| # ============LICENSE_START======================================================= |
| # Copyright (C) 2019 Nordix Foundation. |
| # Modifications Copyright (C) 2019-2020 AT&T Intellectual Property. |
| # Modifications Copyright (C) 2020 Bell Canada. |
| # ================================================================================ |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| # |
| # SPDX-License-Identifier: Apache-2.0 |
| # ============LICENSE_END========================================================= |
| |
| ################################################################# |
| # Global configuration defaults. |
| ################################################################# |
| global: |
| nodePortPrefixExt: 304 |
| persistence: {} |
| envsubstImage: dibi/envsubst |
| |
| ################################################################# |
| # Secrets metaconfig |
| ################################################################# |
| secrets: |
| - uid: db-secret |
| type: basicAuth |
| externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}' |
| login: '{{ .Values.db.user }}' |
| password: '{{ .Values.db.password }}' |
| passwordPolicy: required |
| - uid: restserver-secret |
| type: basicAuth |
| externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}' |
| login: '{{ .Values.restServer.user }}' |
| password: '{{ .Values.restServer.password }}' |
| passwordPolicy: required |
| - uid: api-secret |
| type: basicAuth |
| externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.api.credsExternalSecret) . }}' |
| login: '{{ .Values.healthCheckRestClient.api.user }}' |
| password: '{{ .Values.healthCheckRestClient.api.password }}' |
| passwordPolicy: required |
| - uid: distribution-secret |
| type: basicAuth |
| externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.distribution.credsExternalSecret) . }}' |
| login: '{{ .Values.healthCheckRestClient.distribution.user }}' |
| password: '{{ .Values.healthCheckRestClient.distribution.password }}' |
| passwordPolicy: required |
| |
| ################################################################# |
| # Application configuration defaults. |
| ################################################################# |
| # application image |
| repository: nexus3.onap.org:10001 |
| image: onap/policy-pap:2.2.3 |
| pullPolicy: Always |
| |
| # flag to enable debugging - application support required |
| debugEnabled: false |
| |
| # application configuration |
| |
| db: |
| user: policy_user |
| password: policy_user |
| restServer: |
| user: healthcheck |
| password: zb!XztG34 |
| healthCheckRestClient: |
| api: |
| user: healthcheck |
| password: zb!XztG34 |
| distribution: |
| user: healthcheck |
| password: zb!XztG34 |
| |
| # default number of instances |
| replicaCount: 1 |
| |
| nodeSelector: {} |
| |
| affinity: {} |
| |
| # probe configuration parameters |
| liveness: |
| initialDelaySeconds: 20 |
| periodSeconds: 10 |
| # necessary to disable liveness probe when setting breakpoints |
| # in debugger so K8s doesn't restart unresponsive container |
| enabled: true |
| |
| readiness: |
| initialDelaySeconds: 20 |
| periodSeconds: 10 |
| |
| service: |
| type: ClusterIP |
| name: policy-pap |
| portName: policy-pap |
| internalPort: 6969 |
| externalPort: 6969 |
| nodePort: 42 |
| |
| ingress: |
| enabled: false |
| |
| resources: {} |