blob: 791b7855028acaa3348ecb8fb1ae056aeb871268 [file] [log] [blame]
rameshiyer27ff176652021-09-21 15:19:05 +01001# ============LICENSE_START=======================================================
2# Copyright (C) 2021 Nordix Foundation. All rights reserved.
3# ================================================================================
4# Licensed under the Apache License, Version 2.0 (the "License");
5# you may not use this file except in compliance with the License.
6# You may obtain a copy of the License at
7#
8# http://www.apache.org/licenses/LICENSE-2.0
9#
10# Unless required by applicable law or agreed to in writing, software
11# distributed under the License is distributed on an "AS IS" BASIS,
12# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13# See the License for the specific language governing permissions and
14# limitations under the License.
15#
16# SPDX-License-Identifier: Apache-2.0
17# ============LICENSE_END=========================================================
18
19#################################################################
20# Global configuration defaults.
21#################################################################
22global:
23 persistence: {}
24 aafEnabled: true
25
26#################################################################
27# Secrets metaconfig
28#################################################################
29secrets:
30 - uid: api-secret
31 type: basicAuth
32 externalSecret: '{{ tpl (default "" .Values.restServer.apiUserExternalSecret) . }}'
33 login: '{{ .Values.restServer.api.user }}'
34 password: '{{ .Values.restServer.api.password }}'
35 passwordPolicy: required
36 - uid: pap-secret
37 type: basicAuth
38 externalSecret: '{{ tpl (default "" .Values.restServer.papUserExternalSecret) . }}'
39 login: '{{ .Values.restServer.pap.user }}'
40 password: '{{ .Values.restServer.pap.password }}'
41 passwordPolicy: required
42 - uid: keystore-password
43 type: password
44 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
45 password: '{{ .Values.certStores.keyStorePassword }}'
46 passwordPolicy: required
47 - uid: truststore-password
48 type: password
49 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
50 password: '{{ .Values.certStores.trustStorePassword }}'
51 passwordPolicy: required
52
53certStores:
54 keyStorePassword: Pol1cy_0nap
55 trustStorePassword: Pol1cy_0nap
56
57certInitializer:
58 nameOverride: policy-clamp-cl-pf-ppnt-cert-initializer
59 aafDeployFqi: deployer@people.osaaf.org
60 aafDeployPass: demo123456!
61 fqdn: policy
62 fqi: policy@policy.onap.org
63 public_fqdn: policy.onap.org
64 cadi_latitude: "0.0"
65 cadi_longitude: "0.0"
66 credsPath: /opt/app/osaaf/local
67 app_ns: org.osaaf.aaf
68 uid: 100
69 gid: 101
70 aaf_add_config: >
71 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
72 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
73 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
74
75
76#################################################################
77# Application configuration defaults.
78#################################################################
79# application image
80image: onap/policy-clamp-cl-pf-ppnt:6.1.3
81pullPolicy: Always
82
83# flag to enable debugging - application support required
84debugEnabled: false
85
86# default number of instances
87replicaCount: 1
88
89# application configuration
90restServer:
91 api:
92 user: healthcheck
93 password: none
94 pap:
95 user: healthcheck
96 password: none
97
98nodeSelector: {}
99
100affinity: {}
101ingress:
102 enabled: false
103
104flavor: small
105resources:
106 small:
107 limits:
108 cpu: 1
109 memory: 4Gi
110 requests:
111 cpu: 100m
112 memory: 1Gi
113 large:
114 limits:
115 cpu: 2
116 memory: 8Gi
117 requests:
118 cpu: 200m
119 memory: 2Gi
120 unlimited: {}
121#Pods Service Account
122serviceAccount:
123 nameOverride: policy-clamp-cl-pf-ppnt
124 roles:
125 - read