Compare commits
18 Commits
3254fda226
...
prd
| Author | SHA1 | Date | |
|---|---|---|---|
| d38a2d2840 | |||
| 2b88107a28 | |||
| d9be744f17 | |||
| b1a4779d96 | |||
| 54432a447f | |||
| 779d3448d5 | |||
| 7d9ddc574f | |||
| 0b4238217b | |||
| 39020882f4 | |||
| 39f53751ea | |||
| d686567857 | |||
| 74bca2946b | |||
| 1972f4a965 | |||
| b4f11ea722 | |||
| 004990a4ca | |||
|
|
1481dbe107 | ||
| 0414919e05 | |||
| d5ab5c4671 |
1
.gitignore
vendored
Normal file
1
.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
.idea
|
||||
@@ -1,23 +0,0 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: internalproxy
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
path: internalproxy
|
||||
directory:
|
||||
recurse: true
|
||||
destination:
|
||||
server: https://kubernetes.default.svc
|
||||
namespace: internalproxy
|
||||
syncPolicy:
|
||||
automated:
|
||||
prune: true
|
||||
selfHeal: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: argocd
|
||||
destination:
|
||||
namespace: argocd
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: authentik
|
||||
destination:
|
||||
namespace: authentik
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: bitwarden
|
||||
directory:
|
||||
recurse: true
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: cert-manager
|
||||
destination:
|
||||
namespace: cert-manager
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: crossplane
|
||||
destination:
|
||||
namespace: crossplane
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: durpapi
|
||||
destination:
|
||||
namespace: durpapi
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: durpot
|
||||
destination:
|
||||
namespace: durpot
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: external-dns
|
||||
destination:
|
||||
namespace: external-dns
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: external-secrets
|
||||
destination:
|
||||
namespace: external-secrets
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: gatekeeper
|
||||
destination:
|
||||
namespace: gatekeeper
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: gitlab-runner
|
||||
destination:
|
||||
namespace: gitlab-runner
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: heimdall
|
||||
destination:
|
||||
namespace: heimdall
|
||||
|
||||
@@ -8,7 +8,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`argocd.internal.dev.durp.info`)
|
||||
- match: Host(`argocd.internal.prd.durp.info`)
|
||||
middlewares:
|
||||
- name: internal-only
|
||||
namespace: traefik
|
||||
@@ -31,6 +31,6 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "argocd.internal.dev.durp.info"
|
||||
commonName: "argocd.internal.prd.durp.info"
|
||||
dnsNames:
|
||||
- "argocd.internal.dev.durp.info"
|
||||
- "argocd.internal.prd.durp.info"
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: krakend
|
||||
destination:
|
||||
namespace: krakend
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: kube-prometheus-stack
|
||||
destination:
|
||||
namespace: kube-prometheus-stack
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: kubeclarity
|
||||
destination:
|
||||
namespace: kubeclarity
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: littlelink
|
||||
directory:
|
||||
recurse: true
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: longhorn
|
||||
destination:
|
||||
namespace: longhorn-system
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: metallb-system
|
||||
destination:
|
||||
namespace: metallb-system
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: nfs-client
|
||||
directory:
|
||||
recurse: true
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: open-webui
|
||||
destination:
|
||||
namespace: open-webui
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: traefik
|
||||
destination:
|
||||
namespace: traefik
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: uptimekuma
|
||||
directory:
|
||||
recurse: true
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
project: default
|
||||
source:
|
||||
repoURL: https://gitlab.com/developerdurp/homelab.git
|
||||
targetRevision: dev
|
||||
targetRevision: prd
|
||||
path: vault
|
||||
destination:
|
||||
namespace: vault
|
||||
|
||||
@@ -33,12 +33,12 @@ argo-cd:
|
||||
cm:
|
||||
create: true
|
||||
annotations: {}
|
||||
url: https://argocd.dev.durp.info
|
||||
url: https://argocd.internal.prd.durp.info
|
||||
oidc.tls.insecure.skip.verify: "true"
|
||||
dex.config: |
|
||||
connectors:
|
||||
- config:
|
||||
issuer: https://authentik.dev.durp.info/application/o/argocd/
|
||||
issuer: https://authentik.prd.durp.info/application/o/argocd/
|
||||
clientID: lKuMgyYaOlQMNAUSjsRVYgkwZG9UT6CeFWeTLAcl
|
||||
clientSecret: $client-secret:clientSecret
|
||||
insecureEnableGroups: true
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`authentik.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`authentik.prd.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: authentik-server
|
||||
@@ -25,9 +25,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "authentik.dev.durp.info"
|
||||
commonName: "authentik.prd.durp.info"
|
||||
dnsNames:
|
||||
- "authentik.dev.durp.info"
|
||||
- "authentik.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -36,7 +36,7 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: authentik-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: authentik.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: authentik.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
externalName:.prd.durp.info
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`bitwarden.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`bitwarden.prd.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: bitwarden
|
||||
@@ -25,9 +25,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "bitwarden.dev.durp.info"
|
||||
commonName: "bitwarden.prd.durp.info"
|
||||
dnsNames:
|
||||
- "bitwarden.dev.durp.info"
|
||||
- "bitwarden.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -36,10 +36,10 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: bitwarden-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: bitwarden.dev.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: bitwarden.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: dev.durp.info
|
||||
externalName:.prd.durp.info
|
||||
|
||||
---
|
||||
|
||||
@@ -51,7 +51,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`bitwarden.dev.durp.info`) && PathPrefix(`/admin`)
|
||||
- match: Host(`bitwarden.prd.durp.info`) && PathPrefix(`/admin`)
|
||||
kind: Rule
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
|
||||
@@ -9,4 +9,4 @@ appVersion: "1.16.0"
|
||||
dependencies:
|
||||
- name: crossplane
|
||||
repository: https://charts.crossplane.io/stable
|
||||
version: 1.12.0
|
||||
version: 1.16.0
|
||||
|
||||
@@ -3,7 +3,7 @@ kind: Provider
|
||||
metadata:
|
||||
name: provider-gitlab
|
||||
spec:
|
||||
package: xpkg.upbound.io/crossplane-contrib/provider-gitlab:v0.5.0
|
||||
package: xpkg.upbound.io/crossplane-contrib/provider-gitlab:v0.7.0
|
||||
---
|
||||
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
|
||||
186
crossplane/values.yaml
Normal file
186
crossplane/values.yaml
Normal file
@@ -0,0 +1,186 @@
|
||||
# helm-docs renders these comments into markdown. Use markdown formatting where
|
||||
# appropiate.
|
||||
#
|
||||
# -- The number of Crossplane pod `replicas` to deploy.
|
||||
replicas: 1
|
||||
|
||||
# -- The deployment strategy for the Crossplane and RBAC Manager pods.
|
||||
deploymentStrategy: RollingUpdate
|
||||
|
||||
image:
|
||||
# -- Repository for the Crossplane pod image.
|
||||
repository: xpkg.upbound.io/crossplane/crossplane
|
||||
# -- The Crossplane image tag. Defaults to the value of `appVersion` in `Chart.yaml`.
|
||||
tag: ""
|
||||
# -- The image pull policy used for Crossplane and RBAC Manager pods.
|
||||
pullPolicy: IfNotPresent
|
||||
|
||||
# -- Add `nodeSelectors` to the Crossplane pod deployment.
|
||||
nodeSelector: {}
|
||||
# -- Add `tolerations` to the Crossplane pod deployment.
|
||||
tolerations: []
|
||||
# -- Add `affinities` to the Crossplane pod deployment.
|
||||
affinity: {}
|
||||
|
||||
# -- Enable `hostNetwork` for the Crossplane deployment. Caution: enabling `hostNetwork` grants the Crossplane Pod access to the host network namespace. Consider setting `dnsPolicy` to `ClusterFirstWithHostNet`.
|
||||
hostNetwork: false
|
||||
|
||||
# -- Specify the `dnsPolicy` to be used by the Crossplane pod.
|
||||
dnsPolicy: ""
|
||||
|
||||
# -- Add custom `labels` to the Crossplane pod deployment.
|
||||
customLabels: {}
|
||||
|
||||
# -- Add custom `annotations` to the Crossplane pod deployment.
|
||||
customAnnotations: {}
|
||||
|
||||
serviceAccount:
|
||||
# -- Add custom `annotations` to the Crossplane ServiceAccount.
|
||||
customAnnotations: {}
|
||||
|
||||
# -- Enable [leader election](https://docs.crossplane.io/latest/concepts/pods/#leader-election) for the Crossplane pod.
|
||||
leaderElection: true
|
||||
# -- Add custom arguments to the Crossplane pod.
|
||||
args: []
|
||||
|
||||
provider:
|
||||
# -- A list of Provider packages to install.
|
||||
packages: []
|
||||
|
||||
configuration:
|
||||
# -- A list of Configuration packages to install.
|
||||
packages: []
|
||||
|
||||
function:
|
||||
# -- A list of Function packages to install
|
||||
packages: []
|
||||
|
||||
# -- The imagePullSecret names to add to the Crossplane ServiceAccount.
|
||||
imagePullSecrets: []
|
||||
|
||||
registryCaBundleConfig:
|
||||
# -- The ConfigMap name containing a custom CA bundle to enable fetching packages from registries with unknown or untrusted certificates.
|
||||
name: ""
|
||||
# -- The ConfigMap key containing a custom CA bundle to enable fetching packages from registries with unknown or untrusted certificates.
|
||||
key: ""
|
||||
|
||||
service:
|
||||
# -- Configure annotations on the service object. Only enabled when webhooks.enabled = true
|
||||
customAnnotations: {}
|
||||
|
||||
webhooks:
|
||||
# -- Enable webhooks for Crossplane and installed Provider packages.
|
||||
enabled: true
|
||||
|
||||
rbacManager:
|
||||
# -- Deploy the RBAC Manager pod and its required roles.
|
||||
deploy: true
|
||||
# -- Don't install aggregated Crossplane ClusterRoles.
|
||||
skipAggregatedClusterRoles: false
|
||||
# -- The number of RBAC Manager pod `replicas` to deploy.
|
||||
replicas: 1
|
||||
# -- Enable [leader election](https://docs.crossplane.io/latest/concepts/pods/#leader-election) for the RBAC Manager pod.
|
||||
leaderElection: true
|
||||
# -- Add custom arguments to the RBAC Manager pod.
|
||||
args: []
|
||||
# -- Add `nodeSelectors` to the RBAC Manager pod deployment.
|
||||
nodeSelector: {}
|
||||
# -- Add `tolerations` to the RBAC Manager pod deployment.
|
||||
tolerations: []
|
||||
# -- Add `affinities` to the RBAC Manager pod deployment.
|
||||
affinity: {}
|
||||
|
||||
# -- The PriorityClass name to apply to the Crossplane and RBAC Manager pods.
|
||||
priorityClassName: ""
|
||||
|
||||
resourcesCrossplane:
|
||||
limits:
|
||||
# -- CPU resource limits for the Crossplane pod.
|
||||
cpu: 500m
|
||||
# -- Memory resource limits for the Crossplane pod.
|
||||
memory: 1024Mi
|
||||
requests:
|
||||
# -- CPU resource requests for the Crossplane pod.
|
||||
cpu: 100m
|
||||
# -- Memory resource requests for the Crossplane pod.
|
||||
memory: 256Mi
|
||||
|
||||
securityContextCrossplane:
|
||||
# -- The user ID used by the Crossplane pod.
|
||||
runAsUser: 65532
|
||||
# -- The group ID used by the Crossplane pod.
|
||||
runAsGroup: 65532
|
||||
# -- Enable `allowPrivilegeEscalation` for the Crossplane pod.
|
||||
allowPrivilegeEscalation: false
|
||||
# -- Set the Crossplane pod root file system as read-only.
|
||||
readOnlyRootFilesystem: true
|
||||
|
||||
packageCache:
|
||||
# -- Set to `Memory` to hold the package cache in a RAM backed file system. Useful for Crossplane development.
|
||||
medium: ""
|
||||
# -- The size limit for the package cache. If medium is `Memory` the `sizeLimit` can't exceed Node memory.
|
||||
sizeLimit: 20Mi
|
||||
# -- The name of a PersistentVolumeClaim to use as the package cache. Disables the default package cache `emptyDir` Volume.
|
||||
pvc: ""
|
||||
# -- The name of a ConfigMap to use as the package cache. Disables the default package cache `emptyDir` Volume.
|
||||
configMap: ""
|
||||
|
||||
resourcesRBACManager:
|
||||
limits:
|
||||
# -- CPU resource limits for the RBAC Manager pod.
|
||||
cpu: 100m
|
||||
# -- Memory resource limits for the RBAC Manager pod.
|
||||
memory: 512Mi
|
||||
requests:
|
||||
# -- CPU resource requests for the RBAC Manager pod.
|
||||
cpu: 100m
|
||||
# -- Memory resource requests for the RBAC Manager pod.
|
||||
memory: 256Mi
|
||||
|
||||
securityContextRBACManager:
|
||||
# -- The user ID used by the RBAC Manager pod.
|
||||
runAsUser: 65532
|
||||
# -- The group ID used by the RBAC Manager pod.
|
||||
runAsGroup: 65532
|
||||
# -- Enable `allowPrivilegeEscalation` for the RBAC Manager pod.
|
||||
allowPrivilegeEscalation: false
|
||||
# -- Set the RBAC Manager pod root file system as read-only.
|
||||
readOnlyRootFilesystem: true
|
||||
|
||||
metrics:
|
||||
# -- Enable Prometheus path, port and scrape annotations and expose port 8080 for both the Crossplane and RBAC Manager pods.
|
||||
enabled: false
|
||||
|
||||
# -- Add custom environmental variables to the Crossplane pod deployment.
|
||||
# Replaces any `.` in a variable name with `_`. For example, `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`.
|
||||
extraEnvVarsCrossplane: {}
|
||||
|
||||
# -- Add custom environmental variables to the RBAC Manager pod deployment.
|
||||
# Replaces any `.` in a variable name with `_`. For example, `SAMPLE.KEY=value1` becomes `SAMPLE_KEY=value1`.
|
||||
extraEnvVarsRBACManager: {}
|
||||
|
||||
# -- Add a custom `securityContext` to the Crossplane pod.
|
||||
podSecurityContextCrossplane: {}
|
||||
|
||||
# -- Add a custom `securityContext` to the RBAC Manager pod.
|
||||
podSecurityContextRBACManager: {}
|
||||
|
||||
# -- Add custom `volumes` to the Crossplane pod.
|
||||
extraVolumesCrossplane: {}
|
||||
|
||||
# -- Add custom `volumeMounts` to the Crossplane pod.
|
||||
extraVolumeMountsCrossplane: {}
|
||||
|
||||
# -- To add arbitrary Kubernetes Objects during a Helm Install
|
||||
extraObjects: []
|
||||
# - apiVersion: pkg.crossplane.io/v1alpha1
|
||||
# kind: ControllerConfig
|
||||
# metadata:
|
||||
# name: aws-config
|
||||
# annotations:
|
||||
# eks.amazonaws.com/role-arn: arn:aws:iam::123456789101:role/example
|
||||
# helm.sh/hook: post-install
|
||||
# spec:
|
||||
# podSecurityContext:
|
||||
# fsGroup: 2000
|
||||
|
||||
@@ -1,11 +1,11 @@
|
||||
appVersion: 0.1.0
|
||||
type: application
|
||||
name: durpapi
|
||||
version: 0.1.0-dev0176
|
||||
apiVersion: v2
|
||||
description: A Helm chart for Kubernetes
|
||||
name: durpapi
|
||||
appVersion: 0.1.0
|
||||
dependencies:
|
||||
- name: postgresql
|
||||
repository: https://charts.bitnami.com/bitnami
|
||||
- condition: postgresql.enabled
|
||||
name: postgresql
|
||||
version: 12.5.*
|
||||
condition: postgresql.enabled
|
||||
repository: https://charts.bitnami.com/bitnami
|
||||
version: 0.1.0-dev0184
|
||||
apiVersion: v2
|
||||
type: application
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host("api.dev.durp.info") && PathPrefix(`/api`)
|
||||
- match: Host("api.prd.durp.info") && PathPrefix(`/api`)
|
||||
kind: Rule
|
||||
middlewares:
|
||||
- name: jwt
|
||||
@@ -24,7 +24,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host("api.dev.durp.info") && PathPrefix(`/swagger`)
|
||||
- match: Host("api.prd.durp.info") && PathPrefix(`/swagger`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: "durpapi-service"
|
||||
@@ -41,5 +41,4 @@ spec:
|
||||
jwt:
|
||||
Required: true
|
||||
Keys:
|
||||
- https://authentik.durp.info/application/o/api/jwks
|
||||
|
||||
- https://authentik.prd.durp.info/application/o/api/jwks/
|
||||
|
||||
@@ -4,10 +4,10 @@ external-dns:
|
||||
|
||||
image:
|
||||
pullPolicy: Always
|
||||
txtPrefix: "dev-"
|
||||
txtPrefix: "prd-"
|
||||
sources:
|
||||
- service
|
||||
|
||||
|
||||
provider: cloudflare
|
||||
cloudflare:
|
||||
secretName : "external-dns"
|
||||
|
||||
@@ -7,7 +7,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`heimdall.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`heimdall.prd.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: authentik-proxy-provider
|
||||
namespace: traefik
|
||||
@@ -15,7 +15,7 @@ spec:
|
||||
services:
|
||||
- name: heimdall
|
||||
port: 80
|
||||
- match: Host(`heimdall.dev.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
- match: Host(`heimdall.prd.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: ak-outpost-authentik-embedded-outpost
|
||||
@@ -35,9 +35,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "heimdall.dev.durp.info"
|
||||
commonName: "heimdall.prd.durp.info"
|
||||
dnsNames:
|
||||
- "heimdall.dev.durp.info"
|
||||
- "heimdall.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -46,7 +46,7 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: heimdall-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: heimdall.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: heimdall.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: durp.info
|
||||
externalName:.prd.durp.info
|
||||
|
||||
@@ -1,7 +0,0 @@
|
||||
apiVersion: v2
|
||||
name: internalproxy
|
||||
description: A Helm chart for Kubernetes
|
||||
type: application
|
||||
|
||||
version: 0.1.0
|
||||
appVersion: "0.1.0"
|
||||
@@ -7,9 +7,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "api.dev.durp.info"
|
||||
commonName: "api.prd.durp.info"
|
||||
dnsNames:
|
||||
- "api.dev.durp.info"
|
||||
- "api.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -21,7 +21,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`api.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`api.prd.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: krakend-service
|
||||
@@ -37,10 +37,10 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: api-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: api.dev.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: api.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: dev.durp.info
|
||||
externalName:.prd.durp.info
|
||||
|
||||
---
|
||||
|
||||
@@ -49,7 +49,7 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: api-developer-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: developer.dev.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: developer.prd.durp.info
|
||||
external-dns.alpha.kubernetes.io/cloudflare-proxied: "false"
|
||||
spec:
|
||||
type: ExternalName
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`grafana.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`grafana.prd.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: grafana
|
||||
@@ -25,9 +25,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "grafana.dev.durp.info"
|
||||
commonName: "grafana.prd.durp.info"
|
||||
dnsNames:
|
||||
- "grafana.dev.durp.info"
|
||||
- "grafana.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -39,7 +39,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`alertmanager.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`alertmanager.prd.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
@@ -63,9 +63,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "alertmanager.dev.durp.info"
|
||||
commonName: "alertmanager.prd.durp.info"
|
||||
dnsNames:
|
||||
- "alertmanager.dev.durp.info"
|
||||
- "alertmanager.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -74,7 +74,7 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: grafana-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: grafana.dev.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: grafana.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: dev.durp.info
|
||||
externalName:.prd.durp.info
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`kubeclarity.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`kubeclarity.prd.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
@@ -30,9 +30,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "kubeclarity.dev.durp.info"
|
||||
commonName: "kubeclarity.prd.durp.info"
|
||||
dnsNames:
|
||||
- "kubeclarity.dev.durp.info"
|
||||
- "kubeclarity.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -41,7 +41,7 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: kubeclarity-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: kubeclarity.dev.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: kubeclarity.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: dev.durp.info
|
||||
externalName:.prd.durp.info
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`links.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`links.prd.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: littlelink
|
||||
@@ -25,9 +25,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "links.dev.durp.info"
|
||||
commonName: "links.prd.durp.info"
|
||||
dnsNames:
|
||||
- "links.dev.durp.info"
|
||||
- "links.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -36,8 +36,7 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: links-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: links.dev.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: links.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: dev.durp.info
|
||||
|
||||
externalName:.prd.durp.info
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`longhorn.internal.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`longhorn.internal.prd.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
namespace: traefik
|
||||
@@ -16,7 +16,7 @@ spec:
|
||||
services:
|
||||
- name: longhorn-frontend
|
||||
port: 80
|
||||
- match: Host(`longhorn.internal.dev.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
- match: Host(`longhorn.internal.prd.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: ak-outpost-authentik-embedded-outpost
|
||||
@@ -36,6 +36,6 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "longhorn.internal.dev.durp.info"
|
||||
commonName: "longhorn.internal.prd.durp.info"
|
||||
dnsNames:
|
||||
- "longhorn.internal.dev.durp.info"
|
||||
- "longhorn.internal.prd.durp.info"
|
||||
|
||||
@@ -76,7 +76,7 @@ longhorn:
|
||||
snapshotterReplicaCount: ~
|
||||
|
||||
defaultSettings:
|
||||
backupTarget: S3://longhorn-dev@us-east-1/
|
||||
backupTarget: S3://longhorn-prd@us-east-1/
|
||||
backupTargetCredentialSecret: longhorn-backup-token-secret
|
||||
allowRecurringJobWhileVolumeDetached: ~
|
||||
createDefaultDiskLabeledNodes: ~
|
||||
|
||||
@@ -4,7 +4,7 @@ metadata:
|
||||
name: cheap
|
||||
spec:
|
||||
addresses:
|
||||
- 192.168.10.130-192.168.10.140
|
||||
- 192.168.11.130-192.168.11.140
|
||||
---
|
||||
apiVersion: metallb.io/v1beta1
|
||||
kind: L2Advertisement
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`open-webui.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`open-webui.prd.durp.info`) && PathPrefix(`/`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: open-webui
|
||||
@@ -25,9 +25,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "open-webui.dev.durp.info"
|
||||
commonName: "open-webui.prd.durp.info"
|
||||
dnsNames:
|
||||
- "open-webui.dev.durp.info"
|
||||
- "open-webui.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -36,7 +36,7 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: open-webui-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: open-webui.dev.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: open-webui.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: dev.durp.info
|
||||
externalName: prd.durp.info
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`traefik.internal.dev.durp.info`)
|
||||
- match: Host(`traefik.internal.prd.durp.info`)
|
||||
middlewares:
|
||||
- name: authentik-proxy-provider
|
||||
namespace: traefik
|
||||
@@ -14,7 +14,7 @@ spec:
|
||||
services:
|
||||
- name: api@internal
|
||||
kind: TraefikService
|
||||
- match: Host(`traefik.internal.dev.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
- match: Host(`traefik.internal.prd.durp.info`) && PathPrefix(`/outpost.goauthentik.io`)
|
||||
kind: Rule
|
||||
services:
|
||||
- name: ak-outpost-authentik-embedded-outpost
|
||||
@@ -34,6 +34,6 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "traefik.internal.dev.durp.info"
|
||||
commonName: "traefik.internal.prd.durp.info"
|
||||
dnsNames:
|
||||
- "traefik.internal.dev.durp.info"
|
||||
- "traefik.internal.prd.durp.info"
|
||||
|
||||
@@ -20,6 +20,7 @@ spec:
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
|
||||
|
||||
---
|
||||
|
||||
apiVersion: traefik.containo.us/v1alpha1
|
||||
|
||||
@@ -582,7 +582,7 @@ traefik:
|
||||
# Trust forwarded headers information (X-Forwarded-*).
|
||||
forwardedHeaders:
|
||||
trustedIPs:
|
||||
- "192.168.10.1"
|
||||
- "192.168.11.1"
|
||||
insecure: false
|
||||
#
|
||||
# Enable the Proxy Protocol header parsing for the entry point
|
||||
@@ -613,7 +613,7 @@ traefik:
|
||||
## Trust forwarded headers information (X-Forwarded-*).
|
||||
forwardedHeaders:
|
||||
trustedIPs:
|
||||
- "192.168.10.1"
|
||||
- "192.168.11.1"
|
||||
insecure: false
|
||||
#
|
||||
## Enable the Proxy Protocol header parsing for the entry point
|
||||
|
||||
@@ -6,7 +6,7 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`kuma.dev.durp.info`) && PathPrefix(`/`)
|
||||
- match: Host(`kuma.prd.durp.info`) && PathPrefix(`/`)
|
||||
middlewares:
|
||||
- name: authentik-proxy-provider
|
||||
namespace: traefik
|
||||
@@ -28,9 +28,9 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "kuma.dev.durp.info"
|
||||
commonName: "kuma.prd.durp.info"
|
||||
dnsNames:
|
||||
- "kuma.dev.durp.info"
|
||||
- "kuma.prd.durp.info"
|
||||
|
||||
---
|
||||
|
||||
@@ -39,7 +39,7 @@ apiVersion: v1
|
||||
metadata:
|
||||
name: heimdall-external-dns
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: kuma.dev.durp.info
|
||||
external-dns.alpha.kubernetes.io/hostname: kuma.prd.durp.info
|
||||
spec:
|
||||
type: ExternalName
|
||||
externalName: dev.durp.info
|
||||
externalName: prd.durp.info
|
||||
|
||||
@@ -8,9 +8,9 @@ spec:
|
||||
entryPoints:
|
||||
- websecure
|
||||
routes:
|
||||
- match: Host(`vault.internal.dev.durp.info`)
|
||||
- match: Host(`vault.internal.prd.durp.info`)
|
||||
middlewares:
|
||||
- name: whitelist
|
||||
- name: internal-only
|
||||
namespace: traefik
|
||||
kind: Rule
|
||||
services:
|
||||
@@ -31,7 +31,7 @@ spec:
|
||||
issuerRef:
|
||||
name: letsencrypt-production
|
||||
kind: ClusterIssuer
|
||||
commonName: "vault.internal.dev.durp.info"
|
||||
commonName: "vault.internal.prd.durp.info"
|
||||
dnsNames:
|
||||
- "vault.internal.dev.durp.info"
|
||||
- "vault.internal.prd.durp.info"
|
||||
|
||||
|
||||
Reference in New Issue
Block a user