<modelVersion>4.0.0</modelVersion>
<groupId>org.onap.dmaap.messagerouter.msgrtr</groupId>
<artifactId>msgrtr</artifactId>
- <version>1.1.9-SNAPSHOT</version>
+ <version>1.1.10-SNAPSHOT</version>
<packaging>jar</packaging>
<name>dmaap-messagerouter-msgrtr</name>
<description>Message Router - Restful interface built for kafka</description>
}
-
+ if(Utils.isCadiEnabled()){
transferSetting( props, "sasl.jaas.config", "org.apache.kafka.common.security.plain.PlainLoginModule required username='admin' password='"+Utils.getKafkaproperty()+"';");
transferSetting( props, "security.protocol", "SASL_PLAINTEXT");
- transferSetting( props, "sasl.mechanism", "PLAIN");
+ transferSetting( props, "sasl.mechanism", "PLAIN");
+ }
transferSetting( props, "bootstrap.servers",kafkaConnUrl);
transferSetting( props, "request.required.acks", "1");
props.put("group.id", fakeGroupName);
props.put("enable.auto.commit", "false"); // 0.11
props.put("bootstrap.servers", fkafkaBrokers);
+ if(Utils.isCadiEnabled()){
props.put("sasl.jaas.config", "org.apache.kafka.common.security.plain.PlainLoginModule required username='admin' password='"+Utils.getKafkaproperty()+"';");
props.put("security.protocol", "SASL_PLAINTEXT");
props.put("sasl.mechanism", "PLAIN");
-
+ }
props.put("client.id", consumerId);
// additional settings: start with our defaults, then pull in configured
}
props.put(AdminClientConfig.BOOTSTRAP_SERVERS_CONFIG, fkafkaBrokers );
+ if(Utils.isCadiEnabled()){
props.put("sasl.jaas.config", "org.apache.kafka.common.security.plain.PlainLoginModule required username='admin' password='"+Utils.getKafkaproperty()+"';");
props.put(AdminClientConfig.SECURITY_PROTOCOL_CONFIG, "SASL_PLAINTEXT");
props.put("sasl.mechanism", "PLAIN");
+ }
fKafkaAdminClient=AdminClient.create ( props );
fkafkaBrokers = "localhost:9092";
}
-
+ if(Utils.isCadiEnabled()){
props.put("sasl.jaas.config", "org.apache.kafka.common.security.plain.PlainLoginModule required username='admin' password='"+Utils.getKafkaproperty()+"';");
props.put(AdminClientConfig.SECURITY_PROTOCOL_CONFIG, "SASL_PLAINTEXT");
props.put("sasl.mechanism", "PLAIN");
+ }
props.put(AdminClientConfig.BOOTSTRAP_SERVERS_CONFIG, fkafkaBrokers );
fKafkaAdminClient=AdminClient.create ( props );
import com.att.dmf.mr.security.DMaaPAuthenticatorImpl;
import com.att.dmf.mr.service.TopicService;
import com.att.dmf.mr.utils.DMaaPResponseBuilder;
+import com.att.dmf.mr.utils.Utils;
import com.att.eelf.configuration.EELFLogger;
import com.att.eelf.configuration.EELFManager;
import com.att.nsa.configs.ConfigDbException;
// else if (user==null &&
// (null==dmaapContext.getRequest().getHeader("Authorization") && null
// == dmaapContext.getRequest().getHeader("cookie")) ) {
- else if (user == null && null == dmaapContext.getRequest().getHeader("Authorization")
+ else if (Utils.isCadiEnabled()&&user == null && null == dmaapContext.getRequest().getHeader("Authorization")
&& (null == appName && null == dmaapContext.getRequest().getHeader("cookie"))) {
LOGGER.error("Failed to create topic" + topicBean.getTopicName() + ", Authentication failed.");
}
+
+ public static boolean isCadiEnabled(){
+ boolean enableCadi=false;
+ if(System.getenv("enableCadi")!=null){
+ enableCadi=Boolean.getBoolean(System.getenv("enableCadi"));
+ }
+
+ return enableCadi;
+ }
+
}
major=1
minor=1
-patch=9
+patch=10
base_version=${major}.${minor}.${patch}