3 # ============LICENSE_START==========================================
5 # ===================================================================
6 # Copyright © 2018 AT&T Intellectual Property. All rights reserved.
7 # ===================================================================
8 # Licensed under the Apache License, Version 2.0 (the "License");
9 # you may not use this file except in compliance with the License.
10 # You may obtain a copy of the License at
12 # http://www.apache.org/licenses/LICENSE-2.0
14 # Unless required by applicable law or agreed to in writing, software
15 # distributed under the License is distributed on an "AS IS" BASIS,
16 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 # See the License for the specific language governing permissions and
18 # limitations under the License.
19 # ============LICENSE_END============================================
20 # ECOMP is a trademark and service mark of AT&T Intellectual Property.
24 # Configuration parameters fixed at startup for the DMaaP Bus Controller
27 csit: ${DMAAPBC_CSIT:-No}
30 # URI to retrieve dynamic DR configuration
32 ProvisioningURI: ${DMAAPBC_INTURI:-/internal/prov}
34 # Allow http access to API
36 HttpAllowed: ${DMAAPBC_HTTPALLOWED:-true}
38 # The port number for http as seen within the server
40 IntHttpPort: ${DMAAPBC_INT_HTTP_PORT:-8080}
42 # The port number for https as seen within the server
43 # Set to 0 if no certificate is available yet...
45 IntHttpsPort: ${DMAAPBC_INT_HTTPS_PORT:-8443}
47 # The external port number for https taking port mapping into account
49 ExtHttpsPort: ${DMAAPBC_EXT_HTTPS_PORT:-443}
51 # The type of keystore for https
55 # The path to the keystore for https
57 KeyStoreFile: ${DMAAPBC_KSTOREFILE:-etc/keystore}
59 # The password for the https keystore (remember to put password in "" and escape $ characters)
61 KeyStorePassword: ${DMAAPBC_KSTOREPASS:-"Y@Y5f&gm?PAz,CVQL,lk[VAF"}
63 # The password for the private key in the https keystore (remember to put password in "" and escape $ characters)
65 KeyPassword: ${DMAAPBC_PVTKEYPASS:-"Y@Y5f&gm?PAz,CVQL,lk[VAF"}
67 # The type of truststore for https
71 # The path to the truststore for https
73 TrustStoreFile: ${DMAAPBC_TSTOREFILE:-etc/org.onap.dmaap-bc.trust.jks}
75 # The password for the https truststore (remember to put password in "" and escape $ characters)
77 TrustStorePassword: ${DMAAPBC_TSTOREPASS:-"8b&R5%l\$l:@jSWz@FCs;rhY*"}
79 # The path to the file used to trigger an orderly shutdown
81 QuiesceFile: etc/SHUTDOWN
85 UsePGSQL: ${DMAAPBC_PG_ENABLED:-false}
87 # The host for postgres access
89 DB.host: ${DMAAPBC_PGHOST:-HostNotSet}
93 DB.cred: ${DMAAPBC_PGCRED:-ValueNotSet}
95 # Name of this environment
97 DmaapName: ${DMAAPBC_INSTANCE_NAME:-demo}
99 # Name of DR prov server
101 DR.provhost: ${DMAAPBC_DRPROV_FQDN:-dcae-drps.domain.notset.com}
103 # handling of feed delete
104 # DeleteOnDR - means use the DR API to DELETE a feed. (default for backwards compatibility)
105 # SimulateDelete - means preserve the feed on DR (after cleaning it up), and mark as DELETED in DBCL. Better for cfy environments
106 Feed.deleteHandling: ${DMAAPBC_FEED_DELETE:-DeleteOnDR}
108 ################################################################################
109 # MR Related Properties:
111 # ONAP Beijing and Casablanca are a single site deployment.
114 # Value of the CNAME DNS entry which resolves to the primary central MR cluster (when there are more than one central clusters).
115 # if there is only one MR cluster in an environment, set this to the DNS name for that cluster
117 MR.CentralCname: ${DMAAPBC_MR_CNAME:-message-router}
119 # MR Client Delete Level thoroughness:
121 # 1 = delete from persistent store
122 # 2 = delete from persistent store (DB) and authorization store (AAF)
123 MR.ClientDeleteLevel: 1
125 # MR Topic Factory Namespace
127 MR.TopicFactoryNS: org.onap.dcae.dmaap.topicFactory
130 MR.TopicMgrRole: org.onap.dmaap-bc-topic-mgr.client
132 # MR topic name style
133 MR.topicStyle: FQTN_LEGACY_FORMAT
138 # end of MR Related Properties
139 ################################################################################
142 # The Role and credentials of the MirrorMaker Provisioner. This is used by DMaaP Bus Controller to pub to the provisioning topic
145 MM.ProvRole: ${DMAAPBC_MMPROV_ROLE:-org.onap.dmaap-bc-mm-prov.prov}
146 MM.ProvUserMechId: ${DMAAPBC_MMPROV_ID:-dmaap-bc-mm-prov@dmaap-bc-mm-prov.onap.org}
147 MM.ProvUserPwd: ${DMAAPBC_MMPROV_PWD:-demo123456!}
149 # The Role of the MirrorMaker Agent. This is used by MM to sub to provisioning topic
151 MM.AgentRole: ${DMAAPBC_MMAGENT_ROLE:-org.onap.dmaap-bc-mm-prov.agent}
156 # flag indication if CADI filtering is used
157 enableCADI: ${DMAAPBC_ENABLE_CADI:-false}
159 # path to CADI properties
160 cadi.properties: /opt/app/osaaf/local/org.onap.dmaap-bc.props
164 UseAAF: ${DMAAPBC_USEAAF:-false}
166 # regarding password encryption:
167 # In the dependencies that Maven retrieves (e.g., under dcae_dmaapbc/target/deps/ is a jar file cadi-core-version.jar. Generate the key file with:
169 # java \u2013jar wherever/cadi-core-*.jar keygen keyfilename
170 # chmod 400 keyfilename
174 # java \u2013jar wherever/cadi-core-*.jar digest password-to-encrypt keyfilename
176 # This will generate a string. Put \u201Cenc:\u201D on the front of the string, and put the result in this properties file.
178 # Location of the Codec Keyfile which is used to decrypt passwords in this properties file before they are passed to AAF
180 # REF: https://wiki.domain.notset.com/display/cadi/CADI+Deployment
182 CredentialCodecKeyfile: ${DMAAPBC_CODEC_KEYFILE:-etc/LocalKey}
184 # This overrides the Class used for Decryption.
185 # This allows for a plugin encryption/decryption method if needed.
186 # Call this Class for decryption at runtime.
187 #AafDecryption.Class: com.company.proprietaryDecryptor
190 # This overrides the Class used for API Permission check.
191 # This allows for a plugin policy check, if needed
192 ApiPermission.Class: org.onap.dmaap.dbcapi.authentication.AllowAll
194 # Namespace for URI values for API used to create AAF permissions
195 # e.g. if ApiNamespace is X.Y..dmaapBC.api then for URI /topics we create an AAF perm X.Y..dmaapBC.api.topics
196 ApiNamespace: ${DMAAPBC_API_NAMESPACE:-org.onap.dmaap-bc.api}
198 # URL of AAF environment to use.
200 aaf.URL: ${DMAAPBC_AAF_URL:-https://aaf-onap-test.osaaf.org:8100}
202 # TopicMgr mechid@namespace
204 aaf.TopicMgrUser: ${DMAAPBC_TOPICMGR_USER:-dmaap-bc-topic-mgr@dmaap-bc-topic-mgr.onap.org}
208 aaf.TopicMgrPassword: ${DMAAPBC_TOPICMGR_PWD:-enc:l0ScEojNQiiKbbkuM6U1mtnrme69q960}
210 # Bus Controller Namespace Admin mechid@namespace
212 aaf.AdminUser: ${DMAAPBC_ADMIN_USER:-aaf_admin@people.osaag.org}
214 # Bus Controller Namespace Admin password
216 aaf.AdminPassword: ${DMAAPBC_ADMIN_PWD:-demo123456!}
220 # endof AAF Properties