Skip to content
Merged
Show file tree
Hide file tree
Changes from 8 commits
Commits
Show all changes
25 commits
Select commit Hold shift + click to select a range
b7dc2a8
feature(document-archiving): deploy to QA, missing version numbers
marco-vit-pagopa Nov 14, 2025
ccff56f
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Nov 21, 2025
46855ba
fix: do not change migration version; correction to last merge
marco-vit-pagopa Nov 21, 2025
07ad8f8
fix: move feature flags definitions in the right container
marco-vit-pagopa Nov 21, 2025
35980c0
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Nov 26, 2025
c369003
fix: Remove duplicated env entry, duplicated by merge
marco-vit-pagopa Nov 26, 2025
8cf4b6e
feature: redirect B.f.F. to signed documents bucket
marco-vit-pagopa Nov 26, 2025
96e7460
feature: stop process document generation to activate documents-gener…
marco-vit-pagopa Nov 26, 2025
b3a4a83
set FEATURE_FLAG_USE_SIGNED_DOCUMENT into QA env
marco-vit-pagopa Nov 27, 2025
5d409b7
fix: remove unused batching related variables from QA env of document…
marco-vit-pagopa Nov 27, 2025
a32e732
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Nov 28, 2025
ef03d77
fix: PIN-8650 add new env variables for signed documents bucket
marco-vit-pagopa Nov 28, 2025
c20ce12
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Dec 1, 2025
6ea5105
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Dec 1, 2025
a7b2333
fix(document-archiving,PIN-7642): add FEATURE_FLAG_USE_SIGNED_DOCUMEN…
marco-vit-pagopa Dec 1, 2025
3e3d6be
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Dec 2, 2025
075197c
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Dec 2, 2025
17d5937
fix(document-archiving,PIN-7642): fix some env var names: DELEGATION_…
marco-vit-pagopa Dec 2, 2025
3ffa706
feature(document-archiving,PIN-7642): disable signed documents downlo…
marco-vit-pagopa Dec 3, 2025
61f3603
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Dec 3, 2025
11a4f1e
update image numbers
marco-vit-pagopa Dec 3, 2025
f31332d
fix: re-add m2m-event-cleaner job accidentally removed during merge
marco-vit-pagopa Dec 3, 2025
4a3521e
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Dec 4, 2025
5a8fdd2
Upgrade frontend to RC2
marco-vit-pagopa Dec 4, 2025
2865aa9
Merge branch 'main' into feature/PIN-7642_prepare_qa_deploy
marco-vit-pagopa Dec 4, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions commons/qa/configmaps/feature-flags-configmap.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -8,11 +8,11 @@ data:
FEATURE_FLAG_ADMIN_CLIENT: "true"
FEATURE_FLAG_SIGNALHUB_WHITELIST: "false"
FEATURE_FLAG_AGREEMENT_APPROVAL_POLICY_UPDATE: "true"
FEATURE_FLAG_AGREEMENTS_CONTRACT_BUILDER: "true"
FEATURE_FLAG_AGREEMENTS_CONTRACT_BUILDER: "false"
FEATURE_FLAG_CLIENT_ASSERTION_STRICT_CLAIMS_VALIDATION: "true"
FEATURE_FLAG_DELEGATIONS_CONTRACT_BUILDER: "true"
FEATURE_FLAG_DELEGATIONS_CONTRACT_BUILDER: "false"
FEATURE_FLAG_IMPROVED_PRODUCER_VERIFICATION_CLAIMS: "true"
FEATURE_FLAG_NOTIFICATION_CONFIG: "false"
FEATURE_FLAG_PURPOSE_TEMPLATE: "true"
FEATURE_FLAG_PURPOSES_CONTRACT_BUILDER: "true"
FEATURE_FLAG_PURPOSES_CONTRACT_BUILDER: "false"
FEATURE_FLAG_ESERVICE_PERSONAL_DATA: "true"
Original file line number Diff line number Diff line change
Expand Up @@ -153,4 +153,8 @@ data:
GRANT SELECT ON TABLE "${NAMESPACE}_agreement".agreement_signed_contract TO "${NAMESPACE}_notification_email_sender_user";
GRANT SELECT ON TABLE "${NAMESPACE}_agreement".agreement_signed_contract TO "${NAMESPACE}_token_generation_readmodel_checker_user";
GRANT SELECT ON TABLE "${NAMESPACE}_agreement".agreement_signed_contract TO "${NAMESPACE}_purpose_template_process_user";

V1.4__Grant_Access_DocumentsGenerator_Agreement.sql: |-
GRANT USAGE ON SCHEMA "${NAMESPACE}_agreement" to "${NAMESPACE}_documents_generator_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_agreement" TO "${NAMESPACE}_documents_generator_user";

Original file line number Diff line number Diff line change
Expand Up @@ -52,4 +52,8 @@ data:

V1.2__Grant_Access_PurposeTemplateProcess_Attribute.sql: |-
GRANT USAGE ON SCHEMA "${NAMESPACE}_attribute" to "${NAMESPACE}_purpose_template_process_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_attribute" TO "${NAMESPACE}_purpose_template_process_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_attribute" TO "${NAMESPACE}_purpose_template_process_user";

V1.3__Grant_Access_DocumentsGenerator_Attribute.sql: |-
GRANT USAGE ON SCHEMA "${NAMESPACE}_attribute" to "${NAMESPACE}_documents_generator_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_attribute" TO "${NAMESPACE}_documents_generator_user";
Original file line number Diff line number Diff line change
Expand Up @@ -209,4 +209,8 @@ data:

V1.3__Grant_Access_PurposeTemplateProcess_Catalog.sql: |-
GRANT USAGE ON SCHEMA "${NAMESPACE}_catalog" to "${NAMESPACE}_purpose_template_process_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_catalog" TO "${NAMESPACE}_purpose_template_process_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_catalog" TO "${NAMESPACE}_purpose_template_process_user";

V1.4__Grant_Access_DocumentsGenerator_Catalog.sql: |-
GRANT USAGE ON SCHEMA "${NAMESPACE}_catalog" to "${NAMESPACE}_documents_generator_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_catalog" TO "${NAMESPACE}_documents_generator_user";
Original file line number Diff line number Diff line change
Expand Up @@ -107,3 +107,7 @@ data:
GRANT SELECT ON TABLE "${NAMESPACE}_delegation".delegation_signed_contract_document TO "${NAMESPACE}_tenant_process_user";
GRANT SELECT ON TABLE "${NAMESPACE}_delegation".delegation_signed_contract_document TO "${NAMESPACE}_datalake_data_export_user";
GRANT SELECT ON TABLE "${NAMESPACE}_delegation".delegation_signed_contract_document TO "${NAMESPACE}_purpose_template_process_user";

V1.4__Grant_Access_DocumentsGenerator_Delegation.sql: |-
GRANT USAGE ON SCHEMA "${NAMESPACE}_delegation" TO "${NAMESPACE}_documents_generator_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_delegation" TO "${NAMESPACE}_documents_generator_user";
Original file line number Diff line number Diff line change
Expand Up @@ -188,4 +188,8 @@ data:

V1.2__Grant_Access_PurposeTemplateProcess_Tenant.sql: |-
GRANT USAGE ON SCHEMA "${NAMESPACE}_tenant" to "${NAMESPACE}_purpose_template_process_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_tenant" TO "${NAMESPACE}_purpose_template_process_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_tenant" TO "${NAMESPACE}_purpose_template_process_user";

V1.3__Grant_Access_DocumentsGenerator_Tenant.sql: |-
GRANT USAGE ON SCHEMA "${NAMESPACE}_tenant" to "${NAMESPACE}_documents_generator_user";
GRANT SELECT ON ALL TABLES IN SCHEMA "${NAMESPACE}_tenant" TO "${NAMESPACE}_documents_generator_user";
10 changes: 10 additions & 0 deletions commons/qa/configmaps/safe-storage-configmap.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
apiVersion: v1
kind: ConfigMap
metadata:
name: common-safe-storage
namespace: qa
data:
BASE_URL: "http://vpce-0f17b997ad7e109cd-qh68uzeo.vpce-svc-075ebde4859d4c631.eu-south-1.vpce.amazonaws.com:8080"
DOC_TYPE: "INTEROP_LEGAL_FACTS"
DOC_STATUS: "SAVED"
LIVE_REQUESTS_DYNAMO_TABLE_NAME: "interop-safe-storage-signature-tracking-qa"
10 changes: 10 additions & 0 deletions commons/qa/images.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,8 @@ images:
tag: "2.9.0-RC4"
attribute-registry-readmodel-writer-sql:
tag: "2.9.0-RC4"
audit-signer:
tag: "TBD"
authorization-management:
tag: "1.0.18"
authorization-platformstate-writer:
Expand Down Expand Up @@ -64,6 +66,10 @@ images:
tag: "2.9.0-RC4"
delegation-readmodel-writer-sql:
tag: "2.9.0-RC4"
documents-generator:
tag: "TBD"
documents-signer:
tag: "TBD"
eservice-descriptors-archiver:
tag: "2.9.0-RC4"
eservice-template-instances-updater:
Expand All @@ -74,6 +80,8 @@ images:
tag: "2.9.0-RC4"
eservice-template-readmodel-writer-sql:
tag: "2.9.0-RC4"
events-signer:
tag: "TBD"
frontend:
tag: "1.4.0-RC5"
key-readmodel-writer:
Expand Down Expand Up @@ -120,6 +128,8 @@ images:
tag: "2.9.0-RC4"
ses-mock:
tag: "20"
signed-objects-persister:
tag: "TBD"
smtp-mock:
tag: "1.10.4"
tenant-outbound-writer:
Expand Down
2 changes: 2 additions & 0 deletions commons/qa/values-microservice.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -28,6 +28,8 @@ local:
RSA_KEYS_IDENTIFIERS: "17d3f3c0-5730-45a9-be8a-655e77bf3555"
DEV_ENDPOINTS_ENABLED: "true"
ENABLED_PROJECTIONS: "false"
awsAccountId: "755649575658"
env: "qa"

autoscaling:
keda:
Expand Down
30 changes: 30 additions & 0 deletions microservices/audit-signer/qa/values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,30 @@
name: interop-be-audit-signer
techStack: nodejs

serviceAccount:
roleArn: "arn:aws:iam::{{.Values.local.awsAccountId}}:role/interop-be-audit-signer-{{.Values.local.env}}-es1"

service:
create: false

configmap:
SERVICE_NAME: "audit-signer"
SQS_MAX_NUMBER_OF_MSGS: "5"
SQS_LONG_POLL_WAIT_TIME_SECONDS: "20"
SQS_VISIBILITY_TIMEOUT_SECONDS: "20"
S3_BUCKET: "interop-generated-jwt-details-{{.Values.local.env}}-es1"
SQS_URL: "https://sqs.eu-south-1.amazonaws.com/{{.Values.local.awsAccountId}}/interop-jwt-details-new-s3-object-{{.Values.namespace}}"
SAFE_STORAGE_CLIENT_ID: "interop-{{.Values.namespace}}-audit-signer"

deployment:
envFromConfigmaps:
SAFE_STORAGE_BASE_URL: "common-safe-storage.BASE_URL"
SAFE_STORAGE_DOC_TYPE: "common-safe-storage.DOC_TYPE"
SAFE_STORAGE_DOC_STATUS: "common-safe-storage.DOC_STATUS"
SIGNATURE_REFERENCES_TABLE_NAME: "common-safe-storage.LIVE_REQUESTS_DYNAMO_TABLE_NAME"

envFromSecrets:
SAFE_STORAGE_API_KEY: "safe-storage-signing-credentials.password"

envFromFieldRef:
AWS_ROLE_SESSION_NAME: "metadata.name"
6 changes: 3 additions & 3 deletions microservices/backend-for-frontend/qa/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -26,11 +26,11 @@ configmap:
INTERNAL_JWT_SUBJECT: "{{.Values.namespace}}.interop-m2m"
INTERNAL_JWT_AUDIENCE: "{{.Values.namespace}}.interop.pagopa.it/internal"
INTERNAL_JWT_SECONDS_DURATION: "3600"
CONSUMER_DOCUMENTS_CONTAINER: "interop-application-documents-{{.Values.namespace}}-es1"
CONSUMER_DOCUMENTS_CONTAINER: "interop-signed-application-documents-{{.Values.namespace}}-es1"
CONSUMER_DOCUMENTS_PATH: "{{.Values.namespace}}/agreement/consumer-docs"
ESERVICE_DOCUMENTS_CONTAINER: "interop-application-documents-{{.Values.namespace}}-es1"
ESERVICE_DOCUMENTS_PATH: "eservices/docs"
RISK_ANALYSIS_DOCUMENTS_CONTAINER: "interop-application-documents-{{.Values.namespace}}-es1"
RISK_ANALYSIS_DOCUMENTS_CONTAINER: "interop-signed-application-documents-{{.Values.namespace}}-es1"
RISK_ANALYSIS_DOCUMENTS_PATH: "{{.Values.namespace}}/risk-analysis/docs"
PURPOSE_TEMPLATE_DOCUMENTS_CONTAINER: "interop-application-documents-{{.Values.namespace}}-es1"
PURPOSE_TEMPLATE_DOCUMENTS_PATH: "{{.Values.namespace}}/purpose-template/docs"
Expand Down Expand Up @@ -61,7 +61,7 @@ configmap:
PRESIGNED_URL_PUT_DURATION_MINUTES: "2"
PAGOPA_TENANT_ID: "69e2865e-65ab-4e48-a638-2037a9ee2ee7"
INTEROP_SELFCARE_PRODUCT_NAME: "prod-interop-coll"
DELEGATION_CONTRACTS_CONTAINER: "interop-application-documents-{{.Values.namespace}}-es1"
DELEGATION_CONTRACTS_CONTAINER: "interop-signed-application-documents-{{.Values.namespace}}-es1"
ESERVICE_TEMPLATE_DOCUMENTS_CONTAINER: "interop-application-documents-{{.Values.namespace}}-es1"
ESERVICE_TEMPLATE_DOCUMENTS_PATH: "eservice-template/docs"
BFF_SWAGGER_UI_ENABLED: true
Expand Down
58 changes: 58 additions & 0 deletions microservices/documents-generator/qa/values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
name: interop-be-documents-generator
techStack: nodejs

serviceAccount:
roleArn: "arn:aws:iam::{{.Values.local.awsAccountId}}:role/interop-be-documents-generator-{{.Values.local.env}}-es1"

service:
create: false

configmap:
KAFKA_GROUP_ID: "{{.Values.local.env}}-documents-generator"
TOPIC_STARTING_OFFSET: "earliest"
AVERAGE_KAFKA_MESSAGE_SIZE_IN_BYTES: "5000"
MESSAGES_TO_READ_PER_BATCH: "500"
MAX_WAIT_KAFKA_BATCH_MILLIS: "5000"
S3_BUCKET: "interop-application-documents-{{.Values.local.env}}-es1"
DELEGATION_DOCUMENT_PATH: "{{.Values.namespace}}/generated-documents-unsigned/delegation"
AGREEMENT_DOCUMENT_PATH: "{{.Values.namespace}}/generated-documents-unsigned/agreement"
RISK_ANALYSIS_DOCUMENT_PATH: "{{.Values.namespace}}/generated-documents-unsigned/risk-analysis"
INTERNAL_JWT_KID: "{{.Values.local.interop_be_commons.RSA_KEYS_IDENTIFIERS}}"
INTERNAL_JWT_SUBJECT: "{{.Values.namespace}}.interop-documents-generator"
INTERNAL_JWT_ISSUER: "{{.Values.namespace}}.interop.pagopa.it"
INTERNAL_JWT_AUDIENCE: "{{.Values.namespace}}.interop.pagopa.it/internal"
INTERNAL_JWT_SECONDS_DURATION: "3600"

deployment:
envFromConfigmaps:
KAFKA_BROKERS: "common-kafka.KAFKA_BROKERS"
DELEGATION_TOPIC: "common-kafka.DELEGATION_TOPIC"
CATALOG_TOPIC: "common-kafka.CATALOG_TOPIC"
AGREEMENT_TOPIC: "common-kafka.AGREEMENT_TOPIC"
PURPOSE_TOPIC: "common-kafka.PURPOSE_TOPIC"
AUTHORIZATION_TOPIC: "common-kafka.AUTHORIZATION_TOPIC"
READMODEL_SQL_DB_HOST: "common-read-model-sql.DB_HOST_RO"
READMODEL_SQL_DB_PORT: "common-read-model-sql.DB_PORT"
READMODEL_SQL_DB_NAME: "common-read-model-sql.DB_NAME"
READMODEL_SQL_DB_USE_SSL: "common-read-model-sql.DB_USE_SSL"
READMODEL_SQL_DB_SCHEMA_AGREEMENT: "common-read-model-sql.DB_SCHEMA_AGREEMENT"
READMODEL_SQL_DB_SCHEMA_ATTRIBUTE: "common-read-model-sql.DB_SCHEMA_ATTRIBUTE"
READMODEL_SQL_DB_SCHEMA_CATALOG: "common-read-model-sql.DB_SCHEMA_CATALOG"
READMODEL_SQL_DB_SCHEMA_CLIENT_JWK_KEY: "common-read-model-sql.DB_SCHEMA_CLIENT_JWK_KEY"
READMODEL_SQL_DB_SCHEMA_CLIENT: "common-read-model-sql.DB_SCHEMA_CLIENT"
READMODEL_SQL_DB_SCHEMA_DELEGATION: "common-read-model-sql.DB_SCHEMA_DELEGATION"
READMODEL_SQL_DB_SCHEMA_ESERVICE_TEMPLATE: "common-read-model-sql.DB_SCHEMA_ESERVICE_TEMPLATE"
READMODEL_SQL_DB_SCHEMA_PRODUCER_JWK_KEY: "common-read-model-sql.DB_SCHEMA_PRODUCER_JWK_KEY"
READMODEL_SQL_DB_SCHEMA_PRODUCER_KEYCHAIN: "common-read-model-sql.DB_SCHEMA_PRODUCER_KEYCHAIN"
READMODEL_SQL_DB_SCHEMA_PURPOSE: "common-read-model-sql.DB_SCHEMA_PURPOSE"
READMODEL_SQL_DB_SCHEMA_PURPOSE_TEMPLATE: "common-read-model-sql.DB_SCHEMA_PURPOSE_TEMPLATE"
READMODEL_SQL_DB_SCHEMA_TENANT: "common-read-model-sql.DB_SCHEMA_TENANT"
AGREEMENT_PROCESS_URL: "common-services-urls.AGREEMENT_PROCESS_URL"
DELEGATION_PROCESS_URL: "common-services-urls.DELEGATION_PROCESS_URL"
PURPOSE_PROCESS_URL: "common-services-urls.PURPOSE_PROCESS_URL"
envFromSecrets:
READMODEL_SQL_DB_USERNAME: "platform-data-documents-generator-user.username"
READMODEL_SQL_DB_PASSWORD: "platform-data-documents-generator-user.password"
envFromFieldRef:
AWS_ROLE_SESSION_NAME: "metadata.name"
KAFKA_CLIENT_ID: "metadata.name"
38 changes: 38 additions & 0 deletions microservices/documents-signer/qa/values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
name: interop-be-documents-signer
techStack: nodejs

serviceAccount:
roleArn: "arn:aws:iam::{{.Values.local.awsAccountId}}:role/interop-be-documents-signer-{{.Values.local.env}}-es1"

service:
create: false

configmap:
SERVICE_NAME: "documents-signer"
SAFE_STORAGE_CLIENT_ID: "interop-{{.Values.namespace}}-documents-signer"
KAFKA_GROUP_ID: "{{.Values.local.env}}-documents-signer"
TOPIC_STARTING_OFFSET: "earliest"
AVERAGE_KAFKA_MESSAGE_SIZE_IN_BYTES: "5000"
MESSAGES_TO_READ_PER_BATCH: "500"
MAX_WAIT_KAFKA_BATCH_MILLIS: "5000"
S3_BUCKET: "interop-application-documents-{{.Values.local.env}}-es1"

deployment:
envFromConfigmaps:
KAFKA_BROKERS: "common-kafka.KAFKA_BROKERS"
DELEGATION_TOPIC: "common-kafka.DELEGATION_TOPIC"
CATALOG_TOPIC: "common-kafka.CATALOG_TOPIC"
AGREEMENT_TOPIC: "common-kafka.AGREEMENT_TOPIC"
PURPOSE_TOPIC: "common-kafka.PURPOSE_TOPIC"
AUTHORIZATION_TOPIC: "common-kafka.AUTHORIZATION_TOPIC"
SAFE_STORAGE_BASE_URL: "common-safe-storage.BASE_URL"
SAFE_STORAGE_DOC_TYPE: "common-safe-storage.DOC_TYPE"
SAFE_STORAGE_DOC_STATUS: "common-safe-storage.DOC_STATUS"
SIGNATURE_REFERENCES_TABLE_NAME: "common-safe-storage.LIVE_REQUESTS_DYNAMO_TABLE_NAME"

envFromSecrets:
SAFE_STORAGE_API_KEY: "safe-storage-signing-credentials.password"

envFromFieldRef:
AWS_ROLE_SESSION_NAME: "metadata.name"
KAFKA_CLIENT_ID: "metadata.name"
38 changes: 38 additions & 0 deletions microservices/events-signer/qa/values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,38 @@
name: interop-be-events-signer
techStack: nodejs

serviceAccount:
roleArn: "arn:aws:iam::{{.Values.local.awsAccountId}}:role/interop-be-events-signer-{{.Values.local.env}}-es1"

service:
create: false

configmap:
SERVICE_NAME: "events-signer"
KAFKA_GROUP_ID: "{{.Values.local.env}}-events-signer"
AVERAGE_KAFKA_MESSAGE_SIZE_IN_BYTES: "5000"
MESSAGES_TO_READ_PER_BATCH: "500"
MAX_WAIT_KAFKA_BATCH_MILLIS: "5000"
TOPIC_STARTING_OFFSET: "earliest"
SAFE_STORAGE_CLIENT_ID: "interop-{{.Values.namespace}}-events-signer"
S3_BUCKET: "interop-domain-events-{{.Values.local.env}}-es1"

deployment:
envFromConfigmaps:
AGREEMENT_TOPIC: "common-kafka.AGREEMENT_TOPIC"
AUTHORIZATION_TOPIC: "common-kafka.AUTHORIZATION_TOPIC"
CATALOG_TOPIC: "common-kafka.CATALOG_TOPIC"
DELEGATION_TOPIC: "common-kafka.DELEGATION_TOPIC"
PURPOSE_TOPIC: "common-kafka.PURPOSE_TOPIC"
KAFKA_BROKERS: "common-kafka.KAFKA_BROKERS"
SAFE_STORAGE_BASE_URL: "common-safe-storage.BASE_URL"
SAFE_STORAGE_DOC_TYPE: "common-safe-storage.DOC_TYPE"
SAFE_STORAGE_DOC_STATUS: "common-safe-storage.DOC_STATUS"
SIGNATURE_REFERENCES_TABLE_NAME: "common-safe-storage.LIVE_REQUESTS_DYNAMO_TABLE_NAME"

envFromSecrets:
SAFE_STORAGE_API_KEY: "safe-storage-signing-credentials.password"

envFromFieldRef:
AWS_ROLE_SESSION_NAME: "metadata.name"
KAFKA_CLIENT_ID: "metadata.name"
40 changes: 40 additions & 0 deletions microservices/signed-objects-persister/qa/values.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,40 @@
name: interop-be-signed-objects-persister
techStack: nodejs

serviceAccount:
roleArn: "arn:aws:iam::{{.Values.local.awsAccountId}}:role/interop-be-signed-objects-persister-{{.Values.local.env}}-es1"

service:
create: false

configmap:
SERVICE_NAME: "signed-objects-persister"
SQS_MAX_NUMBER_OF_MSGS: "5"
SQS_LONG_POLL_WAIT_TIME_SECONDS: "20"
SQS_VISIBILITY_TIMEOUT_SECONDS: "20"
S3_BUCKET_SIGNED_DOCUMENTS: "interop-signed-application-documents-{{.Values.local.env}}-es1"
S3_BUCKET_EVENTS: "interop-signed-domain-events-{{.Values.local.env}}-es1"
S3_BUCKET_AUDIT: "interop-signed-jwt-audit-{{.Values.local.env}}-es1"
SQS_URL: "https://sqs.eu-south-1.amazonaws.com/{{.Values.local.awsAccountId}}/interop-safe-storage-completed-tasks-{{.Values.namespace}}"
SAFE_STORAGE_CLIENT_ID: "interop-{{.Values.namespace}}-signed-objects-persister"
INTERNAL_JWT_KID: "{{.Values.local.interop_be_commons.RSA_KEYS_IDENTIFIERS}}"
INTERNAL_JWT_SUBJECT: "{{.Values.namespace}}.interop-signed-objects-persister"
INTERNAL_JWT_ISSUER: "{{.Values.namespace}}.interop.pagopa.it"
INTERNAL_JWT_AUDIENCE: "{{.Values.namespace}}.interop.pagopa.it/internal"
INTERNAL_JWT_SECONDS_DURATION: "3600"

deployment:
envFromConfigmaps:
SAFE_STORAGE_BASE_URL: "common-safe-storage.BASE_URL"
SAFE_STORAGE_DOC_TYPE: "common-safe-storage.DOC_TYPE"
SAFE_STORAGE_DOC_STATUS: "common-safe-storage.DOC_STATUS"
SIGNATURE_REFERENCES_TABLE_NAME: "common-safe-storage.LIVE_REQUESTS_DYNAMO_TABLE_NAME"
AGREEMENT_PROCESS_URL: "common-services-urls.AGREEMENT_PROCESS_URL"
DELEGATION_PROCESS_URL: "common-services-urls.DELEGATION_PROCESS_URL"
PURPOSE_PROCESS_URL: "common-services-urls.PURPOSE_PROCESS_URL"

envFromSecrets:
SAFE_STORAGE_API_KEY: "safe-storage-signing-credentials.password"

envFromFieldRef:
AWS_ROLE_SESSION_NAME: "metadata.name"
Loading