feat: removed unused configuration on ingresses

This commit is contained in:
auricom
2022-07-02 19:58:32 +02:00
parent 804e4ff077
commit 78df35d804
24 changed files with 1 additions and 53 deletions

View File

@@ -56,4 +56,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "bookstack.${SECRET_CLUSTER_DOMAIN}" - "bookstack.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -53,7 +53,6 @@ spec:
tls: tls:
- hosts: - hosts:
- "freshrss.${SECRET_CLUSTER_DOMAIN}" - "freshrss.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
resources: resources:
requests: requests:

View File

@@ -41,9 +41,6 @@ spec:
main: main:
enabled: true enabled: true
ingressClassName: "nginx" ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts: hosts:
- host: "homer.${SECRET_CLUSTER_DOMAIN}" - host: "homer.${SECRET_CLUSTER_DOMAIN}"
paths: paths:
@@ -57,7 +54,6 @@ spec:
- hosts: - hosts:
- "homer.${SECRET_CLUSTER_DOMAIN}" - "homer.${SECRET_CLUSTER_DOMAIN}"
- "services.${SECRET_CLUSTER_DOMAIN}" - "services.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
addons: addons:
codeserver: codeserver:
@@ -76,9 +72,6 @@ spec:
ingress: ingress:
enabled: true enabled: true
ingressClassName: "nginx" ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts: hosts:
- host: "homer-config.${SECRET_CLUSTER_DOMAIN}" - host: "homer-config.${SECRET_CLUSTER_DOMAIN}"
paths: paths:
@@ -87,7 +80,6 @@ spec:
tls: tls:
- hosts: - hosts:
- "homer-config.${SECRET_CLUSTER_DOMAIN}" - "homer-config.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
volumeMounts: volumeMounts:
- name: config - name: config
mountPath: /www/assets mountPath: /www/assets

View File

@@ -53,4 +53,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "joplin.${SECRET_CLUSTER_DOMAIN}" - "joplin.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -30,9 +30,6 @@ spec:
ingress: ingress:
enabled: true enabled: true
annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-medium@kubernetescrd
hosts: hosts:
- host: "pgadmin.${SECRET_CLUSTER_DOMAIN}" - host: "pgadmin.${SECRET_CLUSTER_DOMAIN}"
paths: paths:
@@ -41,7 +38,6 @@ spec:
tls: tls:
- hosts: - hosts:
- "pgadmin.${SECRET_CLUSTER_DOMAIN}" - "pgadmin.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
postRenderers: postRenderers:
- kustomize: - kustomize:
patchesJson6902: patchesJson6902:

View File

@@ -63,9 +63,6 @@ spec:
main: main:
enabled: true enabled: true
ingressClassName: "nginx" ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-buffering-small@kubernetescrd
hosts: hosts:
- host: "recipes.${SECRET_CLUSTER_DOMAIN}" - host: "recipes.${SECRET_CLUSTER_DOMAIN}"
paths: paths:
@@ -74,4 +71,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "recipes.${SECRET_CLUSTER_DOMAIN}" - "recipes.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -212,8 +212,6 @@ spec:
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
metadata: metadata:
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
labels: labels:
app.kubernetes.io/instance: resilio-sync app.kubernetes.io/instance: resilio-sync
app.kubernetes.io/name: resilio-sync app.kubernetes.io/name: resilio-sync
@@ -225,7 +223,6 @@ spec:
- hosts: - hosts:
- "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}" - "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}"
- "resilio-sync-helene.${SECRET_CLUSTER_DOMAIN}" - "resilio-sync-helene.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
rules: rules:
- host: "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}" - host: "resilio-sync-claude.${SECRET_CLUSTER_DOMAIN}"
http: http:

View File

@@ -151,4 +151,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "sharry.${SECRET_CLUSTER_DOMAIN}" - "sharry.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -69,4 +69,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "vaultwarden.${SECRET_CLUSTER_DOMAIN}" - "vaultwarden.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -54,7 +54,6 @@ spec:
tls: tls:
- hosts: - hosts:
- "vikunja.${SECRET_CLUSTER_DOMAIN}" - "vikunja.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
additionalContainers: additionalContainers:
- name: api - name: api

View File

@@ -75,4 +75,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "wallabag.${SECRET_CLUSTER_DOMAIN}" - "wallabag.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -52,4 +52,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "registry.${SECRET_CLUSTER_DOMAIN}" - "registry.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -51,4 +51,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "drone.${SECRET_CLUSTER_DOMAIN}" - "drone.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -97,4 +97,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "gitea.${SECRET_CLUSTER_DOMAIN}" - "gitea.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -51,8 +51,6 @@ spec:
main: main:
enabled: true enabled: true
ingressClassName: "nginx" ingressClassName: "nginx"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts: hosts:
- host: "hass.${SECRET_CLUSTER_DOMAIN}" - host: "hass.${SECRET_CLUSTER_DOMAIN}"
paths: paths:
@@ -66,7 +64,6 @@ spec:
- hosts: - hosts:
- "hass.${SECRET_CLUSTER_DOMAIN}" - "hass.${SECRET_CLUSTER_DOMAIN}"
- "home-assistant.${SECRET_CLUSTER_DOMAIN}" - "home-assistant.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
prometheus: prometheus:
serviceMonitor: serviceMonitor:
@@ -114,8 +111,6 @@ spec:
annotations: annotations:
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify" nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}" nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts: hosts:
- host: "hass-config.${SECRET_CLUSTER_DOMAIN}" - host: "hass-config.${SECRET_CLUSTER_DOMAIN}"
paths: paths:
@@ -124,7 +119,6 @@ spec:
tls: tls:
- hosts: - hosts:
- "hass-config.${SECRET_CLUSTER_DOMAIN}" - "hass-config.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
volumeMounts: volumeMounts:
- name: config - name: config
mountPath: /config mountPath: /config

View File

@@ -77,8 +77,6 @@ spec:
annotations: annotations:
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify" nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}" nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts: hosts:
- host: "zigbee.${SECRET_CLUSTER_DOMAIN}" - host: "zigbee.${SECRET_CLUSTER_DOMAIN}"
paths: paths:
@@ -87,7 +85,6 @@ spec:
tls: tls:
- hosts: - hosts:
- "zigbee.${SECRET_CLUSTER_DOMAIN}" - "zigbee.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
persistence: persistence:
config: config:

View File

@@ -49,7 +49,6 @@ spec:
tls: tls:
- hosts: - hosts:
- zwave.${SECRET_CLUSTER_DOMAIN} - zwave.${SECRET_CLUSTER_DOMAIN}
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
persistence: persistence:
config: config:

View File

@@ -81,8 +81,6 @@ spec:
enabled: true enabled: true
ingressClassName: "nginx" ingressClassName: "nginx"
nameSuffix: "api" nameSuffix: "api"
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
hosts: hosts:
- host: "sabnzbd.${SECRET_CLUSTER_DOMAIN}" - host: "sabnzbd.${SECRET_CLUSTER_DOMAIN}"
paths: paths:

View File

@@ -77,8 +77,6 @@ metadata:
annotations: annotations:
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify" nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}" nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd, networking-buffering-small@kubernetescrd
labels: labels:
app.kubernetes.io/instance: travelstories app.kubernetes.io/instance: travelstories
app.kubernetes.io/name: travelstories app.kubernetes.io/name: travelstories
@@ -100,4 +98,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "tdarr.${SECRET_CLUSTER_DOMAIN}" - "tdarr.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -90,8 +90,6 @@ spec:
annotations: annotations:
nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify" nginx.ingress.kubernetes.io/auth-url: "http://authelia.networking.svc.cluster.local/api/verify"
nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}" nginx.ingress.kubernetes.io/auth-signin: "https://login.${SECRET_CLUSTER_DOMAIN}"
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
# traefik.ingress.kubernetes.io/router.middlewares: networking-forward-auth@kubernetescrd
hosts: hosts:
- host: "blackbox.${SECRET_CLUSTER_DOMAIN}" - host: "blackbox.${SECRET_CLUSTER_DOMAIN}"
paths: paths:
@@ -100,7 +98,6 @@ spec:
tls: tls:
- hosts: - hosts:
- "blackbox.${SECRET_CLUSTER_DOMAIN}" - "blackbox.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
postRenderers: postRenderers:
- kustomize: - kustomize:

View File

@@ -66,4 +66,3 @@ spec:
tls: tls:
- hosts: - hosts:
- "healthchecks.${SECRET_CLUSTER_DOMAIN}" - "healthchecks.${SECRET_CLUSTER_DOMAIN}"
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"

View File

@@ -68,8 +68,6 @@ spec:
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
metadata: metadata:
# annotations:
# traefik.ingress.kubernetes.io/router.entrypoints: "websecure"
labels: labels:
app.kubernetes.io/instance: uptime-kuma app.kubernetes.io/instance: uptime-kuma
app.kubernetes.io/name: uptime-kuma app.kubernetes.io/name: uptime-kuma

View File

@@ -5,7 +5,6 @@ metadata:
name: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}" name: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
namespace: networking namespace: networking
spec: spec:
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
issuerRef: issuerRef:
name: letsencrypt-production name: letsencrypt-production
kind: ClusterIssuer kind: ClusterIssuer

View File

@@ -47,6 +47,5 @@ spec:
- *host - *host
tls: tls:
enabled: true enabled: true
secretName: "${SECRET_CLUSTER_CERTIFICATE_DEFAULT}"
grafana: grafana:
enabled: false enabled: false