feat: BreakPilot PWA - Full codebase (clean push without large binaries)
Some checks failed
Tests / Go Tests (push) Has been cancelled
Tests / Python Tests (push) Has been cancelled
Tests / Integration Tests (push) Has been cancelled
Tests / Go Lint (push) Has been cancelled
Tests / Python Lint (push) Has been cancelled
Tests / Security Scan (push) Has been cancelled
Tests / All Checks Passed (push) Has been cancelled
Security Scanning / Secret Scanning (push) Has been cancelled
Security Scanning / Dependency Vulnerability Scan (push) Has been cancelled
Security Scanning / Go Security Scan (push) Has been cancelled
Security Scanning / Python Security Scan (push) Has been cancelled
Security Scanning / Node.js Security Scan (push) Has been cancelled
Security Scanning / Docker Image Security (push) Has been cancelled
Security Scanning / Security Summary (push) Has been cancelled
CI/CD Pipeline / Go Tests (push) Has been cancelled
CI/CD Pipeline / Python Tests (push) Has been cancelled
CI/CD Pipeline / Website Tests (push) Has been cancelled
CI/CD Pipeline / Linting (push) Has been cancelled
CI/CD Pipeline / Security Scan (push) Has been cancelled
CI/CD Pipeline / Docker Build & Push (push) Has been cancelled
CI/CD Pipeline / Integration Tests (push) Has been cancelled
CI/CD Pipeline / Deploy to Staging (push) Has been cancelled
CI/CD Pipeline / Deploy to Production (push) Has been cancelled
CI/CD Pipeline / CI Summary (push) Has been cancelled
ci/woodpecker/manual/build-ci-image Pipeline was successful
ci/woodpecker/manual/main Pipeline failed

All services: admin-v2, studio-v2, website, ai-compliance-sdk,
consent-service, klausur-service, voice-service, and infrastructure.
Large PDFs and compiled binaries excluded via .gitignore.
This commit is contained in:
BreakPilot Dev
2026-02-11 13:25:58 +01:00
commit 19855efacc
2512 changed files with 933814 additions and 0 deletions

44
vault/agent/config.hcl Normal file
View File

@@ -0,0 +1,44 @@
# Vault Agent Configuration for BreakPilot SSL Certificates
# Automatically renews certificates and updates nginx
pid_file = "/tmp/vault-agent.pid"
vault {
address = "http://vault:8200"
retry {
num_retries = 5
}
}
auto_auth {
method "approle" {
mount_path = "auth/approle"
config = {
role_id_file_path = "/vault/agent/data/role-id"
secret_id_file_path = "/vault/agent/data/secret-id"
remove_secret_id_file_after_reading = false
}
}
sink "file" {
config = {
path = "/vault/agent/data/token"
mode = 0600
}
}
}
# Single template that generates all certificate components
# Uses a single pkiCert call to ensure cert/key match
template {
source = "/vault/agent/templates/all.tpl"
destination = "/vault/certs/combined.pem"
perms = 0600
command = "sh /vault/agent/split-certs.sh"
}
# Listener for debugging (optional)
listener "tcp" {
address = "127.0.0.1:8100"
tls_disable = true
}

View File

@@ -0,0 +1,28 @@
#!/bin/sh
# Split combined certificate file into separate components
COMBINED="/vault/certs/combined.pem"
CERT_FILE="/vault/certs/macmini.crt"
KEY_FILE="/vault/certs/macmini.key"
CA_FILE="/vault/certs/ca-chain.crt"
# Extract certificate (between ===CERT=== and ===CA===)
sed -n '/===CERT===/,/===CA===/p' "$COMBINED" | sed '1d;$d' > "$CERT_FILE"
# Append CA to certificate file for full chain
sed -n '/===CA===/,/===KEY===/p' "$COMBINED" | sed '1d;$d' >> "$CERT_FILE"
# Extract CA chain
sed -n '/===CA===/,/===KEY===/p' "$COMBINED" | sed '1d;$d' > "$CA_FILE"
# Extract private key
sed -n '/===KEY===/,$p' "$COMBINED" | sed '1d' > "$KEY_FILE"
# Set permissions
chmod 644 "$CERT_FILE" "$CA_FILE"
chmod 600 "$KEY_FILE"
# Reload nginx if running
nginx -s reload 2>/dev/null || true
echo "Certificates split successfully"

View File

@@ -0,0 +1,9 @@
{{- /* Combined Certificate Template - generates all certificate components from a single PKI call */ -}}
{{- with pkiCert "pki_int/issue/breakpilot-internal" "common_name=macmini" "alt_names=localhost,macmini.local" "ip_sans=127.0.0.1,192.168.178.163" "ttl=168h" -}}
===CERT===
{{ .Cert }}
===CA===
{{ .CA }}
===KEY===
{{ .Key }}
{{- end -}}

View File

@@ -0,0 +1,4 @@
{{- /* CA Chain Template */ -}}
{{- with pkiCert "pki_int/issue/breakpilot-internal" "common_name=macmini" "alt_names=localhost,macmini.local" "ip_sans=127.0.0.1,192.168.178.163" "ttl=168h" -}}
{{ .CA }}
{{- end -}}

View File

@@ -0,0 +1,5 @@
{{- /* Certificate Template for macmini */ -}}
{{- with pkiCert "pki_int/issue/breakpilot-internal" "common_name=macmini" "alt_names=localhost,macmini.local" "ip_sans=127.0.0.1,192.168.178.163" "ttl=168h" -}}
{{ .Cert }}
{{ .CA }}
{{- end -}}

View File

@@ -0,0 +1,4 @@
{{- /* Private Key Template for macmini */ -}}
{{- with pkiCert "pki_int/issue/breakpilot-internal" "common_name=macmini" "alt_names=localhost,macmini.local" "ip_sans=127.0.0.1,192.168.178.163" "ttl=168h" -}}
{{ .Key }}
{{- end -}}