Skip to content

Latest commit

 

History

History
 
 

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 

tractusx-connector

Version: 0.3.3 Type: application AppVersion: 0.5.0

A Helm chart for Tractus-X Eclipse Data Space Connector. This chart is a test mock that can be used as edc consumer for the DPP applicatiton.

Homepage: https://github.com/eclipse-tractusx/tractusx-edc/tree/main/charts/tractusx-connector

Source Code

Requirements

Repository Name Version
https://charts.bitnami.com/bitnami postgresql(postgresql) 12.1.6
https://eclipse-tractusx.github.io/charts/dev tractusx-connector 0.5.0
https://eclipse-tractusx.github.io/item-relationship-service irs-helm 6.11.0

Values

Key Type Default Description
irs-helm.bpdm.bpnEndpoint string `"{{- if .Values.bpdm.url }} {{- tpl (.Values.bpdm.url default "") . }}/api/catena/legal-entities/{partnerId}?idType={idType} {{- end }}"`
irs-helm.bpdm.url string "https://partners-pool.dev.demo.catena-x.net"
irs-helm.bpn string "<path:material-pass/data/dev/edc/participant#bpnNumber>"
irs-helm.digitalTwinRegistry.discoveryFinderUrl string "https://semantics.dev.demo.catena-x.net/discoveryfinder/api/v1.0/administration/connectors/discovery/search"
irs-helm.digitalTwinRegistry.type string "decentral"
irs-helm.digitalTwinRegistry.url string "https://materialpass.dev.demo.catena-x.net/semantics/registry/api/v3.0"
irs-helm.edc.catalog.acceptedPolicies[0].leftOperand string "FrameworkAgreement.sustainability"
irs-helm.edc.catalog.acceptedPolicies[0].operator string "eq"
irs-helm.edc.catalog.acceptedPolicies[0].rightOperand string "active"
irs-helm.edc.catalog.acceptedPolicies[1].leftOperand string "Membership"
irs-helm.edc.catalog.acceptedPolicies[1].operator string "eq"
irs-helm.edc.catalog.acceptedPolicies[1].rightOperand string "active"
irs-helm.edc.controlplane.apikey.secret string "<path:material-pass/data/dev/edc/oauth#api.key>"
irs-helm.edc.controlplane.endpoint.data string "https://materialpass.dev.demo.catena-x.net/consumer/management"
irs-helm.enabled bool true
irs-helm.ingress.annotations."nginx.ingress.kubernetes.io/backend-protocol" string "HTTP"
irs-helm.ingress.annotations."nginx.ingress.kubernetes.io/force-ssl-redirect" string "true"
irs-helm.ingress.annotations."nginx.ingress.kubernetes.io/ssl-passthrough" string "false"
irs-helm.ingress.annotations.ingressClassName string "nginx"
irs-helm.ingress.enabled bool true
irs-helm.ingress.hosts[0].host string "materialpass-irs.dev.demo.catena-x.net"
irs-helm.ingress.hosts[0].paths[0].path string "/"
irs-helm.ingress.hosts[0].paths[0].pathType string "Prefix"
irs-helm.ingress.tls[0].hosts[0] string "materialpass-irs.dev.demo.catena-x.net"
irs-helm.ingress.tls[0].secretName string "tls-secret"
irs-helm.irsUrl string "https://materialpass-irs.dev.demo.catena-x.net"
irs-helm.minio.rootPassword string "<path:material-pass/data/dev/irs/minio#password>"
irs-helm.minio.rootUser string "<path:material-pass/data/dev/irs/minio#user>"
irs-helm.minio.serviceAccount.create bool false
irs-helm.minioPassword string "<path:material-pass/data/dev/irs/minio#password>"
irs-helm.minioUrl string "http://{{ .Release.Name }}-minio:9000"
irs-helm.minioUser string "<path:material-pass/data/dev/irs/minio#user>"
irs-helm.oauth2.clientId string "<path:material-pass/data/dev/irs/keycloak/oauth2#clientId>"
irs-helm.oauth2.clientSecret string "<path:material-pass/data/dev/irs/keycloak/oauth2#clientSecret>"
irs-helm.oauth2.clientTokenUri string "https://centralidp.dev.demo.catena-x.net/auth/realms/CX-Central/protocol/openid-connect/token"
irs-helm.oauth2.jwkSetUri string "https://centralidp.dev.demo.catena-x.net/auth/realms/CX-Central/protocol/openid-connect/certs"
irs-helm.semanticshub.url string "https://semantics.dev.demo.catena-x.net/hub/api/v1/models"
postgresql.auth.database string "edc"
postgresql.auth.password string "<path:material-pass/data/dev/edc/database#password>"
postgresql.auth.username string "<path:material-pass/data/dev/edc/database#user>"
postgresql.fullnameOverride string "postgresql"
postgresql.jdbcUrl string "jdbc:postgresql://postgresql:5432/edc"
postgresql.primary.persistence.enabled bool true
postgresql.readReplicas.persistence.enabled bool true
tractusx-connector.backendService.httpProxyTokenReceiverUrl string "https://materialpass.dev.demo.catena-x.net/endpoint"
tractusx-connector.controlplane.affinity object {}
tractusx-connector.controlplane.autoscaling.enabled bool false Enables horizontal pod autoscaling
tractusx-connector.controlplane.autoscaling.maxReplicas int 100 Maximum replicas if resource consumption exceeds resource threshholds
tractusx-connector.controlplane.autoscaling.minReplicas int 1 Minimal replicas if resource consumption falls below resource threshholds
tractusx-connector.controlplane.autoscaling.targetCPUUtilizationPercentage int 80 targetAverageUtilization of cpu provided to a pod
tractusx-connector.controlplane.autoscaling.targetMemoryUtilizationPercentage int 80 targetAverageUtilization of memory provided to a pod
tractusx-connector.controlplane.businessPartnerValidation.log.agreementValidation bool true
tractusx-connector.controlplane.debug.enabled bool false
tractusx-connector.controlplane.debug.port int 1044
tractusx-connector.controlplane.debug.suspendOnStart bool false
tractusx-connector.controlplane.enabled bool true
tractusx-connector.controlplane.endpoints object {"control":{"path":"/consumer/control","port":8083},"default":{"path":"/consumer/api","port":8080},"management":{"authKey":"<path:material-pass/data/dev/edc/oauth#api.key>","path":"/consumer/management","port":8081},"metrics":{"path":"/consumer/metrics","port":9090},"observability":{"insecure":true,"path":"/consumer/observability","port":8085},"protocol":{"path":"/consumer/api/v1/dsp","port":8084}} endpoints of the control plane
tractusx-connector.controlplane.endpoints.control object {"path":"/consumer/control","port":8083} control api, used for internal control calls. can be added to the internal ingress, but should probably not
tractusx-connector.controlplane.endpoints.control.path string "/consumer/control" path for incoming api calls
tractusx-connector.controlplane.endpoints.control.port int 8083 port for incoming api calls
tractusx-connector.controlplane.endpoints.default object {"path":"/consumer/api","port":8080} default api for health checks, should not be added to any ingress
tractusx-connector.controlplane.endpoints.default.path string "/consumer/api" path for incoming api calls
tractusx-connector.controlplane.endpoints.default.port int 8080 port for incoming api calls
tractusx-connector.controlplane.endpoints.management object {"authKey":"<path:material-pass/data/dev/edc/oauth#api.key>","path":"/consumer/management","port":8081} data management api, used by internal users, can be added to an ingress and must not be internet facing
tractusx-connector.controlplane.endpoints.management.authKey string "<path:material-pass/data/dev/edc/oauth#api.key>" authentication key, must be attached to each 'X-Api-Key' request header
tractusx-connector.controlplane.endpoints.management.path string "/consumer/management" path for incoming api calls
tractusx-connector.controlplane.endpoints.management.port int 8081 port for incoming api calls
tractusx-connector.controlplane.endpoints.metrics object {"path":"/consumer/metrics","port":9090} metrics api, used for application metrics, must not be internet facing
tractusx-connector.controlplane.endpoints.metrics.path string "/consumer/metrics" path for incoming api calls
tractusx-connector.controlplane.endpoints.metrics.port int 9090 port for incoming api calls
tractusx-connector.controlplane.endpoints.observability object {"insecure":true,"path":"/consumer/observability","port":8085} observability api with unsecured access, must not be internet facing
tractusx-connector.controlplane.endpoints.observability.insecure bool true allow or disallow insecure access, i.e. access without authentication
tractusx-connector.controlplane.endpoints.observability.path string "/consumer/observability" observability api, provides /health /readiness and /liveness endpoints
tractusx-connector.controlplane.endpoints.observability.port int 8085 port for incoming API calls
tractusx-connector.controlplane.endpoints.protocol object {"path":"/consumer/api/v1/dsp","port":8084} ids api, used for inter connector communication and must be internet facing
tractusx-connector.controlplane.endpoints.protocol.path string "/consumer/api/v1/dsp" path for incoming api calls
tractusx-connector.controlplane.endpoints.protocol.port int 8084 port for incoming api calls
tractusx-connector.controlplane.env object {}
tractusx-connector.controlplane.envConfigMapNames list []
tractusx-connector.controlplane.envSecretNames list []
tractusx-connector.controlplane.envValueFrom object {}
tractusx-connector.controlplane.image.pullPolicy string "IfNotPresent" Kubernetes image pull policy to use
tractusx-connector.controlplane.image.repository string "tractusx/edc-controlplane-postgresql-hashicorp-vault" Which derivate of the control plane to use. when left empty the deployment will select the correct image automatically
tractusx-connector.controlplane.image.tag string "0.5.0" Overrides the image tag whose default is the chart appVersion
tractusx-connector.controlplane.ingresses[0].annotations object {} Additional ingress annotations to add
tractusx-connector.controlplane.ingresses[0].certManager.clusterIssuer string "" If preset enables certificate generation via cert-manager cluster-wide issuer
tractusx-connector.controlplane.ingresses[0].certManager.issuer string "" If preset enables certificate generation via cert-manager namespace scoped issuer
tractusx-connector.controlplane.ingresses[0].className string "nginx" Defines the ingress class to use
tractusx-connector.controlplane.ingresses[0].enabled bool true
tractusx-connector.controlplane.ingresses[0].endpoints list ["default","management","control","protocol","metrics","observability"] EDC endpoints exposed by this ingress resource
tractusx-connector.controlplane.ingresses[0].hostname string "materialpass.dev.demo.catena-x.net" The hostname to be used to precisely map incoming traffic onto the underlying network service
tractusx-connector.controlplane.ingresses[0].tls object {"enabled":true,"secretName":"tls-secret"} TLS tls class applied to the ingress resource
tractusx-connector.controlplane.ingresses[0].tls.enabled bool true Enables TLS on the ingress resource
tractusx-connector.controlplane.ingresses[0].tls.secretName string "tls-secret" If present overwrites the default secret name
tractusx-connector.controlplane.ingresses[1].annotations object {} Additional ingress annotations to add
tractusx-connector.controlplane.ingresses[1].certManager.clusterIssuer string "" If preset enables certificate generation via cert-manager cluster-wide issuer
tractusx-connector.controlplane.ingresses[1].certManager.issuer string "" If preset enables certificate generation via cert-manager namespace scoped issuer
tractusx-connector.controlplane.ingresses[1].className string "nginx" Defines the ingress class to use
tractusx-connector.controlplane.ingresses[1].enabled bool false
tractusx-connector.controlplane.ingresses[1].endpoints list ["management","control"] EDC endpoints exposed by this ingress resource
tractusx-connector.controlplane.ingresses[1].hostname string "edc-control.intranet" The hostname to be used to precisely map incoming traffic onto the underlying network service
tractusx-connector.controlplane.ingresses[1].tls object {"enabled":true,"secretName":"tls-secret"} TLS tls class applied to the ingress resource
tractusx-connector.controlplane.ingresses[1].tls.enabled bool true Enables TLS on the ingress resource
tractusx-connector.controlplane.ingresses[1].tls.secretName string "tls-secret" If present overwrites the default secret name
tractusx-connector.controlplane.initContainers list []
tractusx-connector.controlplane.internationalDataSpaces.catalogId string "TXDC-Catalog"
tractusx-connector.controlplane.internationalDataSpaces.curator string ""
tractusx-connector.controlplane.internationalDataSpaces.description string "Tractus-X Eclipse IDS Data Space Connector"
tractusx-connector.controlplane.internationalDataSpaces.id string "TXDC"
tractusx-connector.controlplane.internationalDataSpaces.maintainer string ""
tractusx-connector.controlplane.internationalDataSpaces.title string ""
tractusx-connector.controlplane.livenessProbe.enabled bool true Whether to enable kubernetes liveness-probe
tractusx-connector.controlplane.livenessProbe.failureThreshold int 6 when a probe fails kubernetes will try 6 times before giving up
tractusx-connector.controlplane.livenessProbe.initialDelaySeconds int 30 seconds to wait before performing the first liveness check
tractusx-connector.controlplane.livenessProbe.periodSeconds int 10 this fields specifies that kubernetes should perform a liveness check every 10 seconds
tractusx-connector.controlplane.livenessProbe.successThreshold int 1 number of consecutive successes for the probe to be considered successful after having failed
tractusx-connector.controlplane.livenessProbe.timeoutSeconds int 5 number of seconds after which the probe times out
tractusx-connector.controlplane.logging string ".level=INFO\norg.eclipse.edc.level=ALL\nhandlers=java.util.logging.ConsoleHandler\njava.util.logging.ConsoleHandler.formatter=java.util.logging.SimpleFormatter\njava.util.logging.ConsoleHandler.level=ALL\njava.util.logging.SimpleFormatter.format=[%1$tY-%1$tm-%1$td %1$tH:%1$tM:%1$tS] [%4$-7s] %5$s%6$s%n" configuration of the Java Util Logging Facade
tractusx-connector.controlplane.nodeSelector object {}
tractusx-connector.controlplane.opentelemetry string "otel.javaagent.enabled=false\notel.javaagent.debug=false" configuration of the Open Telemetry Agent to collect and expose metrics
tractusx-connector.controlplane.podAnnotations object {} additional annotations for the pod
tractusx-connector.controlplane.podLabels object {} additional labels for the pod
tractusx-connector.controlplane.podSecurityContext object {"fsGroup":10001,"runAsGroup":10001,"runAsUser":10001,"seccompProfile":{"type":"RuntimeDefault"}} The pod security context defines privilege and access control settings for a Pod within the deployment
tractusx-connector.controlplane.podSecurityContext.fsGroup int 10001 The owner for volumes and any files created within volumes will belong to this guid
tractusx-connector.controlplane.podSecurityContext.runAsGroup int 10001 Processes within a pod will belong to this guid
tractusx-connector.controlplane.podSecurityContext.runAsUser int 10001 Runs all processes within a pod with a special uid
tractusx-connector.controlplane.podSecurityContext.seccompProfile.type string "RuntimeDefault" Restrict a Container's Syscalls with seccomp
tractusx-connector.controlplane.readinessProbe.enabled bool true Whether to enable kubernetes readiness-probes
tractusx-connector.controlplane.readinessProbe.failureThreshold int 6 when a probe fails kubernetes will try 6 times before giving up
tractusx-connector.controlplane.readinessProbe.initialDelaySeconds int 30 seconds to wait before performing the first readiness check
tractusx-connector.controlplane.readinessProbe.periodSeconds int 10 this fields specifies that kubernetes should perform a readiness check every 10 seconds
tractusx-connector.controlplane.readinessProbe.successThreshold int 1 number of consecutive successes for the probe to be considered successful after having failed
tractusx-connector.controlplane.readinessProbe.timeoutSeconds int 5 number of seconds after which the probe times out
tractusx-connector.controlplane.replicaCount int 1
tractusx-connector.controlplane.resources object {} resource management for the container
tractusx-connector.controlplane.securityContext.allowPrivilegeEscalation bool false Controls Privilege Escalation enabling setuid binaries changing the effective user ID
tractusx-connector.controlplane.securityContext.capabilities.add list [] Specifies which capabilities to add to issue specialized syscalls
tractusx-connector.controlplane.securityContext.capabilities.drop list ["ALL"] Specifies which capabilities to drop to reduce syscall attack surface
tractusx-connector.controlplane.securityContext.readOnlyRootFilesystem bool true Whether the root filesystem is mounted in read-only mode
tractusx-connector.controlplane.securityContext.runAsNonRoot bool true Requires the container to run without root privileges
tractusx-connector.controlplane.securityContext.runAsUser int 10001 The container's process will run with the specified uid
tractusx-connector.controlplane.service.annotations object {}
tractusx-connector.controlplane.service.type string "ClusterIP" Service type to expose the running application on a set of Pods as a network service.
tractusx-connector.controlplane.ssi.endpoint.audience string "https://materialpass.dev.demo.catena-x.net/consumer"
tractusx-connector.controlplane.ssi.miw.authorityId string "<path:material-pass/data/dev/edc/ssi#authorityId>"
tractusx-connector.controlplane.ssi.miw.url string "<path:material-pass/data/dev/edc/ssi#miwUrl>"
tractusx-connector.controlplane.ssi.oauth.client.id string "<path:material-pass/data/dev/edc/ssi#clientId>"
tractusx-connector.controlplane.ssi.oauth.client.secretAlias string "dev-client-secret"
tractusx-connector.controlplane.ssi.oauth.tokenurl string "https://centralidp.dev.demo.catena-x.net/auth/realms/CX-Central/protocol/openid-connect/token"
tractusx-connector.controlplane.tolerations list []
tractusx-connector.controlplane.url.ids string "" Explicitly declared url for reaching the ids api (e.g. if ingresses not used)
tractusx-connector.controlplane.volumeMounts list [] declare where to mount volumes into the container
tractusx-connector.controlplane.volumes list [] volume directories
tractusx-connector.customLabels object {}
tractusx-connector.dataplane.affinity object {}
tractusx-connector.dataplane.autoscaling.enabled bool false Enables horizontal pod autoscaling
tractusx-connector.dataplane.autoscaling.maxReplicas int 100 Maximum replicas if resource consumption exceeds resource threshholds
tractusx-connector.dataplane.autoscaling.minReplicas int 1 Minimal replicas if resource consumption falls below resource threshholds
tractusx-connector.dataplane.autoscaling.targetCPUUtilizationPercentage int 80 targetAverageUtilization of cpu provided to a pod
tractusx-connector.dataplane.autoscaling.targetMemoryUtilizationPercentage int 80 targetAverageUtilization of memory provided to a pod
tractusx-connector.dataplane.aws.accessKeyId string ""
tractusx-connector.dataplane.aws.endpointOverride string ""
tractusx-connector.dataplane.aws.secretAccessKey string ""
tractusx-connector.dataplane.debug.enabled bool false
tractusx-connector.dataplane.debug.port int 1044
tractusx-connector.dataplane.debug.suspendOnStart bool false
tractusx-connector.dataplane.enabled bool true
tractusx-connector.dataplane.endpoints.control.path string "/consumer/api/dataplane/control"
tractusx-connector.dataplane.endpoints.control.port int 8083
tractusx-connector.dataplane.endpoints.default.path string "/consumer/api"
tractusx-connector.dataplane.endpoints.default.port int 8080
tractusx-connector.dataplane.endpoints.metrics.path string "/consumer/metrics"
tractusx-connector.dataplane.endpoints.metrics.port int 9090
tractusx-connector.dataplane.endpoints.observability.insecure bool true allow or disallow insecure access, i.e. access without authentication
tractusx-connector.dataplane.endpoints.observability.path string "/consumer/observability" observability api, provides /health /readiness and /liveness endpoints
tractusx-connector.dataplane.endpoints.observability.port int 8085 port for incoming API calls
tractusx-connector.dataplane.endpoints.proxy.path string "/consumer/proxy"
tractusx-connector.dataplane.endpoints.proxy.port int 8186
tractusx-connector.dataplane.endpoints.public.path string "/consumer/api/public"
tractusx-connector.dataplane.endpoints.public.port int 8081
tractusx-connector.dataplane.env object {}
tractusx-connector.dataplane.envConfigMapNames list []
tractusx-connector.dataplane.envSecretNames list []
tractusx-connector.dataplane.envValueFrom object {}
tractusx-connector.dataplane.image.pullPolicy string "IfNotPresent" Kubernetes image pull policy to use
tractusx-connector.dataplane.image.repository string "tractusx/edc-dataplane-hashicorp-vault" Which derivate of the data plane to use. when left empty the deployment will select the correct image automatically
tractusx-connector.dataplane.image.tag string "0.5.0" Overrides the image tag whose default is the chart appVersion
tractusx-connector.dataplane.ingresses[0].annotations object {} Additional ingress annotations to add
tractusx-connector.dataplane.ingresses[0].certManager.clusterIssuer string "" If preset enables certificate generation via cert-manager cluster-wide issuer
tractusx-connector.dataplane.ingresses[0].certManager.issuer string "" If preset enables certificate generation via cert-manager namespace scoped issuer
tractusx-connector.dataplane.ingresses[0].className string "nginx" Defines the ingress class to use
tractusx-connector.dataplane.ingresses[0].enabled bool true
tractusx-connector.dataplane.ingresses[0].endpoints list ["public"] EDC endpoints exposed by this ingress resource
tractusx-connector.dataplane.ingresses[0].hostname string "materialpass.dev.demo.catena-x.net" The hostname to be used to precisely map incoming traffic onto the underlying network service
tractusx-connector.dataplane.ingresses[0].tls object {"enabled":true,"secretName":"tls-secret"} TLS tls class applied to the ingress resource
tractusx-connector.dataplane.ingresses[0].tls.enabled bool true Enables TLS on the ingress resource
tractusx-connector.dataplane.ingresses[0].tls.secretName string "tls-secret" If present overwrites the default secret name
tractusx-connector.dataplane.initContainers list []
tractusx-connector.dataplane.livenessProbe.enabled bool true Whether to enable kubernetes liveness-probe
tractusx-connector.dataplane.livenessProbe.failureThreshold int 6 when a probe fails kubernetes will try 6 times before giving up
tractusx-connector.dataplane.livenessProbe.initialDelaySeconds int 30 seconds to wait before performing the first liveness check
tractusx-connector.dataplane.livenessProbe.periodSeconds int 10 this fields specifies that kubernetes should perform a liveness check every 10 seconds
tractusx-connector.dataplane.livenessProbe.successThreshold int 1 number of consecutive successes for the probe to be considered successful after having failed
tractusx-connector.dataplane.livenessProbe.timeoutSeconds int 5 number of seconds after which the probe times out
tractusx-connector.dataplane.logging string ".level=INFO\norg.eclipse.edc.level=ALL\nhandlers=java.util.logging.ConsoleHandler\njava.util.logging.ConsoleHandler.formatter=java.util.logging.SimpleFormatter\njava.util.logging.ConsoleHandler.level=ALL\njava.util.logging.SimpleFormatter.format=[%1$tY-%1$tm-%1$td %1$tH:%1$tM:%1$tS] [%4$-7s] %5$s%6$s%n" configuration of the Java Util Logging Facade
tractusx-connector.dataplane.nodeSelector object {}
tractusx-connector.dataplane.opentelemetry string "otel.javaagent.enabled=false\notel.javaagent.debug=false" configuration of the Open Telemetry Agent to collect and expose metrics
tractusx-connector.dataplane.podAnnotations object {} additional annotations for the pod
tractusx-connector.dataplane.podLabels object {} additional labels for the pod
tractusx-connector.dataplane.podSecurityContext object {"fsGroup":10001,"runAsGroup":10001,"runAsUser":10001,"seccompProfile":{"type":"RuntimeDefault"}} The pod security context defines privilege and access control settings for a Pod within the deployment
tractusx-connector.dataplane.podSecurityContext.fsGroup int 10001 The owner for volumes and any files created within volumes will belong to this guid
tractusx-connector.dataplane.podSecurityContext.runAsGroup int 10001 Processes within a pod will belong to this guid
tractusx-connector.dataplane.podSecurityContext.runAsUser int 10001 Runs all processes within a pod with a special uid
tractusx-connector.dataplane.podSecurityContext.seccompProfile.type string "RuntimeDefault" Restrict a Container's Syscalls with seccomp
tractusx-connector.dataplane.readinessProbe.enabled bool true Whether to enable kubernetes readiness-probes
tractusx-connector.dataplane.readinessProbe.failureThreshold int 6 when a probe fails kubernetes will try 6 times before giving up
tractusx-connector.dataplane.readinessProbe.initialDelaySeconds int 30 seconds to wait before performing the first readiness check
tractusx-connector.dataplane.readinessProbe.periodSeconds int 10 this fields specifies that kubernetes should perform a liveness check every 10 seconds
tractusx-connector.dataplane.readinessProbe.successThreshold int 1 number of consecutive successes for the probe to be considered successful after having failed
tractusx-connector.dataplane.readinessProbe.timeoutSeconds int 5 number of seconds after which the probe times out
tractusx-connector.dataplane.replicaCount int 1
tractusx-connector.dataplane.resources object {} resource management for the container
tractusx-connector.dataplane.securityContext.allowPrivilegeEscalation bool false Controls Privilege Escalation enabling setuid binaries changing the effective user ID
tractusx-connector.dataplane.securityContext.capabilities.add list [] Specifies which capabilities to add to issue specialized syscalls
tractusx-connector.dataplane.securityContext.capabilities.drop list ["ALL"] Specifies which capabilities to drop to reduce syscall attack surface
tractusx-connector.dataplane.securityContext.readOnlyRootFilesystem bool true Whether the root filesystem is mounted in read-only mode
tractusx-connector.dataplane.securityContext.runAsNonRoot bool true Requires the container to run without root privileges
tractusx-connector.dataplane.securityContext.runAsUser int 10001 The container's process will run with the specified uid
tractusx-connector.dataplane.service.port int 80
tractusx-connector.dataplane.service.type string "ClusterIP" Service type to expose the running application on a set of Pods as a network service.
tractusx-connector.dataplane.tolerations list []
tractusx-connector.dataplane.url.public string "" Explicitly declared url for reaching the public api (e.g. if ingresses not used)
tractusx-connector.dataplane.volumeMounts list [] declare where to mount volumes into the container
tractusx-connector.dataplane.volumes list [] volume directories
tractusx-connector.enabled bool true
tractusx-connector.fullnameOverride string "dpp-edc-consumer"
tractusx-connector.imagePullSecrets list [] Existing image pull secret to use to obtain the container image from private registries
tractusx-connector.install.daps bool false
tractusx-connector.install.postgresql bool false
tractusx-connector.install.vault bool false
tractusx-connector.nameOverride string ""
tractusx-connector.networkPolicy.controlplane object {"from":[{"namespaceSelector":{}}]} Configuration of the controlplane component
tractusx-connector.networkPolicy.controlplane.from list [{"namespaceSelector":{}}] Specify from rule network policy for cp (defaults to all namespaces)
tractusx-connector.networkPolicy.dataplane object {"from":[{"namespaceSelector":{}}]} Configuration of the dataplane component
tractusx-connector.networkPolicy.dataplane.from list [{"namespaceSelector":{}}] Specify from rule network policy for dp (defaults to all namespaces)
tractusx-connector.networkPolicy.enabled bool false If true network policy will be created to restrict access to control- and dataplane
tractusx-connector.participant.id string "<path:material-pass/data/dev/edc/participant#bpnNumber>"
tractusx-connector.postgresql.auth.database string "edc"
tractusx-connector.postgresql.auth.password string "<path:material-pass/data/dev/edc/database#password>"
tractusx-connector.postgresql.auth.username string "<path:material-pass/data/dev/edc/database#user>"
tractusx-connector.postgresql.fullnameOverride string "postgresql"
tractusx-connector.postgresql.jdbcUrl string "jdbc:postgresql://postgresql:5432/edc"
tractusx-connector.postgresql.password string "<path:material-pass/data/dev/edc/database#password>"
tractusx-connector.postgresql.username string "<path:material-pass/data/dev/edc/database#user>"
tractusx-connector.serviceAccount.annotations object {}
tractusx-connector.serviceAccount.create bool true
tractusx-connector.serviceAccount.imagePullSecrets list [] Existing image pull secret bound to the service account to use to obtain the container image from private registries
tractusx-connector.serviceAccount.name string ""
tractusx-connector.tests object {"hookDeletePolicy":"before-hook-creation,hook-succeeded"} Configurations for Helm tests
tractusx-connector.tests.hookDeletePolicy string "before-hook-creation,hook-succeeded" Configure the hook-delete-policy for Helm tests
tractusx-connector.vault.fullnameOverride string "vault"
tractusx-connector.vault.hashicorp.healthCheck.enabled bool true
tractusx-connector.vault.hashicorp.healthCheck.standbyOk bool true
tractusx-connector.vault.hashicorp.paths.health string "/v1/sys/health"
tractusx-connector.vault.hashicorp.paths.secret string "<path:material-pass/data/dev/edc/vault#vault.hashicorp.api.secret.path>"
tractusx-connector.vault.hashicorp.timeout int 30
tractusx-connector.vault.hashicorp.token string "<path:material-pass/data/dev/edc/vault#vault.hashicorp.token>"
tractusx-connector.vault.hashicorp.url string "<path:material-pass/data/dev/edc/vault#vault.hashicorp.url>"
tractusx-connector.vault.injector.enabled bool false
tractusx-connector.vault.secretNames.transferProxyTokenEncryptionAesKey string "edc-encryption-key"
tractusx-connector.vault.secretNames.transferProxyTokenSignerPrivateKey string "daps-key-dev"
tractusx-connector.vault.secretNames.transferProxyTokenSignerPublicKey string "daps-crt-dev"
tractusx-connector.vault.server.dev.devRootToken string "root"
tractusx-connector.vault.server.dev.enabled bool true
tractusx-connector.vault.server.postStart string nil

Autogenerated from chart metadata using helm-docs v1.11.0