forked from komish/dh-plugin-workflow-hackery
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathrhdh-helm-values.yaml
253 lines (253 loc) · 7.06 KB
/
rhdh-helm-values.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
global:
auth:
backend:
enabled: true
clusterRouterBase: apps.dancurran-lab2025.opdev.io
dynamic:
plugins:
- disabled: false
package: oci://quay.io/tkral/backstage-community-plugin-todo:v0.1.1!backstage-community-plugin-todo
includes:
- dynamic-plugins.default.yaml
route:
enabled: true
host: '{{ .Values.global.host }}'
path: /
tls:
enabled: true
insecureEdgeTerminationPolicy: Redirect
termination: edge
wildcardPolicy: None
upstream:
backstage:
appConfig:
app:
baseUrl: 'https://{{- include "janus-idp.hostname" . }}'
backend:
auth:
externalAccess:
- options:
secret: '${BACKEND_SECRET}'
subject: legacy-default-config
type: legacy
baseUrl: 'https://{{- include "janus-idp.hostname" . }}'
cors:
origin: 'https://{{- include "janus-idp.hostname" . }}'
database:
connection:
password: '${POSTGRESQL_ADMIN_PASSWORD}'
user: postgres
args:
- '--config'
- dynamic-plugins-root/app-config.dynamic-plugins.yaml
containerPorts:
backend: 7007
containerSecurityContext:
capabilities:
drop:
- ALL
seccompProfile:
type: RuntimeDefault
allowPrivilegeEscalation: false
runAsNonRoot: true
extraAppConfig:
- configMapRef: app-config-rhdh
filename: app-config-rhdh.yaml
extraEnvVars:
- name: BACKEND_SECRET
valueFrom:
secretKeyRef:
key: backend-secret
name: '{{ include "janus-idp.backend-secret-name" $ }}'
- name: POSTGRESQL_ADMIN_PASSWORD
valueFrom:
secretKeyRef:
key: postgres-password
name: '{{- include "janus-idp.postgresql.secretName" . }}'
extraVolumeMounts:
- mountPath: /opt/app-root/src/dynamic-plugins-root
name: dynamic-plugins-root
extraVolumes:
- name: dynamic-plugins-root
persistentVolumeClaim:
claimName: '{{ printf "%s-dynamic-plugins-root" .Release.Name }}'
- configMap:
defaultMode: 420
name: '{{ printf "%s-dynamic-plugins" .Release.Name }}'
optional: true
name: dynamic-plugins
- name: dynamic-plugins-npmrc
secret:
defaultMode: 420
optional: true
secretName: '{{ printf "%s-dynamic-plugins-npmrc" .Release.Name }}'
- name: dynamic-plugins-registry-auth
secret:
defaultMode: 416
optional: true
secretName: '{{ printf "%s-dynamic-plugins-registry-auth" .Release.Name }}'
- name: npmcacache
image:
pullPolicy: Always
registry: registry.redhat.io
repository: rhdh/rhdh-hub-rhel9@sha256
tag: d8268197ba0466643efb818fcad8f0fc29e32463f75b0f7f51d9ce75ec717572
initContainers:
- command:
- ./install-dynamic-plugins.sh
- /dynamic-plugins-root
env:
- name: NPM_CONFIG_USERCONFIG
value: /opt/app-root/src/.npmrc.dynamic-plugins
image: '{{ include "backstage.image" . }}'
imagePullPolicy: Always
name: install-dynamic-plugins
resources:
limits:
cpu: 1000m
ephemeral-storage: 5Gi
memory: 2.5Gi
requests:
cpu: 250m
memory: 256Mi
securityContext:
allowPrivilegeEscalation: false
capabilities:
drop:
- ALL
runAsNonRoot: true
seccompProfile:
type: RuntimeDefault
volumeMounts:
- mountPath: /dynamic-plugins-root
name: dynamic-plugins-root
- mountPath: /opt/app-root/src/dynamic-plugins.yaml
name: dynamic-plugins
readOnly: true
subPath: dynamic-plugins.yaml
- mountPath: /opt/app-root/src/.npmrc.dynamic-plugins
name: dynamic-plugins-npmrc
readOnly: true
subPath: .npmrc
- mountPath: /opt/app-root/src/.config/containers
name: dynamic-plugins-registry-auth
readOnly: true
- mountPath: /opt/app-root/src/.npm/_cacache
name: npmcacache
workingDir: /opt/app-root/src
installDir: /opt/app-root/src
livenessProbe:
httpGet:
path: /.backstage/health/v1/liveness
port: backend
scheme: HTTP
failureThreshold: 3
periodSeconds: 10
successThreshold: 1
timeoutSeconds: 4
podAnnotations:
checksum/dynamic-plugins: >-
{{- include "common.tplvalues.render" ( dict "value"
.Values.global.dynamic "context" $) | sha256sum }}
readinessProbe:
httpGet:
path: /.backstage/health/v1/readiness
port: backend
scheme: HTTP
failureThreshold: 3
periodSeconds: 10
successThreshold: 2
timeoutSeconds: 4
replicas: 1
resources:
limits:
cpu: 1000m
ephemeral-storage: 5Gi
memory: 2.5Gi
requests:
cpu: 250m
memory: 1Gi
revisionHistoryLimit: 10
startupProbe:
httpGet:
path: /.backstage/health/v1/liveness
port: backend
scheme: HTTP
failureThreshold: 3
initialDelaySeconds: 30
periodSeconds: 20
successThreshold: 1
timeoutSeconds: 4
clusterDomain: cluster.local
diagnosticMode:
args:
- infinity
command:
- sleep
enabled: false
ingress:
enabled: false
host: '{{ .Values.global.host }}'
path: /
tls:
enabled: false
metrics:
serviceMonitor:
enabled: false
path: /metrics
port: http-metrics
nameOverride: developer-hub
networkPolicy:
egressRules:
denyConnectionsToExternal: false
enabled: false
postgresql:
auth:
secretKeys:
adminPasswordKey: postgres-password
userPasswordKey: password
enabled: true
image:
registry: registry.redhat.io
repository: rhel9/postgresql-15@sha256
tag: 44a08b83a6c50714b52f4cf1c3476bc16b66faec21dd9a9bc07d1be5f97b8150
postgresqlDataDir: /var/lib/pgsql/data/userdata
primary:
containerSecurityContext:
enabled: false
extraEnvVars:
- name: POSTGRESQL_ADMIN_PASSWORD
valueFrom:
secretKeyRef:
key: postgres-password
name: '{{- include "postgresql.v1.secretName" . }}'
persistence:
enabled: true
mountPath: /var/lib/pgsql/data
size: 1Gi
podSecurityContext:
enabled: false
resources:
limits:
cpu: 250m
ephemeral-storage: 20Mi
memory: 1024Mi
requests:
cpu: 250m
memory: 256Mi
service:
externalTrafficPolicy: Cluster
extraPorts:
- name: http-metrics
port: 9464
targetPort: 9464
ports:
backend: 7007
name: http-backend
targetPort: backend
sessionAffinity: None
type: ClusterIP
serviceAccount:
automountServiceAccountToken: true
create: false
nameOverride: developer-hub