blob: 7405c487c4f16a20aae825c5309e3cb594c2105f [file] [log] [blame]
Jerry Floodf406ab82018-10-23 07:10:48 -04001# Copyright © 2018 AT&T
krishnaa962849ae52020-07-28 19:22:50 +05302# Copyright (C) 2020 Wipro Limited.
Jerry Floodf406ab82018-10-23 07:10:48 -04003#
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +010016#################################################################
17# Secrets metaconfig
18#################################################################
19secrets:
20 - uid: cmso-db-root-password
krishnaa962849ae52020-07-28 19:22:50 +053021 name: &rootPassword '{{ include "common.release" . }}-cmso-db-root-password'
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +010022 type: password
23 password: ''
24 policy: generate
krishnaa962849ae52020-07-28 19:22:50 +053025 - uid: cmso-service-db-secret
26 name: &serviceDbCreds '{{ include "common.release" . }}-cmso-service-db-secret'
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +010027 type: basicAuth
krishnaa962849ae52020-07-28 19:22:50 +053028 externalSecret: '{{ tpl (default "" .Values.config.db.service.userCredentialsExternalSecret) . }}'
29 login: '{{ .Values.config.db.service.userName }}'
30 password: '{{ .Values.config.db.service.userPassword }}'
31 passwordPolicy: generate
32 - uid: cmso-db-secret
33 name: &optimizerDbCreds '{{ include "common.release" . }}-cmso-optimizer-db-secret'
34 type: basicAuth
35 externalSecret: '{{ tpl (default "" .Values.config.db.optimizer.userCredentialsExternalSecret) . }}'
36 login: '{{ .Values.config.db.optimizer.userName }}'
37 password: '{{ .Values.config.db.optimizer.userPassword }}'
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +010038 passwordPolicy: generate
39
Jerry Floodf406ab82018-10-23 07:10:48 -040040mariadb-galera:
41 replicaCount: 1
krishnaa962849ae52020-07-28 19:22:50 +053042 nameOverride: &containerName cmso-db
Jerry Floodf406ab82018-10-23 07:10:48 -040043 service:
44 type: ClusterIP
krishnaa962849ae52020-07-28 19:22:50 +053045 name: &serviceName oof-cmso-dbhost
Jerry Floodf406ab82018-10-23 07:10:48 -040046 portName: cmso-dbhost
47 nfsprovisionerPrefix: cmso
48 sdnctlPrefix: cmso
49 persistence:
50 mountSubPath: cmso/data
51 enabled: true
52 disableNfsProvisioner: true
53 config:
krishnaa962849ae52020-07-28 19:22:50 +053054 mariadbRootPasswordExternalSecret: *rootPassword
55 # userCredentialsExternalSecret: *dbCreds
56 # mysqlDatabase: cmso
Jerry Floodf406ab82018-10-23 07:10:48 -040057 externalConfig: |
58 [mysqld]
Jerry Flood4b4373d2019-04-30 15:30:04 -040059 lower_case_table_names = 1
60
61global:
62 commonConfigPrefix: "oof-cmso"
63 truststoreFile: "truststoreONAPall.jks"
64 keystoreFile: "org.onap.oof.jks"
Jerry Flood4b4373d2019-04-30 15:30:04 -040065 truststorePassword:
Jerry Flood58ec23c2019-05-13 10:35:37 -040066 authentication: aaf-auth
67
krishnaa962849ae52020-07-28 19:22:50 +053068mariadb-init:
69 mariadbGalera:
70 containerName: *containerName
71 serviceName: *serviceName
72 servicePort: 3306
73 userRootSecret: *rootPassword
74 config:
75 userCredentialsExternalSecret: *serviceDbCreds
76 mysqlDatabase: cmso
77 mysqlAdditionalDatabases:
78 optimizer:
79 externalSecret: *optimizerDbCreds
80 nameOverride: cmso-db-config
81
Jerry Flood58ec23c2019-05-13 10:35:37 -040082flavor: small
83
Jerry Flood4b4373d2019-04-30 15:30:04 -040084config:
85 log:
86 logstashServiceName: log-ls
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +010087 logstashPort: 5044
88 db:
krishnaa962849ae52020-07-28 19:22:50 +053089 service:
90 # userCredentialsExternalsecret: some secret
91 userName: cmso-admin
92 # userPassword: password
93 optimizer:
94 userName: cmso-optimizer
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +010095
krishnaa96dbcd1ca2020-08-11 10:26:50 +053096#sub-charts configuration
97certInitializer: &certInitConfig
98 fqdn: "oof.onap"
99 app_ns: "org.osaaf.aaf"
100 fqi: "oof@oof.onap.org"
101 fqi_namespace: org.onap.oof
102 public_fqdn: "oof.onap.org"
103 aafDeployFqi: "deployer@people.osaaf.org"
104 aafDeployPass: demo123456!
105 cadi_latitude: "0.0"
106 cadi_longitude: "0.0"
107 credsPath: /opt/app/osaaf/local
108 appMountPath: /share/etc/osaaf
109 aaf_add_config: >
110 cd {{ .Values.credsPath }};
111 /opt/app/aaf_config/bin/agent.sh local showpass {{.Values.fqi}} {{ .Values.fqdn }} | grep cadi_keystore_password_jks= | cut -d= -f 2 > {{ .Values.credsPath }}/.pass 2>&1;
112 find ./ -type f -exec sed -i -e 's/\/opt\/app\/osaaf\/local/\/share\/etc\/osaaf\/local/g' {} \;
113
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +0100114oof-cmso-service:
krishnaa96dbcd1ca2020-08-11 10:26:50 +0530115 enabled: true
116 certInitializer:
117 << : *certInitConfig
118 nameOverride: oof-cmso-service-cert-initializer
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +0100119 config:
120 db:
krishnaa962849ae52020-07-28 19:22:50 +0530121 userCredentialsExternalSecret: *serviceDbCreds
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +0100122 host: oof-cmso-dbhost
123 container: cmso-db
124 mysqlDatabase: cmso
125
126oof-cmso-optimizer:
krishnaa96dbcd1ca2020-08-11 10:26:50 +0530127 enabled: true
128 certInitializer:
129 << : *certInitConfig
130 nameOverride: oof-cmso-optimizer-cert-initializer
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +0100131 config:
krishnaa96dbcd1ca2020-08-11 10:26:50 +0530132 enabled: true
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +0100133 db:
krishnaa962849ae52020-07-28 19:22:50 +0530134 userCredentialsExternalSecret: *optimizerDbCreds
Krzysztof Opasiakd74a6592020-02-07 21:06:58 +0100135 host: oof-cmso-dbhost
136 container: cmso-db
137 mysqlDatabase: optimizer
krishnaa96dbcd1ca2020-08-11 10:26:50 +0530138
139oof-cmso-topology:
140 enabled: true
141 certInitializer:
142 << : *certInitConfig
143 nameOverride: oof-cmso-topology-cert-initializer
144
145oof-cmso-ticketmgt:
146 enabled: true
147 certInitializer:
148 << : *certInitConfig
149 nameOverride: oof-cmso-ticketmgt-cert-initializer