Add authentik as kustomize
This commit is contained in:
parent
b6e0381cd2
commit
a3852b611c
5 changed files with 229 additions and 0 deletions
112
namespaces/auth/authentik/kustomization.yaml
Normal file
112
namespaces/auth/authentik/kustomization.yaml
Normal file
|
@ -0,0 +1,112 @@
|
|||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
|
||||
transformers:
|
||||
- |-
|
||||
apiVersion: builtin
|
||||
kind: NamespaceTransformer
|
||||
metadata:
|
||||
name: notImportantHere
|
||||
namespace: auth
|
||||
unsetOnly: true
|
||||
|
||||
namePrefix: authentik-
|
||||
resources:
|
||||
- ../../../kustomize/helmchart
|
||||
|
||||
patches:
|
||||
- path: patches/chart.yaml
|
||||
target:
|
||||
kind: HelmChart
|
||||
name: chart
|
||||
# - path: patches/httproute.yaml
|
||||
# target:
|
||||
# kind: HTTPRoute
|
||||
|
||||
labels:
|
||||
- includeSelectors: true
|
||||
pairs:
|
||||
app.kubernetes.io/appName: authentik
|
||||
- pairs:
|
||||
app.kubernetes.io/appNamespace: auth
|
||||
- pairs:
|
||||
app.kubernetes.io/chartServiceName: authentik-chart-server
|
||||
- pairs:
|
||||
app.kubernetes.io/routePrefix: auth
|
||||
|
||||
replacements:
|
||||
# Update secrets
|
||||
- source:
|
||||
kind: HelmChart
|
||||
name: chart
|
||||
fieldPath: metadata.labels.[app.kubernetes.io/appName]
|
||||
targets:
|
||||
- select:
|
||||
kind: InfisicalSecret
|
||||
options:
|
||||
create: true
|
||||
delimiter: "-"
|
||||
index: 0
|
||||
fieldPaths:
|
||||
- spec.managedSecretReference.secretName
|
||||
- select:
|
||||
kind: InfisicalSecret
|
||||
options:
|
||||
create: true
|
||||
delimiter: "/"
|
||||
index: 2
|
||||
fieldPaths:
|
||||
- spec.authentication.universalAuth.secretsScope.secretsPath
|
||||
- source:
|
||||
kind: HelmChart
|
||||
name: chart
|
||||
fieldPath: metadata.labels.[app.kubernetes.io/appNamespace]
|
||||
targets:
|
||||
- select:
|
||||
kind: InfisicalSecret
|
||||
options:
|
||||
create: true
|
||||
delimiter: "/"
|
||||
index: 1
|
||||
fieldPaths:
|
||||
- spec.authentication.universalAuth.secretsScope.secretsPath
|
||||
- select:
|
||||
kind: InfisicalSecret
|
||||
fieldPaths:
|
||||
- spec.managedSecretReference.secretNamespace
|
||||
# HTTPRoute
|
||||
- source:
|
||||
kind: HelmChart
|
||||
name: chart
|
||||
fieldPath: metadata.labels.[app.kubernetes.io/appName]
|
||||
targets:
|
||||
- select:
|
||||
kind: HTTPRoute
|
||||
options:
|
||||
create: true
|
||||
delimiter: "."
|
||||
index: 0
|
||||
fieldPaths:
|
||||
- spec.hostnames.0
|
||||
- source:
|
||||
kind: HelmChart
|
||||
name: chart
|
||||
fieldPath: metadata.labels.[app.kubernetes.io/chartServiceName]
|
||||
targets:
|
||||
- select:
|
||||
kind: HTTPRoute
|
||||
fieldPaths:
|
||||
- spec.rules.0.backendRefs.0.name
|
||||
- source:
|
||||
kind: HTTPRoute
|
||||
name: http
|
||||
fieldPath: metadata.labels.[app.kubernetes.io/routePrefix]
|
||||
targets:
|
||||
- select:
|
||||
kind: HTTPRoute
|
||||
options:
|
||||
create: true
|
||||
delimiter: "."
|
||||
index: 0
|
||||
fieldPaths:
|
||||
- spec.hostnames.0
|
66
namespaces/auth/authentik/patches/chart.yaml
Normal file
66
namespaces/auth/authentik/patches/chart.yaml
Normal file
|
@ -0,0 +1,66 @@
|
|||
apiVersion: helm.cattle.io/v1
|
||||
kind: HelmChart
|
||||
metadata:
|
||||
name: chart
|
||||
spec:
|
||||
chart: authentik
|
||||
repo: https://charts.goauthentik.io
|
||||
targetNamespace: auth
|
||||
createNamespace: true
|
||||
valuesContent: |-
|
||||
authentik:
|
||||
secret_key: "file:///auth-secrets/SECRET-KEY"
|
||||
postgresql:
|
||||
host: postgres-svc.core.svc.cluster.local
|
||||
port: 5432
|
||||
user: authentik # Using default directly
|
||||
password: file:///auth-secrets/DB-PASSWORD
|
||||
database: authentik
|
||||
redis:
|
||||
host: redis-svc.core.svc.cluster.local
|
||||
db: 15
|
||||
email:
|
||||
from: homelab@leechpepin.com
|
||||
host: blizzard.mxrouting.net
|
||||
port: 465
|
||||
use_ssl: true
|
||||
username: homelab@leechpepin.com
|
||||
password: file:///smtp-secrets/SMTP_PASSWORD
|
||||
|
||||
postgresql:
|
||||
enabled: false
|
||||
redis:
|
||||
enabled: false
|
||||
|
||||
server:
|
||||
service:
|
||||
type: NodePort
|
||||
volumes:
|
||||
- name: auth-secrets
|
||||
secret:
|
||||
secretName: authentik-secrets
|
||||
- name: smtp-secrets
|
||||
secret:
|
||||
secretName: smtp-secrets
|
||||
volumeMounts:
|
||||
- name: auth-secrets
|
||||
mountPath: /auth-secrets
|
||||
readOnly: true
|
||||
- name: smtp-secrets
|
||||
mountPath: /smtp-secrets
|
||||
readOnly: true
|
||||
worker:
|
||||
volumes:
|
||||
- name: auth-secrets
|
||||
secret:
|
||||
secretName: authentik-secrets
|
||||
- name: smtp-secrets
|
||||
secret:
|
||||
secretName: smtp-secrets
|
||||
volumeMounts:
|
||||
- name: auth-secrets
|
||||
mountPath: /auth-secrets
|
||||
readOnly: true
|
||||
- name: smtp-secrets
|
||||
mountPath: /smtp-secrets
|
||||
readOnly: true
|
16
namespaces/auth/authentik/patches/httproute.yaml
Normal file
16
namespaces/auth/authentik/patches/httproute.yaml
Normal file
|
@ -0,0 +1,16 @@
|
|||
apiVersion: gateway.networking.k8s.io/v1
|
||||
kind: HTTPRoute
|
||||
metadata:
|
||||
name: http
|
||||
spec:
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: authentik-chart-server
|
||||
port: 80
|
||||
namespace: auth
|
||||
filters:
|
||||
- requestHeaderModifier:
|
||||
set:
|
||||
- name: X-Forwarded-Proto
|
||||
value: https
|
||||
type: RequestHeaderModifier
|
7
namespaces/auth/kustomization.yaml
Normal file
7
namespaces/auth/kustomization.yaml
Normal file
|
@ -0,0 +1,7 @@
|
|||
apiVersion: kustomize.config.k8s.io/v1beta1
|
||||
kind: Kustomization
|
||||
|
||||
resources:
|
||||
- namespace.yaml
|
||||
- smtp-secrets.yaml
|
||||
- authentik/
|
28
namespaces/auth/smtp-secrets.yaml
Normal file
28
namespaces/auth/smtp-secrets.yaml
Normal file
|
@ -0,0 +1,28 @@
|
|||
---
|
||||
apiVersion: secrets.infisical.com/v1alpha1
|
||||
kind: InfisicalSecret
|
||||
metadata:
|
||||
name: smtp-secrets-auth
|
||||
namespace: infisical
|
||||
labels:
|
||||
label-to-be-passed-to-managed-secret: homelab
|
||||
annotations:
|
||||
example.com/annotation-to-be-passed-to-managed-secret: "homelab"
|
||||
spec:
|
||||
hostAPI: https://app.infisical.com/api
|
||||
resyncInterval: 10
|
||||
authentication:
|
||||
# Universal Auth
|
||||
universalAuth:
|
||||
secretsScope:
|
||||
projectSlug: homelab-n-f-yj
|
||||
envSlug: prod
|
||||
secretsPath: "/" # Root is "/"
|
||||
recursive: false # Whether or not to use recursive mode (Fetches all secrets in an environment from a given secret path, and all folders inside the path) / defaults to false
|
||||
credentialsRef:
|
||||
secretName: universal-auth-credentials
|
||||
secretNamespace: infisical
|
||||
managedSecretReference:
|
||||
secretName: smtp-secrets
|
||||
secretNamespace: auth
|
||||
creationPolicy: "Orphan" ## Owner | Orphan
|
Loading…
Add table
Reference in a new issue