springfox.documentation.open-api.v3.path=/api-docs
server.servlet.contextPath=/across/1.0
server.port=8080

spring.jackson.date-format=com.tecnalia.across.RFC3339DateFormat


springdoc.swagger-ui.path=/swagger-ui.html


spring.jackson.deserialization.fail-on-unknown-properties=true


#PostgreSQL
#spring.jpa.database=POSTGRESQL
#spring.datasource.platform = postgresl
spring.datasource.platform = ujse
# DOCKER spring.datasource.url = jdbc:postgresql://postgres:5432/ujse
#spring.datasource.url = jdbc:postgresql://localhost:5432/ujse
#spring.datasource.url = jdbc:postgresql://134.209.204.98:31907/ujse
spring.datasource.url = jdbc:postgresql://across:5434/ujse
spring.datasource.username = postgres
spring.datasource.password = 12345

spring.jpa.show-sql=true
spring.jpa.generate-ddl=true
#spring.jpa.hibernate.ddl-auto=create
spring.jpa.hibernate.ddl-auto=none
spring.jpa.properties.hibernate.jdbc.lob.non_contextual_creation=true


spring.datasource.driver-class-name = org.postgresql.Driver
spring.jpa.database-platform = org.hibernate.dialect.PostgreSQLDialect


## Endpoints
management.endpoints.enabled-by-default=false


#Keycloak
spring.security.oauth2.resourceserver.jwt.issuer-uri=https://keycloak-security-dev.k8s.across-h2020.eu/realms/across-dev
token.endpoint.url.path=/protocol/openid-connect/token
keycloak.auth-server-url=https://keycloak-security-dev.k8s.across-h2020.eu
keycloak.realm=across-dev
keycloak.resource=ujse
keycloak.public-client=true
keycloak.bearer-only=true
keycloak.ssl-required=none
keycloak.verify-token-audience=true
keycloak.use-resource-role-mappings=true
keycloak.confidential-port=0

#Citizen FE key
citizen.fe.key=qXsP124nZYIdzovxDh2UCl4IXUljt6QPEU793AViER5N4tU4dqIcTmK4Q67IogH52DYPLG9EwGpSOWpvSyKrW8F1N9gtMTQR7BZQRH9ML9oLjEBqXCNGQNbzMZDNKXGI


#ssl settings
# The format used for the keystore. It could be set to JKS in case it is a JKS file
#server.ssl.key-store-type=JKS
# The path to the keystore containing the certificate
#server.ssl.key-store=file:/etc/keycloak/keystore.jks
# The password used to generate the certificate
#server.ssl.key-store-password=tecnalia2022
# The alias mapped to the certificate
#server.ssl.key-alias=1


#Service Catalog  ENG
service.catalog.uri.getServiceInfoENG=https://service-catalogue-server-dev.k8s.across-h2020.eu/service-catalogue/api/v2/services/json/**
service.catalog.uri.getServicesInfoENG=https://service-catalogue-server-dev.k8s.across-h2020.eu/service-catalogue/api/v2/services/specified/**?
service.catalog.uri.getPersonalDataServicesENG=https://service-catalogue-server-dev.k8s.across-h2020.eu/service-catalogue/api/v2/services/isPersonalDataHandling


#Transparency Dashboard
transparency.dashboard.main.uri=https://transparency-dashboard-be-td-dev.k8s.across-h2020.eu/api/rest/v1
transparency.dashboard.consent.uri=/consent/user/
transparency.dashboard.services.withoutconsent.uri=/services/without-consent
transparency.dashboard.selectServicesByUser.uri=/services
transparency.dashboard.consent.activated.uri=/service/check-status-consent/granted
transparency.dashboard.consent.info.uri=/services/status/granted
transparency.dashboard.consentevents.uri=/consent-event-log/user/
transparency.dashboard.datausage.uri=/service/usage


#DataUsageControl
datausage.enforcement.uri=https://uc-dev.k8s.across-h2020.eu/across/AcrossDataUsage/1.0
datausage.api.rest=/api/rest/v1
datausage.policy.template=/usage-policy
datausage.usagecontrol.checkdatausagepolicies=/service/check-data-usage-policies
datausage.usagecontrol.user=/user/


# Max file size.
spring.servlet.multipart.max-file-size=100MB
# Max request size.
spring.servlet.multipart.max-request-size=1000MB