blob: 0b2ea9f20c27aa465c4f380ec991ec4eefaea95a [file] [log] [blame]
Chenfei Gao9292e882019-02-27 22:14:45 -05001# ============LICENSE_START=======================================================
jhh999c2242021-02-24 12:10:02 -06002# Copyright (C) 2019-2021 AT&T Intellectual Property. All rights reserved.
Chenfei Gao9292e882019-02-27 22:14:45 -05003# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
23 nodePortPrefix: 304
24 persistence: {}
jhhd4258672020-08-09 12:08:08 -050025 aafEnabled: true
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020026
27#################################################################
28# Secrets metaconfig
29#################################################################
30secrets:
Dominik Mizyn11038102020-04-14 17:14:42 +020031 - uid: db-creds
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020032 type: basicAuth
33 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
34 login: '{{ .Values.db.user }}'
35 password: '{{ .Values.db.password }}'
36 passwordPolicy: required
Dominik Mizyn11038102020-04-14 17:14:42 +020037 - uid: restserver-creds
38 type: basicAuth
39 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
40 login: '{{ .Values.restServer.user }}'
41 password: '{{ .Values.restServer.password }}'
42 passwordPolicy: required
jhhd4258672020-08-09 12:08:08 -050043 - uid: keystore-password
44 type: password
45 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
46 password: '{{ .Values.certStores.keyStorePassword }}'
47 passwordPolicy: required
48 - uid: truststore-password
49 type: password
50 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
51 password: '{{ .Values.certStores.trustStorePassword }}'
52 passwordPolicy: required
53
54certStores:
55 keyStorePassword: Pol1cy_0nap
56 trustStorePassword: Pol1cy_0nap
57
58certInitializer:
59 nameOverride: policy-api-cert-initializer
60 aafDeployFqi: deployer@people.osaaf.org
61 aafDeployPass: demo123456!
62 fqdn: policy
63 fqi: policy@policy.onap.org
64 public_fqdn: policy.onap.org
65 cadi_latitude: "0.0"
66 cadi_longitude: "0.0"
67 credsPath: /opt/app/osaaf/local
68 app_ns: org.osaaf.aaf
69 uid: 100
70 gid: 101
71 aaf_add_config: >
72 /opt/app/aaf_config/bin/agent.sh;
73 export $(/opt/app/aaf_config/bin/agent.sh local showpass
74 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
75 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
76 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
77 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
78
Chenfei Gao9292e882019-02-27 22:14:45 -050079
80#################################################################
81# Application configuration defaults.
82#################################################################
83# application image
jhh32367fc2021-03-10 13:10:47 -060084image: onap/policy-api:2.4.2
Chenfei Gao9292e882019-02-27 22:14:45 -050085pullPolicy: Always
86
87# flag to enable debugging - application support required
88debugEnabled: false
89
90# application configuration
Krzysztof Opasiak09d1b312020-03-31 23:44:22 +020091db:
92 user: policy_user
93 password: policy_user
jhhd4258672020-08-09 12:08:08 -050094 service:
95 name: policy-mariadb
96 internalPort: 3306
97
Dominik Mizyn11038102020-04-14 17:14:42 +020098restServer:
99 user: healthcheck
100 password: zb!XztG34
Chenfei Gao9292e882019-02-27 22:14:45 -0500101
102# default number of instances
103replicaCount: 1
104
105nodeSelector: {}
106
107affinity: {}
108
109# probe configuration parameters
110liveness:
111 initialDelaySeconds: 20
112 periodSeconds: 10
113 # necessary to disable liveness probe when setting breakpoints
114 # in debugger so K8s doesn't restart unresponsive container
115 enabled: true
116
117readiness:
118 initialDelaySeconds: 20
119 periodSeconds: 10
120
121service:
jhh59ce22d2019-05-14 17:59:36 -0500122 type: ClusterIP
Chenfei Gao9292e882019-02-27 22:14:45 -0500123 name: policy-api
124 portName: policy-api
jhh59ce22d2019-05-14 17:59:36 -0500125 externalPort: 6969
Chenfei Gao9292e882019-02-27 22:14:45 -0500126 internalPort: 6969
127 nodePort: 40
128
129ingress:
130 enabled: false
131
jhhd4258672020-08-09 12:08:08 -0500132flavor: small
133resources:
134 small:
135 limits:
136 cpu: 1
137 memory: 4Gi
138 requests:
139 cpu: 100m
140 memory: 1Gi
141 large:
142 limits:
143 cpu: 2
144 memory: 8Gi
145 requests:
146 cpu: 200m
147 memory: 2Gi
148 unlimited: {}
149