1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2018 Ericsson. All rights reserved.
3 # Modifications Copyright (C) 2019-2020 AT&T Intellectual Property.
4 # ================================================================================
5 # Licensed under the Apache License, Version 2.0 (the "License");
6 # you may not use this file except in compliance with the License.
7 # You may obtain a copy of the License at
9 # http://www.apache.org/licenses/LICENSE-2.0
11 # Unless required by applicable law or agreed to in writing, software
12 # distributed under the License is distributed on an "AS IS" BASIS,
13 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14 # See the License for the specific language governing permissions and
15 # limitations under the License.
17 # SPDX-License-Identifier: Apache-2.0
18 # ============LICENSE_END=========================================================
20 #################################################################
21 # Global configuration defaults.
22 #################################################################
25 readinessImage: onap/oom/readiness:3.0.1
26 envsubstImage: dibi/envsubst
30 #################################################################
32 #################################################################
34 - uid: restserver-creds
36 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
37 login: '{{ .Values.restServer.user }}'
38 password: '{{ .Values.restServer.password }}'
39 - uid: truststore-pass
41 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
42 password: '{{ .Values.certStores.trustStorePassword }}'
43 passwordPolicy: required
46 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
47 password: '{{ .Values.certStores.keyStorePassword }}'
48 passwordPolicy: required
50 #################################################################
51 # Application configuration defaults.
52 #################################################################
54 repository: nexus3.onap.org:10001
55 image: onap/policy-apex-pdp:2.4.0
58 # flag to enable debugging - application support required
61 # application configuration
69 keyStorePassword: Pol1cy_0nap
70 trustStorePassword: Pol1cy_0nap
73 nameOverride: policy-apex-pdp-cert-initializer
74 aafDeployFqi: deployer@people.osaaf.org
75 aafDeployPass: demo123456!
77 fqi: policy@policy.onap.org
78 public_fqdn: policy.onap.org
81 credsPath: /opt/app/osaaf/local
86 /opt/app/aaf_config/bin/agent.sh;
87 export $(/opt/app/aaf_config/bin/agent.sh local showpass
88 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
89 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" >> {{ .Values.credsPath }}/.ci;
90 echo "export KEYSTORE_PASSWORD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
91 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
93 # default number of instances
100 # probe configuration parameters
102 initialDelaySeconds: 20
104 # necessary to disable liveness probe when setting breakpoints
105 # in debugger so K8s doesn't restart unresponsive container
109 initialDelaySeconds: 20
114 name: policy-apex-pdp
115 portName: policy-apex-pdp
123 # Resource Limit flavor -By Default using small
124 # Segregation for Different environment (Small and Large)