# ============LICENSE_START======================================================= # Copyright (C) 2022 Bell Canada. All rights reserved. # Modifications Copyright © 2022 Nordix Foundation # ================================================================================ # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. # # SPDX-License-Identifier: Apache-2.0 # ============LICENSE_END========================================================= spring: security: user: name: "${RESTSERVER_USER}" password: "${RESTSERVER_PASSWORD}" http: converters: preferred-json-mapper: gson datasource: {{ if not .Values.global.postgres.localCluster }} url: jdbc:mariadb://{{ .Values.db.service.name }}:{{ .Values.db.service.internalPort }}/policyadmin driverClassName: org.mariadb.jdbc.Driver username: "${SQL_USER}" password: "${SQL_PASSWORD}" hikari: maximumPoolSize: 20 jpa: properties: hibernate: dialect: org.hibernate.dialect.MariaDB103Dialect hibernate: ddl-auto: none naming: physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy {{- else }} url: jdbc:postgresql://{{ .Values.db.service.pgName }}:{{ .Values.db.service.internalPgPort }}/policyadmin driverClassName: org.postgresql.Driver username: "${SQL_USER}" password: "${SQL_PASSWORD}" hikari: connectionTimeout: 30000 idleTimeout: 600000 maxLifetime: 1800000 maximumPoolSize: 10 jpa: hibernate: ddl-auto: none naming: physical-strategy: org.hibernate.boot.model.naming.PhysicalNamingStrategyStandardImpl implicit-strategy: org.onap.policy.common.spring.utils.CustomImplicitNamingStrategy properties: hibernate: dialect: org.hibernate.dialect.PostgreSQLDialect format_sql: true {{ end }} server: port: 6969 ssl: enabled: false servlet: context-path: /policy/pap/v1 pap: name: PapGroup aaf: false topic: {{ if .Values.global.useStrimziKafkaPf }} pdp-pap.name: {{ .Values.config.kafka.topics.policyPdpPap }} notification.name: {{ .Values.config.kafka.topics.policyNotification }} heartbeat.name: {{ .Values.config.kafka.topics.policyHeartbeat }} {{ else }} pdp-pap.name: {{ .Values.dmaap.topics.policyPdpPap }} notification.name: {{ .Values.dmaap.topics.policyNotification }} heartbeat.name: {{ .Values.dmaap.topics.policyHeartbeat }} {{ end }} pdpParameters: heartBeatMs: 120000 updateParameters: maxRetryCount: 1 maxWaitMs: 30000 stateChangeParameters: maxRetryCount: 1 maxWaitMs: 30000 savePdpStatisticsInDb: true topicParameterGroup: topicSources: - useHttps: false fetchTimeout: 15000 {{ if .Values.global.useStrimziKafkaPf }} topic: {{ .Values.config.kafka.topics.policyPdpPap }} servers: - {{ include "common.release" . }}-strimzi-kafka-bootstrap:9092 topicCommInfrastructure: kafka additionalProps: group.id : {{ .Values.config.kafka.consumer.groupId }} security.protocol: SASL_PLAINTEXT sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }} sasl.jaas.config: ${JAASLOGIN} {{ else }} topic: {{ .Values.dmaap.topics.policyPdpPap }} servers: - ${topicServer:message-router} topicCommInfrastructure: dmaap {{ end }} - useHttps: false fetchTimeout: 15000 {{ if .Values.global.useStrimziKafkaPf }} topic: {{ .Values.config.kafka.topics.policyHeartbeat }} effectiveTopic: {{ .Values.config.kafka.topics.policyPdpPap }} servers: - {{ include "common.release" . }}-strimzi-kafka-bootstrap:9092 topicCommInfrastructure: kafka additionalProps: group.id : {{ .Values.config.kafka.consumer.groupId }} security.protocol: SASL_PLAINTEXT sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }} sasl.jaas.config: ${JAASLOGIN} {{ else }} topic: {{ .Values.dmaap.topics.policyHeartbeat }} effectiveTopic: {{ .Values.dmaap.topics.policyPdpPap }} servers: - ${topicServer:message-router} topicCommInfrastructure: dmaap {{ end }} topicSinks: - useHttps: false {{ if .Values.global.useStrimziKafkaPf }} topic: {{ .Values.config.kafka.topics.policyPdpPap }} servers: - {{ include "common.release" . }}-strimzi-kafka-bootstrap:9092 topicCommInfrastructure: kafka additionalProps: group.id : {{ .Values.config.kafka.consumer.groupId }} security.protocol: SASL_PLAINTEXT sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }} sasl.jaas.config: ${JAASLOGIN} {{ else }} topic: {{ .Values.dmaap.topics.policyPdpPap }} servers: - ${topicServer:message-router} topicCommInfrastructure: dmaap {{ end }} - useHttps: false {{ if .Values.global.useStrimziKafkaPf }} topic: {{ .Values.config.kafka.topics.policyNotification }} servers: - {{ include "common.release" . }}-strimzi-kafka-bootstrap:9092 topicCommInfrastructure: kafka additionalProps: group.id : {{ .Values.config.kafka.consumer.groupId }} security.protocol: SASL_PLAINTEXT sasl.mechanism: {{ .Values.kafkaUser.authenticationType | upper }} sasl.jaas.config: ${JAASLOGIN} {{ else }} topic: {{ .Values.dmaap.topics.policyNotification }} servers: - ${topicServer:message-router} topicCommInfrastructure: dmaap {{ end }} # If Strimzi Kafka to be used for communication, replace following configuration for topicSources and topicSinks # servers: # - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092 # topicCommInfrastructure: kafka # additionalProps: # security.protocol: SASL_PLAINTEXT # sasl.mechanism: SCRAM-SHA-512 # sasl.jaas.config: ${JAASLOGIN} healthCheckRestClientParameters: - clientName: api hostname: policy-api port: 6969 userName: "${API_USER}" password: "${API_PASSWORD}" useHttps: false basePath: policy/api/v1/healthcheck - clientName: distribution hostname: policy-distribution port: 6969 userName: "${DISTRIBUTION_USER}" password: "${DISTRIBUTION_PASSWORD}" useHttps: false basePath: healthcheck management: endpoints: web: base-path: / exposure: include: health, metrics, prometheus path-mapping.prometheus: metrics