This commit is contained in:
2024-01-25 18:35:22 +01:00
parent 0727fca591
commit 8c4348d215
97 changed files with 402 additions and 402 deletions

View File

@@ -9,7 +9,7 @@ resource "kubectl_manifest" "deploy" {
spec: spec:
replicas: 1 replicas: 1
hostname: "${var.component}-${var.instance}" hostname: "${var.component}-${var.instance}"
subdomain: "${var.domain-name}" subdomain: "${var.domain_name}"
selector: selector:
matchLabels: ${jsonencode(local.common-labels)} matchLabels: ${jsonencode(local.common-labels)}
template: template:

View File

@@ -6,17 +6,17 @@ metadata:
name: code-server name: code-server
description: null description: null
options: options:
app-group: app_group:
default: dev default: dev
examples: examples:
- dev - dev
type: string type: string
sub-domain: sub_domain:
default: code default: code
examples: examples:
- code - code
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -48,7 +48,7 @@ options:
- Block - Block
type: string type: string
type: object type: object
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.instance}.${var.sub-domain}.${var.domain-name}" dns_name = "${var.instance}.${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "_static/src/browser/media/favicon-dark-support.svg" icon = "_static/src/browser/media/favicon-dark-support.svg"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -34,10 +34,10 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
middlewares = ["forward-${local.app-name}"] middlewares = ["forward-${local.app_name}"]
service = local.service service = local.service
providers = { providers = {
kubectl = kubectl kubectl = kubectl
@@ -48,8 +48,8 @@ module "application" {
source = "/dist/modules/application" source = "/dist/modules/application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app-group = var.app-group app_group = var.app_group
dns-name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.forward.provider-id protocol_provider = module.forward.provider-id
providers = { providers = {
@@ -73,9 +73,9 @@ module "forward" {
instance = var.instance instance = var.instance
domain = var.domain domain = var.domain
namespace = var.namespace namespace = var.namespace
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
service = local.service service = local.service
icon = local.icon icon = local.icon
request_headers = local.request_headers request_headers = local.request_headers

View File

@@ -8,10 +8,10 @@ resource "kubectl_manifest" "pvc" {
labels: ${jsonencode(local.common-labels)} labels: ${jsonencode(local.common-labels)}
spec: spec:
accessModes: accessModes:
- "${var.storage.accessMode}" - "${var.storage.volume.accessMode}"
resources: resources:
requests: requests:
storage: "${var.storage.size}" storage: "${var.storage.volume.size}"
volumeMode: "${var.storage.type}" volumeMode: "${var.storage.volume.type}"
EOF EOF
} }

View File

@@ -72,7 +72,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
sub-domain: sub_domain:
default: dbgate default: dbgate
examples: examples:
- dbgate - dbgate
@@ -106,12 +106,12 @@ options:
type: string type: string
type: object type: object
type: array type: array
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
app-group: app_group:
default: dev default: dev
examples: examples:
- dev - dev
@@ -169,7 +169,7 @@ options:
type: string type: string
type: object type: object
type: array type: array
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "logo192.png" icon = "logo192.png"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -34,9 +34,9 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
middlewares = [] middlewares = []
service = local.service service = local.service
providers = { providers = {
@@ -48,8 +48,8 @@ module "application" {
source = "/dist/modules/application" source = "/dist/modules/application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app-group = var.app-group app_group = var.app_group
dns-name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.oauth2.provider-id protocol_provider = module.oauth2.provider-id
providers = { providers = {
@@ -63,7 +63,7 @@ module "oauth2" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
labels = local.common-labels labels = local.common-labels
dns-name = local.dns-name dns_name = local.dns_name
redirect-path = "" redirect-path = ""
providers = { providers = {
kubernetes = kubernetes kubernetes = kubernetes

View File

@@ -8,10 +8,10 @@ resource "kubectl_manifest" "pvc" {
labels: ${jsonencode(local.common-labels)} labels: ${jsonencode(local.common-labels)}
spec: spec:
accessModes: accessModes:
- "${var.storage.accessMode}" - "${var.storage.volume.accessMode}"
resources: resources:
requests: requests:
storage: "${var.storage.size}" storage: "${var.storage.volume.size}"
volumeMode: "${var.storage.type}" volumeMode: "${var.storage.volume.type}"
EOF EOF
} }

View File

@@ -1,6 +1,6 @@
locals { locals {
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
main-group = format("app-%s", local.app-name) main-group = format("app-%s", local.app_name)
sorted-group-names = reverse(distinct(sort([ sorted-group-names = reverse(distinct(sort([
for grp in var.user-groups: grp.name for grp in var.user-groups: grp.name
]))) ])))
@@ -19,7 +19,7 @@ data "authentik_group" "vynil-admin" {
resource "authentik_group" "groups" { resource "authentik_group" "groups" {
count = length(local.sorted-groups) count = length(local.sorted-groups)
name = local.sorted-groups[count.index].name name = local.sorted-groups[count.index].name
attributes = jsonencode({"${local.app-name}" = true}) attributes = jsonencode({"${local.app_name}" = true})
} }
data "authentik_group" "readed_groups" { data "authentik_group" "readed_groups" {
depends_on = [ authentik_group.groups ] depends_on = [ authentik_group.groups ]
@@ -38,7 +38,7 @@ resource "authentik_policy_expression" "policy" {
name = local.main-group name = local.main-group
expression = <<-EOF expression = <<-EOF
attr = request.user.group_attributes() attr = request.user.group_attributes()
return attr['${local.app-name}'] if '${local.app-name}' in attr else False return attr['${local.app_name}'] if '${local.app_name}' in attr else False
EOF EOF
} }
@@ -61,10 +61,10 @@ resource "authentik_policy_binding" "dolibarr_ldap_access_vynil" {
resource "authentik_application" "dolibarr_application_saml" { resource "authentik_application" "dolibarr_application_saml" {
name = "${var.instance}" name = "${var.instance}"
slug = "${var.component}-${var.instance}" slug = "${var.component}-${var.instance}"
group = var.app-group group = var.app_group
protocol_provider = authentik_provider_saml.dolibarr.id protocol_provider = authentik_provider_saml.dolibarr.id
meta_launch_url = format("https://%s.%s", var.sub-domain, var.domain-name) meta_launch_url = format("https://%s.%s", var.sub_domain, var.domain_name)
meta_icon = format("https://%s.%s/%s", var.sub-domain, var.domain-name, "theme/dolibarr_256x256_color.png") meta_icon = format("https://%s.%s/%s", var.sub_domain, var.domain_name, "theme/dolibarr_256x256_color.png")
} }
resource "authentik_policy_binding" "dolibarr_saml_access_users" { resource "authentik_policy_binding" "dolibarr_saml_access_users" {

View File

@@ -167,7 +167,7 @@ resource "kubectl_manifest" "config" {
DOLI_ADMIN_LOGIN: "admin_${var.instance}" DOLI_ADMIN_LOGIN: "admin_${var.instance}"
DOLI_MODULES: "modSociete,modBlockedLog,modSamlConnector,modLdap" DOLI_MODULES: "modSociete,modBlockedLog,modSamlConnector,modLdap"
DOLI_AUTH: "dolibarr" DOLI_AUTH: "dolibarr"
DOLI_URL_ROOT: "https://${var.sub-domain}.${var.domain-name}" DOLI_URL_ROOT: "https://${var.sub_domain}.${var.domain_name}"
DOLI_LDAP_PORT: "389" DOLI_LDAP_PORT: "389"
DOLI_LDAP_VERSION: "3" DOLI_LDAP_VERSION: "3"
DOLI_LDAP_SERVERTYPE: "openldap" DOLI_LDAP_SERVERTYPE: "openldap"

View File

@@ -89,7 +89,7 @@ options:
type: string type: string
type: object type: object
type: object type: object
sub-domain: sub_domain:
default: erp default: erp
examples: examples:
- erp - erp
@@ -155,7 +155,7 @@ options:
default: '14' default: '14'
type: string type: string
type: object type: object
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -198,7 +198,7 @@ options:
default: 2Gi default: 2Gi
type: string type: string
type: object type: object
app-group: app_group:
default: '' default: ''
examples: examples:
- '' - ''
@@ -341,7 +341,7 @@ options:
- block - block
type: string type: string
type: object type: object
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -1,5 +1,5 @@
locals { locals {
dns-names = ["${var.sub-domain}.${var.domain-name}"] dns_names = ["${var.sub_domain}.${var.domain_name}"]
middlewares = ["${var.instance}-https"] middlewares = ["${var.instance}-https"]
service = { service = {
"name" = "${var.instance}" "name" = "${var.instance}"
@@ -7,7 +7,7 @@ locals {
"number" = 80 "number" = 80
} }
} }
rules = [ for v in local.dns-names : { rules = [ for v in local.dns_names : {
"host" = "${v}" "host" = "${v}"
"http" = { "http" = {
"paths" = [{ "paths" = [{
@@ -31,7 +31,7 @@ resource "kubectl_manifest" "prj_certificate" {
labels: ${jsonencode(local.common-labels)} labels: ${jsonencode(local.common-labels)}
spec: spec:
secretName: "${var.instance}-cert" secretName: "${var.instance}-cert"
dnsNames: ${jsonencode(local.dns-names)} dnsNames: ${jsonencode(local.dns_names)}
issuerRef: issuerRef:
name: "${var.issuer}" name: "${var.issuer}"
kind: "ClusterIssuer" kind: "ClusterIssuer"
@@ -66,10 +66,10 @@ resource "kubectl_manifest" "prj_ingress" {
annotations: annotations:
"traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in local.middlewares : format("%s-%s@kubernetescrd", var.namespace, m)])}" "traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in local.middlewares : format("%s-%s@kubernetescrd", var.namespace, m)])}"
spec: spec:
ingressClassName: "${var.ingress-class}" ingressClassName: "${var.ingress_class}"
rules: ${jsonencode(local.rules)} rules: ${jsonencode(local.rules)}
tls: tls:
- hosts: ${jsonencode(local.dns-names)} - hosts: ${jsonencode(local.dns_names)}
secretName: "${var.instance}-cert" secretName: "${var.instance}-cert"
EOF EOF
} }

View File

@@ -5,7 +5,7 @@ data "kubernetes_secret_v1" "authentik" {
} }
} }
locals { locals {
base-dn = format("dc=%s", join(",dc=", split(".", format("%s.%s", var.sub-domain, var.domain-name)))) base-dn = format("dc=%s", join(",dc=", split(".", format("%s.%s", var.sub_domain, var.domain_name))))
base-group-dn = format("ou=groups,%s", local.base-dn) base-group-dn = format("ou=groups,%s", local.base-dn)
base-user-dn = format("ou=users,%s", local.base-dn) base-user-dn = format("ou=users,%s", local.base-dn)
authentik_url = "http://authentik.${var.domain}-auth.svc" authentik_url = "http://authentik.${var.domain}-auth.svc"

View File

@@ -10,10 +10,10 @@ resource "kubectl_manifest" "pvc" {
labels: ${jsonencode(local.common-labels)} labels: ${jsonencode(local.common-labels)}
spec: spec:
accessModes: accessModes:
- "${var.storage.accessMode}" - "${var.storage.volume.accessMode}"
resources: resources:
requests: requests:
storage: "${var.storage.size}" storage: "${var.storage.volume.size}"
volumeMode: "${var.storage.type}" volumeMode: "${var.storage.volume.type}"
EOF EOF
} }

View File

@@ -13,7 +13,7 @@ resource "kubectl_manifest" "dolibarr_redis" {
labels: ${jsonencode(local.redis-labels)} labels: ${jsonencode(local.redis-labels)}
spec: spec:
kubernetesConfig: kubernetesConfig:
image: "${var.redis.image}" image: "${var.images.redis.registry}/${var.images.redis.repository}:${var.images.redis.tag}"
imagePullPolicy: "IfNotPresent" imagePullPolicy: "IfNotPresent"
storage: storage:
volumeClaimTemplate: volumeClaimTemplate:
@@ -21,10 +21,10 @@ resource "kubectl_manifest" "dolibarr_redis" {
accessModes: ["ReadWriteOnce"] accessModes: ["ReadWriteOnce"]
resources: resources:
requests: requests:
storage: "${var.redis.storage}" storage: "${var.storage.redis}"
redisExporter: redisExporter:
enabled: ${var.redis.exporter.enabled} enabled: ${var.redis.exporter.enabled}
image: "${var.redis.exporter.image}" image: "${var.images.redis_exporter.registry}/${var.images.redis_exporter.repository}:${var.images.redis_exporter.tag}"
securityContext: securityContext:
runAsUser: 1000 runAsUser: 1000
fsGroup: 1000 fsGroup: 1000

View File

@@ -35,7 +35,7 @@ resource "kubectl_manifest" "saml_certificate" {
labels: ${jsonencode(local.common-labels)} labels: ${jsonencode(local.common-labels)}
spec: spec:
secretName: "${var.instance}-${var.component}-saml" secretName: "${var.instance}-${var.component}-saml"
dnsNames: ${jsonencode(local.dns-names)} dnsNames: ${jsonencode(local.dns_names)}
issuerRef: issuerRef:
name: "self-sign" name: "self-sign"
kind: "ClusterIssuer" kind: "ClusterIssuer"
@@ -47,7 +47,7 @@ resource "authentik_provider_saml" "dolibarr" {
name = "dolibarr-${var.instance}-saml" name = "dolibarr-${var.instance}-saml"
authentication_flow = data.authentik_flow.default-authentication-flow.id authentication_flow = data.authentik_flow.default-authentication-flow.id
authorization_flow = data.authentik_flow.default-authorization-flow.id authorization_flow = data.authentik_flow.default-authorization-flow.id
acs_url = "https://${var.sub-domain}.${var.domain-name}/custom/samlconnector/acs.php?entity=1&fk_idp=0" acs_url = "https://${var.sub_domain}.${var.domain_name}/custom/samlconnector/acs.php?entity=1&fk_idp=0"
property_mappings = data.authentik_property_mapping_saml.saml_maps.ids property_mappings = data.authentik_property_mapping_saml.saml_maps.ids
name_id_mapping = data.authentik_property_mapping_saml.saml_name.id name_id_mapping = data.authentik_property_mapping_saml.saml_name.id
signing_kp = data.authentik_certificate_key_pair.generated.id signing_kp = data.authentik_certificate_key_pair.generated.id

View File

@@ -156,7 +156,7 @@ options:
default: 2Gi default: 2Gi
type: string type: string
type: object type: object
ssh-sub-domain: ssh-sub_domain:
default: git default: git
examples: examples:
- git - git
@@ -185,12 +185,12 @@ options:
default: 10Gi default: 10Gi
type: string type: string
type: object type: object
app-group: app_group:
default: dev default: dev
examples: examples:
- dev - dev
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -301,7 +301,7 @@ options:
default: false default: false
type: boolean type: boolean
type: object type: object
sub-domain: sub_domain:
default: git default: git
examples: examples:
- git - git
@@ -351,7 +351,7 @@ options:
default: false default: false
type: boolean type: boolean
type: object type: object
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -43,15 +43,15 @@ ROOT=/data/git/gitea-repositories
EOF EOF
server = <<-EOF server = <<-EOF
APP_DATA_PATH=/data APP_DATA_PATH=/data
DOMAIN=${var.sub-domain}.${var.domain-name} DOMAIN=${var.sub_domain}.${var.domain_name}
ENABLE_PPROF=false ENABLE_PPROF=false
HTTP_PORT=3000 HTTP_PORT=3000
PROTOCOL=http PROTOCOL=http
ROOT_URL=https://${var.sub-domain}.${var.domain-name} ROOT_URL=https://${var.sub_domain}.${var.domain_name}
SSH_DOMAIN=${var.sub-domain}.${var.domain-name} SSH_DOMAIN=${var.sub_domain}.${var.domain_name}
SSH_LISTEN_PORT=2222 SSH_LISTEN_PORT=2222
SSH_PORT=${var.ssh-port} SSH_PORT=${var.ssh-port}
SSH_DOMAIN=${var.ssh-sub-domain}.${var.domain-name} SSH_DOMAIN=${var.ssh-sub_domain}.${var.domain_name}
START_SSH_SERVER=true START_SSH_SERVER=true
EOF EOF
ui = <<-EOF ui = <<-EOF

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "assets/img/logo.svg" icon = "assets/img/logo.svg"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -34,9 +34,9 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
middlewares = [] middlewares = []
service = local.service service = local.service
providers = { providers = {
@@ -48,8 +48,8 @@ module "application" {
source = "/dist/modules/application" source = "/dist/modules/application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app-group = var.app-group app_group = var.app_group
dns-name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.oauth2.provider-id protocol_provider = module.oauth2.provider-id
providers = { providers = {
@@ -63,7 +63,7 @@ module "oauth2" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
labels = local.common-labels labels = local.common-labels
dns-name = local.dns-name dns_name = local.dns_name
redirect-path = "user/oauth2/vynil/callback" redirect-path = "user/oauth2/vynil/callback"
providers = { providers = {
kubernetes = kubernetes kubernetes = kubernetes

View File

@@ -13,7 +13,7 @@ resource "kubectl_manifest" "prj_redis" {
labels: ${jsonencode(local.redis-labels)} labels: ${jsonencode(local.redis-labels)}
spec: spec:
kubernetesConfig: kubernetesConfig:
image: "${var.redis.image}" image: "${var.images.redis.registry}/${var.images.redis.repository}:${var.images.redis.tag}"
imagePullPolicy: "IfNotPresent" imagePullPolicy: "IfNotPresent"
storage: storage:
volumeClaimTemplate: volumeClaimTemplate:
@@ -21,10 +21,10 @@ resource "kubectl_manifest" "prj_redis" {
accessModes: ["ReadWriteOnce"] accessModes: ["ReadWriteOnce"]
resources: resources:
requests: requests:
storage: "${var.redis.storage}" storage: "${var.storage.redis}"
redisExporter: redisExporter:
enabled: ${var.redis.exporter.enabled} enabled: ${var.redis.exporter.enabled}
image: "${var.redis.exporter.image}" image: "${var.images.redis_exporter.registry}/${var.images.redis_exporter.repository}:${var.images.redis_exporter.tag}"
securityContext: securityContext:
runAsUser: 1000 runAsUser: 1000
fsGroup: 1000 fsGroup: 1000

View File

@@ -11,12 +11,12 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
type: string type: string
sub-domain: sub_domain:
default: gramo default: gramo
examples: examples:
- gramo - gramo
@@ -70,7 +70,7 @@ options:
examples: examples:
- false - false
type: boolean type: boolean
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -85,7 +85,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
app-group: app_group:
default: infra default: infra
examples: examples:
- infra - infra

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "icon.svg" icon = "icon.svg"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -34,10 +34,10 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress_class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns_names = local.dns-names dns_names = local.dns_names
middlewares = ["forward-${local.app-name}"] middlewares = ["forward-${local.app_name}"]
services = [local.service] services = [local.service]
providers = { providers = {
kubectl = kubectl kubectl = kubectl
@@ -48,8 +48,8 @@ module "application" {
source = "git::https://git.solidite.fr/vynil/kydah-modules.git//application" source = "git::https://git.solidite.fr/vynil/kydah-modules.git//application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app_group = var.app-group app_group = var.app_group
dns_name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.forward.provider-id protocol_provider = module.forward.provider-id
providers = { providers = {
@@ -73,9 +73,9 @@ module "forward" {
instance = var.instance instance = var.instance
domain = var.domain domain = var.domain
namespace = var.namespace namespace = var.namespace
ingress_class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns_names = local.dns-names dns_names = local.dns_names
service = local.service service = local.service
icon = local.icon icon = local.icon
request_headers = local.request_headers request_headers = local.request_headers

View File

@@ -6,7 +6,7 @@ metadata:
name: k8s-api name: k8s-api
description: Access to the kubernetes api description: Access to the kubernetes api
options: options:
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -21,12 +21,12 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
sub-domain: sub_domain:
default: api default: api
examples: examples:
- api - api

View File

@@ -1,5 +1,5 @@
locals { locals {
dns-names = ["${var.sub-domain}.${var.domain-name}"] dns_names = ["${var.sub_domain}.${var.domain_name}"]
middlewares = [] middlewares = []
services = [{ services = [{
"kind" = "Service" "kind" = "Service"
@@ -7,7 +7,7 @@ locals {
"namespace" = "default" "namespace" = "default"
"port" = 443 "port" = 443
}] }]
routes = [ for v in local.dns-names : { routes = [ for v in local.dns_names : {
"kind" = "Rule" "kind" = "Rule"
"match" = "Host(`${v}`)" "match" = "Host(`${v}`)"
"middlewares" = local.middlewares "middlewares" = local.middlewares
@@ -25,7 +25,7 @@ resource "kubectl_manifest" "prj_certificate" {
labels: ${jsonencode(local.common-labels)} labels: ${jsonencode(local.common-labels)}
spec: spec:
secretName: "${var.instance}-cert" secretName: "${var.instance}-cert"
dnsNames: ${jsonencode(local.dns-names)} dnsNames: ${jsonencode(local.dns_names)}
issuerRef: issuerRef:
name: "${var.issuer}" name: "${var.issuer}"
kind: "ClusterIssuer" kind: "ClusterIssuer"

View File

@@ -36,7 +36,7 @@ resource "kubectl_manifest" "collabora_deploy" {
imagePullPolicy: "${var.images.collabora.pullPolicy}" imagePullPolicy: "${var.images.collabora.pullPolicy}"
env: env:
- name: aliasgroup1 - name: aliasgroup1
value: "https://${local.dns-name}" value: "https://${local.dns_name}"
- name: DONT_GEN_SSL_CERT - name: DONT_GEN_SSL_CERT
value: "true" value: "true"
- name: extra_params - name: extra_params

View File

@@ -17,7 +17,7 @@ locals {
fi fi
} }
run_as ./occ --no-warnings config:system:set trusted_domains 0 --value=nextcloud run_as ./occ --no-warnings config:system:set trusted_domains 0 --value=nextcloud
run_as ./occ --no-warnings config:system:set trusted_domains 1 --value="${local.dns-name}" run_as ./occ --no-warnings config:system:set trusted_domains 1 --value="${local.dns_name}"
run_as ./occ app:install user_oidc ||: run_as ./occ app:install user_oidc ||:
run_as ./occ user_oidc:provider "$${OAUTH2_CONNECTOR_NAME}" --clientid="$${OAUTH2_CLIENT_ID}" \ run_as ./occ user_oidc:provider "$${OAUTH2_CONNECTOR_NAME}" --clientid="$${OAUTH2_CLIENT_ID}" \
--clientsecret="$${OAUTH2_CLIENT_SECRET}" \ --clientsecret="$${OAUTH2_CLIENT_SECRET}" \
@@ -41,14 +41,14 @@ locals {
var.apps.collabora?[ var.apps.collabora?[
"run_as ./occ app:install richdocuments ||:", "run_as ./occ app:install richdocuments ||:",
"run_as ./occ app:enable richdocuments ||:", "run_as ./occ app:enable richdocuments ||:",
"run_as ./occ config:app:set richdocuments wopi_url --value=\"https://collabora.${local.dns-name}/\"", "run_as ./occ config:app:set richdocuments wopi_url --value=\"https://collabora.${local.dns_name}/\"",
"run_as ./occ config:app:set richdocuments federation_use_trusted_domains --value=yes", "run_as ./occ config:app:set richdocuments federation_use_trusted_domains --value=yes",
"run_as ./occ richdocuments:activate-config ||:", "run_as ./occ richdocuments:activate-config ||:",
]:["run_as ./occ app:disable richdocuments ||:"], ]:["run_as ./occ app:disable richdocuments ||:"],
var.apps.onlyoffice?[ var.apps.onlyoffice?[
"run_as ./occ app:install onlyoffice ||:", "run_as ./occ app:install onlyoffice ||:",
"run_as ./occ app:enable onlyoffice ||:", "run_as ./occ app:enable onlyoffice ||:",
"run_as ./occ --no-warnings config:app:set onlyoffice DocumentServerUrl --value=\"https://onlyoffice.${local.dns-name}/\"", "run_as ./occ --no-warnings config:app:set onlyoffice DocumentServerUrl --value=\"https://onlyoffice.${local.dns_name}/\"",
"run_as ./occ --no-warnings config:app:set onlyoffice DocumentServerInternalUrl --value=\"http://${var.instance}-onlyoffice/\"", "run_as ./occ --no-warnings config:app:set onlyoffice DocumentServerInternalUrl --value=\"http://${var.instance}-onlyoffice/\"",
"run_as ./occ --no-warnings config:app:set onlyoffice StorageUrl --value=\"http://nextcloud/\"", "run_as ./occ --no-warnings config:app:set onlyoffice StorageUrl --value=\"http://nextcloud/\"",
"run_as ./occ --no-warnings config:app:set onlyoffice jwt_secret --value=\"$${ONLYOFFICE_JWT_SECRET}\"", "run_as ./occ --no-warnings config:app:set onlyoffice jwt_secret --value=\"$${ONLYOFFICE_JWT_SECRET}\"",

View File

@@ -81,7 +81,7 @@ data "kustomization_overlay" "data" {
secretKeyRef: secretKeyRef:
name: "${var.instance}-${var.component}-pg-app" name: "${var.instance}-${var.component}-pg-app"
- name: NEXTCLOUD_TRUSTED_DOMAINS - name: NEXTCLOUD_TRUSTED_DOMAINS
value: "${local.dns-name}" value: "${local.dns_name}"
- name: REDIS_HOST - name: REDIS_HOST
value: "${var.instance}-${var.component}-redis.${var.namespace}.svc" value: "${var.instance}-${var.component}-redis.${var.namespace}.svc"
- name: REDIS_HOST_PORT - name: REDIS_HOST_PORT
@@ -134,12 +134,12 @@ data "kustomization_overlay" "data" {
httpGet: httpGet:
httpHeaders: httpHeaders:
- name: Host - name: Host
value: "${local.dns-name}" value: "${local.dns_name}"
livenessProbe: livenessProbe:
httpGet: httpGet:
httpHeaders: httpHeaders:
- name: Host - name: Host
value: "${local.dns-name}" value: "${local.dns_name}"
EOF EOF
} }
patches { patches {
@@ -163,7 +163,7 @@ data "kustomization_overlay" "data" {
imagePullPolicy: "${var.images.exporter.pullPolicy}" imagePullPolicy: "${var.images.exporter.pullPolicy}"
env: env:
- name: NEXTCLOUD_SERVER - name: NEXTCLOUD_SERVER
value: "https://${local.dns-name}" value: "https://${local.dns_name}"
- name: NEXTCLOUD_TLS_SKIP_VERIFY - name: NEXTCLOUD_TLS_SKIP_VERIFY
value: "${var.issuer=="letsencrypt-prod"?"false":"true"}" value: "${var.issuer=="letsencrypt-prod"?"false":"true"}"
EOF EOF
@@ -182,10 +182,10 @@ data "kustomization_overlay" "data" {
k8up.io/backup: "true" k8up.io/backup: "true"
spec: spec:
accessModes: accessModes:
- "${var.storage.accessMode}" - "${var.storage.volume.accessMode}"
resources: resources:
requests: requests:
storage: "${var.storage.size}" storage: "${var.storage.volume.size}"
EOF EOF
} }
patches { patches {

View File

@@ -21,7 +21,7 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
app-group: app_group:
default: '' default: ''
examples: examples:
- '' - ''
@@ -36,12 +36,12 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -497,7 +497,7 @@ options:
default: '14' default: '14'
type: string type: string
type: object type: object
sub-domain: sub_domain:
default: files default: files
examples: examples:
- files - files

View File

@@ -1,9 +1,9 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-collabora = "collabora.${local.dns-name}" dns-collabora = "collabora.${local.dns_name}"
dns-onlyoffice = "onlyoffice.${local.dns-name}" dns-onlyoffice = "onlyoffice.${local.dns_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "apps/theming/favicon" icon = "apps/theming/favicon"
service = { service = {
"name" = "${var.component}" "name" = "${var.component}"
@@ -31,9 +31,9 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
middlewares = ["${var.instance}-sslenforce", "${var.instance}-redirectdav", "${var.instance}-redirectindex"] middlewares = ["${var.instance}-sslenforce", "${var.instance}-redirectdav", "${var.instance}-redirectindex"]
service = local.service service = local.service
providers = { providers = {
@@ -45,8 +45,8 @@ module "application" {
source = "/dist/modules/application" source = "/dist/modules/application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app-group = var.app-group app_group = var.app_group
dns-name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.oauth2.provider-id protocol_provider = module.oauth2.provider-id
providers = { providers = {
@@ -60,7 +60,7 @@ module "oauth2" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
labels = local.common-labels labels = local.common-labels
dns-name = local.dns-name dns_name = local.dns_name
redirect-path = "apps/user_oidc/code" redirect-path = "apps/user_oidc/code"
providers = { providers = {
kubernetes = kubernetes kubernetes = kubernetes
@@ -90,9 +90,9 @@ module "collabora-ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.collabora-labels labels = local.collabora-labels
dns-names = [local.dns-collabora] dns_names = [local.dns-collabora]
middlewares = [] middlewares = []
service = local.collabora-service service = local.collabora-service
providers = { providers = {
@@ -121,9 +121,9 @@ module "onlyoffice-ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.onlyoffice-labels labels = local.onlyoffice-labels
dns-names = [local.dns-onlyoffice] dns_names = [local.dns-onlyoffice]
middlewares = [] middlewares = []
service = local.onlyoffice-service service = local.onlyoffice-service
providers = { providers = {

View File

@@ -13,7 +13,7 @@ resource "kubectl_manifest" "prj_redis" {
labels: ${jsonencode(local.redis-labels)} labels: ${jsonencode(local.redis-labels)}
spec: spec:
kubernetesConfig: kubernetesConfig:
image: "${var.redis.image}" image: "${var.images.redis.registry}/${var.images.redis.repository}:${var.images.redis.tag}"
imagePullPolicy: "IfNotPresent" imagePullPolicy: "IfNotPresent"
storage: storage:
volumeClaimTemplate: volumeClaimTemplate:
@@ -21,10 +21,10 @@ resource "kubectl_manifest" "prj_redis" {
accessModes: ["ReadWriteOnce"] accessModes: ["ReadWriteOnce"]
resources: resources:
requests: requests:
storage: "${var.redis.storage}" storage: "${var.storage.redis}"
redisExporter: redisExporter:
enabled: ${var.redis.exporter.enabled} enabled: ${var.redis.exporter.enabled}
image: "${var.redis.exporter.image}" image: "${var.images.redis_exporter.registry}/${var.images.redis_exporter.repository}:${var.images.redis_exporter.tag}"
securityContext: securityContext:
runAsUser: 1000 runAsUser: 1000
fsGroup: 1000 fsGroup: 1000

View File

@@ -6,12 +6,12 @@ metadata:
name: okd name: okd
description: null description: null
options: options:
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
sub-domain: sub_domain:
default: okd default: okd
examples: examples:
- okd - okd
@@ -65,7 +65,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
app-group: app_group:
default: infra default: infra
examples: examples:
- infra - infra
@@ -75,7 +75,7 @@ options:
examples: examples:
- false - false
type: boolean type: boolean
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "static/assets/okd-logo.svg" icon = "static/assets/okd-logo.svg"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -34,10 +34,10 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
middlewares = ["forward-${local.app-name}"] middlewares = ["forward-${local.app_name}"]
service = local.service service = local.service
providers = { providers = {
kubectl = kubectl kubectl = kubectl
@@ -48,8 +48,8 @@ module "application" {
source = "/dist/modules/application" source = "/dist/modules/application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app-group = var.app-group app_group = var.app_group
dns-name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.forward.provider-id protocol_provider = module.forward.provider-id
providers = { providers = {
@@ -73,9 +73,9 @@ module "forward" {
instance = var.instance instance = var.instance
domain = var.domain domain = var.domain
namespace = var.namespace namespace = var.namespace
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
service = local.service service = local.service
icon = local.icon icon = local.icon
request_headers = local.request_headers request_headers = local.request_headers

View File

@@ -6,12 +6,12 @@ metadata:
name: sonar name: sonar
description: null description: null
options: options:
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
type: string type: string
sub-domain: sub_domain:
default: sonar default: sonar
examples: examples:
- sonar - sonar
@@ -78,7 +78,7 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -11,7 +11,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
app-group: app_group:
default: infra default: infra
examples: examples:
- infra - infra
@@ -21,17 +21,17 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
type: string type: string
sub-domain: sub_domain:
default: traefik default: traefik
examples: examples:
- traefik - traefik
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "dashboard/statics/icons/favicon-96x96.png" icon = "dashboard/statics/icons/favicon-96x96.png"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -21,10 +21,10 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
middlewares = ["forward-${local.app-name}"] middlewares = ["forward-${local.app_name}"]
service = local.service service = local.service
providers = { providers = {
kubectl = kubectl kubectl = kubectl
@@ -35,8 +35,8 @@ module "application" {
source = "/dist/modules/application" source = "/dist/modules/application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app-group = var.app-group app_group = var.app_group
dns-name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.forward.provider-id protocol_provider = module.forward.provider-id
providers = { providers = {
@@ -60,9 +60,9 @@ module "forward" {
instance = var.instance instance = var.instance
domain = var.domain domain = var.domain
namespace = var.namespace namespace = var.namespace
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
service = local.service service = local.service
icon = local.icon icon = local.icon
request_headers = local.request_headers request_headers = local.request_headers

View File

@@ -150,9 +150,9 @@ data "kustomization_overlay" "data" {
- name: WOODPECKER_ADMIN - name: WOODPECKER_ADMIN
value: "${var.admin-users}" value: "${var.admin-users}"
- name: WOODPECKER_HOST - name: WOODPECKER_HOST
value: "https://${var.sub-domain}.${var.domain-name}" value: "https://${var.sub_domain}.${var.domain_name}"
- name: WOODPECKER_HOST - name: WOODPECKER_HOST
value: "https://${var.sub-domain}.${var.domain-name}" value: "https://${var.sub_domain}.${var.domain_name}"
envFrom: envFrom:
- secretRef: - secretRef:
name: woodpecker-secret name: woodpecker-secret

View File

@@ -22,7 +22,7 @@ resource "gitea_oauth2_app" "prj" {
name = var.component name = var.component
confidential_client = true confidential_client = true
redirect_uris = [ redirect_uris = [
"https://${var.sub-domain}.${var.domain-name}/authorize" "https://${var.sub_domain}.${var.domain_name}/authorize"
] ]
} }

View File

@@ -36,12 +36,12 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
app-group: app_group:
default: dev default: dev
examples: examples:
- dev - dev
@@ -162,7 +162,7 @@ options:
default: 10Gi default: 10Gi
type: string type: string
type: object type: object
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -187,7 +187,7 @@ options:
default: '120' default: '120'
type: string type: string
type: object type: object
sub-domain: sub_domain:
default: ci default: ci
examples: examples:
- ci - ci

View File

@@ -1,6 +1,6 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
icon = "favicons/favicon-light-default.png" icon = "favicons/favicon-light-default.png"
service = { service = {
"name" = "${var.component}-server" "name" = "${var.component}-server"
@@ -16,9 +16,9 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns-names = local.dns-names dns_names = local.dns_names
middlewares = [] middlewares = []
service = local.service service = local.service
providers = { providers = {
@@ -30,8 +30,8 @@ module "application" {
source = "/dist/modules/application" source = "/dist/modules/application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app-group = var.app-group app_group = var.app_group
dns-name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
providers = { providers = {
authentik = authentik authentik = authentik

View File

@@ -2,15 +2,15 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = var.component "vynil.solidite.fr/meta" = var.component
"vynil.solidite.fr/name" = "${var.namespace}-auth" "vynil.solidite.fr/name" = "${var.namespace}-auth"
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = var.domain-name "domain_name" = var.domain_name
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
} }
default-mode = var.storage-classes.FilesystemReadWriteMany!=""?"ReadWriteMany":"ReadWriteOnce" default-mode = var.storage-classes.FilesystemReadWriteMany!=""?"ReadWriteMany":"ReadWriteOnce"

View File

@@ -73,7 +73,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -103,7 +103,7 @@ options:
default: '' default: ''
type: string type: string
type: object type: object
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -2,15 +2,15 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = var.component "vynil.solidite.fr/meta" = var.component
"vynil.solidite.fr/name" = "${var.namespace}-auth" "vynil.solidite.fr/name" = "${var.namespace}-auth"
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = var.domain-name "domain_name" = var.domain_name
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
} }
authentik = { for k, v in var.authentik : k => v if k!="enable" } authentik = { for k, v in var.authentik : k => v if k!="enable" }

View File

@@ -41,7 +41,7 @@ options:
default: true default: true
type: boolean type: boolean
type: object type: object
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -81,7 +81,7 @@ options:
default: backup-settings default: backup-settings
type: string type: string
type: object type: object
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -2,15 +2,15 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = var.component "vynil.solidite.fr/meta" = var.component
"vynil.solidite.fr/name" = var.namespace "vynil.solidite.fr/name" = var.namespace
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = var.domain-name "domain_name" = var.domain_name
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
} }
default-mode = var.storage-classes.FilesystemReadWriteMany!=""?"ReadWriteMany":"ReadWriteOnce" default-mode = var.storage-classes.FilesystemReadWriteMany!=""?"ReadWriteMany":"ReadWriteOnce"

View File

@@ -41,12 +41,12 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -2,21 +2,21 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = var.component "vynil.solidite.fr/meta" = var.component
"vynil.solidite.fr/name" = "${var.domain}-devspaces" "vynil.solidite.fr/name" = "${var.domain}-devspaces"
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
global = { global = {
"domain" = var.domain "domain" = var.domain
"domain-name" = var.domain-name "domain_name" = var.domain_name
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
"app-group" = var.app-group "app_group" = var.app_group
} }
global-apps = merge(local.global, { global-apps = merge(local.global, {
"domain-name" = "devtools.${var.domain-name}" "domain_name" = "devtools.${var.domain_name}"
"app-group" = "dev" "app_group" = "dev"
}) })
okd = merge({ okd = merge({
"namespaces" = concat([ "namespaces" = concat([

View File

@@ -110,7 +110,7 @@ options:
type: string type: string
type: object type: object
type: array type: array
app-group: app_group:
default: dev default: dev
examples: examples:
- dev - dev
@@ -220,7 +220,7 @@ options:
type: string type: string
type: object type: object
type: array type: array
stations-sub-domain: stations-sub_domain:
default: code default: code
examples: examples:
- code - code
@@ -230,12 +230,12 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -21,7 +21,7 @@ locals {
"organisation" = org "organisation" = org
"usage" = "station" "usage" = "station"
"station" = station "station" = station
"sub-domain" = "${station.name}.stations" "sub_domain" = "${station.name}.stations"
}) if ds.name == dsname }) if ds.name == dsname
] ]
]) if org.name == name ]) if org.name == name

View File

@@ -2,19 +2,19 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = var.component "vynil.solidite.fr/meta" = var.component
"vynil.solidite.fr/name" = var.namespace "vynil.solidite.fr/name" = var.namespace
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
annotations_default = { annotations_default = {
"vynil.solidite.fr/default/domain_name" = var.domain-name "vynil.solidite.fr/default/domain_name" = var.domain_name
"vynil.solidite.fr/default/*" = var.domain-name "vynil.solidite.fr/default/*" = var.domain_name
} }
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = var.domain-name "domain_name" = var.domain_name
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
} }
default-mode = var.storage-classes.FilesystemReadWriteMany!=""?"ReadWriteMany":"ReadWriteOnce" default-mode = var.storage-classes.FilesystemReadWriteMany!=""?"ReadWriteMany":"ReadWriteOnce"

View File

@@ -36,7 +36,7 @@ options:
default: backup-settings default: backup-settings
type: string type: string
type: object type: object
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -46,7 +46,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -2,17 +2,17 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = "domain-ci" "vynil.solidite.fr/meta" = "domain-ci"
"vynil.solidite.fr/name" = var.namespace "vynil.solidite.fr/name" = var.namespace
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = "admin.${var.domain-name}" "domain_name" = "admin.${var.domain_name}"
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
"app-group" = var.app-group "app_group" = var.app_group
} }
traefik = { for k, v in var.traefik : k => v if k!="enable" } traefik = { for k, v in var.traefik : k => v if k!="enable" }
dns = { for k, v in var.dns : k => v if k!="enable" } dns = { for k, v in var.dns : k => v if k!="enable" }

View File

@@ -46,7 +46,7 @@ options:
default: false default: false
type: boolean type: boolean
type: object type: object
app-group: app_group:
default: infra default: infra
examples: examples:
- infra - infra
@@ -63,7 +63,7 @@ options:
type: object type: object
x-vynil-category: apps x-vynil-category: apps
x-vynil-package: gramo x-vynil-package: gramo
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -105,7 +105,7 @@ options:
default: domain default: domain
type: string type: string
type: object type: object
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -2,15 +2,15 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = var.component "vynil.solidite.fr/meta" = var.component
"vynil.solidite.fr/name" = var.namespace "vynil.solidite.fr/name" = var.namespace
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = var.domain-name "domain_name" = var.domain_name
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
} }
wildduck = { for k, v in var.wildduck : k => v if k!="enable" } wildduck = { for k, v in var.wildduck : k => v if k!="enable" }

View File

@@ -6,7 +6,7 @@ metadata:
name: domain-mail name: domain-mail
description: null description: null
options: options:
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -71,7 +71,7 @@ options:
default: domain default: domain
type: string type: string
type: object type: object
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -2,17 +2,17 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = "domain-monitor" "vynil.solidite.fr/meta" = "domain-monitor"
"vynil.solidite.fr/name" = var.namespace "vynil.solidite.fr/name" = var.namespace
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = "monitor.${var.domain-name}" "domain_name" = "monitor.${var.domain_name}"
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
"app-group" = var.app-group "app_group" = var.app_group
} }
grafana = { for k, v in var.grafana : k => v if k!="enable" } grafana = { for k, v in var.grafana : k => v if k!="enable" }
prometheus = { for k, v in var.prometheus : k => v if k!="enable" } prometheus = { for k, v in var.prometheus : k => v if k!="enable" }

View File

@@ -71,12 +71,12 @@ options:
type: object type: object
x-vynil-category: monitor x-vynil-category: monitor
x-vynil-package: dashboards-cluster x-vynil-package: dashboards-cluster
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
type: string type: string
app-group: app_group:
default: monitor default: monitor
examples: examples:
- monitor - monitor
@@ -176,7 +176,7 @@ options:
type: object type: object
x-vynil-category: monitor x-vynil-category: monitor
x-vynil-package: dashboards-namespace x-vynil-package: dashboards-namespace
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -111,7 +111,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -228,7 +228,7 @@ options:
default: backup-settings default: backup-settings
type: string type: string
type: object type: object
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -1,9 +1,9 @@
locals { locals {
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = var.domain-name "domain_name" = var.domain_name
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"distributions" = var.distributions "distributions" = var.distributions
"backups" = var.backups "backups" = var.backups
"storage-classes"= var.storage-classes "storage-classes"= var.storage-classes
@@ -11,9 +11,9 @@ locals {
annotations = { annotations = {
"vynil.solidite.fr/meta" = var.component "vynil.solidite.fr/meta" = var.component
"vynil.solidite.fr/name" = var.namespace "vynil.solidite.fr/name" = var.namespace
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
auth = { for k, v in var.auth : k => v if k!="enable" } auth = { for k, v in var.auth : k => v if k!="enable" }
infra = { for k, v in var.infra : k => v if k!="enable" } infra = { for k, v in var.infra : k => v if k!="enable" }

View File

@@ -1,36 +1,36 @@
locals { locals {
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
main-group = format("app-%s", local.app-name) main-group = format("app-%s", local.app_name)
} }
data "authentik_group" "akadmin" { data "authentik_group" "akadmin" {
name = "authentik Admins" name = "authentik Admins"
} }
resource "authentik_group" "groups" { resource "authentik_group" "groups" {
name = local.main-group name = local.main-group
attributes = jsonencode({"${local.app-name}" = true}) attributes = jsonencode({"${local.app_name}" = true})
} }
resource "authentik_group" "subgroup" { resource "authentik_group" "subgroup" {
count = length(var.sub-groups) count = length(var.sub-groups)
name = format("%s-%s", local.app-name, var.sub-groups[count.index]) name = format("%s-%s", local.app_name, var.sub-groups[count.index])
parent = authentik_group.groups.id parent = authentik_group.groups.id
} }
resource "authentik_application" "prj_app" { resource "authentik_application" "prj_app" {
name = "${var.instance}" name = "${var.instance}"
slug = "${var.component}-${var.instance}" slug = "${var.component}-${var.instance}"
group = var.app-group group = var.app_group
protocol_provider = var.protocol_provider protocol_provider = var.protocol_provider
backchannel_providers = var.backchannel_providers backchannel_providers = var.backchannel_providers
meta_launch_url = format("https://%s", var.dns-name) meta_launch_url = format("https://%s", var.dns_name)
meta_icon = format("https://%s/%s", var.dns-name, var.icon) meta_icon = format("https://%s/%s", var.dns_name, var.icon)
} }
resource "authentik_policy_expression" "policy" { resource "authentik_policy_expression" "policy" {
name = local.main-group name = local.main-group
expression = <<-EOF expression = <<-EOF
attr = request.user.group_attributes() attr = request.user.group_attributes()
return attr['${local.app-name}'] if '${local.app-name}' in attr else False return attr['${local.app_name}'] if '${local.app_name}' in attr else False
EOF EOF
} }

View File

@@ -7,14 +7,14 @@ variable "instance" {
variable "icon" { variable "icon" {
type = string type = string
} }
variable "app-group" { variable "app_group" {
type = string type = string
} }
variable "protocol_provider" { variable "protocol_provider" {
type = number type = number
default = null default = null
} }
variable "dns-name" { variable "dns_name" {
type = string type = string
} }
variable "sub-groups" { variable "sub-groups" {

View File

@@ -1,10 +1,10 @@
locals { locals {
forward-outpost-providers = jsondecode(data.http.get_forward_outpost.response_body).results[0].providers forward-outpost-providers = jsondecode(data.http.get_forward_outpost.response_body).results[0].providers
forward-outpost-pk = jsondecode(data.http.get_forward_outpost.response_body).results[0].pk forward-outpost-pk = jsondecode(data.http.get_forward_outpost.response_body).results[0].pk
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
main-group = format("app-%s", local.app-name) main-group = format("app-%s", local.app_name)
external-url = format("https://%s", var.dns-names[0]) external-url = format("https://%s", var.dns_names[0])
rules-icons = [ for v in var.dns-names : { rules-icons = [ for v in var.dns_names : {
"host" = "${v}" "host" = "${v}"
"http" = { "http" = {
"paths" = [{ "paths" = [{
@@ -28,10 +28,10 @@ resource "kubectl_manifest" "prj_ingress_icon" {
namespace: "${var.namespace}" namespace: "${var.namespace}"
labels: ${jsonencode(var.labels)} labels: ${jsonencode(var.labels)}
spec: spec:
ingressClassName: "${var.ingress-class}" ingressClassName: "${var.ingress_class}"
rules: ${jsonencode(local.rules-icons)} rules: ${jsonencode(local.rules-icons)}
tls: tls:
- hosts: ${jsonencode(var.dns-names)} - hosts: ${jsonencode(var.dns_names)}
secretName: "${var.instance}-cert" secretName: "${var.instance}-cert"
EOF EOF
} }
@@ -41,7 +41,7 @@ data "authentik_flow" "default-authorization-flow" {
} }
resource "authentik_provider_proxy" "prj_forward" { resource "authentik_provider_proxy" "prj_forward" {
name = local.app-name name = local.app_name
external_host = local.external-url external_host = local.external-url
authorization_flow = data.authentik_flow.default-authorization-flow.id authorization_flow = data.authentik_flow.default-authorization-flow.id
mode = "forward_single" mode = "forward_single"
@@ -74,7 +74,7 @@ resource "kubectl_manifest" "prj_middleware" {
apiVersion: traefik.containo.us/v1alpha1 apiVersion: traefik.containo.us/v1alpha1
kind: Middleware kind: Middleware
metadata: metadata:
name: "forward-${local.app-name}" name: "forward-${local.app_name}"
namespace: "${var.namespace}" namespace: "${var.namespace}"
labels: ${jsonencode(var.labels)} labels: ${jsonencode(var.labels)}
spec: spec:

View File

@@ -13,13 +13,13 @@ variable "domain" {
variable "namespace" { variable "namespace" {
type = string type = string
} }
variable "ingress-class" { variable "ingress_class" {
type = string type = string
} }
variable "labels" { variable "labels" {
type = map(string) type = map(string)
} }
variable "dns-names" { variable "dns_names" {
type = list(string) type = list(string)
} }
variable "access-token-validity" { variable "access-token-validity" {

View File

@@ -1,6 +1,6 @@
locals { locals {
rules = [ for v in var.dns-names : { rules = [ for v in var.dns_names : {
"host" = "${v}" "host" = "${v}"
"http" = { "http" = {
"paths" = [{ "paths" = [{
@@ -25,7 +25,7 @@ resource "kubectl_manifest" "prj_certificate" {
labels: ${jsonencode(var.labels)} labels: ${jsonencode(var.labels)}
spec: spec:
secretName: "${var.instance}${var.component==""?"":"-"}${var.component}-cert" secretName: "${var.instance}${var.component==""?"":"-"}${var.component}-cert"
dnsNames: ${jsonencode(var.dns-names)} dnsNames: ${jsonencode(var.dns_names)}
issuerRef: issuerRef:
name: "${var.issuer}" name: "${var.issuer}"
kind: "ClusterIssuer" kind: "ClusterIssuer"
@@ -61,10 +61,10 @@ resource "kubectl_manifest" "prj_ingress" {
annotations: annotations:
"traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in concat(["${var.instance}-https"],var.middlewares) : format("%s-%s@kubernetescrd", var.namespace, m)])}" "traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in concat(["${var.instance}-https"],var.middlewares) : format("%s-%s@kubernetescrd", var.namespace, m)])}"
spec: spec:
ingressClassName: "${var.ingress-class}" ingressClassName: "${var.ingress_class}"
rules: ${jsonencode(local.rules)} rules: ${jsonencode(local.rules)}
tls: tls:
- hosts: ${jsonencode(var.dns-names)} - hosts: ${jsonencode(var.dns_names)}
secretName: "${var.instance}${var.secret-component!=""?"-${var.secret-component}":var.component==""?"":"-${var.component}"}-cert" secretName: "${var.instance}${var.secret-component!=""?"-${var.secret-component}":var.component==""?"":"-${var.component}"}-cert"
EOF EOF
} }

View File

@@ -10,14 +10,14 @@ variable "namespace" {
variable "issuer" { variable "issuer" {
type = string type = string
} }
variable "ingress-class" { variable "ingress_class" {
type = string type = string
} }
variable "labels" { variable "labels" {
type = map(string) type = map(string)
} }
variable "dns-names" { variable "dns_names" {
type = list(string) type = list(string)
} }
variable "middlewares" { variable "middlewares" {

View File

@@ -50,7 +50,7 @@ resource "authentik_provider_oauth2" "oauth2" {
signing_key = data.authentik_certificate_key_pair.ca.id signing_key = data.authentik_certificate_key_pair.ca.id
property_mappings = data.authentik_scope_mapping.oauth2.ids property_mappings = data.authentik_scope_mapping.oauth2.ids
redirect_uris = [ redirect_uris = [
"https://${var.dns-name}/${var.redirect-path}" "https://${var.dns_name}/${var.redirect-path}"
] ]
} }

View File

@@ -10,7 +10,7 @@ variable "namespace" {
variable "labels" { variable "labels" {
type = map(string) type = map(string)
} }
variable "dns-name" { variable "dns_name" {
type = string type = string
} }
variable "redirect-path" { variable "redirect-path" {

View File

@@ -35,7 +35,7 @@ resource "kubectl_manifest" "saml_certificate" {
labels: ${jsonencode(var.labels)} labels: ${jsonencode(var.labels)}
spec: spec:
secretName: "${var.instance}-${var.component}-saml" secretName: "${var.instance}-${var.component}-saml"
dnsNames: ${jsonencode(var.dns-names)} dnsNames: ${jsonencode(var.dns_names)}
issuerRef: issuerRef:
name: "self-sign" name: "self-sign"
kind: "ClusterIssuer" kind: "ClusterIssuer"
@@ -47,7 +47,7 @@ resource "authentik_provider_saml" "prj" {
name = "${var.component}-${var.instance}-saml" name = "${var.component}-${var.instance}-saml"
authentication_flow = data.authentik_flow.default-authentication-flow.id authentication_flow = data.authentik_flow.default-authentication-flow.id
authorization_flow = data.authentik_flow.default-authorization-flow.id authorization_flow = data.authentik_flow.default-authorization-flow.id
acs_url = "https://${var.dns-names[0]}/${var.acs-path}" acs_url = "https://${var.dns_names[0]}/${var.acs-path}"
property_mappings = data.authentik_property_mapping_saml.saml_maps.ids property_mappings = data.authentik_property_mapping_saml.saml_maps.ids
name_id_mapping = data.authentik_property_mapping_saml.saml_name.id name_id_mapping = data.authentik_property_mapping_saml.saml_name.id
signing_kp = data.authentik_certificate_key_pair.generated.id signing_kp = data.authentik_certificate_key_pair.generated.id

View File

@@ -4,7 +4,7 @@ variable "component" {
variable "instance" { variable "instance" {
type = string type = string
} }
variable "dns-names" { variable "dns_names" {
type = list(string) type = list(string)
} }
variable "acs-path" { variable "acs-path" {

View File

@@ -6,7 +6,7 @@ metadata:
name: alertmanager name: alertmanager
description: null description: null
options: options:
sub-domain: sub_domain:
default: alertmanager default: alertmanager
examples: examples:
- alertmanager - alertmanager
@@ -16,7 +16,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
app-group: app_group:
default: monitor default: monitor
examples: examples:
- monitor - monitor
@@ -65,7 +65,7 @@ options:
examples: examples:
- info - info
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -75,7 +75,7 @@ options:
examples: examples:
- 120h - 120h
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "favicon.ico" icon = "favicon.ico"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -21,10 +21,10 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress_class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns_names = local.dns-names dns_names = local.dns_names
middlewares = ["forward-${local.app-name}"] middlewares = ["forward-${local.app_name}"]
services = [local.service] services = [local.service]
providers = { providers = {
kubectl = kubectl kubectl = kubectl
@@ -35,8 +35,8 @@ module "application" {
source = "git::https://git.solidite.fr/vynil/kydah-modules.git//application" source = "git::https://git.solidite.fr/vynil/kydah-modules.git//application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app_group = var.app-group app_group = var.app_group
dns_name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.forward.provider-id protocol_provider = module.forward.provider-id
providers = { providers = {
@@ -60,9 +60,9 @@ module "forward" {
instance = var.instance instance = var.instance
domain = var.domain domain = var.domain
namespace = var.namespace namespace = var.namespace
ingress_class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns_names = local.dns-names dns_names = local.dns_names
service = local.service service = local.service
icon = local.icon icon = local.icon
request_headers = local.request_headers request_headers = local.request_headers

View File

@@ -19,7 +19,7 @@ plugins = /var/lib/grafana/plugins
provisioning = /etc/grafana/provisioning provisioning = /etc/grafana/provisioning
[server] [server]
domain = '' domain = ''
root_url = 'https://${local.dns-name}/' root_url = 'https://${local.dns_name}/'
[users] [users]
auto_assign_org = true auto_assign_org = true
auto_assign_org_id = 1 auto_assign_org_id = 1

View File

@@ -25,7 +25,7 @@ options:
default: 10Gi default: 10Gi
type: string type: string
type: object type: object
sub-domain: sub_domain:
default: grafana default: grafana
examples: examples:
- grafana - grafana
@@ -132,7 +132,7 @@ options:
type: string type: string
type: object type: object
type: object type: object
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -147,12 +147,12 @@ options:
examples: examples:
- grafana_admin - grafana_admin
type: string type: string
app-group: app_group:
default: monitor default: monitor
examples: examples:
- monitor - monitor
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "public/img/grafana_icon.svg" icon = "public/img/grafana_icon.svg"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -21,9 +21,9 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress_class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns_names = local.dns-names dns_names = local.dns_names
middlewares = [] middlewares = []
services = [local.service] services = [local.service]
providers = { providers = {
@@ -35,8 +35,8 @@ module "ingress" {
source = "git::https://git.solidite.fr/vynil/kydah-modules.git//application" source = "git::https://git.solidite.fr/vynil/kydah-modules.git//application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app_group = var.app-group app_group = var.app_group
dns_name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
sub_groups = ["admin"] sub_groups = ["admin"]
protocol_provider = module.oauth2.provider-id protocol_provider = module.oauth2.provider-id
@@ -52,7 +52,7 @@ module "oauth2" {
namespace = var.namespace namespace = var.namespace
domain = var.domain domain = var.domain
labels = local.common-labels labels = local.common-labels
dns_name = local.dns-name dns_name = local.dns_name
redirect_path = "login/generic_oauth" redirect_path = "login/generic_oauth"
providers = { providers = {
kubernetes = kubernetes kubernetes = kubernetes

View File

@@ -16,12 +16,12 @@ options:
examples: examples:
- 10d - 10d
type: string type: string
sub-domain: sub_domain:
default: prometheus default: prometheus
examples: examples:
- prometheus - prometheus
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -80,12 +80,12 @@ options:
examples: examples:
- 1 - 1
type: integer type: integer
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
app-group: app_group:
default: monitor default: monitor
examples: examples:
- monitor - monitor

View File

@@ -1,7 +1,7 @@
locals { locals {
dns-name = "${var.sub-domain}.${var.domain-name}" dns_name = "${var.sub_domain}.${var.domain_name}"
dns-names = [local.dns-name] dns_names = [local.dns_name]
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
icon = "favicon.ico" icon = "favicon.ico"
request_headers = { request_headers = {
"Content-Type" = "application/json" "Content-Type" = "application/json"
@@ -21,10 +21,10 @@ module "ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress_class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns_names = local.dns-names dns_names = local.dns_names
middlewares = ["forward-${local.app-name}"] middlewares = ["forward-${local.app_name}"]
services = [local.service] services = [local.service]
providers = { providers = {
kubectl = kubectl kubectl = kubectl
@@ -35,8 +35,8 @@ module "application" {
source = "git::https://git.solidite.fr/vynil/kydah-modules.git//application" source = "git::https://git.solidite.fr/vynil/kydah-modules.git//application"
component = var.component component = var.component
instance = var.instance instance = var.instance
app_group = var.app-group app_group = var.app_group
dns_name = local.dns-name dns_name = local.dns_name
icon = local.icon icon = local.icon
protocol_provider = module.forward.provider-id protocol_provider = module.forward.provider-id
providers = { providers = {
@@ -60,9 +60,9 @@ module "forward" {
instance = var.instance instance = var.instance
domain = var.domain domain = var.domain
namespace = var.namespace namespace = var.namespace
ingress_class = var.ingress-class ingress_class = var.ingress_class
labels = local.common-labels labels = local.common-labels
dns_names = local.dns-names dns_names = local.dns_names
service = local.service service = local.service
icon = local.icon icon = local.icon
request_headers = local.request_headers request_headers = local.request_headers

View File

@@ -11,7 +11,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -21,12 +21,12 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
sub-domain: sub_domain:
default: null default: null
dependencies: dependencies:
- dist: null - dist: null

View File

@@ -46,7 +46,7 @@ data "kustomization_overlay" "data" {
"AUTHENTIK_POSTGRESQL__PORT=5432", "AUTHENTIK_POSTGRESQL__PORT=5432",
"AUTHENTIK_POSTGRESQL__USER=${var.component}", "AUTHENTIK_POSTGRESQL__USER=${var.component}",
"AUTHENTIK_REDIS__HOST=${var.name}-${var.component}-redis", "AUTHENTIK_REDIS__HOST=${var.name}-${var.component}-redis",
"AUTHENTIK_BOOTSTRAP_EMAIL=${var.admin.email}@${var.domain-name}", "AUTHENTIK_BOOTSTRAP_EMAIL=${var.admin.email}@${var.domain_name}",
] ]
} }
patches { patches {

View File

@@ -115,7 +115,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -183,7 +183,7 @@ options:
default: 2023.8.3 default: 2023.8.3
type: string type: string
type: object type: object
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -198,7 +198,7 @@ options:
default: auth-admin default: auth-admin
type: string type: string
type: object type: object
sub-domain: sub_domain:
default: auth default: auth
examples: examples:
- auth - auth

View File

@@ -1,5 +1,5 @@
locals { locals {
dns-names = ["${var.sub-domain}.${var.domain-name}"] dns_names = ["${var.sub_domain}.${var.domain_name}"]
middlewares = ["${var.instance}-https"] middlewares = ["${var.instance}-https"]
service = { service = {
"name" = "${var.instance}" "name" = "${var.instance}"
@@ -7,7 +7,7 @@ locals {
"number" = 80 "number" = 80
} }
} }
rules = [ for v in local.dns-names : { rules = [ for v in local.dns_names : {
"host" = "${v}" "host" = "${v}"
"http" = { "http" = {
"paths" = [{ "paths" = [{
@@ -31,7 +31,7 @@ resource "kubectl_manifest" "prj_certificate" {
labels: ${jsonencode(local.common-labels)} labels: ${jsonencode(local.common-labels)}
spec: spec:
secretName: "${var.instance}-cert" secretName: "${var.instance}-cert"
dnsNames: ${jsonencode(local.dns-names)} dnsNames: ${jsonencode(local.dns_names)}
issuerRef: issuerRef:
name: "${var.issuer}" name: "${var.issuer}"
kind: "ClusterIssuer" kind: "ClusterIssuer"
@@ -66,10 +66,10 @@ resource "kubectl_manifest" "prj_ingress" {
annotations: annotations:
"traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in local.middlewares : format("%s-%s@kubernetescrd", var.namespace, m)])}" "traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in local.middlewares : format("%s-%s@kubernetescrd", var.namespace, m)])}"
spec: spec:
ingressClassName: "${var.ingress-class}" ingressClassName: "${var.ingress_class}"
rules: ${jsonencode(local.rules)} rules: ${jsonencode(local.rules)}
tls: tls:
- hosts: ${jsonencode(local.dns-names)} - hosts: ${jsonencode(local.dns_names)}
secretName: "${var.instance}-cert" secretName: "${var.instance}-cert"
EOF EOF
} }

View File

@@ -8,7 +8,7 @@ resource "kubectl_manifest" "authentik_redis" {
labels: ${jsonencode(local.common-labels)} labels: ${jsonencode(local.common-labels)}
spec: spec:
kubernetesConfig: kubernetesConfig:
image: "${var.redis.image}" image: "${var.images.redis.registry}/${var.images.redis.repository}:${var.images.redis.tag}"
imagePullPolicy: "IfNotPresent" imagePullPolicy: "IfNotPresent"
redisSecret: redisSecret:
name: "${var.component}" name: "${var.component}"
@@ -19,10 +19,10 @@ resource "kubectl_manifest" "authentik_redis" {
accessModes: ["ReadWriteOnce"] accessModes: ["ReadWriteOnce"]
resources: resources:
requests: requests:
storage: "${var.redis.storage}" storage: "${var.storage.redis}"
redisExporter: redisExporter:
enabled: ${var.redis.exporter.enabled} enabled: ${var.redis.exporter.enabled}
image: "${var.redis.exporter.image}" image: "${var.images.redis_exporter.registry}/${var.images.redis_exporter.repository}:${var.images.redis_exporter.tag}"
securityContext: securityContext:
runAsUser: 1000 runAsUser: 1000
fsGroup: 1000 fsGroup: 1000

View File

@@ -5,7 +5,7 @@ locals {
"app.kubernetes.io/component" = "directus" "app.kubernetes.io/component" = "directus"
}) })
directus-icon = "admin/img/directus-white.png" directus-icon = "admin/img/directus-white.png"
directus-dns-name = "directus.${local.dns-name}" directus-dns_name = "directus.${local.dns_name}"
directus-service = { directus-service = {
"name" = "directus-${var.instance}" "name" = "directus-${var.instance}"
"port" = { "port" = {
@@ -45,15 +45,15 @@ resource "kubectl_manifest" "directus_config" {
DB_PORT: "5432" DB_PORT: "5432"
STORAGE_LOCATIONS: "local" STORAGE_LOCATIONS: "local"
STORAGE_LOCAL_ROOT: "/var/store" STORAGE_LOCAL_ROOT: "/var/store"
ADMIN_EMAIL: "admin@${var.domain-name}" ADMIN_EMAIL: "admin@${var.domain_name}"
NODE_EXTRA_CA_CERTS: "/etc/local-ca/ca.crt" NODE_EXTRA_CA_CERTS: "/etc/local-ca/ca.crt"
TELEMETRY: "false" TELEMETRY: "false"
AUTH_PROVIDERS: "VYNIL" AUTH_PROVIDERS: "VYNIL"
AUTH_VYNIL_DRIVER: "openid" AUTH_VYNIL_DRIVER: "openid"
AUTH_VYNIL_ALLOW_PUBLIC_REGISTRATION: "true" AUTH_VYNIL_ALLOW_PUBLIC_REGISTRATION: "true"
AUTH_VYNIL_ISSUER_URL: "https://${data.kubernetes_ingress_v1.authentik.spec[0].rule[0].host}/application/o/directus-${replace(var.sub-domain, ".", "-")}-${var.instance}/.well-known/openid-configuration" AUTH_VYNIL_ISSUER_URL: "https://${data.kubernetes_ingress_v1.authentik.spec[0].rule[0].host}/application/o/directus-${replace(var.sub_domain, ".", "-")}-${var.instance}/.well-known/openid-configuration"
AUTH_VYNIL_IDENTIFIER_KEY: "email" AUTH_VYNIL_IDENTIFIER_KEY: "email"
PUBLIC_URL: "https://${local.directus-dns-name}" PUBLIC_URL: "https://${local.directus-dns_name}"
EOF EOF
} }
@@ -133,12 +133,12 @@ resource "kubectl_manifest" "directus_deploy" {
valueFrom: valueFrom:
secretKeyRef: secretKeyRef:
key: "client-id" key: "client-id"
name: "directus-${replace(var.sub-domain, ".", "-")}-${var.instance}-id" name: "directus-${replace(var.sub_domain, ".", "-")}-${var.instance}-id"
- name: AUTH_VYNIL_CLIENT_SECRET - name: AUTH_VYNIL_CLIENT_SECRET
valueFrom: valueFrom:
secretKeyRef: secretKeyRef:
key: "client-secret" key: "client-secret"
name: "directus-${replace(var.sub-domain, ".", "-")}-${var.instance}-secret" name: "directus-${replace(var.sub_domain, ".", "-")}-${var.instance}-secret"
- name: DB_USER - name: DB_USER
valueFrom: valueFrom:
secretKeyRef: secretKeyRef:
@@ -216,9 +216,9 @@ module "directus-ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.directus-labels labels = local.directus-labels
dns-names = [local.directus-dns-name] dns_names = [local.directus-dns_name]
create-redirect = true create-redirect = true
middlewares = [] middlewares = []
service = local.directus-service service = local.directus-service
@@ -230,10 +230,10 @@ module "directus-ingress" {
module "directus-application" { module "directus-application" {
count = var.extentions.directus.enable ? 1 : 0 count = var.extentions.directus.enable ? 1 : 0
source = "/dist/modules/application" source = "/dist/modules/application"
component = "directus-${replace(var.sub-domain, ".", "-")}" component = "directus-${replace(var.sub_domain, ".", "-")}"
instance = var.instance instance = var.instance
app-group = var.app-group app_group = var.app_group
dns-name = local.directus-dns-name dns_name = local.directus-dns_name
icon = local.directus-icon icon = local.directus-icon
protocol_provider = module.directus-oauth2[0].provider-id protocol_provider = module.directus-oauth2[0].provider-id
providers = { providers = {
@@ -244,11 +244,11 @@ module "directus-application" {
module "directus-oauth2" { module "directus-oauth2" {
count = var.extentions.directus.enable ? 1 : 0 count = var.extentions.directus.enable ? 1 : 0
source = "/dist/modules/oauth2" source = "/dist/modules/oauth2"
component = "directus-${replace(var.sub-domain, ".", "-")}" component = "directus-${replace(var.sub_domain, ".", "-")}"
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
labels = local.directus-labels labels = local.directus-labels
dns-name = local.directus-dns-name dns_name = local.directus-dns_name
redirect-path = "auth/login/VYNIL/callback" redirect-path = "auth/login/VYNIL/callback"
providers = { providers = {
kubernetes = kubernetes kubernetes = kubernetes

View File

@@ -65,17 +65,17 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
sub-domain: sub_domain:
default: dataset-pg default: dataset-pg
examples: examples:
- dataset-pg - dataset-pg
type: string type: string
app-group: app_group:
default: api default: api
examples: examples:
- api - api
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -85,7 +85,7 @@ options:
examples: examples:
- 8Gi - 8Gi
type: string type: string
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik

View File

@@ -1,5 +1,5 @@
locals { locals {
dns-name = "${var.instance}.${var.sub-domain}.${var.domain-name}" dns_name = "${var.instance}.${var.sub_domain}.${var.domain_name}"
pg-labels = merge(local.common-labels, { pg-labels = merge(local.common-labels, {
"app.kubernetes.io/component" = "postgresql" "app.kubernetes.io/component" = "postgresql"
}) })

View File

@@ -2,7 +2,7 @@ locals {
prest-labels = merge(local.common-labels, { prest-labels = merge(local.common-labels, {
"app.kubernetes.io/component" = "postgrest" "app.kubernetes.io/component" = "postgrest"
}) })
prest-dns-name = "api.${local.dns-name}" prest-dns_name = "api.${local.dns_name}"
prest-service = { prest-service = {
"name" = "postgrest-${var.instance}" "name" = "postgrest-${var.instance}"
"port" = { "port" = {
@@ -32,9 +32,9 @@ resource "kubectl_manifest" "postgrest_config" {
PGPORT: "5432" PGPORT: "5432"
PGRST_DB_SCHEMA: public PGRST_DB_SCHEMA: public
PGRST_DB_ANON_ROLE: anonymous PGRST_DB_ANON_ROLE: anonymous
PGRST_OPENAPI_SERVER_PROXY_URI: "https://${local.prest-dns-name}" PGRST_OPENAPI_SERVER_PROXY_URI: "https://${local.prest-dns_name}"
PGRST_ADMIN_SERVER_PORT: "9000" PGRST_ADMIN_SERVER_PORT: "9000"
API_URL: "https://${local.prest-dns-name}" API_URL: "https://${local.prest-dns_name}"
BASE_URL: "/ui" BASE_URL: "/ui"
EOF EOF
} }
@@ -152,9 +152,9 @@ module "postgrest-ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.prest-labels labels = local.prest-labels
dns-names = [local.prest-dns-name] dns_names = [local.prest-dns_name]
create-redirect = true create-redirect = true
middlewares = [] middlewares = []
service = local.prest-service service = local.prest-service
@@ -184,9 +184,9 @@ module "swagger-ingress" {
instance = var.instance instance = var.instance
namespace = var.namespace namespace = var.namespace
issuer = var.issuer issuer = var.issuer
ingress-class = var.ingress-class ingress_class = var.ingress_class
labels = local.prest-labels labels = local.prest-labels
dns-names = [local.prest-dns-name] dns_names = [local.prest-dns_name]
middlewares = [] middlewares = []
create-cert = false create-cert = false
sub-path = "ui" sub-path = "ui"

View File

@@ -23,13 +23,13 @@ locals {
} }
EOF EOF
soa-ns = <<-EOF soa-ns = <<-EOF
@ IN SOA ${var.sub-domain}.${var.domain-name}. ${var.domain-name}. ( @ IN SOA ${var.sub_domain}.${var.domain_name}. ${var.domain_name}. (
${formatdate("YYYYMMDDhh",timestamp())} ; Serial ${formatdate("YYYYMMDDhh",timestamp())} ; Serial
4H ; Refresh 4H ; Refresh
1H ; Retry 1H ; Retry
7D ; Expire 7D ; Expire
4H ) ; Negative Cache TTL 4H ) ; Negative Cache TTL
@ IN NS ${var.sub-domain}.${var.domain-name}. @ IN NS ${var.sub_domain}.${var.domain_name}.
EOF EOF
files = merge({ files = merge({
"Corefile" = join("\n", concat([local.begin-core],[for z in var.zones: format("file /etc/coredns/%s.db %s", z.name,z.name)],[local.end-core])) "Corefile" = join("\n", concat([local.begin-core],[for z in var.zones: format("file /etc/coredns/%s.db %s", z.name,z.name)],[local.end-core]))

View File

@@ -6,12 +6,12 @@ metadata:
name: dns name: dns
description: null description: null
options: options:
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
type: string type: string
sub-domain: sub_domain:
default: dns default: dns
examples: examples:
- dns - dns

View File

@@ -83,7 +83,7 @@ resource "gitea_user" "user-ci" {
username = "${var.instance}-ci" username = "${var.instance}-ci"
login_name = "${var.instance}-ci" login_name = "${var.instance}-ci"
password = random_password.password.result password = random_password.password.result
email = "${var.instance}-ci@${var.domain-name}" email = "${var.instance}-ci@${var.domain_name}"
must_change_password = true must_change_password = true
} }

View File

@@ -27,7 +27,7 @@ options:
type: string type: string
type: object type: object
type: array type: array
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -87,12 +87,12 @@ options:
default: backup-settings default: backup-settings
type: string type: string
type: object type: object
app-group: app_group:
default: dev default: dev
examples: examples:
- dev - dev
type: string type: string
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com

View File

@@ -1,17 +1,17 @@
locals { locals {
annotations = { annotations = {
"vynil.solidite.fr/name" = "${var.component}" "vynil.solidite.fr/name" = "${var.component}"
"vynil.solidite.fr/domain" = var.domain-name "vynil.solidite.fr/domain" = var.domain_name
"vynil.solidite.fr/issuer" = var.issuer "vynil.solidite.fr/issuer" = var.issuer
"vynil.solidite.fr/ingress" = var.ingress-class "vynil.solidite.fr/ingress" = var.ingress_class
} }
global = { global = {
"domain" = var.namespace "domain" = var.namespace
"domain-name" = var.domain-name "domain_name" = var.domain_name
"issuer" = var.issuer "issuer" = var.issuer
"ingress-class" = var.ingress-class "ingress_class" = var.ingress_class
"backups" = var.backups "backups" = var.backups
"app-group" = var.app-group "app_group" = var.app_group
} }
sorted-stage-name = reverse(distinct(sort([for s in var.stages: s.name]))) sorted-stage-name = reverse(distinct(sort([for s in var.stages: s.name])))
sorted-dataset-name = reverse(distinct(sort([for d in var.datasets: d.name]))) sorted-dataset-name = reverse(distinct(sort([for d in var.datasets: d.name])))
@@ -26,7 +26,7 @@ locals {
for name in local.sorted-dataset-name: [ for name in local.sorted-dataset-name: [
for ds in var.datasets: for ds in var.datasets:
merge(ds,{ merge(ds,{
"sub-domain" = "${stage}.${var.instance}" "sub_domain" = "${stage}.${var.instance}"
"namespace" = "${var.domain}-${var.instance}-${stage}" "namespace" = "${var.domain}-${var.instance}-${stage}"
}) if ds.name == name }) if ds.name == name
] ]

View File

@@ -1,30 +1,30 @@
locals { locals {
app-name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance) app_name = var.component == var.instance ? var.instance : format("%s-%s", var.component, var.instance)
main-group = format("app-%s", local.app-name) main-group = format("app-%s", local.app_name)
} }
data "authentik_group" "akadmin" { data "authentik_group" "akadmin" {
name = "authentik Admins" name = "authentik Admins"
} }
resource "authentik_group" "groups" { resource "authentik_group" "groups" {
name = local.main-group name = local.main-group
attributes = jsonencode({"${local.app-name}" = true}) attributes = jsonencode({"${local.app_name}" = true})
} }
resource "authentik_application" "prj_app" { resource "authentik_application" "prj_app" {
name = "${var.instance}" name = "${var.instance}"
slug = "${var.component}-${var.instance}" slug = "${var.component}-${var.instance}"
#protocol_provider = authentik_provider_oauth2.oauth2.id #protocol_provider = authentik_provider_oauth2.oauth2.id
group = var.app-group group = var.app_group
backchannel_providers = [authentik_provider_scim.scim.id] backchannel_providers = [authentik_provider_scim.scim.id]
meta_launch_url = format("https://%s.%s", var.sub-domain, var.domain-name) meta_launch_url = format("https://%s.%s", var.sub_domain, var.domain_name)
meta_icon = format("https://%s.%s/%s", var.sub-domain, var.domain-name, "favicon-32x32.png") meta_icon = format("https://%s.%s/%s", var.sub_domain, var.domain_name, "favicon-32x32.png")
} }
resource "authentik_policy_expression" "policy" { resource "authentik_policy_expression" "policy" {
name = local.main-group name = local.main-group
expression = <<-EOF expression = <<-EOF
attr = request.user.group_attributes() attr = request.user.group_attributes()
return attr['${local.app-name}'] if '${local.app-name}' in attr else False return attr['${local.app_name}'] if '${local.app_name}' in attr else False
EOF EOF
} }

View File

@@ -96,11 +96,11 @@ resource "kubernetes_config_map_v1" "haraka_config" {
} }
data = yamldecode(<<-EOF data = yamldecode(<<-EOF
me: |- me: |-
${var.sub-domain}.${var.domain-name} ${var.sub_domain}.${var.domain_name}
host_list: |- host_list: |-
# add hosts in here we want to accept mail for # add hosts in here we want to accept mail for
${var.sub-domain}.${var.domain-name} ${var.sub_domain}.${var.domain_name}
${var.domain-name} ${var.domain_name}
${join("\n ",var.additional-domains)} ${join("\n ",var.additional-domains)}
rspamd.ini: |- rspamd.ini: |-
host = ${var.instance}-rspamd.${var.namespace}.svc.cluster.local host = ${var.instance}-rspamd.${var.namespace}.svc.cluster.local
@@ -188,7 +188,7 @@ resource "kubernetes_config_map_v1" "haraka_config" {
dkim_sign.ini: |- dkim_sign.ini: |-
disabled = true disabled = true
selector = mail selector = mail
domain = ${var.domain-name} domain = ${var.domain_name}
headers_to_sign = From, Sender, Reply-To, Subject, Date, Message-ID, To, Cc, MIME-Version headers_to_sign = From, Sender, Reply-To, Subject, Date, Message-ID, To, Cc, MIME-Version
wildduck.yaml: |- wildduck.yaml: |-
redis: redis:

View File

@@ -6,7 +6,7 @@ metadata:
name: wildduck name: wildduck
description: null description: null
options: options:
ingress-class: ingress_class:
default: traefik default: traefik
examples: examples:
- traefik - traefik
@@ -255,7 +255,7 @@ options:
examples: examples:
- your-company - your-company
type: string type: string
app-group: app_group:
default: '' default: ''
examples: examples:
- '' - ''
@@ -298,7 +298,7 @@ options:
default: 2Gi default: 2Gi
type: string type: string
type: object type: object
domain-name: domain_name:
default: your_company.com default: your_company.com
examples: examples:
- your_company.com - your_company.com
@@ -308,7 +308,7 @@ options:
examples: examples:
- letsencrypt-prod - letsencrypt-prod
type: string type: string
sub-domain: sub_domain:
default: mail default: mail
examples: examples:
- mail - mail

View File

@@ -1,6 +1,6 @@
locals { locals {
dns-names = ["${var.sub-domain}.${var.domain-name}"] dns_names = ["${var.sub_domain}.${var.domain_name}"]
cert-names = concat(local.dns-names, ["${var.domain-name}"]) cert-names = concat(local.dns_names, ["${var.domain_name}"])
middlewares = ["${var.instance}-https"] middlewares = ["${var.instance}-https"]
service = { service = {
"name" = "${var.instance}-webmail" "name" = "${var.instance}-webmail"
@@ -8,7 +8,7 @@ locals {
"number" = 80 "number" = 80
} }
} }
rules = [ for v in local.dns-names : { rules = [ for v in local.dns_names : {
"host" = "${v}" "host" = "${v}"
"http" = { "http" = {
"paths" = [{ "paths" = [{
@@ -67,10 +67,10 @@ resource "kubectl_manifest" "prj_ingress" {
annotations: annotations:
"traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in local.middlewares : format("%s-%s@kubernetescrd", var.namespace, m)])}" "traefik.ingress.kubernetes.io/router.middlewares": "${join(",", [for m in local.middlewares : format("%s-%s@kubernetescrd", var.namespace, m)])}"
spec: spec:
ingressClassName: "${var.ingress-class}" ingressClassName: "${var.ingress_class}"
rules: ${jsonencode(local.rules)} rules: ${jsonencode(local.rules)}
tls: tls:
- hosts: ${jsonencode(local.dns-names)} - hosts: ${jsonencode(local.dns_names)}
secretName: "${var.instance}-cert" secretName: "${var.instance}-cert"
EOF EOF
} }

View File

@@ -13,7 +13,7 @@ resource "kubectl_manifest" "prj_redis" {
labels: ${jsonencode(local.redis-labels)} labels: ${jsonencode(local.redis-labels)}
spec: spec:
kubernetesConfig: kubernetesConfig:
image: "${var.redis.image}" image: "${var.images.redis.registry}/${var.images.redis.repository}:${var.images.redis.tag}"
imagePullPolicy: "IfNotPresent" imagePullPolicy: "IfNotPresent"
storage: storage:
volumeClaimTemplate: volumeClaimTemplate:
@@ -21,10 +21,10 @@ resource "kubectl_manifest" "prj_redis" {
accessModes: ["ReadWriteOnce"] accessModes: ["ReadWriteOnce"]
resources: resources:
requests: requests:
storage: "${var.redis.storage}" storage: "${var.storage.redis}"
redisExporter: redisExporter:
enabled: ${var.redis.exporter.enabled} enabled: ${var.redis.exporter.enabled}
image: "${var.redis.exporter.image}" image: "${var.images.redis_exporter.registry}/${var.images.redis_exporter.repository}:${var.images.redis_exporter.tag}"
securityContext: securityContext:
runAsUser: 1000 runAsUser: 1000
fsGroup: 1000 fsGroup: 1000

View File

@@ -55,7 +55,7 @@ resource "kubectl_manifest" "scimgateway_deploy" {
- name: "PORT" - name: "PORT"
value: "8880" value: "8880"
- name: "WILDDUCK_DOMAIN" - name: "WILDDUCK_DOMAIN"
value: "${var.domain-name}" value: "${var.domain_name}"
- name: "WILDDUCK_API" - name: "WILDDUCK_API"
value: "http://${var.instance}-wildduck-api.${var.namespace}.svc" value: "http://${var.instance}-wildduck-api.${var.namespace}.svc"
- name: SEED - name: SEED

View File

@@ -92,7 +92,7 @@ resource "kubernetes_config_map_v1" "webmail_config" {
[service] [service]
# email domain for new users # email domain for new users
domain="${var.domain-name}" domain="${var.domain_name}"
# default quotas for new users # default quotas for new users
quota=1024 quota=1024
recipients=2000 recipients=2000
@@ -102,7 +102,7 @@ resource "kubernetes_config_map_v1" "webmail_config" {
allowJoin=false allowJoin=false
enableSpecial=false # if true the allow creating addresses with special usernames enableSpecial=false # if true the allow creating addresses with special usernames
# allowed domains for new addresses # allowed domains for new addresses
domains=["${var.domain-name}"] domains=["${var.domain_name}"]
generalNotification="" # static notification to show on top of the page generalNotification="" # static notification to show on top of the page
@@ -145,7 +145,7 @@ resource "kubernetes_config_map_v1" "webmail_config" {
# set to false if not using HTTPS # set to false if not using HTTPS
enabled=true enabled=true
# must be https url or use default # must be https url or use default
appId="https://${var.domain-name}" appId="https://${var.domain_name}"
[log] [log]
level="silly" level="silly"
@@ -154,15 +154,15 @@ resource "kubernetes_config_map_v1" "webmail_config" {
[setup] [setup]
# these values are shown in the configuration help page # these values are shown in the configuration help page
[setup.imap] [setup.imap]
hostname="${var.sub-domain}.${var.domain-name}" hostname="${var.sub_domain}.${var.domain_name}"
secure=true secure=true
port=143 port=143
[setup.pop3] [setup.pop3]
hostname="${var.sub-domain}.${var.domain-name}" hostname="${var.sub_domain}.${var.domain_name}"
secure=true secure=true
port=110 port=110
[setup.smtp] [setup.smtp]
hostname="${var.sub-domain}.${var.domain-name}" hostname="${var.sub_domain}.${var.domain_name}"
secure=true secure=true
port=25 port=25
EOF EOF

View File

@@ -173,7 +173,7 @@ resource "kubernetes_config_map_v1" "wildduck_config" {
enabled=true enabled=true
[smtp.setup] [smtp.setup]
# Public configuration for SMTP MDA, needed for mobileconfig files # Public configuration for SMTP MDA, needed for mobileconfig files
hostname="${var.sub-domain}.${var.domain-name}" hostname="${var.sub_domain}.${var.domain_name}"
secure=true secure=true
port=465 port=465
[webhooks] [webhooks]
@@ -312,7 +312,7 @@ resource "kubernetes_config_map_v1" "wildduck_config" {
autoExpunge=true autoExpunge=true
[setup] [setup]
# Public configuration for IMAP # Public configuration for IMAP
hostname="${var.sub-domain}.${var.domain-name}" hostname="${var.sub_domain}.${var.domain_name}"
secure=true secure=true
# port defaults to imap.port # port defaults to imap.port
port=9930 port=9930
@@ -360,7 +360,7 @@ resource "kubernetes_config_map_v1" "wildduck_config" {
cert="/var/opt/certs/tls.crt" cert="/var/opt/certs/tls.crt"
[setup] [setup]
# Public configuration for POP3 # Public configuration for POP3
hostname="${var.sub-domain}.${var.domain-name}" hostname="${var.sub_domain}.${var.domain_name}"
secure=true secure=true
# port defaults to pop3.port # port defaults to pop3.port
port=995 port=995

View File

@@ -128,7 +128,7 @@ resource "kubernetes_config_map_v1" "zonemta_config" {
# Server process must be able to locally bind to these addresses # Server process must be able to locally bind to these addresses
[[default]] [[default]]
address="0.0.0.0" address="0.0.0.0"
name="${var.sub-domain}.${var.domain-name}" name="${var.sub_domain}.${var.domain_name}"
# #
#[[default]] #[[default]]
#address="1.2.3.5" #address="1.2.3.5"
@@ -145,7 +145,7 @@ resource "kubernetes_config_map_v1" "zonemta_config" {
interfaces=["feeder"] interfaces=["feeder"]
# optional hostname to be used in headers # optional hostname to be used in headers
# defaults to os.hostname() # defaults to os.hostname()
hostname="${var.sub-domain}.${var.domain-name}" hostname="${var.sub_domain}.${var.domain_name}"
# How long to keep auth records in log # How long to keep auth records in log
authlogExpireDays=30 authlogExpireDays=30
# default smtp recipients for 24h (can be overriden per user) # default smtp recipients for 24h (can be overriden per user)
@@ -161,7 +161,7 @@ resource "kubernetes_config_map_v1" "zonemta_config" {
# SRS secret value. Must be the same as in the MX side # SRS secret value. Must be the same as in the MX side
secret="${local.secrets.srs}" secret="${local.secrets.srs}"
# SRS domain, must resolve back to MX # SRS domain, must resolve back to MX
rewriteDomain="${var.domain-name}" rewriteDomain="${var.domain_name}"
# DKIM Settings # DKIM Settings
# ------------- # -------------
["modules/zonemta-wildduck".dkim] ["modules/zonemta-wildduck".dkim]