Skip to content
vky25 edited this page Apr 10, 2022 · 1 revision

Welcome to the PDA-SESSION wiki! GETTING STARTED

Prerequisites

  • Git
  • Docker

Installation

Note: Before installing the application, we need to create an AWS public bucket

Building the library

git clone https://github.com/arghyam/PDA-SESSION.git

cd PDA-SESSION

git checkout patch/POC

Configuration

Copy the below list of configuration and add it to application.properties file inside src/main/resources folder, insert the values with proper configuration details.

server.port = 9091

#neo4j Configuration Same registry Configuration

server.nginx.name=http://domainname #pda-web Endpoint

spring.data.neo4j.username=neo4j

spring.data.neo4j.password=neo4j

spring.data.neo4j.port=7687

spring.data.neo4j.uri=bolt://localhost:7687 #neo4j url

# Postgres Database Configuration

spring.jpa.properties.hibernate.jdbc.lob.non_contextual_creation=true

spring.datasource.url=jdbc:postgresql://localhost:5432/pda_session

spring.datasource.username=postgres

spring.datasource.password=password

spring.jpa.properties.hibernate.dialect=org.hibernate.dialect.PostgreSQLDialect

spring.jpa.hibernate.ddl-auto=update

#PDA Application URL

iam-baseurl= http://localhost:9090/api/v2/user/

Entity.get=http://localhost:9092/api/v1/entity/

registry-base-url=http://localhost:8090/

getGenerateAttestationUrl=http://localhost:9092/api/v1/entity/

#keycloak Configuration

keycloak.principal-attribute=preferred_username

keycloak.auth-server-url=http://localhost:8080/auth/ #Keycloak URL

keycloak.realm=master

keycloak-client-id=admin-cli

keycloak.credentials.secret= #keycloak client secret key

keycloak-public-key= #keycloak realm Public key

client.granttype=password # Keycloak Grant Type

admin-user-username=admin # Keycloak login username

admin-user-password=admin # Keycloak login password

keycloak.resource=account

keycloak.bearer-only = true

#encrypt/decrypt values

salt-value= #In case to change the value refer PDA-WEB wiki

iv-value= #In case to change the value refer PDA-WEB wiki

secret-key=t #In case to change the value refer PDA-WEB wiki

key-size=128

iteration-count=1000

spring.jpa.show-sql=true

# Clevertap Credential Configuration

clevertap.account-id=

clevertap.passcode=

clevertap.base.uri=http://localhost:9092/api/v1/entity/

# aws s3 configuration

aws-accesskey=""

aws-secretkey=""

aws-s3-bucket-name=""

aws-s3-url=""

aws-region=""

aws-qrcode=qr-code/

aws-s3-session-qr-folder-name=session-qr

#name of the private bucket

aws-s3-bucket-name-private=""

#url of the private bucket

aws-s3-url-private=""

# Threshold after which files are written to disk.

spring.servlet.multipart.enabled=true

spring.servlet.multipart.file-size-threshold=2KB

# Max file size.

spring.servlet.multipart.max-file-size=50MB

# Max Request Size

spring.servlet.multipart.max-request-size=55MB

# generate attestation url

attestation.generate=http://localhost:9092/api/v1/template/

attestation.generate.multiple=http://127.0.0.1:9092/api/v1/template/

organisation.get=http://localhost:9092/api/v1/entity/orgs

organisation.get.names=http://localhost:9092/api/v1/entity/orgs/names

#Email SMTP Configuration

sourcemailid=

sourceemailpassword=

mail-smtp-auth=mail.smtp.auth

mail-smtp-starttls-enable=mail.smtp.starttls.enable

mail-smtp-host=mail.smtp.host

smtp-gmail-com=smtp.gmail.com

mail-smtp-port=mail.smtp.port

port=587

#Cron Email Configuration

cron-email-path=templates/CronEmail.html

cron-email-subject=MemberAttestation-CRON

#Logging

log.location=/home/logs/session

management.endpoints.web.exposure.include=prometheus

session-qr-code-path=PDA-SESSION/src/main/resources/templates/

member-attestation-schedular-email=

session-end-minutes=240

Update src/main/java/com/socion/session/utils/KeycloakUtil.java

Example

private static String publicKeyString = “Keycloak realm publicKey”

Commenting logstash configuration

Comment this section in src/main/resources/logback.xml as shown in the screenshot below. This can be uncommented and configured once logstash is configured.

Generating keycloak certificate in root folder

openssl x509 -in <(openssl s_client -connect <KEYCLOAK_HOST>:8443 -prexit 2>/dev/null) -out keycloak.crt

Starting Service using Docker

docker build -t : .

docker run -dp 9091:9091 :