summaryrefslogtreecommitdiffstats
path: root/kubernetes/policy/components/policy-clamp-ac-http-ppnt/resources/config/HttpParticipantParameters.yaml
blob: c8532499a63df11d0cca89104cc6f3a78f883ab6 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
#  ============LICENSE_START=======================================================
#   Copyright (C) 2021-2022 Nordix Foundation.
#  ================================================================================
#  Licensed under the Apache License, Version 2.0 (the "License");
#  you may not use this file except in compliance with the License.
#  You may obtain a copy of the License at
#
#       http://www.apache.org/licenses/LICENSE-2.0
#
#  Unless required by applicable law or agreed to in writing, software
#  distributed under the License is distributed on an "AS IS" BASIS,
#  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
#  See the License for the specific language governing permissions and
#  limitations under the License.
#
#  SPDX-License-Identifier: Apache-2.0
#  ============LICENSE_END=========================================================

spring:
  security:
    user:
      name: ${RESTSERVER_USER}
      password: ${RESTSERVER_PASSWORD}
{{- if .Values.config.useStrimziKafka }}
  kafka:
    consumer:
      group-id: {{ .Values.config.kafka.consumer.groupId }}
    bootstrap-servers: {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
    security.protocol: SASL_PLAINTEXT
    properties.sasl:
      mechanism: SCRAM-SHA-512
      jaas.config: ${JAASLOGIN}
{{ else }}
{{ toYaml .Values.config.eventConsumption | nindent 2 }}
{{- end }}

security:
  enable-csrf: false

participant:
  intermediaryParameters:
    reportingTimeIntervalMs: 120000
    description: Participant Description
    participantId:
      name: HttpParticipant0
      version: 1.0.0
    participantType:
      name: org.onap.policy.clamp.acm.HttpParticipant
      version: 2.3.4
    clampAutomationCompositionTopics:
      topicSources:
        - topic: POLICY-ACRUNTIME-PARTICIPANT
          servers:
            - ${topicServer:message-router}
          topicCommInfrastructure: dmaap
          fetchTimeout: 15000
          useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary "true" "false" }}
      topicSinks:
        - topic: POLICY-ACRUNTIME-PARTICIPANT
          servers:
            - ${topicServer:message-router}
          topicCommInfrastructure: dmaap
          useHttps: {{ (eq "true" (include "common.needTLS" .)) | ternary "true" "false" }}
# If Strimzi Kafka to be used for communication, replace clampAutomationCompositionTopics configuration with below
#    clampAutomationCompositionTopics:
#      topicSources:
#        - topic: policy-acruntime-participant
#          servers:
#            - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
#          topicCommInfrastructure: kafka
#          fetchTimeout: 15000
#          useHttps: true
#          additionalProps:
#            security.protocol: SASL_PLAINTEXT
#            sasl.mechanism: SCRAM-SHA-512
#            sasl.jaas.config: ${JAASLOGIN}
#      topicSinks:
#        - topic: policy-acruntime-participant
#          servers:
#            - {{ include "common.release" . }}-{{ .Values.config.kafkaBootstrap }}:9092
#          topicCommInfrastructure: kafka
#          useHttps: true
#          additionalProps:
#            security.protocol: SASL_PLAINTEXT
#            sasl.mechanism: SCRAM-SHA-512
#            sasl.jaas.config: ${JAASLOGIN}

management:
  endpoints:
    web:
      exposure:
        include: health, metrics, prometheus
server:
  port: 8084
  servlet:
    context-path: /onap/httpparticipant
  ssl:
    enabled: {{ (eq "true" (include "common.needTLS" .)) | ternary true false }}