mirror of
https://github.com/Telecominfraproject/wlan-cloud-ucentralsec.git
synced 2025-10-29 18:02:29 +00:00
143 lines
5.2 KiB
Cheetah
143 lines
5.2 KiB
Cheetah
#
|
|
# uCentral protocol server for devices. This is where you point
|
|
# all your devices. You can replace the * for address by the specific
|
|
# address of one of your interfaces
|
|
#
|
|
|
|
#
|
|
# REST API access
|
|
#
|
|
openwifi.restapi.host.0.backlog = 100
|
|
openwifi.restapi.host.0.security = relaxed
|
|
openwifi.restapi.host.0.rootca = ${RESTAPI_HOST_ROOTCA}
|
|
openwifi.restapi.host.0.address = *
|
|
openwifi.restapi.host.0.port = ${RESTAPI_HOST_PORT}
|
|
openwifi.restapi.host.0.cert = ${RESTAPI_HOST_CERT}
|
|
openwifi.restapi.host.0.key = ${RESTAPI_HOST_KEY}
|
|
openwifi.restapi.host.0.key.password = ${RESTAPI_HOST_KEY_PASSWORD}
|
|
openwifi.restapi.wwwassets = ${RESTAPI_WWWASSETS}
|
|
|
|
openwifi.internal.restapi.host.0.backlog = 100
|
|
openwifi.internal.restapi.host.0.security = relaxed
|
|
openwifi.internal.restapi.host.0.rootca = ${INTERNAL_RESTAPI_HOST_ROOTCA}
|
|
openwifi.internal.restapi.host.0.address = *
|
|
openwifi.internal.restapi.host.0.port = ${INTERNAL_RESTAPI_HOST_PORT}
|
|
openwifi.internal.restapi.host.0.cert = ${INTERNAL_RESTAPI_HOST_CERT}
|
|
openwifi.internal.restapi.host.0.key = ${INTERNAL_RESTAPI_HOST_KEY}
|
|
openwifi.internal.restapi.host.0.key.password = ${INTERNAL_RESTAPI_HOST_KEY_PASSWORD}
|
|
|
|
#
|
|
# Generic section that all microservices must have
|
|
#
|
|
authentication.enabled = true
|
|
authentication.default.username = ${AUTHENTICATION_DEFAULT_USERNAME}
|
|
authentication.default.password = ${AUTHENTICATION_DEFAULT_PASSWORD}
|
|
openwifi.system.data = ${SYSTEM_DATA}
|
|
openwifi.system.uri.private = ${SYSTEM_URI_PRIVATE}
|
|
openwifi.system.uri.public = ${SYSTEM_URI_PUBLIC}
|
|
openwifi.system.uri.ui = ${SYSTEM_URI_UI}
|
|
openwifi.security.restapi.disable = ${SECURITY_RESTAPI_DISABLE}
|
|
openwifi.system.commandchannel = /tmp/app.ucentralsec
|
|
openwifi.service.key = ${SERVICE_KEY}
|
|
openwifi.service.key.password = ${SERVICE_KEY_PASSWORD}
|
|
|
|
smssender.enabled = ${SMSSENDER_ENABLED}
|
|
smssender.provider = ${SMSSENDER_PROVIDER}
|
|
|
|
smssender.aws.secretkey = ${SMSSENDER_AWS_SECRETKEY}
|
|
smssender.aws.accesskey = ${SMSSENDER_AWS_ACCESSKEY}
|
|
smssender.aws.region = ${SMSSENDER_AWS_REGION}
|
|
|
|
smssender.twilio.sid = ${SMSSENDER_TWILIO_SID}
|
|
smssender.twilio.token = ${SMSSENDER_TWILIO_TOKEN}
|
|
smssender.twilio.phonenumber = ${SMSSENDER_TWILIO_PHONENUMBER}
|
|
|
|
#
|
|
# Security Microservice Specific Section
|
|
#
|
|
mailer.enabled = ${MAILER_ENABLED}
|
|
mailer.hostname = ${MAILER_HOSTNAME}
|
|
mailer.username = ${MAILER_USERNAME}
|
|
mailer.password = ${MAILER_PASSWORD}
|
|
mailer.sender = ${MAILER_SENDER}
|
|
mailer.loginmethod = login
|
|
mailer.port = ${MAILER_PORT}
|
|
mailer.templates = ${MAILER_TEMPLATES}
|
|
|
|
helper.user.email = ${USER_HELPER_EMAIL}
|
|
helper.sub.email = ${SUB_HELPER_EMAIL}
|
|
helper.user.global.email = ${GLOBAL_USER_HELPER_EMAIL}
|
|
helper.sub.global.email = ${GLOBAL_SUB_HELPER_EMAIL}
|
|
helper.user.site = ${USER_HELPER_SITE}
|
|
helper.sub.site = ${SUB_HELPER_SITE}
|
|
helper.user.login = ${USER_SYSTEM_LOGIN}
|
|
helper.sub.login = ${SUB_SYSTEM_LOGIN}
|
|
helper.user.signature = ${USER_SIGNATURE}
|
|
helper.sub.signature = ${SUB_SIGNATURE}
|
|
|
|
#############################
|
|
# Generic information for all micro services
|
|
#############################
|
|
#
|
|
# NLB Support
|
|
#
|
|
alb.enable = true
|
|
alb.port = 16101
|
|
|
|
#
|
|
# Kafka
|
|
#
|
|
openwifi.kafka.group.id = security
|
|
openwifi.kafka.client.id = security1
|
|
openwifi.kafka.enable = ${KAFKA_ENABLE}
|
|
openwifi.kafka.brokerlist = ${KAFKA_BROKERLIST}
|
|
openwifi.kafka.auto.commit = false
|
|
openwifi.kafka.queue.buffering.max.ms = 50
|
|
openwifi.kafka.ssl.ca.location = ${KAFKA_SSL_CA_LOCATION}
|
|
openwifi.kafka.ssl.certificate.location = ${KAFKA_SSL_CERTIFICATE_LOCATION}
|
|
openwifi.kafka.ssl.key.location = ${KAFKA_SSL_KEY_LOCATION}
|
|
openwifi.kafka.ssl.key.password = ${KAFKA_SSL_KEY_PASSWORD}
|
|
|
|
openwifi.document.policy.access = ${DOCUMENT_POLICY_ACCESS}
|
|
openwifi.document.policy.password = ${DOCUMENT_POLICY_PASSWORD}
|
|
openwifi.avatar.maxsize = 2000000
|
|
#
|
|
# This section select which form of persistence you need
|
|
# Only one selected at a time. If you select multiple, this service will die if a horrible
|
|
# death and might make your beer flat.
|
|
#
|
|
storage.type = ${STORAGE_TYPE}
|
|
|
|
storage.type.sqlite.db = security.db
|
|
storage.type.sqlite.idletime = 120
|
|
storage.type.sqlite.maxsessions = 128
|
|
|
|
storage.type.postgresql.maxsessions = 64
|
|
storage.type.postgresql.idletime = 60
|
|
storage.type.postgresql.host = ${STORAGE_TYPE_POSTGRESQL_HOST}
|
|
storage.type.postgresql.username = ${STORAGE_TYPE_POSTGRESQL_USERNAME}
|
|
storage.type.postgresql.password = ${STORAGE_TYPE_POSTGRESQL_PASSWORD}
|
|
storage.type.postgresql.database = ${STORAGE_TYPE_POSTGRESQL_DATABASE}
|
|
storage.type.postgresql.port = ${STORAGE_TYPE_POSTGRESQL_PORT}
|
|
storage.type.postgresql.connectiontimeout = 60
|
|
|
|
storage.type.mysql.maxsessions = 64
|
|
storage.type.mysql.idletime = 60
|
|
storage.type.mysql.host = ${STORAGE_TYPE_MYSQL_HOST}
|
|
storage.type.mysql.username = ${STORAGE_TYPE_MYSQL_USERNAME}
|
|
storage.type.mysql.password = ${STORAGE_TYPE_MYSQL_PASSWORD}
|
|
storage.type.mysql.database = ${STORAGE_TYPE_MYSQL_DATABASE}
|
|
storage.type.mysql.port = ${STORAGE_TYPE_MYSQL_PORT}
|
|
storage.type.mysql.connectiontimeout = 60
|
|
|
|
|
|
########################################################################
|
|
########################################################################
|
|
#
|
|
# Logging: please leave as is for now.
|
|
#
|
|
########################################################################
|
|
logging.type = console
|
|
logging.path = $OWSEC_ROOT/logs
|
|
logging.level = debug
|