Pin third-party images from :latest to current stable versions: - Platform: cloudflared, technitium, snmp-exporter, pve-exporter, headscale, shadowsocks, xray - Apps: paperless-ngx, linkwarden, wealthfolio, speedtest, synapse, n8n, prowlarr, qbittorrent, lidarr, rybbit, ollama, immichframe, cyberchef, networking-toolbox, echo, coturn, shlink, affine Enable DIUN annotations on all pinned deployments with per-image tag patterns. Add Woodpecker app-stacks pipeline for selective terragrunt apply on changed app stacks.
324 lines
7.5 KiB
HCL
324 lines
7.5 KiB
HCL
|
|
variable "tls_secret_name" {}
|
|
variable "tier" { type = string }
|
|
variable "headscale_config" {}
|
|
variable "headscale_acl" {}
|
|
variable "nfs_server" { type = string }
|
|
variable "homepage_token" {
|
|
type = string
|
|
default = ""
|
|
sensitive = true
|
|
}
|
|
|
|
resource "kubernetes_namespace" "headscale" {
|
|
metadata {
|
|
name = "headscale"
|
|
labels = {
|
|
tier = var.tier
|
|
}
|
|
}
|
|
}
|
|
|
|
module "tls_secret" {
|
|
source = "../../../../modules/kubernetes/setup_tls_secret"
|
|
namespace = kubernetes_namespace.headscale.metadata[0].name
|
|
tls_secret_name = var.tls_secret_name
|
|
}
|
|
|
|
module "nfs_data" {
|
|
source = "../../../../modules/kubernetes/nfs_volume"
|
|
name = "headscale-data"
|
|
namespace = kubernetes_namespace.headscale.metadata[0].name
|
|
nfs_server = var.nfs_server
|
|
nfs_path = "/mnt/main/headscale"
|
|
}
|
|
|
|
resource "kubernetes_deployment" "headscale" {
|
|
metadata {
|
|
name = "headscale"
|
|
namespace = kubernetes_namespace.headscale.metadata[0].name
|
|
labels = {
|
|
app = "headscale"
|
|
tier = var.tier
|
|
# scare to try but probably non-http will fail
|
|
# "istio-injection" : "enabled"
|
|
}
|
|
|
|
annotations = {
|
|
"reloader.stakater.com/search" = "true"
|
|
}
|
|
}
|
|
spec {
|
|
replicas = 1
|
|
strategy {
|
|
type = "Recreate"
|
|
}
|
|
selector {
|
|
match_labels = {
|
|
app = "headscale"
|
|
}
|
|
}
|
|
template {
|
|
metadata {
|
|
labels = {
|
|
app = "headscale"
|
|
}
|
|
annotations = {
|
|
"diun.enable" = "true"
|
|
"diun.include_tags" = "^\\d+(?:\\.\\d+)?(?:\\.\\d+)?$"
|
|
}
|
|
}
|
|
spec {
|
|
container {
|
|
image = "headscale/headscale:0.28.0"
|
|
# image = "headscale/headscale:0.28.0-debug" # -debug is for debug images
|
|
name = "headscale"
|
|
command = ["headscale", "serve"]
|
|
|
|
resources {
|
|
requests = {
|
|
cpu = "50m"
|
|
memory = "128Mi"
|
|
}
|
|
limits = {
|
|
memory = "128Mi"
|
|
}
|
|
}
|
|
|
|
port {
|
|
container_port = 8080
|
|
}
|
|
port {
|
|
container_port = 9090
|
|
}
|
|
port {
|
|
container_port = 41641
|
|
}
|
|
|
|
liveness_probe {
|
|
http_get {
|
|
path = "/health"
|
|
port = 8080
|
|
}
|
|
initial_delay_seconds = 15
|
|
period_seconds = 30
|
|
timeout_seconds = 5
|
|
failure_threshold = 5
|
|
}
|
|
readiness_probe {
|
|
http_get {
|
|
path = "/health"
|
|
port = 8080
|
|
}
|
|
initial_delay_seconds = 5
|
|
period_seconds = 30
|
|
timeout_seconds = 5
|
|
failure_threshold = 3
|
|
}
|
|
|
|
volume_mount {
|
|
name = "config-volume"
|
|
mount_path = "/etc/headscale"
|
|
}
|
|
|
|
volume_mount {
|
|
mount_path = "/mnt"
|
|
name = "nfs-config"
|
|
}
|
|
}
|
|
volume {
|
|
name = "config-volume"
|
|
config_map {
|
|
name = "headscale-config"
|
|
items {
|
|
key = "config.yaml"
|
|
path = "config.yaml"
|
|
}
|
|
items {
|
|
key = "acl.yaml"
|
|
path = "acl.yaml"
|
|
}
|
|
}
|
|
}
|
|
|
|
volume {
|
|
name = "nfs-config"
|
|
persistent_volume_claim {
|
|
claim_name = module.nfs_data.claim_name
|
|
}
|
|
}
|
|
# container {
|
|
# image = "simcu/headscale-ui:0.1.4"
|
|
# name = "headscale-ui"
|
|
# port {
|
|
# container_port = 80
|
|
# }
|
|
# }
|
|
container {
|
|
image = "ghcr.io/gurucomputing/headscale-ui:latest"
|
|
# image = "ghcr.io/tale/headplane:0.3.2"
|
|
name = "headscale-ui"
|
|
|
|
resources {
|
|
requests = {
|
|
cpu = "25m"
|
|
memory = "128Mi"
|
|
}
|
|
limits = {
|
|
memory = "128Mi"
|
|
}
|
|
}
|
|
|
|
port {
|
|
container_port = 8081
|
|
# container_port = 3000
|
|
}
|
|
env {
|
|
name = "HTTP_PORT"
|
|
value = "8081"
|
|
}
|
|
# env {
|
|
# name = "HTTPS_PORT"
|
|
# value = "8082"
|
|
# }
|
|
env {
|
|
name = "HEADSCALE_URL"
|
|
value = "http://localhost:8080"
|
|
}
|
|
env {
|
|
name = "COOKIE_SECRET"
|
|
value = "kekekekke"
|
|
}
|
|
env {
|
|
name = "ROOT_API_KEY"
|
|
value = "kekekekeke"
|
|
}
|
|
}
|
|
dns_config {
|
|
option {
|
|
name = "ndots"
|
|
value = "2"
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
resource "kubernetes_service" "headscale" {
|
|
metadata {
|
|
name = "headscale"
|
|
namespace = kubernetes_namespace.headscale.metadata[0].name
|
|
labels = {
|
|
"app" = "headscale"
|
|
}
|
|
annotations = {
|
|
"prometheus.io/scrape" = "true"
|
|
"prometheus.io/port" = "9090"
|
|
}
|
|
# annotations = {
|
|
# "metallb.universe.tf/allow-shared-ip" : "shared"
|
|
# }
|
|
}
|
|
|
|
spec {
|
|
# type = "LoadBalancer"
|
|
# external_traffic_policy = "Cluster"
|
|
selector = {
|
|
app = "headscale"
|
|
|
|
}
|
|
port {
|
|
name = "headscale"
|
|
port = "8080"
|
|
protocol = "TCP"
|
|
}
|
|
port {
|
|
name = "headscale-ui"
|
|
port = "80"
|
|
target_port = 8081
|
|
# target_port = 3000
|
|
protocol = "TCP"
|
|
}
|
|
port {
|
|
name = "metrics"
|
|
port = "9090"
|
|
protocol = "TCP"
|
|
}
|
|
}
|
|
}
|
|
|
|
module "ingress" {
|
|
source = "../../../../modules/kubernetes/ingress_factory"
|
|
namespace = kubernetes_namespace.headscale.metadata[0].name
|
|
name = "headscale"
|
|
port = 8080
|
|
tls_secret_name = var.tls_secret_name
|
|
extra_annotations = {
|
|
"gethomepage.dev/enabled" = "true"
|
|
"gethomepage.dev/name" = "Headscale"
|
|
"gethomepage.dev/description" = "VPN mesh network"
|
|
"gethomepage.dev/icon" = "headscale.png"
|
|
"gethomepage.dev/group" = "Identity & Security"
|
|
"gethomepage.dev/pod-selector" = ""
|
|
}
|
|
}
|
|
|
|
module "ingress-ui" {
|
|
source = "../../../../modules/kubernetes/ingress_factory"
|
|
namespace = kubernetes_namespace.headscale.metadata[0].name
|
|
name = "headscale-ui"
|
|
host = "headscale"
|
|
service_name = "headscale"
|
|
port = 8081
|
|
ingress_path = ["/web"]
|
|
tls_secret_name = var.tls_secret_name
|
|
}
|
|
|
|
resource "kubernetes_service" "headscale-server" {
|
|
metadata {
|
|
name = "headscale-server"
|
|
namespace = kubernetes_namespace.headscale.metadata[0].name
|
|
labels = {
|
|
"app" = "headscale"
|
|
}
|
|
annotations = {
|
|
"metallb.io/loadBalancerIPs" = "10.0.20.200"
|
|
"metallb.io/allow-shared-ip" = "shared"
|
|
}
|
|
}
|
|
|
|
spec {
|
|
type = "LoadBalancer"
|
|
external_traffic_policy = "Cluster"
|
|
selector = {
|
|
app = "headscale"
|
|
|
|
}
|
|
# port {
|
|
# name = "headscale-tcp"
|
|
# port = "41641"
|
|
# protocol = "TCP"
|
|
# }
|
|
port {
|
|
name = "headscale-udp"
|
|
port = "41641"
|
|
protocol = "UDP"
|
|
}
|
|
}
|
|
}
|
|
|
|
resource "kubernetes_config_map" "headscale-config" {
|
|
metadata {
|
|
name = "headscale-config"
|
|
namespace = kubernetes_namespace.headscale.metadata[0].name
|
|
|
|
annotations = {
|
|
"reloader.stakater.com/match" = "true"
|
|
}
|
|
}
|
|
|
|
data = {
|
|
"config.yaml" = var.headscale_config
|
|
"acl.yaml" = var.headscale_acl
|
|
}
|
|
}
|