{
"name": "so",
"values": {
- "UserName": "",
- "Password": ""
+ "UserName": "${SO_USER}",
+ "Password": "${SO_PASS}"
}
},
{
export CONFIG_DB_PASS=${CONFIG_DB_PASS_PLAIN};
export OSDF_PCI_OPT_PASS=${OSDF_PCI_OPT_PASS_PLAIN};
export OSDF_OPT_ENGINE_PASS=${OSDF_OPT_ENGINE_PASS_PLAIN};
+ export SO_PASS=${SO_PASS_PLAIN};
cd /config-input;
for PFILE in `find . -not -type d | grep -v -F ..`; do
envsubst <${PFILE} >/config/${PFILE};
{{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "osdf-opt-engine-creds" "key" "login") | indent 10 }}
- name: OSDF_OPT_ENGINE_PASS_PLAIN
{{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "osdf-opt-engine-creds" "key" "password") | indent 10 }}
+
+ - name: SO_USER
+ {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-creds" "key" "login") | indent 10 }}
+ - name: SO_PASS_PLAIN
+ {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "so-creds" "key" "password") | indent 10 }}
+
volumeMounts:
- mountPath: /config-input
name: {{ include "common.name" . }}-preload-input
login: '{{ .Values.oofCreds.osdfOptEngineUsername }}'
password: '{{ .Values.oofCreds.osdfOptEnginePassword }}'
passwordPolicy: required
+ - uid: so-creds
+ type: basicAuth
+ login: '{{ .Values.oofCreds.soUsername }}'
+ password: '{{ .Values.oofCreds.soPassword }}'
+ passwordPolicy: required
oofCreds:
aaiUsername: oof@oof.onap.org
aafUsername: aaf_admin@people.osaaf.org
aafPassword: demo123456!
- policyPlatUsername: testpdp
- policyPlatPassword: alpha123
+ policyPlatUsername: healthcheck
+ policyPlatPassword: zb!XztG34
- policyCliUsername: python
- policyCliPassword: test
+ policyCliUsername: healthcheck
+ policyCliPassword: zb!XztG34
osdfPlacementUsername: test
osdfPlacementPassword: testpwd
osdfOptEngineUsername: opt_test
osdfOptEnginePassword: opt_testpwd
+ soUsername: apihBpmn
+ soPassword: password1$
+
# Configure resource requests and limits
resources:
small:
appc.demo.provider.user={{.Values.config.odlUser}}
appc.demo.provider.pass={{.Values.config.odlPassword}}
appc.demo.provider.url=http://localhost:8181/restconf/operations/appc-provider
-appc.provider.vfodl.url=http://{{.Values.config.odlUser|urlquery}}:{{.Values.config.odlPassword|urlquery}}@{{.Values.service.name}}:{{.Values.service.externalPort}}/restconf/config/network-topology:network-topology/topology/topology-netconf/node/NODE_NAME/yang-ext:mount/stream-count:stream-count/streams/
+appc.provider.vfodl.url=http://{{.Values.config.odlUser|urlquery}}:{{.Values.config.odlPassword|urlquery}}@localhost:8181/restconf/config/network-topology:network-topology/topology/topology-netconf/node/NODE_NAME/yang-ext:mount/stream-count:stream-count/streams/
# The properties right below are needed to properly call the Master DG to serve demo purposes
appc.service.logic.module.name=APPC
springProfile: live
polClientAuth: cHl0aG9uOnRlc3Q=
polBasicAuth: dGVzdHBkcDphbHBoYTEyMw==
- polUrl: https://pdp:8081/pdp/api/getConfig
+ polUrl: https://policy-xacml-pdp:6969/policy/pdpx/v1/decision
polEnv: TEST
polReqId: xx
aaiCertPass: changeit
remote_centralized_system_access = {{.Values.global.aafEnabled}}
# External Access System Basic Auth Credentials & Rest endpoint
-# The credentials are placeholders as these are replaced by AAF X509 identity at runtime
-ext_central_access_user_name = portal@portal.onap.org
-ext_central_access_password = thisfakepasswordwillbereplacedbythex509cert
+ext_central_access_user_name = aaf_admin@people.osaaf.org
+ext_central_access_password = demo123456!
ext_central_access_url = {{.Values.aafURL}}
ext_central_access_user_domain = @people.osaaf.org
\ No newline at end of file
# application image
repository: nexus3.onap.org:10001
-image: onap/portal-app:3.2.1
+image: onap/portal-app:3.2.2
pullPolicy: Always
#AAF local config
# application image
repository: nexus3.onap.org:10001
-image: onap/portal-db:3.2.0
+image: onap/portal-db:3.2.2
pullPolicy: Always
remote_centralized_system_access = {{.Values.global.aafEnabled}}
# External Access System Basic Auth Credentials & Rest endpoint
-# The credentials are placeholders as these are replaced by AAF X509 identity at runtime
-ext_central_access_user_name = portal@portal.onap.org
-ext_central_access_password = thisfakepasswordwillbereplacedbythex509cert
+# External Access System Basic Auth Credentials & Rest endpoint
+ext_central_access_user_name = aaf_admin@people.osaaf.org
+ext_central_access_password = demo123456!
ext_central_access_url = {{.Values.aafURL}}
ext_central_access_user_domain = @people.osaaf.org
\ No newline at end of file
#################################################################
# application image
repository: nexus3.onap.org:10001
-image: onap/portal-wms:3.2.0
+image: onap/portal-wms:3.2.2
pullPolicy: Always
# flag to enable debugging - application support required