move radicale to kubernetes

This commit is contained in:
Pim Kunis 2024-03-28 21:10:15 +01:00
parent 41a5ed9dc5
commit a29f085f99
4 changed files with 138 additions and 1 deletions

View file

@ -4,7 +4,6 @@
roles: roles:
- {role: traefik, tags: traefik} - {role: traefik, tags: traefik}
- {role: forgejo, tags: forgejo} - {role: forgejo, tags: forgejo}
- {role: radicale, tags: radicale}
- {role: hedgedoc, tags: hedgedoc} - {role: hedgedoc, tags: hedgedoc}
- {role: swarm_dashboard, tags: swarm_dashboard} - {role: swarm_dashboard, tags: swarm_dashboard}
- {role: pihole, tags: pihole} - {role: pihole, tags: pihole}

View file

@ -72,6 +72,12 @@ services:
- traefik.http.routers.inbucket.rule=Host(`inbucket.kun.is`) - traefik.http.routers.inbucket.rule=Host(`inbucket.kun.is`)
- traefik.http.routers.inbucket.tls=true - traefik.http.routers.inbucket.tls=true
- traefik.http.routers.inbucket.tls.certresolver=letsencrypt - traefik.http.routers.inbucket.tls.certresolver=letsencrypt
- traefik.http.routers.radicale.entrypoints=websecure
- traefik.http.routers.radicale.service=k3s@file
- traefik.http.routers.radicale.rule=Host(`dav.kun.is`)
- traefik.http.routers.radicale.tls=true
- traefik.http.routers.radicale.tls.certresolver=letsencrypt
volumes: volumes:
- type: bind - type: bind
source: /var/run/docker.sock source: /var/run/docker.sock

View file

@ -11,6 +11,7 @@
./cyberchef.nix ./cyberchef.nix
./kms.nix ./kms.nix
./inbucket.nix ./inbucket.nix
./radicale.nix
]; ];
kubernetes.kubeconfig = "~/.kube/config"; kubernetes.kubeconfig = "~/.kube/config";
kubenix.project = "home"; kubenix.project = "home";

View file

@ -0,0 +1,131 @@
{
kubernetes.resources = {
configMaps.radicale.data = {
users = "pim:$apr1$GUiTihkS$dDCkaUxFx/O86m6NCy/yQ.";
# TODO: Can this be generated with nix?
config = ''
[server]
hosts = 0.0.0.0:5232, [::]:5232
ssl = False
[encoding]
request = utf-8
stock = utf-8
[auth]
realm = Radicale - Password Required
type = htpasswd
htpasswd_filename = /config/users
htpasswd_encryption = md5
[rights]
type = owner_only
[storage]
type = multifilesystem
filesystem_folder = /data
[logging]
[headers]
'';
};
deployments.radicale = {
metadata.labels.app = "radicale";
spec = {
selector.matchLabels.app = "radicale";
template = {
metadata.labels.app = "radicale";
spec = {
containers.radicale = {
image = "tomsquest/docker-radicale";
ports = [{
containerPort = 5232;
protocol = "TCP";
}];
volumeMounts = [
{
name = "data";
mountPath = "/data";
}
{
name = "config";
mountPath = "/config/config";
subPath = "config";
}
{
name = "config";
mountPath = "/config/users";
subPath = "users";
}
];
};
volumes = [
{
name = "data";
persistentVolumeClaim.claimName = "radicale";
}
{
name = "config";
configMap.name = "radicale";
}
];
};
};
};
};
persistentVolumes.radicale.spec = {
capacity.storage = "1Mi";
accessModes = [ "ReadWriteMany" ];
nfs = {
server = "lewis.hyp";
path = "/mnt/data/nfs/radicale";
};
};
persistentVolumeClaims.radicale.spec = {
accessModes = [ "ReadWriteMany" ];
storageClassName = "";
resources.requests.storage = "1Mi";
volumeName = "radicale";
};
services.radicale.spec = {
selector.app = "radicale";
ports = [{
protocol = "TCP";
port = 80;
targetPort = 5232;
}];
};
ingresses.radicale.spec = {
ingressClassName = "traefik";
rules = [{
host = "dav.kun.is";
http.paths = [{
path = "/";
pathType = "Prefix";
backend.service = {
name = "radicale";
port.number = 80;
};
}];
}];
};
};
}