fix: renamarr secrets

This commit is contained in:
auricom
2025-05-26 17:40:46 +02:00
parent 4d14c3af85
commit 6267654707
5 changed files with 9 additions and 73 deletions

View File

@@ -1,7 +1,7 @@
sonarr:
- name: tv
url: https://sonarr.default.svc.cluster.local.:8080
api_key: ${SONARR_API_KEY}
url: http://sonarr.default.svc.cluster.local.:8080
api_key: ${SECRET_RADARR_API_KEY}
renamarr:
enabled: true
hourly_job: false
@@ -11,8 +11,8 @@ sonarr:
hourly_job: false
radarr:
- name: radarr
url: https://radarr.default.svc.cluster.local.:8080
api_key: ${RADARR_API_KEY}
url: http://radarr.default.svc.cluster.local.:8080
api_key: ${SECRET_RADARR_API_KEY}
renamarr:
enabled: true
hourly_job: false

View File

@@ -1,24 +0,0 @@
---
# yaml-language-server: $schema=https://kubernetes-schemas.pages.dev/external-secrets.io/externalsecret_v1.json
apiVersion: external-secrets.io/v1
kind: ExternalSecret
metadata:
name: renamarr-flux
spec:
secretStoreRef:
kind: ClusterSecretStore
name: onepassword-connect
target:
name: renamarr-flux-secret
template:
engineVersion: v2
data:
RADARR_API_KEY: "{{ .RADARR__API_KEY }}"
SONARR_API_KEY: "{{ .SONARR__API_KEY }}"
dataFrom:
- extract:
key: radarr
property: RADARR__API_KEY
- extract:
key: sonarr
property: SONARR__API_KEY

View File

@@ -1,6 +0,0 @@
---
# yaml-language-server: $schema=https://raw.githubusercontent.com/SchemaStore/schemastore/master/src/schemas/json/kustomization.json
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- ./externalsecret.yaml

View File

@@ -2,31 +2,6 @@
# yaml-language-server: $schema=https://kubernetes-schemas.pages.dev/kustomize.toolkit.fluxcd.io/kustomization_v1.json
apiVersion: kustomize.toolkit.fluxcd.io/v1
kind: Kustomization
metadata:
name: &app renamarr-dependencies
namespace: &namespace default
spec:
commonMetadata:
labels:
app.kubernetes.io/name: *app
interval: 1h
path: ./kubernetes/apps/default/renamarr/dependencies
postBuild:
substitute:
APP: *app
prune: true
retryInterval: 2m
sourceRef:
kind: GitRepository
name: home-ops-kubernetes
namespace: flux-system
targetNamespace: *namespace
timeout: 5m
wait: false
---
# yaml-language-server: $schema=https://kubernetes-schemas.pages.dev/kustomize.toolkit.fluxcd.io/kustomization_v1.json
apiVersion: kustomize.toolkit.fluxcd.io/v1
kind: Kustomization
metadata:
name: &app renamarr
namespace: &namespace default
@@ -34,17 +9,11 @@ spec:
commonMetadata:
labels:
app.kubernetes.io/name: *app
dependsOn:
- name: renamarr-dependencies
interval: 1h
path: ./kubernetes/apps/default/renamarr/app
postBuild:
substitute:
APP: *app
substituteFrom:
- kind: Secret
name: renamarr-flux-secret
optional: false
prune: true
retryInterval: 2m
sourceRef:

View File

@@ -16,12 +16,10 @@ stringData:
SECRET_KUBE_PROMETHEUS_STACK_ALERTMANAGER_PUSHOVER_USER_KEY: ENC[AES256_GCM,data:X1J9WLT26soYzlDb8+YtPotGw8p0lJKMuNkn69WX,iv:mW2cJOq5gfzSE+U24IuvPVL+dL2nZcTFpPAkG77Ohus=,tag:kxokidtuE5RAGJlj4Q4P2A==,type:str]
SECRET_KUBE_PROMETHEUS_STACK_ALERTMANAGER_PUSHOVER_TOKEN: ENC[AES256_GCM,data:Bwvuy/jHIRduy/r1A8dOs0OE8ewdjCgs8g/br1oW,iv:PdnPH9I509MT6UJkUG1zLAGn9aV4AVrROgAVCD4a3Y0=,tag:59kBGx9qx3jeauokyoolQQ==,type:str]
SECRET_KUBE_PROMETHEUS_STACK_GRAFANA_ADMIN_PASSWORD: ENC[AES256_GCM,data:L7LS6+tuwPCyb5HN4zg=,iv:JM2KTtDN/VrKicjp5qwqusWiJKHRZnfTtsZE2hkLq6Q=,tag:XGF3L5P6JxVBrlGuKosdZA==,type:str]
SECRET_RADARR_API_KEY: ENC[AES256_GCM,data:pLp3xExMkgqQ87YdODBPyLBOiIciVbL5PmwD2NpPiRM=,iv:8x4o3WDvYjAH/3Nv6wEwnjkznThVUI9lmg8HGaFV73o=,tag:tAvDHVYR04YMV1/MapmUew==,type:str]
SECRET_SONARR_API_KEY: ENC[AES256_GCM,data:a7EUykMkWEhRylmGKddQRDABZlhXxthjOAptUCMGCPY=,iv:0spVY/WIkFjaUYAcEdWhFSvjVgVwgfb9KH9sC9LB2Xs=,tag:3RkYLAAsf7XBLaTVq5Vm4Q==,type:str]
type: Opaque
sops:
kms: []
gcp_kms: []
azure_kv: []
hc_vault: []
age:
- recipient: age1hhurqwmfvl9m3vh3hk8urulfzcdsrep2ax2neazqt435yhpamu3qj20asg
enc: |
@@ -32,8 +30,7 @@ sops:
WG82VkdBMlNnRzBySFQzMk41cEtXSlEKBqOmq9UpO61C85+pj0ibdT31y4pmFsbm
pTi4N0vv81kcf4ilqBU5h1gudNCb42Q2iL0eGNR4e3JzH4iaNsvnEg==
-----END AGE ENCRYPTED FILE-----
lastmodified: "2025-01-03T20:27:58Z"
mac: ENC[AES256_GCM,data:QgFNCP1l74XISc2/6byMOzk4brz0SkbfjLxgoLRaBx08BHULaJRHiNqRRyhaKF5ZjxsOxVYiFpHrWgfu/mi/InwA6nBttwNSM/+bzKabRC6vdgrLIIXxJKGKu7BlmtILF4uZRqKqcOIK+nrZS8YWdlOY0Vyzunh4kMQoyIvugRk=,iv:0HYH18NEag1KqIXwoiMPHkFiW1jaQkK1LJ5XhENPalw=,tag:RO8oMhTRBLOzf31DgV38CQ==,type:str]
pgp: []
lastmodified: "2025-05-26T15:40:29Z"
mac: ENC[AES256_GCM,data:OjhHJ7yQ9xmo2UO5MQWE77EozH8MJCOj03cmZVByBcgAlJNv+S6Zi+8woIg+HDyIAhjH95ruVPuGBbaMxVLfTVONMYfoMewyTHCXmInHRpe6yAkn2Iy2T/6aWUMUi6Lq8l8GJ7XZSgDcVIdbsPd4EW3FUX4U94FXcu+VXbuSYLo=,iv:MO/55Y3W9LZlj02AcXYo7SnokKqcIFHH9Zg3zpkj074=,tag:TY8Q8giPe6SX7aGkizxQqQ==,type:str]
encrypted_regex: ^(data|stringData)$
version: 3.9.3
version: 3.10.2