|
1 |
| -<!-- |
2 |
| -####################################################################### |
| 1 | +# simple-data-backend |
3 | 2 |
|
4 |
| -Tractus-X - Digital Product Pass Application |
| 3 | +   |
5 | 4 |
|
6 |
| -Copyright (c) 2022, 2024 BMW AG |
7 |
| -Copyright (c) 2022, 2024 Henkel AG & Co. KGaA |
8 |
| -Copyright (c) 2023, 2024 CGI Deutschland B.V. & Co. KG |
9 |
| -Copyright (c) 2023, 2024 Contributors to the Eclipse Foundation |
| 5 | +A Helm chart for Kubernetes |
10 | 6 |
|
11 |
| -See the NOTICE file(s) distributed with this work for additional |
12 |
| -information regarding copyright ownership. |
| 7 | +## Requirements |
13 | 8 |
|
14 |
| -This work is made available under the terms of the |
15 |
| -Creative Commons Attribution 4.0 International (CC-BY-4.0) license, |
16 |
| -which is available at |
17 |
| -https://creativecommons.org/licenses/by/4.0/legalcode. |
18 |
| -
|
19 |
| -SPDX-License-Identifier: CC-BY-4.0 |
20 |
| -
|
21 |
| -####################################################################### |
22 |
| ---> |
23 |
| - |
24 |
| -# data-service |
25 |
| - |
26 |
| -   |
27 |
| - |
28 |
| -The Eclipse Dataspace Connector requires the Backend Application to transfer data using the HTTP-TransferMethod. |
| 9 | +| Repository | Name | Version | |
| 10 | +|------------|------|---------| |
| 11 | +| https://eclipse-tractusx.github.io/charts/dev | simple-data-backend(simple-data-backend) | 0.1.0 | |
29 | 12 |
|
30 | 13 | ## Values
|
31 | 14 |
|
32 | 15 | | Key | Type | Default | Description |
|
33 | 16 | |-----|------|---------|-------------|
|
34 |
| -| affinity | object | `{}` | | |
35 |
| -| container.port | int | `80` | | |
36 |
| -| fullnameOverride | string | `"data-service"` | Overrides the releases full name | |
37 |
| -| image.command | string | `""` | | |
38 |
| -| image.pullPolicy | string | `"IfNotPresent"` | [Kubernetes image pull policy](https://kubernetes.io/docs/concepts/containers/images/#image-pull-policy) to use | |
39 |
| -| image.repository | string | `"ghcr.io/catenax-ng/catenax-at-home/provider-backend-service"` | Which container image to use | |
40 |
| -| image.tag | string | `"0.0.1"` | Overrides the image tag whose default is the chart appVersion | |
41 |
| -| imagePullSecrets | list | `[]` | | |
42 |
| -| ingress.annotations."nginx.ingress.kubernetes.io/backend-protocol" | string | `"HTTP"` | | |
43 |
| -| ingress.annotations."nginx.ingress.kubernetes.io/force-ssl-redirect" | string | `"true"` | | |
44 |
| -| ingress.annotations."nginx.ingress.kubernetes.io/rewrite-target" | string | `"/$2"` | | |
45 |
| -| ingress.annotations."nginx.ingress.kubernetes.io/ssl-passthrough" | string | `"false"` | | |
46 |
| -| ingress.className | string | `"nginx"` | | |
47 |
| -| ingress.enabled | bool | `true` | | |
48 |
| -| ingress.hosts[0].host | string | `"materialpass.int.demo.catena-x.net"` | | |
49 |
| -| ingress.hosts[0].paths[0].path | string | `"/provider_backend(/|$)(.*)"` | | |
50 |
| -| ingress.hosts[0].paths[0].pathType | string | `"Prefix"` | | |
51 |
| -| ingress.tls[0].hosts[0] | string | `"materialpass.int.demo.catena-x.net"` | | |
52 |
| -| ingress.tls[0].secretName | string | `"tls-secret"` | | |
53 |
| -| livenessProbe | object | `{}` | | |
54 |
| -| nameOverride | string | `""` | Overrides the charts name | |
55 |
| -| nodeSelector | object | `{}` | | |
56 |
| -| podAnnotations | object | `{}` | additional annotations for the pod | |
57 |
| -| podSecurityContext.fsGroup | int | `10001` | The owner for volumes and any files created within volumes will belong to this guid | |
58 |
| -| podSecurityContext.runAsGroup | int | `10001` | Processes within a pod will belong to this guid | |
59 |
| -| podSecurityContext.runAsUser | int | `10001` | Runs all processes within a pod with a special uid | |
60 |
| -| podSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | Restrict a Container's Syscalls with seccomp | |
61 |
| -| readinessProbe | object | `{}` | | |
62 |
| -| replicaCount | int | `1` | | |
63 |
| -| securityContext.allowPrivilegeEscalation | bool | `false` | Controls [Privilege Escalation](https://kubernetes.io/docs/concepts/security/pod-security-policy/#privilege-escalation) enabling setuid binaries changing the effective user ID | |
64 |
| -| securityContext.capabilities.add | list | `[]` | Specifies which capabilities to add to issue specialized syscalls | |
65 |
| -| securityContext.capabilities.drop | list | `["ALL"]` | Specifies which capabilities to drop to reduce syscall attack surface | |
66 |
| -| securityContext.readOnlyRootFilesystem | bool | `true` | Whether the root filesystem is mounted in read-only mode | |
67 |
| -| securityContext.runAsNonRoot | bool | `true` | Requires the container to run without root privileges | |
68 |
| -| securityContext.runAsUser | int | `10001` | The container's process will run with the specified uid | |
69 |
| -| service.port | int | `8080` | [Service type](https://kubernetes.io/docs/concepts/services-networking/service/#defining-a-service) to expose the running application on a set of Pods as a network service. | |
70 |
| -| service.type | string | `"ClusterIP"` | [Service type](https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services-service-types) to expose the running application on a set of Pods as a network service. | |
71 |
| -| tolerations | list | `[]` | | |
| 17 | +| simple-data-backend.affinity | object | `{}` | | |
| 18 | +| simple-data-backend.autoscaling.enabled | bool | `false` | | |
| 19 | +| simple-data-backend.autoscaling.maxReplicas | int | `100` | | |
| 20 | +| simple-data-backend.autoscaling.minReplicas | int | `1` | | |
| 21 | +| simple-data-backend.autoscaling.targetCPUUtilizationPercentage | int | `80` | | |
| 22 | +| simple-data-backend.fullnameOverride | string | `"simple-data-backend"` | | |
| 23 | +| simple-data-backend.image.pullPolicy | string | `"IfNotPresent"` | | |
| 24 | +| simple-data-backend.image.repository | string | `"tractusx/simple-data-backend"` | | |
| 25 | +| simple-data-backend.image.tag | string | `"latest"` | | |
| 26 | +| simple-data-backend.imagePullSecrets | list | `[]` | | |
| 27 | +| simple-data-backend.ingress.annotations."nginx.ingress.kubernetes.io/backend-protocol" | string | `"HTTP"` | | |
| 28 | +| simple-data-backend.ingress.annotations."nginx.ingress.kubernetes.io/force-ssl-redirect" | string | `"true"` | | |
| 29 | +| simple-data-backend.ingress.annotations."nginx.ingress.kubernetes.io/rewrite-target" | string | `"/$2"` | | |
| 30 | +| simple-data-backend.ingress.annotations."nginx.ingress.kubernetes.io/ssl-passthrough" | string | `"false"` | | |
| 31 | +| simple-data-backend.ingress.className | string | `"nginx"` | | |
| 32 | +| simple-data-backend.ingress.enabled | bool | `true` | | |
| 33 | +| simple-data-backend.ingress.hosts[0].host | string | `"tx-dpp.int.catena-x.net"` | | |
| 34 | +| simple-data-backend.ingress.hosts[0].paths[0].path | string | `"/data-service(/|$)(.*)"` | | |
| 35 | +| simple-data-backend.ingress.hosts[0].paths[0].pathType | string | `"Prefix"` | | |
| 36 | +| simple-data-backend.ingress.tls[0].hosts[0] | string | `"tx-dpp.int.catena-x.net"` | | |
| 37 | +| simple-data-backend.ingress.tls[0].secretName | string | `"tls-secret"` | | |
| 38 | +| simple-data-backend.livenessProbe | object | `{}` | | |
| 39 | +| simple-data-backend.nameOverride | string | `"simple-data-backend"` | | |
| 40 | +| simple-data-backend.nodeSelector | object | `{}` | | |
| 41 | +| simple-data-backend.podAnnotations | object | `{}` | | |
| 42 | +| simple-data-backend.podSecurityContext | object | `{}` | | |
| 43 | +| simple-data-backend.readinessProbe | object | `{}` | | |
| 44 | +| simple-data-backend.replicaCount | int | `1` | | |
| 45 | +| simple-data-backend.resources.limits.cpu | string | `"250m"` | | |
| 46 | +| simple-data-backend.resources.limits.memory | string | `"512Mi"` | | |
| 47 | +| simple-data-backend.resources.requests.cpu | string | `"50m"` | | |
| 48 | +| simple-data-backend.resources.requests.memory | string | `"512Mi"` | | |
| 49 | +| simple-data-backend.securityContext.allowPrivilegeEscalation | bool | `false` | | |
| 50 | +| simple-data-backend.securityContext.runAsGroup | int | `3000` | | |
| 51 | +| simple-data-backend.securityContext.runAsNonRoot | bool | `true` | | |
| 52 | +| simple-data-backend.securityContext.runAsUser | int | `1000` | | |
| 53 | +| simple-data-backend.service.port | int | `8080` | | |
| 54 | +| simple-data-backend.service.type | string | `"ClusterIP"` | | |
| 55 | +| simple-data-backend.tolerations | list | `[]` | | |
72 | 56 |
|
73 | 57 | ----------------------------------------------
|
74 | 58 | Autogenerated from chart metadata using [helm-docs v1.11.0](https://github.com/norwoodj/helm-docs/releases/v1.11.0)
|
0 commit comments