blob: 34e322ce763646885a7ae1985fd97d53690f815d [file] [log] [blame]
ramverma1a3b8ad2019-02-25 12:45:11 +00001# ============LICENSE_START=======================================================
2# Copyright (C) 2019 Nordix Foundation.
jhhd2b9ed82019-12-10 17:15:28 -06003# Modifications Copyright (C) 2019-2020 AT&T Intellectual Property.
Bruno Sakoto425d5be2020-05-20 07:25:41 -04004# Modifications Copyright (C) 2020 Bell Canada.
ramverma1a3b8ad2019-02-25 12:45:11 +00005# ================================================================================
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17#
18# SPDX-License-Identifier: Apache-2.0
19# ============LICENSE_END=========================================================
20
21#################################################################
22# Global configuration defaults.
23#################################################################
24global:
Bruno Sakoto425d5be2020-05-20 07:25:41 -040025 nodePortPrefixExt: 304
ramverma1a3b8ad2019-02-25 12:45:11 +000026 persistence: {}
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020027 envsubstImage: dibi/envsubst
jhhd4258672020-08-09 12:08:08 -050028 aafEnabled: true
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +020029 readinessImage: onap/oom/readiness:3.0.1
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020030
31#################################################################
32# Secrets metaconfig
33#################################################################
34secrets:
35 - uid: db-secret
36 type: basicAuth
37 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
38 login: '{{ .Values.db.user }}'
39 password: '{{ .Values.db.password }}'
40 passwordPolicy: required
Dominik Mizyn389fca12020-04-09 22:37:00 +020041 - uid: restserver-secret
42 type: basicAuth
43 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
44 login: '{{ .Values.restServer.user }}'
45 password: '{{ .Values.restServer.password }}'
46 passwordPolicy: required
47 - uid: api-secret
48 type: basicAuth
49 externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.api.credsExternalSecret) . }}'
50 login: '{{ .Values.healthCheckRestClient.api.user }}'
51 password: '{{ .Values.healthCheckRestClient.api.password }}'
52 passwordPolicy: required
53 - uid: distribution-secret
54 type: basicAuth
55 externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.distribution.credsExternalSecret) . }}'
56 login: '{{ .Values.healthCheckRestClient.distribution.user }}'
57 password: '{{ .Values.healthCheckRestClient.distribution.password }}'
58 passwordPolicy: required
jhhd4258672020-08-09 12:08:08 -050059 - uid: keystore-password
60 type: password
61 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
62 password: '{{ .Values.certStores.keyStorePassword }}'
63 passwordPolicy: required
64 - uid: truststore-password
65 type: password
66 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
67 password: '{{ .Values.certStores.trustStorePassword }}'
68 passwordPolicy: required
69
70certStores:
71 keyStorePassword: Pol1cy_0nap
72 trustStorePassword: Pol1cy_0nap
73
74certInitializer:
75 nameOverride: policy-pap-cert-initializer
76 aafDeployFqi: deployer@people.osaaf.org
77 aafDeployPass: demo123456!
78 fqdn: policy
79 fqi: policy@policy.onap.org
80 public_fqdn: policy.onap.org
81 cadi_latitude: "0.0"
82 cadi_longitude: "0.0"
83 credsPath: /opt/app/osaaf/local
84 app_ns: org.osaaf.aaf
85 uid: 100
86 gid: 101
87 aaf_add_config: >
88 /opt/app/aaf_config/bin/agent.sh;
89 export $(/opt/app/aaf_config/bin/agent.sh local showpass
90 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
91 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
92 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
93 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
94
ramverma1a3b8ad2019-02-25 12:45:11 +000095
96#################################################################
97# Application configuration defaults.
98#################################################################
99# application image
100repository: nexus3.onap.org:10001
jhha7dbd022020-07-13 10:55:47 -0500101image: onap/policy-pap:2.3.0
ramverma1a3b8ad2019-02-25 12:45:11 +0000102pullPolicy: Always
103
104# flag to enable debugging - application support required
105debugEnabled: false
106
107# application configuration
108
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +0200109db:
110 user: policy_user
111 password: policy_user
jhhd4258672020-08-09 12:08:08 -0500112 service:
113 name: policy-mariadb
114 internalPort: 3306
115
Dominik Mizyn389fca12020-04-09 22:37:00 +0200116restServer:
117 user: healthcheck
118 password: zb!XztG34
jhhd4258672020-08-09 12:08:08 -0500119
Dominik Mizyn389fca12020-04-09 22:37:00 +0200120healthCheckRestClient:
121 api:
122 user: healthcheck
123 password: zb!XztG34
124 distribution:
125 user: healthcheck
126 password: zb!XztG34
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +0200127
ramverma1a3b8ad2019-02-25 12:45:11 +0000128# default number of instances
129replicaCount: 1
130
131nodeSelector: {}
132
133affinity: {}
134
135# probe configuration parameters
136liveness:
137 initialDelaySeconds: 20
138 periodSeconds: 10
139 # necessary to disable liveness probe when setting breakpoints
140 # in debugger so K8s doesn't restart unresponsive container
141 enabled: true
Bruno Sakoto0644c262020-05-22 16:56:35 -0400142 port: http-api
ramverma1a3b8ad2019-02-25 12:45:11 +0000143
144readiness:
145 initialDelaySeconds: 20
146 periodSeconds: 10
Bruno Sakoto0644c262020-05-22 16:56:35 -0400147 port: http-api
ramverma1a3b8ad2019-02-25 12:45:11 +0000148
149service:
150 type: ClusterIP
151 name: policy-pap
Bruno Sakoto0644c262020-05-22 16:56:35 -0400152 useNodePortExt: true
153 ports:
154 - name: http-api
155 port: 6969
156 nodePort: 42
ramverma1a3b8ad2019-02-25 12:45:11 +0000157
158ingress:
159 enabled: false
160
jhhd4258672020-08-09 12:08:08 -0500161flavor: small
162resources:
163 small:
164 limits:
165 cpu: 1
166 memory: 4Gi
167 requests:
168 cpu: 100m
169 memory: 1Gi
170 large:
171 limits:
172 cpu: 2
173 memory: 8Gi
174 requests:
175 cpu: 200m
176 memory: 2Gi
177 unlimited: {}
178