mirror of
https://github.com/valitydev/helmsdeep.git
synced 2024-11-06 08:55:21 +00:00
0cd257f642
* dark-api fix KK url * Enlarge domainconfig init with providers, payouts, payment_routing * add reporter enable wapi-* fix fistfull config for identities create * add create account in settlement * fix wallet_contract * Service urls now requires own place in config * fix wapi-pcidss config * fix wapi for creation destination * add environment for devstand * fix wapi endpoint in fistful-magista * darkapi bump * bump dashboard * bump KK version * add roles to internal realm * bump questionary-proxy * reduce default_ttl * add wapi port * group ingress tls secrets for api and iddqd * reduce cert number by splitting tls section in papi * change domain inliner to use vars * refactor ingress domain logic * refactor trigger name * Update erlang services (#204) * Update wapi-pcidss to latest * Update wapi-v0 to latest * Update hellgate * Update fistful * Remove legacy capi services * Add party-management * Add limiter * Fix files for config output for limiter and party-management * Update capi-v2 to latest * Update dominant * Update kds * Update cds * Update bender * Convert template vars to values * Update machinegun * Add token-keeper * Add token-keeper * ED-159: shamway fix * ED-159: Add bouncer and bouncer-policies * Update config/bouncer-policies/values.yaml.gotmpl Co-authored-by: vilorij <vilorij@ya.ru> * Code review fixes * Update bouncer* * Add keys * Move to new way of ingress templating * drop doubled parameter * typofix in dominant host * devstand change * typofix in bouncers * disable LE and tls in devstand * Fix bouncer config * Fix binapi config * fix papi shebang * typofix add probes port * fix bouncer-policies port * disable KK tls if disabled in Values * Fix path to party service in mg * capi-v1 is back for test transaction * ingress secret typofix * capi-v1 in helmfile * typofix in domain address * enable idkfa * fix ttl * bump deps * Add links to provider and rulesets Co-authored-by: r.shaidullin <ndiezel0@gmail.com> Co-authored-by: vilorij <vilorij@ya.ru> Co-authored-by: Dmitry Skokov <d.skokov@rbkmoney.com> * Update devstand.rbk.yaml * move prometheus to helm-infra * fix test-transaction stateless values * Add comment to default.values Co-authored-by: Dmitry Skokov <d.skokov@rbkmoney.com> Co-authored-by: Sergey Yelin <elinsn@gmail.com> Co-authored-by: ilyatrub <ilyatrub@gmail.com> Co-authored-by: Sergey Yelin <s.elin@rbkmoney.com> Co-authored-by: r.shaidullin <ndiezel0@gmail.com>
171 lines
4.2 KiB
YAML
171 lines
4.2 KiB
YAML
# -*- mode: yaml -*-
|
|
|
|
replicaCount: 1
|
|
|
|
image:
|
|
repository: docker.io/rbkmoney/dark-api
|
|
tag: 933d0b9506ba312d69dfd46c5432ced36e3fce64
|
|
pullPolicy: IfNotPresent
|
|
|
|
runopts:
|
|
command: ["/opt/dark-api/entrypoint.sh"]
|
|
|
|
configMap:
|
|
data:
|
|
entrypoint.sh: |
|
|
{{- tpl (readFile "entrypoint.sh.gotmpl") . | nindent 6 }}
|
|
loggers.xml: |
|
|
{{- readFile "loggers.xml" | nindent 6 }}
|
|
logback.xml: |
|
|
{{- readFile "../logs/logback.xml" | nindent 6 }}
|
|
fetchKeycloakPubkey: |
|
|
{{- readFile "../api-common/fetch-keycloak-pubkey.sh" | nindent 6 }}
|
|
|
|
env:
|
|
- name: LOGBACK_SERVICE_NAME
|
|
value: "dark-api"
|
|
|
|
volumes:
|
|
- name: config-volume
|
|
configMap:
|
|
name: {{ .Release.Name }}
|
|
defaultMode: 0755
|
|
- name: keycloak-pubkey
|
|
emptyDir: {}
|
|
|
|
volumeMounts:
|
|
- name: config-volume
|
|
mountPath: /opt/dark-api/entrypoint.sh
|
|
subPath: entrypoint.sh
|
|
readOnly: true
|
|
- name: config-volume
|
|
mountPath: /opt/dark-api/logback.xml
|
|
subPath: logback.xml
|
|
readOnly: true
|
|
- name: config-volume
|
|
mountPath: /opt/dark-api/loggers.xml
|
|
subPath: loggers.xml
|
|
readOnly: true
|
|
- name: keycloak-pubkey
|
|
mountPath: /var/lib/dark-api/keys/keycloak
|
|
readOnly: true
|
|
|
|
apiInitContainers:
|
|
enabled: true
|
|
|
|
service:
|
|
ports:
|
|
- name: api
|
|
port: 8080
|
|
- name: management
|
|
port: 8023
|
|
|
|
{{ $domainWithNamespace := printf "%s.%s" .Release.Namespace .Values.services.ingress.rootDomain }}
|
|
{{ $ingressDomain := .Values.services.ingress.namespacedDomain | ternary $domainWithNamespace .Values.services.ingress.rootDomain }}
|
|
|
|
ingress:
|
|
enabled: true
|
|
annotations:
|
|
{{- if .Values.services.ingress.tls.letsEncrypt.enabled }}
|
|
cert-manager.io/cluster-issuer: {{ .Values.services.ingress.tls.letsEncrypt.issuer }}
|
|
{{- end }}
|
|
nginx.ingress.kubernetes.io/cors-allow-methods: "PUT, GET, POST"
|
|
nginx.ingress.kubernetes.io/cors-allow-credentials: "true"
|
|
nginx.ingress.kubernetes.io/cors-allow-headers: "content-type,content-disposition,authorization,x-request-id"
|
|
nginx.ingress.kubernetes.io/configuration-snippet: |
|
|
more_set_headers "Access-Control-Allow-Origin: $http_origin";
|
|
kubernetes.io/ingress.class: {{ .Values.services.ingress.class | quote }}
|
|
hosts:
|
|
- host: api.{{ $ingressDomain | default "rbk.dev" }}
|
|
paths:
|
|
- /dark-api
|
|
{{- if .Values.services.ingress.tls.enabled }}
|
|
tls:
|
|
{{ if .Values.services.ingress.tls.letsEncrypt.enabled }}
|
|
- secretName: api-{{ .Values.services.ingress.tls.secretName }}
|
|
{{- else }}
|
|
- secretName: {{ .Values.services.ingress.tls.secretName }}
|
|
{{- end }}
|
|
hosts:
|
|
- api.{{ $ingressDomain | default "rbk.dev" }}
|
|
{{- end }}
|
|
servicePort: 8080
|
|
|
|
livenessProbe:
|
|
httpGet:
|
|
path: /actuator/health
|
|
port: management
|
|
|
|
readinessProbe:
|
|
httpGet:
|
|
path: /actuator/health
|
|
port: management
|
|
|
|
metrics:
|
|
serviceMonitor:
|
|
enabled: false
|
|
namespace: {{ .Release.Namespace }}
|
|
additionalLabels:
|
|
release: prometheus
|
|
endpoints:
|
|
- port: "management"
|
|
path: /actuator/prometheus
|
|
scheme: http
|
|
|
|
ciliumPolicies:
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: magista
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: claim-management
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: messages
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: questionary-aggr-proxy
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: questionary
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: file-storage
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: hellgate
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: cabi
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: dominant
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8022
|
|
type: TCP
|
|
name: dudoser
|
|
namespace: {{ .Release.Namespace }}
|
|
- filters:
|
|
- port: 8080
|
|
type: TCP
|
|
name: keycloak
|
|
namespace: {{ .Release.Namespace }}
|