Set up cert-manager wildcard certs

This commit is contained in:
2024-09-23 22:00:49 +02:00
parent 9a393e1326
commit 4adb9cd9ee
9 changed files with 53 additions and 14 deletions

View File

@@ -5,7 +5,7 @@ metadata:
namespace: auth namespace: auth
spec: spec:
forwardAuth: forwardAuth:
address: 'http://authelia.auth.svc.cluster.local/api/verify?rd=https://auth.namesny.com' address: 'http://authelia.auth.svc.cluster.local/api/verify?rd=https://auth.example.com'
trustForwardHeader: true trustForwardHeader: true
authResponseHeaders: authResponseHeaders:
- "Remote-User" - "Remote-User"

View File

@@ -7,7 +7,7 @@ spec:
entryPoints: entryPoints:
- websecure - websecure
routes: routes:
- match: Host(`auth.namesny.com`) - match: Host(`auth.example.com`)
kind: Rule kind: Rule
services: services:
- name: authelia - name: authelia

View File

@@ -1,4 +1,4 @@
domain: 'namesny.com' domain: 'example.com'
configMap: configMap:
authentication_backend: authentication_backend:
file: file:
@@ -13,7 +13,7 @@ configMap:
enabled: false enabled: false
access_control: access_control:
rules: rules:
- domain: '*.namesny.com' - domain: '*.example.com'
policy: one_factor policy: one_factor
session: session:
redis: redis:

View File

@@ -1,7 +1,7 @@
apiVersion: cert-manager.io/v1 apiVersion: cert-manager.io/v1
kind: ClusterIssuer kind: ClusterIssuer
metadata: metadata:
name: letsencrypt-prod name: cloudflare-prod
spec: spec:
acme: acme:
email: admin@example.com email: admin@example.com

View File

@@ -2,3 +2,5 @@ apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization kind: Kustomization
resources: resources:
- ../../base/cert-manager - ../../base/cert-manager
- secret.enc.yaml
- issuer.yaml

View File

@@ -0,0 +1,28 @@
apiVersion: v1
kind: Secret
metadata:
name: cloudflare-api-token-secret
namespace: cert-manager
type: Opaque
stringData:
api-token: ENC[AES256_GCM,data:Urnj7HrYPocHC+h2k75e/H9WDxmh8iF9mReyeWyuB+oOlGKn534SdA==,iv:TTKtIJa4ixQhq9Mh3KeB1VcqoTHFceQJzkSm1gqg3So=,tag:RnckzpR2BRcp8U/J+qX5Lg==,type:str]
sops:
kms: []
gcp_kms: []
azure_kv: []
hc_vault: []
age:
- recipient: age1jk99rtxq3ep2xj2w886cchddf7jypqpwkr3dszg5dzq93gn8cy9qyc786m
enc: |
-----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBEZWprTlZDbUhFdU12bkc3
RVlFVjk0dHNyc21ZVHRzaTZlSTlENDB4MVJjCkFWV1RKcXU2Nk1jeSt4eG9nV0or
UVJmcHNMdnNGd2Jxc2h4M0FoY0RyTmMKLS0tIE9SZ2R3OFZOTVBncVAyUDFyS2Jz
THljamdxWFVpaVdtZFpiQXV0SjdicE0KgvRRtxMKub4V0xQTDU7De+7Es7vLbHn+
BkIKFMqJRnFk32vcPdoXqMlKIncZ3SV0/DSo0L0A/8gKYDN5uQlKVA==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2024-09-23T19:59:37Z"
mac: ENC[AES256_GCM,data:6gM7IN2Ktv/ckSLXdexX19GgbnRnQHAreRzcTdwgW0ptuW05zjW6sZXT3OBg6RyQ1Ua8d33XgNcIgz9w/mB80UsB2oudCdOTOcvxclS/oIts+4Bs0cCsEPpP57LjG68RCyRZAEetnSr7q/0urbTqWxIX8kK5nV4NaumZrfAqqN8=,iv:Swsc8oEgw/4GFBeRmbELq+VIJBxqiE1TPAvi3F+Dpng=,tag:lRKnB0v4atLreLlCg5QX0Q==,type:str]
pgp: []
unencrypted_regex: ^(apiVersion|metadata|kind|type)$
version: 3.9.0

View File

@@ -1,8 +0,0 @@
apiVersion: v1
kind: Secret
metadata:
name: cloudflare-api-token-secret
namespace: cert-manager
type: Opaque
stringData:
api-token: your-cloudflare-api-token

View File

@@ -0,0 +1,13 @@
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: wildcard-nmsny-dev
namespace: traefik
spec:
secretName: wildcard-nmsny-dev-tls
dnsNames:
- "example.com"
- "*.example.com"
issuerRef:
name: cloudflare-prod
kind: Issuer

View File

@@ -13,7 +13,7 @@ logs:
ingressRoute: ingressRoute:
dashboard: dashboard:
enabled: true enabled: true
matchRule: Host(`traefik.namesny.com`) matchRule: Host(`traefik.example.com`)
entryPoints: ["websecure"] entryPoints: ["websecure"]
middlewares: middlewares:
- name: "auth-authelia@kubernetescrd" - name: "auth-authelia@kubernetescrd"
@@ -33,3 +33,7 @@ ports:
service: service:
spec: spec:
externalTrafficPolicy: Local externalTrafficPolicy: Local
tlsStore:
default:
defaultCertificate:
secretName: wildcard-nmsny-dev-tls