1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2021-2022 Nordix Foundation.
3 # ================================================================================
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
16 # SPDX-License-Identifier: Apache-2.0
17 # ============LICENSE_END=========================================================
19 #################################################################
20 # Global configuration defaults.
21 #################################################################
26 #################################################################
28 #################################################################
30 - uid: restserver-secret
32 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
33 login: '{{ .Values.restServer.participantppnt.user }}'
34 password: '{{ .Values.restServer.participantppnt.password }}'
35 passwordPolicy: required
38 externalSecret: '{{ tpl (default "" .Values.restServer.apiUserExternalSecret) . }}'
39 login: '{{ .Values.restServer.api.user }}'
40 password: '{{ .Values.restServer.api.password }}'
41 passwordPolicy: required
44 externalSecret: '{{ tpl (default "" .Values.restServer.papUserExternalSecret) . }}'
45 login: '{{ .Values.restServer.pap.user }}'
46 password: '{{ .Values.restServer.pap.password }}'
47 passwordPolicy: required
48 - uid: keystore-password
50 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
51 password: '{{ .Values.certStores.keyStorePassword }}'
52 passwordPolicy: required
53 - uid: truststore-password
55 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
56 password: '{{ .Values.certStores.trustStorePassword }}'
57 passwordPolicy: required
58 - uid: policy-kafka-user
59 externalSecret: '{{ tpl (default "" .Values.config.jaasConfExternalSecret) . }}'
62 - name: sasl.jaas.config
63 value: '{{ .Values.config.someConfig }}'
67 keyStorePassword: Pol1cy_0nap
68 trustStorePassword: Pol1cy_0nap
71 nameOverride: policy-clamp-ac-pf-ppnt-cert-initializer
72 aafDeployFqi: deployer@people.osaaf.org
73 aafDeployPass: demo123456!
75 fqi: policy@policy.onap.org
76 public_fqdn: policy.onap.org
79 credsPath: /opt/app/osaaf/local
84 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
85 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
86 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
89 #################################################################
90 # Application configuration defaults.
91 #################################################################
93 image: onap/policy-clamp-ac-pf-ppnt:6.3.2
96 # flag to enable debugging - application support required
99 # default number of instances
102 # application configuration
111 user: participantUser
120 # probe configuration parameters
122 initialDelaySeconds: 20
124 # necessary to disable liveness probe when setting breakpoints
125 # in debugger so K8s doesn't restart unresponsive container
130 initialDelaySeconds: 20
136 name: policy-clamp-ac-pf-ppnt
160 #Pods Service Account
162 nameOverride: policy-clamp-ac-pf-ppnt
167 # Event consumption (kafka) properties
168 useStrimziKafka: true
169 kafkaBootstrap: strimzi-kafka-bootstrap
172 groupId: policy-group
175 acRuntimeTopic: policy-acruntime-participant
176 # If targeting a custom kafka cluster, ie useStrimziKakfa: false
177 # uncomment below config and target your kafka bootstrap servers,
178 # along with any other security config.
181 # spring.kafka.bootstrap-servers: <kafka-bootstrap>:9092
182 # spring.kafka.security.protocol: PLAINTEXT
183 # spring.kafka.consumer.group-id: policy-group
185 # Any new property can be added in the env by setting in overrides in the format mentioned below
186 # All the added properties must be in "key: value" format instead of yaml.
188 # spring.config.max-size: 200
189 # spring.config.min-size: 10