From 9489d7013da035576a12a8c05f0ca3560b3bdad0 Mon Sep 17 00:00:00 2001 From: Helmut Hutzler <helmut.hutzler@th-nuernberg.de> Date: Tue, 6 Dec 2022 12:56:19 +0000 Subject: [PATCH] Updated /install-keycloak.sh / Added Yaml File for IngressRoute testing --- Keycloak/install-keycloak.sh | 6 ++-- .../kube-master/ingressRoute_nginx.yaml | 34 +++++++++++++++++++ .../kube-master/ingressRoute_whoami.yaml | 14 ++++++++ 3 files changed, 51 insertions(+), 3 deletions(-) create mode 100644 Traefik/IngressRoute/kube-master/ingressRoute_nginx.yaml create mode 100644 Traefik/IngressRoute/kube-master/ingressRoute_whoami.yaml diff --git a/Keycloak/install-keycloak.sh b/Keycloak/install-keycloak.sh index 41ef70a..b36ad7e 100755 --- a/Keycloak/install-keycloak.sh +++ b/Keycloak/install-keycloak.sh @@ -2,7 +2,7 @@ # if [ -z "$2" ]; then echo "Error : Missing FQN for Ingress-Host parameter or namespace " - echo "Sample: $0 kube-master-h1.informatik.fh-nuernberg.de testing" + echo "Sample: $0 kube-master-h1.informatik.fh-nuernberg.de myoidc-app-ns" exit 1 fi INGRESS_HOST=$1 @@ -36,14 +36,14 @@ kubectl -n ${NAME_SPACE} describe secret ${TLS_CERT} cat ../ir-keycloak.yaml | sed "s/_INGRESS_HOST_/$INGRESS_HOST/g" | sed "s/_TLS_CERT_/$TLS_CERT/g" > ir-keycloak.yaml cat ../deploy-keycloak.yaml | sed "s/_INGRESS_HOST_/$INGRESS_HOST/g" | sed "s/_TLS_CERT_/$TLS_CERT/g" > deploy-keycloak.yaml - kubectl -n ${NAME_SPACE} apply -f deploy-keycloak.yaml kubectl -n ${NAME_SPACE} apply -f ir-keycloak.yaml kubectl -n ${NAME_SPACE} describe ingressroute ingressroute-oidc-app kubectl -n ${NAME_SPACE} get all sleep 5 -echo "Attention: curl script below may fail as it takes some time until keycloak instance is ready just - rerun it should work for http and https ! " +echo "Attention: curl scripts below may fail as it takes some time until keycloak REBAC realm gets imported ! " +echo " ---> just - rerun scripts / should work for both http and https ! " echo "$ curl -v --insecure https://${INGRESS_HOST}/auth/" echo "$ curl -v http://${INGRESS_HOST}/auth/" diff --git a/Traefik/IngressRoute/kube-master/ingressRoute_nginx.yaml b/Traefik/IngressRoute/kube-master/ingressRoute_nginx.yaml new file mode 100644 index 0000000..d147fcd --- /dev/null +++ b/Traefik/IngressRoute/kube-master/ingressRoute_nginx.yaml @@ -0,0 +1,34 @@ +apiVersion: traefik.containo.us/v1alpha1 +kind: Middleware +metadata: + name: nginx-strip-path-prefix +spec: + stripPrefix: + prefixes: + - /nginx-green + - /nginx-blue +--- +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: ingressroute-nginx +spec: + entryPoints: + - websecure + routes: + - match: Host(`kube-master.informatik.fh-nuernberg.de`) && Path(`/nginx-green`) + kind: Rule + middlewares: + - name: nginx-strip-path-prefix + services: + - name: nginx-service-green + port: 8080 + - match: Host(`dev-storage.informatik.fh-nuernberg.de`) && Path(`/nginx-blue`) + kind: Rule + middlewares: + - name: nginx-strip-path-prefix + services: + - name: nginx-service-blue + port: 8080 + + diff --git a/Traefik/IngressRoute/kube-master/ingressRoute_whoami.yaml b/Traefik/IngressRoute/kube-master/ingressRoute_whoami.yaml new file mode 100644 index 0000000..118fc45 --- /dev/null +++ b/Traefik/IngressRoute/kube-master/ingressRoute_whoami.yaml @@ -0,0 +1,14 @@ +apiVersion: traefik.containo.us/v1alpha1 +kind: IngressRoute +metadata: + name: ingressroute-who-svc +spec: + entryPoints: + - websecure + routes: + - match: Host(`kube-master.informatik.fh-nuernberg.de`) && Path(`/who`) + kind: Rule + services: + - name: whoami-svc + port: 80 + -- GitLab