blob: 328f4f296e711c84e8b39eac02a1ce431b79a364 [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002#
3# Licensed under the Apache License, Version 2.0 (the "License");
4# you may not use this file except in compliance with the License.
5# You may obtain a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS,
11# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12# See the License for the specific language governing permissions and
13# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000014#################################################################
15# Global configuration defaults.
16#################################################################
17global:
18 nodePortPrefix: 302
19 nodePortPrefixExt: 304
20 repository: nexus3.onap.org:10001
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +020021 readinessImage: onap/oom/readiness:3.0.1
sunilb0a97ab22020-02-25 10:18:48 +053022 loggingRepository: docker.elastic.co
23 loggingImage: beats/filebeat:5.5.0
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +010024 soBaseImage: onap/so/base-image:1.0
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000025 mariadbGalera:
26 nameOverride: mariadb-galera
27 serviceName: mariadb-galera
28 servicePort: "3306"
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010029 # mariadbRootPassword: secretpassword
30 # rootPasswordExternalSecret: some secret
sarada prasad sahooae2c7342019-07-10 14:40:12 +053031 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000032 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
33 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000034 persistence:
35 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020036 #This configuration specifies Service and port for SDNC OAM interface
37 sdncOamService: sdnc-oam
38 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000039 #This configuration will run the migration. The configurations are for backing up the data
40 #from DB and then restoring it to the present versions preferred DB.
41 migration:
42 enabled: false
43 dbHost: mariadb-galera
44 dbPort: 3306
45 dbUser: root
46 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010047 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000048 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000049 security:
50 aaf:
51 enabled: false
52 aaf:
53 auth:
54 header: Basic c29Ac28ub25hcC5vcmc6ZGVtbzEyMzQ1Ngo=
55 encrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
56 app:
57 siteName: onapheat
58 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
59 defaultCloudOwner: onap
60 cadi:
61 cadiLoglevel: DEBUG
Ramesh Parthasarathy3ea400b2020-04-05 04:30:27 +000062 cadiKeyFile: /app/client/org.onap.so.keyfile
63 cadiTrustStore: /app/client/org.onap.so.trust.jks
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000064 cadiTruststorePassword: enc:MFpuxKeYK6Eo6QXjDUjtOBbp0FthY7SB4mKSIJm_RWC
65 cadiLatitude: 38.4329
66 cadiLongitude: -90.43248
67 aafEnv: IST
68 aafApiVersion: 2.1
69 aafRootNs: org.onap.so
70 aafLocateUrl: https://aaf-locate.onap:8095
71 aafUrl: https://aaf-locate.onap:8095/locate/org.osaaf.aaf.service:2.1
72 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
73 client:
74 certs:
Ramesh Parthasarathy3ea400b2020-04-05 04:30:27 +000075 truststore: /app/client/org.onap.so.trust.jks
76 keystore: /app/client/org.onap.so.jks
77 trustStorePassword: LHN4Iy5DKlcpXXdWZ0pDNmNjRkhJIzpI
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000078 keyStorePassword: c280b25hcA==
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +010079 certificates:
80 path: /etc/ssl/certs
81 share_path: /usr/local/share/ca-certificates/
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010082
83#################################################################
84# Secrets metaconfig
85#################################################################
86secrets:
87 - uid: db-root-pass
88 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
89 type: password
90 externalSecret: '{{ ternary .Values.global.mariadbGalera.rootPasswordExternalSecret (default (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.rootPasswordExternalSecret) .Values.global.mariadbGalera.localCluster }}'
91 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
92 - uid: db-backup-creds
93 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
94 type: basicAuth
95 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
96 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
97 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
98 passwordPolicy: required
99 annotations:
100 helm.sh/hook: pre-upgrade,pre-install
101 helm.sh/hook-weight: "0"
102 helm.sh/hook-delete-policy: before-hook-creation
103 - uid: db-user-creds
104 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
105 type: basicAuth
106 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
107 login: '{{ .Values.dbCreds.userName }}'
108 password: '{{ .Values.dbCreds.userPassword }}'
109 passwordPolicy: generate
110 - uid: db-admin-creds
111 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
112 type: basicAuth
113 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
114 login: '{{ .Values.dbCreds.adminName }}'
115 password: '{{ .Values.dbCreds.adminPassword }}'
116 passwordPolicy: generate
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100117 - uid: "so-onap-certs"
118 name: &so-certs '{{ include "common.release" . }}-so-certs'
119 externalSecret: '{{ tpl (default "" .Values.certSecret) . }}'
120 type: generic
121 filePaths:
122 - resources/config/certificates/onap-ca.crt
123 - resources/config/certificates/msb-ca.crt
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100124
jmacc4f04d32018-10-12 18:24:24 +0000125#################################################################
126# Application configuration defaults.
127#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100128
129dbSecrets: &dbSecrets
130 userCredsExternalSecret: *dbUserCredsSecretName
131 adminCredsExternalSecret: *dbAdminCredsSecretName
132
133# unused in this, just to pass to subcharts
134dbCreds:
135 userName: so_user
136 adminName: so_admin
137
Mike Elliottd32d36e2018-02-12 15:54:03 -0500138repository: nexus3.onap.org:10001
seshukm40ec9fa2020-07-08 14:26:34 +0530139image: onap/so/api-handler-infra:1.6.4
jmacc4f04d32018-10-12 18:24:24 +0000140pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000141replicaCount: 1
142minReadySeconds: 10
143containerPort: 8080
144logPath: ./logs/apih/
145app: api-handler-infra
146service:
147 type: NodePort
Mandeep Khindadc2b43e2018-09-06 16:34:19 +0000148 nodePort: 77
Brian Freeman1a667932018-09-06 14:45:37 -0500149 internalPort: 8080
Mandeep Khindafe527eb2018-10-16 09:56:34 -0400150 externalPort: 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000151 portName: so-apih-port
152updateStrategy:
153 type: RollingUpdate
154 maxUnavailable: 1
155 maxSurge: 1
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400156# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000157flavor: small
158# Segregation for Different environment (Small and Large)
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100159persistence:
160 certificatesPath: /certificates
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000161resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000162 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000163 limits:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000164 cpu: 2000m
vaibhav16dec0da88292018-08-13 06:10:27 +0000165 memory: 4Gi
166 requests:
167 cpu: 500m
168 memory: 1Gi
169 large:
170 limits:
171 cpu: 4000m
172 memory: 8Gi
173 requests:
174 cpu: 1000m
175 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000176 unlimited: {}
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000177livenessProbe:
Ramesh Parthasarathy1ceefda2018-09-14 21:22:43 +0000178 path: /manage/health
179 scheme: HTTP
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000180 initialDelaySeconds: 600
181 periodSeconds: 60
182 timeoutSeconds: 10
183 successThreshold: 1
184 failureThreshold: 3
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000185
Mike Elliottd32d36e2018-02-12 15:54:03 -0500186nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500187affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000188
sunilb0a97ab22020-02-25 10:18:48 +0530189# application configuration
190config:
191 logstashServiceName: log-ls
192 logstashPort: 5044
193
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000194#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
195#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
196# --set so.global.mariadbGalera.localCluster=true \
197# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
198# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
199mariadb-galera:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100200 config:
201 mariadbRootPasswordExternalSecret: *dbRootPassSecretName
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000202 nameOverride: so-mariadb-galera
203 replicaCount: 1
204 service:
205 name: so-mariadb-galera
206 persistence:
207 mountSubPath: so/mariadb-galera/data
208 enabled: true
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200209
210ingress:
211 enabled: false
212 service:
Lucjan Bryndza05649652020-04-29 08:52:33 +0000213 - baseaddr: "so.api"
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200214 name: "so"
215 port: 8080
216 config:
rope252c5e14bb2020-01-02 11:03:59 +0000217 ssl: "none"
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000218
219mso:
220 adapters:
221 requestDb:
222 auth: Basic YnBlbDpwYXNzd29yZDEk
223 config:
224 cadi:
225 aafId: so@so.onap.org
226 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
227 apiEnforcement: org.onap.so.apihPerm
228 noAuthn: /manage/health
229 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
230 sdc:
231 client:
232 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
233 aai:
234 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
235 so:
236 operationalEnv:
237 dmaap:
238 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
239 health:
240 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100241
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000242so-bpmn-infra:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100243 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100244 db:
245 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000246 cds:
247 auth: Basic Y2NzZGthcHBzOmNjc2RrYXBwcw==
248 aai:
249 auth: 221187EFA3AD4E33600DE0488F287099934CE65C3D0697BCECC00BB58E784E07CD74A24581DC31DBC086FF63DF116378776E9BE3D1325885
250 mso:
251 key: 07a7159d3bf51a0e53be7a8f89699be7
252 adapters:
253 requestDb:
254 auth: Basic YnBlbDpwYXNzd29yZDEk
255 db:
256 auth: A3745B5DBE165EFCF101D85A6FC81C211AB8BF604F8861B6C413D5DC90F8F30E0139DE44B8A342F4EF70AF
257 password: wLg4sjrAFUS8rfVfdvTXeQ==
258 po:
259 auth: A3745B5DBE165EFCF101D85A6FC81C211AB8BF604F8861B6C413D5DC90F8F30E0139DE44B8A342F4EF70AF
260 config:
261 cadi:
262 aafId: so@so.onap.org
263 aaafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
264 apiEnforcement: org.onap.so.bpmnPerm
265 noAuthn: /manage/health
266 sdnc:
267 password: 1D78CFC35382B6938A989066A7A7EAEF4FE933D2919BABA99EB4763737F39876C333EE5F
268 sniro:
269 auth: test:testpwd
270 endpoint: http://replaceme:28090/optimizationInstance/V1/create
271 oof:
272 auth: test:testpwd
273 so:
274 vnfm:
275 adapter:
276 auth: Basic dm5mbTpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100277
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000278so-catalog-db-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100279 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100280 db:
281 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000282 mso:
283 config:
284 cadi:
285 aafId: so@so.onap.org
286 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
287 apiEnforcement: org.onap.so.catalogDbAdapterPerm
288 noAuthn: /manage/health
289 adapters:
290 db:
291 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100292
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100293so-monitoring:
294 certSecret: *so-certs
295 db:
296 <<: *dbSecrets
297
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000298so-openstack-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100299 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100300 db:
301 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000302 aaf:
303 auth:
304 encrypted: 7F182B0C05D58A23A1C4966B9CDC9E0B8BC5CD53BC8C7B4083D869F8D53E9BDC3EFD55C94B1D3F
305 aai:
306 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
307 org:
308 onap:
309 so:
310 adapters:
311 bpelauth: D1A67FA93B6A6419132D0F83CC771AF774FD3C60853C50C22C8C6FC5088CC79E9E81EDE9EA39F22B2F66A0068E
312 valet:
313 basic_auth: bXNvOkphY2tkYXdzIGxvdmUgbXkgYmlnIHNwaGlueCBvZiBxdWFydHouCg==
314 mso:
315 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
316 auth: BEA8637716A7EB617DF472BA6552D22F68C1CB17B0D094D77DDA562F4ADAAC4457CAB848E1A4
Ramesh Parthasarathybb611922020-03-18 00:00:30 +0000317 basicUser: poBpmn
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000318 config:
319 cadi:
320 aafId: so@so.onap.org
321 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
322 apiEnforcement: org.onap.so.openStackAdapterPerm
323 noAuthn: /manage/health
324 db:
325 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100326
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000327so-request-db-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100328 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100329 db:
330 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000331 mso:
332 config:
333 cadi:
334 aafId: so@so.onap.org
335 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
336 apiEnforcement: org.onap.so.requestDbAdapterPerm
337 noAuthn: /manage/health
338 adapters:
339 requestDb:
340 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100341
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000342so-sdc-controller:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100343 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100344 db:
345 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000346 aai:
347 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
348 mso:
349 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
350 config:
351 cadi:
352 aafId: so@so.onap.org
353 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
354 apiEnforcement: org.onap.so.sdcControllerPerm
355 noAuthn: /manage/health
356 asdc:
357 config:
358 key: 566B754875657232314F5548556D3665
359 requestDb:
360 auth: Basic YnBlbDpwYXNzd29yZDEk
361 asdc-connections:
362 asdc-controller1:
363 password: 76966BDD3C7414A03F7037264FF2E6C8EEC6C28F2B67F2840A1ED857C0260FEE731D73F47F828E5527125D29FD25D3E0DE39EE44C058906BF1657DE77BF897EECA93BDC07FA64F
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100364
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000365so-sdnc-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100366 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100367 db:
368 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000369 org:
370 onap:
371 so:
372 adapters:
373 sdnc:
374 bpelauth: 4C18603C5AE7E3A42A6CED95CDF9C0BA9B2109B3725747662E5D34E5FDF63DA9ADEBB08185098F14699195FDE9475100
375 sdncauth: ED07A7EE5F099FA53369C3DF2240AD68A00154676EEDBC6F8C16BAA83B1912941B8941ABD48683D2C1072DA7040659692DE936A59BBF42A038CF71DE67B4A375190071EC76EA657801B033C135
376 network:
377 encryptionKey: 07a7159d3bf51a0e53be7a8f89699be7
378 mso:
379 config:
380 cadi:
381 aafId: so@so.onap.org
382 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
383 apiEnforcement: org.onap.so.sdncAdapterPerm
384 noAuthn: /manage/health
385 adapters:
386 requestDb:
387 auth: Basic YnBlbDpwYXNzd29yZDEk
388 rest:
389 aafEncrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100390
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100391so-ve-vnfm-adapter:
392 certSecret: *so-certs
393
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000394so-vfc-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100395 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100396 db:
397 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000398 mso:
399 config:
400 cadi:
401 aafId: so@so.onap.org
402 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
403 apiEnforcement: org.onap.so.vfcAdapterPerm
404 noAuthn: /manage/health
405 adapters:
406 requestDb:
407 auth: Basic YnBlbDpwYXNzd29yZDEk
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100408
jananib28734e02020-04-08 21:35:45 +0530409so-nssmf-adapter:
410 certSecret: *so-certs
411 db:
412 <<: *dbSecrets
413 aaf:
414 auth:
415 username: so@so.onap.org
416 password: 8DB1C939BFC6A35C3832D0E52E452D0E05AE2537AF142CECD125FF827C05A972FDD0F4700547DA
417 aai:
418 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
419 mso:
420 key: 07a7159d3bf51a0e53be7a8f89699be7
421 config:
422 cadi:
423 aafId: so@so.onap.org
424 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
425 apiEnforcement: org.onap.so.nssmfAdapterPerm
426 noAuthn: /manage/health
427 adapters:
428 requestDb:
429 auth: Basic YnBlbDpwYXNzd29yZDEk
430
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000431so-vnfm-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100432 certSecret: *so-certs
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000433 aaf:
434 auth:
435 username: so@so.onap.org
436 password: 8DB1C939BFC6A35C3832D0E52E452D0E05AE2537AF142CECD125FF827C05A972FDD0F4700547DA
437 aai:
438 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
439 sdc:
440 username: mso
441 password: 76966BDD3C7414A03F7037264FF2E6C8EEC6C28F2B67F2840A1ED857C0260FEE731D73F47F828E5527125D29FD25D3E0DE39EE44C058906BF1657DE77BF897EECA93BDC07FA64F
442 key: 566B754875657232314F5548556D3665
443 mso:
444 key: 07a7159d3bf51a0e53be7a8f89699be7
445 config:
446 cadi:
447 aafId: so@so.onap.org
448 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
449 apiEnforcement: org.onap.so.vnfmAdapterPerm
450 noAuthn: /manage/health
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100451
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100452so-mariadb:
453 db:
454 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
455 rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
456 backupCredsExternalSecret: *dbBackupCredsSecretName
457 userCredsExternalSecret: *dbUserCredsSecretName
458 adminCredsExternalSecret: *dbAdminCredsSecretName
Ramesh Parthasarathy3aae7c02020-05-20 22:47:57 +0000459so-appc-orchestrator:
460 certSecret: *so-certs
461 db:
462 <<: *dbSecrets
463 mso:
464 basicUser: poBpmn
465 auth: BEA8637716A7EB617DF472BA6552D22F68C1CB17B0D094D77DDA562F4ADAAC4457CAB848E1A4
466 config:
467 cadi:
468 aafId: so@so.onap.org
469 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
470 apiEnforcement: org.onap.so.openStackAdapterPerm
471 noAuthn: /manage/health
472 appc:
473 client:
474 topic:
475 read:
476 name: APPC-LCM-WRITE
477 timeout: 360000
478 write: APPC-LCM-READ
479 sdnc:
480 read: SDNC-LCM-WRITE
481 write: SDNC-LCM-READ
482 response:
483 timeout: 3600000
484 key: VIlbtVl6YLhNUrtU
485 secret: 64AG2hF4pYeG2pq7CT6XwUOT
486 service: ueb
487 auth:
488 rest:
489 aaf: Basic c29Ac28ub25hcC5vcmc6ZGVtbzEyMzQ1Ngo=
490 aafEncrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456