infra/modules/kubernetes/authentik/main.tf
2026-01-10 16:28:14 +00:00

82 lines
1.8 KiB
HCL

variable "tls_secret_name" {}
variable "secret_key" {}
variable "postgres_password" {}
variable "tier" { type = string }
module "tls_secret" {
source = "../setup_tls_secret"
namespace = kubernetes_namespace.authentik.metadata[0].name
tls_secret_name = var.tls_secret_name
}
resource "kubernetes_namespace" "authentik" {
metadata {
name = "authentik"
labels = {
tier = var.tier
}
}
}
resource "helm_release" "authentik" {
namespace = kubernetes_namespace.authentik.metadata[0].name
create_namespace = true
name = "goauthentik"
repository = "https://charts.goauthentik.io/"
chart = "authentik"
# version = "2025.8.1"
version = "2025.10.3"
atomic = true
timeout = 6000
values = [templatefile("${path.module}/values.yaml", { postgres_password = var.postgres_password, secret_key = var.secret_key })]
}
resource "kubernetes_ingress_v1" "authentik" {
metadata {
name = "authentik"
namespace = kubernetes_namespace.authentik.metadata[0].name
annotations = {
"kubernetes.io/ingress.class" = "nginx"
}
}
spec {
tls {
hosts = ["authentik.viktorbarzin.me"]
secret_name = var.tls_secret_name
}
rule {
host = "authentik.viktorbarzin.me"
http {
path {
path = "/outpost.goauthentik.io"
path_type = "Prefix"
backend {
service {
name = "ak-outpost-authentik-embedded-outpost"
port {
number = 9000
}
}
}
}
path {
path = "/"
path_type = "Prefix"
backend {
service {
name = "goauthentik-server"
port {
number = 80
}
}
}
}
}
}
}
}