deploy-templates/templates/publish-users-job.yaml (121 lines of code) (raw):
{{- if eq .Values.deploy true }}
apiVersion: batch/v1
kind: Job
metadata:
name: {{ .Values.data.jobName }}
labels:
name: {{ .Values.data.jobName }}
app: user-publisher
spec:
template:
metadata:
annotations:
sidecar.istio.io/inject: 'false'
labels:
name: {{ .Values.data.jobName }}
app: user-publisher
collect.logs: "json"
spec:
serviceAccountName: {{ .Values.serviceAccount.name }}
restartPolicy: Never
containers:
- name: publish-users-job
image: "{{ .Values.image.name }}:{{ .Values.image.version }}"
imagePullPolicy: IfNotPresent
command:
- sh
- '-c'
- >-
java -jar app.jar --id=$id --USER_ACCESS_TOKEN='user_access_token' --REQUEST_ID='1'
env:
- name: USER_IMPORT_CEPH_HTTP_ENDPOINT
valueFrom:
configMapKeyRef:
name: {{ .Values.data.userImportConfigMapName }}
key: {{ .Values.data.cephHost }}
- name: USER_IMPORT_ARCHIVE_CEPH_HTTP_ENDPOINT
valueFrom:
configMapKeyRef:
name: {{ .Values.data.userImportArchiveConfigMapName }}
key: {{ .Values.data.cephHost }}
- name: USER_IMPORT_CEPH_BUCKET_NAME
valueFrom:
configMapKeyRef:
name: {{ .Values.data.userImportConfigMapName }}
key: {{ .Values.data.bucketName }}
- name: USER_IMPORT_ARCHIVE_CEPH_BUCKET_NAME
valueFrom:
configMapKeyRef:
name: {{ .Values.data.userImportArchiveConfigMapName }}
key: {{ .Values.data.bucketName }}
- name: USER_IMPORT_CEPH_ACCESS_KEY
valueFrom:
secretKeyRef:
name: {{ .Values.publisher.secrets.userImportCephBucket.secretName }}
key: {{ .Values.publisher.secrets.userImportCephBucket.accessKey }}
- name: USER_IMPORT_ARCHIVE_CEPH_ACCESS_KEY
valueFrom:
secretKeyRef:
name: {{ .Values.publisher.secrets.userImportArchiveCephBucket.secretName }}
key: {{ .Values.publisher.secrets.userImportArchiveCephBucket.accessKey }}
- name: USER_IMPORT_CEPH_SECRET_KEY
valueFrom:
secretKeyRef:
name: {{ .Values.publisher.secrets.userImportCephBucket.secretName }}
key: {{ .Values.publisher.secrets.userImportCephBucket.secretKey }}
- name: USER_IMPORT_ARCHIVE_CEPH_SECRET_KEY
valueFrom:
secretKeyRef:
name: {{ .Values.publisher.secrets.userImportArchiveCephBucket.secretName }}
key: {{ .Values.publisher.secrets.userImportArchiveCephBucket.secretKey }}
- name: id
value: {{ .Values.id | squote }}
- name: KEYCLOAK_URL
value: {{ .Values.keycloak.keycloakUrl }}
- name: CLIENT_ID
value: {{ .Values.keycloak.keycloakClientId }}
- name: CLIENT_SECRET
valueFrom:
secretKeyRef:
name: {{ .Values.keycloak.secret.secretName }}
key: {{ .Values.keycloak.secret.clientSecret }}
- name: KEYCLOAK_REALM
value: "{{ include "keycloak.officerRealm" . }}"
- name: BATCH_SIZE
value: "{{ .Values.data.batchSize }}"
- name: OPENSHIFT_NAMESPACE
value: {{ .Values.namespace }}
- name: OPENSHIFT_JOB
value: {{ .Values.data.jobName }}
- name: OPENSHIFT_RESULT_FIELD
value: link
- name: KAFKA_BOOTSTRAP
value: {{ .Values.kafka.service }}
- name: AUDIT_TOPIC
value: {{ .Values.audit.kafka.topic }}
- name: SCHEMA_REGISTRY_URL
value: {{ .Values.audit.kafka.schemaRegistryUrl }}
- name: SSL_ENABLED
value: "{{ .Values.kafka.sslEnabled }}"
- name: SSL_USER_CERTIFICATE
valueFrom:
secretKeyRef:
name: {{ .Values.kafka.user }}
key: user.crt
- name: SSL_USER_KEY
valueFrom:
secretKeyRef:
name: {{ .Values.kafka.user }}
key: user.key
- name: SSL_CLUSTER_CERTIFICATE
valueFrom:
secretKeyRef:
name: {{ $.Values.kafka.clusterName }}-cluster-ca-cert
key: ca.crt
- name: VAULT_URI
value: http://hashicorp-vault.{{ .Values.namespace }}.svc:8200
- name: VAULT_KEY
value: {{ .Values.vault.key }}
- name: VAULT_DECRYPTION_ROLE
value: {{ .Values.vault.decryptionRole }}
{{- end }}