Skip to content

Commit

Permalink
chore: update Helm charts (#1185)
Browse files Browse the repository at this point in the history
* update chart "tractusx-connector"

* reinstate old config values, needed for upgradeability test

* update chart tractusx-connector-azure-vault

* update chart tractusx-connector-memory

* helm docs

* fix inmem chart, remove test preparation

* removed values_file from deployemtn test

* reenable config values -> upgradeability test
  • Loading branch information
paullatzelsperger authored Apr 2, 2024
1 parent 040252c commit 3f78a4a
Show file tree
Hide file tree
Showing 25 changed files with 606 additions and 309 deletions.
9 changes: 0 additions & 9 deletions .github/actions/run-deployment-test/action.yml
Original file line number Diff line number Diff line change
Expand Up @@ -40,10 +40,6 @@ inputs:
required: true
description: "The directory that contains the docker file, e.g. edc-controlplane/edc-runtime-memory"

values_file:
required: true
description: "A yaml file that contains the values for the test installation. will be modified!"

runs:
using: "composite"
steps:
Expand Down Expand Up @@ -76,11 +72,6 @@ runs:
###################################################
# Install the test infrastructure
###################################################
- name: "Generate test credentials"
shell: bash
run: |-
sh -c "edc-tests/deployment/src/main/resources/prepare-test.sh \
${{ inputs.values_file }}"

- name: Install Runtime
shell: bash
Expand Down
4 changes: 0 additions & 4 deletions .github/workflows/deployment-test.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -63,11 +63,9 @@ jobs:
with:
imagename: edc-runtime-memory
rootDir: edc-controlplane/edc-runtime-memory
values_file: edc-tests/deployment/src/main/resources/helm/tractusx-connector-memory-test.yaml
helm_command: |-
helm install tx-inmem charts/tractusx-connector-memory \
-f edc-tests/deployment/src/main/resources/helm/tractusx-connector-memory-test.yaml \
--set vault.secrets="client-secret:$(cat client.secret)" \
--wait-for-jobs --timeout=120s --dependency-update
# wait for the pod to become ready
Expand All @@ -87,7 +85,6 @@ jobs:
with:
imagename: "edc-controlplane-postgresql-hashicorp-vault edc-dataplane-hashicorp-vault"
rootDir: "."
values_file: edc-tests/deployment/src/main/resources/helm/tractusx-connector-test.yaml
helm_command: |-
helm install tx-prod charts/tractusx-connector \
-f edc-tests/deployment/src/main/resources/helm/tractusx-connector-test.yaml \
Expand Down Expand Up @@ -121,7 +118,6 @@ jobs:
with:
imagename: "edc-controlplane-postgresql-azure-vault edc-dataplane-azure-vault"
rootDir: "."
values_file: edc-tests/deployment/src/main/resources/helm/tractusx-connector-azure-vault-test.yaml
helm_command: |-
az keyvault secret set --vault-name ${{ secrets.AZURE_VAULT_NAME }} --name aes-keys --value "$(cat aes.key)" > /dev/null
az keyvault secret set --vault-name ${{ secrets.AZURE_VAULT_NAME }} --name client-secret --value "$(cat client.secret)" > /dev/null
Expand Down
3 changes: 0 additions & 3 deletions .github/workflows/upgradeability-test.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -74,9 +74,6 @@ jobs:
- name: "Install latest release"
run: |
sh -c "edc-tests/deployment/src/main/resources/prepare-test.sh \
edc-tests/deployment/src/main/resources/helm/tractusx-connector-test.yaml"
helm upgrade --install tx-prod tractusx/tractusx-connector \
-f edc-tests/deployment/src/main/resources/helm/tractusx-connector-test.yaml \
--set "controlplane.image.tag=$RELEASE" \
Expand Down
81 changes: 39 additions & 42 deletions DEPENDENCIES

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion charts/tractusx-connector-azure-vault/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -54,6 +54,6 @@ dependencies:
# PostgreSQL
- name: postgresql
alias: postgresql
version: 12.11.2
version: "15.2.1"
repository: https://charts.bitnami.com/bitnami
condition: install.postgresql
21 changes: 18 additions & 3 deletions charts/tractusx-connector-azure-vault/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -61,24 +61,24 @@ helm install my-release tractusx-edc/tractusx-connector-azure-vault --version 0.

| Repository | Name | Version |
|------------|------|---------|
| https://charts.bitnami.com/bitnami | postgresql(postgresql) | 12.11.2 |
| https://charts.bitnami.com/bitnami | postgresql(postgresql) | 15.2.1 |

## Values

| Key | Type | Default | Description |
|-----|------|---------|-------------|
| backendService.httpProxyTokenReceiverUrl | string | `"https://example.com"` | Specifies a backend service which will receive the EDR |
| controlplane.affinity | object | `{}` | |
| controlplane.autoscaling.enabled | bool | `false` | Enables [horizontal pod autoscaling](https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/) |
| controlplane.autoscaling.maxReplicas | int | `100` | Maximum replicas if resource consumption exceeds resource threshholds |
| controlplane.autoscaling.minReplicas | int | `1` | Minimal replicas if resource consumption falls below resource threshholds |
| controlplane.autoscaling.targetCPUUtilizationPercentage | int | `80` | targetAverageUtilization of cpu provided to a pod |
| controlplane.autoscaling.targetMemoryUtilizationPercentage | int | `80` | targetAverageUtilization of memory provided to a pod |
| controlplane.bdrs.cache_validity_seconds | int | `600` | |
| controlplane.bdrs.server.url | string | `nil` | |
| controlplane.businessPartnerValidation.log.agreementValidation | bool | `true` | |
| controlplane.debug.enabled | bool | `false` | |
| controlplane.debug.port | int | `1044` | |
| controlplane.debug.suspendOnStart | bool | `false` | |
| controlplane.edr.transferProxyTokenValidity | string | `"2592000"` | |
| controlplane.endpoints | object | `{"control":{"path":"/control","port":8083},"default":{"path":"/api","port":8080},"management":{"authKey":"password","path":"/management","port":8081},"metrics":{"path":"/metrics","port":9090},"protocol":{"path":"/api/v1/dsp","port":8084}}` | endpoints of the control plane |
| controlplane.endpoints.control | object | `{"path":"/control","port":8083}` | control api, used for internal control calls. can be added to the internal ingress, but should probably not |
| controlplane.endpoints.control.path | string | `"/control"` | path for incoming api calls |
Expand Down Expand Up @@ -243,14 +243,29 @@ helm install my-release tractusx-edc/tractusx-connector-azure-vault --version 0.
| dataplane.securityContext.runAsUser | int | `10001` | The container's process will run with the specified uid |
| dataplane.service.port | int | `80` | |
| dataplane.service.type | string | `"ClusterIP"` | [Service type](https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services-service-types) to expose the running application on a set of Pods as a network service. |
| dataplane.token.refresh.expiry_seconds | int | `300` | |
| dataplane.token.refresh.expiry_tolerance_seconds | int | `10` | |
| dataplane.token.refresh.refresh_endpoint | string | `nil` | |
| dataplane.token.signer.privatekey_alias | string | `nil` | |
| dataplane.token.verifier.publickey_alias | string | `nil` | |
| dataplane.tolerations | list | `[]` | |
| dataplane.url.public | string | `""` | Explicitly declared url for reaching the public api (e.g. if ingresses not used) |
| dataplane.volumeMounts | string | `nil` | declare where to mount [volumes](https://kubernetes.io/docs/concepts/storage/volumes/) into the container |
| dataplane.volumes | string | `nil` | [volume](https://kubernetes.io/docs/concepts/storage/volumes/) directories |
| fullnameOverride | string | `""` | |
| iatp.id | string | `"did:web:changeme"` | |
| iatp.sts.dim.url | string | `nil` | |
| iatp.sts.oauth.client.id | string | `nil` | |
| iatp.sts.oauth.client.secret_alias | string | `nil` | |
| iatp.sts.oauth.token_url | string | `nil` | |
| imagePullSecrets | list | `[]` | Existing image pull secret to use to [obtain the container image from private registries](https://kubernetes.io/docs/concepts/containers/images/#using-a-private-registry) |
| install.postgresql | bool | `true` | |
| nameOverride | string | `""` | |
| networkPolicy.controlplane | object | `{"from":[{"namespaceSelector":{}}]}` | Configuration of the controlplane component |
| networkPolicy.controlplane.from | list | `[{"namespaceSelector":{}}]` | Specify from rule network policy for cp (defaults to all namespaces) |
| networkPolicy.dataplane | object | `{"from":[{"namespaceSelector":{}}]}` | Configuration of the dataplane component |
| networkPolicy.dataplane.from | list | `[{"namespaceSelector":{}}]` | Specify from rule network policy for dp (defaults to all namespaces) |
| networkPolicy.enabled | bool | `false` | If `true` network policy will be created to restrict access to control- and dataplane |
| participant.id | string | `"BPNLCHANGEME"` | BPN Number |
| postgresql.auth.database | string | `"edc"` | |
| postgresql.auth.password | string | `"password"` | |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -146,6 +146,8 @@ spec:
########################
- name: EDC_PARTICIPANT_ID
value: {{ .Values.participant.id | required ".Values.participant.id is required" | quote }}
- name: "EDC_IAM_ISSUER_ID"
value: {{ .Values.iatp.id | required ".Values.iatp.id is required" | quote}}

#######
# API #
Expand Down Expand Up @@ -236,16 +238,6 @@ spec:
- name: "EDC_DATASOURCE_TRANSFERPROCESS_URL"
value: {{ tpl .Values.postgresql.jdbcUrl . | quote }}

# see extension https://github.com/eclipse-tractusx/tractusx-edc/tree/main/edc-extensions/edr-cache-sql
- name: "EDC_DATASOURCE_EDR_NAME"
value: "edr"
- name: "EDC_DATASOURCE_EDR_USER"
value: {{ .Values.postgresql.auth.username | required ".Values.postgresql.auth.username is required" | quote }}
- name: "EDC_DATASOURCE_EDR_PASSWORD"
value: {{ .Values.postgresql.auth.password | required ".Values.postgresql.auth.password is required" | quote }}
- name: "EDC_DATASOURCE_EDR_URL"
value: {{ tpl .Values.postgresql.jdbcUrl . | quote }}

# see extension https://github.com/eclipse-edc/Connector/tree/main/extensions/policy-monitor/store/sql/policy-monitor-store-sql
- name: "EDC_DATASOURCE_POLICY-MONITOR_NAME"
value: "policy-monitor"
Expand All @@ -266,6 +258,32 @@ spec:
- name: "EDC_DATASOURCE_BPN_URL"
value: {{ tpl .Values.postgresql.jdbcUrl . | quote }}


#############################
## IATP / STS / DIM CONFIG ##
#############################
- name: "EDC_IAM_STS_OAUTH_TOKEN_URL"
value: {{ .Values.iatp.sts.oauth.token_url | required ".Values.iatp.oauth.token_url is required" | quote}}
- name: "EDC_IAM_STS_OAUTH_CLIENT_ID"
value: {{ .Values.iatp.sts.oauth.client.id | required ".Values.iatp.sts.oauth.client.id is required" | quote}}
- name: "EDC_IAM_STS_OAUTH_CLIENT_SECRET_ALIAS"
value: {{ .Values.iatp.sts.oauth.client.secret_alias | required ".Values.iatp.sts.oauth.client.secret_alias is required" | quote}}
- name: "EDC_IAM_STS_DIM_URL"
value: {{ .Values.iatp.sts.dim.url | required ".Values.iatp.sts.dim.url is required" | quote}}

#################
## BDRS CLIENT ##
#################

{{- if .Values.controlplane.bdrs.server.url }}
- name: "TX_IAM_IATP_BDRS_SERVER_URL"
value: {{ .Values.controlplane.bdrs.server.url | required ".Values.controlplane.bdrs.server.url is required" | quote }}
{{- end }}
{{- if .Values.controlplane.bdrs.cache_validity_seconds }}
- name: "TX_IAM_IATP_BDRS_CACHE_VALIDITY"
value: {{ .Values.controlplane.bdrs.cache_validity_seconds | quote}}
{{- end}}

################
## DATA PLANE ##
################
Expand All @@ -281,53 +299,31 @@ spec:
value: |-
{{ printf "{ \"publicApiUrl\": \"%s\" }" (include "txdc.dataplane.url.public" . ) }}

# see extension https://github.com/eclipse-edc/Connector/tree/main/extensions/control-plane/data-plane-transfer
- name: "EDC_TRANSFER_PROXY_ENDPOINT"
value: {{ include "txdc.dataplane.url.public" . }}
{{- if .Values.vault.secretNames.transferProxyTokenSignerPrivateKey }}
- name: "EDC_TRANSFER_PROXY_TOKEN_SIGNER_PRIVATEKEY_ALIAS"
value: {{ .Values.vault.secretNames.transferProxyTokenSignerPrivateKey | quote }}
{{- end }}
{{- if .Values.vault.secretNames.transferProxyTokenSignerPublicKey }}
- name: "EDC_TRANSFER_PROXY_TOKEN_VERIFIER_PUBLICKEY_ALIAS"
value: {{ .Values.vault.secretNames.transferProxyTokenSignerPublicKey | quote }}
{{- end }}
- name: "EDC_TRANSFER_PROXY_TOKEN_VALIDITY_SECONDS"
value: {{ .Values.controlplane.edr.transferProxyTokenValidity | required ".Values.controlplane.edr.transferProxyTokenValidity is required" | quote }}

# see extension https://github.com/eclipse-edc/Connector/tree/main/extensions/control-plane/transfer/transfer-pull-http-dynamic-receiver

- name: "EDC_RECEIVER_HTTP_DYNAMIC_ENDPOINT"
value: {{ .Values.backendService.httpProxyTokenReceiverUrl | required ".Values.backendService.httpProxyTokenReceiverUrl is required" | quote }}

###########
## VAULT ##
###########

- name: "EDC_VAULT_CLIENTID"
- name: "AZURE_CLIENT_ID"
value: {{ .Values.vault.azure.client | required ".Values.vault.azure.client is required" | quote }}
- name: "EDC_VAULT_TENANTID"
- name: "AZURE_TENANT_ID"
value: {{ .Values.vault.azure.tenant | required ".Values.vault.azure.tenant is required" | quote }}
- name: "EDC_VAULT_NAME"
value: {{ .Values.vault.azure.name | required ".Values.vault.azure.name is required" | quote }}
# only set the env var if config value not null
{{- if .Values.vault.azure.secret }}
- name: "EDC_VAULT_CLIENTSECRET"
- name: "AZURE_CLIENT_SECRET"
value: {{ .Values.vault.azure.secret | quote }}
{{- end }}
# only set the env var if config value not null
{{- if .Values.vault.azure.certificate }}
- name: "EDC_VAULT_CERTIFICATE"
- name: "AZURE_CLIENT_CERTIFICATE_PATH"
value: {{ .Values.vault.azure.certificate | quote }}
{{- end }}

###########################
## AAS WRAPPER EXTENSION ##
###########################
- name: "EDC_CP_ADAPTER_CACHE_CATALOG_EXPIRE_AFTER"
value: "0"
- name: "EDC_CP_ADAPTER_REUSE_CONTRACT_AGREEMENT"
value: "0"


###########################
## BUSINESS PARTNER NUMBER VALIDATION EXTENSION ##
Expand Down
Loading

0 comments on commit 3f78a4a

Please sign in to comment.