changeset 7:0071c165e990

more file moves
author drewp@bigasterisk.com
date Mon, 12 Dec 2022 23:18:39 -0800
parents d3caeaf39d87
children 723ad82340d1
files 00-defs/02-roles.yaml 20-kube/20-pom-deploy.yaml kube/02-roles.yaml kube/05-idp-secret.yaml kube/60-auth-cert.yaml
diffstat 5 files changed, 125 insertions(+), 191 deletions(-) [+]
line wrap: on
line diff
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/00-defs/02-roles.yaml	Mon Dec 12 23:18:39 2022 -0800
@@ -0,0 +1,125 @@
+apiVersion: v1
+kind: ServiceAccount
+metadata:
+  labels:
+    app.kubernetes.io/name: pomerium
+  name: pomerium-controller
+  namespace: pomerium
+---
+apiVersion: v1
+kind: ServiceAccount
+metadata:
+  labels:
+    app.kubernetes.io/name: pomerium
+  name: pomerium-gen-secrets
+  namespace: pomerium
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+  labels:
+    app.kubernetes.io/name: pomerium
+  name: pomerium-controller
+rules:
+- apiGroups:
+  - ""
+  resources:
+  - services
+  - endpoints
+  - secrets
+  verbs:
+  - get
+  - list
+  - watch
+- apiGroups:
+  - ""
+  resources:
+  - services/status
+  - secrets/status
+  - endpoints/status
+  verbs:
+  - get
+- apiGroups:
+  - networking.k8s.io
+  resources:
+  - ingresses
+  - ingressclasses
+  verbs:
+  - get
+  - list
+  - watch
+- apiGroups:
+  - networking.k8s.io
+  resources:
+  - ingresses/status
+  verbs:
+  - get
+  - patch
+  - update
+- apiGroups:
+  - ingress.pomerium.io
+  resources:
+  - pomerium
+  verbs:
+  - get
+  - list
+  - watch
+- apiGroups:
+  - ingress.pomerium.io
+  resources:
+  - pomerium/status
+  verbs:
+  - get
+  - update
+  - patch
+- apiGroups:
+  - ""
+  resources:
+  - events
+  verbs:
+  - create
+  - patch
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRole
+metadata:
+  labels:
+    app.kubernetes.io/name: pomerium
+  name: pomerium-gen-secrets
+rules:
+- apiGroups:
+  - ""
+  resources:
+  - secrets
+  verbs:
+  - create
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+  labels:
+    app.kubernetes.io/name: pomerium
+  name: pomerium-controller
+roleRef:
+  apiGroup: rbac.authorization.k8s.io
+  kind: ClusterRole
+  name: pomerium-controller
+subjects:
+- kind: ServiceAccount
+  name: pomerium-controller
+  namespace: pomerium
+---
+apiVersion: rbac.authorization.k8s.io/v1
+kind: ClusterRoleBinding
+metadata:
+  labels:
+    app.kubernetes.io/name: pomerium
+  name: pomerium-gen-secrets
+roleRef:
+  apiGroup: rbac.authorization.k8s.io
+  kind: ClusterRole
+  name: pomerium-gen-secrets
+subjects:
+- kind: ServiceAccount
+  name: pomerium-gen-secrets
+  namespace: pomerium
--- a/20-kube/20-pom-deploy.yaml	Mon Dec 12 23:16:59 2022 -0800
+++ b/20-kube/20-pom-deploy.yaml	Mon Dec 12 23:18:39 2022 -0800
@@ -1,49 +1,3 @@
-apiVersion: v1
-kind: PersistentVolumeClaim
-metadata:
-  namespace: pomerium
-  name: autocert-data
-spec:
-  storageClassName: ""
-  volumeName: "autocert-data"
-  accessModes:
-    - ReadWriteOnce
-  resources:
-    requests:
-      storage: 5Gi
----
-apiVersion: v1
-kind: Service
-metadata:
-  labels:
-    app.kubernetes.io/name: pomerium
-  name: pomerium-metrics
-  namespace: pomerium
-spec:
-  ports:
-    - { name: metrics, port: 9090, protocol: TCP, targetPort: metrics }
-  selector: { app.kubernetes.io/name: pomerium }
-  type: ClusterIP
----
-apiVersion: v1
-kind: Service
-metadata:
-  labels:
-    app.kubernetes.io/name: pomerium
-  name: pomerium-proxy
-  namespace: pomerium
-spec:
-  ports:
-    - { name: https, port: 443, protocol: TCP, targetPort: https }
-    - { name: http, port: 80, protocol: TCP, targetPort: http }
-  selector: { app.kubernetes.io/name: pomerium }
-  type: LoadBalancer
-  externalIPs:
-  # prime forwards to this
-    - 10.5.0.1
-  # local dns picks this
-    - 10.2.0.1
----
 apiVersion: apps/v1
 kind: Deployment
 metadata:
--- a/kube/02-roles.yaml	Mon Dec 12 23:16:59 2022 -0800
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,125 +0,0 @@
-apiVersion: v1
-kind: ServiceAccount
-metadata:
-  labels:
-    app.kubernetes.io/name: pomerium
-  name: pomerium-controller
-  namespace: pomerium
----
-apiVersion: v1
-kind: ServiceAccount
-metadata:
-  labels:
-    app.kubernetes.io/name: pomerium
-  name: pomerium-gen-secrets
-  namespace: pomerium
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRole
-metadata:
-  labels:
-    app.kubernetes.io/name: pomerium
-  name: pomerium-controller
-rules:
-- apiGroups:
-  - ""
-  resources:
-  - services
-  - endpoints
-  - secrets
-  verbs:
-  - get
-  - list
-  - watch
-- apiGroups:
-  - ""
-  resources:
-  - services/status
-  - secrets/status
-  - endpoints/status
-  verbs:
-  - get
-- apiGroups:
-  - networking.k8s.io
-  resources:
-  - ingresses
-  - ingressclasses
-  verbs:
-  - get
-  - list
-  - watch
-- apiGroups:
-  - networking.k8s.io
-  resources:
-  - ingresses/status
-  verbs:
-  - get
-  - patch
-  - update
-- apiGroups:
-  - ingress.pomerium.io
-  resources:
-  - pomerium
-  verbs:
-  - get
-  - list
-  - watch
-- apiGroups:
-  - ingress.pomerium.io
-  resources:
-  - pomerium/status
-  verbs:
-  - get
-  - update
-  - patch
-- apiGroups:
-  - ""
-  resources:
-  - events
-  verbs:
-  - create
-  - patch
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRole
-metadata:
-  labels:
-    app.kubernetes.io/name: pomerium
-  name: pomerium-gen-secrets
-rules:
-- apiGroups:
-  - ""
-  resources:
-  - secrets
-  verbs:
-  - create
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRoleBinding
-metadata:
-  labels:
-    app.kubernetes.io/name: pomerium
-  name: pomerium-controller
-roleRef:
-  apiGroup: rbac.authorization.k8s.io
-  kind: ClusterRole
-  name: pomerium-controller
-subjects:
-- kind: ServiceAccount
-  name: pomerium-controller
-  namespace: pomerium
----
-apiVersion: rbac.authorization.k8s.io/v1
-kind: ClusterRoleBinding
-metadata:
-  labels:
-    app.kubernetes.io/name: pomerium
-  name: pomerium-gen-secrets
-roleRef:
-  apiGroup: rbac.authorization.k8s.io
-  kind: ClusterRole
-  name: pomerium-gen-secrets
-subjects:
-- kind: ServiceAccount
-  name: pomerium-gen-secrets
-  namespace: pomerium
\ No newline at end of file
--- a/kube/05-idp-secret.yaml	Mon Dec 12 23:16:59 2022 -0800
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,8 +0,0 @@
-apiVersion: v1
-kind: Secret
-metadata:
-  name: idp
-  namespace: pomerium
-type: Opaque
-stringData:
-  
\ No newline at end of file
--- a/kube/60-auth-cert.yaml	Mon Dec 12 23:16:59 2022 -0800
+++ /dev/null	Thu Jan 01 00:00:00 1970 +0000
@@ -1,12 +0,0 @@
-apiVersion: cert-manager.io/v1
-kind: Certificate
-metadata:
-  name: pomerium-proxy-tls
-  namespace: pomerium
-spec:
-  dnsNames:
-  - 'authenticate.bigasterisk.com'
-  issuerRef:
-    kind: Issuer
-    name: letsencrypt-prod
-  secretName: pomerium-proxy-tls
\ No newline at end of file