Lathish | 818ee5d | 2020-08-26 13:45:03 +0100 | [diff] [blame] | 1 | ################################################################################ |
| 2 | # Copyright (c) 2020 Nordix Foundation. # |
Konrad Bańka | 52c38b9 | 2020-10-28 16:49:19 +0100 | [diff] [blame] | 3 | # Copyright © 2020 Samsung Electronics, Modifications # |
Lathish | 818ee5d | 2020-08-26 13:45:03 +0100 | [diff] [blame] | 4 | # # |
| 5 | # Licensed under the Apache License, Version 2.0 (the "License"); # |
| 6 | # you may not use this file except in compliance with the License. # |
| 7 | # You may obtain a copy of the License at # |
| 8 | # # |
| 9 | # http://www.apache.org/licenses/LICENSE-2.0 # |
| 10 | # # |
| 11 | # Unless required by applicable law or agreed to in writing, software # |
| 12 | # distributed under the License is distributed on an "AS IS" BASIS, # |
| 13 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # |
| 14 | # See the License for the specific language governing permissions and # |
| 15 | # limitations under the License. # |
| 16 | ################################################################################ |
| 17 | # Default values for Policy Management Service. |
| 18 | # This is a YAML-formatted file. |
| 19 | # Declare variables to be passed into your templates. |
| 20 | |
| 21 | global: |
Sylvain Desbureaux | d4a6afd | 2020-11-21 22:01:15 +0100 | [diff] [blame] | 22 | nodePortPrefix: 302 |
Lathish | 818ee5d | 2020-08-26 13:45:03 +0100 | [diff] [blame] | 23 | |
| 24 | secrets: |
| 25 | - uid: controller-secret |
| 26 | type: basicAuth |
| 27 | externalSecret: '{{ tpl (default "" .Values.a1controller.credsExternalSecret) . }}' |
| 28 | login: '{{ .Values.a1controller.user }}' |
| 29 | password: '{{ .Values.a1controller.password }}' |
| 30 | passwordPolicy: required |
| 31 | |
Sylvain Desbureaux | b5353c9 | 2021-02-15 11:30:29 +0100 | [diff] [blame] | 32 | ################################################################# |
| 33 | # AAF part |
| 34 | ################################################################# |
| 35 | certInitializer: |
| 36 | nameOverride: a1p-cert-initializer |
| 37 | aafDeployFqi: deployer@people.osaaf.org |
| 38 | aafDeployPass: demo123456! |
| 39 | # aafDeployCredsExternalSecret: some secret |
| 40 | fqdn: a1p |
| 41 | fqi: a1p@a1p.onap.org |
| 42 | public_fqdn: a1p.onap.org |
| 43 | cadi_longitude: "0.0" |
| 44 | cadi_latitude: "0.0" |
| 45 | app_ns: org.osaaf.aaf |
| 46 | credsPath: /opt/app/osaaf/local |
| 47 | fqi_namespace: org.onap.a1p |
| 48 | aaf_add_config: | |
| 49 | echo "*** changing them into shell safe ones" |
| 50 | export KEYSTORE_PASSWORD=$(tr -cd '[:alnum:]' < /dev/urandom | fold -w64 | head -n1) |
| 51 | export TRUSTSORE_PASSWORD=$(tr -cd '[:alnum:]' < /dev/urandom | fold -w64 | head -n1) |
| 52 | cd {{ .Values.credsPath }} |
| 53 | keytool -storepasswd -new "${KEYSTORE_PASSWORD}" \ |
| 54 | -storepass "${cadi_keystore_password_p12}" \ |
| 55 | -keystore {{ .Values.fqi_namespace }}.p12 |
| 56 | keytool -storepasswd -new "${TRUSTSORE_PASSWORD}" \ |
| 57 | -storepass "${cadi_truststore_password}" \ |
| 58 | -keystore {{ .Values.fqi_namespace }}.trust.jks |
| 59 | echo "*** set key password as same password as keystore password" |
| 60 | keytool -keypasswd -new "${KEYSTORE_PASSWORD}" \ |
| 61 | -keystore {{ .Values.fqi_namespace }}.p12 \ |
| 62 | -keypass "${cadi_keystore_password_p12}" \ |
| 63 | -storepass "${KEYSTORE_PASSWORD}" -alias {{ .Values.fqi }} |
| 64 | echo "*** save the generated passwords" |
| 65 | echo "KEYSTORE_PASSWORD=${KEYSTORE_PASSWORD}" > mycreds.prop |
| 66 | echo "TRUSTSORE_PASSWORD=${TRUSTSORE_PASSWORD}" >> mycreds.prop |
| 67 | echo "*** change ownership of certificates to targeted user" |
| 68 | chown -R 1000 . |
| 69 | |
Konrad Bańka | 0892b9d | 2020-10-30 14:19:01 +0100 | [diff] [blame] | 70 | image: onap/ccsdk-oran-a1policymanagementservice:1.0.1 |
Konrad Bańka | 52c38b9 | 2020-10-28 16:49:19 +0100 | [diff] [blame] | 71 | userID: 1000 #Should match with image-defined user ID |
| 72 | groupID: 999 #Should match with image-defined group ID |
Lathish | 818ee5d | 2020-08-26 13:45:03 +0100 | [diff] [blame] | 73 | pullPolicy: IfNotPresent |
| 74 | replicaCount: 1 |
| 75 | |
| 76 | service: |
| 77 | type: NodePort |
| 78 | name: a1policymanagement |
| 79 | both_tls_and_plain: true |
| 80 | ports: |
| 81 | - name: api |
| 82 | port: 8433 |
| 83 | plain_port: 8081 |
| 84 | port_protocol: http |
| 85 | nodePort: '94' |
| 86 | |
| 87 | # SDNC Credentials are used here |
| 88 | a1controller: |
| 89 | user: admin |
| 90 | password: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U |
| 91 | |
| 92 | sdncLink: https://sdnc.onap:8443 |
| 93 | # Add your own A1 Mediator link. Supports both STD & OSC Version. ex. http://<ip>:<port> |
| 94 | # Alternatively you can also use the A1 simulator available in ORAN. It provides STD & OSC Version for A1 termination. |
| 95 | # Refer source code & run in docker container : https://gerrit.o-ran-sc.org/r/admin/repos/sim/a1-interface |
| 96 | # Refer it/dep repo for k8's deployment: https://gerrit.o-ran-sc.org/r/admin/repos/it/dep |
| 97 | ricLink: |
| 98 | streamPublish: http://message-router:3904/events/A1-POLICY-AGENT-WRITE |
| 99 | streamSubscribe: http://message-router:3904/events/A1-POLICY-AGENT-READ/users/policy-agent?timeout=15000&limit=100 |
| 100 | |
| 101 | liveness: |
| 102 | port: api |
| 103 | initialDelaySeconds: 60 |
| 104 | periodSeconds: 10 |
| 105 | readiness: |
| 106 | port: api |
| 107 | initialDelaySeconds: 60 |
| 108 | periodSeconds: 10 |
| 109 | |
| 110 | #Resource Limit flavor -By Default using small |
| 111 | flavor: small |
| 112 | |
| 113 | resources: |
| 114 | small: |
| 115 | limits: |
| 116 | cpu: 2 |
| 117 | memory: 4Gi |
| 118 | requests: |
| 119 | cpu: 1 |
| 120 | memory: 2Gi |
| 121 | large: |
| 122 | limits: |
| 123 | cpu: 4 |
| 124 | memory: 8Gi |
| 125 | requests: |
| 126 | cpu: 2 |
| 127 | memory: 4Gi |
| 128 | unlimited: {} |