blob: e4ded1b0b20f8466a08bdbbdc13e3d858a557b70 [file] [log] [blame]
Lathish818ee5d2020-08-26 13:45:03 +01001################################################################################
2# Copyright (c) 2020 Nordix Foundation. #
Konrad Bańka52c38b92020-10-28 16:49:19 +01003# Copyright © 2020 Samsung Electronics, Modifications #
Lathish818ee5d2020-08-26 13:45:03 +01004# #
5# Licensed under the Apache License, Version 2.0 (the "License"); #
6# you may not use this file except in compliance with the License. #
7# You may obtain a copy of the License at #
8# #
9# http://www.apache.org/licenses/LICENSE-2.0 #
10# #
11# Unless required by applicable law or agreed to in writing, software #
12# distributed under the License is distributed on an "AS IS" BASIS, #
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. #
14# See the License for the specific language governing permissions and #
15# limitations under the License. #
16################################################################################
17# Default values for Policy Management Service.
18# This is a YAML-formatted file.
19# Declare variables to be passed into your templates.
20
21global:
Sylvain Desbureauxd4a6afd2020-11-21 22:01:15 +010022 nodePortPrefix: 302
PatrikBuhr746ff372021-04-30 15:12:51 +020023 persistence: {}
guillaume.lambert30ec3902021-09-14 12:32:24 +020024
Lathish818ee5d2020-08-26 13:45:03 +010025secrets:
26 - uid: controller-secret
27 type: basicAuth
28 externalSecret: '{{ tpl (default "" .Values.a1controller.credsExternalSecret) . }}'
29 login: '{{ .Values.a1controller.user }}'
30 password: '{{ .Values.a1controller.password }}'
31 passwordPolicy: required
32
Sylvain Desbureauxb5353c92021-02-15 11:30:29 +010033#################################################################
34# AAF part
35#################################################################
36certInitializer:
37 nameOverride: a1p-cert-initializer
38 aafDeployFqi: deployer@people.osaaf.org
39 aafDeployPass: demo123456!
40 # aafDeployCredsExternalSecret: some secret
41 fqdn: a1p
42 fqi: a1p@a1p.onap.org
43 public_fqdn: a1p.onap.org
44 cadi_longitude: "0.0"
45 cadi_latitude: "0.0"
46 app_ns: org.osaaf.aaf
47 credsPath: /opt/app/osaaf/local
48 fqi_namespace: org.onap.a1p
49 aaf_add_config: |
50 echo "*** changing them into shell safe ones"
51 export KEYSTORE_PASSWORD=$(tr -cd '[:alnum:]' < /dev/urandom | fold -w64 | head -n1)
52 export TRUSTSORE_PASSWORD=$(tr -cd '[:alnum:]' < /dev/urandom | fold -w64 | head -n1)
53 cd {{ .Values.credsPath }}
54 keytool -storepasswd -new "${KEYSTORE_PASSWORD}" \
55 -storepass "${cadi_keystore_password_p12}" \
56 -keystore {{ .Values.fqi_namespace }}.p12
57 keytool -storepasswd -new "${TRUSTSORE_PASSWORD}" \
58 -storepass "${cadi_truststore_password}" \
59 -keystore {{ .Values.fqi_namespace }}.trust.jks
Sylvain Desbureauxb5353c92021-02-15 11:30:29 +010060 echo "*** save the generated passwords"
61 echo "KEYSTORE_PASSWORD=${KEYSTORE_PASSWORD}" > mycreds.prop
62 echo "TRUSTSORE_PASSWORD=${TRUSTSORE_PASSWORD}" >> mycreds.prop
63 echo "*** change ownership of certificates to targeted user"
64 chown -R 1000 .
65
Dan Timoney10a216b2022-01-25 10:34:33 -050066image: onap/ccsdk-oran-a1policymanagementservice:1.2.5
Konrad Bańka52c38b92020-10-28 16:49:19 +010067userID: 1000 #Should match with image-defined user ID
68groupID: 999 #Should match with image-defined group ID
Lathish818ee5d2020-08-26 13:45:03 +010069pullPolicy: IfNotPresent
70replicaCount: 1
71
72service:
73 type: NodePort
74 name: a1policymanagement
75 both_tls_and_plain: true
76 ports:
77 - name: api
78 port: 8433
79 plain_port: 8081
80 port_protocol: http
81 nodePort: '94'
82
83# SDNC Credentials are used here
84a1controller:
85 user: admin
86 password: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
87
88sdncLink: https://sdnc.onap:8443
RehanRazae30f9b92021-03-25 14:36:53 +010089# The information about A1-Mediator/RICs can be added here.
90# The A1 policy management service supports both STD & OSC versions.
91# Alternatively, the A1 simulator from ORAN-SC can also be used. It provides STD & OSC versions for A1 termination.
Lathish818ee5d2020-08-26 13:45:03 +010092# Refer source code & run in docker container : https://gerrit.o-ran-sc.org/r/admin/repos/sim/a1-interface
RehanRazae30f9b92021-03-25 14:36:53 +010093# Refer it/dep repo for k8s deployment: https://gerrit.o-ran-sc.org/r/admin/repos/it/dep
94# Example configuration:
95#rics:
96# - name: ric1
97# link: http://ric1url.url.com:1111/
98# managedElementIds:
99# - kista1
100# - kista2
101# - name: ric2
102# link: http://ric2url.url.com:2222/
103# managedElementIds:
104# - kista3
105# - kista4
106rics:
Lathish818ee5d2020-08-26 13:45:03 +0100107streamPublish: http://message-router:3904/events/A1-POLICY-AGENT-WRITE
108streamSubscribe: http://message-router:3904/events/A1-POLICY-AGENT-READ/users/policy-agent?timeout=15000&limit=100
109
110liveness:
111 port: api
112 initialDelaySeconds: 60
113 periodSeconds: 10
114readiness:
115 port: api
116 initialDelaySeconds: 60
117 periodSeconds: 10
118
119#Resource Limit flavor -By Default using small
120flavor: small
121
122resources:
123 small:
124 limits:
125 cpu: 2
PatrikBuhr27c94362021-04-09 10:58:58 +0200126 memory: 300Mi
Lathish818ee5d2020-08-26 13:45:03 +0100127 requests:
128 cpu: 1
PatrikBuhr27c94362021-04-09 10:58:58 +0200129 memory: 150Mi
Lathish818ee5d2020-08-26 13:45:03 +0100130 large:
131 limits:
132 cpu: 4
133 memory: 8Gi
134 requests:
135 cpu: 2
136 memory: 4Gi
137 unlimited: {}
PatrikBuhr27c94362021-04-09 10:58:58 +0200138
139## Persist data to a persistent volume
140persistence:
141 enabled: true
142
143 ## A manually managed Persistent Volume and Claim
144 ## Requires persistence.enabled: true
145 ## If defined, PVC must be created manually before volume will be bound
146 # existingClaim:
147 volumeReclaimPolicy: Retain
148
149 ## database data Persistent Volume Storage Class
150 ## If defined, storageClassName: <storageClass>
151 ## If set to "-", storageClassName: "", which disables dynamic provisioning
152 ## If undefined (the default) or set to null, no storageClassName spec is
153 ## set, choosing the default provisioner. (gp2 on AWS, standard on
154 ## GKE, AWS & OpenStack)
155 ##
156 # storageClass: "-"
157 accessMode: ReadWriteOnce
158 size: 2Gi
159 mountPath: /dockerdata-nfs
160 mountSubPath: nonrtric/policymanagementservice
161
farida azmy7fe88972021-09-27 20:57:13 +0200162#Pods Service Account
163serviceAccount:
164 nameOverride: a1policymanagement
165 roles:
166 - read