blob: 829d3a01d1e21c3082c2d0f9859966a3cff1a583 [file] [log] [blame]
Joanna Jeremicz5b03f952021-01-27 13:15:16 +01001# Copyright © 2020-2021, Nokia
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +02002# Modifications Copyright © 2020, Nordix Foundation, Orange
Maciej Malewski955e39d2020-08-27 10:43:09 +02003# Modifications Copyright © 2020 Nokia
EmmettCoxbca68e02020-02-27 14:20:52 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17# Global
18global:
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020019 nodePortPrefix: 302
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020020 persistence:
21 enabled: true
22 # Standard OOM
23 pullPolicy: "Always"
Adam Wudzinski11eafc52020-10-28 11:45:20 +010024 repository: "nexus3.onap.org:10001"
25 offlineDeploymentBuild: false
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020026
EmmettCoxbca68e02020-02-27 14:20:52 +000027
28# Service configuration
29service:
30 type: ClusterIP
31 ports:
32 - name: http
33 port: 8443
34 port_protocol: http
35
Adam Wudzinski11eafc52020-10-28 11:45:20 +010036# Certificates generation configuration
Jan Malkiewicz741fb0b2020-11-18 11:31:06 +010037certificateGenerationImage: onap/integration-java11:7.2.0
EmmettCoxbca68e02020-02-27 14:20:52 +000038
39# Deployment configuration
Adam Wudzinski11eafc52020-10-28 11:45:20 +010040repository: "nexus3.onap.org:10001"
Joanna Jeremicz5b03f952021-01-27 13:15:16 +010041image: onap/org.onap.oom.platform.cert-service.oom-certservice-api:2.3.3
EmmettCoxbca68e02020-02-27 14:20:52 +000042pullPolicy: Always
43replicaCount: 1
44
45liveness:
46 initialDelaySeconds: 60
47 periodSeconds: 10
48 command: curl https://localhost:$HTTPS_PORT/actuator/health --cacert $ROOT_CERT --cert-type p12 --cert $KEYSTORE_P12_PATH --pass $KEYSTORE_PASSWORD
49readiness:
50 initialDelaySeconds: 30
51 periodSeconds: 10
52 command: curl https://localhost:$HTTPS_PORT/ready --cacert $ROOT_CERT --cert-type p12 --cert $KEYSTORE_P12_PATH --pass $KEYSTORE_PASSWORD
53
54flavor: small
55resources:
56 small:
57 limits:
58 cpu: 0.5
59 memory: 1Gi
60 requests:
61 cpu: 0.2
62 memory: 512Mi
63 large:
64 limits:
65 cpu: 1
66 memory: 2Gi
67 requests:
68 cpu: 0.4
69 memory: 1Gi
70 unlimited: {}
71
72
73# Application configuration
74cmpServers:
75 secret:
Maciej Malewski955e39d2020-08-27 10:43:09 +020076 name: oom-cert-service-secret
EmmettCoxbca68e02020-02-27 14:20:52 +000077 volume:
Maciej Malewski955e39d2020-08-27 10:43:09 +020078 name: oom-cert-service-volume
79 mountPath: /etc/onap/oom/certservice
EmmettCoxbca68e02020-02-27 14:20:52 +000080
81tls:
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +010082 issuer:
83 selfsigning:
84 name: &selfSigningIssuer cmpv2-selfsigning-issuer
85 ca:
86 name: &caIssuer cmpv2-ca-issuer
87 secret:
88 name: &caKeyPairSecret cmpv2-ca-key-pair
EmmettCoxbca68e02020-02-27 14:20:52 +000089 server:
90 secret:
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +010091 name: &serverSecret oom-cert-service-server-tls-secret
EmmettCoxbca68e02020-02-27 14:20:52 +000092 volume:
Maciej Malewski955e39d2020-08-27 10:43:09 +020093 name: oom-cert-service-server-tls-volume
94 mountPath: /etc/onap/oom/certservice/certs/
EmmettCoxbca68e02020-02-27 14:20:52 +000095 client:
96 secret:
Maciej Malewski955e39d2020-08-27 10:43:09 +020097 defaultName: oom-cert-service-client-tls-secret
EmmettCoxbca68e02020-02-27 14:20:52 +000098
99envs:
100 keystore:
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100101 jksName: keystore.jks
102 p12Name: keystore.p12
103 pemName: tls.crt
EmmettCoxbca68e02020-02-27 14:20:52 +0000104 truststore:
105 jksName: truststore.jks
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100106 crtName: ca.crt
107 pemName: tls.crt
EmmettCoxbca68e02020-02-27 14:20:52 +0000108 httpsPort: 8443
109
110# External secrets with credentials can be provided to override default credentials defined below,
111# by uncommenting and filling appropriate *ExternalSecret value
112credentials:
113 tls:
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100114 certificatesPassword: secret
115 #certificatesPasswordExternalSecret:
EmmettCoxbca68e02020-02-27 14:20:52 +0000116 # Below cmp values contain credentials for EJBCA test instance and are relevant only if global addTestingComponents flag is enabled
117 cmp:
egernug27578332020-03-26 10:27:55 +0000118 # Used only if cmpv2 testing is enabled
Maciej Malewski955e39d2020-08-27 10:43:09 +0200119 clientIakExternalSecret: '{{ include "common.release" . }}-ejbca-client-iak'
EmmettCoxbca68e02020-02-27 14:20:52 +0000120 #clientRvExternalSecret:
Maciej Malewski955e39d2020-08-27 10:43:09 +0200121 raIakExternalSecret: '{{ include "common.release" . }}-ejbca-ra-iak'
EmmettCoxbca68e02020-02-27 14:20:52 +0000122 #raRvExternalSecret:
123 client: {}
124 # iak: mypassword
125 # rv: unused
126 ra: {}
127 # iak: mypassword
128 # rv: unused
129
130secrets:
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100131 - uid: certificates-password
132 name: &certificatesPasswordSecretName '{{ .Values.cmpv2Config.global.platform.certificates.keystorePasswordSecretName }}'
EmmettCoxbca68e02020-02-27 14:20:52 +0000133 type: password
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100134 externalSecret: '{{ tpl (default "" .Values.credentials.tls.certificatesPasswordExternalSecret) . }}'
135 password: '{{ .Values.credentials.tls.certificatesPassword }}'
EmmettCoxbca68e02020-02-27 14:20:52 +0000136 passwordPolicy: required
137 # Below values are relevant only if global addTestingComponents flag is enabled
138 - uid: ejbca-server-client-iak
139 type: password
140 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.clientIakExternalSecret) . }}'
141 password: '{{ .Values.credentials.cmp.client.iak }}'
142 - uid: cmp-config-client-rv
143 type: password
144 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.clientRvExternalSecret) . }}'
145 password: '{{ .Values.credentials.cmp.client.rv }}'
146 - uid: ejbca-server-ra-iak
147 type: password
148 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.raIakExternalSecret) . }}'
149 password: '{{ .Values.credentials.cmp.ra.iak }}'
150 - uid: cmp-config-ra-rv
151 type: password
152 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.raRvExternalSecret) . }}'
153 password: '{{ .Values.credentials.cmp.ra.rv }}'
Piotr Marcinkiewicz32672932021-03-26 13:06:35 +0100154
155# Certificates definitions
156certificates:
157 - name: selfsigned-cert
158 secretName: *caKeyPairSecret
159 isCA: true
160 commonName: root.com
161 subject:
162 organization: Root Company
163 country: PL
164 locality: Wroclaw
165 province: Dolny Slask
166 organizationalUnit: Root Org
167 issuer:
168 name: *selfSigningIssuer
169 kind: Issuer
170 - name: cert-service-server-cert
171 secretName: *serverSecret
172 commonName: oom-cert-service
173 dnsNames:
174 - oom-cert-service
175 - localhost
176 subject:
177 organization: certServiceServer org
178 country: PL
179 locality: Wroclaw
180 province: Dolny Slask
181 organizationalUnit: certServiceServer company
182 usages:
183 - server auth
184 - client auth
185 keystore:
186 outputType:
187 - jks
188 - p12
189 passwordSecretRef:
190 name: *certificatesPasswordSecretName
191 key: password
192 issuer:
193 name: *caIssuer
194 kind: Issuer
195 - name: cert-service-client-cert
196 secretName: '{{ .Values.cmpv2Config.global.platform.certificates.clientSecretName | default .Values.tls.client.secret.defaultName }}'
197 commonName: certServiceClient.com
198 subject:
199 organization: certServiceClient org
200 country: PL
201 locality: Wroclaw
202 province: Dolny Slask
203 organizationalUnit: certServiceClient company
204 usages:
205 - server auth
206 - client auth
207 keystore:
208 outputType:
209 - jks
210 passwordSecretRef:
211 name: *certificatesPasswordSecretName
212 key: password
213 issuer:
214 name: *caIssuer
215 kind: Issuer