Skip to content

Commit

Permalink
Merge pull request #808 from keithhubner/master
Browse files Browse the repository at this point in the history
Updated directory to fix install
  • Loading branch information
kunal-kushwaha authored Jul 17, 2024
2 parents 26b6315 + 9b4e2ce commit b4c6e00
Show file tree
Hide file tree
Showing 5 changed files with 132 additions and 0 deletions.
104 changes: 104 additions & 0 deletions bitwarden-passwordless-dev/app.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,104 @@
apiVersion: cert-manager.io/v1
kind: ClusterIssuer
metadata:
name: letsencrypt-prod-passwordless
spec:
acme:
# The ACME server URL
server: https://acme-v02.api.letsencrypt.org/directory
# Email address used for ACME registration
email: ${EMAIL_ADDRESS}
# Name of a secret used to store the ACME account private key
privateKeySecretRef:
name: letsencrypt-prod-passwordless
# Enable the HTTP-01 challenge provider
solvers:
- http01:
ingress:
class: traefik
---
apiVersion: v1
kind: PersistentVolumeClaim
metadata:
name: passwordless-pv-claim
spec:
accessModes:
- ReadWriteOnce
resources:
requests:
storage: 10Gi
---
apiVersion: v1
kind: Service
metadata:
name: passwordless-service
spec:
selector:
app: passwordless
ports:
- protocol: TCP
port: 5701
targetPort: 5701
---
apiVersion: apps/v1
kind: Deployment
metadata:
name: passwordless
labels:
app: passwordless
spec:
replicas: 1
strategy:
type: Recreate
selector:
matchLabels:
app: passwordless
template:
metadata:
labels:
app: passwordless
spec:
containers:
- name: passwordless-self-host
image: bitwarden/passwordless-self-host:stable
imagePullPolicy: IfNotPresent
ports:
- containerPort: 5701
protocol: TCP
volumeMounts:
- name: passwordless-persistent-storage
mountPath: /etc/bitwarden_passwordless
volumes:
- name: passwordless-persistent-storage
persistentVolumeClaim:
claimName: passwordless-pv-claim
---
apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prod-passwordless
ingress.kubernetes.io/ssl-redirect: "true"
name: passwordless
spec:
tls:
- hosts:
- passwordless.${CLUSTER_ID}.k8s.civo.com
secretName: letsencrypt-prod-passwordless
rules:
- host: passwordless.${CLUSTER_ID}.k8s.civo.com
http:
paths:
- path: /
pathType: Prefix
backend:
service:
name: passwordless-service
port:
number: 5701






Binary file added bitwarden-passwordless-dev/logo.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
17 changes: 17 additions & 0 deletions bitwarden-passwordless-dev/manifest.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
---
name: bitwarden-passwordless.dev
title: "Bitwarden Passwordless.dev"
version: 1.0.74
maintainer: keith@hubner.co.uk
description: Bitwarden Passwordless.dev is a software toolkit that helps developers build FIDO2 WebAuthn-based passkey features into websites and enterprise applications for seamless authentication flows.
url: https://docs.passwordless.dev/guide/
category: management
dependencies:
- cert-manager
configuration:
CLUSTER_ID:
label: "Cluster ID"
value: "CIVO:CLUSTER_ID"
EMAIL_ADDRESS:
label: "Email Address"
value: "CIVO:EMAIL_ADDRESS"
9 changes: 9 additions & 0 deletions bitwarden-passwordless-dev/post_install.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
## Bitwarden Passwordless.dev

### HTTPS

An ingress is automatically created during the application install. A certificate using cert manager and lets-encrypt is also applied automatically and registered against your Civo email address and the generated domain name.

### Post installation

You should be able to access the Web GUI once the service is up and running, once this is available please visit the [official documentation](https://docs.passwordless.dev/guide/self-hosting/configuration.html) for further setup information.
2 changes: 2 additions & 0 deletions bitwarden-passwordless-dev/pre_install.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,2 @@
#Wait for the Cert Manager deployment to be done.
kubectl wait --for=condition=available --timeout=300s deployment/cert-manager-webhook -n cert-manager

0 comments on commit b4c6e00

Please sign in to comment.