mirror of
https://github.com/auricom/home-cluster.git
synced 2025-12-17 05:25:42 +01:00
fix: renamarr secrets
This commit is contained in:
@@ -1,7 +1,7 @@
|
|||||||
sonarr:
|
sonarr:
|
||||||
- name: tv
|
- name: tv
|
||||||
url: https://sonarr.default.svc.cluster.local.:8080
|
url: http://sonarr.default.svc.cluster.local.:8080
|
||||||
api_key: ${SONARR_API_KEY}
|
api_key: ${SECRET_RADARR_API_KEY}
|
||||||
renamarr:
|
renamarr:
|
||||||
enabled: true
|
enabled: true
|
||||||
hourly_job: false
|
hourly_job: false
|
||||||
@@ -11,8 +11,8 @@ sonarr:
|
|||||||
hourly_job: false
|
hourly_job: false
|
||||||
radarr:
|
radarr:
|
||||||
- name: radarr
|
- name: radarr
|
||||||
url: https://radarr.default.svc.cluster.local.:8080
|
url: http://radarr.default.svc.cluster.local.:8080
|
||||||
api_key: ${RADARR_API_KEY}
|
api_key: ${SECRET_RADARR_API_KEY}
|
||||||
renamarr:
|
renamarr:
|
||||||
enabled: true
|
enabled: true
|
||||||
hourly_job: false
|
hourly_job: false
|
||||||
|
|||||||
@@ -1,24 +0,0 @@
|
|||||||
---
|
|
||||||
# yaml-language-server: $schema=https://kubernetes-schemas.pages.dev/external-secrets.io/externalsecret_v1.json
|
|
||||||
apiVersion: external-secrets.io/v1
|
|
||||||
kind: ExternalSecret
|
|
||||||
metadata:
|
|
||||||
name: renamarr-flux
|
|
||||||
spec:
|
|
||||||
secretStoreRef:
|
|
||||||
kind: ClusterSecretStore
|
|
||||||
name: onepassword-connect
|
|
||||||
target:
|
|
||||||
name: renamarr-flux-secret
|
|
||||||
template:
|
|
||||||
engineVersion: v2
|
|
||||||
data:
|
|
||||||
RADARR_API_KEY: "{{ .RADARR__API_KEY }}"
|
|
||||||
SONARR_API_KEY: "{{ .SONARR__API_KEY }}"
|
|
||||||
dataFrom:
|
|
||||||
- extract:
|
|
||||||
key: radarr
|
|
||||||
property: RADARR__API_KEY
|
|
||||||
- extract:
|
|
||||||
key: sonarr
|
|
||||||
property: SONARR__API_KEY
|
|
||||||
@@ -1,6 +0,0 @@
|
|||||||
---
|
|
||||||
# yaml-language-server: $schema=https://raw.githubusercontent.com/SchemaStore/schemastore/master/src/schemas/json/kustomization.json
|
|
||||||
apiVersion: kustomize.config.k8s.io/v1beta1
|
|
||||||
kind: Kustomization
|
|
||||||
resources:
|
|
||||||
- ./externalsecret.yaml
|
|
||||||
@@ -2,31 +2,6 @@
|
|||||||
# yaml-language-server: $schema=https://kubernetes-schemas.pages.dev/kustomize.toolkit.fluxcd.io/kustomization_v1.json
|
# yaml-language-server: $schema=https://kubernetes-schemas.pages.dev/kustomize.toolkit.fluxcd.io/kustomization_v1.json
|
||||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
||||||
kind: Kustomization
|
kind: Kustomization
|
||||||
metadata:
|
|
||||||
name: &app renamarr-dependencies
|
|
||||||
namespace: &namespace default
|
|
||||||
spec:
|
|
||||||
commonMetadata:
|
|
||||||
labels:
|
|
||||||
app.kubernetes.io/name: *app
|
|
||||||
interval: 1h
|
|
||||||
path: ./kubernetes/apps/default/renamarr/dependencies
|
|
||||||
postBuild:
|
|
||||||
substitute:
|
|
||||||
APP: *app
|
|
||||||
prune: true
|
|
||||||
retryInterval: 2m
|
|
||||||
sourceRef:
|
|
||||||
kind: GitRepository
|
|
||||||
name: home-ops-kubernetes
|
|
||||||
namespace: flux-system
|
|
||||||
targetNamespace: *namespace
|
|
||||||
timeout: 5m
|
|
||||||
wait: false
|
|
||||||
---
|
|
||||||
# yaml-language-server: $schema=https://kubernetes-schemas.pages.dev/kustomize.toolkit.fluxcd.io/kustomization_v1.json
|
|
||||||
apiVersion: kustomize.toolkit.fluxcd.io/v1
|
|
||||||
kind: Kustomization
|
|
||||||
metadata:
|
metadata:
|
||||||
name: &app renamarr
|
name: &app renamarr
|
||||||
namespace: &namespace default
|
namespace: &namespace default
|
||||||
@@ -34,17 +9,11 @@ spec:
|
|||||||
commonMetadata:
|
commonMetadata:
|
||||||
labels:
|
labels:
|
||||||
app.kubernetes.io/name: *app
|
app.kubernetes.io/name: *app
|
||||||
dependsOn:
|
|
||||||
- name: renamarr-dependencies
|
|
||||||
interval: 1h
|
interval: 1h
|
||||||
path: ./kubernetes/apps/default/renamarr/app
|
path: ./kubernetes/apps/default/renamarr/app
|
||||||
postBuild:
|
postBuild:
|
||||||
substitute:
|
substitute:
|
||||||
APP: *app
|
APP: *app
|
||||||
substituteFrom:
|
|
||||||
- kind: Secret
|
|
||||||
name: renamarr-flux-secret
|
|
||||||
optional: false
|
|
||||||
prune: true
|
prune: true
|
||||||
retryInterval: 2m
|
retryInterval: 2m
|
||||||
sourceRef:
|
sourceRef:
|
||||||
|
|||||||
@@ -16,12 +16,10 @@ stringData:
|
|||||||
SECRET_KUBE_PROMETHEUS_STACK_ALERTMANAGER_PUSHOVER_USER_KEY: ENC[AES256_GCM,data:X1J9WLT26soYzlDb8+YtPotGw8p0lJKMuNkn69WX,iv:mW2cJOq5gfzSE+U24IuvPVL+dL2nZcTFpPAkG77Ohus=,tag:kxokidtuE5RAGJlj4Q4P2A==,type:str]
|
SECRET_KUBE_PROMETHEUS_STACK_ALERTMANAGER_PUSHOVER_USER_KEY: ENC[AES256_GCM,data:X1J9WLT26soYzlDb8+YtPotGw8p0lJKMuNkn69WX,iv:mW2cJOq5gfzSE+U24IuvPVL+dL2nZcTFpPAkG77Ohus=,tag:kxokidtuE5RAGJlj4Q4P2A==,type:str]
|
||||||
SECRET_KUBE_PROMETHEUS_STACK_ALERTMANAGER_PUSHOVER_TOKEN: ENC[AES256_GCM,data:Bwvuy/jHIRduy/r1A8dOs0OE8ewdjCgs8g/br1oW,iv:PdnPH9I509MT6UJkUG1zLAGn9aV4AVrROgAVCD4a3Y0=,tag:59kBGx9qx3jeauokyoolQQ==,type:str]
|
SECRET_KUBE_PROMETHEUS_STACK_ALERTMANAGER_PUSHOVER_TOKEN: ENC[AES256_GCM,data:Bwvuy/jHIRduy/r1A8dOs0OE8ewdjCgs8g/br1oW,iv:PdnPH9I509MT6UJkUG1zLAGn9aV4AVrROgAVCD4a3Y0=,tag:59kBGx9qx3jeauokyoolQQ==,type:str]
|
||||||
SECRET_KUBE_PROMETHEUS_STACK_GRAFANA_ADMIN_PASSWORD: ENC[AES256_GCM,data:L7LS6+tuwPCyb5HN4zg=,iv:JM2KTtDN/VrKicjp5qwqusWiJKHRZnfTtsZE2hkLq6Q=,tag:XGF3L5P6JxVBrlGuKosdZA==,type:str]
|
SECRET_KUBE_PROMETHEUS_STACK_GRAFANA_ADMIN_PASSWORD: ENC[AES256_GCM,data:L7LS6+tuwPCyb5HN4zg=,iv:JM2KTtDN/VrKicjp5qwqusWiJKHRZnfTtsZE2hkLq6Q=,tag:XGF3L5P6JxVBrlGuKosdZA==,type:str]
|
||||||
|
SECRET_RADARR_API_KEY: ENC[AES256_GCM,data:pLp3xExMkgqQ87YdODBPyLBOiIciVbL5PmwD2NpPiRM=,iv:8x4o3WDvYjAH/3Nv6wEwnjkznThVUI9lmg8HGaFV73o=,tag:tAvDHVYR04YMV1/MapmUew==,type:str]
|
||||||
|
SECRET_SONARR_API_KEY: ENC[AES256_GCM,data:a7EUykMkWEhRylmGKddQRDABZlhXxthjOAptUCMGCPY=,iv:0spVY/WIkFjaUYAcEdWhFSvjVgVwgfb9KH9sC9LB2Xs=,tag:3RkYLAAsf7XBLaTVq5Vm4Q==,type:str]
|
||||||
type: Opaque
|
type: Opaque
|
||||||
sops:
|
sops:
|
||||||
kms: []
|
|
||||||
gcp_kms: []
|
|
||||||
azure_kv: []
|
|
||||||
hc_vault: []
|
|
||||||
age:
|
age:
|
||||||
- recipient: age1hhurqwmfvl9m3vh3hk8urulfzcdsrep2ax2neazqt435yhpamu3qj20asg
|
- recipient: age1hhurqwmfvl9m3vh3hk8urulfzcdsrep2ax2neazqt435yhpamu3qj20asg
|
||||||
enc: |
|
enc: |
|
||||||
@@ -32,8 +30,7 @@ sops:
|
|||||||
WG82VkdBMlNnRzBySFQzMk41cEtXSlEKBqOmq9UpO61C85+pj0ibdT31y4pmFsbm
|
WG82VkdBMlNnRzBySFQzMk41cEtXSlEKBqOmq9UpO61C85+pj0ibdT31y4pmFsbm
|
||||||
pTi4N0vv81kcf4ilqBU5h1gudNCb42Q2iL0eGNR4e3JzH4iaNsvnEg==
|
pTi4N0vv81kcf4ilqBU5h1gudNCb42Q2iL0eGNR4e3JzH4iaNsvnEg==
|
||||||
-----END AGE ENCRYPTED FILE-----
|
-----END AGE ENCRYPTED FILE-----
|
||||||
lastmodified: "2025-01-03T20:27:58Z"
|
lastmodified: "2025-05-26T15:40:29Z"
|
||||||
mac: ENC[AES256_GCM,data:QgFNCP1l74XISc2/6byMOzk4brz0SkbfjLxgoLRaBx08BHULaJRHiNqRRyhaKF5ZjxsOxVYiFpHrWgfu/mi/InwA6nBttwNSM/+bzKabRC6vdgrLIIXxJKGKu7BlmtILF4uZRqKqcOIK+nrZS8YWdlOY0Vyzunh4kMQoyIvugRk=,iv:0HYH18NEag1KqIXwoiMPHkFiW1jaQkK1LJ5XhENPalw=,tag:RO8oMhTRBLOzf31DgV38CQ==,type:str]
|
mac: ENC[AES256_GCM,data:OjhHJ7yQ9xmo2UO5MQWE77EozH8MJCOj03cmZVByBcgAlJNv+S6Zi+8woIg+HDyIAhjH95ruVPuGBbaMxVLfTVONMYfoMewyTHCXmInHRpe6yAkn2Iy2T/6aWUMUi6Lq8l8GJ7XZSgDcVIdbsPd4EW3FUX4U94FXcu+VXbuSYLo=,iv:MO/55Y3W9LZlj02AcXYo7SnokKqcIFHH9Zg3zpkj074=,tag:TY8Q8giPe6SX7aGkizxQqQ==,type:str]
|
||||||
pgp: []
|
|
||||||
encrypted_regex: ^(data|stringData)$
|
encrypted_regex: ^(data|stringData)$
|
||||||
version: 3.9.3
|
version: 3.10.2
|
||||||
|
|||||||
Reference in New Issue
Block a user