1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2019-2020 AT&T Intellectual Property. All rights reserved.
3 # ================================================================================
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
16 # SPDX-License-Identifier: Apache-2.0
17 # ============LICENSE_END=========================================================
19 #################################################################
20 # Global configuration defaults.
21 #################################################################
25 envsubstImage: dibi/envsubst
27 readinessRepository: oomk8s
28 readinessImage: readiness-check:2.0.0
30 #################################################################
32 #################################################################
36 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
37 login: '{{ .Values.db.user }}'
38 password: '{{ .Values.db.password }}'
39 passwordPolicy: required
40 - uid: restserver-creds
42 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
43 login: '{{ .Values.restServer.user }}'
44 password: '{{ .Values.restServer.password }}'
45 passwordPolicy: required
46 - uid: keystore-password
48 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
49 password: '{{ .Values.certStores.keyStorePassword }}'
50 passwordPolicy: required
51 - uid: truststore-password
53 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
54 password: '{{ .Values.certStores.trustStorePassword }}'
55 passwordPolicy: required
58 keyStorePassword: Pol1cy_0nap
59 trustStorePassword: Pol1cy_0nap
62 nameOverride: policy-api-cert-initializer
63 aafDeployFqi: deployer@people.osaaf.org
64 aafDeployPass: demo123456!
66 fqi: policy@policy.onap.org
67 public_fqdn: policy.onap.org
70 credsPath: /opt/app/osaaf/local
75 /opt/app/aaf_config/bin/agent.sh;
76 export $(/opt/app/aaf_config/bin/agent.sh local showpass
77 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
78 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
79 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
80 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
83 #################################################################
84 # Application configuration defaults.
85 #################################################################
87 repository: nexus3.onap.org:10001
88 image: onap/policy-api:2.3.0
91 # flag to enable debugging - application support required
94 # application configuration
106 # default number of instances
113 # probe configuration parameters
115 initialDelaySeconds: 20
117 # necessary to disable liveness probe when setting breakpoints
118 # in debugger so K8s doesn't restart unresponsive container
122 initialDelaySeconds: 20