From 0ff84def1464ce0b81bb72197fed51e3a6a3df10 Mon Sep 17 00:00:00 2001 From: Daniel Date: Tue, 14 Oct 2025 14:36:11 +0200 Subject: [PATCH] Added passbolt ingress and cert --- .DS_Store | Bin 6148 -> 0 bytes .gitignore | 1 + argocd/.DS_Store | Bin 6148 -> 0 bytes argocd/apps/.DS_Store | Bin 6148 -> 0 bytes .../include/passbolt-certificate.yaml | 13 +++++ config/passbolt/passbolt-ingressroute.yaml | 53 ++++++++++++++++++ 6 files changed, 67 insertions(+) delete mode 100644 .DS_Store create mode 100644 .gitignore delete mode 100644 argocd/.DS_Store delete mode 100644 argocd/apps/.DS_Store create mode 100644 argocd/apps/cert-manager/include/passbolt-certificate.yaml create mode 100644 config/passbolt/passbolt-ingressroute.yaml diff --git a/.DS_Store b/.DS_Store deleted file mode 100644 index 2ddac0dcc6eb0523c8fdc56b3317f39e3b0b0558..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 6148 zcmeHKJ8r`;3?);e2$02NM_r*e5RCK$xjgD#rQhvvj$YvLT}bi|zwH1@V-^m;4I%_5-~#+~L;|T|&(V2yybzdCg`Sc9Vy71EH#D_~ z=P1)427Thk&wD!$ugTBfEz>zPS6X`0=rQ`s=Ck7d3L;E+BF)XXUTc76VK1L zn2Z6~?)SU})&N#?SG@Z$GGn~N4Ff*$jm!DxG<;pJgQqdey&lkcjmPy|mWY4|h=2%) zfCx;8Kpf&c|KBF`OnMX%5P@kB@b5#RyVlg!H9j32q6MHXm=5DSdI@Ur1huBNuFTLZ zy9disi#EjbQBEznuco%Hy&RU!hvl8kyBM1Fa#&$Nvl^m71Vms&VBX`kpZ^E?fBpZc zM45*E#r|Wz<4fh)`sejLf6T1U8=V^4IXwIXFz};zLl5J6@d>r2wyw<3^dk@$ KG>E`c3ETmfS`&K! diff --git a/argocd/apps/cert-manager/include/passbolt-certificate.yaml b/argocd/apps/cert-manager/include/passbolt-certificate.yaml new file mode 100644 index 0000000..c5b8a67 --- /dev/null +++ b/argocd/apps/cert-manager/include/passbolt-certificate.yaml @@ -0,0 +1,13 @@ +apiVersion: cert-manager.io/v1 +kind: Certificate +metadata: + name: passbolt-cert + namespace: kube-system +spec: + secretName: passbolt-tls + issuerRef: + name: lets-encrypt + kind: ClusterIssuer + commonName: passbolt.innovation-hub-niedersachsen.de + dnsNames: + - passbolt.innovation-hub-niedersachsen.de diff --git a/config/passbolt/passbolt-ingressroute.yaml b/config/passbolt/passbolt-ingressroute.yaml new file mode 100644 index 0000000..0a9205b --- /dev/null +++ b/config/passbolt/passbolt-ingressroute.yaml @@ -0,0 +1,53 @@ +--- +apiVersion: traefik.io/v1alpha1 +kind: Middleware +metadata: + name: passbolt-stripprefix + namespace: kube-system +spec: + stripPrefix: + prefixes: + - / +--- +apiVersion: traefik.io/v1alpha1 +kind: ServersTransport +metadata: + name: passbolt-transport + namespace: kube-system +spec: + insecureSkipVerify: true +--- +apiVersion: traefik.io/v1alpha1 +kind: IngressRoute +metadata: + name: passbolt-external + namespace: kube-system + annotations: + cert-manager.io/cluster-issuer: "lets-encrypt" +spec: + entryPoints: + - websecure + routes: + - match: Host(`passbolt.innovation-hub-niedersachsen.de`) + kind: Rule + services: + - name: passbolt-external-service + port: 3001 + scheme: http + serversTransport: passbolt-transport + middlewares: + - name: passbolt-stripprefix + tls: + secretName: passbolt-tls +--- +apiVersion: v1 +kind: Service +metadata: + name: passbolt-external-service + namespace: kube-system +spec: + type: ExternalName + externalName: 192-168-4-106.nip.io + ports: + - port: 3001 + targetPort: 3001