blob: e5eef01e541559209e77b6aa7c0a66138b5fb398 [file] [log] [blame]
ramverma1a3b8ad2019-02-25 12:45:11 +00001# ============LICENSE_START=======================================================
2# Copyright (C) 2019 Nordix Foundation.
jhhd2b9ed82019-12-10 17:15:28 -06003# Modifications Copyright (C) 2019-2020 AT&T Intellectual Property.
Bruno Sakoto425d5be2020-05-20 07:25:41 -04004# Modifications Copyright (C) 2020 Bell Canada.
ramverma1a3b8ad2019-02-25 12:45:11 +00005# ================================================================================
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17#
18# SPDX-License-Identifier: Apache-2.0
19# ============LICENSE_END=========================================================
20
21#################################################################
22# Global configuration defaults.
23#################################################################
24global:
Bruno Sakoto425d5be2020-05-20 07:25:41 -040025 nodePortPrefixExt: 304
ramverma1a3b8ad2019-02-25 12:45:11 +000026 persistence: {}
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020027 envsubstImage: dibi/envsubst
28
29#################################################################
30# Secrets metaconfig
31#################################################################
32secrets:
33 - uid: db-secret
34 type: basicAuth
35 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
36 login: '{{ .Values.db.user }}'
37 password: '{{ .Values.db.password }}'
38 passwordPolicy: required
Dominik Mizyn389fca12020-04-09 22:37:00 +020039 - uid: restserver-secret
40 type: basicAuth
41 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
42 login: '{{ .Values.restServer.user }}'
43 password: '{{ .Values.restServer.password }}'
44 passwordPolicy: required
45 - uid: api-secret
46 type: basicAuth
47 externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.api.credsExternalSecret) . }}'
48 login: '{{ .Values.healthCheckRestClient.api.user }}'
49 password: '{{ .Values.healthCheckRestClient.api.password }}'
50 passwordPolicy: required
51 - uid: distribution-secret
52 type: basicAuth
53 externalSecret: '{{ tpl (default "" .Values.healthCheckRestClient.distribution.credsExternalSecret) . }}'
54 login: '{{ .Values.healthCheckRestClient.distribution.user }}'
55 password: '{{ .Values.healthCheckRestClient.distribution.password }}'
56 passwordPolicy: required
ramverma1a3b8ad2019-02-25 12:45:11 +000057
58#################################################################
59# Application configuration defaults.
60#################################################################
61# application image
62repository: nexus3.onap.org:10001
jhh0ee08c02020-04-27 17:12:43 -050063image: onap/policy-pap:2.2.2
ramverma1a3b8ad2019-02-25 12:45:11 +000064pullPolicy: Always
65
66# flag to enable debugging - application support required
67debugEnabled: false
68
69# application configuration
70
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020071db:
72 user: policy_user
73 password: policy_user
Dominik Mizyn389fca12020-04-09 22:37:00 +020074restServer:
75 user: healthcheck
76 password: zb!XztG34
77healthCheckRestClient:
78 api:
79 user: healthcheck
80 password: zb!XztG34
81 distribution:
82 user: healthcheck
83 password: zb!XztG34
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020084
ramverma1a3b8ad2019-02-25 12:45:11 +000085# default number of instances
86replicaCount: 1
87
88nodeSelector: {}
89
90affinity: {}
91
92# probe configuration parameters
93liveness:
94 initialDelaySeconds: 20
95 periodSeconds: 10
96 # necessary to disable liveness probe when setting breakpoints
97 # in debugger so K8s doesn't restart unresponsive container
98 enabled: true
99
100readiness:
101 initialDelaySeconds: 20
102 periodSeconds: 10
103
104service:
105 type: ClusterIP
106 name: policy-pap
107 portName: policy-pap
108 internalPort: 6969
jhh59ce22d2019-05-14 17:59:36 -0500109 externalPort: 6969
Bruno Sakoto425d5be2020-05-20 07:25:41 -0400110 nodePort: 42
ramverma1a3b8ad2019-02-25 12:45:11 +0000111
112ingress:
113 enabled: false
114
115resources: {}