Compare commits

..

9 Commits

10 changed files with 91 additions and 30 deletions

View File

@@ -82,10 +82,24 @@ spec:
protocol: TCP protocol: TCP
type: ClusterIP type: ClusterIP
--- ---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: devpi
namespace: homelab
spec:
ipAllowList:
sourceRange:
- "127.0.0.1/32"
- "10.43.0.0/16"
rateLimit:
average: 10
burst: 50
---
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
metadata: metadata:
name: devpi-ingress name: devpi
namespace: homelab namespace: homelab
annotations: annotations:
nginx.ingress.kubernetes.io/proxy-body-size: "0" nginx.ingress.kubernetes.io/proxy-body-size: "0"
@@ -93,12 +107,10 @@ metadata:
cert-manager.io/acme-challenge-type: "dns01" cert-manager.io/acme-challenge-type: "dns01"
cert-manager.io/private-key-size: "4096" cert-manager.io/private-key-size: "4096"
# NGINX IP-based rate limiting # Traefik Middleware
nginx.ingress.kubernetes.io/limit-rps: "10" traefik.io/router.middlewares: "devpi@kubernetescrd"
nginx.ingress.kubernetes.io/limit-burst-multiplier: "5"
nginx.ingress.kubernetes.io/limit-whitelist: "127.0.0.1"
spec: spec:
ingressClassName: nginx-internal ingressClassName: traefik
tls: tls:
- hosts: - hosts:
- pip.dogar.dev - pip.dogar.dev

View File

@@ -2,9 +2,14 @@ import * as fs from "fs";
import { HelmProvider } from "@cdktf/provider-helm/lib/provider"; import { HelmProvider } from "@cdktf/provider-helm/lib/provider";
import { Release } from "@cdktf/provider-helm/lib/release"; import { Release } from "@cdktf/provider-helm/lib/release";
import { Construct } from "constructs"; import { Construct } from "constructs";
import { Manifest } from "@cdktf/provider-kubernetes/lib/manifest";
import { KubernetesProvider } from "@cdktf/provider-kubernetes/lib/provider";
type GiteaServerOptions = { type GiteaServerOptions = {
provider: HelmProvider; providers: {
helm: HelmProvider;
kubernetes: KubernetesProvider;
};
name: string; name: string;
namespace: string; namespace: string;
r2Endpoint: string; r2Endpoint: string;
@@ -14,8 +19,11 @@ export class GiteaServer extends Construct {
constructor(scope: Construct, id: string, options: GiteaServerOptions) { constructor(scope: Construct, id: string, options: GiteaServerOptions) {
super(scope, id); super(scope, id);
const { kubernetes, helm } = options.providers;
new Release(this, id, { new Release(this, id, {
...options, ...options,
provider: helm,
repository: "https://dl.gitea.com/charts", repository: "https://dl.gitea.com/charts",
chart: "gitea", chart: "gitea",
createNamespace: true, createNamespace: true,
@@ -31,5 +39,31 @@ export class GiteaServer extends Construct {
}), }),
], ],
}); });
new Manifest(this, `${id}-ssh-ingress`, {
provider: kubernetes,
manifest: {
apiVersion: "traefik.io/v1alpha1",
kind: "IngressRouteTCP",
metadata: {
name: "gitea-ssh-ingress",
namespace: options.namespace,
},
spec: {
entryPoints: ["ssh"],
routes: [
{
match: "HostSNI(`*`)",
services: [
{
name: `${options.name}-ssh`,
port: 22,
},
],
},
],
},
},
});
} }
} }

View File

@@ -93,11 +93,7 @@ server:
cert-manager.io/cluster-issuer: cloudflare-issuer cert-manager.io/cluster-issuer: cloudflare-issuer
cert-manager.io/acme-challenge-type: dns01 cert-manager.io/acme-challenge-type: dns01
cert-manager.io/private-key-size: "4096" cert-manager.io/private-key-size: "4096"
nginx.ingress.kubernetes.io/backend-protocol: "HTTPS" ingressClassName: traefik
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
ingressClassName: nginx-internal
https: true
hosts: hosts:
- auth.dogar.dev - auth.dogar.dev
tls: tls:

View File

@@ -1,6 +1,6 @@
global: global:
security: security:
allowInsecureImages: true # needed for ghcr.io images allowInsecureImages: true # needed for non-official images
image: image:
registry: docker.io registry: docker.io
repository: bitnamilegacy/external-dns repository: bitnamilegacy/external-dns
@@ -27,6 +27,7 @@ serviceAccount:
name: "external-dns" name: "external-dns"
ingressClassFilters: ingressClassFilters:
- nginx-internal - nginx-internal
- traefik
metrics: metrics:
enabled: false enabled: false
serviceMonitor: serviceMonitor:

View File

@@ -15,15 +15,8 @@ ingress:
cert-manager.io/cluster-issuer: cloudflare-issuer cert-manager.io/cluster-issuer: cloudflare-issuer
cert-manager.io/acme-challenge-type: dns01 cert-manager.io/acme-challenge-type: dns01
cert-manager.io/private-key-size: 4096 cert-manager.io/private-key-size: 4096
nginx.ingress.kubernetes.io/backend-protocol: HTTPS traefik.io/service.scheme: https
nginx.ingress.kubernetes.io/proxy-request-buffering: off className: traefik
nginx.ingress.kubernetes.io/proxy-buffering: off
nginx.ingress.kubernetes.io/proxy-body-size: 0
nginx.ingress.kubernetes.io/proxy-read-timeout: 3600
nginx.ingress.kubernetes.io/proxy-send-timeout: 3600
nginx.ingress.kubernetes.io/client-body-timeout: 3600
nginx.ingress.kubernetes.io/proxy-connect-timeout: 3600
className: nginx-internal
hosts: hosts:
- host: git.dogar.dev - host: git.dogar.dev
paths: paths:

View File

@@ -17,7 +17,7 @@ metrics:
enabled: true enabled: true
ingress: ingress:
enabled: true enabled: true
ingressClassName: nginx-internal ingressClassName: traefik
host: longhorn.dogar.dev host: longhorn.dogar.dev
tls: true tls: true
tlsSecretName: longhorn-tls tlsSecretName: longhorn-tls

View File

@@ -2,7 +2,7 @@ grafana:
enabled: true enabled: true
ingress: ingress:
enabled: true enabled: true
ingressClassName: nginx-internal ingressClassName: traefik
annotations: annotations:
cert-manager.io/cluster-issuer: cloudflare-issuer cert-manager.io/cluster-issuer: cloudflare-issuer
cert-manager.io/acme-challenge-type: dns01 cert-manager.io/acme-challenge-type: dns01

View File

@@ -16,3 +16,13 @@ topologySpreadConstraints:
labelSelector: labelSelector:
matchLabels: matchLabels:
app: traefik app: traefik
additionalArguments:
- "--entryPoints.ssh.address=:22/tcp"
ports:
ssh:
name: ssh
port: 22
exposedPort: 22
expose:
default: true
protocol: TCP

View File

@@ -142,7 +142,10 @@ class Homelab extends TerraformStack {
const gitea = new GiteaServer(this, "gitea-server", { const gitea = new GiteaServer(this, "gitea-server", {
name: "gitea", name: "gitea",
namespace, namespace,
provider: helm, providers: {
helm,
kubernetes,
},
r2Endpoint: `${env.ACCOUNT_ID}.r2.cloudflarestorage.com`, r2Endpoint: `${env.ACCOUNT_ID}.r2.cloudflarestorage.com`,
}); });

View File

@@ -114,6 +114,20 @@ spec:
targetPort: 4873 targetPort: 4873
type: ClusterIP type: ClusterIP
--- ---
apiVersion: traefik.io/v1alpha1
kind: Middleware
metadata:
name: verdaccio
namespace: homelab
spec:
ipAllowList:
sourceRange:
- "127.0.0.1/32"
- "10.43.0.0/16"
rateLimit:
average: 10
burst: 50
---
apiVersion: networking.k8s.io/v1 apiVersion: networking.k8s.io/v1
kind: Ingress kind: Ingress
metadata: metadata:
@@ -124,12 +138,10 @@ metadata:
cert-manager.io/acme-challenge-type: "dns01" cert-manager.io/acme-challenge-type: "dns01"
cert-manager.io/private-key-size: "4096" cert-manager.io/private-key-size: "4096"
# NGINX IP-based rate limiting # Traefik Middleware
nginx.ingress.kubernetes.io/limit-rps: "10" traefik.io/router.middlewares: "verdaccio@kubernetescrd"
nginx.ingress.kubernetes.io/limit-burst-multiplier: "5"
nginx.ingress.kubernetes.io/limit-whitelist: "127.0.0.1"
spec: spec:
ingressClassName: nginx-internal ingressClassName: traefik
tls: tls:
- hosts: - hosts:
- npm.dogar.dev - npm.dogar.dev