titan-iac/services/keycloak/vault-oidc-secret-ensure-job.yaml

48 lines
1.7 KiB
YAML
Raw Normal View History

2026-01-14 02:24:32 -03:00
# services/keycloak/vault-oidc-secret-ensure-job.yaml
apiVersion: batch/v1
kind: Job
metadata:
2026-01-14 14:33:57 -03:00
name: vault-oidc-secret-ensure-5
2026-01-14 02:24:32 -03:00
namespace: sso
spec:
backoffLimit: 0
ttlSecondsAfterFinished: 3600
template:
metadata:
annotations:
vault.hashicorp.com/agent-inject: "true"
2026-01-14 14:29:29 -03:00
vault.hashicorp.com/agent-pre-populate-only: "true"
vault.hashicorp.com/role: "sso-secrets"
vault.hashicorp.com/agent-inject-secret-keycloak-admin-env.sh: "kv/data/atlas/shared/keycloak-admin"
vault.hashicorp.com/agent-inject-template-keycloak-admin-env.sh: |
{{ with secret "kv/data/atlas/shared/keycloak-admin" }}
export KEYCLOAK_ADMIN="{{ .Data.data.username }}"
export KEYCLOAK_ADMIN_USER="{{ .Data.data.username }}"
export KEYCLOAK_ADMIN_PASSWORD="{{ .Data.data.password }}"
{{ end }}
2026-01-14 02:24:32 -03:00
spec:
serviceAccountName: mas-secrets-ensure
restartPolicy: Never
volumes:
- name: vault-oidc-secret-ensure-script
configMap:
name: vault-oidc-secret-ensure-script
defaultMode: 0555
affinity:
nodeAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: kubernetes.io/arch
operator: In
values: ["arm64"]
- key: node-role.kubernetes.io/worker
operator: Exists
containers:
- name: apply
image: alpine:3.20
command: ["/scripts/vault_oidc_secret_ensure.sh"]
volumeMounts:
- name: vault-oidc-secret-ensure-script
mountPath: /scripts
2026-01-14 14:29:29 -03:00
readOnly: true