-
Notifications
You must be signed in to change notification settings - Fork 5
/
.template.env
86 lines (67 loc) · 3.3 KB
/
.template.env
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
# The mysql host hostname
DB_HOST=localhost
# The mysql host port
DB_PORT=3306
# The mysql user name
DB_USER=root
# The mysql password
DB_PASSWORD=password
# The local port to listen for requests on
LISTEN_PORT=3002
# The external ForEx service endpoint
FXP_ENDPOINT=http://dummy.value
# The external settlements service endpoint
EXTERNAL_SETTLEMENTS_ENDPOINT=http://dummy.value
# The Mojaloop's central settlements service endpoint
CENTRAL_SETTLEMENTS_ENDPOINT=http://localhost:4000/v1
# The Mojaloop's central ledger service endpoint
CENTRAL_LEDGER_ENDPOINT=http://localhost:4001
# The Mojaloop's settlement management service endpoint
SETTLEMENT_MANAGEMENT_ENDPOINT=http://localhost:5000
# Dev/production
NODE_ENV=development
### ONLY SET TO TRUE FOR DEVELOPMENT USE ###
# Allow requests from any origin. Specifically, when true, reflects the origin protocol, hostname,
# port back to the requester in the Access-Control-Allow-Origin header. This is useful for
# testing and development, but should never be used in production as it is important for preventing
# CSRF attacks.
CORS_ACCESS_CONTROL_REFLECT_ORIGIN=true
### ONLY SET TO TRUE FOR DEVELOPMENT USE ###
# If true, the Secure directive will not be set in the Set-Cookie header. This means the browser
# will be able to send the cookie over connections that are insecure. You may need this to develop
# locally when BYPASS_AUTH is true. In other words, you may need this to develop locally when
# developing/debugging login/auth.
INSECURE_COOKIE=true
# Bypass auth. Useful when running locally.
BYPASS_AUTH=true
#Authentical Server (WSO2IS)
AUTH_SERVER_CLIENTKEY=getfromauthserver
AUTH_SERVER_CLIENTSECRET=getfromauthserver
AUTH_SERVER=https://localhost
AUTH_SERVER_PORT=9443
AUTH_SERVICE=/oauth2/token
USERINFO_SERVICE=/oauth2/userinfo
VALIDATE_SERVICE=/oauth2/introspect
REVOKE_SERVICE=/oauth2/revoke
#Hub Report URLs
HUB_REPORT_URL_312=http://localhost:5000/jasperserver/rest_v2/reports/
HUB_REPORT_URL_644=http://localhost:5000/jasperserver/rest_v2/reports/
JASPER_USER=user
JASPER_PASSWORD=password
#feature flags
FEATURE_FLAG_TRANSFER_VERIFICATION=false
### JWS .pem keys required for signature header validation
# This should specify the name of the file that contains the key in .pem format
# Used for searching Azure Log Analytics to extract transfer information for transfer verification
AZURE_AUTH_TOKEN_ENDPOINT=https://login.microsoftonline.com
AZURE_CLIENT_ID=ec3b168c-91db-4aa0-a7d3-ea9f6f999999
AZURE_CLIENT_SECRET=secret
AZURE_GRANT_TYPE=client_credentials
AZURE_KAFKA_MESSAGE_PATTERN=Producer.sendMessage::messageProtocol:'({.*?})'
AZURE_LOG_API_ENDPOINT=https://api.loganalytics.io/v1/
AZURE_REDIRECT_URI=http://localhost:5000
AZURE_RESOURCE=https://api.loganalytics.io/
AZURE_SEARCH_QUERY_REGEX=search '(.*)' | where LogEntry matches regex '.*Producer.sendMessage::messageProtocol:.*' | where LogEntry matches regex '.*transferId.*' | where LogEntry matches regex '.*fspiop-signature.*' | take 1 | project LogEntry
AZURE_SEARCH_QUERY_TEMPLATE=search '{{transferId}}' | where LogEntry matches regex '.*Producer.sendMessage::messageProtocol:.*' | where LogEntry matches regex '.*transferId.*' | where LogEntry matches regex '.*fspiop-signature.*' | take 1 | project LogEntry
AZURE_TENANT_ID=ec3b168c-91db-4aa0-a7d3-ea9f6f999999
AZURE_WORKSPACE_ID=e16d055b-7a9a-4e9b-bb4b-abcdef999999