Sylvain Desbureaux | 47eb4d2 | 2020-12-10 12:15:27 +0100 | [diff] [blame] | 1 | {{/* |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 2 | # |
| 3 | # ============LICENSE_START======================================================= |
| 4 | # org.onap.aai |
| 5 | # ================================================================================ |
| 6 | # Copyright (c) 2018 AT&T Intellectual Property. All rights reserved. |
| 7 | # Copyright (c) 2020 Nokia Intellectual Property. All rights reserved. |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 8 | # Copyright (c) 2020-2021 Orange Intellectual Property. All rights reserved. |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 9 | # ================================================================================ |
| 10 | # Licensed under the Apache License, Version 2.0 (the "License"); |
| 11 | # you may not use this file except in compliance with the License. |
| 12 | # You may obtain a copy of the License at |
| 13 | # |
| 14 | # http://www.apache.org/licenses/LICENSE-2.0 |
| 15 | # |
| 16 | # Unless required by applicable law or agreed to in writing, software |
| 17 | # distributed under the License is distributed on an "AS IS" BASIS, |
| 18 | # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 19 | # See the License for the specific language governing permissions and |
| 20 | # limitations under the License. |
| 21 | # ============LICENSE_END========================================================= |
Sylvain Desbureaux | 47eb4d2 | 2020-12-10 12:15:27 +0100 | [diff] [blame] | 22 | */}} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 23 | apiVersion: apps/v1 |
| 24 | kind: Deployment |
| 25 | metadata: |
| 26 | name: {{ include "common.fullname" . }} |
| 27 | namespace: {{ include "common.namespace" . }} |
| 28 | labels: |
| 29 | app: {{ include "common.name" . }} |
| 30 | chart: {{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }} |
| 31 | release: {{ include "common.release" . }} |
| 32 | heritage: {{ .Release.Service }} |
| 33 | spec: |
| 34 | replicas: {{ .Values.replicaCount }} |
M.Hosnidokht | 6c80653 | 2021-08-25 09:19:41 -0400 | [diff] [blame] | 35 | minReadySeconds: {{ .Values.minReadySeconds }} |
| 36 | strategy: |
| 37 | type: {{ .Values.updateStrategy.type }} |
| 38 | rollingUpdate: |
| 39 | maxUnavailable: {{ .Values.updateStrategy.maxUnavailable }} |
| 40 | maxSurge: {{ .Values.updateStrategy.maxSurge }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 41 | selector: |
| 42 | matchLabels: |
| 43 | app: {{ include "common.name" . }} |
| 44 | template: |
| 45 | metadata: |
| 46 | labels: |
| 47 | app: {{ include "common.name" . }} |
| 48 | release: {{ include "common.release" . }} |
| 49 | name: {{ include "common.name" . }} |
| 50 | annotations: |
| 51 | checksum/config: {{ include (print $.Template.BasePath "/configmap.yaml") . | sha256sum }} |
| 52 | spec: |
| 53 | hostname: aai-graphadmin |
M.Hosnidokht | 6c80653 | 2021-08-25 09:19:41 -0400 | [diff] [blame] | 54 | terminationGracePeriodSeconds: {{ .Values.service.terminationGracePeriodSeconds }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 55 | {{ if .Values.global.initContainers.enabled }} |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 56 | initContainers: {{ include "common.certInitializer.initContainer" . | nindent 6 }} |
| 57 | {{- if .Values.global.aafEnabled }} |
| 58 | - command: |
| 59 | - sh |
| 60 | args: |
| 61 | - -c |
| 62 | - | |
| 63 | echo "*** retrieve Truststore and Keystore password" |
| 64 | export $(cat {{ .Values.certInitializer.appMountPath }}/local/mycreds.prop | xargs -0) |
| 65 | echo "*** obfuscate them " |
Radoslaw Chmiel | 88534f1 | 2022-02-28 21:33:01 +0100 | [diff] [blame] | 66 | export JETTY_UTIL_JAR=$(find /usr/local/jetty/lib/ -regextype sed -regex ".*jetty-util-[0-9].*.jar") |
| 67 | export KEYSTORE_PASSWORD=`java -cp ${JETTY_UTIL_JAR} org.eclipse.jetty.util.security.Password ${KEYSTORE_PLAIN_PASSWORD} 2>&1 | grep "OBF:"` |
| 68 | export KEYSTORE_JKS_PASSWORD=`java -cp ${JETTY_UTIL_JAR} org.eclipse.jetty.util.security.Password ${KEYSTORE_JKS_PLAIN_PASSWORD} 2>&1 | grep "OBF:"` |
| 69 | export TRUSTSTORE_PASSWORD=`java -cp ${JETTY_UTIL_JAR} org.eclipse.jetty.util.security.Password ${TRUSTSTORE_PLAIN_PASSWORD} 2>&1 | grep "OBF:"` |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 70 | echo "KEYSTORE_PASSWORD=${KEYSTORE_PASSWORD}" >> {{ .Values.certInitializer.appMountPath }}/local/mycreds.prop |
| 71 | echo "KEYSTORE_JKS_PASSWORD=${KEYSTORE_JKS_PASSWORD}" >> {{ .Values.certInitializer.appMountPath }}/local/mycreds.prop |
| 72 | echo "TRUSTSTORE_PASSWORD=${TRUSTSTORE_PASSWORD}" >> {{ .Values.certInitializer.appMountPath }}/local/mycreds.prop |
| 73 | image: {{ include "repositoryGenerator.image.jetty" . }} |
| 74 | imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }} |
| 75 | name: {{ include "common.name" . }}-obfuscate |
| 76 | volumeMounts: {{ include "common.certInitializer.volumeMount" . | nindent 8 }} |
| 77 | securityContext: |
| 78 | runAsUser: {{ .Values.securityContext.user_id }} |
| 79 | - command: |
| 80 | - sh |
| 81 | args: |
| 82 | - -c |
| 83 | - | |
| 84 | echo "*** Set obfuscated Truststore and Keystore password into configuration file" |
| 85 | export $(cat {{ .Values.certInitializer.appMountPath }}/local/mycreds.prop | xargs -0) |
| 86 | cd /config-input |
| 87 | for PFILE in `ls -1` |
| 88 | do |
| 89 | envsubst <${PFILE} >/config/${PFILE} |
| 90 | done |
| 91 | volumeMounts: {{ include "common.certInitializer.volumeMount" . | nindent 8 }} |
| 92 | - mountPath: /config-input |
| 93 | name: properties-input |
| 94 | - mountPath: /config |
| 95 | name: properties |
| 96 | image: {{ include "repositoryGenerator.image.envsubst" . }} |
| 97 | imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }} |
| 98 | name: {{ include "common.name" . }}-update-config |
| 99 | {{- end }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 100 | - command: |
| 101 | {{ if .Values.global.jobs.migration.enabled }} |
| 102 | - /app/ready.py |
| 103 | args: |
| 104 | - --job-name |
| 105 | - {{ include "common.release" . }}-aai-graphadmin-migration |
| 106 | {{ else if .Values.global.jobs.createSchema.enabled }} |
| 107 | - /app/ready.py |
| 108 | args: |
| 109 | - --job-name |
| 110 | - {{ include "common.release" . }}-aai-graphadmin-create-db-schema |
| 111 | {{ else }} |
| 112 | - /app/ready.py |
| 113 | args: |
| 114 | - --container-name |
| 115 | {{- if .Values.global.cassandra.localCluster }} |
| 116 | - aai-cassandra |
| 117 | {{- else }} |
| 118 | - cassandra |
| 119 | {{- end }} |
| 120 | - --container-name |
| 121 | - aai-schema-service |
| 122 | {{ end }} |
| 123 | env: |
| 124 | - name: NAMESPACE |
| 125 | valueFrom: |
| 126 | fieldRef: |
| 127 | apiVersion: v1 |
| 128 | fieldPath: metadata.namespace |
Sylvain Desbureaux | 5b65132 | 2020-12-07 15:34:15 +0100 | [diff] [blame] | 129 | image: {{ include "repositoryGenerator.image.readiness" . }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 130 | imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }} |
| 131 | name: {{ include "common.name" . }}-readiness |
| 132 | {{ end }} |
| 133 | containers: |
| 134 | - name: {{ include "common.name" . }} |
Sylvain Desbureaux | 5b65132 | 2020-12-07 15:34:15 +0100 | [diff] [blame] | 135 | image: {{ include "repositoryGenerator.repository" . }}/{{ .Values.image }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 136 | imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }} |
| 137 | env: |
| 138 | - name: LOCAL_USER_ID |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 139 | value: {{ .Values.securityContext.user_id | quote }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 140 | - name: LOCAL_GROUP_ID |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 141 | value: {{ .Values.securityContext.group_id | quote }} |
M.Hosnidokht | 6c80653 | 2021-08-25 09:19:41 -0400 | [diff] [blame] | 142 | - name: INTERNAL_PORT_1 |
| 143 | value: {{ .Values.service.internalPort | quote }} |
| 144 | - name: INTERNAL_PORT_2 |
| 145 | value: {{ .Values.service.internalPort2 | quote }} |
leila | 46fb580 | 2022-11-15 11:33:21 -0500 | [diff] [blame] | 146 | - name: INTERNAL_PORT_3 |
| 147 | value: {{ .Values.service.internalPort3 | quote }} |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 148 | volumeMounts: {{ include "common.certInitializer.volumeMount" . | nindent 8 }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 149 | - mountPath: /etc/localtime |
| 150 | name: localtime |
| 151 | readOnly: true |
| 152 | - mountPath: /opt/app/aai-graphadmin/resources/etc/appprops/janusgraph-realtime.properties |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 153 | name: config |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 154 | subPath: janusgraph-realtime.properties |
| 155 | - mountPath: /opt/app/aai-graphadmin/resources/etc/appprops/janusgraph-cached.properties |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 156 | name: config |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 157 | subPath: janusgraph-cached.properties |
| 158 | - mountPath: /opt/app/aai-graphadmin/resources/etc/appprops/aaiconfig.properties |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 159 | name: properties |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 160 | subPath: aaiconfig.properties |
| 161 | - mountPath: /opt/aai/logroot/AAI-RES |
Maciej Wereski | d523d12 | 2021-09-21 11:22:13 +0200 | [diff] [blame] | 162 | name: logs |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 163 | - mountPath: /opt/app/aai-graphadmin/resources/logback.xml |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 164 | name: config |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 165 | subPath: logback.xml |
| 166 | - mountPath: /opt/app/aai-graphadmin/resources/localhost-access-logback.xml |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 167 | name: config |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 168 | subPath: localhost-access-logback.xml |
| 169 | - mountPath: /opt/app/aai-graphadmin/resources/etc/auth/realm.properties |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 170 | name: config |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 171 | subPath: realm.properties |
| 172 | - mountPath: /opt/app/aai-graphadmin/resources/application.properties |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 173 | name: properties |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 174 | subPath: application.properties |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 175 | ports: |
| 176 | - containerPort: {{ .Values.service.internalPort }} |
| 177 | - containerPort: {{ .Values.service.internalPort2 }} |
leila | 46fb580 | 2022-11-15 11:33:21 -0500 | [diff] [blame] | 178 | - containerPort: {{ .Values.service.internalPort3 }} |
M.Hosnidokht | 6c80653 | 2021-08-25 09:19:41 -0400 | [diff] [blame] | 179 | lifecycle: |
| 180 | # wait for active requests (long-running tasks) to be finished |
| 181 | # Before the SIGTERM is invoked, Kubernetes exposes a preStop hook in the Pod. |
| 182 | preStop: |
| 183 | exec: |
| 184 | command: |
| 185 | - sh |
| 186 | - -c |
| 187 | - | |
| 188 | while (netstat -an | grep ESTABLISHED | grep -e $INTERNAL_PORT_1 -e $INTERNAL_PORT_2) |
| 189 | do sleep 10 |
| 190 | done |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 191 | # disable liveness probe when breakpoints set in debugger |
| 192 | # so K8s doesn't restart unresponsive container |
| 193 | {{ if .Values.liveness.enabled }} |
| 194 | livenessProbe: |
| 195 | tcpSocket: |
| 196 | port: {{ .Values.service.internalPort }} |
| 197 | initialDelaySeconds: {{ .Values.liveness.initialDelaySeconds }} |
| 198 | periodSeconds: {{ .Values.liveness.periodSeconds }} |
| 199 | {{ end }} |
| 200 | readinessProbe: |
| 201 | tcpSocket: |
| 202 | port: {{ .Values.service.internalPort }} |
| 203 | initialDelaySeconds: {{ .Values.readiness.initialDelaySeconds }} |
| 204 | periodSeconds: {{ .Values.readiness.periodSeconds }} |
miroslavmasaryk | a7ac7f0 | 2023-03-01 14:12:26 +0100 | [diff] [blame] | 205 | resources: {{ include "common.resources" . | nindent 10 }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 206 | {{- if .Values.nodeSelector }} |
| 207 | nodeSelector: |
| 208 | {{ toYaml .Values.nodeSelector | indent 8 }} |
| 209 | {{- end -}} |
| 210 | {{- if .Values.affinity }} |
| 211 | affinity: |
| 212 | {{ toYaml .Values.affinity | indent 8 }} |
| 213 | {{- end }} |
| 214 | |
| 215 | # side car containers |
Maciej Wereski | d523d12 | 2021-09-21 11:22:13 +0200 | [diff] [blame] | 216 | {{ include "common.log.sidecar" . | nindent 6 }} |
farida azmy | d893733 | 2021-03-09 12:20:42 +0200 | [diff] [blame] | 217 | serviceAccountName: {{ include "common.fullname" (dict "suffix" "read" "dot" . )}} |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 218 | volumes: {{ include "common.certInitializer.volumes" . | nindent 6 }} |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 219 | - name: localtime |
| 220 | hostPath: |
| 221 | path: /etc/localtime |
Maciej Wereski | d523d12 | 2021-09-21 11:22:13 +0200 | [diff] [blame] | 222 | - name: logs |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 223 | emptyDir: {} |
Maciej Wereski | d523d12 | 2021-09-21 11:22:13 +0200 | [diff] [blame] | 224 | {{ include "common.log.volumes" (dict "dot" . "configMapNamePrefix" (tpl .Values.logConfigMapNamePrefix .)) | nindent 6 }} |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 225 | - name: config |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 226 | configMap: |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 227 | name: {{ include "common.fullname" . }} |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 228 | - name: properties |
othman touijer | 5117667 | 2021-12-01 16:21:18 +0100 | [diff] [blame] | 229 | {{- if .Values.global.aafEnabled }} |
Sylvain Desbureaux | c57b58d | 2021-02-23 18:07:34 +0100 | [diff] [blame] | 230 | emptyDir: |
| 231 | medium: Memory |
othman touijer | 5117667 | 2021-12-01 16:21:18 +0100 | [diff] [blame] | 232 | - name: properties-input |
| 233 | {{- end }} |
| 234 | configMap: |
| 235 | name: {{ include "common.fullname" . }}-properties |
Sylvain Desbureaux | 7007041 | 2020-11-09 21:58:48 +0100 | [diff] [blame] | 236 | restartPolicy: {{ .Values.restartPolicy }} |
| 237 | imagePullSecrets: |
osk11461 | 27fd7d8 | 2021-06-18 00:51:17 +0200 | [diff] [blame] | 238 | - name: {{ include "common.namespace" . }}-docker-registry-key |