blob: 747c94f4d1755553c3d7cf369b19e49f51ae7a34 [file] [log] [blame]
Jozsef Csongvai9d4d5af2020-07-13 11:10:25 -04001# Copyright © 2020 Bell Canada, Samsung Electronics
Krzysztof Opasiak020cdb92020-05-01 01:46:37 +02002#
3# Licensed under the Apache License, Version 2.0 (the "License");
4# you may not use this file except in compliance with the License.
5# You may obtain a copy of the License at
6#
7# http://www.apache.org/licenses/LICENSE-2.0
8#
9# Unless required by applicable law or agreed to in writing, software
10# distributed under the License is distributed on an "AS IS" BASIS,
11# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
12# See the License for the specific language governing permissions and
13# limitations under the License.
14
15global:
Krzysztof Opasiak020cdb92020-05-01 01:46:37 +020016 aafAgentImage: onap/aaf/aaf_agent:2.1.20
17 aafEnabled: true
Sylvain Desbureauxbd94a042021-04-19 16:00:49 +020018 # Give the name of a config map where certInitializer will onboard all certs
19 # given (certs must be in pem format)
20 customCertsConfigMap:
21 # Give the name of a secret where certInitializer will onboard all certs given
22 # (certs must be in pem format)
23 # this one superseedes previous one (so if both are given, only certs from
24 # secret will be onboarded).
25 customCertsSecret:
26
Krzysztof Opasiak020cdb92020-05-01 01:46:37 +020027
28pullPolicy: Always
29
30secrets:
31 - uid: deployer-creds
32 type: basicAuth
33 externalSecret: '{{ ternary (tpl (default "" .Values.aafDeployCredsExternalSecret) .) "aafIsDisabled" .Values.global.aafEnabled }}'
34 login: '{{ .Values.aafDeployFqi }}'
35 password: '{{ .Values.aafDeployPass }}'
36 passwordPolicy: required
Jozsef Csongvai9d4d5af2020-07-13 11:10:25 -040037 - uid: truststore-creds
38 type: password
39 externalSecret: '{{ tpl (default "" .Values.truststoreCredsExternalSecret) . }}'
40 password: '{{ .Values.truststorePassword }}'
41 passwordPolicy: required
Krzysztof Opasiak020cdb92020-05-01 01:46:37 +020042
Krzysztof Opasiake9754a02020-07-16 21:06:39 +020043readinessCheck:
44 wait_for:
45 - aaf-locate
46 - aaf-cm
47 - aaf-service
48
Krzysztof Opasiak020cdb92020-05-01 01:46:37 +020049fqdn: ""
50app_ns: "org.osaaf.aaf"
51fqi: ""
52fqi_namespace: ""
53public_fqdn: "aaf.osaaf.org"
54aafDeployFqi: "deployer@people.osaaf.org"
55aafDeployPass: demo123456!
56cadi_latitude: "38.0"
57cadi_longitude: "-72.0"
58aaf_add_config: ""
59mountPath: "/opt/app/osaaf"
krishnaa96edf6f372020-09-09 09:30:58 +053060appMountPath: "/opt/app/osaaf"
Jozsef Csongvai9d4d5af2020-07-13 11:10:25 -040061importCustomCertsEnabled: false
62truststoreMountpath: ""
63truststoreOutputFileName: truststore.jks
64truststorePassword: changeit
Sylvain Desbureauxb8341592021-02-23 15:54:00 +010065envVarToCheck: cadi_keystore_password_p12
Sylvain Desbureauxda711dd2021-04-07 17:22:42 +020066# ingressTlsSecret:
Krzysztof Opasiak75f18752020-09-09 20:32:56 +020067
Krzysztof Opasiak59976492020-10-20 23:17:17 +020068# This introduces implicit dependency on cert-wrapper
69# if you are using cert initializer cert-wrapper has to be also deployed.
70# We had to move this CM to a separate chart to reduce the total size of our charts
71# as it exceeds the default helm limits.
72certsCMName: '{{ include "common.release" . }}-cert-wrapper-certs'