blob: f53c41c0f5b517e81ff86a336de5790d17cb3362 [file] [log] [blame]
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +01001{{/*
egernug27578332020-03-26 10:27:55 +00002# Copyright © 2020 Samsung Electronics
jmac065e2ce2018-03-29 01:18:02 +00003# Copyright © 2017 Amdocs, Bell Canada
Remigiusz Janeczek42177a12020-12-10 13:10:15 +01004# Copyright © 2021 Nokia
jmac065e2ce2018-03-29 01:18:02 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010017*/}}
jmac065e2ce2018-03-29 01:18:02 +000018
Grzegorz-Lis1318a772020-07-23 15:08:43 +020019apiVersion: apps/v1
jmac065e2ce2018-03-29 01:18:02 +000020kind: StatefulSet
Alexander Dehn9b797d62020-04-21 09:53:50 +000021metadata: {{- include "common.resourceMetadata" . | nindent 2 }}
jmac065e2ce2018-03-29 01:18:02 +000022spec:
Grzegorz-Lis1318a772020-07-23 15:08:43 +020023 selector:
24 matchLabels:
25 app: {{ include "common.name" . }}
BorislavG1ffbd992018-04-24 07:56:27 +000026 serviceName: {{ include "common.servicename" . }}-cluster
jmac065e2ce2018-03-29 01:18:02 +000027 replicas: {{ .Values.replicaCount }}
Alexander Dehn9b797d62020-04-21 09:53:50 +000028 selector: {{- include "common.selectors" . | nindent 4 }}
jmac065e2ce2018-03-29 01:18:02 +000029 podManagementPolicy: Parallel
30 template:
Alexander Dehn9b797d62020-04-21 09:53:50 +000031 metadata: {{- include "common.templateMetadata" . | nindent 6 }}
jmac065e2ce2018-03-29 01:18:02 +000032 spec:
33 initContainers:
34 - command:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010035 - sh
36 args:
37 - -c
38 - "cd /config-input && for PFILE in `ls -1 .`; do envsubst <${PFILE} >/config/${PFILE}; done"
39 env:
40 - name: AAI_CLIENT_NAME
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010041 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010042 - name: AAI_CLIENT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010043 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050044 - name: AAI_TRUSTSTORE_PASSWORD
45 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 10 }}
46 - name: ANSIBLE_TRUSTSTORE_PASSWORD
47 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 10 }}
48 - name: SO_USER
49 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 10 }}
50 - name: SO_PASSWORD
51 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 10 }}
52 - name: NENG_USER
53 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 10 }}
54 - name: NENG_PASSWORD
55 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 10 }}
56 - name: CDS_USER
57 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 10 }}
58 - name: CDS_PASSWORD
59 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 10 }}
60 - name: HONEYCOMB_USER
61 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 10 }}
62 - name: HONEYCOMB_PASSWORD
63 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 10 }}
64 - name: TRUSTSTORE_PASSWORD
65 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 10 }}
66 - name: KEYSTORE_PASSWORD
67 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 10 }}
68 - name: DMAAP_USER
69 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 10 }}
70 - name: DMAAP_PASSWORD
71 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 10 }}
72 - name: DMAAP_AUTHKEY
73 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010074 - name: MODELSERVICE_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010075 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010076 - name: MODELSERVICE_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010077 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010078 - name: RESTCONF_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010079 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010080 - name: RESTCONF_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010081 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010082 - name: ANSIBLE_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010083 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010084 - name: ANSIBLE_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010085 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010086 - name: SCALEOUT_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010087 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010088 - name: SCALEOUT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010089 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010090 - name: NETBOX_APIKEY
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010091 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "netbox-apikey" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010092 - name: SDNC_DB_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010093 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010094 - name: SDNC_DB_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010095 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050096 - name: MYSQL_USER
97 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
98 - name: MYSQL_PASSWORD
99 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Alexander Dehn2ae954d2020-10-20 15:57:42 +0000100 - name: ODL_ADMIN_USERNAME
101 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500102 - name: ODL_USER
103 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
Alexander Dehn2ae954d2020-10-20 15:57:42 +0000104 - name: ODL_ADMIN_PASSWORD
105 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500106 - name: ODL_PASSWORD
107 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
demskeq89d26b332021-01-14 16:45:28 +0100108 {{ if and .Values.config.sdnr.dmaapProxy.enabled .Values.config.sdnr.dmaapProxy.usepwd }}
109 - name: DMAAP_HTTP_PROXY_USERNAME
110 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-proxy-creds" "key" "login") | indent 10 }}
111 - name: DMAAP_HTTP_PROXY_PASSWORD
112 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-proxy-creds" "key" "password") | indent 10 }}
113 {{- end }}
demskeq8b43e92c2021-02-12 15:43:48 +0100114 {{ if .Values.config.sdnr.oauth.enabled }}
115 - name: OAUTH_TOKEN_SECRET
116 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "oauth-token-secret" "key" "password") | indent 10 }}
117 - name: KEYCLOAK_SECRET
118 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keycloak-secret" "key" "password") | indent 10 }}
119
120 - name: ENABLE_ODLUX_RBAC
121 value: "{{ .Values.config.sdnr.oauth.odluxRbac.enabled | default "true" }}"
122 {{ end }}
demskeq89d26b332021-01-14 16:45:28 +0100123
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100124 volumeMounts:
125 - mountPath: /config-input
126 name: config-input
127 - mountPath: /config
128 name: properties
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100129 image: {{ include "repositoryGenerator.image.envsubst" . }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100130 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
131 name: {{ include "common.name" . }}-update-config
demskeq8aa803d02021-11-03 11:56:45 +0100132 {{ if or .Values.dgbuilder.enabled .Values.config.sdnr.enabled -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100133 - command:
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +0200134 - /app/ready.py
jmac065e2ce2018-03-29 01:18:02 +0000135 args:
demskeq8aa803d02021-11-03 11:56:45 +0100136 {{ if .Values.dgbuilder.enabled -}}
jmac065e2ce2018-03-29 01:18:02 +0000137 - --container-name
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100138 - {{ include "common.mariadbService" . }}
Dan Timoney17554772021-04-01 15:49:23 -0400139 - --job-name
140 - {{ include "common.fullname" . }}-dbinit-job
Alexander Dehn9b797d62020-04-21 09:53:50 +0000141 {{ end -}}
142 {{ if .Values.config.sdnr.enabled -}}
demskeq8ad745682021-11-03 10:50:38 +0100143 - --job-name
144 - {{ include "common.fullname" . }}-sdnrdb-init-job
Alexander Dehn9b797d62020-04-21 09:53:50 +0000145 {{ end -}}
jmac065e2ce2018-03-29 01:18:02 +0000146 env:
147 - name: NAMESPACE
148 valueFrom:
149 fieldRef:
150 apiVersion: v1
151 fieldPath: metadata.namespace
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100152 image: {{ include "repositoryGenerator.image.readiness" . }}
jmac065e2ce2018-03-29 01:18:02 +0000153 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100154 name: {{ include "common.name" . }}-readiness
Alexander Dehn9b797d62020-04-21 09:53:50 +0000155 {{ end -}}
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200156{{ include "common.certInitializer.initContainer" . | indent 6 }}
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100157 - name: {{ include "common.name" . }}-chown
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100158 image: {{ include "repositoryGenerator.image.busybox" . }}
Lucjan Bryndza5c63e932020-06-25 08:43:23 +0000159 command:
160 - sh
161 args:
162 - -c
Dan Timoney2ee28a52021-01-15 16:39:50 -0500163 - |
Dan Timoney2ee28a52021-01-15 16:39:50 -0500164 mkdir {{ .Values.persistence.mdsalPath }}/journal
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100165 mkdir {{ .Values.persistence.mdsalPath }}/snapshots
demskeq83b3b7fd2021-02-18 09:41:59 +0100166 mkdir {{ .Values.persistence.mdsalPath }}/daexim
Dan Timoney2ee28a52021-01-15 16:39:50 -0500167 chown -R {{ .Values.config.odlUid }}:{{ .Values.config.odlGid}} {{ .Values.persistence.mdsalPath }}
Lucjan Bryndza5c63e932020-06-25 08:43:23 +0000168{{- if .Values.global.aafEnabled }}
Dan Timoney2ee28a52021-01-15 16:39:50 -0500169 chown -R {{ .Values.config.odlUid }}:{{ .Values.config.odlGid}} {{ .Values.certInitializer.credsPath }}
Lucjan Bryndza5c63e932020-06-25 08:43:23 +0000170{{- end }}
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400171 volumeMounts:
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200172{{ include "common.certInitializer.volumeMount" . | indent 10 }}
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400173 - mountPath: {{ .Values.persistence.mdsalPath }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100174 name: {{ include "common.fullname" . }}-data
jmac065e2ce2018-03-29 01:18:02 +0000175 containers:
176 - name: {{ include "common.name" . }}
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100177 image: {{ include "repositoryGenerator.repository" . }}/{{ .Values.image }}
jmac065e2ce2018-03-29 01:18:02 +0000178 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200179 {{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100180 {{- $linkCommand := include "common.certManager.linkVolumeMounts" . }}
181 lifecycle:
182 postStart:
183 exec:
184 command: ["sh", "-c", {{$linkCommand | quote}} ]
185 {{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000186 command: ["/bin/bash"]
Dan Timoney2ee28a52021-01-15 16:39:50 -0500187 args: ["-c", "/opt/onap/sdnc/bin/createLinks.sh ; /opt/onap/sdnc/bin/startODL.sh"]
jmac065e2ce2018-03-29 01:18:02 +0000188 ports:
189 - containerPort: {{ .Values.service.internalPort }}
190 - containerPort: {{ .Values.service.internalPort2 }}
191 - containerPort: {{ .Values.service.internalPort3 }}
192 - containerPort: {{ .Values.service.clusterPort }}
demskeq827854662021-04-08 14:49:47 +0200193 {{- if .Values.config.sdnr.netconfCallHome.enabled }}
194 - containerPort: {{ .Values.service.callHomePort }}
195 {{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000196 readinessProbe:
197 tcpSocket:
198 port: {{ .Values.service.internalPort }}
199 initialDelaySeconds: {{ .Values.readiness.initialDelaySeconds }}
200 periodSeconds: {{ .Values.readiness.periodSeconds }}
201 env:
demskeq8aa803d02021-11-03 11:56:45 +0100202 {{ if and .Values.config.sdnr.enabled .Values.config.sdnr.sdnronly -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100203 - name: MYSQL_ROOT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100204 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-root-password" "key" "password") | indent 12 }}
demskeq8aa803d02021-11-03 11:56:45 +0100205 {{ end -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100206 - name: ODL_ADMIN_USERNAME
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100207 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500208 - name: ODL_USER
209 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100210 - name: ODL_ADMIN_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100211 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500212 - name: ODL_PASSWORD
213 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100214 - name: SDNC_DB_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100215 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100216 - name: SDNC_DB_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100217 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500218 - name: MYSQL_USER
219 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
220 - name: MYSQL_PASSWORD
221 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
222 - name: MYSQL_DATABASE
223 value: "{{ .Values.config.dbSdnctlDatabase }}"
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100224 - name: SDNC_CONFIG_DIR
225 value: "{{ .Values.config.configDir }}"
Dan Timoney9e310e72021-02-23 11:25:39 -0500226 - name: AAI_CLIENT_NAME
227 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 12 }}
228 - name: AAI_CLIENT_PASSWORD
229 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 12 }}
230 - name: AAI_TRUSTSTORE_PASSWORD
231 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 12 }}
232 - name: ANSIBLE_TRUSTSTORE_PASSWORD
233 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 12 }}
234 - name: SO_USER
235 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 12 }}
236 - name: SO_PASSWORD
237 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 12 }}
238 - name: NENG_USER
239 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 12 }}
240 - name: NENG_PASSWORD
241 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 12 }}
242 - name: CDS_USER
243 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 12 }}
244 - name: CDS_PASSWORD
245 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 12 }}
246 - name: HONEYCOMB_USER
247 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 12 }}
248 - name: HONEYCOMB_PASSWORD
249 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 12 }}
250 - name: TRUSTSTORE_PASSWORD
251 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 12 }}
252 - name: KEYSTORE_PASSWORD
253 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 12 }}
254 - name: DMAAP_USER
255 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 12 }}
256 - name: DMAAP_PASSWORD
257 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 12 }}
258 - name: DMAAP_AUTHKEY
259 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100260 - name: ENABLE_ODL_CLUSTER
261 value: "{{ .Values.config.enableClustering }}"
262 - name: MY_ODL_CLUSTER
263 value: "{{ .Values.config.myODLCluster }}"
264 - name: PEER_ODL_CLUSTER
265 value: "{{ .Values.config.peerODLCluster }}"
266 - name: IS_PRIMARY_CLUSTER
267 value: "{{ .Values.config.isPrimaryCluster }}"
268 - name: GEO_ENABLED
269 value: "{{ .Values.config.geoEnabled}}"
270 - name: SDNC_AAF_ENABLED
271 value: "{{ .Values.global.aafEnabled}}"
272 - name: SDNC_REPLICAS
273 value: "{{ .Values.replicaCount }}"
274 - name: MYSQL_HOST
275 value: {{ include "common.mariadbService" . }}
Dan Timoney2ee28a52021-01-15 16:39:50 -0500276 - name: MDSAL_PATH
277 value: {{ .Values.persistence.mdsalPath }}
278 - name: DAEXIM_PATH
279 value: {{ .Values.persistence.daeximPath }}
280 - name: JOURNAL_PATH
281 value: {{ .Values.persistence.journalPath }}
282 - name: SNAPSHOTS_PATH
283 value: {{ .Values.persistence.snapshotsPath }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100284 - name: JAVA_HOME
285 value: "{{ .Values.config.javaHome}}"
Dan Timoneya98765b2020-09-14 11:57:55 -0400286 - name: JAVA_OPTS
287 value: "-Xms{{.Values.config.odl.javaOptions.minMemory}} -Xmx{{.Values.config.odl.javaOptions.maxMemory}}"
Sylvain Desbureauxbcf72512020-07-22 10:45:18 +0200288 - name: KARAF_CONSOLE_LOG_LEVEL
289 value: "{{ include "common.log.level" . }}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000290 - name: SDNRWT
291 value: "{{ .Values.config.sdnr.enabled | default "false"}}"
292 {{- if eq .Values.config.sdnr.mode "web" }}
293 - name: SDNRDM
294 value: "true"
295 {{- end }}
296 - name: SDNRONLY
297 value: "{{ .Values.config.sdnr.sdnronly | default "false" }}"
298 - name: SDNRDBURL
299 {{- $prefix := ternary "https" "http" .Values.global.aafEnabled}}
300 value: "{{$prefix}}://{{ .Values.elasticsearch.service.name | default "sdnrdb"}}.{{.Release.Namespace}}:{{.Values.elasticsearch.service.port | default "9200"}}"
301 {{- if .Values.config.sdnr.sdnrdbTrustAllCerts }}
302 - name: SDNRDBTRUSTALLCERTS
303 value: "true"
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100304 {{- end }}
305 {{- if .Values.global.cmpv2Enabled }}
306 - name: ODL_CERT_DIR
307 value: {{ (mustFirst (.Values.certificates)).mountPath }}
308 {{- end }}
demskeq8b43e92c2021-02-12 15:43:48 +0100309 - name: ENABLE_OAUTH
310 value: "{{ .Values.config.sdnr.oauth.enabled | default "false" }}"
demskeq827854662021-04-08 14:49:47 +0200311 - name: SDNR_NETCONF_CALLHOME_ENABLED
312 value: "{{ .Values.config.sdnr.netconfCallHome.enabled | default "false" }}"
sebdetb205f402021-10-20 12:16:02 +0200313 - name: SDNR_VES_COLLECTOR_ENABLED
314 value: "{{ .Values.config.sdnr.vesCollector.enabled }}"
315 - name: SDNR_VES_COLLECTOR_TLS_ENABLED
316 value: "{{ .Values.config.sdnr.vesCollector.tls.enabled }}"
317 - name: SDNR_VES_COLLECTOR_TRUST_ALL_CERTS
318 value: "{{ .Values.config.sdnr.vesCollector.trustAllCertificates }}"
319 - name: SDNR_VES_COLLECTOR_IP
320 value: "{{ .Values.config.sdnr.vesCollector.address }}"
321 - name: SDNR_VES_COLLECTOR_PORT
322 value: "{{ .Values.config.sdnr.vesCollector.port }}"
323 - name: SDNR_VES_COLLECTOR_VERSION
324 value: "{{ .Values.config.sdnr.vesCollector.version | default "v7" }}"
325 - name: SDNR_VES_COLLECTOR_REPORTING_ENTITY_NAME
326 value: "{{ .Values.config.sdnr.vesCollector.reportingEntityName | default "ONAP SDN-R" }}"
327 - name: SDNR_VES_COLLECTOR_EVENTLOG_MSG_DETAIL
328 value: "{{ .Values.config.sdnr.vesCollector.eventLogMsgDetail | default "SHORT" }}"
329 - name: SDNR_VES_COLLECTOR_USERNAME
330 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ves-collector-secret" "key" "login") | indent 12 }}
331 - name: SDNR_VES_COLLECTOR_PASSWORD
332 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ves-collector-secret" "key" "password") | indent 12 }}
333
jmac065e2ce2018-03-29 01:18:02 +0000334 volumeMounts:
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200335{{ include "common.certInitializer.volumeMount" . | indent 10 }}
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200336{{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100337{{ include "common.certManager.volumeMounts" . | indent 10 }}
338{{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000339 - mountPath: /etc/localtime
340 name: localtime
341 readOnly: true
342 - mountPath: /opt/opendaylight/current/etc/org.ops4j.pax.logging.cfg
343 name: sdnc-logging-cfg-config
344 subPath: org.ops4j.pax.logging.cfg
jmaca68f4cb2018-05-10 22:44:19 +0000345 - mountPath: {{ .Values.config.binDir }}/installSdncDb.sh
346 name: bin
jmac065e2ce2018-03-29 01:18:02 +0000347 subPath: installSdncDb.sh
Dan Timoney2ee28a52021-01-15 16:39:50 -0500348 - mountPath: {{ .Values.config.binDir }}/createLinks.sh
349 name: bin
350 subPath: createLinks.sh
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200351 - mountPath: {{ .Values.config.ccsdkConfigDir }}/aaiclient.properties
352 name: properties
353 subPath: aaiclient.properties
jmaca68f4cb2018-05-10 22:44:19 +0000354 - mountPath: {{ .Values.config.configDir }}/aaiclient.properties
355 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000356 subPath: aaiclient.properties
jmaca68f4cb2018-05-10 22:44:19 +0000357 - mountPath: {{ .Values.config.configDir }}/dblib.properties
358 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000359 subPath: dblib.properties
jmac7c434672018-05-11 20:14:17 +0000360 - mountPath: {{ .Values.config.configDir }}/lcm-dg.properties
361 name: properties
362 subPath: lcm-dg.properties
jmaca68f4cb2018-05-10 22:44:19 +0000363 - mountPath: {{ .Values.config.configDir }}/svclogic.properties
364 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000365 subPath: svclogic.properties
366 - mountPath: /opt/onap/sdnc/svclogic/config/svclogic.properties
jmaca68f4cb2018-05-10 22:44:19 +0000367 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000368 subPath: svclogic.properties
Alexis de Talhouët43c67e02018-09-20 16:49:16 -0400369 - mountPath: {{ .Values.config.configDir }}/netbox.properties
370 name: properties
371 subPath: netbox.properties
372 - mountPath: {{ .Values.config.configDir }}/blueprints-processor-adaptor.properties
373 name: properties
374 subPath: blueprints-processor-adaptor.properties
jmac8d6dc962018-04-26 14:26:55 +0000375 - mountPath: {{ .Values.persistence.mdsalPath }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100376 name: {{ include "common.fullname" . }}-data
Maciej Wereski537d71e2021-11-03 13:31:44 +0000377 - mountPath: {{ .Values.log.path }}
jmac065e2ce2018-03-29 01:18:02 +0000378 name: logs
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400379 - mountPath: {{ .Values.config.odl.salConfigDir }}/{{ .Values.config.odl.salConfigVersion}}/sal-clustering-config-{{ .Values.config.odl.salConfigVersion}}-akkaconf.xml
380 name: properties
381 subPath: akka.conf
382 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.controller.cluster.datastore.cfg
383 name: properties
384 subPath: org.opendaylight.controller.cluster.datastore.cfg
Dan Timoney9520e7c2021-01-12 11:10:58 -0500385 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.aaa.filterchain.cfg
386 name: properties
387 subPath: org.opendaylight.aaa.filterchain.cfg
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400388 - mountPath: {{ .Values.config.odl.binDir }}/setenv
389 name: properties
390 subPath: setenv
Alexander Dehn9b797d62020-04-21 09:53:50 +0000391 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-registrar.properties
392 name: properties
393 subPath: mountpoint-registrar.properties
394 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-state-provider.properties
395 name: properties
396 subPath: mountpoint-state-provider.properties
demskeq8a86300a2021-02-10 09:53:33 +0100397 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.daexim.cfg
398 name: properties
399 subPath: org.opendaylight.daexim.cfg
demskeq8b43e92c2021-02-12 15:43:48 +0100400 {{- if .Values.config.sdnr.oauth.enabled }}
401 - mountPath: {{ .Values.config.odl.etcDir }}/oauth-provider.config.json
402 name: properties
403 subPath: oauth-provider.config.json
404 {{ end }}
Satoshi Fujii54bfd172021-07-04 16:39:41 +0000405 resources: {{ include "common.resources" . | nindent 12 }}
jmac065e2ce2018-03-29 01:18:02 +0000406 # side car containers
Maciej Wereski537d71e2021-11-03 13:31:44 +0000407 {{ include "common.log.sidecar" . | nindent 8 }}
Satoshi Fujii54bfd172021-07-04 16:39:41 +0000408 {{- if .Values.nodeSelector }}
409 nodeSelector: {{ toYaml .Values.nodeSelector | nindent 8 }}
410 {{- end }}
411 {{- if .Values.affinity }}
412 affinity: {{ toYaml .Values.affinity | nindent 8 }}
413 {{- end }}
jmac8d6dc962018-04-26 14:26:55 +0000414 imagePullSecrets:
415 - name: "{{ include "common.namespace" . }}-docker-registry-key"
farida azmy32c5ed82021-08-04 14:46:09 +0200416 serviceAccountName: {{ include "common.fullname" (dict "suffix" "read" "dot" . )}}
jmac065e2ce2018-03-29 01:18:02 +0000417 volumes:
418 - name: localtime
419 hostPath:
420 path: /etc/localtime
421 - name: logs
422 emptyDir: {}
Maciej Wereski537d71e2021-11-03 13:31:44 +0000423 {{ include "common.log.volumes" . | nindent 8 }}
jmac065e2ce2018-03-29 01:18:02 +0000424 - name: sdnc-logging-cfg-config
425 configMap:
426 name: {{ include "common.fullname" . }}-log-configmap
jmaca68f4cb2018-05-10 22:44:19 +0000427 - name: bin
jmac065e2ce2018-03-29 01:18:02 +0000428 configMap:
jmaca68f4cb2018-05-10 22:44:19 +0000429 name: {{ include "common.fullname" . }}-bin
430 defaultMode: 0755
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100431 - name: config-input
jmac065e2ce2018-03-29 01:18:02 +0000432 configMap:
jmaca68f4cb2018-05-10 22:44:19 +0000433 name: {{ include "common.fullname" . }}-properties
434 defaultMode: 0644
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100435 - name: properties
436 emptyDir:
437 medium: Memory
jmac8d6dc962018-04-26 14:26:55 +0000438 {{ if not .Values.persistence.enabled }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100439 - name: {{ include "common.fullname" . }}-data
jmac8d6dc962018-04-26 14:26:55 +0000440 emptyDir: {}
441 {{ else }}
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200442{{ include "common.certInitializer.volumes" . | nindent 8 }}
Piotr Marcinkiewicz598f2d82021-06-01 12:36:13 +0200443{{- if .Values.global.cmpv2Enabled }}
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100444{{ include "common.certManager.volumes" . | nindent 8 }}
445{{- end }}
jmac8d6dc962018-04-26 14:26:55 +0000446 volumeClaimTemplates:
447 - metadata:
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100448 name: {{ include "common.fullname" . }}-data
jmac8d6dc962018-04-26 14:26:55 +0000449 labels:
450 name: {{ include "common.fullname" . }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100451 chart: "{{ .Chart.Name }}-{{ .Chart.Version }}"
Krzysztof Opasiak137d7cc2020-01-24 23:49:11 +0100452 release: "{{ include "common.release" . }}"
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100453 heritage: "{{ .Release.Service }}"
jmac8d6dc962018-04-26 14:26:55 +0000454 spec:
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100455 accessModes:
456 - {{ .Values.persistence.accessMode }}
457 storageClassName: {{ include "common.storageClass" . }}
jmac8d6dc962018-04-26 14:26:55 +0000458 resources:
459 requests:
460 storage: {{ .Values.persistence.size }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100461 {{- end }}