|
| 1 | +# science-portal |
| 2 | + |
| 3 | +   |
| 4 | + |
| 5 | +A Helm chart for Science Portal Next.js application |
| 6 | + |
| 7 | +**Homepage:** <https://github.com/opencadc/science-portal> |
| 8 | + |
| 9 | +## Maintainers |
| 10 | + |
| 11 | +| Name | Email | Url | |
| 12 | +| ---- | ------ | --- | |
| 13 | +| Science Portal Team | | | |
| 14 | + |
| 15 | +## Values |
| 16 | + |
| 17 | +| Key | Type | Default | Description | |
| 18 | +|-----|------|---------|-------------| |
| 19 | +| affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].key | string | `"app.kubernetes.io/name"` | | |
| 20 | +| affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].operator | string | `"In"` | | |
| 21 | +| affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.labelSelector.matchExpressions[0].values[0] | string | `"science-portal"` | | |
| 22 | +| affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].podAffinityTerm.topologyKey | string | `"kubernetes.io/hostname"` | | |
| 23 | +| affinity.podAntiAffinity.preferredDuringSchedulingIgnoredDuringExecution[0].weight | int | `100` | | |
| 24 | +| autoscaling.enabled | bool | `true` | | |
| 25 | +| autoscaling.maxReplicas | int | `10` | | |
| 26 | +| autoscaling.minReplicas | int | `2` | | |
| 27 | +| autoscaling.targetCPUUtilizationPercentage | int | `80` | | |
| 28 | +| autoscaling.targetMemoryUtilizationPercentage | int | `80` | | |
| 29 | +| env[0].name | string | `"SERVICE_STORAGE_API"` | | |
| 30 | +| env[0].value | string | `"https://ws-uv.canfar.net/arc/nodes/home/"` | | |
| 31 | +| env[10].name | string | `"NEXT_PUBLIC_API_TIMEOUT"` | | |
| 32 | +| env[10].value | string | `"30000"` | | |
| 33 | +| env[11].name | string | `"NEXT_PUBLIC_ENABLE_QUERY_DEVTOOLS"` | | |
| 34 | +| env[11].value | string | `"false"` | | |
| 35 | +| env[12].name | string | `"NEXT_PUBLIC_EXPERIMENTAL"` | | |
| 36 | +| env[12].value | string | `"true"` | | |
| 37 | +| env[13].name | string | `"NEXT_USE_CANFAR"` | | |
| 38 | +| env[13].value | string | `"true"` | | |
| 39 | +| env[14].name | string | `"NEXT_PUBLIC_USE_CANFAR"` | | |
| 40 | +| env[14].value | string | `"true"` | | |
| 41 | +| env[15].name | string | `"AUTH_TRUST_HOST"` | | |
| 42 | +| env[15].value | string | `"true"` | | |
| 43 | +| env[16].name | string | `"NEXTAUTH_URL"` | | |
| 44 | +| env[16].value | string | `"https://science-portal.example.com"` | | |
| 45 | +| env[1].name | string | `"LOGIN_API"` | | |
| 46 | +| env[1].value | string | `"https://ws-cadc.canfar.net/ac"` | | |
| 47 | +| env[2].name | string | `"SKAHA_API"` | | |
| 48 | +| env[2].value | string | `"https://ws-uv.canfar.net/skaha"` | | |
| 49 | +| env[3].name | string | `"SRC_SKAHA_API"` | | |
| 50 | +| env[3].value | string | `"https://src.canfar.net/skaha"` | | |
| 51 | +| env[4].name | string | `"SRC_CAVERN_API"` | | |
| 52 | +| env[4].value | string | `"https://src.canfar.net/cavern"` | | |
| 53 | +| env[5].name | string | `"API_TIMEOUT"` | | |
| 54 | +| env[5].value | string | `"30000"` | | |
| 55 | +| env[6].name | string | `"NEXT_PUBLIC_LOGIN_API"` | | |
| 56 | +| env[6].value | string | `"https://ws-cadc.canfar.net/ac"` | | |
| 57 | +| env[7].name | string | `"NEXT_PUBLIC_SKAHA_API"` | | |
| 58 | +| env[7].value | string | `"https://ws-uv.canfar.net/skaha"` | | |
| 59 | +| env[8].name | string | `"NEXT_PUBLIC_SRC_SKAHA_API"` | | |
| 60 | +| env[8].value | string | `"https://src.canfar.net/skaha"` | | |
| 61 | +| env[9].name | string | `"NEXT_PUBLIC_SRC_CAVERN_API"` | | |
| 62 | +| env[9].value | string | `"https://src.canfar.net/cavern"` | | |
| 63 | +| fullnameOverride | string | `""` | | |
| 64 | +| image.pullPolicy | string | `"IfNotPresent"` | | |
| 65 | +| image.repository | string | `"science-portal-nextjs"` | | |
| 66 | +| image.tag | string | `""` | | |
| 67 | +| imagePullSecrets | list | `[]` | | |
| 68 | +| ingress.annotations."cert-manager.io/cluster-issuer" | string | `"letsencrypt-prod"` | | |
| 69 | +| ingress.annotations."nginx.ingress.kubernetes.io/force-ssl-redirect" | string | `"true"` | | |
| 70 | +| ingress.annotations."nginx.ingress.kubernetes.io/ssl-redirect" | string | `"true"` | | |
| 71 | +| ingress.className | string | `"nginx"` | | |
| 72 | +| ingress.enabled | bool | `true` | | |
| 73 | +| ingress.hosts[0].host | string | `"science-portal.example.com"` | | |
| 74 | +| ingress.hosts[0].paths[0].path | string | `"/"` | | |
| 75 | +| ingress.hosts[0].paths[0].pathType | string | `"Prefix"` | | |
| 76 | +| ingress.tls[0].hosts[0] | string | `"science-portal.example.com"` | | |
| 77 | +| ingress.tls[0].secretName | string | `"science-portal-tls"` | | |
| 78 | +| livenessProbe.failureThreshold | int | `3` | | |
| 79 | +| livenessProbe.httpGet.path | string | `"/api/health"` | | |
| 80 | +| livenessProbe.httpGet.port | int | `3000` | | |
| 81 | +| livenessProbe.initialDelaySeconds | int | `30` | | |
| 82 | +| livenessProbe.periodSeconds | int | `10` | | |
| 83 | +| livenessProbe.timeoutSeconds | int | `3` | | |
| 84 | +| nameOverride | string | `""` | | |
| 85 | +| networkPolicy.egress[0].ports[0].port | int | `443` | | |
| 86 | +| networkPolicy.egress[0].ports[0].protocol | string | `"TCP"` | | |
| 87 | +| networkPolicy.egress[0].ports[1].port | int | `53` | | |
| 88 | +| networkPolicy.egress[0].ports[1].protocol | string | `"TCP"` | | |
| 89 | +| networkPolicy.egress[0].ports[2].port | int | `53` | | |
| 90 | +| networkPolicy.egress[0].ports[2].protocol | string | `"UDP"` | | |
| 91 | +| networkPolicy.egress[0].to[0].namespaceSelector | object | `{}` | | |
| 92 | +| networkPolicy.enabled | bool | `true` | | |
| 93 | +| networkPolicy.ingress[0].from[0].namespaceSelector.matchLabels.name | string | `"ingress-nginx"` | | |
| 94 | +| networkPolicy.ingress[0].ports[0].port | int | `3000` | | |
| 95 | +| networkPolicy.ingress[0].ports[0].protocol | string | `"TCP"` | | |
| 96 | +| networkPolicy.policyTypes[0] | string | `"Ingress"` | | |
| 97 | +| networkPolicy.policyTypes[1] | string | `"Egress"` | | |
| 98 | +| nodeSelector | object | `{}` | | |
| 99 | +| oidc.callbackUri | string | `"https://science-portal.example.com/science-portal"` | | |
| 100 | +| oidc.clientId | string | `""` | | |
| 101 | +| oidc.redirectUri | string | `"https://science-portal.example.com/api/auth/callback/oidc"` | | |
| 102 | +| oidc.scope | string | `"openid profile offline_access"` | | |
| 103 | +| oidc.uri | string | `"https://ska-iam.stfc.ac.uk/"` | | |
| 104 | +| podAnnotations | object | `{}` | | |
| 105 | +| podDisruptionBudget.enabled | bool | `true` | | |
| 106 | +| podDisruptionBudget.minAvailable | int | `1` | | |
| 107 | +| podSecurityContext.fsGroup | int | `1001` | | |
| 108 | +| podSecurityContext.runAsGroup | int | `1001` | | |
| 109 | +| podSecurityContext.runAsNonRoot | bool | `true` | | |
| 110 | +| podSecurityContext.runAsUser | int | `1001` | | |
| 111 | +| podSecurityContext.seccompProfile.type | string | `"RuntimeDefault"` | | |
| 112 | +| readinessProbe.failureThreshold | int | `3` | | |
| 113 | +| readinessProbe.httpGet.path | string | `"/api/health/ready"` | | |
| 114 | +| readinessProbe.httpGet.port | int | `3000` | | |
| 115 | +| readinessProbe.initialDelaySeconds | int | `10` | | |
| 116 | +| readinessProbe.periodSeconds | int | `5` | | |
| 117 | +| readinessProbe.timeoutSeconds | int | `3` | | |
| 118 | +| replicaCount | int | `2` | | |
| 119 | +| resources.limits.cpu | string | `"1000m"` | | |
| 120 | +| resources.limits.memory | string | `"1Gi"` | | |
| 121 | +| resources.requests.cpu | string | `"100m"` | | |
| 122 | +| resources.requests.memory | string | `"256Mi"` | | |
| 123 | +| secrets.existingSecret | string | `"science-portal-secrets"` | | |
| 124 | +| secrets.keys.authSecret | string | `"auth-secret"` | | |
| 125 | +| secrets.keys.oidcClientSecret | string | `"oidc-client-secret"` | | |
| 126 | +| securityContext.allowPrivilegeEscalation | bool | `false` | | |
| 127 | +| securityContext.capabilities.drop[0] | string | `"ALL"` | | |
| 128 | +| securityContext.readOnlyRootFilesystem | bool | `false` | | |
| 129 | +| service.annotations | object | `{}` | | |
| 130 | +| service.port | int | `80` | | |
| 131 | +| service.targetPort | int | `3000` | | |
| 132 | +| service.type | string | `"ClusterIP"` | | |
| 133 | +| serviceAccount.annotations | object | `{}` | | |
| 134 | +| serviceAccount.create | bool | `true` | | |
| 135 | +| serviceAccount.name | string | `""` | | |
| 136 | +| tolerations | list | `[]` | | |
0 commit comments