fixes for sonar vulnerabilities
[dmaap/messagerouter/msgrtr.git] / src / main / java / com / att / dmf / mr / backends / kafka / KafkaPublisher.java
index 9543828..f5751f0 100644 (file)
@@ -35,6 +35,7 @@ import org.springframework.beans.factory.annotation.Qualifier;
 
 import com.att.dmf.mr.backends.Publisher;
 import com.att.dmf.mr.constants.CambriaConstants;
+import com.att.dmf.mr.utils.Utils;
 //import org.slf4j.Logger;
 //import org.slf4j.LoggerFactory;
 import com.att.eelf.configuration.EELFLogger;
@@ -42,10 +43,6 @@ import com.att.eelf.configuration.EELFManager;
 import com.att.nsa.drumlin.till.nv.rrNvReadable;
 
 
-//import kafka.javaapi.producer.Producer;
-//import kafka.producer.KeyedMessage;
-//import kafka.producer.ProducerConfig;
-//import kafka.producer.KeyedMessage;
 
 /**
  * Sends raw JSON objects into Kafka.
@@ -77,10 +74,11 @@ public class KafkaPublisher implements Publisher {
                        kafkaConnUrl="localhost:9092";
                }
                
-        //     props.put("bootstrap.servers", bootSever);
-       //System.setProperty("java.security.auth.login.config",jaaspath);
        
-               
+           
+               transferSetting( props, "sasl.jaas.config", "org.apache.kafka.common.security.plain.PlainLoginModule required username='admin' password='"+Utils.getKafkaproperty()+"';");
+               transferSetting( props, "security.protocol", "SASL_PLAINTEXT");
+               transferSetting( props, "sasl.mechanism", "PLAIN");             
                transferSetting( props, "bootstrap.servers",kafkaConnUrl);
                        
                transferSetting( props, "request.required.acks", "1");
@@ -93,7 +91,7 @@ public class KafkaPublisher implements Publisher {
                 props.put("value.serializer", "org.apache.kafka.common.serialization.StringSerializer");
 
                
-               //fProducer = new Producer<String, String>(fConfig);
+               
                fProducer = new KafkaProducer<>(props);
        }