Files
security/authelia/manifests/secret.yaml
Mayne0213 2cfcc586be refactor: update Vault secret paths to new categorized structure
- authelia: postgresql → storage/postgresql, authelia → security/authelia
- external-secrets: zot → storage/zot (ClusterExternalSecret)
- vault: secret/data/vault/config → security/vault, authelia → security/authelia

Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
2026-01-11 22:36:33 +09:00

60 lines
1.7 KiB
YAML

apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: authelia-secrets
namespace: authelia
spec:
refreshInterval: 1h
secretStoreRef:
kind: ClusterSecretStore
name: vault-backend
target:
name: authelia-secrets
creationPolicy: Owner
data:
# Storage password (PostgreSQL)
- secretKey: storage.postgres.password.txt
remoteRef:
key: storage/postgresql
property: PASSWORD
# Session encryption key
- secretKey: session.encryption.key
remoteRef:
key: security/authelia
property: SESSION_SECRET
# Storage encryption key
- secretKey: storage.encryption.key
remoteRef:
key: security/authelia
property: STORAGE_ENCRYPTION_KEY
# JWT HMAC key for identity validation (password reset)
- secretKey: identity_validation.reset_password.jwt.hmac.key
remoteRef:
key: security/authelia
property: JWT_HMAC_KEY
# OIDC HMAC key
- secretKey: identity_providers.oidc.hmac.key
remoteRef:
key: security/authelia
property: OIDC_HMAC_SECRET
# OIDC JWKS private key
- secretKey: identity_providers.oidc.jwks.key
remoteRef:
key: security/authelia
property: OIDC_JWKS_PRIVATE_KEY
# Headlamp OIDC client secret
- secretKey: HEADLAMP_CLIENT_SECRET
remoteRef:
key: security/authelia
property: HEADLAMP_CLIENT_SECRET
# Vault OIDC client secret
- secretKey: VAULT_CLIENT_SECRET
remoteRef:
key: security/authelia
property: VAULT_CLIENT_SECRET
# Zot OIDC client secret
- secretKey: ZOT_CLIENT_SECRET
remoteRef:
key: security/authelia
property: ZOT_CLIENT_SECRET