Compare commits
79 Commits
auto-updat
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
887ea72a2e | ||
|
|
4151deca72 | ||
| c3e0064412 | |||
| 8a4401fe0b | |||
| 704a19f864 | |||
| 5e4e82296f | |||
| 27bc3f31c9 | |||
| 1ba9226a3b | |||
| 4f7477ee94 | |||
| 87627e5ffb | |||
| 87e38501e3 | |||
| ae211ac7d0 | |||
| 086f9e17df | |||
| 327bcc90d8 | |||
| 7d2beb584c | |||
| a889518e3b | |||
| 4575cd69a9 | |||
| 6460684218 | |||
| 935b9e0a51 | |||
| 9e68fc91a2 | |||
| a613ca086c | |||
|
|
dcd15b296f | ||
|
|
f21c9f548b | ||
|
|
c4bc80eed2 | ||
|
|
176c6e910e | ||
|
|
5834fc23a7 | ||
|
|
567e62e48c | ||
|
|
0a9af8f7bd | ||
|
|
b52676e8c7 | ||
|
|
51fa410231 | ||
|
|
8e69b134a4 | ||
|
|
ecb611cf5f | ||
|
|
1843cb2beb | ||
|
|
cfda43e116 | ||
|
|
d39069ca2c | ||
| dad43693bb | |||
|
|
5d811bd021 | ||
|
|
07b4b7bdf8 | ||
|
|
4be4b1168c | ||
|
|
5588eff8c8 | ||
| 2a5d5af180 | |||
| 0e733f0e3e | |||
|
|
b4eacf2bd3 | ||
|
|
14cbcc8579 | ||
| c5153115da | |||
|
|
56699cd2c6 | ||
|
|
4feed32f94 | ||
|
|
9d67f443c3 | ||
| b12276072a | |||
|
|
04fc582912 | ||
|
|
537ddf1a0c | ||
|
|
b3149fcdc8 | ||
|
|
b7b7b9a34c | ||
|
|
647fabdd38 | ||
|
|
e20453e6e6 | ||
|
|
bd13badd0c | ||
| 997b03120a | |||
| 1eca92d899 | |||
| 411438ab63 | |||
|
|
751c573a48 | ||
|
|
5121dd8cfe | ||
| d0ab5c4774 | |||
| 488326c1d6 | |||
| a7140bbbf1 | |||
| e4e2b5b4a2 | |||
|
|
5718948285 | ||
|
|
88060c1ab5 | ||
|
|
10e351b35b | ||
|
|
825283b911 | ||
|
|
17c36999f0 | ||
|
|
89e788cf1a | ||
|
|
40db3879ea | ||
|
|
334af39f31 | ||
|
|
2b00c7e61e | ||
|
|
fa53fdcd93 | ||
| a5163f288b | |||
| ad2ffb39c3 | |||
| 49effccc3a | |||
| c6995dfef4 |
@@ -25,7 +25,7 @@ jobs:
|
|||||||
uses: actions/checkout@v3
|
uses: actions/checkout@v3
|
||||||
|
|
||||||
- name: Setup Terraform
|
- name: Setup Terraform
|
||||||
uses: hashicorp/setup-terraform@v2
|
uses: hashicorp/setup-terraform@v4.0.0
|
||||||
with:
|
with:
|
||||||
cli_config_credentials_token: ${{ secrets.TF_API_TOKEN }}
|
cli_config_credentials_token: ${{ secrets.TF_API_TOKEN }}
|
||||||
|
|
||||||
@@ -45,7 +45,7 @@ jobs:
|
|||||||
- name: Terraform Apply
|
- name: Terraform Apply
|
||||||
env:
|
env:
|
||||||
TF_VAR_authentik_token: ${{ secrets.AUTHENTIK_TOKEN }}
|
TF_VAR_authentik_token: ${{ secrets.AUTHENTIK_TOKEN }}
|
||||||
run: terraform apply -var-file proxy-apps.tfvars -var-file oauth2-apps.tfvars -var-file terraform.tfvars -var-file groups.tfvars -input=false -auto-approve -parallelism=100
|
run: terraform apply -input=false -auto-approve -parallelism=100
|
||||||
working-directory: ./terraform/authentik
|
working-directory: ./terraform/authentik
|
||||||
|
|
||||||
- name: Generate Wiki Content
|
- name: Generate Wiki Content
|
||||||
|
|||||||
1
.gitignore
vendored
1
.gitignore
vendored
@@ -13,6 +13,7 @@ crash.*.log
|
|||||||
*.tfvars
|
*.tfvars
|
||||||
*.tfvars.json
|
*.tfvars.json
|
||||||
!*terraform.tfvars
|
!*terraform.tfvars
|
||||||
|
!*.auto.tfvars
|
||||||
|
|
||||||
# claude ai
|
# claude ai
|
||||||
.claude/
|
.claude/
|
||||||
|
|||||||
20
k8s/apps/furumi-dev/app.yaml
Normal file
20
k8s/apps/furumi-dev/app.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: furumi-dev
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: apps
|
||||||
|
destination:
|
||||||
|
namespace: furumi-dev
|
||||||
|
server: https://kubernetes.default.svc
|
||||||
|
source:
|
||||||
|
repoURL: ssh://git@gt.hexor.cy:30022/ab/homelab.git
|
||||||
|
targetRevision: HEAD
|
||||||
|
path: k8s/apps/furumi-dev
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
selfHeal: true
|
||||||
|
prune: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
55
k8s/apps/furumi-dev/external-secrets.yaml
Normal file
55
k8s/apps/furumi-dev/external-secrets.yaml
Normal file
@@ -0,0 +1,55 @@
|
|||||||
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
spec:
|
||||||
|
target:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
deletionPolicy: Delete
|
||||||
|
template:
|
||||||
|
type: Opaque
|
||||||
|
data:
|
||||||
|
OIDC_CLIENT_ID: |-
|
||||||
|
{{ .client_id }}
|
||||||
|
OIDC_CLIENT_SECRET: |-
|
||||||
|
{{ .client_secret }}
|
||||||
|
OIDC_ISSUER_URL: https://idm.hexor.cy/application/o/furumi-dev/
|
||||||
|
OIDC_REDIRECT_URL: https://music-dev.hexor.cy/auth/callback
|
||||||
|
OIDC_SESSION_SECRET: |-
|
||||||
|
{{ .session_secret }}
|
||||||
|
PG_STRING: |-
|
||||||
|
postgres://furumi_dev:{{ .pg_pass }}@psql.psql.svc:5432/furumi_dev
|
||||||
|
data:
|
||||||
|
- secretKey: client_id
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: 960735e6-2cc9-4b68-9bd3-e6786e5a0cd6
|
||||||
|
property: fields[0].value
|
||||||
|
- secretKey: client_secret
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: 960735e6-2cc9-4b68-9bd3-e6786e5a0cd6
|
||||||
|
property: fields[1].value
|
||||||
|
- secretKey: session_secret
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: 960735e6-2cc9-4b68-9bd3-e6786e5a0cd6
|
||||||
|
property: fields[2].value
|
||||||
|
- secretKey: pg_pass
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
|
property: fields[17].value
|
||||||
59
k8s/apps/furumi-dev/ingress.yaml
Normal file
59
k8s/apps/furumi-dev/ingress.yaml
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
---
|
||||||
|
apiVersion: traefik.io/v1alpha1
|
||||||
|
kind: Middleware
|
||||||
|
metadata:
|
||||||
|
name: admin-strip
|
||||||
|
spec:
|
||||||
|
stripPrefix:
|
||||||
|
prefixes:
|
||||||
|
- /admin
|
||||||
|
---
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: furumi-tls-ingress
|
||||||
|
annotations:
|
||||||
|
ingressClassName: traefik
|
||||||
|
cert-manager.io/cluster-issuer: letsencrypt
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
|
||||||
|
acme.cert-manager.io/http01-edit-in-place: "true"
|
||||||
|
spec:
|
||||||
|
rules:
|
||||||
|
- host: music-dev.hexor.cy
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
- path: /
|
||||||
|
pathType: Prefix
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: furumi-dev-web-player
|
||||||
|
port:
|
||||||
|
number: 8080
|
||||||
|
tls:
|
||||||
|
- secretName: furumi-tls
|
||||||
|
hosts:
|
||||||
|
- '*.hexor.cy'
|
||||||
|
---
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: furumi-dev-admin-ingress
|
||||||
|
annotations:
|
||||||
|
ingressClassName: traefik
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: furumi-server-admin-strip@kubernetescrd,kube-system-https-redirect@kubernetescrd
|
||||||
|
spec:
|
||||||
|
rules:
|
||||||
|
- host: music-dev.hexor.cy
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
- path: /admin
|
||||||
|
pathType: Prefix
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: furumi-dev-metadata-agent
|
||||||
|
port:
|
||||||
|
number: 8090
|
||||||
|
tls:
|
||||||
|
- secretName: furumi-tls
|
||||||
|
hosts:
|
||||||
|
- '*.hexor.cy'
|
||||||
10
k8s/apps/furumi-dev/kustomization.yaml
Normal file
10
k8s/apps/furumi-dev/kustomization.yaml
Normal file
@@ -0,0 +1,10 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- app.yaml
|
||||||
|
- service.yaml
|
||||||
|
- external-secrets.yaml
|
||||||
|
- ingress.yaml
|
||||||
|
- web-player.yaml
|
||||||
|
- metadata-agent.yaml
|
||||||
59
k8s/apps/furumi-dev/metadata-agent.yaml
Normal file
59
k8s/apps/furumi-dev/metadata-agent.yaml
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: furumi-dev-metadata-agent
|
||||||
|
labels:
|
||||||
|
app: furumi-dev-metadata-agent
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: furumi-dev-metadata-agent
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: furumi-dev-metadata-agent
|
||||||
|
spec:
|
||||||
|
nodeSelector:
|
||||||
|
kubernetes.io/hostname: master.tail2fe2d.ts.net
|
||||||
|
containers:
|
||||||
|
- name: furumi-dev-metadata-agent
|
||||||
|
image: ultradesu/furumi-metadata-agent:dev
|
||||||
|
imagePullPolicy: Always
|
||||||
|
env:
|
||||||
|
- name: FURUMI_AGENT_DATABASE_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: PG_STRING
|
||||||
|
- name: FURUMI_AGENT_INBOX_DIR
|
||||||
|
value: "/inbox"
|
||||||
|
- name: FURUMI_AGENT_STORAGE_DIR
|
||||||
|
value: "/media"
|
||||||
|
- name: FURUMI_AGENT_OLLAMA_URL
|
||||||
|
value: "http://ollama.ollama.svc:11434"
|
||||||
|
- name: FURUMI_AGENT_OLLAMA_MODEL
|
||||||
|
value: "qwen3:14b"
|
||||||
|
- name: FURUMI_AGENT_POLL_INTERVAL_SECS
|
||||||
|
value: "10"
|
||||||
|
- name: RUST_LOG
|
||||||
|
value: "info"
|
||||||
|
ports:
|
||||||
|
- name: admin-ui
|
||||||
|
containerPort: 8090
|
||||||
|
protocol: TCP
|
||||||
|
volumeMounts:
|
||||||
|
- name: library
|
||||||
|
mountPath: /media
|
||||||
|
- name: inbox
|
||||||
|
mountPath: /inbox
|
||||||
|
volumes:
|
||||||
|
- name: library
|
||||||
|
hostPath:
|
||||||
|
path: /k8s/furumi-dev/library
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
- name: inbox
|
||||||
|
hostPath:
|
||||||
|
path: /k8s/furumi-dev/inbox
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
|
||||||
32
k8s/apps/furumi-dev/service.yaml
Normal file
32
k8s/apps/furumi-dev/service.yaml
Normal file
@@ -0,0 +1,32 @@
|
|||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: furumi-dev-metadata-agent
|
||||||
|
labels:
|
||||||
|
app: furumi-dev-metadata-agent
|
||||||
|
spec:
|
||||||
|
type: ClusterIP
|
||||||
|
selector:
|
||||||
|
app: furumi-dev-metadata-agent
|
||||||
|
ports:
|
||||||
|
- name: admin-ui
|
||||||
|
protocol: TCP
|
||||||
|
port: 8090
|
||||||
|
targetPort: 8090
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: furumi-dev-web-player
|
||||||
|
labels:
|
||||||
|
app: furumi-dev-web-player
|
||||||
|
spec:
|
||||||
|
type: ClusterIP
|
||||||
|
selector:
|
||||||
|
app: furumi-dev-web-player
|
||||||
|
ports:
|
||||||
|
- name: web-ui
|
||||||
|
protocol: TCP
|
||||||
|
port: 8080
|
||||||
|
targetPort: 8080
|
||||||
70
k8s/apps/furumi-dev/web-player.yaml
Normal file
70
k8s/apps/furumi-dev/web-player.yaml
Normal file
@@ -0,0 +1,70 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: furumi-dev-web-player
|
||||||
|
labels:
|
||||||
|
app: furumi-dev-web-player
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: furumi-dev-web-player
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: furumi-dev-web-player
|
||||||
|
spec:
|
||||||
|
nodeSelector:
|
||||||
|
kubernetes.io/hostname: master.tail2fe2d.ts.net
|
||||||
|
containers:
|
||||||
|
- name: furumi-dev-web-player
|
||||||
|
image: ultradesu/furumi-web-player:dev
|
||||||
|
imagePullPolicy: Always
|
||||||
|
env:
|
||||||
|
- name: FURUMI_PLAYER_OIDC_CLIENT_ID
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_CLIENT_ID
|
||||||
|
- name: FURUMI_PLAYER_OIDC_CLIENT_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_CLIENT_SECRET
|
||||||
|
- name: FURUMI_PLAYER_OIDC_ISSUER_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_ISSUER_URL
|
||||||
|
- name: FURUMI_PLAYER_OIDC_REDIRECT_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_REDIRECT_URL
|
||||||
|
- name: FURUMI_PLAYER_OIDC_SESSION_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_SESSION_SECRET
|
||||||
|
- name: FURUMI_PLAYER_DATABASE_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: PG_STRING
|
||||||
|
- name: FURUMI_PLAYER_STORAGE_DIR
|
||||||
|
value: "/media"
|
||||||
|
- name: RUST_LOG
|
||||||
|
value: "info"
|
||||||
|
ports:
|
||||||
|
- name: web-ui
|
||||||
|
containerPort: 8080
|
||||||
|
protocol: TCP
|
||||||
|
volumeMounts:
|
||||||
|
- name: music
|
||||||
|
mountPath: /media
|
||||||
|
volumes:
|
||||||
|
- name: music
|
||||||
|
hostPath:
|
||||||
|
path: /k8s/furumi-dev/library
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
|
||||||
@@ -18,13 +18,43 @@ spec:
|
|||||||
kubernetes.io/hostname: master.tail2fe2d.ts.net
|
kubernetes.io/hostname: master.tail2fe2d.ts.net
|
||||||
containers:
|
containers:
|
||||||
- name: furumi-server
|
- name: furumi-server
|
||||||
image: ultradesu/furumi-server:latest
|
image: ultradesu/furumi-server:trunk
|
||||||
imagePullPolicy: Always
|
imagePullPolicy: Always
|
||||||
env:
|
env:
|
||||||
- name: FURUMI_TOKEN
|
- name: FURUMI_TOKEN
|
||||||
value: "f38387266e75effe891b7953eb9c06b4"
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: TOKEN
|
||||||
|
- name: FURUMI_OIDC_CLIENT_ID
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_CLIENT_ID
|
||||||
|
- name: FURUMI_OIDC_CLIENT_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_CLIENT_SECRET
|
||||||
|
- name: FURUMI_OIDC_ISSUER_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_ISSUER_URL
|
||||||
|
- name: FURUMI_OIDC_REDIRECT_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_REDIRECT_URL
|
||||||
|
- name: FURUMI_OIDC_SESSION_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_SESSION_SECRET
|
||||||
- name: FURUMI_ROOT
|
- name: FURUMI_ROOT
|
||||||
value: "/media"
|
value: "/media"
|
||||||
|
- name: RUST_LOG
|
||||||
|
value: "info"
|
||||||
ports:
|
ports:
|
||||||
- name: grpc
|
- name: grpc
|
||||||
containerPort: 50051
|
containerPort: 50051
|
||||||
@@ -32,6 +62,9 @@ spec:
|
|||||||
- name: metrics
|
- name: metrics
|
||||||
containerPort: 9090
|
containerPort: 9090
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
|
- name: web-ui
|
||||||
|
containerPort: 8080
|
||||||
|
protocol: TCP
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: music
|
- name: music
|
||||||
mountPath: /media
|
mountPath: /media
|
||||||
|
|||||||
65
k8s/apps/furumi-server/external-secrets.yaml
Normal file
65
k8s/apps/furumi-server/external-secrets.yaml
Normal file
@@ -0,0 +1,65 @@
|
|||||||
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
spec:
|
||||||
|
target:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
deletionPolicy: Delete
|
||||||
|
template:
|
||||||
|
type: Opaque
|
||||||
|
data:
|
||||||
|
TOKEN: |-
|
||||||
|
{{ .token }}
|
||||||
|
OIDC_CLIENT_ID: |-
|
||||||
|
{{ .client_id }}
|
||||||
|
OIDC_CLIENT_SECRET: |-
|
||||||
|
{{ .client_secret }}
|
||||||
|
OIDC_ISSUER_URL: https://idm.hexor.cy/application/o/furumi-ng-web/
|
||||||
|
OIDC_REDIRECT_URL: https://music.hexor.cy/auth/callback
|
||||||
|
OIDC_SESSION_SECRET: |-
|
||||||
|
{{ .session_secret }}
|
||||||
|
PG_STRING: |-
|
||||||
|
postgres://furumi:{{ .pg_pass }}@psql.psql.svc:5432/furumi
|
||||||
|
data:
|
||||||
|
- secretKey: token
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: b8b8c3a2-c3fe-42d3-9402-0ae305e1455f
|
||||||
|
property: fields[0].value
|
||||||
|
- secretKey: client_id
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: b8b8c3a2-c3fe-42d3-9402-0ae305e1455f
|
||||||
|
property: fields[1].value
|
||||||
|
- secretKey: client_secret
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: b8b8c3a2-c3fe-42d3-9402-0ae305e1455f
|
||||||
|
property: fields[2].value
|
||||||
|
- secretKey: session_secret
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: b8b8c3a2-c3fe-42d3-9402-0ae305e1455f
|
||||||
|
property: fields[3].value
|
||||||
|
- secretKey: pg_pass
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
|
property: fields[16].value
|
||||||
59
k8s/apps/furumi-server/ingress.yaml
Normal file
59
k8s/apps/furumi-server/ingress.yaml
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
---
|
||||||
|
apiVersion: traefik.io/v1alpha1
|
||||||
|
kind: Middleware
|
||||||
|
metadata:
|
||||||
|
name: admin-strip
|
||||||
|
spec:
|
||||||
|
stripPrefix:
|
||||||
|
prefixes:
|
||||||
|
- /admin
|
||||||
|
---
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: furumi-tls-ingress
|
||||||
|
annotations:
|
||||||
|
ingressClassName: traefik
|
||||||
|
cert-manager.io/cluster-issuer: letsencrypt
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
|
||||||
|
acme.cert-manager.io/http01-edit-in-place: "true"
|
||||||
|
spec:
|
||||||
|
rules:
|
||||||
|
- host: music.hexor.cy
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
- path: /
|
||||||
|
pathType: Prefix
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: furumi-web-player
|
||||||
|
port:
|
||||||
|
number: 8080
|
||||||
|
tls:
|
||||||
|
- secretName: furumi-tls
|
||||||
|
hosts:
|
||||||
|
- '*.hexor.cy'
|
||||||
|
---
|
||||||
|
apiVersion: networking.k8s.io/v1
|
||||||
|
kind: Ingress
|
||||||
|
metadata:
|
||||||
|
name: furumi-admin-ingress
|
||||||
|
annotations:
|
||||||
|
ingressClassName: traefik
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: furumi-server-admin-strip@kubernetescrd,kube-system-https-redirect@kubernetescrd
|
||||||
|
spec:
|
||||||
|
rules:
|
||||||
|
- host: music.hexor.cy
|
||||||
|
http:
|
||||||
|
paths:
|
||||||
|
- path: /admin
|
||||||
|
pathType: Prefix
|
||||||
|
backend:
|
||||||
|
service:
|
||||||
|
name: furumi-metadata-agent
|
||||||
|
port:
|
||||||
|
number: 8090
|
||||||
|
tls:
|
||||||
|
- secretName: furumi-tls
|
||||||
|
hosts:
|
||||||
|
- '*.hexor.cy'
|
||||||
@@ -6,3 +6,7 @@ resources:
|
|||||||
- deployment.yaml
|
- deployment.yaml
|
||||||
- service.yaml
|
- service.yaml
|
||||||
- servicemonitor.yaml
|
- servicemonitor.yaml
|
||||||
|
- external-secrets.yaml
|
||||||
|
- ingress.yaml
|
||||||
|
- web-player.yaml
|
||||||
|
- metadata-agent.yaml
|
||||||
|
|||||||
59
k8s/apps/furumi-server/metadata-agent.yaml
Normal file
59
k8s/apps/furumi-server/metadata-agent.yaml
Normal file
@@ -0,0 +1,59 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: furumi-metadata-agent
|
||||||
|
labels:
|
||||||
|
app: furumi-metadata-agent
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: furumi-metadata-agent
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: furumi-metadata-agent
|
||||||
|
spec:
|
||||||
|
nodeSelector:
|
||||||
|
kubernetes.io/hostname: master.tail2fe2d.ts.net
|
||||||
|
containers:
|
||||||
|
- name: furumi-metadata-agent
|
||||||
|
image: ultradesu/furumi-metadata-agent:trunk
|
||||||
|
imagePullPolicy: Always
|
||||||
|
env:
|
||||||
|
- name: FURUMI_AGENT_DATABASE_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: PG_STRING
|
||||||
|
- name: FURUMI_AGENT_INBOX_DIR
|
||||||
|
value: "/inbox"
|
||||||
|
- name: FURUMI_AGENT_STORAGE_DIR
|
||||||
|
value: "/media"
|
||||||
|
- name: FURUMI_AGENT_OLLAMA_URL
|
||||||
|
value: "http://ollama.ollama.svc:11434"
|
||||||
|
- name: FURUMI_AGENT_OLLAMA_MODEL
|
||||||
|
value: "qwen3.5:9b"
|
||||||
|
- name: FURUMI_AGENT_POLL_INTERVAL_SECS
|
||||||
|
value: "10"
|
||||||
|
- name: RUST_LOG
|
||||||
|
value: "info"
|
||||||
|
ports:
|
||||||
|
- name: admin-ui
|
||||||
|
containerPort: 8090
|
||||||
|
protocol: TCP
|
||||||
|
volumeMounts:
|
||||||
|
- name: library
|
||||||
|
mountPath: /media
|
||||||
|
- name: inbox
|
||||||
|
mountPath: /inbox
|
||||||
|
volumes:
|
||||||
|
- name: library
|
||||||
|
hostPath:
|
||||||
|
path: /k8s/furumi/library
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
- name: inbox
|
||||||
|
hostPath:
|
||||||
|
path: /k8s/furumi/inbox
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
|
||||||
@@ -28,3 +28,35 @@ spec:
|
|||||||
protocol: TCP
|
protocol: TCP
|
||||||
port: 9090
|
port: 9090
|
||||||
targetPort: 9090
|
targetPort: 9090
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: furumi-metadata-agent
|
||||||
|
labels:
|
||||||
|
app: furumi-metadata-agent
|
||||||
|
spec:
|
||||||
|
type: ClusterIP
|
||||||
|
selector:
|
||||||
|
app: furumi-metadata-agent
|
||||||
|
ports:
|
||||||
|
- name: admin-ui
|
||||||
|
protocol: TCP
|
||||||
|
port: 8090
|
||||||
|
targetPort: 8090
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: furumi-web-player
|
||||||
|
labels:
|
||||||
|
app: furumi-web-player
|
||||||
|
spec:
|
||||||
|
type: ClusterIP
|
||||||
|
selector:
|
||||||
|
app: furumi-web-player
|
||||||
|
ports:
|
||||||
|
- name: web-ui
|
||||||
|
protocol: TCP
|
||||||
|
port: 8080
|
||||||
|
targetPort: 8080
|
||||||
|
|||||||
70
k8s/apps/furumi-server/web-player.yaml
Normal file
70
k8s/apps/furumi-server/web-player.yaml
Normal file
@@ -0,0 +1,70 @@
|
|||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: furumi-web-player
|
||||||
|
labels:
|
||||||
|
app: furumi-web-player
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: furumi-web-player
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: furumi-web-player
|
||||||
|
spec:
|
||||||
|
nodeSelector:
|
||||||
|
kubernetes.io/hostname: master.tail2fe2d.ts.net
|
||||||
|
containers:
|
||||||
|
- name: furumi-web-player
|
||||||
|
image: ultradesu/furumi-web-player:trunk
|
||||||
|
imagePullPolicy: Always
|
||||||
|
env:
|
||||||
|
- name: FURUMI_PLAYER_OIDC_CLIENT_ID
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_CLIENT_ID
|
||||||
|
- name: FURUMI_PLAYER_OIDC_CLIENT_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_CLIENT_SECRET
|
||||||
|
- name: FURUMI_PLAYER_OIDC_ISSUER_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_ISSUER_URL
|
||||||
|
- name: FURUMI_PLAYER_OIDC_REDIRECT_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_REDIRECT_URL
|
||||||
|
- name: FURUMI_PLAYER_OIDC_SESSION_SECRET
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: OIDC_SESSION_SECRET
|
||||||
|
- name: FURUMI_PLAYER_DATABASE_URL
|
||||||
|
valueFrom:
|
||||||
|
secretKeyRef:
|
||||||
|
name: furumi-ng-creds
|
||||||
|
key: PG_STRING
|
||||||
|
- name: FURUMI_PLAYER_STORAGE_DIR
|
||||||
|
value: "/media"
|
||||||
|
- name: RUST_LOG
|
||||||
|
value: "info"
|
||||||
|
ports:
|
||||||
|
- name: web-ui
|
||||||
|
containerPort: 8080
|
||||||
|
protocol: TCP
|
||||||
|
volumeMounts:
|
||||||
|
- name: music
|
||||||
|
mountPath: /media
|
||||||
|
volumes:
|
||||||
|
- name: music
|
||||||
|
hostPath:
|
||||||
|
path: /k8s/furumi/library
|
||||||
|
type: DirectoryOrCreate
|
||||||
|
|
||||||
@@ -77,8 +77,11 @@ spec:
|
|||||||
labels:
|
labels:
|
||||||
app: gitea-runner
|
app: gitea-runner
|
||||||
spec:
|
spec:
|
||||||
#nodeSelector:
|
tolerations:
|
||||||
# kubernetes.io/hostname: home.homenet
|
- key: workload
|
||||||
|
operator: Equal
|
||||||
|
value: desktop
|
||||||
|
effect: NoSchedule
|
||||||
volumes:
|
volumes:
|
||||||
- name: docker-sock
|
- name: docker-sock
|
||||||
hostPath:
|
hostPath:
|
||||||
@@ -90,21 +93,28 @@ spec:
|
|||||||
affinity:
|
affinity:
|
||||||
nodeAffinity:
|
nodeAffinity:
|
||||||
preferredDuringSchedulingIgnoredDuringExecution:
|
preferredDuringSchedulingIgnoredDuringExecution:
|
||||||
- weight: 1
|
- weight: 100
|
||||||
|
preference:
|
||||||
|
matchExpressions:
|
||||||
|
- key: kubernetes.io/hostname
|
||||||
|
operator: In
|
||||||
|
values:
|
||||||
|
- uk-desktop.tail2fe2d.ts.net
|
||||||
|
- weight: 50
|
||||||
preference:
|
preference:
|
||||||
matchExpressions:
|
matchExpressions:
|
||||||
- key: kubernetes.io/hostname
|
- key: kubernetes.io/hostname
|
||||||
operator: In
|
operator: In
|
||||||
values:
|
values:
|
||||||
- home.homenet
|
- home.homenet
|
||||||
- weight: 2
|
- weight: 30
|
||||||
preference:
|
preference:
|
||||||
matchExpressions:
|
matchExpressions:
|
||||||
- key: kubernetes.io/hostname
|
- key: kubernetes.io/hostname
|
||||||
operator: In
|
operator: In
|
||||||
values:
|
values:
|
||||||
- master.tail2fe2d.ts.net
|
- master.tail2fe2d.ts.net
|
||||||
- weight: 3
|
- weight: 10
|
||||||
preference:
|
preference:
|
||||||
matchExpressions:
|
matchExpressions:
|
||||||
- key: kubernetes.io/hostname
|
- key: kubernetes.io/hostname
|
||||||
@@ -113,18 +123,6 @@ spec:
|
|||||||
- it.tail2fe2d.ts.net
|
- it.tail2fe2d.ts.net
|
||||||
- ch.tail2fe2d.ts.net
|
- ch.tail2fe2d.ts.net
|
||||||
- us.tail2fe2d.ts.net
|
- us.tail2fe2d.ts.net
|
||||||
|
|
||||||
requiredDuringSchedulingIgnoredDuringExecution:
|
|
||||||
nodeSelectorTerms:
|
|
||||||
- matchExpressions:
|
|
||||||
- key: kubernetes.io/hostname
|
|
||||||
operator: In
|
|
||||||
values:
|
|
||||||
- home.homenet
|
|
||||||
- it.tail2fe2d.ts.net
|
|
||||||
- ch.tail2fe2d.ts.net
|
|
||||||
- us.tail2fe2d.ts.net
|
|
||||||
- master.tail2fe2d.ts.net
|
|
||||||
containers:
|
containers:
|
||||||
- name: gitea-runner
|
- name: gitea-runner
|
||||||
image: gitea/act_runner:nightly
|
image: gitea/act_runner:nightly
|
||||||
@@ -132,11 +130,11 @@ spec:
|
|||||||
requests:
|
requests:
|
||||||
cpu: "100m"
|
cpu: "100m"
|
||||||
memory: "256Mi"
|
memory: "256Mi"
|
||||||
ephemeral-storage: "1Gi" # reserve ephemeral storage
|
ephemeral-storage: "1Gi"
|
||||||
limits:
|
limits:
|
||||||
cpu: "3000m"
|
cpu: "3000m"
|
||||||
memory: "4Gi"
|
memory: "4Gi"
|
||||||
ephemeral-storage: "28Gi" # hard cap for /data usage
|
ephemeral-storage: "28Gi"
|
||||||
volumeMounts:
|
volumeMounts:
|
||||||
- name: docker-sock
|
- name: docker-sock
|
||||||
mountPath: /var/run/docker.sock
|
mountPath: /var/run/docker.sock
|
||||||
|
|||||||
20
k8s/apps/matrix/app.yaml
Normal file
20
k8s/apps/matrix/app.yaml
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
apiVersion: argoproj.io/v1alpha1
|
||||||
|
kind: Application
|
||||||
|
metadata:
|
||||||
|
name: matrix
|
||||||
|
namespace: argocd
|
||||||
|
spec:
|
||||||
|
project: apps
|
||||||
|
destination:
|
||||||
|
namespace: matrix
|
||||||
|
server: https://kubernetes.default.svc
|
||||||
|
source:
|
||||||
|
repoURL: ssh://git@gt.hexor.cy:30022/ab/homelab.git
|
||||||
|
targetRevision: HEAD
|
||||||
|
path: k8s/apps/matrix
|
||||||
|
syncPolicy:
|
||||||
|
automated:
|
||||||
|
selfHeal: true
|
||||||
|
prune: true
|
||||||
|
syncOptions:
|
||||||
|
- CreateNamespace=true
|
||||||
95
k8s/apps/matrix/external-secrets.yaml
Normal file
95
k8s/apps/matrix/external-secrets.yaml
Normal file
@@ -0,0 +1,95 @@
|
|||||||
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: matrix-postgres-creds
|
||||||
|
spec:
|
||||||
|
target:
|
||||||
|
name: matrix-postgres-creds
|
||||||
|
deletionPolicy: Delete
|
||||||
|
template:
|
||||||
|
type: Opaque
|
||||||
|
data:
|
||||||
|
synapse_db_password: |-
|
||||||
|
{{ .synapse_db_password }}
|
||||||
|
mas_db_password: |-
|
||||||
|
{{ .mas_db_password }}
|
||||||
|
data:
|
||||||
|
- secretKey: synapse_db_password
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
|
property: fields[14].value
|
||||||
|
- secretKey: mas_db_password
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
|
property: fields[15].value
|
||||||
|
---
|
||||||
|
apiVersion: external-secrets.io/v1
|
||||||
|
kind: ExternalSecret
|
||||||
|
metadata:
|
||||||
|
name: matrix-oidc-config
|
||||||
|
spec:
|
||||||
|
target:
|
||||||
|
name: matrix-oidc-config
|
||||||
|
deletionPolicy: Delete
|
||||||
|
template:
|
||||||
|
type: Opaque
|
||||||
|
data:
|
||||||
|
mas-oidc.yaml: |
|
||||||
|
upstream_oauth2:
|
||||||
|
providers:
|
||||||
|
- id: 001KKV4EKY7KG98W2M9T806K6A
|
||||||
|
human_name: Authentik
|
||||||
|
issuer: https://idm.hexor.cy/application/o/matrix/
|
||||||
|
client_id: "{{ .oauth_client_id }}"
|
||||||
|
client_secret: "{{ .oauth_client_secret }}"
|
||||||
|
token_endpoint_auth_method: client_secret_post
|
||||||
|
scope: "openid profile email"
|
||||||
|
claims_imports:
|
||||||
|
localpart:
|
||||||
|
action: suggest
|
||||||
|
template: "{{ `{{ user.preferred_username | split(\"@\") | first }}` }}"
|
||||||
|
displayname:
|
||||||
|
action: suggest
|
||||||
|
template: "{{ `{{ user.name }}` }}"
|
||||||
|
email:
|
||||||
|
action: suggest
|
||||||
|
template: "{{ `{{ user.email }}` }}"
|
||||||
|
set_email_verification: always
|
||||||
|
data:
|
||||||
|
- secretKey: oauth_client_id
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
|
key: ca76867f-49f3-4a30-9ef3-b05af35ee49a
|
||||||
|
property: fields[0].value
|
||||||
|
- secretKey: oauth_client_secret
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
|
key: ca76867f-49f3-4a30-9ef3-b05af35ee49a
|
||||||
|
property: fields[1].value
|
||||||
15
k8s/apps/matrix/kustomization.yaml
Normal file
15
k8s/apps/matrix/kustomization.yaml
Normal file
@@ -0,0 +1,15 @@
|
|||||||
|
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||||
|
kind: Kustomization
|
||||||
|
|
||||||
|
resources:
|
||||||
|
- app.yaml
|
||||||
|
- external-secrets.yaml
|
||||||
|
|
||||||
|
helmCharts:
|
||||||
|
- name: matrix-stack
|
||||||
|
repo: oci://ghcr.io/element-hq/ess-helm
|
||||||
|
version: 26.2.3
|
||||||
|
releaseName: matrix-stack
|
||||||
|
namespace: matrix
|
||||||
|
valuesFile: matrix-stack-values.yaml
|
||||||
|
includeCRDs: true
|
||||||
112
k8s/apps/matrix/matrix-stack-values.yaml
Normal file
112
k8s/apps/matrix/matrix-stack-values.yaml
Normal file
@@ -0,0 +1,112 @@
|
|||||||
|
## Matrix server name - appears in @user:matrix.hexor.cy
|
||||||
|
serverName: matrix.hexor.cy
|
||||||
|
|
||||||
|
## Use letsencrypt cluster issuer for all ingresses
|
||||||
|
certManager:
|
||||||
|
clusterIssuer: letsencrypt
|
||||||
|
|
||||||
|
## Global ingress settings
|
||||||
|
ingress:
|
||||||
|
className: traefik
|
||||||
|
annotations:
|
||||||
|
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
|
||||||
|
|
||||||
|
## Disable built-in PostgreSQL - using external database
|
||||||
|
postgres:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
## Disable components we don't need yet
|
||||||
|
hookshot:
|
||||||
|
enabled: false
|
||||||
|
|
||||||
|
## MatrixRTC - voice/video calls via LiveKit SFU
|
||||||
|
matrixRTC:
|
||||||
|
enabled: true
|
||||||
|
ingress:
|
||||||
|
host: livekit.matrix.hexor.cy
|
||||||
|
sfu:
|
||||||
|
enabled: true
|
||||||
|
manualIP: "138.201.61.182"
|
||||||
|
nodeSelector:
|
||||||
|
kubernetes.io/hostname: master.tail2fe2d.ts.net
|
||||||
|
exposedServices:
|
||||||
|
rtcTcp:
|
||||||
|
enabled: true
|
||||||
|
port: 30881
|
||||||
|
rtcMuxedUdp:
|
||||||
|
enabled: true
|
||||||
|
port: 30882
|
||||||
|
turnTLS:
|
||||||
|
enabled: true
|
||||||
|
port: 31443
|
||||||
|
domain: turn.matrix.hexor.cy
|
||||||
|
tlsTerminationOnPod: true
|
||||||
|
|
||||||
|
## Synapse homeserver
|
||||||
|
synapse:
|
||||||
|
enabled: true
|
||||||
|
ingress:
|
||||||
|
host: synapse.matrix.hexor.cy
|
||||||
|
postgres:
|
||||||
|
host: psql.psql.svc
|
||||||
|
port: 5432
|
||||||
|
user: synapse
|
||||||
|
database: synapse
|
||||||
|
sslMode: prefer
|
||||||
|
password:
|
||||||
|
secret: matrix-postgres-creds
|
||||||
|
secretKey: synapse_db_password
|
||||||
|
media:
|
||||||
|
storage:
|
||||||
|
size: 20Gi
|
||||||
|
maxUploadSize: 100M
|
||||||
|
# nodeSelector:
|
||||||
|
# kubernetes.io/hostname: nas.homenet
|
||||||
|
|
||||||
|
## Matrix Authentication Service
|
||||||
|
matrixAuthenticationService:
|
||||||
|
enabled: true
|
||||||
|
ingress:
|
||||||
|
host: auth.matrix.hexor.cy
|
||||||
|
postgres:
|
||||||
|
host: psql.psql.svc
|
||||||
|
port: 5432
|
||||||
|
user: mas
|
||||||
|
database: mas
|
||||||
|
sslMode: prefer
|
||||||
|
password:
|
||||||
|
secret: matrix-postgres-creds
|
||||||
|
secretKey: mas_db_password
|
||||||
|
## Admin policy
|
||||||
|
additional:
|
||||||
|
0-admin-policy:
|
||||||
|
config: |
|
||||||
|
policy:
|
||||||
|
data:
|
||||||
|
admin_users:
|
||||||
|
- username: ultradesu
|
||||||
|
1-oidc:
|
||||||
|
configSecret: matrix-oidc-config
|
||||||
|
configSecretKey: mas-oidc.yaml
|
||||||
|
# nodeSelector:
|
||||||
|
# kubernetes.io/hostname: nas.homenet
|
||||||
|
|
||||||
|
## Element Web client
|
||||||
|
elementWeb:
|
||||||
|
enabled: true
|
||||||
|
ingress:
|
||||||
|
host: chat.matrix.hexor.cy
|
||||||
|
# nodeSelector:
|
||||||
|
# kubernetes.io/hostname: nas.homenet
|
||||||
|
|
||||||
|
## Element Admin panel
|
||||||
|
elementAdmin:
|
||||||
|
enabled: true
|
||||||
|
ingress:
|
||||||
|
host: admin.matrix.hexor.cy
|
||||||
|
# nodeSelector:
|
||||||
|
# kubernetes.io/hostname: nas.homenet
|
||||||
|
|
||||||
|
## Well-known delegation on the base domain (host is derived from serverName)
|
||||||
|
wellKnownDelegation:
|
||||||
|
enabled: true
|
||||||
@@ -4,6 +4,7 @@ kind: Kustomization
|
|||||||
resources:
|
resources:
|
||||||
- external-secrets.yaml
|
- external-secrets.yaml
|
||||||
- local-pv.yaml
|
- local-pv.yaml
|
||||||
|
- open-terminal.yaml
|
||||||
|
|
||||||
helmCharts:
|
helmCharts:
|
||||||
- name: ollama
|
- name: ollama
|
||||||
@@ -15,7 +16,7 @@ helmCharts:
|
|||||||
includeCRDs: true
|
includeCRDs: true
|
||||||
- name: open-webui
|
- name: open-webui
|
||||||
repo: https://helm.openwebui.com/
|
repo: https://helm.openwebui.com/
|
||||||
version: 12.8.1
|
version: 12.10.0
|
||||||
releaseName: openweb-ui
|
releaseName: openweb-ui
|
||||||
namespace: ollama
|
namespace: ollama
|
||||||
valuesFile: openweb-ui-values.yaml
|
valuesFile: openweb-ui-values.yaml
|
||||||
|
|||||||
53
k8s/apps/ollama/open-terminal.yaml
Normal file
53
k8s/apps/ollama/open-terminal.yaml
Normal file
@@ -0,0 +1,53 @@
|
|||||||
|
---
|
||||||
|
apiVersion: apps/v1
|
||||||
|
kind: Deployment
|
||||||
|
metadata:
|
||||||
|
name: open-terminal
|
||||||
|
labels:
|
||||||
|
app: open-terminal
|
||||||
|
spec:
|
||||||
|
replicas: 1
|
||||||
|
selector:
|
||||||
|
matchLabels:
|
||||||
|
app: open-terminal
|
||||||
|
template:
|
||||||
|
metadata:
|
||||||
|
labels:
|
||||||
|
app: open-terminal
|
||||||
|
spec:
|
||||||
|
nodeSelector:
|
||||||
|
kubernetes.io/hostname: uk-desktop.tail2fe2d.ts.net
|
||||||
|
tolerations:
|
||||||
|
- key: workload
|
||||||
|
operator: Equal
|
||||||
|
value: desktop
|
||||||
|
effect: NoSchedule
|
||||||
|
containers:
|
||||||
|
- name: open-terminal
|
||||||
|
image: ghcr.io/open-webui/open-terminal:latest
|
||||||
|
ports:
|
||||||
|
- containerPort: 8000
|
||||||
|
env:
|
||||||
|
- name: OPEN_TERMINAL_API_KEY
|
||||||
|
value: "LOCAL_ACCESS_TOKEN"
|
||||||
|
resources:
|
||||||
|
requests:
|
||||||
|
cpu: 100m
|
||||||
|
memory: 256Mi
|
||||||
|
limits:
|
||||||
|
cpu: "2"
|
||||||
|
memory: 2Gi
|
||||||
|
---
|
||||||
|
apiVersion: v1
|
||||||
|
kind: Service
|
||||||
|
metadata:
|
||||||
|
name: open-terminal
|
||||||
|
labels:
|
||||||
|
app: open-terminal
|
||||||
|
spec:
|
||||||
|
selector:
|
||||||
|
app: open-terminal
|
||||||
|
ports:
|
||||||
|
- port: 8000
|
||||||
|
targetPort: 8000
|
||||||
|
protocol: TCP
|
||||||
@@ -18,4 +18,5 @@ spec:
|
|||||||
prune: true
|
prune: true
|
||||||
syncOptions:
|
syncOptions:
|
||||||
- CreateNamespace=true
|
- CreateNamespace=true
|
||||||
|
- ServerSideApply=true
|
||||||
|
|
||||||
|
|||||||
@@ -23,6 +23,9 @@ spec:
|
|||||||
name: vaultwarden-login
|
name: vaultwarden-login
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
remoteRef:
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
key: 1062e5b4-5380-49f1-97c3-340f26f3487e
|
key: 1062e5b4-5380-49f1-97c3-340f26f3487e
|
||||||
property: fields[0].value
|
property: fields[0].value
|
||||||
- secretKey: client_secret
|
- secretKey: client_secret
|
||||||
@@ -31,6 +34,9 @@ spec:
|
|||||||
name: vaultwarden-login
|
name: vaultwarden-login
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
remoteRef:
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
key: 1062e5b4-5380-49f1-97c3-340f26f3487e
|
key: 1062e5b4-5380-49f1-97c3-340f26f3487e
|
||||||
property: fields[1].value
|
property: fields[1].value
|
||||||
|
|
||||||
|
|||||||
@@ -28,8 +28,9 @@ configs:
|
|||||||
issuer: https://idm.hexor.cy/application/o/argocd/
|
issuer: https://idm.hexor.cy/application/o/argocd/
|
||||||
clientID: $oidc-creds:id
|
clientID: $oidc-creds:id
|
||||||
clientSecret: $oidc-creds:secret
|
clientSecret: $oidc-creds:secret
|
||||||
requestedScopes: ["openid", "profile", "email", "groups"]
|
requestedScopes: ["openid", "profile", "email", "groups", "offline_access"]
|
||||||
requestedIDTokenClaims: {"groups": {"essential": true}}
|
requestedIDTokenClaims: {"groups": {"essential": true}}
|
||||||
|
refreshTokenThreshold: 2m
|
||||||
rbac:
|
rbac:
|
||||||
create: true
|
create: true
|
||||||
policy.default: ""
|
policy.default: ""
|
||||||
|
|||||||
@@ -34,6 +34,9 @@ spec:
|
|||||||
name: vaultwarden-login
|
name: vaultwarden-login
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
remoteRef:
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
|
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
|
||||||
property: login.password
|
property: login.password
|
||||||
- secretKey: username
|
- secretKey: username
|
||||||
@@ -42,6 +45,9 @@ spec:
|
|||||||
name: vaultwarden-login
|
name: vaultwarden-login
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
remoteRef:
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
|
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
|
||||||
property: login.username
|
property: login.username
|
||||||
- secretKey: secret_key
|
- secretKey: secret_key
|
||||||
@@ -50,6 +56,9 @@ spec:
|
|||||||
name: vaultwarden-login
|
name: vaultwarden-login
|
||||||
kind: ClusterSecretStore
|
kind: ClusterSecretStore
|
||||||
remoteRef:
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
|
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
|
||||||
property: fields[0].value
|
property: fields[0].value
|
||||||
|
|
||||||
|
|||||||
@@ -5,12 +5,13 @@ resources:
|
|||||||
- app.yaml
|
- app.yaml
|
||||||
- external-secrets.yaml
|
- external-secrets.yaml
|
||||||
- https-middleware.yaml
|
- https-middleware.yaml
|
||||||
|
- outpost-selector-fix.yaml
|
||||||
# - worker-restart.yaml
|
# - worker-restart.yaml
|
||||||
|
|
||||||
helmCharts:
|
helmCharts:
|
||||||
- name: authentik
|
- name: authentik
|
||||||
repo: https://charts.goauthentik.io
|
repo: https://charts.goauthentik.io
|
||||||
version: 2025.12.0
|
version: 2026.2.1
|
||||||
releaseName: authentik
|
releaseName: authentik
|
||||||
namespace: authentik
|
namespace: authentik
|
||||||
valuesFile: values.yaml
|
valuesFile: values.yaml
|
||||||
|
|||||||
81
k8s/core/authentik/outpost-selector-fix.yaml
Normal file
81
k8s/core/authentik/outpost-selector-fix.yaml
Normal file
@@ -0,0 +1,81 @@
|
|||||||
|
## Workaround for authentik bug: embedded outpost controller creates
|
||||||
|
## a Service with selectors that don't match the pod labels it sets.
|
||||||
|
## Remove this after upgrading to a version with the fix.
|
||||||
|
apiVersion: v1
|
||||||
|
kind: ServiceAccount
|
||||||
|
metadata:
|
||||||
|
name: outpost-selector-fix
|
||||||
|
namespace: authentik
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: Role
|
||||||
|
metadata:
|
||||||
|
name: outpost-selector-fix
|
||||||
|
namespace: authentik
|
||||||
|
rules:
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["services"]
|
||||||
|
verbs: ["get", "patch"]
|
||||||
|
- apiGroups: [""]
|
||||||
|
resources: ["endpoints"]
|
||||||
|
verbs: ["get"]
|
||||||
|
---
|
||||||
|
apiVersion: rbac.authorization.k8s.io/v1
|
||||||
|
kind: RoleBinding
|
||||||
|
metadata:
|
||||||
|
name: outpost-selector-fix
|
||||||
|
namespace: authentik
|
||||||
|
subjects:
|
||||||
|
- kind: ServiceAccount
|
||||||
|
name: outpost-selector-fix
|
||||||
|
namespace: authentik
|
||||||
|
roleRef:
|
||||||
|
apiGroup: rbac.authorization.k8s.io
|
||||||
|
kind: Role
|
||||||
|
name: outpost-selector-fix
|
||||||
|
---
|
||||||
|
apiVersion: batch/v1
|
||||||
|
kind: CronJob
|
||||||
|
metadata:
|
||||||
|
name: outpost-selector-fix
|
||||||
|
namespace: authentik
|
||||||
|
spec:
|
||||||
|
schedule: "* * * * *"
|
||||||
|
successfulJobsHistoryLimit: 1
|
||||||
|
failedJobsHistoryLimit: 3
|
||||||
|
concurrencyPolicy: Replace
|
||||||
|
jobTemplate:
|
||||||
|
spec:
|
||||||
|
ttlSecondsAfterFinished: 300
|
||||||
|
template:
|
||||||
|
spec:
|
||||||
|
serviceAccountName: outpost-selector-fix
|
||||||
|
restartPolicy: OnFailure
|
||||||
|
containers:
|
||||||
|
- name: fix
|
||||||
|
image: bitnami/kubectl:latest
|
||||||
|
command:
|
||||||
|
- /bin/sh
|
||||||
|
- -c
|
||||||
|
- |
|
||||||
|
SVC="ak-outpost-authentik-embedded-outpost"
|
||||||
|
# check if endpoints are populated
|
||||||
|
ADDRS=$(kubectl get endpoints "$SVC" -n authentik -o jsonpath='{.subsets[*].addresses[*].ip}' 2>/dev/null)
|
||||||
|
if [ -n "$ADDRS" ]; then
|
||||||
|
echo "Endpoints OK ($ADDRS), nothing to fix"
|
||||||
|
exit 0
|
||||||
|
fi
|
||||||
|
echo "No endpoints for $SVC, patching selector..."
|
||||||
|
kubectl patch svc "$SVC" -n authentik --type=json -p '[
|
||||||
|
{"op":"remove","path":"/spec/selector/app.kubernetes.io~1component"},
|
||||||
|
{"op":"replace","path":"/spec/selector/app.kubernetes.io~1name","value":"authentik-outpost-proxy"}
|
||||||
|
]'
|
||||||
|
echo "Patched. Verifying..."
|
||||||
|
sleep 2
|
||||||
|
ADDRS=$(kubectl get endpoints "$SVC" -n authentik -o jsonpath='{.subsets[*].addresses[*].ip}' 2>/dev/null)
|
||||||
|
if [ -n "$ADDRS" ]; then
|
||||||
|
echo "Fix confirmed, endpoints: $ADDRS"
|
||||||
|
else
|
||||||
|
echo "WARNING: still no endpoints after patch"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
@@ -1,6 +1,6 @@
|
|||||||
global:
|
global:
|
||||||
image:
|
image:
|
||||||
tag: "2025.12.0"
|
tag: "2026.2.1"
|
||||||
|
|
||||||
authentik:
|
authentik:
|
||||||
error_reporting:
|
error_reporting:
|
||||||
@@ -54,19 +54,6 @@ server:
|
|||||||
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
|
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
|
||||||
hosts:
|
hosts:
|
||||||
- idm.hexor.cy
|
- idm.hexor.cy
|
||||||
- nas.hexor.cy # TrueNAS Limassol
|
|
||||||
- nc.hexor.cy # NaxtCloud
|
|
||||||
- of.hexor.cy # Outfleet-v2
|
|
||||||
- k8s.hexor.cy # k8s dashboard
|
|
||||||
- qbt.hexor.cy # qBittorent for Jellyfin
|
|
||||||
- prom.hexor.cy # Prometheus
|
|
||||||
- khm.hexor.cy # Known Hosts keys Manager
|
|
||||||
- backup.hexor.cy # Kopia Backup UI
|
|
||||||
- fm.hexor.cy # Filemanager
|
|
||||||
- minecraft.hexor.cy # Minecraft UI and server
|
|
||||||
- pass.hexor.cy # k8s-secret for openai
|
|
||||||
- ps.hexor.cy # pasarguard UI
|
|
||||||
# - rw.hexor.cy # RemnaWave UI
|
|
||||||
tls:
|
tls:
|
||||||
- secretName: idm-tls
|
- secretName: idm-tls
|
||||||
hosts:
|
hosts:
|
||||||
|
|||||||
@@ -37,4 +37,5 @@ spec:
|
|||||||
dnsZones:
|
dnsZones:
|
||||||
- "ps.hexor.cy"
|
- "ps.hexor.cy"
|
||||||
- "of.hexor.cy"
|
- "of.hexor.cy"
|
||||||
|
- "matrix.hexor.cy"
|
||||||
|
|
||||||
|
|||||||
@@ -10,7 +10,7 @@ resources:
|
|||||||
helmCharts:
|
helmCharts:
|
||||||
- name: cert-manager
|
- name: cert-manager
|
||||||
repo: https://charts.jetstack.io
|
repo: https://charts.jetstack.io
|
||||||
version: 1.19.1
|
version: 1.20.0
|
||||||
releaseName: cert-manager
|
releaseName: cert-manager
|
||||||
namespace: cert-manager
|
namespace: cert-manager
|
||||||
valuesFile: values.yaml
|
valuesFile: values.yaml
|
||||||
|
|||||||
@@ -127,6 +127,14 @@ spec:
|
|||||||
{{ .mmdl }}
|
{{ .mmdl }}
|
||||||
USER_n8n: |-
|
USER_n8n: |-
|
||||||
{{ .n8n }}
|
{{ .n8n }}
|
||||||
|
USER_synapse: |-
|
||||||
|
{{ .synapse }}
|
||||||
|
USER_mas: |-
|
||||||
|
{{ .mas }}
|
||||||
|
USER_furumi: |-
|
||||||
|
{{ .furumi }}
|
||||||
|
USER_furumi_dev: |-
|
||||||
|
{{ .furumi_dev }}
|
||||||
data:
|
data:
|
||||||
- secretKey: authentik
|
- secretKey: authentik
|
||||||
sourceRef:
|
sourceRef:
|
||||||
@@ -271,4 +279,48 @@ spec:
|
|||||||
metadataPolicy: None
|
metadataPolicy: None
|
||||||
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
property: fields[13].value
|
property: fields[13].value
|
||||||
|
- secretKey: synapse
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
|
property: fields[14].value
|
||||||
|
- secretKey: mas
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
|
property: fields[15].value
|
||||||
|
- secretKey: furumi
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
|
property: fields[16].value
|
||||||
|
- secretKey: furumi_dev
|
||||||
|
sourceRef:
|
||||||
|
storeRef:
|
||||||
|
name: vaultwarden-login
|
||||||
|
kind: ClusterSecretStore
|
||||||
|
remoteRef:
|
||||||
|
conversionStrategy: Default
|
||||||
|
decodingStrategy: None
|
||||||
|
metadataPolicy: None
|
||||||
|
key: 2a9deb39-ef22-433e-a1be-df1555625e22
|
||||||
|
property: fields[17].value
|
||||||
|
|
||||||
|
|||||||
@@ -449,7 +449,7 @@
|
|||||||
"type": "prometheus",
|
"type": "prometheus",
|
||||||
"uid": "${datasource}"
|
"uid": "${datasource}"
|
||||||
},
|
},
|
||||||
"expr": "process_resident_memory_bytes / 1024 / 1024",
|
"expr": "sum(process_resident_memory_bytes) / 1024 / 1024",
|
||||||
"legendFormat": "Resident Memory",
|
"legendFormat": "Resident Memory",
|
||||||
"refId": "A"
|
"refId": "A"
|
||||||
},
|
},
|
||||||
@@ -458,7 +458,7 @@
|
|||||||
"type": "prometheus",
|
"type": "prometheus",
|
||||||
"uid": "${datasource}"
|
"uid": "${datasource}"
|
||||||
},
|
},
|
||||||
"expr": "process_virtual_memory_bytes / 1024 / 1024",
|
"expr": "sum(process_virtual_memory_bytes) / 1024 / 1024",
|
||||||
"legendFormat": "Virtual Memory",
|
"legendFormat": "Virtual Memory",
|
||||||
"refId": "B"
|
"refId": "B"
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -20,7 +20,7 @@ data:
|
|||||||
relativeTimeRange:
|
relativeTimeRange:
|
||||||
from: 600
|
from: 600
|
||||||
to: 0
|
to: 0
|
||||||
datasourceUid: P76F38748CEC837F0
|
datasourceUid: prometheus
|
||||||
model:
|
model:
|
||||||
expr: 'rate(container_cpu_cfs_throttled_periods_total{container="pasarguard-node"}[5m])'
|
expr: 'rate(container_cpu_cfs_throttled_periods_total{container="pasarguard-node"}[5m])'
|
||||||
refId: A
|
refId: A
|
||||||
@@ -73,7 +73,7 @@ data:
|
|||||||
relativeTimeRange:
|
relativeTimeRange:
|
||||||
from: 600
|
from: 600
|
||||||
to: 0
|
to: 0
|
||||||
datasourceUid: P76F38748CEC837F0
|
datasourceUid: prometheus
|
||||||
model:
|
model:
|
||||||
expr: 'kube_node_status_condition{condition="Ready",status="false"}'
|
expr: 'kube_node_status_condition{condition="Ready",status="false"}'
|
||||||
refId: A
|
refId: A
|
||||||
@@ -119,7 +119,7 @@ data:
|
|||||||
relativeTimeRange:
|
relativeTimeRange:
|
||||||
from: 300
|
from: 300
|
||||||
to: 0
|
to: 0
|
||||||
datasourceUid: P76F38748CEC837F0
|
datasourceUid: prometheus
|
||||||
model:
|
model:
|
||||||
expr: '(1 - (node_memory_MemAvailable_bytes / node_memory_MemTotal_bytes)) * 100'
|
expr: '(1 - (node_memory_MemAvailable_bytes / node_memory_MemTotal_bytes)) * 100'
|
||||||
refId: A
|
refId: A
|
||||||
@@ -165,7 +165,7 @@ data:
|
|||||||
relativeTimeRange:
|
relativeTimeRange:
|
||||||
from: 300
|
from: 300
|
||||||
to: 0
|
to: 0
|
||||||
datasourceUid: P76F38748CEC837F0
|
datasourceUid: prometheus
|
||||||
model:
|
model:
|
||||||
expr: '100 - (avg by(instance) (rate(node_cpu_seconds_total{mode="idle"}[5m])) * 100)'
|
expr: '100 - (avg by(instance) (rate(node_cpu_seconds_total{mode="idle"}[5m])) * 100)'
|
||||||
refId: A
|
refId: A
|
||||||
@@ -211,7 +211,7 @@ data:
|
|||||||
relativeTimeRange:
|
relativeTimeRange:
|
||||||
from: 300
|
from: 300
|
||||||
to: 0
|
to: 0
|
||||||
datasourceUid: P76F38748CEC837F0
|
datasourceUid: prometheus
|
||||||
model:
|
model:
|
||||||
expr: '(1 - (node_filesystem_avail_bytes{fstype=~"ext[234]|xfs|zfs|btrfs"} / node_filesystem_size_bytes)) * 100'
|
expr: '(1 - (node_filesystem_avail_bytes{fstype=~"ext[234]|xfs|zfs|btrfs"} / node_filesystem_size_bytes)) * 100'
|
||||||
refId: A
|
refId: A
|
||||||
@@ -258,7 +258,7 @@ data:
|
|||||||
relativeTimeRange:
|
relativeTimeRange:
|
||||||
from: 300
|
from: 300
|
||||||
to: 0
|
to: 0
|
||||||
datasourceUid: P76F38748CEC837F0
|
datasourceUid: prometheus
|
||||||
model:
|
model:
|
||||||
expr: 'node_load15 / on(instance) group_left count by(instance)(node_cpu_seconds_total{mode="idle"})'
|
expr: 'node_load15 / on(instance) group_left count by(instance)(node_cpu_seconds_total{mode="idle"})'
|
||||||
refId: A
|
refId: A
|
||||||
@@ -304,7 +304,7 @@ data:
|
|||||||
relativeTimeRange:
|
relativeTimeRange:
|
||||||
from: 300
|
from: 300
|
||||||
to: 0
|
to: 0
|
||||||
datasourceUid: P76F38748CEC837F0
|
datasourceUid: prometheus
|
||||||
model:
|
model:
|
||||||
expr: 'up{job="node-exporter"}'
|
expr: 'up{job="node-exporter"}'
|
||||||
refId: A
|
refId: A
|
||||||
|
|||||||
@@ -11,7 +11,7 @@ resources:
|
|||||||
helmCharts:
|
helmCharts:
|
||||||
- name: kube-prometheus-stack
|
- name: kube-prometheus-stack
|
||||||
repo: https://prometheus-community.github.io/helm-charts
|
repo: https://prometheus-community.github.io/helm-charts
|
||||||
version: 79.7.1
|
version: 82.10.3
|
||||||
releaseName: prometheus
|
releaseName: prometheus
|
||||||
namespace: prometheus
|
namespace: prometheus
|
||||||
valuesFile: prom-values.yaml
|
valuesFile: prom-values.yaml
|
||||||
|
|||||||
@@ -16,7 +16,7 @@ spec:
|
|||||||
serviceAccountName: system-upgrade
|
serviceAccountName: system-upgrade
|
||||||
upgrade:
|
upgrade:
|
||||||
image: rancher/k3s-upgrade
|
image: rancher/k3s-upgrade
|
||||||
version: v1.34.3+k3s1
|
version: v1.35.2+k3s1
|
||||||
---
|
---
|
||||||
# Agent plan
|
# Agent plan
|
||||||
apiVersion: upgrade.cattle.io/v1
|
apiVersion: upgrade.cattle.io/v1
|
||||||
@@ -39,5 +39,4 @@ spec:
|
|||||||
serviceAccountName: system-upgrade
|
serviceAccountName: system-upgrade
|
||||||
upgrade:
|
upgrade:
|
||||||
image: rancher/k3s-upgrade
|
image: rancher/k3s-upgrade
|
||||||
version: v1.34.3+k3s1
|
version: v1.35.2+k3s1
|
||||||
|
|
||||||
@@ -1,16 +0,0 @@
|
|||||||
{
|
|
||||||
"permissions": {
|
|
||||||
"allow": [
|
|
||||||
"WebSearch",
|
|
||||||
"WebFetch(domain:registry.terraform.io)",
|
|
||||||
"Bash(C:UsersabAppDataLocalMicrosoftWinGetPackagesHashicorp.Terraform_Microsoft.Winget.Source_8wekyb3d8bbweterraform.exe apply -auto-approve)",
|
|
||||||
"Bash(\"C:\\Users\\ab\\AppData\\Local\\Microsoft\\WinGet\\Packages\\Hashicorp.Terraform_Microsoft.Winget.Source_8wekyb3d8bbwe\\terraform.exe\" apply -auto-approve)",
|
|
||||||
"Bash(\"C:\\Users\\ab\\AppData\\Local\\Microsoft\\WinGet\\Packages\\Hashicorp.Terraform_Microsoft.Winget.Source_8wekyb3d8bbwe\\terraform.exe\" apply -auto-approve -lock=false)",
|
|
||||||
"Bash(\"C:\\Users\\ab\\AppData\\Local\\Microsoft\\WinGet\\Packages\\Hashicorp.Terraform_Microsoft.Winget.Source_8wekyb3d8bbwe\\terraform.exe\" plan -lock=false)",
|
|
||||||
"Bash(\"C:\\Users\\ab\\AppData\\Local\\Microsoft\\WinGet\\Packages\\Hashicorp.Terraform_Microsoft.Winget.Source_8wekyb3d8bbwe\\terraform.exe\" apply -replace=\"authentik_outpost.outposts[\"\"kubernetes-outpost\"\"]\" -auto-approve -lock=false)",
|
|
||||||
"Bash(terraform plan:*)"
|
|
||||||
],
|
|
||||||
"deny": [],
|
|
||||||
"ask": []
|
|
||||||
}
|
|
||||||
}
|
|
||||||
60
terraform/authentik/.terraform.lock.hcl
generated
60
terraform/authentik/.terraform.lock.hcl
generated
@@ -2,43 +2,43 @@
|
|||||||
# Manual edits may be lost in future updates.
|
# Manual edits may be lost in future updates.
|
||||||
|
|
||||||
provider "registry.terraform.io/goauthentik/authentik" {
|
provider "registry.terraform.io/goauthentik/authentik" {
|
||||||
version = "2025.8.1"
|
version = "2025.12.1"
|
||||||
constraints = ">= 2023.10.0, 2025.8.1"
|
constraints = ">= 2023.10.0, 2025.12.1"
|
||||||
hashes = [
|
hashes = [
|
||||||
"h1:R3h8ADB0Kkv/aoY0AaHkBiX2/P4+GnW8sSgkN30kJfQ=",
|
"h1:p9AGeRqK50wTHEIp7z7O4MUP83cs+lt7wPajZ9m9TB8=",
|
||||||
"zh:0c3f1083fd48f20ed06959401ff1459fbb5d454d81c8175b5b6d321b308c0be3",
|
"zh:0e856d3b13614bc32346a236a8e84ba55ecd17238c2008d4b3e71aa8cb49f515",
|
||||||
"zh:21c6d93f8d26e688da38a660d121b5624e3597c426c671289f31a17a9771abbf",
|
"zh:2dcc44cd499c18ebbc4f763eff97a7b725763c8ac8fbb5d69c935413ccdc4962",
|
||||||
"zh:301b5763ffc4c5fe47aa7e851ce0b19f71bab4fae5c81003ad81b38775e85f78",
|
"zh:434100fc75ec7cd6b64cc9497e8273e79325fa8d285e9fd9d341c1a67421643b",
|
||||||
"zh:4f7ee6473f6a687340538ddac0ec4a0453664186b15fdb0bb2fb5fcd8fb3ad30",
|
"zh:483484f66d2e8ce6fa4bfd91e824ceebf07d10acb5df5f366397c55227c4ae91",
|
||||||
"zh:7927f4f634c9e072d4aa6620d09e97dc83eeb1dbd0667102086779cd5fc495c1",
|
"zh:596743a6f1c77a6f103b06ef8d932fe8f2376793b92478853dc84571d17c429f",
|
||||||
"zh:84e7c2a3f3de721a54abe4c971d9a163127f5e4af91d023260fea305ac74bcf4",
|
"zh:5ed2d5eb7db13229baaf042c725d5c64b58ffdcc641370175e0a88900af94bf1",
|
||||||
"zh:92af52aaac518c426164eb731d282f51a5825e64e6a02b0695952177a7af7d9c",
|
"zh:8aecd4cf782c82bee01098f72fe4ffff83707516007b32a01c7fcb19a9260338",
|
||||||
"zh:a6920a54d5df69342f4ea2d903676145b00e7375d2f2eecc0840858d83b3b4a8",
|
"zh:928c05ecac309287ff7d73ed6e478350fe3003557658ae5dc2be817a4268dba7",
|
||||||
"zh:ac8a60801fc55fd05b3471778f908ed43072e046997c0082644c9602b84dafec",
|
"zh:9b9fd36dfb3e75da8b4478485272505ae9a3c67b10db173e1d2d76cfe2b637b8",
|
||||||
"zh:b1cc29e2878aa94a3827fd5e1dd8cffb98397aa4093d6a4852c6e53157e9b35f",
|
"zh:ab7cd8c61ab67a045854e32f0be1940a92746770dbf3c17bbe923e0259c4f897",
|
||||||
"zh:c2d78f308c4d70a16ef4f6d1f4822a64f8f160d0a207f2121904cdd6f4942db4",
|
"zh:bb1360ec19a4fc1095d0ef1b7b6c5c3c1a91daac7cd1957d43a4cdbb7356a2e3",
|
||||||
"zh:ca970e5776f408059a84b4e17f6ac257ec92afae956be74f3807c548e4567eaa",
|
"zh:d2186f4063aa1a547b52a53745d472e43f5343bc1674f2bbb91421c61b0fab50",
|
||||||
"zh:eb2e3650ee0eec033207b6d72fcb938dc5846c6feb8a61ae30d61981ea411269",
|
"zh:d74bbb67a77951b18ffd7b2863954e70ac03450ad2023cc305c66a5ff25d8d18",
|
||||||
"zh:fcb93e51c84ba592bc2b075d7342e475126e5029620959666999b5b1bd11cb98",
|
"zh:f5970569ea0a479bbfbf2d452f5962e1c9bd472b82756db822d0e951363daa25",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
provider "registry.terraform.io/hashicorp/random" {
|
provider "registry.terraform.io/hashicorp/random" {
|
||||||
version = "3.7.2"
|
version = "3.8.1"
|
||||||
constraints = ">= 3.5.0"
|
constraints = ">= 3.5.0"
|
||||||
hashes = [
|
hashes = [
|
||||||
"h1:356j/3XnXEKr9nyicLUufzoF4Yr6hRy481KIxRVpK0c=",
|
"h1:u8AKlWVDTH5r9YLSeswoVEjiY72Rt4/ch7U+61ZDkiQ=",
|
||||||
"zh:14829603a32e4bc4d05062f059e545a91e27ff033756b48afbae6b3c835f508f",
|
"zh:08dd03b918c7b55713026037c5400c48af5b9f468f483463321bd18e17b907b4",
|
||||||
"zh:1527fb07d9fea400d70e9e6eb4a2b918d5060d604749b6f1c361518e7da546dc",
|
"zh:0eee654a5542dc1d41920bbf2419032d6f0d5625b03bd81339e5b33394a3e0ae",
|
||||||
"zh:1e86bcd7ebec85ba336b423ba1db046aeaa3c0e5f921039b3f1a6fc2f978feab",
|
"zh:229665ddf060aa0ed315597908483eee5b818a17d09b6417a0f52fd9405c4f57",
|
||||||
"zh:24536dec8bde66753f4b4030b8f3ef43c196d69cccbea1c382d01b222478c7a3",
|
"zh:2469d2e48f28076254a2a3fc327f184914566d9e40c5780b8d96ebf7205f8bc0",
|
||||||
"zh:29f1786486759fad9b0ce4fdfbbfece9343ad47cd50119045075e05afe49d212",
|
"zh:37d7eb334d9561f335e748280f5535a384a88675af9a9eac439d4cfd663bcb66",
|
||||||
"zh:4d701e978c2dd8604ba1ce962b047607701e65c078cb22e97171513e9e57491f",
|
"zh:741101426a2f2c52dee37122f0f4a2f2d6af6d852cb1db634480a86398fa3511",
|
||||||
"zh:78d5eefdd9e494defcb3c68d282b8f96630502cac21d1ea161f53cfe9bb483b3",
|
"zh:78d5eefdd9e494defcb3c68d282b8f96630502cac21d1ea161f53cfe9bb483b3",
|
||||||
"zh:7b8434212eef0f8c83f5a90c6d76feaf850f6502b61b53c329e85b3b281cba34",
|
"zh:a902473f08ef8df62cfe6116bd6c157070a93f66622384300de235a533e9d4a9",
|
||||||
"zh:ac8a23c212258b7976e1621275e3af7099e7e4a3d4478cf8d5d2a27f3bc3e967",
|
"zh:b85c511a23e57a2147355932b3b6dce2a11e856b941165793a0c3d7578d94d05",
|
||||||
"zh:b516ca74431f3df4c6cf90ddcdb4042c626e026317a33c53f0b445a3d93b720d",
|
"zh:c5172226d18eaac95b1daac80172287b69d4ce32750c82ad77fa0768be4ea4b8",
|
||||||
"zh:dc76e4326aec2490c1600d6871a95e78f9050f9ce427c71707ea412a2f2f1a62",
|
"zh:dab4434dba34aad569b0bc243c2d3f3ff86dd7740def373f2a49816bd2ff819b",
|
||||||
"zh:eac7b63e86c749c7d48f527671c7aee5b4e26c10be6ad7232d6860167f99dbb0",
|
"zh:f49fd62aa8c5525a5c17abd51e27ca5e213881d58882fd42fec4a545b53c9699",
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,55 +1,81 @@
|
|||||||
# Authentik Terraform Module
|
# Authentik Terraform Configuration
|
||||||
|
|
||||||
Terraform module for managing Authentik applications with OAuth2/OpenID and Proxy providers, including automatic Outpost assignment.
|
Root Terraform configuration for managing Authentik SSO — applications (OAuth2/OIDC, Proxy, SAML), groups, outposts, flows, certificates, and property mappings.
|
||||||
|
|
||||||
|
State is stored in Terraform Cloud (organization `ultradesu`, workspace `Authentik`).
|
||||||
|
|
||||||
|
## Structure
|
||||||
|
|
||||||
|
```
|
||||||
|
.
|
||||||
|
├── main.tf # Resources: groups, outposts, policy bindings, module calls
|
||||||
|
├── variables.tf # Input variable definitions
|
||||||
|
├── outputs.tf # Outputs (app details, groups, flows, wiki data)
|
||||||
|
├── providers.tf # Authentik provider (goauthentik/authentik 2025.12.1)
|
||||||
|
├── state.tf # Terraform Cloud backend
|
||||||
|
├── terraform.tfvars # General settings: authentik_url, outposts, flows, tags
|
||||||
|
├── oauth2-apps.auto.tfvars # OAuth2/OIDC application definitions
|
||||||
|
├── proxy-apps.auto.tfvars # Proxy application definitions
|
||||||
|
├── groups.auto.tfvars # Group definitions
|
||||||
|
└── modules/
|
||||||
|
├── oauth-provider/ # OAuth2/OIDC provider + application
|
||||||
|
├── proxy-provider/ # Proxy provider + application
|
||||||
|
└── saml-provider/ # SAML provider + application
|
||||||
|
```
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
|
```bash
|
||||||
|
# Set the API token
|
||||||
|
export TF_VAR_authentik_token="..."
|
||||||
|
|
||||||
|
terraform init
|
||||||
|
terraform plan
|
||||||
|
terraform apply
|
||||||
|
```
|
||||||
|
|
||||||
|
All `*.auto.tfvars` files are loaded automatically — no `-var-file` flags needed.
|
||||||
|
|
||||||
|
## Adding applications
|
||||||
|
|
||||||
|
OAuth2/OIDC — add to `oauth2-apps.auto.tfvars`:
|
||||||
|
|
||||||
```hcl
|
```hcl
|
||||||
module "authentik" {
|
oauth_applications = {
|
||||||
source = "./authentik"
|
"my-app" = {
|
||||||
|
name = "My App"
|
||||||
authentik_url = "https://auth.example.com"
|
slug = "my-app"
|
||||||
authentik_token = var.authentik_token
|
group = "Tools"
|
||||||
|
redirect_uris = ["https://my-app.example.com/callback"]
|
||||||
oauth_applications = {
|
create_group = true
|
||||||
"gitlab" = {
|
access_groups = ["admins"]
|
||||||
name = "GitLab OAuth"
|
|
||||||
slug = "gitlab"
|
|
||||||
redirect_uris = ["https://gitlab.example.com/users/auth/openid_connect/callback"]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
proxy_applications = {
|
|
||||||
"portainer" = {
|
|
||||||
name = "Portainer"
|
|
||||||
slug = "portainer"
|
|
||||||
external_host = "https://portainer.example.com"
|
|
||||||
internal_host = "http://portainer:9000"
|
|
||||||
outpost = "k8s-outpost"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
outposts = {
|
|
||||||
"k8s-outpost" = {
|
|
||||||
name = "Kubernetes Outpost"
|
|
||||||
type = "proxy"
|
|
||||||
service_connection = "k8s-local"
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
```
|
```
|
||||||
|
|
||||||
## Structure
|
Proxy — add to `proxy-apps.auto.tfvars`:
|
||||||
|
|
||||||
- `main.tf` - Main configuration
|
```hcl
|
||||||
- `variables.tf` - Input variables
|
proxy_applications = {
|
||||||
- `outputs.tf` - Output values
|
"my-proxy" = {
|
||||||
- `modules/oauth-provider/` - OAuth2/OIDC provider module
|
name = "My Proxy"
|
||||||
- `modules/proxy-provider/` - Proxy provider module
|
slug = "my-proxy"
|
||||||
- `terraform.tfvars.example` - Configuration example
|
group = "Tools"
|
||||||
|
external_host = "https://my-proxy.example.com"
|
||||||
|
internal_host = "http://my-service.namespace.svc:80"
|
||||||
|
outpost = "kubernetes-outpost"
|
||||||
|
create_group = true
|
||||||
|
access_groups = ["admins"]
|
||||||
|
}
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
## CI/CD
|
||||||
|
|
||||||
|
Managed via Gitea Actions (`.gitea/workflows/authentik-apps.yaml`). Runs `terraform apply` on push to `main` when files in `terraform/authentik/` change. Also generates a wiki page with the applications list.
|
||||||
|
|
||||||
## Requirements
|
## Requirements
|
||||||
|
|
||||||
- Terraform >= 1.0
|
- Terraform >= 1.0
|
||||||
- Authentik provider >= 2023.10.0
|
- goauthentik/authentik provider 2025.12.1
|
||||||
- Authentik API token with admin permissions
|
- Authentik API token with admin permissions
|
||||||
@@ -31,7 +31,7 @@ resource "authentik_group" "child_groups" {
|
|||||||
|
|
||||||
name = each.value.name
|
name = each.value.name
|
||||||
is_superuser = each.value.is_superuser
|
is_superuser = each.value.is_superuser
|
||||||
parent = authentik_group.root_groups[each.value.parent].id
|
parents = authentik_group.root_groups[each.value.parent].id
|
||||||
attributes = jsonencode(each.value.attributes)
|
attributes = jsonencode(each.value.attributes)
|
||||||
|
|
||||||
depends_on = [authentik_group.root_groups]
|
depends_on = [authentik_group.root_groups]
|
||||||
@@ -292,7 +292,60 @@ resource "authentik_outpost" "outposts" {
|
|||||||
authentik_host_browser = ""
|
authentik_host_browser = ""
|
||||||
object_naming_template = "ak-outpost-%(name)s"
|
object_naming_template = "ak-outpost-%(name)s"
|
||||||
authentik_host_insecure = false
|
authentik_host_insecure = false
|
||||||
kubernetes_json_patches = null
|
kubernetes_json_patches = {
|
||||||
|
deployment = [
|
||||||
|
{
|
||||||
|
op = "add"
|
||||||
|
path = "/spec/template/spec/containers/0/env/-"
|
||||||
|
value = {
|
||||||
|
name = "AUTHENTIK_POSTGRESQL__HOST"
|
||||||
|
value = "psql.psql.svc"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
op = "add"
|
||||||
|
path = "/spec/template/spec/containers/0/env/-"
|
||||||
|
value = {
|
||||||
|
name = "AUTHENTIK_POSTGRESQL__PORT"
|
||||||
|
value = "5432"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
op = "add"
|
||||||
|
path = "/spec/template/spec/containers/0/env/-"
|
||||||
|
value = {
|
||||||
|
name = "AUTHENTIK_POSTGRESQL__NAME"
|
||||||
|
value = "authentik"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
op = "add"
|
||||||
|
path = "/spec/template/spec/containers/0/env/-"
|
||||||
|
value = {
|
||||||
|
name = "AUTHENTIK_POSTGRESQL__USER"
|
||||||
|
valueFrom = {
|
||||||
|
secretKeyRef = {
|
||||||
|
name = "authentik-creds"
|
||||||
|
key = "AUTHENTIK_POSTGRESQL__USER"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
op = "add"
|
||||||
|
path = "/spec/template/spec/containers/0/env/-"
|
||||||
|
value = {
|
||||||
|
name = "AUTHENTIK_POSTGRESQL__PASSWORD"
|
||||||
|
valueFrom = {
|
||||||
|
secretKeyRef = {
|
||||||
|
name = "authentik-creds"
|
||||||
|
key = "AUTHENTIK_POSTGRESQL__PASSWORD"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
kubernetes_service_type = "ClusterIP"
|
kubernetes_service_type = "ClusterIP"
|
||||||
kubernetes_image_pull_secrets = []
|
kubernetes_image_pull_secrets = []
|
||||||
kubernetes_ingress_class_name = null
|
kubernetes_ingress_class_name = null
|
||||||
|
|||||||
@@ -126,15 +126,15 @@ oauth_applications = {
|
|||||||
}
|
}
|
||||||
|
|
||||||
"home-assistant-lms" = {
|
"home-assistant-lms" = {
|
||||||
name = "Home Assistant LMS"
|
name = "Home Assistant LMS"
|
||||||
slug = "home-assistant-lms"
|
slug = "home-assistant-lms"
|
||||||
group = "Internal"
|
group = "Internal"
|
||||||
meta_description = "Home Assistant Limassol"
|
meta_description = "Home Assistant Limassol"
|
||||||
meta_icon = "https://img.icons8.com/stickers/100/smart-home-automation.png"
|
meta_icon = "https://img.icons8.com/stickers/100/smart-home-automation.png"
|
||||||
redirect_uris = [
|
redirect_uris = [
|
||||||
"http://ha-lms:8123/auth/oidc/callback",
|
"http://ha-lms:8123/auth/oidc/callback",
|
||||||
"http://ha-lms.homenet:8123/auth/oidc/callback",
|
"http://ha-lms.homenet:8123/auth/oidc/callback",
|
||||||
]
|
]
|
||||||
meta_launch_url = "http://ha-lms:8123/auth/oidc/welcome"
|
meta_launch_url = "http://ha-lms:8123/auth/oidc/welcome"
|
||||||
client_type = "confidential"
|
client_type = "confidential"
|
||||||
include_claims_in_id_token = true
|
include_claims_in_id_token = true
|
||||||
@@ -147,15 +147,15 @@ oauth_applications = {
|
|||||||
signing_key = "1b1b5bec-034a-4d96-871a-133f11322360"
|
signing_key = "1b1b5bec-034a-4d96-871a-133f11322360"
|
||||||
}
|
}
|
||||||
"home-assistant-london" = {
|
"home-assistant-london" = {
|
||||||
name = "Home Assistant London"
|
name = "Home Assistant London"
|
||||||
slug = "home-assistant-london"
|
slug = "home-assistant-london"
|
||||||
group = "Internal"
|
group = "Internal"
|
||||||
meta_description = "Home Assistant London"
|
meta_description = "Home Assistant London"
|
||||||
meta_icon = "https://img.icons8.com/stickers/100/smart-home-automation.png"
|
meta_icon = "https://img.icons8.com/stickers/100/smart-home-automation.png"
|
||||||
redirect_uris = [
|
redirect_uris = [
|
||||||
"http://ha-london:8123/auth/oidc/callback",
|
"http://ha-london:8123/auth/oidc/callback",
|
||||||
"http://ha-london.tail2fe2d.ts.net:8123/auth/oidc/callback",
|
"http://ha-london.tail2fe2d.ts.net:8123/auth/oidc/callback",
|
||||||
]
|
]
|
||||||
meta_launch_url = "http://ha-london:8123/auth/oidc/welcome"
|
meta_launch_url = "http://ha-london:8123/auth/oidc/welcome"
|
||||||
client_type = "confidential"
|
client_type = "confidential"
|
||||||
include_claims_in_id_token = true
|
include_claims_in_id_token = true
|
||||||
@@ -169,14 +169,14 @@ oauth_applications = {
|
|||||||
}
|
}
|
||||||
|
|
||||||
"openwebui" = {
|
"openwebui" = {
|
||||||
name = "OpenWeb UI"
|
name = "OpenWeb UI"
|
||||||
slug = "openwebui"
|
slug = "openwebui"
|
||||||
group = "Tools"
|
group = "Tools"
|
||||||
meta_description = "OpenWeb UI"
|
meta_description = "OpenWeb UI"
|
||||||
meta_icon = "https://ollama.com/public/ollama.png"
|
meta_icon = "https://ollama.com/public/ollama.png"
|
||||||
redirect_uris = [
|
redirect_uris = [
|
||||||
"https://ai.hexor.cy/oauth/oidc/callback",
|
"https://ai.hexor.cy/oauth/oidc/callback",
|
||||||
]
|
]
|
||||||
meta_launch_url = "https://ai.hexor.cy"
|
meta_launch_url = "https://ai.hexor.cy"
|
||||||
client_type = "confidential"
|
client_type = "confidential"
|
||||||
include_claims_in_id_token = true
|
include_claims_in_id_token = true
|
||||||
@@ -188,5 +188,45 @@ oauth_applications = {
|
|||||||
create_group = true
|
create_group = true
|
||||||
signing_key = "1b1b5bec-034a-4d96-871a-133f11322360"
|
signing_key = "1b1b5bec-034a-4d96-871a-133f11322360"
|
||||||
}
|
}
|
||||||
|
"matrix" = {
|
||||||
|
name = "Matrix Chat"
|
||||||
|
slug = "matrix"
|
||||||
|
group = "Tools"
|
||||||
|
meta_description = "Matrix Chat"
|
||||||
|
meta_icon = "https://img.icons8.com/ios/100/40C057/matrix-logo.png"
|
||||||
|
redirect_uris = [
|
||||||
|
"https://auth.matrix.hexor.cy/upstream/callback/001KKV4EKY7KG98W2M9T806K6A",
|
||||||
|
]
|
||||||
|
meta_launch_url = "https://chat.matrix.hexor.cy"
|
||||||
|
client_type = "confidential"
|
||||||
|
include_claims_in_id_token = true
|
||||||
|
access_code_validity = "minutes=1"
|
||||||
|
access_token_validity = "minutes=5"
|
||||||
|
refresh_token_validity = "days=30"
|
||||||
|
scope_mappings = ["openid", "profile", "email"]
|
||||||
|
access_groups = []
|
||||||
|
create_group = false
|
||||||
|
signing_key = "1b1b5bec-034a-4d96-871a-133f11322360"
|
||||||
|
}
|
||||||
|
"furumi-ng-web" = {
|
||||||
|
name = "Furumi Web Player"
|
||||||
|
slug = "furumi-ng-web"
|
||||||
|
group = "Tools"
|
||||||
|
meta_description = "Furumi Web Player"
|
||||||
|
meta_icon = "https://img.icons8.com/pulsar-color/48/music.png"
|
||||||
|
redirect_uris = [
|
||||||
|
"https://music.hexor.cy/auth/callback",
|
||||||
|
]
|
||||||
|
meta_launch_url = "https://music.hexor.cy"
|
||||||
|
client_type = "confidential"
|
||||||
|
include_claims_in_id_token = true
|
||||||
|
access_code_validity = "minutes=1"
|
||||||
|
access_token_validity = "minutes=5"
|
||||||
|
refresh_token_validity = "days=30"
|
||||||
|
scope_mappings = ["openid", "profile", "email"]
|
||||||
|
access_groups = []
|
||||||
|
create_group = true
|
||||||
|
signing_key = "1b1b5bec-034a-4d96-871a-133f11322360"
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -2,7 +2,7 @@ terraform {
|
|||||||
required_providers {
|
required_providers {
|
||||||
authentik = {
|
authentik = {
|
||||||
source = "goauthentik/authentik"
|
source = "goauthentik/authentik"
|
||||||
version = "2025.8.1"
|
version = "2025.12.1"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -77,46 +77,8 @@ EOT
|
|||||||
create_group = true
|
create_group = true
|
||||||
access_groups = ["admins"]
|
access_groups = ["admins"]
|
||||||
}
|
}
|
||||||
# Tools applications
|
|
||||||
"vpn" = {
|
|
||||||
name = "VPN"
|
|
||||||
slug = "vpn"
|
|
||||||
group = "Tools"
|
|
||||||
external_host = "https://of.hexor.cy"
|
|
||||||
internal_host = "http://outfleet.vpn.svc"
|
|
||||||
internal_host_ssl_validation = false
|
|
||||||
meta_description = ""
|
|
||||||
skip_path_regex = <<-EOT
|
|
||||||
/u/
|
|
||||||
/stat/
|
|
||||||
/ss/
|
|
||||||
/xray/
|
|
||||||
/dynamic/
|
|
||||||
EOT
|
|
||||||
meta_icon = "https://img.icons8.com/?size=100&id=fqAD3lAB6zTe&format=png&color=000000"
|
|
||||||
mode = "proxy"
|
|
||||||
outpost = "kubernetes-outpost"
|
|
||||||
create_group = true
|
|
||||||
access_groups = ["admins"]
|
|
||||||
}
|
|
||||||
|
|
||||||
"outfleet-rs" = {
|
# Tools applications
|
||||||
name = "OutFleet"
|
|
||||||
slug = "outfleet-rs"
|
|
||||||
group = "Tools"
|
|
||||||
external_host = "https://vpn.hexor.cy"
|
|
||||||
internal_host = "http://outfleet-rs.vpn.svc"
|
|
||||||
internal_host_ssl_validation = false
|
|
||||||
meta_description = ""
|
|
||||||
skip_path_regex = <<-EOT
|
|
||||||
/sub/
|
|
||||||
EOT
|
|
||||||
meta_icon = "https://img.icons8.com/?size=100&id=fqAD3lAB6zTe&format=png&color=000000"
|
|
||||||
mode = "proxy"
|
|
||||||
outpost = "kubernetes-outpost"
|
|
||||||
create_group = true
|
|
||||||
access_groups = ["admins"]
|
|
||||||
}
|
|
||||||
"qbittorrent" = {
|
"qbittorrent" = {
|
||||||
name = "qBittorent"
|
name = "qBittorent"
|
||||||
slug = "qbittorent"
|
slug = "qbittorent"
|
||||||
@@ -189,7 +151,7 @@ EOT
|
|||||||
meta_icon = "https://img.icons8.com/liquid-glass/48/key.png"
|
meta_icon = "https://img.icons8.com/liquid-glass/48/key.png"
|
||||||
mode = "proxy"
|
mode = "proxy"
|
||||||
outpost = "kubernetes-outpost"
|
outpost = "kubernetes-outpost"
|
||||||
access_groups = ["admins", "khm"] # Используем существующие группы
|
access_groups = ["admins", "khm"]
|
||||||
create_group = true
|
create_group = true
|
||||||
access_groups = ["admins"]
|
access_groups = ["admins"]
|
||||||
}
|
}
|
||||||
@@ -229,5 +191,20 @@ EOT
|
|||||||
create_group = true
|
create_group = true
|
||||||
access_groups = ["admins"]
|
access_groups = ["admins"]
|
||||||
}
|
}
|
||||||
|
"ollama-public" = {
|
||||||
|
name = "Ollama Public"
|
||||||
|
slug = "ollama-public"
|
||||||
|
group = "AI"
|
||||||
|
external_host = "https://ollama.hexor.cy"
|
||||||
|
internal_host = "http://ollama.ollama.svc:11434"
|
||||||
|
internal_host_ssl_validation = false
|
||||||
|
meta_description = ""
|
||||||
|
meta_icon = "https://img.icons8.com/external-icongeek26-outline-icongeek26/64/external-llama-animal-head-icongeek26-outline-icongeek26.png"
|
||||||
|
mode = "proxy"
|
||||||
|
outpost = "kubernetes-outpost"
|
||||||
|
intercept_header_auth = true
|
||||||
|
create_group = true
|
||||||
|
access_groups = ["admins"]
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -4,7 +4,7 @@ variable "oauth_applications" {
|
|||||||
name = string
|
name = string
|
||||||
slug = string
|
slug = string
|
||||||
group = optional(string, "")
|
group = optional(string, "")
|
||||||
policy_engine_mode = optional(string, "all")
|
policy_engine_mode = optional(string, "any")
|
||||||
meta_description = optional(string, "")
|
meta_description = optional(string, "")
|
||||||
meta_launch_url = optional(string, "")
|
meta_launch_url = optional(string, "")
|
||||||
meta_icon = optional(string, "")
|
meta_icon = optional(string, "")
|
||||||
@@ -32,7 +32,7 @@ variable "proxy_applications" {
|
|||||||
name = string
|
name = string
|
||||||
slug = string
|
slug = string
|
||||||
group = optional(string, "")
|
group = optional(string, "")
|
||||||
policy_engine_mode = optional(string, "all")
|
policy_engine_mode = optional(string, "any")
|
||||||
meta_description = optional(string, "")
|
meta_description = optional(string, "")
|
||||||
meta_launch_url = optional(string, "")
|
meta_launch_url = optional(string, "")
|
||||||
meta_icon = optional(string, "")
|
meta_icon = optional(string, "")
|
||||||
@@ -60,7 +60,7 @@ variable "saml_applications" {
|
|||||||
name = string
|
name = string
|
||||||
slug = string
|
slug = string
|
||||||
group = optional(string, "")
|
group = optional(string, "")
|
||||||
policy_engine_mode = optional(string, "all")
|
policy_engine_mode = optional(string, "any")
|
||||||
meta_description = optional(string, "")
|
meta_description = optional(string, "")
|
||||||
meta_launch_url = optional(string, "")
|
meta_launch_url = optional(string, "")
|
||||||
meta_icon = optional(string, "")
|
meta_icon = optional(string, "")
|
||||||
@@ -95,7 +95,7 @@ variable "flows" {
|
|||||||
title = string
|
title = string
|
||||||
slug = string
|
slug = string
|
||||||
designation = string
|
designation = string
|
||||||
policy_engine_mode = optional(string, "all")
|
policy_engine_mode = optional(string, "any")
|
||||||
compatibility_mode = optional(bool, false)
|
compatibility_mode = optional(bool, false)
|
||||||
layout = optional(string, "stacked")
|
layout = optional(string, "stacked")
|
||||||
denied_action = optional(string, "message_continue")
|
denied_action = optional(string, "message_continue")
|
||||||
|
|||||||
Reference in New Issue
Block a user