This commit is contained in:
21
k8s/apps/rustdesk/app.yaml
Normal file
21
k8s/apps/rustdesk/app.yaml
Normal file
@ -0,0 +1,21 @@
|
||||
apiVersion: argoproj.io/v1alpha1
|
||||
kind: Application
|
||||
metadata:
|
||||
name: rustdesk
|
||||
namespace: argocd
|
||||
spec:
|
||||
project: apps
|
||||
destination:
|
||||
namespace: rustdesk
|
||||
server: https://kubernetes.default.svc
|
||||
source:
|
||||
repoURL: ssh://git@gt.hexor.cy:30022/ab/homelab.git
|
||||
targetRevision: HEAD
|
||||
path: k8s/apps/rustdesk
|
||||
syncPolicy:
|
||||
automated:
|
||||
selfHeal: true
|
||||
prune: true
|
||||
syncOptions:
|
||||
- CreateNamespace=true
|
||||
|
66
k8s/apps/rustdesk/external-secrets.yaml
Normal file
66
k8s/apps/rustdesk/external-secrets.yaml
Normal file
@ -0,0 +1,66 @@
|
||||
---
|
||||
apiVersion: external-secrets.io/v1beta1
|
||||
kind: ExternalSecret
|
||||
metadata:
|
||||
name: postgres-creds
|
||||
spec:
|
||||
target:
|
||||
name: postgres-creds
|
||||
deletionPolicy: Delete
|
||||
template:
|
||||
type: Opaque
|
||||
data:
|
||||
psql_user: paperless
|
||||
psql_pass: |-
|
||||
{{ .psql_pass }}
|
||||
oauth_config: |-
|
||||
{
|
||||
"openid_connect": {
|
||||
"APPS": [
|
||||
{
|
||||
"provider_id": "authentik",
|
||||
"name": "Authentik",
|
||||
"client_id": "{{ .oauth_id }}",
|
||||
"secret": "{{ .oauth_secret }}",
|
||||
"settings": {
|
||||
"server_url": "{{ .server_url }}"
|
||||
}
|
||||
}
|
||||
],
|
||||
"OAUTH_PKCE_ENABLED": "True"
|
||||
}
|
||||
}
|
||||
data:
|
||||
- secretKey: psql_pass
|
||||
sourceRef:
|
||||
storeRef:
|
||||
name: vaultwarden-login
|
||||
kind: ClusterSecretStore
|
||||
remoteRef:
|
||||
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||
property: fields[5].value
|
||||
- secretKey: oauth_id
|
||||
sourceRef:
|
||||
storeRef:
|
||||
name: vaultwarden-login
|
||||
kind: ClusterSecretStore
|
||||
remoteRef:
|
||||
key: 07d4efd9-597c-4a4c-a78d-13bfc43e6055
|
||||
property: fields[0].value
|
||||
- secretKey: oauth_secret
|
||||
sourceRef:
|
||||
storeRef:
|
||||
name: vaultwarden-login
|
||||
kind: ClusterSecretStore
|
||||
remoteRef:
|
||||
key: 07d4efd9-597c-4a4c-a78d-13bfc43e6055
|
||||
property: fields[1].value
|
||||
- secretKey: server_url
|
||||
sourceRef:
|
||||
storeRef:
|
||||
name: vaultwarden-login
|
||||
kind: ClusterSecretStore
|
||||
remoteRef:
|
||||
key: 07d4efd9-597c-4a4c-a78d-13bfc43e6055
|
||||
property: fields[2].value
|
||||
|
16
k8s/apps/rustdesk/kustomization.yaml
Normal file
16
k8s/apps/rustdesk/kustomization.yaml
Normal file
@ -0,0 +1,16 @@
|
||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
|
||||
resources:
|
||||
- app.yaml
|
||||
#- external-secrets.yaml
|
||||
|
||||
helmCharts:
|
||||
- name: rustdesk-server-oss
|
||||
repo: https://schich.tel/helm-charts
|
||||
version: 0.2.2
|
||||
releaseName: rustdesk
|
||||
namespace: rustdesk
|
||||
valuesFile: values.yaml
|
||||
includeCRDs: true
|
||||
|
87
k8s/apps/rustdesk/values.yaml
Normal file
87
k8s/apps/rustdesk/values.yaml
Normal file
@ -0,0 +1,87 @@
|
||||
replicaCount: 1
|
||||
|
||||
image:
|
||||
repository: docker.io/rustdesk/rustdesk-server
|
||||
pullPolicy: IfNotPresent
|
||||
tag: 1
|
||||
|
||||
nodeSelector:
|
||||
kubernetes.io/hostname: nas.homenet
|
||||
|
||||
ingress:
|
||||
enabled: true
|
||||
className: "traefik"
|
||||
annotations:
|
||||
ingressClassName: traefik
|
||||
cert-manager.io/cluster-issuer: letsencrypt
|
||||
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
|
||||
acme.cert-manager.io/http01-edit-in-place: "true"
|
||||
hosts:
|
||||
- rd.hexor.cy
|
||||
tls:
|
||||
- secretName: rustdesk-tls
|
||||
hosts:
|
||||
- rd.hexor.cy
|
||||
|
||||
service:
|
||||
type: ClusterIP
|
||||
externalTrafficPolicy: Cluster
|
||||
loadBalancerIP: null
|
||||
enableWebClientSupport: false
|
||||
hbbr:
|
||||
replayPort:
|
||||
port: 21117
|
||||
targetPort: 21117
|
||||
clientPort:
|
||||
port: 21119
|
||||
targetPort: 21119
|
||||
hbbs:
|
||||
natPort:
|
||||
port: 21115
|
||||
targetPort: 21115
|
||||
registryPort:
|
||||
port: 21116
|
||||
targetPort: 21116
|
||||
heartbeatPort:
|
||||
port: 21116
|
||||
targetPort: 21116
|
||||
webPort:
|
||||
port: 21118
|
||||
targetPort: 21118
|
||||
|
||||
resources:
|
||||
hbbrResource: {}
|
||||
# We usually recommend not to specify default resources and to leave this as a conscious
|
||||
# choice for the user. This also increases chances charts run on environments with little
|
||||
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
||||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
hbbsResource: {}
|
||||
# We usually recommend not to specify default resources and to leave this as a conscious
|
||||
# choice for the user. This also increases chances charts run on environments with little
|
||||
# resources, such as Minikube. If you do want to specify resources, uncomment the following
|
||||
# lines, adjust them as necessary, and remove the curly braces after 'resources:'.
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
# requests:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
|
||||
# Additional volumes on the output Deployment definition.
|
||||
volume: {}
|
||||
|
||||
# - name: foo
|
||||
# secret:
|
||||
# secretName: mysecret
|
||||
# optional: false
|
||||
|
||||
# - name: foo
|
||||
# mountPath: "/etc/foo"
|
||||
# readOnly: true
|
||||
|
Reference in New Issue
Block a user