Files
security/authelia/vault/authelia-secrets.yaml
Mayne0213 ddc733d2d2 FEAT(authelia): add Vault as OIDC client in Authelia
- Add Vault OIDC client configuration
- Add VAULT_CLIENT_SECRET to ExternalSecret
- Mount VAULT_CLIENT_SECRET in pod
2026-01-05 00:40:26 +09:00

55 lines
1.7 KiB
YAML

apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: authelia-secrets
namespace: authelia
spec:
refreshInterval: 1h
secretStoreRef:
kind: ClusterSecretStore
name: vault-backend
target:
name: authelia-secrets
creationPolicy: Owner
data:
# Storage password (PostgreSQL)
- secretKey: storage.postgres.password.txt
remoteRef:
key: databases/postgresql
property: PASSWORD
# Session encryption key
- secretKey: session.encryption.key
remoteRef:
key: cluster-infrastructure/authelia
property: SESSION_SECRET
# Storage encryption key
- secretKey: storage.encryption.key
remoteRef:
key: cluster-infrastructure/authelia
property: STORAGE_ENCRYPTION_KEY
# JWT HMAC key for identity validation (password reset)
- secretKey: identity_validation.reset_password.jwt.hmac.key
remoteRef:
key: cluster-infrastructure/authelia
property: JWT_HMAC_KEY
# OIDC HMAC key
- secretKey: identity_providers.oidc.hmac.key
remoteRef:
key: cluster-infrastructure/authelia
property: OIDC_HMAC_SECRET
# OIDC JWKS private key
- secretKey: identity_providers.oidc.jwks.key
remoteRef:
key: cluster-infrastructure/authelia
property: OIDC_JWKS_PRIVATE_KEY
# Headlamp OIDC client secret
- secretKey: HEADLAMP_CLIENT_SECRET
remoteRef:
key: cluster-infrastructure/authelia
property: HEADLAMP_CLIENT_SECRET
# Vault OIDC client secret
- secretKey: VAULT_CLIENT_SECRET
remoteRef:
key: cluster-infrastructure/authelia
property: VAULT_CLIENT_SECRET