mirror of
https://github.com/lordmathis/dev-cluster.git
synced 2025-12-23 00:54:26 +00:00
Use variable susbtitution in manifests
This commit is contained in:
@@ -6,7 +6,7 @@ metadata:
|
|||||||
namespace: auth
|
namespace: auth
|
||||||
spec:
|
spec:
|
||||||
forwardAuth:
|
forwardAuth:
|
||||||
address: 'http://authelia.auth.svc.cluster.local/api/authz/forward-auth?authelia_url=https%3A%2F%2Fauth.example.com'
|
address: 'http://authelia.auth.svc.cluster.local/api/authz/forward-auth?authelia_url=https%3A%2F%2F${AUTHELIA_DOMAIN}'
|
||||||
trustForwardHeader: true
|
trustForwardHeader: true
|
||||||
authResponseHeaders:
|
authResponseHeaders:
|
||||||
- "Remote-User"
|
- "Remote-User"
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
# /apps/prod/authelia/values.yaml
|
# /apps/prod/authelia/values.yaml
|
||||||
domain: 'example.com'
|
domain: '${DOMAIN}'
|
||||||
configMap:
|
configMap:
|
||||||
authentication_backend:
|
authentication_backend:
|
||||||
file:
|
file:
|
||||||
@@ -11,7 +11,7 @@ configMap:
|
|||||||
enabled: false
|
enabled: false
|
||||||
access_control:
|
access_control:
|
||||||
rules:
|
rules:
|
||||||
- domain: '*.example.com'
|
- domain: '*.${DOMAIN}'
|
||||||
policy: one_factor
|
policy: one_factor
|
||||||
server:
|
server:
|
||||||
endpoints:
|
endpoints:
|
||||||
@@ -22,8 +22,8 @@ configMap:
|
|||||||
redis:
|
redis:
|
||||||
enabled: false
|
enabled: false
|
||||||
cookies:
|
cookies:
|
||||||
- domain: 'example.com'
|
- domain: '${DOMAIN}'
|
||||||
authelia_url: 'https://auth.example.com'
|
authelia_url: 'https://${AUTHELIA_DOMAIN}'
|
||||||
name: 'authelia_session'
|
name: 'authelia_session'
|
||||||
storage:
|
storage:
|
||||||
local:
|
local:
|
||||||
@@ -51,6 +51,6 @@ ingress:
|
|||||||
ingressClassName: "traefik"
|
ingressClassName: "traefik"
|
||||||
traefikCRD:
|
traefikCRD:
|
||||||
enabled: true
|
enabled: true
|
||||||
matchOverride: Host(`auth.example.com`)
|
matchOverride: Host(`${AUTHELIA_DOMAIN}`)
|
||||||
entryPoints:
|
entryPoints:
|
||||||
- "websecure"
|
- "websecure"
|
||||||
@@ -8,7 +8,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`git.example.com`)
|
- match: Host(`${GITEA_DOMAIN}`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: gitea-http
|
- name: gitea-http
|
||||||
|
|||||||
@@ -24,7 +24,7 @@ image:
|
|||||||
gitea:
|
gitea:
|
||||||
admin:
|
admin:
|
||||||
existingSecret: gitea-admin-secret
|
existingSecret: gitea-admin-secret
|
||||||
email: "admin@example.com"
|
email: "${GITEA_ADMIN_EMAIL}"
|
||||||
config:
|
config:
|
||||||
actions:
|
actions:
|
||||||
ENABLED: true
|
ENABLED: true
|
||||||
@@ -40,8 +40,8 @@ gitea:
|
|||||||
TYPE: channel
|
TYPE: channel
|
||||||
server:
|
server:
|
||||||
BUILTIN_SSH_SERVER_USER: git
|
BUILTIN_SSH_SERVER_USER: git
|
||||||
ROOT_URL: https://git.example.com
|
ROOT_URL: https://${GITEA_DOMAIN}
|
||||||
DOMAIN: git.example.com
|
DOMAIN: ${GITEA_DOMAIN}
|
||||||
SSH_CREATE_AUTHORIZED_KEYS_FILE: false
|
SSH_CREATE_AUTHORIZED_KEYS_FILE: false
|
||||||
LANDING_PAGE: explore
|
LANDING_PAGE: explore
|
||||||
service:
|
service:
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`k9s.example.com`)
|
- match: Host(`${K9S_DOMAIN}`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
middlewares:
|
middlewares:
|
||||||
- name: "auth-authelia@kubernetescrd"
|
- name: "auth-authelia@kubernetescrd"
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ spec:
|
|||||||
entryPoints:
|
entryPoints:
|
||||||
- websecure
|
- websecure
|
||||||
routes:
|
routes:
|
||||||
- match: Host(`lemma.example.com`)
|
- match: Host(`${LEMMA_DOMAIN}`)
|
||||||
kind: Rule
|
kind: Rule
|
||||||
services:
|
services:
|
||||||
- name: lemma-http
|
- name: lemma-http
|
||||||
|
|||||||
@@ -4,12 +4,13 @@ metadata:
|
|||||||
name: cluster-vars-prod
|
name: cluster-vars-prod
|
||||||
namespace: flux-system
|
namespace: flux-system
|
||||||
stringData:
|
stringData:
|
||||||
DOMAIN: ENC[AES256_GCM,data:95H2LGPNDZWu,iv:dPZncDMxmt80FgX2Kzc3u4Tw3ZN5XxNm1W9RExxkozw=,tag:OPCTvLJesJ7OzmZ4/c04sQ==,type:str]
|
DOMAIN: ENC[AES256_GCM,data:uvdyDhnU5LDh,iv:n1QC5g/Eh3I5/l2rxg9p32ucW+SK1dbpNQf8ah2b3Gg=,tag:YZ6sDLVfdbBQP0heHcpaYw==,type:str]
|
||||||
GITEA_DOMAIN: ENC[AES256_GCM,data:6eDeGcMQp71VTjRUfA==,iv:KtCy5YQeV4tY8xzFuH2y2Yp8QWzK7ZOSuWdKhihklgU=,tag:PkdH/n01nHWCyaAW4QwoPg==,type:str]
|
GITEA_DOMAIN: ENC[AES256_GCM,data:zaHlAuW9mSRby2bDqw==,iv:veC2X0mw3XPNlsqrt6iA5pLBz3GIBahNVBUS+Rf/ATQ=,tag:ZiNe5zRUWC2lgJHzMqyVwQ==,type:str]
|
||||||
AUTHELIA_DOMAIN: ENC[AES256_GCM,data:iWiuvZ5U0rCH64IOe3k=,iv:8WaB4ukSauuzmdD+TlKCVlNE2opox+XlVVjr+ER9mH0=,tag:oLWQ4r+LgzRpHTuU2mu+Xw==,type:str]
|
AUTHELIA_DOMAIN: ENC[AES256_GCM,data:b3ZxmxKfDAuL3ZnJHLk=,iv:WuzJjp1804xsgJmyCwm+KCrrZRrfzE55gCjUcwiusJM=,tag:ZFATTKyDyGIsBiLUO6JsFg==,type:str]
|
||||||
TRAEFIK_DOMAIN: ENC[AES256_GCM,data:QC1SpkDPrqZm+sc3e1Tv8So=,iv:YQLzZNP4+D7EcCJYYMygsFfHAjNIh12q449ensSmcc8=,tag:l6HnN4GBq9+9TynWzZCTng==,type:str]
|
TRAEFIK_DOMAIN: ENC[AES256_GCM,data:quzmURTYuaLVdH4Wmm7oX4I=,iv:WW1eSlj/UD3Zau75pR6ToqSAW80ebmM+LtCcxnB3P2M=,tag:yOZlmp75IUZhLAEP2rBVSg==,type:str]
|
||||||
LEMMA_DOMAIN: ENC[AES256_GCM,data:3+HM+wE0SZeceyAJGx9e,iv:TrOp/Lcf+Ka3RlusoBvmhOVIbRquJ7fHK/ThXSkU4SU=,tag:kGwqvbHQ4jgQ6lbz+9zvKw==,type:str]
|
LEMMA_DOMAIN: ENC[AES256_GCM,data:buFgyV2AQtHxVW7MQ62l,iv:51pv0VWSGO+I7M1VpF/hSMPb/rnDvvg6pDAb+3jW45E=,tag:gi9JfLP7zui9InJSrqQIZw==,type:str]
|
||||||
LETSENCRYPT_EMAIL: ENC[AES256_GCM,data:932hjsPXXEzeeMRoCxScU0YsKo0iwDE=,iv:aVnK22akFCamQMWC+pgmhN1Ok8RUwRJ7RCrqryJUiaU=,tag:e7QZYNeR2QRJg94BRRqZSw==,type:str]
|
LETSENCRYPT_EMAIL: ENC[AES256_GCM,data:v+WsLHOEKLAEOvgue3EvfHWPIhC3Jeg=,iv:7HMnV1P/J+EhaaDtm5mnylrdNxChPC8WITSEexsnmpM=,tag:S03Tmjx1o/FP+8x7M/Yhyw==,type:str]
|
||||||
|
GITEA_ADMIN_EMAIL: ENC[AES256_GCM,data:pXGtveDs596aRLLkmyS7dIU=,iv:YbRX0/iGCnCfFVmqEgoXF6ue68yRpSKaaQuYhCBebZE=,tag:6tmteEIvUVBlLQUwewrYHQ==,type:str]
|
||||||
sops:
|
sops:
|
||||||
kms: []
|
kms: []
|
||||||
gcp_kms: []
|
gcp_kms: []
|
||||||
@@ -19,14 +20,14 @@ sops:
|
|||||||
- recipient: age1jk99rtxq3ep2xj2w886cchddf7jypqpwkr3dszg5dzq93gn8cy9qyc786m
|
- recipient: age1jk99rtxq3ep2xj2w886cchddf7jypqpwkr3dszg5dzq93gn8cy9qyc786m
|
||||||
enc: |
|
enc: |
|
||||||
-----BEGIN AGE ENCRYPTED FILE-----
|
-----BEGIN AGE ENCRYPTED FILE-----
|
||||||
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBNRGZmNGpKVWYva0VJRTdh
|
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSByd1AvVDZ4MXVsSnBmMlNk
|
||||||
TGh1eXhHUzM0bm51QTJZOENjbDkrMEdPM3pJCnNwN1pGK3E3VVZVSXpWTVBSemYw
|
QktaOW56MnZTU2hWdUE0c2M0bGdFR3ViTEhRCk96S3pSNG1mOXk3YnpPUnVFNEJp
|
||||||
eTVHNjZvZStISTBpeVhoazc3VFMxdVkKLS0tIEErYkFTV1o4RW1tODFWWk9VNkho
|
djFpOUdtWlNWSm42M3l2Vmh6UEYraHcKLS0tIFVTQU01cEl5VnJ2Y011a2tGdnpE
|
||||||
dWwrUlpjQ2xZVjNJSG9vN0tidHVvMnMKwNj4Gm3bXY/vbVIq2bH7/8OWBVMiUxuk
|
VktxSU5INzBUNHpodHcxOVRab01xRGcK6YCFV7n25srmqcKwpyLqvwI/2NLIWlmK
|
||||||
ttMDYmoTmGAqWwa3uYxpAJiYV6Qni0rGsEop+IKs4DehcmH7UH2XZw==
|
n5wsDxLICDkxrPAe8LZFaNIs7MQ732kVVihSS0AlfvEGohMx5V3l2Q==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
lastmodified: "2024-12-30T14:20:14Z"
|
lastmodified: "2024-12-30T14:35:24Z"
|
||||||
mac: ENC[AES256_GCM,data:X8J6nwxK+ECLilgwpeSDcf8OTBuqZYEXiFe2UhIBfIB/xrdGRSnPrwcMf3drswftdjnHT9biFocyC3/D9Qv/dPF9iC5ft3D38SDvklstLCn97YivdxQZxGcdggp0we14WVGhmjvlLLucLZ9+1KN5tx+P2r8LhjsI+JhwkB13Zbk=,iv:QU28TNdNwzAsjyEA3po75iPZB8nIq7zCrD3y8JDzkr8=,tag:qPRcTlmAjC4BGEmsxctIRg==,type:str]
|
mac: ENC[AES256_GCM,data:VYbExocsn36JFM2MLNlGy3JVBtwDDGf8ChXtqydn3HylBCG/Hhc0rEqpfXcjxFUvvKTFw3+wBWsejm7u7yiVz/qDB82LvMAzEYs5z5/S1T+WWYtdj5FoghhbVd6pup83pVQmMxm6vk/mOjMzkjp8I1smKqAmxMTPToY5qfyLNSo=,iv:vdqnAZCVbBv0A2UFeyL683CCdmyQiRQifEgzMYNSuPQ=,tag:gplLS7z2IqFqBke11NzFXw==,type:str]
|
||||||
pgp: []
|
pgp: []
|
||||||
unencrypted_regex: ^(apiVersion|metadata|kind|type)$
|
unencrypted_regex: ^(apiVersion|metadata|kind|type)$
|
||||||
version: 3.9.0
|
version: 3.9.0
|
||||||
|
|||||||
@@ -7,8 +7,8 @@ metadata:
|
|||||||
spec:
|
spec:
|
||||||
secretName: wildcard-nmsny-dev-tls
|
secretName: wildcard-nmsny-dev-tls
|
||||||
dnsNames:
|
dnsNames:
|
||||||
- "example.com"
|
- "${DOMAIN}"
|
||||||
- "*.example.com"
|
- "*.{DOMAIN}"
|
||||||
issuerRef:
|
issuerRef:
|
||||||
name: cloudflare-prod
|
name: cloudflare-prod
|
||||||
kind: ClusterIssuer
|
kind: ClusterIssuer
|
||||||
@@ -5,7 +5,7 @@ metadata:
|
|||||||
name: cloudflare-prod
|
name: cloudflare-prod
|
||||||
spec:
|
spec:
|
||||||
acme:
|
acme:
|
||||||
email: admin@example.com
|
email: ${LETSENCRYPT_EMAIL}
|
||||||
server: https://acme-v02.api.letsencrypt.org/directory
|
server: https://acme-v02.api.letsencrypt.org/directory
|
||||||
privateKeySecretRef:
|
privateKeySecretRef:
|
||||||
name: cloudflare-prod-issuer-account-key
|
name: cloudflare-prod-issuer-account-key
|
||||||
|
|||||||
@@ -5,7 +5,7 @@ logs:
|
|||||||
ingressRoute:
|
ingressRoute:
|
||||||
dashboard:
|
dashboard:
|
||||||
enabled: true
|
enabled: true
|
||||||
matchRule: Host(`traefik.example.com`)
|
matchRule: Host(`${TRAEFIK_DOMAIN}`)
|
||||||
entryPoints: ["websecure"]
|
entryPoints: ["websecure"]
|
||||||
middlewares:
|
middlewares:
|
||||||
- name: "auth-authelia@kubernetescrd"
|
- name: "auth-authelia@kubernetescrd"
|
||||||
|
|||||||
Reference in New Issue
Block a user