infra/stacks/foolery/main.tf
Viktor Barzin 9820f2ced0 add foolery stack: agent orchestration UI on devvm [ci skip]
Service+Endpoints pattern proxying to 10.0.10.10:3210 (Foolery).
Protected by Authentik forward-auth. DNS via Cloudflare tunnel.
2026-04-10 00:21:59 +01:00

72 lines
1.6 KiB
HCL

variable "tls_secret_name" {
type = string
sensitive = true
}
resource "kubernetes_namespace" "foolery" {
metadata {
name = "foolery"
labels = {
"istio-injection" : "disabled"
tier = local.tiers.aux
}
}
}
module "tls_secret" {
source = "../../modules/kubernetes/setup_tls_secret"
namespace = kubernetes_namespace.foolery.metadata[0].name
tls_secret_name = var.tls_secret_name
}
# Service + Endpoints to reverse-proxy to Foolery at 10.0.10.10:3210
resource "kubernetes_service" "foolery" {
metadata {
name = "foolery"
namespace = kubernetes_namespace.foolery.metadata[0].name
labels = {
app = "foolery"
}
}
spec {
port {
name = "http"
port = 80
target_port = 3210
}
}
}
resource "kubernetes_endpoints" "foolery" {
metadata {
name = "foolery"
namespace = kubernetes_namespace.foolery.metadata[0].name
}
subset {
address {
ip = "10.0.10.10"
}
port {
name = "http"
port = 3210
}
}
}
module "ingress" {
source = "../../modules/kubernetes/ingress_factory"
namespace = kubernetes_namespace.foolery.metadata[0].name
name = "foolery"
tls_secret_name = var.tls_secret_name
protected = true
extra_annotations = {
"gethomepage.dev/enabled" = "true"
"gethomepage.dev/name" = "Foolery"
"gethomepage.dev/description" = "Agent orchestration control room"
"gethomepage.dev/icon" = "mdi-robot"
"gethomepage.dev/group" = "AI"
"gethomepage.dev/pod-selector" = ""
}
}