Automated Manifest Update (#3861)

This PR contains newly rendered Kubernetes manifests automatically generated by the CI workflow.

Reviewed-on: #3861
Co-authored-by: gitea-bot <gitea-bot@alexlebens.net>
Co-committed-by: gitea-bot <gitea-bot@alexlebens.net>
This commit was merged in pull request #3861.
This commit is contained in:
2026-02-09 22:55:59 +00:00
committed by Alex Lebens
parent 2e747b776e
commit 9e8bb7170f
10 changed files with 40 additions and 91 deletions

View File

@@ -1,58 +0,0 @@
apiVersion: apps/v1
kind: Deployment
metadata:
name: directus-cloudflared
labels:
app.kubernetes.io/controller: main
app.kubernetes.io/instance: directus
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: cloudflared
app.kubernetes.io/version: 2026.2.0
helm.sh/chart: cloudflared-2.3.0
namespace: directus
spec:
revisionHistoryLimit: 3
replicas: 1
strategy:
type: Recreate
selector:
matchLabels:
app.kubernetes.io/controller: main
app.kubernetes.io/name: cloudflared
app.kubernetes.io/instance: directus
template:
metadata:
labels:
app.kubernetes.io/controller: main
app.kubernetes.io/instance: directus
app.kubernetes.io/name: cloudflared
spec:
enableServiceLinks: false
serviceAccountName: default
automountServiceAccountToken: true
hostIPC: false
hostNetwork: false
hostPID: false
dnsPolicy: ClusterFirst
containers:
- args:
- tunnel
- --protocol
- http2
- --no-autoupdate
- run
- --token
- $(CF_MANAGED_TUNNEL_TOKEN)
env:
- name: CF_MANAGED_TUNNEL_TOKEN
valueFrom:
secretKeyRef:
key: cf-tunnel-token
name: directus-cloudflared-secret
image: cloudflare/cloudflared:2026.2.0
imagePullPolicy: IfNotPresent
name: main
resources:
requests:
cpu: 10m
memory: 128Mi

View File

@@ -36,7 +36,7 @@ spec:
containers:
- env:
- name: PUBLIC_URL
value: https://directus.alexlebens.dev
value: https://directus.alexlebens.net
- name: WEBSOCKETS_ENABLED
value: "true"
- name: ADMIN_EMAIL
@@ -148,7 +148,7 @@ spec:
- name: AUTH_AUTHENTIK_SCOPE
value: openid profile email
- name: AUTH_AUTHENTIK_ISSUER_URL
value: https://auth.alexlebens.dev/application/o/directus/.well-known/openid-configuration
value: https://authentik.alexlebens.net/application/o/directus/.well-known/openid-configuration
- name: AUTH_AUTHENTIK_IDENTIFIER_KEY
value: email
- name: AUTH_AUTHENTIK_ALLOW_PUBLIC_REGISTRATION

View File

@@ -1,24 +0,0 @@
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: directus-cloudflared-secret
namespace: directus
labels:
helm.sh/chart: cloudflared-2.3.0
app.kubernetes.io/instance: directus
app.kubernetes.io/part-of: directus
app.kubernetes.io/version: "2.3.0"
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: directus-cloudflared-secret
spec:
secretStoreRef:
kind: ClusterSecretStore
name: vault
data:
- secretKey: cf-tunnel-token
remoteRef:
conversionStrategy: Default
decodingStrategy: None
key: /cloudflare/tunnels/directus
metadataPolicy: None
property: token

View File

@@ -0,0 +1,30 @@
apiVersion: gateway.networking.k8s.io/v1
kind: HTTPRoute
metadata:
name: directus
labels:
app.kubernetes.io/instance: directus
app.kubernetes.io/managed-by: Helm
app.kubernetes.io/name: directus
helm.sh/chart: directus-4.6.2
namespace: directus
spec:
parentRefs:
- group: gateway.networking.k8s.io
kind: Gateway
name: traefik-gateway
namespace: traefik
hostnames:
- "directus.alexlebens.net"
rules:
- backendRefs:
- group: ""
kind: Service
name: directus
namespace: directus
port: 80
weight: 100
matches:
- path:
type: PathPrefix
value: /