diff --git a/manuscript/ha-docker-swarm/authelia.md b/manuscript/ha-docker-swarm/authelia.md index 0947d3b..8895e58 100644 --- a/manuscript/ha-docker-swarm/authelia.md +++ b/manuscript/ha-docker-swarm/authelia.md @@ -40,9 +40,12 @@ Authelia configurations are defined in `/var/data/config/authelia/configuration. # Authelia configuration # ############################################################### -host: 0.0.0.0 -port: 9091 -log_level: warn +server: + host: 0.0.0.0 + port: 9091 + +log: + level: warn # This secret can also be set using the env variables AUTHELIA_JWT_SECRET_FILE # I used this site to generate the secret: https://www.grc.com/passwords.htm @@ -92,6 +95,7 @@ regulation: ban_time: 300 storage: + encryption_key: SECRET_GOES_HERE local: path: /config/db.sqlite3 @@ -188,7 +192,7 @@ services: - "traefik.http.routers.whoami.rule=Host(`whoami.example.com`)" - "traefik.http.routers.whoami.entrypoints=https" - "traefik.http.services.whoami.loadbalancer.server.port=80" - - "traefik.http.routers.service.middlewares=forward-auth@file" + - "traefik.http.routers.whoami.middlewares=forward-auth@file" networks: diff --git a/manuscript/kubernetes/sealed-secrets.md b/manuscript/kubernetes/sealed-secrets.md index 941db8b..8cbe832 100644 --- a/manuscript/kubernetes/sealed-secrets.md +++ b/manuscript/kubernetes/sealed-secrets.md @@ -114,10 +114,11 @@ Now we're into the sealed-secrets-specific YAMLs. First, we create a ConfigMap, apiVersion: v1 kind: ConfigMap metadata: - creationTimestamp: null - name: sealed-secrets-helm-chart-value-overrides - namespace: sealed-secrets - values.yaml: |- + creationTimestamp: null + name: sealed-secrets-helm-chart-value-overrides + namespace: sealed-secrets + data: + values.yaml: |- image: repository: quay.io/bitnami/sealed-secrets-controller tag: v0.17.0