Skip to content

Conversation

@youhide
Copy link
Owner

@youhide youhide commented Dec 17, 2025

This PR contains the following updates:

Package Type Update Change
authentik (source) helm_release patch 2025.10.22025.10.3

Release Notes

goauthentik/helm (authentik)

v2025.10.3

Compare Source

authentik is an open-source Identity Provider focused on flexibility and versatility

What's Changed

Full Changelog: goauthentik/helm@authentik-2025.10.2...authentik-2025.10.3


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Renovate Bot.

@youhide-atlantis
Copy link

Ran Plan for 2 projects:

  1. dir: terragrunt/kubernetes/authentik-config workspace: terragrunt_kubernetes_authentik-config
  2. dir: terragrunt/kubernetes/authentik workspace: terragrunt_kubernetes_authentik

1. dir: terragrunt/kubernetes/authentik-config workspace: terragrunt_kubernetes_authentik-config

Plan Error

Show Output
running 'sh -c' 'terragrunt plan -input=false $(printf '%s' $COMMENT_ARGS | sed 's/,/ /g' | tr -d '\\') -no-color -out $PLANFILE' in '/home/atlantis/.atlantis/repos/youhide/hideForming/92/terragrunt_kubernetes_authentik-config/terragrunt/kubernetes/authentik-config': exit status 1: running "terragrunt plan -input=false $(printf '%s' $COMMENT_ARGS | sed 's/,/ /g' | tr -d '\\\\') -no-color -out $PLANFILE" in "/home/atlantis/.atlantis/repos/youhide/hideForming/92/terragrunt_kubernetes_authentik-config/terragrunt/kubernetes/authentik-config": 
01:00:22.355 INFO   Downloading Terraform configurations from . into ./.terragrunt-cache/_XKef7m8iZK8UF-FgiRBKfsxDyM/axStNTxFBt1dPOTVYW1jgWVOyHA
01:00:22.386 INFO   tofu: Initializing the backend...
01:00:22.412 INFO   tofu: Successfully configured the backend "s3"! OpenTofu will automatically
01:00:22.412 INFO   tofu: use this backend unless the backend configuration changes.
01:00:22.429 INFO   tofu: Initializing provider plugins...
01:00:22.429 INFO   tofu: - Reusing previous version of cloudflare/cloudflare from the dependency lock file
01:00:22.917 INFO   tofu: - Reusing previous version of hashicorp/vault from the dependency lock file
01:00:23.047 INFO   tofu: - Reusing previous version of telmate/proxmox from the dependency lock file
01:00:23.323 INFO   tofu: - Reusing previous version of hashicorp/kubernetes from the dependency lock file
01:00:23.453 INFO   tofu: - Reusing previous version of hashicorp/helm from the dependency lock file
01:00:23.554 INFO   tofu: - Reusing previous version of goauthentik/authentik from the dependency lock file
01:00:23.706 INFO   tofu: - Reusing previous version of gavinbunney/kubectl from the dependency lock file
01:00:23.802 INFO   tofu: - Reusing previous version of aminueza/minio from the dependency lock file
01:00:25.027 INFO   tofu: - Installing hashicorp/kubernetes v2.36.0...
01:00:26.761 INFO   tofu: - Installed hashicorp/kubernetes v2.36.0 (signed, key ID 0C0AF313E5FD9F80)
01:00:27.900 INFO   tofu: - Installing hashicorp/helm v3.0.0-pre2...
01:00:30.235 INFO   tofu: - Installed hashicorp/helm v3.0.0-pre2 (signed, key ID 0C0AF313E5FD9F80)
01:00:31.376 INFO   tofu: - Installing goauthentik/authentik v2025.8.1...
01:00:32.624 INFO   tofu: - Installed goauthentik/authentik v2025.8.1. Signature validation was skipped due to the registry not containing GPG keys for this provider
01:00:33.376 INFO   tofu: - Installing gavinbunney/kubectl v1.19.0...
01:00:35.236 INFO   tofu: - Installed gavinbunney/kubectl v1.19.0 (signed, key ID 1E1CE42504F5FBB2)
01:00:35.511 INFO   tofu: - Installing aminueza/minio v3.5.0...
01:00:36.402 INFO   tofu: - Installed aminueza/minio v3.5.0. Signature validation was skipped due to the registry not containing GPG keys for this provider
01:00:36.782 INFO   tofu: - Installing cloudflare/cloudflare v5.4.0...
01:00:38.970 INFO   tofu: - Installed cloudflare/cloudflare v5.4.0 (signed, key ID C76001609EE3B136)
01:00:39.238 INFO   tofu: - Installing hashicorp/vault v4.8.0...
01:00:40.500 INFO   tofu: - Installed hashicorp/vault v4.8.0 (signed, key ID 0C0AF313E5FD9F80)
01:00:40.793 INFO   tofu: - Installing telmate/proxmox v3.0.1-rc8...
01:00:41.551 INFO   tofu: - Installed telmate/proxmox v3.0.1-rc8. Signature validation was skipped due to the registry not containing GPG keys for this provider
01:00:41.551 INFO   tofu: Providers are signed by their developers.
01:00:41.551 INFO   tofu: If you'd like to know more about provider signing, you can read about it here:
01:00:41.551 INFO   tofu: https://opentofu.org/docs/cli/plugins/signing/
01:00:41.551 INFO   tofu: OpenTofu has made some changes to the provider dependency selections recorded
01:00:41.551 INFO   tofu: in the .terraform.lock.hcl file. Review those changes and commit them to your
01:00:41.551 INFO   tofu: version control system if they represent changes you intended to make.
01:00:41.551 INFO   tofu: OpenTofu has been successfully initialized!
01:00:43.080 STDOUT tofu: data.authentik_property_mapping_provider_scope.oauth2: Reading...
01:00:43.080 STDOUT tofu: data.authentik_flow.authorization_flow: Reading...
01:00:43.080 STDOUT tofu: data.authentik_flow.invalidation_flow: Reading...
01:00:43.083 STDOUT tofu: data.authentik_certificate_key_pair.rs256_keypair: Reading...
01:00:43.130 STDOUT tofu: Planning failed. OpenTofu encountered an error while generating this plan.
01:00:43.130 STDERR tofu: Error: HTTP Error 'Get "https://auth.tkasolutions.com.br/api/v3/flows/instances/?slug=default-authentication-flow": dial tcp: lookup auth.tkasolutions.com.br on 192.168.11.1:53: no such host' without http response
01:00:43.130 STDERR tofu:   with data.authentik_flow.authorization_flow,
01:00:43.130 STDERR tofu:   on main.tf line 7, in data "authentik_flow" "authorization_flow":
01:00:43.130 STDERR tofu:    7: data "authentik_flow" "authorization_flow" {
01:00:43.130 STDERR tofu: Error: HTTP Error 'Get "https://auth.tkasolutions.com.br/api/v3/flows/instances/?slug=default-invalidation-flow": dial tcp: lookup auth.tkasolutions.com.br on 192.168.11.1:53: no such host' without http response
01:00:43.130 STDERR tofu:   with data.authentik_flow.invalidation_flow,
01:00:43.130 STDERR tofu:   on main.tf line 11, in data "authentik_flow" "invalidation_flow":
01:00:43.130 STDERR tofu:   11: data "authentik_flow" "invalidation_flow" {
01:00:43.135 STDERR tofu: Error: HTTP Error 'Get "https://auth.tkasolutions.com.br/api/v3/propertymappings/provider/scope/?managed=goauthentik.io%2Fproviders%2Foauth2%2Fscope-email&managed=goauthentik.io%2Fproviders%2Foauth2%2Fscope-openid&managed=goauthentik.io%2Fproviders%2Foauth2%2Fscope-profile": dial tcp: lookup auth.tkasolutions.com.br on 192.168.11.1:53: no such host' without http response
01:00:43.135 STDERR tofu:   with data.authentik_property_mapping_provider_scope.oauth2,
01:00:43.135 STDERR tofu:   on main.tf line 15, in data "authentik_property_mapping_provider_scope" "oauth2":
01:00:43.135 STDERR tofu:   15: data "authentik_property_mapping_provider_scope" "oauth2" {
01:00:43.140 STDERR tofu: Error: HTTP Error 'Get "https://auth.tkasolutions.com.br/api/v3/crypto/certificatekeypairs/?include_details=true&name=authentik+Self-signed+Certificate": dial tcp: lookup auth.tkasolutions.com.br on 192.168.11.1:53: no such host' without http response
01:00:43.140 STDERR tofu:   with data.authentik_certificate_key_pair.rs256_keypair,
01:00:43.140 STDERR tofu:   on main.tf line 24, in data "authentik_certificate_key_pair" "rs256_keypair":
01:00:43.140 STDERR tofu:   24: data "authentik_certificate_key_pair" "rs256_keypair" {
01:00:43.152 ERROR  tofu invocation failed in ./.terragrunt-cache/_XKef7m8iZK8UF-FgiRBKfsxDyM/axStNTxFBt1dPOTVYW1jgWVOyHA
01:00:43.152 ERROR  error occurred:

* Failed to execute "tofu plan -input=false -out ./terragrunt_kubernetes_authentik-config.tfplan -no-color" in ./.terragrunt-cache/_XKef7m8iZK8UF-FgiRBKfsxDyM/axStNTxFBt1dPOTVYW1jgWVOyHA
  
  Error: HTTP Error 'Get "https://auth.tkasolutions.com.br/api/v3/flows/instances/?slug=default-authentication-flow": dial tcp: lookup auth.tkasolutions.com.br on 192.168.11.1:53: no such host' without http response
  
    with data.authentik_flow.authorization_flow,
    on main.tf line 7, in data "authentik_flow" "authorization_flow":
     7: data "authentik_flow" "authorization_flow" {
  
  
  Error: HTTP Error 'Get "https://auth.tkasolutions.com.br/api/v3/flows/instances/?slug=default-invalidation-flow": dial tcp: lookup auth.tkasolutions.com.br on 192.168.11.1:53: no such host' without http response
  
    with data.authentik_flow.invalidation_flow,
    on main.tf line 11, in data "authentik_flow" "invalidation_flow":
    11: data "authentik_flow" "invalidation_flow" {
  
  
  Error: HTTP Error 'Get "https://auth.tkasolutions.com.br/api/v3/propertymappings/provider/scope/?managed=goauthentik.io%2Fproviders%2Foauth2%2Fscope-email&managed=goauthentik.io%2Fproviders%2Foauth2%2Fscope-openid&managed=goauthentik.io%2Fproviders%2Foauth2%2Fscope-profile": dial tcp: lookup auth.tkasolutions.com.br on 192.168.11.1:53: no such host' without http response
  
    with data.authentik_property_mapping_provider_scope.oauth2,
    on main.tf line 15, in data "authentik_property_mapping_provider_scope" "oauth2":
    15: data "authentik_property_mapping_provider_scope" "oauth2" {
  
  
  Error: HTTP Error 'Get "https://auth.tkasolutions.com.br/api/v3/crypto/certificatekeypairs/?include_details=true&name=authentik+Self-signed+Certificate": dial tcp: lookup auth.tkasolutions.com.br on 192.168.11.1:53: no such host' without http response
  
    with data.authentik_certificate_key_pair.rs256_keypair,
    on main.tf line 24, in data "authentik_certificate_key_pair" "rs256_keypair":
    24: data "authentik_certificate_key_pair" "rs256_keypair" {
  
  
  exit status 1


Authenticated


2. dir: terragrunt/kubernetes/authentik workspace: terragrunt_kubernetes_authentik

Show Output
Authenticated

01:00:45.506 INFO   Downloading Terraform configurations from . into ./.terragrunt-cache/bTyTbrSmrTW1u0RWFe8LEciekVs/KXlWF0qjw63x4EDBwwSxsvjy7ds
01:00:45.557 INFO   tofu: Initializing the backend...
01:00:45.931 INFO   tofu: Initializing provider plugins...
01:00:45.931 INFO   tofu: - Reusing previous version of hashicorp/helm from the dependency lock file
01:00:46.139 INFO   tofu: - Reusing previous version of goauthentik/authentik from the dependency lock file
01:00:46.262 INFO   tofu: - Reusing previous version of gavinbunney/kubectl from the dependency lock file
01:00:46.344 INFO   tofu: - Reusing previous version of aminueza/minio from the dependency lock file
01:00:46.495 INFO   tofu: - Reusing previous version of cloudflare/cloudflare from the dependency lock file
01:00:46.636 INFO   tofu: - Reusing previous version of hashicorp/vault from the dependency lock file
01:00:46.776 INFO   tofu: - Reusing previous version of telmate/proxmox from the dependency lock file
01:00:46.893 INFO   tofu: - Reusing previous version of hashicorp/kubernetes from the dependency lock file
01:00:47.070 INFO   tofu: - Using previously-installed aminueza/minio v3.5.0
01:00:47.189 INFO   tofu: - Using previously-installed cloudflare/cloudflare v5.4.0
01:00:47.218 INFO   tofu: - Using previously-installed hashicorp/vault v4.8.0
01:00:47.234 INFO   tofu: - Using previously-installed telmate/proxmox v3.0.1-rc8
01:00:47.283 INFO   tofu: - Using previously-installed hashicorp/kubernetes v2.36.0
01:00:47.335 INFO   tofu: - Using previously-installed hashicorp/helm v3.0.0-pre2
01:00:47.365 INFO   tofu: - Using previously-installed goauthentik/authentik v2025.8.1
01:00:47.417 INFO   tofu: - Using previously-installed gavinbunney/kubectl v1.19.0
01:00:47.417 INFO   tofu: OpenTofu has been successfully initialized!
01:00:48.495 STDOUT tofu: OpenTofu used the selected providers to generate the following execution
01:00:48.495 STDOUT tofu: plan. Resource actions are indicated with the following symbols:
01:00:48.495 STDOUT tofu:   ~ update in-place
01:00:48.495 STDOUT tofu: OpenTofu will perform the following actions:
01:00:48.496 STDOUT tofu:   # helm_release.authentik will be updated in-place
01:00:48.496 STDOUT tofu:   ~ resource "helm_release" "authentik" {
01:00:48.496 STDOUT tofu:       ~ id                         = "authentik" -> (known after apply)
01:00:48.496 STDOUT tofu:       ~ metadata                   = {
01:00:48.496 STDOUT tofu:           ~ app_version    = "2025.10.2" -> (known after apply)
01:00:48.496 STDOUT tofu:           ~ chart          = "authentik" -> (known after apply)
01:00:48.496 STDOUT tofu:           ~ first_deployed = 1765211853 -> (known after apply)
01:00:48.496 STDOUT tofu:           ~ last_deployed  = 1765211853 -> (known after apply)
01:00:48.497 STDOUT tofu:           ~ name           = "authentik" -> (known after apply)
01:00:48.497 STDOUT tofu:           ~ namespace      = "authentik" -> (known after apply)
01:00:48.497 STDOUT tofu:           ~ revision       = 1 -> (known after apply)
01:00:48.497 STDOUT tofu:           ~ values         = jsonencode(
01:00:48.497 STDOUT tofu:                 {
01:00:48.497 STDOUT tofu:                   - authentik  = {
01:00:48.497 STDOUT tofu:                       - bootstrap_email = "youri@youhide.com.br"
01:00:48.497 STDOUT tofu:                       - email           = {
01:00:48.497 STDOUT tofu:                           - from     = "Authentik <postmaster@mg.tkasolutions.com.br>"
01:00:48.497 STDOUT tofu:                           - host     = "smtp.mailgun.org"
01:00:48.497 STDOUT tofu:                           - port     = 587
01:00:48.497 STDOUT tofu:                           - use_tls  = true
01:00:48.497 STDOUT tofu:                           - username = "postmaster@mg.tkasolutions.com.br"
01:00:48.497 STDOUT tofu:                         }
01:00:48.497 STDOUT tofu:                     }
01:00:48.497 STDOUT tofu:                   - global     = {
01:00:48.497 STDOUT tofu:                       - env = [
01:00:48.497 STDOUT tofu:                           - {
01:00:48.497 STDOUT tofu:                               - name      = "AUTHENTIK_SECRET_KEY"
01:00:48.497 STDOUT tofu:                               - valueFrom = {
01:00:48.497 STDOUT tofu:                                   - secretKeyRef = {
01:00:48.497 STDOUT tofu:                                       - key  = "authentik-secret-key"
01:00:48.497 STDOUT tofu:                                       - name = "authentik-secrets"
01:00:48.497 STDOUT tofu:                                     }
01:00:48.497 STDOUT tofu:                                 }
01:00:48.497 STDOUT tofu:                             },
01:00:48.497 STDOUT tofu:                           - {
01:00:48.497 STDOUT tofu:                               - name      = "AUTHENTIK_EMAIL__PASSWORD"
01:00:48.497 STDOUT tofu:                               - valueFrom = {
01:00:48.497 STDOUT tofu:                                   - secretKeyRef = {
01:00:48.497 STDOUT tofu:                                       - key  = "smtp-password"
01:00:48.497 STDOUT tofu:                                       - name = "authentik-secrets"
01:00:48.498 STDOUT tofu:                                     }
01:00:48.498 STDOUT tofu:                                 }
01:00:48.498 STDOUT tofu:                             },
01:00:48.498 STDOUT tofu:                           - {
01:00:48.498 STDOUT tofu:                               - name      = "AUTHENTIK_BOOTSTRAP_PASSWORD"
01:00:48.498 STDOUT tofu:                               - valueFrom = {
01:00:48.498 STDOUT tofu:                                   - secretKeyRef = {
01:00:48.498 STDOUT tofu:                                       - key  = "token"
01:00:48.498 STDOUT tofu:                                       - name = "authentik-secrets"
01:00:48.498 STDOUT tofu:                                     }
01:00:48.498 STDOUT tofu:                                 }
01:00:48.498 STDOUT tofu:                             },
01:00:48.498 STDOUT tofu:                           - {
01:00:48.498 STDOUT tofu:                               - name      = "AUTHENTIK_BOOTSTRAP_TOKEN"
01:00:48.498 STDOUT tofu:                               - valueFrom = {
01:00:48.498 STDOUT tofu:                                   - secretKeyRef = {
01:00:48.498 STDOUT tofu:                                       - key  = "token"
01:00:48.498 STDOUT tofu:                                       - name = "authentik-secrets"
01:00:48.498 STDOUT tofu:                                     }
01:00:48.498 STDOUT tofu:                                 }
01:00:48.498 STDOUT tofu:                             },
01:00:48.498 STDOUT tofu:                           - {
01:00:48.498 STDOUT tofu:                               - name      = "POSTGRES_PASSWORD"
01:00:48.498 STDOUT tofu:                               - valueFrom = {
01:00:48.498 STDOUT tofu:                                   - secretKeyRef = {
01:00:48.498 STDOUT tofu:                                       - key  = "postgresql-password"
01:00:48.498 STDOUT tofu:                                       - name = "authentik-secrets"
01:00:48.498 STDOUT tofu:                                     }
01:00:48.498 STDOUT tofu:                                 }
01:00:48.498 STDOUT tofu:                             },
01:00:48.498 STDOUT tofu:                         ]
01:00:48.498 STDOUT tofu:                     }
01:00:48.498 STDOUT tofu:                   - postgresql = {
01:00:48.498 STDOUT tofu:                       - auth    = {
01:00:48.498 STDOUT tofu:                           - existingSecret = "authentik-secrets"
01:00:48.498 STDOUT tofu:                           - secretKeys     = {
01:00:48.498 STDOUT tofu:                               - userPasswordKey = "postgresql-password"
01:00:48.498 STDOUT tofu:                             }
01:00:48.498 STDOUT tofu:                         }
01:00:48.498 STDOUT tofu:                       - enabled = true
01:00:48.499 STDOUT tofu:                       - primary = {
01:00:48.499 STDOUT tofu:                           - persistence = {
01:00:48.499 STDOUT tofu:                               - accessModes  = [
01:00:48.499 STDOUT tofu:                                   - "ReadWriteOnce",
01:00:48.499 STDOUT tofu:                                 ]
01:00:48.499 STDOUT tofu:                               - size         = "4Gi"
01:00:48.499 STDOUT tofu:                               - storageClass = "longhorn"
01:00:48.499 STDOUT tofu:                             }
01:00:48.499 STDOUT tofu:                         }
01:00:48.499 STDOUT tofu:                     }
01:00:48.499 STDOUT tofu:                   - redis      = {
01:00:48.499 STDOUT tofu:                       - enabled = true
01:00:48.499 STDOUT tofu:                       - master  = {
01:00:48.499 STDOUT tofu:                           - persistence = {
01:00:48.499 STDOUT tofu:                               - accessModes  = [
01:00:48.499 STDOUT tofu:                                   - "ReadWriteOnce",
01:00:48.499 STDOUT tofu:                                 ]
01:00:48.499 STDOUT tofu:                               - size         = "2Gi"
01:00:48.499 STDOUT tofu:                               - storageClass = "local-path"
01:00:48.499 STDOUT tofu:                             }
01:00:48.499 STDOUT tofu:                         }
01:00:48.499 STDOUT tofu:                     }
01:00:48.499 STDOUT tofu:                   - server     = {
01:00:48.499 STDOUT tofu:                       - ingress = {
01:00:48.499 STDOUT tofu:                           - enabled          = true
01:00:48.499 STDOUT tofu:                           - hosts            = [
01:00:48.499 STDOUT tofu:                               - "authentik.tkasolutions.com.br",
01:00:48.499 STDOUT tofu:                             ]
01:00:48.499 STDOUT tofu:                           - ingressClassName = "traefik"
01:00:48.499 STDOUT tofu:                         }
01:00:48.499 STDOUT tofu:                     }
01:00:48.499 STDOUT tofu:                 }
01:00:48.499 STDOUT tofu:             ) -> (known after apply)
01:00:48.499 STDOUT tofu:           ~ version        = "2025.10.2" -> (known after apply)
01:00:48.499 STDOUT tofu:         } -> (known after apply)
01:00:48.499 STDOUT tofu:         name                       = "authentik"
01:00:48.499 STDOUT tofu:       ~ values                     = [
01:00:48.499 STDOUT tofu:           - <<-EOT
01:00:48.499 STDOUT tofu:                 "authentik":
01:00:48.499 STDOUT tofu:                   "bootstrap_email": "youri@youhide.com.br"
01:00:48.499 STDOUT tofu:                   "email":
01:00:48.499 STDOUT tofu:                     "from": "Authentik <postmaster@mg.tkasolutions.com.br>"
01:00:48.499 STDOUT tofu:                     "host": "smtp.mailgun.org"
01:00:48.500 STDOUT tofu:                     "port": 587
01:00:48.500 STDOUT tofu:                     "use_tls": true
01:00:48.500 STDOUT tofu:                     "username": "postmaster@mg.tkasolutions.com.br"
01:00:48.500 STDOUT tofu:                 "global":
01:00:48.500 STDOUT tofu:                   "env":
01:00:48.500 STDOUT tofu:                   - "name": "AUTHENTIK_SECRET_KEY"
01:00:48.500 STDOUT tofu:                     "valueFrom":
01:00:48.500 STDOUT tofu:                       "secretKeyRef":
01:00:48.500 STDOUT tofu:                         "key": "authentik-secret-key"
01:00:48.500 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.500 STDOUT tofu:                   - "name": "AUTHENTIK_EMAIL__PASSWORD"
01:00:48.500 STDOUT tofu:                     "valueFrom":
01:00:48.500 STDOUT tofu:                       "secretKeyRef":
01:00:48.500 STDOUT tofu:                         "key": "smtp-password"
01:00:48.500 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.500 STDOUT tofu:                   - "name": "AUTHENTIK_BOOTSTRAP_PASSWORD"
01:00:48.500 STDOUT tofu:                     "valueFrom":
01:00:48.500 STDOUT tofu:                       "secretKeyRef":
01:00:48.500 STDOUT tofu:                         "key": "token"
01:00:48.500 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.500 STDOUT tofu:                   - "name": "AUTHENTIK_BOOTSTRAP_TOKEN"
01:00:48.500 STDOUT tofu:                     "valueFrom":
01:00:48.500 STDOUT tofu:                       "secretKeyRef":
01:00:48.500 STDOUT tofu:                         "key": "token"
01:00:48.500 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.500 STDOUT tofu:                   - "name": "POSTGRES_PASSWORD"
01:00:48.500 STDOUT tofu:                     "valueFrom":
01:00:48.500 STDOUT tofu:                       "secretKeyRef":
01:00:48.500 STDOUT tofu:                         "key": "postgresql-password"
01:00:48.500 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.500 STDOUT tofu:                 "postgresql":
01:00:48.500 STDOUT tofu:                   "auth":
01:00:48.500 STDOUT tofu:                     "existingSecret": "authentik-secrets"
01:00:48.500 STDOUT tofu:                     "secretKeys":
01:00:48.500 STDOUT tofu:                       "userPasswordKey": "postgresql-password"
01:00:48.500 STDOUT tofu:                   "enabled": true
01:00:48.500 STDOUT tofu:                   "primary":
01:00:48.500 STDOUT tofu:                     "persistence":
01:00:48.500 STDOUT tofu:                       "accessModes":
01:00:48.500 STDOUT tofu:                       - "ReadWriteOnce"
01:00:48.500 STDOUT tofu:                       "size": "4Gi"
01:00:48.500 STDOUT tofu:                       "storageClass": "longhorn"
01:00:48.500 STDOUT tofu:                 "redis":
01:00:48.500 STDOUT tofu:                   "enabled": true
01:00:48.500 STDOUT tofu:                   "master":
01:00:48.500 STDOUT tofu:                     "persistence":
01:00:48.500 STDOUT tofu:                       "accessModes":
01:00:48.500 STDOUT tofu:                       - "ReadWriteOnce"
01:00:48.500 STDOUT tofu:                       "size": "2Gi"
01:00:48.500 STDOUT tofu:                       "storageClass": "local-path"
01:00:48.500 STDOUT tofu:                 "server":
01:00:48.500 STDOUT tofu:                   "ingress":
01:00:48.500 STDOUT tofu:                     "enabled": true
01:00:48.500 STDOUT tofu:                     "hosts":
01:00:48.500 STDOUT tofu:                     - "authentik.tkasolutions.com.br"
01:00:48.500 STDOUT tofu:                     "ingressClassName": "traefik"
01:00:48.500 STDOUT tofu:             EOT,
01:00:48.500 STDOUT tofu:           + <<-EOT
01:00:48.500 STDOUT tofu:                 "authentik":
01:00:48.500 STDOUT tofu:                   "bootstrap_email": "youri@youhide.com.br"
01:00:48.500 STDOUT tofu:                   "email":
01:00:48.500 STDOUT tofu:                     "from": "Authentik <postmaster@mg.tkasolutions.com.br>"
01:00:48.501 STDOUT tofu:                     "host": "smtp.mailgun.org"
01:00:48.501 STDOUT tofu:                     "port": 587
01:00:48.501 STDOUT tofu:                     "use_tls": true
01:00:48.501 STDOUT tofu:                     "username": "postmaster@mg.tkasolutions.com.br"
01:00:48.501 STDOUT tofu:                 "global":
01:00:48.501 STDOUT tofu:                   "env":
01:00:48.501 STDOUT tofu:                   - "name": "AUTHENTIK_SECRET_KEY"
01:00:48.501 STDOUT tofu:                     "valueFrom":
01:00:48.501 STDOUT tofu:                       "secretKeyRef":
01:00:48.501 STDOUT tofu:                         "key": "authentik-secret-key"
01:00:48.501 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.501 STDOUT tofu:                   - "name": "AUTHENTIK_EMAIL__PASSWORD"
01:00:48.501 STDOUT tofu:                     "valueFrom":
01:00:48.501 STDOUT tofu:                       "secretKeyRef":
01:00:48.501 STDOUT tofu:                         "key": "smtp-password"
01:00:48.501 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.501 STDOUT tofu:                   - "name": "AUTHENTIK_BOOTSTRAP_PASSWORD"
01:00:48.501 STDOUT tofu:                     "valueFrom":
01:00:48.501 STDOUT tofu:                       "secretKeyRef":
01:00:48.501 STDOUT tofu:                         "key": "token"
01:00:48.501 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.501 STDOUT tofu:                   - "name": "AUTHENTIK_BOOTSTRAP_TOKEN"
01:00:48.501 STDOUT tofu:                     "valueFrom":
01:00:48.501 STDOUT tofu:                       "secretKeyRef":
01:00:48.501 STDOUT tofu:                         "key": "token"
01:00:48.501 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.501 STDOUT tofu:                   - "name": "POSTGRES_PASSWORD"
01:00:48.501 STDOUT tofu:                     "valueFrom":
01:00:48.501 STDOUT tofu:                       "secretKeyRef":
01:00:48.501 STDOUT tofu:                         "key": "postgresql-password"
01:00:48.501 STDOUT tofu:                         "name": "authentik-secrets"
01:00:48.501 STDOUT tofu:                 "postgresql":
01:00:48.501 STDOUT tofu:                   "auth":
01:00:48.501 STDOUT tofu:                     "existingSecret": "authentik-secrets"
01:00:48.501 STDOUT tofu:                     "secretKeys":
01:00:48.501 STDOUT tofu:                       "userPasswordKey": "postgresql-password"
01:00:48.501 STDOUT tofu:                   "enabled": true
01:00:48.501 STDOUT tofu:                   "primary":
01:00:48.501 STDOUT tofu:                     "persistence":
01:00:48.501 STDOUT tofu:                       "accessModes":
01:00:48.501 STDOUT tofu:                       - "ReadWriteOnce"
01:00:48.501 STDOUT tofu:                       "size": "4Gi"
01:00:48.501 STDOUT tofu:                       "storageClass": "longhorn"
01:00:48.501 STDOUT tofu:                       "volumeName": "authentik-postgres"
01:00:48.501 STDOUT tofu:                 "redis":
01:00:48.501 STDOUT tofu:                   "enabled": true
01:00:48.501 STDOUT tofu:                   "master":
01:00:48.501 STDOUT tofu:                     "persistence":
01:00:48.501 STDOUT tofu:                       "accessModes":
01:00:48.501 STDOUT tofu:                       - "ReadWriteOnce"
01:00:48.501 STDOUT tofu:                       "size": "2Gi"
01:00:48.501 STDOUT tofu:                       "storageClass": "local-path"
01:00:48.501 STDOUT tofu:                       "volumeName": "authentik-redis"
01:00:48.502 STDOUT tofu:                 "server":
01:00:48.502 STDOUT tofu:                   "ingress":
01:00:48.502 STDOUT tofu:                     "enabled": true
01:00:48.502 STDOUT tofu:                     "hosts":
01:00:48.502 STDOUT tofu:                     - "auth.tkasolutions.com.br"
01:00:48.502 STDOUT tofu:                     "ingressClassName": "traefik"
01:00:48.502 STDOUT tofu:             EOT,
01:00:48.502 STDOUT tofu:         ]
01:00:48.502 STDOUT tofu:       ~ version                    = "2025.10.2" -> "2025.10.3"
01:00:48.502 STDOUT tofu:         # (25 unchanged attributes hidden)
01:00:48.502 STDOUT tofu:     }
01:00:48.502 STDOUT tofu: Plan: 0 to add, 1 to change, 0 to destroy.
01:00:48.502 STDOUT tofu:
  • ▶️ To apply this plan, comment:
    atlantis apply -d terragrunt/kubernetes/authentik -w terragrunt_kubernetes_authentik
  • 🚮 To delete this plan and lock, click here
  • 🔁 To plan this project again, comment:
    atlantis plan -d terragrunt/kubernetes/authentik -w terragrunt_kubernetes_authentik

Plan: 0 to add, 1 to change, 0 to destroy.


Plan Summary

2 projects, 1 with changes, 0 with no changes, 1 failed

  • ⏩ To apply all unapplied plans from this Pull Request, comment:
    atlantis apply
  • 🚮 To delete all plans and locks from this Pull Request, comment:
    atlantis unlock

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants