mirror of
https://github.com/Telecominfraproject/wlan-cloud-ucentral-deploy.git
synced 2026-03-20 03:40:49 +00:00
Compare commits
309 Commits
v2.10.0
...
release/v3
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
e029fc4eed | ||
|
|
eb1bb37158 | ||
|
|
fa0d1268a0 | ||
|
|
2578d17605 | ||
|
|
c7692c9107 | ||
|
|
536e84ce50 | ||
|
|
70c8886d24 | ||
|
|
0ee5ea9648 | ||
|
|
6f2c8d9b02 | ||
|
|
796c78cf1c | ||
|
|
6355161429 | ||
|
|
e2f99ae6e2 | ||
|
|
c84cd0f15b | ||
|
|
472c4d6809 | ||
|
|
ea4d0e40fa | ||
|
|
d0e5d398cf | ||
|
|
538086267a | ||
|
|
f0cd139e90 | ||
|
|
7a8cb72b65 | ||
|
|
2bc81390ff | ||
|
|
747739cf94 | ||
|
|
9784d1aeb1 | ||
|
|
ffd68dabf5 | ||
|
|
9b47f84f4e | ||
|
|
93afc33c41 | ||
|
|
320ef553ab | ||
|
|
8427b5eadc | ||
|
|
ced503bdf7 | ||
|
|
b32a792b7d | ||
|
|
c0daf9466f | ||
|
|
9381a34f85 | ||
|
|
03e79b7f99 | ||
|
|
87996d04e9 | ||
|
|
7818432a14 | ||
|
|
7d6ae997d8 | ||
|
|
05bc9d3ab3 | ||
|
|
39c20d79c1 | ||
|
|
f88c1bbeb5 | ||
|
|
8cda55889d | ||
|
|
986ffd0258 | ||
|
|
eae85d7db9 | ||
|
|
fe93f39e2e | ||
|
|
a9f8faac36 | ||
|
|
e80913bf84 | ||
|
|
d6606dbb0f | ||
|
|
fa967934c9 | ||
|
|
2d8f1b935b | ||
|
|
952e630876 | ||
|
|
f810cc5536 | ||
|
|
8b12984eff | ||
|
|
8929e86d0c | ||
|
|
2a32ed21a8 | ||
|
|
f52417d742 | ||
|
|
f690ca2585 | ||
|
|
37e595b202 | ||
|
|
c08aad1c0a | ||
|
|
12242da7b0 | ||
|
|
c5e26a357d | ||
|
|
21e2365626 | ||
|
|
a38e491b76 | ||
|
|
fac3af182e | ||
|
|
f02958bc07 | ||
|
|
65411efe2e | ||
|
|
a79a225bc3 | ||
|
|
58d54a2bd7 | ||
|
|
608a58ac7c | ||
|
|
d047d3bbb1 | ||
|
|
dc54001c7b | ||
|
|
890d0bea4c | ||
|
|
b5e6a22c73 | ||
|
|
d80530908a | ||
|
|
5608ee9adc | ||
|
|
c7e41cd4c0 | ||
|
|
fbcb103938 | ||
|
|
6e9e9f1187 | ||
|
|
0fbcfa5b45 | ||
|
|
e565aeaf39 | ||
|
|
ec1e7b89f0 | ||
|
|
83998ec70e | ||
|
|
6b9444b50d | ||
|
|
7ad2bac419 | ||
|
|
090331391d | ||
|
|
f7a36f792a | ||
|
|
c46fc17078 | ||
|
|
71067480bc | ||
|
|
add837b45b | ||
|
|
f3c8443af9 | ||
|
|
99bd897465 | ||
|
|
bb931ae0a3 | ||
|
|
6ea88b6975 | ||
|
|
c02dc94ff7 | ||
|
|
238ef71867 | ||
|
|
f7d1ed5d36 | ||
|
|
3532fd23d0 | ||
|
|
e487c731ec | ||
|
|
e75e6ea3c7 | ||
|
|
0f5022b59d | ||
|
|
b8bcff04bd | ||
|
|
b2d7bb8b80 | ||
|
|
4f41a6f7b0 | ||
|
|
5c8abd8bcb | ||
|
|
262c42f6a0 | ||
|
|
83074c779e | ||
|
|
42e2a1d0a0 | ||
|
|
75423754b0 | ||
|
|
479fd3f040 | ||
|
|
ba4e69ffce | ||
|
|
f5ecc34128 | ||
|
|
3f3cc377c9 | ||
|
|
4107b342c9 | ||
|
|
ffdf4fc703 | ||
|
|
2dd8ddc26c | ||
|
|
6f9b1f5b2f | ||
|
|
dc43d1bbd5 | ||
|
|
67f2244d01 | ||
|
|
4610ee6953 | ||
|
|
0af7d2c5e9 | ||
|
|
465447e459 | ||
|
|
d03d03444e | ||
|
|
57589aa3a8 | ||
|
|
75d0e46d0b | ||
|
|
3117a3a1e9 | ||
|
|
12ed612312 | ||
|
|
9d319c4085 | ||
|
|
06edcdde64 | ||
|
|
c30a03e941 | ||
|
|
cdb4639626 | ||
|
|
6a8fca9c82 | ||
|
|
43def4712f | ||
|
|
14e77a220f | ||
|
|
2d9e10024f | ||
|
|
a87c1b542f | ||
|
|
cda4b5a5e1 | ||
|
|
f799acb0fe | ||
|
|
3ac0e9dc42 | ||
|
|
90f9b5c367 | ||
|
|
eb24b72e36 | ||
|
|
ffad0b31f5 | ||
|
|
10f06d04d2 | ||
|
|
6e5cd4b30c | ||
|
|
9fbc0c3ebc | ||
|
|
ea068ac4c7 | ||
|
|
6431c1aa1d | ||
|
|
67eac5522e | ||
|
|
21353d8f51 | ||
|
|
94f09770a7 | ||
|
|
1bbdba9926 | ||
|
|
9ff6579afa | ||
|
|
c064a1b0a4 | ||
|
|
83f94c8b13 | ||
|
|
096027772a | ||
|
|
811dda11e3 | ||
|
|
e946d99081 | ||
|
|
f42c96d3c0 | ||
|
|
cef4242d9a | ||
|
|
743a90f622 | ||
|
|
166d8a54cf | ||
|
|
725f85038a | ||
|
|
fa76dc1bfc | ||
|
|
207a8664e0 | ||
|
|
d5030c109d | ||
|
|
6cd6c47035 | ||
|
|
e55d279919 | ||
|
|
c54c8088a2 | ||
|
|
f5965f53a0 | ||
|
|
7cd7ba9ee8 | ||
|
|
06d0608bb4 | ||
|
|
eb2f21b89b | ||
|
|
7de1d089a6 | ||
|
|
4ac1576933 | ||
|
|
63f29684cc | ||
|
|
82353e3df6 | ||
|
|
73c6f7a383 | ||
|
|
295f2d21b1 | ||
|
|
b119c9f3dc | ||
|
|
a27cc80bb6 | ||
|
|
3e0c5c0e70 | ||
|
|
aa1db914f7 | ||
|
|
98d1713883 | ||
|
|
14fd7e9441 | ||
|
|
96deee627f | ||
|
|
e3fb4643fe | ||
|
|
0bd8e051e2 | ||
|
|
6ede170fc0 | ||
|
|
52fc195ee3 | ||
|
|
df8f901a22 | ||
|
|
9d67e8f61f | ||
|
|
d03360da3d | ||
|
|
89cdd369a6 | ||
|
|
f5c6ff408c | ||
|
|
22baae6d92 | ||
|
|
48205c387f | ||
|
|
bdbe827928 | ||
|
|
3fe4cd1b94 | ||
|
|
3b9e39cc0d | ||
|
|
c1ae42fc65 | ||
|
|
f57ed1aaee | ||
|
|
5c70c28a5d | ||
|
|
65591f7fa9 | ||
|
|
ebfdd92d20 | ||
|
|
b219a167b5 | ||
|
|
5aa25cf324 | ||
|
|
86709bcca4 | ||
|
|
c2c06de6d2 | ||
|
|
b2968d964e | ||
|
|
b8ca1dfe0b | ||
|
|
154066f42c | ||
|
|
692bb41a71 | ||
|
|
8fa982c06d | ||
|
|
43bf06adc4 | ||
|
|
ff33578416 | ||
|
|
b812a2babb | ||
|
|
63dee4ba81 | ||
|
|
4abc5663e7 | ||
|
|
b8661d89da | ||
|
|
729a62675f | ||
|
|
0b38f7b27e | ||
|
|
5a00216428 | ||
|
|
981cc20a1c | ||
|
|
e74f77f1dc | ||
|
|
7fdb05b796 | ||
|
|
f1bc57bb19 | ||
|
|
9d78a02f9e | ||
|
|
624eb1eec9 | ||
|
|
992af6e97d | ||
|
|
4c3fa53073 | ||
|
|
47e7650846 | ||
|
|
2e2fa7fa49 | ||
|
|
bd83ccb0ce | ||
|
|
383158eaa7 | ||
|
|
bd0286036a | ||
|
|
0884b19584 | ||
|
|
e4a20e26a3 | ||
|
|
92eed9caa2 | ||
|
|
105e93973a | ||
|
|
ecbb2b5889 | ||
|
|
6978d74fb8 | ||
|
|
c755d29aea | ||
|
|
c6bdcad56d | ||
|
|
b741cc6344 | ||
|
|
3c220a43a8 | ||
|
|
187320675c | ||
|
|
bc2af4f41b | ||
|
|
fb7f8f5b4f | ||
|
|
0c1b319ef6 | ||
|
|
a234fdf605 | ||
|
|
07feed776e | ||
|
|
2bd2173e11 | ||
|
|
6838e5a0f4 | ||
|
|
1c120e987a | ||
|
|
c1da868627 | ||
|
|
17ae0c8257 | ||
|
|
bcd6d945e7 | ||
|
|
72ade5e9ab | ||
|
|
7b3747b199 | ||
|
|
3259c1c6a8 | ||
|
|
b574e5cc2d | ||
|
|
62b5d3bf2f | ||
|
|
2c0ea54a87 | ||
|
|
610a0e42c7 | ||
|
|
b0fc8de462 | ||
|
|
0aa876dda7 | ||
|
|
d032a1414f | ||
|
|
11262036ae | ||
|
|
83bdaaeae8 | ||
|
|
ea30f3ec0a | ||
|
|
97bead0e3c | ||
|
|
3ada49204d | ||
|
|
5943c870b5 | ||
|
|
65bedb38fe | ||
|
|
2c150d7a43 | ||
|
|
ddb7300dc2 | ||
|
|
30c7934393 | ||
|
|
39af697fc4 | ||
|
|
e2ee1ad247 | ||
|
|
3b8f8fb7f2 | ||
|
|
9faf523b7d | ||
|
|
3105510ee5 | ||
|
|
4126bc94c1 | ||
|
|
840d759024 | ||
|
|
7e779f7a88 | ||
|
|
1e9edcd7f6 | ||
|
|
a5b5223744 | ||
|
|
97c986ef1f | ||
|
|
1459950bea | ||
|
|
31b65a890f | ||
|
|
56e69f9339 | ||
|
|
ad93ba4a27 | ||
|
|
09dd14e0b2 | ||
|
|
acaa929719 | ||
|
|
0bfa6cd508 | ||
|
|
f2bb115710 | ||
|
|
7196a480f3 | ||
|
|
e6bff9b9a5 | ||
|
|
e817bedfb8 | ||
|
|
956c0a62c6 | ||
|
|
d4ab88876a | ||
|
|
b7c14bed7e | ||
|
|
09a36a2a93 | ||
|
|
e3699b2856 | ||
|
|
87f9890ad5 | ||
|
|
75f2ae0383 | ||
|
|
1987b8560f | ||
|
|
81c7a4cd02 | ||
|
|
02a994f196 | ||
|
|
ef4b33ddd7 | ||
|
|
56defe7333 | ||
|
|
098766b32c | ||
|
|
2f07656a7e |
1
.github/workflows/ci.yml
vendored
1
.github/workflows/ci.yml
vendored
@@ -9,6 +9,7 @@ on:
|
||||
branches:
|
||||
- main
|
||||
- 'release/*'
|
||||
workflow_dispatch: {}
|
||||
|
||||
defaults:
|
||||
run:
|
||||
|
||||
@@ -2,34 +2,34 @@ apiVersion: v2
|
||||
name: openwifi
|
||||
appVersion: "1.0"
|
||||
description: A Helm chart for Kubernetes
|
||||
version: 0.1.0
|
||||
version: 3.0.0
|
||||
dependencies:
|
||||
- name: owgw
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-ucentralgw@helm?ref=master"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-ucentralgw@helm?ref=v3.0.2-RC1"
|
||||
version: 0.1.0
|
||||
- name: owsec
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-ucentralsec@helm?ref=main"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-ucentralsec@helm?ref=v3.0.2-RC1"
|
||||
version: 0.1.0
|
||||
- name: owfms
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-ucentralfms@helm?ref=main"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-ucentralfms@helm?ref=v3.0.2-RC1"
|
||||
version: 0.1.0
|
||||
- name: owprov
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-owprov@helm?ref=main"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-owprov@helm?ref=v3.0.2-RC1"
|
||||
version: 0.1.0
|
||||
- name: owanalytics
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-analytics@helm?ref=main"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-analytics@helm?ref=v3.0.2-RC1"
|
||||
version: 0.1.0
|
||||
- name: owgwui
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-ucentralgw-ui@helm?ref=main"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-ucentralgw-ui@helm?ref=v3.0.2-RC1"
|
||||
version: 0.1.0
|
||||
- name: owprovui
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-owprov-ui@helm?ref=main"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-owprov-ui@helm?ref=v3.0.2-RC1"
|
||||
version: 0.1.0
|
||||
- name: owsub
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-userportal@helm?ref=main"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-userportal@helm?ref=v3.0.2-RC1"
|
||||
version: 0.1.0
|
||||
- name: owrrm
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-rrm@helm?ref=main"
|
||||
repository: "git+https://github.com/Telecominfraproject/wlan-cloud-rrm@helm?ref=v2.8.0"
|
||||
version: 0.1.0
|
||||
- name: kafka
|
||||
repository: https://tip.jfrog.io/artifactory/tip-wlan-cloud-ucentral-helm/
|
||||
@@ -44,10 +44,14 @@ dependencies:
|
||||
version: 0.1.0
|
||||
condition: owlsui.enabled
|
||||
- name: haproxy
|
||||
repository: https://tip.jfrog.io/artifactory/tip-wlan-cloud-ucentral-helm/
|
||||
version: 0.2.21
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
version: 0.13.3
|
||||
condition: haproxy.enabled
|
||||
- name: postgresql-ha
|
||||
repository: https://tip.jfrog.io/artifactory/tip-wlan-cloud-ucentral-helm/
|
||||
version: 8.6.13
|
||||
condition: postgresql-ha.enabled
|
||||
#- name: postgresql-ha
|
||||
# repository: https://tip.jfrog.io/artifactory/tip-wlan-cloud-ucentral-helm/
|
||||
# version: 8.6.13
|
||||
# condition: postgresql-ha.enabled
|
||||
- name: postgresql
|
||||
repository: oci://registry-1.docker.io/bitnamicharts
|
||||
version: 13.4.3
|
||||
condition: postgresql.enabled
|
||||
|
||||
@@ -1,10 +1,10 @@
|
||||
# openwifi
|
||||
|
||||
This Helm chart helps to deploy OpenWIFI Cloud SDK with all required dependencies to the Kubernetes clusters. Purpose of this chart is to setup correct connections between other microservices and other dependencies with correct Values and other charts as dependencies in [chart definition](Chart.yaml)
|
||||
This Helm chart helps to deploy OpenWIFI Cloud SDK with all required dependencies to the Kubernetes clusters. The purpose of this chart is to set up the correct connections between other microservices and other dependencies with correct Values and other charts as dependencies in [chart definition](Chart.yaml)
|
||||
|
||||
## TL;DR;
|
||||
|
||||
[helm-git](https://github.com/aslafy-z/helm-git) is required for remote the installation as it pull charts from other repositories for the deployment, so intall it if you don't have it already.
|
||||
[helm-git](https://github.com/aslafy-z/helm-git) is required for remote the installation as it pull charts from other repositories for the deployment, so install it if you don't have it already.
|
||||
|
||||
Using that you can deploy Cloud SDK with 2 setups - without TLS certificates for RESTAPI endpoints and with them.
|
||||
|
||||
@@ -20,7 +20,7 @@ $ kubectl create secret generic openwifi-certs --from-file=../docker-compose/cer
|
||||
$ helm upgrade --install -f environment-values/values.base.secure.yaml openwifi .
|
||||
```
|
||||
|
||||
In order to acces the UI and other RESTAPI endpoints you should run the following commands after the deployment:
|
||||
In order to access the UI and other RESTAPI endpoints you should run the following commands after the deployment:
|
||||
|
||||
```
|
||||
$ kubectl port-forward deployment/proxy 5912 5913 16001 16002 16003 16004 16005 16006 16009 &
|
||||
@@ -43,7 +43,7 @@ $ kubectl create secret generic openwifi-certs --from-file=../docker-compose/cer
|
||||
$ helm upgrade --install -f environment-values/values.base.insecure.yaml openwifi .
|
||||
```
|
||||
|
||||
In order to acces the UI and other RESTAPI endpoints you should run the following commands after the deployment:
|
||||
In order to access the UI and other RESTAPI endpoints you should run the following commands after the deployment:
|
||||
|
||||
```
|
||||
$ kubectl port-forward deployment/proxy 5912 5913 16001 16002 16003 16004 16005 16006 16009 &
|
||||
@@ -167,7 +167,7 @@ The following table lists the configurable parameters that overrides microservic
|
||||
| `restapiCerts.services` | array | List of services that require certificates generation | |
|
||||
| `restapiCerts.clusterDomain` | string | Kubernetes cluster domain | `cluster.local` |
|
||||
|
||||
If required, further overrides may be passed. They will be merged with default values from this chart and other subcharts with priority to values you'll pass.
|
||||
If required, further overrides may be passed. They will be merged with default values from this chart and other sub-charts with priority to values you'll pass.
|
||||
|
||||
Specify each parameter using the `--set key=value[,key=value]` argument to `helm install`. For example,
|
||||
|
||||
@@ -200,7 +200,7 @@ By setting `clusterinfo.enabled` to `true` you may enable job on post-install/po
|
||||
1. Change default security credentials from credentials set in OWSEC configuration file (see 'Required password changing on the first startup' block above)
|
||||
2. Check if all services started responding correctly after the deployment using systeminfo REST API method
|
||||
|
||||
In order to do that, you need to additionaly set multiple parameters:
|
||||
In order to do that, you need to additionally set multiple parameters:
|
||||
|
||||
1. clusterinfo.public_env_variables.OWSEC - OWSEC endpoint to use for CLI tools
|
||||
2. clusterinfo.secret_env_variables.OWSEC_DEFAULT_USERNAME - username used for CLI requests (see OWSEC configuration file for details)
|
||||
@@ -221,17 +221,17 @@ You may see example values to enable this feature in [values.enable-owls.yaml](.
|
||||
|
||||
In order to use single point of entry for all services (may be used for one cloud Load Balancer per installation) HAproxy is installed by default with other services. HAproxy is working in TCP proxy mode, so every TLS certificate is managed by services themself, while it is possible to pass requests from cloud load balancer to services using same ports (configuration of cloud load balancer may vary from cloud provider to provider).
|
||||
|
||||
By default this option is enabled, but you may disable it and make per-service LoadBalancer using values in [values.disable-haproxy.yaml](./feature-values/values.disable-haproxy.yaml).
|
||||
By default, this option is enabled, but you may disable it and make per-service LoadBalancer using values in [values.disable-haproxy.yaml](./feature-values/values.disable-haproxy.yaml).
|
||||
|
||||
### OWGW unsafe sysctls
|
||||
|
||||
By default Linux is using quite adeqate sysctl values for TCP keepalive, but OWGW may keep disconnected APs in stuck state preventing it from connecting back. This may be changed by setting some sysctls to lower values:
|
||||
By default, Linux is using quite adequate sysctl values for TCP keepalive, but OWGW may keep disconnected APs in stuck state preventing it from connecting back. This may be changed by setting some sysctls to lower values:
|
||||
|
||||
- net.ipv4.tcp_keepalive_intvl
|
||||
- net.ipv4.tcp_keepalive_probes - 2
|
||||
- net.ipv4.tcp_keepalive_time - 45
|
||||
|
||||
However this change is [not considered safe by Kubernetes](https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls) and it requires to pass additional argument to your Kubelets services in your Kubernetes cluster:
|
||||
However, this change is [not considered safe by Kubernetes](https://kubernetes.io/docs/tasks/administer-cluster/sysctl-cluster/#enabling-unsafe-sysctls), and it requires to pass additional argument to your Kubelets services in your Kubernetes cluster:
|
||||
|
||||
```
|
||||
--allowed-unsafe-sysctls net.ipv4.tcp_keepalive_intvl,net.ipv4.tcp_keepalive_probes,net.ipv4.tcp_keepalive_time
|
||||
@@ -258,16 +258,16 @@ You may see example values to enable this feature in [values.restapi-disable-tls
|
||||
|
||||
### PostgreSQL storage option for services
|
||||
|
||||
By default all microservices except RRM service use SQLite as default storage driver, but it is possible to use PostgreSQL for that purpose. Both [cluster-per-microservice](environment-values/values.openwifi-qa.external-db.yaml) and [cluster per installation](environment-values/values.openwifi-qa.single-external-db.yaml) deployments method may be used.
|
||||
By default, all microservices except RRM service use SQLite as default storage driver, but it is possible to use PostgreSQL for that purpose. Both [cluster-per-microservice](environment-values/values.openwifi-qa.external-db.yaml) and [cluster per installation](environment-values/values.openwifi-qa.single-external-db.yaml) deployments method may be used.
|
||||
|
||||
## Environment specific values
|
||||
|
||||
This repository contains values files that may be used in the same manner as feature values above to deploy to specific runtime envionemnts (including different cloud deployments).
|
||||
This repository contains values files that may be used in the same manner as feature values above to deploy to specific runtime environments (including different cloud deployments).
|
||||
|
||||
Some environments are using [external-dns](https://github.com/kubernetes-sigs/external-dns) service to dynamically set DNS records, but you may manage your records manually
|
||||
|
||||
### AWS EKS
|
||||
|
||||
EKS based installation assumes that you are using [AWS Load Balancer controller](https://kubernetes-sigs.github.io/aws-load-balancer-controller) so that all required ALBs and NLBs are created automatically. Also it is assumed that you have Route53 managed DNS zone and you've issued wildcard certificate for one of your zones that may be used by Load Balancers.
|
||||
EKS based installation assumes that you are using [AWS Load Balancer controller](https://kubernetes-sigs.github.io/aws-load-balancer-controller) so that all required ALBs and NLBs are created automatically. Also, it is assumed that you have Route53 managed DNS zone, and you've issued wildcard certificate for one of your zones that may be used by Load Balancers.
|
||||
|
||||
You may see example values for this environment in [values.aws.yaml](./environment-values/values.aws.yaml).
|
||||
|
||||
@@ -61,7 +61,7 @@ then
|
||||
echo "Logged in with new credentials:"
|
||||
fi
|
||||
else
|
||||
echo "Credentials check failed with unexpected ErrorCode, please review the responce body:"
|
||||
echo "Credentials check failed with unexpected ErrorCode, please review the response body:"
|
||||
jq < ${result_file}
|
||||
exit 2
|
||||
fi
|
||||
|
||||
8
chart/environment-values/cleanup.sh
Executable file
8
chart/environment-values/cleanup.sh
Executable file
@@ -0,0 +1,8 @@
|
||||
#!/bin/bash
|
||||
[ -z "$NAMESPACE" ] && echo "No NAMESPACE set" && exit 1
|
||||
helm -n openwifi-"$NAMESPACE" delete tip-openwifi
|
||||
if [[ "$1" == "full" ]] ; then
|
||||
sleep 30
|
||||
kubectl delete ns openwifi-"$NAMESPACE"
|
||||
fi
|
||||
exit 0
|
||||
@@ -2,47 +2,47 @@
|
||||
set -e
|
||||
|
||||
# Usage function
|
||||
usage () {
|
||||
echo >&2;
|
||||
echo "This script is indended for OpenWIFI Cloud SDK deployment to TIP QA/Dev environments using assembly Helm chart (https://github.com/Telecominfraproject/wlan-cloud-ucentral-deploy/tree/main/chart) with configuration through environment variables" >&2;
|
||||
echo >&2;
|
||||
echo "Required environment variables:" >&2;
|
||||
echo >&2;
|
||||
echo "- NAMESPACE - namespace suffix that will used added for the Kubernetes environment (i.e. if you pass 'test', kubernetes namespace will be named 'ucentral-test')" >&2;
|
||||
echo "- DEPLOY_METHOD - deployment method for the chart deployment (supported methods - 'git' (will use helm-git from assembly chart) and 'bundle' (will use chart stored in the Artifactory0" >&2;
|
||||
echo "- CHART_VERSION - version of chart to be deployed from assembly chart (for 'git' method git ref may be passed, for 'bundle' method version of chart may be passed)" >&2;
|
||||
echo >&2;
|
||||
echo "- VALUES_FILE_LOCATION - path to file with override values that may be used for deployment" >&2;
|
||||
echo "- OWGW_AUTH_USERNAME - username to be used for requests to OpenWIFI Security" >&2;
|
||||
echo "- OWGW_AUTH_PASSWORD - hashed password for OpenWIFI Security (details on this may be found in https://github.com/Telecominfraproject/wlan-cloud-ucentralsec/#authenticationdefaultpassword)" >&2;
|
||||
echo "- OWFMS_S3_SECRET - secret key that is used for OpenWIFI Firmware access to firmwares S3 bucket" >&2;
|
||||
echo "- OWFMS_S3_KEY - access key that is used for OpenWIFI Firmware access to firmwares S3 bucket" >&2;
|
||||
echo "- OWSEC_NEW_PASSWORD - password that should be set to default user instead of default password from properties" >&2;
|
||||
echo "- CERT_LOCATION - path to certificate in PEM format that will be used for securing all endpoint in all services" >&2;
|
||||
echo "- KEY_LOCATION - path to private key in PEM format that will be used for securing all endpoint in all services" >&2;
|
||||
echo >&2;
|
||||
echo "Following environmnet variables may be passed, but will be ignored if CHART_VERSION is set to release (i.e. v2.4.0):" >&2;
|
||||
echo >&2;
|
||||
echo "- OWGW_VERSION - OpenWIFI Gateway version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo "- OWGWUI_VERSION - OpenWIFI Web UI version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo "- OWSEC_VERSION - OpenWIFI Security version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo "- OWFMS_VERSION - OpenWIFI Firmware version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo "- OWPROV_VERSION - OpenWIFI Provisioning version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo "- OWPROVUI_VERSION - OpenWIFI Provisioning Web UI version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo "- OWANALYTICS_VERSION - OpenWIFI Analytics version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo "- OWSUB_VERSION - OpenWIFI Subscription (Userportal) version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo "- OWRRM_VERSION - OpenWIFI radio resource management service (RRM) version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)" >&2;
|
||||
echo >&2;
|
||||
echo "Optional environment variables:" >&2;
|
||||
echo >&2;
|
||||
echo "- EXTRA_VALUES - extra values that should be passed to Helm deployment separated by comma (,)" >&2;
|
||||
echo "- DEVICE_CERT_LOCATION - path to certificate in PEM format that will be used for load simulator" >&2;
|
||||
echo "- DEVICE_KEY_LOCATION - path to private key in PEM format that will be used for load simulator" >&2;
|
||||
echo "- USE_SEPARATE_OWGW_LB - flag that should change split external DNS for OWGW and other services" >&2;
|
||||
echo "- INTERNAL_RESTAPI_ENDPOINT_SCHEMA - what schema to use for internal RESTAPI endpoints (https by default)" >&2;
|
||||
echo "- IPTOCOUNTRY_IPINFO_TOKEN - token that should be set for IPInfo support (owgw/owprov iptocountry.ipinfo.token properties), ommited if not passed" >&2;
|
||||
echo "- MAILER_USERNAME - SMTP username used for OWSEC mailer" >&2;
|
||||
echo "- MAILER_PASSWORD - SMTP password used for OWSEC mailer (only if both MAILER_PASSWORD and MAILER_USERNAME are set, mailer will be enabled)" >&2;
|
||||
function usage()
|
||||
{
|
||||
cat <<-EOF >&2
|
||||
|
||||
This script is indended for OpenWIFI Cloud SDK deployment to TIP QA/Dev environments using assembly Helm chart (https://github.com/Telecominfraproject/wlan-cloud-ucentral-deploy/tree/main/chart) with configuration through environment variables
|
||||
|
||||
Required environment variables:
|
||||
- NAMESPACE - namespace suffix that will used added for the Kubernetes environment (i.e. if you pass 'test', kubernetes namespace will be named 'ucentral-test')
|
||||
- DEPLOY_METHOD - deployment method for the chart deployment (supported methods - 'git' (will use helm-git from assembly chart), 'bundle' (will use chart stored in the Artifactory) or local
|
||||
- CHART_VERSION - version of chart to be deployed from assembly chart (for 'git' method git ref may be passed, for 'bundle' method version of chart may be passed)
|
||||
- VALUES_FILE_LOCATION - path to file with override values that may be used for deployment
|
||||
- DOMAIN - Domain name. default: cicd.lab.wlan.tip.build
|
||||
- OWGW_AUTH_USERNAME - username to be used for requests to OpenWIFI Security
|
||||
- OWGW_AUTH_PASSWORD - hashed password for OpenWIFI Security (details on this may be found in https://github.com/Telecominfraproject/wlan-cloud-ucentralsec/#authenticationdefaultpassword)
|
||||
- OWFMS_S3_SECRET - secret key that is used for OpenWIFI Firmware access to firmwares S3 bucket
|
||||
- OWFMS_S3_KEY - access key that is used for OpenWIFI Firmware access to firmwares S3 bucket
|
||||
- OWSEC_NEW_PASSWORD - password that should be set to default user instead of default password from properties
|
||||
- CERT_LOCATION - path to certificate in PEM format that will be used for securing all endpoint in all services
|
||||
- KEY_LOCATION - path to private key in PEM format that will be used for securing all endpoint in all services
|
||||
|
||||
The following environmnet variables may be passed, but will be ignored if CHART_VERSION is set to release (i.e. v2.4.0):
|
||||
- OWGW_VERSION - OpenWIFI Gateway version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
- OWGWUI_VERSION - OpenWIFI Web UI version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
- OWSEC_VERSION - OpenWIFI Security version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
- OWFMS_VERSION - OpenWIFI Firmware version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
- OWPROV_VERSION - OpenWIFI Provisioning version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
- OWPROVUI_VERSION - OpenWIFI Provisioning Web UI version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
- OWANALYTICS_VERSION - OpenWIFI Analytics version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
- OWSUB_VERSION - OpenWIFI Subscription (Userportal) version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
- OWRRM_VERSION - OpenWIFI radio resource management service (RRM) version to deploy (will be used for Docker image tag and git branch for Helm chart if git deployment is required)
|
||||
|
||||
Optional environment variables:
|
||||
- EXTRA_VALUES - extra values that should be passed to Helm deployment separated by comma (,)
|
||||
- DEVICE_CERT_LOCATION - path to certificate in PEM format that will be used for load simulator
|
||||
- DEVICE_KEY_LOCATION - path to private key in PEM format that will be used for load simulator
|
||||
- USE_SEPARATE_OWGW_LB - flag that should change split external DNS for OWGW and other services
|
||||
- INTERNAL_RESTAPI_ENDPOINT_SCHEMA - what schema to use for internal RESTAPI endpoints (https by default)
|
||||
- IPTOCOUNTRY_IPINFO_TOKEN - token that should be set for IPInfo support (owgw/owprov iptocountry.ipinfo.token properties), ommited if not passed
|
||||
- MAILER_USERNAME - SMTP username used for OWSEC mailer
|
||||
- MAILER_PASSWORD - SMTP password used for OWSEC mailer (only if both MAILER_PASSWORD and MAILER_USERNAME are set, mailer will be enabled)
|
||||
EOF
|
||||
}
|
||||
|
||||
# Global variables
|
||||
@@ -50,32 +50,30 @@ VALUES_FILE_LOCATION_SPLITTED=()
|
||||
EXTRA_VALUES_SPLITTED=()
|
||||
|
||||
# Helper functions
|
||||
check_if_chart_version_is_release() {
|
||||
PARSED_CHART_VERSION=$(echo $CHART_VERSION | grep -xP "v\d+\.\d+\.\d+.*")
|
||||
if [[ -z "$PARSED_CHART_VERSION" ]]; then
|
||||
return 1
|
||||
else
|
||||
return 0
|
||||
fi
|
||||
function check_if_chart_version_is_release()
|
||||
{
|
||||
[[ "$CHART_VERSION" =~ ^v[0-9]+\.[0-9]+\.[0-9]+ ]]
|
||||
}
|
||||
|
||||
# Check if required environment variables were passed
|
||||
## Deployment specifics
|
||||
[ -z ${DEPLOY_METHOD+x} ] && echo "DEPLOY_METHOD is unset" >&2 && usage && exit 1
|
||||
[ -z ${CHART_VERSION+x} ] && echo "CHART_VERSION is unset" >&2 && usage && exit 1
|
||||
if check_if_chart_version_is_release; then
|
||||
echo "Chart version ($CHART_VERSION) is release version, ignoring services versions"
|
||||
else
|
||||
echo "Chart version ($CHART_VERSION) is not release version, checking if services versions are set"
|
||||
[ -z ${OWGW_VERSION+x} ] && echo "OWGW_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWGWUI_VERSION+x} ] && echo "OWGWUI_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWSEC_VERSION+x} ] && echo "OWSEC_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWFMS_VERSION+x} ] && echo "OWFMS_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWPROV_VERSION+x} ] && echo "OWPROV_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWPROVUI_VERSION+x} ] && echo "OWPROVUI_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWANALYTICS_VERSION+x} ] && echo "OWANALYTICS_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWSUB_VERSION+x} ] && echo "OWSUB_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWRRM_VERSION+x} ] && echo "OWRRM_VERSION is unset" >&2 && usage && exit 1
|
||||
if [[ "$DEPLOY_METHOD" != "local" ]] ; then
|
||||
if check_if_chart_version_is_release ; then
|
||||
echo "Chart version ($CHART_VERSION) is a release version, ignoring services versions"
|
||||
else
|
||||
echo "Chart version ($CHART_VERSION) is not a release version, checking if services versions are set"
|
||||
[ -z ${OWGW_VERSION+x} ] && echo "OWGW_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWGWUI_VERSION+x} ] && echo "OWGWUI_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWSEC_VERSION+x} ] && echo "OWSEC_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWFMS_VERSION+x} ] && echo "OWFMS_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWPROV_VERSION+x} ] && echo "OWPROV_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWPROVUI_VERSION+x} ] && echo "OWPROVUI_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWANALYTICS_VERSION+x} ] && echo "OWANALYTICS_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWSUB_VERSION+x} ] && echo "OWSUB_VERSION is unset" >&2 && usage && exit 1
|
||||
[ -z ${OWRRM_VERSION+x} ] && echo "OWRRM_VERSION is unset" >&2 && usage && exit 1
|
||||
fi
|
||||
fi
|
||||
## Environment specifics
|
||||
[ -z ${NAMESPACE+x} ] && echo "NAMESPACE is unset" >&2 && usage && exit 1
|
||||
@@ -94,6 +92,7 @@ fi
|
||||
[ -z ${INTERNAL_RESTAPI_ENDPOINT_SCHEMA+x} ] && echo "INTERNAL_RESTAPI_ENDPOINT_SCHEMA is unset, setting it to 'https'" && export INTERNAL_RESTAPI_ENDPOINT_SCHEMA=https
|
||||
export MAILER_ENABLED="false"
|
||||
[ ! -z ${MAILER_USERNAME+x} ] && [ ! -z ${MAILER_PASSWORD+x} ] && echo "MAILER_USERNAME and MAILER_PASSWORD are set, mailer will be enabled" && export MAILER_ENABLED="true"
|
||||
[ -z "${DOMAIN}" ] && echo "DOMAIN is unset, using cicd.lab.wlan.tip.build" && export DOMAIN="cicd.lab.wlan.tip.build"
|
||||
|
||||
# Transform some environment variables
|
||||
export OWGW_VERSION_TAG=$(echo ${OWGW_VERSION} | tr '/' '-')
|
||||
@@ -106,128 +105,71 @@ export OWANALYTICS_VERSION_TAG=$(echo ${OWANALYTICS_VERSION} | tr '/' '-')
|
||||
export OWSUB_VERSION_TAG=$(echo ${OWSUB_VERSION} | tr '/' '-')
|
||||
export OWRRM_VERSION_TAG=$(echo ${OWRRM_VERSION} | tr '/' '-')
|
||||
|
||||
# Debug get bash version
|
||||
bash --version >&2
|
||||
|
||||
# Check deployment method that's required for this environment
|
||||
helm plugin install https://github.com/databus23/helm-diff || true
|
||||
if [[ "$DEPLOY_METHOD" == "git" ]]; then
|
||||
helm plugin install https://github.com/aslafy-z/helm-git --version 0.10.0 || true
|
||||
rm -rf wlan-cloud-ucentral-deploy || true
|
||||
git clone https://github.com/Telecominfraproject/wlan-cloud-ucentral-deploy.git
|
||||
cd wlan-cloud-ucentral-deploy
|
||||
git checkout $CHART_VERSION
|
||||
cd chart
|
||||
if ! check_if_chart_version_is_release; then
|
||||
sed -i '/wlan-cloud-ucentralgw@/s/ref=.*/ref='${OWGW_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-ucentralgw-ui@/s/ref=.*/ref='${OWGWUI_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-ucentralsec@/s/ref=.*/ref='${OWSEC_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-ucentralfms@/s/ref=.*/ref='${OWFMS_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-owprov@/s/ref=.*/ref='${OWPROV_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-owprov-ui@/s/ref=.*/ref='${OWPROVUI_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-analytics@/s/ref=.*/ref='${OWANALYTICS_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-userportal@/s/ref=.*/ref='${OWSUB_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-rrm@/s/ref=.*/ref='${OWRRM_VERSION}'\"/g' Chart.yaml
|
||||
fi
|
||||
helm repo add bitnami https://charts.bitnami.com/bitnami
|
||||
helm repo update
|
||||
helm dependency update
|
||||
cd ../..
|
||||
export DEPLOY_SOURCE="wlan-cloud-ucentral-deploy/chart"
|
||||
else
|
||||
if [[ "$DEPLOY_METHOD" == "bundle" ]]; then
|
||||
if [[ "$DEPLOY_METHOD" == "git" ]] ; then
|
||||
helm plugin install https://github.com/aslafy-z/helm-git --version 0.10.0 || true
|
||||
rm -rf wlan-cloud-ucentral-deploy || true
|
||||
git clone https://github.com/Telecominfraproject/wlan-cloud-ucentral-deploy.git
|
||||
cd wlan-cloud-ucentral-deploy
|
||||
git checkout $CHART_VERSION
|
||||
cd chart
|
||||
if ! check_if_chart_version_is_release ; then
|
||||
sed -i '/wlan-cloud-ucentralgw@/s/ref=.*/ref='${OWGW_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-ucentralgw-ui@/s/ref=.*/ref='${OWGWUI_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-ucentralsec@/s/ref=.*/ref='${OWSEC_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-ucentralfms@/s/ref=.*/ref='${OWFMS_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-owprov@/s/ref=.*/ref='${OWPROV_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-owprov-ui@/s/ref=.*/ref='${OWPROVUI_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-analytics@/s/ref=.*/ref='${OWANALYTICS_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-userportal@/s/ref=.*/ref='${OWSUB_VERSION}'\"/g' Chart.yaml
|
||||
sed -i '/wlan-cloud-rrm@/s/ref=.*/ref='${OWRRM_VERSION}'\"/g' Chart.yaml
|
||||
fi
|
||||
helm repo add bitnami https://charts.bitnami.com/bitnami
|
||||
helm repo update
|
||||
[ -z "$SKIP_DEPS" ] && helm dependency update
|
||||
cd ../..
|
||||
export DEPLOY_SOURCE="wlan-cloud-ucentral-deploy/chart"
|
||||
elif [[ "$DEPLOY_METHOD" == "bundle" ]] ; then
|
||||
helm repo add tip-wlan-cloud-ucentral-helm https://tip.jfrog.io/artifactory/tip-wlan-cloud-ucentral-helm/ || true
|
||||
export DEPLOY_SOURCE="tip-wlan-cloud-ucentral-helm/openwifi --version $CHART_VERSION"
|
||||
else
|
||||
echo "Deploy method is not correct: $DEPLOY_METHOD. Valid value - git or bundle" >&2
|
||||
elif [[ "$DEPLOY_METHOD" == "local" ]] ; then
|
||||
export DEPLOY_SOURCE=".."
|
||||
pushd ..
|
||||
[ -z "$SKIP_DEPS" ] && helm dependency update
|
||||
popd
|
||||
else
|
||||
echo "Deploy method is not correct: $DEPLOY_METHOD. Valid values: git, bundle or local" >&2
|
||||
exit 1
|
||||
fi
|
||||
fi
|
||||
|
||||
VALUES_FILES_FLAGS=()
|
||||
IFS=',' read -ra VALUES_FILE_LOCATION_SPLITTED <<< "$VALUES_FILE_LOCATION"
|
||||
for VALUE_FILE in ${VALUES_FILE_LOCATION_SPLITTED[*]}; do
|
||||
VALUES_FILES_FLAGS+=("-f" $VALUE_FILE)
|
||||
VALUES_FILES_FLAGS+=("-f" $VALUE_FILE)
|
||||
done
|
||||
EXTRA_VALUES_FLAGS=()
|
||||
IFS=',' read -ra EXTRA_VALUES_SPLITTED <<< "$EXTRA_VALUES"
|
||||
for EXTRA_VALUE in ${EXTRA_VALUES_SPLITTED[*]}; do
|
||||
EXTRA_VALUES_FLAGS+=("--set" $EXTRA_VALUE)
|
||||
EXTRA_VALUES_FLAGS+=("--set" $EXTRA_VALUE)
|
||||
done
|
||||
|
||||
if [[ "$USE_SEPARATE_OWGW_LB" == "true" ]]; then
|
||||
export HAPROXY_SERVICE_DNS_RECORDS="sec-${NAMESPACE}.cicd.lab.wlan.tip.build\,fms-${NAMESPACE}.cicd.lab.wlan.tip.build\,prov-${NAMESPACE}.cicd.lab.wlan.tip.build\,analytics-${NAMESPACE}.cicd.lab.wlan.tip.build\,sub-${NAMESPACE}.cicd.lab.wlan.tip.build"
|
||||
export OWGW_SERVICE_DNS_RECORDS="gw-${NAMESPACE}.cicd.lab.wlan.tip.build"
|
||||
if [[ "$USE_SEPARATE_OWGW_LB" == "true" ]] ; then
|
||||
export HAPROXY_SERVICE_DNS_RECORDS="sec-${NAMESPACE}.${DOMAIN},fms-${NAMESPACE}.${DOMAIN},prov-${NAMESPACE}.${DOMAIN},analytics-${NAMESPACE}.${DOMAIN},sub-${NAMESPACE}.${DOMAIN}"
|
||||
export OWGW_SERVICE_DNS_RECORDS="gw-${NAMESPACE}.${DOMAIN}"
|
||||
else
|
||||
export HAPROXY_SERVICE_DNS_RECORDS="gw-${NAMESPACE}.cicd.lab.wlan.tip.build\,sec-${NAMESPACE}.cicd.lab.wlan.tip.build\,fms-${NAMESPACE}.cicd.lab.wlan.tip.build\,prov-${NAMESPACE}.cicd.lab.wlan.tip.build\,analytics-${NAMESPACE}.cicd.lab.wlan.tip.build\,sub-${NAMESPACE}.cicd.lab.wlan.tip.build"
|
||||
export HAPROXY_SERVICE_DNS_RECORDS="gw-${NAMESPACE}.${DOMAIN},sec-${NAMESPACE}.${DOMAIN},fms-${NAMESPACE}.${DOMAIN},prov-${NAMESPACE}.${DOMAIN},analytics-${NAMESPACE}.${DOMAIN},sub-${NAMESPACE}.${DOMAIN}"
|
||||
export OWGW_SERVICE_DNS_RECORDS=""
|
||||
fi
|
||||
|
||||
# Run the deployment
|
||||
envsubst < values.custom.tpl.yaml > values.custom-${NAMESPACE}.yaml
|
||||
|
||||
set -x
|
||||
helm upgrade --install --create-namespace --wait --timeout 60m \
|
||||
--namespace openwifi-${NAMESPACE} \
|
||||
${VALUES_FILES_FLAGS[*]} \
|
||||
--set owgw.services.owgw.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=gw-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owgw.configProperties."openwifi\.fileuploader\.host\.0\.name"=gw-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owgw.configProperties."rtty\.server"=gw-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owgw.configProperties."openwifi\.system\.uri\.public"=https://gw-${NAMESPACE}.cicd.lab.wlan.tip.build:16002 \
|
||||
--set owgw.configProperties."openwifi\.system\.uri\.private"=$INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owgw-owgw:17002 \
|
||||
--set owgw.configProperties."openwifi\.system\.uri\.ui"=https://webui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owgw.configProperties."iptocountry\.ipinfo\.token"="${IPTOCOUNTRY_IPINFO_TOKEN}" \
|
||||
--set owgw.public_env_variables.OWSEC=sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set owsec.configProperties."authentication\.default\.username"=${OWGW_AUTH_USERNAME} \
|
||||
--set owsec.configProperties."authentication\.default\.password"=${OWGW_AUTH_PASSWORD} \
|
||||
--set owsec.services.owsec.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=sec-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owsec.configProperties."openwifi\.system\.uri\.public"=https://sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set owsec.configProperties."openwifi\.system\.uri\.private"=$INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owsec-owsec:17001 \
|
||||
--set owsec.configProperties."openwifi\.system\.uri\.ui"=https://webui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owsec.configProperties."mailer\.sender"=sec-${NAMESPACE}@cicd.lab.wlan.tip.build \
|
||||
--set owsec.configProperties."mailer\.enabled"=$MAILER_ENABLED \
|
||||
--set owsec.configProperties."mailer\.username"=$MAILER_USERNAME \
|
||||
--set owsec.configProperties."mailer\.password"=$MAILER_PASSWORD \
|
||||
--set owfms.configProperties."s3\.secret"=${OWFMS_S3_SECRET} \
|
||||
--set owfms.configProperties."s3\.key"=${OWFMS_S3_KEY} \
|
||||
--set owfms.services.owfms.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=fms-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owfms.configProperties."openwifi\.system\.uri\.public"=https://fms-${NAMESPACE}.cicd.lab.wlan.tip.build:16004 \
|
||||
--set owfms.configProperties."openwifi\.system\.uri\.private"=$INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owfms-owfms:17004 \
|
||||
--set owfms.configProperties."openwifi\.system\.uri\.ui"=https://webui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owfms.public_env_variables.OWSEC=sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set owgwui.ingresses.default.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=webui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owgwui.ingresses.default.hosts={webui-${NAMESPACE}.cicd.lab.wlan.tip.build} \
|
||||
--set owgwui.public_env_variables.REACT_APP_UCENTRALSEC_URL=https://sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set owprov.services.owprov.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=prov-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owprov.configProperties."openwifi\.system\.uri\.public"=https://prov-${NAMESPACE}.cicd.lab.wlan.tip.build:16005 \
|
||||
--set owprov.configProperties."openwifi\.system\.uri\.private"=$INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owprov-owprov:17005 \
|
||||
--set owprov.configProperties."openwifi\.system\.uri\.ui"=https://webui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owprov.configProperties."iptocountry\.ipinfo\.token"="${IPTOCOUNTRY_IPINFO_TOKEN}" \
|
||||
--set owprov.public_env_variables.OWSEC=sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set owprovui.ingresses.default.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=provui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owprovui.ingresses.default.hosts={provui-${NAMESPACE}.cicd.lab.wlan.tip.build} \
|
||||
--set owprovui.public_env_variables.REACT_APP_UCENTRALSEC_URL=https://sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set owanalytics.services.owanalytics.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=analytics-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owanalytics.configProperties."openwifi\.system\.uri\.public"=https://analytics-${NAMESPACE}.cicd.lab.wlan.tip.build:16009 \
|
||||
--set owanalytics.configProperties."openwifi\.system\.uri\.private"=$INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owanalytics-owanalytics:17009 \
|
||||
--set owanalytics.configProperties."openwifi\.system\.uri\.ui"=https://webui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owanalytics.public_env_variables.OWSEC=sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set owsub.services.owsub.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=sub-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owsub.configProperties."openwifi\.system\.uri\.public"=https://sub-${NAMESPACE}.cicd.lab.wlan.tip.build:16006 \
|
||||
--set owsub.configProperties."openwifi\.system\.uri\.private"=$INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owsub-owsub:17006 \
|
||||
--set owsub.configProperties."openwifi\.system\.uri\.ui"=https://webui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owsub.public_env_variables.OWSEC=sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set clustersysteminfo.public_env_variables.OWSEC=sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set clustersysteminfo.secret_env_variables.OWSEC_NEW_PASSWORD=${OWSEC_NEW_PASSWORD} \
|
||||
--set owls.services.owls.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=ls-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owls.configProperties."openwifi\.system\.uri\.public"=https://ls-${NAMESPACE}.cicd.lab.wlan.tip.build:16007 \
|
||||
--set owls.configProperties."openwifi\.system\.uri\.private"=$INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owls-owls:17007 \
|
||||
--set owls.configProperties."openwifi\.system\.uri\.ui"=https://webui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owlsui.ingresses.default.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=lsui-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set owlsui.ingresses.default.hosts={lsui-${NAMESPACE}.cicd.lab.wlan.tip.build} \
|
||||
--set owlsui.public_env_variables.REACT_APP_UCENTRALSEC_URL=https://sec-${NAMESPACE}.cicd.lab.wlan.tip.build:16001 \
|
||||
--set owrrm.public_env_variables.SERVICECONFIG_PUBLICENDPOINT=https://rrm-${NAMESPACE}.cicd.lab.wlan.tip.build:16789 \
|
||||
--set owrrm.services.owrrm.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=rrm-${NAMESPACE}.cicd.lab.wlan.tip.build \
|
||||
--set haproxy.service.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=$HAPROXY_SERVICE_DNS_RECORDS \
|
||||
--set owgw.services.owgw.annotations."external-dns\.alpha\.kubernetes\.io/hostname"=$OWGW_SERVICE_DNS_RECORDS \
|
||||
${EXTRA_VALUES_FLAGS[*]} \
|
||||
-f values.custom-${NAMESPACE}.yaml \
|
||||
--set-file owgw.certs."restapi-cert\.pem"=$CERT_LOCATION \
|
||||
--set-file owgw.certs."restapi-key\.pem"=$KEY_LOCATION \
|
||||
--set-file owgw.certs."websocket-cert\.pem"=$CERT_LOCATION \
|
||||
|
||||
@@ -15,11 +15,11 @@ owgwui:
|
||||
ingresses:
|
||||
default:
|
||||
enabled: true
|
||||
className: alb
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: alb
|
||||
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||
alb.ingress.kubernetes.io/group.name: wlan-cicd
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285 # TODO change certificate
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
|
||||
alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}'
|
||||
external-dns.alpha.kubernetes.io/hostname: webui.cicd.lab.wlan.tip.build # TODO change FQDN
|
||||
@@ -65,11 +65,11 @@ owprovui:
|
||||
ingresses:
|
||||
default:
|
||||
enabled: true
|
||||
className: alb
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: alb
|
||||
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||
alb.ingress.kubernetes.io/group.name: wlan-cicd
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285 # TODO change certificate
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
|
||||
alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}'
|
||||
external-dns.alpha.kubernetes.io/hostname: provui.cicd.lab.wlan.tip.build # TODO change FQDN
|
||||
@@ -99,7 +99,7 @@ haproxy:
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "8080"
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285 # TODO change certificate
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16004,17004,16002,16003,17002,16005,17005,16001,17001,5912,5913,16009,16007"
|
||||
service.beta.kubernetes.io/aws-load-balancer-type: nlb-ip
|
||||
external-dns.alpha.kubernetes.io/hostname: "gw.cicd.lab.wlan.tip.build,sec.cicd.lab.wlan.tip.build,fms.cicd.lab.wlan.tip.build,prov.cicd.lab.wlan.tip.build,rtty.cicd.lab.wlan.tip.build,sub.cicd.lab.wlan.tip.build,analytics.cicd.lab.wlan.tip.build,rrm.cicd.lab.wlan.tip.build" # TODO change FQDNs
|
||||
|
||||
128
chart/environment-values/values.custom.tpl.yaml
Normal file
128
chart/environment-values/values.custom.tpl.yaml
Normal file
@@ -0,0 +1,128 @@
|
||||
owgw:
|
||||
services:
|
||||
owgw:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: "$OWGW_SERVICE_DNS_RECORDS"
|
||||
configProperties:
|
||||
openwifi.fileuploader.host.0.name: gw-${NAMESPACE}.${DOMAIN}
|
||||
rtty.server: gw-${NAMESPACE}.${DOMAIN}
|
||||
openwifi.system.uri.public: https://gw-${NAMESPACE}.${DOMAIN}:16002
|
||||
openwifi.system.uri.private: $INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owgw-owgw:17002
|
||||
openwifi.system.uri.ui: https://webui-${NAMESPACE}.${DOMAIN}
|
||||
iptocountry.ipinfo.token: "${IPTOCOUNTRY_IPINFO_TOKEN}"
|
||||
public_env_variables:
|
||||
OWSEC: sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
owsec:
|
||||
configProperties:
|
||||
authentication.default.username: "${OWGW_AUTH_USERNAME}"
|
||||
authentication.default.password: "${OWGW_AUTH_PASSWORD}"
|
||||
openwifi.system.uri.public: https://sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
openwifi.system.uri.private: $INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owsec-owsec:17001
|
||||
openwifi.ystem.uri.ui: https://webui-${NAMESPACE}.${DOMAIN}
|
||||
mailer.sender: "sec-${NAMESPACE}@${DOMAIN}"
|
||||
mailer.enabled: $MAILER_ENABLED
|
||||
mailer.username: "$MAILER_USERNAME"
|
||||
mailer.password: "$MAILER_PASSWORD"
|
||||
services:
|
||||
owsec:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: sec-${NAMESPACE}.${DOMAIN}
|
||||
owfms:
|
||||
configProperties:
|
||||
s3.secret: "${OWFMS_S3_SECRET}"
|
||||
s3.key: "${OWFMS_S3_KEY}"
|
||||
openwifi.system.uri.public: https://fms-${NAMESPACE}.${DOMAIN}:16004
|
||||
openwifi.system.uri.private: $INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owfms-owfms:17004
|
||||
openwifi.system.uri.ui: https://webui-${NAMESPACE}.${DOMAIN}
|
||||
services:
|
||||
owfms:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: fms-${NAMESPACE}.${DOMAIN}
|
||||
public_env_variables:
|
||||
OWSEC: sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
owgwui:
|
||||
ingresses:
|
||||
default:
|
||||
hosts:
|
||||
- webui-${NAMESPACE}.${DOMAIN}
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: webui-${NAMESPACE}.${DOMAIN}
|
||||
public_env_variables:
|
||||
REACT_APP_UCENTRALSEC_URL: https://sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
owprov:
|
||||
services:
|
||||
owprov:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: prov-${NAMESPACE}.${DOMAIN}
|
||||
configProperties:
|
||||
openwifi.system.uri.public: https://prov-${NAMESPACE}.${DOMAIN}:16005
|
||||
openwifi.system.uri.private: $INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owprov-owprov:17005
|
||||
openwifi.system.uri.ui: https://provui-${NAMESPACE}.${DOMAIN}
|
||||
iptocountry.ipinfo.token: "${IPTOCOUNTRY_IPINFO_TOKEN}"
|
||||
public_env_variables:
|
||||
OWSEC: sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
owprovui:
|
||||
ingresses:
|
||||
default:
|
||||
hosts:
|
||||
- provui-${NAMESPACE}.${DOMAIN}
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: provui-${NAMESPACE}.${DOMAIN}
|
||||
public_env_variables:
|
||||
REACT_APP_UCENTRALSEC_URL: https://sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
owanalytics:
|
||||
services:
|
||||
owanalytics:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: analytics-${NAMESPACE}.${DOMAIN}
|
||||
configProperties:
|
||||
openwifi.system.uri.public: https://analytics-${NAMESPACE}.${DOMAIN}:16009
|
||||
openwifi.system.uri.private: $INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owanalytics-owanalytics:17009
|
||||
openwifi.system.uri.ui: https://webui-${NAMESPACE}.${DOMAIN}
|
||||
public_env_variables:
|
||||
OWSEC: sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
owsub:
|
||||
services:
|
||||
owsub:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: sub-${NAMESPACE}.${DOMAIN}
|
||||
configProperties:
|
||||
openwifi.system.uri.public: https://sub-${NAMESPACE}.${DOMAIN}:16006
|
||||
openwifi.system.uri.private: $INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owsub-owsub:17006
|
||||
openwifi.system.uri.ui: https://webui-${NAMESPACE}.${DOMAIN}
|
||||
public_env_variables:
|
||||
OWSEC: sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
clustersysteminfo:
|
||||
public_env_variables:
|
||||
OWSEC: sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
secret_env_variables:
|
||||
OWSEC_NEW_PASSWORD: "${OWSEC_NEW_PASSWORD}"
|
||||
owls:
|
||||
services:
|
||||
owls:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: ls-${NAMESPACE}.${DOMAIN}
|
||||
configProperties:
|
||||
openwifi.system.uri.public: https://ls-${NAMESPACE}.${DOMAIN}:16007
|
||||
openwifi.system.uri.private: $INTERNAL_RESTAPI_ENDPOINT_SCHEMA://owls-owls:17007
|
||||
openwifi.system.uri.ui: https://webui-${NAMESPACE}.${DOMAIN}
|
||||
owlsui:
|
||||
ingresses:
|
||||
default:
|
||||
hosts:
|
||||
- lsui-${NAMESPACE}.${DOMAIN}
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: lsui-${NAMESPACE}.${DOMAIN}
|
||||
public_env_variables:
|
||||
REACT_APP_UCENTRALSEC_URL: https://sec-${NAMESPACE}.${DOMAIN}:16001
|
||||
owrrm:
|
||||
public_env_variables:
|
||||
SERVICECONFIG_PUBLICENDPOINT: https://rrm-${NAMESPACE}.${DOMAIN}:16789
|
||||
services:
|
||||
owrrm:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: rrm-${NAMESPACE}.${DOMAIN}
|
||||
haproxy:
|
||||
service:
|
||||
annotations:
|
||||
external-dns.alpha.kubernetes.io/hostname: "$HAPROXY_SERVICE_DNS_RECORDS"
|
||||
@@ -1,3 +1,4 @@
|
||||
# This helm values file is to be used when OWLS is run in the same namespace.
|
||||
owgw:
|
||||
services:
|
||||
owgw:
|
||||
@@ -7,7 +8,7 @@ owgw:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16102"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16002,16003,17002"
|
||||
|
||||
configProperties:
|
||||
@@ -30,7 +31,6 @@ owgw:
|
||||
postgresql:
|
||||
enabled: true
|
||||
fullnameOverride: owgw-pgsql
|
||||
|
||||
postgresqlDatabase: owgw
|
||||
postgresqlUsername: owgw
|
||||
postgresqlPassword: owgw
|
||||
@@ -46,7 +46,7 @@ owls:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16107"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16007,17007"
|
||||
external-dns.alpha.kubernetes.io/ttl: "60"
|
||||
|
||||
@@ -162,7 +162,145 @@ owlsui:
|
||||
kubernetes.io/ingress.class: alb
|
||||
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||
alb.ingress.kubernetes.io/group.name: wlan-cicd
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
|
||||
alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}'
|
||||
external-dns.alpha.kubernetes.io/ttl: "60"
|
||||
paths:
|
||||
- path: /*
|
||||
serviceName: owlsui
|
||||
servicePort: http
|
||||
|
||||
podAnnotations:
|
||||
cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
|
||||
owls:
|
||||
enabled: true
|
||||
|
||||
services:
|
||||
owls:
|
||||
type: LoadBalancer
|
||||
annotations:
|
||||
service.beta.kubernetes.io/aws-load-balancer-type: "nlb-ip"
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16107"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16007,17007"
|
||||
external-dns.alpha.kubernetes.io/ttl: "60"
|
||||
|
||||
podAnnotations:
|
||||
cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: 6000m
|
||||
memory: 8000Mi
|
||||
limits:
|
||||
cpu: 6000m
|
||||
memory: 8000Mi
|
||||
|
||||
checks:
|
||||
owls:
|
||||
liveness:
|
||||
httpGet:
|
||||
path: /
|
||||
port: 16107
|
||||
failureThreshold: 900
|
||||
readiness:
|
||||
httpGet:
|
||||
path: /
|
||||
port: 16107
|
||||
failureThreshold: 900
|
||||
|
||||
certs:
|
||||
restapi-ca.pem: |
|
||||
-----BEGIN CERTIFICATE-----
|
||||
MIIDojCCAoqgAwIBAgIUPVYBpqNbcLYygF6Mx+qxSWwQyFowDQYJKoZIhvcNAQEL
|
||||
BQAwaTELMAkGA1UEBhMCVVMxJDAiBgNVBAoTG1RlbGVjb20gSW5mcmEgUHJvamVj
|
||||
dCwgSW5jLjEMMAoGA1UECxMDVElQMSYwJAYDVQQDEx1UZWxlY29tIEluZnJhIFBy
|
||||
b2plY3QgUm9vdCBDQTAeFw0yMTA0MTMyMjQyNDRaFw0zMTA0MTMyMjM4NDZaMGkx
|
||||
CzAJBgNVBAYTAlVTMSQwIgYDVQQKExtUZWxlY29tIEluZnJhIFByb2plY3QsIElu
|
||||
Yy4xDDAKBgNVBAsTA1RJUDEmMCQGA1UEAxMdVGVsZWNvbSBJbmZyYSBQcm9qZWN0
|
||||
IFJvb3QgQ0EwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDIGCibwf5u
|
||||
AAwZ+1H8U0e3u2V+0d2gSctucoK86XwUmfe1V2a/qlCYZd29r80IuN1IIeB0naIm
|
||||
KnK/MzXW87clF6tFd1+HzEvmlY/W4KyIXalVCTEzirFSvBEG2oZpM0yC3AefytAO
|
||||
aOpA00LaM3xTfTqMKIRhJBuLy0I4ANUVG6ixVebbGuc78IodleqiLoWy2Q9QHyEO
|
||||
t/7hZndJhiVogh0PveRhho45EbsACu7ymDY+JhlIleevqwlE3iQoq0YcmYADHno6
|
||||
Eq8vcwLpZFxihupUafkd1T3WJYQAJf9coCjBu2qIhNgrcrGD8R9fGswwNRzMRMpX
|
||||
720+GjcDW3bJAgMBAAGjQjBAMA8GA1UdEwEB/wQFMAMBAf8wHQYDVR0OBBYEFAJG
|
||||
lmB5sVP2qfL3xZ8hQOTpkQH6MA4GA1UdDwEB/wQEAwIBhjANBgkqhkiG9w0BAQsF
|
||||
AAOCAQEAVjl9dm4epG9NUYnagT9sg7scVQEPfz3Lt6w1NXJXgD8mAUlK0jXmEyvM
|
||||
dCPD4514n+8+lM7US8fh+nxc7jO//LwK17Wm9FblgjNFR7+anv0Q99T9fP19DLlF
|
||||
PSNHL2emogy1bl1lLTAoj8nxg2wVKPDSHBGviQ5LR9fsWUIJDv9Bs5k0qWugWYSj
|
||||
19S6qnHeskRDB8MqRLhKMG82oDVLerSnhD0P6HjySBHgTTU7/tYS/OZr1jI6MPbG
|
||||
L+/DtiR5fDVMNdBSGU89UNTi0wHY9+RFuNlIuvZC+x/swF0V9R5mN+ywquTPtDLA
|
||||
5IOM7ItsRmen6u3qu+JXros54e4juQ==
|
||||
-----END CERTIFICATE-----
|
||||
|
||||
public_env_variables:
|
||||
SELFSIGNED_CERTS: "true"
|
||||
|
||||
configProperties:
|
||||
openwifi.internal.restapi.host.0.rootca: $OWLS_ROOT/certs/restapi-certs/ca.crt
|
||||
openwifi.internal.restapi.host.0.cert: $OWLS_ROOT/certs/restapi-certs/tls.crt
|
||||
openwifi.internal.restapi.host.0.key: $OWLS_ROOT/certs/restapi-certs/tls.key
|
||||
openwifi.restapi.host.0.rootca: $OWLS_ROOT/certs/restapi-certs/ca.crt
|
||||
openwifi.restapi.host.0.cert: $OWLS_ROOT/certs/restapi-certs/tls.crt
|
||||
openwifi.restapi.host.0.key: $OWLS_ROOT/certs/restapi-certs/tls.key
|
||||
|
||||
volumes:
|
||||
owls:
|
||||
- name: config
|
||||
mountPath: /owls-data/owls.properties
|
||||
subPath: owls.properties
|
||||
# Template below will be rendered in template
|
||||
volumeDefinition: |
|
||||
secret:
|
||||
secretName: {{ include "owls.fullname" . }}-config
|
||||
- name: certs
|
||||
mountPath: /owls-data/certs
|
||||
volumeDefinition: |
|
||||
secret:
|
||||
secretName: {{ include "owls.fullname" . }}-certs
|
||||
- name: certs-cas
|
||||
mountPath: /owls-data/certs/cas
|
||||
volumeDefinition: |
|
||||
secret:
|
||||
secretName: {{ include "owls.fullname" . }}-certs-cas
|
||||
# Change this if you want to use another volume type
|
||||
- name: persist
|
||||
mountPath: /owls-data/persist
|
||||
volumeDefinition: |
|
||||
persistentVolumeClaim:
|
||||
claimName: {{ template "owls.fullname" . }}-pvc
|
||||
|
||||
- name: restapi-certs
|
||||
mountPath: /owls-data/certs/restapi-certs
|
||||
volumeDefinition: |
|
||||
secret:
|
||||
secretName: {{ include "owls.fullname" . }}-owls-restapi-tls
|
||||
- name: restapi-ca
|
||||
mountPath: /usr/local/share/ca-certificates/restapi-ca-selfsigned.crt
|
||||
subPath: ca.crt
|
||||
volumeDefinition: |
|
||||
secret:
|
||||
secretName: {{ include "owls.fullname" . }}-owls-restapi-tls
|
||||
|
||||
owlsui:
|
||||
enabled: true
|
||||
|
||||
services:
|
||||
owlsui:
|
||||
type: NodePort
|
||||
|
||||
ingresses:
|
||||
default:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: alb
|
||||
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||
alb.ingress.kubernetes.io/group.name: wlan-cicd
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
|
||||
alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}'
|
||||
external-dns.alpha.kubernetes.io/ttl: "60"
|
||||
|
||||
@@ -0,0 +1,36 @@
|
||||
# This helm values file is to be used when OWLS is run externally.
|
||||
owgw:
|
||||
services:
|
||||
owgw:
|
||||
type: LoadBalancer
|
||||
annotations:
|
||||
service.beta.kubernetes.io/aws-load-balancer-type: "nlb-ip"
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16102"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16002,16003,17002"
|
||||
|
||||
configProperties:
|
||||
simulatorid: 53494D020202
|
||||
storage.type: postgresql
|
||||
storage.type.postgresql.host: owgw-pgsql
|
||||
storage.type.postgresql.database: owgw
|
||||
storage.type.postgresql.username: owgw
|
||||
storage.type.postgresql.password: owgw
|
||||
openwifi.certificates.allowmismatch: "true"
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: 2000m
|
||||
memory: 3000Mi
|
||||
limits:
|
||||
cpu: 2000m
|
||||
memory: 3000Mi
|
||||
|
||||
postgresql:
|
||||
enabled: true
|
||||
fullnameOverride: owgw-pgsql
|
||||
postgresqlDatabase: owgw
|
||||
postgresqlUsername: owgw
|
||||
postgresqlPassword: owgw
|
||||
@@ -7,7 +7,7 @@ owgw:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16102"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16002,16003,17002,5912,5913"
|
||||
|
||||
owsec:
|
||||
@@ -19,7 +19,7 @@ owsec:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16101"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16001,17001"
|
||||
|
||||
owfms:
|
||||
@@ -31,7 +31,7 @@ owfms:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16104"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16004,17004"
|
||||
|
||||
owprov:
|
||||
@@ -43,7 +43,7 @@ owprov:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16105"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16005,17005"
|
||||
|
||||
owanalytics:
|
||||
@@ -55,7 +55,7 @@ owanalytics:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16109"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16009,17009"
|
||||
|
||||
owsub:
|
||||
@@ -67,7 +67,7 @@ owsub:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16106"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16006,17006"
|
||||
|
||||
haproxy:
|
||||
|
||||
@@ -1,7 +1,8 @@
|
||||
owgw:
|
||||
configProperties:
|
||||
simulatorid: 53494D020202
|
||||
storage.type: postgresql
|
||||
storage.type.postgresql.host: pgsql-pgpool
|
||||
storage.type.postgresql.host: pgsql
|
||||
storage.type.postgresql.database: owgw
|
||||
storage.type.postgresql.username: owgw
|
||||
storage.type.postgresql.password: owgw
|
||||
@@ -9,7 +10,7 @@ owgw:
|
||||
owsec:
|
||||
configProperties:
|
||||
storage.type: postgresql
|
||||
storage.type.postgresql.host: pgsql-pgpool
|
||||
storage.type.postgresql.host: pgsql
|
||||
storage.type.postgresql.database: owsec
|
||||
storage.type.postgresql.username: owsec
|
||||
storage.type.postgresql.password: owsec
|
||||
@@ -17,7 +18,7 @@ owsec:
|
||||
owfms:
|
||||
configProperties:
|
||||
storage.type: postgresql
|
||||
storage.type.postgresql.host: pgsql-pgpool
|
||||
storage.type.postgresql.host: pgsql
|
||||
storage.type.postgresql.database: owfms
|
||||
storage.type.postgresql.username: owfms
|
||||
storage.type.postgresql.password: owfms
|
||||
@@ -25,7 +26,7 @@ owfms:
|
||||
owprov:
|
||||
configProperties:
|
||||
storage.type: postgresql
|
||||
storage.type.postgresql.host: pgsql-pgpool
|
||||
storage.type.postgresql.host: pgsql
|
||||
storage.type.postgresql.database: owprov
|
||||
storage.type.postgresql.username: owprov
|
||||
storage.type.postgresql.password: owprov
|
||||
@@ -33,7 +34,7 @@ owprov:
|
||||
owanalytics:
|
||||
configProperties:
|
||||
storage.type: postgresql
|
||||
storage.type.postgresql.host: pgsql-pgpool
|
||||
storage.type.postgresql.host: pgsql
|
||||
storage.type.postgresql.database: owanalytics
|
||||
storage.type.postgresql.username: owanalytics
|
||||
storage.type.postgresql.password: owanalytics
|
||||
@@ -41,15 +42,37 @@ owanalytics:
|
||||
owsub:
|
||||
configProperties:
|
||||
storage.type: postgresql
|
||||
storage.type.postgresql.host: pgsql-pgpool
|
||||
storage.type.postgresql.host: pgsql
|
||||
storage.type.postgresql.database: owsub
|
||||
storage.type.postgresql.username: owsub
|
||||
storage.type.postgresql.password: owsub
|
||||
|
||||
postgresql-ha:
|
||||
postgresql:
|
||||
enabled: true
|
||||
initDbScriptSecret:
|
||||
enabled: true
|
||||
initdbScriptsSecret: tip-openwifi-initdb-scripts
|
||||
volumePermissions:
|
||||
enabled: true
|
||||
global:
|
||||
postgresql:
|
||||
auth:
|
||||
postgresPassword: postgres
|
||||
auth:
|
||||
postgresPassword: postgres
|
||||
primary:
|
||||
extendedConfiguration: |-
|
||||
max_connections = 550
|
||||
shared_buffers = 128MB
|
||||
# log_error_verbosity = verbose
|
||||
initdb:
|
||||
scriptsSecret: tip-openwifi-initdb-scripts
|
||||
|
||||
postgresql-ha:
|
||||
enabled: false
|
||||
initDbScriptSecret:
|
||||
enabled: false
|
||||
initdbScriptsSecret: tip-openwifi-initdb-scripts
|
||||
pgpool:
|
||||
adminPassword: admin
|
||||
resources:
|
||||
@@ -61,11 +84,12 @@ postgresql-ha:
|
||||
memory: 1024Mi
|
||||
initdbScriptsSecret: tip-openwifi-initdb-scripts
|
||||
postgresql:
|
||||
replicaCount: 1 # TODO change after tests
|
||||
password: password
|
||||
replicaCount: 1
|
||||
password: postgres
|
||||
postgresPassword: postgres
|
||||
repmgrPassword: repmgr
|
||||
maxConnections: 1000
|
||||
|
||||
resources:
|
||||
requests:
|
||||
cpu: 250m
|
||||
|
||||
@@ -17,20 +17,20 @@ owgw:
|
||||
cpu: 2000m
|
||||
memory: 2Gi
|
||||
|
||||
securityContext:
|
||||
sysctls:
|
||||
- name: net.ipv4.tcp_keepalive_intvl
|
||||
value: "5"
|
||||
- name: net.ipv4.tcp_keepalive_probes
|
||||
value: "2"
|
||||
- name: net.ipv4.tcp_keepalive_time
|
||||
value: "45"
|
||||
# securityContext:
|
||||
# sysctls:
|
||||
# - name: net.ipv4.tcp_keepalive_intvl
|
||||
# value: "5"
|
||||
# - name: net.ipv4.tcp_keepalive_probes
|
||||
# value: "2"
|
||||
# - name: net.ipv4.tcp_keepalive_time
|
||||
# value: "45"
|
||||
|
||||
podAnnotations:
|
||||
cluster-autoscaler.kubernetes.io/safe-to-evict: "false"
|
||||
|
||||
podSecurityPolicy:
|
||||
enabled: true
|
||||
# podSecurityPolicy:
|
||||
# enabled: true
|
||||
|
||||
certs:
|
||||
restapi-ca.pem: |
|
||||
@@ -357,10 +357,9 @@ owgwui:
|
||||
default:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: alb
|
||||
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||
alb.ingress.kubernetes.io/group.name: wlan-cicd
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
|
||||
alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}'
|
||||
paths:
|
||||
@@ -425,6 +424,8 @@ owfms:
|
||||
|
||||
public_env_variables:
|
||||
SELFSIGNED_CERTS: "true"
|
||||
# This has no effect as template based config is not enabled (see configProperties)
|
||||
FIRMWAREDB_MAXAGE: "360"
|
||||
|
||||
configProperties:
|
||||
openwifi.internal.restapi.host.0.rootca: $OWFMS_ROOT/certs/restapi-certs/ca.crt
|
||||
@@ -433,6 +434,7 @@ owfms:
|
||||
openwifi.restapi.host.0.rootca: $OWFMS_ROOT/certs/restapi-certs/ca.crt
|
||||
openwifi.restapi.host.0.cert: $OWFMS_ROOT/certs/restapi-certs/tls.crt
|
||||
openwifi.restapi.host.0.key: $OWFMS_ROOT/certs/restapi-certs/tls.key
|
||||
firmwaredb.maxage: 360
|
||||
|
||||
volumes:
|
||||
owfms:
|
||||
@@ -519,6 +521,7 @@ owprov:
|
||||
openwifi.restapi.host.0.rootca: $OWPROV_ROOT/certs/restapi-certs/ca.crt
|
||||
openwifi.restapi.host.0.cert: $OWPROV_ROOT/certs/restapi-certs/tls.crt
|
||||
openwifi.restapi.host.0.key: $OWPROV_ROOT/certs/restapi-certs/tls.key
|
||||
rrm.providers: owrrm
|
||||
|
||||
volumes:
|
||||
owprov:
|
||||
@@ -561,10 +564,9 @@ owprovui:
|
||||
default:
|
||||
enabled: true
|
||||
annotations:
|
||||
kubernetes.io/ingress.class: alb
|
||||
alb.ingress.kubernetes.io/scheme: internet-facing
|
||||
alb.ingress.kubernetes.io/group.name: wlan-cicd
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285
|
||||
alb.ingress.kubernetes.io/certificate-arn: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
alb.ingress.kubernetes.io/listen-ports: '[{"HTTP": 80}, {"HTTPS": 443}]'
|
||||
alb.ingress.kubernetes.io/actions.ssl-redirect: '{"Type": "redirect", "RedirectConfig": { "Protocol": "HTTPS", "Port": "443", "StatusCode": "HTTP_302"}}'
|
||||
paths:
|
||||
@@ -752,8 +754,8 @@ owrrm:
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "16789"
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: tcp
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16789,17007"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: "arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16789,16790"
|
||||
|
||||
resources:
|
||||
requests:
|
||||
@@ -842,18 +844,18 @@ clustersysteminfo:
|
||||
haproxy:
|
||||
resources:
|
||||
requests:
|
||||
cpu: 10m
|
||||
memory: 20Mi
|
||||
cpu: 50m
|
||||
memory: 50Mi
|
||||
limits:
|
||||
cpu: 10m
|
||||
memory: 20Mi
|
||||
cpu: 50m
|
||||
memory: 50Mi
|
||||
service:
|
||||
annotations:
|
||||
service.beta.kubernetes.io/aws-load-balancer-backend-protocol: ssl
|
||||
service.beta.kubernetes.io/aws-load-balancer-healthcheck-port: "8080"
|
||||
service.beta.kubernetes.io/aws-load-balancer-scheme: internet-facing
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:us-east-2:289708231103:certificate/bfa89c7a-5b64-4a8a-bcfe-ffec655b5285
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16004,17004,16002,16003,17002,16005,17005,5913,16001,17001,16009,16007,16006,17006"
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-cert: arn:aws:acm:ap-south-1:289708231103:certificate/2cc8c764-11fd-411d-bf7d-a93f488f3f6c
|
||||
service.beta.kubernetes.io/aws-load-balancer-ssl-ports: "16004,17004,16002,16003,17002,16005,17005,5913,16001,17001,16009,16006,17006"
|
||||
service.beta.kubernetes.io/aws-load-balancer-type: nlb-ip
|
||||
|
||||
restapiCerts:
|
||||
|
||||
13
chart/templates/_initdb_sql.tpl
Normal file
13
chart/templates/_initdb_sql.tpl
Normal file
@@ -0,0 +1,13 @@
|
||||
{{- define "openwifi.user_creation_script_sql" -}}
|
||||
{{- $root := . -}}
|
||||
{{- $postgresqlBase := index .Values "postgresql" }}
|
||||
{{- $postgresqlEmulatedRoot := (dict "Values" $postgresqlBase "Chart" (dict "Name" "postgresql") "Release" $.Release) }}
|
||||
{{ range index .Values "postgresql" "initDbScriptSecret" "services" }}
|
||||
CREATE USER {{ index $root "Values" . "configProperties" "storage.type.postgresql.username" }};
|
||||
ALTER USER {{ index $root "Values" . "configProperties" "storage.type.postgresql.username" }} WITH ENCRYPTED PASSWORD '{{ index $root "Values" . "configProperties" "storage.type.postgresql.password" }}';
|
||||
CREATE DATABASE {{ index $root "Values" . "configProperties" "storage.type.postgresql.database" }};
|
||||
GRANT ALL PRIVILEGES ON DATABASE {{ index $root "Values" . "configProperties" "storage.type.postgresql.database" }} TO {{ index $root "Values" . "configProperties" "storage.type.postgresql.username" }};
|
||||
ALTER DATABASE {{ index $root "Values" . "configProperties" "storage.type.postgresql.database" }} OWNER TO {{ index $root "Values" . "configProperties" "storage.type.postgresql.username" }};
|
||||
{{ end }}
|
||||
{{- end -}}
|
||||
|
||||
@@ -1,16 +0,0 @@
|
||||
{{- $root := . -}}
|
||||
{{- if index .Values "postgresql-ha" "initDbScriptSecret" "enabled" }}
|
||||
---
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
labels:
|
||||
app.kuberentes.io/name: {{ include "openwifi.name" . }}
|
||||
helm.sh/chart: {{ include "openwifi.chart" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||
name: {{ include "openwifi.fullname" . }}-initdb-scripts
|
||||
kind: Secret
|
||||
type: Opaque
|
||||
data:
|
||||
users_creation.sh: {{ include "openwifi.user_creation_script" . | b64enc | quote }}
|
||||
{{- end }}
|
||||
31
chart/templates/secret-postgresql-initdb.yaml
Normal file
31
chart/templates/secret-postgresql-initdb.yaml
Normal file
@@ -0,0 +1,31 @@
|
||||
{{- $root := . -}}
|
||||
{{- if index .Values "postgresql-ha" "initDbScriptSecret" "enabled" }}
|
||||
---
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
labels:
|
||||
app.kubernetes.io/name: {{ include "openwifi.name" . }}
|
||||
helm.sh/chart: {{ include "openwifi.chart" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||
name: {{ include "openwifi.fullname" . }}-initdb-scripts
|
||||
kind: Secret
|
||||
type: Opaque
|
||||
data:
|
||||
users_creation.sh: {{ include "openwifi.user_creation_script" . | b64enc | quote }}
|
||||
{{- end }}
|
||||
{{- if index .Values "postgresql" "initDbScriptSecret" "enabled" }}
|
||||
---
|
||||
apiVersion: v1
|
||||
metadata:
|
||||
labels:
|
||||
app.kubernetes.io/name: {{ include "openwifi.name" . }}
|
||||
helm.sh/chart: {{ include "openwifi.chart" . }}
|
||||
app.kubernetes.io/instance: {{ .Release.Name }}
|
||||
app.kubernetes.io/managed-by: {{ .Release.Service }}
|
||||
name: {{ include "openwifi.fullname" . }}-initdb-scripts
|
||||
kind: Secret
|
||||
type: Opaque
|
||||
data:
|
||||
initdb.sql: {{ include "openwifi.user_creation_script_sql" . | b64enc | quote }}
|
||||
{{- end }}
|
||||
@@ -1,7 +1,6 @@
|
||||
# OpenWIFI Gateway (https://github.com/Telecominfraproject/wlan-cloud-ucentralgw/)
|
||||
owgw:
|
||||
fullnameOverride: owgw
|
||||
|
||||
configProperties:
|
||||
openwifi.kafka.enable: "true"
|
||||
openwifi.kafka.brokerlist: kafka:9092
|
||||
@@ -9,7 +8,6 @@ owgw:
|
||||
# OpenWIFI Security (https://github.com/Telecominfraproject/wlan-cloud-ucentralsec)
|
||||
owsec:
|
||||
fullnameOverride: owsec
|
||||
|
||||
configProperties:
|
||||
openwifi.kafka.enable: "true"
|
||||
openwifi.kafka.brokerlist: kafka:9092
|
||||
@@ -17,7 +15,6 @@ owsec:
|
||||
# OpenWIFI Firmware (https://github.com/Telecominfraproject/wlan-cloud-ucentralfms)
|
||||
owfms:
|
||||
fullnameOverride: owfms
|
||||
|
||||
configProperties:
|
||||
openwifi.kafka.enable: "true"
|
||||
openwifi.kafka.brokerlist: kafka:9092
|
||||
@@ -25,7 +22,6 @@ owfms:
|
||||
# OpenWIFI Provisioning (https://github.com/Telecominfraproject/wlan-cloud-owprov/)
|
||||
owprov:
|
||||
fullnameOverride: owprov
|
||||
|
||||
configProperties:
|
||||
openwifi.kafka.enable: "true"
|
||||
openwifi.kafka.brokerlist: kafka:9092
|
||||
@@ -33,7 +29,6 @@ owprov:
|
||||
# OpenWIFI Analytics (https://github.com/Telecominfraproject/wlan-cloud-analytics)
|
||||
owanalytics:
|
||||
fullnameOverride: owanalytics
|
||||
|
||||
configProperties:
|
||||
openwifi.kafka.enable: "true"
|
||||
openwifi.kafka.brokerlist: kafka:9092
|
||||
@@ -49,7 +44,6 @@ owprovui:
|
||||
# OpenWIFI Subscription (https://github.com/Telecominfraproject/wlan-cloud-userportal/)
|
||||
owsub:
|
||||
fullnameOverride: owsub
|
||||
|
||||
configProperties:
|
||||
openwifi.kafka.enable: "true"
|
||||
openwifi.kafka.brokerlist: kafka:9092
|
||||
@@ -57,23 +51,18 @@ owsub:
|
||||
# OpenWIFI radio resource management (https://github.com/Telecominfraproject/wlan-cloud-rrm/)
|
||||
owrrm:
|
||||
fullnameOverride: owrrm
|
||||
|
||||
mysql:
|
||||
enabled: true
|
||||
|
||||
# kafka (https://github.com/bitnami/charts/blob/master/bitnami/kafka/)
|
||||
kafka:
|
||||
enabled: true
|
||||
|
||||
fullnameOverride: kafka
|
||||
|
||||
image:
|
||||
registry: docker.io
|
||||
repository: bitnami/kafka
|
||||
tag: 2.8.0-debian-10-r43
|
||||
|
||||
minBrokerId: 100
|
||||
|
||||
zookeeper:
|
||||
fullnameOverride: zookeeper
|
||||
|
||||
@@ -81,11 +70,10 @@ kafka:
|
||||
clustersysteminfo:
|
||||
enabled: false
|
||||
delay: 0 # number of seconds to delay clustersysteminfo execution
|
||||
|
||||
images:
|
||||
clustersysteminfo:
|
||||
repository: tip-tip-wlan-cloud-ucentral.jfrog.io/clustersysteminfo
|
||||
tag: main
|
||||
tag: v3.0.0
|
||||
pullPolicy: Always
|
||||
# regcred:
|
||||
# registry: tip-tip-wlan-cloud-ucentral.jfrog.io
|
||||
@@ -103,23 +91,17 @@ clustersysteminfo:
|
||||
# limits:
|
||||
# cpu: 100m
|
||||
# memory: 128Mi
|
||||
|
||||
nodeSelector: {}
|
||||
|
||||
tolerations: []
|
||||
|
||||
affinity: {}
|
||||
|
||||
public_env_variables:
|
||||
FLAGS: "-s --connect-timeout 3"
|
||||
OWSEC: owsec-owsec:16001
|
||||
CHECK_RETRIES: 30
|
||||
|
||||
secret_env_variables:
|
||||
OWSEC_DEFAULT_USERNAME: tip@ucentral.com
|
||||
OWSEC_DEFAULT_PASSWORD: openwifi
|
||||
#OWSEC_NEW_PASSWORD: "" # Set this value in order for the check to work. Password must comply https://github.com/Telecominfraproject/wlan-cloud-ucentralsec/#authenticationvalidationexpression
|
||||
|
||||
activeDeadlineSeconds: 2400
|
||||
backoffLimit: 5
|
||||
restartPolicy: OnFailure
|
||||
@@ -127,9 +109,7 @@ clustersysteminfo:
|
||||
# OpenWIFI Load Simulator (https://github.com/Telecominfraproject/wlan-cloud-owls)
|
||||
owls:
|
||||
enabled: false
|
||||
|
||||
fullnameOverride: owls
|
||||
|
||||
configProperties:
|
||||
openwifi.kafka.enable: "true"
|
||||
openwifi.kafka.brokerlist: kafka:9092
|
||||
@@ -137,17 +117,13 @@ owls:
|
||||
# OpenWIFI Load Simulator UI (https://github.com/Telecominfraproject/wlan-cloud-owls-ui)
|
||||
owlsui:
|
||||
enabled: false
|
||||
|
||||
fullnameOverride: owlsui
|
||||
|
||||
# HAproxy (https://github.com/bitnami/charts/tree/master/bitnami/haproxy)
|
||||
haproxy:
|
||||
enabled: true
|
||||
|
||||
fullnameOverride: proxy
|
||||
|
||||
replicaCount: 3
|
||||
|
||||
replicaCount: 1
|
||||
service:
|
||||
type: LoadBalancer
|
||||
ports:
|
||||
@@ -428,7 +404,6 @@ haproxy:
|
||||
# Cert-manager RESTAPI certs
|
||||
restapiCerts:
|
||||
enabled: false
|
||||
|
||||
services:
|
||||
- owgw-owgw
|
||||
- owsec-owsec
|
||||
@@ -438,9 +413,22 @@ restapiCerts:
|
||||
- owanalytics-owanalytics
|
||||
- owsub-owsub
|
||||
- owrrm-owrrm
|
||||
|
||||
clusterDomain: cluster.local
|
||||
|
||||
postgresql:
|
||||
enabled: false
|
||||
nameOverride: pgsql
|
||||
fullnameOverride: pgsql
|
||||
initDbScriptSecret:
|
||||
enabled: false
|
||||
services:
|
||||
- owgw
|
||||
- owsec
|
||||
- owfms
|
||||
- owprov
|
||||
- owanalytics
|
||||
- owsub
|
||||
|
||||
postgresql-ha:
|
||||
enabled: false
|
||||
nameOverride: pgsql
|
||||
|
||||
@@ -1,19 +1,20 @@
|
||||
# Image tags
|
||||
COMPOSE_PROJECT_NAME=openwifi
|
||||
OWGW_TAG=master
|
||||
OWGWUI_TAG=main
|
||||
OWSEC_TAG=main
|
||||
OWFMS_TAG=main
|
||||
OWPROV_TAG=main
|
||||
OWPROVUI_TAG=main
|
||||
OWANALYTICS_TAG=main
|
||||
OWSUB_TAG=main
|
||||
KAFKA_TAG=latest
|
||||
|
||||
OWGW_TAG=v3.0.2-RC1
|
||||
OWGWUI_TAG=v3.0.2-RC1
|
||||
OWSEC_TAG=v3.0.2-RC1
|
||||
OWFMS_TAG=v3.0.2-RC1
|
||||
OWPROV_TAG=v3.0.2-RC1
|
||||
OWPROVUI_TAG=v3.0.2-RC1
|
||||
OWANALYTICS_TAG=v3.0.2-RC1
|
||||
OWSUB_TAG=v3.0.2-RC1
|
||||
KAFKA_TAG=2.8.0-debian-10-r43
|
||||
ZOOKEEPER_TAG=3.8
|
||||
POSTGRESQL_TAG=15.0
|
||||
MYSQL_TAG=latest
|
||||
# NOTE currently OWRRM is only supported in LB installations
|
||||
#OWRRM_TAG=main
|
||||
#OWRRM_TAG=v2.8.0
|
||||
|
||||
# Microservice root/config directories
|
||||
OWGW_ROOT=/owgw-data
|
||||
|
||||
@@ -1,15 +1,16 @@
|
||||
# Image tags
|
||||
COMPOSE_PROJECT_NAME=openwifi
|
||||
OWGW_TAG=master
|
||||
OWGWUI_TAG=main
|
||||
OWSEC_TAG=main
|
||||
OWFMS_TAG=main
|
||||
OWPROV_TAG=main
|
||||
OWPROVUI_TAG=main
|
||||
OWANALYTICS_TAG=main
|
||||
OWSUB_TAG=main
|
||||
OWRRM_TAG=main
|
||||
KAFKA_TAG=latest
|
||||
|
||||
OWGW_TAG=v3.0.0
|
||||
OWGWUI_TAG=v3.0.0
|
||||
OWSEC_TAG=v3.0.0
|
||||
OWFMS_TAG=v3.0.0
|
||||
OWPROV_TAG=v3.0.0
|
||||
OWPROVUI_TAG=v3.0.0
|
||||
OWANALYTICS_TAG=v3.0.0
|
||||
OWSUB_TAG=v3.0.0
|
||||
OWRRM_TAG=v2.8.0
|
||||
KAFKA_TAG=2.8.0-debian-10-r43
|
||||
ZOOKEEPER_TAG=3.8
|
||||
ACMESH_TAG=latest
|
||||
TRAEFIK_TAG=latest
|
||||
|
||||
@@ -1,15 +1,16 @@
|
||||
# Image tags
|
||||
COMPOSE_PROJECT_NAME=openwifi
|
||||
OWGW_TAG=master
|
||||
OWGWUI_TAG=main
|
||||
OWSEC_TAG=main
|
||||
OWFMS_TAG=main
|
||||
OWPROV_TAG=main
|
||||
OWPROVUI_TAG=main
|
||||
OWANALYTICS_TAG=main
|
||||
OWSUB_TAG=main
|
||||
OWRRM_TAG=main
|
||||
KAFKA_TAG=latest
|
||||
|
||||
OWGW_TAG=v3.0.0
|
||||
OWGWUI_TAG=v3.0.0
|
||||
OWSEC_TAG=v3.0.0
|
||||
OWFMS_TAG=v3.0.0
|
||||
OWPROV_TAG=v3.0.0
|
||||
OWPROVUI_TAG=v3.0.0
|
||||
OWANALYTICS_TAG=v3.0.0
|
||||
OWSUB_TAG=v3.0.0
|
||||
OWRRM_TAG=v2.8.0
|
||||
KAFKA_TAG=2.8.0-debian-10-r43
|
||||
ZOOKEEPER_TAG=3.8
|
||||
ACMESH_TAG=latest
|
||||
TRAEFIK_TAG=latest
|
||||
|
||||
@@ -39,6 +39,12 @@ services:
|
||||
image: "postgres:${POSTGRESQL_TAG}"
|
||||
networks:
|
||||
openwifi:
|
||||
command:
|
||||
- "postgres"
|
||||
- "-c"
|
||||
- "max_connections=400"
|
||||
- "-c"
|
||||
- "shared_buffers=20MB"
|
||||
env_file:
|
||||
- postgresql.env
|
||||
restart: unless-stopped
|
||||
|
||||
@@ -1,3 +1,3 @@
|
||||
KAFKA_CFG_ZOOKEEPER_CONNECT=zookeeper:2181
|
||||
ALLOW_PLAINTEXT_LISTENER=yes
|
||||
TOPICS=command connection device_event_queue device telemetry healthcheck provisioning_change service_events state wifiscan
|
||||
TOPICS=command connection device_event_queue device telemetry healthcheck provisioning_change service_events state wifiscan rrm
|
||||
|
||||
@@ -3,7 +3,7 @@ COMPOSE_PROJECT_NAME=owls
|
||||
OWSEC_TAG=main
|
||||
OWLS_TAG=main
|
||||
OWLSUI_TAG=master
|
||||
KAFKA_TAG=latest
|
||||
KAFKA_TAG=2.8.0-debian-10-r43
|
||||
ZOOKEEPER_TAG=latest
|
||||
|
||||
# Microservice root/config directories
|
||||
|
||||
Reference in New Issue
Block a user