blob: 201f48776d4d29c07891a1446be8f29212778a39 [file] [log] [blame]
Jakub Latusekd71d26c2020-10-21 13:36:29 +02001{{/*
jhhd4258672020-08-09 12:08:08 -05002# ============LICENSE_START=======================================================
3# Copyright (C) 2020 AT&T Intellectual Property.
a.sreekumar2f377362022-02-09 12:40:57 +00004# Modifications Copyright (C) 2022 Bell Canada. All rights reserved.
jhhd4258672020-08-09 12:08:08 -05005# ================================================================================
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
17#
18# SPDX-License-Identifier: Apache-2.0
19# ============LICENSE_END=========================================================
Jakub Latusekd71d26c2020-10-21 13:36:29 +020020*/}}
jhhd4258672020-08-09 12:08:08 -050021
Grzegorz-Lis4fad3022020-07-31 10:18:21 +020022apiVersion: apps/v1
ramverma1a3b8ad2019-02-25 12:45:11 +000023kind: Deployment
Bruno Sakoto0644c262020-05-22 16:56:35 -040024metadata: {{- include "common.resourceMetadata" . | nindent 2 }}
ramverma1a3b8ad2019-02-25 12:45:11 +000025spec:
Bruno Sakoto0644c262020-05-22 16:56:35 -040026 selector: {{- include "common.selectors" . | nindent 4 }}
ramverma1a3b8ad2019-02-25 12:45:11 +000027 replicas: {{ .Values.replicaCount }}
28 template:
Bruno Sakoto0644c262020-05-22 16:56:35 -040029 metadata: {{- include "common.templateMetadata" . | nindent 6 }}
ramverma1a3b8ad2019-02-25 12:45:11 +000030 spec:
ramverma6acdabf2019-04-12 18:56:03 +000031 initContainers:
32 - command:
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +020033 - /app/ready.py
ramverma6acdabf2019-04-12 18:56:03 +000034 args:
jhhd4258672020-08-09 12:08:08 -050035 - --job-name
36 - {{ include "common.release" . }}-policy-galera-config
ramverma6acdabf2019-04-12 18:56:03 +000037 env:
38 - name: NAMESPACE
39 valueFrom:
40 fieldRef:
41 apiVersion: v1
42 fieldPath: metadata.namespace
Sylvain Desbureaux7c8c6862020-11-19 18:02:37 +010043 image: {{ include "repositoryGenerator.image.readiness" . }}
ramverma6acdabf2019-04-12 18:56:03 +000044 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
45 name: {{ include "common.name" . }}-readiness
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020046 - command:
47 - sh
48 args:
49 - -c
Taka Choebd62952020-10-08 13:50:09 -040050 - "cd /config-input && for PFILE in `ls -1`; do envsubst <${PFILE} >/config/${PFILE}; done"
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020051 env:
52 - name: SQL_USER
53 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
54 - name: SQL_PASSWORD
55 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Dominik Mizyn389fca12020-04-09 22:37:00 +020056 - name: RESTSERVER_USER
57 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restserver-secret" "key" "login") | indent 10 }}
58 - name: RESTSERVER_PASSWORD
59 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restserver-secret" "key" "password") | indent 10 }}
60 - name: API_USER
61 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "api-secret" "key" "login") | indent 10 }}
62 - name: API_PASSWORD
63 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "api-secret" "key" "password") | indent 10 }}
64 - name: DISTRIBUTION_USER
65 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "distribution-secret" "key" "login") | indent 10 }}
66 - name: DISTRIBUTION_PASSWORD
67 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "distribution-secret" "key" "password") | indent 10 }}
Sirisha_Manchikanti73c5f002022-07-25 17:04:45 +010068{{- if .Values.config.useStrimziKafka }}
69 - name: JAASLOGIN
70 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "policy-kafka-user" "key" "sasl.jaas.config") | indent 10 }}
71{{- end }}
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020072 volumeMounts:
73 - mountPath: /config-input
74 name: papconfig
75 - mountPath: /config
76 name: papconfig-processed
Sylvain Desbureaux7c8c6862020-11-19 18:02:37 +010077 image: {{ include "repositoryGenerator.image.envsubst" . }}
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +020078 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
79 name: {{ include "common.name" . }}-update-config
ramverma1a3b8ad2019-02-25 12:45:11 +000080 containers:
81 - name: {{ include "common.name" . }}
Sylvain Desbureaux7c8c6862020-11-19 18:02:37 +010082 image: {{ include "repositoryGenerator.repository" . }}/{{ .Values.image }}
ramverma1a3b8ad2019-02-25 12:45:11 +000083 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
84 command: ["/opt/app/policy/pap/bin/policy-pap.sh"]
a.sreekumar2f377362022-02-09 12:40:57 +000085 args: ["/opt/app/policy/pap/etc/mounted/papParameters.yaml"]
Bruno Sakoto0644c262020-05-22 16:56:35 -040086 ports: {{ include "common.containerPorts" . | nindent 12 }}
ramverma1a3b8ad2019-02-25 12:45:11 +000087 # disable liveness probe when breakpoints set in debugger
88 # so K8s doesn't restart unresponsive container
89 {{- if eq .Values.liveness.enabled true }}
90 livenessProbe:
91 tcpSocket:
Bruno Sakoto0644c262020-05-22 16:56:35 -040092 port: {{ .Values.liveness.port }}
ramverma1a3b8ad2019-02-25 12:45:11 +000093 initialDelaySeconds: {{ .Values.liveness.initialDelaySeconds }}
94 periodSeconds: {{ .Values.liveness.periodSeconds }}
95 {{ end -}}
96 readinessProbe:
a.sreekumar2f377362022-02-09 12:40:57 +000097 httpGet:
98 path: {{ .Values.readiness.api }}
Bruno Sakoto0644c262020-05-22 16:56:35 -040099 port: {{ .Values.readiness.port }}
a.sreekumar2f377362022-02-09 12:40:57 +0000100 httpHeaders:
101 - name: Authorization
102 value: Basic {{ printf "%s:%s" .Values.restServer.user .Values.restServer.password | b64enc }}
Andreas Geisslerf10c5552023-03-21 18:09:46 +0100103 scheme: "HTTP"
a.sreekumar2f377362022-02-09 12:40:57 +0000104 successThreshold: {{ .Values.readiness.successThreshold }}
105 failureThreshold: {{ .Values.readiness.failureThreshold }}
ramverma1a3b8ad2019-02-25 12:45:11 +0000106 initialDelaySeconds: {{ .Values.readiness.initialDelaySeconds }}
107 periodSeconds: {{ .Values.readiness.periodSeconds }}
a.sreekumar2f377362022-02-09 12:40:57 +0000108 timeoutSeconds: {{ .Values.readiness.timeout }}
ramverma1a3b8ad2019-02-25 12:45:11 +0000109 volumeMounts:
110 - mountPath: /etc/localtime
111 name: localtime
112 readOnly: true
113 - mountPath: /opt/app/policy/pap/etc/mounted
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +0200114 name: papconfig-processed
miroslavmasaryka7ac7f02023-03-01 14:12:26 +0100115 resources: {{ include "common.resources" . | nindent 12 }}
ramverma1a3b8ad2019-02-25 12:45:11 +0000116 {{- if .Values.nodeSelector }}
117 nodeSelector:
118{{ toYaml .Values.nodeSelector | indent 10 }}
119 {{- end -}}
120 {{- if .Values.affinity }}
121 affinity:
122{{ toYaml .Values.affinity | indent 10 }}
123 {{- end }}
farida azmyc1178372021-04-11 12:55:33 +0200124 serviceAccountName: {{ include "common.fullname" (dict "suffix" "read" "dot" . )}}
ramverma1a3b8ad2019-02-25 12:45:11 +0000125 volumes:
126 - name: localtime
127 hostPath:
128 path: /etc/localtime
129 - name: papconfig
130 configMap:
131 name: {{ include "common.fullname" . }}-configmap
132 defaultMode: 0755
Krzysztof Opasiak3d9dc8b2020-03-31 23:05:16 +0200133 - name: papconfig-processed
134 emptyDir:
135 medium: Memory
ramverma1a3b8ad2019-02-25 12:45:11 +0000136 imagePullSecrets:
137 - name: "{{ include "common.namespace" . }}-docker-registry-key"