From 0278914449837332ba56013413c1cc0877b359e7 Mon Sep 17 00:00:00 2001 From: julien Date: Wed, 15 Apr 2026 00:12:19 +0200 Subject: [PATCH] "Updates" --- TuringPi/kubernetes.md | 34 ++++++++++++++++++++++++++++++---- installs_on_host/Caddyfile | 3 +++ 2 files changed, 33 insertions(+), 4 deletions(-) diff --git a/TuringPi/kubernetes.md b/TuringPi/kubernetes.md index 2414feb..a0c17f6 100644 --- a/TuringPi/kubernetes.md +++ b/TuringPi/kubernetes.md @@ -402,8 +402,10 @@ kubectl patch storageclass longhorn -p '{"metadata": {"annotations":{"storagecla #### UI +##### Option 1 : ingress ? + ```bash -USER=admin; PASSWORD=transatlantique; echo "${USER}:$(openssl passwd -stdin -apr1 <<< ${PASSWORD})" >> auth +USER=admin; PASSWORD=v5bB4OQRDfY5tFJ1; echo "${USER}:$(openssl passwd -stdin -apr1 <<< ${PASSWORD})" >> auth sudo k3s kubectl -n longhorn-system create secret generic basic-auth --from-file=auth ``` @@ -445,7 +447,7 @@ metadata: cert-manager.io/cluster-issuer: letsencrypt-staging spec: rules: - - host: dashboard.delmar.bzh + - host: lghn.delmar.bzh http: paths: - path: / @@ -454,9 +456,9 @@ spec: servicePort: 8090 tls: - # cert-manager will store the certificate and key in this secret - secretName: dashboard-delmar-bzh-cert + secretName: lghn-delmar-bzh-cert hosts: - - dashboard.delmar.bzh + - lghn.delmar.bzh ``` ```bash @@ -464,6 +466,30 @@ sudo k3s kubectl -n longhorn-system apply -f longhorn-ingress.yml sudo k3s kubectl -n longhorn-system get ingress ``` +##### Option 2 : caddy + +```bash +sudo caddy hash-password +``` + +```bash +sudo vim /etc/caddy/Caddyfile +``` + +``` +lghn.delmar.bzh { + encode { + zstd + gzip + minimum_length 1024 + } + reverse_proxy 192.168.1.23 + basic_auth / { + admin $2a$14$RsUJ13kC9DcRMoQa8hlmNOljcXGMSem.1XwYFeV1El8Drw7DIJbVu + } +} +``` + ## 6. HAProxy ```bash diff --git a/installs_on_host/Caddyfile b/installs_on_host/Caddyfile index 3fa2e3a..c24631f 100644 --- a/installs_on_host/Caddyfile +++ b/installs_on_host/Caddyfile @@ -672,4 +672,7 @@ lghn.delmar.bzh { minimum_length 1024 } reverse_proxy 192.168.1.23 + basic_auth / { + admin $apr1$EXhYrlk0$x3xvql01IQF5r/3ANbcBC. + } }