blob: a94031ac95b472d0e7626350e6a3b69501bc3814 [file] [log] [blame]
Chenfei Gao9292e882019-02-27 22:14:45 -05001# ============LICENSE_START=======================================================
jhhd2b9ed82019-12-10 17:15:28 -06002# Copyright (C) 2019-2020 AT&T Intellectual Property. All rights reserved.
Chenfei Gao9292e882019-02-27 22:14:45 -05003# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
23 nodePortPrefix: 304
24 persistence: {}
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020025 envsubstImage: dibi/envsubst
jhhd4258672020-08-09 12:08:08 -050026 aafEnabled: true
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +020027 readinessImage: onap/oom/readiness:3.0.1
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020028
29#################################################################
30# Secrets metaconfig
31#################################################################
32secrets:
Dominik Mizyn11038102020-04-14 17:14:42 +020033 - uid: db-creds
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020034 type: basicAuth
35 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
36 login: '{{ .Values.db.user }}'
37 password: '{{ .Values.db.password }}'
38 passwordPolicy: required
Dominik Mizyn11038102020-04-14 17:14:42 +020039 - uid: restserver-creds
40 type: basicAuth
41 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
42 login: '{{ .Values.restServer.user }}'
43 password: '{{ .Values.restServer.password }}'
44 passwordPolicy: required
jhhd4258672020-08-09 12:08:08 -050045 - uid: keystore-password
46 type: password
47 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
48 password: '{{ .Values.certStores.keyStorePassword }}'
49 passwordPolicy: required
50 - uid: truststore-password
51 type: password
52 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
53 password: '{{ .Values.certStores.trustStorePassword }}'
54 passwordPolicy: required
55
56certStores:
57 keyStorePassword: Pol1cy_0nap
58 trustStorePassword: Pol1cy_0nap
59
60certInitializer:
61 nameOverride: policy-api-cert-initializer
62 aafDeployFqi: deployer@people.osaaf.org
63 aafDeployPass: demo123456!
64 fqdn: policy
65 fqi: policy@policy.onap.org
66 public_fqdn: policy.onap.org
67 cadi_latitude: "0.0"
68 cadi_longitude: "0.0"
69 credsPath: /opt/app/osaaf/local
70 app_ns: org.osaaf.aaf
71 uid: 100
72 gid: 101
73 aaf_add_config: >
74 /opt/app/aaf_config/bin/agent.sh;
75 export $(/opt/app/aaf_config/bin/agent.sh local showpass
76 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
77 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
78 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
79 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
80
Chenfei Gao9292e882019-02-27 22:14:45 -050081
82#################################################################
83# Application configuration defaults.
84#################################################################
85# application image
86repository: nexus3.onap.org:10001
jhhbf8d8a92020-09-10 14:01:49 -050087image: onap/policy-api:2.3.1
Chenfei Gao9292e882019-02-27 22:14:45 -050088pullPolicy: Always
89
90# flag to enable debugging - application support required
91debugEnabled: false
92
93# application configuration
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020094db:
95 user: policy_user
96 password: policy_user
jhhd4258672020-08-09 12:08:08 -050097 service:
98 name: policy-mariadb
99 internalPort: 3306
100
Dominik Mizyn11038102020-04-14 17:14:42 +0200101restServer:
102 user: healthcheck
103 password: zb!XztG34
Chenfei Gao9292e882019-02-27 22:14:45 -0500104
105# default number of instances
106replicaCount: 1
107
108nodeSelector: {}
109
110affinity: {}
111
112# probe configuration parameters
113liveness:
114 initialDelaySeconds: 20
115 periodSeconds: 10
116 # necessary to disable liveness probe when setting breakpoints
117 # in debugger so K8s doesn't restart unresponsive container
118 enabled: true
119
120readiness:
121 initialDelaySeconds: 20
122 periodSeconds: 10
123
124service:
jhh59ce22d2019-05-14 17:59:36 -0500125 type: ClusterIP
Chenfei Gao9292e882019-02-27 22:14:45 -0500126 name: policy-api
127 portName: policy-api
jhh59ce22d2019-05-14 17:59:36 -0500128 externalPort: 6969
Chenfei Gao9292e882019-02-27 22:14:45 -0500129 internalPort: 6969
130 nodePort: 40
131
132ingress:
133 enabled: false
134
jhhd4258672020-08-09 12:08:08 -0500135flavor: small
136resources:
137 small:
138 limits:
139 cpu: 1
140 memory: 4Gi
141 requests:
142 cpu: 100m
143 memory: 1Gi
144 large:
145 limits:
146 cpu: 2
147 memory: 8Gi
148 requests:
149 cpu: 200m
150 memory: 2Gi
151 unlimited: {}
152