|
| 1 | +############################################################### |
| 2 | +# Eclipse Tractus-X - identity-hub |
| 3 | +# |
| 4 | +# Copyright (c) 2025 Contributors to the Eclipse Foundation |
| 5 | +# |
| 6 | +# See the NOTICE file(s) distributed with this work for additional |
| 7 | +# information regarding copyright ownership. |
| 8 | +# |
| 9 | +# This program and the accompanying materials are made available under the |
| 10 | +# terms of the Apache License, Version 2.0 which is available at |
| 11 | +# https://www.apache.org/licenses/LICENSE-2.0. |
| 12 | +# |
| 13 | +# Unless required by applicable law or agreed to in writing, software |
| 14 | +# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT |
| 15 | +# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the |
| 16 | +# License for the specific language governing permissions and limitations |
| 17 | +# under the License. |
| 18 | +# |
| 19 | +# SPDX-License-Identifier: Apache-2.0 |
| 20 | +############################################################### |
| 21 | + |
| 22 | +--- |
| 23 | +# Example values file for deploying the identity-hub with an external |
| 24 | +# HashiCorp Vault instance (i.e., the bundled dev Vault is disabled). |
| 25 | +# |
| 26 | +# Secrets referenced with the <path:...> syntax are resolved at deploy-time |
| 27 | +# by the ArgoCD Vault Plugin (AVP) or an equivalent secrets-injection tool. |
| 28 | + |
| 29 | +nameOverride: identity-hub |
| 30 | +fullnameOverride: identity-hub |
| 31 | + |
| 32 | +install: |
| 33 | + # -- Disable the bundled PostgreSQL subchart; use an external database instead |
| 34 | + postgresql: true |
| 35 | + # -- Disable the bundled HashiCorp Vault dev-mode subchart |
| 36 | + vault: false |
| 37 | + |
| 38 | +identityhub: |
| 39 | + image: |
| 40 | + pullPolicy: Always |
| 41 | + |
| 42 | + endpoints: |
| 43 | + default: |
| 44 | + port: 8081 |
| 45 | + path: /api |
| 46 | + identity: |
| 47 | + port: 8082 |
| 48 | + path: /api/identity |
| 49 | + # -- API key alias stored in the external vault |
| 50 | + authKeyAlias: identity-api-key |
| 51 | + credentials: |
| 52 | + port: 8083 |
| 53 | + path: /api/credentials |
| 54 | + did: |
| 55 | + port: 8084 |
| 56 | + path: / |
| 57 | + accounts: |
| 58 | + port: 8085 |
| 59 | + path: /api/accounts |
| 60 | + authKeyAlias: accounts-api-key |
| 61 | + version: |
| 62 | + port: 8086 |
| 63 | + path: /.well-known/api |
| 64 | + pathType: ImplementationSpecific |
| 65 | + sts: |
| 66 | + port: 8087 |
| 67 | + path: /api/sts |
| 68 | + |
| 69 | + ## Ingress declaration to expose the network service. |
| 70 | + ingresses: |
| 71 | + ## Single Ingress exposing all endpoints under one hostname |
| 72 | + - enabled: true |
| 73 | + # -- The hostname to be used to precisely map incoming traffic onto the underlying network service |
| 74 | + hostname: "identity-hub.int.catena-x.net" |
| 75 | + # -- Defines the [ingress class](https://kubernetes.io/docs/concepts/services-networking/ingress/#ingress-class) to use |
| 76 | + className: "nginx" |
| 77 | + # -- Additional ingress annotations to add |
| 78 | + annotations: |
| 79 | + cert-manager.io/cluster-issuer: letsencrypt-prod |
| 80 | + # -- Endpoints exposed by this ingress resource |
| 81 | + endpoints: |
| 82 | + - credentials |
| 83 | + - did |
| 84 | + - sts |
| 85 | + - identity |
| 86 | + - accounts |
| 87 | + - version |
| 88 | + # -- TLS [tls class](https://kubernetes.io/docs/concepts/services-networking/ingress/#tls) applied to the ingress resource |
| 89 | + tls: |
| 90 | + # -- Enables TLS on the ingress resource |
| 91 | + enabled: true |
| 92 | + # -- If present overwrites the default secret name |
| 93 | + secretName: "tls-secret-identity-hub" |
| 94 | + ## Adds [cert-manager](https://cert-manager.io/docs/) annotations to the ingress resource |
| 95 | + certManager: |
| 96 | + # -- If preset enables certificate generation via cert-manager namespace scoped issuer |
| 97 | + issuer: "" |
| 98 | + # -- If preset enables certificate generation via cert-manager cluster-wide issuer |
| 99 | + clusterIssuer: "" |
| 100 | + |
| 101 | + resources: |
| 102 | + limits: |
| 103 | + cpu: 1.5 |
| 104 | + memory: 512Mi |
| 105 | + requests: |
| 106 | + cpu: 500m |
| 107 | + memory: 128Mi |
| 108 | + |
| 109 | +############################# |
| 110 | +## PostgreSQL configuration |
| 111 | +############################# |
| 112 | +postgresql: |
| 113 | + nameOverride: identity-hub-postgresql |
| 114 | + fullnameOverride: identity-hub-postgresql |
| 115 | + jdbcUrl: "jdbc:postgresql://identity-hub-postgresql:5432/ih" |
| 116 | + auth: |
| 117 | + database: "ih" |
| 118 | + username: <path:identity-hub/data/db#username> |
| 119 | + password: <path:identity-hub/data/db#password> |
| 120 | + |
| 121 | +#################################### |
| 122 | +## External HashiCorp Vault config |
| 123 | +#################################### |
| 124 | +vault: |
| 125 | + hashicorp: |
| 126 | + # -- URL of the external HashiCorp Vault instance |
| 127 | + url: <path:identity-hub/data/vault#url> |
| 128 | + # -- Authentication token for the external vault |
| 129 | + token: <path:identity-hub/data/vault#token> |
| 130 | + # -- Timeout in seconds for vault operations |
| 131 | + timeout: 30 |
| 132 | + healthCheck: |
| 133 | + enabled: true |
| 134 | + standbyOk: true |
| 135 | + paths: |
| 136 | + # -- Base path for the KV secrets engine (e.g. /v1/secret) |
| 137 | + secret: <path:identity-hub/data/vault#secretPath> |
| 138 | + # -- Health check endpoint of the vault |
| 139 | + health: /v1/sys/health |
0 commit comments