titan-iac/services/communication/mas-admin-client-secret-ensure-job.yaml

75 lines
2.0 KiB
YAML
Raw Normal View History

# services/communication/mas-admin-client-secret-ensure-job.yaml
apiVersion: v1
kind: ServiceAccount
metadata:
name: mas-admin-client-secret-writer
namespace: comms
---
apiVersion: rbac.authorization.k8s.io/v1
kind: Role
metadata:
name: mas-admin-client-secret-writer
namespace: comms
rules:
- apiGroups: [""]
resources: ["secrets"]
resourceNames: ["mas-admin-client"]
verbs: ["get", "patch", "update"]
---
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
name: mas-admin-client-secret-writer
namespace: comms
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
name: mas-admin-client-secret-writer
subjects:
- kind: ServiceAccount
name: mas-admin-client-secret-writer
namespace: comms
---
apiVersion: batch/v1
kind: Job
metadata:
name: mas-admin-client-secret-ensure-4
namespace: comms
spec:
backoffLimit: 2
template:
spec:
serviceAccountName: mas-admin-client-secret-writer
restartPolicy: OnFailure
volumes:
- name: work
emptyDir: {}
initContainers:
- name: generate
image: alpine:3.20
command: ["/bin/sh", "-c"]
args:
- |
set -eu
umask 077
dd if=/dev/urandom bs=32 count=1 2>/dev/null | od -An -tx1 | tr -d ' \n' > /work/client_secret
volumeMounts:
- name: work
mountPath: /work
containers:
- name: patch
image: bitnami/kubectl:latest
command: ["/bin/sh", "-c"]
args:
- |
set -eu
if [ -n "$(kubectl -n comms get secret mas-admin-client -o jsonpath='{.data.client_secret}' 2>/dev/null || true)" ]; then
exit 0
fi
secret="$(cat /work/client_secret)"
payload="$(printf '{"stringData":{"client_secret":"%s"}}' "${secret}")"
kubectl -n comms patch secret mas-admin-client --type=merge -p "${payload}" >/dev/null
volumeMounts:
- name: work
mountPath: /work