1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2018 Ericsson. All rights reserved.
3 # Modifications Copyright (C) 2019-2021 AT&T Intellectual Property.
4 # Modifications Copyright © 2022 Nordix Foundation
5 # ================================================================================
6 # Licensed under the Apache License, Version 2.0 (the "License");
7 # you may not use this file except in compliance with the License.
8 # You may obtain a copy of the License at
10 # http://www.apache.org/licenses/LICENSE-2.0
12 # Unless required by applicable law or agreed to in writing, software
13 # distributed under the License is distributed on an "AS IS" BASIS,
14 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15 # See the License for the specific language governing permissions and
16 # limitations under the License.
18 # SPDX-License-Identifier: Apache-2.0
19 # ============LICENSE_END=========================================================
21 #################################################################
22 # Global configuration defaults.
23 #################################################################
29 #################################################################
31 #################################################################
33 - uid: restserver-creds
35 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
36 login: '{{ .Values.restServer.user }}'
37 password: '{{ .Values.restServer.password }}'
38 - uid: truststore-pass
40 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
41 password: '{{ .Values.certStores.trustStorePassword }}'
42 passwordPolicy: required
45 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
46 password: '{{ .Values.certStores.keyStorePassword }}'
47 passwordPolicy: required
48 - uid: policy-kafka-user
49 externalSecret: '{{ tpl (default "" .Values.config.jaasConfExternalSecret) . }}'
52 - name: sasl.jaas.config
53 value: '{{ .Values.config.someConfig }}'
56 #################################################################
57 # Application configuration defaults.
58 #################################################################
60 image: onap/policy-apex-pdp:2.8.2
63 # flag to enable debugging - application support required
66 # application configuration
74 keyStorePassword: Pol1cy_0nap
75 trustStorePassword: Pol1cy_0nap
78 nameOverride: policy-apex-pdp-cert-initializer
79 aafDeployFqi: deployer@people.osaaf.org
80 aafDeployPass: demo123456!
82 fqi: policy@policy.onap.org
83 public_fqdn: policy.onap.org
86 credsPath: /opt/app/osaaf/local
91 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
92 echo "export KEYSTORE_PASSWORD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
93 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
95 # default number of instances
102 # probe configuration parameters
104 initialDelaySeconds: 20
106 # necessary to disable liveness probe when setting breakpoints
107 # in debugger so K8s doesn't restart unresponsive container
111 initialDelaySeconds: 20
116 name: policy-apex-pdp
125 # Resource Limit flavor -By Default using small
126 # Segregation for Different environment (Small and Large)
145 #Pods Service Account
147 nameOverride: policy-apex-pdp
153 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
154 # The default operator for prometheus enforces the below label.
158 port: policy-apex-pdp
163 externalSecretNameSuffix: policy-apex-pdp-restserver-creds
164 externalSecretUserKey: login
165 externalSecretPasswordKey: password
167 app: '{{ include "common.name" . }}'
168 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
169 release: '{{ include "common.release" . }}'
170 heritage: '{{ .Release.Service }}'
172 # application configuration
174 # Event consumption (kafka) properties
175 useStrimziKafka: true
176 kafkaBootstrap: strimzi-kafka-bootstrap
179 groupId: policy-group
182 policyPdpPapTopic: policy-pdp-pap
183 # If targeting a custom kafka cluster, ie useStrimziKakfa: false
184 # uncomment below config and target your kafka bootstrap servers,
185 # along with any other security config.
188 # spring.kafka.bootstrap-servers: <kafka-bootstrap>:9092
189 # spring.kafka.security.protocol: PLAINTEXT
190 # spring.kafka.consumer.group-id: policy-group
192 # Any new property can be added in the env by setting in overrides in the format mentioned below
193 # All the added properties must be in "key: value" format instead of yaml.