core-auth
diff --git a/charts/auth/Chart.lock b/charts/auth/Chart.lock
index 4e721e9..c8a1eed 100644
--- a/charts/auth/Chart.lock
+++ b/charts/auth/Chart.lock
@@ -1,9 +1,9 @@
 dependencies:
 - name: kratos
   repository: https://k8s.ory.sh/helm/charts
-  version: 0.20.1
+  version: 0.33.1
 - name: hydra
   repository: https://k8s.ory.sh/helm/charts
-  version: 0.20.1
-digest: sha256:2467fbd505772fa37ee80fdbc7a20cc1fec923702a69176cda04b99311b13e0b
-generated: "2021-11-06T21:20:46.694331+04:00"
+  version: 0.33.1
+digest: sha256:10ebc5a0091aa612b31d13ad09ab3ae9593e876b8dc27edcaf8e2fd553aab832
+generated: "2023-05-30T14:29:25.471201+04:00"
diff --git a/charts/auth/Chart.yaml b/charts/auth/Chart.yaml
index e707e31..f261203 100644
--- a/charts/auth/Chart.yaml
+++ b/charts/auth/Chart.yaml
@@ -6,8 +6,8 @@
 appVersion: "0.0.1"
 dependencies:
 - name: kratos
-  version: v0.20.1
+  version: v0.33.1
   repository: https://k8s.ory.sh/helm/charts
 - name: hydra
-  version: v0.20.1
+  version: v0.33.1
   repository: https://k8s.ory.sh/helm/charts
diff --git a/charts/auth/charts/hydra-0.20.1.tgz b/charts/auth/charts/hydra-0.20.1.tgz
deleted file mode 100644
index 11e35f1..0000000
--- a/charts/auth/charts/hydra-0.20.1.tgz
+++ /dev/null
Binary files differ
diff --git a/charts/auth/charts/hydra-0.33.1.tgz b/charts/auth/charts/hydra-0.33.1.tgz
new file mode 100644
index 0000000..80d1080
--- /dev/null
+++ b/charts/auth/charts/hydra-0.33.1.tgz
Binary files differ
diff --git a/charts/auth/charts/kratos-0.20.1.tgz b/charts/auth/charts/kratos-0.20.1.tgz
deleted file mode 100644
index e3d7302..0000000
--- a/charts/auth/charts/kratos-0.20.1.tgz
+++ /dev/null
Binary files differ
diff --git a/charts/auth/charts/kratos-0.33.1.tgz b/charts/auth/charts/kratos-0.33.1.tgz
new file mode 100644
index 0000000..17bdd12
--- /dev/null
+++ b/charts/auth/charts/kratos-0.33.1.tgz
Binary files differ
diff --git a/charts/auth/templates/certificates.yaml b/charts/auth/templates/certificates.yaml
index b6b54b7..8db0ddd 100644
--- a/charts/auth/templates/certificates.yaml
+++ b/charts/auth/templates/certificates.yaml
@@ -7,7 +7,7 @@
     helm.sh/resource-policy: keep
 spec:
   dnsNames:
-  - 'accounts-ui.{{ .Values.ui.domain }}'
+  - "accounts-ui.{{ .Values.ui.domain }}"
   issuerRef:
     name: {{ .Values.ui.certificateIssuer }}
     kind: ClusterIssuer
@@ -22,7 +22,7 @@
     helm.sh/resource-policy: keep
 spec:
   dnsNames:
-  - 'accounts.{{ .Values.ui.domain }}'
+  - "accounts.{{ .Values.ui.domain }}"
   issuerRef:
     name: {{ .Values.ui.certificateIssuer }}
     kind: ClusterIssuer
@@ -37,7 +37,7 @@
     helm.sh/resource-policy: keep
 spec:
   dnsNames:
-  - 'hydra.{{ .Values.ui.domain }}'
+  - "hydra.{{ .Values.ui.domain }}"
   issuerRef:
     name: {{ .Values.ui.certificateIssuer }}
     kind: ClusterIssuer
diff --git a/charts/auth/templates/lighthouse-config.yaml b/charts/auth/templates/lighthouse-config.yaml
deleted file mode 100644
index 1318c1a..0000000
--- a/charts/auth/templates/lighthouse-config.yaml
+++ /dev/null
@@ -1,48 +0,0 @@
-apiVersion: v1
-kind: ConfigMap
-metadata:
-  name: {{ .Values.ui.nebula.lighthouse.name }}
-  namespace: {{ .Release.Namespace }}
-data:
-  lighthouse.yaml: |
-    pki:
-      ca: /etc/nebula/lighthouse/ca.crt
-      cert: /etc/nebula/lighthouse/host.crt
-      key: /etc/nebula/lighthouse/host.key
-    static_host_map:
-      "{{ .Values.ui.nebula.lighthouse.internalIP }}": ["{{ .Values.ui.nebula.lighthouse.externalIP }}:{{ .Values.ui.nebula.lighthouse.port }}"]
-    lighthouse:
-      am_lighthouse: false
-      interval: 60
-      hosts:
-        - {{ .Values.ui.nebula.lighthouse.internalIP }}
-    listen:
-      host: "[::]"
-      port: 4242
-    punchy:
-      punch: true
-    cipher: chachapoly
-    tun:
-      disabled: false
-      dev: nebula1
-      drop_local_broadcast: false
-      drop_multicast: false
-      tx_queue: 500
-      mtu: 1300
-    logging:
-      level: info
-      format: text
-    firewall:
-      conntrack:
-        tcp_timeout: 12m
-        udp_timeout: 3m
-        default_timeout: 10m
-        max_connections: 100000
-      outbound:
-        - port: any
-          proto: any
-          host: any
-      inbound:
-        - port: any
-          proto: any
-          host: any
diff --git a/charts/auth/templates/ui.yaml b/charts/auth/templates/ui.yaml
index ad31ccb..b9054fe 100644
--- a/charts/auth/templates/ui.yaml
+++ b/charts/auth/templates/ui.yaml
@@ -50,16 +50,16 @@
     metadata:
       labels:
         app: ui
-      annotations:
-        checksum/config: {{ include (print $.Template.BasePath "/lighthouse-config.yaml") . | sha256sum }}
+      # annotations:
+      #   checksum/config: {{ include (print $.Template.BasePath "/lighthouse-config.yaml") . | sha256sum }}
     spec:
       volumes:
-      - name: cert
-        secret:
-          secretName: {{ .Values.ui.nebula.node.secretName }}
-      - name: config
-        configMap:
-          name: {{ .Values.ui.nebula.lighthouse.name }}
+      # - name: cert
+      #   secret:
+      #     secretName: {{ .Values.ui.nebula.node.secretName }}
+      # - name: config
+      #   configMap:
+      #     name: {{ .Values.ui.nebula.lighthouse.name }}
       containers:
       - name: server
         image: giolekva/auth-ui:latest
@@ -84,36 +84,36 @@
         #   limits:
         #     memory: "20Mi"
         #     cpu: "100m"
-      - name: lighthouse
-        image: giolekva/nebula:latest
-        imagePullPolicy: Always
-        securityContext:
-          capabilities:
-            add:
-            - NET_ADMIN
-          privileged: true
-        ports:
-        - name: lighthouse
-          containerPort: 4247
-          protocol: UDP
-        command:
-        - nebula
-        - --config=/etc/nebula/config/lighthouse.yaml
-        volumeMounts:
-        - name: cert
-          mountPath: /etc/nebula/lighthouse
-          readOnly: true
-        - name: config
-          mountPath: /etc/nebula/config
-          readOnly: true
----
-apiVersion: lekva.me/v1
-kind: NebulaNode
-metadata:
-  name: {{ .Values.ui.nebula.node.name }}
-  namespace: {{ .Release.Namespace }}
-spec:
-  caName: {{ .Values.ui.nebula.certificateAuthority.name }}
-  caNamespace: {{ .Values.ui.nebula.certificateAuthority.namespace }}
-  ipCidr: {{ .Values.ui.nebula.node.ipCidr }}
-  secretName: {{ .Values.ui.nebula.node.secretName }}
+      # - name: lighthouse
+      #   image: giolekva/nebula:latest
+      #   imagePullPolicy: Always
+      #   securityContext:
+      #     capabilities:
+      #       add:
+      #       - NET_ADMIN
+      #     privileged: true
+      #   ports:
+      #   - name: lighthouse
+      #     containerPort: 4247
+      #     protocol: UDP
+      #   command:
+      #   - nebula
+      #   - --config=/etc/nebula/config/lighthouse.yaml
+      #   volumeMounts:
+      #   - name: cert
+      #     mountPath: /etc/nebula/lighthouse
+      #     readOnly: true
+      #   - name: config
+      #     mountPath: /etc/nebula/config
+      #     readOnly: true
+# ---
+# apiVersion: lekva.me/v1
+# kind: NebulaNode
+# metadata:
+#   name: {{ .Values.ui.nebula.node.name }}
+#   namespace: {{ .Release.Namespace }}
+# spec:
+#   caName: {{ .Values.ui.nebula.certificateAuthority.name }}
+#   caNamespace: {{ .Values.ui.nebula.certificateAuthority.namespace }}
+#   ipCidr: {{ .Values.ui.nebula.node.ipCidr }}
+#   secretName: {{ .Values.ui.nebula.node.secretName }}