mirror of
https://github.com/auricom/home-cluster.git
synced 2025-09-30 15:37:44 +02:00
169 lines
5.5 KiB
YAML
169 lines
5.5 KiB
YAML
---
|
|
# yaml-language-server: $schema=https://kubernetes-schemas.devbu.io/helm.toolkit.fluxcd.io/helmrelease_v2beta1.json
|
|
apiVersion: helm.toolkit.fluxcd.io/v2beta1
|
|
kind: HelmRelease
|
|
metadata:
|
|
name: &app authelia
|
|
namespace: default
|
|
spec:
|
|
interval: 30m
|
|
chart:
|
|
spec:
|
|
chart: app-template
|
|
version: 1.5.1
|
|
sourceRef:
|
|
kind: HelmRepository
|
|
name: bjw-s
|
|
namespace: flux-system
|
|
maxHistory: 2
|
|
install:
|
|
createNamespace: true
|
|
remediation:
|
|
retries: 3
|
|
upgrade:
|
|
cleanupOnFail: true
|
|
remediation:
|
|
retries: 3
|
|
uninstall:
|
|
keepHistory: false
|
|
dependsOn:
|
|
- name: lldap
|
|
- name: redis
|
|
- name: smtp-relay
|
|
values:
|
|
initContainers:
|
|
01-init-db:
|
|
image: ghcr.io/auricom/postgres-init:15.3
|
|
imagePullPolicy: IfNotPresent
|
|
envFrom: &envFrom
|
|
- secretRef:
|
|
name: authelia-secret
|
|
controller:
|
|
replicas: 2
|
|
strategy: RollingUpdate
|
|
annotations:
|
|
reloader.stakater.com/auto: "true"
|
|
image:
|
|
repository: ghcr.io/authelia/authelia
|
|
tag: master@sha256:a3647c3dd136402745c7639e446944004145630c822f27e22f999c414c234d2f
|
|
args: ["--config", "/config/configuration.yaml", "--config.experimental.filters", "expand-env"]
|
|
env:
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_ADDITIONAL_GROUPS_DN: ou=groups
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_ADDITIONAL_USERS_DN: ou=people
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_BASE_DN: dc=home,dc=arpa
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_DISPLAY_NAME_ATTRIBUTE: displayName
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_GROUPS_FILTER: (member={dn})
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_GROUP_NAME_ATTRIBUTE: cn
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_IMPLEMENTATION: custom
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_MAIL_ATTRIBUTE: mail
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_START_TLS: "false"
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_TIMEOUT: 5s
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_URL: ldap://lldap.default.svc.cluster.local:5389
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_USER: uid=admin,ou=people,dc=home,dc=arpa
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_USERNAME_ATTRIBUTE: uid
|
|
AUTHELIA_AUTHENTICATION_BACKEND_LDAP_USERS_FILTER: (&({username_attribute}={input})(objectClass=person))
|
|
AUTHELIA_AUTHENTICATION_BACKEND_PASSWORD_RESET_DISABLE: "true"
|
|
AUTHELIA_AUTHENTICATION_BACKEND_REFRESH_INTERVAL: 1m
|
|
AUTHELIA_DEFAULT_REDIRECTION_URL: https://auth.${SECRET_CLUSTER_DOMAIN}
|
|
AUTHELIA_DUO_API_DISABLE: "true"
|
|
AUTHELIA_LOG_LEVEL: info
|
|
AUTHELIA_NOTIFIER_DISABLE_STARTUP_CHECK: "true"
|
|
AUTHELIA_NOTIFIER_SMTP_DISABLE_REQUIRE_TLS: "true"
|
|
AUTHELIA_NOTIFIER_SMTP_HOST: smtp-relay.default.svc.cluster.local.
|
|
AUTHELIA_NOTIFIER_SMTP_PORT: "2525"
|
|
AUTHELIA_NOTIFIER_SMTP_SENDER: "Authelia <authelia@${SECRET_DOMAIN}>"
|
|
AUTHELIA_SERVER_DISABLE_HEALTHCHECK: "true"
|
|
AUTHELIA_SERVER_PORT: &port 8888
|
|
AUTHELIA_SESSION_DOMAIN: ${SECRET_CLUSTER_DOMAIN}
|
|
AUTHELIA_SESSION_NAME: authelia-home-ops
|
|
AUTHELIA_SESSION_REDIS_DATABASE_INDEX: 14
|
|
AUTHELIA_SESSION_REDIS_HOST: redis-master.default.svc.cluster.local.
|
|
AUTHELIA_SESSION_REDIS_PORT: 6379
|
|
AUTHELIA_STORAGE_POSTGRES_DATABASE: authelia
|
|
AUTHELIA_STORAGE_POSTGRES_HOST: ${POSTGRES_HOST}
|
|
AUTHELIA_TELEMETRY_METRICS_ADDRESS: tcp://0.0.0.0:8080
|
|
AUTHELIA_TELEMETRY_METRICS_ENABLED: "true"
|
|
AUTHELIA_THEME: dark
|
|
AUTHELIA_TOTP_ISSUER: authelia.com
|
|
AUTHELIA_WEBAUTHN_DISABLE: "true"
|
|
envFrom: *envFrom
|
|
enableServiceLinks: false
|
|
service:
|
|
main:
|
|
ports:
|
|
http:
|
|
port: *port
|
|
metrics:
|
|
enabled: true
|
|
port: 8080
|
|
serviceMonitor:
|
|
main:
|
|
enabled: true
|
|
endpoints:
|
|
- port: metrics
|
|
scheme: http
|
|
path: /metrics
|
|
interval: 1m
|
|
scrapeTimeout: 10s
|
|
probes:
|
|
liveness: &probes
|
|
enabled: true
|
|
custom: true
|
|
spec:
|
|
httpGet:
|
|
path: /api/health
|
|
port: *port
|
|
initialDelaySeconds: 0
|
|
periodSeconds: 10
|
|
timeoutSeconds: 1
|
|
failureThreshold: 3
|
|
readiness: *probes
|
|
startup:
|
|
enabled: false
|
|
ingress:
|
|
main:
|
|
enabled: true
|
|
ingressClassName: nginx
|
|
annotations:
|
|
external-dns.home.arpa/enabled: "true"
|
|
nginx.ingress.kubernetes.io/configuration-snippet: |
|
|
add_header Cache-Control "no-store";
|
|
add_header Pragma "no-cache";
|
|
add_header X-Frame-Options "SAMEORIGIN";
|
|
add_header X-XSS-Protection "1; mode=block";
|
|
hajimari.io/icon: mdi:shield-account
|
|
hosts:
|
|
- host: &host auth.${SECRET_CLUSTER_DOMAIN}
|
|
paths:
|
|
- path: /
|
|
pathType: Prefix
|
|
tls:
|
|
- hosts:
|
|
- *host
|
|
podSecurityContext:
|
|
runAsUser: 568
|
|
runAsGroup: 568
|
|
fsGroup: 568
|
|
fsGroupChangePolicy: OnRootMismatch
|
|
persistence:
|
|
config:
|
|
enabled: true
|
|
type: configMap
|
|
name: authelia-configmap
|
|
subPath: configuration.yaml
|
|
mountPath: /config/configuration.yaml
|
|
readOnly: false
|
|
topologySpreadConstraints:
|
|
- maxSkew: 1
|
|
topologyKey: kubernetes.io/hostname
|
|
whenUnsatisfiable: DoNotSchedule
|
|
labelSelector:
|
|
matchLabels:
|
|
app.kubernetes.io/name: *app
|
|
resources:
|
|
requests:
|
|
cpu: 5m
|
|
memory: 10Mi
|
|
limits:
|
|
memory: 200Mi
|