mirror of
https://github.com/Telecominfraproject/wlan-cloud-ucentralgw.git
synced 2026-01-27 10:23:13 +00:00
186 lines
6.7 KiB
Cheetah
186 lines
6.7 KiB
Cheetah
#
|
|
# uCentral protocol server for devices. This is where you point
|
|
# all your devices. You can replace the * for address by the specific
|
|
# address of one of your interfaces
|
|
#
|
|
ucentral.websocket.host.0.backlog = 500
|
|
ucentral.websocket.host.0.rootca = ${WEBSOCKET_HOST_ROOTCA}
|
|
ucentral.websocket.host.0.issuer = ${WEBSOCKET_HOST_ISSUER}
|
|
ucentral.websocket.host.0.cert = ${WEBSOCKET_HOST_CERT}
|
|
ucentral.websocket.host.0.key = ${WEBSOCKET_HOST_KEY}
|
|
ucentral.websocket.host.0.clientcas = ${WEBSOCKET_HOST_CLIENTCAS}
|
|
ucentral.websocket.host.0.cas = ${WEBSOCKET_HOST_CAS}
|
|
ucentral.websocket.host.0.address = *
|
|
ucentral.websocket.host.0.port = ${WEBSOCKET_HOST_PORT}
|
|
ucentral.websocket.host.0.security = strict
|
|
ucentral.websocket.host.0.key.password = ${WEBSOCKET_HOST_KEY_PASSWORD}
|
|
ucentral.websocket.maxreactors = 20
|
|
|
|
#
|
|
# REST API access
|
|
#
|
|
openwifi.restapi.host.0.backlog = 100
|
|
openwifi.restapi.host.0.security = relaxed
|
|
openwifi.restapi.host.0.rootca = ${RESTAPI_HOST_ROOTCA}
|
|
openwifi.restapi.host.0.address = *
|
|
openwifi.restapi.host.0.port = ${RESTAPI_HOST_PORT}
|
|
openwifi.restapi.host.0.cert = ${RESTAPI_HOST_CERT}
|
|
openwifi.restapi.host.0.key = ${RESTAPI_HOST_KEY}
|
|
openwifi.restapi.host.0.key.password = ${RESTAPI_HOST_KEY_PASSWORD}
|
|
|
|
openwifi.internal.restapi.host.0.backlog = 100
|
|
openwifi.internal.restapi.host.0.security = relaxed
|
|
openwifi.internal.restapi.host.0.rootca = ${INTERNAL_RESTAPI_HOST_ROOTCA}
|
|
openwifi.internal.restapi.host.0.address = *
|
|
openwifi.internal.restapi.host.0.port = ${INTERNAL_RESTAPI_HOST_PORT}
|
|
openwifi.internal.restapi.host.0.cert = ${INTERNAL_RESTAPI_HOST_CERT}
|
|
openwifi.internal.restapi.host.0.key = ${INTERNAL_RESTAPI_HOST_KEY}
|
|
openwifi.internal.restapi.host.0.key.password = ${INTERNAL_RESTAPI_HOST_KEY_PASSWORD}
|
|
|
|
#
|
|
# Used to upload files to the service.
|
|
# You should replace the 'name' vaalue with the IP address of your gateway or an FQDN
|
|
# that your devices can reach
|
|
#
|
|
openwifi.fileuploader.host.0.backlog = 100
|
|
openwifi.fileuploader.host.0.rootca = ${FILEUPLOADER_HOST_ROOTCA}
|
|
openwifi.fileuploader.host.0.security = relaxed
|
|
openwifi.fileuploader.host.0.address = *
|
|
openwifi.fileuploader.host.0.name = ${FILEUPLOADER_HOST_NAME}
|
|
openwifi.fileuploader.host.0.port = ${FILEUPLOADER_HOST_PORT}
|
|
openwifi.fileuploader.host.0.cert = ${FILEUPLOADER_HOST_CERT}
|
|
openwifi.fileuploader.host.0.key = ${FILEUPLOADER_HOST_KEY}
|
|
openwifi.fileuploader.host.0.key.password = ${FILEUPLOADER_HOST_KEY_PASSWORD}
|
|
openwifi.fileuploader.path = ${FILEUPLOADER_PATH}
|
|
openwifi.fileuploader.maxsize = 10000
|
|
openwifi.fileuploader.uri = ${FILEUPLOADER_URI}
|
|
|
|
#
|
|
# Generic section that all microservices must have
|
|
#
|
|
openwifi.service.key = ${SERVICE_KEY}
|
|
openwifi.service.key.password = ${SERVICE_KEY_PASSWORD}
|
|
openwifi.system.data = ${SYSTEM_DATA}
|
|
openwifi.system.debug = true
|
|
openwifi.system.uri.private = ${SYSTEM_URI_PRIVATE}
|
|
openwifi.system.uri.public = ${SYSTEM_URI_PUBLIC}
|
|
openwifi.system.uri.ui = ${SYSTEM_URI_UI}
|
|
openwifi.security.restapi.disable = ${SECURITY_RESTAPI_DISABLE}
|
|
openwifi.system.commandchannel = /tmp/app.ucentralgw
|
|
|
|
#
|
|
# Gateway Microservice Specific Section
|
|
#
|
|
openwifi.autoprovisioning = true
|
|
openwifi.devicetypes.0 = AP:linksys_ea8300,edgecore_eap101,linksys_e8450-ubi
|
|
openwifi.devicetypes.1 = SWITCH:edgecore_ecs4100-12ph
|
|
openwifi.devicetypes.2 = IOT:esp32
|
|
openwifi.certificates.allowmismatch = ${CERTIFICATES_ALLOWMISMATCH}
|
|
oui.download.uri = https://standards-oui.ieee.org/oui/oui.txt
|
|
simulatorid = ${SIMULATORID}
|
|
iptocountry.default = US
|
|
iptocountry.provider = ${IPTOCOUNTRY_PROVIDER}
|
|
iptocountry.ipinfo.token = ${IPTOCOUNTRY_IPINFO_TOKEN}
|
|
iptocountry.ipdata.apikey = ${IPTOCOUNTRY_IPDATA_APIKEY}
|
|
|
|
autoprovisioning.process = ${AUTOPROVISIONING_PROCESS}
|
|
|
|
openwifi.session.timeout = ${DEVICE_SESSION_TIMEOUT}
|
|
#
|
|
# rtty
|
|
#
|
|
rtty.internal = ${RTTY_INTERNAL}
|
|
rtty.enabled = ${RTTY_ENABLED}
|
|
rtty.server = ${RTTY_SERVER}
|
|
rtty.port = ${RTTY_PORT}
|
|
rtty.token = ${RTTY_TOKEN}
|
|
rtty.timeout = ${RTTY_TIMEOUT}
|
|
rtty.viewport = ${RTTY_VIEWPORT}
|
|
rtty.assets = ${RTTY_ASSETS}
|
|
|
|
### RADIUS proxy config
|
|
radius.proxy.enable = ${RADIUS_PROXY_ENABLE}
|
|
radius.proxy.accounting.port = ${RADIUS_PROXY_ACCOUNTING_PORT}
|
|
radius.proxy.authentication.port = ${RADIUS_PROXY_AUTHENTICATION_PORT}
|
|
radius.proxy.coa.port = ${RADIUS_PROXY_COA_PORT}
|
|
|
|
iptocountry.default = ${IPINFO_DEFAULT_COUNTRY}
|
|
#iptocountry.provider = ipinfo
|
|
#iptocountry.provider = ipdata
|
|
#iptocountry.ipinfo.token =
|
|
#iptocountry.ipdata.apikey =
|
|
|
|
#############################
|
|
# Generic information for all micro services
|
|
#############################
|
|
#
|
|
# NLB Support
|
|
#
|
|
alb.enable = true
|
|
alb.port = 16102
|
|
|
|
#
|
|
# Kafka
|
|
#
|
|
openwifi.kafka.group.id = gateway
|
|
openwifi.kafka.client.id = gateway1
|
|
openwifi.kafka.enable = ${KAFKA_ENABLE}
|
|
openwifi.kafka.brokerlist = ${KAFKA_BROKERLIST}
|
|
openwifi.kafka.auto.commit = false
|
|
openwifi.kafka.queue.buffering.max.ms = 50
|
|
|
|
openwifi.kafka.ssl.ca.location = ${KAFKA_SSL_CA_LOCATION}
|
|
openwifi.kafka.ssl.certificate.location = ${KAFKA_SSL_CERTIFICATE_LOCATION}
|
|
openwifi.kafka.ssl.key.location = ${KAFKA_SSL_KEY_LOCATION}
|
|
openwifi.kafka.ssl.key.password = ${KAFKA_SSL_KEY_PASSWORD}
|
|
|
|
#
|
|
# This section select which form of persistence you need
|
|
# Only one selected at a time. If you select multiple, this service will die if a horrible
|
|
# death and might make your beer flat.
|
|
#
|
|
storage.type = ${STORAGE_TYPE}
|
|
|
|
storage.type.sqlite.db = devices.db
|
|
storage.type.sqlite.idletime = 120
|
|
storage.type.sqlite.maxsessions = 128
|
|
|
|
storage.type.postgresql.maxsessions = 250
|
|
storage.type.postgresql.idletime = 60
|
|
storage.type.postgresql.host = ${STORAGE_TYPE_POSTGRESQL_HOST}
|
|
storage.type.postgresql.username = ${STORAGE_TYPE_POSTGRESQL_USERNAME}
|
|
storage.type.postgresql.password = ${STORAGE_TYPE_POSTGRESQL_PASSWORD}
|
|
storage.type.postgresql.database = ${STORAGE_TYPE_POSTGRESQL_DATABASE}
|
|
storage.type.postgresql.port = ${STORAGE_TYPE_POSTGRESQL_PORT}
|
|
storage.type.postgresql.connectiontimeout = 60
|
|
|
|
storage.type.mysql.maxsessions = 64
|
|
storage.type.mysql.idletime = 60
|
|
storage.type.mysql.host = ${STORAGE_TYPE_MYSQL_HOST}
|
|
storage.type.mysql.username = ${STORAGE_TYPE_MYSQL_USERNAME}
|
|
storage.type.mysql.password = ${STORAGE_TYPE_MYSQL_PASSWORD}
|
|
storage.type.mysql.database = ${STORAGE_TYPE_MYSQL_DATABASE}
|
|
storage.type.mysql.port = ${STORAGE_TYPE_MYSQL_PORT}
|
|
storage.type.mysql.connectiontimeout = 60
|
|
|
|
archiver.enabled = true
|
|
archiver.schedule = 03:00
|
|
archiver.db.0.name = healthchecks
|
|
archiver.db.0.keep = 7
|
|
archiver.db.1.name = statistics
|
|
archiver.db.1.keep = 7
|
|
archiver.db.2.name = devicelogs
|
|
archiver.db.2.keep = 7
|
|
archiver.db.3.name = commandlist
|
|
archiver.db.3.keep = 7
|
|
|
|
########################################################################
|
|
########################################################################
|
|
#
|
|
# Logging: please leave as is for now.
|
|
#
|
|
########################################################################
|
|
logging.type = console
|
|
logging.path = $OWGW_ROOT/logs
|
|
logging.level = information
|