2026-01-02 21:03:44 -03:00
|
|
|
# services/bstein-dev-home/vaultwarden-cred-sync-cronjob.yaml
|
|
|
|
|
apiVersion: batch/v1
|
|
|
|
|
kind: CronJob
|
|
|
|
|
metadata:
|
|
|
|
|
name: vaultwarden-cred-sync
|
|
|
|
|
namespace: bstein-dev-home
|
2026-01-18 02:50:07 -03:00
|
|
|
labels:
|
|
|
|
|
atlas.bstein.dev/glue: "true"
|
2026-01-02 21:03:44 -03:00
|
|
|
spec:
|
|
|
|
|
schedule: "*/15 * * * *"
|
2026-01-19 16:58:02 -03:00
|
|
|
suspend: true
|
2026-01-02 21:03:44 -03:00
|
|
|
concurrencyPolicy: Forbid
|
|
|
|
|
successfulJobsHistoryLimit: 1
|
|
|
|
|
failedJobsHistoryLimit: 3
|
|
|
|
|
jobTemplate:
|
|
|
|
|
spec:
|
|
|
|
|
backoffLimit: 0
|
|
|
|
|
template:
|
2026-01-14 12:28:10 -03:00
|
|
|
metadata:
|
|
|
|
|
annotations:
|
|
|
|
|
vault.hashicorp.com/agent-inject: "true"
|
2026-01-14 14:29:29 -03:00
|
|
|
vault.hashicorp.com/agent-pre-populate-only: "true"
|
2026-01-14 12:28:10 -03:00
|
|
|
vault.hashicorp.com/role: "bstein-dev-home"
|
|
|
|
|
vault.hashicorp.com/agent-inject-secret-portal-env.sh: "kv/data/atlas/portal/atlas-portal-db"
|
|
|
|
|
vault.hashicorp.com/agent-inject-template-portal-env.sh: |
|
2026-01-14 13:40:29 -03:00
|
|
|
{{ with secret "kv/data/atlas/portal/atlas-portal-db" }}
|
2026-01-14 12:28:10 -03:00
|
|
|
export PORTAL_DATABASE_URL="{{ .Data.data.PORTAL_DATABASE_URL }}"
|
2026-01-14 13:40:29 -03:00
|
|
|
{{ end }}
|
|
|
|
|
{{ with secret "kv/data/atlas/portal/bstein-dev-home-keycloak-admin" }}
|
2026-01-14 12:28:10 -03:00
|
|
|
export KEYCLOAK_ADMIN_CLIENT_SECRET="{{ .Data.data.client_secret }}"
|
2026-01-14 13:40:29 -03:00
|
|
|
{{ end }}
|
|
|
|
|
{{ with secret "kv/data/atlas/shared/chat-ai-keys-runtime" }}
|
2026-01-14 12:28:10 -03:00
|
|
|
export CHAT_KEY_MATRIX="{{ .Data.data.matrix }}"
|
|
|
|
|
export CHAT_KEY_HOMEPAGE="{{ .Data.data.homepage }}"
|
2026-01-14 13:40:29 -03:00
|
|
|
{{ end }}
|
|
|
|
|
{{ with secret "kv/data/atlas/shared/portal-e2e-client" }}
|
2026-01-14 12:28:10 -03:00
|
|
|
export PORTAL_E2E_CLIENT_ID="{{ .Data.data.client_id }}"
|
|
|
|
|
export PORTAL_E2E_CLIENT_SECRET="{{ .Data.data.client_secret }}"
|
2026-01-14 13:40:29 -03:00
|
|
|
{{ end }}
|
2026-01-02 21:03:44 -03:00
|
|
|
spec:
|
|
|
|
|
serviceAccountName: bstein-dev-home
|
|
|
|
|
restartPolicy: Never
|
|
|
|
|
nodeSelector:
|
|
|
|
|
kubernetes.io/arch: arm64
|
|
|
|
|
node-role.kubernetes.io/worker: "true"
|
|
|
|
|
imagePullSecrets:
|
2026-01-14 10:07:31 -03:00
|
|
|
- name: harbor-regcred
|
2026-01-02 21:03:44 -03:00
|
|
|
containers:
|
|
|
|
|
- name: sync
|
2026-01-15 03:11:57 -03:00
|
|
|
image: registry.bstein.dev/bstein/bstein-dev-home-backend:0.1.1-95
|
2026-01-02 21:03:44 -03:00
|
|
|
imagePullPolicy: Always
|
2026-01-14 02:54:59 -03:00
|
|
|
command: ["/bin/sh", "-c"]
|
|
|
|
|
args:
|
|
|
|
|
- >-
|
2026-01-14 12:28:10 -03:00
|
|
|
. /vault/secrets/portal-env.sh
|
2026-01-14 02:54:59 -03:00
|
|
|
&& exec python /scripts/vaultwarden_cred_sync.py
|
2026-01-02 21:03:44 -03:00
|
|
|
env:
|
2026-01-02 21:11:21 -03:00
|
|
|
- name: PYTHONPATH
|
|
|
|
|
value: /app
|
2026-01-02 21:03:44 -03:00
|
|
|
- name: KEYCLOAK_ENABLED
|
|
|
|
|
value: "true"
|
|
|
|
|
- name: KEYCLOAK_REALM
|
|
|
|
|
value: atlas
|
|
|
|
|
- name: KEYCLOAK_ADMIN_URL
|
|
|
|
|
value: http://keycloak.sso.svc.cluster.local
|
|
|
|
|
- name: KEYCLOAK_ADMIN_REALM
|
|
|
|
|
value: atlas
|
|
|
|
|
- name: KEYCLOAK_ADMIN_CLIENT_ID
|
|
|
|
|
value: bstein-dev-home-admin
|
|
|
|
|
- name: HTTP_CHECK_TIMEOUT_SEC
|
|
|
|
|
value: "20"
|
2026-01-18 03:00:24 -03:00
|
|
|
- name: VAULTWARDEN_ADMIN_SESSION_TTL_SEC
|
|
|
|
|
value: "900"
|
|
|
|
|
- name: VAULTWARDEN_RETRY_COOLDOWN_SEC
|
|
|
|
|
value: "1800"
|
|
|
|
|
- name: VAULTWARDEN_FAILURE_BAILOUT
|
|
|
|
|
value: "2"
|
2026-01-02 21:03:44 -03:00
|
|
|
volumeMounts:
|
|
|
|
|
- name: vaultwarden-cred-sync-script
|
|
|
|
|
mountPath: /scripts
|
|
|
|
|
readOnly: true
|
|
|
|
|
volumes:
|
|
|
|
|
- name: vaultwarden-cred-sync-script
|
|
|
|
|
configMap:
|
|
|
|
|
name: vaultwarden-cred-sync-script
|
2026-01-15 00:28:15 -03:00
|
|
|
defaultMode: 0555
|