1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2018 Ericsson. All rights reserved.
3 # Modifications Copyright (C) 2019-2020 AT&T Intellectual Property.
4 # ================================================================================
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
17 # SPDX-License-Identifier: Apache-2.0
18 # ============LICENSE_END=========================================================
20 #################################################################
21 # Global configuration defaults.
22 #################################################################
25 readinessRepository: oomk8s
26 readinessImage: readiness-check:2.0.0
27 envsubstImage: dibi/envsubst
31 #################################################################
33 #################################################################
35 - uid: restserver-creds
37 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
38 login: '{{ .Values.restServer.user }}'
39 password: '{{ .Values.restServer.password }}'
40 - uid: truststore-pass
42 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
43 password: '{{ .Values.certStores.trustStorePassword }}'
44 passwordPolicy: required
47 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
48 password: '{{ .Values.certStores.keyStorePassword }}'
49 passwordPolicy: required
51 #################################################################
52 # Application configuration defaults.
53 #################################################################
55 repository: nexus3.onap.org:10001
56 image: onap/policy-apex-pdp:2.4.0
59 # flag to enable debugging - application support required
62 # application configuration
70 keyStorePassword: Pol1cy_0nap
71 trustStorePassword: Pol1cy_0nap
74 nameOverride: policy-apex-pdp-cert-initializer
75 aafDeployFqi: deployer@people.osaaf.org
76 aafDeployPass: demo123456!
78 fqi: policy@policy.onap.org
79 public_fqdn: policy.onap.org
82 credsPath: /opt/app/osaaf/local
87 /opt/app/aaf_config/bin/agent.sh;
88 export $(/opt/app/aaf_config/bin/agent.sh local showpass
89 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
90 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
91 echo "export KEYSTORE_PASSWORD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
92 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
94 # default number of instances
101 # probe configuration parameters
103 initialDelaySeconds: 20
105 # necessary to disable liveness probe when setting breakpoints
106 # in debugger so K8s doesn't restart unresponsive container
110 initialDelaySeconds: 20
115 name: policy-apex-pdp
116 portName: policy-apex-pdp
124 # Resource Limit flavor -By Default using small
125 # Segregation for Different environment (Small and Large)