blob: 3cc9b9542fe83ca2121d398553106b0321e2fe0f [file] [log] [blame]
# Copyright © 2018 Amdocs, Bell Canada
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#################################################################
# Global configuration defaults.
#################################################################
global:
nodePortPrefix: 302
nodePortPrefixExt: 304
aafEnabled: true
#################################################################
# AAF Part
#################################################################
certInitializer:
nameOverride: sdc-wfd-fe-cert-init
aafDeployFqi: deployer@people.osaaf.org
aafDeployPass: demo123456!
fqdn: sdc
fqi: sdc@sdc.onap.org
public_fqdn: sdc.onap.org
cadi_longitude: "0.0"
cadi_latitude: "0.0"
app_ns: org.osaaf.aaf
credsPath: /opt/app/osaaf/local
addconfig: true
keystoreFile: "org.onap.sdc.p12"
truststoreFile: "org.onap.sdc.trust.jks"
permission_user: 352070
permission_group: 35953
aaf_add_config: |
echo "cadi_keystore_password_p12=$cadi_keystore_password_p12" > {{ .Values.credsPath }}/mycreds.prop
echo "cadi_truststore_password=$cadi_truststore_password" >> {{ .Values.credsPath }}/mycreds.prop
#################################################################
# Application configuration defaults.
#################################################################
# application image
image: onap/sdc-workflow-frontend:1.7.0
pullPolicy: Always
# flag to enable debugging - application support required
debugEnabled: false
config:
javaOptions: "-Xmx256m -Xms256m"
backendServerURL: "https://sdc-wfd-be:8443"
isHttpsEnabled: true
# following flag decides whether to check the certificate on the outgoing proxy request or whether to trust all parties
isTrustAll: true
# https relevant settings. Change in case you have other trust files then default ones.
#environment file
env:
name: AUTO
security:
isDefaultStore: false
# default number of instances
replicaCount: 1
nodeSelector: {}
affinity: {}
# probe configuration parameters
liveness:
initialDelaySeconds: 1
periodSeconds: 10
successThreshold: 1
failureThreshold: 3
# necessary to disable liveness probe when setting breakpoints
# in debugger so K8s doesn't restart unresponsive container
enabled: true
readiness:
initialDelaySeconds: 1
periodSeconds: 10
successThreshold: 1
failureThreshold: 3
startup:
initialDelaySeconds: 10
periodSeconds: 10
successThreshold: 1
failureThreshold: 60
service:
type: NodePort
internalPort: 8080
externalPort: 8080
internalPort2: 8443
externalPort2: 8443
portName: sdc-wfd-fe
nodePort: "56" # only one node port. set to http or https port depending on isHttpsEnabled property
ingress:
enabled: false
service:
- baseaddr: "sdcwfdfe"
name: "sdc-wfd-fe"
port: 8443
annotations:
ingress.kubernetes.io/secure-backends: "false"
nginx.ingress.kubernetes.io/secure-backends: "false"
nginx.ingress.kubernetes.io/proxy-body-size: "0"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
nginx.ingress.kubernetes.io/backend-protocol: "HTTP"
nginx.ingress.kubernetes.io/rewrite-target: "/workflows/"
# Resource Limit flavor -By Default using small
# Segregation for Different environment (Small and Large)
flavor: small
resources:
small:
limits:
cpu: 500m
memory: 2Gi
requests:
cpu: 40m
memory: 1Gi
large:
limits:
cpu: 1
memory: 4Gi
requests:
cpu: 80m
memory: 2Gi
unlimited: {}