Compare commits

..

1 Commits

Author SHA1 Message Date
Gitea Actions Bot 742e8a5716 Auto-update README with current k8s applications
Terraform / Terraform (pull_request) Failing after 14s
Generated by CI/CD workflow on 2026-05-04 17:08:04

This PR updates the README.md file with the current list of applications found in the k8s/ directory structure.
2026-05-04 17:08:04 +00:00
5 changed files with 40 additions and 23 deletions
+1 -13
View File
@@ -1,18 +1,5 @@
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
---
apiVersion: traefik.io/v1alpha1
kind: IngressRoute
metadata:
name: secret-reader
@@ -26,6 +13,7 @@ spec:
kind: Rule
middlewares:
- name: keycloak-auth
namespace: oauth2-proxy
services:
- name: secret-reader
port: 80
+5 -5
View File
@@ -10,10 +10,10 @@ spec:
template:
type: Opaque
data:
client-id: oauth2-proxy
client-secret: |-
client_id: oauth2-proxy
client_secret: |-
{{ .client_secret }}
cookie-secret: |-
cookie_secret: |-
{{ .cookie_secret }}
data:
- secretKey: client_secret
@@ -25,7 +25,7 @@ spec:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: e62e8c4d-d538-43b2-a682-9cdf2a5a1165
key: PLACEHOLDER_VAULTWARDEN_ITEM_ID
property: login.password
- secretKey: cookie_secret
sourceRef:
@@ -36,5 +36,5 @@ spec:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: e62e8c4d-d538-43b2-a682-9cdf2a5a1165
key: PLACEHOLDER_VAULTWARDEN_ITEM_ID
property: fields[0].value
+2 -1
View File
@@ -4,11 +4,12 @@ kind: Kustomization
resources:
- app.yaml
- external-secrets.yaml
- middleware.yaml
helmCharts:
- name: oauth2-proxy
repo: https://oauth2-proxy.github.io/manifests
version: 10.4.3
version: 7.12.6
releaseName: oauth2-proxy
namespace: oauth2-proxy
valuesFile: values.yaml
+15 -3
View File
@@ -1,3 +1,15 @@
# Middleware is deployed per-namespace alongside each IngressRoute
# because Traefik does not allow cross-namespace middleware references.
# See k8s/apps/mtproxy/secret-reader-ingress.yaml for example.
---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: keycloak-auth
namespace: oauth2-proxy
spec:
forwardAuth:
address: http://oauth2-proxy.oauth2-proxy.svc:80/oauth2/auth
trustForwardHeader: true
authResponseHeaders:
- X-Auth-Request-User
- X-Auth-Request-Email
- X-Auth-Request-Groups
- Authorization
+17 -1
View File
@@ -1,7 +1,6 @@
replicaCount: 1
config:
existingSecret: oauth2-proxy-creds
configFile: |-
provider = "keycloak-oidc"
provider_display_name = "Keycloak"
@@ -22,6 +21,23 @@ config:
code_challenge_method = "S256"
scope = "openid profile email"
extraEnv:
- name: OAUTH2_PROXY_CLIENT_ID
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: client_id
- name: OAUTH2_PROXY_CLIENT_SECRET
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: client_secret
- name: OAUTH2_PROXY_COOKIE_SECRET
valueFrom:
secretKeyRef:
name: oauth2-proxy-creds
key: cookie_secret
ingress:
enabled: true
className: traefik