Initial commit
This commit is contained in:
6
.gitignore
vendored
Normal file
6
.gitignore
vendored
Normal file
@@ -0,0 +1,6 @@
|
||||
**/secrets/**
|
||||
manifests/**/*secret.yaml
|
||||
|
||||
|
||||
.gitattributes !filter !diff
|
||||
!*.md
|
||||
10
Readme.md
Normal file
10
Readme.md
Normal file
@@ -0,0 +1,10 @@
|
||||
# Инфраструктура сайта openvibes.ru
|
||||
|
||||
На данный момент на поддоменах развернуты сервисы:
|
||||
|
||||
- [git.openvibes.ru](./manifests/apps/gitea/helm/)
|
||||
- [pm.openvibes.ru](./manifests/apps/planka/)
|
||||
- [dbadmin.openvibes.ru](./manifests/apps/adminer/)
|
||||
- [warden.openvibes.ru](./manifests/apps/vaultwarden/)
|
||||
|
||||
Как оркестратор используется k3s.
|
||||
1
apps/smtprelay/.gitignore
vendored
Normal file
1
apps/smtprelay/.gitignore
vendored
Normal file
@@ -0,0 +1 @@
|
||||
smtprelay
|
||||
32
apps/smtprelay/README.md
Normal file
32
apps/smtprelay/README.md
Normal file
@@ -0,0 +1,32 @@
|
||||
# smtprelay
|
||||
|
||||
[](https://goreportcard.com/report/github.com/decke/smtprelay)
|
||||
|
||||
Simple Golang based SMTP relay/proxy server that accepts mail via SMTP
|
||||
and forwards it directly to another SMTP server.
|
||||
|
||||
|
||||
## Why another SMTP server?
|
||||
|
||||
Outgoing mails are usually send via SMTP to an MTA (Mail Transfer Agent)
|
||||
which is one of Postfix, Exim, Sendmail or OpenSMTPD on UNIX/Linux in most
|
||||
cases. You really don't want to setup and maintain any of those full blown
|
||||
kitchensinks yourself because they are complex, fragile and hard to
|
||||
configure.
|
||||
|
||||
My use case is simple. I need to send automatically generated mails from
|
||||
cron via msmtp/sSMTP/dma, mails from various services and network printers
|
||||
via a remote SMTP server without giving away my mail credentials to each
|
||||
device which produces mail.
|
||||
|
||||
|
||||
## Main features
|
||||
|
||||
* Simple configuration with ini file .env file or environment variables
|
||||
* Supports SMTPS/TLS (465), STARTTLS (587) and unencrypted SMTP (25)
|
||||
* Checks for sender, receiver, client IP
|
||||
* Authentication support with file (LOGIN, PLAIN)
|
||||
* Enforce encryption for authentication
|
||||
* Forwards all mail to a smarthost (any SMTP server)
|
||||
* Small codebase
|
||||
* IPv6 support
|
||||
11
apps/smtprelay/smtp-relay.service
Normal file
11
apps/smtprelay/smtp-relay.service
Normal file
@@ -0,0 +1,11 @@
|
||||
[Unit]
|
||||
Description=Smtp relay Service
|
||||
After=network.target
|
||||
|
||||
[Service]
|
||||
ExecStart=/var/deploy/apps/smtprelay/smtprelay -config /var/deploy/apps/smtprelay/secrets/smtprelay.ini
|
||||
Restart=always
|
||||
User=root
|
||||
|
||||
[Install]
|
||||
WantedBy=multi-user.target
|
||||
27
manifests/apps/adminer/deployment.yaml
Normal file
27
manifests/apps/adminer/deployment.yaml
Normal file
@@ -0,0 +1,27 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: adminer
|
||||
labels:
|
||||
app: adminer
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: adminer
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: adminer
|
||||
spec:
|
||||
containers:
|
||||
- name: adminer
|
||||
image: docker.io/library/adminer:5.2.1
|
||||
ports:
|
||||
- containerPort: 8080
|
||||
resources:
|
||||
requests:
|
||||
cpu: "0.1"
|
||||
memory: 50Mi
|
||||
limits:
|
||||
cpu: "0.1"
|
||||
memory: 100Mi
|
||||
13
manifests/apps/adminer/service.yaml
Normal file
13
manifests/apps/adminer/service.yaml
Normal file
@@ -0,0 +1,13 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: adminer-service
|
||||
spec:
|
||||
selector:
|
||||
app: adminer
|
||||
type: ClusterIP
|
||||
ports:
|
||||
- name: adminer
|
||||
protocol: TCP
|
||||
port: 80
|
||||
targetPort: 8080
|
||||
5
manifests/apps/gitea/helm/install.md
Normal file
5
manifests/apps/gitea/helm/install.md
Normal file
@@ -0,0 +1,5 @@
|
||||
```sh
|
||||
kubectl apply -f admin-secret.yaml,db-secret.yaml
|
||||
helm repo add gitea-charts https://dl.gitea.com/charts/
|
||||
helm repo update
|
||||
```
|
||||
131
manifests/apps/gitea/helm/values.yaml
Normal file
131
manifests/apps/gitea/helm/values.yaml
Normal file
@@ -0,0 +1,131 @@
|
||||
replicaCount: 1
|
||||
|
||||
strategy:
|
||||
type: RollingUpdate
|
||||
rollingUpdate:
|
||||
maxSurge: 1
|
||||
maxUnavailable: 0
|
||||
|
||||
image:
|
||||
registry: docker.gitea.com
|
||||
repository: gitea
|
||||
tag: "1.21.11"
|
||||
pullPolicy: IfNotPresent
|
||||
rootless: true
|
||||
|
||||
ingress:
|
||||
enabled: false
|
||||
|
||||
service:
|
||||
http:
|
||||
type: ClusterIP
|
||||
targetPort: 3000
|
||||
port: 3000
|
||||
|
||||
annotations: {}
|
||||
|
||||
gitea:
|
||||
admin:
|
||||
existingSecret: "gitea-admin-secret"
|
||||
email: "vloldik@openvibes.ru"
|
||||
passwordMode: initialOnlyRequireReset
|
||||
config:
|
||||
server:
|
||||
ROOT_URL: "https://git.openvibes.ru/"
|
||||
DOMAIN: "git.openvibes.ru"
|
||||
SSH_DOMAIN: "git.openvibes.ru"
|
||||
|
||||
APP_NAME: "Openvibes Git"
|
||||
service:
|
||||
DISABLE_REGISTRATION: true
|
||||
REQUIRE_SIGNIN_VIEW: false
|
||||
repository:
|
||||
ENABLE_PUSH_CREATE_USER: true
|
||||
ENABLE_PUSH_CREATE_ORG: true
|
||||
|
||||
database:
|
||||
DB_TYPE: postgres
|
||||
HOST: "postgres-service-headless:5432"
|
||||
NAME: "gitea"
|
||||
USER: "gitea"
|
||||
security:
|
||||
INSTALL_LOCK: true
|
||||
PASSWORD_COMPLEXITY: "medium"
|
||||
MIN_PASSWORD_LENGTH: 8
|
||||
|
||||
log:
|
||||
ROOT_PATH: /data/gitea/log
|
||||
LEVEL: Info
|
||||
|
||||
mailer:
|
||||
ENABLED: true
|
||||
FORCE_TRUST_SERVER_CERT: true
|
||||
FROM: gitea@mail.openvibes.ru
|
||||
PROTOCOL: smtps
|
||||
ENVELOPE_FROM: gitea@mail.openvibes.ru
|
||||
|
||||
additionalConfigFromEnvs:
|
||||
- name: GITEA__DATABASE__PASSWD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: "gitea-db-secret"
|
||||
key: "db-password"
|
||||
- name: GITEA__MAILER__SMTP_ADDR
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: "gitea-mailer-secret"
|
||||
key: "smtp-server"
|
||||
- name: GITEA__MAILER__SMTP_PORT
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: "gitea-mailer-secret"
|
||||
key: "smtp-port"
|
||||
- name: GITEA__MAILER__USER
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: "gitea-mailer-secret"
|
||||
key: "smtp-login"
|
||||
- name: GITEA__MAILER__PASSWD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: "gitea-mailer-secret"
|
||||
key: "smtp-password"
|
||||
|
||||
metrics:
|
||||
enabled: true
|
||||
serviceMonitor:
|
||||
enabled: false
|
||||
|
||||
persistence:
|
||||
enabled: true
|
||||
storageClass: "local-path"
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
size: 20Gi
|
||||
|
||||
deployment:
|
||||
resources:
|
||||
requests:
|
||||
cpu: 500m
|
||||
memory: 1Gi
|
||||
limits:
|
||||
cpu: 2
|
||||
memory: 2Gi
|
||||
|
||||
postgresql:
|
||||
enabled: false
|
||||
postgresql-ha:
|
||||
enabled: false
|
||||
|
||||
valkey:
|
||||
enabled: true
|
||||
|
||||
valkey-cluster:
|
||||
enabled: false
|
||||
|
||||
redis:
|
||||
enabled: true
|
||||
|
||||
|
||||
redis-cluster:
|
||||
enabled: false
|
||||
12
manifests/apps/planka/configmap.yaml
Normal file
12
manifests/apps/planka/configmap.yaml
Normal file
@@ -0,0 +1,12 @@
|
||||
kind: ConfigMap
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
name: planka-env
|
||||
data:
|
||||
BASE_URL: https://pm.openvibes.ru
|
||||
TOKEN_EXPIRES_IN: "7"
|
||||
DEFAULT_ADMIN_NAME: Vladislav
|
||||
DEFAULT_ADMIN_USERNAME: vlad
|
||||
DEFAULT_ADMIN_EMAIL: admin@openvibes.ru
|
||||
SMTP_FROM: Planka Service <planka@mail.openvibes.ru>
|
||||
SMTP_TLS_REJECT_UNAUTHORIZED: "false"
|
||||
68
manifests/apps/planka/deployment.yaml
Normal file
68
manifests/apps/planka/deployment.yaml
Normal file
@@ -0,0 +1,68 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: planka
|
||||
labels:
|
||||
app: planka
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: planka
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: planka
|
||||
spec:
|
||||
containers:
|
||||
- name: planka
|
||||
image: ghcr.io/plankanban/planka:1.26.1
|
||||
resources:
|
||||
requests:
|
||||
cpu: 50m
|
||||
memory: 100Mi
|
||||
limits:
|
||||
cpu: 300m
|
||||
memory: 500Mi
|
||||
env:
|
||||
- name: DATABASE_URL
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: planka-secrets
|
||||
key: database-url
|
||||
- name: DEFAULT_ADMIN_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: planka-secrets
|
||||
key: default-admin-password
|
||||
- name: SECRET_KEY
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: planka-secrets
|
||||
key: secret-key
|
||||
envFrom:
|
||||
- configMapRef:
|
||||
name: planka-env
|
||||
- secretRef:
|
||||
name: planka-mail-secret
|
||||
ports:
|
||||
- containerPort: 1337
|
||||
name: planka
|
||||
volumeMounts:
|
||||
- name: user-avatars
|
||||
mountPath: /app/public/user-avatars
|
||||
- name: background-images
|
||||
mountPath: /app/public/project-background-images
|
||||
- name: attachments
|
||||
mountPath: /app/private/attachments
|
||||
|
||||
volumes:
|
||||
- name: user-avatars
|
||||
persistentVolumeClaim:
|
||||
claimName: planka-user-avatars
|
||||
- name: background-images
|
||||
persistentVolumeClaim:
|
||||
claimName: planka-background-images
|
||||
- name: attachments
|
||||
persistentVolumeClaim:
|
||||
claimName: planka-attachments
|
||||
restartPolicy: Always
|
||||
11
manifests/apps/planka/pvc-attachments.yaml
Normal file
11
manifests/apps/planka/pvc-attachments.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
apiVersion: v1
|
||||
kind: PersistentVolumeClaim
|
||||
metadata:
|
||||
name: planka-attachments
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
storageClassName: local-path
|
||||
resources:
|
||||
requests:
|
||||
storage: 1Gi
|
||||
11
manifests/apps/planka/pvc-bg-images.yaml
Normal file
11
manifests/apps/planka/pvc-bg-images.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
apiVersion: v1
|
||||
kind: PersistentVolumeClaim
|
||||
metadata:
|
||||
name: planka-background-images
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
storageClassName: local-path
|
||||
resources:
|
||||
requests:
|
||||
storage: 1Gi
|
||||
11
manifests/apps/planka/pvc-user-avatars.yaml
Normal file
11
manifests/apps/planka/pvc-user-avatars.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
apiVersion: v1
|
||||
kind: PersistentVolumeClaim
|
||||
metadata:
|
||||
name: planka-user-avatars
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
storageClassName: local-path
|
||||
resources:
|
||||
requests:
|
||||
storage: 1Gi
|
||||
14
manifests/apps/planka/service.yaml
Normal file
14
manifests/apps/planka/service.yaml
Normal file
@@ -0,0 +1,14 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: planka-service-headless
|
||||
spec:
|
||||
selector:
|
||||
app: planka
|
||||
type: ClusterIP
|
||||
clusterIP: None
|
||||
ports:
|
||||
- name: http
|
||||
protocol: TCP
|
||||
port: 80
|
||||
targetPort: 1337
|
||||
40
manifests/apps/postgres/deployment.yaml
Normal file
40
manifests/apps/postgres/deployment.yaml
Normal file
@@ -0,0 +1,40 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: postgres
|
||||
labels:
|
||||
app: postgres
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: postgres
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: postgres
|
||||
spec:
|
||||
containers:
|
||||
- name: postgres
|
||||
image: docker.io/library/postgres:16-alpine
|
||||
ports:
|
||||
- containerPort: 5432
|
||||
resources:
|
||||
requests:
|
||||
cpu: "0.1"
|
||||
memory: 100Mi
|
||||
limits:
|
||||
cpu: "0.5"
|
||||
memory: 1Gi
|
||||
env:
|
||||
- name: POSTGRES_PASSWORD
|
||||
valueFrom:
|
||||
secretKeyRef:
|
||||
name: postgres-secrets
|
||||
key: admin-password
|
||||
volumeMounts:
|
||||
- name: postgres-storage
|
||||
mountPath: /var/lib/postgresql/data
|
||||
volumes:
|
||||
- name: postgres-storage
|
||||
persistentVolumeClaim:
|
||||
claimName: postgres-pvc
|
||||
11
manifests/apps/postgres/pvc.yaml
Normal file
11
manifests/apps/postgres/pvc.yaml
Normal file
@@ -0,0 +1,11 @@
|
||||
apiVersion: v1
|
||||
kind: PersistentVolumeClaim
|
||||
metadata:
|
||||
name: postgres-pvc
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
storageClassName: local-path
|
||||
resources:
|
||||
requests:
|
||||
storage: 10Gi
|
||||
14
manifests/apps/postgres/service.yaml
Normal file
14
manifests/apps/postgres/service.yaml
Normal file
@@ -0,0 +1,14 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: postgres-service-headless
|
||||
spec:
|
||||
selector:
|
||||
app: postgres
|
||||
type: ClusterIP
|
||||
clusterIP: None
|
||||
ports:
|
||||
- name: postgres-service
|
||||
protocol: TCP
|
||||
port: 5432
|
||||
targetPort: 5432
|
||||
10
manifests/apps/vaultwarden/configmap.yaml
Normal file
10
manifests/apps/vaultwarden/configmap.yaml
Normal file
@@ -0,0 +1,10 @@
|
||||
kind: ConfigMap
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
labels:
|
||||
instance: vaultwarden
|
||||
name: vaultwarden-env
|
||||
data:
|
||||
SIGNUPS_ALLOWED: "false"
|
||||
DOMAIN: https://warden.openvibes.ru
|
||||
ROCKET_ADDRESS: '::'
|
||||
43
manifests/apps/vaultwarden/deploy.yaml
Normal file
43
manifests/apps/vaultwarden/deploy.yaml
Normal file
@@ -0,0 +1,43 @@
|
||||
apiVersion: apps/v1
|
||||
kind: Deployment
|
||||
metadata:
|
||||
name: vaultwarden
|
||||
labels:
|
||||
app: vaultwarden
|
||||
instance: vaultwarden
|
||||
spec:
|
||||
selector:
|
||||
matchLabels:
|
||||
app: vaultwarden
|
||||
replicas: 1
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
app: vaultwarden
|
||||
spec:
|
||||
containers:
|
||||
- name: vaultwarden
|
||||
image: docker.io/vaultwarden/server:1.33.2-alpine
|
||||
resources:
|
||||
requests:
|
||||
cpu: 300m
|
||||
memory: 500Mi
|
||||
limits:
|
||||
cpu: "1"
|
||||
memory: 1Gi
|
||||
envFrom:
|
||||
- configMapRef:
|
||||
name: vaultwarden-env
|
||||
- secretRef:
|
||||
name: vaultwarden-secrets
|
||||
ports:
|
||||
- containerPort: 80
|
||||
name: vaultwarden
|
||||
volumeMounts:
|
||||
- name: storage
|
||||
mountPath: /data
|
||||
volumes:
|
||||
- name: storage
|
||||
persistentVolumeClaim:
|
||||
claimName: vaultwarden-pvc
|
||||
restartPolicy: Always
|
||||
13
manifests/apps/vaultwarden/pvc.yaml
Normal file
13
manifests/apps/vaultwarden/pvc.yaml
Normal file
@@ -0,0 +1,13 @@
|
||||
apiVersion: v1
|
||||
kind: PersistentVolumeClaim
|
||||
metadata:
|
||||
labels:
|
||||
instance: vaultwarden
|
||||
name: vaultwarden-pvc
|
||||
spec:
|
||||
accessModes:
|
||||
- ReadWriteOnce
|
||||
storageClassName: local-path
|
||||
resources:
|
||||
requests:
|
||||
storage: 10Gi
|
||||
15
manifests/apps/vaultwarden/service.yaml
Normal file
15
manifests/apps/vaultwarden/service.yaml
Normal file
@@ -0,0 +1,15 @@
|
||||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
name: vaultwarden-service-headless
|
||||
labels:
|
||||
instance: vaultwarden
|
||||
spec:
|
||||
selector:
|
||||
app: vaultwarden
|
||||
type: ClusterIP
|
||||
ports:
|
||||
- name: http
|
||||
protocol: TCP
|
||||
port: 80
|
||||
targetPort: 80
|
||||
1
manifests/common/Readme.md
Normal file
1
manifests/common/Readme.md
Normal file
@@ -0,0 +1 @@
|
||||
## Сертификат, описание issuer для letsencrypt скрыты.
|
||||
28
manifests/ingress/dbadmin.openvibes.yaml
Normal file
28
manifests/ingress/dbadmin.openvibes.yaml
Normal file
@@ -0,0 +1,28 @@
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: dbadmin-ingress
|
||||
annotations:
|
||||
spec.ingressClassName: traefik
|
||||
cert-manager.io/cluster-issuer: letsencrypt-openvibes-issuer
|
||||
traefik.ingress.kubernetes.io/router.middlewares: openvibes-redirect-https@kubernetescrd
|
||||
traefik.ingress.kubernetes.io/router.tls.options: openvibes-user-validate-tls@kubernetescrd
|
||||
spec:
|
||||
ingressClassName: traefik
|
||||
rules:
|
||||
- host: dbadmin.openvibes.ru
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: adminer-service
|
||||
port:
|
||||
number: 80
|
||||
tls:
|
||||
|
||||
- secretName: dbadmin-tls
|
||||
hosts:
|
||||
- dbadmin.openvibes.ru
|
||||
|
||||
27
manifests/ingress/git.openvibes.yaml
Normal file
27
manifests/ingress/git.openvibes.yaml
Normal file
@@ -0,0 +1,27 @@
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: git-ingress
|
||||
annotations:
|
||||
spec.ingressClassName: traefik
|
||||
cert-manager.io/cluster-issuer: letsencrypt-openvibes-issuer
|
||||
traefik.ingress.kubernetes.io/router.middlewares: openvibes-redirect-https@kubernetescrd
|
||||
spec:
|
||||
ingressClassName: traefik
|
||||
rules:
|
||||
- host: git.openvibes.ru
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: gitea-http
|
||||
port:
|
||||
number: 3000
|
||||
tls:
|
||||
|
||||
- secretName: git-tls
|
||||
hosts:
|
||||
- git.openvibes.ru
|
||||
|
||||
27
manifests/ingress/pm.openvibes.yaml
Normal file
27
manifests/ingress/pm.openvibes.yaml
Normal file
@@ -0,0 +1,27 @@
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: pm-ingress
|
||||
annotations:
|
||||
spec.ingressClassName: traefik
|
||||
cert-manager.io/cluster-issuer: letsencrypt-openvibes-issuer
|
||||
traefik.ingress.kubernetes.io/router.middlewares: openvibes-redirect-https@kubernetescrd
|
||||
spec:
|
||||
ingressClassName: traefik
|
||||
rules:
|
||||
- host: pm.openvibes.ru
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: planka-service-headless
|
||||
port:
|
||||
number: 80
|
||||
tls:
|
||||
|
||||
- secretName: pm-tls
|
||||
hosts:
|
||||
- pm.openvibes.ru
|
||||
|
||||
27
manifests/ingress/warden.openvibes.yaml
Normal file
27
manifests/ingress/warden.openvibes.yaml
Normal file
@@ -0,0 +1,27 @@
|
||||
apiVersion: networking.k8s.io/v1
|
||||
kind: Ingress
|
||||
metadata:
|
||||
name: warden-ingress
|
||||
annotations:
|
||||
spec.ingressClassName: traefik
|
||||
cert-manager.io/cluster-issuer: letsencrypt-openvibes-issuer
|
||||
traefik.ingress.kubernetes.io/router.middlewares: openvibes-redirect-https@kubernetescrd
|
||||
spec:
|
||||
ingressClassName: traefik
|
||||
rules:
|
||||
- host: warden.openvibes.ru
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
pathType: Prefix
|
||||
backend:
|
||||
service:
|
||||
name: vaultwarden-service-headless
|
||||
port:
|
||||
number: 80
|
||||
tls:
|
||||
|
||||
- secretName: warden-tls
|
||||
hosts:
|
||||
- warden.openvibes.ru
|
||||
|
||||
6
secrets/Readme.md
Normal file
6
secrets/Readme.md
Normal file
@@ -0,0 +1,6 @@
|
||||
# Для создания самоподписанного сертификата пользователя
|
||||
|
||||
1. `openssl genrsa -out myuser.key 2048`
|
||||
2. `openssl req -new -key myuser.key -out myuser.csr`
|
||||
3. `openssl x509 -req -in myuser.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out myuser.crt -days 365 -sha256`
|
||||
4. `openssl pkcs12 -export -out myuser.pfx -inkey myuser.key -in myuser.crt`
|
||||
Reference in New Issue
Block a user