This helm chart installs the Portal application which consists of
- portal-frontend (v2.3.0),
- portal-frontend-registration (v2.1.0),
- portal-assets (v2.3.0) and
- portal-backend (v2.3.0).
The Portal is designed to work with the IAM. This version is compatible with the 4.0.0 version of the IAM instances:
For information on how to upgrade from previous versions please refer to Version Upgrade.
For further information please refer to Technical Documentation.
For information about the initial wallet insert for the Operator, please refer to initial operator wallet setup.
In case of usage of the Decentralized Identity Verification (DIV, formerly known as DIM) Wallet: this version is compatible with the 2.x.x version of the SSI DIM Middle Layer.
The referenced container images are for demonstration purposes only.
To install the chart with the release name portal
:
$ helm repo add tractusx-dev https://eclipse-tractusx.github.io/charts/dev
$ helm install portal tractusx-dev/portal
To install the helm chart into your cluster with your values:
$ helm install -f your-values.yaml portal tractusx-dev/portal
To use the helm chart as a dependency:
dependencies:
- name: portal
repository: https://eclipse-tractusx.github.io/charts/dev
version: 2.3.0
Repository | Name | Version |
---|---|---|
https://charts.bitnami.com/bitnami | postgresql | 12.x.x |
Key | Type | Default | Description |
---|---|---|---|
portalAddress | string | "https://portal.example.org" |
Provide portal base address. |
portalBackendAddress | string | "https://portal-backend.example.org" |
Provide portal-backend base address. |
centralidp | object | {"address":"https://centralidp.example.org","clients":{"bpdm":"Cl7-CX-BPDM","issuerComponent":"Cl24-CX-SSI-CredentialIssuer","miw":"Cl5-CX-Custodian","portal":"Cl2-CX-Portal","registration":"Cl1-CX-Registration","semantic":"Cl3-CX-Semantic","technicalRolesManagement":"technical_roles_management"},"realm":"CX-Central"} |
Provide details about centralidp (CX IAM) Keycloak instance. |
centralidp.address | string | "https://centralidp.example.org" |
Provide centralidp base address, without trailing '/auth'. |
sharedidpAddress | string | "https://sharedidp.example.org" |
Provide sharedidp address (CX IAM), without trailing '/auth'. |
semanticsAddress | string | "https://semantics.example.org" |
Provide semantics base address. |
bpdm | object | {"poolAddress":"https://business-partners.example.org","poolApiPath":"/pool/v6","portalGateAddress":"https://business-partners.example.org","portalGateApiPath":"/companies/test-company/v6"} |
Provide details about business partner data management (BPDM). |
bpdm.poolAddress | string | "https://business-partners.example.org" |
Provide bpdm partners pool base address. |
bpdm.poolApiPath | string | "/pool/v6" |
Provide bpdm pool api path. |
bpdm.portalGateAddress | string | "https://business-partners.example.org" |
Provide bpdm portal gate base address. |
bpdm.portalGateApiPath | string | "/companies/test-company/v6" |
Provide bpdm portal gate api path. |
custodianAddress | string | "https://managed-identity-wallets.example.org" |
Provide custodian base address. |
sdfactoryAddress | string | "https://sdfactory.example.org" |
Provide sdfactory base address. |
clearinghouseAddress | string | "https://validation.example.org" |
Provide clearinghouse base address. |
clearinghouseTokenAddress | string | "https://keycloak.example.org/realms/example/protocol/openid-connect/token" |
Provide clearinghouse token address. |
clearinghouseConnectDisabled | bool | false |
if set to true the self description document creation will be skipped for company registrations as well as connector registrations |
issuerComponentAddress | string | "https://ssi-credential-issuer.example.org" |
Provide issuer component base address |
bpnDidResolver | object | {"directoryApiAddress":"https://bpn-did-resolution-service.example.org/api/directory","managementApiAddress":"http://bpn-did-resolution-service-bdrs-server:8081"} |
Provide details about the BPN DID Resolver. |
bpnDidResolver.managementApiAddress | string | "http://bpn-did-resolution-service-bdrs-server:8081" |
Provide management api base address |
bpnDidResolver.directoryApiAddress | string | "https://bpn-did-resolution-service.example.org/api/directory" |
Provide directory api address |
dimWrapper | object | {"apiPath":"/api/dim","baseAddress":"https://dim.example.org","tokenAddress":"https://keycloak.example.org/realms/example/protocol/openid-connect/token"} |
Provide the configuration of the dim wrapper address |
dimWrapper.baseAddress | string | "https://dim.example.org" |
Provide the dim base address |
dimWrapper.apiPath | string | "/api/dim" |
Provide the api path |
dimWrapper.tokenAddress | string | "https://keycloak.example.org/realms/example/protocol/openid-connect/token" |
Provide dim token address. |
decentralIdentityManagementAuthAddress | string | "https://dis-integration-service-prod.eu10.dim.cloud.sap/api/v2.0.0/iatp/catena-x-portal" |
|
operator | object | {"bpn":"BPNL00000003CRHK","city":"Munich","country_alpha2code":"DE","name":"Catena-X","region":"","shortname":"Catena-X","streetAdditional":"","streetName":"Street","streetNumber":"1","zipCode":"0001"} |
Set information related to the operator company |
operator.bpn | string | "BPNL00000003CRHK" |
The bpn of the operator |
operator.name | string | "Catena-X" |
The name of the operator |
operator.shortname | string | "Catena-X" |
The shortname of the operator |
operator.city | string | "Munich" |
The city of the operator address |
operator.region | string | "" |
The region of the operator address |
operator.streetAdditional | string | "" |
Additional street information of the operator address |
operator.streetName | string | "Street" |
The street name of the operator address |
operator.streetNumber | string | "1" |
The street number of the operator address |
operator.zipCode | string | "0001" |
The zipcode of the operator address |
operator.country_alpha2code | string | "DE" |
The alpha 2 code of the operator address |
frontend.ingress.enabled | bool | false |
Portal frontend ingress parameters, enable ingress record generation for portal frontend. |
frontend.ingress.name | string | "frontend" |
|
frontend.ingress.tls | list | [] |
Ingress TLS configuration |
frontend.ingress.hosts[0] | object | `{"host":"","paths":[{"backend":{"port":8080,"service":"portal"},"path":"/(.)","pathType":"Prefix"},{"backend":{"port":8080,"service":"registration"},"path":"/registration/(.)","pathType":"Prefix"},{"backend":{"port":8080,"service":"assets"},"path":"/((assets | documentation)/.*)","pathType":"Prefix"}]}` |
frontend.portal.name | string | "portal" |
|
frontend.portal.image.name | string | "docker.io/tractusx/portal-frontend" |
|
frontend.portal.image.portaltag | string | "v2.3.0" |
|
frontend.portal.image.pullPolicy | string | "IfNotPresent" |
|
frontend.portal.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
frontend.portal.resources | object | {"limits":{"cpu":"75m","memory":"125M"},"requests":{"cpu":"25m","memory":"125M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
frontend.portal.requireHttpsUrlPattern | bool | true |
|
frontend.registration.name | string | "registration" |
|
frontend.registration.image.name | string | "docker.io/tractusx/portal-frontend-registration" |
|
frontend.registration.image.registrationtag | string | "v2.1.0" |
|
frontend.registration.image.pullPolicy | string | "IfNotPresent" |
|
frontend.registration.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
frontend.registration.resources | object | {"limits":{"cpu":"75m","memory":"100M"},"requests":{"cpu":"25m","memory":"100M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
frontend.assets.name | string | "assets" |
|
frontend.assets.image.name | string | "docker.io/tractusx/portal-assets" |
|
frontend.assets.image.assetstag | string | "v2.3.0" |
|
frontend.assets.image.pullPolicy | string | "IfNotPresent" |
|
frontend.assets.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
frontend.assets.resources | object | {"limits":{"cpu":"45m","memory":"100M"},"requests":{"cpu":"25m","memory":"100M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
frontend.assets.path | string | "/assets" |
|
frontend.centralidpAuthPath | string | "/auth" |
|
backend.ingress.enabled | bool | false |
Portal-backend ingress parameters, enable ingress record generation for portal-backend. |
backend.ingress.name | string | "backend" |
|
backend.ingress.tls | list | [] |
Ingress TLS configuration |
backend.ingress.hosts[0] | object | {"host":"portal-backend.example.org","paths":[{"backend":{"port":8080,"service":"registration-service"},"path":"/api/registration","pathType":"Prefix"},{"backend":{"port":8080,"service":"administration-service"},"path":"/api/administration","pathType":"Prefix"},{"backend":{"port":8080,"service":"notification-service"},"path":"/api/notification","pathType":"Prefix"},{"backend":{"port":8080,"service":"provisioning-service"},"path":"/api/provisioning","pathType":"Prefix"},{"backend":{"port":8080,"service":"marketplace-app-service"},"path":"/api/apps","pathType":"Prefix"},{"backend":{"port":8080,"service":"services-service"},"path":"/api/services","pathType":"Prefix"}]} |
Provide default path for the ingress record. |
backend.dotnetEnvironment | string | "Production" |
|
backend.dbConnection.schema | string | "portal" |
|
backend.dbConnection.sslMode | string | "Disable" |
|
backend.portalHomePath | string | "/home" |
|
backend.portalHelpPath | string | "/documentation" |
|
backend.portalPasswordResendPath | string | "/home/passwordResend" |
The password resend logic is not yet implemented in the backend - this will currently lead to a 404 page when clicking on the link in the mail |
backend.portalIntroductionCompanyRolePath | string | "/companyroles" |
|
backend.portalIntroductionDataspacePath | string | "/dataspace" |
|
backend.userManagementPath | string | "/usermanagement" |
|
backend.useDimWallet | bool | false |
Enable for using Decentral Identity Management (DIM) instead of Managed Identity Wallet (MIW) as wallet |
backend.keycloak.secret | string | "portal-backend-keycloak" |
Secret containing the database-password and the client-secret for the connection to the centralidp (CX IAM) and the client-secret for the connection to the sharedidp (CX-IAM). |
backend.keycloak.central.clientId | string | "central-client-id" |
Provide centralidp client-id from CX IAM centralidp. |
backend.keycloak.central.clientSecret | string | "" |
Client-secret for centralidp client-id. Secret-key 'central-client-secret'. |
backend.keycloak.central.jwtBearerOptions.requireHttpsMetadata | string | "true" |
|
backend.keycloak.central.jwtBearerOptions.metadataPath | string | "/auth/realms/CX-Central/.well-known/openid-configuration" |
|
backend.keycloak.central.jwtBearerOptions.tokenValidationParameters.validIssuerPath | string | "/auth/realms/CX-Central" |
|
backend.keycloak.central.jwtBearerOptions.tokenValidationParameters.validAudiencePortal | string | "Cl2-CX-Portal" |
|
backend.keycloak.central.jwtBearerOptions.tokenValidationParameters.validAudienceRegistration | string | "Cl1-CX-Registration" |
|
backend.keycloak.central.jwtBearerOptions.tokenValidationParameters.clockSkew | string | "00:05:00" |
|
backend.keycloak.central.jwtBearerOptions.refreshInterval | string | "00:00:30" |
|
backend.keycloak.central.tokenPath | string | "/auth/realms/CX-Central/protocol/openid-connect/token" |
|
backend.keycloak.central.useAuthTrail | bool | true |
Flag if the api should be used with an leading /auth path |
backend.keycloak.shared.clientId | string | "shared-client-id" |
Provide sharedidp client-id from CX IAM sharedidp. |
backend.keycloak.shared.clientSecret | string | "" |
Client-secret for sharedidp client-id. Secret-key 'shared-client-secret'. |
backend.keycloak.shared.authRealm | string | "master" |
|
backend.keycloak.shared.useAuthTrail | bool | true |
Flag if the api should be used with an leading /auth path |
backend.mailing.secret | string | "portal-backend-mailing" |
Secret containing the passwords for backend.mailing and backend.provisioning.sharedRealm. |
backend.mailing.host | string | "smtp.example.org" |
Provide host. |
backend.mailing.port | string | "587" |
Provide port. |
backend.mailing.user | string | "smtp-user" |
Provide user. |
backend.mailing.password | string | "" |
Password for the smtp username. Secret-key 'password'. |
backend.mailing.senderEmail | string | "[email protected]" |
The email which is set as a sender |
backend.interfaces.secret | string | "portal-backend-interfaces" |
Secret containing the client-secrets for the connection to custodian, bpdm, sdFactory, clearinghouse, offer provider and onboarding service provider. |
backend.healthChecks.startup.path | string | "/health/startup" |
|
backend.healthChecks.liveness.path | string | "/healthz" |
|
backend.healthChecks.readyness.path | string | "/ready" |
|
backend.registration.name | string | "registration-service" |
|
backend.registration.image.name | string | "docker.io/tractusx/portal-registration-service" |
|
backend.registration.image.registrationservicetag | string | "v2.3.0" |
|
backend.registration.image.pullPolicy | string | "IfNotPresent" |
|
backend.registration.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.registration.resources | object | {"limits":{"cpu":"225m","memory":"400M"},"requests":{"cpu":"75m","memory":"400M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.registration.basePath | string | "api/registration" |
|
backend.registration.logging.bpdmLibrary | string | "Information" |
|
backend.registration.logging.registrationService | string | "Information" |
|
backend.registration.logging.default | string | "Information" |
|
backend.registration.healthChecks | object | {"startup":{"tags":[{"name":"HEALTHCHECKS__0__TAGS__1","value":"portaldb"}]}} |
Keycloak Healthcheck to be enabled for startupProbe; once the centralidp Keycloak instance is available, enable healthcheck by uncommenting. |
backend.registration.portalRegistrationPath | string | "/registration/" |
|
backend.registration.keycloakClientId | string | "Cl1-CX-Registration" |
|
backend.registration.applicationStatusIds.status0 | string | "SUBMITTED" |
|
backend.registration.applicationStatusIds.status1 | string | "DECLINED" |
|
backend.registration.applicationStatusIds.status2 | string | "CONFIRMED" |
|
backend.registration.applicationDeclineStatusIds.status0 | string | "CREATED" |
|
backend.registration.applicationDeclineStatusIds.status1 | string | "ADD_COMPANY_DATA" |
|
backend.registration.applicationDeclineStatusIds.status2 | string | "INVITE_USER" |
|
backend.registration.applicationDeclineStatusIds.status3 | string | "SELECT_COMPANY_ROLE" |
|
backend.registration.applicationDeclineStatusIds.status4 | string | "UPLOAD_DOCUMENTS" |
|
backend.registration.applicationDeclineStatusIds.status5 | string | "VERIFY" |
|
backend.registration.documentTypeIds.type0 | string | "CX_FRAME_CONTRACT" |
|
backend.registration.documentTypeIds.type1 | string | "COMMERCIAL_REGISTER_EXTRACT" |
|
backend.registration.swaggerEnabled | bool | false |
|
backend.registration.registrationDocumentTypeIds.type0 | string | "CX_FRAME_CONTRACT" |
|
backend.registration.submitDocumentTypeIds.type0 | string | "COMMERCIAL_REGISTER_EXTRACT" |
|
backend.administration.name | string | "administration-service" |
|
backend.administration.image.name | string | "docker.io/tractusx/portal-administration-service" |
|
backend.administration.image.administrationservicetag | string | "v2.3.0" |
|
backend.administration.image.pullPolicy | string | "IfNotPresent" |
|
backend.administration.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.administration.resources | object | {"limits":{"cpu":"225m","memory":"600M"},"requests":{"cpu":"75m","memory":"600M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.administration.basePath | string | "api/administration" |
|
backend.administration.logging.businessLogic | string | "Information" |
|
backend.administration.logging.sdfactoryLibrary | string | "Information" |
|
backend.administration.logging.bpdmLibrary | string | "Information" |
|
backend.administration.logging.custodianLibrary | string | "Information" |
|
backend.administration.logging.default | string | "Information" |
|
backend.administration.healthChecks | object | {"startup":{"tags":[{"name":"HEALTHCHECKS__0__TAGS__1","value":"portaldb"},{"name":"HEALTHCHECKS__0__TAGS__2","value":"provisioningdb"}]}} |
Keycloak Healthcheck to be enabled for startupProbe; once the centralidp Keycloak instance is available, enable healthcheck by uncommenting. |
backend.administration.companyData.useCaseParticipationMediaTypes.type0 | string | "PDF" |
|
backend.administration.companyData.ssiCertificateMediaTypes.type0 | string | "PDF" |
|
backend.administration.companyData.companyCertificateMediaTypes.type0 | string | "PDF" |
|
backend.administration.issuerdid | string | "did:web:example.org:test123" |
|
backend.administration.connectors.validCertificationContentTypes.type0 | string | "application/x-pem-file" |
|
backend.administration.connectors.validCertificationContentTypes.type1 | string | "application/x-x509-ca-cert" |
|
backend.administration.connectors.validCertificationContentTypes.type2 | string | "application/pkix-cert" |
|
backend.administration.connectors.validCertificationContentTypes.type3 | string | "application/octet-stream" |
|
backend.administration.connectors.selfDescriptionDocumentPath | string | "/api/administration/documents/selfDescription" |
|
backend.administration.identityProviderAdmin.csvSettings.fileName | string | "identityproviderlinks.csv" |
|
backend.administration.identityProviderAdmin.csvSettings.contentType | string | "text/csv" |
|
backend.administration.identityProviderAdmin.csvSettings.charset | string | "UTF-8" |
|
backend.administration.identityProviderAdmin.csvSettings.separator | string | "," |
|
backend.administration.identityProviderAdmin.csvSettings.headerUserId | string | "UserId" |
|
backend.administration.identityProviderAdmin.csvSettings.headerFirstName | string | "FirstName" |
|
backend.administration.identityProviderAdmin.csvSettings.headerLastName | string | "LastName" |
|
backend.administration.identityProviderAdmin.csvSettings.headerEmail | string | "Email" |
|
backend.administration.identityProviderAdmin.csvSettings.headerProviderAlias | string | "ProviderAlias" |
|
backend.administration.identityProviderAdmin.csvSettings.headerProviderUserId | string | "ProviderUserId" |
|
backend.administration.identityProviderAdmin.csvSettings.headerProviderUserName | string | "ProviderUserName" |
|
backend.administration.identityProviderAdmin.deleteIdpRoles.role0 | string | "Company Admin" |
|
backend.administration.identityProviderAdmin.deleteIdpRoles.role1 | string | "IT Admin" |
|
backend.administration.identityProviderAdmin.deactivateIdpRoles.role0 | string | "Company Admin" |
|
backend.administration.identityProviderAdmin.deactivateIdpRoles.role1 | string | "IT Admin" |
|
backend.administration.registration.documentTypeIds.type0 | string | "COMMERCIAL_REGISTER_EXTRACT" |
|
backend.administration.userManagement.companyUserStatusIds.status0 | string | "ACTIVE" |
|
backend.administration.userManagement.companyUserStatusIds.status1 | string | "INACTIVE" |
|
backend.administration.userManagement.userAdminRoles.role0 | string | "Company Admin" |
|
backend.administration.userManagement.userAdminRoles.role1 | string | "IT Admin" |
|
backend.administration.serviceAccount.clientId | string | "technical_roles_management" |
|
backend.administration.serviceAccount.encryptionConfigIndex | int | 0 |
|
backend.administration.serviceAccount.encryptionConfigs.index0.index | int | 0 |
|
backend.administration.serviceAccount.encryptionConfigs.index0.cipherMode | string | "CBC" |
|
backend.administration.serviceAccount.encryptionConfigs.index0.paddingMode | string | "PKCS7" |
|
backend.administration.serviceAccount.encryptionConfigs.index0.encryptionKey | string | "" |
EncryptionKey for service account creation. Secret-key 'serviceaccount-encryption-key0'. Expected format is 256 bit (64 digits) hex. |
backend.administration.serviceAccount.dimCreationRoles.role0 | string | "Identity Wallet Management" |
|
backend.administration.swaggerEnabled | bool | false |
|
backend.administration.frameDocumentTypeIds.type0 | string | "CX_FRAME_CONTRACT" |
|
backend.provisioning.centralRealmId | string | "CX-Central" |
|
backend.provisioning.invitedUserInitialRoles.registration | string | "Company Admin" |
|
backend.provisioning.serviceAccountClientPrefix | string | "sa" |
|
backend.provisioning.centralIdentityProvider.clientId | string | "central-idp" |
|
backend.provisioning.sharedRealmClient.clientId | string | "central-idp" |
|
backend.provisioning.sharedRealm.smtpServer.host | string | "smtp.example.org" |
Provide host. |
backend.provisioning.sharedRealm.smtpServer.port | string | "587" |
Provide port. |
backend.provisioning.sharedRealm.smtpServer.user | string | "smtp-user" |
Provide user. |
backend.provisioning.sharedRealm.smtpServer.password | string | "" |
Password for the smtp username. Secret-key 'provisioning-sharedrealm-password'. |
backend.provisioning.sharedRealm.smtpServer.ssl | string | "" |
|
backend.provisioning.sharedRealm.smtpServer.startTls | string | "true" |
|
backend.provisioning.sharedRealm.smtpServer.auth | string | "true" |
|
backend.provisioning.sharedRealm.smtpServer.from | string | "[email protected]" |
Provide from. |
backend.provisioning.sharedRealm.smtpServer.replyTo | string | "[email protected]" |
Provide replyTo. |
backend.appmarketplace.name | string | "marketplace-app-service" |
|
backend.appmarketplace.image.name | string | "docker.io/tractusx/portal-marketplace-app-service" |
|
backend.appmarketplace.image.appmarketplaceservicetag | string | "v2.3.0" |
|
backend.appmarketplace.image.pullPolicy | string | "IfNotPresent" |
|
backend.appmarketplace.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.appmarketplace.resources | object | {"limits":{"cpu":"225m","memory":"500M"},"requests":{"cpu":"75m","memory":"500M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.appmarketplace.basePath | string | "api/apps" |
|
backend.appmarketplace.logging.default | string | "Information" |
|
backend.appmarketplace.logging.offersLibrary | string | "Information" |
|
backend.appmarketplace.healthChecks | object | {"startup":{"tags":[{"name":"HEALTHCHECKS__0__TAGS__1","value":"portaldb"}]}} |
Keycloak Healthcheck to be enabled for startupProbe; once the centralidp Keycloak instance is available, enable healthcheck by uncommenting. |
backend.appmarketplace.appOverviewPath | string | "/appoverview" |
|
backend.appmarketplace.subscriptionPath | string | "/appsubscription" |
|
backend.appmarketplace.detailPath | string | "/appdetail" |
|
backend.appmarketplace.catenaAdminRoles.role0 | string | "CX Admin" |
|
backend.appmarketplace.serviceAccountRoles.role0 | string | "App Tech User" |
|
backend.appmarketplace.salesManagerRoles.role0 | string | "Sales Manager" |
|
backend.appmarketplace.serviceManagerRoles.role0 | string | "App Manager" |
|
backend.appmarketplace.subscriptionManagerRoles.role0 | string | "App Manager" |
|
backend.appmarketplace.subscriptionManagerRoles.role1 | string | "Sales Manager" |
|
backend.appmarketplace.activeAppCompanyAdminRoles.role0 | string | "IT Admin" |
|
backend.appmarketplace.activeAppCompanyAdminRoles.role1 | string | "Company Admin" |
|
backend.appmarketplace.approveAppUserRoles.role0 | string | "Sales Manager" |
|
backend.appmarketplace.approveAppUserRoles.role1 | string | "App Manager" |
|
backend.appmarketplace.activationUserRoles.role0 | string | "Sales Manager" |
|
backend.appmarketplace.activationUserRoles.role1 | string | "App Manager" |
|
backend.appmarketplace.ITAdminRoles.role0 | string | "IT Admin" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.documentTypeId0 | string | "APP_TECHNICAL_INFORMATION" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds0.mediaTypeId0 | string | "PDF" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.documentTypeId1 | string | "APP_LEADIMAGE" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds1.mediaTypeId0 | string | "JPEG" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds1.mediaTypeId1 | string | "PNG" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds1.mediaTypeId2 | string | "SVG" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.documentTypeId2 | string | "APP_IMAGE" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds2.mediaTypeId0 | string | "JPEG" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds2.mediaTypeId1 | string | "PNG" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds2.mediaTypeId2 | string | "SVG" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.documentTypeId3 | string | "APP_CONTRACT" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds3.mediaTypeId0 | string | "PDF" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.documentTypeId4 | string | "ADDITIONAL_DETAILS" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds4.mediaTypeId0 | string | "PDF" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.documentTypeId5 | string | "CONFORMITY_APPROVAL_BUSINESS_APPS" |
|
backend.appmarketplace.uploadAppDocumentTypeIds.mediaTypeIds5.mediaTypeId0 | string | "PDF" |
|
backend.appmarketplace.deleteDocumentTypeIds.type0 | string | "APP_CONTRACT" |
|
backend.appmarketplace.deleteDocumentTypeIds.type1 | string | "ADDITIONAL_DETAILS" |
|
backend.appmarketplace.deleteDocumentTypeIds.type2 | string | "APP_TECHNICAL_INFORMATION" |
|
backend.appmarketplace.deleteDocumentTypeIds.type3 | string | "APP_LEADIMAGE" |
|
backend.appmarketplace.deleteDocumentTypeIds.type4 | string | "APP_IMAGE" |
|
backend.appmarketplace.deleteDocumentTypeIds.type5 | string | "CONFORMITY_APPROVAL_BUSINESS_APPS" |
|
backend.appmarketplace.submitAppDocumentTypeIds.type0 | string | "APP_LEADIMAGE" |
|
backend.appmarketplace.submitAppDocumentTypeIds.type1 | string | "APP_IMAGE" |
|
backend.appmarketplace.submitAppDocumentTypeIds.type2 | string | "CONFORMITY_APPROVAL_BUSINESS_APPS" |
|
backend.appmarketplace.activeAppDocumentTypeIds.type0 | string | "APP_IMAGE" |
|
backend.appmarketplace.activeAppDocumentTypeIds.type1 | string | "APP_TECHNICAL_INFORMATION" |
|
backend.appmarketplace.activeAppDocumentTypeIds.type2 | string | "APP_CONTRACT" |
|
backend.appmarketplace.activeAppDocumentTypeIds.type3 | string | "ADDITIONAL_DETAILS" |
|
backend.appmarketplace.deleteActiveAppDocumentTypeIds.type0 | string | "APP_IMAGE" |
|
backend.appmarketplace.deleteActiveAppDocumentTypeIds.type1 | string | "APP_TECHNICAL_INFORMATION" |
|
backend.appmarketplace.deleteActiveAppDocumentTypeIds.type2 | string | "APP_CONTRACT" |
|
backend.appmarketplace.deleteActiveAppDocumentTypeIds.type3 | string | "ADDITIONAL_DETAILS" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.documentTypeId0 | string | "APP_IMAGE" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.mediaTypeIds0.mediaTypeId0 | string | "JPEG" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.mediaTypeIds0.mediaTypeId1 | string | "PNG" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.documentTypeId1 | string | "APP_TECHNICAL_INFORMATION" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.mediaTypeIds1.mediaTypeId0 | string | "PDF" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.documentTypeId2 | string | "APP_CONTRACT" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.mediaTypeIds2.mediaTypeId0 | string | "PDF" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.documentTypeId3 | string | "ADDITIONAL_DETAILS" |
|
backend.appmarketplace.uploadActiveAppDocumentTypeIds.mediaTypeIds3.mediaTypeId0 | string | "PDF" |
|
backend.appmarketplace.notificationTypeIds.type0 | string | "APP_RELEASE_REQUEST" |
|
backend.appmarketplace.activeAppNotificationTypeIds.type0 | string | "APP_ROLE_ADDED" |
|
backend.appmarketplace.submitAppNotificationTypeIds.type0 | string | "APP_RELEASE_REQUEST" |
|
backend.appmarketplace.approveAppNotificationTypeIds.type0 | string | "APP_RELEASE_APPROVAL" |
|
backend.appmarketplace.appImageDocumentTypeIds.type0 | string | "APP_LEADIMAGE" |
|
backend.appmarketplace.appImageDocumentTypeIds.type1 | string | "APP_IMAGE" |
|
backend.appmarketplace.appImageDocumentTypeIds.type2 | string | "APP_CONTRACT" |
|
backend.appmarketplace.appImageDocumentTypeIds.type3 | string | "ADDITIONAL_DETAILS" |
|
backend.appmarketplace.appImageDocumentTypeIds.type4 | string | "APP_TECHNICAL_INFORMATION" |
|
backend.appmarketplace.appImageDocumentTypeIds.type5 | string | "CONFORMITY_APPROVAL_BUSINESS_APPS" |
|
backend.appmarketplace.offerStatusIds.status0 | string | "IN_REVIEW" |
|
backend.appmarketplace.offerStatusIds.status1 | string | "ACTIVE" |
|
backend.appmarketplace.swaggerEnabled | bool | false |
|
backend.appmarketplace.technicalUserProfileClient | string | "technical_roles_management" |
|
backend.appmarketplace.companyAdminRoles.role0 | string | "Company Admin" |
|
backend.portalmigrations.name | string | "portal-migrations" |
|
backend.portalmigrations.image.name | string | "docker.io/tractusx/portal-portal-migrations" |
|
backend.portalmigrations.image.portalmigrationstag | string | "v2.3.0" |
|
backend.portalmigrations.image.pullPolicy | string | "IfNotPresent" |
|
backend.portalmigrations.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.portalmigrations.resources | object | {"limits":{"cpu":"225m","memory":"350M"},"requests":{"cpu":"75m","memory":"350M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.portalmigrations.seeding.useInitial | bool | true |
Enables dynamic seeding of information related to the operator company: operator.bpn, operator.name, operator.city etc.; If set to true the data configured in the config map 'configmap-seeding-initialdata.yaml' will be taken to insert the initial data; |
backend.portalmigrations.seeding.seedTestData | object | {"useDefault":false,"useOwnConfigMap":{"configMap":"","filename":""}} |
Option to seed test data provided in a configMap |
backend.portalmigrations.seeding.seedTestData.useDefault | bool | false |
If set to true the data configured in the config map 'configmap-backend-seeding-testdata.yaml' will be taken to insert the default test data |
backend.portalmigrations.seeding.seedTestData.useOwnConfigMap.configMap | string | "" |
ConfigMap containing json files for the tables to seed, e.g. companies.test.json, addresses.test.json, etc. |
backend.portalmigrations.seeding.seedTestData.useOwnConfigMap.filename | string | "" |
Filename identifying the test data files e.g. for companies.test.json the value would be "test" |
backend.portalmigrations.logging.default | string | "Information" |
|
backend.portalmaintenance.name | string | "portal-maintenance" |
|
backend.portalmaintenance.image.name | string | "docker.io/tractusx/portal-maintenance-service" |
|
backend.portalmaintenance.image.portalmaintenancetag | string | "v2.3.0" |
|
backend.portalmaintenance.image.pullPolicy | string | "IfNotPresent" |
|
backend.portalmaintenance.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.portalmaintenance.resources | object | {"limits":{"cpu":"75m","memory":"200M"},"requests":{"cpu":"25m","memory":"200M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.portalmaintenance.processIdentity.processUserId | string | "d21d2e8a-fe35-483c-b2b8-4100ed7f0953" |
|
backend.portalmaintenance.batchDelete.days | int | 80 |
The maximum days a document can stay in state DELETED before it is removed from the database |
backend.portalmaintenance.logging.default | string | "Information" |
|
backend.notification.name | string | "notification-service" |
|
backend.notification.image.name | string | "docker.io/tractusx/portal-notification-service" |
|
backend.notification.image.notificationservicetag | string | "v2.3.0" |
|
backend.notification.image.pullPolicy | string | "IfNotPresent" |
|
backend.notification.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.notification.resources | object | {"limits":{"cpu":"225m","memory":"200M"},"requests":{"cpu":"75m","memory":"200M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.notification.basePath | string | "api/notification" |
|
backend.notification.healthChecks | object | {"startup":{"tags":[{"name":"HEALTHCHECKS__0__TAGS__1","value":"portaldb"}]}} |
Keycloak Healthcheck to be enabled for startupProbe; once the centralidp Keycloak instance is available, enable healthcheck by uncommenting. |
backend.notification.swaggerEnabled | bool | false |
|
backend.notification.logging.default | string | "Information" |
|
backend.services.name | string | "services-service" |
|
backend.services.image.name | string | "docker.io/tractusx/portal-services-service" |
|
backend.services.image.servicesservicetag | string | "v2.3.0" |
|
backend.services.image.pullPolicy | string | "IfNotPresent" |
|
backend.services.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.services.resources | object | {"limits":{"cpu":"225m","memory":"400M"},"requests":{"cpu":"75m","memory":"400M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.services.basePath | string | "api/services" |
|
backend.services.logging.default | string | "Information" |
|
backend.services.logging.offersLibrary | string | "Information" |
|
backend.services.healthChecks | object | {"startup":{"tags":[{"name":"HEALTHCHECKS__0__TAGS__1","value":"portaldb"}]}} |
Keycloak Healthcheck to be enabled for startupProbe; once the centralidp Keycloak instance is available, enable healthcheck by uncommenting. |
backend.services.serviceOverviewPath | string | "/serviceoverview" |
|
backend.services.subscriptionPath | string | "/servicesubscription" |
|
backend.services.detailPath | string | "/servicedetail" |
|
backend.services.catenaAdminRoles.role0 | string | "CX Admin" |
|
backend.services.serviceAccountRoles.role0 | string | "App Tech User" |
|
backend.services.salesManagerRoles.role0 | string | "Sales Manager" |
|
backend.services.serviceManagerRoles.role0 | string | "Service Manager" |
|
backend.services.subscriptionManagerRoles.role0 | string | "Service Manager" |
|
backend.services.subscriptionManagerRoles.role1 | string | "Sales Manager" |
|
backend.services.approveServiceUserRoles.role0 | string | "Sales Manager" |
|
backend.services.approveServiceUserRoles.role1 | string | "Service Manager" |
|
backend.services.activationUserRoles.role0 | string | "Sales Manager" |
|
backend.services.activationUserRoles.role1 | string | "Service Manager" |
|
backend.services.ITAdminRoles.role0 | string | "IT Admin" |
|
backend.services.uploadServiceDocumentTypeIds.documentTypeId0 | string | "ADDITIONAL_DETAILS" |
|
backend.services.uploadServiceDocumentTypeIds.mediaTypeIds0.mediaTypeId0 | string | "PDF" |
|
backend.services.uploadServiceDocumentTypeIds.documentTypeId1 | string | "SERVICE_LEADIMAGE" |
|
backend.services.uploadServiceDocumentTypeIds.mediaTypeIds1.mediaTypeId0 | string | "JPEG" |
|
backend.services.uploadServiceDocumentTypeIds.mediaTypeIds1.mediaTypeId1 | string | "PNG" |
|
backend.services.uploadServiceDocumentTypeIds.mediaTypeIds1.mediaTypeId2 | string | "SVG" |
|
backend.services.uploadServiceDocumentTypeIds.documentTypeId2 | string | "CONFORMITY_APPROVAL_SERVICES" |
|
backend.services.uploadServiceDocumentTypeIds.mediaTypeIds2.mediaTypeId0 | string | "PDF" |
|
backend.services.submitServiceNotificationTypeIds.type0 | string | "SERVICE_RELEASE_REQUEST" |
|
backend.services.approveServiceNotificationTypeIds.type0 | string | "SERVICE_RELEASE_APPROVAL" |
|
backend.services.swaggerEnabled | bool | false |
|
backend.services.serviceImageDocumentTypeIds.type0 | string | "ADDITIONAL_DETAILS" |
|
backend.services.serviceImageDocumentTypeIds.type1 | string | "CONFORMITY_APPROVAL_SERVICES" |
|
backend.services.serviceImageDocumentTypeIds.type2 | string | "SERVICE_LEADIMAGE" |
|
backend.services.offerStatusIds.status0 | string | "IN_REVIEW" |
|
backend.services.offerStatusIds.status1 | string | "ACTIVE" |
|
backend.services.deleteDocumentTypeIds.type0 | string | "SERVICE_LEADIMAGE" |
|
backend.services.deleteDocumentTypeIds.type1 | string | "ADDITIONAL_DETAILS" |
|
backend.services.deleteDocumentTypeIds.type2 | string | "CONFORMITY_APPROVAL_SERVICES" |
|
backend.services.technicalUserProfileClient | string | "technical_roles_management" |
|
backend.services.companyAdminRoles.role0 | string | "Company Admin" |
|
backend.provisioningmigrations.name | string | "provisioning-migrations" |
|
backend.provisioningmigrations.image.name | string | "docker.io/tractusx/portal-provisioning-migrations" |
|
backend.provisioningmigrations.image.provisioningmigrationstag | string | "v2.3.0" |
|
backend.provisioningmigrations.image.pullPolicy | string | "IfNotPresent" |
|
backend.provisioningmigrations.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.provisioningmigrations.resources | object | {"limits":{"cpu":"75m","memory":"200M"},"requests":{"cpu":"25m","memory":"200M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.provisioningmigrations.logging.default | string | "Information" |
|
backend.processesworker.name | string | "processes-worker" |
|
backend.processesworker.image.name | string | "docker.io/tractusx/portal-processes-worker" |
|
backend.processesworker.image.processesworkertag | string | "v2.3.0" |
|
backend.processesworker.image.pullPolicy | string | "IfNotPresent" |
|
backend.processesworker.image.pullSecrets | list | [] |
Pull secrets for private docker registry |
backend.processesworker.resources | object | {"limits":{"cpu":"225m","memory":"600M"},"requests":{"cpu":"75m","memory":"600M"}} |
We recommend to review the default resource limits as this should a conscious choice. |
backend.processesworker.logging.default | string | "Information" |
|
backend.processesworker.logging.processesLibrary | string | "Information" |
|
backend.processesworker.logging.bpdmLibrary | string | "Information" |
|
backend.processesworker.logging.clearinghouseLibrary | string | "Information" |
|
backend.processesworker.logging.custodianLibrary | string | "Information" |
|
backend.processesworker.logging.sdfactoryLibrary | string | "Information" |
|
backend.processesworker.logging.offerProvider | string | "Information" |
|
backend.processesworker.applicationActivation.applicationApprovalInitialRoles.portal.role0 | string | "Company Admin" |
|
backend.processesworker.applicationActivation.applicationApprovalInitialRoles.registration.role0 | string | "Company Admin" |
|
backend.processesworker.applicationActivation.clientToRemoveRolesOnActivation.client0 | string | "Cl1-CX-Registration" |
|
backend.processesworker.applicationActivation.welcomeNotificationTypeIds.type0 | string | "WELCOME" |
|
backend.processesworker.applicationActivation.welcomeNotificationTypeIds.type1 | string | "WELCOME_USE_CASES" |
|
backend.processesworker.applicationActivation.welcomeNotificationTypeIds.type2 | string | "WELCOME_SERVICE_PROVIDER" |
|
backend.processesworker.applicationActivation.welcomeNotificationTypeIds.type3 | string | "WELCOME_CONNECTOR_REGISTRATION" |
|
backend.processesworker.applicationActivation.welcomeNotificationTypeIds.type4 | string | "WELCOME_APP_MARKETPLACE" |
|
backend.processesworker.applicationActivation.loginTheme | string | "catenax-shared-portal" |
|
backend.processesworker.bpdm.scope | string | "openid" |
|
backend.processesworker.bpdm.grantType | string | "client_credentials" |
|
backend.processesworker.bpdm.clientId | string | "bpdm-client-id" |
Provide bpdm client-id from CX IAM centralidp. |
backend.processesworker.bpdm.clientSecret | string | "" |
Client-secret for bpdm client-id. Secret-key 'bpdm-client-secret'. |
backend.processesworker.bpdm.startSharingStateAsReady | bool | true |
When set to true the call to set sharing state ready is skipped. This means that BPDM needs to set the state manually. When set to false, the process worker will trigger the set sharing state ready of BPDM, which means no manual interference on BPDM site is needed. This value should be aligned with the value set in the BPDM helm chart creation -> '.fromSharingMember.starts-as-ready'; if the values are not aligned the BPDM application checklist will fail. |
backend.processesworker.custodian.membershipErrorMessage | string | "Credential of type MembershipCredential is already exists" |
|
backend.processesworker.custodian.scope | string | "openid" |
|
backend.processesworker.custodian.grantType | string | "client_credentials" |
|
backend.processesworker.custodian.clientId | string | "custodian-client-id" |
Provide custodian client-id from CX IAM centralidp. |
backend.processesworker.custodian.clientSecret | string | "" |
Client-secret for custodian client-id. Secret-key 'custodian-client-secret'. |
backend.processesworker.sdfactory.selfdescriptionPath | string | "/api/rel3/selfdescription" |
|
backend.processesworker.sdfactory.scope | string | "openid" |
|
backend.processesworker.sdfactory.grantType | string | "client_credentials" |
|
backend.processesworker.sdfactory.clientId | string | "sdfactory-client-id" |
Provide sdfactory client-id from CX IAM centralidp. |
backend.processesworker.sdfactory.clientSecret | string | "" |
Client-secret for sdfactory client-id. Secret-key 'sdfactory-client-secret'. |
backend.processesworker.clearinghouse.scope | string | "openid" |
|
backend.processesworker.clearinghouse.grantType | string | "client_credentials" |
|
backend.processesworker.clearinghouse.clientId | string | "clearinghouse-client-id" |
Provide clearinghouse client-id from clearinghouse IAM. |
backend.processesworker.clearinghouse.clientSecret | string | "" |
Client-secret for clearinghouse client-id. Secret-key 'clearinghouse-client-secret'. |
backend.processesworker.clearinghouse.callbackPath | string | "/api/administration/registration/clearinghouse" |
|
backend.processesworker.clearinghouse.retriggerEndClearinghouseIntervalInDays | int | 30 |
Defines the days a END_CLEARINGHOUSE process can stay in state TODO before the process is retriggered |
backend.processesworker.processes.lockExpirySeconds | string | "300" |
|
backend.processesworker.offerSubscriptionProcess.serviceAccountRoles.role0 | string | "Digital Twin Management" |
|
backend.processesworker.offerSubscriptionProcess.serviceManagerRoles.role0 | string | "App Manager" |
|
backend.processesworker.offerSubscriptionProcess.itAdminRoles.role0 | string | "IT Admin" |
|
backend.processesworker.offerprovider.serviceManagerRoles.role0 | string | "App Manager" |
|
backend.processesworker.offerprovider.scope | string | "openid" |
|
backend.processesworker.offerprovider.grantType | string | "client_credentials" |
|
backend.processesworker.offerprovider.clientId | string | "offerprovider-client-id" |
Provide offerprovider client-id from CX IAM centralidp. |
backend.processesworker.offerprovider.clientSecret | string | "" |
Client-secret for offer provider client-id. Secret-key 'offerprovider-client-secret'. |
backend.processesworker.processIdentity.processUserId | string | "d21d2e8a-fe35-483c-b2b8-4100ed7f0953" |
|
backend.processesworker.onboardingServiceProvider.encryptionConfigIndex | int | 1 |
|
backend.processesworker.onboardingServiceProvider.encryptionConfigs.index0.index | int | 0 |
|
backend.processesworker.onboardingServiceProvider.encryptionConfigs.index0.cipherMode | string | "ECB" |
|
backend.processesworker.onboardingServiceProvider.encryptionConfigs.index0.paddingMode | string | "PKCS7" |
|
backend.processesworker.onboardingServiceProvider.encryptionConfigs.index0.encryptionKey | string | "" |
EncryptionKey for onboardingserviceprovider. Secret-key 'onboardingserviceprovider-encryption-key0'. Expected format is 256 bit (64 digits) hex. When upgrading from v2.0.0-RC1 please read document portal-upgrade-details.md |
backend.processesworker.onboardingServiceProvider.encryptionConfigs.index1.index | int | 1 |
|
backend.processesworker.onboardingServiceProvider.encryptionConfigs.index1.cipherMode | string | "CBC" |
|
backend.processesworker.onboardingServiceProvider.encryptionConfigs.index1.paddingMode | string | "PKCS7" |
|
backend.processesworker.onboardingServiceProvider.encryptionConfigs.index1.encryptionKey | string | "" |
EncryptionKey for onboardingserviceprovider. Secret-key 'onboardingserviceprovider-encryption-key1'. Expected format is 256 bit (64 digits) hex. When upgrading from v2.0.0-RC1 please read document portal-upgrade-details.md |
backend.processesworker.networkRegistration.loginDocumentPath | string | "/documentation/?path=docs%2F09.+Others%28s%29%2F01.+Login.md" |
|
backend.processesworker.networkRegistration.externalRegistrationPath | string | "/consentOsp" |
|
backend.processesworker.networkRegistration.closeApplicationPath | string | "/decline" |
The logic to decline an application is not yet implemented in the backend - this will currently lead to a 404 page when clicking on the link in the mail |
backend.processesworker.dim.clientId | string | "dim-client-id" |
Provide dim client-id from CX IAM centralidp. |
backend.processesworker.dim.clientSecret | string | "" |
Client-secret for dim client-id. Secret-key 'dim-client-secret'. |
backend.processesworker.dim.grantType | string | "client_credentials" |
|
backend.processesworker.dim.scope | string | "openid" |
|
backend.processesworker.dim.baseAddress | string | "https://dim.example.org" |
Base address of the DIM Middle Layer |
backend.processesworker.dim.universalResolverAddress | string | "https://resolver.example.org/did" |
Url of a public available universal resolver to validate the did and did document |
backend.processesworker.dim.didDocumentPath | string | "/api/administration/staticdata/did" |
path where the did document will be hosted |
backend.processesworker.dim.maxValidationTimeInDays | int | 7 |
|
backend.processesworker.dim.encryptionConfigIndex | int | 0 |
|
backend.processesworker.dim.encryptionConfigs.index0.index | int | 0 |
|
backend.processesworker.dim.encryptionConfigs.index0.cipherMode | string | "CBC" |
|
backend.processesworker.dim.encryptionConfigs.index0.paddingMode | string | "PKCS7" |
|
backend.processesworker.dim.encryptionConfigs.index0.encryptionKey | string | "" |
EncryptionKey for dim wallet creation. Secret-key 'dim-encryption-key0'. Expected format is 256 bit (64 digits) hex. |
backend.processesworker.issuerComponent.clientId | string | "issuercomponent-client-id" |
Provide dim client-id from CX IAM centralidp. |
backend.processesworker.issuerComponent.clientSecret | string | "" |
Client-secret for dim client-id. Secret-key 'issuercomponent-client-secret'. |
backend.processesworker.issuerComponent.grantType | string | "client_credentials" |
|
backend.processesworker.issuerComponent.scope | string | "openid" |
|
backend.processesworker.bpnDidResolver.apiKey | string | "" |
ApiKey for management endpoint of the bpnDidResolver. Secret-key 'bpndidresolver-api-key'. |
backend.processesworker.invitation.invitedUserInitialRoles.role0 | string | "Company Admin" |
|
backend.processesworker.invitation.initialLoginTheme | string | "catenax-shared" |
|
backend.processesworker.invitation.closeApplicationPath | string | "/decline" |
|
backend.processesworker.invitation.encryptionConfigIndex | int | 0 |
|
backend.processesworker.invitation.encryptionConfigs.index0.index | int | 0 |
|
backend.processesworker.invitation.encryptionConfigs.index0.cipherMode | string | "CBC" |
|
backend.processesworker.invitation.encryptionConfigs.index0.paddingMode | string | "PKCS7" |
|
backend.processesworker.invitation.encryptionConfigs.index0.encryptionKey | string | "" |
EncryptionKey to encrypt the company-invitation client-secret. Secret-key 'invitation-encryption-key0'. Expected format is 256 bit (64 digits) hex. |
backend.processesworker.mailing.encryptionConfigIndex | int | 0 |
|
backend.processesworker.mailing.encryptionConfigs.index0.index | int | 0 |
|
backend.processesworker.mailing.encryptionConfigs.index0.cipherMode | string | "CBC" |
|
backend.processesworker.mailing.encryptionConfigs.index0.paddingMode | string | "PKCS7" |
|
backend.processesworker.mailing.encryptionConfigs.index0.encryptionKey | string | "" |
EncryptionKey to encrypt the parameters of mailing processes. Secret-key 'mailing-encryption-key0'. Expected format is 256 bit (64 digits) hex. |
backend.placeholder | string | "empty" |
|
postgresql.enabled | bool | true |
PostgreSQL chart configuration Switch to enable or disable the PostgreSQL helm chart |
postgresql.image | object | {"tag":"15-debian-11"} |
Setting image tag to major to get latest minor updates |
postgresql.commonLabels."app.kubernetes.io/version" | string | "15" |
|
postgresql.auth.database | string | "postgres" |
Database name |
postgresql.auth.port | int | 5432 |
Database port number |
postgresql.auth.existingSecret | string | "portal-postgres" |
Secret containing the passwords for root usernames postgres and non-root usernames repl_user, portal and provisioning. |
postgresql.auth.password | string | "" |
Password for the root username 'postgres'. Secret-key 'postgres-password'. |
postgresql.auth.replicationPassword | string | "" |
Password for the non-root username 'repl_user'. Secret-key 'replication-password'. |
postgresql.auth.portalUser | string | "portal" |
Non-root username for portal. |
postgresql.auth.provisioningUser | string | "provisioning" |
Non-root username for provisioning. |
postgresql.auth.portalPassword | string | "" |
Password for the non-root username 'portal'. Secret-key 'portal-password'. |
postgresql.auth.provisioningPassword | string | "" |
Password for the non-root username 'provisioning'. Secret-key 'provisioning-password'. |
postgresql.architecture | string | "replication" |
|
postgresql.audit.pgAuditLog | string | "write, ddl" |
|
postgresql.audit.logLinePrefix | string | "%m %u %d " |
|
postgresql.primary.extendedConfiguration | string | "" |
Extended PostgreSQL Primary configuration (increase of max_connections recommended - default is 100) |
postgresql.primary.initdb.scriptsConfigMap | string | "{{ .Release.Name }}-portal-cm-postgres" |
|
postgresql.primary.extraEnvVars[0].name | string | "PORTAL_PASSWORD" |
|
postgresql.primary.extraEnvVars[0].valueFrom.secretKeyRef.name | string | "{{ .Values.auth.existingSecret }}" |
|
postgresql.primary.extraEnvVars[0].valueFrom.secretKeyRef.key | string | "portal-password" |
|
postgresql.primary.extraEnvVars[1].name | string | "PROVISIONING_PASSWORD" |
|
postgresql.primary.extraEnvVars[1].valueFrom.secretKeyRef.name | string | "{{ .Values.auth.existingSecret }}" |
|
postgresql.primary.extraEnvVars[1].valueFrom.secretKeyRef.key | string | "provisioning-password" |
|
postgresql.readReplicas.extendedConfiguration | string | "" |
Extended PostgreSQL read only replicas configuration (increase of max_connections recommended - default is 100) |
externalDatabase.host | string | "portal-backend-postgresql-external-db" |
External PostgreSQL configuration IMPORTANT: init scripts (01-init-db-user.sh and 02-init-db.sql) available in templates/configmap-backend-postgres-init.yaml need to be executed beforehand. Database host |
externalDatabase.database | string | "postgres" |
Database name |
externalDatabase.port | int | 5432 |
Database port number |
externalDatabase.secret | string | "portal-postgres-external-db" |
Secret containing the passwords non-root usernames portal and provisioning. |
externalDatabase.portalUser | string | "portal" |
Non-root username for portal. |
externalDatabase.provisioningUser | string | "provisioning" |
Non-root username for provisioning. |
externalDatabase.portalPassword | string | "" |
Password for the non-root username 'portal'. Secret-key 'portal-password'. |
externalDatabase.provisioningPassword | string | "" |
Password for the non-root username 'provisioning'. Secret-key 'provisioning-password'. |
portContainer | int | 8080 |
|
portService | int | 8080 |
|
replicaCount | int | 3 |
|
nodeSelector | object | {} |
Node labels for pod assignment |
tolerations | list | [] |
Tolerations for pod assignment |
affinity.podAntiAffinity | object | {"preferredDuringSchedulingIgnoredDuringExecution":[{"podAffinityTerm":{"labelSelector":{"matchExpressions":[{"key":"app.kubernetes.io/name","operator":"DoesNotExist"}]},"topologyKey":"kubernetes.io/hostname"},"weight":100}]} |
Following Catena-X Helm Best Practices, reference. |
updateStrategy.type | string | "RollingUpdate" |
Update strategy type, rolling update configuration parameters, reference. |
updateStrategy.rollingUpdate.maxSurge | int | 1 |
|
updateStrategy.rollingUpdate.maxUnavailable | int | 0 |
|
startupProbe | object | {"failureThreshold":30,"initialDelaySeconds":10,"periodSeconds":10,"successThreshold":1,"timeoutSeconds":1} |
Following Catena-X Helm Best Practices, reference. |
livenessProbe.failureThreshold | int | 3 |
|
livenessProbe.initialDelaySeconds | int | 10 |
|
livenessProbe.periodSeconds | int | 10 |
|
livenessProbe.successThreshold | int | 1 |
|
livenessProbe.timeoutSeconds | int | 10 |
|
readinessProbe.failureThreshold | int | 3 |
|
readinessProbe.initialDelaySeconds | int | 10 |
|
readinessProbe.periodSeconds | int | 10 |
|
readinessProbe.successThreshold | int | 1 |
|
readinessProbe.timeoutSeconds | int | 1 |
Autogenerated with helm docs