Compare commits

..

4 Commits

Author SHA1 Message Date
Gitea Actions Bot 82ed1c6078 Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Failing after 4s
Generated by CI/CD workflow on 2026-05-04 17:24:32

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-04 17:24:32 +00:00
Ultradesu 0df274c0b2 Added oauth2 proxy
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 14s
Check with kubeconform / lint (push) Successful in 14s
Auto-update README / Generate README and Create MR (push) Successful in 12s
2026-05-04 18:24:04 +01:00
Ultradesu 658ec19ff1 Added oauth2 proxy
Check with kubeconform / lint (push) Successful in 14s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 19s
Auto-update README / Generate README and Create MR (push) Successful in 19s
2026-05-04 18:21:44 +01:00
Ultradesu eb27dcf65b Added oauth2 proxy
Check with kubeconform / lint (push) Successful in 15s
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 24s
Auto-update README / Generate README and Create MR (push) Successful in 35s
2026-05-04 18:19:41 +01:00
3 changed files with 45 additions and 16 deletions
+42 -1
View File
@@ -1,5 +1,41 @@
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80/oauth2/auth
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth-redirect
spec:
errors:
status:
- "401"
service:
name: oauth2-proxy-redirect
port: 80
query: /oauth2/sign_in?rd={url}
---
apiVersion: v1
kind: Service
metadata:
name: oauth2-proxy-redirect
spec:
type: ExternalName
externalName: oauth2-proxy.oauth2-proxy.svc.cluster.local
ports:
- port: 80
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: secret-reader
@@ -9,11 +45,16 @@ spec:
entryPoints:
- websecure
routes:
- match: Host(`secret-reader.hexor.cy`) && PathPrefix(`/oauth2/`)
kind: Rule
services:
- name: oauth2-proxy-redirect
port: 80
- match: Host(`secret-reader.hexor.cy`)
kind: Rule
middlewares:
- name: keycloak-auth
namespace: oauth2-proxy
- name: keycloak-auth-redirect
services:
- name: secret-reader
port: 80
-1
View File
@@ -4,7 +4,6 @@ kind: Kustomization
resources:
- app.yaml
- external-secrets.yaml
- middleware.yaml
helmCharts:
- name: oauth2-proxy
+3 -14
View File
@@ -1,14 +1,3 @@
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80/oauth2/auth
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
- Authorization
# Middleware is deployed per-namespace alongside each IngressRoute
# because Traefik does not allow cross-namespace middleware references.
# See k8s/apps/mtproxy/secret-reader-ingress.yaml for example.