blob: c9ced1fc1358007f4a725d8b52aae998135546ac [file] [log] [blame]
Michael Mokryafae9972019-03-11 14:46:34 -05001# ============LICENSE_START=======================================================
jhhd2b9ed82019-12-10 17:15:28 -06002# Copyright (C) 2019-2020 AT&T Intellectual Property. All rights reserved.
Michael Mokryafae9972019-03-11 14:46:34 -05003# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
23 persistence: {}
Dominik Mizync88bcc92020-04-14 18:20:20 +020024 envsubstImage: dibi/envsubst
Michael Mokryafae9972019-03-11 14:46:34 -050025
26#################################################################
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020027# Secrets metaconfig
28#################################################################
29secrets:
30 - uid: db-secret
31 type: basicAuth
32 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
33 login: '{{ .Values.db.user }}'
34 password: '{{ .Values.db.password }}'
35 passwordPolicy: required
Dominik Mizync88bcc92020-04-14 18:20:20 +020036 - uid: restserver-creds
37 type: basicAuth
38 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
39 login: '{{ .Values.restServer.user }}'
40 password: '{{ .Values.restServer.password }}'
41 passwordPolicy: required
42 - uid: api-creds
43 type: basicAuth
44 externalSecret: '{{ tpl (default "" .Values.apiServer.credsExternalSecret) . }}'
45 login: '{{ .Values.apiServer.user }}'
46 password: '{{ .Values.apiServer.password }}'
47 passwordPolicy: required
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020048
49#################################################################
Michael Mokryafae9972019-03-11 14:46:34 -050050# Application configuration defaults.
51#################################################################
52# application image
53repository: nexus3.onap.org:10001
jhh080016d2020-05-22 09:59:49 -050054image: onap/policy-xacml-pdp:2.2.2
Michael Mokryafae9972019-03-11 14:46:34 -050055pullPolicy: Always
56
57# flag to enable debugging - application support required
58debugEnabled: false
59
60# application configuration
61
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020062db:
63 user: policy_user
64 password: policy_user
Dominik Mizync88bcc92020-04-14 18:20:20 +020065restServer:
66 user: healthcheck
67 password: zb!XztG34
68apiServer:
69 user: healthcheck
70 password: zb!XztG34
Krzysztof Opasiak7e31efc2020-04-01 00:21:45 +020071
Michael Mokryafae9972019-03-11 14:46:34 -050072# default number of instances
ramverma39a79a42019-05-02 13:07:36 +000073replicaCount: 1
Michael Mokryafae9972019-03-11 14:46:34 -050074
75nodeSelector: {}
76
77affinity: {}
78
79# probe configuration parameters
80liveness:
81 initialDelaySeconds: 20
82 periodSeconds: 10
83 # necessary to disable liveness probe when setting breakpoints
84 # in debugger so K8s doesn't restart unresponsive container
85 enabled: true
86
87readiness:
88 initialDelaySeconds: 20
89 periodSeconds: 10
90
91service:
92 type: ClusterIP
93 name: policy-xacml-pdp
94 portName: policy-xacml-pdp
95 externalPort: 6969
96 internalPort: 6969
97
98ingress:
99 enabled: false
100
101resources: {}