kypo-training.properties 3.42 KB
Newer Older
1
2
## server port for a given service, e.g., 8083
server.port=8083
Dominik Pilar's avatar
Dominik Pilar committed
3
## server context path (the base url for the service), e.g., /kypo-rest-training/api/v1
4
server.servlet.context-path={{ kypo_crp_training_service_context_path }}
Dominik Pilar's avatar
Dominik Pilar committed
5
6
## microservice name which is used in user management service for identification of this service, e.g. kypo-training
microservice.name=kypo-training
7
8

## Allows you to specify allowed origins for CORS mapping. You could set it as, e.g., http://domain1.com, http://domain2.com, etc. The default value is: *
9
cors.allowed.origins={{ kypo_crp_url }}
10

Dominik Pilar's avatar
Dominik Pilar committed
11
# calling user-and-group project, e.g., https://localhost:8084/kypo-rest-user-and-group/api/v1
12
user-and-group-server.uri={{ kypo_crp_uag_service_internal_url }}
Dominik Pilar's avatar
Dominik Pilar committed
13
# calling kypo-openstack, e.g., http://localhost:8080/kypo-openstack/api/v1
14
openstack-server.uri={{ kypo_crp_sandbox_service_internal_url }}
Dominik Pilar's avatar
Dominik Pilar committed
15
# calling kypo-elasticsearch-service, e.g., http://elastic-service:8085/kypo-elastic/api/v1
16
elasticsearch-service.uri={{ kypo_crp_elasticsearch_service_internal_url }}
17
18
# calling kypo-answers-storage, e.g., http://answers-storage:8087/kypo-answers-storage/api/v1
answers-storage.uri={{ kypo_crp_answers_storage_service_internal_url }}
19
20
# calling kypo-answers-storage, e.g., http://answers-storage:8087/kypo-answers-storage/api/v1
training-feedback-service.uri={{ kypo_crp_training_feedback_service_internal_url }}
21
22

# OpenID Connect OIDC configuration settings for a resource servers configuration
23
24
25
26
27
28
# Add configuration values for your OIDC providers. If you want to run the application properly, make sure that all values have a proper index.
## OIDC issuers, e.g. MUNI OIDC and another proprietary OIDC authorization server
{% for oidc_provider in kypo_crp_oidc_providers %}
kypo.identity.providers[{{ loop.index - 1 }}].issuer= {{ oidc_provider.issuer_identifier | default(oidc_provider.url) }}
kypo.identity.providers[{{ loop.index - 1 }}].userInfoEndpoint={{ oidc_provider.user_info_url | default('') }}
{% endfor %}
29
30
31
32
33
34
35
36
37
38
39

# DATASOURCE (DataSourceAutoConfiguration & DataSourceProperties)
spring.datasource.url=jdbc:postgresql://localhost:5432/training
spring.datasource.username=postgres
spring.datasource.password=postgres
spring.datasource.driver-class-name=org.postgresql.Driver

# JPA (JpaBaseConfiguration, HibernateJpaAutoConfiguration)
spring.data.jpa.repositories.enabled=true
spring.jpa.database-platform=org.hibernate.dialect.PostgreSQL9Dialect
spring.jpa.properties.hibernate.dialect=org.hibernate.dialect.PostgreSQLDialect
40
spring.jpa.hibernate.ddl-auto=
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
spring.jpa.show-sql=true 
spring.jpa.properties.hibernate.temp.use_jdbc_metadata_defaults = false

# spring-cloud
spring.cloud.refresh.enabled = false
## disables the settings in application.properties in resource folder
spring.jmx.enabled=false
## Configuring Jackson serializer for converting Java 8 dates to ISO format
spring.jackson.serialization.write_dates_as_timestamps=false 
## all atributes in JSON are in SNAKE_CASE
spring.jackson.property-naming-strategy=SNAKE_CASE

## the requirement for ssl, e.g., false
security.require-ssl=false
management.health.refresh.enabled=false

57
58
# Logging
## set logger levels using pattern logging.level.<logger-name>=<level>, NOT REQUIRED
59
logging.level.cz.muni.ics=DEBUG
60
61
kypo.audit.syslog.host=kypo-syslog-ng
kypo.audit.syslog.port=514
62
kypo.audit.messages.format=kypo-training --- KYPO_PORTAL_EVENTS_AUDIT [%thread] %logger{5} --- %msg%n
63
64
65
66

elasticsearch.protocol=http
elasticsearch.host=kypo-elasticsearch
elasticsearch.port=9200