3 # ============LICENSE_START==========================================
5 # ===================================================================
6 # Copyright © 2018 AT&T Intellectual Property. All rights reserved.
7 # ===================================================================
8 # Licensed under the Apache License, Version 2.0 (the "License");
9 # you may not use this file except in compliance with the License.
10 # You may obtain a copy of the License at
12 # http://www.apache.org/licenses/LICENSE-2.0
14 # Unless required by applicable law or agreed to in writing, software
15 # distributed under the License is distributed on an "AS IS" BASIS,
16 # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
17 # See the License for the specific language governing permissions and
18 # limitations under the License.
19 # ============LICENSE_END============================================
20 # ECOMP is a trademark and service mark of AT&T Intellectual Property.
23 # Configuration parameters fixed at startup for the DMaaP Bus Controller
26 # URI to retrieve dynamic DR configuration
29 ProvisioningURI: /internal/prov
31 # Allow http access to API
35 # The port number for http as seen within the server
39 # The port number for https as seen within the server
40 # Set to 0 if no certificate is available yet...
44 # The external port number for https taking port mapping into account
48 # The type of keystore for https
52 # The path to the keystore for https
54 KeyStoreFile: etc/keystore
56 # The password for the https keystore
58 KeyStorePassword: changeit
60 # The password for the private key in the https keystore
64 # The type of truststore for https
68 # The path to the truststore for https
70 TrustStoreFile: ${DMAAPBC_TSTOREFILE}
72 # The password for the https truststore
74 TrustStorePassword: changeit
76 # The path to the file used to trigger an orderly shutdown
78 QuiesceFile: etc/SHUTDOWN
84 # The host for postgres access
92 # Name of this environment
96 # Name of DR prov server
98 DR.provhost: localhost
100 # handling of feed delete
101 # DeleteOnDR - means use the DR API to DELETE a feed. (default for backwards compatibility)
102 # SimulateDelete - means preserve the feed on DR (after cleaning it up), and mark as DELETED in DBCL. Better for cfy environments
103 Feed.deleteHandling: DeleteOnDR
105 ################################################################################
106 # MR Related Properties:
108 # Value of the CNAME DNS entry which resolves to the primary central MR cluster (when there are more than one central clusters).
109 # if there is only one MR cluster in an environment, set this to the DNS name for that cluster
111 MR.CentralCname: notSet.onap.org
113 # MR Client Delete Level thoroughness:
115 # 1 = delete from persistent store
116 # 2 = delete from persistent store (DB) and authorization store (AAF)
117 MR.ClientDeleteLevel: 1
119 # MR Topic Factory Namespace
121 MR.TopicFactoryNS: org.onap.dmaap.mr.topicFactory
124 MR.TopicMgrRole: org.onap.dmaap-bc.TopicMgr
126 # MR topic name style
127 MR.topicStyle: FQTN_LEGACY_FORMAT
134 # end of MR Related Properties
135 ################################################################################
138 # The Role and credentials of the MirrorMaker Provisioner. This is used by DMaaP Bus Controller to pub to the provisioning topic
141 MM.ProvRole: org.onap.dmaapBC.MMprov.prov
142 MM.ProvUserMechId: idNotSet@namespaceNotSet
143 MM.ProvUserPwd: pwdNotSet
145 # The Role of the MirrorMaker Agent. This is used by MM to sub to provisioning topic
147 MM.AgentRole: org.onap.dmaapBC.MMagent.agent
151 # regarding password encryption:
152 # In the dependencies that Maven retrieves (e.g., under dcae_dmaapbc/target/deps/ is a jar file cadi-core-version.jar. Generate the key file with:
154 # java \u2013jar wherever/cadi-core-*.jar keygen keyfilename
155 # chmod 400 keyfilename
159 # java \u2013jar wherever/cadi-core-*.jar digest password-to-encrypt keyfilename
161 # This will generate a string. Put \u201Cenc:\u201D on the front of the string, and put the result in this properties file.
163 # Location of the Codec Keyfile which is used to decrypt passwords in this properties file before they are passed to AAF
165 # REF: https://wiki.domain.notset.com/display/cadi/CADI+Deployment
167 CredentialCodecKeyfile: etc/LocalKey
169 # This overrides the Class used for Decryption.
170 # This allows for a plugin encryption/decryption method if needed.
171 # Call this Class for decryption at runtime.
172 #AafDecryption.Class: com.company.proprietaryDecryptor
175 # This overrides the Class used for API Permission check.
176 # This allows for a plugin policy check, if needed
177 #ApiPermission.Class: com.company.policy.DecisionPolicy
180 # URL of AAF environment to use.
182 aaf.URL: https://localhost:8095/proxy/
184 # TopicMgr mechid@namespace
186 aaf.TopicMgrUser: idNotSet@namespaceNotSet
190 aaf.TopicMgrPassword: pwdNotSet
192 # Bus Controller Namespace Admin mechid@namespace
194 aaf.AdminUser: idNotSet@namespaceNotSet
196 # Bus Controller Namespace Admin password
198 aaf.AdminPassword: pwdNotSet
200 # endof AAF Properties
203 # PolicyEngine Properties
205 # Flag to turn on/off Authentication
208 # Argument to decisionAttributes.put("AAF_ENVIRONMENT", X);
209 # where X is: TEST= UAT, PROD = PROD, DEVL = TEST
211 PeAafEnvironment: DEVL
212 PeAafUrl.DEVL: https://localhost:8095/proxy/
213 PeAafUrl.TEST: https://aafist..onap.org:8095/proxy/
214 PeAafUrl.PROD: https://aafprod.onap.org:8095/proxy/
217 # Name of PolicyEngineApi properties file
218 PolicyEngineProperties: config/PolicyEngineApi.properties
220 # Namespace for URI values for API used to create AAF permissions
221 # e.g. if ApiNamespace is X.Y..dmaapBC.api then for URI /topics we create an AAF perm X.Y..dmaapBC.api.topics
222 ApiNamespace: org.onap.dmaapBC.api
224 # endof PolicyEngineProperties