Compare commits
12 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 2f912ac7b1 | |||
| 4240cd61ad | |||
| a9f9c29679 | |||
| 70bb07529f | |||
| a4f6f4b06e | |||
| 688a91d04f | |||
| 4212cdc26e | |||
| f33de7c78c | |||
| d0d76fcfd2 | |||
| ec649d8ffd | |||
| 84a3d1880b | |||
| 9956a87818 |
@@ -1,5 +1,5 @@
|
||||
---
|
||||
image: &image 'pasarguard/panel:v3.1.0'
|
||||
image: &image 'pasarguard/panel:v4.0.2'
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
|
||||
@@ -6,6 +6,8 @@ metadata:
|
||||
app: web-petting
|
||||
spec:
|
||||
replicas: 1
|
||||
strategy:
|
||||
type: Recreate
|
||||
selector:
|
||||
matchLabels:
|
||||
app: web-petting
|
||||
@@ -22,7 +24,7 @@ spec:
|
||||
claimName: web-petting-data
|
||||
containers:
|
||||
- name: web-petting
|
||||
image: ultradesu/web-petting:v0.1.1
|
||||
image: ultradesu/web-petting:latest
|
||||
imagePullPolicy: Always
|
||||
args:
|
||||
# - "tail"
|
||||
|
||||
@@ -20,8 +20,21 @@ spec:
|
||||
name: web-petting
|
||||
port:
|
||||
number: 80
|
||||
- host: xn--l1acako8eb.xn--p1ai
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: web-petting
|
||||
port:
|
||||
number: 80
|
||||
tls:
|
||||
- secretName: web-petting-tls
|
||||
hosts:
|
||||
- pet.hexor.cy
|
||||
- secretName: web-petting-murnyanya-tls
|
||||
hosts:
|
||||
- xn--l1acako8eb.xn--p1ai
|
||||
|
||||
|
||||
@@ -23,14 +23,22 @@ configs:
|
||||
admin.enabled: false
|
||||
statusbadge.enabled: true
|
||||
timeout.reconciliation: 60s
|
||||
oidc.config: |
|
||||
name: Keycloak
|
||||
issuer: https://auth.hexor.cy/auth/realms/hexor
|
||||
clientID: $oidc-creds:id
|
||||
clientSecret: $oidc-creds:secret
|
||||
requestedScopes: ["openid", "profile", "email", "offline_access"]
|
||||
requestedIDTokenClaims: {"groups": {"essential": true}}
|
||||
refreshTokenThreshold: 2m
|
||||
dex.config: |
|
||||
connectors:
|
||||
- type: oidc
|
||||
id: keycloak
|
||||
name: Keycloak
|
||||
config:
|
||||
issuer: https://auth.hexor.cy/auth/realms/hexor
|
||||
clientID: $oidc-creds:id
|
||||
clientSecret: $oidc-creds:secret
|
||||
insecureEnableGroups: true
|
||||
scopes:
|
||||
- openid
|
||||
- profile
|
||||
- email
|
||||
- offline_access
|
||||
getUserInfo: true
|
||||
rbac:
|
||||
create: true
|
||||
policy.default: ""
|
||||
@@ -64,7 +72,7 @@ dex:
|
||||
replicas: 1
|
||||
nodeSelector:
|
||||
<<: *nodeSelector
|
||||
enabled: false
|
||||
enabled: true
|
||||
|
||||
# Standard Redis disabled because Redis HA is enabled
|
||||
redis:
|
||||
|
||||
@@ -35,4 +35,6 @@ spec:
|
||||
dnsZones:
|
||||
- "*.hexor.cy"
|
||||
- "hexor.cy"
|
||||
- "*.xn--l1acako8eb.xn--p1ai"
|
||||
- "xn--l1acako8eb.xn--p1ai"
|
||||
|
||||
|
||||
@@ -167,9 +167,7 @@ resource "keycloak_openid_client_optional_scopes" "oauth2_app" {
|
||||
}
|
||||
|
||||
resource "keycloak_group" "oauth2_app" {
|
||||
for_each = {
|
||||
for k, v in var.oauth2_applications : k => v if length(v.allowed_groups) > 0
|
||||
}
|
||||
for_each = var.oauth2_applications
|
||||
|
||||
realm_id = keycloak_realm.hexor.id
|
||||
name = "app-${each.key}"
|
||||
|
||||
Reference in New Issue
Block a user