blob: 42f0e13b71f38e199374296443753e6d7a7c2a38 [file] [log] [blame]
ramverma1a3b8ad2019-02-25 12:45:11 +00001# ============LICENSE_START=======================================================
2# Copyright (C) 2019 Nordix Foundation.
jhh999c2242021-02-24 12:10:02 -06003# Modifications Copyright (C) 2019-2021 AT&T Intellectual Property.
Bruno Sakoto425d5be2020-05-20 07:25:41 -04004# Modifications Copyright (C) 2020 Bell Canada.
ramverma1a3b8ad2019-02-25 12:45:11 +00005# ================================================================================
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17#
18# SPDX-License-Identifier: Apache-2.0
19# ============LICENSE_END=========================================================
20
21#################################################################
22# Global configuration defaults.
23#################################################################
24global:
Bruno Sakoto425d5be2020-05-20 07:25:41 -040025 nodePortPrefixExt: 304
ramverma1a3b8ad2019-02-25 12:45:11 +000026 persistence: {}
jhhd4258672020-08-09 12:08:08 -050027 aafEnabled: true
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020028
29#################################################################
30# Secrets metaconfig
31#################################################################
32secrets:
33 - uid: db-secret
34 type: basicAuth
35 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
36 login: '{{ .Values.db.user }}'
37 password: '{{ .Values.db.password }}'
38 passwordPolicy: required
Dominik Mizyn389fca12020-04-09 22:37:00 +020039 - uid: restserver-secret
40 type: basicAuth
41 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
42 login: '{{ .Values.restServer.user }}'
43 password: '{{ .Values.restServer.password }}'
44 passwordPolicy: required
45 - uid: api-secret
46 type: basicAuth
47 externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.api.credsExternalSecret) . }}'
48 login: '{{ .Values.healthCheckRestClient.api.user }}'
49 password: '{{ .Values.healthCheckRestClient.api.password }}'
50 passwordPolicy: required
51 - uid: distribution-secret
52 type: basicAuth
53 externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.distribution.credsExternalSecret) . }}'
54 login: '{{ .Values.healthCheckRestClient.distribution.user }}'
55 password: '{{ .Values.healthCheckRestClient.distribution.password }}'
56 passwordPolicy: required
jhhd4258672020-08-09 12:08:08 -050057 - uid: keystore-password
58 type: password
59 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
60 password: '{{ .Values.certStores.keyStorePassword }}'
61 passwordPolicy: required
62 - uid: truststore-password
63 type: password
64 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
65 password: '{{ .Values.certStores.trustStorePassword }}'
66 passwordPolicy: required
67
68certStores:
69 keyStorePassword: Pol1cy_0nap
70 trustStorePassword: Pol1cy_0nap
71
72certInitializer:
73 nameOverride: policy-pap-cert-initializer
74 aafDeployFqi: deployer@people.osaaf.org
75 aafDeployPass: demo123456!
76 fqdn: policy
77 fqi: policy@policy.onap.org
78 public_fqdn: policy.onap.org
79 cadi_latitude: "0.0"
80 cadi_longitude: "0.0"
81 credsPath: /opt/app/osaaf/local
82 app_ns: org.osaaf.aaf
83 uid: 100
84 gid: 101
85 aaf_add_config: >
86 /opt/app/aaf_config/bin/agent.sh;
87 export $(/opt/app/aaf_config/bin/agent.sh local showpass
88 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
89 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
90 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
91 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
92
ramverma1a3b8ad2019-02-25 12:45:11 +000093
94#################################################################
95# Application configuration defaults.
96#################################################################
97# application image
jhh999c2242021-02-24 12:10:02 -060098image: onap/policy-pap:2.4.0
ramverma1a3b8ad2019-02-25 12:45:11 +000099pullPolicy: Always
100
101# flag to enable debugging - application support required
102debugEnabled: false
103
104# application configuration
105
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +0200106db:
107 user: policy_user
108 password: policy_user
jhhd4258672020-08-09 12:08:08 -0500109 service:
110 name: policy-mariadb
111 internalPort: 3306
112
Dominik Mizyn389fca12020-04-09 22:37:00 +0200113restServer:
114 user: healthcheck
115 password: zb!XztG34
jhhd4258672020-08-09 12:08:08 -0500116
Dominik Mizyn389fca12020-04-09 22:37:00 +0200117healthCheckRestClient:
118 api:
119 user: healthcheck
120 password: zb!XztG34
121 distribution:
122 user: healthcheck
123 password: zb!XztG34
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +0200124
ramverma1a3b8ad2019-02-25 12:45:11 +0000125# default number of instances
126replicaCount: 1
127
128nodeSelector: {}
129
130affinity: {}
131
132# probe configuration parameters
133liveness:
134 initialDelaySeconds: 20
135 periodSeconds: 10
136 # necessary to disable liveness probe when setting breakpoints
137 # in debugger so K8s doesn't restart unresponsive container
138 enabled: true
Bruno Sakoto0644c262020-05-22 16:56:35 -0400139 port: http-api
ramverma1a3b8ad2019-02-25 12:45:11 +0000140
141readiness:
142 initialDelaySeconds: 20
143 periodSeconds: 10
Bruno Sakoto0644c262020-05-22 16:56:35 -0400144 port: http-api
ramverma1a3b8ad2019-02-25 12:45:11 +0000145
146service:
147 type: ClusterIP
148 name: policy-pap
Bruno Sakoto0644c262020-05-22 16:56:35 -0400149 useNodePortExt: true
150 ports:
151 - name: http-api
152 port: 6969
153 nodePort: 42
ramverma1a3b8ad2019-02-25 12:45:11 +0000154
155ingress:
156 enabled: false
157
jhhd4258672020-08-09 12:08:08 -0500158flavor: small
159resources:
160 small:
161 limits:
162 cpu: 1
163 memory: 4Gi
164 requests:
165 cpu: 100m
166 memory: 1Gi
167 large:
168 limits:
169 cpu: 2
170 memory: 8Gi
171 requests:
172 cpu: 200m
173 memory: 2Gi
174 unlimited: {}
175