Files
K3S/addons/authelia/role/chart/templates/ingress.yaml
Sergey Antropoff 225f77598a feat: добавить аддон authelia — SSO forward-auth и OIDC provider
Helm chart + Ansible role для Authelia 4.38:
- Forward-auth для ingress-nginx через аннотации auth-url/auth-signin
- OIDC provider: Gitea, Grafana, ArgoCD, MinIO, Vault, Nextcloud
- SQLite default или PostgreSQL; опциональный Redis для сессий
- RSA ключ OIDC генерируется автоматически если не задан в vault
- ConfigMap authelia-forward-auth с готовыми аннотациями для любого сервиса
- README: install, users, protect service, OIDC per-service, debug, test
2026-04-26 18:18:46 +03:00

37 lines
1.2 KiB
YAML

{{- if .Values.ingress.enabled }}
---
# Authelia portal ingress — accessible at authHost
# No forward-auth annotation here (would cause an auth loop)
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
name: {{ include "authelia.name" . }}
namespace: {{ .Release.Namespace }}
labels:
{{- include "authelia.labels" . | nindent 4 }}
annotations:
kubernetes.io/ingress.class: {{ .Values.ingress.ingressClass | quote }}
nginx.ingress.kubernetes.io/proxy-buffer-size: "128k"
{{- if .Values.ingress.tls.certManager.enabled }}
cert-manager.io/cluster-issuer: {{ .Values.ingress.tls.certManager.issuer | quote }}
{{- end }}
spec:
{{- if .Values.ingress.tls.enabled }}
tls:
- hosts:
- {{ .Values.authHost | quote }}
secretName: {{ .Values.ingress.tls.secretName | default (printf "%s-tls" (include "authelia.name" .)) | quote }}
{{- end }}
rules:
- host: {{ .Values.authHost | quote }}
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: {{ include "authelia.name" . }}
port:
number: 9091
{{- end }}