kypo-smart-assistant.properties 3.23 KB
Newer Older
1
2
3
4
5
6
7
8
9
10
## server port for a given service, e.g., 8086
server.port=8086
## server context path (the base url for the service), e.g., /kypo-adaptive-training/api/v1
server.servlet.context-path=/kypo-adaptive-smart-assistant/api/v1
## microservice name which is used in user management service for identification of this service, e.g. kypo-smart-assistant
microservice.name=kypo-adaptive-smart-assistant

## Allows you to specify allowed origins for CORS mapping. You could set it as, e.g., http://domain1.com, http://domain2.com, etc. The default value is: *
cors.allowed.origins={{ kypo_crp_url }}

Dominik Pilar's avatar
Dominik Pilar committed
11
# calling user-and-group project, e.g., https://localhost:8084/kypo-rest-user-and-group/api/v1
12
user-and-group-server.uri={{ kypo_crp_uag_service_internal_url }}
Dominik Pilar's avatar
Dominik Pilar committed
13
# calling kypo-openstack, e.g., http://localhost:8080/kypo-openstack/api/v1
14
openstack-server.uri={{ kypo_crp_sandbox_service_internal_url }}
Dominik Pilar's avatar
Dominik Pilar committed
15
# calling kypo-elasticsearch-service, e.g., http://elastic-service:8085/kypo-elastic/api/v1
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
elasticsearch-service.uri={{ kypo_crp_elasticsearch_service_internal_url }}

# OpenID Connect OIDC configuration settings for a resource servers configuration
# Add configuration values for your OIDC providers. If you want to run application properly, make sure that all values are in the same order.
# First OIDC provider is used for authorization in swagger page
## OIDC issuers, e.g. MUNI OIDC and another proprietary OIDC authorization server, e.g., https://oidc.muni.cz/oidc/, https://kypo-oidc-idp.cz/oidc/
kypo.idp.4oauth.issuers={{ kypo_crp_oidc_spring_processed_lists.issuers }}
## the identification of a resource service using client IDs
kypo.idp.4oauth.resource.clientIds={{ kypo_crp_oidc_spring_processed_lists.resource_client_ids }}
## the identification of a resource service using client secrets
kypo.idp.4oauth.resource.clientSecrets={{ kypo_crp_oidc_spring_processed_lists.resource_client_secrets }}

# OpenID Connection MUNI OIDC configuration settings for a client configuration
## the scopes that authorization servers will provide for a given user, e.g., openid, profile, email
kypo.idp.4oauth.scopes={{ kypo_crp_oidc_spring_processed_lists.scopes }}

# DATASOURCE (DataSourceAutoConfiguration & DataSourceProperties)
spring.datasource.url=jdbc:postgresql://localhost:5432/kypo-adaptive-smart-assistant
spring.datasource.username=postgres
spring.datasource.password=postgres
spring.datasource.driver-class-name=org.postgresql.Driver

# JPA (JpaBaseConfiguration, HibernateJpaAutoConfiguration)
spring.data.jpa.repositories.enabled=true
spring.jpa.database-platform=org.hibernate.dialect.PostgreSQL9Dialect
spring.jpa.properties.hibernate.dialect=org.hibernate.dialect.PostgreSQLDialect
spring.jpa.hibernate.ddl-auto=
spring.jpa.show-sql=true 
spring.jpa.properties.hibernate.temp.use_jdbc_metadata_defaults = false

# spring-cloud
spring.cloud.refresh.enabled = false
## disables the settings in application.properties in resource folder
spring.jmx.enabled=false
## Configuring Jackson serializer for converting Java 8 dates to ISO format
spring.jackson.serialization.write_dates_as_timestamps=false 
## all atributes in JSON are in SNAKE_CASE
spring.jackson.property-naming-strategy=SNAKE_CASE

## the requirement for ssl, e.g., false
security.require-ssl=false
management.health.refresh.enabled=false