blob: 4cf991ea606c9e0573c283e8097c7e67e084a4b4 [file] [log] [blame]
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +00001# Copyright © 2018 AT&T USA
vaibhav_16dece04b2fe2018-03-22 09:07:12 +00002#
3# Licensed under the Apache License, Version 2.0 (the "License");
4# you may not use this file except in compliance with the License.
5# You may obtain a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS,
11# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12# See the License for the specific language governing permissions and
13# limitations under the License.
jmacc4f04d32018-10-12 18:24:24 +000014#################################################################
15# Global configuration defaults.
16#################################################################
17global:
18 nodePortPrefix: 302
19 nodePortPrefixExt: 304
20 repository: nexus3.onap.org:10001
21 readinessRepository: oomk8s
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000022 readinessImage: readiness-check:2.0.2
sunilb0a97ab22020-02-25 10:18:48 +053023 loggingRepository: docker.elastic.co
24 loggingImage: beats/filebeat:5.5.0
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +010025 soBaseImage: onap/so/base-image:1.0
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000026 mariadbGalera:
27 nameOverride: mariadb-galera
28 serviceName: mariadb-galera
29 servicePort: "3306"
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010030 # mariadbRootPassword: secretpassword
31 # rootPasswordExternalSecret: some secret
sarada prasad sahooae2c7342019-07-10 14:40:12 +053032 #This flag allows SO to instantiate its own mariadb-galera cluster,
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000033 #serviceName and nameOverride should be so-mariadb-galera if this flag is enabled
34 localCluster: false
jmacc4f04d32018-10-12 18:24:24 +000035 persistence:
36 mountPath: /dockerdata-nfs
Konrad Bańka7bde1d62020-04-01 16:09:11 +020037 #This configuration specifies Service and port for SDNC OAM interface
38 sdncOamService: sdnc-oam
39 sdncOamPort: 8282
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +000040 #This configuration will run the migration. The configurations are for backing up the data
41 #from DB and then restoring it to the present versions preferred DB.
42 migration:
43 enabled: false
44 dbHost: mariadb-galera
45 dbPort: 3306
46 dbUser: root
47 dbPassword: secretpassword
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010048 # dbCredsExternalSecret: some secret
rope252c5e14bb2020-01-02 11:03:59 +000049 msbEnabled: true
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +000050 security:
51 aaf:
52 enabled: false
53 aaf:
54 auth:
55 header: Basic c29Ac28ub25hcC5vcmc6ZGVtbzEyMzQ1Ngo=
56 encrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
57 app:
58 siteName: onapheat
59 auth: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
60 defaultCloudOwner: onap
61 cadi:
62 cadiLoglevel: DEBUG
63 cadiKeyFile: /app/org.onap.so.keyfile
64 cadiTrustStore: /app/org.onap.so.trust.jks
65 cadiTruststorePassword: enc:MFpuxKeYK6Eo6QXjDUjtOBbp0FthY7SB4mKSIJm_RWC
66 cadiLatitude: 38.4329
67 cadiLongitude: -90.43248
68 aafEnv: IST
69 aafApiVersion: 2.1
70 aafRootNs: org.onap.so
71 aafLocateUrl: https://aaf-locate.onap:8095
72 aafUrl: https://aaf-locate.onap:8095/locate/org.osaaf.aaf.service:2.1
73 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
74 client:
75 certs:
76 trustStorePassword: b25hcDRzbw==
77 keyStorePassword: c280b25hcA==
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +010078 certificates:
79 path: /etc/ssl/certs
80 share_path: /usr/local/share/ca-certificates/
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +010081
82#################################################################
83# Secrets metaconfig
84#################################################################
85secrets:
86 - uid: db-root-pass
87 name: &dbRootPassSecretName '{{ include "common.release" . }}-so-db-root-pass'
88 type: password
89 externalSecret: '{{ ternary .Values.global.mariadbGalera.rootPasswordExternalSecret (default (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.rootPasswordExternalSecret) .Values.global.mariadbGalera.localCluster }}'
90 password: '{{ .Values.global.mariadbGalera.mariadbRootpassword }}'
91 - uid: db-backup-creds
92 name: &dbBackupCredsSecretName '{{ include "common.release" . }}-so-db-backup-creds'
93 type: basicAuth
94 externalSecret: '{{ ternary .Values.global.migration.dbCredsExternalSecret "migrationDisabled" .Values.global.migration.enabled }}'
95 login: '{{ ternary .Values.global.migration.dbUser "migrationDisabled" .Values.global.migration.enabled }}'
96 password: '{{ ternary .Values.global.migration.dbPassword "migrationDisabled" .Values.global.migration.enabled }}'
97 passwordPolicy: required
98 annotations:
99 helm.sh/hook: pre-upgrade,pre-install
100 helm.sh/hook-weight: "0"
101 helm.sh/hook-delete-policy: before-hook-creation
102 - uid: db-user-creds
103 name: &dbUserCredsSecretName '{{ include "common.release" . }}-so-db-user-creds'
104 type: basicAuth
105 externalSecret: '{{ .Values.dbCreds.userCredsExternalSecret }}'
106 login: '{{ .Values.dbCreds.userName }}'
107 password: '{{ .Values.dbCreds.userPassword }}'
108 passwordPolicy: generate
109 - uid: db-admin-creds
110 name: &dbAdminCredsSecretName '{{ include "common.release" . }}-so-db-admin-creds'
111 type: basicAuth
112 externalSecret: '{{ .Values.dbCreds.adminCredsExternalSecret }}'
113 login: '{{ .Values.dbCreds.adminName }}'
114 password: '{{ .Values.dbCreds.adminPassword }}'
115 passwordPolicy: generate
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100116 - uid: "so-onap-certs"
117 name: &so-certs '{{ include "common.release" . }}-so-certs'
118 externalSecret: '{{ tpl (default "" .Values.certSecret) . }}'
119 type: generic
120 filePaths:
121 - resources/config/certificates/onap-ca.crt
122 - resources/config/certificates/msb-ca.crt
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100123
jmacc4f04d32018-10-12 18:24:24 +0000124#################################################################
125# Application configuration defaults.
126#################################################################
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100127
128dbSecrets: &dbSecrets
129 userCredsExternalSecret: *dbUserCredsSecretName
130 adminCredsExternalSecret: *dbAdminCredsSecretName
131
132# unused in this, just to pass to subcharts
133dbCreds:
134 userName: so_user
135 adminName: so_admin
136
Mike Elliottd32d36e2018-02-12 15:54:03 -0500137repository: nexus3.onap.org:10001
seshukm8325af52020-03-27 22:20:41 +0530138image: onap/so/api-handler-infra:1.6.0
jmacc4f04d32018-10-12 18:24:24 +0000139pullPolicy: Always
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000140replicaCount: 1
141minReadySeconds: 10
142containerPort: 8080
143logPath: ./logs/apih/
144app: api-handler-infra
145service:
146 type: NodePort
Mandeep Khindadc2b43e2018-09-06 16:34:19 +0000147 nodePort: 77
Brian Freeman1a667932018-09-06 14:45:37 -0500148 internalPort: 8080
Mandeep Khindafe527eb2018-10-16 09:56:34 -0400149 externalPort: 8080
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000150 portName: so-apih-port
151updateStrategy:
152 type: RollingUpdate
153 maxUnavailable: 1
154 maxSurge: 1
Alexis de Talhouëta52efcc2018-09-18 16:46:12 -0400155# Resource Limit flavor -By Default using small
vaibhav16dec0da88292018-08-13 06:10:27 +0000156flavor: small
157# Segregation for Different environment (Small and Large)
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100158persistence:
159 certificatesPath: /certificates
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000160resources:
vaibhav16dec0da88292018-08-13 06:10:27 +0000161 small:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000162 limits:
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000163 cpu: 2000m
vaibhav16dec0da88292018-08-13 06:10:27 +0000164 memory: 4Gi
165 requests:
166 cpu: 500m
167 memory: 1Gi
168 large:
169 limits:
170 cpu: 4000m
171 memory: 8Gi
172 requests:
173 cpu: 1000m
174 memory: 2Gi
Mandeep Khinda60d36d42018-09-24 15:15:48 +0000175 unlimited: {}
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000176livenessProbe:
Ramesh Parthasarathy1ceefda2018-09-14 21:22:43 +0000177 path: /manage/health
178 scheme: HTTP
Ramesh Parthasarathy3cd3fb12018-09-05 01:47:29 +0000179 initialDelaySeconds: 600
180 periodSeconds: 60
181 timeoutSeconds: 10
182 successThreshold: 1
183 failureThreshold: 3
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000184
Mike Elliottd32d36e2018-02-12 15:54:03 -0500185nodeSelector: {}
Brian Freeman1a667932018-09-06 14:45:37 -0500186affinity: {}
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000187
sunilb0a97ab22020-02-25 10:18:48 +0530188# application configuration
189config:
190 logstashServiceName: log-ls
191 logstashPort: 5044
192
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000193#Used only if localCluster is enabled. Instantiates SO's own cassandra cluster
194#helm deploy demo local/onap --namespace onap --verbose --set so.enabled=true \
195# --set so.global.mariadbGalera.localCluster=true \
196# --set so.global.mariadbGalera.nameOverride=so-mariadb-galera \
197# --set so.global.mariadbGalera.serviceName=so-mariadb-galera
198mariadb-galera:
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100199 config:
200 mariadbRootPasswordExternalSecret: *dbRootPassSecretName
Mahendra Raghuwanshi72b69c12019-04-04 10:43:25 +0000201 nameOverride: so-mariadb-galera
202 replicaCount: 1
203 service:
204 name: so-mariadb-galera
205 persistence:
206 mountSubPath: so/mariadb-galera/data
207 enabled: true
Lucjan Bryndza426a82c2019-08-14 09:14:12 +0200208
209ingress:
210 enabled: false
211 service:
212 - baseaddr: "so"
213 name: "so"
214 port: 8080
215 config:
rope252c5e14bb2020-01-02 11:03:59 +0000216 ssl: "none"
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000217
218mso:
219 adapters:
220 requestDb:
221 auth: Basic YnBlbDpwYXNzd29yZDEk
222 config:
223 cadi:
224 aafId: so@so.onap.org
225 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
226 apiEnforcement: org.onap.so.apihPerm
227 noAuthn: /manage/health
228 camundaAuth: AE2E9BE6EF9249085AF98689C4EE087736A5500629A72F35068FFB88813A023581DD6E765071F1C04075B36EA4213A
229 sdc:
230 client:
231 auth: 878785F4F31BC9CFA5AB52A172008212D8845ED2DE08AD5E56AF114720A4E49768B8F95CDA2EB971765D28EDCDAA24
232 aai:
233 auth: 6E081E10B1CA43A843E303733A74D9B23B601A6E22A21C7EF2C7F15A42F81A1A4E85E65268C2661F71321052C7F3E55B96A8E1E951F8BF6F
234 so:
235 operationalEnv:
236 dmaap:
237 auth: 51EA5414022D7BE536E7516C4D1A6361416921849B72C0D6FC1C7F262FD9F2BBC2AD124190A332D9845A188AD80955567A4F975C84C221EEA8243BFD92FFE6896CDD1EA16ADD34E1E3D47D4A
238 health:
239 auth: basic bXNvX2FkbWlufHBhc3N3b3JkMSQ=
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100240
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000241so-bpmn-infra:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100242 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100243 db:
244 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000245 cds:
246 auth: Basic Y2NzZGthcHBzOmNjc2RrYXBwcw==
247 aai:
248 auth: 221187EFA3AD4E33600DE0488F287099934CE65C3D0697BCECC00BB58E784E07CD74A24581DC31DBC086FF63DF116378776E9BE3D1325885
249 mso:
250 key: 07a7159d3bf51a0e53be7a8f89699be7
251 adapters:
252 requestDb:
253 auth: Basic YnBlbDpwYXNzd29yZDEk
254 db:
255 auth: A3745B5DBE165EFCF101D85A6FC81C211AB8BF604F8861B6C413D5DC90F8F30E0139DE44B8A342F4EF70AF
256 password: wLg4sjrAFUS8rfVfdvTXeQ==
257 po:
258 auth: A3745B5DBE165EFCF101D85A6FC81C211AB8BF604F8861B6C413D5DC90F8F30E0139DE44B8A342F4EF70AF
259 config:
260 cadi:
261 aafId: so@so.onap.org
262 aaafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
263 apiEnforcement: org.onap.so.bpmnPerm
264 noAuthn: /manage/health
265 sdnc:
266 password: 1D78CFC35382B6938A989066A7A7EAEF4FE933D2919BABA99EB4763737F39876C333EE5F
267 sniro:
268 auth: test:testpwd
269 endpoint: http://replaceme:28090/optimizationInstance/V1/create
270 oof:
271 auth: test:testpwd
272 so:
273 vnfm:
274 adapter:
275 auth: Basic dm5mbTpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100276
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000277so-catalog-db-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100278 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100279 db:
280 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000281 mso:
282 config:
283 cadi:
284 aafId: so@so.onap.org
285 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
286 apiEnforcement: org.onap.so.catalogDbAdapterPerm
287 noAuthn: /manage/health
288 adapters:
289 db:
290 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100291
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100292so-monitoring:
293 certSecret: *so-certs
294 db:
295 <<: *dbSecrets
296
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000297so-openstack-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100298 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100299 db:
300 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000301 aaf:
302 auth:
303 encrypted: 7F182B0C05D58A23A1C4966B9CDC9E0B8BC5CD53BC8C7B4083D869F8D53E9BDC3EFD55C94B1D3F
304 aai:
305 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
306 org:
307 onap:
308 so:
309 adapters:
310 bpelauth: D1A67FA93B6A6419132D0F83CC771AF774FD3C60853C50C22C8C6FC5088CC79E9E81EDE9EA39F22B2F66A0068E
311 valet:
312 basic_auth: bXNvOkphY2tkYXdzIGxvdmUgbXkgYmlnIHNwaGlueCBvZiBxdWFydHouCg==
313 mso:
314 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
315 auth: BEA8637716A7EB617DF472BA6552D22F68C1CB17B0D094D77DDA562F4ADAAC4457CAB848E1A4
Ramesh Parthasarathybb611922020-03-18 00:00:30 +0000316 basicUser: poBpmn
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000317 config:
318 cadi:
319 aafId: so@so.onap.org
320 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
321 apiEnforcement: org.onap.so.openStackAdapterPerm
322 noAuthn: /manage/health
323 db:
324 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100325
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000326so-request-db-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100327 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100328 db:
329 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000330 mso:
331 config:
332 cadi:
333 aafId: so@so.onap.org
334 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
335 apiEnforcement: org.onap.so.requestDbAdapterPerm
336 noAuthn: /manage/health
337 adapters:
338 requestDb:
339 auth: Basic YnBlbDpwYXNzd29yZDEk
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100340
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000341so-sdc-controller:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100342 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100343 db:
344 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000345 aai:
346 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
347 mso:
348 msoKey: 07a7159d3bf51a0e53be7a8f89699be7
349 config:
350 cadi:
351 aafId: so@so.onap.org
352 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
353 apiEnforcement: org.onap.so.sdcControllerPerm
354 noAuthn: /manage/health
355 asdc:
356 config:
357 key: 566B754875657232314F5548556D3665
358 requestDb:
359 auth: Basic YnBlbDpwYXNzd29yZDEk
360 asdc-connections:
361 asdc-controller1:
362 password: 76966BDD3C7414A03F7037264FF2E6C8EEC6C28F2B67F2840A1ED857C0260FEE731D73F47F828E5527125D29FD25D3E0DE39EE44C058906BF1657DE77BF897EECA93BDC07FA64F
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100363
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000364so-sdnc-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100365 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100366 db:
367 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000368 org:
369 onap:
370 so:
371 adapters:
372 sdnc:
373 bpelauth: 4C18603C5AE7E3A42A6CED95CDF9C0BA9B2109B3725747662E5D34E5FDF63DA9ADEBB08185098F14699195FDE9475100
374 sdncauth: ED07A7EE5F099FA53369C3DF2240AD68A00154676EEDBC6F8C16BAA83B1912941B8941ABD48683D2C1072DA7040659692DE936A59BBF42A038CF71DE67B4A375190071EC76EA657801B033C135
375 network:
376 encryptionKey: 07a7159d3bf51a0e53be7a8f89699be7
377 mso:
378 config:
379 cadi:
380 aafId: so@so.onap.org
381 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
382 apiEnforcement: org.onap.so.sdncAdapterPerm
383 noAuthn: /manage/health
384 adapters:
385 requestDb:
386 auth: Basic YnBlbDpwYXNzd29yZDEk
387 rest:
388 aafEncrypted: 3EDC974C5CD7FE54C47C7490AF4D3B474CDD7D0FFA35A7ACDE3E209631E45F428976EAC0858874F17390A13149E63C90281DD8D20456
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100389
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100390so-ve-vnfm-adapter:
391 certSecret: *so-certs
392
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000393so-vfc-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100394 certSecret: *so-certs
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100395 db:
396 <<: *dbSecrets
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000397 mso:
398 config:
399 cadi:
400 aafId: so@so.onap.org
401 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
402 apiEnforcement: org.onap.so.vfcAdapterPerm
403 noAuthn: /manage/health
404 adapters:
405 requestDb:
406 auth: Basic YnBlbDpwYXNzd29yZDEk
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100407
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000408so-vnfm-adapter:
Sylvain Desbureauxaadf5452020-03-18 18:13:51 +0100409 certSecret: *so-certs
Ramesh Parthasarathy95dc1c92020-02-05 17:02:28 +0000410 aaf:
411 auth:
412 username: so@so.onap.org
413 password: 8DB1C939BFC6A35C3832D0E52E452D0E05AE2537AF142CECD125FF827C05A972FDD0F4700547DA
414 aai:
415 auth: 2A11B07DB6214A839394AA1EC5844695F5114FC407FF5422625FB00175A3DCB8A1FF745F22867EFA72D5369D599BBD88DA8BED4233CF5586
416 sdc:
417 username: mso
418 password: 76966BDD3C7414A03F7037264FF2E6C8EEC6C28F2B67F2840A1ED857C0260FEE731D73F47F828E5527125D29FD25D3E0DE39EE44C058906BF1657DE77BF897EECA93BDC07FA64F
419 key: 566B754875657232314F5548556D3665
420 mso:
421 key: 07a7159d3bf51a0e53be7a8f89699be7
422 config:
423 cadi:
424 aafId: so@so.onap.org
425 aafPassword: enc:EME-arXn2lx8PO0f2kEtyK7VVGtAGWavXorFoxRmPO9
426 apiEnforcement: org.onap.so.vnfmAdapterPerm
427 noAuthn: /manage/health
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100428
Krzysztof Opasiakc53ff542020-03-28 02:14:37 +0100429so-mariadb:
430 db:
431 rootPasswordExternalSecretLocalDb: *dbRootPassSecretName
432 rootPasswordExternalSecret: '{{ ternary .Values.db.rootPasswordExternalSecretLocalDb (include "common.mariadb.secret.rootPassSecretName" (dict "dot" . "chartName" .Values.global.mariadbGalera.nameOverride)) .Values.global.mariadbGalera.localCluster }}'
433 backupCredsExternalSecret: *dbBackupCredsSecretName
434 userCredsExternalSecret: *dbUserCredsSecretName
435 adminCredsExternalSecret: *dbAdminCredsSecretName