1 # ============LICENSE_START=======================================================
2 # Copyright (C) 2019-2020 AT&T Intellectual Property. All rights reserved.
3 # ================================================================================
4 # Licensed under the Apache License, Version 2.0 (the "License");
5 # you may not use this file except in compliance with the License.
6 # You may obtain a copy of the License at
8 # http://www.apache.org/licenses/LICENSE-2.0
10 # Unless required by applicable law or agreed to in writing, software
11 # distributed under the License is distributed on an "AS IS" BASIS,
12 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 # See the License for the specific language governing permissions and
14 # limitations under the License.
16 # SPDX-License-Identifier: Apache-2.0
17 # ============LICENSE_END=========================================================
19 #################################################################
20 # Global configuration defaults.
21 #################################################################
24 envsubstImage: dibi/envsubst
26 readinessRepository: oomk8s
27 readinessImage: readiness-check:2.0.0
29 #################################################################
31 #################################################################
35 externalSecret: '{{ tpl (default "" .Values.db.credsExternalSecret) . }}'
36 login: '{{ .Values.db.user }}'
37 password: '{{ .Values.db.password }}'
38 passwordPolicy: required
39 - uid: restserver-creds
41 externalSecret: '{{ tpl (default "" .Values.restServer.credsExternalSecret) . }}'
42 login: '{{ .Values.restServer.user }}'
43 password: '{{ .Values.restServer.password }}'
44 passwordPolicy: required
47 externalSecret: '{{ tpl (default "" .Values.apiServer.credsExternalSecret) . }}'
48 login: '{{ .Values.apiServer.user }}'
49 password: '{{ .Values.apiServer.password }}'
50 passwordPolicy: required
51 - uid: keystore-password
53 externalSecret: '{{ tpl (default "" .Values.certStores.keyStorePasswordExternalSecret) . }}'
54 password: '{{ .Values.certStores.keyStorePassword }}'
55 passwordPolicy: required
56 - uid: truststore-password
58 externalSecret: '{{ tpl (default "" .Values.certStores.trustStorePasswordExternalSecret) . }}'
59 password: '{{ .Values.certStores.trustStorePassword }}'
60 passwordPolicy: required
63 keyStorePassword: Pol1cy_0nap
64 trustStorePassword: Pol1cy_0nap
67 nameOverride: policy-xacml-pdp-cert-initializer
68 aafDeployFqi: deployer@people.osaaf.org
69 aafDeployPass: demo123456!
71 fqi: policy@policy.onap.org
72 public_fqdn: policy.onap.org
75 credsPath: /opt/app/osaaf/local
80 /opt/app/aaf_config/bin/agent.sh;
81 export $(/opt/app/aaf_config/bin/agent.sh local showpass
82 {{ .Values.fqi }} {{ .Values.fqdn }} | grep "^cadi_keystore_password_p12");
83 echo "export KEYSTORE='{{ .Values.credsPath }}/org.onap.policy.p12'" > {{ .Values.credsPath }}/.ci;
84 echo "export KEYSTORE_PASSWD='${cadi_keystore_password_p12}'" >> {{ .Values.credsPath }}/.ci;
85 chown -R {{ .Values.uid }}:{{ .Values.gid }} $(dirname {{ .Values.credsPath }});
88 #################################################################
89 # Application configuration defaults.
90 #################################################################
92 repository: nexus3.onap.org:10001
93 image: onap/policy-xacml-pdp:2.3.0
96 # flag to enable debugging - application support required
99 # application configuration
103 password: policy_user
116 # default number of instances
123 # probe configuration parameters
125 initialDelaySeconds: 20
127 # necessary to disable liveness probe when setting breakpoints
128 # in debugger so K8s doesn't restart unresponsive container
132 initialDelaySeconds: 20
137 name: policy-xacml-pdp
138 portName: policy-xacml-pdp