Browse Source

expose vaultwarden websocket

Josh Bicking 1 year ago
parent
commit
250d5e93e4
2 changed files with 18 additions and 0 deletions
  1. 6 0
      cloudflared.yaml
  2. 12 0
      vaultwarden.yaml

+ 6 - 0
cloudflared.yaml

@@ -80,4 +80,10 @@ data:
       service: http://rook-ceph-rgw-ceph-objectstore.rook-ceph.svc.cluster.local:6980
     - hostname: miniflux.jibby.org
       service: http://miniflux-service.miniflux.svc.cluster.local:8080
+    - hostname: vaultwarden.jibby.org
+      service: http://vaultwarden-service.vaultwarden.svc.cluster.local:80
+    # Rules can match the request's path to a regular expression:
+    - hostname: vaultwarden.jibby.org
+      path: /notifications/hub.*
+      service: http://vaultwarden-service.vaultwarden.svc.cluster.local:3012
     - service: http_status:404

+ 12 - 0
vaultwarden.yaml

@@ -25,6 +25,8 @@ spec:
         ports:
         - containerPort: 80
           name: http-web-svc
+        - containerPort: 3012
+          name: http-sock-svc
         envFrom:
         - secretRef:
             name: vaultwarden-secret
@@ -62,6 +64,10 @@ spec:
     protocol: TCP
     port: 80
     targetPort: http-web-svc
+  - name: vaultwarden-sock-port
+    protocol: TCP
+    port: 3012
+    targetPort: http-sock-svc
 ---
 apiVersion: traefik.containo.us/v1alpha1
 kind: IngressRoute
@@ -78,3 +84,9 @@ spec:
     - kind: Service
       name: vaultwarden-service
       port: 80
+  - kind: Rule
+    match: Host(`vaultwarden.jibby.org`) && Path(`/notifications/hub`)
+    services:
+    - kind: Service
+      name: vaultwarden-service
+      port: 3012