variable "tls_secret_name" {} variable "tier" { type = string } variable "headscale_config" {} variable "headscale_acl" {} variable "nfs_server" { type = string } variable "homepage_token" { type = string default = "" sensitive = true } resource "kubernetes_namespace" "headscale" { metadata { name = "headscale" labels = { tier = var.tier } } } module "tls_secret" { source = "../../../../modules/kubernetes/setup_tls_secret" namespace = kubernetes_namespace.headscale.metadata[0].name tls_secret_name = var.tls_secret_name } module "nfs_data" { source = "../../../../modules/kubernetes/nfs_volume" name = "headscale-data" namespace = kubernetes_namespace.headscale.metadata[0].name nfs_server = var.nfs_server nfs_path = "/mnt/main/headscale" } resource "kubernetes_deployment" "headscale" { metadata { name = "headscale" namespace = kubernetes_namespace.headscale.metadata[0].name labels = { app = "headscale" tier = var.tier # scare to try but probably non-http will fail # "istio-injection" : "enabled" } annotations = { "reloader.stakater.com/search" = "true" } } spec { replicas = 1 strategy { type = "Recreate" } selector { match_labels = { app = "headscale" } } template { metadata { labels = { app = "headscale" } annotations = { # "diun.enable" = "true" "diun.enable" = "false" "diun.include_tags" = "^\\d+(?:\\.\\d+)?(?:\\.\\d+)?$" } } spec { container { image = "headscale/headscale:0.23.0" # image = "headscale/headscale:0.23.0-debug" # -debug is for debug images name = "headscale" command = ["headscale", "serve"] resources { requests = { cpu = "50m" memory = "64Mi" } limits = { cpu = "200m" memory = "256Mi" } } port { container_port = 8080 } port { container_port = 9090 } port { container_port = 41641 } liveness_probe { http_get { path = "/health" port = 8080 } initial_delay_seconds = 15 period_seconds = 30 timeout_seconds = 5 failure_threshold = 5 } readiness_probe { http_get { path = "/health" port = 8080 } initial_delay_seconds = 5 period_seconds = 30 timeout_seconds = 5 failure_threshold = 3 } volume_mount { name = "config-volume" mount_path = "/etc/headscale" } volume_mount { mount_path = "/mnt" name = "nfs-config" } } volume { name = "config-volume" config_map { name = "headscale-config" items { key = "config.yaml" path = "config.yaml" } items { key = "acl.yaml" path = "acl.yaml" } } } volume { name = "nfs-config" persistent_volume_claim { claim_name = module.nfs_data.claim_name } } # container { # image = "simcu/headscale-ui:0.1.4" # name = "headscale-ui" # port { # container_port = 80 # } # } container { image = "ghcr.io/gurucomputing/headscale-ui:latest" # image = "ghcr.io/tale/headplane:0.3.2" name = "headscale-ui" resources { requests = { cpu = "25m" memory = "32Mi" } limits = { cpu = "100m" memory = "128Mi" } } port { container_port = 8081 # container_port = 3000 } env { name = "HTTP_PORT" value = "8081" } # env { # name = "HTTPS_PORT" # value = "8082" # } env { name = "HEADSCALE_URL" value = "http://localhost:8080" } env { name = "COOKIE_SECRET" value = "kekekekke" } env { name = "ROOT_API_KEY" value = "kekekekeke" } } dns_config { option { name = "ndots" value = "2" } } } } } } resource "kubernetes_service" "headscale" { metadata { name = "headscale" namespace = kubernetes_namespace.headscale.metadata[0].name labels = { "app" = "headscale" } annotations = { "prometheus.io/scrape" = "true" "prometheus.io/port" = "9090" } # annotations = { # "metallb.universe.tf/allow-shared-ip" : "shared" # } } spec { # type = "LoadBalancer" # external_traffic_policy = "Cluster" selector = { app = "headscale" } port { name = "headscale" port = "8080" protocol = "TCP" } port { name = "headscale-ui" port = "80" target_port = 8081 # target_port = 3000 protocol = "TCP" } port { name = "metrics" port = "9090" protocol = "TCP" } } } module "ingress" { source = "../../../../modules/kubernetes/ingress_factory" namespace = kubernetes_namespace.headscale.metadata[0].name name = "headscale" port = 8080 tls_secret_name = var.tls_secret_name extra_annotations = { "gethomepage.dev/enabled" = "true" "gethomepage.dev/name" = "Headscale" "gethomepage.dev/description" = "VPN mesh network" "gethomepage.dev/icon" = "headscale.png" "gethomepage.dev/group" = "Identity & Security" "gethomepage.dev/pod-selector" = "" } } module "ingress-ui" { source = "../../../../modules/kubernetes/ingress_factory" namespace = kubernetes_namespace.headscale.metadata[0].name name = "headscale-ui" host = "headscale" service_name = "headscale" port = 8081 ingress_path = ["/web"] tls_secret_name = var.tls_secret_name } resource "kubernetes_service" "headscale-server" { metadata { name = "headscale-server" namespace = kubernetes_namespace.headscale.metadata[0].name labels = { "app" = "headscale" } annotations = { "metallb.universe.tf/allow-shared-ip" : "shared" } } spec { type = "LoadBalancer" external_traffic_policy = "Cluster" selector = { app = "headscale" } # port { # name = "headscale-tcp" # port = "41641" # protocol = "TCP" # } port { name = "headscale-udp" port = "41641" protocol = "UDP" } } } resource "kubernetes_config_map" "headscale-config" { metadata { name = "headscale-config" namespace = kubernetes_namespace.headscale.metadata[0].name annotations = { "reloader.stakater.com/match" = "true" } } data = { "config.yaml" = var.headscale_config "acl.yaml" = var.headscale_acl } }