core-auth
diff --git a/charts/auth/Chart.lock b/charts/auth/Chart.lock
index 4e721e9..c8a1eed 100644
--- a/charts/auth/Chart.lock
+++ b/charts/auth/Chart.lock
@@ -1,9 +1,9 @@
dependencies:
- name: kratos
repository: https://k8s.ory.sh/helm/charts
- version: 0.20.1
+ version: 0.33.1
- name: hydra
repository: https://k8s.ory.sh/helm/charts
- version: 0.20.1
-digest: sha256:2467fbd505772fa37ee80fdbc7a20cc1fec923702a69176cda04b99311b13e0b
-generated: "2021-11-06T21:20:46.694331+04:00"
+ version: 0.33.1
+digest: sha256:10ebc5a0091aa612b31d13ad09ab3ae9593e876b8dc27edcaf8e2fd553aab832
+generated: "2023-05-30T14:29:25.471201+04:00"
diff --git a/charts/auth/Chart.yaml b/charts/auth/Chart.yaml
index e707e31..f261203 100644
--- a/charts/auth/Chart.yaml
+++ b/charts/auth/Chart.yaml
@@ -6,8 +6,8 @@
appVersion: "0.0.1"
dependencies:
- name: kratos
- version: v0.20.1
+ version: v0.33.1
repository: https://k8s.ory.sh/helm/charts
- name: hydra
- version: v0.20.1
+ version: v0.33.1
repository: https://k8s.ory.sh/helm/charts
diff --git a/charts/auth/charts/hydra-0.20.1.tgz b/charts/auth/charts/hydra-0.20.1.tgz
deleted file mode 100644
index 11e35f1..0000000
--- a/charts/auth/charts/hydra-0.20.1.tgz
+++ /dev/null
Binary files differ
diff --git a/charts/auth/charts/hydra-0.33.1.tgz b/charts/auth/charts/hydra-0.33.1.tgz
new file mode 100644
index 0000000..80d1080
--- /dev/null
+++ b/charts/auth/charts/hydra-0.33.1.tgz
Binary files differ
diff --git a/charts/auth/charts/kratos-0.20.1.tgz b/charts/auth/charts/kratos-0.20.1.tgz
deleted file mode 100644
index e3d7302..0000000
--- a/charts/auth/charts/kratos-0.20.1.tgz
+++ /dev/null
Binary files differ
diff --git a/charts/auth/charts/kratos-0.33.1.tgz b/charts/auth/charts/kratos-0.33.1.tgz
new file mode 100644
index 0000000..17bdd12
--- /dev/null
+++ b/charts/auth/charts/kratos-0.33.1.tgz
Binary files differ
diff --git a/charts/auth/templates/certificates.yaml b/charts/auth/templates/certificates.yaml
index b6b54b7..8db0ddd 100644
--- a/charts/auth/templates/certificates.yaml
+++ b/charts/auth/templates/certificates.yaml
@@ -7,7 +7,7 @@
helm.sh/resource-policy: keep
spec:
dnsNames:
- - 'accounts-ui.{{ .Values.ui.domain }}'
+ - "accounts-ui.{{ .Values.ui.domain }}"
issuerRef:
name: {{ .Values.ui.certificateIssuer }}
kind: ClusterIssuer
@@ -22,7 +22,7 @@
helm.sh/resource-policy: keep
spec:
dnsNames:
- - 'accounts.{{ .Values.ui.domain }}'
+ - "accounts.{{ .Values.ui.domain }}"
issuerRef:
name: {{ .Values.ui.certificateIssuer }}
kind: ClusterIssuer
@@ -37,7 +37,7 @@
helm.sh/resource-policy: keep
spec:
dnsNames:
- - 'hydra.{{ .Values.ui.domain }}'
+ - "hydra.{{ .Values.ui.domain }}"
issuerRef:
name: {{ .Values.ui.certificateIssuer }}
kind: ClusterIssuer
diff --git a/charts/auth/templates/lighthouse-config.yaml b/charts/auth/templates/lighthouse-config.yaml
deleted file mode 100644
index 1318c1a..0000000
--- a/charts/auth/templates/lighthouse-config.yaml
+++ /dev/null
@@ -1,48 +0,0 @@
-apiVersion: v1
-kind: ConfigMap
-metadata:
- name: {{ .Values.ui.nebula.lighthouse.name }}
- namespace: {{ .Release.Namespace }}
-data:
- lighthouse.yaml: |
- pki:
- ca: /etc/nebula/lighthouse/ca.crt
- cert: /etc/nebula/lighthouse/host.crt
- key: /etc/nebula/lighthouse/host.key
- static_host_map:
- "{{ .Values.ui.nebula.lighthouse.internalIP }}": ["{{ .Values.ui.nebula.lighthouse.externalIP }}:{{ .Values.ui.nebula.lighthouse.port }}"]
- lighthouse:
- am_lighthouse: false
- interval: 60
- hosts:
- - {{ .Values.ui.nebula.lighthouse.internalIP }}
- listen:
- host: "[::]"
- port: 4242
- punchy:
- punch: true
- cipher: chachapoly
- tun:
- disabled: false
- dev: nebula1
- drop_local_broadcast: false
- drop_multicast: false
- tx_queue: 500
- mtu: 1300
- logging:
- level: info
- format: text
- firewall:
- conntrack:
- tcp_timeout: 12m
- udp_timeout: 3m
- default_timeout: 10m
- max_connections: 100000
- outbound:
- - port: any
- proto: any
- host: any
- inbound:
- - port: any
- proto: any
- host: any
diff --git a/charts/auth/templates/ui.yaml b/charts/auth/templates/ui.yaml
index ad31ccb..b9054fe 100644
--- a/charts/auth/templates/ui.yaml
+++ b/charts/auth/templates/ui.yaml
@@ -50,16 +50,16 @@
metadata:
labels:
app: ui
- annotations:
- checksum/config: {{ include (print $.Template.BasePath "/lighthouse-config.yaml") . | sha256sum }}
+ # annotations:
+ # checksum/config: {{ include (print $.Template.BasePath "/lighthouse-config.yaml") . | sha256sum }}
spec:
volumes:
- - name: cert
- secret:
- secretName: {{ .Values.ui.nebula.node.secretName }}
- - name: config
- configMap:
- name: {{ .Values.ui.nebula.lighthouse.name }}
+ # - name: cert
+ # secret:
+ # secretName: {{ .Values.ui.nebula.node.secretName }}
+ # - name: config
+ # configMap:
+ # name: {{ .Values.ui.nebula.lighthouse.name }}
containers:
- name: server
image: giolekva/auth-ui:latest
@@ -84,36 +84,36 @@
# limits:
# memory: "20Mi"
# cpu: "100m"
- - name: lighthouse
- image: giolekva/nebula:latest
- imagePullPolicy: Always
- securityContext:
- capabilities:
- add:
- - NET_ADMIN
- privileged: true
- ports:
- - name: lighthouse
- containerPort: 4247
- protocol: UDP
- command:
- - nebula
- - --config=/etc/nebula/config/lighthouse.yaml
- volumeMounts:
- - name: cert
- mountPath: /etc/nebula/lighthouse
- readOnly: true
- - name: config
- mountPath: /etc/nebula/config
- readOnly: true
----
-apiVersion: lekva.me/v1
-kind: NebulaNode
-metadata:
- name: {{ .Values.ui.nebula.node.name }}
- namespace: {{ .Release.Namespace }}
-spec:
- caName: {{ .Values.ui.nebula.certificateAuthority.name }}
- caNamespace: {{ .Values.ui.nebula.certificateAuthority.namespace }}
- ipCidr: {{ .Values.ui.nebula.node.ipCidr }}
- secretName: {{ .Values.ui.nebula.node.secretName }}
+ # - name: lighthouse
+ # image: giolekva/nebula:latest
+ # imagePullPolicy: Always
+ # securityContext:
+ # capabilities:
+ # add:
+ # - NET_ADMIN
+ # privileged: true
+ # ports:
+ # - name: lighthouse
+ # containerPort: 4247
+ # protocol: UDP
+ # command:
+ # - nebula
+ # - --config=/etc/nebula/config/lighthouse.yaml
+ # volumeMounts:
+ # - name: cert
+ # mountPath: /etc/nebula/lighthouse
+ # readOnly: true
+ # - name: config
+ # mountPath: /etc/nebula/config
+ # readOnly: true
+# ---
+# apiVersion: lekva.me/v1
+# kind: NebulaNode
+# metadata:
+# name: {{ .Values.ui.nebula.node.name }}
+# namespace: {{ .Release.Namespace }}
+# spec:
+# caName: {{ .Values.ui.nebula.certificateAuthority.name }}
+# caNamespace: {{ .Values.ui.nebula.certificateAuthority.namespace }}
+# ipCidr: {{ .Values.ui.nebula.node.ipCidr }}
+# secretName: {{ .Values.ui.nebula.node.secretName }}