Compare commits

..

3 Commits

Author SHA1 Message Date
Gitea Actions Bot e91d34ee64 Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Failing after 4s
Generated by CI/CD workflow on 2026-05-04 16:20:46

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-04 16:20:46 +00:00
ab 8e2c4f54c4 Update k8s/core/postgresql/external-secrets.yaml
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 15s
Check with kubeconform / lint (push) Successful in 16s
Auto-update README / Generate README and Create MR (push) Successful in 14s
2026-05-04 16:20:18 +00:00
Ultradesu 7a0c536ecc Added kanidm
Check with kubeconform / lint (push) Successful in 14s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 16s
Auto-update README / Generate README and Create MR (push) Successful in 11s
2026-05-04 17:09:49 +01:00
2 changed files with 26 additions and 20 deletions
+13 -19
View File
@@ -1,26 +1,20 @@
--- ---
apiVersion: networking.k8s.io/v1 apiVersion: traefik.io/v1alpha1
kind: Ingress kind: IngressRoute
metadata: metadata:
name: kanidm name: kanidm
annotations: annotations:
cert-manager.io/cluster-issuer: letsencrypt cert-manager.io/cluster-issuer: letsencrypt
traefik.ingress.kubernetes.io/router.middlewares: kube-system-https-redirect@kubernetescrd
traefik.ingress.kubernetes.io/service.serversscheme: https
traefik.ingress.kubernetes.io/service.serverstransport: kanidm-kanidm-transport@kubernetescrd
spec: spec:
entryPoints:
- websecure
routes:
- match: Host(`auth.hexor.cy`)
kind: Rule
services:
- name: kanidm
port: 443
scheme: https
serversTransport: kanidm-transport
tls: tls:
- hosts: secretName: kanidm-ingress-tls
- auth.hexor.cy
secretName: kanidm-ingress-tls
rules:
- host: auth.hexor.cy
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: kanidm
port:
number: 443
+13 -1
View File
@@ -135,6 +135,8 @@ spec:
{{ .furumi }} {{ .furumi }}
USER_furumi_dev: |- USER_furumi_dev: |-
{{ .furumi_dev }} {{ .furumi_dev }}
USER_keycloak: |-
{{ .keycloak }}
data: data:
- secretKey: authentik - secretKey: authentik
sourceRef: sourceRef:
@@ -323,4 +325,14 @@ spec:
metadataPolicy: None metadataPolicy: None
key: 2a9deb39-ef22-433e-a1be-df1555625e22 key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[17].value property: fields[17].value
- secretKey: keycloak
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: 2a9deb39-ef22-433e-a1be-df1555625e22
property: fields[18].value