Skip to content

Commit

Permalink
add values for ory idp to management-portal chart 1.1.2 --> 1.1.3
Browse files Browse the repository at this point in the history
  • Loading branch information
Bdegraaf1234 committed Feb 12, 2024
1 parent e4fd578 commit 76806c2
Show file tree
Hide file tree
Showing 8 changed files with 400 additions and 378 deletions.
8 changes: 4 additions & 4 deletions charts/management-portal/Chart.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ apiVersion: v2
appVersion: "2.0.0"
description: A Helm chart for RADAR-Base Management Portal to manage projects and participants throughout RADAR-base.
name: management-portal
version: 1.1.2
version: 1.1.3
icon: "http://radar-base.org/wp-content/uploads/2022/09/Logo_RADAR-Base-RGB.png"
sources:
- https://github.com/RADAR-base/radar-helm-charts/tree/main/charts/management-portal
Expand All @@ -19,9 +19,9 @@ maintainers:
- email: [email protected]
name: Keyvan Hedayati
url: https://www.thehyve.nl
- email: joris@thehyve.nl
name: Joris Borgdorff
url: https://www.thehyve.nl/experts/joris-borgdorff
- email: bastiaan@thehyve.nl
name: Bastiaan de Graaf
url: https://www.thehyve.nl/experts/bastiaan-de-graaf
- email: [email protected]
name: Nivethika Mahasivam
url: https://www.thehyve.nl/experts/nivethika-mahasivam
10 changes: 7 additions & 3 deletions charts/management-portal/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# management-portal
[![Artifact HUB](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/management-portal)](https://artifacthub.io/packages/helm/radar-base/management-portal)

![Version: 1.1.2](https://img.shields.io/badge/Version-1.1.2-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 2.0.0](https://img.shields.io/badge/AppVersion-2.0.0-informational?style=flat-square)
![Version: 1.1.3](https://img.shields.io/badge/Version-1.1.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 2.0.0](https://img.shields.io/badge/AppVersion-2.0.0-informational?style=flat-square)

A Helm chart for RADAR-Base Management Portal to manage projects and participants throughout RADAR-base.

Expand All @@ -14,7 +14,7 @@ A Helm chart for RADAR-Base Management Portal to manage projects and participant
| Name | Email | Url |
| ---- | ------ | --- |
| Keyvan Hedayati | <[email protected]> | <https://www.thehyve.nl> |
| Joris Borgdorff | <joris@thehyve.nl> | <https://www.thehyve.nl/experts/joris-borgdorff> |
| Bastiaan de Graaf | <bastiaan@thehyve.nl> | <https://www.thehyve.nl/experts/bastiaan-de-graaf> |
| Nivethika Mahasivam | <[email protected]> | <https://www.thehyve.nl/experts/nivethika-mahasivam> |

## Source Code
Expand Down Expand Up @@ -88,10 +88,14 @@ A Helm chart for RADAR-Base Management Portal to manage projects and participant
| postgres.ssl.keystore | string | `""` | base64 encoded certificate needed to connect to the PostgreSQL With helmfile, this can be set in a production.yaml.gotmpl file by setting keystore: {{ readFile "certificate.pem" | b64enc | quote }} or with SOPS keystore: {{ exec "sops" (list "-d" "certificate.pem") | b64enc | quote }} |
| server_name | string | `"localhost"` | domain name of the server |
| catalogue_server | string | `"catalog-server"` | Hostname of the catalogue-server |
| managementportal.catalogue_server_enable_auto_import | string | `"false"` | set to true, if automatic source-type import from catalogue server should be enabled |
| identity_server.admin_email | string | `"[email protected]"` | The admin email to link to the admin service account. This account should only be used to set up admin-users |
| identity_server.server_url | string | `"https://my.example-domain.net/kratos"` | The publicly accessible server URL for the IDP |
| identity_server.server_admin_url | string | `"http://kratos-admin"` | The admin server URL for the IDP. Only needs to be accessible from inside the cluster where the managementportal resides |
| managementportal.catalogue_server_enable_auto_import | bool | `false` | set to true, if automatic source-type import from catalogue server should be enabled |
| managementportal.common_privacy_policy_url | string | `"http://info.thehyve.nl/radar-cns-privacy-policy"` | Override with a publicly resolvable url of the privacy-policy url for your set-up. This can be overridden on a project basis as well. |
| managementportal.oauth_checking_key_aliases_0 | string | `"radarbase-managementportal-ec"` | Keystore alias to sign JWT tokens from Management Portal |
| managementportal.oauth_checking_key_aliases_1 | string | `"selfsigned"` | Keystore alias to sign JWT tokens from Management Portal |
| managementportal.oauth_require_aal2 | bool | `true` | Whether or not to require AAL2 level authentication (i.e. MFA) |
| managementportal.frontend_client_secret | string | `"xxx"` | OAuth2 Client secret of the Management Portal frontend application |
| managementportal.common_admin_password | string | `"xxx"` | Admin password of the default admin user created by the system |
| smtp.enabled | bool | `false` | set to true, if SMTP server should be enabled. Required to be true for production setup |
Expand Down
6 changes: 6 additions & 0 deletions charts/management-portal/templates/deployment.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -84,6 +84,12 @@ spec:
value: "{{ .Values.managementportal.catalogue_server_enable_auto_import }}"
- name: MANAGEMENTPORTAL_CATALOGUE_SERVER_SERVER_URL
value: http://{{ .Values.catalogue_server }}:9010/source-types
- name: MANAGEMENTPORTAL_IDENTITY_SERVER_ADMIN_EMAIL
value: {{ .Values.identity_server.admin_email }}
- name: MANAGEMENTPORTAL_IDENTITY_SERVER_SERVER_URL
value: {{ .Values.identity_server.server_url }}
- name: MANAGEMENTPORTAL_IDENTITY_SERVER_SERVER_ADMIN_URL
value: {{ .Values.identity_server.server_admin_url }}
- name: MANAGEMENTPORTAL_COMMON_ADMIN_PASSWORD
valueFrom:
secretKeyRef:
Expand Down
14 changes: 13 additions & 1 deletion charts/management-portal/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -289,15 +289,27 @@ postgres:
server_name: localhost
# -- Hostname of the catalogue-server
catalogue_server: catalog-server

# Settings pertaining to the identity provider (IDP)
identity_server:
# -- The admin email to link to the admin service account. This account should only be used to set up admin-users
admin_email: [email protected]
# -- The publicly accessible server URL for the IDP
server_url: https://my.example-domain.net/kratos
# -- The admin server URL for the IDP. Only needs to be accessible from inside the cluster where the managementportal resides
server_admin_url: http://kratos-admin

managementportal:
# -- set to true, if automatic source-type import from catalogue server should be enabled
catalogue_server_enable_auto_import: "false"
catalogue_server_enable_auto_import: false
# -- Override with a publicly resolvable url of the privacy-policy url for your set-up. This can be overridden on a project basis as well.
common_privacy_policy_url: http://info.thehyve.nl/radar-cns-privacy-policy
# -- Keystore alias to sign JWT tokens from Management Portal
oauth_checking_key_aliases_0: radarbase-managementportal-ec
# -- Keystore alias to sign JWT tokens from Management Portal
oauth_checking_key_aliases_1: selfsigned
# -- Whether or not to require AAL2 level authentication (i.e. MFA)
oauth_require_aal2: true
# -- OAuth2 Client secret of the Management Portal frontend application
frontend_client_secret: xxx
# -- Admin password of the default admin user created by the system
Expand Down
54 changes: 27 additions & 27 deletions charts/radar-rest-sources-authorizer/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,27 +1,27 @@
apiVersion: v2
appVersion: "4.4.0"
description: A Helm chart for the front-end application of RADAR-base Rest Sources Authorizer which is a portal to authorize the Fitbit connector to read data from Fitbit accounts.
name: radar-rest-sources-authorizer
version: 1.1.3
icon: "http://radar-base.org/wp-content/uploads/2022/09/Logo_RADAR-Base-RGB.png"
sources:
- https://github.com/RADAR-base/radar-helm-charts/tree/main/charts/radar-rest-sources-authorizer
- https://github.com/RADAR-base/RADAR-Rest-Source-Auth
keywords:
- radar-base
- remote-trial
annotations:
artifacthub.io/license: Apache-2.0
deprecated: false
type: application
home: "https://radar-base.org"
maintainers:
- email: [email protected]
name: Keyvan Hedayati
url: https://www.thehyve.nl
- email: [email protected]
name: Joris Borgdorff
url: https://www.thehyve.nl/experts/joris-borgdorff
- email: [email protected]
name: Nivethika Mahasivam
url: https://www.thehyve.nl/experts/nivethika-mahasivam
apiVersion: v2

Check failure on line 1 in charts/radar-rest-sources-authorizer/Chart.yaml

View workflow job for this annotation

GitHub Actions / lint

[new-lines] wrong new line character: expected \n
appVersion: "4.4.0"
description: A Helm chart for the front-end application of RADAR-base Rest Sources Authorizer which is a portal to authorize the Fitbit connector to read data from Fitbit accounts.
name: radar-rest-sources-authorizer
version: 1.1.3
icon: "http://radar-base.org/wp-content/uploads/2022/09/Logo_RADAR-Base-RGB.png"
sources:
- https://github.com/RADAR-base/radar-helm-charts/tree/main/charts/radar-rest-sources-authorizer
- https://github.com/RADAR-base/RADAR-Rest-Source-Auth
keywords:
- radar-base
- remote-trial
annotations:
artifacthub.io/license: Apache-2.0
deprecated: false
type: application
home: "https://radar-base.org"
maintainers:
- email: [email protected]
name: Keyvan Hedayati
url: https://www.thehyve.nl
- email: [email protected]
name: Joris Borgdorff
url: https://www.thehyve.nl/experts/joris-borgdorff
- email: [email protected]
name: Nivethika Mahasivam
url: https://www.thehyve.nl/experts/nivethika-mahasivam
148 changes: 74 additions & 74 deletions charts/radar-rest-sources-authorizer/README.md
Original file line number Diff line number Diff line change
@@ -1,74 +1,74 @@


# radar-rest-sources-authorizer
[![Artifact HUB](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/radar-rest-sources-authorizer)](https://artifacthub.io/packages/helm/radar-base/radar-rest-sources-authorizer)

![Version: 1.1.3](https://img.shields.io/badge/Version-1.1.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 4.4.0](https://img.shields.io/badge/AppVersion-4.4.0-informational?style=flat-square)

A Helm chart for the front-end application of RADAR-base Rest Sources Authorizer which is a portal to authorize the Fitbit connector to read data from Fitbit accounts.

**Homepage:** <https://radar-base.org>

## Maintainers

| Name | Email | Url |
| ---- | ------ | --- |
| Keyvan Hedayati | <[email protected]> | <https://www.thehyve.nl> |
| Joris Borgdorff | <[email protected]> | <https://www.thehyve.nl/experts/joris-borgdorff> |
| Nivethika Mahasivam | <[email protected]> | <https://www.thehyve.nl/experts/nivethika-mahasivam> |

## Source Code

* <https://github.com/RADAR-base/radar-helm-charts/tree/main/charts/radar-rest-sources-authorizer>
* <https://github.com/RADAR-base/RADAR-Rest-Source-Auth>

## Prerequisites
* Kubernetes 1.22+
* Kubectl 1.22+
* Helm 3.1.0+

## Values

| Key | Type | Default | Description |
|-----|------|---------|-------------|
| replicaCount | int | `2` | Number of radar-rest-sources-authorizer replicas to deploy |
| image.repository | string | `"radarbase/radar-rest-source-authorizer"` | radar-rest-sources-authorizer image repository |
| image.tag | string | `"4.4.0"` | radar-rest-sources-authorizer image tag (immutable tags are recommended) Overrides the image tag whose default is the chart appVersion. |
| image.pullPolicy | string | `"IfNotPresent"` | radar-rest-sources-authorizer image pull policy |
| imagePullSecrets | list | `[]` | Docker registry secret names as an array |
| nameOverride | string | `""` | String to partially override radar-rest-sources-authorizer.fullname template with a string (will prepend the release name) |
| fullnameOverride | string | `""` | String to fully override radar-rest-sources-authorizer.fullname template with a string |
| podSecurityContext | object | `{}` | Configure radar-rest-sources-authorizer pods' Security Context |
| securityContext | object | `{}` | Configure radar-rest-sources-authorizer containers' Security Context |
| service.type | string | `"ClusterIP"` | Kubernetes Service type |
| service.port | int | `8080` | radar-rest-sources-authorizer port |
| ingress.enabled | bool | `true` | Enable ingress controller resource |
| ingress.annotations | object | check values.yaml | Annotations that define default ingress class, certificate issuer |
| ingress.path | string | `"/rest-sources/authorizer"` | Path within the url structure |
| ingress.pathType | string | `"ImplementationSpecific"` | Ingress Path type |
| ingress.ingressClassName | string | `"nginx"` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) |
| ingress.hosts | list | `["localhost"]` | Hosts to accept requests from |
| ingress.tls.secretName | string | `"radar-base-tls-radar-rest-sources-authorizer"` | TLS Secret Name |
| resources.requests | object | `{"cpu":"100m","memory":"128Mi"}` | CPU/Memory resource requests |
| nodeSelector | object | `{}` | Node labels for pod assignment |
| tolerations | list | `[]` | Toleration labels for pod assignment |
| affinity | object | `{}` | Affinity labels for pod assignment |
| extraEnvVars | list | `[]` | Extra environment variables |
| customLivenessProbe | object | `{}` | Custom livenessProbe that overrides the default one |
| livenessProbe.enabled | bool | `true` | Enable livenessProbe |
| livenessProbe.initialDelaySeconds | int | `5` | Initial delay seconds for livenessProbe |
| livenessProbe.periodSeconds | int | `30` | Period seconds for livenessProbe |
| livenessProbe.timeoutSeconds | int | `3` | Timeout seconds for livenessProbe |
| livenessProbe.successThreshold | int | `1` | Success threshold for livenessProbe |
| livenessProbe.failureThreshold | int | `3` | Failure threshold for livenessProbe |
| customReadinessProbe | object | `{}` | Custom readinessProbe that overrides the default one |
| readinessProbe.enabled | bool | `true` | Enable readinessProbe |
| readinessProbe.initialDelaySeconds | int | `5` | Initial delay seconds for readinessProbe |
| readinessProbe.periodSeconds | int | `10` | Period seconds for readinessProbe |
| readinessProbe.timeoutSeconds | int | `3` | Timeout seconds for readinessProbe |
| readinessProbe.successThreshold | int | `1` | Success threshold for readinessProbe |
| readinessProbe.failureThreshold | int | `3` | Failure threshold for readinessProbe |
| networkpolicy | object | check `values.yaml` | Network policy defines who can access this application and who this applications has access to |
| clientId | string | `"radar_rest_sources_authorizer"` | OAuth2 client id of the application registered in Management Portal. It is assumed that this is a public client with empty client secret. |
| serverName | string | `"localhost"` | Domain name of the server |
| authUrl | string | `"localhost/managementportal/oauth"` | Authorization URL of the IDP |


# radar-rest-sources-authorizer
[![Artifact HUB](https://img.shields.io/endpoint?url=https://artifacthub.io/badge/repository/radar-rest-sources-authorizer)](https://artifacthub.io/packages/helm/radar-base/radar-rest-sources-authorizer)

![Version: 1.1.3](https://img.shields.io/badge/Version-1.1.3-informational?style=flat-square) ![Type: application](https://img.shields.io/badge/Type-application-informational?style=flat-square) ![AppVersion: 4.4.0](https://img.shields.io/badge/AppVersion-4.4.0-informational?style=flat-square)

A Helm chart for the front-end application of RADAR-base Rest Sources Authorizer which is a portal to authorize the Fitbit connector to read data from Fitbit accounts.

**Homepage:** <https://radar-base.org>

## Maintainers

| Name | Email | Url |
| ---- | ------ | --- |
| Keyvan Hedayati | <[email protected]> | <https://www.thehyve.nl> |
| Joris Borgdorff | <[email protected]> | <https://www.thehyve.nl/experts/joris-borgdorff> |
| Nivethika Mahasivam | <[email protected]> | <https://www.thehyve.nl/experts/nivethika-mahasivam> |

## Source Code

* <https://github.com/RADAR-base/radar-helm-charts/tree/main/charts/radar-rest-sources-authorizer>
* <https://github.com/RADAR-base/RADAR-Rest-Source-Auth>

## Prerequisites
* Kubernetes 1.22+
* Kubectl 1.22+
* Helm 3.1.0+

## Values

| Key | Type | Default | Description |
|-----|------|---------|-------------|
| replicaCount | int | `2` | Number of radar-rest-sources-authorizer replicas to deploy |
| image.repository | string | `"radarbase/radar-rest-source-authorizer"` | radar-rest-sources-authorizer image repository |
| image.tag | string | `"4.4.0"` | radar-rest-sources-authorizer image tag (immutable tags are recommended) Overrides the image tag whose default is the chart appVersion. |
| image.pullPolicy | string | `"IfNotPresent"` | radar-rest-sources-authorizer image pull policy |
| imagePullSecrets | list | `[]` | Docker registry secret names as an array |
| nameOverride | string | `""` | String to partially override radar-rest-sources-authorizer.fullname template with a string (will prepend the release name) |
| fullnameOverride | string | `""` | String to fully override radar-rest-sources-authorizer.fullname template with a string |
| podSecurityContext | object | `{}` | Configure radar-rest-sources-authorizer pods' Security Context |
| securityContext | object | `{}` | Configure radar-rest-sources-authorizer containers' Security Context |
| service.type | string | `"ClusterIP"` | Kubernetes Service type |
| service.port | int | `8080` | radar-rest-sources-authorizer port |
| ingress.enabled | bool | `true` | Enable ingress controller resource |
| ingress.annotations | object | check values.yaml | Annotations that define default ingress class, certificate issuer |
| ingress.path | string | `"/rest-sources/authorizer"` | Path within the url structure |
| ingress.pathType | string | `"ImplementationSpecific"` | Ingress Path type |
| ingress.ingressClassName | string | `"nginx"` | IngressClass that will be be used to implement the Ingress (Kubernetes 1.18+) |
| ingress.hosts | list | `["localhost"]` | Hosts to accept requests from |
| ingress.tls.secretName | string | `"radar-base-tls-radar-rest-sources-authorizer"` | TLS Secret Name |
| resources.requests | object | `{"cpu":"100m","memory":"128Mi"}` | CPU/Memory resource requests |
| nodeSelector | object | `{}` | Node labels for pod assignment |
| tolerations | list | `[]` | Toleration labels for pod assignment |
| affinity | object | `{}` | Affinity labels for pod assignment |
| extraEnvVars | list | `[]` | Extra environment variables |
| customLivenessProbe | object | `{}` | Custom livenessProbe that overrides the default one |
| livenessProbe.enabled | bool | `true` | Enable livenessProbe |
| livenessProbe.initialDelaySeconds | int | `5` | Initial delay seconds for livenessProbe |
| livenessProbe.periodSeconds | int | `30` | Period seconds for livenessProbe |
| livenessProbe.timeoutSeconds | int | `3` | Timeout seconds for livenessProbe |
| livenessProbe.successThreshold | int | `1` | Success threshold for livenessProbe |
| livenessProbe.failureThreshold | int | `3` | Failure threshold for livenessProbe |
| customReadinessProbe | object | `{}` | Custom readinessProbe that overrides the default one |
| readinessProbe.enabled | bool | `true` | Enable readinessProbe |
| readinessProbe.initialDelaySeconds | int | `5` | Initial delay seconds for readinessProbe |
| readinessProbe.periodSeconds | int | `10` | Period seconds for readinessProbe |
| readinessProbe.timeoutSeconds | int | `3` | Timeout seconds for readinessProbe |
| readinessProbe.successThreshold | int | `1` | Success threshold for readinessProbe |
| readinessProbe.failureThreshold | int | `3` | Failure threshold for readinessProbe |
| networkpolicy | object | check `values.yaml` | Network policy defines who can access this application and who this applications has access to |
| clientId | string | `"radar_rest_sources_authorizer"` | OAuth2 client id of the application registered in Management Portal. It is assumed that this is a public client with empty client secret. |
| serverName | string | `"localhost"` | Domain name of the server |
| authUrl | string | `"localhost/managementportal/oauth"` | Authorization URL of the IDP |
Loading

0 comments on commit 76806c2

Please sign in to comment.