migrate all secrets from SOPS to Vault KV

- Add vault provider to root terragrunt.hcl (generated providers.tf)
- Delete stacks/vault/vault_provider.tf (now in generated providers.tf)
- Add 124 variable declarations + 43 vault_kv_secret_v2 resources to
  vault/main.tf to populate Vault KV at secret/<stack-name>
- Migrate 43 consuming stacks to read secrets from Vault KV via
  data "vault_kv_secret_v2" instead of SOPS var-file
- Add dependency "vault" to all migrated stacks' terragrunt.hcl
- Complex types (maps/lists) stored as JSON strings, decoded with
  jsondecode() in locals blocks

Bootstrap secrets (vault_root_token, vault_authentik_client_id,
vault_authentik_client_secret) remain in SOPS permanently.

Apply order: vault stack first (populates KV), then all others.
This commit is contained in:
Viktor Barzin 2026-03-14 17:15:48 +00:00
parent 39b7dac1a9
commit a8d944eb9b
126 changed files with 1635 additions and 817 deletions

View file

@ -2,12 +2,17 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "actualbudget_credentials" {
type = map(any)
sensitive = true
}
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "actualbudget"
}
locals {
credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["credentials"])
}
# To create a new deployment:
/**
@ -42,8 +47,8 @@ module "viktor" {
nfs_server = var.nfs_server
depends_on = [kubernetes_namespace.actualbudget]
tier = local.tiers.edge
budget_encryption_password = lookup(var.actualbudget_credentials["viktor"], "password", null)
sync_id = lookup(var.actualbudget_credentials["viktor"], "sync_id", null)
budget_encryption_password = lookup(local.credentials["viktor"], "password", null)
sync_id = lookup(local.credentials["viktor"], "sync_id", null)
homepage_annotations = {
"gethomepage.dev/enabled" = "true"
"gethomepage.dev/name" = "Budget Viktor"
@ -63,8 +68,8 @@ module "anca" {
nfs_server = var.nfs_server
depends_on = [kubernetes_namespace.actualbudget]
tier = local.tiers.edge
budget_encryption_password = lookup(var.actualbudget_credentials["anca"], "password", null)
sync_id = lookup(var.actualbudget_credentials["anca"], "sync_id", null)
budget_encryption_password = lookup(local.credentials["anca"], "password", null)
sync_id = lookup(local.credentials["anca"], "sync_id", null)
homepage_annotations = {
"gethomepage.dev/enabled" = "true"
"gethomepage.dev/name" = "Budget Anca"
@ -84,8 +89,8 @@ module "emo" {
nfs_server = var.nfs_server
depends_on = [kubernetes_namespace.actualbudget]
tier = local.tiers.edge
budget_encryption_password = lookup(var.actualbudget_credentials["emo"], "password", null)
sync_id = lookup(var.actualbudget_credentials["emo"], "sync_id", null)
budget_encryption_password = lookup(local.credentials["emo"], "password", null)
sync_id = lookup(local.credentials["emo"], "sync_id", null)
homepage_annotations = {
"gethomepage.dev/enabled" = "true"
"gethomepage.dev/name" = "Budget Emo"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,12 +2,16 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "affine_postgresql_password" {
type = string
sensitive = true
}
variable "mailserver_accounts" { type = map(any) }
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "affine"
}
locals {
mailserver_accounts = jsondecode(data.vault_kv_secret_v2.secrets.data["mailserver_accounts"])
}
variable "redis_host" { type = string }
variable "postgresql_host" { type = string }
variable "mail_host" { type = string }
@ -32,7 +36,7 @@ locals {
common_env = [
{
name = "DATABASE_URL"
value = "postgresql://affine:${var.affine_postgresql_password}@${var.postgresql_host}:5432/affine"
value = "postgresql://affine:${data.vault_kv_secret_v2.secrets.data["db_password"]}@${var.postgresql_host}:5432/affine"
},
{
name = "REDIS_SERVER_HOST"
@ -70,7 +74,7 @@ locals {
},
{
name = "MAILER_PASSWORD"
value = var.mailserver_accounts["info@viktorbarzin.me"]
value = local.mailserver_accounts["info@viktorbarzin.me"]
},
{
name = "MAILER_SENDER"

View file

@ -2,7 +2,6 @@
variable "kube_config_path" {
type = string
default = "~/.kube/config"
sensitive = true
}
provider "kubernetes" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -3,9 +3,13 @@ variable "tls_secret_name" {
sensitive = true
}
variable "nfs_server" { type = string }
variable "homepage_credentials" {
type = map(any)
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "audiobookshelf"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
@ -205,6 +209,6 @@ module "ingress" {
"gethomepage.dev/pod-selector" = ""
"gethomepage.dev/widget.type" = "audiobookshelf"
"gethomepage.dev/widget.url" = "http://audiobookshelf.audiobookshelf.svc.cluster.local"
"gethomepage.dev/widget.key" = var.homepage_credentials["audiobookshelf"]["token"]
"gethomepage.dev/widget.key" = local.homepage_credentials["audiobookshelf"]["token"]
}
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,12 +2,17 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "homepage_credentials" {
type = map(any)
sensitive = true
}
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "calibre"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
resource "kubernetes_namespace" "calibre" {
metadata {
@ -194,6 +199,24 @@ resource "kubernetes_deployment" "calibre-web-automated" {
port {
container_port = 8083
}
# Startup probe: allow up to 10 min for calibre binary install on first boot
startup_probe {
http_get {
path = "/"
port = 8083
}
initial_delay_seconds = 30
period_seconds = 10
failure_threshold = 54
}
liveness_probe {
http_get {
path = "/"
port = 8083
}
period_seconds = 30
failure_threshold = 3
}
resources {
requests = {
cpu = "50m"
@ -274,8 +297,8 @@ module "ingress" {
"gethomepage.dev/name" = "Calibre"
"gethomepage.dev/widget.type" = "calibreweb"
"gethomepage.dev/widget.url" = "http://calibre.calibre.svc.cluster.local"
"gethomepage.dev/widget.username" = var.homepage_credentials["calibre-web"]["username"]
"gethomepage.dev/widget.password" = var.homepage_credentials["calibre-web"]["password"]
"gethomepage.dev/widget.username" = local.homepage_credentials["calibre-web"]["username"]
"gethomepage.dev/widget.password" = local.homepage_credentials["calibre-web"]["password"]
"gethomepage.dev/pod-selector" = ""
# gethomepage.dev/weight: 10 # optional
# gethomepage.dev/instance: "public" # optional

View file

@ -1,8 +1,22 @@
# Generated by Terragrunt. Sig: nIlQXj57tbuaRZEa
terraform {
required_providers {
vault = {
source = "hashicorp/vault"
version = "~> 4.0"
}
}
}
variable "kube_config_path" {
type = string
default = "~/.kube/config"
}
variable "vault_root_token" {
type = string
sensitive = true
default = ""
}
provider "kubernetes" {
@ -14,3 +28,9 @@ provider "helm" {
config_path = var.kube_config_path
}
}
provider "vault" {
address = "https://vault.viktorbarzin.me"
token = var.vault_root_token
skip_child_token = true
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -3,9 +3,13 @@ variable "tls_secret_name" {
sensitive = true
}
variable "nfs_server" { type = string }
variable "homepage_credentials" {
type = map(any)
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "changedetection"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
@ -171,6 +175,6 @@ module "ingress" {
"gethomepage.dev/pod-selector" = ""
"gethomepage.dev/widget.type" = "changedetectionio"
"gethomepage.dev/widget.url" = "http://changedetection.changedetection.svc.cluster.local"
"gethomepage.dev/widget.key" = var.homepage_credentials["changedetection"]["api_key"]
"gethomepage.dev/widget.key" = local.homepage_credentials["changedetection"]["api_key"]
}
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -3,17 +3,14 @@ variable "tls_secret_name" {
sensitive = true
}
variable "postgresql_host" { type = string }
variable "dbaas_postgresql_root_password" {
type = string
sensitive = true
}
variable "claude_memory_db_password" {
type = string
sensitive = true
}
variable "claude_memory_api_key" {
type = string
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "claude-memory"
}
resource "kubernetes_namespace" "claude-memory" {
@ -48,11 +45,11 @@ resource "kubernetes_job" "db_init" {
"sh", "-c",
<<-EOT
set -e
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_roles WHERE rolname='claude_memory'" | grep -q 1 || \
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -c "CREATE ROLE claude_memory WITH LOGIN PASSWORD '${var.claude_memory_db_password}'"
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_database WHERE datname='claude_memory'" | grep -q 1 || \
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -c "CREATE DATABASE claude_memory OWNER claude_memory"
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -c "GRANT ALL PRIVILEGES ON DATABASE claude_memory TO claude_memory"
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_roles WHERE rolname='claude_memory'" | grep -q 1 || \
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -c "CREATE ROLE claude_memory WITH LOGIN PASSWORD '${var.claude_memory_db_password}'"
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_database WHERE datname='claude_memory'" | grep -q 1 || \
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -c "CREATE DATABASE claude_memory OWNER claude_memory"
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -c "GRANT ALL PRIVILEGES ON DATABASE claude_memory TO claude_memory"
echo "Database init complete"
EOT
]
@ -79,7 +76,7 @@ resource "kubernetes_deployment" "claude-memory" {
}
}
spec {
replicas = 1
replicas = 2
selector {
match_labels = {
app = "claude-memory"
@ -92,6 +89,18 @@ resource "kubernetes_deployment" "claude-memory" {
}
}
spec {
affinity {
pod_anti_affinity {
required_during_scheduling_ignored_during_execution {
label_selector {
match_labels = {
app = "claude-memory"
}
}
topology_key = "kubernetes.io/hostname"
}
}
}
container {
name = "claude-memory"
image = "viktorbarzin/claude-memory-mcp:latest"
@ -106,9 +115,17 @@ resource "kubernetes_deployment" "claude-memory" {
}
env {
name = "API_KEY"
value = var.claude_memory_api_key
value = data.vault_kv_secret_v2.secrets.data["api_key"]
}
startup_probe {
http_get {
path = "/health"
port = 8000
}
failure_threshold = 30
period_seconds = 2
}
liveness_probe {
http_get {
path = "/health"
@ -146,6 +163,21 @@ resource "kubernetes_deployment" "claude-memory" {
}
}
resource "kubernetes_pod_disruption_budget_v1" "claude-memory" {
metadata {
name = "claude-memory"
namespace = kubernetes_namespace.claude-memory.metadata[0].name
}
spec {
min_available = "1"
selector {
match_labels = {
app = "claude-memory"
}
}
}
}
resource "kubernetes_service" "claude-memory" {
metadata {
name = "claude-memory"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,12 +2,12 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "coturn_turn_secret" {
type = string
sensitive = true
}
variable "public_ip" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "coturn"
}
locals {
turn_realm = "viktorbarzin.me"
@ -45,7 +45,7 @@ resource "kubernetes_config_map" "coturn_config" {
fingerprint
lt-cred-mech
use-auth-secret
static-auth-secret=${var.coturn_turn_secret}
static-auth-secret=${data.vault_kv_secret_v2.secrets.data["turn_secret"]}
realm=${local.turn_realm}
server-name=turn.${local.turn_realm}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,15 +2,6 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "dawarich_database_password" {
type = string
sensitive = true
}
variable "geoapify_api_key" {
type = string
sensitive = true
}
variable "image_version" {
type = string
@ -20,6 +11,11 @@ variable "nfs_server" { type = string }
variable "redis_host" { type = string }
variable "postgresql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "dawarich"
}
resource "kubernetes_namespace" "dawarich" {
metadata {
name = "dawarich"
@ -97,7 +93,7 @@ resource "kubernetes_deployment" "dawarich" {
}
env {
name = "DATABASE_PASSWORD"
value = var.dawarich_database_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "DATABASE_NAME"
@ -178,7 +174,7 @@ resource "kubernetes_deployment" "dawarich" {
# }
# env {
# name = "DATABASE_PASSWORD"
# value = var.dawarich_database_password
# value = data.vault_kv_secret_v2.secrets.data["db_password"]
# }
# env {
# name = "DATABASE_NAME"
@ -219,7 +215,7 @@ resource "kubernetes_deployment" "dawarich" {
# # }
# env {
# name = "GEOAPIFY_API_KEY"
# value = var.geoapify_api_key
# value = data.vault_kv_secret_v2.secrets.data["geoapify_api_key"]
# }
# env {
# name = "SELF_HOSTED"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,13 +2,12 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "diun_nfty_token" {
type = string
sensitive = true
}
variable "diun_slack_url" { type = string }
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "diun"
}
resource "kubernetes_namespace" "diun" {
metadata {
@ -154,11 +153,11 @@ resource "kubernetes_deployment" "diun" {
# }
# env {
# name = "DIUN_NOTIF_NTFY_TOKEN"
# value = var.diun_nfty_token
# value = data.vault_kv_secret_v2.secrets.data["nfty_token"]
# }
env {
name = "DIUN_NOTIF_SLACK_WEBHOOKURL"
value = var.diun_slack_url
value = data.vault_kv_secret_v2.secrets.data["slack_url"]
}
env {
name = "LOG_LEVEL"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -3,13 +3,13 @@ variable "tls_secret_name" {
sensitive = true
}
variable "nfs_server" { type = string }
variable "discord_user_token" {
type = string
sensitive = true
}
variable "discord_f1_guild_id" { type = string }
variable "discord_f1_channel_ids" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "f1-stream"
}
resource "kubernetes_namespace" "f1-stream" {
metadata {
@ -70,7 +70,7 @@ resource "kubernetes_deployment" "f1-stream" {
}
env {
name = "DISCORD_TOKEN"
value = var.discord_user_token
value = data.vault_kv_secret_v2.secrets.data["discord_user_token"]
}
env {
name = "DISCORD_CHANNELS"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -3,12 +3,11 @@ variable "tls_secret_name" {
sensitive = true
}
variable "nfs_server" { type = string }
variable "forgejo_authentik_client_id" { type = string }
variable "forgejo_authentik_client_secret" {
type = string
sensitive = true
}
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "forgejo"
}
resource "kubernetes_namespace" "forgejo" {
metadata {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,9 +2,13 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "freedify_credentials" {
type = map(any)
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "freedify"
}
locals {
credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["credentials"])
}
@ -40,11 +44,11 @@ module "viktor" {
depends_on = [kubernetes_namespace.freedify]
tier = local.tiers.aux
protected = true
listenbrainz_token = lookup(var.freedify_credentials["viktor"], "listenbrainz_token", null)
genius_token = lookup(var.freedify_credentials["viktor"], "genius_token", null)
dab_session = lookup(var.freedify_credentials["viktor"], "dab_session", null)
dab_visitor_id = lookup(var.freedify_credentials["viktor"], "dab_visitor_id", null)
gemini_api_key = lookup(var.freedify_credentials["viktor"], "gemini_api_key", null)
listenbrainz_token = lookup(local.credentials["viktor"], "listenbrainz_token", null)
genius_token = lookup(local.credentials["viktor"], "genius_token", null)
dab_session = lookup(local.credentials["viktor"], "dab_session", null)
dab_visitor_id = lookup(local.credentials["viktor"], "dab_visitor_id", null)
gemini_api_key = lookup(local.credentials["viktor"], "gemini_api_key", null)
extra_annotations = {
"gethomepage.dev/enabled" = "true"
"gethomepage.dev/name" = "Freedify (Viktor)"
@ -64,8 +68,8 @@ module "emo" {
depends_on = [kubernetes_namespace.freedify]
tier = local.tiers.aux
protected = true
genius_token = lookup(var.freedify_credentials["emo"], "genius_token", null)
gemini_api_key = lookup(var.freedify_credentials["emo"], "gemini_api_key", null)
genius_token = lookup(local.credentials["emo"], "genius_token", null)
gemini_api_key = lookup(local.credentials["emo"], "gemini_api_key", null)
extra_annotations = {
"gethomepage.dev/enabled" = "true"
"gethomepage.dev/name" = "Freedify (Emo)"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -3,9 +3,13 @@ variable "tls_secret_name" {
sensitive = true
}
variable "nfs_server" { type = string }
variable "homepage_credentials" {
type = map(any)
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "freshrss"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
@ -159,7 +163,7 @@ module "ingress" {
"gethomepage.dev/pod-selector" = ""
"gethomepage.dev/widget.type" = "freshrss"
"gethomepage.dev/widget.url" = "http://freshrss.freshrss.svc.cluster.local"
"gethomepage.dev/widget.username" = var.homepage_credentials["freshrss"]["username"]
"gethomepage.dev/widget.password" = var.homepage_credentials["freshrss"]["password"]
"gethomepage.dev/widget.username" = local.homepage_credentials["freshrss"]["username"]
"gethomepage.dev/widget.password" = local.homepage_credentials["freshrss"]["password"]
}
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,8 +2,16 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "mailserver_accounts" { type = map(any) }
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "grampsweb"
}
locals {
mailserver_accounts = jsondecode(data.vault_kv_secret_v2.secrets.data["mailserver_accounts"])
}
variable "redis_host" { type = string }
variable "ollama_host" { type = string }
variable "mail_host" { type = string }
@ -81,7 +89,7 @@ locals {
},
{
name = "GRAMPSWEB_EMAIL_HOST_PASSWORD"
value = var.mailserver_accounts["info@viktorbarzin.me"]
value = local.mailserver_accounts["info@viktorbarzin.me"]
},
{
name = "GRAMPSWEB_EMAIL_USE_SSL"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -1,13 +1,13 @@
variable "hackmd_db_password" {
type = string
sensitive = true
}
variable "tls_secret_name" {
type = string
}
variable "nfs_server" { type = string }
variable "mysql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "hackmd"
}
resource "kubernetes_namespace" "hackmd" {
metadata {
@ -103,7 +103,7 @@ resource "kubernetes_deployment" "hackmd" {
env {
name = "CMD_DB_URL"
# value = format("%s%s%s", "postgres://codimd:", var.hackmd_db_password, "@localhost/codimd")
value = format("%s%s%s", "mysql://codimd:", var.hackmd_db_password, "@${var.mysql_host}/codimd")
value = format("%s%s%s", "mysql://codimd:", data.vault_kv_secret_v2.secrets.data["db_password"], "@${var.mysql_host}/codimd")
}
env {
name = "CMD_USECDN"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,17 +2,13 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "health_postgresql_password" {
type = string
sensitive = true
}
variable "health_secret_key" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
variable "postgresql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "health"
}
resource "kubernetes_namespace" "health" {
metadata {
@ -70,11 +66,11 @@ resource "kubernetes_deployment" "health" {
env {
name = "DATABASE_URL"
value = "postgresql+asyncpg://health:${var.health_postgresql_password}@${var.postgresql_host}:5432/health"
value = "postgresql+asyncpg://health:${data.vault_kv_secret_v2.secrets.data["db_password"]}@${var.postgresql_host}:5432/health"
}
env {
name = "SECRET_KEY"
value = var.health_secret_key
value = data.vault_kv_secret_v2.secrets.data["secret_key"]
}
env {
name = "UPLOAD_DIR"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -23,7 +23,7 @@ resource "kubernetes_config_map" "mailserver_config" {
ShowProgressBar: false
Accounts:
- ImmichServerUrl: http://immich.viktorbarzin.me
ApiKey: ${var.immich_frame_api_key}
ApiKey: ${data.vault_kv_secret_v2.secrets.data["frame_api_key"]}
Albums:
- 1aa98849-bbd5-452b-aac0-310b210a8597 # china
EOF

View file

@ -2,17 +2,13 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "immich_postgresql_password" {
type = string
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "immich"
}
variable "immich_frame_api_key" {
type = string
sensitive = true
}
variable "homepage_credentials" {
type = map(any)
sensitive = true
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
@ -168,7 +164,7 @@ resource "kubernetes_deployment" "immich_server" {
}
env {
name = "DB_PASSWORD"
value = var.immich_postgresql_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "IMMICH_MACHINE_LEARNING_URL"
@ -357,7 +353,7 @@ resource "kubernetes_deployment" "immich-postgres" {
}
env {
name = "POSTGRES_PASSWORD"
value = var.immich_postgresql_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "POSTGRES_USER"
@ -428,7 +424,7 @@ resource "kubernetes_service" "immich-postgresql" {
# version = "0.9.3"
# timeout = 6000
# values = [templatefile("${path.module}/chart_values.tpl", { postgresql_password = var.immich_postgresql_password, version = var.immich_version })]
# values = [templatefile("${path.module}/chart_values.tpl", { postgresql_password = data.vault_kv_secret_v2.secrets.data["db_password"], version = var.immich_version })]
# }
# The helm one cannot be customized to use affinity settings to use the gpu node
@ -595,7 +591,7 @@ module "ingress-immich" {
"gethomepage.dev/widget.url" = "http://immich-server.immich.svc.cluster.local:2283"
"gethomepage.dev/widget.version" = "2"
"gethomepage.dev/pod-selector" = ""
"gethomepage.dev/widget.key" = var.homepage_credentials["immich"]["token"]
"gethomepage.dev/widget.key" = local.homepage_credentials["immich"]["token"]
}
}
@ -625,7 +621,7 @@ resource "kubernetes_cron_job_v1" "postgresql-backup" {
image = "postgres:16.4-bullseye"
command = ["/bin/sh", "-c", <<-EOT
export now=$(date +"%Y_%m_%d_%H_%M")
PGPASSWORD=${var.immich_postgresql_password} pg_dumpall -h immich-postgresql -U immich > /backup/dump_$now.sql
PGPASSWORD=${data.vault_kv_secret_v2.secrets.data["db_password"]} pg_dumpall -h immich-postgresql -U immich > /backup/dump_$now.sql
# Rotate - delete last log file
cd /backup
@ -710,7 +706,7 @@ resource "kubernetes_cron_job_v1" "postgresql-backup" {
# }
# env {
# name = "DB_PASSWORD"
# value = var.immich_postgresql_password
# value = data.vault_kv_secret_v2.secrets.data["db_password"]
# }
# env {
# name = "DB_HOST"

View file

@ -2,7 +2,6 @@
variable "kube_config_path" {
type = string
default = "~/.kube/config"
sensitive = true
}
provider "kubernetes" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,19 +2,15 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "linkwarden_postgresql_password" {
type = string
sensitive = true
}
variable "linkwarden_authentik_client_id" { type = string }
variable "linkwarden_authentik_client_secret" {
type = string
sensitive = true
}
variable "postgresql_host" { type = string }
variable "homepage_credentials" {
type = map(any)
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "linkwarden"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
@ -78,7 +74,7 @@ resource "kubernetes_deployment" "linkwarden" {
}
env {
name = "DATABASE_URL"
value = "postgresql://linkwarden:${var.linkwarden_postgresql_password}@${var.postgresql_host}:5432/linkwarden"
value = "postgresql://linkwarden:${data.vault_kv_secret_v2.secrets.data["db_password"]}@${var.postgresql_host}:5432/linkwarden"
}
env {
name = "NEXT_PUBLIC_AUTHENTIK_ENABLED"
@ -98,11 +94,11 @@ resource "kubernetes_deployment" "linkwarden" {
}
env {
name = "AUTHENTIK_CLIENT_ID"
value = var.linkwarden_authentik_client_id
value = data.vault_kv_secret_v2.secrets.data["authentik_client_id"]
}
env {
name = "AUTHENTIK_CLIENT_SECRET"
value = var.linkwarden_authentik_client_secret
value = data.vault_kv_secret_v2.secrets.data["authentik_client_secret"]
}
resources {
requests = {
@ -153,6 +149,6 @@ module "ingress" {
"gethomepage.dev/pod-selector" = ""
"gethomepage.dev/widget.type" = "linkwarden"
"gethomepage.dev/widget.url" = "http://linkwarden.linkwarden.svc.cluster.local"
"gethomepage.dev/widget.key" = var.homepage_credentials["linkwarden"]["api_key"]
"gethomepage.dev/widget.key" = local.homepage_credentials["linkwarden"]["api_key"]
}
}

View file

@ -2,7 +2,6 @@
variable "kube_config_path" {
type = string
default = "~/.kube/config"
sensitive = true
}
provider "kubernetes" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,13 +2,13 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "n8n_postgresql_password" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
variable "postgresql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "n8n"
}
module "tls_secret" {
source = "../../modules/kubernetes/setup_tls_secret"
@ -125,7 +125,7 @@ resource "kubernetes_deployment" "n8n" {
}
env {
name = "DB_POSTGRESDB_PASSWORD"
value = var.n8n_postgresql_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "GENERIC_TIMEZONE"

View file

@ -2,7 +2,6 @@
variable "kube_config_path" {
type = string
default = "~/.kube/config"
sensitive = true
}
provider "kubernetes" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -3,9 +3,13 @@ variable "tls_secret_name" {
sensitive = true
}
variable "nfs_server" { type = string }
variable "homepage_credentials" {
type = map(any)
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "navidrome"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
@ -164,8 +168,8 @@ module "ingress" {
"gethomepage.dev/pod-selector" = ""
"gethomepage.dev/widget.type" = "navidrome"
"gethomepage.dev/widget.url" = "http://navidrome.navidrome.svc.cluster.local"
"gethomepage.dev/widget.user" = var.homepage_credentials["navidrome"]["user"]
"gethomepage.dev/widget.token" = var.homepage_credentials["navidrome"]["token"]
"gethomepage.dev/widget.salt" = var.homepage_credentials["navidrome"]["salt"]
"gethomepage.dev/widget.user" = local.homepage_credentials["navidrome"]["user"]
"gethomepage.dev/widget.token" = local.homepage_credentials["navidrome"]["token"]
"gethomepage.dev/widget.salt" = local.homepage_credentials["navidrome"]["salt"]
}
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,18 +2,14 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "netbox_db_password" {
type = string
sensitive = true
}
variable "netbox_superuser_password" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
variable "redis_host" { type = string }
variable "postgresql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "netbox"
}
resource "kubernetes_namespace" "netbox" {
metadata {
@ -81,7 +77,7 @@ resource "kubernetes_deployment" "netbox" {
}
env {
name = "DB_PASSWORD"
value = var.netbox_db_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "DB_HOST"
@ -117,7 +113,7 @@ resource "kubernetes_deployment" "netbox" {
}
env {
name = "SUPERUSER_PASSWORD"
value = var.netbox_superuser_password
value = data.vault_kv_secret_v2.secrets.data["superuser_password"]
}
env {
name = "REMOTE_AUTH_ENABLED"

View file

@ -2,7 +2,6 @@
variable "kube_config_path" {
type = string
default = "~/.kube/config"
sensitive = true
}
provider "kubernetes" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,16 +2,17 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "nextcloud_db_password" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
variable "redis_host" { type = string }
variable "mysql_host" { type = string }
variable "homepage_credentials" {
type = map(any)
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "nextcloud"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
@ -79,7 +80,7 @@ resource "helm_release" "nextcloud" {
atomic = true
version = "8.8.1"
values = [templatefile("${path.module}/chart_values.yaml", { tls_secret_name = var.tls_secret_name, db_password = var.nextcloud_db_password, redis_host = var.redis_host, mysql_host = var.mysql_host })]
values = [templatefile("${path.module}/chart_values.yaml", { tls_secret_name = var.tls_secret_name, db_password = data.vault_kv_secret_v2.secrets.data["db_password"], redis_host = var.redis_host, mysql_host = var.mysql_host })]
timeout = 6000
}
@ -182,7 +183,7 @@ resource "kubernetes_deployment" "whiteboard" {
}
env {
name = "JWT_SECRET_KEY"
value = var.nextcloud_db_password # anything secret is fine
value = data.vault_kv_secret_v2.secrets.data["db_password"] # anything secret is fine
}
}
}
@ -227,8 +228,8 @@ module "ingress" {
"gethomepage.dev/pod-selector" = ""
"gethomepage.dev/widget.type" = "nextcloud"
"gethomepage.dev/widget.url" = "https://nextcloud.viktorbarzin.me"
"gethomepage.dev/widget.username" = var.homepage_credentials["nextcloud"]["username"]
"gethomepage.dev/widget.password" = var.homepage_credentials["nextcloud"]["password"]
"gethomepage.dev/widget.username" = local.homepage_credentials["nextcloud"]["username"]
"gethomepage.dev/widget.password" = local.homepage_credentials["nextcloud"]["password"]
}
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,13 +2,18 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "ollama_api_credentials" {
type = map(string)
sensitive = true
}
variable "nfs_server" { type = string }
variable "ollama_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "ollama"
}
locals {
api_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["api_credentials"])
}
resource "kubernetes_namespace" "ollama" {
metadata {
@ -167,11 +172,11 @@ module "ollama-ingress" {
# Ollama API ingress for external access (basicAuth protected)
locals {
ollama_api_htpasswd = join("\n", [for name, pass in var.ollama_api_credentials : "${name}:${bcrypt(pass, 10)}"])
ollama_api_htpasswd = join("\n", [for name, pass in local.api_credentials : "${name}:${bcrypt(pass, 10)}"])
}
resource "kubernetes_secret" "ollama_api_basic_auth" {
count = length(var.ollama_api_credentials) > 0 ? 1 : 0
count = length(local.api_credentials) > 0 ? 1 : 0
metadata {
name = "ollama-api-basic-auth-secret"
namespace = kubernetes_namespace.ollama.metadata[0].name
@ -188,7 +193,7 @@ resource "kubernetes_secret" "ollama_api_basic_auth" {
}
resource "kubernetes_manifest" "ollama_api_basic_auth_middleware" {
count = length(var.ollama_api_credentials) > 0 ? 1 : 0
count = length(local.api_credentials) > 0 ? 1 : 0
manifest = {
apiVersion = "traefik.io/v1alpha1"
kind = "Middleware"

View file

@ -2,7 +2,6 @@
variable "kube_config_path" {
type = string
default = "~/.kube/config"
sensitive = true
}
provider "kubernetes" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,18 +2,14 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "onlyoffice_db_password" {
type = string
sensitive = true
}
variable "onlyoffice_jwt_token" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
variable "redis_host" { type = string }
variable "mysql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "onlyoffice"
}
resource "kubernetes_namespace" "onlyoffice" {
metadata {
@ -140,7 +136,7 @@ resource "kubernetes_deployment" "onlyoffice-document-server" {
}
env {
name = "DB_PWD"
value = var.onlyoffice_db_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "REDIS_SERVER_HOST"
@ -152,7 +148,7 @@ resource "kubernetes_deployment" "onlyoffice-document-server" {
}
env {
name = "JWT_SECRET"
value = var.onlyoffice_jwt_token
value = data.vault_kv_secret_v2.secrets.data["jwt_token"]
}
volume_mount {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,48 +2,17 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "openclaw_ssh_key" {
type = string
sensitive = true
}
variable "openclaw_skill_secrets" {
type = map(string)
sensitive = true
}
variable "llama_api_key" {
type = string
sensitive = true
}
variable "brave_api_key" {
type = string
sensitive = true
}
variable "openrouter_api_key" {
type = string
sensitive = true
}
variable "nvidia_api_key" {
type = string
sensitive = true
}
variable "anthropic_api_key" {
type = string
sensitive = true
}
variable "openclaw_telegram_bot_token" {
type = string
sensitive = true
}
variable "forgejo_api_token" {
type = string
sensitive = true
}
variable "claude_memory_api_key" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "openclaw"
}
locals {
skill_secrets = jsondecode(data.vault_kv_secret_v2.secrets.data["skill_secrets"])
}
resource "kubernetes_namespace" "openclaw" {
metadata {
@ -89,7 +58,7 @@ resource "kubernetes_secret" "ssh_key" {
namespace = kubernetes_namespace.openclaw.metadata[0].name
}
data = {
"id_rsa" = var.openclaw_ssh_key
"id_rsa" = data.vault_kv_secret_v2.secrets.data["ssh_key"]
}
type = "generic"
}
@ -166,7 +135,7 @@ resource "kubernetes_config_map" "openclaw_config" {
search = {
enabled = true
provider = "brave"
apiKey = var.brave_api_key
apiKey = data.vault_kv_secret_v2.secrets.data["brave_api_key"]
maxResults = 5
}
fetch = {
@ -192,7 +161,7 @@ resource "kubernetes_config_map" "openclaw_config" {
channels = {
telegram = {
enabled = true
botToken = var.openclaw_telegram_bot_token
botToken = data.vault_kv_secret_v2.secrets.data["telegram_bot_token"]
dmPolicy = "allowlist"
allowFrom = ["tg:8281953845"]
groupPolicy = "allowlist"
@ -213,7 +182,7 @@ resource "kubernetes_config_map" "openclaw_config" {
anthropic = {
baseUrl = "https://api.anthropic.com/v1"
api = "anthropic-messages"
apiKey = var.anthropic_api_key
apiKey = data.vault_kv_secret_v2.secrets.data["anthropic_api_key"]
models = [
{ id = "claude-sonnet-4-20250514", name = "Claude Sonnet 4", reasoning = true, input = ["text", "image"], contextWindow = 200000, maxTokens = 16384, cost = { input = 0.003, output = 0.015, cacheRead = 0.0003, cacheWrite = 0.00375 } },
{ id = "claude-opus-4-20250514", name = "Claude Opus 4", reasoning = true, input = ["text", "image"], contextWindow = 200000, maxTokens = 16384, cost = { input = 0.015, output = 0.075, cacheRead = 0.0015, cacheWrite = 0.01875 } },
@ -223,7 +192,7 @@ resource "kubernetes_config_map" "openclaw_config" {
nim = {
baseUrl = "https://integrate.api.nvidia.com/v1"
api = "openai-completions"
apiKey = var.nvidia_api_key
apiKey = data.vault_kv_secret_v2.secrets.data["nvidia_api_key"]
models = [
{ id = "deepseek-ai/deepseek-v3.2", name = "DeepSeek V3.2", reasoning = false, input = ["text"], contextWindow = 164000, maxTokens = 16384, cost = { input = 0, output = 0, cacheRead = 0, cacheWrite = 0 } },
{ id = "qwen/qwen3.5-397b-a17b", name = "Qwen 3.5", reasoning = true, input = ["text"], contextWindow = 262000, maxTokens = 16384, cost = { input = 0, output = 0, cacheRead = 0, cacheWrite = 0 } },
@ -236,7 +205,7 @@ resource "kubernetes_config_map" "openclaw_config" {
openrouter = {
baseUrl = "https://openrouter.ai/api/v1"
api = "openai-completions"
apiKey = var.openrouter_api_key
apiKey = data.vault_kv_secret_v2.secrets.data["openrouter_api_key"]
models = [
{ id = "stepfun/step-3.5-flash:free", name = "Step 3.5 Flash", reasoning = true, input = ["text"], contextWindow = 256000, maxTokens = 16384, cost = { input = 0, output = 0, cacheRead = 0, cacheWrite = 0 } },
{ id = "arcee-ai/trinity-large-preview:free", name = "Trinity Large", reasoning = false, input = ["text"], contextWindow = 131000, maxTokens = 16384, cost = { input = 0, output = 0, cacheRead = 0, cacheWrite = 0 } },
@ -244,7 +213,7 @@ resource "kubernetes_config_map" "openclaw_config" {
}
llama-as-openai = {
baseUrl = "https://api.llama.com/compat/v1"
apiKey = var.llama_api_key
apiKey = data.vault_kv_secret_v2.secrets.data["llama_api_key"]
api = "openai-completions"
models = [
{ id = "Llama-4-Maverick-17B-128E-Instruct-FP8", name = "Llama 4 Maverick", reasoning = false, input = ["text"], contextWindow = 200000, maxTokens = 16384, cost = { input = 0, output = 0, cacheRead = 0, cacheWrite = 0 } },
@ -574,7 +543,7 @@ resource "kubernetes_deployment" "openclaw" {
}
env {
name = "HOME_ASSISTANT_TOKEN"
value = var.openclaw_skill_secrets["home_assistant_token"]
value = local.skill_secrets["home_assistant_token"]
}
env {
name = "HOME_ASSISTANT_SOFIA_URL"
@ -582,17 +551,17 @@ resource "kubernetes_deployment" "openclaw" {
}
env {
name = "HOME_ASSISTANT_SOFIA_TOKEN"
value = var.openclaw_skill_secrets["home_assistant_sofia_token"]
value = local.skill_secrets["home_assistant_sofia_token"]
}
# Skill secrets - Uptime Kuma
env {
name = "UPTIME_KUMA_PASSWORD"
value = var.openclaw_skill_secrets["uptime_kuma_password"]
value = local.skill_secrets["uptime_kuma_password"]
}
# Skill secrets - Slack
env {
name = "SLACK_WEBHOOK_URL"
value = var.openclaw_skill_secrets["slack_webhook"]
value = local.skill_secrets["slack_webhook"]
}
# Memory API
env {
@ -601,7 +570,7 @@ resource "kubernetes_deployment" "openclaw" {
}
env {
name = "MEMORY_API_KEY"
value = var.claude_memory_api_key
value = data.vault_kv_secret_v2.secrets.data["claude_memory_api_key"]
}
# Python packages path for skills
env {
@ -659,11 +628,11 @@ resource "kubernetes_deployment" "openclaw" {
}
env {
name = "NVIDIA_API_KEY"
value = var.nvidia_api_key
value = data.vault_kv_secret_v2.secrets.data["nvidia_api_key"]
}
env {
name = "OPENROUTER_API_KEY"
value = var.openrouter_api_key
value = data.vault_kv_secret_v2.secrets.data["openrouter_api_key"]
}
volume_mount {
name = "tools"
@ -1122,11 +1091,11 @@ resource "kubernetes_cron_job_v1" "task_processor" {
env {
name = "FORGEJO_TOKEN"
value = var.forgejo_api_token
value = data.vault_kv_secret_v2.secrets.data["forgejo_api_token"]
}
env {
name = "OPENCLAW_TOKEN"
value = var.nvidia_api_key
value = data.vault_kv_secret_v2.secrets.data["nvidia_api_key"]
}
resources {

View file

@ -2,7 +2,6 @@
variable "kube_config_path" {
type = string
default = "~/.kube/config"
sensitive = true
}
provider "kubernetes" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,12 +2,17 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "owntracks_credentials" {
type = map(string)
sensitive = true
}
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "owntracks"
}
locals {
credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["credentials"])
}
resource "kubernetes_namespace" "owntracks" {
metadata {
@ -27,7 +32,7 @@ module "tls_secret" {
locals {
username = "owntracks"
htpasswd = join("\n", [for name, pass in var.owntracks_credentials : "${name}:${bcrypt(pass, 10)}"])
htpasswd = join("\n", [for name, pass in local.credentials : "${name}:${bcrypt(pass, 10)}"])
}
resource "kubernetes_secret" "basic_auth" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,18 +2,19 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "paperless_db_password" {
type = string
sensitive = true
}
variable "homepage_credentials" {
type = map(any)
sensitive = true
}
variable "nfs_server" { type = string }
variable "redis_host" { type = string }
variable "mysql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "paperless-ngx"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
resource "kubernetes_namespace" "paperless-ngx" {
metadata {
@ -104,7 +105,7 @@ resource "kubernetes_deployment" "paperless-ngx" {
}
env {
name = "PAPERLESS_DBPASS"
value = var.paperless_db_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "PAPERLESS_CSRF_TRUSTED_ORIGINS"
@ -191,8 +192,8 @@ module "ingress" {
"gethomepage.dev/widget.type" = "paperlessngx"
"gethomepage.dev/widget.url" = "http://paperless-ngx.paperless-ngx.svc.cluster.local"
# "gethomepage.dev/widget.token" = var.homepage_token
"gethomepage.dev/widget.username" = var.homepage_credentials["paperless-ngx"]["username"]
"gethomepage.dev/widget.password" = var.homepage_credentials["paperless-ngx"]["password"]
"gethomepage.dev/widget.username" = local.homepage_credentials["paperless-ngx"]["username"]
"gethomepage.dev/widget.password" = local.homepage_credentials["paperless-ngx"]["password"]
"gethomepage.dev/widget.fields" = "[\"total\"]"
"gethomepage.dev/pod-selector" = ""
# gethomepage.dev/weight: 10 # optional

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -21,7 +21,7 @@
# Variable Declarations
# =============================================================================
# --- Core ---
# --- Core (non-secret, from config.tfvars) ---
variable "tls_secret_name" {
type = string
}
@ -35,91 +35,15 @@ variable "prod" {
type = bool
default = false
}
# --- dbaas ---
variable "dbaas_root_password" {
type = string
sensitive = true
}
variable "dbaas_postgresql_root_password" {
type = string
sensitive = true
}
variable "dbaas_pgadmin_password" {
type = string
sensitive = true
}
# --- traefik ---
variable "ingress_crowdsec_api_key" {
type = string
sensitive = true
}
variable "auth_fallback_htpasswd" {
type = string
sensitive = true
default = ""
}
# --- technitium ---
variable "technitium_db_password" {
type = string
sensitive = true
}
variable "homepage_credentials" {
type = map(any)
sensitive = true
}
# --- headscale ---
variable "headscale_config" { type = string }
variable "headscale_acl" { type = string }
variable "k8s_ca_cert" {
type = string
default = ""
}
# --- authentik / rbac / k8s-portal ---
variable "authentik_secret_key" {
type = string
sensitive = true
}
variable "authentik_postgres_password" {
type = string
sensitive = true
}
variable "k8s_users" {
type = map(any)
default = {}
}
variable "ssh_private_key" {
type = string
default = ""
sensitive = true
}
# --- crowdsec ---
variable "crowdsec_enroll_key" { type = string }
variable "crowdsec_db_password" {
type = string
sensitive = true
}
variable "crowdsec_dash_api_key" {
type = string
sensitive = true
}
variable "crowdsec_dash_machine_id" { type = string }
variable "crowdsec_dash_machine_password" {
type = string
sensitive = true
}
variable "alertmanager_slack_api_url" { type = string }
# --- cloudflared ---
variable "cloudflare_api_key" {
type = string
sensitive = true
}
variable "cloudflare_email" { type = string }
variable "cloudflare_account_id" { type = string }
variable "cloudflare_zone_id" { type = string }
@ -127,91 +51,23 @@ variable "cloudflare_tunnel_id" { type = string }
variable "public_ip" { type = string }
variable "cloudflare_proxied_names" {}
variable "cloudflare_non_proxied_names" {}
variable "cloudflare_tunnel_token" {
type = string
sensitive = true
}
# --- monitoring ---
variable "alertmanager_account_password" {
type = string
sensitive = true
}
variable "monitoring_idrac_username" { type = string }
variable "monitoring_idrac_password" {
type = string
sensitive = true
}
variable "tiny_tuya_service_secret" {
type = string
sensitive = true
}
variable "haos_api_token" {
type = string
sensitive = true
}
variable "pve_password" {
type = string
sensitive = true
}
variable "grafana_db_password" {
type = string
sensitive = true
}
variable "grafana_admin_password" {
type = string
sensitive = true
# --- Vault KV secrets ---
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "platform"
}
# --- vaultwarden ---
variable "vaultwarden_smtp_password" {
type = string
sensitive = true
}
# --- wireguard ---
variable "wireguard_wg_0_conf" { type = string }
variable "wireguard_wg_0_key" { type = string }
variable "wireguard_firewall_sh" { type = string }
# --- xray ---
variable "xray_reality_clients" { type = list(map(string)) }
variable "xray_reality_private_key" {
type = string
sensitive = true
}
variable "xray_reality_short_ids" { type = list(string) }
# --- mailserver ---
variable "mailserver_accounts" {}
variable "mailserver_aliases" {}
variable "mailserver_opendkim_key" {}
variable "mailserver_sasl_passwd" {}
variable "mailserver_roundcubemail_db_password" {
type = string
sensitive = true
}
# --- infra-maintenance ---
variable "webhook_handler_git_user" { type = string }
variable "webhook_handler_git_token" {
type = string
sensitive = true
}
variable "technitium_username" { type = string }
variable "technitium_password" {
type = string
sensitive = true
}
# --- iscsi-csi ---
variable "truenas_api_key" {
type = string
sensitive = true
}
variable "truenas_ssh_private_key" {
type = string
sensitive = true
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
k8s_users = jsondecode(data.vault_kv_secret_v2.secrets.data["k8s_users"])
xray_reality_clients = jsondecode(data.vault_kv_secret_v2.secrets.data["xray_reality_clients"])
xray_reality_short_ids = jsondecode(data.vault_kv_secret_v2.secrets.data["xray_reality_short_ids"])
mailserver_accounts = jsondecode(data.vault_kv_secret_v2.secrets.data["mailserver_accounts"])
mailserver_aliases = jsondecode(data.vault_kv_secret_v2.secrets.data["mailserver_aliases"])
mailserver_opendkim_key = jsondecode(data.vault_kv_secret_v2.secrets.data["mailserver_opendkim_key"])
mailserver_sasl_passwd = jsondecode(data.vault_kv_secret_v2.secrets.data["mailserver_sasl_passwd"])
}
# =============================================================================
@ -234,9 +90,9 @@ module "dbaas" {
prod = var.prod
tls_secret_name = var.tls_secret_name
nfs_server = var.nfs_server
dbaas_root_password = var.dbaas_root_password
postgresql_root_password = var.dbaas_postgresql_root_password
pgadmin_password = var.dbaas_pgadmin_password
dbaas_root_password = data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]
postgresql_root_password = data.vault_kv_secret_v2.secrets.data["dbaas_postgresql_root_password"]
pgadmin_password = data.vault_kv_secret_v2.secrets.data["dbaas_pgadmin_password"]
kube_config_path = var.kube_config_path
tier = local.tiers.cluster
}
@ -257,10 +113,10 @@ module "redis" {
module "traefik" {
source = "./modules/traefik"
tier = local.tiers.core
crowdsec_api_key = var.ingress_crowdsec_api_key
crowdsec_api_key = data.vault_kv_secret_v2.secrets.data["ingress_crowdsec_api_key"]
redis_host = var.redis_host
tls_secret_name = var.tls_secret_name
auth_fallback_htpasswd = var.auth_fallback_htpasswd
auth_fallback_htpasswd = data.vault_kv_secret_v2.secrets.data["auth_fallback_htpasswd"]
}
# -----------------------------------------------------------------------------
@ -271,10 +127,10 @@ module "technitium" {
tls_secret_name = var.tls_secret_name
nfs_server = var.nfs_server
mysql_host = var.mysql_host
homepage_token = var.homepage_credentials["technitium"]["token"]
technitium_db_password = var.technitium_db_password
technitium_username = var.technitium_username
technitium_password = var.technitium_password
homepage_token = local.homepage_credentials["technitium"]["token"]
technitium_db_password = data.vault_kv_secret_v2.secrets.data["technitium_db_password"]
technitium_username = data.vault_kv_secret_v2.secrets.data["technitium_username"]
technitium_password = data.vault_kv_secret_v2.secrets.data["technitium_password"]
tier = local.tiers.core
}
@ -285,9 +141,9 @@ module "headscale" {
source = "./modules/headscale"
tls_secret_name = var.tls_secret_name
nfs_server = var.nfs_server
headscale_config = var.headscale_config
headscale_acl = var.headscale_acl
homepage_token = try(var.homepage_credentials["headscale"]["api_key"], "")
headscale_config = data.vault_kv_secret_v2.secrets.data["headscale_config"]
headscale_acl = data.vault_kv_secret_v2.secrets.data["headscale_acl"]
homepage_token = try(local.homepage_credentials["headscale"]["api_key"], "")
tier = local.tiers.core
}
@ -298,10 +154,10 @@ module "authentik" {
source = "./modules/authentik"
tier = local.tiers.cluster
tls_secret_name = var.tls_secret_name
secret_key = var.authentik_secret_key
postgres_password = var.authentik_postgres_password
secret_key = data.vault_kv_secret_v2.secrets.data["authentik_secret_key"]
postgres_password = data.vault_kv_secret_v2.secrets.data["authentik_postgres_password"]
redis_host = var.redis_host
homepage_token = try(var.homepage_credentials["authentik"]["token"], "")
homepage_token = try(local.homepage_credentials["authentik"]["token"], "")
}
# -----------------------------------------------------------------------------
@ -311,7 +167,7 @@ module "rbac" {
source = "./modules/rbac"
tier = local.tiers.cluster
tls_secret_name = var.tls_secret_name
k8s_users = var.k8s_users
k8s_users = local.k8s_users
ssh_private_key = var.ssh_private_key
}
@ -333,14 +189,14 @@ module "crowdsec" {
tier = local.tiers.cluster
tls_secret_name = var.tls_secret_name
mysql_host = var.mysql_host
homepage_username = var.homepage_credentials["crowdsec"]["username"]
homepage_password = var.homepage_credentials["crowdsec"]["password"]
enroll_key = var.crowdsec_enroll_key
db_password = var.crowdsec_db_password
crowdsec_dash_api_key = var.crowdsec_dash_api_key
crowdsec_dash_machine_id = var.crowdsec_dash_machine_id
crowdsec_dash_machine_password = var.crowdsec_dash_machine_password
slack_webhook_url = var.alertmanager_slack_api_url
homepage_username = local.homepage_credentials["crowdsec"]["username"]
homepage_password = local.homepage_credentials["crowdsec"]["password"]
enroll_key = data.vault_kv_secret_v2.secrets.data["crowdsec_enroll_key"]
db_password = data.vault_kv_secret_v2.secrets.data["crowdsec_db_password"]
crowdsec_dash_api_key = data.vault_kv_secret_v2.secrets.data["crowdsec_dash_api_key"]
crowdsec_dash_machine_id = data.vault_kv_secret_v2.secrets.data["crowdsec_dash_machine_id"]
crowdsec_dash_machine_password = data.vault_kv_secret_v2.secrets.data["crowdsec_dash_machine_password"]
slack_webhook_url = data.vault_kv_secret_v2.secrets.data["alertmanager_slack_api_url"]
}
# -----------------------------------------------------------------------------
@ -351,15 +207,15 @@ module "monitoring" {
tls_secret_name = var.tls_secret_name
nfs_server = var.nfs_server
mysql_host = var.mysql_host
alertmanager_account_password = var.alertmanager_account_password
alertmanager_account_password = data.vault_kv_secret_v2.secrets.data["alertmanager_account_password"]
idrac_username = var.monitoring_idrac_username
idrac_password = var.monitoring_idrac_password
alertmanager_slack_api_url = var.alertmanager_slack_api_url
tiny_tuya_service_secret = var.tiny_tuya_service_secret
haos_api_token = var.haos_api_token
pve_password = var.pve_password
grafana_db_password = var.grafana_db_password
grafana_admin_password = var.grafana_admin_password
idrac_password = data.vault_kv_secret_v2.secrets.data["monitoring_idrac_password"]
alertmanager_slack_api_url = data.vault_kv_secret_v2.secrets.data["alertmanager_slack_api_url"]
tiny_tuya_service_secret = data.vault_kv_secret_v2.secrets.data["tiny_tuya_service_secret"]
haos_api_token = data.vault_kv_secret_v2.secrets.data["haos_api_token"]
pve_password = data.vault_kv_secret_v2.secrets.data["pve_password"]
grafana_db_password = data.vault_kv_secret_v2.secrets.data["grafana_db_password"]
grafana_admin_password = data.vault_kv_secret_v2.secrets.data["grafana_admin_password"]
tier = local.tiers.cluster
}
@ -371,7 +227,7 @@ module "vaultwarden" {
tls_secret_name = var.tls_secret_name
nfs_server = var.nfs_server
mail_host = var.mail_host
smtp_password = var.vaultwarden_smtp_password
smtp_password = data.vault_kv_secret_v2.secrets.data["vaultwarden_smtp_password"]
tier = local.tiers.edge
}
@ -381,9 +237,9 @@ module "vaultwarden" {
module "reverse-proxy" {
source = "./modules/reverse_proxy"
tls_secret_name = var.tls_secret_name
truenas_homepage_token = var.homepage_credentials["reverse_proxy"]["truenas_token"]
pfsense_homepage_token = var.homepage_credentials["reverse_proxy"]["pfsense_token"]
haos_homepage_token = try(var.homepage_credentials["home_assistant"]["token"], "")
truenas_homepage_token = local.homepage_credentials["reverse_proxy"]["truenas_token"]
pfsense_homepage_token = local.homepage_credentials["reverse_proxy"]["pfsense_token"]
haos_homepage_token = try(local.homepage_credentials["home_assistant"]["token"], "")
}
# -----------------------------------------------------------------------------
@ -420,8 +276,8 @@ module "iscsi-csi" {
source = "./modules/iscsi-csi"
tier = local.tiers.cluster
truenas_host = var.nfs_server # Same TrueNAS host
truenas_api_key = var.truenas_api_key
truenas_ssh_private_key = var.truenas_ssh_private_key
truenas_api_key = data.vault_kv_secret_v2.secrets.data["truenas_api_key"]
truenas_ssh_private_key = data.vault_kv_secret_v2.secrets.data["truenas_ssh_private_key"]
}
# -----------------------------------------------------------------------------
@ -472,9 +328,9 @@ module "uptime-kuma" {
module "wireguard" {
source = "./modules/wireguard"
tls_secret_name = var.tls_secret_name
wg_0_conf = var.wireguard_wg_0_conf
wg_0_key = var.wireguard_wg_0_key
firewall_sh = var.wireguard_firewall_sh
wg_0_conf = data.vault_kv_secret_v2.secrets.data["wireguard_wg_0_conf"]
wg_0_key = data.vault_kv_secret_v2.secrets.data["wireguard_wg_0_key"]
firewall_sh = data.vault_kv_secret_v2.secrets.data["wireguard_firewall_sh"]
tier = local.tiers.core
}
@ -486,9 +342,9 @@ module "xray" {
tls_secret_name = var.tls_secret_name
tier = local.tiers.core
xray_reality_clients = var.xray_reality_clients
xray_reality_private_key = var.xray_reality_private_key
xray_reality_short_ids = var.xray_reality_short_ids
xray_reality_clients = local.xray_reality_clients
xray_reality_private_key = data.vault_kv_secret_v2.secrets.data["xray_reality_private_key"]
xray_reality_short_ids = local.xray_reality_short_ids
}
# -----------------------------------------------------------------------------
@ -499,11 +355,11 @@ module "mailserver" {
tls_secret_name = var.tls_secret_name
nfs_server = var.nfs_server
mysql_host = var.mysql_host
mailserver_accounts = var.mailserver_accounts
postfix_account_aliases = var.mailserver_aliases
opendkim_key = var.mailserver_opendkim_key
sasl_passwd = var.mailserver_sasl_passwd
roundcube_db_password = var.mailserver_roundcubemail_db_password
mailserver_accounts = local.mailserver_accounts
postfix_account_aliases = local.mailserver_aliases
opendkim_key = local.mailserver_opendkim_key
sasl_passwd = local.mailserver_sasl_passwd
roundcube_db_password = data.vault_kv_secret_v2.secrets.data["mailserver_roundcubemail_db_password"]
tier = local.tiers.edge
}
@ -515,7 +371,7 @@ module "cloudflared" {
tier = local.tiers.core
tls_secret_name = var.tls_secret_name
cloudflare_api_key = var.cloudflare_api_key
cloudflare_api_key = data.vault_kv_secret_v2.secrets.data["cloudflare_api_key"]
cloudflare_email = var.cloudflare_email
cloudflare_account_id = var.cloudflare_account_id
cloudflare_zone_id = var.cloudflare_zone_id
@ -523,7 +379,7 @@ module "cloudflared" {
public_ip = var.public_ip
cloudflare_proxied_names = var.cloudflare_proxied_names
cloudflare_non_proxied_names = var.cloudflare_non_proxied_names
cloudflare_tunnel_token = var.cloudflare_tunnel_token
cloudflare_tunnel_token = data.vault_kv_secret_v2.secrets.data["cloudflare_tunnel_token"]
}
# -----------------------------------------------------------------------------
@ -532,10 +388,10 @@ module "cloudflared" {
module "infra-maintenance" {
source = "./modules/infra-maintenance"
nfs_server = var.nfs_server
git_user = var.webhook_handler_git_user
git_token = var.webhook_handler_git_token
technitium_username = var.technitium_username
technitium_password = var.technitium_password
git_user = data.vault_kv_secret_v2.secrets.data["webhook_handler_git_user"]
git_token = data.vault_kv_secret_v2.secrets.data["webhook_handler_git_token"]
technitium_username = data.vault_kv_secret_v2.secrets.data["technitium_username"]
technitium_password = data.vault_kv_secret_v2.secrets.data["technitium_password"]
}
# =============================================================================

View file

@ -7,3 +7,8 @@ dependency "infra" {
config_path = "../infra"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,10 +2,6 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "plotting_book_session_secret" {
type = string
sensitive = true
}
variable "plotting_book_google_client_id" {
type = string
sensitive = true
@ -15,6 +11,10 @@ variable "plotting_book_google_client_secret" {
sensitive = true
}
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "plotting-book"
}
resource "kubernetes_namespace" "plotting-book" {
metadata {
@ -92,7 +92,7 @@ resource "kubernetes_deployment" "plotting-book" {
image_pull_policy = "Always"
env {
name = "SESSION_SECRET"
value = var.plotting_book_session_secret
value = data.vault_kv_secret_v2.secrets.data["session_secret"]
}
env {
name = "GOOGLE_CLIENT_ID"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,15 +2,19 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "realestate_crawler_db_password" {
type = string
sensitive = true
}
variable "realestate_crawler_notification_settings" { type = map(string) }
variable "nfs_server" { type = string }
variable "redis_host" { type = string }
variable "mysql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "real-estate-crawler"
}
locals {
notification_settings = jsondecode(data.vault_kv_secret_v2.secrets.data["notification_settings"])
}
resource "kubernetes_namespace" "realestate-crawler" {
metadata {
@ -150,7 +154,7 @@ resource "kubernetes_deployment" "realestate-crawler-api" {
}
env {
name = "DB_CONNECTION_STRING"
value = "mysql://wrongmove:${var.realestate_crawler_db_password}@${var.mysql_host}:3306/wrongmove"
value = "mysql://wrongmove:${data.vault_kv_secret_v2.secrets.data["db_password"]}@${var.mysql_host}:3306/wrongmove"
}
# env {
@ -188,7 +192,7 @@ resource "kubernetes_deployment" "realestate-crawler-api" {
}
env {
name = "SLACK_WEBHOOK_URL"
value = var.realestate_crawler_notification_settings["slack"]
value = local.notification_settings["slack"]
}
env {
name = "WEBAUTHN_RP_ID"
@ -339,7 +343,7 @@ resource "kubernetes_deployment" "realestate-crawler-celery" {
}
env {
name = "DB_CONNECTION_STRING"
value = "mysql://wrongmove:${var.realestate_crawler_db_password}@${var.mysql_host}:3306/wrongmove"
value = "mysql://wrongmove:${data.vault_kv_secret_v2.secrets.data["db_password"]}@${var.mysql_host}:3306/wrongmove"
}
env {
name = "CELERY_BROKER_URL"
@ -351,7 +355,7 @@ resource "kubernetes_deployment" "realestate-crawler-celery" {
}
env {
name = "SLACK_WEBHOOK_URL"
value = lookup(var.realestate_crawler_notification_settings, "slack", "")
value = lookup(local.notification_settings, "slack", "")
}
env {
name = "OSRM_FOOT_URL"
@ -447,7 +451,7 @@ resource "kubernetes_deployment" "realestate-crawler-celery-beat" {
}
env {
name = "DB_CONNECTION_STRING"
value = "mysql://wrongmove:${var.realestate_crawler_db_password}@${var.mysql_host}:3306/wrongmove"
value = "mysql://wrongmove:${data.vault_kv_secret_v2.secrets.data["db_password"]}@${var.mysql_host}:3306/wrongmove"
}
env {
name = "CELERY_BROKER_URL"
@ -459,7 +463,7 @@ resource "kubernetes_deployment" "realestate-crawler-celery-beat" {
}
env {
name = "SCRAPE_SCHEDULES"
value = lookup(var.realestate_crawler_notification_settings, "scrape_schedules", "")
value = lookup(local.notification_settings, "scrape_schedules", "")
}
volume_mount {
name = "data"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -3,18 +3,18 @@ variable "tls_secret_name" {
sensitive = true
}
variable "resume_database_url" { type = string }
variable "resume_auth_secret" {
type = string
sensitive = true
}
variable "mailserver_accounts" { type = map(any) }
variable "nfs_server" { type = string }
variable "mail_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "resume"
}
locals {
namespace = "resume"
app_url = "https://resume.viktorbarzin.me"
mailserver_accounts = jsondecode(data.vault_kv_secret_v2.secrets.data["mailserver_accounts"])
}
resource "kubernetes_namespace" "resume" {
@ -186,7 +186,7 @@ resource "kubernetes_deployment" "resume" {
}
env {
name = "AUTH_SECRET"
value = var.resume_auth_secret
value = data.vault_kv_secret_v2.secrets.data["auth_secret"]
}
# Server config
@ -210,7 +210,7 @@ resource "kubernetes_deployment" "resume" {
}
env {
name = "SMTP_PASS"
value = var.mailserver_accounts["info@viktorbarzin.me"]
value = local.mailserver_accounts["info@viktorbarzin.me"]
}
env {
name = "SMTP_FROM"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,17 +2,13 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "clickhouse_password" {
type = string
sensitive = true
}
variable "clickhouse_postgres_password" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
variable "postgresql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "rybbit"
}
resource "kubernetes_namespace" "rybbit" {
metadata {
@ -82,7 +78,7 @@ resource "kubernetes_deployment" "clickhouse" {
}
env {
name = "CLICKHOUSE_PASSWORD"
value = var.clickhouse_password
value = data.vault_kv_secret_v2.secrets.data["clickhouse_password"]
}
port {
name = "clickhouse"
@ -180,12 +176,12 @@ resource "kubernetes_cron_job_v1" "clickhouse_truncate_logs" {
command = [
"sh", "-c",
join(" && ", [
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${var.clickhouse_password}' -d 'TRUNCATE TABLE IF EXISTS system.metric_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${var.clickhouse_password}' -d 'TRUNCATE TABLE IF EXISTS system.trace_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${var.clickhouse_password}' -d 'TRUNCATE TABLE IF EXISTS system.text_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${var.clickhouse_password}' -d 'TRUNCATE TABLE IF EXISTS system.asynchronous_metric_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${var.clickhouse_password}' -d 'TRUNCATE TABLE IF EXISTS system.query_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${var.clickhouse_password}' -d 'TRUNCATE TABLE IF EXISTS system.part_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${data.vault_kv_secret_v2.secrets.data["clickhouse_password"]}' -d 'TRUNCATE TABLE IF EXISTS system.metric_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${data.vault_kv_secret_v2.secrets.data["clickhouse_password"]}' -d 'TRUNCATE TABLE IF EXISTS system.trace_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${data.vault_kv_secret_v2.secrets.data["clickhouse_password"]}' -d 'TRUNCATE TABLE IF EXISTS system.text_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${data.vault_kv_secret_v2.secrets.data["clickhouse_password"]}' -d 'TRUNCATE TABLE IF EXISTS system.asynchronous_metric_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${data.vault_kv_secret_v2.secrets.data["clickhouse_password"]}' -d 'TRUNCATE TABLE IF EXISTS system.query_log'",
"curl -s 'http://clickhouse.rybbit.svc.cluster.local:8123/?user=default&password=${data.vault_kv_secret_v2.secrets.data["clickhouse_password"]}' -d 'TRUNCATE TABLE IF EXISTS system.part_log'",
"echo 'System logs truncated'"
])
]
@ -242,7 +238,7 @@ resource "kubernetes_deployment" "rybbit" {
}
env {
name = "CLICKHOUSE_PASSWORD"
value = var.clickhouse_password
value = data.vault_kv_secret_v2.secrets.data["clickhouse_password"]
}
env {
name = "POSTGRES_HOST"
@ -262,7 +258,7 @@ resource "kubernetes_deployment" "rybbit" {
}
env {
name = "POSTGRES_PASSWORD"
value = var.clickhouse_postgres_password
value = data.vault_kv_secret_v2.secrets.data["postgres_password"]
}
env {
name = "BASE_URL"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,11 +2,15 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "aiostreams_database_connection_string" { type = string }
variable "nfs_server" { type = string }
variable "homepage_credentials" {
type = map(any)
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "servarr"
}
locals {
homepage_credentials = jsondecode(data.vault_kv_secret_v2.secrets.data["homepage_credentials"])
}
@ -37,7 +41,7 @@ module "prowlarr" {
tls_secret_name = var.tls_secret_name
tier = local.tiers.aux
nfs_server = var.nfs_server
homepage_credentials = var.homepage_credentials
homepage_credentials = local.homepage_credentials
}
module "qbittorrent" {
@ -45,7 +49,7 @@ module "qbittorrent" {
tls_secret_name = var.tls_secret_name
tier = local.tiers.aux
nfs_server = var.nfs_server
homepage_credentials = var.homepage_credentials
homepage_credentials = local.homepage_credentials
}
module "flaresolverr" {
@ -76,7 +80,7 @@ module "listenarr" {
module "aiostreams" {
source = "./aiostreams"
tls_secret_name = var.tls_secret_name
aiostreams_database_connection_string = var.aiostreams_database_connection_string
aiostreams_database_connection_string = data.vault_kv_secret_v2.secrets.data["aiostreams_database_connection_string"]
tier = local.tiers.aux
nfs_server = var.nfs_server
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -1,9 +1,8 @@
variable "shadowsocks_password" {
type = string
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "shadowsocks"
}
variable "method" {
default = "chacha20-ietf-poly1305"
}
@ -57,7 +56,7 @@ resource "kubernetes_deployment" "shadowsocks" {
}
env {
name = "PASSWORD"
value = var.shadowsocks_password
value = data.vault_kv_secret_v2.secrets.data["password"]
}
port {
container_port = 8388

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,13 +2,13 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "speedtest_db_password" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
variable "mysql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "speedtest"
}
resource "kubernetes_namespace" "speedtest" {
metadata {
@ -109,7 +109,7 @@ resource "kubernetes_deployment" "speedtest" {
}
env {
name = "DB_PASSWORD"
value = var.speedtest_db_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "APP_TIMEZONE"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,10 +2,6 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "tandoor_database_password" {
type = string
sensitive = true
}
variable "tandoor_email_password" {
type = string
default = ""
@ -15,6 +11,10 @@ variable "nfs_server" { type = string }
variable "postgresql_host" { type = string }
variable "mail_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "tandoor"
}
resource "kubernetes_namespace" "tandoor" {
metadata {
@ -97,7 +97,7 @@ resource "kubernetes_deployment" "tandoor" {
}
env {
name = "POSTGRES_PASSWORD"
value = var.tandoor_database_password
value = data.vault_kv_secret_v2.secrets.data["db_password"]
}
env {
name = "TANDOOR_PORT"

View file

@ -2,7 +2,6 @@
variable "kube_config_path" {
type = string
default = "~/.kube/config"
sensitive = true
}
provider "kubernetes" {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -6,52 +6,23 @@ variable "nfs_server" { type = string }
variable "postgresql_host" { type = string }
variable "redis_host" { type = string }
variable "ollama_host" { type = string }
variable "dbaas_postgresql_root_password" {
type = string
sensitive = true
}
variable "trading_bot_db_password" {
type = string
sensitive = true
}
variable "trading_bot_alpaca_api_key" {
type = string
sensitive = true
}
variable "trading_bot_alpaca_secret_key" {
type = string
sensitive = true
}
variable "trading_bot_jwt_secret" {
type = string
sensitive = true
}
variable "trading_bot_reddit_client_id" { type = string }
variable "trading_bot_reddit_client_secret" {
type = string
sensitive = true
}
variable "trading_bot_alpha_vantage_api_key" {
type = string
sensitive = true
}
variable "trading_bot_fmp_api_key" {
type = string
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "trading-bot"
}
locals {
common_env = {
TRADING_DATABASE_URL = "postgresql+asyncpg://trading:${var.trading_bot_db_password}@${var.postgresql_host}:5432/trading"
TRADING_DATABASE_URL = "postgresql+asyncpg://trading:${data.vault_kv_secret_v2.secrets.data["db_password"]}@${var.postgresql_host}:5432/trading"
TRADING_REDIS_URL = "redis://${var.redis_host}:6379/4"
TRADING_LOG_LEVEL = "INFO"
TRADING_ALPACA_API_KEY = var.trading_bot_alpaca_api_key
TRADING_ALPACA_SECRET_KEY = var.trading_bot_alpaca_secret_key
TRADING_ALPACA_API_KEY = data.vault_kv_secret_v2.secrets.data["alpaca_api_key"]
TRADING_ALPACA_SECRET_KEY = data.vault_kv_secret_v2.secrets.data["alpaca_secret_key"]
TRADING_ALPACA_BASE_URL = "https://paper-api.alpaca.markets"
TRADING_PAPER_TRADING = "true"
TRADING_JWT_SECRET_KEY = var.trading_bot_jwt_secret
TRADING_REDDIT_CLIENT_ID = var.trading_bot_reddit_client_id
TRADING_REDDIT_CLIENT_SECRET = var.trading_bot_reddit_client_secret
TRADING_JWT_SECRET_KEY = data.vault_kv_secret_v2.secrets.data["jwt_secret"]
TRADING_REDDIT_CLIENT_ID = data.vault_kv_secret_v2.secrets.data["reddit_client_id"]
TRADING_REDDIT_CLIENT_SECRET = data.vault_kv_secret_v2.secrets.data["reddit_client_secret"]
TRADING_REDDIT_USER_AGENT = "trading-bot/0.1"
TRADING_OLLAMA_HOST = "http://${var.ollama_host}:11434"
TRADING_OLLAMA_MODEL = "gemma3"
@ -60,8 +31,8 @@ locals {
TRADING_POLL_INTERVAL_SECONDS = "60"
TRADING_HISTORICAL_BARS = "100"
TRADING_SNAPSHOT_INTERVAL_SECONDS = "60"
TRADING_ALPHA_VANTAGE_API_KEY = var.trading_bot_alpha_vantage_api_key
TRADING_FMP_API_KEY = var.trading_bot_fmp_api_key
TRADING_ALPHA_VANTAGE_API_KEY = data.vault_kv_secret_v2.secrets.data["alpha_vantage_api_key"]
TRADING_FMP_API_KEY = data.vault_kv_secret_v2.secrets.data["fmp_api_key"]
TRADING_FUNDAMENTALS_CACHE_TTL_HOURS = "24"
TRADING_RP_ID = "trading.viktorbarzin.me"
TRADING_RP_NAME = "Trading Bot"
@ -103,15 +74,15 @@ resource "kubernetes_job" "db_init" {
<<-EOT
set -e
# Create role if not exists
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_roles WHERE rolname='trading'" | grep -q 1 || \
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -c "CREATE ROLE trading WITH LOGIN PASSWORD '${var.trading_bot_db_password}'"
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_roles WHERE rolname='trading'" | grep -q 1 || \
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -c "CREATE ROLE trading WITH LOGIN PASSWORD '${data.vault_kv_secret_v2.secrets.data["db_password"]}'"
# Create database if not exists
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_database WHERE datname='trading'" | grep -q 1 || \
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -c "CREATE DATABASE trading OWNER trading"
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_database WHERE datname='trading'" | grep -q 1 || \
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -c "CREATE DATABASE trading OWNER trading"
# Grant privileges
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -c "GRANT ALL PRIVILEGES ON DATABASE trading TO trading"
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -c "GRANT ALL PRIVILEGES ON DATABASE trading TO trading"
# Try to enable timescaledb (allow failure)
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -d trading -c "CREATE EXTENSION IF NOT EXISTS timescaledb CASCADE" || true
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -d trading -c "CREATE EXTENSION IF NOT EXISTS timescaledb CASCADE" || true
echo "Database init complete"
EOT
]
@ -144,7 +115,7 @@ resource "kubernetes_job" "migrations" {
command = ["python", "-m", "alembic", "upgrade", "head"]
env {
name = "TRADING_DATABASE_URL"
value = "postgresql+asyncpg://trading:${var.trading_bot_db_password}@${var.postgresql_host}:5432/trading"
value = "postgresql+asyncpg://trading:${data.vault_kv_secret_v2.secrets.data["db_password"]}@${var.postgresql_host}:5432/trading"
}
env {
name = "TRADING_REDIS_URL"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,20 +2,11 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "tiny_tuya_api_key" {
type = string
sensitive = true
}
variable "tiny_tuya_api_secret" {
type = string
sensitive = true
}
variable "tiny_tuya_service_secret" {
type = string
sensitive = true
}
variable "tiny_tuya_slack_url" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "tuya-bridge"
}
resource "kubernetes_namespace" "tuya-bridge" {
metadata {
@ -64,19 +55,19 @@ resource "kubernetes_deployment" "tuya-bridge" {
}
env {
name = "TINYTUYA_API_KEY"
value = var.tiny_tuya_api_key
value = data.vault_kv_secret_v2.secrets.data["api_key"]
}
env {
name = "TINYTUYA_API_SECRET"
value = var.tiny_tuya_api_secret
value = data.vault_kv_secret_v2.secrets.data["api_secret"]
}
env {
name = "SERVICE_API_KEY" # used for auth the API endpoint
value = var.tiny_tuya_service_secret
value = data.vault_kv_secret_v2.secrets.data["service_secret"]
}
env {
name = "SLACK_URL"
value = var.tiny_tuya_slack_url
value = data.vault_kv_secret_v2.secrets.data["slack_url"]
}
resources {
requests = {

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,17 +2,12 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "url_shortener_geolite_license_key" { type = string }
variable "url_shortener_api_key" {
type = string
sensitive = true
}
variable "url_shortener_mysql_password" {
type = string
sensitive = true
}
variable "mysql_host" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "url"
}
## Setup
## Need to manually add
@ -50,7 +45,7 @@ resource "kubernetes_secret" "mysql_config" {
}
data = {
"DB_USER" = "shlink"
"DB_PASSWORD" = var.url_shortener_mysql_password
"DB_PASSWORD" = data.vault_kv_secret_v2.secrets.data["db_password"]
}
}
@ -120,7 +115,7 @@ resource "kubernetes_deployment" "shlink" {
}
env {
name = "GEOLITE_LICENSE_KEY"
value = var.url_shortener_geolite_license_key
value = data.vault_kv_secret_v2.secrets.data["geolite_license_key"]
}
# DB config
env {
@ -142,7 +137,7 @@ resource "kubernetes_deployment" "shlink" {
}
# env {
# name = "DB_PASSWORD"
# value = var.url_shortener_mysql_password
# value = data.vault_kv_secret_v2.secrets.data["db_password"]
# }
resources {
limits = {
@ -218,7 +213,7 @@ module "ingress" {
"gethomepage.dev/pod-selector" = ""
"gethomepage.dev/widget.type" = "shlink"
"gethomepage.dev/widget.url" = "http://shlink.shlink.svc.cluster.local:8080"
"gethomepage.dev/widget.key" = var.url_shortener_api_key
"gethomepage.dev/widget.key" = data.vault_kv_secret_v2.secrets.data["api_key"]
}
}
@ -239,7 +234,7 @@ resource "kubernetes_config_map" "shlink-web" {
"servers.json" = jsonencode([{
name = "Main"
url = "https://url.viktorbarzin.me"
apiKey = var.url_shortener_api_key
apiKey = data.vault_kv_secret_v2.secrets.data["api_key"]
}])
}
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -8,6 +8,10 @@ variable "vault_authentik_client_secret" {
type = string
sensitive = true
}
variable "nfs_server" {
type = string
}
resource "kubernetes_namespace" "vault" {
metadata {
name = "vault"
@ -30,30 +34,48 @@ resource "helm_release" "vault" {
repository = "https://helm.releases.hashicorp.com"
chart = "vault"
version = "0.29.1"
atomic = true
timeout = 300
atomic = false # HA pods start sealed readiness probes fail until unsealed
timeout = 600
values = [yamlencode({
global = {
enabled = true
}
global = { enabled = true }
server = {
enabled = true
resources = {
requests = { memory = "64Mi", cpu = "50m" }
limits = { memory = "256Mi" }
requests = { memory = "128Mi", cpu = "100m" }
limits = { memory = "512Mi" }
}
# Allow scheduling on GPU node (node1)
tolerations = [{
key = "nvidia.com/gpu"
operator = "Exists"
effect = "NoSchedule"
}]
dataStorage = {
enabled = true
size = "1Gi"
storageClass = "nfs-truenas"
size = "2Gi"
storageClass = "nfs-truenas" # NFS iSCSI CSI driver not available on all nodes
}
standalone = {
auditStorage = {
enabled = true
size = "2Gi"
storageClass = "nfs-truenas" # NFS fine for append-only audit logs
}
standalone = { enabled = false }
ha = {
enabled = true
replicas = 3
raft = {
enabled = true
setNodeId = true
config = <<-EOT
ui = true
@ -63,28 +85,60 @@ resource "helm_release" "vault" {
cluster_address = "[::]:8201"
}
storage "file" {
storage "raft" {
path = "/vault/data"
retry_join {
leader_api_addr = "http://vault-0.vault-internal:8200"
}
retry_join {
leader_api_addr = "http://vault-1.vault-internal:8200"
}
retry_join {
leader_api_addr = "http://vault-2.vault-internal:8200"
}
}
service_registration "kubernetes" {}
EOT
}
ha = {
enabled = false
}
}
ui = {
enabled = true
# Mount unseal key secret
extraVolumes = [{
type = "secret"
name = "vault-unseal-key"
}]
# Auto-unseal sidecar polls every 10s, unseals if sealed
extraContainers = [{
name = "auto-unseal"
image = "hashicorp/vault:1.18.1"
command = ["/bin/sh", "-c"]
args = [join("", [
"while true; do ",
"sealed=$(VAULT_ADDR=http://127.0.0.1:8200 vault status -format=json 2>/dev/null | grep '\"sealed\"' | grep -o 'true\\|false'); ",
"if [ \"$sealed\" = \"true\" ]; then ",
"echo \"$(date): Vault is sealed, unsealing...\"; ",
"VAULT_ADDR=http://127.0.0.1:8200 vault operator unseal $(cat /vault/unseal-key/unseal-key); ",
"fi; ",
"sleep 10; ",
"done"
])]
volumeMounts = [{
name = "userconfig-vault-unseal-key" # Helm chart prefixes extraVolumes with "userconfig-"
mountPath = "/vault/unseal-key"
readOnly = true
}]
resources = {
requests = { cpu = "10m", memory = "32Mi" }
limits = { memory = "64Mi" }
}
}]
}
injector = {
enabled = false
}
csi = {
enabled = false
}
ui = { enabled = true }
injector = { enabled = false }
csi = { enabled = false }
})]
}
@ -155,3 +209,715 @@ module "ingress" {
"gethomepage.dev/pod-selector" = ""
}
}
# --- Audit Logging ---
resource "vault_audit" "file" {
type = "file"
options = {
file_path = "/vault/audit/vault-audit.log"
}
depends_on = [helm_release.vault]
}
# --- Raft Snapshot Backups ---
module "vault_backup_nfs" {
source = "../../modules/kubernetes/nfs_volume"
name = "vault-backup"
namespace = kubernetes_namespace.vault.metadata[0].name
nfs_server = var.nfs_server
nfs_path = "/mnt/main/vault-backup"
storage = "5Gi"
}
resource "kubernetes_cron_job_v1" "vault_backup" {
metadata {
name = "vault-raft-backup"
namespace = kubernetes_namespace.vault.metadata[0].name
}
spec {
schedule = "0 2 * * *"
successful_jobs_history_limit = 3
failed_jobs_history_limit = 3
concurrency_policy = "Forbid"
job_template {
metadata {}
spec {
template {
metadata {}
spec {
container {
name = "backup"
image = "hashicorp/vault:1.18.1"
command = ["/bin/sh", "-c"]
args = [join("", [
"export VAULT_ADDR=http://vault-active.vault.svc.cluster.local:8200 && ",
"export VAULT_TOKEN=$(cat /vault/token/vault-root-token) && ",
"TIMESTAMP=$(date +%Y%m%d-%H%M%S) && ",
"vault operator raft snapshot save /backup/vault-raft-$TIMESTAMP.db && ",
"find /backup -name '*.db' -mtime +30 -delete && ",
"echo \"Backup done: vault-raft-$TIMESTAMP.db\" && ls -lh /backup/"
])]
volume_mount {
mount_path = "/backup"
name = "backup-storage"
}
volume_mount {
mount_path = "/vault/token"
name = "vault-token"
read_only = true
}
}
restart_policy = "OnFailure"
volume {
name = "backup-storage"
persistent_volume_claim {
claim_name = module.vault_backup_nfs.claim_name
}
}
volume {
name = "vault-token"
secret {
secret_name = "vault-root-token"
}
}
}
}
}
}
}
}
# =============================================================================
# Vault KV Secret Population
# =============================================================================
# Reads secrets from SOPS (-var-file) and writes them to Vault KV v2 at
# secret/<stack-name>. Consuming stacks read from Vault instead of SOPS.
# =============================================================================
# --- Variable Declarations (secrets consumed by other stacks) ---
# Simple string secrets
variable "speedtest_db_password" { type = string; sensitive = true }
variable "hackmd_db_password" { type = string; sensitive = true }
variable "n8n_postgresql_password" { type = string; sensitive = true }
variable "tandoor_database_password" { type = string; sensitive = true }
variable "shadowsocks_password" { type = string; sensitive = true }
variable "coturn_turn_secret" { type = string; sensitive = true }
variable "wealthfolio_password_hash" { type = string; sensitive = true }
variable "plotting_book_session_secret" { type = string; sensitive = true }
variable "discord_user_token" { type = string; sensitive = true }
variable "health_postgresql_password" { type = string; sensitive = true }
variable "health_secret_key" { type = string; sensitive = true }
variable "onlyoffice_db_password" { type = string; sensitive = true }
variable "onlyoffice_jwt_token" { type = string; sensitive = true }
variable "netbox_db_password" { type = string; sensitive = true }
variable "netbox_superuser_password" { type = string; sensitive = true }
variable "clickhouse_password" { type = string; sensitive = true }
variable "clickhouse_postgres_password" { type = string; sensitive = true }
variable "diun_nfty_token" { type = string; sensitive = true }
variable "diun_slack_url" { type = string; sensitive = true }
variable "forgejo_authentik_client_id" { type = string; sensitive = true }
variable "forgejo_authentik_client_secret" { type = string; sensitive = true }
variable "dawarich_database_password" { type = string; sensitive = true }
variable "geoapify_api_key" { type = string; sensitive = true }
variable "resume_auth_secret" { type = string; sensitive = true }
variable "url_shortener_api_key" { type = string; sensitive = true }
variable "url_shortener_geolite_license_key" { type = string; sensitive = true }
variable "url_shortener_mysql_password" { type = string; sensitive = true }
variable "linkwarden_authentik_client_id" { type = string; sensitive = true }
variable "linkwarden_authentik_client_secret" { type = string; sensitive = true }
variable "linkwarden_postgresql_password" { type = string; sensitive = true }
variable "tiny_tuya_api_key" { type = string; sensitive = true }
variable "tiny_tuya_api_secret" { type = string; sensitive = true }
variable "tiny_tuya_service_secret" { type = string; sensitive = true }
variable "tiny_tuya_slack_url" { type = string; sensitive = true }
variable "claude_memory_api_key" { type = string; sensitive = true }
variable "dbaas_postgresql_root_password" { type = string; sensitive = true }
variable "openrouter_api_key" { type = string; sensitive = true }
variable "slack_bot_token" { type = string; sensitive = true }
variable "woodpecker_agent_secret" { type = string; sensitive = true }
variable "woodpecker_db_password" { type = string; sensitive = true }
variable "woodpecker_forgejo_client_id" { type = string; sensitive = true }
variable "woodpecker_forgejo_client_secret" { type = string; sensitive = true }
variable "woodpecker_github_client_id" { type = string; sensitive = true }
variable "woodpecker_github_client_secret" { type = string; sensitive = true }
variable "webhook_handler_secret" { type = string; sensitive = true }
variable "webhook_handler_fb_verify_token" { type = string; sensitive = true }
variable "webhook_handler_fb_page_token" { type = string; sensitive = true }
variable "webhook_handler_fb_app_secret" { type = string; sensitive = true }
variable "webhook_handler_git_user" { type = string; sensitive = true }
variable "webhook_handler_git_token" { type = string; sensitive = true }
variable "webhook_handler_ssh_key" { type = string; sensitive = true }
variable "trading_bot_db_password" { type = string; sensitive = true }
variable "trading_bot_alpaca_api_key" { type = string; sensitive = true }
variable "trading_bot_alpaca_secret_key" { type = string; sensitive = true }
variable "trading_bot_jwt_secret" { type = string; sensitive = true }
variable "trading_bot_reddit_client_id" { type = string; sensitive = true }
variable "trading_bot_reddit_client_secret" { type = string; sensitive = true }
variable "trading_bot_alpha_vantage_api_key" { type = string; sensitive = true }
variable "trading_bot_fmp_api_key" { type = string; sensitive = true }
variable "openclaw_ssh_key" { type = string; sensitive = true }
variable "llama_api_key" { type = string; sensitive = true }
variable "brave_api_key" { type = string; sensitive = true }
variable "nvidia_api_key" { type = string; sensitive = true }
variable "anthropic_api_key" { type = string; sensitive = true }
variable "openclaw_telegram_bot_token" { type = string; sensitive = true }
variable "forgejo_api_token" { type = string; sensitive = true }
variable "affine_postgresql_password" { type = string; sensitive = true }
variable "immich_postgresql_password" { type = string; sensitive = true }
variable "immich_frame_api_key" { type = string; sensitive = true }
variable "nextcloud_db_password" { type = string; sensitive = true }
variable "paperless_db_password" { type = string; sensitive = true }
variable "realestate_crawler_db_password" { type = string; sensitive = true }
variable "aiostreams_database_connection_string" { type = string; sensitive = true }
# Platform-specific secrets
variable "dbaas_root_password" { type = string; sensitive = true }
variable "dbaas_pgadmin_password" { type = string; sensitive = true }
variable "ingress_crowdsec_api_key" { type = string; sensitive = true }
variable "auth_fallback_htpasswd" { type = string; sensitive = true; default = "" }
variable "technitium_db_password" { type = string; sensitive = true }
variable "authentik_secret_key" { type = string; sensitive = true }
variable "authentik_postgres_password" { type = string; sensitive = true }
variable "crowdsec_enroll_key" { type = string; sensitive = true }
variable "crowdsec_db_password" { type = string; sensitive = true }
variable "crowdsec_dash_api_key" { type = string; sensitive = true }
variable "crowdsec_dash_machine_id" { type = string; sensitive = true }
variable "crowdsec_dash_machine_password" { type = string; sensitive = true }
variable "alertmanager_slack_api_url" { type = string; sensitive = true }
variable "cloudflare_api_key" { type = string; sensitive = true }
variable "cloudflare_tunnel_token" { type = string; sensitive = true }
variable "alertmanager_account_password" { type = string; sensitive = true }
variable "monitoring_idrac_password" { type = string; sensitive = true }
variable "haos_api_token" { type = string; sensitive = true }
variable "pve_password" { type = string; sensitive = true }
variable "grafana_db_password" { type = string; sensitive = true }
variable "grafana_admin_password" { type = string; sensitive = true }
variable "vaultwarden_smtp_password" { type = string; sensitive = true }
variable "technitium_username" { type = string; sensitive = true }
variable "technitium_password" { type = string; sensitive = true }
variable "truenas_api_key" { type = string; sensitive = true }
variable "truenas_ssh_private_key" { type = string; sensitive = true }
variable "xray_reality_private_key" { type = string; sensitive = true }
variable "mailserver_roundcubemail_db_password" { type = string; sensitive = true }
variable "headscale_config" { type = string; sensitive = true }
variable "headscale_acl" { type = string; sensitive = true }
variable "wireguard_wg_0_conf" { type = string; sensitive = true }
variable "wireguard_wg_0_key" { type = string; sensitive = true }
variable "wireguard_firewall_sh" { type = string; sensitive = true }
# Complex type secrets
variable "homepage_credentials" { type = map(any); sensitive = true }
variable "mailserver_accounts" { sensitive = true }
variable "mailserver_aliases" { sensitive = true }
variable "mailserver_opendkim_key" { sensitive = true }
variable "mailserver_sasl_passwd" { sensitive = true }
variable "actualbudget_credentials" { type = map(any); sensitive = true }
variable "freedify_credentials" { type = map(any); sensitive = true }
variable "ollama_api_credentials" { type = map(string); sensitive = true }
variable "owntracks_credentials" { type = map(string); sensitive = true }
variable "realestate_crawler_notification_settings" { type = map(string); sensitive = true }
variable "openclaw_skill_secrets" { type = map(string); sensitive = true }
variable "k8s_users" { type = map(any); sensitive = true; default = {} }
variable "xray_reality_clients" { type = list(map(string)); sensitive = true }
variable "xray_reality_short_ids" { type = list(string); sensitive = true }
# =============================================================================
# KV Secret Resources one per consuming stack
# =============================================================================
resource "vault_kv_secret_v2" "speedtest" {
mount = "secret"
name = "speedtest"
data_json = jsonencode({
db_password = var.speedtest_db_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "hackmd" {
mount = "secret"
name = "hackmd"
data_json = jsonencode({
db_password = var.hackmd_db_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "n8n" {
mount = "secret"
name = "n8n"
data_json = jsonencode({
db_password = var.n8n_postgresql_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "tandoor" {
mount = "secret"
name = "tandoor"
data_json = jsonencode({
db_password = var.tandoor_database_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "shadowsocks" {
mount = "secret"
name = "shadowsocks"
data_json = jsonencode({
password = var.shadowsocks_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "coturn" {
mount = "secret"
name = "coturn"
data_json = jsonencode({
turn_secret = var.coturn_turn_secret
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "wealthfolio" {
mount = "secret"
name = "wealthfolio"
data_json = jsonencode({
password_hash = var.wealthfolio_password_hash
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "plotting-book" {
mount = "secret"
name = "plotting-book"
data_json = jsonencode({
session_secret = var.plotting_book_session_secret
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "f1-stream" {
mount = "secret"
name = "f1-stream"
data_json = jsonencode({
discord_user_token = var.discord_user_token
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "health" {
mount = "secret"
name = "health"
data_json = jsonencode({
db_password = var.health_postgresql_password
secret_key = var.health_secret_key
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "onlyoffice" {
mount = "secret"
name = "onlyoffice"
data_json = jsonencode({
db_password = var.onlyoffice_db_password
jwt_token = var.onlyoffice_jwt_token
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "netbox" {
mount = "secret"
name = "netbox"
data_json = jsonencode({
db_password = var.netbox_db_password
superuser_password = var.netbox_superuser_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "rybbit" {
mount = "secret"
name = "rybbit"
data_json = jsonencode({
clickhouse_password = var.clickhouse_password
postgres_password = var.clickhouse_postgres_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "diun" {
mount = "secret"
name = "diun"
data_json = jsonencode({
nfty_token = var.diun_nfty_token
slack_url = var.diun_slack_url
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "forgejo" {
mount = "secret"
name = "forgejo"
data_json = jsonencode({
authentik_client_id = var.forgejo_authentik_client_id
authentik_client_secret = var.forgejo_authentik_client_secret
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "dawarich" {
mount = "secret"
name = "dawarich"
data_json = jsonencode({
db_password = var.dawarich_database_password
geoapify_api_key = var.geoapify_api_key
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "resume" {
mount = "secret"
name = "resume"
data_json = jsonencode({
auth_secret = var.resume_auth_secret
mailserver_accounts = jsonencode(var.mailserver_accounts)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "url" {
mount = "secret"
name = "url"
data_json = jsonencode({
api_key = var.url_shortener_api_key
geolite_license_key = var.url_shortener_geolite_license_key
db_password = var.url_shortener_mysql_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "linkwarden" {
mount = "secret"
name = "linkwarden"
data_json = jsonencode({
authentik_client_id = var.linkwarden_authentik_client_id
authentik_client_secret = var.linkwarden_authentik_client_secret
db_password = var.linkwarden_postgresql_password
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "tuya-bridge" {
mount = "secret"
name = "tuya-bridge"
data_json = jsonencode({
api_key = var.tiny_tuya_api_key
api_secret = var.tiny_tuya_api_secret
service_secret = var.tiny_tuya_service_secret
slack_url = var.tiny_tuya_slack_url
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "claude-memory" {
mount = "secret"
name = "claude-memory"
data_json = jsonencode({
api_key = var.claude_memory_api_key
dbaas_root_password = var.dbaas_postgresql_root_password
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "ytdlp" {
mount = "secret"
name = "ytdlp"
data_json = jsonencode({
openrouter_api_key = var.openrouter_api_key
slack_bot_token = var.slack_bot_token
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "woodpecker" {
mount = "secret"
name = "woodpecker"
data_json = jsonencode({
dbaas_root_password = var.dbaas_postgresql_root_password
agent_secret = var.woodpecker_agent_secret
db_password = var.woodpecker_db_password
forgejo_client_id = var.woodpecker_forgejo_client_id
forgejo_client_secret = var.woodpecker_forgejo_client_secret
github_client_id = var.woodpecker_github_client_id
github_client_secret = var.woodpecker_github_client_secret
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "webhook_handler" {
mount = "secret"
name = "webhook-handler"
data_json = jsonencode({
secret = var.webhook_handler_secret
fb_verify_token = var.webhook_handler_fb_verify_token
fb_page_token = var.webhook_handler_fb_page_token
fb_app_secret = var.webhook_handler_fb_app_secret
git_user = var.webhook_handler_git_user
git_token = var.webhook_handler_git_token
ssh_key = var.webhook_handler_ssh_key
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "trading-bot" {
mount = "secret"
name = "trading-bot"
data_json = jsonencode({
dbaas_root_password = var.dbaas_postgresql_root_password
db_password = var.trading_bot_db_password
alpaca_api_key = var.trading_bot_alpaca_api_key
alpaca_secret_key = var.trading_bot_alpaca_secret_key
jwt_secret = var.trading_bot_jwt_secret
reddit_client_id = var.trading_bot_reddit_client_id
reddit_client_secret = var.trading_bot_reddit_client_secret
alpha_vantage_api_key = var.trading_bot_alpha_vantage_api_key
fmp_api_key = var.trading_bot_fmp_api_key
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "openclaw" {
mount = "secret"
name = "openclaw"
data_json = jsonencode({
ssh_key = var.openclaw_ssh_key
skill_secrets = jsonencode(var.openclaw_skill_secrets)
llama_api_key = var.llama_api_key
brave_api_key = var.brave_api_key
openrouter_api_key = var.openrouter_api_key
nvidia_api_key = var.nvidia_api_key
anthropic_api_key = var.anthropic_api_key
telegram_bot_token = var.openclaw_telegram_bot_token
forgejo_api_token = var.forgejo_api_token
claude_memory_api_key = var.claude_memory_api_key
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "affine" {
mount = "secret"
name = "affine"
data_json = jsonencode({
db_password = var.affine_postgresql_password
mailserver_accounts = jsonencode(var.mailserver_accounts)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "grampsweb" {
mount = "secret"
name = "grampsweb"
data_json = jsonencode({
mailserver_accounts = jsonencode(var.mailserver_accounts)
})
depends_on = [helm_release.vault]
}
# --- Homepage-only stacks ---
resource "vault_kv_secret_v2" "audiobookshelf" {
mount = "secret"
name = "audiobookshelf"
data_json = jsonencode({
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "calibre" {
mount = "secret"
name = "calibre"
data_json = jsonencode({
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "changedetection" {
mount = "secret"
name = "changedetection"
data_json = jsonencode({
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "freshrss" {
mount = "secret"
name = "freshrss"
data_json = jsonencode({
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "navidrome" {
mount = "secret"
name = "navidrome"
data_json = jsonencode({
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "servarr" {
mount = "secret"
name = "servarr"
data_json = jsonencode({
homepage_credentials = jsonencode(var.homepage_credentials)
aiostreams_database_connection_string = var.aiostreams_database_connection_string
})
depends_on = [helm_release.vault]
}
# --- Complex stacks (map secrets) ---
resource "vault_kv_secret_v2" "actualbudget" {
mount = "secret"
name = "actualbudget"
data_json = jsonencode({
credentials = jsonencode(var.actualbudget_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "freedify" {
mount = "secret"
name = "freedify"
data_json = jsonencode({
credentials = jsonencode(var.freedify_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "ollama" {
mount = "secret"
name = "ollama"
data_json = jsonencode({
api_credentials = jsonencode(var.ollama_api_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "owntracks" {
mount = "secret"
name = "owntracks"
data_json = jsonencode({
credentials = jsonencode(var.owntracks_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "real-estate-crawler" {
mount = "secret"
name = "real-estate-crawler"
data_json = jsonencode({
db_password = var.realestate_crawler_db_password
notification_settings = jsonencode(var.realestate_crawler_notification_settings)
})
depends_on = [helm_release.vault]
}
# --- Stacks with homepage_credentials + other secrets ---
resource "vault_kv_secret_v2" "immich" {
mount = "secret"
name = "immich"
data_json = jsonencode({
db_password = var.immich_postgresql_password
frame_api_key = var.immich_frame_api_key
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "nextcloud" {
mount = "secret"
name = "nextcloud"
data_json = jsonencode({
db_password = var.nextcloud_db_password
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
resource "vault_kv_secret_v2" "paperless-ngx" {
mount = "secret"
name = "paperless-ngx"
data_json = jsonencode({
db_password = var.paperless_db_password
homepage_credentials = jsonencode(var.homepage_credentials)
})
depends_on = [helm_release.vault]
}
# --- Platform stack (largest all core/cluster secrets) ---
resource "vault_kv_secret_v2" "platform" {
mount = "secret"
name = "platform"
data_json = jsonencode({
dbaas_root_password = var.dbaas_root_password
dbaas_postgresql_root_password = var.dbaas_postgresql_root_password
dbaas_pgadmin_password = var.dbaas_pgadmin_password
ingress_crowdsec_api_key = var.ingress_crowdsec_api_key
auth_fallback_htpasswd = var.auth_fallback_htpasswd
technitium_db_password = var.technitium_db_password
homepage_credentials = jsonencode(var.homepage_credentials)
headscale_config = var.headscale_config
headscale_acl = var.headscale_acl
authentik_secret_key = var.authentik_secret_key
authentik_postgres_password = var.authentik_postgres_password
k8s_users = jsonencode(var.k8s_users)
crowdsec_enroll_key = var.crowdsec_enroll_key
crowdsec_db_password = var.crowdsec_db_password
crowdsec_dash_api_key = var.crowdsec_dash_api_key
crowdsec_dash_machine_id = var.crowdsec_dash_machine_id
crowdsec_dash_machine_password = var.crowdsec_dash_machine_password
alertmanager_slack_api_url = var.alertmanager_slack_api_url
cloudflare_api_key = var.cloudflare_api_key
cloudflare_tunnel_token = var.cloudflare_tunnel_token
alertmanager_account_password = var.alertmanager_account_password
monitoring_idrac_password = var.monitoring_idrac_password
tiny_tuya_service_secret = var.tiny_tuya_service_secret
haos_api_token = var.haos_api_token
pve_password = var.pve_password
grafana_db_password = var.grafana_db_password
grafana_admin_password = var.grafana_admin_password
vaultwarden_smtp_password = var.vaultwarden_smtp_password
wireguard_wg_0_conf = var.wireguard_wg_0_conf
wireguard_wg_0_key = var.wireguard_wg_0_key
wireguard_firewall_sh = var.wireguard_firewall_sh
xray_reality_clients = jsonencode(var.xray_reality_clients)
xray_reality_private_key = var.xray_reality_private_key
xray_reality_short_ids = jsonencode(var.xray_reality_short_ids)
mailserver_accounts = jsonencode(var.mailserver_accounts)
mailserver_aliases = jsonencode(var.mailserver_aliases)
mailserver_opendkim_key = jsonencode(var.mailserver_opendkim_key)
mailserver_sasl_passwd = jsonencode(var.mailserver_sasl_passwd)
mailserver_roundcubemail_db_password = var.mailserver_roundcubemail_db_password
webhook_handler_git_user = var.webhook_handler_git_user
webhook_handler_git_token = var.webhook_handler_git_token
technitium_username = var.technitium_username
technitium_password = var.technitium_password
truenas_api_key = var.truenas_api_key
truenas_ssh_private_key = var.truenas_ssh_private_key
})
depends_on = [helm_release.vault]
}

View file

@ -1,18 +0,0 @@
terraform {
required_providers {
vault = {
source = "hashicorp/vault"
version = "~> 4.0"
}
}
}
variable "vault_root_token" {
type = string
sensitive = true
}
provider "vault" {
address = "https://vault.viktorbarzin.me"
token = var.vault_root_token
}

View file

@ -2,12 +2,12 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "wealthfolio_password_hash" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "wealthfolio"
}
# To refresh transactions use finance db positions exporters:
#
@ -80,7 +80,7 @@ resource "kubernetes_deployment" "wealthfolio" {
}
env {
name = "WF_AUTH_PASSWORD_HASH"
value = var.wealthfolio_password_hash
value = data.vault_kv_secret_v2.secrets.data["password_hash"]
}
env {
name = "WF_DB_PATH"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,30 +2,9 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "webhook_handler_secret" {
type = string
sensitive = true
}
variable "webhook_handler_fb_verify_token" {
type = string
sensitive = true
}
variable "webhook_handler_fb_page_token" {
type = string
sensitive = true
}
variable "webhook_handler_fb_app_secret" {
type = string
sensitive = true
}
variable "webhook_handler_git_user" { type = string }
variable "webhook_handler_git_token" {
type = string
sensitive = true
}
variable "webhook_handler_ssh_key" {
type = string
sensitive = true
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "webhook-handler"
}
@ -85,7 +64,7 @@ resource "kubernetes_secret" "ssh-key" {
}
}
data = {
"id_rsa" = var.webhook_handler_ssh_key
"id_rsa" = data.vault_kv_secret_v2.secrets.data["ssh_key"]
}
type = "generic"
}
@ -148,19 +127,19 @@ resource "kubernetes_deployment" "webhook_handler" {
}
env {
name = "WEBHOOKSECRET"
value = var.webhook_handler_secret
value = data.vault_kv_secret_v2.secrets.data["secret"]
}
env {
name = "FB_APP_SECRET"
value = var.webhook_handler_fb_app_secret
value = data.vault_kv_secret_v2.secrets.data["fb_app_secret"]
}
env {
name = "FB_VERIFY_TOKEN"
value = var.webhook_handler_fb_verify_token
value = data.vault_kv_secret_v2.secrets.data["fb_verify_token"]
}
env {
name = "FB_PAGE_TOKEN"
value = var.webhook_handler_fb_page_token
value = data.vault_kv_secret_v2.secrets.data["fb_page_token"]
}
env {
name = "CONFIG"
@ -168,11 +147,11 @@ resource "kubernetes_deployment" "webhook_handler" {
}
env {
name = "GIT_USER"
value = var.webhook_handler_git_user
value = data.vault_kv_secret_v2.secrets.data["git_user"]
}
env {
name = "GIT_TOKEN"
value = var.webhook_handler_git_token
value = data.vault_kv_secret_v2.secrets.data["git_token"]
}
env {
name = "SSH_KEY"

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,32 +2,15 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "woodpecker_github_client_id" { type = string }
variable "woodpecker_github_client_secret" {
type = string
sensitive = true
}
variable "woodpecker_agent_secret" {
type = string
sensitive = true
}
variable "woodpecker_db_password" {
type = string
sensitive = true
}
variable "dbaas_postgresql_root_password" {
type = string
sensitive = true
}
variable "nfs_server" { type = string }
variable "postgresql_host" { type = string }
variable "woodpecker_forgejo_client_id" { type = string }
variable "woodpecker_forgejo_client_secret" {
type = string
sensitive = true
}
variable "woodpecker_forgejo_url" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "woodpecker"
}
resource "kubernetes_namespace" "woodpecker" {
metadata {
@ -89,11 +72,11 @@ resource "kubernetes_job" "db_init" {
<<-EOT
set -e
# Create user if not exists
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_roles WHERE rolname='woodpecker'" | grep -q 1 || \
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -c "CREATE ROLE woodpecker WITH LOGIN PASSWORD '${var.woodpecker_db_password}'"
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_roles WHERE rolname='woodpecker'" | grep -q 1 || \
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -c "CREATE ROLE woodpecker WITH LOGIN PASSWORD '${data.vault_kv_secret_v2.secrets.data["db_password"]}'"
# Create database if not exists
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_database WHERE datname='woodpecker'" | grep -q 1 || \
PGPASSWORD='${var.dbaas_postgresql_root_password}' psql -h ${var.postgresql_host} -U root -c "CREATE DATABASE woodpecker OWNER woodpecker"
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -tc "SELECT 1 FROM pg_database WHERE datname='woodpecker'" | grep -q 1 || \
PGPASSWORD='${data.vault_kv_secret_v2.secrets.data["dbaas_root_password"]}' psql -h ${var.postgresql_host} -U root -c "CREATE DATABASE woodpecker OWNER woodpecker"
echo "Database init complete"
EOT
]
@ -149,13 +132,13 @@ resource "helm_release" "woodpecker" {
values = [
templatefile("${path.module}/values.yaml", {
github_client_id = var.woodpecker_github_client_id
github_client_secret = var.woodpecker_github_client_secret
agent_secret = var.woodpecker_agent_secret
db_password = var.woodpecker_db_password
github_client_id = data.vault_kv_secret_v2.secrets.data["github_client_id"]
github_client_secret = data.vault_kv_secret_v2.secrets.data["github_client_secret"]
agent_secret = data.vault_kv_secret_v2.secrets.data["agent_secret"]
db_password = data.vault_kv_secret_v2.secrets.data["db_password"]
postgresql_host = var.postgresql_host
forgejo_client_id = var.woodpecker_forgejo_client_id
forgejo_client_secret = var.woodpecker_forgejo_client_secret
forgejo_client_id = data.vault_kv_secret_v2.secrets.data["forgejo_client_id"]
forgejo_client_secret = data.vault_kv_secret_v2.secrets.data["forgejo_client_secret"]
forgejo_url = var.woodpecker_forgejo_url
})
]

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -2,16 +2,13 @@ variable "tls_secret_name" {
type = string
sensitive = true
}
variable "openrouter_api_key" {
type = string
sensitive = true
}
variable "slack_bot_token" {
type = string
sensitive = true
}
variable "slack_channel" { type = string }
variable "nfs_server" { type = string }
data "vault_kv_secret_v2" "secrets" {
mount = "secret"
name = "ytdlp"
}
variable "redis_host" { type = string }
variable "ollama_host" { type = string }
@ -173,7 +170,7 @@ resource "kubernetes_secret" "openrouter" {
namespace = kubernetes_namespace.ytdlp.metadata[0].name
}
data = {
"api-key" = var.openrouter_api_key
"api-key" = data.vault_kv_secret_v2.secrets.data["openrouter_api_key"]
}
}
@ -183,7 +180,7 @@ resource "kubernetes_secret" "slack" {
namespace = kubernetes_namespace.ytdlp.metadata[0].name
}
data = {
"bot-token" = var.slack_bot_token
"bot-token" = data.vault_kv_secret_v2.secrets.data["slack_bot_token"]
"channel" = var.slack_channel
}
}

View file

@ -6,3 +6,8 @@ dependency "platform" {
config_path = "../platform"
skip_outputs = true
}
dependency "vault" {
config_path = "../vault"
skip_outputs = true
}

View file

@ -48,11 +48,26 @@ generate "k8s_providers" {
path = "providers.tf"
if_exists = "overwrite_terragrunt"
contents = <<EOF
terraform {
required_providers {
vault = {
source = "hashicorp/vault"
version = "~> 4.0"
}
}
}
variable "kube_config_path" {
type = string
default = "~/.kube/config"
}
variable "vault_root_token" {
type = string
sensitive = true
default = ""
}
provider "kubernetes" {
config_path = var.kube_config_path
}
@ -62,6 +77,12 @@ provider "helm" {
config_path = var.kube_config_path
}
}
provider "vault" {
address = "https://vault.viktorbarzin.me"
token = var.vault_root_token
skip_child_token = true
}
EOF
}