Files
homelab/k8s/core/authentik/external-secrets.yaml
Ultradesu 88060c1ab5
All checks were successful
Update Kubernetes Services Wiki / Generate and Update K8s Wiki (push) Successful in 11s
Check with kubeconform / lint (push) Successful in 7s
Auto-update README / Generate README and Create MR (push) Successful in 23s
Fixed authentik ext secret
2026-03-13 10:49:20 +00:00

65 lines
1.7 KiB
YAML

---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: authentik-creds
spec:
target:
name: authentik-creds
deletionPolicy: Delete
template:
type: Opaque
data:
AUTHENTIK_HOST: "https://idm.hexor.cy"
AUTHENTIK_COOKIE_DOMAIN: "hexor.cy"
AUTHENTIK_LOG_LEVEL: debug
AUTHENTIK_POSTGRESQL__USER: |-
{{ .username }}
AUTHENTIK_POSTGRESQL__PASSWORD: |-
{{ .password }}
AUTHENTIK_SECRET_KEY: |-
{{ .secret_key }}
POSTGRES_PASSWORD: |-
{{ .password }}
POSTGRES_USER: |-
{{ .username }}
username: |-
{{ .password }}
password: |-
{{ .username }}
data:
- secretKey: password
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
property: login.password
- secretKey: username
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
property: login.username
- secretKey: secret_key
sourceRef:
storeRef:
name: vaultwarden-login
kind: ClusterSecretStore
remoteRef:
conversionStrategy: Default
decodingStrategy: None
metadataPolicy: None
key: 279c2c1f-c147-4b6b-a511-36c3cd764f9d
property: fields[0].value