diff options
author | efiacor <fiachra.corcoran@est.tech> | 2023-05-08 16:58:03 +0100 |
---|---|---|
committer | efiacor <fiachra.corcoran@est.tech> | 2023-05-08 16:58:54 +0100 |
commit | 3bc3a5c724e9a6ea8a112dca72a9a3128eddca19 (patch) | |
tree | 0bc2b9592436efa149d4b749c3633a5f3ccf4f00 /catalog-be | |
parent | a2feaf9b65cbba66181fb560b5815a62427d65cc (diff) |
[SDC-BE] Update kafka ssl config
Signed-off-by: efiacor <fiachra.corcoran@est.tech>
Change-Id: Id5c7aa72a1714fca9cfbdf4462a9faf9fd9bff88
Issue-ID: SDC-4476
Diffstat (limited to 'catalog-be')
-rw-r--r-- | catalog-be/src/main/java/org/openecomp/sdc/be/components/kafka/KafkaCommonConfig.java | 10 |
1 files changed, 7 insertions, 3 deletions
diff --git a/catalog-be/src/main/java/org/openecomp/sdc/be/components/kafka/KafkaCommonConfig.java b/catalog-be/src/main/java/org/openecomp/sdc/be/components/kafka/KafkaCommonConfig.java index 06c36e4add..bf65c52874 100644 --- a/catalog-be/src/main/java/org/openecomp/sdc/be/components/kafka/KafkaCommonConfig.java +++ b/catalog-be/src/main/java/org/openecomp/sdc/be/components/kafka/KafkaCommonConfig.java @@ -68,9 +68,13 @@ public class KafkaCommonConfig { props.put(CommonClientConfigs.BOOTSTRAP_SERVERS_CONFIG, deConfiguration.getKafkaBootStrapServers()); if("SSL".equals(securityProtocolConfig)) { - log.error("Kafka over SSL has not been implemented yet"); - } - else{ + props.put(SslConfigs.SSL_KEYSTORE_LOCATION_CONFIG, deConfiguration.getSSLConfig().getKeystorePath()); + props.put(SslConfigs.SSL_KEYSTORE_PASSWORD_CONFIG, deConfiguration.getSSLConfig().getKeystorePass()); + props.put(SslConfigs.SSL_KEY_PASSWORD_CONFIG, deConfiguration.getSSLConfig().getKeyManagerPassword()); + props.put(SslConfigs.SSL_ENDPOINT_IDENTIFICATION_ALGORITHM_CONFIG, ""); + props.put(SslConfigs.SSL_TRUSTSTORE_LOCATION_CONFIG, deConfiguration.getSSLConfig().getTruststorePath()); + props.put(SslConfigs.SSL_TRUSTSTORE_PASSWORD_CONFIG, deConfiguration.getSSLConfig().getTruststorePass()); + } else { props.put(SaslConfigs.SASL_JAAS_CONFIG, getKafkaSaslJaasConfig()); props.put(SaslConfigs.SASL_MECHANISM, "SCRAM-SHA-512"); } |