mirror of
https://github.com/phfroidmont/self-hosting.git
synced 2025-12-25 05:36:59 +01:00
Manage letsencrypt certificates with cert-manager
This commit is contained in:
parent
c6f69f614c
commit
01b7e79e55
8 changed files with 137 additions and 8 deletions
|
|
@ -1,3 +1,4 @@
|
|||
---
|
||||
letsencrypt_email: letsencrypt.account@banditlair.com
|
||||
searx_issuer: "{{default_issuer}}"
|
||||
traefik_domain: "traefik.{{banditlair_domain}}"
|
||||
searx_domain: "searx.{{banditlair_domain}}"
|
||||
27
roles/k8s-manifests/tasks/cert-manager.yml
Normal file
27
roles/k8s-manifests/tasks/cert-manager.yml
Normal file
|
|
@ -0,0 +1,27 @@
|
|||
- name: cert-manager issuers
|
||||
k8s:
|
||||
state: present
|
||||
namespace: "{{item.1}}"
|
||||
definition:
|
||||
apiVersion: certmanager.k8s.io/v1alpha1
|
||||
kind: Issuer
|
||||
metadata:
|
||||
name: "{{item.0.name}}"
|
||||
spec:
|
||||
acme:
|
||||
# The ACME server URL
|
||||
server: "{{item.0.server}}"
|
||||
# Email address used for ACME registration
|
||||
email: "{{letsencrypt_email}}"
|
||||
# Name of a secret used to store the ACME account private key
|
||||
privateKeySecretRef:
|
||||
name: "{{item.0.name}}"
|
||||
# Enable HTTP01 validations
|
||||
http01: {}
|
||||
with_nested:
|
||||
- - name: letsencrypt-production
|
||||
server: https://acme-v02.api.letsencrypt.org/directory
|
||||
- name: letsencrypt-staging
|
||||
server: https://acme-staging-v02.api.letsencrypt.org/directory
|
||||
- - default
|
||||
- kube-system
|
||||
|
|
@ -1,9 +1,12 @@
|
|||
---
|
||||
- include: prerequisites.yml
|
||||
- import_tasks: prerequisites.yml
|
||||
tags: prerequisites
|
||||
|
||||
- include: traefik.yml
|
||||
- import_tasks: cert-manager.yml
|
||||
tags: cert-manager
|
||||
|
||||
- import_tasks: traefik.yml
|
||||
tags: traefik
|
||||
|
||||
- include: searx.yml
|
||||
- import_tasks: searx.yml
|
||||
tags: searx
|
||||
|
|
|
|||
|
|
@ -58,12 +58,40 @@
|
|||
kind: Ingress
|
||||
metadata:
|
||||
name: searx
|
||||
annotation:
|
||||
traefik.ingress.kubernetes.io/redirect-entry-point: https
|
||||
traefik.ingress.kubernetes.io/redirect-permanent: "true"
|
||||
ingress.kubernetes.io/ssl-redirect: "true"
|
||||
ingress.kubernetes.io/ssl-temporary-redirect: "false"
|
||||
spec:
|
||||
rules:
|
||||
- host: searx.k8s.banditlair.com
|
||||
- host: "{{searx_domain}}"
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
backend:
|
||||
serviceName: searx
|
||||
servicePort: 80
|
||||
tls:
|
||||
- secretName: searx-cert
|
||||
|
||||
- name: Searx certificate
|
||||
k8s:
|
||||
namespace: default
|
||||
state: present
|
||||
definition:
|
||||
apiVersion: certmanager.k8s.io/v1alpha1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: searx-cert
|
||||
spec:
|
||||
secretName: traefik-cert
|
||||
issuerRef:
|
||||
name: "{{cert_manager_issuer}}"
|
||||
commonName: "{{searx_domain}}"
|
||||
acme:
|
||||
config:
|
||||
- http01:
|
||||
ingressClass: traefik
|
||||
domains:
|
||||
- "{{searx_domain}}"
|
||||
|
|
@ -53,6 +53,39 @@
|
|||
name: traefik-ingress-controller
|
||||
namespace: kube-system
|
||||
|
||||
# - name: Traefik configuration
|
||||
# k8s:
|
||||
# state: present
|
||||
# definition:
|
||||
# apiVersion: v1
|
||||
# kind: ConfigMap
|
||||
# metadata:
|
||||
# name: traefik-conf
|
||||
# namespace: kube-system
|
||||
# data:
|
||||
# traefik.toml: |
|
||||
# defaultEntryPoints = ["http", "https"]
|
||||
|
||||
# logLevel = "INFO"
|
||||
|
||||
# [entryPoints]
|
||||
# [entryPoints.http]
|
||||
# address = ":80"
|
||||
# [entryPoints.http.redirect]
|
||||
# entryPoint = "https"
|
||||
# [entryPoints.https]
|
||||
# address = ":443"
|
||||
# [entryPoints.https.tls]
|
||||
# [entryPoints.api]
|
||||
# address = ":8080"
|
||||
|
||||
# [api]
|
||||
# entryPoint = "api"
|
||||
# dashboard = true
|
||||
# debug = false
|
||||
|
||||
# [kubernetes]
|
||||
|
||||
- name: Traefik daemon set
|
||||
k8s:
|
||||
state: present
|
||||
|
|
@ -76,6 +109,9 @@
|
|||
containers:
|
||||
- image: traefik
|
||||
name: traefik-ingress-lb
|
||||
# volumeMounts:
|
||||
# - mountPath: /config
|
||||
# name: traefik-config
|
||||
ports:
|
||||
- name: http
|
||||
containerPort: 80
|
||||
|
|
@ -92,6 +128,10 @@
|
|||
- --api
|
||||
- --kubernetes
|
||||
- --logLevel=INFO
|
||||
# volumes:
|
||||
# - name: traefik-config
|
||||
# configMap:
|
||||
# name: traefik-conf
|
||||
|
||||
- name: Traefik service
|
||||
k8s:
|
||||
|
|
@ -154,12 +194,39 @@
|
|||
annotations:
|
||||
traefik.ingress.kubernetes.io/auth-type: "basic"
|
||||
traefik.ingress.kubernetes.io/auth-secret: "traefik-auth"
|
||||
traefik.ingress.kubernetes.io/redirect-entry-point: https
|
||||
traefik.ingress.kubernetes.io/redirect-permanent: "true"
|
||||
ingress.kubernetes.io/ssl-redirect: "true"
|
||||
ingress.kubernetes.io/ssl-temporary-redirect: "false"
|
||||
spec:
|
||||
rules:
|
||||
- host: traefik.k8s.banditlair.com
|
||||
- host: "{{traefik_domain}}"
|
||||
http:
|
||||
paths:
|
||||
- path: /
|
||||
backend:
|
||||
serviceName: traefik-web-ui
|
||||
servicePort: web
|
||||
tls:
|
||||
- secretName: traefik-cert
|
||||
|
||||
- name: Traefik UI certificate
|
||||
k8s:
|
||||
state: present
|
||||
definition:
|
||||
apiVersion: certmanager.k8s.io/v1alpha1
|
||||
kind: Certificate
|
||||
metadata:
|
||||
name: traefik-cert
|
||||
namespace: kube-system
|
||||
spec:
|
||||
secretName: traefik-cert
|
||||
issuerRef:
|
||||
name: "{{cert_manager_issuer}}"
|
||||
commonName: "{{traefik_domain}}"
|
||||
acme:
|
||||
config:
|
||||
- http01:
|
||||
ingressClass: traefik
|
||||
domains:
|
||||
- "{{traefik_domain}}"
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue