_vaultwarden.tpl 3.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. {{- define "vaultwarden.workload" -}}
  2. workload:
  3. vaultwarden:
  4. enabled: true
  5. primary: true
  6. type: Deployment
  7. podSpec:
  8. hostNetwork: {{ .Values.vaultwardenNetwork.hostNetwork }}
  9. containers:
  10. vaultwarden:
  11. enabled: true
  12. primary: true
  13. imageSelector: image
  14. securityContext:
  15. runAsUser: {{ .Values.vaultwardenRunAs.user }}
  16. runAsGroup: {{ .Values.vaultwardenRunAs.group }}
  17. env:
  18. ROCKET_PORT: {{ .Values.vaultwardenNetwork.webPort }}
  19. WEBSOCKET_PORT: {{ .Values.vaultwardenNetwork.wsPort }}
  20. WEBSOCKET_ENABLED: {{ .Values.vaultwardenNetwork.wsEnabled }}
  21. DATABASE_URL:
  22. secretKeyRef:
  23. name: postgres-creds
  24. key: POSTGRES_URL
  25. {{ if .Values.vaultwardenConfig.adminToken }}
  26. ADMIN_TOKEN:
  27. secretKeyRef:
  28. name: vaultwarden
  29. key: ADMIN_TOKEN
  30. {{ end }}
  31. {{ if .Values.vaultwardenNetwork.certificateID }}
  32. ROCKET_TLS: '{certs="/certs/public.crt",key="/certs/private.key"}'
  33. {{ end }}
  34. {{ with .Values.vaultwardenNetwork.domain }}
  35. DOMAIN: {{ . }}
  36. {{ end }}
  37. {{ with .Values.vaultwardenConfig.additionalEnvs }}
  38. envList:
  39. {{ range $env := . }}
  40. - name: {{ $env.name }}
  41. value: {{ $env.value }}
  42. {{ end }}
  43. {{ end }}
  44. probes:
  45. liveness:
  46. enabled: true
  47. type: exec
  48. command: /healthcheck.sh
  49. readiness:
  50. enabled: true
  51. type: exec
  52. command: /healthcheck.sh
  53. startup:
  54. enabled: true
  55. type: exec
  56. command: /healthcheck.sh
  57. initContainers:
  58. {{- include "ix.v1.common.app.permissions" (dict "containerName" "01-permissions"
  59. "UID" .Values.vaultwardenRunAs.user
  60. "GID" .Values.vaultwardenRunAs.group
  61. "type" "install") | nindent 8 }}
  62. {{- include "ix.v1.common.app.postgresWait" (dict "name" "postgres-wait"
  63. "secretName" "postgres-creds") | nindent 8 }}
  64. {{/* Service */}}
  65. service:
  66. vaultwarden:
  67. enabled: true
  68. primary: true
  69. type: NodePort
  70. targetSelector: vaultwarden
  71. ports:
  72. webui:
  73. enabled: true
  74. primary: true
  75. port: {{ .Values.vaultwardenNetwork.webPort }}
  76. nodePort: {{ .Values.vaultwardenNetwork.webPort }}
  77. targetSelector: vaultwarden
  78. ws:
  79. enabled: {{ .Values.vaultwardenNetwork.wsEnabled }}
  80. port: {{ .Values.vaultwardenNetwork.wsPort }}
  81. nodePort: {{ .Values.vaultwardenNetwork.wsPort }}
  82. targetSelector: vaultwarden
  83. {{/* Persistence */}}
  84. persistence:
  85. data:
  86. enabled: true
  87. type: {{ .Values.vaultwardenStorage.data.type }}
  88. datasetName: {{ .Values.vaultwardenStorage.data.datasetName | default "" }}
  89. hostPath: {{ .Values.vaultwardenStorage.data.hostPath | default "" }}
  90. targetSelector:
  91. vaultwarden:
  92. vaultwarden:
  93. mountPath: /data
  94. 01-permissions:
  95. mountPath: /mnt/directories/data
  96. {{- if .Values.vaultwardenNetwork.certificateID }}
  97. cert:
  98. enabled: true
  99. type: secret
  100. objectName: vaultwarden-cert
  101. defaultMode: "0600"
  102. items:
  103. - key: tls.key
  104. path: private.key
  105. - key: tls.crt
  106. path: public.crt
  107. targetSelector:
  108. vaultwarden:
  109. vaultwarden:
  110. mountPath: /certs
  111. readOnly: true
  112. scaleCertificate:
  113. vaultwarden-cert:
  114. enabled: true
  115. id: {{ .Values.vaultwardenNetwork.certificateID }}
  116. {{- end -}}
  117. {{- end -}}