-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathapp.properties
131 lines (114 loc) · 5.04 KB
/
app.properties
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
// ----------------Cluster Configuration-----------------
// Name of the cluster this instance is in
ivan.prod.cluster=test
// ----------------------Logging-----------------------
ivan.prod.log.file=ivan.log
ivan.prod.log.level=Debug
// -------------Transaction Configuration----------------
// Format for transactions
ivan.prod.transaction.format=json
// Transaction ID's active
ivan.prod.transaction.id.stamp=True
// -----------------Event Configuration--------------
// Port to listen for events on
ivan.prod.udp.port=8764
// Method for streaming events
ivan.prod.event.stream.method=udp
// Format for events
ivan.prod.event.format=json
// --------------HTTP Socket Configuration----------------
// HTTP host to register with Consul
ivan.prod.http.host=127.0.0.1
// HTTP Port
ivan.prod.http.port=8766
// --------------------Connectivity----------------------
// Optional connectivity information when dependent services are
// needed and not registered with Consul
// Neo4j Connectivity String
// Used if neo4j.discover is false
// include username and password here
ivan.prod.neo4j=neo4j://localhost:7687
// Should we use Consul Service Discovery to find Neo4j?
ivan.prod.neo4j.discover=false
// If we are using service discovery, then we will also
// need to provide authentication information
ivan.prod.neo4j.auth.un=neo4j
ivan.prod.neo4j.auth.pw=admin
// Adrestia
ivan.prod.adrestia=http://localhost:8080
ivan.prod.adrestia.discover=false
ivan.prod.adrestia.secure=false
ivan.prod.adrestia.cache.load=true
// Clyman
ivan.prod.clyman.service.name=Clyman
// Consul Agent
// ivan.prod.consul=http://127.0.0.1/8500
// Location of the SSL Cert used to communicate with Consul
// ivan.prod.consul.cert=
// ACL Token string
// ivan.prod.consul.token=
// Vault Server
// ivan.prod.vault=http://127.0.0.1/8200
// Location of the SSL Cert used to communicate with Vault
// ivan.prod.vault.cert=
// Authentication type for Vault
// BASIC for userpass
// APPROLE for AppRole
// ivan.prod.vault.authtype=BASIC
// Authentication info for Vault
// ivan.prod.vault.un=test
// ivan.prod.vault.pw=test
// --------------------Security----------------------
// true to enable HTTPS socket, false to use HTTP socket
// If true, you need to either enable using Vault as a CA,
// and connect to a Vault instance, or provide an ssl.properties
// file which contains the certificate details. Keep in mind that
// the second method is not recommended for Production use, and
// SSL Certs should always come from Vault when running as a
// Linux Service or inside a Container.
//
// Secure values are configured by cluster name.
// See the configuration above, and the matching config options.
ivan.prod.transaction.security.ssl.enabled=false
// true to enable AES Encryption on events (UDP Messages)
ivan.prod.event.security.aes.enabled=false
// Should Ivan generate SSL Certs from a connected Vault Instance
// acting as a Certificate Authority?
ivan.prod.transaction.security.ssl.ca.vault.active=false
ivan.prod.transaction.security.ssl.ca.vault.role_name=test
ivan.prod.transaction.security.ssl.ca.vault.common_name=test
// Authentication type:
// - none: No authentication required
// - single: basic-auth with single user/password set in properties file
// - basic: basic-auth with users stored in Neo4j
ivan.prod.transaction.security.auth.type=none
// If auth.type is single, these set the only user.
// If auth.type is basic, these set the default user.
ivan.prod.test.transaction.security.auth.user=test
ivan.prod.test.transaction.security.auth.password=test
// Password used for SHA1 algorithm to generate hashes of the stored password
ivan.prod.test.transaction.security.hash.password=test
// Password used for AES Encryption
ivan.prod.test.event.security.out.aes.password=th1rds3cr3t
// Salt used for AES Encryption
ivan.prod.test.event.security.out.aes.salt=DE58008F64A44829
// Key used for AES Encryption
ivan.prod.test.event.security.out.aes.key=1393812869195417E6A266DC042A17CF8AD9B1652D740E667DFC15D0FAEB7352
// IV used for AES Encryption
ivan.prod.test.event.security.out.aes.iv=F9625F6F5C5E48AF25220C73DA68A344
// Password used for AES Decryption (Should match input key for CLyman)
ivan.prod.test.event.security.registration.aes.password=an0th3rs3cr3t
// Salt used for AES Decryption (Should match input salt for CLyman)
ivan.prod.test.event.security.registration.aes.salt=0AF46FFAD408DEE9
// Key used for AES Decryption (Should match input key for CLyman)
ivan.prod.test.event.security.registration.aes.key=F5C18B0613F578BFC4ACF00867A8A2E0512EDE180197241C40FB60E2201A5B6B
// IV used for AES Decryption (Should match input IV for CLyman)
ivan.prod.test.event.security.registration.aes.iv=8753F0BB2C932972822A54E3B2C622C1
// Password used for AES Decryption
ivan.prod.test.event.security.in.aes.password=b1gs3cr3t
// Salt used for AES Decryption
ivan.prod.test.event.security.in.aes.salt=2ED8B9B8EBCAB8AF
// Key used for AES Decryption
ivan.prod.test.event.security.in.aes.key=7134C6351598C63EDD21368130480A4ABC9AA35CEDAB6817A00186A9BE9643DE
// IV used for AES Decryption
ivan.prod.test.event.security.in.aes.iv=545D1665611DE4C401F60E35E88B34AE