blob: 8a7259ba0da97382e85f66d1d563796e758f07aa [file] [log] [blame]
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +01001{{/*
egernug27578332020-03-26 10:27:55 +00002# Copyright © 2020 Samsung Electronics
jmac065e2ce2018-03-29 01:18:02 +00003# Copyright © 2017 Amdocs, Bell Canada
Remigiusz Janeczek42177a12020-12-10 13:10:15 +01004# Copyright © 2021 Nokia
jmac065e2ce2018-03-29 01:18:02 +00005#
6# Licensed under the Apache License, Version 2.0 (the "License");
7# you may not use this file except in compliance with the License.
8# You may obtain a copy of the License at
9#
10# http://www.apache.org/licenses/LICENSE-2.0
11#
12# Unless required by applicable law or agreed to in writing, software
13# distributed under the License is distributed on an "AS IS" BASIS,
14# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15# See the License for the specific language governing permissions and
16# limitations under the License.
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010017*/}}
jmac065e2ce2018-03-29 01:18:02 +000018
Grzegorz-Lis1318a772020-07-23 15:08:43 +020019apiVersion: apps/v1
jmac065e2ce2018-03-29 01:18:02 +000020kind: StatefulSet
Alexander Dehn9b797d62020-04-21 09:53:50 +000021metadata: {{- include "common.resourceMetadata" . | nindent 2 }}
jmac065e2ce2018-03-29 01:18:02 +000022spec:
Grzegorz-Lis1318a772020-07-23 15:08:43 +020023 selector:
24 matchLabels:
25 app: {{ include "common.name" . }}
BorislavG1ffbd992018-04-24 07:56:27 +000026 serviceName: {{ include "common.servicename" . }}-cluster
jmac065e2ce2018-03-29 01:18:02 +000027 replicas: {{ .Values.replicaCount }}
Alexander Dehn9b797d62020-04-21 09:53:50 +000028 selector: {{- include "common.selectors" . | nindent 4 }}
jmac065e2ce2018-03-29 01:18:02 +000029 podManagementPolicy: Parallel
30 template:
Alexander Dehn9b797d62020-04-21 09:53:50 +000031 metadata: {{- include "common.templateMetadata" . | nindent 6 }}
jmac065e2ce2018-03-29 01:18:02 +000032 spec:
33 initContainers:
34 - command:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010035 - sh
36 args:
37 - -c
38 - "cd /config-input && for PFILE in `ls -1 .`; do envsubst <${PFILE} >/config/${PFILE}; done"
39 env:
40 - name: AAI_CLIENT_NAME
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010041 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010042 - name: AAI_CLIENT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010043 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050044 - name: AAI_TRUSTSTORE_PASSWORD
45 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 10 }}
46 - name: ANSIBLE_TRUSTSTORE_PASSWORD
47 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 10 }}
48 - name: SO_USER
49 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 10 }}
50 - name: SO_PASSWORD
51 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 10 }}
52 - name: NENG_USER
53 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 10 }}
54 - name: NENG_PASSWORD
55 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 10 }}
56 - name: CDS_USER
57 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 10 }}
58 - name: CDS_PASSWORD
59 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 10 }}
60 - name: HONEYCOMB_USER
61 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 10 }}
62 - name: HONEYCOMB_PASSWORD
63 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 10 }}
64 - name: TRUSTSTORE_PASSWORD
65 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 10 }}
66 - name: KEYSTORE_PASSWORD
67 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 10 }}
68 - name: DMAAP_USER
69 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 10 }}
70 - name: DMAAP_PASSWORD
71 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 10 }}
72 - name: DMAAP_AUTHKEY
73 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010074 - name: MODELSERVICE_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010075 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010076 - name: MODELSERVICE_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010077 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "modeling-user-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010078 - name: RESTCONF_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010079 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010080 - name: RESTCONF_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010081 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "restconf-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010082 - name: ANSIBLE_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010083 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010084 - name: ANSIBLE_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010085 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010086 - name: SCALEOUT_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010087 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010088 - name: SCALEOUT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010089 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "scaleout-creds" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010090 - name: NETBOX_APIKEY
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010091 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "netbox-apikey" "key" "password") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010092 - name: SDNC_DB_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010093 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +010094 - name: SDNC_DB_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +010095 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -050096 - name: MYSQL_USER
97 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
98 - name: MYSQL_PASSWORD
99 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 10 }}
Alexander Dehn2ae954d2020-10-20 15:57:42 +0000100 - name: ODL_ADMIN_USERNAME
101 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500102 - name: ODL_USER
103 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 10 }}
Alexander Dehn2ae954d2020-10-20 15:57:42 +0000104 - name: ODL_ADMIN_PASSWORD
105 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500106 - name: ODL_PASSWORD
107 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 10 }}
demskeq89d26b332021-01-14 16:45:28 +0100108 {{ if and .Values.config.sdnr.dmaapProxy.enabled .Values.config.sdnr.dmaapProxy.usepwd }}
109 - name: DMAAP_HTTP_PROXY_USERNAME
110 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-proxy-creds" "key" "login") | indent 10 }}
111 - name: DMAAP_HTTP_PROXY_PASSWORD
112 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-proxy-creds" "key" "password") | indent 10 }}
113 {{- end }}
demskeq8b43e92c2021-02-12 15:43:48 +0100114 {{ if .Values.config.sdnr.oauth.enabled }}
115 - name: OAUTH_TOKEN_SECRET
116 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "oauth-token-secret" "key" "password") | indent 10 }}
117 - name: KEYCLOAK_SECRET
118 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keycloak-secret" "key" "password") | indent 10 }}
119
120 - name: ENABLE_ODLUX_RBAC
121 value: "{{ .Values.config.sdnr.oauth.odluxRbac.enabled | default "true" }}"
122 {{ end }}
demskeq89d26b332021-01-14 16:45:28 +0100123
Alexander Dehn2ae954d2020-10-20 15:57:42 +0000124
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100125 volumeMounts:
126 - mountPath: /config-input
127 name: config-input
128 - mountPath: /config
129 name: properties
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100130 image: {{ include "repositoryGenerator.image.envsubst" . }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100131 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
132 name: {{ include "common.name" . }}-update-config
Alexander Dehn9b797d62020-04-21 09:53:50 +0000133 {{ if .Values.dgbuilder.enabled -}}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100134 - command:
Sylvain Desbureaux1694e1d2020-08-21 09:58:25 +0200135 - /app/ready.py
jmac065e2ce2018-03-29 01:18:02 +0000136 args:
Alexander Dehn9b797d62020-04-21 09:53:50 +0000137 {{ if or .Values.dgbuilder.enabled .Values.config.sdnr.enabled -}}
jmac065e2ce2018-03-29 01:18:02 +0000138 - --container-name
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100139 - {{ include "common.mariadbService" . }}
Dan Timoney17554772021-04-01 15:49:23 -0400140 - --job-name
141 - {{ include "common.fullname" . }}-dbinit-job
Alexander Dehn9b797d62020-04-21 09:53:50 +0000142 {{ end -}}
143 {{ if .Values.config.sdnr.enabled -}}
144 - --container-name
145 - {{ include "common.name" . }}-sdnrdb-init-job
146 {{ end -}}
jmac065e2ce2018-03-29 01:18:02 +0000147 env:
148 - name: NAMESPACE
149 valueFrom:
150 fieldRef:
151 apiVersion: v1
152 fieldPath: metadata.namespace
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100153 image: {{ include "repositoryGenerator.image.readiness" . }}
jmac065e2ce2018-03-29 01:18:02 +0000154 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100155 name: {{ include "common.name" . }}-readiness
Alexander Dehn9b797d62020-04-21 09:53:50 +0000156 {{ end -}}
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200157{{ include "common.certInitializer.initContainer" . | indent 6 }}
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100158{{ include "common.certServiceClient.initContainer" . | indent 6 }}
159 - name: {{ include "common.name" . }}-chown
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100160 image: {{ include "repositoryGenerator.image.busybox" . }}
Lucjan Bryndza5c63e932020-06-25 08:43:23 +0000161 command:
162 - sh
163 args:
164 - -c
Dan Timoney2ee28a52021-01-15 16:39:50 -0500165 - |
Dan Timoney2ee28a52021-01-15 16:39:50 -0500166 mkdir {{ .Values.persistence.mdsalPath }}/journal
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100167 mkdir {{ .Values.persistence.mdsalPath }}/snapshots
demskeq83b3b7fd2021-02-18 09:41:59 +0100168 mkdir {{ .Values.persistence.mdsalPath }}/daexim
Dan Timoney2ee28a52021-01-15 16:39:50 -0500169 chown -R {{ .Values.config.odlUid }}:{{ .Values.config.odlGid}} {{ .Values.persistence.mdsalPath }}
Lucjan Bryndza5c63e932020-06-25 08:43:23 +0000170{{- if .Values.global.aafEnabled }}
Dan Timoney2ee28a52021-01-15 16:39:50 -0500171 chown -R {{ .Values.config.odlUid }}:{{ .Values.config.odlGid}} {{ .Values.certInitializer.credsPath }}
Lucjan Bryndza5c63e932020-06-25 08:43:23 +0000172{{- end }}
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400173 volumeMounts:
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200174{{ include "common.certInitializer.volumeMount" . | indent 10 }}
Timoney, Dan (dt5972)ba4d2eb2019-05-07 13:32:42 -0400175 - mountPath: {{ .Values.persistence.mdsalPath }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100176 name: {{ include "common.fullname" . }}-data
jmac065e2ce2018-03-29 01:18:02 +0000177 containers:
178 - name: {{ include "common.name" . }}
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100179 image: {{ include "repositoryGenerator.repository" . }}/{{ .Values.image }}
jmac065e2ce2018-03-29 01:18:02 +0000180 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100181 {{- if and .Values.global.cmpv2Enabled .Values.global.CMPv2CertManagerIntegration }}
182 {{- $linkCommand := include "common.certManager.linkVolumeMounts" . }}
183 lifecycle:
184 postStart:
185 exec:
186 command: ["sh", "-c", {{$linkCommand | quote}} ]
187 {{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000188 command: ["/bin/bash"]
Dan Timoney2ee28a52021-01-15 16:39:50 -0500189 args: ["-c", "/opt/onap/sdnc/bin/createLinks.sh ; /opt/onap/sdnc/bin/startODL.sh"]
jmac065e2ce2018-03-29 01:18:02 +0000190 ports:
191 - containerPort: {{ .Values.service.internalPort }}
192 - containerPort: {{ .Values.service.internalPort2 }}
193 - containerPort: {{ .Values.service.internalPort3 }}
194 - containerPort: {{ .Values.service.clusterPort }}
demskeq827854662021-04-08 14:49:47 +0200195 {{- if .Values.config.sdnr.netconfCallHome.enabled }}
196 - containerPort: {{ .Values.service.callHomePort }}
197 {{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000198 readinessProbe:
199 tcpSocket:
200 port: {{ .Values.service.internalPort }}
201 initialDelaySeconds: {{ .Values.readiness.initialDelaySeconds }}
202 periodSeconds: {{ .Values.readiness.periodSeconds }}
203 env:
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100204 - name: MYSQL_ROOT_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100205 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-root-password" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100206 - name: ODL_ADMIN_USERNAME
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100207 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500208 - name: ODL_USER
209 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "login") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100210 - name: ODL_ADMIN_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100211 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500212 - name: ODL_PASSWORD
213 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "odl-creds" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100214 - name: SDNC_DB_USER
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100215 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100216 - name: SDNC_DB_PASSWORD
Krzysztof Opasiakab7a6bb2020-03-24 03:30:51 +0100217 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
Dan Timoney9e310e72021-02-23 11:25:39 -0500218 - name: MYSQL_USER
219 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 12 }}
220 - name: MYSQL_PASSWORD
221 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "password") | indent 12 }}
222 - name: MYSQL_DATABASE
223 value: "{{ .Values.config.dbSdnctlDatabase }}"
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100224 - name: SDNC_CONFIG_DIR
225 value: "{{ .Values.config.configDir }}"
Dan Timoney9e310e72021-02-23 11:25:39 -0500226 - name: AAI_CLIENT_NAME
227 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "login") | indent 12 }}
228 - name: AAI_CLIENT_PASSWORD
229 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-user-creds" "key" "password") | indent 12 }}
230 - name: AAI_TRUSTSTORE_PASSWORD
231 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "aai-truststore-password" "key" "password") | indent 12 }}
232 - name: ANSIBLE_TRUSTSTORE_PASSWORD
233 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "ansible-truststore-password" "key" "password") | indent 12 }}
234 - name: SO_USER
235 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "login") | indent 12 }}
236 - name: SO_PASSWORD
237 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-user-creds" "key" "password") | indent 12 }}
238 - name: NENG_USER
239 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "login") | indent 12 }}
240 - name: NENG_PASSWORD
241 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "neng-user-creds" "key" "password") | indent 12 }}
242 - name: CDS_USER
243 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "login") | indent 12 }}
244 - name: CDS_PASSWORD
245 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "cds-user-creds" "key" "password") | indent 12 }}
246 - name: HONEYCOMB_USER
247 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "login") | indent 12 }}
248 - name: HONEYCOMB_PASSWORD
249 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "honeycomb-user-creds" "key" "password") | indent 12 }}
250 - name: TRUSTSTORE_PASSWORD
251 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "truststore-password" "key" "password") | indent 12 }}
252 - name: KEYSTORE_PASSWORD
253 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "keystore-password" "key" "password") | indent 12 }}
254 - name: DMAAP_USER
255 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "login") | indent 12 }}
256 - name: DMAAP_PASSWORD
257 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-user-creds" "key" "password") | indent 12 }}
258 - name: DMAAP_AUTHKEY
259 {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "dmaap-authkey" "key" "password") | indent 12 }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100260 - name: ENABLE_ODL_CLUSTER
261 value: "{{ .Values.config.enableClustering }}"
262 - name: MY_ODL_CLUSTER
263 value: "{{ .Values.config.myODLCluster }}"
264 - name: PEER_ODL_CLUSTER
265 value: "{{ .Values.config.peerODLCluster }}"
266 - name: IS_PRIMARY_CLUSTER
267 value: "{{ .Values.config.isPrimaryCluster }}"
268 - name: GEO_ENABLED
269 value: "{{ .Values.config.geoEnabled}}"
270 - name: SDNC_AAF_ENABLED
271 value: "{{ .Values.global.aafEnabled}}"
272 - name: SDNC_REPLICAS
273 value: "{{ .Values.replicaCount }}"
274 - name: MYSQL_HOST
275 value: {{ include "common.mariadbService" . }}
Dan Timoney2ee28a52021-01-15 16:39:50 -0500276 - name: MDSAL_PATH
277 value: {{ .Values.persistence.mdsalPath }}
278 - name: DAEXIM_PATH
279 value: {{ .Values.persistence.daeximPath }}
280 - name: JOURNAL_PATH
281 value: {{ .Values.persistence.journalPath }}
282 - name: SNAPSHOTS_PATH
283 value: {{ .Values.persistence.snapshotsPath }}
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100284 - name: JAVA_HOME
285 value: "{{ .Values.config.javaHome}}"
Dan Timoneya98765b2020-09-14 11:57:55 -0400286 - name: JAVA_OPTS
287 value: "-Xms{{.Values.config.odl.javaOptions.minMemory}} -Xmx{{.Values.config.odl.javaOptions.maxMemory}}"
Sylvain Desbureauxbcf72512020-07-22 10:45:18 +0200288 - name: KARAF_CONSOLE_LOG_LEVEL
289 value: "{{ include "common.log.level" . }}"
Alexander Dehn9b797d62020-04-21 09:53:50 +0000290 - name: SDNRWT
291 value: "{{ .Values.config.sdnr.enabled | default "false"}}"
292 {{- if eq .Values.config.sdnr.mode "web" }}
293 - name: SDNRDM
294 value: "true"
295 {{- end }}
296 - name: SDNRONLY
297 value: "{{ .Values.config.sdnr.sdnronly | default "false" }}"
298 - name: SDNRDBURL
299 {{- $prefix := ternary "https" "http" .Values.global.aafEnabled}}
300 value: "{{$prefix}}://{{ .Values.elasticsearch.service.name | default "sdnrdb"}}.{{.Release.Namespace}}:{{.Values.elasticsearch.service.port | default "9200"}}"
301 {{- if .Values.config.sdnr.sdnrdbTrustAllCerts }}
302 - name: SDNRDBTRUSTALLCERTS
303 value: "true"
Piotr Marcinkiewiczaf82e2b2021-02-11 11:23:31 +0100304 {{- end }}
305 {{- if .Values.global.cmpv2Enabled }}
306 - name: ODL_CERT_DIR
307 value: {{ (mustFirst (.Values.certificates)).mountPath }}
308 {{- end }}
demskeq8b43e92c2021-02-12 15:43:48 +0100309 - name: ENABLE_OAUTH
310 value: "{{ .Values.config.sdnr.oauth.enabled | default "false" }}"
demskeq827854662021-04-08 14:49:47 +0200311 - name: SDNR_NETCONF_CALLHOME_ENABLED
312 value: "{{ .Values.config.sdnr.netconfCallHome.enabled | default "false" }}"
jmac065e2ce2018-03-29 01:18:02 +0000313 volumeMounts:
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200314{{ include "common.certInitializer.volumeMount" . | indent 10 }}
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100315{{ include "common.certServiceClient.volumeMounts" . | indent 10 }}
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100316{{- if and .Values.global.cmpv2Enabled .Values.global.CMPv2CertManagerIntegration }}
317{{ include "common.certManager.volumeMounts" . | indent 10 }}
318{{- end }}
jmac065e2ce2018-03-29 01:18:02 +0000319 - mountPath: /etc/localtime
320 name: localtime
321 readOnly: true
322 - mountPath: /opt/opendaylight/current/etc/org.ops4j.pax.logging.cfg
323 name: sdnc-logging-cfg-config
324 subPath: org.ops4j.pax.logging.cfg
jmaca68f4cb2018-05-10 22:44:19 +0000325 - mountPath: {{ .Values.config.binDir }}/installSdncDb.sh
326 name: bin
jmac065e2ce2018-03-29 01:18:02 +0000327 subPath: installSdncDb.sh
Dan Timoney2ee28a52021-01-15 16:39:50 -0500328 - mountPath: {{ .Values.config.binDir }}/createLinks.sh
329 name: bin
330 subPath: createLinks.sh
Konrad Bańka5ea1db32020-04-06 14:32:46 +0200331 - mountPath: {{ .Values.config.ccsdkConfigDir }}/aaiclient.properties
332 name: properties
333 subPath: aaiclient.properties
jmaca68f4cb2018-05-10 22:44:19 +0000334 - mountPath: {{ .Values.config.configDir }}/aaiclient.properties
335 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000336 subPath: aaiclient.properties
jmaca68f4cb2018-05-10 22:44:19 +0000337 - mountPath: {{ .Values.config.configDir }}/dblib.properties
338 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000339 subPath: dblib.properties
jmac7c434672018-05-11 20:14:17 +0000340 - mountPath: {{ .Values.config.configDir }}/lcm-dg.properties
341 name: properties
342 subPath: lcm-dg.properties
jmaca68f4cb2018-05-10 22:44:19 +0000343 - mountPath: {{ .Values.config.configDir }}/svclogic.properties
344 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000345 subPath: svclogic.properties
346 - mountPath: /opt/onap/sdnc/svclogic/config/svclogic.properties
jmaca68f4cb2018-05-10 22:44:19 +0000347 name: properties
jmac065e2ce2018-03-29 01:18:02 +0000348 subPath: svclogic.properties
Alexis de Talhouët43c67e02018-09-20 16:49:16 -0400349 - mountPath: {{ .Values.config.configDir }}/netbox.properties
350 name: properties
351 subPath: netbox.properties
352 - mountPath: {{ .Values.config.configDir }}/blueprints-processor-adaptor.properties
353 name: properties
354 subPath: blueprints-processor-adaptor.properties
jmac8d6dc962018-04-26 14:26:55 +0000355 - mountPath: {{ .Values.persistence.mdsalPath }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100356 name: {{ include "common.fullname" . }}-data
jmac065e2ce2018-03-29 01:18:02 +0000357 - mountPath: /var/log/onap
358 name: logs
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400359 - mountPath: {{ .Values.config.odl.salConfigDir }}/{{ .Values.config.odl.salConfigVersion}}/sal-clustering-config-{{ .Values.config.odl.salConfigVersion}}-akkaconf.xml
360 name: properties
361 subPath: akka.conf
362 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.controller.cluster.datastore.cfg
363 name: properties
364 subPath: org.opendaylight.controller.cluster.datastore.cfg
Dan Timoney9520e7c2021-01-12 11:10:58 -0500365 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.aaa.filterchain.cfg
366 name: properties
367 subPath: org.opendaylight.aaa.filterchain.cfg
Timoney, Dan (dt5972)58774772019-08-21 16:50:54 -0400368 - mountPath: {{ .Values.config.odl.binDir }}/setenv
369 name: properties
370 subPath: setenv
Alexander Dehn9b797d62020-04-21 09:53:50 +0000371 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-registrar.properties
372 name: properties
373 subPath: mountpoint-registrar.properties
374 - mountPath: {{ .Values.config.odl.etcDir }}/mountpoint-state-provider.properties
375 name: properties
376 subPath: mountpoint-state-provider.properties
demskeq8a86300a2021-02-10 09:53:33 +0100377 - mountPath: {{ .Values.config.odl.etcDir }}/org.opendaylight.daexim.cfg
378 name: properties
379 subPath: org.opendaylight.daexim.cfg
demskeq8b43e92c2021-02-12 15:43:48 +0100380 {{- if .Values.config.sdnr.oauth.enabled }}
381 - mountPath: {{ .Values.config.odl.etcDir }}/oauth-provider.config.json
382 name: properties
383 subPath: oauth-provider.config.json
384 {{ end }}
jmac065e2ce2018-03-29 01:18:02 +0000385 resources:
Mandeep Khinda5e3f36a2018-09-24 15:25:42 +0000386{{ include "common.resources" . | indent 12 }}
jmac065e2ce2018-03-29 01:18:02 +0000387 {{- if .Values.nodeSelector }}
388 nodeSelector:
389{{ toYaml .Values.nodeSelector | indent 10 }}
390 {{- end -}}
391 {{- if .Values.affinity }}
392 affinity:
393{{ toYaml .Values.affinity | indent 10 }}
394 {{- end }}
395
396 # side car containers
397 - name: filebeat-onap
Sylvain Desbureauxcbc703c2020-11-19 17:52:07 +0100398 image: {{ include "repositoryGenerator.image.logging" . }}
jmac065e2ce2018-03-29 01:18:02 +0000399 imagePullPolicy: {{ .Values.global.pullPolicy | default .Values.pullPolicy }}
400 volumeMounts:
401 - mountPath: /usr/share/filebeat/filebeat.yml
402 name: filebeat-conf
403 subPath: filebeat.yml
404 - mountPath: /var/log/onap
405 name: logs
406 - mountPath: /usr/share/filebeat/data
407 name: data-filebeat
jmac8d6dc962018-04-26 14:26:55 +0000408 imagePullSecrets:
409 - name: "{{ include "common.namespace" . }}-docker-registry-key"
jmac065e2ce2018-03-29 01:18:02 +0000410 volumes:
411 - name: localtime
412 hostPath:
413 path: /etc/localtime
414 - name: logs
415 emptyDir: {}
416 - name: data-filebeat
417 emptyDir: {}
418 - name: filebeat-conf
419 configMap:
420 name: {{ include "common.fullname" . }}-filebeat-configmap
421 - name: sdnc-logging-cfg-config
422 configMap:
423 name: {{ include "common.fullname" . }}-log-configmap
jmaca68f4cb2018-05-10 22:44:19 +0000424 - name: bin
jmac065e2ce2018-03-29 01:18:02 +0000425 configMap:
jmaca68f4cb2018-05-10 22:44:19 +0000426 name: {{ include "common.fullname" . }}-bin
427 defaultMode: 0755
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100428 - name: config-input
jmac065e2ce2018-03-29 01:18:02 +0000429 configMap:
jmaca68f4cb2018-05-10 22:44:19 +0000430 name: {{ include "common.fullname" . }}-properties
431 defaultMode: 0644
Krzysztof Opasiakcc97c732020-02-25 23:31:20 +0100432 - name: properties
433 emptyDir:
434 medium: Memory
jmac8d6dc962018-04-26 14:26:55 +0000435 {{ if not .Values.persistence.enabled }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100436 - name: {{ include "common.fullname" . }}-data
jmac8d6dc962018-04-26 14:26:55 +0000437 emptyDir: {}
438 {{ else }}
Krzysztof Opasiak8ab45472020-05-12 12:53:50 +0200439{{ include "common.certInitializer.volumes" . | nindent 8 }}
Remigiusz Janeczek42177a12020-12-10 13:10:15 +0100440{{ include "common.certServiceClient.volumes" . | nindent 8 }}
Piotr Marcinkiewicz59571012021-01-12 17:37:08 +0100441{{- if and .Values.global.cmpv2Enabled .Values.global.CMPv2CertManagerIntegration }}
442{{ include "common.certManager.volumes" . | nindent 8 }}
443{{- end }}
jmac8d6dc962018-04-26 14:26:55 +0000444 volumeClaimTemplates:
445 - metadata:
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100446 name: {{ include "common.fullname" . }}-data
jmac8d6dc962018-04-26 14:26:55 +0000447 labels:
448 name: {{ include "common.fullname" . }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100449 chart: "{{ .Chart.Name }}-{{ .Chart.Version }}"
Krzysztof Opasiak137d7cc2020-01-24 23:49:11 +0100450 release: "{{ include "common.release" . }}"
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100451 heritage: "{{ .Release.Service }}"
jmac8d6dc962018-04-26 14:26:55 +0000452 spec:
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100453 accessModes:
454 - {{ .Values.persistence.accessMode }}
455 storageClassName: {{ include "common.storageClass" . }}
jmac8d6dc962018-04-26 14:26:55 +0000456 resources:
457 requests:
458 storage: {{ .Values.persistence.size }}
Sylvain Desbureaux25e01d52019-12-09 11:06:39 +0100459 {{- end }}