Skip to content

Commit 76f28a9

Browse files
fix(headplane): Wrong namespace
1 parent 2f3d428 commit 76f28a9

2 files changed

Lines changed: 21 additions & 4 deletions

File tree

k8s/apps/network/headscale/deployment.k8s.yaml

Lines changed: 19 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -86,11 +86,13 @@ apiVersion: apps/v1
8686
kind: Deployment
8787
metadata:
8888
name: headplane
89-
namespace: headplane
89+
namespace: headscale
9090
labels:
9191
app.kubernetes.io/name: headplane
9292
app.kubernetes.io/instance: headplane
9393
spec:
94+
strategy:
95+
type: Recreate
9496
replicas: 1
9597
selector:
9698
matchLabels:
@@ -105,6 +107,15 @@ spec:
105107
containers:
106108
- name: headplane
107109
image: ghcr.io/tale/headplane:0.6.1
110+
startupProbe:
111+
exec:
112+
command: ["/bin/hp_healthcheck"]
113+
livenessProbe:
114+
exec:
115+
command: ["/bin/hp_healthcheck"]
116+
readinessProbe:
117+
exec:
118+
command: ["/bin/hp_healthcheck"]
108119
resources:
109120
requests:
110121
cpu: 10m
@@ -114,6 +125,12 @@ spec:
114125
ports:
115126
- name: web
116127
containerPort: 3000
128+
env:
129+
- name: HEADPLANE_OIDC__CLIENT_ID
130+
valueFrom:
131+
secretKeyRef:
132+
key: oidc_client_id
133+
name: headscale
117134
volumeMounts:
118135
- name: data
119136
mountPath: /var/lib/headplane
@@ -127,7 +144,7 @@ spec:
127144
- name: secrets
128145
readOnly: true
129146
mountPath: /etc/headplane-secrets
130-
- name: headplane-cookie-secret
147+
- name: cookie-secret
131148
readOnly: true
132149
mountPath: /etc/headplane-secrets/cookies
133150
- name: headscale-secrets

k8s/apps/network/headscale/headplane-config.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -188,12 +188,12 @@ oidc:
188188
# The authentication method to use when communicating with the token endpoint.
189189
# This is fully optional and Headplane will attempt to auto-detect the best
190190
# method and fall back to `client_secret_basic` if unsure.
191-
# token_endpoint_auth_method: "client_secret_post"
191+
token_endpoint_auth_method: "client_secret_basic"
192192

193193
# The client ID for the OIDC client
194194
# For the best experience please ensure this is *identical* to the client_id
195195
# you are using for Headscale. because
196-
client_id_path: /etc/headscale-secrets/oidc_client_id
196+
#client_id: <specified through env>
197197

198198
# The client secret for the OIDC client
199199
# You may also provide `client_secret_path` instead to read a value from disk.

0 commit comments

Comments
 (0)