blob: 3ab98950375aec4bc78a114a6cf76b2e6629a7ef [file] [log] [blame]
EmmettCoxbca68e02020-02-27 14:20:52 +00001# Copyright © 2020, Nokia
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +02002# Modifications Copyright © 2020, Nordix Foundation, Orange
Maciej Malewski955e39d2020-08-27 10:43:09 +02003# Modifications Copyright © 2020 Nokia
EmmettCoxbca68e02020-02-27 14:20:52 +00004#
5# Licensed under the Apache License, Version 2.0 (the "License");
6# you may not use this file except in compliance with the License.
7# You may obtain a copy of the License at
8#
9# http://www.apache.org/licenses/LICENSE-2.0
10#
11# Unless required by applicable law or agreed to in writing, software
12# distributed under the License is distributed on an "AS IS" BASIS,
13# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14# See the License for the specific language governing permissions and
15# limitations under the License.
16
17# Global
18global:
19 envsubstImage: dibi/envsubst
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020020 nodePortPrefix: 302
21 # Readiness image
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +020022 readinessImage: onap/oom/readiness:3.0.1
Sylvain Desbureaux0de302a2020-06-05 15:19:22 +020023 # Ubuntu Init image
24 ubuntuInitRepository: registry.hub.docker.com
25 ubuntuInitImage: oomk8s/ubuntu-init:2.0.0
26 # Logging image
27 loggingRepository: docker.elastic.co
28 loggingImage: beats/filebeat:5.5.0
29 # BusyBox image
30 busyboxRepository: registry.hub.docker.com
31 busyboxImage: library/busybox:1.31
32 persistence:
33 enabled: true
34 # Standard OOM
35 pullPolicy: "Always"
36 repository: "nexus3.onap.org:10001"
37
EmmettCoxbca68e02020-02-27 14:20:52 +000038
39# Service configuration
40service:
41 type: ClusterIP
42 ports:
43 - name: http
44 port: 8443
45 port_protocol: http
46
47
48# Deployment configuration
49repository: nexus3.onap.org:10001
Jan Malkiewicz339a93d2020-09-02 08:31:32 +020050image: onap/org.onap.oom.platform.cert-service.oom-certservice-api:2.1.0
EmmettCoxbca68e02020-02-27 14:20:52 +000051pullPolicy: Always
52replicaCount: 1
53
54liveness:
55 initialDelaySeconds: 60
56 periodSeconds: 10
57 command: curl https://localhost:$HTTPS_PORT/actuator/health --cacert $ROOT_CERT --cert-type p12 --cert $KEYSTORE_P12_PATH --pass $KEYSTORE_PASSWORD
58readiness:
59 initialDelaySeconds: 30
60 periodSeconds: 10
61 command: curl https://localhost:$HTTPS_PORT/ready --cacert $ROOT_CERT --cert-type p12 --cert $KEYSTORE_P12_PATH --pass $KEYSTORE_PASSWORD
62
63flavor: small
64resources:
65 small:
66 limits:
67 cpu: 0.5
68 memory: 1Gi
69 requests:
70 cpu: 0.2
71 memory: 512Mi
72 large:
73 limits:
74 cpu: 1
75 memory: 2Gi
76 requests:
77 cpu: 0.4
78 memory: 1Gi
79 unlimited: {}
80
81
82# Application configuration
83cmpServers:
84 secret:
Maciej Malewski955e39d2020-08-27 10:43:09 +020085 name: oom-cert-service-secret
EmmettCoxbca68e02020-02-27 14:20:52 +000086 volume:
Maciej Malewski955e39d2020-08-27 10:43:09 +020087 name: oom-cert-service-volume
88 mountPath: /etc/onap/oom/certservice
EmmettCoxbca68e02020-02-27 14:20:52 +000089
90tls:
91 server:
92 secret:
Maciej Malewski955e39d2020-08-27 10:43:09 +020093 name: oom-cert-service-server-tls-secret
EmmettCoxbca68e02020-02-27 14:20:52 +000094 volume:
Maciej Malewski955e39d2020-08-27 10:43:09 +020095 name: oom-cert-service-server-tls-volume
96 mountPath: /etc/onap/oom/certservice/certs/
EmmettCoxbca68e02020-02-27 14:20:52 +000097 client:
98 secret:
Maciej Malewski955e39d2020-08-27 10:43:09 +020099 defaultName: oom-cert-service-client-tls-secret
EmmettCoxbca68e02020-02-27 14:20:52 +0000100
101envs:
102 keystore:
103 jksName: certServiceServer-keystore.jks
104 p12Name: certServiceServer-keystore.p12
105 truststore:
106 jksName: truststore.jks
107 crtName: root.crt
108 httpsPort: 8443
109
110# External secrets with credentials can be provided to override default credentials defined below,
111# by uncommenting and filling appropriate *ExternalSecret value
112credentials:
113 tls:
114 keystorePassword: secret
115 truststorePassword: secret
116 #keystorePasswordExternalSecret:
117 #truststorePasswordExternalSecret:
118 # Below cmp values contain credentials for EJBCA test instance and are relevant only if global addTestingComponents flag is enabled
119 cmp:
egernug27578332020-03-26 10:27:55 +0000120 # Used only if cmpv2 testing is enabled
Maciej Malewski955e39d2020-08-27 10:43:09 +0200121 clientIakExternalSecret: '{{ include "common.release" . }}-ejbca-client-iak'
EmmettCoxbca68e02020-02-27 14:20:52 +0000122 #clientRvExternalSecret:
Maciej Malewski955e39d2020-08-27 10:43:09 +0200123 raIakExternalSecret: '{{ include "common.release" . }}-ejbca-ra-iak'
EmmettCoxbca68e02020-02-27 14:20:52 +0000124 #raRvExternalSecret:
125 client: {}
126 # iak: mypassword
127 # rv: unused
128 ra: {}
129 # iak: mypassword
130 # rv: unused
131
132secrets:
133 - uid: keystore-password
134 name: '{{ include "common.release" . }}-keystore-password'
135 type: password
136 externalSecret: '{{ tpl (default "" .Values.credentials.tls.keystorePasswordExternalSecret) . }}'
137 password: '{{ .Values.credentials.tls.keystorePassword }}'
138 passwordPolicy: required
139 - uid: truststore-password
140 name: '{{ include "common.release" . }}-truststore-password'
141 type: password
142 externalSecret: '{{ tpl (default "" .Values.credentials.tls.truststorePasswordExternalSecret) . }}'
143 password: '{{ .Values.credentials.tls.truststorePassword }}'
144 passwordPolicy: required
145 # Below values are relevant only if global addTestingComponents flag is enabled
146 - uid: ejbca-server-client-iak
147 type: password
148 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.clientIakExternalSecret) . }}'
149 password: '{{ .Values.credentials.cmp.client.iak }}'
150 - uid: cmp-config-client-rv
151 type: password
152 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.clientRvExternalSecret) . }}'
153 password: '{{ .Values.credentials.cmp.client.rv }}'
154 - uid: ejbca-server-ra-iak
155 type: password
156 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.raIakExternalSecret) . }}'
157 password: '{{ .Values.credentials.cmp.ra.iak }}'
158 - uid: cmp-config-ra-rv
159 type: password
160 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.raRvExternalSecret) . }}'
161 password: '{{ .Values.credentials.cmp.ra.rv }}'