2023-02-13 16:48:20 +00:00
|
|
|
{{/*
|
|
|
|
Copyright (c) HashiCorp, Inc.
|
|
|
|
SPDX-License-Identifier: MPL-2.0
|
|
|
|
*/}}
|
|
|
|
|
2019-07-31 18:26:12 +00:00
|
|
|
{{ template "vault.mode" . }}
|
2020-02-21 16:16:33 +00:00
|
|
|
{{- if ne .mode "external" }}
|
2022-03-21 16:50:23 +00:00
|
|
|
{{- if ne .mode "" }}
|
|
|
|
{{- if .serverEnabled -}}
|
2020-02-06 16:44:38 +00:00
|
|
|
# StatefulSet to run the actual vault server cluster.
|
2018-08-18 05:08:03 +00:00
|
|
|
apiVersion: apps/v1
|
|
|
|
kind: StatefulSet
|
|
|
|
metadata:
|
2019-07-31 18:26:12 +00:00
|
|
|
name: {{ template "vault.fullname" . }}
|
2019-08-28 13:58:48 +00:00
|
|
|
namespace: {{ .Release.Namespace }}
|
2018-08-18 21:38:33 +00:00
|
|
|
labels:
|
2019-08-07 18:55:32 +00:00
|
|
|
app.kubernetes.io/name: {{ include "vault.name" . }}
|
|
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
|
|
|
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
2020-08-14 22:04:52 +00:00
|
|
|
{{- template "vault.statefulSet.annotations" . }}
|
2018-08-18 05:08:03 +00:00
|
|
|
spec:
|
2020-03-18 19:49:14 +00:00
|
|
|
serviceName: {{ template "vault.fullname" . }}-internal
|
2018-08-18 05:08:03 +00:00
|
|
|
podManagementPolicy: Parallel
|
2019-07-31 18:26:12 +00:00
|
|
|
replicas: {{ template "vault.replicas" . }}
|
|
|
|
updateStrategy:
|
2020-01-18 12:36:45 +00:00
|
|
|
type: {{ .Values.server.updateStrategyType }}
|
2018-08-18 21:38:33 +00:00
|
|
|
selector:
|
|
|
|
matchLabels:
|
2019-08-07 18:55:32 +00:00
|
|
|
app.kubernetes.io/name: {{ template "vault.name" . }}
|
|
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
2018-08-18 21:38:33 +00:00
|
|
|
component: server
|
2018-08-18 05:08:03 +00:00
|
|
|
template:
|
|
|
|
metadata:
|
|
|
|
labels:
|
2019-08-07 18:55:32 +00:00
|
|
|
helm.sh/chart: {{ template "vault.chart" . }}
|
|
|
|
app.kubernetes.io/name: {{ template "vault.name" . }}
|
|
|
|
app.kubernetes.io/instance: {{ .Release.Name }}
|
2018-08-18 21:38:33 +00:00
|
|
|
component: server
|
2019-10-06 19:50:48 +00:00
|
|
|
{{- if .Values.server.extraLabels -}}
|
|
|
|
{{- toYaml .Values.server.extraLabels | nindent 8 -}}
|
|
|
|
{{- end -}}
|
2019-08-05 16:31:06 +00:00
|
|
|
{{ template "vault.annotations" . }}
|
2018-08-18 05:08:03 +00:00
|
|
|
spec:
|
2019-07-31 18:26:12 +00:00
|
|
|
{{ template "vault.affinity" . }}
|
2022-04-28 17:47:40 +00:00
|
|
|
{{ template "vault.topologySpreadConstraints" . }}
|
2019-08-05 16:31:06 +00:00
|
|
|
{{ template "vault.tolerations" . }}
|
|
|
|
{{ template "vault.nodeselector" . }}
|
2020-05-01 01:37:27 +00:00
|
|
|
{{- if .Values.server.priorityClassName }}
|
|
|
|
priorityClassName: {{ .Values.server.priorityClassName }}
|
|
|
|
{{- end }}
|
2021-12-15 02:15:11 +00:00
|
|
|
terminationGracePeriodSeconds: {{ .Values.server.terminationGracePeriodSeconds }}
|
2020-08-19 02:13:02 +00:00
|
|
|
serviceAccountName: {{ template "vault.serviceAccount.name" . }}
|
2020-01-15 10:06:54 +00:00
|
|
|
{{ if .Values.server.shareProcessNamespace }}
|
|
|
|
shareProcessNamespace: true
|
|
|
|
{{ end }}
|
2022-08-08 19:48:28 +00:00
|
|
|
{{- template "server.statefulSet.securityContext.pod" . }}
|
2022-09-12 14:17:24 +00:00
|
|
|
{{- if not .Values.global.openshift }}
|
|
|
|
hostNetwork: {{ .Values.server.hostNetwork }}
|
|
|
|
{{- end }}
|
2018-08-18 05:08:03 +00:00
|
|
|
volumes:
|
2019-07-31 18:26:12 +00:00
|
|
|
{{ template "vault.volumes" . }}
|
2020-06-03 02:10:41 +00:00
|
|
|
- name: home
|
|
|
|
emptyDir: {}
|
2020-05-08 18:35:39 +00:00
|
|
|
{{- if .Values.server.extraInitContainers }}
|
|
|
|
initContainers:
|
|
|
|
{{ toYaml .Values.server.extraInitContainers | nindent 8}}
|
|
|
|
{{- end }}
|
2018-08-18 05:08:03 +00:00
|
|
|
containers:
|
2018-09-28 20:56:48 +00:00
|
|
|
- name: vault
|
2019-07-31 18:26:12 +00:00
|
|
|
{{ template "vault.resources" . }}
|
2019-11-28 22:39:28 +00:00
|
|
|
image: {{ .Values.server.image.repository }}:{{ .Values.server.image.tag | default "latest" }}
|
|
|
|
imagePullPolicy: {{ .Values.server.image.pullPolicy }}
|
2020-11-30 21:31:02 +00:00
|
|
|
command:
|
|
|
|
- "/bin/sh"
|
|
|
|
- "-ec"
|
2019-07-31 18:26:12 +00:00
|
|
|
args: {{ template "vault.args" . }}
|
2022-08-08 19:48:28 +00:00
|
|
|
{{- template "server.statefulSet.securityContext.container" . }}
|
2018-08-18 05:08:03 +00:00
|
|
|
env:
|
2019-07-31 18:26:12 +00:00
|
|
|
- name: HOST_IP
|
2018-08-18 05:08:03 +00:00
|
|
|
valueFrom:
|
|
|
|
fieldRef:
|
2019-07-31 18:26:12 +00:00
|
|
|
fieldPath: status.hostIP
|
|
|
|
- name: POD_IP
|
2018-08-18 05:08:03 +00:00
|
|
|
valueFrom:
|
|
|
|
fieldRef:
|
2019-07-31 18:26:12 +00:00
|
|
|
fieldPath: status.podIP
|
2020-04-09 13:26:58 +00:00
|
|
|
- name: VAULT_K8S_POD_NAME
|
|
|
|
valueFrom:
|
|
|
|
fieldRef:
|
|
|
|
fieldPath: metadata.name
|
|
|
|
- name: VAULT_K8S_NAMESPACE
|
|
|
|
valueFrom:
|
|
|
|
fieldRef:
|
|
|
|
fieldPath: metadata.namespace
|
2019-07-31 18:26:12 +00:00
|
|
|
- name: VAULT_ADDR
|
2019-08-20 15:40:47 +00:00
|
|
|
value: "{{ include "vault.scheme" . }}://127.0.0.1:8200"
|
2019-08-20 21:09:06 +00:00
|
|
|
- name: VAULT_API_ADDR
|
2020-07-14 14:09:43 +00:00
|
|
|
{{- if .Values.server.ha.apiAddr }}
|
|
|
|
value: {{ .Values.server.ha.apiAddr }}
|
|
|
|
{{- else }}
|
2020-03-23 16:10:47 +00:00
|
|
|
value: "{{ include "vault.scheme" . }}://$(POD_IP):8200"
|
2020-07-14 14:09:43 +00:00
|
|
|
{{- end }}
|
2019-07-31 18:26:12 +00:00
|
|
|
- name: SKIP_CHOWN
|
|
|
|
value: "true"
|
2019-09-23 05:11:04 +00:00
|
|
|
- name: SKIP_SETCAP
|
|
|
|
value: "true"
|
2020-03-18 19:49:14 +00:00
|
|
|
- name: HOSTNAME
|
|
|
|
valueFrom:
|
|
|
|
fieldRef:
|
|
|
|
fieldPath: metadata.name
|
2020-04-09 13:26:58 +00:00
|
|
|
- name: VAULT_CLUSTER_ADDR
|
2022-04-14 22:16:39 +00:00
|
|
|
{{- if .Values.server.ha.clusterAddr }}
|
2022-11-09 22:19:38 +00:00
|
|
|
value: {{ .Values.server.ha.clusterAddr | quote }}
|
2022-04-14 22:16:39 +00:00
|
|
|
{{- else }}
|
2020-04-09 13:26:58 +00:00
|
|
|
value: "https://$(HOSTNAME).{{ template "vault.fullname" . }}-internal:8201"
|
2022-04-14 22:16:39 +00:00
|
|
|
{{- end }}
|
2020-04-27 15:38:26 +00:00
|
|
|
{{- if and (eq (.Values.server.ha.raft.enabled | toString) "true") (eq (.Values.server.ha.raft.setNodeId | toString) "true") }}
|
|
|
|
- name: VAULT_RAFT_NODE_ID
|
|
|
|
valueFrom:
|
|
|
|
fieldRef:
|
|
|
|
fieldPath: metadata.name
|
|
|
|
{{- end }}
|
2020-06-03 02:10:41 +00:00
|
|
|
- name: HOME
|
|
|
|
value: "/home/vault"
|
2021-04-08 15:18:16 +00:00
|
|
|
{{- if .Values.server.logLevel }}
|
|
|
|
- name: VAULT_LOG_LEVEL
|
|
|
|
value: "{{ .Values.server.logLevel }}"
|
|
|
|
{{- end }}
|
|
|
|
{{- if .Values.server.logFormat }}
|
|
|
|
- name: VAULT_LOG_FORMAT
|
|
|
|
value: "{{ .Values.server.logFormat }}"
|
|
|
|
{{- end }}
|
2021-06-11 20:29:30 +00:00
|
|
|
{{- if (and .Values.server.enterpriseLicense.secretName .Values.server.enterpriseLicense.secretKey) }}
|
|
|
|
- name: VAULT_LICENSE_PATH
|
|
|
|
value: /vault/license/{{ .Values.server.enterpriseLicense.secretKey }}
|
|
|
|
{{- end }}
|
2019-07-31 18:26:12 +00:00
|
|
|
{{ template "vault.envs" . }}
|
|
|
|
{{- include "vault.extraEnvironmentVars" .Values.server | nindent 12 }}
|
2019-08-14 20:29:07 +00:00
|
|
|
{{- include "vault.extraSecretEnvironmentVars" .Values.server | nindent 12 }}
|
2018-08-18 05:08:03 +00:00
|
|
|
volumeMounts:
|
2019-07-31 18:26:12 +00:00
|
|
|
{{ template "vault.mounts" . }}
|
2020-06-03 02:10:41 +00:00
|
|
|
- name: home
|
|
|
|
mountPath: /home/vault
|
2018-08-18 05:08:03 +00:00
|
|
|
ports:
|
2018-10-02 21:14:57 +00:00
|
|
|
- containerPort: 8200
|
2020-04-13 15:48:23 +00:00
|
|
|
name: {{ include "vault.scheme" . }}
|
2019-07-31 18:26:12 +00:00
|
|
|
- containerPort: 8201
|
2020-04-13 15:48:23 +00:00
|
|
|
name: https-internal
|
2019-07-31 18:26:12 +00:00
|
|
|
- containerPort: 8202
|
2020-04-13 15:48:23 +00:00
|
|
|
name: {{ include "vault.scheme" . }}-rep
|
2023-02-16 18:49:07 +00:00
|
|
|
{{- if .Values.server.extraPorts -}}
|
|
|
|
{{ toYaml .Values.server.extraPorts | nindent 12}}
|
|
|
|
{{- end }}
|
2019-11-28 23:24:41 +00:00
|
|
|
{{- if .Values.server.readinessProbe.enabled }}
|
2018-11-26 17:44:05 +00:00
|
|
|
readinessProbe:
|
2019-11-28 23:24:41 +00:00
|
|
|
{{- if .Values.server.readinessProbe.path }}
|
|
|
|
httpGet:
|
|
|
|
path: {{ .Values.server.readinessProbe.path | quote }}
|
2023-04-04 14:17:24 +00:00
|
|
|
port: {{ .Values.server.readinessProbe.port }}
|
2019-12-16 23:07:23 +00:00
|
|
|
scheme: {{ include "vault.scheme" . | upper }}
|
2019-11-28 23:24:41 +00:00
|
|
|
{{- else }}
|
2018-11-26 17:44:05 +00:00
|
|
|
# Check status; unsealed vault servers return 0
|
|
|
|
# The exit code reflects the seal status:
|
|
|
|
# 0 - unsealed
|
|
|
|
# 1 - error
|
|
|
|
# 2 - sealed
|
|
|
|
exec:
|
2019-08-20 15:40:47 +00:00
|
|
|
command: ["/bin/sh", "-ec", "vault status -tls-skip-verify"]
|
2019-11-28 23:24:41 +00:00
|
|
|
{{- end }}
|
2020-09-15 20:24:38 +00:00
|
|
|
failureThreshold: {{ .Values.server.readinessProbe.failureThreshold }}
|
|
|
|
initialDelaySeconds: {{ .Values.server.readinessProbe.initialDelaySeconds }}
|
|
|
|
periodSeconds: {{ .Values.server.readinessProbe.periodSeconds }}
|
|
|
|
successThreshold: {{ .Values.server.readinessProbe.successThreshold }}
|
|
|
|
timeoutSeconds: {{ .Values.server.readinessProbe.timeoutSeconds }}
|
2019-11-28 23:24:41 +00:00
|
|
|
{{- end }}
|
|
|
|
{{- if .Values.server.livenessProbe.enabled }}
|
|
|
|
livenessProbe:
|
|
|
|
httpGet:
|
|
|
|
path: {{ .Values.server.livenessProbe.path | quote }}
|
2023-04-04 14:17:24 +00:00
|
|
|
port: {{ .Values.server.livenessProbe.port }}
|
2019-12-16 23:07:23 +00:00
|
|
|
scheme: {{ include "vault.scheme" . | upper }}
|
2020-09-15 20:24:38 +00:00
|
|
|
failureThreshold: {{ .Values.server.livenessProbe.failureThreshold }}
|
2019-12-16 23:07:23 +00:00
|
|
|
initialDelaySeconds: {{ .Values.server.livenessProbe.initialDelaySeconds }}
|
2020-09-15 20:24:38 +00:00
|
|
|
periodSeconds: {{ .Values.server.livenessProbe.periodSeconds }}
|
|
|
|
successThreshold: {{ .Values.server.livenessProbe.successThreshold }}
|
|
|
|
timeoutSeconds: {{ .Values.server.livenessProbe.timeoutSeconds }}
|
2019-11-28 23:24:41 +00:00
|
|
|
{{- end }}
|
2019-11-06 16:06:57 +00:00
|
|
|
lifecycle:
|
|
|
|
# Vault container doesn't receive SIGTERM from Kubernetes
|
2020-01-18 12:36:45 +00:00
|
|
|
# and after the grace period ends, Kube sends SIGKILL. This
|
2019-11-06 16:06:57 +00:00
|
|
|
# causes issues with graceful shutdowns such as deregistering itself
|
|
|
|
# from Consul (zombie services).
|
|
|
|
preStop:
|
|
|
|
exec:
|
2020-01-30 17:39:08 +00:00
|
|
|
command: [
|
|
|
|
"/bin/sh", "-c",
|
|
|
|
# Adding a sleep here to give the pod eviction a
|
|
|
|
# chance to propagate, so requests will not be made
|
|
|
|
# to this pod while it's terminating
|
|
|
|
"sleep {{ .Values.server.preStopSleepSeconds }} && kill -SIGTERM $(pidof vault)",
|
|
|
|
]
|
2020-05-28 18:53:46 +00:00
|
|
|
{{- if .Values.server.postStart }}
|
|
|
|
postStart:
|
|
|
|
exec:
|
|
|
|
command:
|
|
|
|
{{- range (.Values.server.postStart) }}
|
|
|
|
- {{ . | quote }}
|
|
|
|
{{- end }}
|
|
|
|
{{- end }}
|
2020-01-15 10:03:20 +00:00
|
|
|
{{- if .Values.server.extraContainers }}
|
|
|
|
{{ toYaml .Values.server.extraContainers | nindent 8}}
|
|
|
|
{{- end }}
|
2021-07-23 16:05:24 +00:00
|
|
|
{{- include "imagePullSecrets" . | nindent 6 }}
|
2019-07-31 18:26:12 +00:00
|
|
|
{{ template "vault.volumeclaims" . }}
|
|
|
|
{{ end }}
|
2020-02-21 16:16:33 +00:00
|
|
|
{{ end }}
|
2022-04-13 05:54:54 +00:00
|
|
|
{{ end }}
|