Configurable Property Keys

SW360 Configurable property keys

Introduction

List of all applicable property files in sw360:

  • sw360.properties
  • fossology.properties
  • couchdb.properties
  • search.properties
  • orgmapping.properties
  • databasetest.properties
  • authorization/application.yml
  • rest/application.yml

SW360.properties (/etc/sw360/sw360.properties)

The following table shall give an overview about the general sw360 configuration settings.

Property KeyDefault
licenseinfo.spdxparser.use-license-info-from-filestrue/false
mainline.state.enabled.for.usertrue/false
key.auth.emailEMAIL
key.auth.extidEXTID
key.auth.givennameGIVENNAME
key.auth.surnameSURNAME
key.auth.departmentDEPARTMENT
backend.urlhttp://127.0.0.1:8080
cvesearch.vendor.threshold1
cvesearch.product.threshold0
cvesearch.cutoff6
combined.cli.parser.external.id.correlation.key-
schedule.cvesearch.firstOffset.seconds0
schedule.cvesearch.interval.seconds“(246060)”
autostart-
rest.write.access.usergroupSW360_ADMIN
rest.access.token.validity.seconds3600
rest.security.client.idsw360-trusted-client
rest.security.client.secretsw360-secret
programming.languagesActionScript,AppleScript, Asp,Bash,BASIC, C,C++,C#,Cocoa,Clojure, COBOL,ColdFusion,D, Delphi,Erlang,Fortran, Go,Groovy,Haskell, JSP,Java,JavaScript,Objective-C, Ocaml,Lisp,Perl, PHP,Python,Ruby,SQL ,SVG,Scala,SmallTalk Scheme,Tcl,XML, Node.js,JSON
software.platformsAdobe AIR,Adobe Flash, Adobe Shockwave,Binary Runtime Environment for Wireless,Cocoa (API),Cocoa Touch,Java (software platform)
operating.systemsAndroid,BSD,iOS, Linux,OS X,QNX, Microsoft Windows,Windows Phone,IBM z/OS
clearing.teamsorg1,org2,org3
stateActive,Phase out,Unknown
project.typeCustomer Project,Internal Project,Product,Service,Inner Source
project.externalkeysinternal.id
license.identifiers-
component.categoriesframework,SDK,big-data, build-management,cloud,content, database,graphics,http, javaee,library,mail,mobile, security,testing,virtual-machine, web-framework,xml
component.externalkeyscom.github.id,com.gitlab.id,purl.id
custommap.project.rolesStakeholder,Analyst,Contributor,Accountant,End user,Quality manager,Test manager,Technical writer,Key user
custommap.component.rolesCommitter,Contributor,Expert
custommap.release.rolesCommitter,Contributor,Expert
custommap.release.externalIds-
release.externalkeysorg.maven.id,com.github.id,com.gitlab.id,purl.id
projectimport.hosts-
preferred.country.codesDE,AT,CH,US
MailUtil_from_No_Reply__@sw360.org
MailUtil_host-
MailUtil_port25
MailUtil_enableStarttlsfalse
MailUtil_enableSslfalse
MailUtil_isAuthenticationNecessarytrue
MailUtil_login-
MailUtil_password-
MailUtil_enableDebugfalse
MailUtil_supportMailAddress-
defaultBegin-
defaultEnd-
unsubscribeNoticeBefore-
unsubscribeNoticeAfter-

fossology.properties (/etc/sw360/fossology.properties)

These configuration parameters are necessary to connect to a fossology server.

Property KeyDefault
fossology.hostlocalhost
fossology.port22
fossology.usersw360
fossology.key.file/fossology.id_rsa
fossology.key.pub.file[fossology.key.file] + .pub

couchdb.properties (/etc/sw360/couchdb.properties)

CouchDB and Lucene serach configuration properties.

Property KeyDefault
couchdb.urlhttp://localhost:5984
couchdb.databasesw360db
couchdb.user-
couchdb.password-
couchdb.userdbsw360users
couchdb.attachmentssw360attachments
couchdb.fossologyKeyssw360fossologyKeys
couchdb.vulnerability_managementsw360vm
lucenesearch.limit25
lucenesearch.leading.wildcard*false

* If you enable lucene leading wildcards you have to enable this configuration also in couchdb-lucene.ini! Leading wildcard search is disabled as default because its a expensive operation. (couchdb-lucene.ini is part of the couchdb-lucene .war package)
[lucene]
allowLeadingWildcard=true

search.properties (/etc/sw360/search.properties)

The following table shall give an overview about the specific search properties

Property KeyDefault
search.name.max.length64

orgmapping.properties (/etc/sw360/orgmapping.properties)

This configuration file is used to activate the sw360 orgmapping feature.

Property KeyDefault
match.prefixfalse
enable.custom.mappingfalse

databasetest.properties (/etc/sw360/databasetest.properties)

Just for couchdb database test purpose.

Property KeyDefault
couch_db_urlhttp://localhost:5984
couch_db_databasedatahandlertestdb
couchdb.username-
couchdb.password-

authorization/application.yml (/etc/sw360/authorization/application.yml)

All of the following built-in properties can be overridden:


# Port to open in standalone mode
server:
  port: 8090

# Connection to the couch databases. Will be used to store client credentials
couchdb:
  url: http://localhost:5984
  database: sw360oauthclients
  # if your couchdb does not use authentication, pls just don't use the settings for username and password
  #username:
  #password:

spring:
  jackson:
    serialization:
      indent_output: true

# Common SW360 properties
sw360:
  # The url of the Liferay instance
  sw360-portal-server-url: ${SW360_PORTAL_SERVER_URL:http://127.0.0.1:8080}
  # The id of the company in Liferay that sw360 is run for
  sw360-liferay-company-id: ${SW360_LIFERAY_COMPANY_ID:20155}
  # Allowed origins that should be set in the header
  cors:
    allowed-origin: ${SW360_CORS_ALLOWED_ORIGIN:#{null}}

security:
  # Configuration for enabling authorization via headers, e.g. when using SSO
  # in combination with a reverse proxy server
  customheader:
    headername:
      # You have to enable authorization by headers explicitly here
      enabled: false
      # Attention: please make sure that the proxy is removing there headers
      # if they are coming from anywhere else then the authentication server
      intermediateauthstore: custom-header-auth-marker
      email: authenticated-email
      extid: authenticated-extid
      # also available - at least in saml pre auth - are "givenname", "surname" and "department"

  oauth2:
    resource:
      id: sw360-REST-API

rest/application.yml (/etc/sw360/rest/application.yml)

All of the following built-in properties can be overridden:

server:
  port: 8091

spring:
  http:
    multipart:
      max-file-size: 500MB
      max-request-size: 600MB

  data:
    rest:
      base-path: /api

# logging:
#   level:
#     org.springframework.web: DEBUG

security:
  oauth2:
    resource:
      id: sw360-REST-API
      filter-order: 3
      jwt:
        keyValue: |
          -----BEGIN PUBLIC KEY-----
          MIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEApz8Cr1o5yHMv/FUdF5uy
          VptilqdWtNvw5S6Tr4IaQ4XR9QPt8nlRsjOngfG4QCcKMBWJISldFg8PlJWUBeV+
          6TwQUidxokl2GbO6/+QA+lz1a5Ei1Y1pcnvFeRb2pdYlH3Yg6fXMxS6QwDLk27pZ
          5xbpSDIGISDesyaIMvwaKdhAbFW/tTb/oJY7rCPvmYLT80kJzilijJ/W01jMMSHg
          9Yi5cCt1eU/s78co+pxHzwNXO0Ul4iRpo/CXprQCsSIsdWkJTo6btal1xzd292Da
          d+9xq499JEsNbcqLfCq8DBQ7CEz6aJjMvPkvZiCrFIGxC/Gqmw35DQ4688rbkKSJ
          PQIDAQAB
          -----END PUBLIC KEY-----

sw360:
  thrift-server-url: ${SW360_THRIFT_SERVER_URL:http://localhost:8080}
  test-user-id: admin@sw360.org
  test-user-password: sw360-password
  couchdb-url: ${SW360_COUCHDB_URL:http://localhost:5984}
  cors:
    allowed-origin: ${SW360_CORS_ALLOWED_ORIGIN:#{null}}
Last modified June 22, 2022: SW360 website remodeling (#9) (3e6e7da)