Compare commits
14 Commits
e013c34cd2
...
renovate/c
| Author | SHA1 | Date | |
|---|---|---|---|
|
e03d1f0d41
|
|||
| fbc8b4014f | |||
| 7411f391e8 | |||
| 536e164b03 | |||
| ade761cc85 | |||
| 218cb6c9de | |||
| 9ba91dd00b | |||
| 4c02107d95 | |||
| 4faecf7888 | |||
| b0e7da062a | |||
| 91540f1955 | |||
| cd35da4bed | |||
| 752c9fc47d | |||
| 826558ae44 |
@@ -0,0 +1,39 @@
|
||||
apiVersion: gateway.networking.k8s.io/v1beta1
|
||||
kind: ReferenceGrant
|
||||
metadata:
|
||||
name: allow-outpost-cross-namespace-access
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: allow-outpost-cross-namespace-access
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
from:
|
||||
- group: gateway.networking.k8s.io
|
||||
kind: HTTPRoute
|
||||
namespace: lidarr
|
||||
- group: gateway.networking.k8s.io
|
||||
kind: HTTPRoute
|
||||
namespace: radarr
|
||||
- group: gateway.networking.k8s.io
|
||||
kind: HTTPRoute
|
||||
namespace: radarr-4k
|
||||
- group: gateway.networking.k8s.io
|
||||
kind: HTTPRoute
|
||||
namespace: radarr-anime
|
||||
- group: gateway.networking.k8s.io
|
||||
kind: HTTPRoute
|
||||
namespace: radarr-standup
|
||||
- group: gateway.networking.k8s.io
|
||||
kind: HTTPRoute
|
||||
namespace: sonarr
|
||||
- group: gateway.networking.k8s.io
|
||||
kind: HTTPRoute
|
||||
namespace: sonarr-4k
|
||||
- group: gateway.networking.k8s.io
|
||||
kind: HTTPRoute
|
||||
namespace: sonarr-anime
|
||||
to:
|
||||
- group: ""
|
||||
kind: Service
|
||||
name: ak-outpost-traefik-proxy-auth
|
||||
@@ -30,4 +30,4 @@ dependencies:
|
||||
repository: oci://harbor.alexlebens.net/helm-charts
|
||||
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/booklore.png
|
||||
# renovate: datasource=github-releases depName=booklore-app/BookLore
|
||||
appVersion: v2.0.1
|
||||
appVersion: v2.0.2
|
||||
|
||||
@@ -9,7 +9,7 @@ booklore:
|
||||
main:
|
||||
image:
|
||||
repository: ghcr.io/booklore-app/booklore
|
||||
tag: v2.0.1
|
||||
tag: v2.0.2
|
||||
pullPolicy: IfNotPresent
|
||||
env:
|
||||
- name: TZ
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
dependencies:
|
||||
- name: cilium
|
||||
repository: https://helm.cilium.io/
|
||||
version: 1.18.6
|
||||
digest: sha256:8ea328ac238524b5b423e6289f5e25d05ef64e6aa19cfd5de238f1d5dd533e9b
|
||||
generated: "2026-02-05T12:00:20.15778-06:00"
|
||||
version: 1.19.1
|
||||
digest: sha256:bf5e8b3233c18bdb9409bb98c9a7ea4114e0e04e8489a49fdb2d29ded0cfa429
|
||||
generated: "2026-02-26T00:07:10.014164289Z"
|
||||
|
||||
@@ -15,7 +15,7 @@ maintainers:
|
||||
- name: alexlebens
|
||||
dependencies:
|
||||
- name: cilium
|
||||
version: 1.18.6
|
||||
version: 1.19.1
|
||||
repository: https://helm.cilium.io/
|
||||
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/cilium.png
|
||||
# renovate: datasource=github-releases depName=cilium/cilium
|
||||
|
||||
@@ -1,6 +1,6 @@
|
||||
dependencies:
|
||||
- name: eck-operator
|
||||
repository: https://helm.elastic.co
|
||||
version: 3.3.0
|
||||
digest: sha256:d2b00de6c03bf7624fdf496b326262149a2d2635012f14e900ed0724545c95d9
|
||||
generated: "2026-02-03T18:05:00.461644575Z"
|
||||
version: 3.3.1
|
||||
digest: sha256:8585f3ea3e4cafc4ff2969ea7e797017b7cfe4becb3385f0b080725908c02f09
|
||||
generated: "2026-02-25T18:48:55.77034549Z"
|
||||
|
||||
@@ -15,8 +15,8 @@ maintainers:
|
||||
- name: alexlebens
|
||||
dependencies:
|
||||
- name: eck-operator
|
||||
version: 3.3.0
|
||||
version: 3.3.1
|
||||
repository: https://helm.elastic.co
|
||||
icon: https://helm.elastic.co/icons/eck.png
|
||||
# renovate: datasource=github-releases depName=elastic/cloud-on-k8s
|
||||
appVersion: v3.3.0
|
||||
appVersion: v3.3.1
|
||||
|
||||
@@ -1,12 +1,12 @@
|
||||
dependencies:
|
||||
- name: kube-prometheus-stack
|
||||
repository: oci://ghcr.io/prometheus-community/charts
|
||||
version: 82.3.0
|
||||
version: 82.4.0
|
||||
- name: app-template
|
||||
repository: https://bjw-s-labs.github.io/helm-charts/
|
||||
version: 4.6.2
|
||||
- name: redis-replication
|
||||
repository: oci://harbor.alexlebens.net/helm-charts
|
||||
version: 1.0.4
|
||||
digest: sha256:41de0559e2f4e85a33ca006520cf67c85abaf5691f3cd0aacf7b66ba0d95ce50
|
||||
generated: "2026-02-24T20:10:32.588038295Z"
|
||||
digest: sha256:24214c0bc1e6aed9954385aa61b403a7fa4b4e92bac09777504635cba98735ba
|
||||
generated: "2026-02-25T23:46:14.059155578Z"
|
||||
|
||||
@@ -20,7 +20,7 @@ maintainers:
|
||||
- name: alexlebens
|
||||
dependencies:
|
||||
- name: kube-prometheus-stack
|
||||
version: 82.3.0
|
||||
version: 82.4.0
|
||||
repository: oci://ghcr.io/prometheus-community/charts
|
||||
- name: app-template
|
||||
alias: ntfy-alertmanager
|
||||
|
||||
26
clusters/cl01tl/helm/lidarr/templates/middleware.yaml
Normal file
26
clusters/cl01tl/helm/lidarr/templates/middleware.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: oidc-forward-auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: oidc-forward-auth
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
forwardAuth:
|
||||
address: http://ak-outpost-traefik-proxy-auth.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeaders:
|
||||
- X-authentik-username
|
||||
- X-authentik-groups
|
||||
- X-authentik-entitlements
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
- X-authentik-jwt
|
||||
- X-authentik-meta-jwks
|
||||
- X-authentik-meta-outpost
|
||||
- X-authentik-meta-provider
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
@@ -84,12 +84,28 @@ lidarr:
|
||||
hostnames:
|
||||
- lidarr.alexlebens.net
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: ak-outpost-traefik-proxy-auth
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
weight: 100
|
||||
filters: []
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
value: /outpost.goauthentik.io
|
||||
- backendRefs:
|
||||
- group: ''
|
||||
kind: Service
|
||||
name: lidarr
|
||||
port: 80
|
||||
weight: 100
|
||||
filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: oidc-forward-auth
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
|
||||
26
clusters/cl01tl/helm/radarr-4k/templates/middleware.yaml
Normal file
26
clusters/cl01tl/helm/radarr-4k/templates/middleware.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: oidc-forward-auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: oidc-forward-auth
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
forwardAuth:
|
||||
address: http://ak-outpost-traefik-proxy-auth.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeaders:
|
||||
- X-authentik-username
|
||||
- X-authentik-groups
|
||||
- X-authentik-entitlements
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
- X-authentik-jwt
|
||||
- X-authentik-meta-jwks
|
||||
- X-authentik-meta-outpost
|
||||
- X-authentik-meta-provider
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
@@ -84,12 +84,28 @@ radarr-4k:
|
||||
hostnames:
|
||||
- radarr-4k.alexlebens.net
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: ak-outpost-traefik-proxy-auth
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
weight: 100
|
||||
filters: []
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
value: /outpost.goauthentik.io
|
||||
- backendRefs:
|
||||
- group: ''
|
||||
kind: Service
|
||||
name: radarr-4k
|
||||
port: 80
|
||||
weight: 100
|
||||
filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: oidc-forward-auth
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
|
||||
26
clusters/cl01tl/helm/radarr-anime/templates/middleware.yaml
Normal file
26
clusters/cl01tl/helm/radarr-anime/templates/middleware.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: oidc-forward-auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: oidc-forward-auth
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
forwardAuth:
|
||||
address: http://ak-outpost-traefik-proxy-auth.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeaders:
|
||||
- X-authentik-username
|
||||
- X-authentik-groups
|
||||
- X-authentik-entitlements
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
- X-authentik-jwt
|
||||
- X-authentik-meta-jwks
|
||||
- X-authentik-meta-outpost
|
||||
- X-authentik-meta-provider
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
@@ -82,12 +82,28 @@ radarr-anime:
|
||||
hostnames:
|
||||
- radarr-anime.alexlebens.net
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: ak-outpost-traefik-proxy-auth
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
weight: 100
|
||||
filters: []
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
value: /outpost.goauthentik.io
|
||||
- backendRefs:
|
||||
- group: ''
|
||||
kind: Service
|
||||
name: radarr-anime
|
||||
port: 80
|
||||
weight: 100
|
||||
filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: oidc-forward-auth
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
|
||||
@@ -0,0 +1,26 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: oidc-forward-auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: oidc-forward-auth
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
forwardAuth:
|
||||
address: http://ak-outpost-traefik-proxy-auth.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeaders:
|
||||
- X-authentik-username
|
||||
- X-authentik-groups
|
||||
- X-authentik-entitlements
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
- X-authentik-jwt
|
||||
- X-authentik-meta-jwks
|
||||
- X-authentik-meta-outpost
|
||||
- X-authentik-meta-provider
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
@@ -82,12 +82,28 @@ radarr-standup:
|
||||
hostnames:
|
||||
- radarr-standup.alexlebens.net
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: ak-outpost-traefik-proxy-auth
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
weight: 100
|
||||
filters: []
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
value: /outpost.goauthentik.io
|
||||
- backendRefs:
|
||||
- group: ''
|
||||
kind: Service
|
||||
name: radarr-standup
|
||||
port: 80
|
||||
weight: 100
|
||||
filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: oidc-forward-auth
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
|
||||
26
clusters/cl01tl/helm/radarr/templates/middleware.yaml
Normal file
26
clusters/cl01tl/helm/radarr/templates/middleware.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: oidc-forward-auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: oidc-forward-auth
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
forwardAuth:
|
||||
address: http://ak-outpost-traefik-proxy-auth.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeaders:
|
||||
- X-authentik-username
|
||||
- X-authentik-groups
|
||||
- X-authentik-entitlements
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
- X-authentik-jwt
|
||||
- X-authentik-meta-jwks
|
||||
- X-authentik-meta-outpost
|
||||
- X-authentik-meta-provider
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
@@ -84,12 +84,28 @@ radarr:
|
||||
hostnames:
|
||||
- radarr.alexlebens.net
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: ak-outpost-traefik-proxy-auth
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
weight: 100
|
||||
filters: []
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
value: /outpost.goauthentik.io
|
||||
- backendRefs:
|
||||
- group: ''
|
||||
kind: Service
|
||||
name: radarr
|
||||
port: 80
|
||||
weight: 100
|
||||
filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: oidc-forward-auth
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
|
||||
26
clusters/cl01tl/helm/sonarr-4k/templates/middleware.yaml
Normal file
26
clusters/cl01tl/helm/sonarr-4k/templates/middleware.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: oidc-forward-auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: oidc-forward-auth
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
forwardAuth:
|
||||
address: http://ak-outpost-traefik-proxy-auth.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeaders:
|
||||
- X-authentik-username
|
||||
- X-authentik-groups
|
||||
- X-authentik-entitlements
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
- X-authentik-jwt
|
||||
- X-authentik-meta-jwks
|
||||
- X-authentik-meta-outpost
|
||||
- X-authentik-meta-provider
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
@@ -82,12 +82,28 @@ sonarr-4k:
|
||||
hostnames:
|
||||
- sonarr-4k.alexlebens.net
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: ak-outpost-traefik-proxy-auth
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
weight: 100
|
||||
filters: []
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
value: /outpost.goauthentik.io
|
||||
- backendRefs:
|
||||
- group: ''
|
||||
kind: Service
|
||||
name: sonarr-4k
|
||||
port: 80
|
||||
weight: 100
|
||||
filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: oidc-forward-auth
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
|
||||
26
clusters/cl01tl/helm/sonarr-anime/templates/middleware.yaml
Normal file
26
clusters/cl01tl/helm/sonarr-anime/templates/middleware.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: oidc-forward-auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: oidc-forward-auth
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
forwardAuth:
|
||||
address: http://ak-outpost-traefik-proxy-auth.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeaders:
|
||||
- X-authentik-username
|
||||
- X-authentik-groups
|
||||
- X-authentik-entitlements
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
- X-authentik-jwt
|
||||
- X-authentik-meta-jwks
|
||||
- X-authentik-meta-outpost
|
||||
- X-authentik-meta-provider
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
@@ -82,12 +82,28 @@ sonarr-anime:
|
||||
hostnames:
|
||||
- sonarr-anime.alexlebens.net
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: ak-outpost-traefik-proxy-auth
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
weight: 100
|
||||
filters: []
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
value: /outpost.goauthentik.io
|
||||
- backendRefs:
|
||||
- group: ''
|
||||
kind: Service
|
||||
name: sonarr-anime
|
||||
port: 80
|
||||
weight: 100
|
||||
filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: oidc-forward-auth
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
|
||||
26
clusters/cl01tl/helm/sonarr/templates/middleware.yaml
Normal file
26
clusters/cl01tl/helm/sonarr/templates/middleware.yaml
Normal file
@@ -0,0 +1,26 @@
|
||||
apiVersion: traefik.io/v1alpha1
|
||||
kind: Middleware
|
||||
metadata:
|
||||
name: oidc-forward-auth
|
||||
namespace: {{ .Release.Namespace }}
|
||||
labels:
|
||||
app.kubernetes.io/name: oidc-forward-auth
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/part-of: {{ .Release.Name }}
|
||||
spec:
|
||||
forwardAuth:
|
||||
address: http://ak-outpost-traefik-proxy-auth.authentik.svc.cluster.local:9000/outpost.goauthentik.io/auth/traefik
|
||||
trustForwardHeader: true
|
||||
authResponseHeaders:
|
||||
- X-authentik-username
|
||||
- X-authentik-groups
|
||||
- X-authentik-entitlements
|
||||
- X-authentik-email
|
||||
- X-authentik-name
|
||||
- X-authentik-uid
|
||||
- X-authentik-jwt
|
||||
- X-authentik-meta-jwks
|
||||
- X-authentik-meta-outpost
|
||||
- X-authentik-meta-provider
|
||||
- X-authentik-meta-app
|
||||
- X-authentik-meta-version
|
||||
@@ -82,12 +82,28 @@ sonarr:
|
||||
hostnames:
|
||||
- sonarr.alexlebens.net
|
||||
rules:
|
||||
- backendRefs:
|
||||
- name: ak-outpost-traefik-proxy-auth
|
||||
namespace: authentik
|
||||
port: 9000
|
||||
weight: 100
|
||||
filters: []
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
value: /outpost.goauthentik.io
|
||||
- backendRefs:
|
||||
- group: ''
|
||||
kind: Service
|
||||
name: sonarr
|
||||
port: 80
|
||||
weight: 100
|
||||
filters:
|
||||
- type: ExtensionRef
|
||||
extensionRef:
|
||||
group: traefik.io
|
||||
kind: Middleware
|
||||
name: oidc-forward-auth
|
||||
matches:
|
||||
- path:
|
||||
type: PathPrefix
|
||||
|
||||
@@ -21,4 +21,4 @@ dependencies:
|
||||
repository: https://pkgs.tailscale.com/helmcharts
|
||||
icon: https://cdn.jsdelivr.net/gh/selfhst/icons/png/tailscale-light.png
|
||||
# renovate: datasource=github-releases depName=tailscale/tailscale
|
||||
appVersion: v1.94.1
|
||||
appVersion: v1.94.2
|
||||
|
||||
Reference in New Issue
Block a user