This repository has been archived by the owner on Jun 28, 2024. It is now read-only.
generated from ghga-de/microservice-repository-template
-
Notifications
You must be signed in to change notification settings - Fork 0
/
config_schema.json
382 lines (382 loc) · 11.3 KB
/
config_schema.json
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
{
"additionalProperties": false,
"description": "Modifies the orginal Settings class provided by the user",
"properties": {
"log_level": {
"default": "INFO",
"description": "The minimum log level to capture.",
"enum": [
"CRITICAL",
"ERROR",
"WARNING",
"INFO",
"DEBUG",
"TRACE"
],
"title": "Log Level",
"type": "string"
},
"service_name": {
"default": "fis",
"title": "Service Name",
"type": "string"
},
"service_instance_id": {
"description": "A string that uniquely identifies this instance across all instances of this service. A globally unique Kafka client ID will be created by concatenating the service_name and the service_instance_id.",
"examples": [
"germany-bw-instance-001"
],
"title": "Service Instance Id",
"type": "string"
},
"log_format": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "If set, will replace JSON formatting with the specified string format. If not set, has no effect. In addition to the standard attributes, the following can also be specified: timestamp, service, instance, level, correlation_id, and details",
"examples": [
"%(timestamp)s - %(service)s - %(level)s - %(message)s",
"%(asctime)s - Severity: %(levelno)s - %(msg)s"
],
"title": "Log Format"
},
"vault_url": {
"description": "URL of the vault instance to connect to",
"examples": [
"http://127.0.0.1.8200"
],
"title": "Vault Url",
"type": "string"
},
"vault_role_id": {
"anyOf": [
{
"format": "password",
"type": "string",
"writeOnly": true
},
{
"type": "null"
}
],
"default": null,
"description": "Vault role ID to access a specific prefix",
"examples": [
"example_role"
],
"title": "Vault Role Id"
},
"vault_secret_id": {
"anyOf": [
{
"format": "password",
"type": "string",
"writeOnly": true
},
{
"type": "null"
}
],
"default": null,
"description": "Vault secret ID to access a specific prefix",
"examples": [
"example_secret"
],
"title": "Vault Secret Id"
},
"vault_verify": {
"anyOf": [
{
"type": "boolean"
},
{
"type": "string"
}
],
"default": true,
"description": "SSL certificates (CA bundle) used to verify the identity of the vault, or True to use the default CAs, or False for no verification.",
"examples": [
"/etc/ssl/certs/my_bundle.pem"
],
"title": "Vault Verify"
},
"vault_path": {
"description": "Path without leading or trailing slashes where secrets should be stored in the vault.",
"title": "Vault Path",
"type": "string"
},
"vault_secrets_mount_point": {
"default": "secret",
"description": "Name used to address the secret engine under a custom mount path.",
"examples": [
"secret"
],
"title": "Vault Secrets Mount Point",
"type": "string"
},
"vault_kube_role": {
"anyOf": [
{
"type": "string"
},
{
"type": "null"
}
],
"default": null,
"description": "Vault role name used for Kubernetes authentication",
"examples": [
"file-ingest-role"
],
"title": "Vault Kube Role"
},
"service_account_token_path": {
"default": "/var/run/secrets/kubernetes.io/serviceaccount/token",
"description": "Path to service account token used by kube auth adapter.",
"format": "path",
"title": "Service Account Token Path",
"type": "string"
},
"private_key": {
"description": "Base64 encoded private key of the keypair whose public key is used to encrypt the payload.",
"title": "Private Key",
"type": "string"
},
"source_bucket_id": {
"description": "ID of the bucket the object(s) corresponding to the upload metadata have been uploaded to. This should currently point to the staging bucket.",
"title": "Source Bucket Id",
"type": "string"
},
"token_hashes": {
"description": "List of token hashes corresponding to the tokens that can be used to authenticate calls to this service.",
"items": {
"type": "string"
},
"title": "Token Hashes",
"type": "array"
},
"selected_storage_alias": {
"description": "S3 endpoint alias of the object storage node the bucket and object(s) corresponding to the upload metadata have been uploaded to. This should point to a node containing a staging bucket.",
"title": "Selected Storage Alias",
"type": "string"
},
"kafka_servers": {
"description": "A list of connection strings to connect to Kafka bootstrap servers.",
"examples": [
[
"localhost:9092"
]
],
"items": {
"type": "string"
},
"title": "Kafka Servers",
"type": "array"
},
"kafka_security_protocol": {
"default": "PLAINTEXT",
"description": "Protocol used to communicate with brokers. Valid values are: PLAINTEXT, SSL.",
"enum": [
"PLAINTEXT",
"SSL"
],
"title": "Kafka Security Protocol",
"type": "string"
},
"kafka_ssl_cafile": {
"default": "",
"description": "Certificate Authority file path containing certificates used to sign broker certificates. If a CA is not specified, the default system CA will be used if found by OpenSSL.",
"title": "Kafka Ssl Cafile",
"type": "string"
},
"kafka_ssl_certfile": {
"default": "",
"description": "Optional filename of client certificate, as well as any CA certificates needed to establish the certificate's authenticity.",
"title": "Kafka Ssl Certfile",
"type": "string"
},
"kafka_ssl_keyfile": {
"default": "",
"description": "Optional filename containing the client private key.",
"title": "Kafka Ssl Keyfile",
"type": "string"
},
"kafka_ssl_password": {
"default": "",
"description": "Optional password to be used for the client private key.",
"format": "password",
"title": "Kafka Ssl Password",
"type": "string",
"writeOnly": true
},
"generate_correlation_id": {
"default": true,
"description": "A flag, which, if False, will result in an error when inbound requests don't possess a correlation ID. If True, requests without a correlation ID will be assigned a newly generated ID in the correlation ID middleware function.",
"examples": [
true,
false
],
"title": "Generate Correlation Id",
"type": "boolean"
},
"publisher_topic": {
"description": "Topic name expected by downstream services. Use the topic name from the interrogation room service.",
"examples": [
"file_interrogation"
],
"title": "Publisher Topic",
"type": "string"
},
"publisher_type": {
"description": "Type expected by downstream services. Use the type from the interrogation room service.",
"examples": [
"file_validation_success"
],
"title": "Publisher Type",
"type": "string"
},
"host": {
"default": "127.0.0.1",
"description": "IP of the host.",
"title": "Host",
"type": "string"
},
"port": {
"default": 8080,
"description": "Port to expose the server on the specified host",
"title": "Port",
"type": "integer"
},
"auto_reload": {
"default": false,
"description": "A development feature. Set to `True` to automatically reload the server upon code changes",
"title": "Auto Reload",
"type": "boolean"
},
"workers": {
"default": 1,
"description": "Number of workers processes to run.",
"title": "Workers",
"type": "integer"
},
"api_root_path": {
"default": "",
"description": "Root path at which the API is reachable. This is relative to the specified host and port.",
"title": "Api Root Path",
"type": "string"
},
"openapi_url": {
"default": "/openapi.json",
"description": "Path to get the openapi specification in JSON format. This is relative to the specified host and port.",
"title": "Openapi Url",
"type": "string"
},
"docs_url": {
"default": "/docs",
"description": "Path to host the swagger documentation. This is relative to the specified host and port.",
"title": "Docs Url",
"type": "string"
},
"cors_allowed_origins": {
"anyOf": [
{
"items": {
"type": "string"
},
"type": "array"
},
{
"type": "null"
}
],
"default": null,
"description": "A list of origins that should be permitted to make cross-origin requests. By default, cross-origin requests are not allowed. You can use ['*'] to allow any origin.",
"examples": [
[
"https://example.org",
"https://www.example.org"
]
],
"title": "Cors Allowed Origins"
},
"cors_allow_credentials": {
"anyOf": [
{
"type": "boolean"
},
{
"type": "null"
}
],
"default": null,
"description": "Indicate that cookies should be supported for cross-origin requests. Defaults to False. Also, cors_allowed_origins cannot be set to ['*'] for credentials to be allowed. The origins must be explicitly specified.",
"examples": [
[
"https://example.org",
"https://www.example.org"
]
],
"title": "Cors Allow Credentials"
},
"cors_allowed_methods": {
"anyOf": [
{
"items": {
"type": "string"
},
"type": "array"
},
{
"type": "null"
}
],
"default": null,
"description": "A list of HTTP methods that should be allowed for cross-origin requests. Defaults to ['GET']. You can use ['*'] to allow all standard methods.",
"examples": [
[
"*"
]
],
"title": "Cors Allowed Methods"
},
"cors_allowed_headers": {
"anyOf": [
{
"items": {
"type": "string"
},
"type": "array"
},
{
"type": "null"
}
],
"default": null,
"description": "A list of HTTP request headers that should be supported for cross-origin requests. Defaults to []. You can use ['*'] to allow all headers. The Accept, Accept-Language, Content-Language and Content-Type headers are always allowed for CORS requests.",
"examples": [
[]
],
"title": "Cors Allowed Headers"
}
},
"required": [
"service_instance_id",
"vault_url",
"vault_path",
"private_key",
"source_bucket_id",
"token_hashes",
"selected_storage_alias",
"kafka_servers",
"publisher_topic",
"publisher_type"
],
"title": "ModSettings",
"type": "object"
}