FIX(authelia): fix Authelia secret key names

- Update key names to match chart expectations
- Fix ExternalSecret configuration
This commit is contained in:
2026-01-02 00:13:28 +09:00
parent de5183469e
commit d88cf75b95
2 changed files with 4 additions and 65 deletions

View File

@@ -18,17 +18,11 @@ pod:
- name: users-database - name: users-database
configMap: configMap:
name: authelia-config name: authelia-config
- name: oidc-clients
secret:
secretName: authelia-oidc-clients
extraVolumeMounts: extraVolumeMounts:
- name: users-database - name: users-database
mountPath: /config/users_database.yml mountPath: /config/users_database.yml
subPath: users_database.yml subPath: users_database.yml
readOnly: true readOnly: true
- name: oidc-clients
mountPath: /secrets/oidc
readOnly: true
# ConfigMap configuration # ConfigMap configuration
configMap: configMap:
@@ -77,32 +71,6 @@ configMap:
enabled: true enabled: true
issuer: mayne.kro.kr issuer: mayne.kro.kr
# Identity providers (OIDC)
identity_providers:
oidc:
enabled: true
cors:
endpoints:
- authorization
- token
- revocation
- introspection
- userinfo
allowed_origins_from_client_redirect_uris: true
clients:
- client_id: minio
client_name: MinIO Console
client_secret: '$plaintext${{ secret "/secrets/oidc/MINIO_CLIENT_SECRET" }}'
authorization_policy: one_factor
redirect_uris:
- https://minio.minio0213.kro.kr/oauth_callback
- https://minio0213.kro.kr/oauth_callback
scopes:
- openid
- profile
- email
token_endpoint_auth_method: client_secret_post
# Secret configuration - use existing secret from Vault # Secret configuration - use existing secret from Vault
secret: secret:
existingSecret: authelia-secrets existingSecret: authelia-secrets

View File

@@ -13,51 +13,22 @@ spec:
creationPolicy: Owner creationPolicy: Owner
data: data:
# Storage password (PostgreSQL) # Storage password (PostgreSQL)
- secretKey: STORAGE_PASSWORD - secretKey: storage.postgres.password.txt
remoteRef: remoteRef:
key: databases/postgresql key: databases/postgresql
property: PASSWORD property: PASSWORD
# Session secret # Session encryption key
- secretKey: SESSION_SECRET - secretKey: session.encryption.key
remoteRef: remoteRef:
key: cluster-infrastructure/authelia key: cluster-infrastructure/authelia
property: SESSION_SECRET property: SESSION_SECRET
# Storage encryption key # Storage encryption key
- secretKey: STORAGE_ENCRYPTION_KEY - secretKey: storage.encryption.key
remoteRef: remoteRef:
key: cluster-infrastructure/authelia key: cluster-infrastructure/authelia
property: STORAGE_ENCRYPTION_KEY property: STORAGE_ENCRYPTION_KEY
# OIDC HMAC secret
- secretKey: IDENTITY_PROVIDERS_OIDC_HMAC_SECRET
remoteRef:
key: cluster-infrastructure/authelia
property: OIDC_HMAC_SECRET
# OIDC JWKS private key (base64 encoded)
- secretKey: IDENTITY_PROVIDERS_OIDC_JWKS_KEY
remoteRef:
key: cluster-infrastructure/authelia
property: OIDC_JWKS_PRIVATE_KEY
# JWT HMAC key for identity validation (password reset) # JWT HMAC key for identity validation (password reset)
- secretKey: identity_validation.reset_password.jwt.hmac.key - secretKey: identity_validation.reset_password.jwt.hmac.key
remoteRef: remoteRef:
key: cluster-infrastructure/authelia key: cluster-infrastructure/authelia
property: JWT_HMAC_KEY property: JWT_HMAC_KEY
---
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: authelia-oidc-clients
namespace: authelia
spec:
refreshInterval: 1h
secretStoreRef:
kind: ClusterSecretStore
name: vault-backend
target:
name: authelia-oidc-clients
creationPolicy: Owner
data:
- secretKey: MINIO_CLIENT_SECRET
remoteRef:
key: databases/minio
property: OIDC_CLIENT_SECRET