blob: e445c9f562777118462bbcd45dc5151679c9eced [file] [log] [blame]
rameshiyer2701b8cc02021-09-21 15:07:50 +01001# ============LICENSE_START=======================================================
FrancescoFioraEst9c79e262022-02-22 13:12:19 +00002# Copyright (C) 2021-2022 Nordix Foundation.
rameshiyer2701b8cc02021-09-21 15:07:50 +01003# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
rameshiyer2701b8cc02021-09-21 15:07:50 +010023 persistence: {}
24 aafEnabled: true
25
26#################################################################
27# Secrets metaconfig
28#################################################################
29secrets:
30 - uid: restserver-secret
31 type: basicAuth
32 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
33 login: '{{ .Values.restServer.user }}'
34 password: '{{ .Values.restServer.password }}'
35 passwordPolicy: required
36 - uid: keystore-password
37 type: password
38 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
39 password: '{{ .Values.certStores.keyStorePassword }}'
40 passwordPolicy: required
41 - uid: truststore-password
42 type: password
43 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
44 password: '{{ .Values.certStores.trustStorePassword }}'
45 passwordPolicy: required
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +010046 - uid: policy-kafka-user
47 externalSecret: '{{ tpl (default "" .Values.config.jaasConfExternalSecret) . }}'
48 type: genericKV
49 envs:
50 - name: sasl.jaas.config
51 value: '{{ .Values.config.someConfig }}'
52 policy: generate
rameshiyer2701b8cc02021-09-21 15:07:50 +010053
54certStores:
55 keyStorePassword: Pol1cy_0nap
56 trustStorePassword: Pol1cy_0nap
57
58certInitializer:
FrancescoFioraEst9c79e262022-02-22 13:12:19 +000059 nameOverride: policy-clamp-ac-http-ppnt-cert-initializer
rameshiyer2701b8cc02021-09-21 15:07:50 +010060 aafDeployFqi: deployer@people.osaaf.org
61 aafDeployPass: demo123456!
62 fqdn: policy
63 fqi: policy@policy.onap.org
64 public_fqdn: policy.onap.org
65 cadi_latitude: "0.0"
66 cadi_longitude: "0.0"
67 credsPath: /opt/app/osaaf/local
68 app_ns: org.osaaf.aaf
69 uid: 100
70 gid: 101
71 aaf_add_config: >
72 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
73 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
74 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
75
76
77#################################################################
78# Application configuration defaults.
79#################################################################
80# application image
saul.gill5e611402023-03-02 11:49:23 +000081image: onap/policy-clamp-ac-http-ppnt:6.4.1
rameshiyer2701b8cc02021-09-21 15:07:50 +010082pullPolicy: Always
83
rameshiyer2701b8cc02021-09-21 15:07:50 +010084# application configuration
85restServer:
86 user: participantUser
87 password: zb!XztG34
88
FrancescoFioraEst9c79e262022-02-22 13:12:19 +000089# flag to enable debugging - application support required
90debugEnabled: false
91
rameshiyer2701b8cc02021-09-21 15:07:50 +010092# default number of instances
93replicaCount: 1
94
95nodeSelector: {}
96
97affinity: {}
FrancescoFioraEst9c79e262022-02-22 13:12:19 +000098ingress:
99 enabled: false
100
rameshiyer2701b8cc02021-09-21 15:07:50 +0100101# probe configuration parameters
102liveness:
103 initialDelaySeconds: 20
104 periodSeconds: 10
105 # necessary to disable liveness probe when setting breakpoints
106 # in debugger so K8s doesn't restart unresponsive container
107 enabled: true
108 port: http-api
109
110readiness:
111 initialDelaySeconds: 20
112 periodSeconds: 10
113 port: http-api
guillaume.lambert600dc982021-10-20 20:42:32 +0200114
rameshiyer2701b8cc02021-09-21 15:07:50 +0100115service:
116 type: ClusterIP
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000117 name: policy-clamp-ac-http-ppnt
rameshiyer2701b8cc02021-09-21 15:07:50 +0100118 useNodePortExt: true
119 ports:
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000120 - name: http-api
121 port: 8084
122 nodePort: 42
rameshiyer2701b8cc02021-09-21 15:07:50 +0100123
rameshiyer2701b8cc02021-09-21 15:07:50 +0100124
125flavor: small
126resources:
127 small:
128 limits:
129 cpu: 1
130 memory: 4Gi
131 requests:
132 cpu: 100m
133 memory: 1Gi
134 large:
135 limits:
136 cpu: 2
137 memory: 8Gi
138 requests:
139 cpu: 200m
140 memory: 2Gi
141 unlimited: {}
rameshiyer2701b8cc02021-09-21 15:07:50 +0100142#Pods Service Account
143serviceAccount:
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000144 nameOverride: policy-clamp-ac-http-ppnt
rameshiyer2701b8cc02021-09-21 15:07:50 +0100145 roles:
FrancescoFioraEst9c79e262022-02-22 13:12:19 +0000146 - read
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +0100147
148config:
149# Event consumption (kafka) properties
150 useStrimziKafka: true
151 kafkaBootstrap: strimzi-kafka-bootstrap
152 kafka:
153 consumer:
154 groupId: policy-group
155 app:
156 listener:
157 acRuntimeTopic: policy-acruntime-participant
158# If targeting a custom kafka cluster, ie useStrimziKakfa: false
159# uncomment below config and target your kafka bootstrap servers,
160# along with any other security config.
161#
162# eventConsumption:
163# spring.kafka.bootstrap-servers: <kafka-bootstrap>:9092
164# spring.kafka.security.protocol: PLAINTEXT
165# spring.kafka.consumer.group-id: policy-group
166#
167# Any new property can be added in the env by setting in overrides in the format mentioned below
168# All the added properties must be in "key: value" format instead of yaml.
169# additional:
170# spring.config.max-size: 200
171# spring.config.min-size: 10
172