1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2019-2021 AT&T Intellectual Property. All rights reserved.
3 # ================================================================================
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
16 # SPDX-License-Identifier: Apache-2.0
17 # ============LICENSE_END=========================================================
19 #################################################################
20 # Global configuration defaults.
21 #################################################################
26 #################################################################
28 #################################################################
32 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
33 login: '{{ .Values.db.user }}'
34 password: '{{ .Values.db.password }}'
35 passwordPolicy: required
36 - uid: restserver-creds
38 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
39 login: '{{ .Values.restServer.user }}'
40 password: '{{ .Values.restServer.password }}'
41 passwordPolicy: required
44 externalSecret: '{{ tpl (default "" .Values.apiServer.credsExternalSecret) . }}'
45 login: '{{ .Values.apiServer.user }}'
46 password: '{{ .Values.apiServer.password }}'
47 passwordPolicy: required
48 - uid: keystore-password
50 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
51 password: '{{ .Values.certStores.keyStorePassword }}'
52 passwordPolicy: required
53 - uid: truststore-password
55 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
56 password: '{{ .Values.certStores.trustStorePassword }}'
57 passwordPolicy: required
60 keyStorePassword: Pol1cy_0nap
61 trustStorePassword: Pol1cy_0nap
64 nameOverride: policy-xacml-pdp-cert-initializer
65 aafDeployFqi: deployer@people.osaaf.org
66 aafDeployPass: demo123456!
68 fqi: policy@policy.onap.org
69 public_fqdn: policy.onap.org
72 credsPath: /opt/app/osaaf/local
77 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
78 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
79 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
82 #################################################################
83 # Application configuration defaults.
84 #################################################################
86 image: onap/policy-xacml-pdp:2.6.3
89 # flag to enable debugging - application support required
92 # application configuration
109 # default number of instances
116 # probe configuration parameters
118 initialDelaySeconds: 20
120 # necessary to disable liveness probe when setting breakpoints
121 # in debugger so K8s doesn't restart unresponsive container
125 initialDelaySeconds: 20
130 name: policy-xacml-pdp
131 portName: policy-xacml-pdp
156 #Pods Service Account
158 nameOverride: policy-xacml-pdp
164 # Override the labels based on the Prometheus config parameter: serviceMonitorSelector.
165 # The default operator for prometheus enforces the below label.
169 port: policy-xacml-pdp
174 externalSecretNameSuffix: policy-xacml-pdp-restserver-creds
175 externalSecretUserKey: login
176 externalSecretPasswordKey: password
178 app: '{{ include "common.name" . }}'
179 chart: '{{ .Chart.Name }}-{{ .Chart.Version | replace "+" "_" }}'
180 release: '{{ include "common.release" . }}'
181 heritage: '{{ .Release.Service }}'