[POLICY] new image versions 13/112513/6
authorjhh <jorge.hernandez-herrero@att.com>
Thu, 10 Sep 2020 19:01:49 +0000 (14:01 -0500)
committerKrzysztof Opasiak <k.opasiak@samsung.com>
Fri, 11 Sep 2020 20:07:40 +0000 (20:07 +0000)
- Changes needed to support the new images.
- Add resources to galera config job (POLICY-2820)

Issue-ID: POLICY-2789
Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
Change-Id: Id3b87a5931c64f729afcf77861d12fd5e25a5531
Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
15 files changed:
kubernetes/policy/components/policy-apex-pdp/values.yaml
kubernetes/policy/components/policy-api/templates/deployment.yaml
kubernetes/policy/components/policy-api/values.yaml
kubernetes/policy/components/policy-distribution/templates/deployment.yaml
kubernetes/policy/components/policy-distribution/values.yaml
kubernetes/policy/components/policy-drools-pdp/resources/configmaps/base.conf
kubernetes/policy/components/policy-drools-pdp/resources/secrets/credentials.conf
kubernetes/policy/components/policy-drools-pdp/templates/statefulset.yaml
kubernetes/policy/components/policy-drools-pdp/values.yaml
kubernetes/policy/components/policy-pap/templates/deployment.yaml
kubernetes/policy/components/policy-pap/values.yaml
kubernetes/policy/components/policy-xacml-pdp/templates/deployment.yaml
kubernetes/policy/components/policy-xacml-pdp/values.yaml
kubernetes/policy/templates/job.yaml
kubernetes/policy/values.yaml

index 79fed0c..e149aa5 100755 (executable)
@@ -52,7 +52,7 @@ secrets:
 #################################################################
 # application image
 repository: nexus3.onap.org:10001
-image: onap/policy-apex-pdp:2.4.0
+image: onap/policy-apex-pdp:2.4.1
 pullPolicy: Always
 
 # flag to enable debugging - application support required
index f436006..5774344 100755 (executable)
@@ -64,7 +64,6 @@ spec:
 {{- if .Values.global.aafEnabled }}
           command: ["bash","-c"]
           args: ["source {{ .Values.certInitializer.credsPath }}/.ci;\
-                  cp {{ .Values.certInitializer.credsPath }}/org.onap.policy.p12 ${POLICY_HOME}/etc/ssl/policy-keystore;\
                   /opt/app/policy/api/bin/policy-api.sh /opt/app/policy/api/etc/mounted/config.json"]
 {{- else }}
           command: ["/opt/app/policy/api/bin/policy-api.sh"]
index e6f68cb..a94031a 100755 (executable)
@@ -84,7 +84,7 @@ certInitializer:
 #################################################################
 # application image
 repository: nexus3.onap.org:10001
-image: onap/policy-api:2.3.0
+image: onap/policy-api:2.3.1
 pullPolicy: Always
 
 # flag to enable debugging - application support required
index add085f..414d617 100755 (executable)
@@ -76,7 +76,6 @@ spec:
 {{- if .Values.global.aafEnabled }}
           command: ["bash","-c"]
           args: ["source {{ .Values.certInitializer.credsPath }}/.ci;\
-                  cp {{ .Values.certInitializer.credsPath }}/org.onap.policy.p12 ${POLICY_HOME}/etc/ssl/policy-keystore;\
                   /opt/app/policy/distribution/bin/policy-dist.sh /opt/app/policy/distribution/etc/mounted/config.json"]
 {{- else }}
           command: ["/opt/app/policy/distribution/bin/policy-dist.sh"]
index e437de0..9d20941 100755 (executable)
@@ -70,7 +70,7 @@ global:
 #################################################################
 # application image
 repository: nexus3.onap.org:10001
-image: onap/policy-distribution:2.4.0
+image: onap/policy-distribution:2.4.1
 pullPolicy: Always
 
 # flag to enable debugging - application support required
index 184ae9a..a0f5ceb 100755 (executable)
@@ -57,6 +57,7 @@ PDPD_CONFIGURATION_PARTITION_KEY=
 
 POLICY_PDP_PAP_TOPIC=POLICY-PDP-PAP
 POLICY_PDP_PAP_GROUP=defaultGroup
+POLICY_PDP_PAP_POLICYTYPES=onap.policies.controlloop.operational.common.Drools
 
 # Symmetric Key for encoded sensitive data
 
index bb2b90c..17efdbc 100755 (executable)
 #  SPDX-License-Identifier: Apache-2.0
 #  ============LICENSE_END=========================================================
 
+{{- if not .Values.global.aafEnabled }}
 KEYSTORE_PASSWD={{.Values.keystore.password}}
+{{- end }}
+
 TRUSTSTORE_PASSWD={{.Values.truststore.password}}
 
 TELEMETRY_USER={{.Values.telemetry.user}}
index eb1ef42..90e8723 100755 (executable)
@@ -74,6 +74,7 @@ spec:
           command: ["bash","-c"]
           args: ["if [ -f {{ .Values.certInitializer.credsPath }}/.ci ]; then \
                   source {{ .Values.certInitializer.credsPath }}/.ci; fi;\
+                  cp {{ .Values.certInitializer.credsPath }}/org.onap.policy.p12 ${POLICY_HOME}/etc/ssl/policy-keystore;\
                   /opt/app/policy/bin/pdpd-cl-entrypoint.sh boot"]
           ports:
           - containerPort: {{ .Values.service.externalPort }}
index 8a8e3c2..5e8c8be 100755 (executable)
@@ -39,7 +39,7 @@ secrets:
 #################################################################
 # application image
 repository: nexus3.onap.org:10001
-image: onap/policy-pdpd-cl:1.7.0
+image: onap/policy-pdpd-cl:1.7.1
 pullPolicy: Always
 
 # flag to enable debugging - application support required
index 57812d4..f07ed4a 100755 (executable)
@@ -78,7 +78,6 @@ spec:
 {{- if .Values.global.aafEnabled }}
           command: ["bash","-c"]
           args: ["source {{ .Values.certInitializer.credsPath }}/.ci;\
-                  cp {{ .Values.certInitializer.credsPath }}/org.onap.policy.p12 ${POLICY_HOME}/etc/ssl/policy-keystore;\
                   /opt/app/policy/pap/bin/policy-pap.sh /opt/app/policy/pap/etc/mounted/config.json"]
 {{- else }}
           command: ["/opt/app/policy/pap/bin/policy-pap.sh"]
index 34e322c..008fefd 100755 (executable)
@@ -98,7 +98,7 @@ certInitializer:
 #################################################################
 # application image
 repository: nexus3.onap.org:10001
-image: onap/policy-pap:2.3.0
+image: onap/policy-pap:2.3.1
 pullPolicy: Always
 
 # flag to enable debugging - application support required
index fe8c74d..a4d060c 100755 (executable)
@@ -86,7 +86,6 @@ spec:
 {{- if .Values.global.aafEnabled }}
           command: ["bash","-c"]
           args: ["source {{ .Values.certInitializer.credsPath }}/.ci;\
-                  cp {{ .Values.certInitializer.credsPath }}/org.onap.policy.p12 ${POLICY_HOME}/etc/ssl/policy-keystore;\
                   /opt/app/policy/pdpx/bin/policy-pdpx.sh /opt/app/policy/pdpx/etc/mounted/config.json"]
 {{- else }}
           command: ["/opt/app/policy/pdpx/bin/policy-pdpx.sh"]
index e7984fb..81196e1 100755 (executable)
@@ -89,7 +89,7 @@ certInitializer:
 #################################################################
 # application image
 repository: nexus3.onap.org:10001
-image: onap/policy-xacml-pdp:2.3.0
+image: onap/policy-xacml-pdp:2.3.1
 pullPolicy: Always
 
 # flag to enable debugging - application support required
index aea18a6..463877b 100755 (executable)
@@ -65,6 +65,8 @@ spec:
           {{- include "common.secret.envFromSecretFast" (dict "global" . "uid" "db-secret" "key" "login") | indent 10 }}
         - name: MYSQL_PORT
           value: "{{ index .Values "mariadb-galera" "service" "internalPort" }}"
+        resources:
+{{ include "common.resources" . }}
       restartPolicy: Never
       volumes:
         - name: {{ include "common.fullname" . }}-config
index b337383..714f9d9 100755 (executable)
@@ -69,7 +69,7 @@ policy-distribution:
   enabled: true
   db: *dbSecretsHook
 policy-nexus:
-  enabled: true
+  enabled: false
 
 #################################################################
 # DB configuration defaults.
@@ -122,3 +122,23 @@ mariadb-galera:
     [mysqld]
     lower_case_table_names = 1
 
+# Resource Limit flavor -By Default using small
+# Segregation for Different environment (small, large, or unlimited)
+flavor: small
+resources:
+  small:
+    limits:
+      cpu: 1
+      memory: 4Gi
+    requests:
+      cpu: 100m
+      memory: 1Gi
+  large:
+    limits:
+      cpu: 2
+      memory: 8Gi
+    requests:
+      cpu: 200m
+      memory: 2Gi
+  unlimited: {}
+