1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2021-2022 Nordix Foundation.
3 # ================================================================================
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
16 # SPDX-License-Identifier: Apache-2.0
17 # ============LICENSE_END=========================================================
19 #################################################################
20 # Global configuration defaults.
21 #################################################################
26 #################################################################
28 #################################################################
30 - uid: restserver-secret
32 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
33 login: '{{ .Values.restServer.user }}'
34 password: '{{ .Values.restServer.password }}'
35 passwordPolicy: required
36 - uid: keystore-password
38 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
39 password: '{{ .Values.certStores.keyStorePassword }}'
40 passwordPolicy: required
41 - uid: truststore-password
43 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
44 password: '{{ .Values.certStores.trustStorePassword }}'
45 passwordPolicy: required
46 - uid: policy-kafka-user
47 externalSecret: '{{ tpl (default "" .Values.config.jaasConfExternalSecret) . }}'
50 - name: sasl.jaas.config
51 value: '{{ .Values.config.someConfig }}'
55 keyStorePassword: Pol1cy_0nap
56 trustStorePassword: Pol1cy_0nap
59 nameOverride: policy-clamp-ac-http-ppnt-cert-initializer
60 aafDeployFqi: deployer@people.osaaf.org
61 aafDeployPass: demo123456!
63 fqi: policy@policy.onap.org
64 public_fqdn: policy.onap.org
67 credsPath: /opt/app/osaaf/local
72 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
73 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
74 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
77 #################################################################
78 # Application configuration defaults.
79 #################################################################
81 image: onap/policy-clamp-ac-http-ppnt:6.3.2
84 # application configuration
89 # flag to enable debugging - application support required
92 # default number of instances
101 # probe configuration parameters
103 initialDelaySeconds: 20
105 # necessary to disable liveness probe when setting breakpoints
106 # in debugger so K8s doesn't restart unresponsive container
111 initialDelaySeconds: 20
117 name: policy-clamp-ac-http-ppnt
142 #Pods Service Account
144 nameOverride: policy-clamp-ac-http-ppnt
149 # Event consumption (kafka) properties
150 useStrimziKafka: true
151 kafkaBootstrap: strimzi-kafka-bootstrap
154 groupId: policy-group
157 acRuntimeTopic: policy-acruntime-participant
158 # If targeting a custom kafka cluster, ie useStrimziKakfa: false
159 # uncomment below config and target your kafka bootstrap servers,
160 # along with any other security config.
163 # spring.kafka.bootstrap-servers: <kafka-bootstrap>:9092
164 # spring.kafka.security.protocol: PLAINTEXT
165 # spring.kafka.consumer.group-id: policy-group
167 # Any new property can be added in the env by setting in overrides in the format mentioned below
168 # All the added properties must be in "key: value" format instead of yaml.
170 # spring.config.max-size: 200
171 # spring.config.min-size: 10