This repository has been archived on 2026-02-15. You can view files and clone it. You cannot open issues or pull requests or push a commit.
Files
breakpilot-pwa/docker-compose.vault.yml
Benjamin Admin 21a844cb8a fix: Restore all files lost during destructive rebase
A previous `git pull --rebase origin main` dropped 177 local commits,
losing 3400+ files across admin-v2, backend, studio-v2, website,
klausur-service, and many other services. The partial restore attempt
(660295e2) only recovered some files.

This commit restores all missing files from pre-rebase ref 98933f5e
while preserving post-rebase additions (night-scheduler, night-mode UI,
NightModeWidget dashboard integration).

Restored features include:
- AI Module Sidebar (FAB), OCR Labeling, OCR Compare
- GPU Dashboard, RAG Pipeline, Magic Help
- Klausur-Korrektur (8 files), Abitur-Archiv (5+ files)
- Companion, Zeugnisse-Crawler, Screen Flow
- Full backend, studio-v2, website, klausur-service
- All compliance SDKs, agent-core, voice-service
- CI/CD configs, documentation, scripts

Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
2026-02-09 09:51:32 +01:00

99 lines
2.8 KiB
YAML

# HashiCorp Vault Configuration for BreakPilot
#
# Usage:
# Development mode (unsealed, no auth required):
# docker-compose -f docker-compose.vault.yml up -d vault
#
# Production mode:
# docker-compose -f docker-compose.vault.yml --profile production up -d
#
# After starting Vault in dev mode:
# export VAULT_ADDR=http://localhost:8200
# export VAULT_TOKEN=breakpilot-dev-token
#
# License: HashiCorp Vault is BSL 1.1 (open source for non-commercial use)
# Vault clients (hvac) are Apache-2.0
services:
# HashiCorp Vault - Secrets Management
vault:
image: hashicorp/vault:1.15
container_name: breakpilot-pwa-vault
ports:
- "8200:8200"
environment:
# Development mode settings
VAULT_DEV_ROOT_TOKEN_ID: ${VAULT_DEV_TOKEN:-breakpilot-dev-token}
VAULT_DEV_LISTEN_ADDRESS: "0.0.0.0:8200"
VAULT_ADDR: "http://127.0.0.1:8200"
VAULT_API_ADDR: "http://0.0.0.0:8200"
cap_add:
- IPC_LOCK # Required for mlock
volumes:
- vault_data:/vault/data
- vault_logs:/vault/logs
- ./vault/config:/vault/config:ro
- ./vault/policies:/vault/policies:ro
command: server -dev -dev-root-token-id=${VAULT_DEV_TOKEN:-breakpilot-dev-token}
healthcheck:
test: ["CMD", "vault", "status"]
interval: 10s
timeout: 5s
retries: 3
networks:
- breakpilot-pwa-network
restart: unless-stopped
# Vault Agent for automatic secret injection (production)
vault-agent:
image: hashicorp/vault:1.15
container_name: breakpilot-pwa-vault-agent
profiles:
- production
depends_on:
vault:
condition: service_healthy
environment:
VAULT_ADDR: "http://vault:8200"
volumes:
- ./vault/agent-config.hcl:/vault/config/agent-config.hcl:ro
- vault_agent_secrets:/vault/secrets
command: agent -config=/vault/config/agent-config.hcl
networks:
- breakpilot-pwa-network
restart: unless-stopped
# Vault initializer - Seeds secrets in development
vault-init:
image: hashicorp/vault:1.15
container_name: breakpilot-pwa-vault-init
depends_on:
vault:
condition: service_healthy
environment:
VAULT_ADDR: "http://vault:8200"
VAULT_TOKEN: ${VAULT_DEV_TOKEN:-breakpilot-dev-token}
volumes:
- ./vault/init-secrets.sh:/vault/init-secrets.sh:ro
entrypoint: ["/bin/sh", "-c"]
command:
- |
sleep 5
chmod +x /vault/init-secrets.sh
/vault/init-secrets.sh
echo "Vault initialized with development secrets"
networks:
- breakpilot-pwa-network
volumes:
vault_data:
name: breakpilot_vault_data
vault_logs:
name: breakpilot_vault_logs
vault_agent_secrets:
name: breakpilot_vault_agent_secrets
networks:
breakpilot-pwa-network:
external: true