diff --git a/cluster/apps/kustomization.yaml b/cluster/apps/kustomization.yaml index cd4df45..0625fcb 100644 --- a/cluster/apps/kustomization.yaml +++ b/cluster/apps/kustomization.yaml @@ -9,5 +9,4 @@ resources: - crowdsec - storage/longhorn - mail - - security # - system-upgrade diff --git a/cluster/apps/security/kustomization.yaml b/cluster/apps/security/kustomization.yaml deleted file mode 100644 index 713c773..0000000 --- a/cluster/apps/security/kustomization.yaml +++ /dev/null @@ -1,6 +0,0 @@ ---- -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: - - namespace.yaml - - vaultwarden diff --git a/cluster/apps/security/namespace.yaml b/cluster/apps/security/namespace.yaml deleted file mode 100644 index 6411299..0000000 --- a/cluster/apps/security/namespace.yaml +++ /dev/null @@ -1,7 +0,0 @@ ---- -apiVersion: v1 -kind: Namespace -metadata: - name: security-apps - labels: - kustomize.toolkit.fluxcd.io/prune: disabled diff --git a/cluster/apps/security/vaultwarden/config-pvc.yaml b/cluster/apps/security/vaultwarden/config-pvc.yaml deleted file mode 100644 index 7ea50fb..0000000 --- a/cluster/apps/security/vaultwarden/config-pvc.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: vaultwarden-config - namespace: security-apps -spec: - accessModes: - - ReadWriteOnce - storageClassName: longhorn - resources: - requests: - storage: 2Gi diff --git a/cluster/apps/security/vaultwarden/helm-release.yaml b/cluster/apps/security/vaultwarden/helm-release.yaml deleted file mode 100644 index b248f95..0000000 --- a/cluster/apps/security/vaultwarden/helm-release.yaml +++ /dev/null @@ -1,95 +0,0 @@ ---- -apiVersion: helm.toolkit.fluxcd.io/v2beta1 -kind: HelmRelease -metadata: - name: vaultwarden - namespace: security-apps -spec: - interval: 5m - chart: - spec: - chart: vaultwarden - version: 5.0.0 - sourceRef: - kind: HelmRepository - name: k8s-at-home - namespace: flux-system - interval: 5m - install: - remediation: - retries: 3 - upgrade: - remediation: - retries: 3 - values: - replicas: 1 - image: - repository: vaultwarden/server - tag: 1.25.1 - env: - DATA_FOLDER: "config" - DOMAIN: https://bitwarden.${SECRET_DOMAIN} - SIGNUPS_ALLOWED: "false" - TZ: Europe/London - WEBSOCKET_ADDRESS: 0.0.0.0 - WEBSOCKET_ENABLED: true - WEBSOCKET_PORT: 3012 - DATABASE_URL: postgresql://vaultwarden:${SECRET_VAULTWARDEN_DB_PASSWORD}@vaultwarden-postgresql:5432/vaultwarden - ADMIN_TOKEN: - valueFrom: - secretKeyRef: - name: vaultwarden-secrets - key: adminToken - YUBICO_CLIENT_ID: - valueFrom: - secretKeyRef: - name: vaultwarden-secrets - key: yubikeyClientID - YUBICO_SECRET_KEY: - valueFrom: - secretKeyRef: - name: vaultwarden-secrets - key: yubikeySecretKey - ingress: - main: - enabled: true - ingressClassName: "nginx" - annotations: - cert-manager.io/cluster-issuer: "letsencrypt-staging" - external-dns.alpha.kubernetes.io/target: "ipv4.${SECRET_DOMAIN}" - external-dns/is-public: "true" - hajimari.io/enable: "true" - hajimari.io/icon: "shield-key" - hosts: - - host: bitwarden.${SECRET_DOMAIN} - paths: - - path: / - pathType: Prefix - service: - port: 80 - - path: /notifications/hub/negotiate - pathType: Prefix - service: - port: 80 - - path: /notifications/hub - pathType: Prefix - service: - port: 3012 - tls: - - hosts: - - "bitwarden.${SECRET_DOMAIN}" - secretName: "bitwarden-tls" - persistence: - config: - enabled: true - existingClaim: vaultwarden-config - postgresql: - enabled: true - postgresqlUsername: vaultwarden - postgresqlPassword: ${SECRET_VAULTWARDEN_DB_PASSWORD} - postgresqlDatabase: vaultwarden - persistence: - enabled: true - existingClaim: vaultwarden-postgresql - accessModes: - - ReadWriteOnce diff --git a/cluster/apps/security/vaultwarden/kustomization.yaml b/cluster/apps/security/vaultwarden/kustomization.yaml deleted file mode 100644 index bfbd4fc..0000000 --- a/cluster/apps/security/vaultwarden/kustomization.yaml +++ /dev/null @@ -1,7 +0,0 @@ -apiVersion: kustomize.config.k8s.io/v1beta1 -kind: Kustomization -resources: - - config-pvc.yaml - - postgres-pvc.yaml - - vaultwarden-secrets.sops.yaml - - helm-release.yaml diff --git a/cluster/apps/security/vaultwarden/postgres-pvc.yaml b/cluster/apps/security/vaultwarden/postgres-pvc.yaml deleted file mode 100644 index 8d3a1be..0000000 --- a/cluster/apps/security/vaultwarden/postgres-pvc.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v1 -kind: PersistentVolumeClaim -metadata: - name: vaultwarden-postgresql - namespace: security-apps -spec: - accessModes: - - ReadWriteOnce - storageClassName: longhorn - resources: - requests: - storage: 6Gi diff --git a/cluster/apps/security/vaultwarden/vaultwarden-secrets.sops.yaml b/cluster/apps/security/vaultwarden/vaultwarden-secrets.sops.yaml deleted file mode 100644 index c211d70..0000000 --- a/cluster/apps/security/vaultwarden/vaultwarden-secrets.sops.yaml +++ /dev/null @@ -1,30 +0,0 @@ -apiVersion: v1 -kind: Secret -metadata: - name: vaultwarden-secrets - namespace: security-apps -stringData: - adminToken: ENC[AES256_GCM,data:fGpAk6qn2yV/Dqy4EK73Y5UaHWRtujtSyTlnP0Jb/+wN0fhq9KvohgtosXiqN/uvBAqnrMYr9X0dPvcAT3o4Tg==,iv:TOp3CwDS+x37uchxWn3cuk911xDE3tiojh6i8cKeX+Q=,tag:Bo+WjQUl0rrYTTHdt6puaQ==,type:str] - yubikeyClientID: ENC[AES256_GCM,data:uRjin2w=,iv:qfCUY8HeHOvDQAmUQiIIkyQGe1706JkBxranOiTmO/E=,tag:DUhH5Jk1iZF8ClQKMcFjUg==,type:str] - yubikeySecretKey: ENC[AES256_GCM,data:xe5SHxU4jzOfWo94kO3mEbeOC8BxSn4r9ET12w==,iv:38Hkr75bw9nOMA2reN2dASz7hPNzJn5Cvil2ukYzIgU=,tag:YhGn+4Zwz3vU4DRJLAfhPA==,type:str] - SECRET_VAULTWARDEN_DB_PASSWORD: ENC[AES256_GCM,data:8JzSrNEdRB8ctlOhjzWQaqIqmgkuAEj4XHTrsRL4kMAl/Nc2l9VlA32Ajer/1ZFWqZvHtiUJLE0Ji0hBlJfbHA==,iv:MhCzhHKo4rxJWs9jbZHoAa6dXVFch92wLiQmjI3WPwI=,tag:IIRfNO61di5Jxv4IAchYeQ==,type:str] -sops: - kms: [] - gcp_kms: [] - azure_kv: [] - hc_vault: [] - age: - - recipient: age12vnf98cueysmhz2vumkrg3889dn7v672tyccqfwz8l5k4fcfucgshzgfh6 - enc: | - -----BEGIN AGE ENCRYPTED FILE----- - YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAyK0FBZ3kzajIxUC9BMHVY - NTJHRFZyaGJreXlwRDVhUmJ5cWF5T3A1RGlvClUwZ3M2UC9nQ3lwZHU1U1oyZFQr - RTBSY1lBRTQ3VCs1dytGdk1yVm1MdXMKLS0tIHk5eHdKdC8zUlIxRlMxWlN4TGow - V1psbExvSzlZN3FWcDFhN3pVOTNzUUUKLfwSwQR11XqyUwbZeJTHQYorwVSMsa8l - OwU66S+4bnll+P3gBlRfw1EG5/47MX7hgXfLTehSD/QSKGtSwoMo4Q== - -----END AGE ENCRYPTED FILE----- - lastmodified: "2022-07-04T11:11:28Z" - mac: ENC[AES256_GCM,data:YGlL2nWFUoHvbW0W9wuDTDT78rjyY/VTEFYQK8vU4LbD8NYlf0S64KV89taPJJsNKg3zfswAZTJKQRXnmNwTUiUa730eE6OwvjZLcR2Pw8L5i+GBArZFRdJUL+01wuvEwfiUOtwGmjEfDmrYkd62VuvVS23j5edmCAv78QkDt6Y=,iv:TFYHU9KbWK30BHdnEmQpiVbuClDTcbJo0NxHZWjWIs4=,tag:BYuqNgRgbuPutxh4SMhoPw==,type:str] - pgp: [] - encrypted_regex: ^(data|stringData)$ - version: 3.7.3