modified values for helm authentik
This commit is contained in:
@@ -1,28 +1,51 @@
|
|||||||
authentik:
|
authentik:
|
||||||
# WICHTIG: Authentik braucht Secrets. Wir injizieren sie via EnvVars aus dem ExternalSecret
|
# --- App Configuration ---
|
||||||
# Das Chart erlaubt "envValueFrom" oder Referenzen.
|
authentik:
|
||||||
|
error_reporting:
|
||||||
error_reporting:
|
enabled: false
|
||||||
enabled: false
|
email:
|
||||||
|
host: "smtp.example.com"
|
||||||
# Wir nutzen einen externen Secret-Namen, den das ExternalSecret erzeugt
|
port: 587
|
||||||
# Das Chart kann Secrets mappen, oder wir setzen Env Vars manuell in "extraEnv".
|
username: "user"
|
||||||
|
use_tls: true
|
||||||
# Authentik Config
|
from: "authentik@stabify.de"
|
||||||
email:
|
secret_key: "" # Via Env Var
|
||||||
host: "smtp.example.com" # Dummy, später via Vault
|
|
||||||
port: 587
|
|
||||||
username: "user"
|
|
||||||
use_tls: true
|
|
||||||
from: "authentik@stabify.de"
|
|
||||||
|
|
||||||
|
# --- Server Component (UI & API) ---
|
||||||
|
server:
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: authentik-secrets
|
||||||
|
ingress:
|
||||||
|
enabled: true
|
||||||
|
ingressClassName: traefik
|
||||||
|
annotations:
|
||||||
|
cert-manager.io/cluster-issuer: letsencrypt-prod
|
||||||
|
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
||||||
|
traefik.ingress.kubernetes.io/router.tls: "true"
|
||||||
|
hosts:
|
||||||
|
- "auth.apps.k3s.stabify.de"
|
||||||
|
paths:
|
||||||
|
- "/"
|
||||||
|
tls:
|
||||||
|
- secretName: authentik-tls
|
||||||
|
hosts:
|
||||||
|
- "auth.apps.k3s.stabify.de"
|
||||||
|
|
||||||
|
# --- Worker Component ---
|
||||||
|
worker:
|
||||||
|
envFrom:
|
||||||
|
- secretRef:
|
||||||
|
name: authentik-secrets
|
||||||
|
|
||||||
|
# --- Dependencies (Postgres & Redis) ---
|
||||||
postgresql:
|
postgresql:
|
||||||
enabled: true
|
enabled: true
|
||||||
auth:
|
auth:
|
||||||
existingSecret: "authentik-secrets"
|
existingSecret: "authentik-secrets"
|
||||||
secretKeys:
|
secretKeys:
|
||||||
adminPasswordKey: "postgres-password"
|
adminPasswordKey: "postgres-password"
|
||||||
userPasswordKey: "postgres-password" # Authentik nutzt User PW
|
userPasswordKey: "postgres-password"
|
||||||
primary:
|
primary:
|
||||||
persistence:
|
persistence:
|
||||||
enabled: true
|
enabled: true
|
||||||
@@ -34,46 +57,3 @@ authentik:
|
|||||||
existingSecret: "authentik-secrets"
|
existingSecret: "authentik-secrets"
|
||||||
existingSecretPasswordKey: "redis-password"
|
existingSecretPasswordKey: "redis-password"
|
||||||
architecture: standalone
|
architecture: standalone
|
||||||
|
|
||||||
ingress:
|
|
||||||
enabled: true
|
|
||||||
ingressClassName: traefik
|
|
||||||
annotations:
|
|
||||||
cert-manager.io/cluster-issuer: letsencrypt-prod
|
|
||||||
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
|
||||||
traefik.ingress.kubernetes.io/router.tls: "true"
|
|
||||||
hosts:
|
|
||||||
- host: auth.apps.k3s.stabify.de
|
|
||||||
paths:
|
|
||||||
- path: "/"
|
|
||||||
pathType: Prefix
|
|
||||||
tls:
|
|
||||||
- secretName: authentik-tls
|
|
||||||
hosts:
|
|
||||||
- auth.apps.k3s.stabify.de
|
|
||||||
|
|
||||||
# Worker Configuration (muss auch Secrets kennen)
|
|
||||||
# Das Chart zieht sich "authentik-secrets" nicht automatisch für alles.
|
|
||||||
# Wir müssen "authentik_secret_key" setzen.
|
|
||||||
|
|
||||||
# Wir nutzen "envFrom" um alle Secrets aus "authentik-secrets" zu laden
|
|
||||||
# Leider unterstützt das Chart "envFrom" nicht direkt auf Top-Level für alle Komponenten?
|
|
||||||
# Doch, meistens. Ich prüfe die Chart-Values Struktur...
|
|
||||||
# Wir setzen es explizit.
|
|
||||||
|
|
||||||
authentik:
|
|
||||||
secret_key: "" # Wird überschrieben durch Env Var AUTHENTIK_SECRET_KEY aus Secret
|
|
||||||
# bootstrap_token: "" # Initial Admin Token (optional)
|
|
||||||
|
|
||||||
# Server deployment env
|
|
||||||
server:
|
|
||||||
envFrom:
|
|
||||||
- secretRef:
|
|
||||||
name: authentik-secrets
|
|
||||||
|
|
||||||
# Worker deployment env
|
|
||||||
worker:
|
|
||||||
envFrom:
|
|
||||||
- secretRef:
|
|
||||||
name: authentik-secrets
|
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user