blob: 8a83427c4b4047014cdd9cf47e73d7790c59846c [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002#
3# Licensed under the Apache License, Version 2.0 (the "License");
4# you may not use this file except in compliance with the License.
5# You may obtain a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS,
11# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12# See the License for the specific language governing permissions and
13# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000014#################################################################
15# Global configuration defaults.
16#################################################################
17global:
18 nodePortPrefix: 302
19 nodePortPrefixExt: 304
20 repository: nexus3.onap.org:10001
21 readinessRepository: oomk8s
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000022 readinessImage: readiness-check:2.0.2
sunilb0a97ab22020-02-25 10:18:48 +053023 loggingRepository: docker.elastic.co
24 loggingImage: beats/filebeat:5.5.0
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +010025 soBaseImage: onap/so/base-image:1.0
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000026 mariadbGalera:
27 nameOverride: mariadb-galera
28 serviceName: mariadb-galera
29 servicePort: "3306"
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010030 # mariadbRootPassword: secretpassword
31 # rootPasswordExternalSecret: some secret
sarada prasad sahooae2c7342019-07-10 14:40:12 +053032 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000033 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
34 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000035 persistence:
36 mountPath: /dockerdata-nfs
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000037 #This configuration will run the migration. The configurations are for backing up the data
38 #from DB and then restoring it to the present versions preferred DB.
39 migration:
40 enabled: false
41 dbHost: mariadb-galera
42 dbPort: 3306
43 dbUser: root
44 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010045 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000046 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000047 security:
48 aaf:
49 enabled: false
50 aaf:
51 auth:
52 header: Basic c29Ac28ub25hcC5vcmc6ZGVtbzEyMzQ1Ngo=
53 encrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
54 app:
55 siteName: onapheat
56 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
57 defaultCloudOwner: onap
58 cadi:
59 cadiLoglevel: DEBUG
60 cadiKeyFile: /app/org.onap.so.keyfile
61 cadiTrustStore: /app/org.onap.so.trust.jks
62 cadiTruststorePassword: enc:MFpuxKeYK6Eo6QXjDUjtOBbp0FthY7SB4mKSIJm_RWC
63 cadiLatitude: 38.4329
64 cadiLongitude: -90.43248
65 aafEnv: IST
66 aafApiVersion: 2.1
67 aafRootNs: org.onap.so
68 aafLocateUrl: https://aaf-locate.onap:8095
69 aafUrl: https://aaf-locate.onap:8095/locate/org.osaaf.aaf.service:2.1
70 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
71 client:
72 certs:
73 trustStorePassword: b25hcDRzbw==
74 keyStorePassword: c280b25hcA==
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +010075 certificates:
76 path: /etc/ssl/certs
77 share_path: /usr/local/share/ca-certificates/
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010078
79#################################################################
80# Secrets metaconfig
81#################################################################
82secrets:
83 - uid: db-root-pass
84 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
85 type: password
86 externalSecret: '{{ ternary .Values.global.mariadbGalera.rootPasswordExternalSecret (default (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.rootPasswordExternalSecret) .Values.global.mariadbGalera.localCluster }}'
87 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
88 - uid: db-backup-creds
89 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
90 type: basicAuth
91 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
92 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
93 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
94 passwordPolicy: required
95 annotations:
96 helm.sh/hook: pre-upgrade,pre-install
97 helm.sh/hook-weight: "0"
98 helm.sh/hook-delete-policy: before-hook-creation
99 - uid: db-user-creds
100 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
101 type: basicAuth
102 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
103 login: '{{ .Values.dbCreds.userName }}'
104 password: '{{ .Values.dbCreds.userPassword }}'
105 passwordPolicy: generate
106 - uid: db-admin-creds
107 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
108 type: basicAuth
109 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
110 login: '{{ .Values.dbCreds.adminName }}'
111 password: '{{ .Values.dbCreds.adminPassword }}'
112 passwordPolicy: generate
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100113 - uid: "so-onap-certs"
114 name: &so-certs '{{ include "common.release" . }}-so-certs'
115 externalSecret: '{{ tpl (default "" .Values.certSecret) . }}'
116 type: generic
117 filePaths:
118 - resources/config/certificates/onap-ca.crt
119 - resources/config/certificates/msb-ca.crt
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100120
jmacc4f04d32018-10-12 18:24:24 +0000121#################################################################
122# Application configuration defaults.
123#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100124
125dbSecrets: &dbSecrets
126 userCredsExternalSecret: *dbUserCredsSecretName
127 adminCredsExternalSecret: *dbAdminCredsSecretName
128
129# unused in this, just to pass to subcharts
130dbCreds:
131 userName: so_user
132 adminName: so_admin
133
Mike Elliottd32d36e2018-02-12 15:54:03 -0500134repository: nexus3.onap.org:10001
seshukm8325af52020-03-27 22:20:41 +0530135image: onap/so/api-handler-infra:1.6.0
jmacc4f04d32018-10-12 18:24:24 +0000136pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000137replicaCount: 1
138minReadySeconds: 10
139containerPort: 8080
140logPath: ./logs/apih/
141app: api-handler-infra
142service:
143 type: NodePort
Mandeep Khindadc2b43e2018-09-06 16:34:19 +0000144 nodePort: 77
Brian Freeman1a667932018-09-06 14:45:37 -0500145 internalPort: 8080
Mandeep Khindafe527eb2018-10-16 09:56:34 -0400146 externalPort: 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000147 portName: so-apih-port
148updateStrategy:
149 type: RollingUpdate
150 maxUnavailable: 1
151 maxSurge: 1
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400152# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000153flavor: small
154# Segregation for Different environment (Small and Large)
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100155persistence:
156 certificatesPath: /certificates
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000157resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000158 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000159 limits:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000160 cpu: 2000m
vaibhav16dec0da88292018-08-13 06:10:27 +0000161 memory: 4Gi
162 requests:
163 cpu: 500m
164 memory: 1Gi
165 large:
166 limits:
167 cpu: 4000m
168 memory: 8Gi
169 requests:
170 cpu: 1000m
171 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000172 unlimited: {}
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000173livenessProbe:
Ramesh Parthasarathy1ceefda2018-09-14 21:22:43 +0000174 path: /manage/health
175 scheme: HTTP
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000176 initialDelaySeconds: 600
177 periodSeconds: 60
178 timeoutSeconds: 10
179 successThreshold: 1
180 failureThreshold: 3
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000181
Mike Elliottd32d36e2018-02-12 15:54:03 -0500182nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500183affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000184
sunilb0a97ab22020-02-25 10:18:48 +0530185# application configuration
186config:
187 logstashServiceName: log-ls
188 logstashPort: 5044
189
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000190#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
191#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
192# --set so.global.mariadbGalera.localCluster=true \
193# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
194# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
195mariadb-galera:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100196 config:
197 mariadbRootPasswordExternalSecret: *dbRootPassSecretName
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000198 nameOverride: so-mariadb-galera
199 replicaCount: 1
200 service:
201 name: so-mariadb-galera
202 persistence:
203 mountSubPath: so/mariadb-galera/data
204 enabled: true
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200205
206ingress:
207 enabled: false
208 service:
209 - baseaddr: "so"
210 name: "so"
211 port: 8080
212 config:
rope252c5e14bb2020-01-02 11:03:59 +0000213 ssl: "none"
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000214
215mso:
216 adapters:
217 requestDb:
218 auth: Basic YnBlbDpwYXNzd29yZDEk
219 config:
220 cadi:
221 aafId: so@so.onap.org
222 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
223 apiEnforcement: org.onap.so.apihPerm
224 noAuthn: /manage/health
225 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
226 sdc:
227 client:
228 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
229 aai:
230 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
231 so:
232 operationalEnv:
233 dmaap:
234 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
235 health:
236 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100237
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000238so-bpmn-infra:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100239 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100240 db:
241 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000242 cds:
243 auth: Basic Y2NzZGthcHBzOmNjc2RrYXBwcw==
244 aai:
245 auth: 221187EFA3AD4E33600DE0488F287099934CE65C3D0697BCECC00BB58E784E07CD74A24581DC31DBC086FF63DF116378776E9BE3D1325885
246 mso:
247 key: 07a7159d3bf51a0e53be7a8f89699be7
248 adapters:
249 requestDb:
250 auth: Basic YnBlbDpwYXNzd29yZDEk
251 db:
252 auth: A3745B5DBE165EFCF101D85A6FC81C211AB8BF604F8861B6C413D5DC90F8F30E0139DE44B8A342F4EF70AF
253 password: wLg4sjrAFUS8rfVfdvTXeQ==
254 po:
255 auth: A3745B5DBE165EFCF101D85A6FC81C211AB8BF604F8861B6C413D5DC90F8F30E0139DE44B8A342F4EF70AF
256 config:
257 cadi:
258 aafId: so@so.onap.org
259 aaafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
260 apiEnforcement: org.onap.so.bpmnPerm
261 noAuthn: /manage/health
262 sdnc:
263 password: 1D78CFC35382B6938A989066A7A7EAEF4FE933D2919BABA99EB4763737F39876C333EE5F
264 sniro:
265 auth: test:testpwd
266 endpoint: http://replaceme:28090/optimizationInstance/V1/create
267 oof:
268 auth: test:testpwd
269 so:
270 vnfm:
271 adapter:
272 auth: Basic dm5mbTpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100273
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000274so-catalog-db-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100275 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100276 db:
277 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000278 mso:
279 config:
280 cadi:
281 aafId: so@so.onap.org
282 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
283 apiEnforcement: org.onap.so.catalogDbAdapterPerm
284 noAuthn: /manage/health
285 adapters:
286 db:
287 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100288
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100289so-monitoring:
290 certSecret: *so-certs
291 db:
292 <<: *dbSecrets
293
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000294so-openstack-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100295 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100296 db:
297 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000298 aaf:
299 auth:
300 encrypted: 7F182B0C05D58A23A1C4966B9CDC9E0B8BC5CD53BC8C7B4083D869F8D53E9BDC3EFD55C94B1D3F
301 aai:
302 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
303 org:
304 onap:
305 so:
306 adapters:
307 bpelauth: D1A67FA93B6A6419132D0F83CC771AF774FD3C60853C50C22C8C6FC5088CC79E9E81EDE9EA39F22B2F66A0068E
308 valet:
309 basic_auth: bXNvOkphY2tkYXdzIGxvdmUgbXkgYmlnIHNwaGlueCBvZiBxdWFydHouCg==
310 mso:
311 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
312 auth: BEA8637716A7EB617DF472BA6552D22F68C1CB17B0D094D77DDA562F4ADAAC4457CAB848E1A4
Ramesh Parthasarathybb611922020-03-18 00:00:30 +0000313 basicUser: poBpmn
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000314 config:
315 cadi:
316 aafId: so@so.onap.org
317 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
318 apiEnforcement: org.onap.so.openStackAdapterPerm
319 noAuthn: /manage/health
320 db:
321 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100322
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000323so-request-db-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100324 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100325 db:
326 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000327 mso:
328 config:
329 cadi:
330 aafId: so@so.onap.org
331 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
332 apiEnforcement: org.onap.so.requestDbAdapterPerm
333 noAuthn: /manage/health
334 adapters:
335 requestDb:
336 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100337
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000338so-sdc-controller:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100339 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100340 db:
341 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000342 aai:
343 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
344 mso:
345 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
346 config:
347 cadi:
348 aafId: so@so.onap.org
349 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
350 apiEnforcement: org.onap.so.sdcControllerPerm
351 noAuthn: /manage/health
352 asdc:
353 config:
354 key: 566B754875657232314F5548556D3665
355 requestDb:
356 auth: Basic YnBlbDpwYXNzd29yZDEk
357 asdc-connections:
358 asdc-controller1:
359 password: 76966BDD3C7414A03F7037264FF2E6C8EEC6C28F2B67F2840A1ED857C0260FEE731D73F47F828E5527125D29FD25D3E0DE39EE44C058906BF1657DE77BF897EECA93BDC07FA64F
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100360
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000361so-sdnc-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100362 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100363 db:
364 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000365 org:
366 onap:
367 so:
368 adapters:
369 sdnc:
370 bpelauth: 4C18603C5AE7E3A42A6CED95CDF9C0BA9B2109B3725747662E5D34E5FDF63DA9ADEBB08185098F14699195FDE9475100
371 sdncauth: ED07A7EE5F099FA53369C3DF2240AD68A00154676EEDBC6F8C16BAA83B1912941B8941ABD48683D2C1072DA7040659692DE936A59BBF42A038CF71DE67B4A375190071EC76EA657801B033C135
372 network:
373 encryptionKey: 07a7159d3bf51a0e53be7a8f89699be7
374 mso:
375 config:
376 cadi:
377 aafId: so@so.onap.org
378 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
379 apiEnforcement: org.onap.so.sdncAdapterPerm
380 noAuthn: /manage/health
381 adapters:
382 requestDb:
383 auth: Basic YnBlbDpwYXNzd29yZDEk
384 rest:
385 aafEncrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100386
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100387so-ve-vnfm-adapter:
388 certSecret: *so-certs
389
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000390so-vfc-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100391 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100392 db:
393 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000394 mso:
395 config:
396 cadi:
397 aafId: so@so.onap.org
398 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
399 apiEnforcement: org.onap.so.vfcAdapterPerm
400 noAuthn: /manage/health
401 adapters:
402 requestDb:
403 auth: Basic YnBlbDpwYXNzd29yZDEk
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100404
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000405so-vnfm-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100406 certSecret: *so-certs
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000407 aaf:
408 auth:
409 username: so@so.onap.org
410 password: 8DB1C939BFC6A35C3832D0E52E452D0E05AE2537AF142CECD125FF827C05A972FDD0F4700547DA
411 aai:
412 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
413 sdc:
414 username: mso
415 password: 76966BDD3C7414A03F7037264FF2E6C8EEC6C28F2B67F2840A1ED857C0260FEE731D73F47F828E5527125D29FD25D3E0DE39EE44C058906BF1657DE77BF897EECA93BDC07FA64F
416 key: 566B754875657232314F5548556D3665
417 mso:
418 key: 07a7159d3bf51a0e53be7a8f89699be7
419 config:
420 cadi:
421 aafId: so@so.onap.org
422 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
423 apiEnforcement: org.onap.so.vnfmAdapterPerm
424 noAuthn: /manage/health
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100425
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100426so-mariadb:
427 db:
428 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
429 rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
430 backupCredsExternalSecret: *dbBackupCredsSecretName
431 userCredsExternalSecret: *dbUserCredsSecretName
432 adminCredsExternalSecret: *dbAdminCredsSecretName