Compare commits

...

14 Commits

Author SHA1 Message Date
Gitea Actions Bot
096a004090 Auto-update README with current k8s applications
All checks were successful
Terraform / Terraform (pull_request) Successful in 31s
Generated by CI/CD workflow on 2026-03-16 12:26:59

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-03-16 12:26:59 +00:00
Ultradesu
56699cd2c6 Added matrix
All checks were successful
Check with kubeconform / lint (push) Successful in 15s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 17s
Auto-update README / Generate README and Create MR (push) Successful in 25s
2026-03-16 12:26:14 +00:00
Ultradesu
4feed32f94 Rotate furumi token
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 15s
Check with kubeconform / lint (push) Successful in 10s
Auto-update README / Generate README and Create MR (push) Successful in 18s
2026-03-16 11:55:11 +00:00
Ultradesu
9d67f443c3 Added matrix
All checks were successful
Check with kubeconform / lint (push) Successful in 7s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 12s
Auto-update README / Generate README and Create MR (push) Successful in 9s
2026-03-16 11:24:47 +00:00
ab
b12276072a Update terraform/authentik/oauth2-apps.auto.tfvars
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 14s
Terraform / Terraform (push) Successful in 33s
2026-03-16 11:06:16 +00:00
Ultradesu
04fc582912 Added matrix
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 8s
Check with kubeconform / lint (push) Successful in 11s
Auto-update README / Generate README and Create MR (push) Successful in 16s
2026-03-16 11:03:23 +00:00
Ultradesu
537ddf1a0c Added matrix
All checks were successful
Check with kubeconform / lint (push) Successful in 7s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Auto-update README / Generate README and Create MR (push) Successful in 8s
2026-03-16 10:55:35 +00:00
Ultradesu
b3149fcdc8 Added matrix
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 10s
Check with kubeconform / lint (push) Successful in 11s
Auto-update README / Generate README and Create MR (push) Successful in 18s
2026-03-16 10:53:37 +00:00
Ultradesu
b7b7b9a34c Added matrix
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 9s
Check with kubeconform / lint (push) Successful in 15s
Auto-update README / Generate README and Create MR (push) Successful in 17s
2026-03-16 10:49:15 +00:00
Ultradesu
647fabdd38 Added matrix
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 12s
Auto-update README / Generate README and Create MR (push) Successful in 21s
2026-03-16 10:40:54 +00:00
Ultradesu
e20453e6e6 Added matrix
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 8s
Check with kubeconform / lint (push) Successful in 11s
Auto-update README / Generate README and Create MR (push) Successful in 17s
2026-03-16 10:31:25 +00:00
Ultradesu
bd13badd0c Added matrix
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 10s
Check with kubeconform / lint (push) Successful in 13s
Auto-update README / Generate README and Create MR (push) Successful in 27s
2026-03-16 10:28:23 +00:00
ab
997b03120a Update terraform/authentik/oauth2-apps.auto.tfvars
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 17s
Terraform / Terraform (push) Successful in 30s
2026-03-16 10:22:18 +00:00
ab
1eca92d899 Update k8s/core/postgresql/external-secrets.yaml
All checks were successful
Check with kubeconform / lint (push) Successful in 14s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 17s
Auto-update README / Generate README and Create MR (push) Successful in 8s
2026-03-16 10:11:29 +00:00
8 changed files with 99 additions and 22 deletions

View File

@@ -16,6 +16,7 @@ ArgoCD homelab project
| **authentik** | [![authentik](https://ag.hexor.cy/api/badge?name=authentik&revision=true)](https://ag.hexor.cy/applications/argocd/authentik) |
| **cert-manager** | [![cert-manager](https://ag.hexor.cy/api/badge?name=cert-manager&revision=true)](https://ag.hexor.cy/applications/argocd/cert-manager) |
| **external-secrets** | [![external-secrets](https://ag.hexor.cy/api/badge?name=external-secrets&revision=true)](https://ag.hexor.cy/applications/argocd/external-secrets) |
| **gpu** | [![gpu](https://ag.hexor.cy/api/badge?name=gpu&revision=true)](https://ag.hexor.cy/applications/argocd/gpu) |
| **kube-system-custom** | [![kube-system-custom](https://ag.hexor.cy/api/badge?name=kube-system-custom&revision=true)](https://ag.hexor.cy/applications/argocd/kube-system-custom) |
| **kubernetes-dashboard** | [![kubernetes-dashboard](https://ag.hexor.cy/api/badge?name=kubernetes-dashboard&revision=true)](https://ag.hexor.cy/applications/argocd/kubernetes-dashboard) |
| **longhorn** | [![longhorn](https://ag.hexor.cy/api/badge?name=longhorn&revision=true)](https://ag.hexor.cy/applications/argocd/longhorn) |
@@ -37,6 +38,8 @@ ArgoCD homelab project
| Application | Status |
| :--- | :---: |
| **comfyui** | [![comfyui](https://ag.hexor.cy/api/badge?name=comfyui&revision=true)](https://ag.hexor.cy/applications/argocd/comfyui) |
| **furumi-server** | [![furumi-server](https://ag.hexor.cy/api/badge?name=furumi-server&revision=true)](https://ag.hexor.cy/applications/argocd/furumi-server) |
| **gitea** | [![gitea](https://ag.hexor.cy/api/badge?name=gitea&revision=true)](https://ag.hexor.cy/applications/argocd/gitea) |
| **greece-notifier** | [![greece-notifier](https://ag.hexor.cy/api/badge?name=greece-notifier&revision=true)](https://ag.hexor.cy/applications/argocd/greece-notifier) |
| **hexound** | [![hexound](https://ag.hexor.cy/api/badge?name=hexound&revision=true)](https://ag.hexor.cy/applications/argocd/hexound) |
@@ -45,6 +48,9 @@ ArgoCD homelab project
| **jellyfin** | [![jellyfin](https://ag.hexor.cy/api/badge?name=jellyfin&revision=true)](https://ag.hexor.cy/applications/argocd/jellyfin) |
| **k8s-secrets** | [![k8s-secrets](https://ag.hexor.cy/api/badge?name=k8s-secrets&revision=true)](https://ag.hexor.cy/applications/argocd/k8s-secrets) |
| **khm** | [![khm](https://ag.hexor.cy/api/badge?name=khm&revision=true)](https://ag.hexor.cy/applications/argocd/khm) |
| **lidarr** | [![lidarr](https://ag.hexor.cy/api/badge?name=lidarr&revision=true)](https://ag.hexor.cy/applications/argocd/lidarr) |
| **matrix** | [![matrix](https://ag.hexor.cy/api/badge?name=matrix&revision=true)](https://ag.hexor.cy/applications/argocd/matrix) |
| **mtproxy** | [![mtproxy](https://ag.hexor.cy/api/badge?name=mtproxy&revision=true)](https://ag.hexor.cy/applications/argocd/mtproxy) |
| **n8n** | [![n8n](https://ag.hexor.cy/api/badge?name=n8n&revision=true)](https://ag.hexor.cy/applications/argocd/n8n) |
| **ollama** | [![ollama](https://ag.hexor.cy/api/badge?name=ollama&revision=true)](https://ag.hexor.cy/applications/argocd/ollama) |
| **paperless** | [![paperless](https://ag.hexor.cy/api/badge?name=paperless&revision=true)](https://ag.hexor.cy/applications/argocd/paperless) |

View File

@@ -22,7 +22,10 @@ spec:
imagePullPolicy: Always
env:
- name: FURUMI_TOKEN
value: "f38387266e75effe891b7953eb9c06b4"
valueFrom:
secretKeyRef:
name: furumi-ng-token
key: TOKEN
- name: FURUMI_ROOT
value: "/media"
ports:

View File

@@ -0,0 +1,23 @@
---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: furumi-ng-token
spec:
target:
name: furumi-ng-token
deletionPolicy: Delete
template:
type: Opaque
data:
TOKEN: |-
{{ .token }}
data:
- secretKey: token
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: b8b8c3a2-c3fe-42d3-9402-0ae305e1455f
property: fields[0].value

View File

@@ -6,3 +6,4 @@ resources:
- deployment.yaml
- service.yaml
- servicemonitor.yaml
- external-secrets.yaml

View File

@@ -21,16 +21,22 @@ spec:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: CHANGE_ME
property: CHANGE_ME
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[14].value
- secretKey: mas_db_password
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: CHANGE_ME
property: CHANGE_ME
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[15].value
---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
@@ -46,16 +52,17 @@ spec:
mas-oidc.yaml: |
upstream_oauth2:
providers:
- id: authentik
- id: 001KKV4EKY7KG98W2M9T806K6A
human_name: Authentik
issuer: https://idm.hexor.cy/application/o/matrix/
client_id: {{ .oauth_client_id }}
client_secret: {{ .oauth_client_secret }}
client_id: "{{ .oauth_client_id }}"
client_secret: "{{ .oauth_client_secret }}"
token_endpoint_auth_method: client_secret_post
scope: "openid profile email"
claims_imports:
localpart:
action: require
template: "{{ `{{ user.preferred_username }}` }}"
action: suggest
template: "{{ `{{ user.preferred_username | split(\"@\") | first }}` }}"
displayname:
action: suggest
template: "{{ `{{ user.name }}` }}"
@@ -70,13 +77,19 @@ spec:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: CHANGE_ME
property: CHANGE_ME
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: ca76867f-49f3-4a30-9ef3-b05af35ee49a
property: fields[0].value
- secretKey: oauth_client_secret
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
key: CHANGE_ME
property: CHANGE_ME
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: ca76867f-49f3-4a30-9ef3-b05af35ee49a
property: fields[1].value

View File

@@ -20,12 +20,12 @@ matrixRTC:
enabled: false
hookshot:
enabled: false
haproxy:
enabled: false
## Synapse homeserver
synapse:
enabled: true
ingress:
host: matrix.hexor.cy
postgres:
host: psql.psql.svc
port: 5432
@@ -35,6 +35,11 @@ synapse:
password:
secret: matrix-postgres-creds
secretKey: synapse_db_password
additional:
0-unsafe-locale:
config: |
database:
allow_unsafe_locale: true
media:
storage:
size: 20Gi
@@ -45,6 +50,8 @@ synapse:
## Matrix Authentication Service
matrixAuthenticationService:
enabled: true
ingress:
host: auth.matrix.hexor.cy
postgres:
host: psql.psql.svc
port: 5432
@@ -54,9 +61,15 @@ matrixAuthenticationService:
password:
secret: matrix-postgres-creds
secretKey: mas_db_password
## Authentik OIDC upstream provider
## Admin policy
additional:
0-oidc:
0-admin-policy:
config: |
policy:
data:
admin_users:
- username: ultradesu
1-oidc:
configSecret: matrix-oidc-config
configSecretKey: mas-oidc.yaml
# nodeSelector:
@@ -78,8 +91,6 @@ elementAdmin:
# nodeSelector:
# kubernetes.io/hostname: nas.homenet
## Well-known delegation on the base domain
## Well-known delegation on the base domain (host is derived from serverName)
wellKnownDelegation:
enabled: true
ingress:
host: matrix.hexor.cy

View File

@@ -129,7 +129,7 @@ spec:
{{ .n8n }}
USER_synapse: |-
{{ .synapse }}
USER_mas: |-
USER_mas: |-
{{ .mas }}
data:
- secretKey: authentik

View File

@@ -188,5 +188,25 @@ oauth_applications = {
create_group = true
signing_key = "1b1b5bec-034a-4d96-871a-133f11322360"
}
"matrix" = {
name = "Matrix Chat"
slug = "matrix"
group = "Tools"
meta_description = "Matrix Chat"
meta_icon = "https://img.icons8.com/ios/100/40C057/matrix-logo.png"
redirect_uris = [
"https://auth.matrix.hexor.cy/upstream/callback/001KKV4EKY7KG98W2M9T806K6A",
]
meta_launch_url = "https://matrix.hexor.cy"
client_type = "confidential"
include_claims_in_id_token = true
access_code_validity = "minutes=1"
access_token_validity = "minutes=5"
refresh_token_validity = "days=30"
scope_mappings = ["openid", "profile", "email"]
access_groups = []
create_group = true
signing_key = "1b1b5bec-034a-4d96-871a-133f11322360"
}
}