controllers: main: enabled: true type: deployment replicas: 1 # initContainers: # migrate: # image: # repository: gitea.corredorconect.com/software-engineering/policy-service # tag: '{{ $.Chart.AppVersion }}' # command: # - /bin/sh # - -c # - "/opt/policy_service/bin/policy_service eval 'Mix.Tasks.Ecto.Create.run([])' --no-start && /opt/policy_service/bin/policy_service eval 'Mix.Tasks.Ecto.Migrate.run([])' --no-start && /opt/policy_service/bin/policy_service eval 'Mix.Tasks.EventStore.Create.run([])' --no-start && /opt/policy_service/bin/policy_service eval 'Mix.Tasks.EventStore.Init.run([])' --no-start" # env: # MIX_ENV: prod # DATABASE_URL: # valueFrom: # secretKeyRef: # name: policy-service-pg-app # key: uri containers: main: image: repository: gitea.corredorconect.com/software-engineering/policy-service tag: '{{ $.Chart.AppVersion }}' env: LOG_LEVEL: debug MIX_ENV: prod PORT: "8080" PHX_HOST: "0.0.0.0" AMQP_URL: valueFrom: secretKeyRef: name: rabbitmq-default-user key: connection_string RELEASE_COOKIE: valueFrom: secretKeyRef: name: '{{ include "bjw-s.common.lib.chart.names.fullname" $ }}-secrets' key: cookie SECRET_KEY_BASE: valueFrom: secretKeyRef: name: '{{ include "bjw-s.common.lib.chart.names.fullname" $ }}-secrets' key: secretKeyBase DATABASE_URL: valueFrom: secretKeyRef: name: policy-service-cluster-pg-app key: uri probes: liveness: enabled: true custom: true spec: httpGet: path: /health port: 8080 initialDelaySeconds: 30 periodSeconds: 10 readiness: enabled: true custom: true spec: httpGet: path: /health/ready port: 8080 initialDelaySeconds: 5 periodSeconds: 5 resources: requests: cpu: 100m memory: 256Mi limits: cpu: 500m memory: 512Mi service: main: enabled: true controller: main primary: true type: ClusterIP ports: http: enabled: true primary: true port: 8080 protocol: HTTP rawResources: password-generator: enabled: true apiVersion: generators.external-secrets.io/v1alpha1 kind: Password suffix: password-generator spec: spec: length: 32 noUpper: false allowRepeat: true secretKeys: - cookie - secretKeyBase external-secret: enabled: true apiVersion: external-secrets.io/v1 kind: ExternalSecret suffix: secrets spec: spec: refreshInterval: 0s secretStoreRef: name: cluster-secrets-store kind: ClusterSecretStore target: name: '{{ include "bjw-s.common.lib.chart.names.fullname" $ }}-secrets' creationPolicy: Owner dataFrom: - sourceRef: generatorRef: apiVersion: generators.external-secrets.io/v1alpha1 kind: Password name: '{{ include "bjw-s.common.lib.chart.names.fullname" $ }}-password-generator' cluster: enabled: true apiVersion: postgresql.cnpg.io/v1 kind: Cluster suffix: pg spec: spec: description: "PostgreSQL cluster for policy-service" instances: 1 bootstrap: initdb: database: policy_service owner: policy_service storage: size: 5Gi