sekharhuawei | 2e799e9 | 2020-11-14 17:06:56 +0530 | [diff] [blame] | 1 | {{/* |
| 2 | # Copyright © 2020 Huawei Technologies Co., Ltd. |
| 3 | # |
| 4 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | # you may not use this file except in compliance with the License. |
| 6 | # You may obtain a copy of the License at |
| 7 | # |
| 8 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | # |
| 10 | # Unless required by applicable law or agreed to in writing, software |
| 11 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | # See the License for the specific language governing permissions and |
| 14 | # limitations under the License. |
| 15 | */}} |
| 16 | |
| 17 | apiVersion: apps/v1 |
| 18 | kind: Deployment |
| 19 | metadata: {{- include "common.resourceMetadata" . | nindent 2 }} |
| 20 | spec: |
| 21 | selector: {{- include "common.selectors" . | nindent 4 }} |
| 22 | replicas: {{ index .Values.replicaCount }} |
| 23 | minReadySeconds: {{ index .Values.minReadySeconds }} |
| 24 | strategy: |
| 25 | type: {{ index .Values.updateStrategy.type }} |
| 26 | rollingUpdate: |
| 27 | maxUnavailable: {{ index .Values.updateStrategy.maxUnavailable }} |
| 28 | maxSurge: {{ index .Values.updateStrategy.maxSurge }} |
| 29 | template: |
| 30 | metadata: |
| 31 | labels: {{- include "common.labels" . | nindent 8 }} |
| 32 | spec: |
| 33 | initContainers: {{ include "so.certificate.container_importer" . | nindent 8 }} |
| 34 | - name: {{ include "common.name" . }}-encrypter |
| 35 | command: |
| 36 | - sh |
| 37 | args: |
| 38 | - -c |
| 39 | - | |
| 40 | java Crypto "${AAI_USERNAME}:${AAI_PASSWORD}" "${MSO_KEY}" > /output/.aai_creds |
| 41 | env: |
| 42 | - name: AAI_USERNAME |
| 43 | {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-aai-creds" "key" "login") | indent 14 }} |
| 44 | - name: AAI_PASSWORD |
| 45 | {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-aai-creds" "key" "password") | indent 14 }} |
| 46 | - name: MSO_KEY |
| 47 | {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cnf-adapter-mso-key" "key" "password") | indent 14 }} |
| 48 | image: {{ include "repositoryGenerator.dockerHubRepository" . }}/{{ .Values.global.soCryptoImage }} |
| 49 | imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }} |
| 50 | volumeMounts: |
| 51 | - name: encoder |
| 52 | mountPath: /output |
Sylvain Desbureaux | a2e3275 | 2020-12-08 18:03:50 +0100 | [diff] [blame^] | 53 | {{ include "common.readinessCheck.waitFor" . | indent 8 | trim }} |
sekharhuawei | 2e799e9 | 2020-11-14 17:06:56 +0530 | [diff] [blame] | 54 | containers: |
| 55 | - name: {{ include "common.name" . }} |
| 56 | image: {{ include "repositoryGenerator.repository" . }}/{{ .Values.image }} |
| 57 | command: |
| 58 | - sh |
| 59 | args: |
| 60 | - -c |
| 61 | - | |
| 62 | export AAF_BASE64=$(echo -n "${AAF_USERNAME}:${AAF_PASSWORD}" | base64) |
| 63 | export AAF_AUTH=$(echo "Basic ${AAF_BASE64}") |
| 64 | export AAI_AUTH=$(cat /input/.aai_creds) |
| 65 | {{- if .Values.global.aafEnabled }} |
| 66 | export $(grep '^c' {{ .Values.soHelpers.certInitializer.credsPath }}/mycreds.prop | xargs -0) |
| 67 | export TRUSTSTORE_PASSWORD="${cadi_truststore_password}" |
| 68 | {{- if .Values.global.security.aaf.enabled }} |
| 69 | export KEYSTORE_PASSWORD="${cadi_keystore_password}" |
| 70 | {{- end }} |
| 71 | {{- end }} |
| 72 | ./start-app.sh |
| 73 | resources: {{ include "common.resources" . | nindent 12 }} |
| 74 | ports: {{- include "common.containerPorts" . | nindent 12 }} |
| 75 | env: |
| 76 | - name: AAF_USERNAME |
| 77 | {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-aaf-creds" "key" "login") | indent 14 }} |
| 78 | - name: AAF_PASSWORD |
| 79 | {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-aaf-creds" "key" "password") | indent 14 }} |
| 80 | - name: ACTUATOR_USERNAME |
| 81 | {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "server-actuator-creds" "key" "login") | indent 14 }} |
| 82 | - name: ACTUATOR_PASSWORD |
| 83 | {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "server-actuator-creds" "key" "password") | indent 14 }} |
| 84 | {{ include "so.certificates.env" . | indent 12 | trim }} |
| 85 | envFrom: |
| 86 | - configMapRef: |
| 87 | name: {{ include "common.fullname" . }}-env |
| 88 | imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }} |
| 89 | volumeMounts: {{ include "so.certificate.volumeMount" . | nindent 12 }} |
| 90 | - name: logs |
| 91 | mountPath: /app/logs |
| 92 | - name: config |
| 93 | mountPath: /app/config |
| 94 | readOnly: true |
| 95 | readOnly: true |
| 96 | - name: encoder |
| 97 | mountPath: /input |
| 98 | livenessProbe: |
| 99 | httpGet: |
| 100 | path: {{ index .Values.livenessProbe.path}} |
| 101 | port: {{ index .Values.containerPort }} |
| 102 | scheme: {{ index .Values.livenessProbe.scheme}} |
| 103 | initialDelaySeconds: {{ index .Values.livenessProbe.initialDelaySeconds}} |
| 104 | periodSeconds: {{ index .Values.livenessProbe.periodSeconds}} |
| 105 | timeoutSeconds: {{ index .Values.livenessProbe.timeoutSeconds}} |
| 106 | successThreshold: {{ index .Values.livenessProbe.successThreshold}} |
| 107 | failureThreshold: {{ index .Values.livenessProbe.failureThreshold}} |
| 108 | volumes: {{ include "so.certificate.volumes" . | nindent 8 }} |
| 109 | - name: logs |
| 110 | emptyDir: {} |
| 111 | - name: config |
| 112 | configMap: |
| 113 | name: {{ include "common.fullname" . }} |
| 114 | - name: encoder |
| 115 | emptyDir: |
| 116 | medium: Memory |
| 117 | imagePullSecrets: |
| 118 | - name: "{{ include "common.namespace" . }}-docker-registry-key" |
| 119 | |