blob: f0c3954c11f4389aad196b61b427be5257f86924 [file] [log] [blame]
# Copyright © 2017 Amdocs, Bell Canada
# Modifications Copyright © 2018, 2020 AT&T
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
#################################################################
# Global configuration defaults.
#################################################################
global:
env:
tomcatDir: "/usr/local/tomcat"
nodePortPrefix: 302
persistence: {}
#AAF service
aafEnabled: true
################################################################
# Secrets metaconfig
#################################################################
secrets:
- uid: portal-cass
type: basicAuth
externalSecret: '{{ tpl (default "" .Values.cassandra.config.cassandraExternalSecret) . }}'
login: '{{ .Values.cassandra.config.cassandraUsername }}'
password: '{{ .Values.cassandra.config.cassandraPassword }}'
passwordPolicy: required
- uid: portal-backend-db
type: basicAuth
externalSecret: '{{ tpl (default "" .Values.mariadb.config.backendDbExternalSecret) . }}'
login: '{{ .Values.mariadb.config.backendUserName }}'
password: '{{ .Values.mariadb.config.backendPassword }}'
passwordPolicy: required
- uid: cipher-enc-key
type: password
externalSecret: '{{ .Values.config.cipherEncKeyExternalSecret}}'
password: '{{ .Values.config.cipherEncKey }}'
passwordPolicy: required
#################################################################
# Application configuration defaults.
#################################################################
# application image
image: onap/portal-sdk:3.4.2
pullPolicy: Always
# application configuration
config:
# cipherEncKeyExternalSecret: some secret
cipherEncKey: AGLDdG4D04BKm2IxIWEr8o==
#AAF local config
aafURL: https://aaf-service:8100/authz/
certInitializer:
nameOverride: portal-sdk-cert-initializer
aafDeployFqi: deployer@people.osaaf.org
aafDeployPass: demo123456!
fqdn: portal
fqi: portal@portal.onap.org
public_fqdn: portal.onap.org
cadi_latitude: "38.0"
cadi_longitude: "-72.0"
credsPath: /opt/app/osaaf/local
app_ns: org.osaaf.aaf
permission_user: 1000
permission_group: 999
keystoreFile: "org.onap.portal.p12"
truststoreFile: "org.onap.portal.trust.jks"
aaf_add_config: |
echo "cadi_truststore_password=$cadi_truststore_password" > {{ .Values.credsPath }}/mycreds.prop
echo "cadi_keystore_password_p12=$cadi_keystore_password_p12" >> {{ .Values.credsPath }}/mycreds.prop
# flag to enable debugging - application support required
debugEnabled: false
# default number of instances
replicaCount: 1
nodeSelector: {}
affinity: {}
# probe configuration parameters
liveness:
initialDelaySeconds: 10
periodSeconds: 10
# necessary to disable liveness probe when setting breakpoints
# in debugger so K8s doesn't restart unresponsive container
enabled: true
readiness:
initialDelaySeconds: 10
periodSeconds: 10
service:
type: NodePort
name: portal-sdk
portName: portal-sdk
internalPort: 8443
externalPort: 8443
nodePort: 12
mariadb:
service:
name: portal-db
config:
# backendDbExternalSecret: some secret
backendUserName: portal
backendPassword: portal
widget:
service:
name: portal-widget
cassandra:
service:
name: portal-cassandra
config:
# cassandraExternalSecret: some secret
cassandraUsername: root
cassandraPassword: Aa123456
messageRouter:
service:
name: message-router
ingress:
enabled: false
service:
- baseaddr: portal-sdk
name: "portal-sdk"
port: 8443
config:
ssl: "redirect"
# Resource Limit flavor -By Default using small
flavor: small
# Segregation for Different environment (Small and Large)
resources:
small:
limits:
cpu: 600m
memory: 1.6Gi
requests:
cpu: 10m
memory: 1.3Gi
large:
limits:
cpu: 8
memory: 20Gi
requests:
cpu: 4
memory: 10Gi
unlimited: {}
# Log configuration
log:
path: /var/log/onap
logConfigMapNamePrefix: '{{ include "common.fullname" . }}'