diff options
Diffstat (limited to 'aai-traversal/src/main/resources/application.properties')
-rw-r--r-- | aai-traversal/src/main/resources/application.properties | 32 |
1 files changed, 4 insertions, 28 deletions
diff --git a/aai-traversal/src/main/resources/application.properties b/aai-traversal/src/main/resources/application.properties index 0416af4..0f37151 100644 --- a/aai-traversal/src/main/resources/application.properties +++ b/aai-traversal/src/main/resources/application.properties @@ -19,7 +19,6 @@ server.servlet.context-path=${schema.uri.base.path} spring.autoconfigure.exclude=\ org.springframework.boot.autoconfigure.jdbc.DataSourceAutoConfiguration,\ org.springframework.boot.autoconfigure.orm.jpa.HibernateJpaAutoConfiguration,\ - org.keycloak.adapters.springboot.KeycloakAutoConfiguration,\ org.springframework.boot.autoconfigure.security.servlet.SecurityAutoConfiguration, \ org.springframework.boot.actuate.autoconfigure.security.servlet.ManagementWebSecurityAutoConfiguration @@ -38,29 +37,10 @@ server.local.startpath=aai-traversal/src/main/resources server.basic.auth.location=${server.local.startpath}/etc/auth/realm.properties server.port=8446 -server.ssl.enabled-protocols=TLSv1.1,TLSv1.2 -server.compression.excluded-user-agents= -# By default spring boot jetty will exclude the following ciphers -# We need to specifically add this to support tls v1.1 -server.ssl.ciphers=^.*_(MD5|SHA|SHA1)$ -server.ssl.client-auth=want -server.ssl.key-store-type=JKS # Start of Internal Specific Properties # Switch to one-way-ssl spring.profiles.active=production,one-way-ssl -# Switch to keycloak -#spring.profiles.active=production, keycloak -### -server.certs.location=${server.local.startpath}/etc/auth/ -server.keystore.name.pkcs12=aai_keystore -server.keystore.name=aai_keystore -server.truststore.name=aai_keystore -### -server.ssl.key-store=${server.certs.location}${server.keystore.name} -server.ssl.key-store-password=password(OBF:1vn21ugu1saj1v9i1v941sar1ugw1vo0) -server.ssl.trust-store=${server.certs.location}${server.truststore.name} -server.ssl.trust-store-password=password(OBF:1vn21ugu1saj1v9i1v941sar1ugw1vo0) schema.version.list=v10,v11,v12,v13,v14,v15,v16,v17,v18,v19,v20,v21,v22,v23,v24,v25,v26,v27,v28,v29,v30 # Specifies which component should the oxm be looking at @@ -112,16 +92,8 @@ schema.service.edges.endpoint=edgerules?version= schema.service.versions.endpoint=versions schema.service.custom.queries.endpoint=stored-queries -schema.service.ssl.key-store=${server.certs.location}${server.keystore.name.pkcs12} -schema.service.ssl.trust-store=${server.certs.location}${server.truststore.name} - -schema.service.ssl.key-store-password=password(OBF:1vn21ugu1saj1v9i1v941sar1ugw1vo0) -schema.service.ssl.trust-store-password=password(OBF:1vn21ugu1saj1v9i1v941sar1ugw1vo0) schema.service.versions.override=false -# Location of the cadi properties file should be specified here -aaf.cadi.file=${server.local.startpath}/cadi.properties - history.enabled=false; history.truncate.window.days=365 @@ -149,3 +121,7 @@ BOOTSTRAP_SERVERS=localhost:9092 JAAS_CONFIG="" aai.notifications.enabled=false aai.graph.properties.path=${server.local.startpath}/etc/appprops/janusgraph-realtime.properties + +aai.basic-auth.enabled=true +aai.basic-auth.users[0].username=AAI +aai.basic-auth.users[0].password=AAI |