blob: 2e45858b9f46b2e43a91f388b662e242ab54a819 [file] [log] [blame]
Chenfei Gao9292e882019-02-27 22:14:45 -05001# ============LICENSE_START=======================================================
jhhd2b9ed82019-12-10 17:15:28 -06002# Copyright (C) 2019-2020 AT&T Intellectual Property. All rights reserved.
Chenfei Gao9292e882019-02-27 22:14:45 -05003# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
23 nodePortPrefix: 304
24 persistence: {}
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020025 envsubstImage: dibi/envsubst
jhhd4258672020-08-09 12:08:08 -050026 aafEnabled: true
27 readinessRepository: oomk8s
28 readinessImage: readiness-check:2.0.0
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020029
30#################################################################
31# Secrets metaconfig
32#################################################################
33secrets:
Dominik Mizyn11038102020-04-14 17:14:42 +020034 - uid: db-creds
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020035 type: basicAuth
36 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
37 login: '{{ .Values.db.user }}'
38 password: '{{ .Values.db.password }}'
39 passwordPolicy: required
Dominik Mizyn11038102020-04-14 17:14:42 +020040 - uid: restserver-creds
41 type: basicAuth
42 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
43 login: '{{ .Values.restServer.user }}'
44 password: '{{ .Values.restServer.password }}'
45 passwordPolicy: required
jhhd4258672020-08-09 12:08:08 -050046 - uid: keystore-password
47 type: password
48 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
49 password: '{{ .Values.certStores.keyStorePassword }}'
50 passwordPolicy: required
51 - uid: truststore-password
52 type: password
53 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
54 password: '{{ .Values.certStores.trustStorePassword }}'
55 passwordPolicy: required
56
57certStores:
58 keyStorePassword: Pol1cy_0nap
59 trustStorePassword: Pol1cy_0nap
60
61certInitializer:
62 nameOverride: policy-api-cert-initializer
63 aafDeployFqi: deployer@people.osaaf.org
64 aafDeployPass: demo123456!
65 fqdn: policy
66 fqi: policy@policy.onap.org
67 public_fqdn: policy.onap.org
68 cadi_latitude: "0.0"
69 cadi_longitude: "0.0"
70 credsPath: /opt/app/osaaf/local
71 app_ns: org.osaaf.aaf
72 uid: 100
73 gid: 101
74 aaf_add_config: >
75 /opt/app/aaf_config/bin/agent.sh;
76 export $(/opt/app/aaf_config/bin/agent.sh local showpass
77 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
78 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
79 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
80 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
81
Chenfei Gao9292e882019-02-27 22:14:45 -050082
83#################################################################
84# Application configuration defaults.
85#################################################################
86# application image
87repository: nexus3.onap.org:10001
jhha7dbd022020-07-13 10:55:47 -050088image: onap/policy-api:2.3.0
Chenfei Gao9292e882019-02-27 22:14:45 -050089pullPolicy: Always
90
91# flag to enable debugging - application support required
92debugEnabled: false
93
94# application configuration
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020095db:
96 user: policy_user
97 password: policy_user
jhhd4258672020-08-09 12:08:08 -050098 service:
99 name: policy-mariadb
100 internalPort: 3306
101
Dominik Mizyn11038102020-04-14 17:14:42 +0200102restServer:
103 user: healthcheck
104 password: zb!XztG34
Chenfei Gao9292e882019-02-27 22:14:45 -0500105
106# default number of instances
107replicaCount: 1
108
109nodeSelector: {}
110
111affinity: {}
112
113# probe configuration parameters
114liveness:
115 initialDelaySeconds: 20
116 periodSeconds: 10
117 # necessary to disable liveness probe when setting breakpoints
118 # in debugger so K8s doesn't restart unresponsive container
119 enabled: true
120
121readiness:
122 initialDelaySeconds: 20
123 periodSeconds: 10
124
125service:
jhh59ce22d2019-05-14 17:59:36 -0500126 type: ClusterIP
Chenfei Gao9292e882019-02-27 22:14:45 -0500127 name: policy-api
128 portName: policy-api
jhh59ce22d2019-05-14 17:59:36 -0500129 externalPort: 6969
Chenfei Gao9292e882019-02-27 22:14:45 -0500130 internalPort: 6969
131 nodePort: 40
132
133ingress:
134 enabled: false
135
jhhd4258672020-08-09 12:08:08 -0500136flavor: small
137resources:
138 small:
139 limits:
140 cpu: 1
141 memory: 4Gi
142 requests:
143 cpu: 100m
144 memory: 1Gi
145 large:
146 limits:
147 cpu: 2
148 memory: 8Gi
149 requests:
150 cpu: 200m
151 memory: 2Gi
152 unlimited: {}
153