Skip to content

Commit

Permalink
chore: deploy to association environment (#61)
Browse files Browse the repository at this point in the history
  • Loading branch information
evegufy authored Jul 10, 2024
1 parent edd8ceb commit 185d944
Show file tree
Hide file tree
Showing 2 changed files with 136 additions and 0 deletions.
38 changes: 38 additions & 0 deletions environments/argocd-app-templates/appsetup-int.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
###############################################################
# Copyright (c) 2024 BMW Group AG
#
# See the NOTICE file(s) distributed with this work for additional
# information regarding copyright ownership.
#
# This program and the accompanying materials are made available under the
# terms of the Apache License, Version 2.0 which is available at
# https://www.apache.org/licenses/LICENSE-2.0.
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# SPDX-License-Identifier: Apache-2.0
###############################################################

apiVersion: argoproj.io/v1alpha1
kind: Application
metadata:
name: dim-wrapper
spec:
destination:
namespace: product-portal
server: 'https://kubernetes.default.svc'
source:
path: charts/dim
repoURL: 'https://github.com/phil91/dim-client.git'
targetRevision: chore/349-deploy-to-eV
plugin:
env:
- name: AVP_SECRET
value: vault-secret
- name: helm_args
value: '-f values.yaml -f ../../environments/helm-values/values-int.yaml'
project: project-portal
98 changes: 98 additions & 0 deletions environments/helm-values/values-int.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,98 @@
###############################################################
# Copyright (c) 2024 BMW Group AG
#
# See the NOTICE file(s) distributed with this work for additional
# information regarding copyright ownership.
#
# This program and the accompanying materials are made available under the
# terms of the Apache License, Version 2.0 which is available at
# https://www.apache.org/licenses/LICENSE-2.0.
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# SPDX-License-Identifier: Apache-2.0
###############################################################

ingress:
enabled: true
className: "nginx"
annotations:
cert-manager.io/cluster-issuer: "letsencrypt-prod"
nginx.ingress.kubernetes.io/use-regex: "true"
nginx.ingress.kubernetes.io/enable-cors: "true"
nginx.ingress.kubernetes.io/proxy-body-size: "8m"
nginx.ingress.kubernetes.io/cors-allow-origin: "https://*.int.catena-x.net"
tls:
- secretName: "dim.int.catena-x.net-tls"
hosts:
- "dim.int.catena-x.net"
hosts:
- host: "dim.int.catena-x.net"
paths:
- path: "/api/dim"
pathType: "Prefix"
backend:
port: 8080

dim:
swaggerEnabled: true
rootDirectoryId: "d6cd4e2e-1053-4ba6-888e-1cd56509958a"
operatorId: "d6cd4e2e-1053-4ba6-888e-1cd56509958a"

migrations:
logging:
default: "Debug"

processesworker:
logging:
default: "Debug"
dim:
adminMail: "<path:portal/data/dim/int/dim#adminMail>"
clientIdCisCentral: "<path:portal/data/dim/int/dim#cisClientId>"
clientSecretCisCentral: "<path:portal/data/dim/int/dim#cisClientSecret>"
authUrl: "https://catena-x-int-div.authentication.eu10.hana.ondemand.com"
subaccount:
# -- Url to the subaccount service api
baseUrl: "https://accounts-service.cfapps.eu10.hana.ondemand.com"
entitlement:
# -- Url to the entitlement service api
baseUrl: "https://entitlements-service.cfapps.eu10.hana.ondemand.com"
cf:
clientId: "<path:portal/data/dim/int/cf#clientId>"
clientSecret: "<path:portal/data/dim/int/cf#clientSecret>"
tokenAddress: "https://login.cf.eu10.hana.ondemand.com/oauth/token"
# -- Url to the cf service api
baseUrl: "https://api.cf.eu10.hana.ondemand.com"
grantType: "client_credentials"
callback:
scope: "openid"
grantType: "client_credentials"
# -- Provide client-id for callback.
clientId: "<path:portal/data/dim/callback#clientId>"
# -- Client-secret for callback client-id. Secret-key 'callback-client-secret'.
clientSecret: "<path:portal/data/int/iam/centralidp-client-secrets#dim-portal-sa>"
tokenAddress: "http://centralidp.int.catena-x.net/auth/realms/CX-Central/protocol/openid-connect/token"
# -- Url to the cf service api
baseAddress: "https://portal-backend.int.catena-x.net"
technicalUserCreation:
encryptionConfigs:
index0:
encryptionKey: "<<path:portal/data/dim/int/technicaluser#technicalusercreation-encryption-key0>"

idp:
address: "https://centralidp.int.catena-x.net"
jwtBearerOptions:
tokenValidationParameters:
validAudience: "DIM-Middle-Layer"

replicaCount: 2

postgresql:
architecture: "standalone"
auth:
postgrespassword: "<path:portal/data/dim/int/postgres#postgres-password>"
password: "<path:portal/data/dim/int/postgres#password>"

0 comments on commit 185d944

Please sign in to comment.