Skip to content

Latest commit

 

History

History
171 lines (156 loc) · 14.9 KB

File metadata and controls

171 lines (156 loc) · 14.9 KB

bdrs-server

Version: 0.5.2 Type: application AppVersion: 0.5.2

A Helm chart for the Tractus-X BPN-DID Resolution Service

Homepage: https://github.com/eclipse-tractusx/bpn-did-resolution-service/tree/main/charts/bdrs-server

Configure the chart

Optionally provide the following configuration entries to your Tractus-X BDRS Server Helm chart, either by directly setting them (--set) or by supplying an additional yaml file:

  • server.endpoints.default.[port|path]: the port and base path for the Observability API. This API is not supposed to be reachable via the internet!
  • server.endpoints.management.[port|path]: the port and base path for the Management API. This API is not supposed to be reachable via the internet!
  • server.endpoints.directory.[port|path]: the port and base path for the Directory API. This API is supposed to be internet-facing.

Launching the application

Simply execute these commands on a shell:

helm repo add tractusx https://eclipse-tractusx.github.io/charts/dev
helm install my-release tractusx-edc/bdrs-server --version 0.5.2 \
     -f <path-to>/additional-values-file.yaml \
     --wait-for-jobs --timeout=120s --dependency-update

Source Code

Requirements

Repository Name Version
https://charts.bitnami.com/bitnami postgresql(postgresql) 12.11.2
https://helm.releases.hashicorp.com vault(vault) 0.27.0

Values

Key Type Default Description
customCaCerts object {} Add custom ca certificates to the truststore
customLabels object {} To add some custom labels
fullnameOverride string ""
imagePullSecrets list [] Existing image pull secret to use to obtain the container image from private registries
install.postgresql bool true
install.vault bool true
nameOverride string ""
postgresql.auth.database string "bdrs"
postgresql.auth.password string "password"
postgresql.auth.username string "bdrs"
postgresql.jdbcUrl string "jdbc:postgresql://{{ .Release.Name }}-postgresql:5432/bdrs"
postgresql.primary.persistence.enabled bool false
postgresql.primary.resources.limits.cpu int 1
postgresql.primary.resources.limits.memory string "1Gi"
postgresql.primary.resources.requests.cpu string "250m"
postgresql.primary.resources.requests.memory string "256Mi"
postgresql.readReplicas.persistence.enabled bool false
postgresql.readReplicas.resources.limits.cpu string "500Mi"
postgresql.readReplicas.resources.limits.memory string "1Gi"
postgresql.readReplicas.resources.requests.cpu string "250m"
postgresql.readReplicas.resources.requests.memory string "256Mi"
server.affinity object {}
server.autoscaling.enabled bool false Enables horizontal pod autoscaling
server.autoscaling.maxReplicas int 100 Maximum replicas if resource consumption exceeds resource threshholds
server.autoscaling.minReplicas int 1 Minimal replicas if resource consumption falls below resource threshholds
server.autoscaling.targetCPUUtilizationPercentage int 80 targetAverageUtilization of cpu provided to a pod
server.autoscaling.targetMemoryUtilizationPercentage int 80 targetAverageUtilization of memory provided to a pod
server.debug.enabled bool false
server.debug.port int 1044
server.debug.suspendOnStart bool false
server.endpoints object {"default":{"path":"/api","port":8080},"directory":{"path":"/api/directory","port":8082},"management":{"authKeyAlias":"mgmt-api-key","path":"/api/management","port":8081}} endpoints of the control plane
server.endpoints.default object {"path":"/api","port":8080} default api for health checks, should not be added to any ingress
server.endpoints.default.path string "/api" path for incoming api calls
server.endpoints.default.port int 8080 port for incoming api calls
server.endpoints.directory object {"path":"/api/directory","port":8082} directory API
server.endpoints.directory.path string "/api/directory" path for incoming api calls
server.endpoints.directory.port int 8082 port for incoming api calls
server.endpoints.management object {"authKeyAlias":"mgmt-api-key","path":"/api/management","port":8081} management api, used by internal users, can be added to an ingress and must not be internet facing
server.endpoints.management.authKeyAlias string "mgmt-api-key" authentication key, must be attached to each 'X-Api-Key' request header
server.endpoints.management.path string "/api/management" path for incoming api calls
server.endpoints.management.port int 8081 port for incoming api calls
server.env object {}
server.envConfigMapNames list []
server.envSecretNames list []
server.envValueFrom object {}
server.image.pullPolicy string "IfNotPresent" Kubernetes image pull policy to use
server.image.repository string ""
server.image.tag string "" Overrides the image tag whose default is the chart appVersion
server.ingresses[0].annotations object {} Additional ingress annotations to add
server.ingresses[0].certManager.clusterIssuer string "" If preset enables certificate generation via cert-manager cluster-wide issuer
server.ingresses[0].certManager.issuer string "" If preset enables certificate generation via cert-manager namespace scoped issuer
server.ingresses[0].className string "" Defines the ingress class to use
server.ingresses[0].enabled bool false
server.ingresses[0].endpoints list ["directory"] EDC endpoints exposed by this ingress resource
server.ingresses[0].hostname string "bdrs-server.directory.local" The hostname to be used to precisely map incoming traffic onto the underlying network service
server.ingresses[0].tls object {"enabled":false,"secretName":""} TLS tls class applied to the ingress resource
server.ingresses[0].tls.enabled bool false Enables TLS on the ingress resource
server.ingresses[0].tls.secretName string "" If present overwrites the default secret name
server.ingresses[1].annotations object {} Additional ingress annotations to add
server.ingresses[1].certManager.clusterIssuer string "" If preset enables certificate generation via cert-manager cluster-wide issuer
server.ingresses[1].certManager.issuer string "" If preset enables certificate generation via cert-manager namespace scoped issuer
server.ingresses[1].className string "" Defines the ingress class to use
server.ingresses[1].enabled bool false
server.ingresses[1].endpoints list ["management"] EDC endpoints exposed by this ingress resource
server.ingresses[1].hostname string "bdrs-server.mgmt.local" The hostname to be used to precisely map incoming traffic onto the underlying network service
server.ingresses[1].tls object {"enabled":false,"secretName":""} TLS tls class applied to the ingress resource
server.ingresses[1].tls.enabled bool false Enables TLS on the ingress resource
server.ingresses[1].tls.secretName string "" If present overwrites the default secret name
server.initContainers list []
server.livenessProbe.enabled bool true Whether to enable kubernetes liveness-probe
server.livenessProbe.failureThreshold int 6 when a probe fails kubernetes will try 6 times before giving up
server.livenessProbe.initialDelaySeconds int 5 seconds to wait before performing the first liveness check
server.livenessProbe.periodSeconds int 5 this fields specifies that kubernetes should perform a liveness check every 5 seconds
server.livenessProbe.successThreshold int 1 number of consecutive successes for the probe to be considered successful after having failed
server.livenessProbe.timeoutSeconds int 5 number of seconds after which the probe times out
server.logging string ".level=INFO\norg.eclipse.edc.level=ALL\nhandlers=java.util.logging.ConsoleHandler\njava.util.logging.ConsoleHandler.formatter=java.util.logging.SimpleFormatter\njava.util.logging.ConsoleHandler.level=ALL\njava.util.logging.SimpleFormatter.format=[%1$tY-%1$tm-%1$td %1$tH:%1$tM:%1$tS] [%4$-7s] %5$s%6$s%n" configuration of the Java Util Logging Facade
server.nodeSelector object {}
server.podAnnotations object {} additional annotations for the pod
server.podLabels object {} additional labels for the pod
server.podSecurityContext object {"fsGroup":10001,"runAsGroup":10001,"runAsUser":10001,"seccompProfile":{"type":"RuntimeDefault"}} The pod security context defines privilege and access control settings for a Pod within the deployment
server.podSecurityContext.fsGroup int 10001 The owner for volumes and any files created within volumes will belong to this guid
server.podSecurityContext.runAsGroup int 10001 Processes within a pod will belong to this guid
server.podSecurityContext.runAsUser int 10001 Runs all processes within a pod with a special uid
server.podSecurityContext.seccompProfile.type string "RuntimeDefault" Restrict a Container's Syscalls with seccomp
server.readinessProbe.enabled bool true Whether to enable kubernetes readiness-probes
server.readinessProbe.failureThreshold int 6 when a probe fails kubernetes will try 6 times before giving up
server.readinessProbe.initialDelaySeconds int 5 seconds to wait before performing the first readiness check
server.readinessProbe.periodSeconds int 5 this fields specifies that kubernetes should perform a readiness check every 5 seconds
server.readinessProbe.successThreshold int 1 number of consecutive successes for the probe to be considered successful after having failed
server.readinessProbe.timeoutSeconds int 5 number of seconds after which the probe times out
server.replicaCount int 1
server.resources object {"limits":{"cpu":1.5,"memory":"512Mi"},"requests":{"cpu":"500m","memory":"128Mi"}} resource management for the container
server.securityContext.allowPrivilegeEscalation bool false Controls Privilege Escalation enabling setuid binaries changing the effective user ID
server.securityContext.capabilities.add list [] Specifies which capabilities to add to issue specialized syscalls
server.securityContext.capabilities.drop list ["ALL"] Specifies which capabilities to drop to reduce syscall attack surface
server.securityContext.readOnlyRootFilesystem bool true Whether the root filesystem is mounted in read-only mode
server.securityContext.runAsNonRoot bool true Requires the container to run without root privileges
server.securityContext.runAsUser int 10001 The container's process will run with the specified uid
server.service.annotations object {}
server.service.type string "ClusterIP" Service type to expose the running application on a set of Pods as a network service.
server.tolerations list []
server.trustedIssuers list [] Configures the trusted issuers for this runtime. Must not be empty.
server.url.protocol string "" Explicitly declared url for reaching the dsp api (e.g. if ingresses not used)
server.url.public string ""
server.url.readiness string ""
server.volumeMounts list [] declare where to mount volumes into the container
server.volumes list [] volume directories
serviceAccount.annotations object {}
serviceAccount.create bool true
serviceAccount.imagePullSecrets list [] Existing image pull secret bound to the service account to use to obtain the container image from private registries
serviceAccount.name string ""
tests object {"hookDeletePolicy":"before-hook-creation,hook-succeeded"} Configurations for Helm tests
tests.hookDeletePolicy string "before-hook-creation,hook-succeeded" Configure the hook-delete-policy for Helm tests
vault.hashicorp.healthCheck.enabled bool true
vault.hashicorp.healthCheck.standbyOk bool true
vault.hashicorp.paths.health string "/v1/sys/health"
vault.hashicorp.paths.secret string "/v1/secret"
vault.hashicorp.timeout int 30
vault.hashicorp.token string "root"
vault.hashicorp.url string "http://{{ .Release.Name }}-vault:8200"
vault.injector.enabled bool false
vault.server.dev.devRootToken string "root"
vault.server.dev.enabled bool true
vault.server.postStart string nil

Autogenerated from chart metadata using helm-docs v1.10.0