aboutsummaryrefslogtreecommitdiffstats
path: root/kubernetes/policy
AgeCommit message (Collapse)AuthorFilesLines
2020-09-30Merge "[POLICY] Remove field undefined in deployment"Sylvain Desbureaux1-2/+0
2020-09-28[POLICY] Remove field undefined in deploymentJakub Latusek1-2/+0
Field emptyDir is defined in Deployment.spec.template.spec.volumes Signed-off-by: Jakub Latusek <j.latusek@samsung.com> Issue-ID: OOM-2562 Change-Id: I4e52f585eebfe10138d1b22a5c8a127845560996
2020-09-25[POLICY] update preloaded types for api:2.3.1jhh1-2/+3
Issue-ID: POLICY-2846 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: Ic11248cd11c58a6a1a5d887c3c6b73e66e722848
2020-09-14Merge "[POLICY] new image versions"Sylvain Desbureaux15-11/+34
2020-09-11[POLICY] new image versionsjhh15-11/+34
- Changes needed to support the new images. - Add resources to galera config job (POLICY-2820) Issue-ID: POLICY-2789 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: Id3b87a5931c64f729afcf77861d12fd5e25a5531 Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-09-11[TREE-WIDE] Use faster version of common secret templateKrzysztof Opasiak2-3/+3
Replace all calls to common.secret with a faster version to save some linting time. Issue-ID: OOM-2248 Change-Id: I3372c87226d5dd8b7468ebed2d77e7ceceba5777 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
2020-09-04[GENERAL] Use readiness container v3.0.1Sylvain Desbureaux13-30/+23
Readiness container v3.x and up are now present in ONAP main repository. They're also not using root user anymore and then script path has changed. Finally, "job_complete" script has been integrated in main "ready" script. As those changes are significant, we must upgrade all the components at once. Depends-On: I5afa83892043f4844afe12e61724a8d368a9f2e0 Issue-ID: OOM-2545 Signed-off-by: Grzegorz Lis <grzegorz.lis@nokia.com> Change-Id: I0b4eb5dd86390273532d67d0a9696e1cfcadf110
2020-08-27[POLICY] certInit support + refactoringjhh124-3736/+1495
Several changes are including in this patch: - certInitializer support (POLICY-2615, REQ-361) - renamed policy objects to start with "policy-" prefix (POLICY-1000) - add resources section to components that did not have or had it incorrectly set up rendering null (POLICY-2502) - Removal of legacy policy-engine components (POLICY-2743) - Miscellaneous refactoring of charts (POLICY-2745) - update pdp legacy reference to policy-xacml-pdp from pdp (legacy) Issue-ID: POLICY-2615 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: I8b6984a663bbb14d331a366ec02b6dd38755cde7 Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-08-03Merge "[POLICY] Make POLICY compatible with Kubernetes v1.17"Krzysztof Opasiak10-10/+28
2020-07-31[POLICY] Add logback configuration filesBruno Sakoto6-0/+743
Have logging configuration files available in charts and log to stdout by default Issue-ID: POLICY-2682 Signed-off-by: Bruno Sakoto <bruno.sakoto@bell.ca> Change-Id: Ic247723f31bd99c3c2801343cbb4ab42e6319e01
2020-07-31[POLICY] Make POLICY compatible with Kubernetes v1.17Grzegorz-Lis10-10/+28
Issue-ID: OOM-2462 Signed-off-by: Grzegorz Lis <grzegorz.lis@nokia.com> Change-Id: Ieda79c0c1109823bef82b714dc7b97b3a84a31c2
2020-07-28Update config of policy/distribution chartRam Krishna Verma1-16/+0
HpaDecoder has been deprecated from policy distribution codebase. Updating the config file to remove the same. Issue-ID: POLICY-2477 Change-Id: I867e64db1c388e84e42a305f803335a09324777f Signed-off-by: Ram Krishna Verma <ram_krishna.verma@bell.ca>
2020-07-13[POLICY] update released imagesjhh8-6/+8
- update to the latest released images versions. - added fetchTimeout configuration to XACML-PDP and PAP for POLICY-2702. Issue-ID: POLICY-2695 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: I492212e3920f93d42870ca20b7d0ca38c7841831
2020-05-27Refactor Policy PAP for common service templateBruno Sakoto3-45/+14
Issue-ID: POLICY-2514 Signed-off-by: Bruno Sakoto <bruno.sakoto@bell.ca> Change-Id: I3021081f3e9d1a3cec079fdaf4595689d25571fb
2020-05-22[POLICY] frankfurt RC2 imagesjhh10-11/+11
Issue-ID: POLICY-2514 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: Id2597d80cfd5c43992e8d0435a2aca4312a3c796 Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-05-20Make Policy PAP exposition configurableBruno Sakoto2-0/+11
Policy PAP endpoint exposition is made configurable using helm override values when deploying. Available options for service type are: * Cluster IP (default value) * Node Port (by overriding policy.pap.service.type value with NodePort) Issue-ID: POLICY-2514 Signed-off-by: Bruno Sakoto <bruno.sakoto@bell.ca> Change-Id: Ifc3ac09aeb9e8836c0ef15a8b5b60bd8e31dca03
2020-05-13Merge "[POLICY] Remove hardcoded credentials from policy-distribution"Krzysztof Opasiak4-9/+101
2020-05-11[POLICY] Remove hardcoded credentials from policy-apex-pdpDominik Mizyn5-4/+64
This patch remove hardcoded healthcheck credentials and trustStorePassword from policy-apex-pdp. Issue-ID: OOM-2342 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com> Change-Id: Ie8800830919479b87d7a71dfafe934bb95839ede
2020-05-08[POLICY] put base64 password in xacml.propertiesjhh3-8/+7
In addition, remove heap mem sizing for drools too as it is properly sized according to container allocated resources. Issue-ID: POLICY-2547 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: I4e1e5eaef1cad924ac4c86e5248230aef1fad7d8 Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-05-08[POLICY] Remove hardcoded credentials from policy-distributionDominik Mizyn4-9/+101
This patch remove hardcoded healthcheck credentials from policy-distribution. Issue-ID: OOM-2342 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com> Change-Id: I7c71fcceab030bd7858e8de9fe3f58451ac505d6 [Fix init container] Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
2020-05-04Merge "Change ingress hosnames for exposed services"Sylvain Desbureaux1-0/+6
2020-04-30[POLICY] update images and fixesjhh11-516/+27
Issue-ID: POLICY-2510 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: I1ac9698233d1b570ef3c5759742038c96015ba32 Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-04-29Change ingress hosnames for exposed servicesLucjan Bryndza1-0/+6
Change ingress host to the required hostnames Change-Id: Ic78c8821e2e23e00943d8abdf7b2183b4d940c72 Signed-off-by: Lucjan Bryndza <l.bryndza@samsung.com> Issue-ID: OOM-2391 Signed-off-by: Lucjan Bryndza <l.bryndza@samsung.com>
2020-04-24[POLICY] fix: Process also content of pd-pdpKrzysztof Opasiak1-17/+16
By mistake we've been processing only pe volume but recently we removed hardcoded passwords also from other files in pe-pdp. To fix this let's improve our init container and process files in both volumes. Issue-ID: POLICY-2516 Change-Id: Id97a64708803b72ab88362ccc5b88970661146e6 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com>
2020-04-23Merge "[POLICY] Remove hardcoded credentials from policy-xacml-pdp"Krzysztof Opasiak3-5/+51
2020-04-22[POLICY] Remove hardcoded credentials from policy-apiDominik Mizyn3-5/+18
This patch remove hardcoded healthcheck credentials from policy-api. Issue-ID: OOM-2342 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com> Change-Id: Ifc12d78fc1f7f00dd1466c32553453f0273661a3
2020-04-22[POLICY] Remove hardcoded credentials from policy-xacml-pdpDominik Mizyn3-5/+51
This patch remove hardcoded healthcheck credentials from policy-xacml-pdp Issue-ID: OOM-2342 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com> Change-Id: I49db16a852412bad79f092232bcd2ba97eac7170
2020-04-20Merge "[POLICY] Use common secret template in pdp"Krzysztof Opasiak3-4/+38
2020-04-20Merge "[Policy] Remove hardcoded credentials from pap"Krzysztof Opasiak3-6/+46
2020-04-20[POLICY] Use common secret template in pdpDominik Mizyn3-4/+38
Use common secret template in pdp module instead of hardcoding them For now creds are hardcoded but this will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com> Change-Id: I091e5390c1ef7d98f0c4fb1cb5f6ca2d099e387f
2020-04-17[POLICY] legacy PDP healtchcheck removedjhh1-1/+1
It may be causing some flakiness with some healthchecks passing in OOM builds. Not sure the root cause, as the problem happens occassionally, may be a race condition or something else (legacy PDP and dependent components may take some time to initialize). Issue-ID: POLICY-2471 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: I8ab7c8c563c1db13b2a99aa8cb6f3c022c625642
2020-04-17[Policy] Remove hardcoded credentials from papDominik Mizyn3-6/+46
This patch remove hardcoded healthcheck credentials from pap. Issue-ID: OOM-2342 Change-Id: I8dc2a1b0a84a18215403aabc8ae9b2a25387c3d7 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com>
2020-04-17[POLICY] Fix in brmsgw templateDominik Mizyn1-1/+0
Double volumeMounts in brmsgw template fix Issue-ID: OOM-2342 Change-Id: Ia855d18a636b19ee9aafcc8739b8c52260f611c2 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com>
2020-04-16[POLICY] Use common secret template in brmsgwDominik Mizyn3-6/+59
Use common secret template in brmsgw module instead of hardcoding them in config map. For now creds are hardcoded but this will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Dominik Mizyn <d.mizyn@samsung.com> Change-Id: Ic6ea25004d87d993b40df838dd30a71e25386b2c
2020-04-15[POLICY] legacy pdp health + new image versionsjhh10-10/+10
Issue-ID: POLICY-2471 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: Ia05d2c52e99757dafff4ac8bbcc7ef4269734707 Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-04-10[POLICY] Use common secret template in whole policy moduleKrzysztof Opasiak8-29/+110
All subcharts are ready so now we can remove hardcoded mariadb credentials in policy module and depend on common secret chart to generate them for us at the deployment time. Issue-ID: OOM-2342 Change-Id: I84bfc30511312be0b2e614ddff4676f36d85619b Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Signed-off-by: jhh <jorge.hernandez-herrero@att.com>
2020-04-07Merge "Add healthcheck for legacy PAP"Krzysztof Opasiak3-0/+61
2020-04-06Add healthcheck for legacy PAPjhh3-0/+61
Issue-ID: POLICY-2473 Signed-off-by: jhh <jorge.hernandez-herrero@att.com> Change-Id: Ib6c129b2cc9e9c81335da66df6d6d178de0cbc61
2020-04-03[POLICY] Use common secret template in papKrzysztof Opasiak4-3/+56
Use common secret template in pap module instead of hardcoding them in config map. For now db creds are hardcoded but this will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: Ic4a4c175579fdc89de216fc09edd562530ad10cc
2020-04-03[POLICY] Use common secret template in policy-apiKrzysztof Opasiak4-3/+56
Use common secret template in policy-api module instead of hardcoding db credentials in config map. For now db creds are hardcoded but will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I6219a06ef466e214756302974589fcc27fa0a4cd
2020-04-02Bump chart versionSylvain Desbureaux22-23/+23
Use 6.0.0 in preparation for Frankfurt release Issue-ID: OOM-2320 Signed-off-by: Sylvain Desbureaux <sylvain.desbureaux@orange.com> Change-Id: I8ad82dfdf48b56c38c0e85d640b18cc13c8d9e67
2020-04-01Merge "[POLICY] Use common secret template in brmsgw"Krzysztof Opasiak3-0/+35
2020-04-01Merge "[POLICY] Use common secret template in pdp"Sylvain Desbureaux3-0/+36
2020-04-01Merge "[POLICY] Allow to override username and password from env"Sylvain Desbureaux1-2/+11
2020-04-01[POLICY] Use common secret template in pdpKrzysztof Opasiak3-0/+36
Use common secret template in pdp module to override DB credentials comming from policy-common. For now db creds are hardcoded but will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I7e2304a79e0c92b5e7e32170135fd59769a21899
2020-04-01[POLICY] Use common secret template in brmsgwKrzysztof Opasiak3-0/+35
Use common secret template in brmsgw module to override DB credentials comming from policy-common For now db creds are hardcoded but will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: Ic15afa9d65982d0ae3a535094f1e4b5f21758c82
2020-04-01[POLICY] Allow to override username and password from envKrzysztof Opasiak1-2/+11
To avoid hardcoding password in base.conf let's allow to override DB username and password from the environment variable. Issue-ID: OOM-2342 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I9fc9506b3908da06d0ad221f63d0a56c783788db
2020-04-01[POLICY] Use common secret template in policy-xacmlKrzysztof Opasiak4-2/+37
Use common secret template in policy-xacml module instead of hardcoding db credentials in config map. For now db creds are hardcoded but will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I3c78373d1b6cf6cdd94af03645e3d5af8704b942
2020-03-27Merge "policy changes pre-1st policy release in frankfurt"Krzysztof Opasiak19-96/+280
2020-03-26[POLICY] Use common secret template in droolsKrzysztof Opasiak4-3/+17
Use common secret template in drools module instead of putting db credentials in a single secret file to allow usage of external secret mechanism. For now db creds are hardcoded but will be remove in further commits. Issue-ID: OOM-2342 Signed-off-by: Krzysztof Opasiak <k.opasiak@samsung.com> Change-Id: I377b71d76b0b37e919ea841586bb6d5c22107952