Compare commits

..

3 Commits

20 changed files with 771 additions and 219 deletions

View File

@@ -3,32 +3,25 @@ import * as path from "path";
import { HelmProvider } from "@cdktf/provider-helm/lib/provider";
import { Release } from "@cdktf/provider-helm/lib/release";
import { Construct } from "constructs";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
import { Manifest } from "@cdktf/provider-kubernetes/lib/manifest";
type CertManagerOptions = {
providers: {
kubernetes: KubernetesProvider;
helm: HelmProvider;
};
provider: HelmProvider;
version: string;
name: string;
namespace: string;
certManagerApiVersion: string;
};
export class CertManager extends Construct {
constructor(scope: Construct, id: string, options: CertManagerOptions) {
super(scope, id);
const { helm, kubernetes } = options.providers;
const { certManagerApiVersion } = options;
const { namespace, name, version, provider } = options;
new Release(this, id, {
provider: helm,
name: options.name,
namespace: options.namespace,
version: options.version,
provider,
name,
namespace,
version,
repository: "https://charts.jetstack.io",
chart: "cert-manager",
createNamespace: true,
@@ -38,97 +31,5 @@ export class CertManager extends Construct {
}),
],
});
// Self-signed ClusterIssuer for initial CA
new Manifest(this, "ca-issuer", {
provider: kubernetes,
manifest: {
apiVersion: certManagerApiVersion,
kind: "ClusterIssuer",
metadata: {
name: "ca-issuer",
},
spec: {
selfSigned: {},
},
},
});
// Self-signed CA Certificate
new Manifest(this, "selfsigned-ca", {
provider: kubernetes,
manifest: {
apiVersion: certManagerApiVersion,
kind: "Certificate",
metadata: {
name: "selfsigned-ca",
namespace: options.namespace,
},
spec: {
isCA: true,
commonName: "Shahab Dogar",
secretName: "root-secret",
privateKey: {
algorithm: "ECDSA",
size: 256,
},
issuerRef: {
name: "ca-issuer",
kind: "ClusterIssuer",
group: "cert-manager.io",
},
},
},
});
// CA-based ClusterIssuer
new Manifest(this, "cluster-issuer", {
provider: kubernetes,
manifest: {
apiVersion: certManagerApiVersion,
kind: "ClusterIssuer",
metadata: {
name: "cluster-issuer",
},
spec: {
ca: {
secretName: "root-secret",
},
},
},
});
// Cloudflare ACME ClusterIssuer
new Manifest(this, "cloudflare-issuer", {
provider: kubernetes,
manifest: {
apiVersion: certManagerApiVersion,
kind: "ClusterIssuer",
metadata: {
name: "cloudflare-issuer",
},
spec: {
acme: {
email: "shahab@dogar.dev",
server: "https://acme-v02.api.letsencrypt.org/directory",
privateKeySecretRef: {
name: "cloudflare-cluster-issuer-account-key",
},
solvers: [
{
dns01: {
cloudflare: {
apiTokenSecretRef: {
name: "cloudflare-token",
key: "token",
},
},
},
},
],
},
},
},
});
}
}

View File

@@ -56,14 +56,10 @@ export class CoreServices extends TerraformStack {
});
new CertManager(this, "cert-manager", {
certManagerApiVersion: "cert-manager.io/v1",
provider: helm,
name: "cert-manager",
namespace,
version: "1.18.2",
providers: {
kubernetes,
helm,
},
});
}
}

View File

@@ -26,6 +26,7 @@ additionalArguments:
- "--entryPoints.ssh.address=:22/tcp"
- "--entryPoints.minecraft-gtnh.address=:25566/tcp"
- "--entryPoints.minecraft-tfg.address=:25567/tcp"
- "--entryPoints.minecraft-star-technology.address=:25568/tcp"
ports:
ssh:
name: ssh
@@ -48,3 +49,10 @@ ports:
expose:
default: true
protocol: TCP
minecraft-star-technology:
name: minecraft-star-technology
port: 25568
exposedPort: 25568
expose:
default: true
protocol: TCP

View File

@@ -5,6 +5,7 @@ import { NamespaceV1 } from "@cdktf/provider-kubernetes/lib/namespace-v1";
import { OnePasswordSecret } from "../../utils";
import { TerraFirmaGreg } from "./tfg";
import { GTNH } from "./gtnh";
import { StarTechnology } from "./star-technology";
export class GamingServices extends TerraformStack {
constructor(scope: Construct, id: string) {
@@ -31,5 +32,6 @@ export class GamingServices extends TerraformStack {
new TerraFirmaGreg(this, "tfg", provider, namespace);
new GTNH(this, "gtnh", provider, namespace);
new StarTechnology(this, "star-technology", provider, namespace);
}
}

View File

@@ -0,0 +1,74 @@
import { Construct } from "constructs";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
import { MinecraftServer } from "./utils";
export class StarTechnology extends Construct {
constructor(
scope: Construct,
id: string,
provider: KubernetesProvider,
namespace: string,
) {
super(scope, id);
new MinecraftServer(this, "star-technology", {
provider,
namespace,
image: "itzg/minecraft-server:java21",
name: "star-technology",
env: [
{
name: "EULA",
value: "TRUE",
},
{
name: "MODE",
value: "survival",
},
{
name: "MODPACK_PLATFORM",
value: "AUTO_CURSEFORGE",
},
{
name: "CF_API_KEY",
valueFrom: {
secretKeyRef: {
name: "curseforge",
key: "credential",
},
},
},
{
name: "CF_PAGE_URL",
value:
"https://www.curseforge.com/minecraft/modpacks/star-technology",
},
{
name: "VERSION",
value: "1.20.1",
},
{
name: "INIT_MEMORY",
value: "2G",
},
{
name: "MAX_MEMORY",
value: "12G",
},
{
name: "ALLOW_FLIGHT",
value: "TRUE",
},
{
name: "ENABLE_ROLLING_LOGS",
value: "TRUE",
},
{
name: "USE_MEOWICE_FLAGS",
value: "TRUE",
},
],
});
}
}

13
main.ts
View File

@@ -7,6 +7,7 @@ import { K8SOperators } from "./k8s-operators";
import { CoreServices } from "./core-services";
import { NetworkSecurity } from "./network-security";
import { GamingServices } from "./gaming-services/minecraft";
import { PKI } from "./pki";
dotenv.config();
@@ -26,18 +27,21 @@ const coreServices = new CoreServices(app, "core-services");
const k8sOperators = new K8SOperators(app, "k8s-operators");
k8sOperators.node.addDependency(coreServices);
const pki = new PKI(app, "pki");
pki.node.addDependency(k8sOperators);
const networkSecurity = new NetworkSecurity(app, "network-security");
networkSecurity.node.addDependency(k8sOperators);
networkSecurity.node.addDependency(pki);
const utilityServices = new UtilityServices(app, "utility-services");
utilityServices.node.addDependency(networkSecurity);
const caches = new CacheInfrastructure(app, "cache-infrastructure");
caches.node.addDependency(utilityServices);
const gamingServices = new GamingServices(app, "gaming-services");
gamingServices.node.addDependency(networkSecurity);
const caches = new CacheInfrastructure(app, "cache-infrastructure");
caches.node.addDependency(utilityServices);
const deploy: (stack: TerraformStack, key: string) => S3Backend = (
stack,
key,
@@ -61,6 +65,7 @@ const deploy: (stack: TerraformStack, key: string) => S3Backend = (
deploy(coreServices, "core-services");
deploy(k8sOperators, "k8s-operators");
deploy(pki, "pki");
deploy(networkSecurity, "network-security");
deploy(utilityServices, "utility-services");
deploy(caches, "cache-infrastructure");

70
pki/index.ts Normal file
View File

@@ -0,0 +1,70 @@
import { DataKubernetesNamespaceV1 } from "@cdktf/provider-kubernetes/lib/data-kubernetes-namespace-v1";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
import { DataTerraformRemoteStateS3, TerraformStack } from "cdktf";
import { Construct } from "constructs";
import { PrivateIssuer, PublicIssuer } from "./issuers";
export class PKI extends TerraformStack {
constructor(scope: Construct, id: string) {
super(scope, id);
const kubernetes = new KubernetesProvider(this, "kubernetes", {
configPath: "~/.kube/config",
});
const r2Endpoint = `${process.env.ACCOUNT_ID!}.r2.cloudflarestorage.com`;
const coreServicesState = new DataTerraformRemoteStateS3(
this,
"core-services-state",
{
usePathStyle: true,
skipRegionValidation: true,
skipCredentialsValidation: true,
skipRequestingAccountId: true,
skipS3Checksum: true,
encrypt: true,
bucket: "terraform-state",
key: "core-services/terraform.tfstate",
endpoints: {
s3: `https://${r2Endpoint}`,
},
region: "auto",
accessKey: process.env.ACCESS_KEY,
secretKey: process.env.SECRET_KEY,
},
);
const namespaceName = coreServicesState.getString("namespace-output");
const namespaceResource = new DataKubernetesNamespaceV1(
this,
"homelab-namespace",
{
provider: kubernetes,
metadata: {
name: namespaceName,
},
},
);
const namespace = namespaceResource.metadata.name;
new PrivateIssuer(this, "private-issuer", {
provider: kubernetes,
namespace,
apiVersion: "cert-manager.io/v1",
secretName: "root-secret",
commonName: "Homelab Root CA",
privateKey: {
algorithm: "Ed25519",
size: 256,
},
});
new PublicIssuer(this, "public-issuer", {
provider: kubernetes,
namespace,
apiVersion: "cert-manager.io/v1",
server: "https://acme-v02.api.letsencrypt.org/directory",
});
}
}

2
pki/issuers/index.ts Normal file
View File

@@ -0,0 +1,2 @@
export { PrivateIssuer } from "./private";
export { PublicIssuer } from "./public";

86
pki/issuers/private.ts Normal file
View File

@@ -0,0 +1,86 @@
import { Manifest } from "@cdktf/provider-kubernetes/lib/manifest";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
import { Construct } from "constructs";
type PrivateIssuerOptions = {
provider: KubernetesProvider;
namespace: string;
apiVersion: string;
commonName: string;
secretName: string;
privateKey: {
algorithm: "RSA" | "ECDSA" | "Ed25519";
size: number;
};
};
export class PrivateIssuer extends Construct {
constructor(scope: Construct, id: string, options: PrivateIssuerOptions) {
super(scope, id);
const {
provider,
namespace,
commonName,
privateKey,
secretName,
apiVersion,
} = options;
// Self-signed ClusterIssuer for initial CA
new Manifest(this, "ca-issuer", {
provider,
manifest: {
apiVersion,
kind: "ClusterIssuer",
metadata: {
name: "ca-issuer",
},
spec: {
selfSigned: {},
},
},
});
// Self-signed CA Certificate
new Manifest(this, "selfsigned-ca", {
provider,
manifest: {
apiVersion,
kind: "Certificate",
metadata: {
name: "selfsigned-ca",
namespace,
},
spec: {
isCA: true,
commonName,
secretName,
privateKey,
issuerRef: {
name: "ca-issuer",
kind: "ClusterIssuer",
group: "cert-manager.io",
},
},
},
});
// CA-based ClusterIssuer
new Manifest(this, "cluster-issuer", {
provider,
manifest: {
apiVersion,
kind: "ClusterIssuer",
metadata: {
name: "cluster-issuer",
},
spec: {
ca: {
secretName,
},
},
},
});
}
}

59
pki/issuers/public.ts Normal file
View File

@@ -0,0 +1,59 @@
import { Manifest } from "@cdktf/provider-kubernetes/lib/manifest";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
import { Construct } from "constructs";
import { OnePasswordSecret } from "../../utils";
type PublicIssuerOptions = {
provider: KubernetesProvider;
apiVersion: string;
namespace: string;
server: string;
};
export class PublicIssuer extends Construct {
constructor(scope: Construct, id: string, options: PublicIssuerOptions) {
super(scope, id);
const { apiVersion, provider, namespace, server } = options;
new OnePasswordSecret(this, "cloudflare-token", {
provider,
namespace,
name: "public-issuer-cloudflare-token",
itemPath: "vaults/Lab/items/cloudflare",
});
// Cloudflare ACME ClusterIssuer
new Manifest(this, "cloudflare-issuer", {
provider,
manifest: {
apiVersion,
kind: "ClusterIssuer",
metadata: {
name: "cloudflare-issuer",
},
spec: {
acme: {
email: "shahab@dogar.dev",
server,
privateKeySecretRef: {
name: "cloudflare-cluster-issuer-account-key",
},
solvers: [
{
dns01: {
cloudflare: {
apiTokenSecretRef: {
name: "public-issuer-cloudflare-token",
key: "token",
},
},
},
},
],
},
},
},
});
}
}

View File

@@ -1,10 +1,10 @@
import { Construct } from "constructs";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
import { OnePasswordSecret, LonghornPvc } from "../../utils";
import { DeploymentV1 } from "@cdktf/provider-kubernetes/lib/deployment-v1";
import { PodDisruptionBudgetV1 } from "@cdktf/provider-kubernetes/lib/pod-disruption-budget-v1";
import { OnePasswordSecret, LonghornPvc } from "../../../utils";
type GiteaRunnerOptions = {
provider: KubernetesProvider;
name: string;

View File

@@ -7,8 +7,9 @@ import {
OnePasswordSecret,
PublicIngressRoute,
IngressRouteTcp,
} from "../../utils";
import type { Providers } from "../../types";
PrivateCertificate,
} from "../../../utils";
import type { Providers } from "../../../types";
type GiteaServerOptions = {
providers: Providers;
@@ -22,45 +23,61 @@ export class GiteaServer extends Construct {
super(scope, id);
const { kubernetes, helm } = options.providers;
const { name, namespace, r2Endpoint } = options;
new OnePasswordSecret(this, "admin", {
provider: kubernetes,
name: "gitea-admin",
namespace: options.namespace,
namespace,
itemPath: "vaults/Lab/items/gitea-admin",
});
new OnePasswordSecret(this, "oauth", {
provider: kubernetes,
name: "gitea-oauth",
namespace: options.namespace,
namespace,
itemPath: "vaults/Lab/items/gitea-oauth",
});
new OnePasswordSecret(this, "smtp", {
provider: kubernetes,
name: "gitea-smtp-token",
namespace: options.namespace,
namespace,
itemPath: "vaults/Lab/items/smtp-token",
});
new OnePasswordSecret(this, "r2", {
provider: kubernetes,
name: "gitea-cloudflare-token",
namespace: options.namespace,
namespace,
itemPath: "vaults/Lab/items/cloudflare",
});
new PrivateCertificate(this, "internal-cert", {
provider: kubernetes,
namespace,
name: "gitea-tls-internal",
secretName: "gitea-tls-internal",
dnsNames: [
"git.dogar.dev",
"gitea",
"gitea.homelab.svc",
"gitea.homelab.svc.cluster.local",
],
usages: ["digital signature", "key encipherment", "server auth"],
});
new Release(this, id, {
...options,
provider: helm,
repository: "https://dl.gitea.com/charts",
chart: "gitea",
namespace,
createNamespace: true,
set: [
{
name: "gitea.config.storage.MINIO_ENDPOINT",
value: options.r2Endpoint,
value: r2Endpoint,
},
],
values: [
@@ -72,21 +89,22 @@ export class GiteaServer extends Construct {
new IngressRouteTcp(this, "ssh-ingress", {
provider: kubernetes,
namespace: options.namespace,
name: options.name,
namespace,
name,
match: "HostSNI(`*`)",
entryPoint: "ssh",
serviceName: `${options.name}-ssh`,
serviceName: `${name}-ssh`,
servicePort: 22,
});
new PublicIngressRoute(this, "http-ingress", {
provider: kubernetes,
namespace: options.namespace,
name: options.name,
namespace,
name,
host: "git.dogar.dev",
serviceName: `${options.name}-http`,
serviceName: `${name}-http`,
servicePort: 3000,
serviceProtocol: "https",
});
}
}

View File

@@ -24,11 +24,18 @@ gitea:
enabled: true
serviceMonitor:
enabled: true
scheme: "https"
tlsConfig:
insecureSkipVerify: false
caFile: /internal-ca/ca.crt
config:
server:
ENABLE_PPROF: true
ENABLE_GZIP: true
LFS_START_SERVER: true
PROTOCOL: https
CERT_FILE: /certs/tls.crt
KEY_FILE: /certs/tls.key
ROOT_URL: https://git.dogar.dev/
SSH_DOMAIN: git.dogar.dev
DISABLE_SSH: false
@@ -93,6 +100,27 @@ gitea:
secretKeyRef:
name: gitea-cloudflare-token
key: secret_access_key
livenessProbe:
httpGet:
path: /api/healthz
port: 3000
scheme: HTTPS
initialDelaySeconds: 5
periodSeconds: 10
readinessProbe:
httpGet:
path: /api/healthz
port: 3000
scheme: HTTPS
initialDelaySeconds: 5
periodSeconds: 10
startupProbe:
httpGet:
path: /api/healthz
port: 3000
scheme: HTTPS
initialDelaySeconds: 5
periodSeconds: 10
persistence:
labels:
recurring-job.longhorn.io/source: "enabled"
@@ -149,6 +177,9 @@ extraVolumes:
items:
- key: ca.crt
path: root.crt
- name: gitea-tls-internal
secret:
secretName: gitea-tls-internal
- name: gitea-temp
emptyDir: {}
extraInitVolumeMounts:
@@ -159,6 +190,8 @@ extraContainerVolumeMounts:
- name: ssl-bundle
mountPath: /opt/gitea/.postgresql
readOnly: true
- name: gitea-tls-internal
mountPath: /certs
readOnly: true
- name: gitea-temp
mountPath: /tmp/gitea-uploads

281
utils/cert-manager/base.ts Normal file
View File

@@ -0,0 +1,281 @@
import { Construct } from "constructs";
import { Manifest } from "@cdktf/provider-kubernetes/lib/manifest";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
/**
* Options passed to the Certificate construct for generating
* cert-manager.io/v1 Certificate resources.
*
* This type supports both public certificates (Cloudflare/ACME)
* and private internal certificates (internal CA), making it usable
* across all cluster security contexts (Ingress TLS, internal mTLS, etc.).
*/
export type CertificateOptions = {
/**
* Kubernetes provider instance used by the underlying Manifest resource.
*
* This should typically be the cluster's primary Kubernetes provider.
*
* Required.
*/
provider: KubernetesProvider;
/**
* Kubernetes namespace where the Certificate resource and the
* corresponding Secret will be created.
*
* Required.
*/
namespace: string;
/**
* Name of the Certificate resource (metadata.name).
*
* This should be unique within the namespace.
*
* Required.
*/
name: string;
/**
* Name of the Kubernetes Secret that cert-manager will populate with
* `tls.crt`, `tls.key`, and optionally `ca.crt`.
*
* This secret is automatically created and updated by cert-manager.
*
* Required.
*/
secretName: string;
/**
* List of DNS Subject Alternative Names that the certificate must cover.
*
* cert-manager requires at least one entry.
*
* For internal certificates: service FQDNs (svc.cluster.local).
* For public certificates: external domain names.
*
* Required.
*/
dnsNames: string[];
/**
* Reference to the cert-manager Issuer or ClusterIssuer used to sign the certificate.
*
* - For public certs: Cloudflare ACME ClusterIssuer
* - For private certs: Internal CA ClusterIssuer
*
* This field is usually injected automatically by subclasses
* (e.g., PublicCertificate / PrivateCertificate).
*
* Required internally — not intended to be set by user code directly.
*/
issuerRef?: {
/**
* Name of the Issuer or ClusterIssuer.
*/
name: string;
/**
* Type of issuer ("Issuer" or "ClusterIssuer").
*
* Defaults to "ClusterIssuer" when omitted.
*/
kind?: string;
};
/**
* The certificate's validity duration (e.g. "2160h" for 90 days).
*
* If omitted, cert-manager applies its own default (90 days for ACME).
*
* Optional.
*/
duration?: string;
/**
* How long before expiry cert-manager should attempt early renewal.
*
* Example: "360h" (15 days before expiration).
*
* Optional.
*/
renewBefore?: string;
/**
* Optional Common Name for the certificate's subject.
*
* SAN-only certificates are recommended, but CN is still required for
* compatibility with some older libraries (Java, ClickHouse, OpenSSL tooling).
*
* Optional.
*/
commonName?: string;
/**
* Key Usage extension — determines what the certificate may be used for.
*
* Common values:
*
* - "digital signature"
* - "key encipherment"
* - "server auth"
* - "client auth"
*
* Example for mTLS server certificates:
* usages: ["digital signature", "key encipherment", "server auth"]
*
* Example for mTLS client certificates:
* usages: ["digital signature", "client auth"]
*
* Optional — cert-manager applies sensible defaults when omitted.
*/
usages?: string[];
/**
* Options controlling the generated private key.
*
* Useful for:
* - Choosing RSA vs ECDSA vs Ed25519
* - Increasing RSA key strength (2048 → 4096)
* - Optimizing performance for internal services (ECDSA P-256)
*
* Optional.
*/
privateKey?: {
/**
* Private key algorithm.
*
* - "RSA" (default)
* - "ECDSA" (great for internal TLS)
* - "Ed25519" (fast and modern, but not universally supported)
*
* Optional.
*/
algorithm?: "RSA" | "ECDSA" | "Ed25519";
/**
* Key size in bits.
*
* Only applies to algorithms that support length:
* - RSA: 2048, 3072, 4096
* - ECDSA: 256, 384
*
* Optional.
*/
size?: number;
};
/**
* IP address SAN entries (rarely needed, but sometimes required
* for services bound directly to cluster node IPs or StatefulSet pod IPs).
*
* Using IP SANs is generally discouraged unless explicitly required.
*
* Optional.
*/
ipAddresses?: string[];
/**
* Subject information for the certificate (Organization, OrgUnit, etc.)
*
* Example:
*
* subject: {
* organizations: ["Internal Systems"],
* organizationalUnits: ["Platform"]
* }
*
* Optional.
*/
subject?: {
organizations?: string[];
organizationalUnits?: string[];
countries?: string[];
provinces?: string[];
localities?: string[];
streetAddresses?: string[];
postalCodes?: string[];
};
};
export class Certificate extends Construct {
/** The underlying Kubernetes manifest */
public readonly manifest: Manifest;
constructor(scope: Construct, id: string, opts: CertificateOptions) {
super(scope, id);
// --- Validation ---------------------------------------------------------
if (!opts.issuerRef) {
throw new Error(
`Certificate '${opts.name}' must specify issuerRef (usually provided by a subclass).`,
);
}
if (!opts.dnsNames || opts.dnsNames.length === 0) {
throw new Error(
`Certificate '${opts.name}' must include at least one DNS name in dnsNames[].`,
);
}
// --- Base manifest ------------------------------------------------------
const manifest: any = {
apiVersion: "cert-manager.io/v1",
kind: "Certificate",
metadata: {
name: opts.name,
namespace: opts.namespace,
},
spec: {
secretName: opts.secretName,
dnsNames: opts.dnsNames,
issuerRef: {
name: opts.issuerRef.name,
kind: opts.issuerRef.kind ?? "ClusterIssuer",
},
},
};
// --- Optional: duration & renewBefore ---------------------------------
if (opts.duration) {
manifest.spec.duration = opts.duration;
}
if (opts.renewBefore) {
manifest.spec.renewBefore = opts.renewBefore;
}
// --- Optional: commonName ----------------------------------------------
if (opts.commonName) {
manifest.spec.commonName = opts.commonName;
}
// --- Optional: key usages ----------------------------------------------
if (opts.usages?.length) {
manifest.spec.usages = opts.usages;
}
// --- Optional: private key settings ------------------------------------
if (opts.privateKey) {
manifest.spec.privateKey = {
...opts.privateKey,
};
}
// --- Optional: IP SAN entries ------------------------------------------
if (opts.ipAddresses?.length) {
manifest.spec.ipAddresses = opts.ipAddresses;
}
// --- Optional: subject fields ------------------------------------------
if (opts.subject) {
manifest.spec.subject = opts.subject;
}
// --- Create manifest resource ------------------------------------------
this.manifest = new Manifest(this, id, {
provider: opts.provider,
manifest,
});
}
}

View File

@@ -0,0 +1,32 @@
import { Construct } from "constructs";
import { Certificate, CertificateOptions } from "./base";
/**
* Public certificate issued via the Cloudflare ACME ClusterIssuer.
*
* This subclass automatically injects:
*
* issuerRef:
* name: "cloudflare-issuer"
* kind: "ClusterIssuer"
*
* It is intended for generating publicly trusted HTTPS certificates
* (e.g., *.dogar.dev) using Cloudflare DNS-01 validation.
*
* Users of this class should *not* specify issuerRef manually.
*/
export class CloudflareCertificate extends Certificate {
constructor(
scope: Construct,
id: string,
opts: Omit<CertificateOptions, "issuerRef">,
) {
super(scope, id, {
...opts,
issuerRef: {
name: "cloudflare-issuer",
kind: "ClusterIssuer",
},
});
}
}

View File

@@ -1,85 +1,2 @@
import { Construct } from "constructs";
import { Manifest } from "@cdktf/provider-kubernetes/lib/manifest";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
type CertificateOptions = {
provider: KubernetesProvider;
/** Namespace to create the Certificate in */
namespace: string;
/** Required name of the certificate (and CRD name) */
name: string;
/** Secret name for storing the issued TLS cert */
secretName: string;
/** One or more DNS names the certificate should cover */
dnsNames: string[];
/** Reference to the cert-manager issuer */
issuerRef: {
name: string;
kind?: string; // ClusterIssuer or Issuer
};
/** Optional duration (default: cert-manager default) */
duration?: string;
/** Optional renewBefore (default: cert-manager default) */
renewBefore?: string;
};
class Certificate extends Construct {
public readonly manifest: Manifest;
constructor(scope: Construct, id: string, opts: CertificateOptions) {
super(scope, id);
const manifest: any = {
apiVersion: "cert-manager.io/v1",
kind: "Certificate",
metadata: {
name: opts.name,
namespace: opts.namespace,
},
spec: {
secretName: opts.secretName,
dnsNames: opts.dnsNames,
issuerRef: {
name: opts.issuerRef.name,
kind: opts.issuerRef.kind ?? "ClusterIssuer",
},
},
};
if (opts.duration) {
manifest.spec.duration = opts.duration;
}
if (opts.renewBefore) {
manifest.spec.renewBefore = opts.renewBefore;
}
this.manifest = new Manifest(this, id, {
provider: opts.provider,
manifest,
});
}
}
export class CloudflareCertificate extends Certificate {
constructor(
scope: Construct,
id: string,
opts: Omit<CertificateOptions, "issuerRef">,
) {
super(scope, id, {
...opts,
issuerRef: {
name: "cloudflare-issuer",
kind: "ClusterIssuer",
},
});
}
}
export { CloudflareCertificate } from "./cloudflare";
export { PrivateCertificate } from "./internal";

View File

@@ -0,0 +1,36 @@
import { Construct } from "constructs";
import { Certificate, CertificateOptions } from "./base";
/**
* Private TLS certificate issued by the internal cluster CA.
*
* This subclass automatically injects:
*
* issuerRef:
* name: "cluster-issuer"
* kind: "ClusterIssuer"
*
* Use this for:
* - Internal service-to-service TLS (HTTP, gRPC, Webhooks)
* - mTLS server certificates
* - mTLS client certificates
* - Internal wildcard certificates
* - Databases, queues, operators, controllers, etc.
*
* Users of this class should NOT specify issuerRef manually.
*/
export class PrivateCertificate extends Certificate {
constructor(
scope: Construct,
id: string,
opts: Omit<CertificateOptions, "issuerRef">,
) {
super(scope, id, {
...opts,
issuerRef: {
name: "cluster-issuer", // internal CA
kind: "ClusterIssuer",
},
});
}
}

View File

@@ -1,4 +1,4 @@
export { CloudflareCertificate } from "./cert-manager";
export { CloudflareCertificate, PrivateCertificate } from "./cert-manager";
export { OnePasswordSecret } from "./1password-secret";
export {
PublicIngressRoute,

View File

@@ -18,6 +18,7 @@ export type IngressRouteOptions = {
/** Backend K8s Service */
serviceName: string;
servicePort: number;
serviceProtocol?: "http" | "https";
/** EntryPoints (default: ["websecure"]) */
entryPoints?: string[];
@@ -39,6 +40,31 @@ export class IngressRoute extends Construct {
const path = opts.path ?? "/";
const entryPoints = opts.entryPoints ?? ["websecure"];
const { provider, namespace } = opts;
if (opts.serviceProtocol === "https") {
new Manifest(this, `${name}-https-transport`, {
provider,
manifest: {
apiVersion: "traefik.io/v1alpha1",
kind: "ServersTransport",
metadata: {
name: `${name}-https-transport`,
namespace,
},
spec: {
serverName: `${opts.name}.${opts.namespace}.svc.cluster.local`,
rootCAs: [
{
secret: "root-secret",
},
],
insecureSkipVerify: false,
},
},
});
}
const route: any = {
match: `Host(\`${opts.host}\`) && PathPrefix(\`${path}\`)`,
kind: "Rule",
@@ -46,6 +72,11 @@ export class IngressRoute extends Construct {
{
name: opts.serviceName,
port: opts.servicePort,
scheme: opts.serviceProtocol ?? "http",
serversTransport:
opts.serviceProtocol === "https"
? `${name}-https-transport`
: undefined,
},
],
};
@@ -68,8 +99,8 @@ export class IngressRoute extends Construct {
};
new CloudflareCertificate(this, `${name}-cert`, {
provider: opts.provider,
namespace: opts.namespace,
provider,
namespace,
name: opts.host,
secretName: opts.tlsSecretName,
dnsNames: [opts.host],
@@ -77,13 +108,13 @@ export class IngressRoute extends Construct {
}
this.manifest = new Manifest(this, name, {
provider: opts.provider,
provider,
manifest: {
apiVersion: "traefik.io/v1alpha1",
kind: "IngressRoute",
metadata: {
name,
namespace: opts.namespace,
namespace,
},
spec,
},

View File

@@ -54,6 +54,7 @@ export class PublicIngressRoute extends Construct {
path: opts.path ?? "/",
serviceName: opts.serviceName,
servicePort: opts.servicePort,
serviceProtocol: opts.serviceProtocol,
entryPoints: ["websecure"],
tlsSecretName: `${opts.name}-tls`,
middlewares: [`${namespace}/rate-limit`],