-
Notifications
You must be signed in to change notification settings - Fork 61
/
Copy pathexample.yaml
70 lines (62 loc) · 2.72 KB
/
example.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
#
# Copyright (c) 2023 Bayerische Motoren Werke Aktiengesellschaft (BMW AG)
# Copyright (c) 2021, 2023 Contributors to the Eclipse Foundation
#
# See the NOTICE file(s) distributed with this work for additional
# information regarding copyright ownership.
#
# This program and the accompanying materials are made available under the
# terms of the Apache License, Version 2.0 which is available at
# https://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# SPDX-License-Identifier: Apache-2.0
#
## This file can be used to verify that the chart is working properly. It provides an exemplary configuration
## that is intended to be used with the supporting infrastructure.
## 1. install DAPS:
## helm install infrastructure edc-tests/deployment/src/main/resources/helm/test-infrastructure \ ─╯
## --wait-for-jobs
##
## 2. install in-mem runtime. Note that the key and crt must match exactly the DAPS setup, c.f. edc-tests/deployment/src/main/resources/helm/test-infrastructure/values.yaml
## export DAPSKEY="<private-key-content>"
## export DAPSCRT="<certificate-content>"
## export YOUR_VAULT_SECRETS="daps-key:$DAPSKEY;daps-crt:$DAPSCRT"
## helm install trudy charts/tractusx-connector-memory -f charts/tractusx-connector-memory/example.yaml --set vault.secrets=$YOUR_VAULT_SECRETS
---
fullnameOverride: tx-inmem
participant:
id: "test-participant"
runtime:
service:
type: NodePort
endpoints:
management:
authKey: password
image:
pullPolicy: Never
tag: "latest"
repository: "edc-runtime-memory"
securityContext:
# avoids some errors in the log: cannot write temp files of large multipart requests when R/O
readOnlyRootFilesystem: false
vault:
secretNames:
transferProxyTokenSignerPublicKey: daps-crt
transferProxyTokenSignerPrivateKey: daps-key
transferProxyTokenEncryptionAesKey: aes-keys
dapsPrivateKey: daps-key
dapsPublicKey: daps-crt
# this must be set through CLI args: --set vault.secrets=$YOUR_VAULT_SECRETS where YOUR_VAULT_SECRETS should
# be a string in the format "key1:secret1;key2:secret2;..."
secrets:
daps:
url: "http://daps:4567"
clientId: "99:83:A7:17:86:FF:98:93:CE:A0:DD:A1:F1:36:FA:F6:0F:75:0A:23:keyid:99:83:A7:17:86:FF:98:93:CE:A0:DD:A1:F1:36:FA:F6:0F:75:0A:23"
backendService:
httpProxyTokenReceiverUrl: "http://backend:8080"