diff --git a/clusters/cl01tl/applications/vaultwarden/Chart.yaml b/clusters/cl01tl/applications/vaultwarden/Chart.yaml new file mode 100644 index 000000000..3ca27f80e --- /dev/null +++ b/clusters/cl01tl/applications/vaultwarden/Chart.yaml @@ -0,0 +1,34 @@ +apiVersion: v2 +name: vaultwarden +version: 1.0.0 +description: Vaultwarden +keywords: + - vaultwarden + - bitwarden + - password +home: https://wiki.alexlebens.dev/doc/vaultwarden-HFX1rsTgMD +sources: + - https://github.com/dani-garcia/vaultwarden + - https://github.com/cloudflare/cloudflared + - https://github.com/cloudnative-pg/cloudnative-pg + - https://hub.docker.com/r/vaultwarden/server + - https://github.com/bjw-s/helm-charts/tree/main/charts/other/app-template + - https://github.com/alexlebens/helm-charts/tree/main/charts/cloudflared + - https://github.com/alexlebens/helm-charts/tree/main/charts/postgres-cluster +maintainers: + - name: alexlebens +dependencies: + - name: app-template + alias: vaultwarden + repository: https://bjw-s.github.io/helm-charts/ + version: 3.2.1 + - name: cloudflared + alias: cloudflared + repository: http://alexlebens.github.io/helm-charts + version: 1.4.1 + - name: postgres-cluster + alias: postgres-16-cluster + version: 3.8.3 + repository: http://alexlebens.github.io/helm-charts +icon: https://raw.githubusercontent.com/walkxcode/dashboard-icons/main/png/vaultwarden.png +appVersion: 1.31.0 diff --git a/clusters/cl01tl/applications/vaultwarden/templates/external-secret.yaml b/clusters/cl01tl/applications/vaultwarden/templates/external-secret.yaml new file mode 100644 index 000000000..f607ce6dc --- /dev/null +++ b/clusters/cl01tl/applications/vaultwarden/templates/external-secret.yaml @@ -0,0 +1,114 @@ +apiVersion: external-secrets.io/v1beta1 +kind: ExternalSecret +metadata: + name: vaultwarden-cloudflared-secret + namespace: {{ .Release.Namespace }} + labels: + app.kubernetes.io/name: vaultwarden-cloudflared-secret + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/version: {{ .Chart.AppVersion }} + app.kubernetes.io/component: web + app.kubernetes.io/part-of: {{ .Release.Name }} +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + data: + - secretKey: cf-tunnel-token + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /cloudflare/tunnels/vaultwarden + metadataPolicy: None + property: token + +--- +apiVersion: external-secrets.io/v1beta1 +kind: ExternalSecret +metadata: + name: vaultwarden-data-backup-secret + namespace: {{ .Release.Namespace }} + labels: + app.kubernetes.io/name: vaultwarden-data-backup-secret + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/version: {{ .Chart.AppVersion }} + app.kubernetes.io/component: backup + app.kubernetes.io/part-of: {{ .Release.Name }} +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + target: + template: + mergePolicy: Merge + engineVersion: v2 + data: + RESTIC_REPOSITORY: "{{ `{{ .BUCKET_ENDPOINT }}` }}/vaultwarden/vaultwarden-data" + data: + - secretKey: BUCKET_ENDPOINT + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /cl01tl/volsync/restic/config + metadataPolicy: None + property: S3_BUCKET_ENDPOINT + - secretKey: RESTIC_PASSWORD + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /cl01tl/volsync/restic/config + metadataPolicy: None + property: RESTIC_PASSWORD + - secretKey: AWS_DEFAULT_REGION + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /cl01tl/volsync/restic/config + metadataPolicy: None + property: AWS_DEFAULT_REGION + - secretKey: AWS_ACCESS_KEY_ID + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /aws/keys/cl01tl-volsync-backups + metadataPolicy: None + property: access_key + - secretKey: AWS_SECRET_ACCESS_KEY + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /aws/keys/cl01tl-volsync-backups + metadataPolicy: None + property: secret_key + +--- +apiVersion: external-secrets.io/v1beta1 +kind: ExternalSecret +metadata: + name: vaultwarden-postgresql-16-cluster-backup-secret + namespace: {{ .Release.Namespace }} + labels: + app.kubernetes.io/name: vaultwarden-postgresql-16-cluster-backup-secret + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/version: {{ .Chart.AppVersion }} + app.kubernetes.io/component: database + app.kubernetes.io/part-of: {{ .Release.Name }} +spec: + secretStoreRef: + kind: ClusterSecretStore + name: vault + data: + - secretKey: ACCESS_KEY_ID + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /aws/keys/cl01tl-vaultwarden-postgresql + metadataPolicy: None + property: access_key + - secretKey: ACCESS_SECRET_KEY + remoteRef: + conversionStrategy: Default + decodingStrategy: None + key: /aws/keys/cl01tl-vaultwarden-postgresql + metadataPolicy: None + property: secret_key diff --git a/clusters/cl01tl/applications/vaultwarden/templates/replication-source.yaml b/clusters/cl01tl/applications/vaultwarden/templates/replication-source.yaml new file mode 100644 index 000000000..96353f147 --- /dev/null +++ b/clusters/cl01tl/applications/vaultwarden/templates/replication-source.yaml @@ -0,0 +1,27 @@ +apiVersion: volsync.backube/v1alpha1 +kind: ReplicationSource +metadata: + name: vaultwarden-data-backup-source + namespace: {{ .Release.Namespace }} + labels: + app.kubernetes.io/name: vaultwarden-data-backup-source + app.kubernetes.io/instance: {{ .Release.Name }} + app.kubernetes.io/version: {{ .Chart.AppVersion }} + app.kubernetes.io/component: backup + app.kubernetes.io/part-of: {{ .Release.Name }} +spec: + sourcePVC: vaultwarden-data + trigger: + schedule: 0 */6 * * * + restic: + pruneIntervalDays: 7 + repository: vaultwarden-data-backup-secret + retain: + hourly: 1 + daily: 1 + weekly: 3 + monthly: 2 + yearly: 4 + copyMethod: Snapshot + storageClassName: ceph-block + volumeSnapshotClassName: ceph-blockpool-snapshot diff --git a/clusters/cl01tl/applications/vaultwarden/values.yaml b/clusters/cl01tl/applications/vaultwarden/values.yaml new file mode 100644 index 000000000..ebf16bb12 --- /dev/null +++ b/clusters/cl01tl/applications/vaultwarden/values.yaml @@ -0,0 +1,67 @@ +vaultwarden: + controllers: + main: + type: deployment + replicas: 1 + strategy: Recreate + revisionHistoryLimit: 3 + containers: + main: + image: + repository: vaultwarden/server + tag: 1.31.0 + pullPolicy: IfNotPresent + env: + - name: DOMAIN + value: https://passwords.alexlebens.dev + - name: SIGNUPS_ALLOWED + value: "true" + - name: INVITATIONS_ALLOWED + value: "false" + - name: DATABASE_URL + value: "false" + resources: + requests: + cpu: 100m + memory: 256Mi + serviceAccount: + create: true + service: + main: + controller: main + ports: + http: + port: 80 + targetPort: 80 + protocol: HTTP + persistence: + data: + storageClass: ceph-block + accessMode: ReadWriteOnce + size: 5Gi + retain: true + advancedMounts: + main: + main: + - path: /data + readOnly: false +cloudflared: + existingSecretName: vaultwarden-cloudflared-secret +postgres-16-cluster: + mode: standalone + cluster: + walStorage: + storageClass: local-path + storage: + storageClass: local-path + monitoring: + enabled: true + prometheusRule: + enabled: false + backup: + enabled: true + endpointURL: https://s3.us-east-2.amazonaws.com + destinationPath: s3://cl01tl-postgresql-backups/vaultwarden + endpointCredentials: vaultwarden-postgresql-16-cluster-backup-secret + backupIndex: 1 + retentionPolicy: 14d