1 # Copyright © 2020, Nokia
2 # Modifications Copyright © 2020, Nordix Foundation
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
18 envsubstImage: dibi/envsubst
20 # Service configuration
29 # Deployment configuration
30 repository: nexus3.onap.org:10001
31 image: onap/org.onap.aaf.certservice.aaf-certservice-api:1.0.0
36 initialDelaySeconds: 60
38 command: curl https://localhost:$HTTPS_PORT/actuator/health --cacert $ROOT_CERT --cert-type p12 --cert $KEYSTORE_P12_PATH --pass $KEYSTORE_PASSWORD
40 initialDelaySeconds: 30
42 command: curl https://localhost:$HTTPS_PORT/ready --cacert $ROOT_CERT --cert-type p12 --cert $KEYSTORE_P12_PATH --pass $KEYSTORE_PASSWORD
63 # Application configuration
66 name: aaf-cert-service-secret
68 name: aaf-cert-service-volume
69 mountPath: /etc/onap/aaf/certservice
74 name: aaf-cert-service-server-tls-secret
76 name: aaf-cert-service-server-tls-volume
77 mountPath: /etc/onap/aaf/certservice/certs/
80 defaultName: aaf-cert-service-client-tls-secret
84 jksName: certServiceServer-keystore.jks
85 p12Name: certServiceServer-keystore.p12
87 jksName: truststore.jks
91 # External secrets with credentials can be provided to override default credentials defined below,
92 # by uncommenting and filling appropriate *ExternalSecret value
95 keystorePassword: secret
96 truststorePassword: secret
97 #keystorePasswordExternalSecret:
98 #truststorePasswordExternalSecret:
99 # Below cmp values contain credentials for EJBCA test instance and are relevant only if global addTestingComponents flag is enabled
101 #clientIakExternalSecret:
102 #clientRvExternalSecret:
103 #raIakExternalSecret:
113 - uid: keystore-password
114 name: '{{ include "common.release" . }}-keystore-password'
116 externalSecret: '{{ tpl (default "" .Values.credentials.tls.keystorePasswordExternalSecret) . }}'
117 password: '{{ .Values.credentials.tls.keystorePassword }}'
118 passwordPolicy: required
119 - uid: truststore-password
120 name: '{{ include "common.release" . }}-truststore-password'
122 externalSecret: '{{ tpl (default "" .Values.credentials.tls.truststorePasswordExternalSecret) . }}'
123 password: '{{ .Values.credentials.tls.truststorePassword }}'
124 passwordPolicy: required
125 # Below values are relevant only if global addTestingComponents flag is enabled
126 - uid: ejbca-server-client-iak
128 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.clientIakExternalSecret) . }}'
129 password: '{{ .Values.credentials.cmp.client.iak }}'
130 - uid: cmp-config-client-rv
132 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.clientRvExternalSecret) . }}'
133 password: '{{ .Values.credentials.cmp.client.rv }}'
134 - uid: ejbca-server-ra-iak
136 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.raIakExternalSecret) . }}'
137 password: '{{ .Values.credentials.cmp.ra.iak }}'
138 - uid: cmp-config-ra-rv
140 externalSecret: '{{ tpl (default "" .Values.credentials.cmp.raRvExternalSecret) . }}'
141 password: '{{ .Values.credentials.cmp.ra.rv }}'