blob: ca0c84f3c933271298dc804082f1d8e229937fc0 [file] [log] [blame]
ramverma1a3b8ad2019-02-25 12:45:11 +00001# ============LICENSE_START=======================================================
2# Copyright (C) 2019 Nordix Foundation.
jhhd2b9ed82019-12-10 17:15:28 -06003# Modifications Copyright (C) 2019-2020 AT&T Intellectual Property.
ramverma1a3b8ad2019-02-25 12:45:11 +00004# ================================================================================
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16#
17# SPDX-License-Identifier: Apache-2.0
18# ============LICENSE_END=========================================================
19
20#################################################################
21# Global configuration defaults.
22#################################################################
23global:
24 persistence: {}
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020025 envsubstImage: dibi/envsubst
26
27#################################################################
28# Secrets metaconfig
29#################################################################
30secrets:
31 - uid: db-secret
32 type: basicAuth
33 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
34 login: '{{ .Values.db.user }}'
35 password: '{{ .Values.db.password }}'
36 passwordPolicy: required
Dominik Mizyn389fca12020-04-09 22:37:00 +020037 - uid: restserver-secret
38 type: basicAuth
39 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
40 login: '{{ .Values.restServer.user }}'
41 password: '{{ .Values.restServer.password }}'
42 passwordPolicy: required
43 - uid: api-secret
44 type: basicAuth
45 externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.api.credsExternalSecret) . }}'
46 login: '{{ .Values.healthCheckRestClient.api.user }}'
47 password: '{{ .Values.healthCheckRestClient.api.password }}'
48 passwordPolicy: required
49 - uid: distribution-secret
50 type: basicAuth
51 externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.distribution.credsExternalSecret) . }}'
52 login: '{{ .Values.healthCheckRestClient.distribution.user }}'
53 password: '{{ .Values.healthCheckRestClient.distribution.password }}'
54 passwordPolicy: required
ramverma1a3b8ad2019-02-25 12:45:11 +000055
56#################################################################
57# Application configuration defaults.
58#################################################################
59# application image
60repository: nexus3.onap.org:10001
jhh110657a2020-04-09 16:35:50 -050061image: onap/policy-pap:2.2.1
ramverma1a3b8ad2019-02-25 12:45:11 +000062pullPolicy: Always
63
64# flag to enable debugging - application support required
65debugEnabled: false
66
67# application configuration
68
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020069db:
70 user: policy_user
71 password: policy_user
Dominik Mizyn389fca12020-04-09 22:37:00 +020072restServer:
73 user: healthcheck
74 password: zb!XztG34
75healthCheckRestClient:
76 api:
77 user: healthcheck
78 password: zb!XztG34
79 distribution:
80 user: healthcheck
81 password: zb!XztG34
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020082
ramverma1a3b8ad2019-02-25 12:45:11 +000083# default number of instances
84replicaCount: 1
85
86nodeSelector: {}
87
88affinity: {}
89
90# probe configuration parameters
91liveness:
92 initialDelaySeconds: 20
93 periodSeconds: 10
94 # necessary to disable liveness probe when setting breakpoints
95 # in debugger so K8s doesn't restart unresponsive container
96 enabled: true
97
98readiness:
99 initialDelaySeconds: 20
100 periodSeconds: 10
101
102service:
103 type: ClusterIP
104 name: policy-pap
105 portName: policy-pap
106 internalPort: 6969
jhh59ce22d2019-05-14 17:59:36 -0500107 externalPort: 6969
ramverma1a3b8ad2019-02-25 12:45:11 +0000108
109ingress:
110 enabled: false
111
112resources: {}