Compare commits

...

3 Commits

Author SHA1 Message Date
92a024d744 Misc. changes 2025-11-06 11:35:51 -05:00
055c92f3f7 Closes #15 2025-11-06 11:33:41 -05:00
71d0491236 Closes #33 2025-11-03 22:59:41 -05:00
5 changed files with 69 additions and 9 deletions

View File

@@ -17,6 +17,9 @@
release_namespace: coturn release_namespace: coturn
create_namespace: true create_namespace: true
values: values:
global:
security:
allowInsecureImages: true
service: service:
type: LoadBalancer type: LoadBalancer
externalTrafficPolicy: Local externalTrafficPolicy: Local
@@ -30,8 +33,14 @@
pullPolicy: Always pullPolicy: Always
externalDatabase: externalDatabase:
enabled: true enabled: true
username: coturn
password: "{{ coturn_admin_password }}"
database: coturn
postgresql: postgresql:
enabled: true enabled: true
image:
repository: bitnamilegacy/postgresql
tag: 17.6.0-debian-12-r0
global: global:
postgresql: postgresql:
auth: auth:
@@ -101,3 +110,6 @@
auth: auth:
username: coturn username: coturn
password: "{{ coturn_admin_password }}" password: "{{ coturn_admin_password }}"
extraTurnserverConfiguration: |
use-auth-secret
static-auth-secret={{ coturn_shared_secret }}

View File

@@ -32,10 +32,6 @@
volumeName: "data" volumeName: "data"
size: 256Gi size: 256Gi
- name: Deploy Dex - name: Deploy Dex
kubernetes.core.helm: kubernetes.core.helm:
name: dex name: dex
@@ -45,6 +41,12 @@
values: values:
config: config:
issuer: https://dex.eom.dev/ issuer: https://dex.eom.dev/
staticClients:
- id: "{{ matrix_dex_oidc_client_id }}"
name: Matrix Auth Service
secret: "{{ matrix_dex_oidc_client_secret }}"
redirectURIs:
- "https://mas.eom.dev/upstream/callback/01K96AQEZKKABW34PY3R6BVNJ4"
storage: storage:
type: postgres type: postgres
config: config:
@@ -62,10 +64,10 @@
config: config:
host: openldap.openldap.svc.cluster.local host: openldap.openldap.svc.cluster.local
insecureNoSSL: true insecureNoSSL: true
bindDN: cn=readonly,dc=example,dc=com bindDN: cn=readonly,dc=eom,dc=dev
bindPW: "{{ openldap_readonly_password }}" bindPW: "{{ openldap_readonly_password }}"
userSearch: userSearch:
baseDN: dc=example,dc=com baseDN: dc=eom,dc=dev
filter: "(&(objectClass=posixAccount)(memberOf=cn=Dex Users,ou=Dex,ou=Services,dc=eom,dc=dev))" filter: "(&(objectClass=posixAccount)(memberOf=cn=Dex Users,ou=Dex,ou=Services,dc=eom,dc=dev))"
username: uid username: uid
idAttr: uid idAttr: uid
@@ -81,12 +83,14 @@
nameAttr: cn nameAttr: cn
ingress: ingress:
enabled: true enabled: true
className: nginx
annotations: annotations:
cert-manager.io/cluster-issuer: ca-issuer cert-manager.io/cluster-issuer: ca-issuer
hosts: hosts:
- host: dex.eom.dev - host: dex.eom.dev
paths: paths:
- path: / - path: /
pathType: ImplementationSpecific
tls: tls:
- hosts: - hosts:
- dex.eom.dev - dex.eom.dev

View File

@@ -1,5 +1,14 @@
--- ---
# tasks file for grafana-matrix-forwarder # tasks file for grafana-matrix-forwarder
- name: Create Grafana Matrix Forwarder namespace
k8s:
state: present
definition:
apiVersion: v1
kind: Namespace
metadata:
name: grafana-matrix-forwarder
- name: Create a Deployment for Grafana Matrix Forwarder - name: Create a Deployment for Grafana Matrix Forwarder
k8s: k8s:
definition: definition:
@@ -7,7 +16,7 @@
kind: Deployment kind: Deployment
metadata: metadata:
name: matrix-forwarder name: matrix-forwarder
namespace: grafana namespace: grafana-matrix-forwarder
spec: spec:
replicas: 1 replicas: 1
selector: selector:
@@ -29,7 +38,7 @@
- name: GMF_MATRIX_PASSWORD - name: GMF_MATRIX_PASSWORD
value: "{{ grafana_admin_password }}" value: "{{ grafana_admin_password }}"
- name: GMF_MATRIX_HOMESERVER - name: GMF_MATRIX_HOMESERVER
value: eom.dev value: synapse.eom.dev
- name: GMF_RESOLVE_MODE - name: GMF_RESOLVE_MODE
value: reply value: reply
@@ -40,7 +49,7 @@
kind: Service kind: Service
metadata: metadata:
name: matrix-forwarder name: matrix-forwarder
namespace: grafana namespace: grafana-matrix-forwarder
spec: spec:
selector: selector:
app: matrix-forwarder app: matrix-forwarder

View File

@@ -41,6 +41,36 @@
requests: requests:
storage: 32Gi storage: 32Gi
- name: Request a certificate for OpenLDAP
k8s:
state: present
definition:
apiVersion: cert-manager.io/v1
kind: Certificate
metadata:
name: openldap
namespace: openldap
spec:
secretName: openldap
privateKey:
algorithm: RSA
encoding: PKCS1
size: 2048
duration: 2160h # 90d
renewBefore: 360h # 15d
isCA: false
usages:
- server auth
- client auth
subject:
organizations:
- EOM
dnsNames:
- openldap.eom.dev
issuerRef:
name: ca-issuer
kind: ClusterIssuer
- name: Create Deployment for OpenLDAP - name: Create Deployment for OpenLDAP
k8s: k8s:
definition: definition:
@@ -75,6 +105,10 @@
value: "{{ openldap_readonly_password }}" value: "{{ openldap_readonly_password }}"
- name: LDAP_TLS_VERIFY_CLIENT - name: LDAP_TLS_VERIFY_CLIENT
value: never value: never
- name: LDAP_TLS_CRT_FILENAME
value: tls.crt
- name: LDAP_TLS_KEY_FILENAME
value: tls.key
volumeMounts: volumeMounts:
- name: config - name: config
mountPath: /etc/ldap/slapd.d mountPath: /etc/ldap/slapd.d

View File

@@ -81,6 +81,7 @@
name: rtmp name: rtmp
- port: 8080 - port: 8080
name: http name: http
externalTrafficPolicy: Local
type: LoadBalancer type: LoadBalancer
- name: Create Ingress - name: Create Ingress