homelab/manifests/authentik/authentik-gitea-secret.sh
Nik Afiq 83f46c9748 feat(gitea): add backup CronJob with RBAC and NFS support
feat(gitea): create PersistentVolume and PersistentVolumeClaim for Gitea

feat(gitea): add script to create Gitea runner registration token secret

feat(gitea): deploy Gitea Actions runner with Docker socket access

feat(media): deploy JDownloader with Ingress configuration

feat(media): set up Jellyfin media server with NFS and Ingress

feat(media): configure qBittorrent deployment with Ingress

feat(monitoring): add Grafana Loki datasource ConfigMap

feat(monitoring): create Grafana admin credentials secret

feat(monitoring): define PersistentVolumes for monitoring stack

feat(network): implement DDNS CronJob for Porkbun DNS updates

feat(network): create secret for Porkbun DDNS API credentials

feat(network): set up Glances service and Ingress for Debian node

fix(network): patch Pi-hole DNS services with external IPs

feat(network): configure Traefik dashboard Ingress with Authentik auth

feat(network): set up Watch Party service and Ingress for Mac Mini

refactor(values): update Helm values files for various services
2026-03-12 21:56:32 +09:00

11 lines
458 B
Bash
Executable File

#!/usr/bin/env bash
# Usage: bash manifests/authentik/authentik-gitea-secret.sh
# Description: Creates the Authentik OAuth secret for Gitea integration
set -euo pipefail
source "$(dirname "$0")/../../.env"
kubectl create secret generic authentik-gitea-oauth \
--namespace gitea \
--from-literal=client-id="${AUTHENTIK_GITEA_CLIENT_ID}" \
--from-literal=client-secret="${AUTHENTIK_GITEA_CLIENT_SECRET}" \
--dry-run=client -o yaml | kubectl apply -f -