diff options
author | pranitk1905 <pranit.kapdule@t-systems.com> | 2023-09-01 14:52:39 +0530 |
---|---|---|
committer | pranitk1905 <pranit.kapdule@t-systems.com> | 2023-09-04 13:25:24 +0530 |
commit | d82c53bd799b22660be17219da516415d4c56b46 (patch) | |
tree | 852f840dfaf3947a5f3c6266beb16ece581a7757 /prh-app-server/src/test/resources/autoCommitDisabledConfigurationFromCbs2.json | |
parent | be165c3b701c8c08b4ad4a895d988b33e14a01e0 (diff) |
[DCAEGEN2] Pass autoCommitDisabled mode configuration via CBSContentParser
Pass autoCommitDisabled mode configuration via CBSContentParser instead
of environment variables.
Issue-ID: DCAEGEN2-3365
Change-Id: I3c56153d66a7291966d298874f12a01839f3ee3f
Signed-off-by: pranitk1905 <pranit.kapdule@t-systems.com>
[DCAEGEN2] Pass autoCommitDisabled mode configuration via CBSContentParser
Mentioned Copyrights and removed tabbed indentations
Issue-ID: DCAEGEN2-3365
Change-Id: I3c56153d66a7291966d298874f12a01839f3ee3f
Signed-off-by: pranitk1905 <pranit.kapdule@t-systems.com>
[DCAEGEN2] Pass autoCommitDisabled mode configuration via CBSContentParser
Added missing copyrights
Issue-ID: DCAEGEN2-3365
Change-Id: I3c56153d66a7291966d298874f12a01839f3ee3f
Signed-off-by: pranitk1905 <pranit.kapdule@t-systems.com>
[DCAEGEN2] Pass autoCommitDisabled mode configuration via CBSContentParser
Added missing copyrights
Issue-ID: DCAEGEN2-3365
Change-Id: I3c56153d66a7291966d298874f12a01839f3ee3f
Signed-off-by: pranitk1905 <pranit.kapdule@t-systems.com>
[DCAEGEN2] Pass autoCommitDisabled mode configuration via CBSContentParser
Removed Docs folder from the project as it is maintained in different
place
Issue-ID: DCAEGEN2-3365
Change-Id: I3c56153d66a7291966d298874f12a01839f3ee3f
Signed-off-by: pranitk1905 <pranit.kapdule@t-systems.com>
Diffstat (limited to 'prh-app-server/src/test/resources/autoCommitDisabledConfigurationFromCbs2.json')
-rw-r--r-- | prh-app-server/src/test/resources/autoCommitDisabledConfigurationFromCbs2.json | 66 |
1 files changed, 66 insertions, 0 deletions
diff --git a/prh-app-server/src/test/resources/autoCommitDisabledConfigurationFromCbs2.json b/prh-app-server/src/test/resources/autoCommitDisabledConfigurationFromCbs2.json new file mode 100644 index 00000000..6e58e6a5 --- /dev/null +++ b/prh-app-server/src/test/resources/autoCommitDisabledConfigurationFromCbs2.json @@ -0,0 +1,66 @@ +{ + "config": { + "aai.aaiClientConfiguration.aaiBasePath": "/aai/v23", + "aai.aaiClientConfiguration.aaiHeaders": { + "Accept": "application/json", + "Authorization": "Basic QUFJOkFBSQ==", + "Real-Time": "true", + "X-FromAppId": "prh", + "X-TransactionId": "9999" + }, + "aai.aaiClientConfiguration.aaiHost": "aai-internal.onap.svc.cluster.local", + "aai.aaiClientConfiguration.aaiHostPortNumber": 80, + "aai.aaiClientConfiguration.aaiIgnoreSslCertificateErrors": true, + "aai.aaiClientConfiguration.aaiPnfPath": "/network/pnfs/pnf", + "aai.aaiClientConfiguration.aaiProtocol": "http", + "aai.aaiClientConfiguration.aaiServiceInstancePath": "/business/customers/customer/{{customer}}/service-subscriptions/service-subscription/{{serviceType}}/service-instances/service-instance/{{serviceInstanceId}}", + "aai.aaiClientConfiguration.aaiUserName": "AAI", + "aai.aaiClientConfiguration.aaiUserPassword": "AAI", + "aai.aaiClientConfiguration.baseUrl": "https://aai.onap.svc.cluster.local:8443/aai/v23", + "aai.aaiClientConfiguration.pnfUrl": "http://aai.onap.svc.cluster.local:8443/aai/v23/network/pnfs/pnf", + "dmaap.dmaapConsumerConfiguration.consumerGroup": "OpenDCAE-c12", + "dmaap.dmaapConsumerConfiguration.consumerId": "c12", + "dmaap.dmaapConsumerConfiguration.dmaapContentType": "application/json", + "dmaap.dmaapConsumerConfiguration.timeoutMs": -1, + "dmaap.dmaapProducerConfiguration.dmaapContentType": "application/json", + "dmaap.dmaapUpdateProducerConfiguration.dmaapContentType": "application/json", + "security.enableAaiCertAuth": false, + "security.enableDmaapCertAuth": false, + "security.keyStorePasswordPath": "/opt/app/prh/etc/cert/jks.pass", + "security.keyStorePath": "/opt/app/prh/etc/cert/cert.jks", + "security.trustStorePasswordPath": "/opt/app/prh/etc/cert/trust.pass", + "security.trustStorePath": "/opt/app/prh/etc/cert/trust.jks", + "streams_publishes": { + "pnf-ready": { + "dmaap_info": { + "topic_url": "http://dmaap-mr:2222/events/unauthenticated.PNF_READY" + }, + "type": "message_router" + }, + "pnf-update": { + "dmaap_info": { + "topic_url": "http://dmaap-mr:2222/events/unauthenticated.PNF_UPDATE" + }, + "type": "message_router" + } + }, + "streams_subscribes": { + "ves-reg-output": { + "dmaap_info": { + "topic_url": "http://dmaap-mr:2222/events/unauthenticated.VES_PNFREG_OUTPUT" + }, + "type": "message_router" + } + }, + "kafka-configurations": { + "kafkaBoostrapServerConfig": "onap-strimzi-kafka-bootstrap:9092", + "groupIdConfig": "OpenDCAE-c12", + "kafkaSecurityProtocol": "SASL_PLAINTEXT", + "kafkaSaslMechanism": "SCRAM-SHA-512", + "kafkaUsername": "strimzi-kafka-admin-username", + "kafkaPassword": "strimzi-kafka-admin-password", + "kafkaJaasConfig": "jaas_config", + "Login_Module_Class": "MODULE-CLASS" + } + } +} |