Skip to content

Commit

Permalink
chore: TRACEFOSS-2373 stable environment setup preparation
Browse files Browse the repository at this point in the history
  • Loading branch information
ds-ext-sceronik committed Sep 21, 2023
1 parent de34d21 commit 54ab87f
Show file tree
Hide file tree
Showing 14 changed files with 1,542 additions and 6 deletions.
56 changes: 56 additions & 0 deletions charts/connector/aasregistry/values-stable-a.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
###############################################################
# Copyright (c) 2023 Contributors to the Eclipse Foundation
#
# See the NOTICE file(s) distributed with this work for additional
# information regarding copyright ownership.
#
# This program and the accompanying materials are made available under the
# terms of the Apache License, Version 2.0 which is available at
# https://www.apache.org/licenses/LICENSE-2.0.
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# SPDX-License-Identifier: Apache-2.0
###############################################################

registry:
enableKeycloak: false
postgresql:
primary:
persistence:
enabled: true
size: 1Gi
resources:
limits:
cpu: 400m
memory: 1Gi
requests:
cpu: 200m
memory: 1Gi
registry:
authentication: false
idpIssuerUri: https://centralidp.stable.demo.catena-x.net/auth/realms/CX-Central # check centralidp url when provided
host: trace-x-registry-stable-a.stable.demo.catena-x.net
ingress:
enabled: true
tls: true
className: nginx
urlPrefix: /semantics/registry
annotations:
nginx.ingress.kubernetes.io/enable-cors: "true"
nginx.ingress.kubernetes.io/cors-allow-credentials: "true"
nginx.ingress.kubernetes.io/rewrite-target: /$2
nginx.ingress.kubernetes.io/use-regex: "true"

resources:
limits:
cpu: 400m
memory: 1Gi
requests:
cpu: 200m
memory: 1Gi

56 changes: 56 additions & 0 deletions charts/connector/aasregistry/values-stable-b.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
###############################################################
# Copyright (c) 2023 Contributors to the Eclipse Foundation
#
# See the NOTICE file(s) distributed with this work for additional
# information regarding copyright ownership.
#
# This program and the accompanying materials are made available under the
# terms of the Apache License, Version 2.0 which is available at
# https://www.apache.org/licenses/LICENSE-2.0.
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# SPDX-License-Identifier: Apache-2.0
###############################################################

registry:
enableKeycloak: false
postgresql:
primary:
persistence:
enabled: true
size: 1Gi
resources:
limits:
cpu: 400m
memory: 1Gi
requests:
cpu: 200m
memory: 1Gi
registry:
authentication: false
idpIssuerUri: https://centralidp.stable.demo.catena-x.net/auth/realms/CX-Central # check centralidp url when provided
host: trace-x-registry-stable-b.stable.demo.catena-x.net
ingress:
enabled: true
tls: true
className: nginx
urlPrefix: /semantics/registry
annotations:
nginx.ingress.kubernetes.io/enable-cors: "true"
nginx.ingress.kubernetes.io/cors-allow-credentials: "true"
nginx.ingress.kubernetes.io/rewrite-target: /$2
nginx.ingress.kubernetes.io/use-regex: "true"

resources:
limits:
cpu: 400m
memory: 1Gi
requests:
cpu: 200m
memory: 1Gi

110 changes: 110 additions & 0 deletions charts/connector/edc-provider/values-stable-a.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,110 @@
tractusx-connector:
enabled: true
nameOverride: "tx-edc-provider-stable-a"
fullnameOverride: "tx-edc-provider-stable-a"
participant:
id: CHANGE_ME # provide bpn when specified
controlplane:
ingresses:
- enabled: true
hostname: "trace-x-edc-stable-a.stable.demo.catena-x.net"
annotations:
nginx.ingress.kubernetes.io/ssl-passthrough: "false"
nginx.ingress.kubernetes.io/backend-protocol: "HTTP"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
endpoints:
- protocol
- management
tls:
enabled: true
secretName: tls-secret
ssi:
miw:
url: <path:traceability-foss/data/stable-a/edc/wallet#ssi.miw.url>
authorityId: <path:traceability-foss/data/stable-a/edc/wallet#ssi.miw.authorityId>
oauth:
tokenurl: <path:traceability-foss/data/stable-a/edc/wallet#ssi.oauth.tokenurl>
client:
id: <path:traceability-foss/data/stable-a/edc/wallet#ssi.oauth.client.id>
secretAlias: edc-miw-keycloak-secret-stable-a
endpoints:
management:
authKey: <path:traceability-foss/data/stable-a/edc/controlplane#edc.api.control.auth.apikey.value>

resources:
limits:
cpu: 400m
memory: 1.5Gi
requests:
cpu: 200m
memory: 1.5Gi

dataplane:
ingresses:
- enabled: true
hostname: "trace-x-edc-stable-a-dataplane.stable.demo.catena-x.net"
annotations:
nginx.ingress.kubernetes.io/ssl-passthrough: "false"
nginx.ingress.kubernetes.io/backend-protocol: "HTTP"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
endpoints:
- public
className: "nginx"
tls:
enabled: true
secretName: tls-secret

resources:
limits:
cpu: 200m
memory: 512Mi
requests:
cpu: 100m
memory: 512Mi

backendService:
httpProxyTokenReceiverUrl: "https://traceability-stable-a.stable.demo.catena-x.net/api/callback/endpoint-data-reference"

postgresql:
enabled: true
auth:
username: "<path:traceability-foss/data/stable-a/edc/database#user>"
password: "<path:traceability-foss/data/stable-a/edc/database#password>"
username: "<path:traceability-foss/data/stable-a/edc/database#user>"
password: "<path:traceability-foss/data/stable-a/edc/database#password>"
jdbcUrl: "jdbc:postgresql://tx-edc-provider-postgresql-stable-a-hl:5432/edc"

vault:
hashicorp:
url: "https://vault.demo.catena-x.net"
token: "<path:traceability-foss/data/stable-a/edc#edc.vault.hashicorp.token>"
timeout: 30
healthCheck:
enabled: true
standbyOk: true
paths:
secret: /v1/traceability-foss
health: /v1/sys/health
secretNames:
transferProxyTokenSignerPrivateKey: daps-cert-key-stable-a
transferProxyTokenSignerPublicKey: daps-cert-stable-a
transferProxyTokenEncryptionAesKey: token-signer-aes-key

edc-postgresql:
nameOverride: "tx-edc-provider-postgresql-stable-a"
fullnameOverride: "tx-edc-provider-postgresql-stable-a"
enabled: true

primary:
resources:
requests:
cpu: 100m
memory: 1Gi
limits:
cpu: 200m
memory: 1Gi
auth:
database: edc
username: <path:traceability-foss/data/stable-a/edc/database#user>
postgresPassword: <path:traceability-foss/data/stable-a/edc/database#password>
password: <path:traceability-foss/data/stable-a/edc/database#password>
110 changes: 110 additions & 0 deletions charts/connector/edc-provider/values-stable-b.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,110 @@
tractusx-connector:
enabled: true
nameOverride: "tx-edc-provider-stable-b"
fullnameOverride: "tx-edc-provider-stable-b"
participant:
id: CHANGE_ME # provide bpn when specified
controlplane:
ingresses:
- enabled: true
hostname: "trace-x-edc-stable-b.stable.demo.catena-x.net"
annotations:
nginx.ingress.kubernetes.io/ssl-passthrough: "false"
nginx.ingress.kubernetes.io/backend-protocol: "HTTP"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
endpoints:
- protocol
- management
tls:
enabled: true
secretName: tls-secret
ssi:
miw:
url: <path:traceability-foss/data/stable-b/edc/wallet#ssi.miw.url>
authorityId: <path:traceability-foss/data/stable-b/edc/wallet#ssi.miw.authorityId>
oauth:
tokenurl: <path:traceability-foss/data/stable-b/edc/wallet#ssi.oauth.tokenurl>
client:
id: <path:traceability-foss/data/stable-b/edc/wallet#ssi.oauth.client.id>
secretAlias: edc-miw-keycloak-secret-stable-b
endpoints:
management:
authKey: <path:traceability-foss/data/stable-b/edc/controlplane#edc.api.control.auth.apikey.value>

resources:
limits:
cpu: 400m
memory: 1.5Gi
requests:
cpu: 200m
memory: 1.5Gi

dataplane:
ingresses:
- enabled: true
hostname: "trace-x-edc-stable-b-dataplane.stable.demo.catena-x.net"
annotations:
nginx.ingress.kubernetes.io/ssl-passthrough: "false"
nginx.ingress.kubernetes.io/backend-protocol: "HTTP"
nginx.ingress.kubernetes.io/force-ssl-redirect: "true"
endpoints:
- public
className: "nginx"
tls:
enabled: true
secretName: tls-secret

resources:
limits:
cpu: 200m
memory: 512Mi
requests:
cpu: 100m
memory: 512Mi

backendService:
httpProxyTokenReceiverUrl: "https://traceability-stable-b.stable.demo.catena-x.net/api/callback/endpoint-data-reference"

postgresql:
enabled: true
auth:
username: "<path:traceability-foss/data/stable-b/edc/database#user>"
password: "<path:traceability-foss/data/stable-b/edc/database#password>"
username: "<path:traceability-foss/data/stable-b/edc/database#user>"
password: "<path:traceability-foss/data/stable-b/edc/database#password>"
jdbcUrl: "jdbc:postgresql://tx-edc-provider-postgresql-stable-b-hl:5432/edc"

vault:
hashicorp:
url: "https://vault.demo.catena-x.net"
token: "<path:traceability-foss/data/stable-b/edc#edc.vault.hashicorp.token>"
timeout: 30
healthCheck:
enabled: true
standbyOk: true
paths:
secret: /v1/traceability-foss
health: /v1/sys/health
secretNames:
transferProxyTokenSignerPrivateKey: daps-cert-key-stable-b
transferProxyTokenSignerPublicKey: daps-cert-stable-b
transferProxyTokenEncryptionAesKey: token-signer-aes-key

edc-postgresql:
nameOverride: "tx-edc-provider-postgresql-stable-b"
fullnameOverride: "tx-edc-provider-postgresql-stable-b"
enabled: true

primary:
resources:
requests:
cpu: 100m
memory: 1Gi
limits:
cpu: 200m
memory: 1Gi
auth:
database: edc
username: <path:traceability-foss/data/stable-b/edc/database#user>
postgresPassword: <path:traceability-foss/data/stable-b/edc/database#password>
password: <path:traceability-foss/data/stable-b/edc/database#password>
Loading

0 comments on commit 54ab87f

Please sign in to comment.