From c2ae8879aabba7319906dda0c9b367744b6f7b76 Mon Sep 17 00:00:00 2001 From: Dennis Wendland Date: Thu, 25 Jul 2024 08:27:21 +0200 Subject: [PATCH] Remove i4Trust and ai-marketplace resources --- aws/ai-marketplace/cm-to-service/aws-crd.yaml | 124 - .../cm-to-service/deployment.yaml | 22 - .../cm-to-service/role-binding.yaml | 12 - .../cm-to-service/role-openshift.yaml | 17 - .../cm-to-service/service-account.yaml | 4 - .../secrets/api-sealed-secret.yaml | 17 - .../secrets/aws-user-sealed-secret.yaml | 18 - .../charging-backend-sealed-secret.yaml | 19 - .../secrets/keyrock-env-sealed-secret.yaml | 17 - .../secrets/keyrock-sealed-secret.yaml | 19 - .../secrets/logic-proxy-sealed-secret.yaml | 17 - .../secrets/mongo-root-sealed-secret.yaml | 17 - .../secrets/mongo-users-sealed-secret.yaml | 18 - .../secrets/mysql-sealed-secret.yaml | 17 - .../secrets/rss-sealed-secret.yaml | 17 - .../ai-marketplace-cm-to-service.yaml | 18 - .../ai-marketplace-hella-kong.yaml | 16 - .../ai-marketplace-hella-orion.yaml | 16 - .../ai-marketplace-satellite.yaml | 16 - .../ai-marketplace-secrets.yaml | 18 - aws/apps/i4trust/README.md | 7 - .../i4trust-demo-bae-keyrock.yaml | 16 - .../i4trust-demo/i4trust-demo-bae.yaml | 16 - .../i4trust-demo/i4trust-demo-configmaps.yaml | 16 - .../i4trust-demo-elasticsearch.yaml | 16 - .../i4trust-demo-happypets-backend.yaml | 16 - .../i4trust-demo-happypets-keyrock-shop.yaml | 16 - .../i4trust-demo-happypets-keyrock.yaml | 16 - .../i4trust-demo-happypets-wallet.yaml | 16 - .../i4trust-demo-happypets-waltid.yaml | 16 - .../i4trust-demo/i4trust-demo-jobs.yaml | 16 - .../i4trust-demo/i4trust-demo-mongodb.yaml | 16 - .../i4trust-demo/i4trust-demo-mysql.yaml | 16 - .../i4trust-demo-nocheaper-backend.yaml | 16 - .../i4trust-demo-nocheaper-keyrock-shop.yaml | 16 - .../i4trust-demo-nocheaper-keyrock.yaml | 16 - .../i4trust-demo-nocheaper-waltid.yaml | 16 - .../i4trust-demo/i4trust-demo-pdc-as.yaml | 16 - .../i4trust-demo-pdc-backend.yaml | 16 - .../i4trust-demo-pdc-keyrock.yaml | 16 - .../i4trust-demo/i4trust-demo-pdc-kong.yaml | 16 - .../i4trust-demo/i4trust-demo-pdc-mysql.yaml | 16 - .../i4trust-demo/i4trust-demo-pdc-orion.yaml | 16 - .../i4trust-demo/i4trust-demo-pdc-pdp.yaml | 16 - .../i4trust-demo/i4trust-demo-pdc-portal.yaml | 16 - .../i4trust-demo/i4trust-demo-pdc-waltid.yaml | 16 - .../i4trust-demo/i4trust-demo-secrets.yaml | 16 - .../i4trust-demo-serviceaccounts.yaml | 16 - .../i4trust-dev/i4trust-dev-bae-keyrock.yaml | 16 - .../i4trust/i4trust-dev/i4trust-dev-bae.yaml | 16 - .../i4trust-dev/i4trust-dev-configmaps.yaml | 16 - .../i4trust-dev-elasticsearch.yaml | 16 - .../i4trust-dev-happypets-keyrock-shop.yaml | 16 - .../i4trust-dev-happypets-keyrock.yaml | 16 - .../i4trust/i4trust-dev/i4trust-dev-jobs.yaml | 16 - .../i4trust-dev/i4trust-dev-mongodb.yaml | 16 - .../i4trust-dev/i4trust-dev-mysql.yaml | 16 - .../i4trust-dev-nocheaper-keyrock-shop.yaml | 16 - .../i4trust-dev-nocheaper-keyrock.yaml | 16 - .../i4trust-dev/i4trust-dev-pdc-as.yaml | 16 - .../i4trust-dev/i4trust-dev-pdc-keyrock.yaml | 16 - .../i4trust-dev/i4trust-dev-pdc-kong.yaml | 16 - .../i4trust-dev/i4trust-dev-pdc-orion.yaml | 16 - .../i4trust-dev/i4trust-dev-pdc-portal.yaml | 16 - .../i4trust-dev/i4trust-dev-satellite.yaml | 16 - .../i4trust-dev/i4trust-dev-secrets.yaml | 16 - .../i4trust-dev-serviceaccounts.yaml | 16 - aws/i4trust/README.md | 6 - aws/i4trust/i4trust-demo/README.md | 830 --- .../i4trust-demo/bae-keyrock/Chart.yaml | 12 - .../i4trust-demo/bae-keyrock/values.yaml | 51 - aws/i4trust/i4trust-demo/bae/Chart.yaml | 12 - aws/i4trust/i4trust-demo/bae/values.yaml | 272 - .../configmaps/mongodb-configmap.yaml | 78 - .../configmaps/pdc-kong-configmap.yaml | 73 - .../configmaps/pdc-orion-data-configmap.yaml | 213 - .../i4trust-demo/elasticsearch/Chart.yaml | 12 - .../i4trust-demo/elasticsearch/values.yaml | 9 - .../happypets-issuer-vcbackend/Chart.yaml | 12 - .../happypets-issuer-vcbackend/values.yaml | 18 - .../happypets-issuer-vcwaltid/Chart.yaml | 12 - .../happypets-issuer-vcwaltid/values.yaml | 88 - .../happypets-keyrock-shop/Chart.yaml | 12 - .../happypets-keyrock-shop/values.yaml | 110 - .../i4trust-demo/happypets-keyrock/Chart.yaml | 12 - .../happypets-keyrock/values.yaml | 110 - .../happypets-wallet/certificate.yaml | 14 - .../happypets-wallet/deployment.yaml | 23 - .../i4trust-demo/happypets-wallet/route.yaml | 16 - .../happypets-wallet/service.yaml | 14 - .../i4trust-demo/jobs/pdc-orion-data-job.yaml | 32 - aws/i4trust/i4trust-demo/mongodb/Chart.yaml | 12 - aws/i4trust/i4trust-demo/mongodb/values.yaml | 27 - aws/i4trust/i4trust-demo/mysql-pdp/Chart.yaml | 12 - .../i4trust-demo/mysql-pdp/values.yaml | 17 - aws/i4trust/i4trust-demo/mysql/Chart.yaml | 12 - aws/i4trust/i4trust-demo/mysql/values.yaml | 4783 ----------------- .../nocheaper-issuer-vcbackend/Chart.yaml | 12 - .../nocheaper-issuer-vcbackend/values.yaml | 16 - .../nocheaper-issuer-vcwaltid/Chart.yaml | 12 - .../nocheaper-issuer-vcwaltid/values.yaml | 37 - .../nocheaper-keyrock-shop/Chart.yaml | 12 - .../nocheaper-keyrock-shop/values.yaml | 110 - .../i4trust-demo/nocheaper-keyrock/Chart.yaml | 12 - .../nocheaper-keyrock/values.yaml | 110 - aws/i4trust/i4trust-demo/pdc-as/Chart.yaml | 12 - aws/i4trust/i4trust-demo/pdc-as/values.yaml | 45 - .../i4trust-demo/pdc-keyrock/Chart.yaml | 12 - .../i4trust-demo/pdc-keyrock/values.yaml | 112 - aws/i4trust/i4trust-demo/pdc-kong/Chart.yaml | 12 - .../pdc-kong/templates/_helpers.tpl | 39 - .../pdc-kong/templates/proxy-certificate.yaml | 15 - .../pdc-kong/templates/proxy-route.yaml | 34 - aws/i4trust/i4trust-demo/pdc-kong/values.yaml | 69 - aws/i4trust/i4trust-demo/pdc-orion/Chart.yaml | 12 - .../i4trust-demo/pdc-orion/values.yaml | 15 - aws/i4trust/i4trust-demo/pdc-pdp/Chart.yaml | 12 - aws/i4trust/i4trust-demo/pdc-pdp/values.yaml | 28 - .../i4trust-demo/pdc-portal/Chart.yaml | 12 - .../i4trust-demo/pdc-portal/values.yaml | 70 - .../pdc-verifier-vcbackend/Chart.yaml | 12 - .../pdc-verifier-vcbackend/values.yaml | 18 - .../pdc-verifier-vcwaltid/Chart.yaml | 12 - .../pdc-verifier-vcwaltid/values.yaml | 37 - .../secrets/bae-apis-sealed-secret.yaml | 16 - .../secrets/bae-cb-cert-sealed-secret.yaml | 17 - .../secrets/bae-cb-sealed-secret.yaml | 18 - .../secrets/bae-keyrock-sealed-secret.yaml | 17 - .../secrets/bae-lp-cert-sealed-secret.yaml | 17 - .../secrets/bae-lp-sealed-secret.yaml | 17 - .../secrets/bae-rss-sealed-secret.yaml | 16 - .../happypets-keyrock-cert-sealed-secret.yaml | 17 - .../happypets-keyrock-sealed-secret.yaml | 17 - ...ypets-keyrock-shop-cert-sealed-secret.yaml | 17 - .../happypets-keyrock-shop-sealed-secret.yaml | 17 - .../secrets/mongodb-envs-sealed-secret.yaml | 17 - .../secrets/mongodb-sealed-secret.yaml | 18 - .../secrets/mysql-pdp-sealed-secret.yaml | 20 - .../secrets/mysql-sealed-secret.yaml | 16 - .../nocheaper-keyrock-cert-sealed-secret.yaml | 17 - .../nocheaper-keyrock-sealed-secret.yaml | 17 - ...eaper-keyrock-shop-cert-sealed-secret.yaml | 17 - .../nocheaper-keyrock-shop-sealed-secret.yaml | 17 - .../secrets/pdc-as-sealed-secret.yaml | 17 - .../pdc-keyrock-cert-sealed-secret.yaml | 17 - .../secrets/pdc-keyrock-sealed-secret.yaml | 17 - .../secrets/pdc-kong-sealed-secret.yaml | 17 - .../secrets/pdc-orion-sealed-secret.yaml | 16 - .../secrets/pdc-portal-sealed-secret.yaml | 17 - .../secrets/pdp-ishare-sealed-secret.yaml | 17 - .../i4trust-demo-root-runner.yaml | 5 - aws/i4trust/i4trust-dev/README.md | 875 --- .../i4trust-dev/bae-keyrock/Chart.yaml | 12 - aws/i4trust/i4trust-dev/bae-keyrock/README.md | 4 - .../i4trust-dev/bae-keyrock/values.yaml | 40 - aws/i4trust/i4trust-dev/bae/Chart.yaml | 12 - aws/i4trust/i4trust-dev/bae/values.yaml | 266 - .../configmaps/mongodb-configmap.yaml | 42 - .../configmaps/pdc-orion-data-configmap.yaml | 218 - .../i4trust-dev/elasticsearch/Chart.yaml | 12 - .../i4trust-dev/elasticsearch/values.yaml | 9 - .../happypets-keyrock-shop/Chart.yaml | 12 - .../happypets-keyrock-shop/values.yaml | 103 - .../i4trust-dev/happypets-keyrock/Chart.yaml | 12 - .../i4trust-dev/happypets-keyrock/values.yaml | 103 - .../i4trust-dev/jobs/pdc-orion-data-job.yaml | 51 - aws/i4trust/i4trust-dev/mongodb/Chart.yaml | 12 - aws/i4trust/i4trust-dev/mongodb/values.yaml | 27 - aws/i4trust/i4trust-dev/mysql/Chart.yaml | 12 - aws/i4trust/i4trust-dev/mysql/values.yaml | 8 - .../nocheaper-keyrock-shop/Chart.yaml | 12 - .../nocheaper-keyrock-shop/values.yaml | 103 - .../i4trust-dev/nocheaper-keyrock/Chart.yaml | 12 - .../i4trust-dev/nocheaper-keyrock/values.yaml | 103 - aws/i4trust/i4trust-dev/pdc-as/Chart.yaml | 12 - aws/i4trust/i4trust-dev/pdc-as/values.yaml | 40 - .../i4trust-dev/pdc-keyrock/Chart.yaml | 12 - .../i4trust-dev/pdc-keyrock/values.yaml | 109 - aws/i4trust/i4trust-dev/pdc-kong/Chart.yaml | 12 - .../pdc-kong/templates/configmap.yaml | 51 - aws/i4trust/i4trust-dev/pdc-kong/values.yaml | 61 - aws/i4trust/i4trust-dev/pdc-orion/Chart.yaml | 12 - aws/i4trust/i4trust-dev/pdc-orion/values.yaml | 15 - aws/i4trust/i4trust-dev/pdc-portal/Chart.yaml | 12 - .../i4trust-dev/pdc-portal/values.yaml | 49 - aws/i4trust/i4trust-dev/satellite/Chart.yaml | 12 - aws/i4trust/i4trust-dev/satellite/values.yaml | 241 - .../secrets/bae-apis-sealed-secret.yaml | 16 - .../secrets/bae-cb-cert-sealed-secret.yaml | 17 - .../secrets/bae-cb-sealed-secret.yaml | 19 - .../secrets/bae-keyrock-sealed-secret.yaml | 17 - .../secrets/bae-lp-cert-sealed-secret.yaml | 17 - .../secrets/bae-lp-sealed-secret.yaml | 17 - .../secrets/bae-rss-sealed-secret.yaml | 16 - .../happypets-keyrock-cert-sealed-secret.yaml | 17 - .../happypets-keyrock-sealed-secret.yaml | 17 - ...ypets-keyrock-shop-cert-sealed-secret.yaml | 17 - .../happypets-keyrock-shop-sealed-secret.yaml | 17 - .../secrets/mongodb-envs-sealed-secret.yaml | 17 - .../secrets/mongodb-sealed-secret.yaml | 18 - .../secrets/mysql-sealed-secret.yaml | 16 - .../nocheaper-keyrock-cert-sealed-secret.yaml | 17 - .../nocheaper-keyrock-sealed-secret.yaml | 17 - ...eaper-keyrock-shop-cert-sealed-secret.yaml | 17 - .../nocheaper-keyrock-shop-sealed-secret.yaml | 17 - .../secrets/pdc-as-sealed-secret.yaml | 17 - .../pdc-keyrock-cert-sealed-secret.yaml | 17 - .../secrets/pdc-keyrock-sealed-secret.yaml | 17 - .../secrets/pdc-kong-sealed-secret.yaml | 17 - .../secrets/pdc-orion-sealed-secret.yaml | 16 - .../secrets/pdc-portal-sealed-secret.yaml | 17 - .../secrets/satellite-sealed-secret.yaml | 17 - .../i4trust-dev-root-runner.yaml | 5 - aws/namespaces/ai-marketplace.yaml | 4 - aws/namespaces/i4trust-demo.yaml | 4 - aws/namespaces/i4trust-dev.yaml | 4 - 216 files changed, 12572 deletions(-) delete mode 100644 aws/ai-marketplace/cm-to-service/aws-crd.yaml delete mode 100644 aws/ai-marketplace/cm-to-service/deployment.yaml delete mode 100644 aws/ai-marketplace/cm-to-service/role-binding.yaml delete mode 100644 aws/ai-marketplace/cm-to-service/role-openshift.yaml delete mode 100644 aws/ai-marketplace/cm-to-service/service-account.yaml delete mode 100644 aws/ai-marketplace/secrets/api-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/aws-user-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/charging-backend-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/keyrock-env-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/keyrock-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/logic-proxy-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/mongo-root-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/mongo-users-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/mysql-sealed-secret.yaml delete mode 100644 aws/ai-marketplace/secrets/rss-sealed-secret.yaml delete mode 100644 aws/apps/ai-marketplace/ai-marketplace-cm-to-service.yaml delete mode 100644 aws/apps/ai-marketplace/ai-marketplace-hella-kong.yaml delete mode 100644 aws/apps/ai-marketplace/ai-marketplace-hella-orion.yaml delete mode 100644 aws/apps/ai-marketplace/ai-marketplace-satellite.yaml delete mode 100644 aws/apps/ai-marketplace/ai-marketplace-secrets.yaml delete mode 100644 aws/apps/i4trust/README.md delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-bae-keyrock.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-bae.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-configmaps.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-elasticsearch.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-backend.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-keyrock-shop.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-keyrock.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-wallet.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-waltid.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-jobs.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-mongodb.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-mysql.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-backend.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-keyrock-shop.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-keyrock.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-waltid.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-as.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-backend.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-keyrock.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-kong.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-mysql.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-orion.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-pdp.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-portal.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-waltid.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-secrets.yaml delete mode 100644 aws/apps/i4trust/i4trust-demo/i4trust-demo-serviceaccounts.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-bae-keyrock.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-bae.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-configmaps.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-elasticsearch.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-happypets-keyrock-shop.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-happypets-keyrock.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-jobs.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-mongodb.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-mysql.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-nocheaper-keyrock-shop.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-nocheaper-keyrock.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-as.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-keyrock.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-kong.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-orion.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-portal.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-satellite.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-secrets.yaml delete mode 100644 aws/apps/i4trust/i4trust-dev/i4trust-dev-serviceaccounts.yaml delete mode 100644 aws/i4trust/README.md delete mode 100644 aws/i4trust/i4trust-demo/README.md delete mode 100644 aws/i4trust/i4trust-demo/bae-keyrock/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/bae-keyrock/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/bae/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/bae/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/configmaps/mongodb-configmap.yaml delete mode 100644 aws/i4trust/i4trust-demo/configmaps/pdc-kong-configmap.yaml delete mode 100644 aws/i4trust/i4trust-demo/configmaps/pdc-orion-data-configmap.yaml delete mode 100644 aws/i4trust/i4trust-demo/elasticsearch/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/elasticsearch/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-issuer-vcbackend/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-issuer-vcbackend/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-issuer-vcwaltid/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-issuer-vcwaltid/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-keyrock-shop/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-keyrock-shop/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-keyrock/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-keyrock/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-wallet/certificate.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-wallet/deployment.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-wallet/route.yaml delete mode 100644 aws/i4trust/i4trust-demo/happypets-wallet/service.yaml delete mode 100644 aws/i4trust/i4trust-demo/jobs/pdc-orion-data-job.yaml delete mode 100644 aws/i4trust/i4trust-demo/mongodb/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/mongodb/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/mysql-pdp/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/mysql-pdp/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/mysql/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/mysql/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/nocheaper-issuer-vcbackend/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/nocheaper-issuer-vcbackend/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/nocheaper-issuer-vcwaltid/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/nocheaper-issuer-vcwaltid/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/nocheaper-keyrock-shop/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/nocheaper-keyrock-shop/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/nocheaper-keyrock/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/nocheaper-keyrock/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-as/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-as/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-keyrock/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-keyrock/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-kong/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-kong/templates/_helpers.tpl delete mode 100644 aws/i4trust/i4trust-demo/pdc-kong/templates/proxy-certificate.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-kong/templates/proxy-route.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-kong/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-orion/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-orion/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-pdp/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-pdp/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-portal/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-portal/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-verifier-vcbackend/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-verifier-vcbackend/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-verifier-vcwaltid/Chart.yaml delete mode 100644 aws/i4trust/i4trust-demo/pdc-verifier-vcwaltid/values.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/bae-apis-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/bae-cb-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/bae-cb-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/bae-keyrock-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/bae-lp-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/bae-lp-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/bae-rss-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/happypets-keyrock-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/happypets-keyrock-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/happypets-keyrock-shop-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/happypets-keyrock-shop-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/mongodb-envs-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/mongodb-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/mysql-pdp-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/mysql-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/nocheaper-keyrock-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/nocheaper-keyrock-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/nocheaper-keyrock-shop-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/nocheaper-keyrock-shop-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/pdc-as-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/pdc-keyrock-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/pdc-keyrock-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/pdc-kong-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/pdc-orion-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/pdc-portal-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/secrets/pdp-ishare-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-demo/serviceaccounts/i4trust-demo-root-runner.yaml delete mode 100644 aws/i4trust/i4trust-dev/README.md delete mode 100644 aws/i4trust/i4trust-dev/bae-keyrock/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/bae-keyrock/README.md delete mode 100644 aws/i4trust/i4trust-dev/bae-keyrock/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/bae/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/bae/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/configmaps/mongodb-configmap.yaml delete mode 100644 aws/i4trust/i4trust-dev/configmaps/pdc-orion-data-configmap.yaml delete mode 100644 aws/i4trust/i4trust-dev/elasticsearch/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/elasticsearch/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/happypets-keyrock-shop/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/happypets-keyrock-shop/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/happypets-keyrock/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/happypets-keyrock/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/jobs/pdc-orion-data-job.yaml delete mode 100644 aws/i4trust/i4trust-dev/mongodb/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/mongodb/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/mysql/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/mysql/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/nocheaper-keyrock-shop/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/nocheaper-keyrock-shop/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/nocheaper-keyrock/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/nocheaper-keyrock/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-as/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-as/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-keyrock/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-keyrock/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-kong/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-kong/templates/configmap.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-kong/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-orion/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-orion/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-portal/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/pdc-portal/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/satellite/Chart.yaml delete mode 100644 aws/i4trust/i4trust-dev/satellite/values.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/bae-apis-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/bae-cb-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/bae-cb-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/bae-keyrock-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/bae-lp-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/bae-lp-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/bae-rss-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/happypets-keyrock-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/happypets-keyrock-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/happypets-keyrock-shop-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/happypets-keyrock-shop-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/mongodb-envs-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/mongodb-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/mysql-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/nocheaper-keyrock-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/nocheaper-keyrock-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/nocheaper-keyrock-shop-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/nocheaper-keyrock-shop-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/pdc-as-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/pdc-keyrock-cert-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/pdc-keyrock-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/pdc-kong-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/pdc-orion-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/pdc-portal-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/secrets/satellite-sealed-secret.yaml delete mode 100644 aws/i4trust/i4trust-dev/serviceaccounts/i4trust-dev-root-runner.yaml delete mode 100644 aws/namespaces/ai-marketplace.yaml delete mode 100644 aws/namespaces/i4trust-demo.yaml delete mode 100644 aws/namespaces/i4trust-dev.yaml diff --git a/aws/ai-marketplace/cm-to-service/aws-crd.yaml b/aws/ai-marketplace/cm-to-service/aws-crd.yaml deleted file mode 100644 index b77f6d5f..00000000 --- a/aws/ai-marketplace/cm-to-service/aws-crd.yaml +++ /dev/null @@ -1,124 +0,0 @@ -apiVersion: apiextensions.k8s.io/v1 -kind: CustomResourceDefinition -metadata: - name: fieldexports.services.k8s.aws -spec: - group: services.k8s.aws - names: - kind: FieldExport - listKind: FieldExportList - plural: fieldexports - singular: fieldexport - scope: Cluster - versions: - - name: v1alpha1 - schema: - openAPIV3Schema: - description: FieldExport is the schema for the FieldExport API. - properties: - apiVersion: - description: 'APIVersion defines the versioned schema of this representation - of an object. Servers should convert recognized schemas to the latest - internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources' - type: string - kind: - description: 'Kind is a string value representing the REST resource this - object represents. Servers may infer this from the endpoint the client - submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds' - type: string - metadata: - type: object - spec: - description: FieldExportSpec defines the desired state of the FieldExport. - properties: - from: - description: ResourceFieldSelector provides the values necessary to - identify an individual field on an individual K8s resource. - properties: - path: - type: string - resource: - description: NamespacedResource provides all the values necessary - to identify an ACK resource of a given type (within the same - namespace as the custom resource containing this type). - properties: - group: - type: string - kind: - type: string - name: - type: string - required: - - group - - kind - - name - type: object - required: - - path - - resource - type: object - to: - description: FieldExportTarget provides the values necessary to identify - the output path for a field export. - properties: - kind: - description: FieldExportOutputType represents all types that can - be produced by a field export operation - enum: - - configmap - - secret - type: string - name: - type: string - namespace: - description: Namespace is marked as optional, so we cannot compose - `NamespacedName` - type: string - required: - - kind - - name - type: object - required: - - from - - to - type: object - status: - description: FieldExportStatus defines the observed status of the FieldExport. - properties: - conditions: - description: A collection of `ackv1alpha1.Condition` objects that - describe the various recoverable states of the field CR - items: - description: Condition is the common struct used by all CRDs managed - by ACK service controllers to indicate terminal states of the - CR and its backend AWS service API resource - properties: - lastTransitionTime: - description: Last time the condition transitioned from one status - to another. - format: date-time - type: string - message: - description: A human readable message indicating details about - the transition. - type: string - reason: - description: The reason for the condition's last transition. - type: string - status: - description: Status of the condition, one of True, False, Unknown. - type: string - type: - description: Type is the type of the Condition - type: string - required: - - status - - type - type: object - type: array - required: - - conditions - type: object - type: object - served: true - storage: true diff --git a/aws/ai-marketplace/cm-to-service/deployment.yaml b/aws/ai-marketplace/cm-to-service/deployment.yaml deleted file mode 100644 index 967a4eb7..00000000 --- a/aws/ai-marketplace/cm-to-service/deployment.yaml +++ /dev/null @@ -1,22 +0,0 @@ -apiVersion: apps/v1 -kind: Deployment -metadata: - name: test-cm-to-service -spec: - replicas: 1 - selector: - matchLabels: - app: test-cm-to-service - template: - metadata: - labels: - app: test-cm-to-service - spec: - serviceAccountName: cm-to-service-sa - containers: - - image: quay.io/fiware/k8s-cm-to-service:0.0.1 - imagePullPolicy: Always - name: cm-to-service - env: - - name: CREATED_LABEL_VALUE - value: test-cm-to-service \ No newline at end of file diff --git a/aws/ai-marketplace/cm-to-service/role-binding.yaml b/aws/ai-marketplace/cm-to-service/role-binding.yaml deleted file mode 100644 index cb92afc4..00000000 --- a/aws/ai-marketplace/cm-to-service/role-binding.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRoleBinding -metadata: - name: cm-to-service-sa-rb -subjects: - - kind: ServiceAccount - name: cm-to-service-sa - namespace: ai-marketplace -roleRef: - kind: ClusterRole - name: cm-to-service - apiGroup: rbac.authorization.k8s.io \ No newline at end of file diff --git a/aws/ai-marketplace/cm-to-service/role-openshift.yaml b/aws/ai-marketplace/cm-to-service/role-openshift.yaml deleted file mode 100644 index 7d6dbf08..00000000 --- a/aws/ai-marketplace/cm-to-service/role-openshift.yaml +++ /dev/null @@ -1,17 +0,0 @@ - -apiVersion: rbac.authorization.k8s.io/v1 -kind: ClusterRole -metadata: - name: cm-to-service -rules: -- apiGroups: - - "" - resources: - - services - - configmaps - verbs: - - get - - watch - - list - - create - - update \ No newline at end of file diff --git a/aws/ai-marketplace/cm-to-service/service-account.yaml b/aws/ai-marketplace/cm-to-service/service-account.yaml deleted file mode 100644 index e177b989..00000000 --- a/aws/ai-marketplace/cm-to-service/service-account.yaml +++ /dev/null @@ -1,4 +0,0 @@ -apiVersion: v1 -kind: ServiceAccount -metadata: - name: cm-to-service-sa \ No newline at end of file diff --git a/aws/ai-marketplace/secrets/api-sealed-secret.yaml b/aws/ai-marketplace/secrets/api-sealed-secret.yaml deleted file mode 100644 index cb935b08..00000000 --- a/aws/ai-marketplace/secrets/api-sealed-secret.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: api-secret - namespace: ai-marketplace -spec: - encryptedData: - dbPassword: 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 - template: - data: null - metadata: - creationTimestamp: null - name: api-secret - namespace: ai-marketplace - type: Opaque - diff --git a/aws/ai-marketplace/secrets/aws-user-sealed-secret.yaml b/aws/ai-marketplace/secrets/aws-user-sealed-secret.yaml deleted file mode 100644 index 442365ba..00000000 --- a/aws/ai-marketplace/secrets/aws-user-sealed-secret.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: ack-rds-user-secrets - namespace: ack-system -spec: - encryptedData: - AWS_ACCESS_KEY_ID: AgB+6KTm9XUPUbTf6CEK8bxr+m0OPCY7pkvvXJrjW7rh4brfikgXTFmRORVwONCzjXnJUbdIdEMWuQYLOTk+PcpzLNq+6cfE1fPCHGzO5MG+yGiwg8UlSniKEPvm7BBCt3qZ3itQe34DSmW7N+JhVfVvJ1K8taLBGBK4nXhrYv0w+E/+G47OLxJ5/kM0KY0UQuDcn3fTymbMaqzf3N7LWX5dfI6lc3Xf00jROGccDY3gFsTKrOCxI3zzrD91uzIJ7IOwh87XlV8AsD2VZ+l+kVz0m8kZLe09fj6K98NNuHEK0avqU8M4D7vPwCx+RuKZrvivnY+hD67DDDBPVrodSDJhHHc9Jf44JJirEF47YqBgabVAo6IusFt6xJXT/7I3X/bDCLLe8QhPu4Hx5xMFKBBeLRLLgWSyZzH1Ce6H4phsgILLVbDgQh/T/woxp7QdB75JAx1kyntydHNV47gErp45zVC50PXMKmKfjtsBalX5Gm77qSkEGbhTkVcdWJSE6yUy/HgavkKMS9m+x4XAFXUb/I4D3CK4DLTKGKjM3SbBb2kW2NEPWuzWgOUV9Ty7gGk+OzzDGPW6Ikbw8D9d/YGujHO5Trgw6//DpW8obPpyMTSsdOTPQplertQkcUmDXkP2xbBDPQTBr0b5VIPuL/pIfRRqU+0pjaShE75fgrg+nWIKZM+1vV4HWLDvmYICeiG3jPnqLJEH+RAC4IL9ecuoifzi/w== - AWS_SECRET_ACCESS_KEY: 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 - template: - data: null - metadata: - creationTimestamp: null - name: ack-rds-user-secrets - namespace: ack-system - type: Opaque - diff --git a/aws/ai-marketplace/secrets/charging-backend-sealed-secret.yaml b/aws/ai-marketplace/secrets/charging-backend-sealed-secret.yaml deleted file mode 100644 index 9f61ea68..00000000 --- a/aws/ai-marketplace/secrets/charging-backend-sealed-secret.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: cb-secret - namespace: ai-marketplace -spec: - encryptedData: - dbPassword: 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 - paypalClientSecret: AgBxzLORnEBqbZ1VOZvxjYLyOVzQkggHjEE09jCBE4HK4CaISWKwU5z2hXqel4COvuxUYnBRZI9+P8VRDk3cCkMdQPw3YhDaObPXSlEVq/1MRRM7RlKHf3V5fLXLFz6lrJt9zENrGpNUAEMD6fD4TOm6e+xjuuZWNxzMaX/bvqdh4pFclhM8ujiHtCWiHwxVS9n5fsXMC6ZI8+0kPPq6o1zySKDCEvQITrV0xO59W7+iY45sbFoKIvxsDCiHHHdIz5cNeLUVstR0ht+2UGap8QiKzL70G1UcDALJ+X4uH0NRRM9pFfpwCUdina9x75Le98AuWumD58hbqsxIGe/Y20t7wt3+nPvHUNDTSsi5earET+jAK5tVg/Us3tZWy+qcAAFqxYoZt23aKHLJLl2vvdNmxUb/dXeSmKUWv0eeyABq1bQgO1iZpKh//6N9NZ6bxXHfdz7zOHxxFv/KfEpjnyDtAT4MlDQfCn4/yvhQWubmyPWvhem1h7EXZXuWt/hDXAZsDViESFVayL4lPQvRDNUFAUY6fgbUGbbdzQpdhRvacOShYc96XqsS6DA9UkUDi4vNXFsDcQfTNO6mhUwyLaAUqQ/6CjcOjhhOJC+ZfRKEAJDM8aZvbli8ChTFHeMlCZZMaQV3K4YO4PFNCUasmiIsIwij0puSvgnnNUo9XJAj9mNu8Gz6vwKzyBMLL4htULPiiqKAcxPyi/8KEQ2p+smnp/2aZZGKVAP1TMW9LVa1DEV3sWSZ47HNBduuFdVF3TPyoAchRh3afF1xVwBtP8MhnqJWxIconAVeLvgmIrXBpw== - pluginsIdmPassword: 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 - template: - data: null - metadata: - creationTimestamp: null - name: cb-secret - namespace: ai-marketplace - type: Opaque - diff --git a/aws/ai-marketplace/secrets/keyrock-env-sealed-secret.yaml b/aws/ai-marketplace/secrets/keyrock-env-sealed-secret.yaml deleted file mode 100644 index 9d3d08c5..00000000 --- a/aws/ai-marketplace/secrets/keyrock-env-sealed-secret.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: keyrock-env-secret - namespace: ai-marketplace -spec: - encryptedData: - IDM_EMAIL_AUTH_PASS: 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 - template: - data: null - metadata: - creationTimestamp: null - name: keyrock-env-secret - namespace: ai-marketplace - type: Opaque - diff --git a/aws/ai-marketplace/secrets/keyrock-sealed-secret.yaml b/aws/ai-marketplace/secrets/keyrock-sealed-secret.yaml deleted file mode 100644 index 6d3fe98d..00000000 --- a/aws/ai-marketplace/secrets/keyrock-sealed-secret.yaml +++ /dev/null @@ -1,19 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: keyrock-secret - namespace: ai-marketplace -spec: - encryptedData: - adminPassword: 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 - appSecret: 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 - dbPassword: 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 - template: - data: null - metadata: - creationTimestamp: null - name: keyrock-secret - namespace: ai-marketplace - type: Opaque - diff --git a/aws/ai-marketplace/secrets/logic-proxy-sealed-secret.yaml b/aws/ai-marketplace/secrets/logic-proxy-sealed-secret.yaml deleted file mode 100644 index 482c977b..00000000 --- a/aws/ai-marketplace/secrets/logic-proxy-sealed-secret.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: belp-secret - namespace: ai-marketplace -spec: - encryptedData: - dbPassword: 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 - oauthClientSecret: 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 - template: - data: null - metadata: - creationTimestamp: null - name: belp-secret - namespace: ai-marketplace - diff --git a/aws/ai-marketplace/secrets/mongo-root-sealed-secret.yaml b/aws/ai-marketplace/secrets/mongo-root-sealed-secret.yaml deleted file mode 100644 index 369e1a4b..00000000 --- a/aws/ai-marketplace/secrets/mongo-root-sealed-secret.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: mongo-root-secret - namespace: ai-marketplace -spec: - encryptedData: - mongodb-root-password: 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 - template: - data: null - metadata: - creationTimestamp: null - name: mongo-root-secret - namespace: ai-marketplace - type: Opaque - diff --git a/aws/ai-marketplace/secrets/mongo-users-sealed-secret.yaml b/aws/ai-marketplace/secrets/mongo-users-sealed-secret.yaml deleted file mode 100644 index 84be20e6..00000000 --- a/aws/ai-marketplace/secrets/mongo-users-sealed-secret.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: mongo-users-secret - namespace: ai-marketplace -spec: - encryptedData: - BELP_PASSWORD: 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 - CHARGING_PASSWORD: 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 - template: - data: null - metadata: - creationTimestamp: null - name: mongo-users-secret - namespace: ai-marketplace - type: Opaque - diff --git a/aws/ai-marketplace/secrets/mysql-sealed-secret.yaml b/aws/ai-marketplace/secrets/mysql-sealed-secret.yaml deleted file mode 100644 index f668cc31..00000000 --- a/aws/ai-marketplace/secrets/mysql-sealed-secret.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: mysql-secret - namespace: ai-marketplace -spec: - encryptedData: - password: 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 - template: - data: null - metadata: - creationTimestamp: null - name: mysql-secret - namespace: ai-marketplace - type: Opaque - diff --git a/aws/ai-marketplace/secrets/rss-sealed-secret.yaml b/aws/ai-marketplace/secrets/rss-sealed-secret.yaml deleted file mode 100644 index dc7d92c9..00000000 --- a/aws/ai-marketplace/secrets/rss-sealed-secret.yaml +++ /dev/null @@ -1,17 +0,0 @@ -apiVersion: bitnami.com/v1alpha1 -kind: SealedSecret -metadata: - creationTimestamp: null - name: rss-secret - namespace: ai-marketplace -spec: - encryptedData: - dbPassword: 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 - template: - data: null - metadata: - creationTimestamp: null - name: rss-secret - namespace: ai-marketplace - type: Opaque - diff --git a/aws/apps/ai-marketplace/ai-marketplace-cm-to-service.yaml b/aws/apps/ai-marketplace/ai-marketplace-cm-to-service.yaml deleted file mode 100644 index ace22a13..00000000 --- a/aws/apps/ai-marketplace/ai-marketplace-cm-to-service.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: cm-to-service - namespace: argocd -spec: - destination: - namespace: ai-marketplace - server: https://kubernetes.default.svc - project: default - source: - path: aws/ai-marketplace/cm-to-service - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: - prune: true - selfHeal: true \ No newline at end of file diff --git a/aws/apps/ai-marketplace/ai-marketplace-hella-kong.yaml b/aws/apps/ai-marketplace/ai-marketplace-hella-kong.yaml deleted file mode 100644 index 8db24859..00000000 --- a/aws/apps/ai-marketplace/ai-marketplace-hella-kong.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: ai-marketplace-hella-kong - namespace: argocd -spec: - destination: - namespace: ai-marketplace - server: https://kubernetes.default.svc - project: default - source: - path: aws/ai-marketplace/hella-kong - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/ai-marketplace/ai-marketplace-hella-orion.yaml b/aws/apps/ai-marketplace/ai-marketplace-hella-orion.yaml deleted file mode 100644 index 08d6fdbf..00000000 --- a/aws/apps/ai-marketplace/ai-marketplace-hella-orion.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: ai-marketplace-hella-orion - namespace: argocd -spec: - destination: - namespace: ai-marketplace - server: https://kubernetes.default.svc - project: default - source: - path: aws/ai-marketplace/hella-orion - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/ai-marketplace/ai-marketplace-satellite.yaml b/aws/apps/ai-marketplace/ai-marketplace-satellite.yaml deleted file mode 100644 index 617e4891..00000000 --- a/aws/apps/ai-marketplace/ai-marketplace-satellite.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: ai-marketplace-ishare-satellite - namespace: argocd -spec: - destination: - namespace: ai-marketplace - server: https://kubernetes.default.svc - project: default - source: - path: aws/ai-marketplace/satellite - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/ai-marketplace/ai-marketplace-secrets.yaml b/aws/apps/ai-marketplace/ai-marketplace-secrets.yaml deleted file mode 100644 index a0b6adcf..00000000 --- a/aws/apps/ai-marketplace/ai-marketplace-secrets.yaml +++ /dev/null @@ -1,18 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: ai-marketplace-secrets - namespace: argocd -spec: - destination: - namespace: ai-marketplace - server: https://kubernetes.default.svc - project: default - source: - path: aws/ai-marketplace/secrets - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: - prune: true - selfHeal: true \ No newline at end of file diff --git a/aws/apps/i4trust/README.md b/aws/apps/i4trust/README.md deleted file mode 100644 index e4dfe0ff..00000000 --- a/aws/apps/i4trust/README.md +++ /dev/null @@ -1,7 +0,0 @@ -# Apps for i4Trust - -ArgoCD apps for the i4trust namespaces under -[https://github.com/FIWARE-Ops/fiware-gitops/tree/master/aws/i4trust](https://github.com/FIWARE-Ops/fiware-gitops/tree/master/aws/i4trust) - -See deployment instructions in the corresponding namespace folder -(e.g., [i4trust-dev](https://github.com/FIWARE-Ops/fiware-gitops/tree/master/aws/i4trust/i4trust-dev)). diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-bae-keyrock.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-bae-keyrock.yaml deleted file mode 100644 index c6d730e7..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-bae-keyrock.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-bae-keyrock - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/bae-keyrock - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-bae.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-bae.yaml deleted file mode 100644 index 0deca88e..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-bae.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-bae - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/bae - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-configmaps.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-configmaps.yaml deleted file mode 100644 index a87a39fc..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-configmaps.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-configmaps - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/configmaps - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-elasticsearch.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-elasticsearch.yaml deleted file mode 100644 index fe3c5613..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-elasticsearch.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-elasticsearch - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/elasticsearch - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-backend.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-backend.yaml deleted file mode 100644 index f448ee17..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-backend.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-happypets-backend - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/happypets-issuer-vcbackend - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-keyrock-shop.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-keyrock-shop.yaml deleted file mode 100644 index 99b29187..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-keyrock-shop.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-happypets-keyrock-shop - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/happypets-keyrock-shop - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-keyrock.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-keyrock.yaml deleted file mode 100644 index a3d6ce70..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-keyrock.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-happypets-keyrock - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/happypets-keyrock - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-wallet.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-wallet.yaml deleted file mode 100644 index 259c5c49..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-wallet.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-happypets-wallet - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/happypets-wallet - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-waltid.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-waltid.yaml deleted file mode 100644 index 3bb78ff5..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-happypets-waltid.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-happypets-waltid - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/happypets-issuer-vcwaltid - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-jobs.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-jobs.yaml deleted file mode 100644 index 5e882ed7..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-jobs.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-jobs - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/jobs - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-mongodb.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-mongodb.yaml deleted file mode 100644 index d0e6fafd..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-mongodb.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-mongodb - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/mongodb - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-mysql.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-mysql.yaml deleted file mode 100644 index b3b5b18c..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-mysql.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-mysql - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/mysql - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-backend.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-backend.yaml deleted file mode 100644 index c58427f3..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-backend.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-nocheaper-backend - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/nocheaper-issuer-vcbackend - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-keyrock-shop.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-keyrock-shop.yaml deleted file mode 100644 index cef6cd78..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-keyrock-shop.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-nocheaper-keyrock-shop - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/nocheaper-keyrock-shop - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-keyrock.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-keyrock.yaml deleted file mode 100644 index 1c4b7d31..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-keyrock.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-nocheaper-keyrock - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/nocheaper-keyrock - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-waltid.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-waltid.yaml deleted file mode 100644 index 4961e56f..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-nocheaper-waltid.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-nocheaper-waltid - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/nocheaper-issuer-vcwaltid - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-as.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-as.yaml deleted file mode 100644 index 31d30b2d..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-as.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-as - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/pdc-as - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-backend.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-backend.yaml deleted file mode 100644 index f82b515c..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-backend.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-backend - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/pdc-verifier-vcbackend - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-keyrock.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-keyrock.yaml deleted file mode 100644 index eac5532f..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-keyrock.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-keyrock - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/pdc-keyrock - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-kong.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-kong.yaml deleted file mode 100644 index caf2a2b1..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-kong.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-kong - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/pdc-kong - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-mysql.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-mysql.yaml deleted file mode 100644 index 2cb85a79..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-mysql.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-mysql - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/mysql-pdp - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-orion.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-orion.yaml deleted file mode 100644 index 911889eb..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-orion.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-orion - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/pdc-orion - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-pdp.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-pdp.yaml deleted file mode 100644 index 6a847f69..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-pdp.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-pdp - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/pdc-pdp - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-portal.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-portal.yaml deleted file mode 100644 index 97d4bb88..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-portal.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-portal - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/pdc-portal - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-waltid.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-waltid.yaml deleted file mode 100644 index 10a3d7a5..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-pdc-waltid.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-pdc-waltid - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/pdc-verifier-vcwaltid - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-secrets.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-secrets.yaml deleted file mode 100644 index 4f225959..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-secrets.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-secrets - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/secrets - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-demo/i4trust-demo-serviceaccounts.yaml b/aws/apps/i4trust/i4trust-demo/i4trust-demo-serviceaccounts.yaml deleted file mode 100644 index 98a61542..00000000 --- a/aws/apps/i4trust/i4trust-demo/i4trust-demo-serviceaccounts.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-demo-serviceaccounts - namespace: argocd -spec: - destination: - namespace: i4trust-demo - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-demo/serviceaccounts - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-bae-keyrock.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-bae-keyrock.yaml deleted file mode 100644 index b71b241d..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-bae-keyrock.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-bae-keyrock - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/bae-keyrock - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-bae.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-bae.yaml deleted file mode 100644 index d47b24d7..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-bae.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-bae - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/bae - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-configmaps.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-configmaps.yaml deleted file mode 100644 index 0eeb8515..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-configmaps.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-configmaps - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/configmaps - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-elasticsearch.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-elasticsearch.yaml deleted file mode 100644 index b1aa2761..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-elasticsearch.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-elasticsearch - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/elasticsearch - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-happypets-keyrock-shop.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-happypets-keyrock-shop.yaml deleted file mode 100644 index 729f6d75..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-happypets-keyrock-shop.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-happypets-keyrock-shop - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/happypets-keyrock-shop - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-happypets-keyrock.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-happypets-keyrock.yaml deleted file mode 100644 index ed4f8786..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-happypets-keyrock.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-happypets-keyrock - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/happypets-keyrock - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-jobs.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-jobs.yaml deleted file mode 100644 index ab7d3678..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-jobs.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-jobs - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/jobs - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-mongodb.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-mongodb.yaml deleted file mode 100644 index c4f4c56f..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-mongodb.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-mongodb - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/mongodb - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-mysql.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-mysql.yaml deleted file mode 100644 index 31d4e30d..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-mysql.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-mysql - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/mysql - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-nocheaper-keyrock-shop.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-nocheaper-keyrock-shop.yaml deleted file mode 100644 index 0a2eba2c..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-nocheaper-keyrock-shop.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-nocheaper-keyrock-shop - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/nocheaper-keyrock-shop - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-nocheaper-keyrock.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-nocheaper-keyrock.yaml deleted file mode 100644 index 9af618ea..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-nocheaper-keyrock.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-nocheaper-keyrock - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/nocheaper-keyrock - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-as.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-as.yaml deleted file mode 100644 index df5fdd27..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-as.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-pdc-as - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/pdc-as - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-keyrock.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-keyrock.yaml deleted file mode 100644 index a5175c10..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-keyrock.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-pdc-keyrock - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/pdc-keyrock - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-kong.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-kong.yaml deleted file mode 100644 index 2a3864be..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-kong.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-pdc-kong - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/pdc-kong - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-orion.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-orion.yaml deleted file mode 100644 index 02ef383e..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-orion.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-pdc-orion - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/pdc-orion - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-portal.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-portal.yaml deleted file mode 100644 index 468f7c60..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-pdc-portal.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-pdc-portal - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/pdc-portal - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-satellite.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-satellite.yaml deleted file mode 100644 index 351e3f9a..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-satellite.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-satellite - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/satellite - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-secrets.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-secrets.yaml deleted file mode 100644 index c71bfb19..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-secrets.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-secrets - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/secrets - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/apps/i4trust/i4trust-dev/i4trust-dev-serviceaccounts.yaml b/aws/apps/i4trust/i4trust-dev/i4trust-dev-serviceaccounts.yaml deleted file mode 100644 index df83778b..00000000 --- a/aws/apps/i4trust/i4trust-dev/i4trust-dev-serviceaccounts.yaml +++ /dev/null @@ -1,16 +0,0 @@ -apiVersion: argoproj.io/v1alpha1 -kind: Application -metadata: - name: i4trust-dev-serviceaccounts - namespace: argocd -spec: - destination: - namespace: i4trust-dev - server: https://kubernetes.default.svc - project: default - source: - path: aws/i4trust/i4trust-dev/serviceaccounts - repoURL: https://github.com/FIWARE-Ops/fiware-gitops - targetRevision: HEAD - syncPolicy: - automated: {} diff --git a/aws/i4trust/README.md b/aws/i4trust/README.md deleted file mode 100644 index d7e7b435..00000000 --- a/aws/i4trust/README.md +++ /dev/null @@ -1,6 +0,0 @@ -# Components for i4Trust reference examples - -Deployment of all necessary components of the i4Trust reference examples. - -There are separate namespaces for the different stages: -* Development: `i4trust-dev` diff --git a/aws/i4trust/i4trust-demo/README.md b/aws/i4trust/i4trust-demo/README.md deleted file mode 100644 index b40a64ca..00000000 --- a/aws/i4trust/i4trust-demo/README.md +++ /dev/null @@ -1,830 +0,0 @@ -# i4Trust demo environment - -Components for the stable demo stage in namespace `i4trust-demo`. - -For deployment and configuration of all components, follow the order below. - -The corresponding ArgoCD apps can be -found [here](../../apps/i4trust/i4trust-demo). - - - - -## ServiceAccount - -Some applications need root priviliges. They have to use the ServiceAccount created with the manifest -[./serviceaccounts/i4trust-demo-root-runner.yaml](./serviceaccounts/i4trust-demo-root-runner.yaml). -For this, first create the app -[i4trust-demo-serviceaccounts](../../apps/i4trust/i4trust-demo/i4trust-demo-serviceaccounts.yaml). - -When the ServiceAccount was created within the namespace, add it to the privileged users: -```shell -oc edit scc privileged -``` -In the open editor, add the new service account under `users:`, e.g. -```yaml -users: -- system:admin -- ... -- system:serviceaccount:i4trust-demo:i4trust-demo-root-runner -- ... -``` - -In case of an error when patching, there was a `yaml` file created under `/tmp`. Enforce the replacement by e.g. -```shell -oc replace -f /tmp/oc-edit-pzvsn.yaml -``` - - -## Secrets - -In the following, several secrets are created using the -[sealed-secrets project](https://github.com/FIWARE-Ops/fiware-gitops#7-deploy-bitnamisealed-secrets). -In general, [created secrets](https://github.com/FIWARE-Ops/fiware-gitops#8-create-secrets) get encrypted before -pushing them to GitHub. - -For deployment of all sealed secrets, create the ArgoCD -app [i4trust-demo-secrets](../../apps/i4trust/i4trust-demo/i4trust-demo-secrets.yaml). - -Note, that the sealed-secrets within this repository can only be decrypted by the sealed-secrets -controller deployed at the FIWARE OpenShift cluster. When deploying on your own infrastructure, -you need to create your own sealed-secrets first, as described below for the different -components. - - - -## ConfigMaps - -ConfigMaps are used to store additional configuration data used by the components, or initial data -for databases and the Context Broker. - -For deployment of all ConfigMaps, create the ArgoCD -app [i4trust-demo-configmaps](../../apps/i4trust/i4trust-demo/i4trust-demo-configmaps.yaml). - - - -## Jobs - -Jobs are used to perform initialisation tasks, like creating initial entities at the Context Broker. - -For deployment of all jobs, create the ArgoCD -app [i4trust-demo-jobs](../../apps/i4trust/i4trust-demo/i4trust-demo-jobs.yaml). - - - - -## Databases - - -### MySQL - -MySQL is deployed with the t3n chart. - -To create an own secret, change to the secrets/ folder and create a -secret manifest `mysql-secret.manifest.yaml`: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: mysql-secret - namespace: i4trust-demo -data: - # Your base64 encoded root password - mysql-root-password: -``` - -Create a sealed secret with `kubeseal`: -```shell -kubeseal mysql-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Then create the corresponding ArgoCD app. - -During deployment, also all IDP users and applications are created within the DB. - - - -### MongoDB - -MongoDB is deployed with the bitnami chart. - -#### MongoDB root password -To create an own secret, change to the secrets/ folder and create a -secret manifest `mongodb-secret.manifest.yaml`: -```yaml -apiVersion: v1 -kind: Secret -metadata: - # name of the secret - name: mongodb-secret - # namespace the secret should be deployed to - important, sealed-secrets will check the namespace before decryption - namespace: i4trust-demo -data: - # the actual data, needs to be base64 encoded - mongodb-password: - mongodb-replica-set-key: - mongodb-root-password: -``` - -Create a sealed secret with `kubeseal`: -```shell -kubeseal mongodb-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### MongoDB user passwords for init-db scripts -Create a secret manifest `mongodb-envs-secret.manifest.yaml`: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: mongodb-envs-secret - namespace: i4trust-demo -data: - # Base64 encoded PW for charging user - MONGO_BAE_CHARGING_PW: - # Base64 encoded PW for belp user - MONGO_BAE_BELP_PW: -``` - -Create a sealed secret: -```shell -kubeseal mongodb-envs-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### App - -Then create the corresponding ArgoCD app for MongoDB. - -During deployment, external IDPs are added to the BAE Logic Proxy config. - - - -### elasticsearch - -No further configuration required. Just create the corresponding ArgoCD app. - - - - - - -## Marketplace - -The marketplace consists of the Business API Ecosystem (BAE) and its own Keyrock -instance. It will use the previously deployed databases. - - -### Keyrock - -#### Secret - -Create a Secret manifest `bae-keyrock-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-keyrock-secret - namespace: i4trust-demo -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-keyrock-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### App - -Create the corresponding ArgoCD app. - - -#### Create Application for marketplace in Keyrock - -An application was already created during deployment of the MySQL. - -The following values were used: -```yaml -Name: i4Trust Marketplace -Description: "Enter some description" -URL: https://i4trust-demo-bae.apps.fiware-dev-aws.fiware.dev -Callback-URL: http://i4trust-demo-bae.apps.fiware-dev-aws.fiware.dev/auth/fiware/callback -Grant-Type: "Authorization Code, Refresh Token" -``` -and the following roles: -```yaml -roles: - - admin - - orgAdmin - - seller - - customer -``` - - - - - - -### BAE - -The BAE consists of sifferent components running as separate services: -* TMForum APIs -* RSS -* Charging Backend -* Logic Proxy - -Each requires further configuration. - - -#### APIs - -Create a Secret manifest `bae-apis-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-apis-secret - namespace: i4trust-demo -data: - # Base64 encoded - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-apis-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### RSS - -Create a Secret manifest `bae-rss-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-rss-secret - namespace: i4trust-demo -data: - # Base64 encoded - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-rss-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### Charging Backend - -Create a Secret manifest `bae-cb-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-cb-secret - namespace: i4trust-demo -data: - # MongoDB charing user password - dbPassword: - # PayPal client secret - paypalClientSecret: - # Password of SMTP (dummy) - smtpPassword: - # IDP password for plugins (dummy) - pluginsIdmPassword: -``` -where `dbPassword` must match to the charging user password of the MongoDB. Dummys can be set with any base64 encoded string. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-cb-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `bae-cb-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-cb-cert-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - cert.pem: - key.pem: -``` -where the cert chain and key were issued to the marketplace. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-cb-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### Logic Proxy -Make sure, that in the BAE [values.yaml](./bae/values.yaml) the client ID is entered which was generated in the local Keyrock IDP application before. -This was inserted when the MySQL DB was deployed. - -Create a Secret manifest `bae-lp-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-lp-secret - namespace: i4trust-demo -data: - # MongoDB charing user password - dbPassword: - # OAuth2 client secret of local Keyrock IDP Application - oauthClientSecret: -``` -where `oauthClientSecret` is the client secret which was generated in the local Keyrock IDP application before (during MySQL deployment). - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-lp-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `bae-lp-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-lp-cert-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - cert.pem: - key.pem: -``` -where the cert chain and key were issued to the marketplace. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-lp-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD App - -Create the ArgoCD app [i4trust-demo-bae](../../apps/i4trust/i4trust-demo/i4trust-demo-bae.yaml). - - - -#### Plugins - -Plugins need to be installed on the charging backend after its deployment. - -In order to install a plugin, perform the following steps: - -Create zip file from plugin directory -```shell -zip -r my-plugin.zip my-plugin/ -``` - -Copy to plugin directory of charging backend pod -```shell -kubectl cp ./my-plugin.zip my-charging-backend-pod:/opt/business-ecosystem-charging-backend/src/plugins/. -``` - -Open shell in Pod and load plugin -```shell -kubectl exec --stdin --tty my-charging-backend-pod -- /bin/bash - -# Shell within pod: -root@my-charging-backend-pod:/business-ecosystem-charging-backend/src# ./manage.py loadplugin plugins/my-plugin.zip -``` - -In order to enable the creation of assets for data services in i4Trust, -the [bae-i4trust-service plugin](https://github.com/i4Trust/bae-i4trust-service) needs to be installed. - - - -### Usage - -The marketplace is accessible via the URL [https://marketplace.i4trust-demo.fiware.dev](https://marketplace.i4trust-demo.fiware.dev). - -The 'Local IDP' login option allows to login using the locally configured Keyrock IDP. In order to be able to perform administrative tasks on the -marketplace, a user on the local Keyrock instance must be authorized in the marketplace application with the admin role. - -As admin, one can also add further external IDPs, like for Packet Delivery or Happy Pets. The external (company) IDPs of -Packet Delivery, Happy Pets and No Cheaper have already been configured during deployment of the MongoDB. - - - - -## Packet Delivery Company - -The environment of Packet Delivery Company consists of: -* Keyrock IDP -* Orion-LD Context Broker -* Activation Service (in addition to Authorization Registry) -* PEP/PDP Gateway (Kong) - -An external Authorisation Registry is configured. Components are using -the previously deployed databases. - - - -### Keyrock - -#### Secrets - -Create a Secret manifest `pdc-keyrock-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-keyrock-secret - namespace: i4trust-demo -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-keyrock-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `pdc-keyrock-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-keyrock-cert-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-keyrock-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the ArgoCD app [i4trust-demo-pdc-keyrock](../../apps/i4trust/i4trust-demo/i4trust-demo-pdc-keyrock.yaml). - - - -### Orion - -#### Secret - -Create a Secret manifest `pdc-orion-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-orion-secret - namespace: i4trust-demo -data: - # MongoDB root user password - dbPassword: -``` -where `dbPassword` must match to the root password of the MongoDB. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-orion-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - -### Kong - -#### Secret - -Create a Secret manifest `pdc-kong-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-kong-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - FIWARE_JWS_X5C: - # Base64 encoded private key PEM - FIWARE_JWS_PRIVATE_KEY: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-kong-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - -### Activation Service - -The activation service is required, so that the marketplace is able to create policies at the AR of Packet Delivery. - -#### Secret - -Create a Secret manifest `pdc-as-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-as-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - AS_CLIENT_CRT: - # Base64 encoded private key PEM - AS_CLIENT_KEY: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-as-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - - -### Packet Delivery Service Portal - -The portal is a simple demo application, which showcases, how a login is performed via an external IDP in i4Trust, -and how requests are sent to a data service with an access token JWT. - -#### Secret - -Create a Secret manifest `pdc-portal-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-portal-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - PORTAL_CLIENT_CRT: - # Base64 encoded private key PEM - PORTAL_CLIENT_KEY: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-portal-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - - - - - -## Happy Pets - -The environment of Happy Pets consists of two instance of the Keyrock IDP. One is dedicated to company employees, the other instances is used -for the users of the shop. - - -### Keyrock (Company) - -#### Secrets - -Create a Secret manifest `happypets-keyrock-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: happypets-keyrock-secret - namespace: i4trust-demo -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal happypets-keyrock-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `happypets-keyrock-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: happypets-keyrock-cert-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal happypets-keyrock-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - -### Keyrock (Shop) - -#### Secrets - -Create a Secret manifest `happypets-keyrock-shop-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: happypets-keyrock-shop-secret - namespace: i4trust-demo -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal happypets-keyrock-shop-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `happypets-keyrock-shop-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: happypets-keyrock-shop-cert-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal happypets-keyrock-shop-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - - - - - - - -## No Cheaper - -The environment of No CHeaper consists of two instance of the Keyrock IDP. One is dedicated to company employees, the other instances is used -for the users of the shop. - - -### Keyrock (Company) - -#### Secret - -Create a Secret manifest `nocheaper-keyrock-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: nocheaper-keyrock-secret - namespace: i4trust-demo -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal nocheaper-keyrock-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `nocheaper-keyrock-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: nocheaper-keyrock-cert-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal nocheaper-keyrock-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - - - -### Keyrock (Shop) - -#### Secret - -Create a Secret manifest `nocheaper-keyrock-shop-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: nocheaper-keyrock-shop-secret - namespace: i4trust-demo -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal nocheaper-keyrock-shop-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `nocheaper-keyrock-shop-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: nocheaper-keyrock-shop-cert-secret - namespace: i4trust-demo -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal nocheaper-keyrock-shop-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - diff --git a/aws/i4trust/i4trust-demo/bae-keyrock/Chart.yaml b/aws/i4trust/i4trust-demo/bae-keyrock/Chart.yaml deleted file mode 100644 index a3c36a61..00000000 --- a/aws/i4trust/i4trust-demo/bae-keyrock/Chart.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v2 -name: keyrock -description: Chart holder for argo-cd - -type: application -version: 0.4.1 -appVersion: "i4trust-rc7" - -dependencies: - - name: keyrock - version: 0.4.1 - repository: https://fiware.github.io/helm-charts diff --git a/aws/i4trust/i4trust-demo/bae-keyrock/values.yaml b/aws/i4trust/i4trust-demo/bae-keyrock/values.yaml deleted file mode 100644 index 3488ac90..00000000 --- a/aws/i4trust/i4trust-demo/bae-keyrock/values.yaml +++ /dev/null @@ -1,51 +0,0 @@ -keyrock: - statefulset: - image: - repository: quay.io/fiware/idm - tag: i4trust-rc8 - #pullPolicy: Always - pullPolicy: IfNotPresent - - db: - user: root - host: i4trust-demo-mysql - - admin: - user: admin - email: dennis.wendland@fiware.org - - existingSecret: bae-keyrock-secret - - host: https://bae-keyrock.i4trust-demo.fiware.dev - - route: - enabled: true - #host: i4trust-demo-bae-keyrock.apps.fiware-dev-aws.fiware.dev - host: bae-keyrock.i4trust-demo.fiware.dev - tls: - termination: edge - insecureEdgeTerminationPolicy: Redirect - # should a certificate for the address automatically be generated - certificate: - issuer: - kind: ClusterIssuer - name: letsencrypt-aws-prod - - additionalEnvVars: - - name: IDM_TITLE - value: i4Trust Marketplace IDP (DEMO) - - name: IDM_DEBUG - value: "true" - - name: DEBUG - value: "*" - - name: IDM_DB_NAME - value: i4trust_demo_bae_idm - - name: IDM_DB_SEED - value: "true" - - name: IDM_EMAIL_HOST - value: "mailgun-fiware-io.infra.svc.cluster.local" - - name: IDM_EMAIL_PORT - value: "25" - - name: IDM_EMAIL_ADDRESS - value: "bae-keyrock@fiware.io" - diff --git a/aws/i4trust/i4trust-demo/bae/Chart.yaml b/aws/i4trust/i4trust-demo/bae/Chart.yaml deleted file mode 100644 index f2756fb3..00000000 --- a/aws/i4trust/i4trust-demo/bae/Chart.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v2 -name: bae -description: Chart holder for argo-cd - -type: application -version: 0.4.6 -appVersion: "7.9.0" - -dependencies: - - name: business-api-ecosystem - version: 0.4.6 - repository: https://fiware.github.io/helm-charts diff --git a/aws/i4trust/i4trust-demo/bae/values.yaml b/aws/i4trust/i4trust-demo/bae/values.yaml deleted file mode 100644 index 060500dd..00000000 --- a/aws/i4trust/i4trust-demo/bae/values.yaml +++ /dev/null @@ -1,272 +0,0 @@ -business-api-ecosystem: - openshift: true - - ## Marketplace OAuth and IdM configuration - ## - oauth: - # URL of the FIWARE IDM used for user authentication - server: https://bae-keyrock.i4trust-demo.fiware.dev/ - # OAuth2 Client ID of the BAE applicaiton - clientId: b76b7b93-851b-4c00-8e9b-8963464ce63d - - ## External URL used to access the BAE frontend (logic proxy) - ## Should match the host of the Ingress or Route of the Logic Proxy - ## - externalUrl: https://marketplace.i4trust-demo.fiware.dev - - ## Configuration for biz-ecosystem-apis component - ## - bizEcosystemApis: - ## Service account - serviceAccount: - create: false - name: i4trust-demo-root-runner - - ## Security context - securityContext: - ## -- specifies the user UID - runAsUser: 0 - ## -- specifies the group GID - runAsGroup: 0 - - # Existing Secret - existingSecret: bae-apis-secret - - ## -- deployment specific configuration - deployment: - ## -- configuration of the image to be used - image: - ## -- BAE APIs image name - ## ref: https://hub.docker.com/r/fiware/biz-ecosystem-apis - repository: quay.io/fiware/biz-ecosystem-apis - ## -- tag of the image to be used - tag: v8.0.0 - ## -- specification of the image pull policy - pullPolicy: IfNotPresent - - ## port that the APIs container uses - port: 8080 - - ## database configuration for APIs - db: - ## host of the database to be used - host: i4trust-demo-mysql - - ## Configuration for biz-ecosystem-rss component - ## - bizEcosystemRss: - ## Service account - serviceAccount: - create: false - name: i4trust-demo-root-runner - - ## Security context - securityContext: - ## -- specifies the user UID - runAsUser: 0 - ## -- specifies the group GID - runAsGroup: 0 - - # Existing Secret - existingSecret: bae-rss-secret - - ## -- deployment specific configuration - deployment: - ## -- configuration of the image to be used - image: - ## -- BAE RSS image name - ## ref: https://hub.docker.com/r/fiware/biz-ecosystem-rss - repository: quay.io/fiware/biz-ecosystem-rss - ## -- tag of the image to be used - tag: v8.0.0 - ## -- specification of the image pull policy - pullPolicy: IfNotPresent - - ## port that the RSS container uses - port: 8080 - - ## database configuration for RSS - db: - ## host of the database to be used - host: i4trust-demo-mysql - ## URL connection string of the database to be used - url: jdbc:mysql://i4trust-demo-mysql:3306/RSS - - ## Configuration for biz-ecosystem-charging-backend component - ## - bizEcosystemChargingBackend: - ## Service account - serviceAccount: - create: false - name: i4trust-demo-root-runner - - ## Security context - securityContext: - ## -- specifies the user UID - runAsUser: 0 - ## -- specifies the group GID - runAsGroup: 0 - - # Existing Secret - existingSecret: bae-cb-secret - existingCertSecret: bae-cb-cert-secret - - ## -- deployment specific configuration - deployment: - ## -- configuration of the image to be used - image: - ## -- BAE Charging backend image name - repository: quay.io/fiware/biz-ecosystem-charging-backend - ## -- tag of the image to be used - tag: 8.1.0-pre-5 - ## -- specification of the image pull policy - pullPolicy: Always - #pullPolicy: Always - - ## -- PVC configuration for charging backend plugins - plugins: - ## -- Enable the PVC for plugins storage - enabled: true - ## -- Annotations - annotations: - helm.sh/resource-policy: "keep" - - ## port that the charging backend container uses - port: 8006 - - # -- Loglevel - loglevel: debug - - ## payment configuration - payment: - ## method: paypal or None (testing mode payment disconected) - method: paypal - - ## Paypal Oauth2 configuration - paypal: - ## Paypal Client-ID - clientId: ASvDFneqaHm0rLuQwilCgZiBw9PGpXVX4r34X7rLBorqYpGjNR3yQL2RJ9kWDVbIiHm3nuPprN1CVjP7 - - ## database configuration for Charging backend (MongoDB) - db: - ## host of the database to be used - host: i4trust-demo-mongodb.i4trust-demo.svc.cluster.local - ## Database name for connecting the database - database: charging_db - ## username for connecting the database - user: charging - - # -- Sets wehther to expect the user access token in each request from the logic proxy - propagateToken: false - - # -- Maximum asset upload size (in MB) - maxUploadSize: 428800 - - ## -- Configuration of local key and certificate for validation and generation of tokens - token: - enabled: true - identifier: "EU.EORI.NLMARKETPLA" - - ## Configuration for biz-ecosystem-logic-proxy component - ## - bizEcosystemLogicProxy: - ## Service account - serviceAccount: - create: false - name: i4trust-demo-root-runner - - ## Security context - securityContext: - ## -- specifies the user UID - runAsUser: 0 - ## -- specifies the group GID - runAsGroup: 0 - - # Existing Secret - existingSecret: bae-lp-secret - existingCertSecret: bae-lp-cert-secret - - ## -- statefulset specific configuration - statefulset: - ## -- configuration of the image to be used - image: - ## -- BAE Logic Proxy image name - ## ref: https://hub.docker.com/r/fiware/biz-ecosystem-logic-proxy - repository: quay.io/fiware/biz-ecosystem-logic-proxy - ## -- tag of the image to be used - tag: 8.1.0-pre - ## -- specification of the image pull policy - pullPolicy: Always - #pullPolicy: Always - - ## openshift specific route definition. Will not work on plain k8s - route: - ## -- should the deployment create openshift routes - enabled: true - # -- Hostname - host: marketplace.i4trust-demo.fiware.dev - # -- tls configuration for the route - tls: - termination: edge - insecureEdgeTerminationPolicy: Redirect - certificate: - issuer: - kind: ClusterIssuer - name: letsencrypt-aws-prod - - ## port that the logic proxy container uses - port: 8004 - - ## Deployment in development or in production - nodeEnvironment: production - - ## database configuration for Logic Proxy (MongoDB) - db: - # host of the database to be used - host: i4trust-demo-mongodb.i4trust-demo.svc.cluster.local - # Database name for connecting the database - database: belp_db - # username for connecting the database - user: belp - - ## -- elasticsearch configuration - elastic: - ## -- indexing engine of logic proxy - engine: elasticsearch - ## -- URL of elasticsearch service - url: elasticsearch-master.i4trust-demo.svc.cluster.local:9200 - ## -- API version of elasticsearch - version: 7.5 - - ## -- Custom theme configuration - theme: - ## -- Enable theme - enabled: true - ## -- Name of the theme - name: i4trust - ## -- Size of PVC to be created - size: 4Gi - ## Image which holds the theme files - image: i4trust/bae-i4trust-theme:1.0.1 - # -- specification of the image pull policy - imagePullPolicy: Always - ## Path to the source theme files inside the container - # Files will be copied to /themes/{{name}} with the PVC mounted at /themes - sourcePath: /bae-i4trust-theme - - ## -- Configuration for external IDPs - externalIdp: - # -- Enable usage of external IDPs - enabled: true - # -- Show login button for local IDP - showLocalLogin: true - - # -- Sets wehther the logic proxy should propagate the user access token to the backend components - propagateToken: false - - ## -- Configuration of local key and certificate for validation and generation of tokens - token: - enabled: true - identifier: "EU.EORI.NLMARKETPLA" - - diff --git a/aws/i4trust/i4trust-demo/configmaps/mongodb-configmap.yaml b/aws/i4trust/i4trust-demo/configmaps/mongodb-configmap.yaml deleted file mode 100644 index b8dd4274..00000000 --- a/aws/i4trust/i4trust-demo/configmaps/mongodb-configmap.yaml +++ /dev/null @@ -1,78 +0,0 @@ -apiVersion: v1 -kind: ConfigMap -metadata: - name: mongodb-configmap - namespace: i4trust-demo -data: - init-db.sh: | - mongo < -``` - - - - -## ServiceAccount - -Some applications need root priviliges. They have to use the ServiceAccount created with the manifest -[./serviceaccounts/i4trust-dev-root-runner.yaml](./serviceaccounts/i4trust-dev-root-runner.yaml). -For this, first create the app -[i4trust-dev-serviceaccounts](../../apps/i4trust/i4trust-dev/i4trust-dev-serviceaccounts.yaml). - -When the ServiceAccount was created within the namespace, add it to the privileged users: -```shell -oc edit scc privileged -``` -In the open editor, add the new service account under `users:`, e.g. -```yaml -users: -- system:admin -- ... -- system:serviceaccount:i4trust-dev:i4trust-dev-root-runner -- ... -``` - -In case of an error when patching, there was a `yaml` file created under `/tmp`. Enforce the replacement by e.g. -```shell -oc replace -f /tmp/oc-edit-pzvsn.yaml -``` - - -## Secrets - -In the following, several secrets are created using the -[sealed-secrets project](https://github.com/FIWARE-Ops/fiware-gitops#7-deploy-bitnamisealed-secrets). -In general, [created secrets](https://github.com/FIWARE-Ops/fiware-gitops#8-create-secrets) get encrypted before -pushing them to GitHub. - -For deployment of all sealed secrets, create the ArgoCD -app [i4trust-dev-secrets](../../apps/i4trust/i4trust-dev/i4trust-dev-secrets.yaml). - -Note, that the sealed-secrets within this repository can only be decrypted by the sealed-secrets -controller deployed at the FIWARE OpenShift cluster. When deploying on your own infrastructure, -you need to create your own sealed-secrets first, as described below for the different -components. - - - -## ConfigMaps - -ConfigMaps are used to store additional configuration data used by the components, or initial data -for databases and the Context Broker. - -For deployment of all ConfigMaps, create the ArgoCD -app [i4trust-dev-configmaps](../../apps/i4trust/i4trust-dev/i4trust-dev-configmaps.yaml). - - - -## Jobs - -Jobs are used to perform initialisation tasks, like creating initial entities at the Context Broker. - -For deployment of all jobs, create the ArgoCD -app [i4trust-dev-jobs](../../apps/i4trust/i4trust-dev/i4trust-dev-jobs.yaml). - - - - -## Databases - - -### MySQL - -MySQL is deployed with the t3n chart. - -To create an own secret, change to the secrets/ folder and create a -secret manifest `mysql-secret.manifest.yaml`: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: mysql-secret - namespace: i4trust-dev -data: - # Your base64 encoded root password - mysql-root-password: -``` - -Create a sealed secret with `kubeseal`: -```shell -kubeseal mysql-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Then create the corresponding ArgoCD app. - - - -### MongoDB - -MongoDB is deployed with the bitnami chart. - -#### MongoDB root password -To create an own secret, change to the secrets/ folder and create a -secret manifest `mongodb-secret.manifest.yaml`: -```yaml -apiVersion: v1 -kind: Secret -metadata: - # name of the secret - name: mongodb-secret - # namespace the secret should be deployed to - important, sealed-secrets will check the namespace before decryption - namespace: i4trust-dev -data: - # the actual data, needs to be base64 encoded - mongodb-password: - mongodb-replica-set-key: - mongodb-root-password: -``` - -Create a sealed secret with `kubeseal`: -```shell -kubeseal mongodb-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### MongoDB user passwords for init-db scripts -Create a secret manifest `mongodb-envs-secret.manifest.yaml`: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: mongodb-envs-secret - namespace: i4trust-dev -data: - # Base64 encoded PW for charging user - MONGO_BAE_CHARGING_PW: - # Base64 encoded PW for belp user - MONGO_BAE_BELP_PW: -``` - -Create a sealed secret: -```shell -kubeseal mongodb-envs-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### App - -Then create the corresponding ArgoCD app for MongoDB. - - - -### elasticsearch - -No further configuration required. Just create the corresponding ArgoCD app. - - - -## Satellite - -The trust anchor satellite is based on the iSHARE Satellite, and is required to ensure trust among all -participants of the data space. - - -### Secret - -Create a Secret manifest `satellite-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: satellite-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - SATELLITE_CERTS: - # Base64 encoded private key PEM - SATELLITE_KEY: -``` -where the cert chain and key were created and issued for the satellite - -Create a sealed secret with `kubeseal`: -```shell -kubeseal satellite-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -### ArgoCD app - -Create the corresponding ArgoCD app - - - -## Marketplace - -The marketplace consists of the Business API Ecosystem (BAE) and its own Keyrock -instance. It will use the previously deployed databases. - - -### Keyrock - -#### Secret - -Create a Secret manifest `bae-keyrock-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-keyrock-secret - namespace: i4trust-dev -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-keyrock-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### App - -Create the corresponding ArgoCD app. - - -#### Create Application for marketplace in Keyrock - -Login on [Keyrock](https://i4trust-dev-bae-keyrock.apps.fiware-dev-aws.fiware.dev/) with the admin credentials and create a new application. - -Fill in the following values: -```yaml -Name: i4Trust Marketplace -Description: "Enter some description" -URL: https://i4trust-dev-bae.apps.fiware-dev-aws.fiware.dev -Callback-URL: http://i4trust-dev-bae.apps.fiware-dev-aws.fiware.dev/auth/fiware/callback -Grant-Type: "Authorization Code, Refresh Token" -``` -and add the follwing roles: -```yaml -roles: - - admin - - orgAdmin - - seller - - customer -``` - -When the application was created, note down the client ID and client secret. - - - - -### BAE - -The BAE consists of sifferent components running as separate services: -* TMForum APIs -* RSS -* Charging Backend -* Logic Proxy - -Each requires further configuration. - - -#### APIs - -Create a Secret manifest `bae-apis-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-apis-secret - namespace: i4trust-dev -data: - # Base64 encoded - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-apis-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### RSS - -Create a Secret manifest `bae-rss-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-rss-secret - namespace: i4trust-dev -data: - # Base64 encoded - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-rss-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### Charging Backend - -Create a Secret manifest `bae-cb-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-cb-secret - namespace: i4trust-dev -data: - # MongoDB charing user password - dbPassword: - # PayPal client secret - paypalClientSecret: - # Password of SMTP (dummy) - smtpPassword: - # IDP password for plugins (dummy) - pluginsIdmPassword: -``` -where `dbPassword` must match to the charging user password of the MongoDB. Dummys can be set with any base64 encoded string. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-cb-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `bae-cb-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-cb-cert-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - cert.pem: - key.pem: -``` -where the cert chain and key were issued to the marketplace. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-cb-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### Logic Proxy -Make sure, that in the BAE [values.yaml](./bae/values.yaml) the client ID is entered which was generated in the local Keyrock IDP application before. - -Create a Secret manifest `bae-lp-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-lp-secret - namespace: i4trust-dev -data: - # MongoDB charing user password - dbPassword: - # OAuth2 client secret of local Keyrock IDP Application - oauthClientSecret: -``` -where `oauthClientSecret` is the client secret which was generated in the local Keyrock IDP application before. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-lp-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `bae-lp-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: bae-lp-cert-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - cert.pem: - key.pem: -``` -where the cert chain and key were issued to the marketplace. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal bae-lp-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD App - -Create the ArgoCD app [i4trust-dev-bae](../../apps/i4trust/i4trust-dev/i4trust-dev-bae.yaml). - - - -#### Plugins - -Plugins need to be installed on the charging backend after its deployment. - -In order to install a plugin, perform the following steps: - -Create zip file from plugin directory -```shell -zip -r my-plugin.zip my-plugin/ -``` - -Copy to plugin directory of charging backend pod -```shell -kubectl cp ./my-plugin.zip my-charging-backend-pod:/opt/business-ecosystem-charging-backend/src/plugins/. -``` - -Open shell in Pod and load plugin -```shell -kubectl exec --stdin --tty my-charging-backend-pod -- /bin/bash - -# Shell within pod: -root@my-charging-backend-pod:/business-ecosystem-charging-backend/src# ./manage.py loadplugin plugins/my-plugin.zip -``` - -In order to enable the creation of assets for data services in i4Trust, -the [bae-i4trust-service plugin](https://github.com/i4Trust/bae-i4trust-service) needs to be installed. - - - -### Usage - -The marketplace is accessible via the URL [https://i4trust-dev-bae.apps.fiware-dev-aws.fiware.dev/](https://i4trust-dev-bae.apps.fiware-dev-aws.fiware.dev/). - -The 'Local IDP' login option allows to login using the locally configured Keyrock IDP. In order to be able to perform administrative tasks on the -marketplace, a user on the local Keyrock instance must be authorized in the marketplace application with the admin role. - -As admin, one can also add further external IDPs, like for Packet Delivery or Happy Pets. - - - - -## Packet Delivery Company - -The environment of Packet Delivery Company consists of: -* Keyrock IDP -* Orion-LD Context Broker -* Activation Service (in addition to Authorization Registry) -* PEP/PDP Gateway (Kong) - -An external Authorisation Registry is configured. Components are using -the previously deployed databases. - - - -### Keyrock - -#### Secrets - -Create a Secret manifest `pdc-keyrock-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-keyrock-secret - namespace: i4trust-dev -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-keyrock-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `pdc-keyrock-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-keyrock-cert-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-keyrock-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the ArgoCD app [i4trust-dev-pdc-keyrock](../../apps/i4trust/i4trust-dev/i4trust-dev-pdc-keyrock.yaml). - - - -### Orion - -#### Secret - -Create a Secret manifest `pdc-orion-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-orion-secret - namespace: i4trust-dev -data: - # MongoDB root user password - dbPassword: -``` -where `dbPassword` must match to the root password of the MongoDB. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-orion-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - -### Kong - -#### Secret - -Create a Secret manifest `pdc-kong-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-kong-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - FIWARE_JWS_X5C: - # Base64 encoded private key PEM - FIWARE_JWS_PRIVATE_KEY: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-kong-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - -### Activation Service - -The activation service is required, so that the marketplace is able to create policies at the AR of Packet Delivery. - -#### Secret - -Create a Secret manifest `pdc-as-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-as-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - AS_CLIENT_CRT: - # Base64 encoded private key PEM - AS_CLIENT_KEY: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-as-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - - -### Packet Delivery Service Portal - -The portal is a simple demo application, which showcases, how a login is performed via an external IDP in i4Trust, -and how requests are sent to a data service with an access token JWT. - -#### Secret - -Create a Secret manifest `pdc-portal-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: pdc-portal-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - PORTAL_CLIENT_CRT: - # Base64 encoded private key PEM - PORTAL_CLIENT_KEY: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal pdc-portal-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - - - - - -## Happy Pets - -The environment of Happy Pets consists of two instance of the Keyrock IDP. One is dedicated to company employees, the other instances is used -for the users of the shop. - - -### Keyrock (Company) - -#### Secrets - -Create a Secret manifest `happypets-keyrock-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: happypets-keyrock-secret - namespace: i4trust-dev -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal happypets-keyrock-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `happypets-keyrock-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: happypets-keyrock-cert-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal happypets-keyrock-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - -### Keyrock (Shop) - -#### Secrets - -Create a Secret manifest `happypets-keyrock-shop-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: happypets-keyrock-shop-secret - namespace: i4trust-dev -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal happypets-keyrock-shop-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `happypets-keyrock-shop-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: happypets-keyrock-shop-cert-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal happypets-keyrock-shop-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - -#### Add as external IDP to BAE - -The Keyrock company instance should be added as external IDP to the marketplace. - -Login as admin on the BAE and open the administrative UI. - -Add an external IDP with the EORI of Happy Pets and the hostname of the company Keyrock -IDP ([https://i4trust-dev-happypets-keyrock.apps.fiware-dev-aws.fiware.dev](https://i4trust-dev-happypets-keyrock.apps.fiware-dev-aws.fiware.dev)). - - - - - - -## No Cheaper - -The environment of No CHeaper consists of two instance of the Keyrock IDP. One is dedicated to company employees, the other instances is used -for the users of the shop. - - -### Keyrock (Company) - -#### Secret - -Create a Secret manifest `nocheaper-keyrock-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: nocheaper-keyrock-secret - namespace: i4trust-dev -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal nocheaper-keyrock-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `nocheaper-keyrock-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: nocheaper-keyrock-cert-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal nocheaper-keyrock-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - - - -### Keyrock (Shop) - -#### Secret - -Create a Secret manifest `nocheaper-keyrock-shop-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: nocheaper-keyrock-shop-secret - namespace: i4trust-dev -data: - # Base64 encoded - adminPassword: - dbPassword: -``` -where `dbPassword` must match to the root password of the MySQL. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal nocheaper-keyrock-shop-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - -Create a Secret manifest `nocheaper-keyrock-shop-cert-secret.manifest.yaml` in the secrets/ folder: -```yaml -apiVersion: v1 -kind: Secret -metadata: - name: nocheaper-keyrock-shop-cert-secret - namespace: i4trust-dev -data: - # Base64 encoded cert chain PEM - cert: - # Base64 encoded private key PEM - key: -``` -where the cert chain and key were issued to the Packet Delivery Company. - -Create a sealed secret with `kubeseal`: -```shell -kubeseal nocheaper-keyrock-shop-cert-sealed-secret.yaml -o yaml --controller-namespace sealed-secrets --controller-name sealed-secrets -``` - - -#### ArgoCD app - -Create the corresponding ArgoCD app - - - -#### Add as external IDP to BAE - -The Keyrock company instance should be added as external IDP to the marketplace. - -Login as admin on the BAE and open the administrative UI. - -Add an external IDP with the EORI of No CHeaper and the hostname of the company Keyrock -IDP ([https://i4trust-dev-nocheaper-keyrock.apps.fiware-dev-aws.fiware.dev](https://i4trust-dev-nocheaper-keyrock.apps.fiware-dev-aws.fiware.dev)). diff --git a/aws/i4trust/i4trust-dev/bae-keyrock/Chart.yaml b/aws/i4trust/i4trust-dev/bae-keyrock/Chart.yaml deleted file mode 100644 index fe34548a..00000000 --- a/aws/i4trust/i4trust-dev/bae-keyrock/Chart.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v2 -name: keyrock -description: Chart holder for argo-cd - -type: application -version: 0.2.3 -appVersion: "i4trust-rc7" - -dependencies: - - name: keyrock - version: 0.2.3 - repository: https://fiware.github.io/helm-charts diff --git a/aws/i4trust/i4trust-dev/bae-keyrock/README.md b/aws/i4trust/i4trust-dev/bae-keyrock/README.md deleted file mode 100644 index df29ecd1..00000000 --- a/aws/i4trust/i4trust-dev/bae-keyrock/README.md +++ /dev/null @@ -1,4 +0,0 @@ -# Keyrock of BAE Marketplace instance - -Keyrock instance of the BAE Marketplace for e.g. admin login and local users. - diff --git a/aws/i4trust/i4trust-dev/bae-keyrock/values.yaml b/aws/i4trust/i4trust-dev/bae-keyrock/values.yaml deleted file mode 100644 index 96740fdb..00000000 --- a/aws/i4trust/i4trust-dev/bae-keyrock/values.yaml +++ /dev/null @@ -1,40 +0,0 @@ -keyrock: - statefulset: - image: - repository: quay.io/fiware/idm - tag: i4trust-rc8 - - db: - user: root - host: i4trust-dev-mysql - - admin: - user: admin - email: dennis.wendland@fiware.org - - existingSecret: bae-keyrock-secret - - route: - enabled: true - host: i4trust-dev-bae-keyrock.apps.fiware-dev-aws.fiware.dev - tls: - termination: edge - - additionalEnvVars: - - name: IDM_TITLE - value: i4Trust Marketplace IDP (DEV) - - name: IDM_DEBUG - value: "true" - - name: DEBUG - value: "*" - - name: IDM_DB_NAME - value: i4trust_dev_bae_idm - - name: IDM_DB_SEED - value: "true" - - name: IDM_EMAIL_HOST - value: "mailgun-fiware-io.infra.svc.cluster.local" - - name: IDM_EMAIL_PORT - value: "25" - - name: IDM_EMAIL_ADDRESS - value: "bae-keyrock@fiware.io" - diff --git a/aws/i4trust/i4trust-dev/bae/Chart.yaml b/aws/i4trust/i4trust-dev/bae/Chart.yaml deleted file mode 100644 index 92b777fa..00000000 --- a/aws/i4trust/i4trust-dev/bae/Chart.yaml +++ /dev/null @@ -1,12 +0,0 @@ -apiVersion: v2 -name: bae -description: Chart holder for argo-cd - -type: application -version: 0.3.1 -appVersion: "8.0.0" - -dependencies: - - name: business-api-ecosystem - version: 0.3.1 - repository: https://fiware.github.io/helm-charts diff --git a/aws/i4trust/i4trust-dev/bae/values.yaml b/aws/i4trust/i4trust-dev/bae/values.yaml deleted file mode 100644 index 1d2294be..00000000 --- a/aws/i4trust/i4trust-dev/bae/values.yaml +++ /dev/null @@ -1,266 +0,0 @@ -business-api-ecosystem: - ## Marketplace OAuth and IdM configuration - ## - oauth: - # URL of the FIWARE IDM used for user authentication - server: https://i4trust-dev-bae-keyrock.apps.fiware-dev-aws.fiware.dev - # OAuth2 Client ID of the BAE applicaiton - clientId: 700027bb-bea0-4b3a-acbe-36f5ddb45fa7 - - ## External URL used to access the BAE frontend (logic proxy) - ## Should match the host of the Ingress or Route of the Logic Proxy - ## - externalUrl: https://i4trust-dev-bae.apps.fiware-dev-aws.fiware.dev - - ## Configuration for biz-ecosystem-apis component - ## - bizEcosystemApis: - ## Service account - serviceAccount: - create: false - name: i4trust-dev-root-runner - - ## Security context - securityContext: - ## -- specifies the user UID - runAsUser: 0 - ## -- specifies the group GID - runAsGroup: 0 - - # Existing Secret - existingSecret: bae-apis-secret - - ## -- deployment specific configuration - deployment: - ## -- configuration of the image to be used - image: - ## -- BAE APIs image name - ## ref: https://hub.docker.com/r/fiware/biz-ecosystem-apis - repository: quay.io/fiware/biz-ecosystem-apis - ## -- tag of the image to be used - tag: v8.1.0-rc1 - ## -- specification of the image pull policy - pullPolicy: IfNotPresent - - ## port that the APIs container uses - port: 8080 - - ## database configuration for APIs - db: - ## host of the database to be used - host: i4trust-dev-mysql - - ## Configuration for biz-ecosystem-rss component - ## - bizEcosystemRss: - ## Service account - serviceAccount: - create: false - name: i4trust-dev-root-runner - - ## Security context - securityContext: - ## -- specifies the user UID - runAsUser: 0 - ## -- specifies the group GID - runAsGroup: 0 - - # Existing Secret - existingSecret: bae-rss-secret - - ## -- deployment specific configuration - deployment: - ## -- configuration of the image to be used - image: - ## -- BAE RSS image name - ## ref: https://hub.docker.com/r/fiware/biz-ecosystem-rss - repository: quay.io/fiware/biz-ecosystem-rss - ## -- tag of the image to be used - tag: v8.0.0 - ## -- specification of the image pull policy - pullPolicy: IfNotPresent - - ## port that the RSS container uses - port: 8080 - - ## database configuration for RSS - db: - ## host of the database to be used - host: i4trust-dev-mysql - ## URL connection string of the database to be used - url: jdbc:mysql://i4trust-dev-mysql:3306/RSS - - ## Configuration for biz-ecosystem-charging-backend component - ## - bizEcosystemChargingBackend: - ## Service account - serviceAccount: - create: false - name: i4trust-dev-root-runner - - ## Security context - securityContext: - ## -- specifies the user UID - runAsUser: 0 - ## -- specifies the group GID - runAsGroup: 0 - - # Existing Secret - existingSecret: bae-cb-secret - existingCertSecret: bae-cb-cert-secret - - ## -- deployment specific configuration - deployment: - ## -- configuration of the image to be used - image: - ## -- BAE Charging backend image name - ## ref: https://hub.docker.com/r/fiware/biz-ecosystem-charging-backend - repository: quay.io/fiware/biz-ecosystem-charging-backend - ## -- tag of the image to be used - tag: v8.1.0-dev - ## -- specification of the image pull policy - pullPolicy: IfNotPresent - #pullPolicy: Always - - ## -- PVC configuration for charging backend plugins - plugins: - ## -- Enable the PVC for plugins storage - enabled: true - ## -- Annotations - annotations: - helm.sh/resource-policy: "keep" - - ## port that the charging backend container uses - port: 8006 - - # -- Loglevel - loglevel: debug - - ## payment configuration - payment: - ## method: paypal or None (testing mode payment disconected) - method: paypal - - ## Paypal Oauth2 configuration - paypal: - ## Paypal Client-ID - clientId: AcpWBNZUGQ3fUgG3nG54xMonW7E5gwXUANpyrap1g-E6KzvwEpy-X_8TPJXvM68HgMm_jW2kjkiRvb_x - - ## database configuration for Charging backend (MongoDB) - db: - ## host of the database to be used - host: i4trust-dev-mongodb.i4trust-dev.svc.cluster.local - ## Database name for connecting the database - database: charging_db - ## username for connecting the database - user: charging - - # -- Sets wehther to expect the user access token in each request from the logic proxy - propagateToken: false - - # -- Maximum asset upload size (in MB) - maxUploadSize: 428800 - - ## -- Configuration of local key and certificate for validation and generation of tokens - token: - enabled: true - identifier: "EU.EORI.NLMARKETPLA" - - ## Configuration for biz-ecosystem-logic-proxy component - ## - bizEcosystemLogicProxy: - ## Service account - serviceAccount: - create: false - name: i4trust-dev-root-runner - - ## Security context - securityContext: - ## -- specifies the user UID - runAsUser: 0 - ## -- specifies the group GID - runAsGroup: 0 - - # Existing Secret - existingSecret: bae-lp-secret - existingCertSecret: bae-lp-cert-secret - - ## -- statefulset specific configuration - statefulset: - ## -- configuration of the image to be used - image: - ## -- BAE Logic Proxy image name - ## ref: https://hub.docker.com/r/fiware/biz-ecosystem-logic-proxy - repository: quay.io/fiware/biz-ecosystem-logic-proxy - ## -- tag of the image to be used - tag: v8.1.0-dev - ## -- specification of the image pull policy - #pullPolicy: Always - pullPolicy: IfNotPresent - - ## openshift specific route definition. Will not work on plain k8s - route: - ## -- should the deployment create openshift routes - enabled: true - # -- Hostname - host: i4trust-dev-bae.apps.fiware-dev-aws.fiware.dev - # -- tls configuration for the route - tls: - termination: edge - - ## port that the logic proxy container uses - port: 8004 - - ## Deployment in development or in production - nodeEnvironment: production - - ## database configuration for Logic Proxy (MongoDB) - db: - # host of the database to be used - host: i4trust-dev-mongodb.i4trust-dev.svc.cluster.local - # Database name for connecting the database - database: belp_db - # username for connecting the database - user: belp - - ## -- elasticsearch configuration - elastic: - ## -- indexing engine of logic proxy - engine: elasticsearch - ## -- URL of elasticsearch service - url: elasticsearch-master.i4trust-dev.svc.cluster.local:9200 - ## -- API version of elasticsearch - version: 7.5 - - ## -- Custom theme configuration - theme: - ## -- Enable theme - enabled: true - ## -- Name of the theme - name: i4trust - ## -- Size of PVC to be created - size: 4Gi - ## Image which holds the theme files - image: i4trust/bae-i4trust-theme:1.0.1 - # -- specification of the image pull policy - imagePullPolicy: Always - ## Path to the source theme files inside the container - # Files will be copied to /themes/{{name}} with the PVC mounted at /themes - sourcePath: /bae-i4trust-theme - - ## -- Configuration for external IDPs - externalIdp: - # -- Enable usage of external IDPs - enabled: true - # -- Show login button for local IDP - showLocalLogin: true - - # -- Sets wehther the logic proxy should propagate the user access token to the backend components - propagateToken: false - - ## -- Configuration of local key and certificate for validation and generation of tokens - token: - enabled: true - identifier: "EU.EORI.NLMARKETPLA" - - diff --git a/aws/i4trust/i4trust-dev/configmaps/mongodb-configmap.yaml b/aws/i4trust/i4trust-dev/configmaps/mongodb-configmap.yaml deleted file mode 100644 index 83193fcd..00000000 --- a/aws/i4trust/i4trust-dev/configmaps/mongodb-configmap.yaml +++ /dev/null @@ -1,42 +0,0 @@ -apiVersion: v1 -kind: ConfigMap -metadata: - name: mongodb-configmap - namespace: i4trust-dev -data: - init-db.sh: | - mongo <