aboutsummaryrefslogtreecommitdiffstats
path: root/kubernetes/policy/components/policy-clamp-ac-pf-ppnt/resources/config/PolicyParticipantParameters.yaml
blob: 07d5eca3771f8dc0f1e968108bb8bd50f6234706 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
#  ============LICENSE_START=======================================================
#   Copyright (C) 2021-2022 Nordix Foundation.
#  ================================================================================
#  Licensed under the Apache License, Version 2.0 (the "License");
#  you may not use this file except in compliance with the License.
#  You may obtain a copy of the License at
#
#       http://www.apache.org/licenses/LICENSE-2.0
#
#  Unless required by applicable law or agreed to in writing, software
#  distributed under the License is distributed on an "AS IS" BASIS,
#  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
#  See the License for the specific language governing permissions and
#  limitations under the License.
#
#  SPDX-License-Identifier: Apache-2.0
#  ============LICENSE_END=========================================================

spring:
  security:
    user:
      name: ${RESTSERVER_USER}
      password: ${RESTSERVER_PASSWORD}
  kafka:
    consumer:
      group-id: {{ .Values.config.kafka.consumer.groupId }}
{{- if .Values.config.useStrimziKafka }}
    bootstrap-servers: {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
    security.protocol: SASL_PLAINTEXT
    properties.sasl:
      mechanism: SCRAM-SHA-512
      jaas.config: ${JAASLOGIN}
{{ else }}
{{ toYaml .Values.config.eventConsumption | nindent 2 }}
{{- end }}

security:
  enable-csrf: false

participant:
  pdpGroup: defaultGroup
  pdpType: apex
  policyApiParameters:
    clientName: api
    hostname: policy-api
    port: 6969
    userName: ${API_USER}
    password: ${API_PASSWORD}
    useHttps: true
    allowSelfSignedCerts: true
  policyPapParameters:
    clientName: pap
    hostname: policy-pap
    port: 6969
    userName: ${PAP_USER}
    password: ${PAP_PASSWORD}
    useHttps: true
    allowSelfSignedCerts: true
  intermediaryParameters:
    reportingTimeIntervalMs: 120000
    description: Participant Description
    participantId:
      name: org.onap.PM_Policy
      version: 1.0.0
    participantType:
      name: org.onap.policy.clamp.acm.PolicyParticipant
      version: 2.3.1
    clampAutomationCompositionTopics:
      topicSources:
        -
          topic: POLICY-ACRUNTIME-PARTICIPANT
          servers:
            - ${topicServer:message-router}
          topicCommInfrastructure: dmaap
          fetchTimeout: 15000
          useHttps: true
      topicSinks:
        -
          topic: POLICY-ACRUNTIME-PARTICIPANT
          servers:
            - ${topicServer:message-router}
          topicCommInfrastructure: dmaap
          useHttps: true

# If Strimzi Kafka to be used for communication, replace clampAutomationCompositionTopics configuration with below
#    clampAutomationCompositionTopics:
#      topicSources:
#        -
#          topic: policy-acruntime-participant
#          servers:
#            - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
#          topicCommInfrastructure: kafka
#          fetchTimeout: 15000
#          useHttps: true
#          additionalProps:
#            security.protocol: SASL_PLAINTEXT
#            sasl.mechanism: SCRAM-SHA-512
#            sasl.jaas.config: ${JAASLOGIN}
#      topicSinks:
#        -
#          topic: policy-acruntime-participant
#          servers:
#            - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
#          topicCommInfrastructure: kafka
#          useHttps: true
#          additionalProps:
#            security.protocol: SASL_PLAINTEXT
#            sasl.mechanism: SCRAM-SHA-512
#            sasl.jaas.config: ${JAASLOGIN}

management:
  endpoints:
    web:
      exposure:
        include: health, metrics, prometheus

server:
  port: 8085
  servlet:
    context-path: /onap/policyparticipant