Skip to content

Commit

Permalink
Fix fial start serivce due to issue with propertiy file
Browse files Browse the repository at this point in the history
Signed-off-by: Sreang Rathanak <[email protected]>
  • Loading branch information
Sreang Rathanak committed Sep 10, 2024
1 parent 8d47e99 commit 27bc6f2
Showing 1 changed file with 1 addition and 226 deletions.
227 changes: 1 addition & 226 deletions signup-service/src/main/resources/application-default.properties
Original file line number Diff line number Diff line change
@@ -1,226 +1 @@
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at https://mozilla.org/MPL/2.0/.
## ---------------------------------------------------------------------------------------------------------------------
# challenge.timeout, resend-delay are count as seconds
mosip.signup.identifier.regex=^\\+855[1-9]\\d{7,8}$
mosip.signup.identifier.prefix=+855
mosip.signup.supported-languages={'khm','eng'}
mosip.signup.default-language=khm
mosip.signup.password.pattern=^(?=.*[0-9])(?=.*[a-z])(?=.*[A-Z])(?=.*[\\x5F\\W])(?=.{8,20})[a-zA-Z0-9\\x5F\\W]{8,20}$
mosip.signup.password.max-length=20
mosip.signup.generate-challenge.blocked.timeout=300
mosip.signup.challenge.timeout=60
mosip.signup.audit.description.max-length=2048
mosip.signup.password.min-length=8
mosip.signup.fullname.pattern=^[\\u1780-\\u17FF\\u19E0-\\u19FF\\u1A00-\\u1A9F\\u0020]{1,30}$

## Time given to generate and verify the challenge in seconds.
## Default resend delay is 60 seconds, with 3 attempts, so 60*3=180 seconds.
## Adding 60 seconds for the default generate challenge 180+60=240
## Adding 10 seconds buffer to default 240 seconds = 250 seconds.
## so 250 seconds is the Generate and verify cookie max age.
mosip.signup.unauthenticated.txn.timeout=250
mosip.signup.challenge.resend-attempt=3
mosip.signup.challenge.verification-attempt=3
mosip.signup.challenge.resend-delay=60

## Time given to complete registration and get back the status of the registration in seconds.
## Considering 5 minutes(300 seconds) to complete registration form and submit.
## Default status request limit is 10 with 20 seconds request delay, 10*20=200 seconds
## so 300+200=500 seconds is the authentication cookie max age.
mosip.signup.verified.txn.timeout=300
mosip.signup.status-check.txn.timeout=200
mosip.signup.status.request.delay=20
mosip.signup.status.request.limit=10

mosip.signup.task.core.pool.size=2
mosip.signup.task.max.pool.size=4

mosip.signup.slot.max.pool.size=20
mosip.signup.slot.expire-in-seconds=3600
mosip.signup.slot.cleanup-cron=0 0 * * * *
mosip.signup.slot.max-count=50
mosip.signup.slot.request.delay=20
mosip.signup.slot.request.limit=10

mosip.signup.identity-verification.txn.timeout=180
mosip.signup.slot-allotted.txn.timeout=180

mosip.signup.config-server-url=https://raw.githack.com/mosip/mosip-config/camdgc-dev/

mosip.signup.oauth.client-id=mosip-signup-oauth-client
mosip.signup.oauth.redirect-uri='https://signup.dev.mosip.net/identity-verification'
mosip.signup.oauth.issuer-uri=https://esignet.dev.mosip.net
mosip.signup.oauth.keystore-path=keystore.p12
mosip.signup.oauth.keystore-password=mosip
mosip.signup.oauth.key-alias=signup
mosip.signup.oauth.token-uri=https://esignet.dev.mosip.net/v1/esignet/oauth/v2/token
mosip.signup.oauth.audience=https://esignet.dev.mosip.net/v1/esignet/oauth/v2/token
mosip.signup.oauth.userinfo-uri=https://esignet.dev.mosip.net/v1/esignet/oidc/userinfo

mosip.signup.generate-challenge.endpoint=${mosip.api.internal.url}/v1/otpmanager/otp/generate
mosip.signup.audit-endpoint=${mosip.api.internal.url}/v1/auditmanager/audits
mosip.signup.send-notification.endpoint=${mosip.api.internal.url}/v1/notifier/sms/send

## ------------------------------------- challenge configuration -------------------------------------------------------
mosip.signup.supported.generate-challenge-type=OTP
mosip.signup.supported.challenge-format-types={'alpha-numeric', 'base64url-encoded-json'}
mosip.signup.supported.challenge-types={'OTP', 'KBI'}
mosip.signup.supported.challenge.otp.length=6

## ------------------------------------- Cache configuration -----------------------------------------------------------

mosip.signup.cache.symmetric-algorithm-name=AES/CFB/PKCS5Padding
spring.cache.type=simple

#spring.cache.type=redis
#spring.cache.cache-names=${mosip.esignet.cache.names}
#spring.redis.host=localhost
#spring.redis.port=6379
management.health.redis.enabled=false

mosip.esignet.cache.names=challenge_generated,challenge_verified,status_check,blocked_identifier,keystore,key_alias,request_ids,identity_verification,identity_verifiers,slot_allotted,verified_slot

mosip.esignet.cache.size={'challenge_generated': 200, \
'challenge_verified': 200,\
'status_check': 200,\
'blocked_identifier':2000,\
'keystore' : 10, \
'key_alias' : 1,\
'request_ids' : 300,\
'identity_verification': 200,\
'identity_verifiers' : 20, \
'slot_allotted' : 20, \
'verified_slot' : 50 }

## Note: keystore TTL should be more than the key_alias cache TTL.
## So that key rotation happens before the actual key is removed from the keystore cache.
mosip.esignet.cache.expire-in-seconds={'challenge_generated': ${mosip.signup.unauthenticated.txn.timeout},\
'challenge_verified': ${mosip.signup.verified.txn.timeout},\
'status_check': ${mosip.signup.status-check.txn.timeout}, \
'blocked_identifier': ${mosip.signup.generate-challenge.blocked.timeout},\
'keystore' : 600, \
'key_alias' : ${mosip.signup.verified.txn.timeout},\
'request_ids' : ${mosip.signup.status-check.txn.timeout},\
'identity_verification' : ${mosip.signup.identity-verification.txn.timeout},\
'identity_verifiers' : 800, \
'slot_allotted' : ${mosip.signup.slot-allotted.txn.timeout}, \
'verified_slot' : ${mosip.signup.slot.expire-in-seconds}} }

## ------------------------------------- Auth adapter ------------------------------------------------------------------
mosip.api.internal.url=https://api-internal.dev.mosip.net
keycloak.external.url=https://iam.dev.mosip.net
keycloak.internal.url=https://iam.dev.mosip.net
auth.server.validate.url=${mosip.api.internal.url}/v1/authmanager/authorize/admin/validateToken
auth.server.admin.issuer.uri=${keycloak.external.url}/auth/realms/
auth-token-generator.rest.issuerUrl=${keycloak.internal.url}/auth/realms/mosip
mosip.keycloak.issuerUrl=${keycloak.internal.url}/auth/realms/mosip
mosip.auth.adapter.impl.basepackage=io.mosip.kernel.auth.defaultadapter
mosip.kernel.auth.adapter.ssl-bypass=true
mosip.kernel.auth.appid-realm-map={admin:'mosip',crereq:'mosip',creser:'mosip',idrepo:'mosip', signup:'mosip'}
mosip.kernel.auth.appids.realm.map={admin:'mosip',crereq:'mosip',creser:'mosip',idrepo:'mosip','regproc':'mosip', signup:'mosip'}

mosip.iam.adapter.clientid=mosip-signup-client
mosip.iam.adapter.clientsecret=abc@123
mosip.iam.adapter.appid=signup
mosip.iam.adapter.issuerURL=${keycloak.external.url}/auth/realms/mosip
mosip.authmanager.client-token-endpoint=${mosip.api.internal.url}/v1/authmanager/authenticate/clientidsecretkey
mosip.iam.adapter.validate-expiry-check-rate=15
mosip.iam.adapter.renewal-before-expiry-interval=15
mosip.iam.adapter.self-token-renewal-enable=true

mosip.service-context=${server.servlet.context-path}
mosip.service.end-points=/**/*
mosip.service.exclude.auth.allowed.method=GET,POST

mosip.security.csrf-enable=true
mosip.security.cors-enable=true

## --------------------------------- Integration -----------------------------------------------------------------------
mosip.signup.integration.impl.basepackage=io.mosip.signup.plugin.mosipid,io.mosip.signup.plugin.mock
mosip.signup.integration.profile-registry-plugin=MOSIPProfileRegistryPluginImpl

mosip.signup.idrepo.schema-url=${mosip.api.internal.url}/v1/masterdata/idschema/latest?schemaVersion=
mosip.signup.idrepo.get-identity.endpoint=${mosip.api.internal.url}/idrepository/v1/identity/idvid/
mosip.signup.idrepo.identity.endpoint=${mosip.api.internal.url}/idrepository/v1/identity/
mosip.signup.idrepo.generate-hash.endpoint=${mosip.api.internal.url}/v1/keymanager/generateArgon2Hash
mosip.signup.idrepo.get-uin.endpoint=${mosip.api.internal.url}/v1/idgenerator/uin
mosip.signup.idrepo.get-status.endpoint=${mosip.api.internal.url}/v1/credentialrequest/get/
mosip.signup.idrepo.add-identity.request.id=mosip.id.create
mosip.signup.idrepo.update-identity.request.id=mosip.id.update
mosip.signup.idrepo.identity.request.version=v1
mosip.signup.idrepo.mandatory-language=khm
mosip.signup.idrepo.optional-language=eng
mosip.signup.idrepo.idvid-postfix=@phone

mosip.signup.identity-verification.mock.usecase=usecase1

## --------------------------------- captcha validation------------------------------------------------------------------
mosip.signup.send-challenge.captcha-required=false
mosip.esignet.captcha.module-name=signup
mosip.esignet.captcha.validator-url=https://api-internal.dev.mosip.net/v1/captcha/validatecaptcha
mosip.signup.captcha.site-key=6LcdIvsoAAAAAMq_WeWuxfxgt26Nl3cjvMc-4IUJ

## ----------------------------- UI-Config -----------------------------------------------------------------------------

mosip.signup.minimum-browser-version={ \
'chrome': '118.0.5993.72', \
'firefox': '118.0.2', \
'edge': '118.0.2088.46', \
'safari': '14.1' }

# Only after current challenge timeout we should enable resend in the UI.
# In this case timeout and resend-delay should be same always.
mosip.signup.ui.config.key-values={\
'identifier.pattern': '${mosip.signup.identifier.regex}', \
'identifier.prefix': '${mosip.signup.identifier.prefix}', \
'captcha.site.key': '${mosip.signup.captcha-validator.site-key}', \
'otp.length': ${mosip.signup.supported.challenge.otp.length}, \
'password.pattern': '${mosip.signup.password.pattern}', \
'password.length.max': ${mosip.signup.password.max-length}, \
'password.length.min': ${mosip.signup.password.min-length}, \
'challenge.timeout': ${mosip.signup.challenge.resend-delay}, \
'resend.attempts': ${mosip.signup.challenge.resend-attempt}, \
'resend.delay': ${mosip.signup.challenge.resend-delay}, \
'fullname.pattern': '${mosip.signup.fullname.pattern}', \
'status.request.delay': ${mosip.signup.status.request.delay}, \
'status.request.limit': ${mosip.signup.status.request.limit}, \
'slot.request.delay': ${mosip.signup.slot.request.delay}, \
'slot.request.limit': ${mosip.signup.slot.request.limit}, \
'popup.timeout': 10, \
'signin.redirect-url': 'https://esignet.dev.mosip.net/authorize', \
'identifier.allowed.characters': '^[0-9]+', \
'identifier.length.min': 8, \
'identifier.length.max': 9, \
'fullname.allowed.characters': '^[\\u1780-\\u17FF\\u19E0-\\u19FF\\u1A00-\\u1A9F\\u0020]', \
'fullname.length.min': 1, \
'fullname.length.max': 30, \
'otp.blocked' : ${mosip.signup.generate-challenge.blocked.timeout}, \
'send-challenge.captcha.required': ${mosip.signup.send-challenge.captcha-required}, \
'signup.oauth-client-id': '${mosip.signup.oauth.client-id}', \
'identity-verification.redirect-url': '${mosip.signup.oauth.redirect-uri}', \
'broswer.minimum-version': ${mosip.signup.minimum-browser-version}, \
'online.polling.timeout': 5000,\
'offline.polling.interval': 5000,\
'offline.polling.timeout': 5000,\
'offline.polling.enabled': true,\
'offline.polling.url': 'https://ipv4.icanhazip.com/'} }

## ----------------------------- Notification templates ----------------------------------------------------------------
# Default charset encoding ISO-8859-1 does not support khmer language characters, so templates in khm language are base64 encoded.
mosip.signup.sms-notification-template.encoded-langcodes={'khm'}
mosip.signup.sms-notification-template.send-otp.khm=4Z6U4Z+S4Z6a4Z6+IHtjaGFsbGVuZ2V9IOGeiuGevuGemOGfkuGelOGeuOGeleGfkuGekeGfgOGehOGeleGfkuGekeGetuGej+Gfi+GeguGejuGek+GeuCBLaElEIOGemuGelOGen+Gfi+GeouGfkuGek+GegOGflA==
mosip.signup.sms-notification-template.send-otp.eng=Use {challenge} to verify your KhID account.
mosip.signup.sms-notification-template.registration.khm=4Z6i4Z+S4Z6T4Z6A4Z6U4Z624Z6T4Z6F4Z674Z+H4Z6I4Z+S4Z6Y4Z+E4Z+H4Z6C4Z6O4Z6T4Z64IEtoSUQg4Z6K4Z+E4Z6Z4Z6H4Z+E4Z6C4Z6H4Z+Q4Z6Z4Z+U
mosip.signup.sms-notification-template.registration.eng=You successfully registered to KhID account.
mosip.signup.sms-notification-template.forgot-password.khm=4Z6i4Z+S4Z6T4Z6A4Z6U4Z624Z6T4Z6V4Z+S4Z6b4Z624Z6f4Z+L4Z6U4Z+S4Z6K4Z684Z6a4Z6W4Z624Z6A4Z+S4Z6Z4Z6f4Z6Y4Z+S4Z6E4Z624Z6P4Z+LIEtoSUQg4Z6K4Z+E4Z6Z4Z6H4Z+E4Z6C4Z6H4Z+Q4Z6Z4Z+U
mosip.signup.sms-notification-template.forgot-password.eng=You successfully changed KhID password.

## ------------------------------------------ Kafka configurations ------------------------------------------------------
kafka.bootstrap-servers=localhost:9092
kafka.consumer.group-id=signup-idv-kafka
kafka.consumer.enable-auto-commit=true

## ------------------------------------------ Others ---------------------------------------------------------------------
logging.level.io.mosip.signup=DEBUG
q

0 comments on commit 27bc6f2

Please sign in to comment.