blob: d013ca3d941ca5af08c361470acf0685f18cb468 [file] [log] [blame]
cat <<!EOF
#
# ============LICENSE_START==========================================
# org.onap.dmaap
# ===================================================================
# Copyright © 2018 AT&T Intellectual Property. All rights reserved.
# ===================================================================
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
# ============LICENSE_END============================================
# ECOMP is a trademark and service mark of AT&T Intellectual Property.
#
#
#
# Configuration parameters fixed at startup for the DMaaP Bus Controller
#
# CSIT TESTING
csit: ${DMAAPBC_CSIT:-No}
#
# URI to retrieve dynamic DR configuration
#
ProvisioningURI: ${DMAAPBC_INTURI:-/internal/prov}
#
# Allow http access to API
#
HttpAllowed: ${DMAAPBC_HTTPALLOWED:-true}
#
# The port number for http as seen within the server
#
IntHttpPort: ${DMAAPBC_INT_HTTP_PORT:-8080}
#
# The port number for https as seen within the server
# Set to 0 if no certificate is available yet...
#
IntHttpsPort: ${DMAAPBC_INT_HTTPS_PORT:-8443}
#
# The external port number for https taking port mapping into account
#
ExtHttpsPort: ${DMAAPBC_EXT_HTTPS_PORT:-443}
#
# The type of keystore for https
#
KeyStoreType: jks
#
# The path to the keystore for https
#
KeyStoreFile: ${DMAAPBC_KSTOREFILE:-etc/keystore}
#
# The password for the https keystore (remember to put password in "" and escape $ characters)
#
KeyStorePassword: ${DMAAPBC_KSTOREPASS:-"Y@Y5f&gm?PAz,CVQL,lk[VAF"}
#
# The password for the private key in the https keystore (remember to put password in "" and escape $ characters)
#
KeyPassword: ${DMAAPBC_PVTKEYPASS:-"Y@Y5f&gm?PAz,CVQL,lk[VAF"}
#
# The type of truststore for https
#
TrustStoreType: jks
#
# The path to the truststore for https
#
TrustStoreFile: ${DMAAPBC_TSTOREFILE:-etc/org.onap.dmaap-bc.trust.jks}
#
# The password for the https truststore (remember to put password in "" and escape $ characters)
#
TrustStorePassword: ${DMAAPBC_TSTOREPASS:-"8b&R5%l\$l:@jSWz@FCs;rhY*"}
#
# The path to the file used to trigger an orderly shutdown
#
QuiesceFile: etc/SHUTDOWN
#
# Enable postgress
#
UsePGSQL: ${DMAAPBC_PG_ENABLED:-false}
#
# The host for postgres access
#
DB.host: ${DMAAPBC_PGHOST:-HostNotSet}
#
# For postgres access
#
DB.cred: ${DMAAPBC_PGCRED:-ValueNotSet}
#
# Name of this environment
#
DmaapName: ${DMAAPBC_INSTANCE_NAME:-demo}
#
# Name of DR prov server
#
DR.provhost: ${DMAAPBC_DRPROV_FQDN:-dcae-drps.domain.notset.com}
#
# handling of feed delete
# DeleteOnDR - means use the DR API to DELETE a feed. (default for backwards compatibility)
# SimulateDelete - means preserve the feed on DR (after cleaning it up), and mark as DELETED in DBCL. Better for cfy environments
Feed.deleteHandling: ${DMAAPBC_FEED_DELETE:-DeleteOnDR}
################################################################################
# MR Related Properties:
#
# ONAP Beijing and Casablanca are a single site deployment.
MR.multisite: false
#
# Value of the CNAME DNS entry which resolves to the primary central MR cluster (when there are more than one central clusters).
# if there is only one MR cluster in an environment, set this to the DNS name for that cluster
#
MR.CentralCname: ${DMAAPBC_MR_CNAME:-message-router}
#
# MR Client Delete Level thoroughness:
# 0 = don't delete
# 1 = delete from persistent store
# 2 = delete from persistent store (DB) and authorization store (AAF)
MR.ClientDeleteLevel: 1
#
# MR Topic Factory Namespace
#
MR.TopicFactoryNS: org.onap.dcae.dmaap.topicFactory
#
# MR TopicMgr Role
MR.TopicMgrRole: org.onap.dmaap-bc-topic-mgr.client
# MR topic name style
MR.topicStyle: FQTN_LEGACY_FORMAT
# MR topic ProjectID
MR.projectID: 23456
#
# end of MR Related Properties
################################################################################
#
# The Role and credentials of the MirrorMaker Provisioner. This is used by DMaaP Bus Controller to pub to the provisioning topic
# Not part of 1701
#
MM.ProvRole: ${DMAAPBC_MMPROV_ROLE:-org.onap.dmaap-bc-mm-prov.prov}
MM.ProvUserMechId: ${DMAAPBC_MMPROV_ID:-dmaap-bc-mm-prov@dmaap-bc-mm-prov.onap.org}
MM.ProvUserPwd: ${DMAAPBC_MMPROV_PWD:-demo123456!}
#
# The Role of the MirrorMaker Agent. This is used by MM to sub to provisioning topic
#
MM.AgentRole: ${DMAAPBC_MMAGENT_ROLE:-org.onap.dmaap-bc-mm-prov.agent}
#################
#
# CADI settings
#
# flag indication if CADI filtering is used
enableCADI: ${DMAAPBC_ENABLE_CADI:-false}
#
# path to CADI properties
cadi.properties: /opt/app/osaaf/local/org.onap.dmaap-bc.props
#################
# AAF Properties:
UseAAF: ${DMAAPBC_USEAAF:-false}
#
# regarding password encryption:
# In the dependencies that Maven retrieves (e.g., under dcae_dmaapbc/target/deps/ is a jar file cadi-core-version.jar. Generate the key file with:
#
# java \u2013jar wherever/cadi-core-*.jar keygen keyfilename
# chmod 400 keyfilename
#
# To encrypt a key:
#
# java \u2013jar wherever/cadi-core-*.jar digest password-to-encrypt keyfilename
#
# This will generate a string. Put \u201Cenc:\u201D on the front of the string, and put the result in this properties file.
#
# Location of the Codec Keyfile which is used to decrypt passwords in this properties file before they are passed to AAF
#
# REF: https://wiki.domain.notset.com/display/cadi/CADI+Deployment
#
CredentialCodecKeyfile: ${DMAAPBC_CODEC_KEYFILE:-etc/LocalKey}
#
# This overrides the Class used for Decryption.
# This allows for a plugin encryption/decryption method if needed.
# Call this Class for decryption at runtime.
#AafDecryption.Class: com.company.proprietaryDecryptor
#
# This overrides the Class used for API Permission check.
# This allows for a plugin policy check, if needed
ApiPermission.Class: org.onap.dmaap.dbcapi.authentication.AllowAll
# Namespace for URI values for API used to create AAF permissions
# e.g. if ApiNamespace is X.Y..dmaapBC.api then for URI /topics we create an AAF perm X.Y..dmaapBC.api.topics
ApiNamespace: ${DMAAPBC_API_NAMESPACE:-org.onap.dmaap-bc.api}
#
# URL of AAF environment to use.
#
aaf.URL: ${DMAAPBC_AAF_URL:-https://aaf-onap-test.osaaf.org:8100}
#
# TopicMgr mechid@namespace
#
aaf.TopicMgrUser: ${DMAAPBC_TOPICMGR_USER:-dmaap-bc-topic-mgr@dmaap-bc-topic-mgr.onap.org}
#
# TopicMgr password
#
aaf.TopicMgrPassword: ${DMAAPBC_TOPICMGR_PWD:-enc:l0ScEojNQiiKbbkuM6U1mtnrme69q960}
#
# Bus Controller Namespace Admin mechid@namespace
#
aaf.AdminUser: ${DMAAPBC_ADMIN_USER:-aaf_admin@people.osaag.org}
#
# Bus Controller Namespace Admin password
#
aaf.AdminPassword: ${DMAAPBC_ADMIN_PWD:-demo123456!}
#
# endof AAF Properties
#################
!EOF