diff --git a/argocd/values.yaml b/argocd/values.yaml index b695911..1828329 100644 --- a/argocd/values.yaml +++ b/argocd/values.yaml @@ -14,13 +14,11 @@ externalRedis: existingSecret: argocd-redis server: - # HTTPS is implemented by Traefik ingress: enabled: true annotations: external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" hosts: - argocd.k-space.ee tls: diff --git a/etherpad/application.yml b/etherpad/application.yml index ccc4e06..e83eeb6 100644 --- a/etherpad/application.yml +++ b/etherpad/application.yml @@ -87,7 +87,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/freescout/application.yml b/freescout/application.yml index 66d7a75..055ce16 100644 --- a/freescout/application.yml +++ b/freescout/application.yml @@ -110,7 +110,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.middlewares: freescout-freescout@kubernetescrd spec: diff --git a/frigate/application.yml b/frigate/application.yml index b1ce5ef..90f0046 100644 --- a/frigate/application.yml +++ b/frigate/application.yml @@ -264,7 +264,6 @@ metadata: external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.middlewares: frigate-frigate@kubernetescrd - traefik.ingress.kubernetes.io/router.tls: "true" spec: tls: - hosts: diff --git a/frigate/values.yaml b/frigate/values.yaml index 58cce01..92fda4f 100644 --- a/frigate/values.yaml +++ b/frigate/values.yaml @@ -152,7 +152,6 @@ ingress: enabled: true annotations: traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.middlewares: frigate-frigate@kubernetescrd hosts: diff --git a/grafana/application.yml b/grafana/application.yml index 44580e2..e53e195 100644 --- a/grafana/application.yml +++ b/grafana/application.yml @@ -203,7 +203,6 @@ metadata: name: grafana annotations: traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/hackerspace/doorboy.yml b/hackerspace/doorboy.yml index 3daeaf1..aede39e 100644 --- a/hackerspace/doorboy.yml +++ b/hackerspace/doorboy.yml @@ -82,7 +82,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/hackerspace/goredirect.yaml b/hackerspace/goredirect.yaml index 70e2bed..5918590 100644 --- a/hackerspace/goredirect.yaml +++ b/hackerspace/goredirect.yaml @@ -63,7 +63,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" # external-dns.alpha.kubernetes.io/target: traefik.k-space.ee # ^ ommitting for direct ip. Root level can't have CNAME. external-dns.alpha.kubernetes.io/hostname: k6.ee diff --git a/hackerspace/inventory.yaml b/hackerspace/inventory.yaml index 9c80a3f..f93c095 100644 --- a/hackerspace/inventory.yaml +++ b/hackerspace/inventory.yaml @@ -103,7 +103,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee external-dns.alpha.kubernetes.io/hostname: inventory.k-space.ee,members.k-space.ee spec: diff --git a/harbor/application.yml b/harbor/application.yml index e76efea..211d513 100644 --- a/harbor/application.yml +++ b/harbor/application.yml @@ -1251,7 +1251,6 @@ metadata: nginx.ingress.kubernetes.io/proxy-body-size: "0" nginx.ingress.kubernetes.io/ssl-redirect: "true" traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" spec: tls: - secretName: wildcard-tls diff --git a/harbor/values.yaml b/harbor/values.yaml index dfa364a..e127190 100644 --- a/harbor/values.yaml +++ b/harbor/values.yaml @@ -13,7 +13,6 @@ expose: cert-manager.io/cluster-issuer: default kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee labels: {} diff --git a/kubernetes-dashboard/application.yml b/kubernetes-dashboard/application.yml index 4510529..50bff88 100644 --- a/kubernetes-dashboard/application.yml +++ b/kubernetes-dashboard/application.yml @@ -273,7 +273,6 @@ metadata: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.middlewares: kubernetes-dashboard-sso@kubernetescrd - traefik.ingress.kubernetes.io/router.tls: "true" spec: rules: - host: dashboard.k-space.ee diff --git a/longhorn-system/application-extras.yml b/longhorn-system/application-extras.yml index d16b1a8..d55caf4 100644 --- a/longhorn-system/application-extras.yml +++ b/longhorn-system/application-extras.yml @@ -24,7 +24,6 @@ metadata: external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.middlewares: longhorn-system-ui@kubernetescrd - traefik.ingress.kubernetes.io/router.tls: "true" spec: rules: - host: longhorn.k-space.ee diff --git a/minio-clusters/external.yaml b/minio-clusters/external.yaml index 1acc030..e8c2e2e 100644 --- a/minio-clusters/external.yaml +++ b/minio-clusters/external.yaml @@ -43,7 +43,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: @@ -70,7 +69,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/monitoring/prometheus.yaml b/monitoring/prometheus.yaml index 7b9adfc..030a9ce 100644 --- a/monitoring/prometheus.yaml +++ b/monitoring/prometheus.yaml @@ -384,7 +384,6 @@ metadata: namespace: monitoring annotations: traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.middlewares: monitoring-prometheus@kubernetescrd spec: @@ -410,7 +409,6 @@ metadata: namespace: monitoring annotations: traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.middlewares: monitoring-alertmanager@kubernetescrd spec: diff --git a/mysql-clusters/phpmyadmin.yaml b/mysql-clusters/phpmyadmin.yaml index 26c04cd..dba7798 100644 --- a/mysql-clusters/phpmyadmin.yaml +++ b/mysql-clusters/phpmyadmin.yaml @@ -77,7 +77,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.middlewares: mysql-clusters-phpmyadmin@kubernetescrd spec: diff --git a/passmower/application.yaml b/passmower/application.yaml index a8057e1..00fece9 100644 --- a/passmower/application.yaml +++ b/passmower/application.yaml @@ -649,7 +649,6 @@ metadata: external-dns.alpha.kubernetes.io/target: traefik.k-space.ee kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" spec: tls: - hosts: diff --git a/passmower/proxmox.yaml b/passmower/proxmox.yaml index 988f7d6..40af0ec 100644 --- a/passmower/proxmox.yaml +++ b/passmower/proxmox.yaml @@ -155,7 +155,6 @@ metadata: external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.entrypoints: websecure # traefik.ingress.kubernetes.io/router.middlewares: passmower-proxmox@kubernetescrd,passmower-proxmox-redirect@kubernetescrd - traefik.ingress.kubernetes.io/router.tls: "true" spec: rules: - host: proxmox.k-space.ee @@ -234,7 +233,6 @@ metadata: external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.middlewares: passmower-codemowers-cloud-ip-whitelist@kubernetescrd - traefik.ingress.kubernetes.io/router.tls: "true" spec: rules: - host: pve-internal.k-space.ee diff --git a/passmower/prusa.yaml b/passmower/prusa.yaml index b573926..f3d343c 100644 --- a/passmower/prusa.yaml +++ b/passmower/prusa.yaml @@ -34,7 +34,6 @@ metadata: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.middlewares: passmower-prusa@kubernetescrd - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/passmower/values.yaml b/passmower/values.yaml index fb17f1d..4ebc4e7 100644 --- a/passmower/values.yaml +++ b/passmower/values.yaml @@ -72,7 +72,6 @@ ingress: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee external-dns.alpha.kubernetes.io/hostname: auth.k-space.ee,auth2.k-space.ee tls: diff --git a/passmower/voron.yaml b/passmower/voron.yaml index 77fb669..2cf21d5 100644 --- a/passmower/voron.yaml +++ b/passmower/voron.yaml @@ -34,7 +34,6 @@ metadata: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.middlewares: passmower-voron@kubernetescrd - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/postgres-clusters/pgweb.yaml b/postgres-clusters/pgweb.yaml index e101cd8..472eb45 100644 --- a/postgres-clusters/pgweb.yaml +++ b/postgres-clusters/pgweb.yaml @@ -53,7 +53,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee traefik.ingress.kubernetes.io/router.middlewares: postgres-clusters-pgweb@kubernetescrd spec: diff --git a/ripe87/application.yaml b/ripe87/application.yaml index 86c86fe..82212f9 100644 --- a/ripe87/application.yaml +++ b/ripe87/application.yaml @@ -6,7 +6,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/signs/application.yaml b/signs/application.yaml index 22e88c7..06ff550 100644 --- a/signs/application.yaml +++ b/signs/application.yaml @@ -6,7 +6,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee external-dns.alpha.kubernetes.io/hostname: sign.k-space.ee,signs.k-space.ee spec: diff --git a/whoami/application.yml b/whoami/application.yml index b5b5320..65a0e27 100644 --- a/whoami/application.yml +++ b/whoami/application.yml @@ -59,7 +59,6 @@ metadata: external-dns.alpha.kubernetes.io/target: traefik.k-space.ee kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" traefik.ingress.kubernetes.io/router.middlewares: whoami-whoami@kubernetescrd spec: rules: diff --git a/wiki/application.yml b/wiki/application.yml index 054027e..87c20fa 100644 --- a/wiki/application.yml +++ b/wiki/application.yml @@ -120,7 +120,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/wildduck/webmail.yaml b/wildduck/webmail.yaml index d7c5878..a7dd8eb 100644 --- a/wildduck/webmail.yaml +++ b/wildduck/webmail.yaml @@ -126,7 +126,6 @@ metadata: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure traefik.ingress.kubernetes.io/router.middlewares: wildduck-webmail@kubernetescrd,wildduck-webmail-redirect@kubernetescrd - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: diff --git a/wildduck/wildflock.yaml b/wildduck/wildflock.yaml index 0adfd5c..0c0f004 100644 --- a/wildduck/wildflock.yaml +++ b/wildduck/wildflock.yaml @@ -40,7 +40,6 @@ metadata: annotations: kubernetes.io/ingress.class: traefik traefik.ingress.kubernetes.io/router.entrypoints: websecure - traefik.ingress.kubernetes.io/router.tls: "true" external-dns.alpha.kubernetes.io/target: traefik.k-space.ee spec: rules: