enable authentik auth
This commit is contained in:
@@ -30,7 +30,7 @@ directus:
|
|||||||
pullPolicy: IfNotPresent
|
pullPolicy: IfNotPresent
|
||||||
env:
|
env:
|
||||||
- name: PUBLIC_URL
|
- name: PUBLIC_URL
|
||||||
value: https://directus.alexlebens.net
|
value: https://directus.alexlebens.dev
|
||||||
- name: WEBSOCKETS_ENABLED
|
- name: WEBSOCKETS_ENABLED
|
||||||
value: true
|
value: true
|
||||||
- name: ADMIN_EMAIL
|
- name: ADMIN_EMAIL
|
||||||
@@ -83,7 +83,7 @@ directus:
|
|||||||
- name: REDIS_ENABLED
|
- name: REDIS_ENABLED
|
||||||
value: false
|
value: false
|
||||||
- name: REDIS_HOST
|
- name: REDIS_HOST
|
||||||
value: site-profile-valkey-master
|
value: directus-valkey-master
|
||||||
- name: REDIS_PORT
|
- name: REDIS_PORT
|
||||||
value: 6379
|
value: 6379
|
||||||
- name: REDIS_USERNAME
|
- name: REDIS_USERNAME
|
||||||
@@ -102,30 +102,30 @@ directus:
|
|||||||
value: local
|
value: local
|
||||||
- name: STORAGE_LOCAL_ROOT
|
- name: STORAGE_LOCAL_ROOT
|
||||||
value: /directus/data
|
value: /directus/data
|
||||||
# - name: AUTH_PROVIDERS
|
- name: AUTH_PROVIDERS
|
||||||
# value: AUTHENTIK
|
value: AUTHENTIK
|
||||||
# - name: AUTH_AUTHENTIK_DRIVER
|
- name: AUTH_AUTHENTIK_DRIVER
|
||||||
# value: openid
|
value: openid
|
||||||
# - name: AUTH_AUTHENTIK_CLIENT_ID
|
- name: AUTH_AUTHENTIK_CLIENT_ID
|
||||||
# valueFrom:
|
valueFrom:
|
||||||
# secretKeyRef:
|
secretKeyRef:
|
||||||
# name: directus-oidc-secret
|
name: directus-oidc-secret
|
||||||
# key: OIDC_CLIENT_ID
|
key: OIDC_CLIENT_ID
|
||||||
# - name: AUTH_AUTHENTIK_CLIENT_SECRET
|
- name: AUTH_AUTHENTIK_CLIENT_SECRET
|
||||||
# valueFrom:
|
valueFrom:
|
||||||
# secretKeyRef:
|
secretKeyRef:
|
||||||
# name: directus-oidc-secret
|
name: directus-oidc-secret
|
||||||
# key: OIDC_CLIENT_SECRET
|
key: OIDC_CLIENT_SECRET
|
||||||
# - name: AUTH_AUTHENTIK_SCOPE
|
- name: AUTH_AUTHENTIK_SCOPE
|
||||||
# value: openid profile email
|
value: openid profile email
|
||||||
# - name: AUTH_AUTHENTIK_ISSUER_URL
|
- name: AUTH_AUTHENTIK_ISSUER_URL
|
||||||
# value: https://auth.alexlebens.net/application/o/directus/.well-known/openid-configuration
|
value: https://auth.alexlebens.dev/application/o/directus/.well-known/openid-configuration
|
||||||
# - name: AUTH_AUTHENTIK_IDENTIFIER_KEY
|
- name: AUTH_AUTHENTIK_IDENTIFIER_KEY
|
||||||
# value: email
|
value: email
|
||||||
# - name: AUTH_AUTHENTIK_ALLOW_PUBLIC_REGISTRATION
|
- name: AUTH_AUTHENTIK_ALLOW_PUBLIC_REGISTRATION
|
||||||
# value: true
|
value: true
|
||||||
# - name: AUTH_AUTHENTIK_LABEL
|
- name: AUTH_AUTHENTIK_LABEL
|
||||||
# value: Authentik Login
|
value: Authentik Login
|
||||||
- name: TELEMETRY
|
- name: TELEMETRY
|
||||||
value: false
|
value: false
|
||||||
resources:
|
resources:
|
||||||
@@ -142,26 +142,6 @@ directus:
|
|||||||
port: 80
|
port: 80
|
||||||
targetPort: 8055
|
targetPort: 8055
|
||||||
protocol: TCP
|
protocol: TCP
|
||||||
ingress:
|
|
||||||
traefik:
|
|
||||||
enabled: true
|
|
||||||
className: traefik
|
|
||||||
annotations:
|
|
||||||
traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
|
||||||
traefik.ingress.kubernetes.io/router.tls: "true"
|
|
||||||
cert-manager.io/cluster-issuer: letsencrypt-issuer
|
|
||||||
hosts:
|
|
||||||
- host: directus.alexlebens.net
|
|
||||||
paths:
|
|
||||||
- path: /
|
|
||||||
pathType: Prefix
|
|
||||||
service:
|
|
||||||
name: directus
|
|
||||||
port: 80
|
|
||||||
tls:
|
|
||||||
- hosts:
|
|
||||||
- directus.alexlebens.net
|
|
||||||
secretName: directus-tls-secret
|
|
||||||
persistence:
|
persistence:
|
||||||
data:
|
data:
|
||||||
storageClass: ceph-block
|
storageClass: ceph-block
|
||||||
|
Reference in New Issue
Block a user