| {{/* |
| # Copyright © 2018 AT&T, Amdocs, Bell Canada Intellectual Property. All rights reserved. |
| # |
| # Licensed under the Apache License, Version 2.0 (the "License"); |
| # you may not use this file except in compliance with the License. |
| # You may obtain a copy of the License at |
| # |
| # http://www.apache.org/licenses/LICENSE-2.0 |
| # |
| # Unless required by applicable law or agreed to in writing, software |
| # distributed under the License is distributed on an "AS IS" BASIS, |
| # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| # See the License for the specific language governing permissions and |
| # limitations under the License. |
| */}} |
| ##################################################### |
| # |
| # Hooks for specific environment configurations |
| # |
| ##################################################### |
| # Indicator for whether to use AAF for authentication |
| UseAAF: false |
| |
| ##################################################### |
| # |
| # HTTP Server Configuration |
| # |
| ##################################################### |
| |
| # Allow http access to dbcapi |
| HttpAllowed: true |
| |
| # listen to http port within this container (server) |
| IntHttpPort: 8080 |
| |
| # listen to https port within this container (server) |
| # set to 0 if no certificates are available. |
| IntHttpsPort: 0 |
| |
| ##################################################### |
| # |
| # Settings for Southbound API: Datarouter |
| # |
| ##################################################### |
| # URI to retrieve dynamic DR configuration |
| ProvisioningURI: /internal/prov |
| |
| # indicator for handling feed delete: |
| # DeleteOnDR - means use the DR API to DELETE a feed. (default for backwards compatibility) |
| # SimulateDelete - means preserve the feed on DR (after cleaning it up), and mark as DELETED in DBCL. Better for cloudify environments. |
| Feed.deleteHandling: DeleteOnDR |
| |
| ##################################################### |
| # |
| # Settings for Soutbound API: Postgresql |
| # |
| ##################################################### |
| # flag indicates if we are using postgresql or an in memory db |
| UsePGSQL: {{ .Values.usePostgres }} |
| |
| # postgres host name |
| # Need to connect to PG primary service, designated by service.name2 |
| DB.host: {{ .Values.postgres.service.name2 }} |
| |
| # postgres schema name |
| #DB.schema: {{ .Values.postgres.config.pgDatabase }} |
| # postgres user name |
| DB.user: ${PG_USER} |
| |
| # postgres user password |
| DB.cred: ${PG_PASSWORD} |
| |
| ##################################################### |
| # |
| # Settings for Soutbound API: Message Router |
| # |
| ##################################################### |
| # indicator for multi-site (locations) deployment. Give clue to buscontroller whether |
| # there is a need for message replication between edge and central. |
| # ONAP Casablanca is a single site deployment |
| MR.multisite: false |
| |
| # FQDN of primary message router. |
| # In ONAP, there is only 1 message router service, so use that. |
| MR.CentralCname: {{ .Values.dmaapMessageRouterService }} |
| |
| # Indicator for whether we want hostname verification on SSL connection to MR |
| MR.hostnameVerify: false |
| |
| # MR Client Delete Level thoroughness: |
| # 0 = don't delete |
| # 1 = delete from persistent store |
| # 2 = delete from persistent store (DB) and authorization store (AAF) |
| MR.ClientDeleteLevel: 1 |
| |
| # Use Basic Authentication when provisioning topics |
| MR.authentication: none |
| |
| ApiPermission.Class: org.onap.dmaap.dbcapi.authentication.AllowAll |
| # |
| # end of MR Related Properties |
| ################################################################################ |
| |
| ##################################################### |
| # |
| # Certificate Management |
| # |
| ##################################################### |
| # When CertificateManagement is legacy, we need to provide more details about cert handling: |
| #CertificateManagement: legacy |
| # the type of keystore for https (for legacy CertificateManagment only) |
| #KeyStoreType: jks |
| |
| # path to the keystore file (for legacy CertificateManagment only) |
| #KeyStoreFile: etc/keystore |
| |
| # password for the https keystore (for legacy CertificateManagment only) |
| #KeyStorePassword: Y@Y5f&gm?PAz,CVQL,lk[VAF |
| # password for the private key in the https keystore (for legacy CertificateManagment only) |
| #KeyPassword: changeit |
| |
| # type of truststore for https (for legacy CertificateManagment only) |
| #TrustStoreType: jks |
| |
| # path to the truststore for https (for legacy CertificateManagment only) |
| #TrustStoreFile: etc/org.onap.dmaap-bc.trust.jks |
| |
| # password for the https truststore (for legacy CertificateManagment only) |
| #TrustStorePassword: changeit |
| # |
| # END OF legacy CertificateManagement properties |
| ########################################################################################## |