns.alpha.kubernetes.io/hostname: registry.durp.info
|
||||||
external-dns.alpha.kubernetes.io/hostname: registry.durp.info
|
#spec:
|
||||||
spec:
|
# type: ExternalName
|
||||||
type: ExternalName
|
# externalName: durp.info
|
||||||
externalName: durp.info
|
|
||||||
|
|||||||
@@ -8,10 +8,10 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: base
|
- name: base
|
||||||
repository: https://istio-release.storage.googleapis.com/charts
|
repository: https://istio-release.storage.googleapis.com/charts
|
||||||
version: 1.25.1
|
version: 1.26.2
|
||||||
- name: istiod
|
- name: istiod
|
||||||
repository: https://istio-release.storage.googleapis.com/charts
|
repository: https://istio-release.storage.googleapis.com/charts
|
||||||
version: 1.25.1
|
version: 1.26.2
|
||||||
- name: gateway
|
- name: gateway
|
||||||
repository: https://istio-release.storage.googleapis.com/charts
|
repository: https://istio-release.storage.googleapis.com/charts
|
||||||
version: 1.25.1
|
version: 1.26.2
|
||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: longhorn
|
- name: longhorn
|
||||||
repository: https://charts.longhorn.io
|
repository: https://charts.longhorn.io
|
||||||
version: 1.7.2
|
version: 1.9.0
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ metadata:
|
|||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: external-longhorn-backup-token-secret
|
name: external-longhorn-backup-token-secret
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: metallb
|
- name: metallb
|
||||||
repository: https://metallb.github.io/metallb
|
repository: https://metallb.github.io/metallb
|
||||||
version: 0.14.9
|
version: 0.15.2
|
||||||
|
|||||||
@@ -18,7 +18,6 @@ spec:
|
|||||||
secretName: redlib-tls
|
secretName: redlib-tls
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: cert-manager.io/v1
|
apiVersion: cert-manager.io/v1
|
||||||
kind: Certificate
|
kind: Certificate
|
||||||
metadata:
|
metadata:
|
||||||
@@ -33,7 +32,6 @@ spec:
|
|||||||
- "redlib.durp.info"
|
- "redlib.durp.info"
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
kind: Service
|
kind: Service
|
||||||
apiVersion: v1
|
apiVersion: v1
|
||||||
metadata:
|
metadata:
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
proxmox = {
|
proxmox = {
|
||||||
source = "Telmate/proxmox"
|
source = "Telmate/proxmox"
|
||||||
version = "3.0.1-rc6"
|
version = "3.0.1-rc9"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: traefik
|
- name: traefik
|
||||||
repository: https://traefik.github.io/charts
|
repository: https://traefik.github.io/charts
|
||||||
version: 34.0.0
|
version: 34.5.0
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ metadata:
|
|||||||
namespace: traefik
|
namespace: traefik
|
||||||
spec:
|
spec:
|
||||||
forwardAuth:
|
forwardAuth:
|
||||||
address: http://ak-outpost-dmz-embedded-outpost.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik?rd=$scheme://$http_host$request_uri
|
address: http://ak-outpost-authentik-dmz-outpost.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik?rd=$scheme://$http_host$request_uri
|
||||||
trustForwardHeader: true
|
trustForwardHeader: true
|
||||||
authResponseHeaders:
|
authResponseHeaders:
|
||||||
- X-authentik-username
|
- X-authentik-username
|
||||||
@@ -21,7 +21,6 @@ spec:
|
|||||||
- X-authentik-meta-version
|
- X-authentik-meta-version
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: traefik.io/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
kind: Middleware
|
kind: Middleware
|
||||||
metadata:
|
metadata:
|
||||||
@@ -33,3 +32,23 @@ spec:
|
|||||||
- 192.168.0.0/16
|
- 192.168.0.0/16
|
||||||
- 172.16.0.0/12
|
- 172.16.0.0/12
|
||||||
- 10.0.0.0/8
|
- 10.0.0.0/8
|
||||||
|
|
||||||
|
---
|
||||||
|
#apiVersion: traefik.io/v1alpha1
|
||||||
|
#kind: Middleware
|
||||||
|
#metadata:
|
||||||
|
# name: bouncer
|
||||||
|
# namespace: traefik
|
||||||
|
#spec:
|
||||||
|
# plugin:
|
||||||
|
# bouncer:
|
||||||
|
# enabled: true
|
||||||
|
# crowdsecMode: stream
|
||||||
|
# crowdsecLapiScheme: https
|
||||||
|
# crowdsecLapiTLSInsecureVerify: true
|
||||||
|
# crowdsecLapiHost: crowdsec-service.crowdsec:8080
|
||||||
|
# crowdsecLapiKey:
|
||||||
|
# valueFrom:
|
||||||
|
# secretKeyRef:
|
||||||
|
# name: crowdsec-lapi-key
|
||||||
|
# key: lapi-key
|
||||||
|
|||||||
21
dmz/traefik/templates/secrets.yaml
Normal file
21
dmz/traefik/templates/secrets.yaml
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
apiVersion: external-secrets.io/v1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: crowdsec-lapi-key
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: crowdsec-lapi-key
|
||||||
|
data:
|
||||||
|
- secretKey: lapi-key
|
||||||
|
remoteRef:
|
||||||
|
key: kv/crowdsec/api
|
||||||
|
property: key
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
name: vault
|
||||||
@@ -1,34 +1,35 @@
|
|||||||
#apiVersion: traefik.io/v1alpha1
|
apiVersion: traefik.io/v1alpha1
|
||||||
#kind: IngressRoute
|
kind: IngressRoute
|
||||||
#metadata:
|
metadata:
|
||||||
# name: traefik-ingress
|
name: traefik-ingress
|
||||||
#spec:
|
spec:
|
||||||
# entryPoints:
|
entryPoints:
|
||||||
# - websecure
|
- websecure
|
||||||
# routes:
|
routes:
|
||||||
# - match: Host(`traefik.durp.info`)
|
- match: Host(`traefik.dmz.durp.info`)
|
||||||
# kind: Rule
|
kind: Rule
|
||||||
# services:
|
middlewares:
|
||||||
# - name: api@internal
|
- name: whitelist
|
||||||
# kind: TraefikService
|
namespace: traefik
|
||||||
# tls:
|
- name: authentik-proxy-provider
|
||||||
# secretName: traefik-tls
|
namespace: traefik
|
||||||
#
|
services:
|
||||||
#---
|
- name: api@internal
|
||||||
#
|
kind: TraefikService
|
||||||
#apiVersion: cert-manager.io/v1
|
tls:
|
||||||
#kind: Certificate
|
secretName: traefik-tls
|
||||||
#metadata:
|
|
||||||
# name: traefik-tls
|
---
|
||||||
# namespace: traefik
|
apiVersion: cert-manager.io/v1
|
||||||
#spec:
|
kind: Certificate
|
||||||
# secretName: traefik-tls
|
metadata:
|
||||||
# issuerRef:
|
name: traefik-tls
|
||||||
# name: letsencrypt-production
|
namespace: traefik
|
||||||
# kind: ClusterIssuer
|
spec:
|
||||||
# commonName: "traefik.durp.info"
|
secretName: traefik-tls
|
||||||
# dnsNames:
|
issuerRef:
|
||||||
# - "traefik.durp.info"
|
name: vault-issuer
|
||||||
#
|
kind: ClusterIssuer
|
||||||
#---
|
commonName: "traefik.dmz.durp.info"
|
||||||
#
|
dnsNames:
|
||||||
|
- "traefik.dmz.durp.info"
|
||||||
|
|||||||
@@ -29,6 +29,8 @@ traefik:
|
|||||||
- "--log.level=DEBUG"
|
- "--log.level=DEBUG"
|
||||||
- --experimental.plugins.jwt.moduleName=github.com/traefik-plugins/traefik-jwt-plugin
|
- --experimental.plugins.jwt.moduleName=github.com/traefik-plugins/traefik-jwt-plugin
|
||||||
- --experimental.plugins.jwt.version=v0.7.0
|
- --experimental.plugins.jwt.version=v0.7.0
|
||||||
|
- --experimental.plugins.bouncer.moduleName=github.com/maxlerebourg/crowdsec-bouncer-traefik-plugin
|
||||||
|
- --experimental.plugins.bouncer.version=v1.4.2
|
||||||
|
|
||||||
autoscaling:
|
autoscaling:
|
||||||
enabled: true
|
enabled: true
|
||||||
@@ -49,7 +51,6 @@ traefik:
|
|||||||
value: 1
|
value: 1
|
||||||
periodSeconds: 60
|
periodSeconds: 60
|
||||||
|
|
||||||
|
|
||||||
# -- [Resources](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) for `traefik` container.
|
# -- [Resources](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) for `traefik` container.
|
||||||
resources:
|
resources:
|
||||||
requests:
|
requests:
|
||||||
|
|||||||
@@ -8,5 +8,5 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: vault
|
- name: vault
|
||||||
repository: https://helm.releases.hashicorp.com
|
repository: https://helm.releases.hashicorp.com
|
||||||
version: 0.29.1
|
version: 0.30.0
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
metadata:
|
metadata:
|
||||||
name: vault
|
name: vault
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: argo-cd
|
- name: argo-cd
|
||||||
repository: https://argoproj.github.io/argo-helm
|
repository: https://argoproj.github.io/argo-helm
|
||||||
version: 6.11.1
|
version: 8.1.3
|
||||||
|
|||||||
101
infra/argocd/templates/argocd-crossplane.yaml
Normal file
101
infra/argocd/templates/argocd-crossplane.yaml
Normal file
@@ -0,0 +1,101 @@
|
|||||||
|
#apiVersion: external-secrets.io/v1
|
||||||
|
#kind: ExternalSecret
|
||||||
|
#metadata:
|
||||||
|
# name: argocd-secret-crossplane
|
||||||
|
#spec:
|
||||||
|
# secretStoreRef:
|
||||||
|
# name: vault
|
||||||
|
# kind: ClusterSecretStore
|
||||||
|
# target:
|
||||||
|
# name: argocd-secret-crossplane
|
||||||
|
# data:
|
||||||
|
# - secretKey: authToken
|
||||||
|
# remoteRef:
|
||||||
|
# key: kv/argocd/provider-argocd
|
||||||
|
# property: token
|
||||||
|
#
|
||||||
|
#---
|
||||||
|
#apiVersion: external-secrets.io/v1
|
||||||
|
#kind: ExternalSecret
|
||||||
|
#metadata:
|
||||||
|
# name: prod-kubeconfig
|
||||||
|
#spec:
|
||||||
|
# secretStoreRef:
|
||||||
|
# name: vault
|
||||||
|
# kind: ClusterSecretStore
|
||||||
|
# target:
|
||||||
|
# name: prod-kubeconfig
|
||||||
|
# data:
|
||||||
|
# - secretKey: kubeconfig
|
||||||
|
# remoteRef:
|
||||||
|
# key: kv/argocd/prd
|
||||||
|
# property: kubeconfig
|
||||||
|
#
|
||||||
|
#---
|
||||||
|
#apiVersion: argocd.crossplane.io/v1alpha1
|
||||||
|
#kind: ProviderConfig
|
||||||
|
#metadata:
|
||||||
|
# name: argocd-provider
|
||||||
|
#spec:
|
||||||
|
# serverAddr: argocd-server.argocd.svc:443
|
||||||
|
# insecure: true
|
||||||
|
# plainText: false
|
||||||
|
# credentials:
|
||||||
|
# source: Secret
|
||||||
|
# secretRef:
|
||||||
|
# namespace: argocd
|
||||||
|
# name: argocd-secret-crossplane
|
||||||
|
# key: authToken
|
||||||
|
#
|
||||||
|
#---
|
||||||
|
#apiVersion: cluster.argocd.crossplane.io/v1alpha1
|
||||||
|
#kind: Cluster
|
||||||
|
#metadata:
|
||||||
|
# name: prd
|
||||||
|
# labels:
|
||||||
|
# purpose: prd
|
||||||
|
#spec:
|
||||||
|
# forProvider:
|
||||||
|
# name: prd
|
||||||
|
# config:
|
||||||
|
# kubeconfigSecretRef:
|
||||||
|
# name: prod-kubeconfig
|
||||||
|
# namespace: argocd
|
||||||
|
# key: kubeconfig
|
||||||
|
# providerConfigRef:
|
||||||
|
# name: argocd-provider
|
||||||
|
#
|
||||||
|
#---
|
||||||
|
#apiVersion: external-secrets.io/v1
|
||||||
|
#kind: ExternalSecret
|
||||||
|
#metadata:
|
||||||
|
# name: dev-kubeconfig
|
||||||
|
#spec:
|
||||||
|
# secretStoreRef:
|
||||||
|
# name: vault
|
||||||
|
# kind: ClusterSecretStore
|
||||||
|
# target:
|
||||||
|
# name: dev-kubeconfig
|
||||||
|
# data:
|
||||||
|
# - secretKey: kubeconfig
|
||||||
|
# remoteRef:
|
||||||
|
# key: kv/argocd/dev
|
||||||
|
# property: kubeconfig
|
||||||
|
#
|
||||||
|
#---
|
||||||
|
#apiVersion: cluster.argocd.crossplane.io/v1alpha1
|
||||||
|
#kind: Cluster
|
||||||
|
#metadata:
|
||||||
|
# name: dev
|
||||||
|
# labels:
|
||||||
|
# purpose: dev
|
||||||
|
#spec:
|
||||||
|
# forProvider:
|
||||||
|
# name: dev
|
||||||
|
# config:
|
||||||
|
# kubeconfigSecretRef:
|
||||||
|
# name: dev-kubeconfig
|
||||||
|
# namespace: argocd
|
||||||
|
# key: kubeconfig
|
||||||
|
# providerConfigRef:
|
||||||
|
# name: argocd-provider
|
||||||
@@ -21,7 +21,7 @@ spec:
|
|||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: vault-argocd
|
name: vault-argocd
|
||||||
|
|||||||
@@ -23,7 +23,6 @@ spec:
|
|||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
@@ -44,4 +43,3 @@ spec:
|
|||||||
selfHeal: true
|
selfHeal: true
|
||||||
syncOptions:
|
syncOptions:
|
||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
|
||||||
|
|||||||
20
infra/argocd/templates/crowdsec.yaml
Normal file
20
infra/argocd/templates/crowdsec.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: crowdsec
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: default
|
||||||
|
source:
|
||||||
|
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||||
|
targetRevision: main
|
||||||
|
path: dmz/crowdsec
|
||||||
|
destination:
|
||||||
|
namespace: crowdsec
|
||||||
|
name: dmz
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
prune: true
|
||||||
|
selfHeal: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
@@ -28,7 +28,6 @@ spec:
|
|||||||
- /webhooks/0/failurePolicy
|
- /webhooks/0/failurePolicy
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
|
|||||||
@@ -18,6 +18,11 @@ spec:
|
|||||||
selfHeal: true
|
selfHeal: true
|
||||||
syncOptions:
|
syncOptions:
|
||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
ignoreDifferences:
|
||||||
|
- group: engineimages.longhorn.io
|
||||||
|
jsonPointers:
|
||||||
|
- /spec/preserveUnknownFields
|
||||||
|
kind: CustomResourceDefinition
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
|||||||
@@ -20,7 +20,6 @@ spec:
|
|||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: argoproj.io/v1alpha1
|
apiVersion: argoproj.io/v1alpha1
|
||||||
kind: Application
|
kind: Application
|
||||||
metadata:
|
metadata:
|
||||||
@@ -33,7 +32,7 @@ spec:
|
|||||||
targetRevision: main
|
targetRevision: main
|
||||||
path: infra/octopus-agent
|
path: infra/octopus-agent
|
||||||
destination:
|
destination:
|
||||||
namespace: octpus-agent
|
namespace: octopus-agent
|
||||||
name: in-cluster
|
name: in-cluster
|
||||||
syncPolicy:
|
syncPolicy:
|
||||||
automated:
|
automated:
|
||||||
@@ -41,4 +40,3 @@ spec:
|
|||||||
selfHeal: true
|
selfHeal: true
|
||||||
syncOptions:
|
syncOptions:
|
||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
|
||||||
|
|||||||
@@ -34,6 +34,7 @@ argo-cd:
|
|||||||
annotations: {}
|
annotations: {}
|
||||||
url: https://argocd.infra.durp.info
|
url: https://argocd.infra.durp.info
|
||||||
oidc.tls.insecure.skip.verify: "true"
|
oidc.tls.insecure.skip.verify: "true"
|
||||||
|
accounts.provider-argocd: apiKey
|
||||||
dex.config: |
|
dex.config: |
|
||||||
connectors:
|
connectors:
|
||||||
- config:
|
- config:
|
||||||
@@ -49,11 +50,13 @@ argo-cd:
|
|||||||
name: authentik
|
name: authentik
|
||||||
type: oidc
|
type: oidc
|
||||||
id: authentik
|
id: authentik
|
||||||
|
resource.exclusions: ""
|
||||||
|
|
||||||
rbac:
|
rbac:
|
||||||
create: true
|
create: true
|
||||||
policy.csv: |
|
policy.csv: |
|
||||||
g, ArgoCD Admins, role:admin
|
g, ArgoCD Admins, role:admin
|
||||||
|
g, provider-argocd, role:admin
|
||||||
scopes: "[groups]"
|
scopes: "[groups]"
|
||||||
|
|
||||||
server:
|
server:
|
||||||
|
|||||||
@@ -9,5 +9,5 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: authentik
|
- name: authentik
|
||||||
repository: https://charts.goauthentik.io
|
repository: https://charts.goauthentik.io
|
||||||
version: 2025.4.0
|
version: 2025.4.1
|
||||||
|
|
||||||
|
|||||||
@@ -11,11 +11,15 @@ spec:
|
|||||||
services:
|
services:
|
||||||
- name: authentik-server
|
- name: authentik-server
|
||||||
port: 80
|
port: 80
|
||||||
|
- match: Host(`authentik.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||||
|
kind: Rule
|
||||||
|
services:
|
||||||
|
- name: ak-outpost-authentik-embedded-outpost
|
||||||
|
port: 9000
|
||||||
tls:
|
tls:
|
||||||
secretName: authentik-tls
|
secretName: authentik-tls
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: cert-manager.io/v1
|
apiVersion: cert-manager.io/v1
|
||||||
kind: Certificate
|
kind: Certificate
|
||||||
metadata:
|
metadata:
|
||||||
@@ -28,4 +32,3 @@ spec:
|
|||||||
commonName: "authentik.durp.info"
|
commonName: "authentik.durp.info"
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "authentik.durp.info"
|
- "authentik.durp.info"
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: authentik-secret
|
name: authentik-secret
|
||||||
|
|||||||
@@ -17,7 +17,7 @@ spec:
|
|||||||
spec:
|
spec:
|
||||||
containers:
|
containers:
|
||||||
- name: bitwarden
|
- name: bitwarden
|
||||||
image: registry.durp.info/vaultwarden/server:1.32.7
|
image: registry.durp.info/vaultwarden/server:1.34.3
|
||||||
imagePullPolicy: Always
|
imagePullPolicy: Always
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: bitwarden-pvc
|
- name: bitwarden-pvc
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: bitwarden-secret
|
name: bitwarden-secret
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: cert-manager
|
- name: cert-manager
|
||||||
repository: https://charts.jetstack.io
|
repository: https://charts.jetstack.io
|
||||||
version: v1.16.3
|
version: v1.17.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: cloudflare-api-token-secret
|
name: cloudflare-api-token-secret
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-secrets
|
- name: external-secrets
|
||||||
repository: https://charts.external-secrets.io
|
repository: https://charts.external-secrets.io
|
||||||
version: 0.15.0
|
version: 0.17.0
|
||||||
|
|||||||
@@ -1,7 +1,13 @@
|
|||||||
external-secrets:
|
external-secrets:
|
||||||
|
global:
|
||||||
|
security:
|
||||||
|
allowInsecureImages: true
|
||||||
|
|
||||||
|
log:
|
||||||
|
level: debug
|
||||||
replicaCount: 1
|
replicaCount: 1
|
||||||
revisionHistoryLimit: 1
|
revisionHistoryLimit: 1
|
||||||
leaderElect: true
|
leaderElect: false
|
||||||
|
|
||||||
installCRDs: true
|
installCRDs: true
|
||||||
crds:
|
crds:
|
||||||
@@ -27,13 +33,13 @@ external-secrets:
|
|||||||
subPath: vault.pem
|
subPath: vault.pem
|
||||||
readOnly: true
|
readOnly: true
|
||||||
|
|
||||||
resources:
|
# resources:
|
||||||
requests:
|
# requests:
|
||||||
memory: 32Mi
|
# memory: 32Mi
|
||||||
cpu: 10m
|
# cpu: 10m
|
||||||
limits:
|
# limits:
|
||||||
memory: 32Mi
|
# memory: 32Mi
|
||||||
cpu: 10m
|
# cpu: 10m
|
||||||
|
|
||||||
webhook:
|
webhook:
|
||||||
log:
|
log:
|
||||||
@@ -42,13 +48,13 @@ external-secrets:
|
|||||||
repository: registry.durp.info/external-secrets/external-secrets
|
repository: registry.durp.info/external-secrets/external-secrets
|
||||||
pullPolicy: Always
|
pullPolicy: Always
|
||||||
|
|
||||||
resources:
|
# resources:
|
||||||
requests:
|
# requests:
|
||||||
memory: 32Mi
|
# memory: 32Mi
|
||||||
cpu: 10m
|
# cpu: 10m
|
||||||
limits:
|
# limits:
|
||||||
memory: 32Mi
|
# memory: 32Mi
|
||||||
cpu: 10m
|
# cpu: 10m
|
||||||
|
|
||||||
certController:
|
certController:
|
||||||
create: false
|
create: false
|
||||||
|
|||||||
@@ -8,10 +8,10 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: base
|
- name: base
|
||||||
repository: https://istio-release.storage.googleapis.com/charts
|
repository: https://istio-release.storage.googleapis.com/charts
|
||||||
version: 1.25.1
|
version: 1.26.2
|
||||||
- name: istiod
|
- name: istiod
|
||||||
repository: https://istio-release.storage.googleapis.com/charts
|
repository: https://istio-release.storage.googleapis.com/charts
|
||||||
version: 1.25.1
|
version: 1.26.2
|
||||||
- name: gateway
|
- name: gateway
|
||||||
repository: https://istio-release.storage.googleapis.com/charts
|
repository: https://istio-release.storage.googleapis.com/charts
|
||||||
version: 1.25.1
|
version: 1.26.2
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: longhorn
|
- name: longhorn
|
||||||
repository: https://charts.longhorn.io
|
repository: https://charts.longhorn.io
|
||||||
version: 1.7.2
|
version: 1.9.0
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ metadata:
|
|||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: external-longhorn-backup-token-secret
|
name: external-longhorn-backup-token-secret
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: metallb
|
- name: metallb
|
||||||
repository: https://metallb.github.io/metallb
|
repository: https://metallb.github.io/metallb
|
||||||
version: 0.14.9
|
version: 0.15.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: nebula-sync-secret
|
name: nebula-sync-secret
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ metadata:
|
|||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: agent-token
|
name: agent-token
|
||||||
|
|||||||
@@ -4,7 +4,9 @@ kubernetes-agent:
|
|||||||
acceptEula: "Y"
|
acceptEula: "Y"
|
||||||
serverUrl: "https://octopus.durp.info/"
|
serverUrl: "https://octopus.durp.info/"
|
||||||
serverCommsAddresses:
|
serverCommsAddresses:
|
||||||
- "https://octopusdeploy-octopus-deploy.octopusdeploy.svc.cluster.local:10943/"
|
- "https://octopus-deploy-node0.octopusdeploy.svc.cluster.local:10943/"
|
||||||
|
- "https://octopus-deploy-node1.octopusdeploy.svc.cluster.local:10943/"
|
||||||
|
- "https://octopus-deploy-node2.octopusdeploy.svc.cluster.local:10943/"
|
||||||
space: "Default"
|
space: "Default"
|
||||||
name: "infra"
|
name: "infra"
|
||||||
deploymentTarget:
|
deploymentTarget:
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: octopusdeploy-helm
|
- name: octopusdeploy-helm
|
||||||
repository: oci://ghcr.io/octopusdeploy
|
repository: oci://ghcr.io/octopusdeploy
|
||||||
version: 1.3.1
|
version: 1.4.0
|
||||||
|
|||||||
@@ -4,8 +4,7 @@ metadata:
|
|||||||
name: vault
|
name: vault
|
||||||
|
|
||||||
---
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: octopusdeploy-adminpassword
|
name: octopusdeploy-adminpassword
|
||||||
@@ -22,8 +21,7 @@ spec:
|
|||||||
property: adminpassword
|
property: adminpassword
|
||||||
|
|
||||||
---
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: octopusdeploy-adminusername
|
name: octopusdeploy-adminusername
|
||||||
@@ -40,8 +38,7 @@ spec:
|
|||||||
property: adminusername
|
property: adminusername
|
||||||
|
|
||||||
---
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: octopusdeploy-connectionstring
|
name: octopusdeploy-connectionstring
|
||||||
@@ -58,8 +55,7 @@ spec:
|
|||||||
property: connectionstring
|
property: connectionstring
|
||||||
|
|
||||||
---
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: octopusdeploy-masterkey
|
name: octopusdeploy-masterkey
|
||||||
@@ -76,8 +72,7 @@ spec:
|
|||||||
property: masterkey
|
property: masterkey
|
||||||
|
|
||||||
---
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
apiVersion: external-secrets.io/v1beta1
|
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: octopusdeploy-sapassword
|
name: octopusdeploy-sapassword
|
||||||
@@ -92,3 +87,20 @@ spec:
|
|||||||
remoteRef:
|
remoteRef:
|
||||||
key: kv/octopusdeploy
|
key: kv/octopusdeploy
|
||||||
property: sapassword
|
property: sapassword
|
||||||
|
|
||||||
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: octopusdeploy-licensekey
|
||||||
|
spec:
|
||||||
|
secretStoreRef:
|
||||||
|
name: vault
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
target:
|
||||||
|
name: octopusdeploy-licensekey
|
||||||
|
data:
|
||||||
|
- secretKey: secret
|
||||||
|
remoteRef:
|
||||||
|
key: kv/octopusdeploy
|
||||||
|
property: licensekey
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ metadata:
|
|||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: openclarity-postgres-secret
|
name: openclarity-postgres-secret
|
||||||
|
|||||||
@@ -317,7 +317,7 @@ openclarity:
|
|||||||
# -- Gateway service container repository
|
# -- Gateway service container repository
|
||||||
repository: nginxinc/nginx-unprivileged
|
repository: nginxinc/nginx-unprivileged
|
||||||
# -- Gateway service container tag
|
# -- Gateway service container tag
|
||||||
tag: 1.27.3
|
tag: 1.29.0
|
||||||
# -- Gateway image digest. If set will override the tag.
|
# -- Gateway image digest. If set will override the tag.
|
||||||
digest: ""
|
digest: ""
|
||||||
# -- Gateway service container pull policy
|
# -- Gateway service container pull policy
|
||||||
@@ -542,7 +542,7 @@ openclarity:
|
|||||||
# -- Trivy Server container repository
|
# -- Trivy Server container repository
|
||||||
repository: aquasec/trivy
|
repository: aquasec/trivy
|
||||||
# -- Trivy Server container tag
|
# -- Trivy Server container tag
|
||||||
tag: 0.58.2
|
tag: 0.64.1
|
||||||
# -- Trivy Server image digest. If set will override the tag.
|
# -- Trivy Server image digest. If set will override the tag.
|
||||||
digest: ""
|
digest: ""
|
||||||
# -- Trivy Server image pull policy
|
# -- Trivy Server image pull policy
|
||||||
@@ -719,7 +719,7 @@ openclarity:
|
|||||||
# -- Swagger UI container repository
|
# -- Swagger UI container repository
|
||||||
repository: swaggerapi/swagger-ui
|
repository: swaggerapi/swagger-ui
|
||||||
# -- Swagger UI container tag
|
# -- Swagger UI container tag
|
||||||
tag: v5.21.0
|
tag: v5.29.0
|
||||||
# -- Swagger UI image digest. If set will override the tag.
|
# -- Swagger UI image digest. If set will override the tag.
|
||||||
digest: ""
|
digest: ""
|
||||||
# -- Swagger UI image pull policy
|
# -- Swagger UI image pull policy
|
||||||
|
|||||||
@@ -4,7 +4,7 @@ metadata:
|
|||||||
name: vault
|
name: vault
|
||||||
|
|
||||||
---
|
---
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: renovate-config-secret
|
name: renovate-config-secret
|
||||||
|
|||||||
@@ -103,7 +103,8 @@ renovate:
|
|||||||
"autodiscover": "true",
|
"autodiscover": "true",
|
||||||
"dryRun": false,
|
"dryRun": false,
|
||||||
"printConfig": false,
|
"printConfig": false,
|
||||||
"autodiscoverFilter": ["developerdurp/*", "durfy/*"]
|
"autodiscoverFilter": ["developerdurp/*", "durfy/*"],
|
||||||
|
"assignees": ["developerdurp"],
|
||||||
}
|
}
|
||||||
# See https://docs.renovatebot.com/self-hosted-configuration
|
# See https://docs.renovatebot.com/self-hosted-configuration
|
||||||
# config: |
|
# config: |
|
||||||
@@ -304,7 +305,7 @@ renovate:
|
|||||||
# -- Create extra manifests via values. Would be passed through `tpl` for templating
|
# -- Create extra manifests via values. Would be passed through `tpl` for templating
|
||||||
extraObjects: []
|
extraObjects: []
|
||||||
# extraObjects:
|
# extraObjects:
|
||||||
# - apiVersion: external-secrets.io/v1beta1
|
# - apiVersion: external-secrets.io/v1
|
||||||
# kind: ExternalSecret
|
# kind: ExternalSecret
|
||||||
# metadata:
|
# metadata:
|
||||||
# name: '{{ include "renovate.fullname" . }}-token'
|
# name: '{{ include "renovate.fullname" . }}-token'
|
||||||
|
|||||||
@@ -3,7 +3,7 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
proxmox = {
|
proxmox = {
|
||||||
source = "Telmate/proxmox"
|
source = "Telmate/proxmox"
|
||||||
version = "3.0.1-rc6"
|
version = "3.0.1-rc9"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: traefik
|
- name: traefik
|
||||||
repository: https://traefik.github.io/charts
|
repository: https://traefik.github.io/charts
|
||||||
version: 34.0.0
|
version: 34.5.0
|
||||||
|
|||||||
@@ -8,5 +8,5 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: vault
|
- name: vault
|
||||||
repository: https://helm.releases.hashicorp.com
|
repository: https://helm.releases.hashicorp.com
|
||||||
version: 0.29.1
|
version: 0.30.0
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
metadata:
|
metadata:
|
||||||
name: vault
|
name: vault
|
||||||
|
|||||||
@@ -9,6 +9,6 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: argo-cd
|
- name: argo-cd
|
||||||
repository: https://argoproj.github.io/argo-helm
|
repository: https://argoproj.github.io/argo-helm
|
||||||
version: 6.11.1
|
version: 8.1.3
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: vault-argocd
|
name: vault-argocd
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: authentik-remote-cluster
|
- name: authentik-remote-cluster
|
||||||
repository: https://charts.goauthentik.io
|
repository: https://charts.goauthentik.io
|
||||||
version: 2.0.0
|
version: 2.1.0
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: authentik-secret
|
name: authentik-secret
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: bitwarden-secret
|
name: bitwarden-secret
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: cert-manager
|
- name: cert-manager
|
||||||
repository: https://charts.jetstack.io
|
repository: https://charts.jetstack.io
|
||||||
version: v1.15.3
|
version: v1.17.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: cloudflare-api-token-secret
|
name: cloudflare-api-token-secret
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: crossplane
|
- name: crossplane
|
||||||
repository: https://charts.crossplane.io/stable
|
repository: https://charts.crossplane.io/stable
|
||||||
version: 1.17.1
|
version: 1.20.0
|
||||||
|
|||||||
@@ -6,7 +6,7 @@ spec:
|
|||||||
package: xpkg.upbound.io/crossplane-contrib/provider-gitlab:v0.5.0
|
package: xpkg.upbound.io/crossplane-contrib/provider-gitlab:v0.5.0
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: gitlab-secret
|
name: gitlab-secret
|
||||||
|
|||||||
@@ -8,6 +8,6 @@ appVersion: 0.1.0
|
|||||||
|
|
||||||
dependencies:
|
dependencies:
|
||||||
- condition: postgresql.enabled
|
- condition: postgresql.enabled
|
||||||
version: 12.5.*
|
version: 16.7.*
|
||||||
repository: https://charts.bitnami.com/bitnami
|
repository: https://charts.bitnami.com/bitnami
|
||||||
name: postgresql
|
name: postgresql
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: durpapi-secret
|
name: durpapi-secret
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: durpot-secert
|
name: durpot-secert
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-dns
|
- name: external-dns
|
||||||
repository: https://charts.bitnami.com/bitnami
|
repository: https://charts.bitnami.com/bitnami
|
||||||
version: 8.3.8
|
version: 8.9.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: external-dns-secret
|
name: external-dns-secret
|
||||||
|
|||||||
@@ -8,5 +8,5 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: external-secrets
|
- name: external-secrets
|
||||||
repository: https://charts.external-secrets.io
|
repository: https://charts.external-secrets.io
|
||||||
version: 0.10.4
|
version: 0.17.0
|
||||||
|
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: gatekeeper
|
- name: gatekeeper
|
||||||
repository: https://open-policy-agent.github.io/gatekeeper/charts
|
repository: https://open-policy-agent.github.io/gatekeeper/charts
|
||||||
version: 3.17.1
|
version: 3.19.2
|
||||||
|
|||||||
@@ -8,4 +8,4 @@ appVersion: 0.0.1
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: gitlab-runner
|
- name: gitlab-runner
|
||||||
repository: https://charts.gitlab.io/
|
repository: https://charts.gitlab.io/
|
||||||
version: 0.69.0
|
version: 0.77.2
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: gitlab-secret
|
name: gitlab-secret
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: ollama-secret
|
name: ollama-secret
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: krakend-secret
|
name: krakend-secret
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: kube-prometheus-stack
|
- name: kube-prometheus-stack
|
||||||
repository: https://prometheus-community.github.io/helm-charts
|
repository: https://prometheus-community.github.io/helm-charts
|
||||||
version: 63.1.0
|
version: 72.9.1
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: vault-grafana-oauth
|
name: vault-grafana-oauth
|
||||||
@@ -20,7 +20,7 @@ spec:
|
|||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
apiVersion: external-secrets.io/v1beta1
|
apiVersion: external-secrets.io/v1
|
||||||
kind: ExternalSecret
|
kind: ExternalSecret
|
||||||
metadata:
|
metadata:
|
||||||
name: vault-admin-credentials
|
name: vault-admin-credentials
|
||||||
|
|||||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
|||||||
dependencies:
|
dependencies:
|
||||||
- name: longhorn
|
- name: longhorn
|
||||||
repository: https://charts.longhorn.io
|
repository: https://charts.longhorn.io
|
||||||
version: 1.7.1
|
version: 1.9.0
|
||||||
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user