blob: 09805bd496c2eae700b1cbac8ebbfbfd390e3aaf [file] [log] [blame]
mmis9cb50292018-09-19 00:31:35 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2018 Ericsson. All rights reserved.
jhh999c2242021-02-24 12:10:02 -06003# Modifications Copyright (C) 2019-2021 AT&T Intellectual Property.
mmis9cb50292018-09-19 00:31:35 +01004# ================================================================================
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16#
17# SPDX-License-Identifier: Apache-2.0
18# ============LICENSE_END=========================================================
19
20#################################################################
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020021# Secrets metaconfig
22#################################################################
23secrets:
24 - uid: restserver-creds
25 type: basicAuth
26 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
27 login: '{{ .Values.restServer.user }}'
28 password: '{{ .Values.restServer.password }}'
29 passwordPolicy: required
30 - uid: apiparameters-creds
31 type: basicAuth
32 externalSecret: '{{ tpl (default "" .Values.apiParameters.credsExternalSecret) . }}'
33 login: '{{ .Values.apiParameters.user }}'
34 password: '{{ .Values.apiParameters.password }}'
35 passwordPolicy: required
36 - uid: papparameters-creds
37 type: basicAuth
38 externalSecret: '{{ tpl (default "" .Values.papParameters.credsExternalSecret) . }}'
39 login: '{{ .Values.papParameters.user }}'
40 password: '{{ .Values.papParameters.password }}'
41 passwordPolicy: required
42 - uid: sdcbe-creds
43 type: basicAuth
44 externalSecret: '{{ tpl (default "" .Values.sdcBe.credsExternalSecret) . }}'
45 login: '{{ .Values.sdcBe.user }}'
46 password: '{{ .Values.sdcBe.password }}'
47 passwordPolicy: required
jhhd4258672020-08-09 12:08:08 -050048 - uid: keystore-password
49 type: password
50 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
51 password: '{{ .Values.certStores.keyStorePassword }}'
52 passwordPolicy: required
53 - uid: truststore-password
54 type: password
55 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
56 password: '{{ .Values.certStores.trustStorePassword }}'
57 passwordPolicy: required
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020058
59#################################################################
mmis9cb50292018-09-19 00:31:35 +010060# Global configuration defaults.
61#################################################################
62global:
63 persistence: {}
jhhd4258672020-08-09 12:08:08 -050064 aafEnabled: true
mmis9cb50292018-09-19 00:31:35 +010065
66#################################################################
67# Application configuration defaults.
68#################################################################
69# application image
jhh32367fc2021-03-10 13:10:47 -060070image: onap/policy-distribution:2.5.2
mmis9cb50292018-09-19 00:31:35 +010071pullPolicy: Always
72
73# flag to enable debugging - application support required
74debugEnabled: false
75
76# application configuration
77
Dominik Mizyn4aa534f2020-04-14 18:03:53 +020078restServer:
79 user: healthcheck
80 password: zb!XztG34
81apiParameters:
82 user: healthcheck
83 password: zb!XztG34
84papParameters:
85 user: healthcheck
86 password: zb!XztG34
87sdcBe:
88 user: policy
89 password: Kp8bJ4SXszM0WXlhak3eHlcse2gAw84vaoGGmJvUy2U
jhhd4258672020-08-09 12:08:08 -050090certStores:
91 keyStorePassword: Pol1cy_0nap
92 trustStorePassword: Pol1cy_0nap
93
94certInitializer:
95 nameOverride: policy-distribution-cert-initializer
96 aafDeployFqi: deployer@people.osaaf.org
97 aafDeployPass: demo123456!
98 fqdn: policy
99 fqi: policy@policy.onap.org
100 public_fqdn: policy.onap.org
101 cadi_latitude: "0.0"
102 cadi_longitude: "0.0"
103 credsPath: /opt/app/osaaf/local
104 app_ns: org.osaaf.aaf
105 uid: 100
106 gid: 101
107 aaf_add_config: >
108 /opt/app/aaf_config/bin/agent.sh;
109 export $(/opt/app/aaf_config/bin/agent.sh local showpass
110 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
111 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
112 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
113 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
Dominik Mizyn4aa534f2020-04-14 18:03:53 +0200114
mmis9cb50292018-09-19 00:31:35 +0100115# default number of instances
116replicaCount: 1
117
118nodeSelector: {}
119
120affinity: {}
121
122# probe configuration parameters
123liveness:
124 initialDelaySeconds: 20
125 periodSeconds: 10
126 # necessary to disable liveness probe when setting breakpoints
127 # in debugger so K8s doesn't restart unresponsive container
128 enabled: true
129
130readiness:
131 initialDelaySeconds: 20
132 periodSeconds: 10
133
134service:
135 type: ClusterIP
136 name: policy-distribution
137 portName: policy-distribution
jhh59ce22d2019-05-14 17:59:36 -0500138 externalPort: 6969
mmis9cb50292018-09-19 00:31:35 +0100139 internalPort: 6969
140
141ingress:
142 enabled: false
143
jhhd4258672020-08-09 12:08:08 -0500144flavor: small
145resources:
146 small:
147 limits:
148 cpu: 1
149 memory: 4Gi
150 requests:
151 cpu: 100m
152 memory: 1Gi
153 large:
154 limits:
155 cpu: 2
156 memory: 8Gi
157 requests:
158 cpu: 200m
159 memory: 2Gi
160 unlimited: {}