JAVA_HOME=/usr/lib/jvm/java-8-openjdk-amd64
POLICY_HOME=/opt/app/policy
KEYSTORE_PASSWD=PolicyR0ck$
+KEY_PASSWD=PolicyR0ck$
+TRUSTSTORE_PASSWD=PolicyR0ck$
JDBC_DRIVER=org.mariadb.jdbc.Driver
JDBC_URL=jdbc:mariadb://mariadb:3306/ecomp_sdk
jmx_fqdn=
ENVIRONMENT=TEST
+
+#Micro Service Model Properties
+policy_msEcompName=
+policy_msPolicyName=
\ No newline at end of file
CLIENT_ID=PyPDPServer
CLIENT_KEY=test
ENVIRONMENT=TEST
+
+#Notification Properties... type can be either websocket, ueb, or dmaap
+BRMS_NOTIFICATION_TYPE=websocket
+BRMS_UEB_URL=
+BRMS_UEB_TOPIC=
+BRMS_UEB_DELAY=
+BRMS_CLIENT_ID=
+BRMS_CLIENT_KEY=
+BRMS_UEB_API_KEY=
+BRMS_UEB_API_SECRET=
+
ecomp_smtp_port=25
ecomp_smtp_userName=
ecomp_smtp_password=
+ecomp_smtp_emailExtension=
ecomp_application_name=
#-----------------------ECOMP-PORTAL-Properties----------------------
ECOMP_UEB_APP_MAILBOX_NAME=
APP_DISPLAY_NAME=OpenECOMP Policy
ECOMP_SHARED_CONTEXT_REST_URL=http://portal.api.simpledemo.openecomp.org:8989/ECOMPPORTAL/context
-
-#Add the Rest PAP url and pap auth password on adding delimiter @Auth@
-
-REST_PAPURL_WITH_AUTH_PASSWORD=http://policy.api.simpledemo.openecomp.org:9091/pap/@Auth@dGVzdHBhcDphbHBoYTEyMw==
#! /bin/bash
-
-# config directory may contain an ip_addr.txt file that specifies
-# the VM IP address. Substitute this value in the URL in the
-# config.json file, overriding the hostname that came from the
-# REST_PAPURL_WITH_AUTH_PASSWORD property in console.conf. This is
-# to avoid hardcoding an IP address in console.conf that can change
-# from one VM instance to the next.
-
-if [[ -f config/ip_addr.txt ]]; then
- vm_ip=$(<config/ip_addr.txt)
- echo "Substituting VM IP address $vm_ip in console config.json file"
- sed -i -e "s@http:.*:@http://$vm_ip:@" \
- $POLICY_HOME/servers/console/webapps/ecomp/app/policyApp/Properties/config.json
-fi
resource_name=pdp_1
dependency_groups=pdplp_1;pypdp_1;brmsgw_1
test_via_jmx=true
+
+#
+# Notification Properties
+# Notifcation type: websocket, ueb or dmaap... if left blank websocket is the default
+PDP_NOTIFICATION_TYPE=websocket,UEB
+PDP_UEB_CLUSTER=
+PDP_UEB_TOPIC=
+PDP_UEB_DELAY=
+PDP_UEB_API_KEY=
+PDP_UEB_API_SECRET=
+PDP_DMAAP_AAF_LOGIN=
+PDP_DMAAP_AAF_PASSWORD=
+
+#AAF Policy Name space
+#Required only, when we use AAF
+POLICY_AAF_NAMESPACE=
+POLICY_AAF_RESOURCE=
\ No newline at end of file
"policyName": "vFirewall",
"policyScope": "com",
"policyType": "MicroService"
-}' 'http://pypdp:8480/PyPDPServer/pushPolicy'
+}' 'http://pdp:8081/pdp/api/pushPolicy'
sleep 2
"policyName": "vLoadBalancer",
"policyScope": "com",
"policyType": "MicroService"
-}' 'http://pypdp:8480/PyPDPServer/pushPolicy'
+}' 'http://pdp:8081/pdp/api/pushPolicy'
sleep 2
curl -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHJlc3Q6M2MwbXBVI2gwMUBOMWMz' --header 'Environment: TEST' -d '{
"policyName": "BRMSParamvLBDemoPolicy",
"policyScope": "com",
"policyType": "BRMS_Param"
-}' 'http://pypdp:8480/PyPDPServer/pushPolicy'
+}' 'http://pdp:8081/pdp/api/pushPolicy'
sleep 2
"policyName": "BRMSParamvFWDemoPolicy",
"policyScope": "com",
"policyType": "BRMS_Param"
-}' 'http://pypdp:8480/PyPDPServer/pushPolicy'
+}' 'http://pdp:8081/pdp/api/pushPolicy'
sleep 2
"pdpGroup": "default",
"policyComponent": "PDP",
"policyName": "com.Config_BRMS_Param_BRMSParamvFWDemoPolicy.1.xml"
-}' 'http://pypdp:8480/PyPDPServer/deletePolicy'
+}' 'http://pdp:8081/pdp/api/deletePolicy'
"pdpGroup": "default",
"policyComponent": "PDP",
"policyName": "com.Config_BRMS_Param_BRMSParamvLBDemoPolicy.1.xml"
-}' 'http://pypdp:8480/PyPDPServer/deletePolicy'
+}' 'http://pdp:8081/pdp/api/deletePolicy'
sleep 2
curl -X PUT --header 'Content-Type: application/json' --header 'Accept: text/plain' --header 'ClientAuth: cHl0aG9uOnRlc3Q=' --header 'Authorization: Basic dGVzdHJlc3Q6M2MwbXBVI2gwMUBOMWMz' --header 'Environment: TEST' -d '{
"policyName": "BRMSParamvLBDemoPolicy",
"policyScope": "com",
"policyType": "BRMS_Param"
-}' 'http://pypdp:8480/PyPDPServer/pushPolicy'
+}' 'http://pdp:8081/pdp/api/pushPolicy'
sleep 2
"policyName": "BRMSParamvFWDemoPolicy",
"policyScope": "com",
"policyType": "BRMS_Param"
-}' 'http://pypdp:8480/PyPDPServer/pushPolicy'
+}' 'http://pdp:8081/pdp/api/pushPolicy'
+++ /dev/null
-#! /bin/bash
-
-
+++ /dev/null
-# pypdp component installation configuration parameters
-
-# tomcat specific parameters
-
-TOMCAT_JMX_PORT=9994
-TOMCAT_SHUTDOWN_PORT=8405
-SSL_HTTP_CONNECTOR_PORT=8480
-SSL_AJP_CONNECTOR_PORT=8384
-SSL_AJP_CONNECTOR_REDIRECT_PORT=8443
-
-TOMCAT_X_MS_MB=1024
-TOMCAT_X_MX_MB=1024
-
-# pypdp parameters
-
-PDP_URL=http://pdp:8081/pdp/,testpdp,alpha123
-PAP_URL=http://pap:9091/pap/,testpap,alpha123
-PYPDP_ID=testrest
-PYPDP_PASSWORD=3c0mpU#h01@N1c3
-
-node_type=pypdp
-# the java property is RESOURCE_NAME (uppercase), but the conf parameter is lowercase
-resource_name=pypdp_1
-
-CLIENT_FILE=client.properties
command: pdp
volumes:
- ./config/pe:/tmp/policy-install/config
- pypdp:
- image: onap/policy/policy-pe
- container_name: pypdp
- depends_on:
- - pap
- hostname: pypdp
- ports:
- - "8480:8480"
- command: pypdp
- volumes:
- - ./config/pe:/tmp/policy-install/config
brmsgw:
image: onap/policy/policy-pe
container_name: brmsgw
pdp)
comps="base pdp pdplp"
;;
-pypdp)
- comps="base pypdp"
- ;;
brmsgw)
comps="base brmsgw"
;;
*)
- echo "Usage: do-start.sh pap|pdp|pypdp|brmsgw" >&2
+ echo "Usage: do-start.sh pap|pdp|brmsgw" >&2
exit 1
esac
policy.sh start
-# on pap, wait for pap, pdp, pypdp, brmsgw, and nexus up,
+# on pap, wait for pap, pdp, brmsgw, and nexus up,
# then push the initial default policies
if [[ $container == pap ]]; then
./wait-for-port.sh pap 9091
./wait-for-port.sh pdp 8081
- ./wait-for-port.sh pypdp 8480
# brmsgw doesn't have a REST API, so check for JMX port instead
./wait-for-port.sh brmsgw 9989
./wait-for-port.sh nexus 8081
function usage() {
echo -n "syntax: $(basename $0) "
echo -n "--debug ("
- echo -n "[--install base|pap|pdp|pypdp|console|mysql|brmsgw|paplp|pdplp] | "
- echo -n "[--configure base|pap|pdp|pypdp|console|mysql|brmsgw|paplp|pdplp] | "
+ echo -n "[--install base|pap|pdp|console|mysql|brmsgw|paplp|pdplp] | "
+ echo -n "[--configure base|pap|pdp|console|mysql|brmsgw|paplp|pdplp] | "
}
function check_java() {
paplp) ;;
pdplp) ;;
skip) ;;
- *) echo "invalid component type (${COMPONENT_TYPE}): must be in {base|pypdp|pdp|pap|console|mysql|brmsgw|paplp|pdplp}";
+ *) echo "invalid component type (${COMPONENT_TYPE}): must be in {base|pdp|pap|console|mysql|brmsgw|paplp|pdplp}";
usage
exit 1
;;
base)
install_base
;;
- pypdp)
- install_tomcat_component
- ;;
pdp)
install_tomcat_component
;;
install_logparser
;;
*)
- echo "invalid component type (${COMPONENT_TYPE}): must be in {base|pypdp|pdp|pap|console|mysql|brmsgw|paplp|pdplp}";
+ echo "invalid component type (${COMPONENT_TYPE}): must be in {base|pdp|pap|console|mysql|brmsgw|paplp|pdplp}";
usage
exit 1
;;
configure_base
component_preconfigure
;;
- pypdp)
- configure_component "${COMPONENT_TYPE}.conf" "${POLICY_HOME}/servers/${COMPONENT_TYPE}/"
- ;;
pdp)
configure_component "${COMPONENT_TYPE}.conf" "${POLICY_HOME}/servers/${COMPONENT_TYPE}/"
;;
configure_component "${COMPONENT_TYPE}.conf" "${POLICY_HOME}/servers/${COMPONENT_TYPE}/"
;;
*)
- echo "invalid component type (${COMPONENT_TYPE}): must be in {base|pypdp|pdp|pap|console|mysql|brmsgw|paplp|pdplp}";
+ echo "invalid component type (${COMPONENT_TYPE}): must be in {base|pdp|pap|console|mysql|brmsgw|paplp|pdplp}";
usage
exit 1
;;