Files
biz_service_ebtp_extend/src/main/resources/application-dev.yml

245 lines
7.4 KiB
YAML
Raw Normal View History

server:
port: 18018
servlet:
context-path: /
2025-04-14 11:02:17 +08:00
spring:
cloud:
nacos:
discovery:
server-addr: 127.0.0.1:8848
aop:
auto: true #开启spring的aop配置
proxy-target-class: true
2025-04-14 11:02:17 +08:00
application:
2021-03-08 16:52:57 +08:00
name: biz-service-ebtp-extend
2025-04-14 11:02:17 +08:00
2025-06-24 16:07:21 +08:00
datasource:
type: com.alibaba.druid.pool.DruidDataSource
driver-class-name: com.mysql.cj.jdbc.Driver
username: root
password: Unicom@2024
url: jdbc:mysql://59.110.10.99:53306/ebtp_mall_extend?serverTimezone=Asia/Shanghai&useUnicode=true&characterEncoding=utf-8&zeroDateTimeBehavior=convertToNull&useSSL=false&allowPublicKeyRetrieval=true
druid:
maxActive: 20
initialSize: 1
maxWait: 60000
minIdle: 1
timeBetweenEvictionRunsMillis: 60000
minEvictableIdleTimeMillis: 300000
validationQuery: select 'x'
testWhileIdle: true
testOnBorrow: false
testOnReturn: false
poolPreparedStatements: true
maxOpenPreparedStatements: 20
connection-properties: druid.stat.mergeSql=ture;druid.stat.slowSqlMillis=5000
props:
sql:
show: true
jackson:
date-format: yyyy-MM-dd HH:mm:ss
time-zone: GMT+8
serialization:
write-dates-as-timestamps: false
2025-04-14 11:02:17 +08:00
# 天宫Kafka增加了安全认证需要配置安全属性
kafka:
2025-06-24 16:07:21 +08:00
# bootstrap-servers: 10.125.164.192:32005,10.125.164.193:32005,10.125.164.194:32005
bootstrap-servers: 127.0.0.1:2181
2021-02-22 18:55:29 +08:00
template:
default-topic: jl_test
2025-04-14 11:02:17 +08:00
2021-02-22 18:55:29 +08:00
# 生产者配置参数
producer:
2021-02-22 18:55:29 +08:00
client-id: core-service-ebtp-crypt
2025-04-14 11:02:17 +08:00
properties:
2021-02-22 18:55:29 +08:00
security.protocol: SASL_PLAINTEXT
sasl.mechanism: SCRAM-SHA-256
sasl.jaas.config: org.apache.kafka.common.security.scram.ScramLoginModule required username="jltest" password="Unicom#123";
2025-04-14 11:02:17 +08:00
# 消费者配置参数
consumer:
2021-02-22 18:55:29 +08:00
group-id: core-service-ebtp-crypt-consumer
auto-offset-reset: latest
properties:
security.protocol: SASL_PLAINTEXT
sasl.mechanism: SCRAM-SHA-256
sasl.jaas.config: org.apache.kafka.common.security.scram.ScramLoginModule required username="jltest" password="Unicom#123";
2025-04-14 11:02:17 +08:00
2021-02-22 18:55:29 +08:00
# 天宫 redis 需要使用哨兵进行访问
redis:
2021-02-22 18:55:29 +08:00
sentinel:
master: mymaster
2025-06-24 16:07:21 +08:00
nodes: localhost:26379
password: pass
2025-04-14 11:02:17 +08:00
database:
sharding: 1
2025-06-24 16:07:21 +08:00
cache: 2
idempotent: 3
userinfo: 4
2025-05-16 16:39:42 +08:00
# 邮件配置
mail:
# host: smtp.126.com
# username: clc0820@126.com
# password: WGZnauWK9RXHYQcJ
host: mailtest.coscoshipping.com
username: bidding.test@coscoshipping.com
password: WBksH6GjtBBV7q6e
port: 465
default-encoding: UTF-8
properties:
mail:
smtp:
auth: true
starttls:
enable: true
# required: true
ssl:
enable: true
trust: mailtest.coscoshipping.com
# checkServerIdentity: false
socketFactory:
class: javax.net.ssl.SSLSocketFactory
2025-06-16 21:07:39 +08:00
# iam测试环境配置
iam:
2025-06-17 09:33:34 +08:00
url: https://sso.bj.internal.coscoshipping.com
2025-06-19 15:47:18 +08:00
# 天眼查测试环境配置
tianyancha:
custom_key: OMiJDRXf9_rxC1_XciulpZPocQMa
custom_secret: VWiByzLc8T310b_kfmeNuzWDFYIa
url: https://apigw.coscoshipping.com
username: SRM
password: Fjm123!@#
token: e48fa67e-d991-3542-b486-94e26a05425d
2025-06-25 16:29:09 +08:00
# 数据底座
dt:
url: http://10.12.0.168:8560
app_key: 5312cb20cca64fe9ba190e72ccec117d
app_secret: SnAc5SPNm5s=
# ioa测试环境配置
ioa:
url: http://10.18.55.175:19997
app_id: g8Jdg7kJLc
app_secret: d72d9660ac344f6af782ec9c3cb78648cb2250c7
# 合规风险系统
rm:
# url: https://rm.coscoshipping.com
url: http://192.168.1.153:8888/
username: esourcing@coscoshipping.com
password: JTsrm_2243
# 云通讯平台配置(短信)
cloopen:
url: https://app.cloopen.com:8883/
softVersion: 2013-12-26
accountSid: 8aaf070857f4daef0157fe76a1220724
authToken: fb5198e122fc4d1e9344525e5288029d
appId: 8aaf070857f4daef0157fe76a316072b
2025-08-07 10:44:26 +08:00
# 流程中心
workflow:
url: http://59.110.10.99:59999/
secret_key: 7t8qC8XYRh3AANfhP9Pqjeu5AHZRv19G
client_id: zhongyuan-haiyun
2025-06-17 09:33:34 +08:00
2025-06-16 21:07:39 +08:00
mybatis-plus:
configuration:
# 是否开启自动驼峰命名规则映射:从数据库列名到Java属性驼峰命名的类似映射
map-underscore-to-camel-case: true
auto-mapping-behavior: full
# 这个配置会将执行的sql打印出来在开发或测试的时候可以用
log-impl: org.apache.ibatis.logging.stdout.StdOutImpl
mapper-locations: classpath*:com/chinaunicom/mall/ebtp/**/mapper/*Mapper.xml
global-config:
# 逻辑删除配置
db-config:
# logic-delete-field: flag # 全局逻辑删除的实体字段名(since 3.3.0,配置后可以忽略不配置步骤2) @TableLogic
logic-delete-value: deleted # 逻辑已删除值
logic-not-delete-value: normal # 逻辑未删除值
2021-03-25 15:07:48 +08:00
# --------------feign ------------
feign:
httpclient:
enabled: false
okhttp:
enabled: true
client:
config:
default:
connect-timeout: 20000
read-timeout: 20000
2025-06-24 16:07:21 +08:00
logger-level: full
2021-03-25 15:07:48 +08:00
hystrix:
command:
default:
execution:
2021-02-22 18:55:29 +08:00
timeout:
enabled: true
isolation:
2021-02-22 18:55:29 +08:00
strategy: SEMAPHORE
thread:
timeoutInMilliseconds: 200000 #熔断超时时间
circuitBreaker:
sleepWindowInMilliseconds: 20000
forceClosed: true
2025-04-14 11:02:17 +08:00
ribbon:
ReadTimeout: 20000 #请求处理的超时时间
ConnectTimeout: 20000 #请求连接超时时间
MaxAutoRetries: 0 #对当前实例的重试次数
MaxAutoRetriesNextServer: 1 #切换实例的重试次数 1
2025-04-14 11:02:17 +08:00
mconfig:
workerId: 1
datacenterId: 1
2021-02-22 18:55:29 +08:00
# 服务名
feign:
name:
2021-02-25 14:40:43 +08:00
open: biz-service-ebtp-opening #开标大厅服务
process: biz-service-ebtp-process #评审流程服务
project: biz-service-ebtp-project #项目服务
resps: biz-service-ebtp-resps #应答结构化服务
rsms: biz-service-ebtp-rsms #评审结构化服务
2021-03-02 16:38:48 +08:00
tender: biz-service-ebtp-tender #投标服务
2021-03-25 15:07:48 +08:00
documentcenter: core-service-document-center #文档中心
2021-04-12 10:54:30 +08:00
usercenter: core-service-usercenter-public #用户中心
2021-08-20 15:50:02 +08:00
file:
2021-08-23 15:21:44 +08:00
font-address: /storage/fonts/
2021-08-20 15:50:02 +08:00
upload-address: /storage/reviewReport/
2025-06-24 16:07:21 +08:00
ioa:
app_id: g8Jdg7kJLc
app_secret: d72d9660ac344f6af782ec9c3cb78648cb2250c7
base_url: http://10.18.55.175:19997
2021-03-25 15:07:48 +08:00
document:
clientHttpUrl: http://10.242.31.158:8100/auth/oauth/token?grant_type=client_credentials&client_id=bVS46ElU&client_secret=58ea04ba02475c8da2321cc99849d2a10f15b749
2021-08-20 15:50:02 +08:00
2025-04-14 11:02:17 +08:00
# 用户暴露给 prometheus 的健康数据
2021-02-22 18:55:29 +08:00
management:
endpoints:
web:
exposure:
include: "*"
cors:
allowed-origins: "*"
allowed-methods: "*"
2025-08-07 10:44:26 +08:00
check:
porject:
name-value: 33333
num-value: 33333
length: 2000
checkBoolen: false
tokentime:
timeLimit: 5000
onof: 0
checkprivateKey : MIIBVAIBADANBgkqhkiG9w0BAQEFAASCAT4wggE6AgEAAkEAk7N3OeQS9WJa/v5dX/s9/DCKpJ8kOjR1Zrh1X+TF98udqGbGBWmiyVk2SqGPA4Q9kUCWw46CocjE047gx5AFrQIDAQABAkAIHG/stvCvlxImNLPOBI8X3VaPycmEhML5vCF9/aM9g1SuFa298Q5W8FqAmm8SE5lRpw2yyToWtLbufJtAa7wFAiEAxViJBkLU4wfPCwiPiAn17owXbocC9rj3fAzEH9DYDdcCIQC/mZp4ujO035Qqw2QQeFWpDc/vITx1OTWaxq6/LvvwGwIgXTZLSmzItw9aKOD7QotJ4UnES41zxetp4er5u/leA3MCIGcRw2ZEjII1b+hdOdweT75kfsId9/77apm7Xc/c/4yXAiEAnBrCiVXRNN+slO0MYaxynr4eIiPG/EjYBYxXlwBpeOc=
checkpublicKey: MFwwDQYJKoZIhvcNAQEBBQADSwAwSAJBAJOzdznkEvViWv7+XV/7PfwwiqSfJDo0dWa4dV/kxffLnahmxgVposlZNkqhjwOEPZFAlsOOgqHIxNOO4MeQBa0CAwEAAQ==