Skip to content

Commit cc7ea7e

Browse files
committed
change application.properties to default
1 parent 36a46c9 commit cc7ea7e

4 files changed

Lines changed: 14 additions & 11 deletions

File tree

authentication/src/main/resources/application.properties

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ service.registry.port=8443
2424

2525
mqtt.api.enabled=false
2626
mqtt.broker.address=127.0.0.1
27-
mqtt.broker.port=4763
27+
mqtt.broker.port=1883
2828
mqtt.client.password=123456
2929

3030
############################################

consumer-authorization/src/main/resources/application.properties

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ spring.jpa.properties.hibernate.format_sql=true
2121

2222
mqtt.api.enabled=false
2323
mqtt.broker.address=127.0.0.1
24-
mqtt.broker.port=4763
24+
mqtt.broker.port=1883
2525
mqtt.client.password=123456
2626

2727
############################################
@@ -62,7 +62,7 @@ enable.blacklist.filter=false
6262
force.blacklist.filter=true
6363

6464
# Name of systems which are excluded from the blacklist check
65-
# blacklist.check.exclude.list=""
65+
# blacklist.check.exclude.list=
6666

6767
# Show all request/response in debug log
6868
log.all.request.and.response=false
@@ -91,7 +91,7 @@ simple.token.byte.size=32
9191
simple.token.usage.limit=5
9292

9393
# The secrets (consumer tokens, provider encryption keys) will be encrypted with this key before writing out into the database. Must be exactly 16 byte long!
94-
secret.cryptographer.key=abcd1234efgh5678
94+
secret.cryptographer.key=5v7xa6k0g9du8uz7
9595

9696
# Specifies how often (in milisec) to remove the expired and/or old tokens.
9797
# cleaner.job.interval=
@@ -110,6 +110,7 @@ server.ssl.key-store=classpath:certificate/ConsumerAuthorization.p12
110110
server.ssl.key-store-password=123456
111111
server.ssl.key-alias=ConsumerAuthorization.TestCloud.Company.arrowhead.eu
112112
server.ssl.key-password=123456
113+
# Set to "need" in case of CERTIFICATE authentication policy
113114
server.ssl.client-auth=none
114115
server.ssl.trust-store-type=PKCS12
115116
server.ssl.trust-store=classpath:certificate/truststore.p12

serviceorchestration-dynamic/src/main/resources/application.properties

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ spring.jpa.properties.hibernate.format_sql=true
2424

2525
mqtt.api.enabled=false
2626
mqtt.broker.address=127.0.0.1
27-
mqtt.broker.port=4763
27+
mqtt.broker.port=1883
2828
mqtt.client.password=123456
2929

3030
############################################
@@ -60,13 +60,13 @@ enable.blacklist.filter=false
6060
force.blacklist.filter=true
6161

6262
# Name of systems which are excluded from the blacklist check
63-
# blacklist.check.exclude.list=""
63+
# blacklist.check.exclude.list=
6464

6565
# Enable/disable the requirement for authorization control (when Arrowhead Core System is deployed to the local cloud)
6666
enable.authorization=true
6767

6868
# Enable/disable the inter-cloud orchestration
69-
enable.translation=true
69+
enable.translation=false
7070

7171
# Enable/disable orchestration with considering QoS
7272
enable.qos=false
@@ -108,6 +108,7 @@ server.ssl.key-store=classpath:certificate/DynamicServiceOrchestration.p12
108108
server.ssl.key-store-password=123456
109109
server.ssl.key-alias=DynamicServiceOrchestration.TestCloud.Company.arrowhead.eu
110110
server.ssl.key-password=123456
111+
# Set to "need" in case of CERTIFICATE authentication policy
111112
server.ssl.client-auth=none
112113
server.ssl.trust-store-type=PKCS12
113114
server.ssl.trust-store=classpath:certificate/truststore.p12

serviceregistry/src/main/resources/application.properties

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ spring.jpa.properties.hibernate.format_sql=true
2121

2222
mqtt.api.enabled=false
2323
mqtt.broker.address=127.0.0.1
24-
mqtt.broker.port=4763
24+
mqtt.broker.port=1883
2525
mqtt.client.password=123456
2626

2727
############################################
@@ -61,14 +61,14 @@ enable.blacklist.filter=false
6161
force.blacklist.filter=true
6262

6363
# Name of systems which are excluded from the blacklist check
64-
# blacklist.check.exclude.list=""
64+
# blacklist.check.exclude.list=
6565

6666
# Show all request/response in debug log
6767
log.all.request.and.response=false
6868

6969
# Set to open in order to make services directly discoverable [open, restricted]
7070
# When 'restricted', only the public core services are discoverable directly
71-
service.discovery.policy=open
71+
service.discovery.policy=restricted
7272

7373
# Name of systems which always have direct access to service discovery
7474
service.discovery.direct.access=DynamicServiceOrchestration
@@ -88,7 +88,7 @@ allow.self.addressing=true
8888

8989
# If true, the registration of systems and devices with non-routable IPv4 and IPv6 addresses are allowed.
9090
# In case of non-routable addresses the IP packets cannot be directed from one network to another.
91-
allow.non.routable.addressing=true
91+
allow.non.routable.addressing=false
9292

9393
# Alias keys under which the service addresses can appear in the interface properties
9494
service.address.alias=address,addresses,accessAddress,accessAddresses,host,hosts
@@ -115,6 +115,7 @@ server.ssl.key-store=classpath:certificate/ServiceRegistry.p12
115115
server.ssl.key-store-password=123456
116116
server.ssl.key-alias=ServiceRegistry.TestCloud.Company.arrowhead.eu
117117
server.ssl.key-password=123456
118+
# Set to "need" in case of CERTIFICATE authentication policy
118119
server.ssl.client-auth=none
119120
server.ssl.trust-store-type=PKCS12
120121
server.ssl.trust-store=classpath:certificate/truststore.p12

0 commit comments

Comments
 (0)