source: MILK/trunk/milk_server/milk.config @ 5128

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/MILK/trunk/milk_server/milk.config@5128
Revision 5128, 10.9 KB checked in by cbyrom, 10 years ago (diff)

Adjust atom links when in editor mode to point to the editor instance

  • and correct these when saving the data so that the links actually

point to the browse service + turn of granule delete function when not
in edit mode + remove duplicated inclusion of badc icon + tidy up
config file.

Line 
1#
2# MILK Configuration File
3# At deployment time the only pieces that a user ought to need to customise
4# will be
5#    - the server address
6#    - it might be necessary to customise the location of the layout directory
7#    - the localLink, localImage and localAlt in the [layout] section
8#
9[DEFAULT]
10#
11# the following is the server on which this browse/discovery instance runs!
12server:         http://localhost:5000
13#server:       http://superglue.badc.rl.ac.uk:8083
14## This is the proxied server root
15#server: http://superglue.badc.rl.ac.uk/ndg-test
16
17#
18# the following is the server on which the NDG discovery service is running! (Not to be confused with
19# the server on which the NDG discovery web service is running). This can and probably should be the local
20# server (i.e. don't change it!)
21#
22ndgServer:      %(server)s
23#
24##!NOTE: These are changed to  reflect the proxy prefix
25layout:          /layout/
26icondir:         /layout/icons/
27
28#
29mailserver:       xxxoutbox.rl.ac.uk
30metadataMaintainer: b.n.lawrence@rl.ac.uk
31repository:        %(server)s
32tbrecipient:      b.n.lawrence@rl.ac.uk
33
34# The following should only be needed for debugging some parts of the code when running on sandboxes behind a firewall
35proxyServer:      http://wwwcache.rl.ac.uk:8080/
36disclaimer:       
37
38# if set to True, errors output will generally be more verbose - e.g. with stacktrace to templates
39debug: True             
40
41[SEARCH]
42advancedURL:        %(ndgServer)s/discovery
43discoveryURL:       %(ndgServer)s/discovery
44helpURL:            %(ndgServer)s/discovery?help=1
45
46[logging]
47debuglog:        discovery.log
48
49[layout]
50###### user customisable:
51localLink:      %(ndgServer)s/layout/
52localImage:     %(icondir)sndg_logo_circle.gif
53localAlt:       visit badc
54###### ought to be the end of the customisations
55ndgLink:        http://ndg.nerc.ac.uk/
56ndgImage:       %(icondir)sndg_logo_circle.gif
57ndgAlt:         visit ndg
58stfcLink:       http://ceda.stfc.ac.uk/
59stfcImage:      %(icondir)sstfc-circle-sm.gif
60key:            %(icondir)spadlock.png
61Xicon:          %(icondir)sxml.png
62plot:           %(icondir)splot.png
63printer:        %(icondir)sprinter.png
64helpIcon:       %(icondir)shelp.png
65HdrLeftAlt:     %(icondir)s British Atmospheric Data Centre
66HdrLeftLogo:    %(icondir)sbadc_logo.gif
67navMinus:       %(icondir)snavigate_minus.png
68navPlus:                %(icondir)snavigate_plus.png
69loadingIcon:    %(icondir)sloading.gif
70
71pageLogo:       %(layout)s20050502_albert-park_silhouetted-trees-and-clouds_02_cropped.jpg
72
73[HELP]
74helpFile:       %(layout)shelp.html
75
76[WMC_CLIENT]
77# specify url for the client; if not specified it will not be possible to view WMS data for
78# discovered records
79url=
80
81[NDG_A_SERVICE]
82badc.nerc.ac.uk: http://glue.badc.rl.ac.uk/cgi-bin/dxui
83icon: %(icondir)splot.png
84#%(icondir)sdata_aservice.png
85icon_alt: A Service
86service_name: A
87icon_title: LINKS to a DATA BROWSE view of this dataset
88instance: datasetURI_%s
89
90[NDG_B_SERVICE]
91#
92#These are the hosts which are publicly available on which the browse
93#service is running. The list should be of the form 'repository: hostname'
94#where repository is the NDG identifier ....
95#
96neodc.nerc.ac.uk: %(server)s
97badc.nerc.ac.uk: %(server)s
98www.npm.ac.uk: http://wwwdev.neodaas.ac.uk/projects/ndg
99grid.bodc.nerc.ac.uk: http://grid.bodc.nerc.ac.uk
100ndg.noc.soton.ac.uk: http://ndg.noc.soton.ac.uk:8001
101icon: %(icondir)sbrowse_bservice.png
102icon_alt: B Service
103icon_title: Links to a METADATA BROWSE view of this dataset
104service_name: B
105instance: SERVICEHOST/view/URI
106
107[NDG_EXIST]
108#
109# following is a list of repository servers, actually only one is needed,
110# at any one location running browse, and that is the local one. The
111# entire purpose of the rest of the list is to simplify updates. These
112# hosts do not need to be visible outside of corporate firewalls.
113# The list should be of the form 'repository: hostname' where repository
114# is the NDG identifier.
115#
116local: bora.badc.rl.ac.uk
117badc.nerc.ac.uk: bora.badc.rl.ac.uk
118neodc.nerc.ac.uk: bora.badc.rl.ac.uk
119grid.bodc.nerc.ac.uk: grid.bodc.nerc.ac.uk
120ndg.noc.soton.ac.uk: ndg.noc.soton.ac.uk
121www.npm.ac.uk: pgsql.npm.ac.uk
122passwordFile: ./passwords.txt
123
124#
125# NDG Security
126#
127
128# Security settings for configuration as a client to a Single Sign On Service
129# i.e. Where Are You From, login and logout operations are handled by a
130# separate standalone paster instance
131#[NDG_SECURITY.ssoClient]
132## THIS service's address for secure connections - the Single Sign On service
133## returns security parameters to this service along this channel
134#sslServer: https://localhost
135##sslServer: https://ndgbeta.badc.rl.ac.uk
136#
137## THIS service's address for unencrypted connections - when login is complete,
138## the BaseController redirects to an equivalent address under this host name.
139## sslServer and server settings must match for the sharing of cookies.
140#server: http://localhost
141#
142## WAYF running on Single Sign On Service - omit to default to WAYF running on
143## THIS paster instance
144#wayfURI:               https://localhost/sso/wayf
145#
146## Logout URI running on Single Sign On Service - omit to default to logout
147## running on THIS paster instance
148#logoutURI:             https://localhost/sso/logout
149
150# Security settings for running a Single Sign On Service from this paster
151# instance.  Either NDG_SECURITY.ssoClient or NDG_SECURITY.ssoService sections
152# should be set but NOT both
153
154# Single Sign On Service Settings
155[NDG_SECURITY.ssoService]
156
157# THIS service's address for secure connections - the Single Sign On service
158# returns security parameters to this service along this channel
159sslServer: https://localhost
160#sslServer: https://ndgbeta.badc.rl.ac.uk
161
162# THIS service's address for unencrypted connections - when login is complete,
163# the BaseController redirects to an equivalent address under this host name.
164# sslServer and server settings must match for the sharing of cookies.
165server: http://localhost
166
167enableOpenID: True
168
169# Redirect SOAP output to a file e.g. open(<somefile>, 'w')
170tracefile: None
171#tracefile: sys.stderr
172
173# Service addresses
174sessionMgrURI: https://localhost/SessionManager
175#sessionMgrURI: https://ndgbeta.badc.rl.ac.uk/SessionManager
176attAuthorityURI: http://localhost:5000/AttributeAuthority
177#attAuthorityURI: http://aa.ceda.rl.ac.uk
178
179# SSL Connections
180#
181# Space separated list of CA cert. files.  The peer cert.
182# must verify against at least one of these otherwise the connection is
183# dropped.  Include CA certs for all the sites trusted
184sslCACertFilePathList: certs/ndg-test-ca.crt
185
186# Web Services HTTP Proxy fine tuning
187#
188# For most situations, these settings can be ignored and instead make use of
189# the http_proxy environment variable.  They allow for the case where specific
190# settings are needed just for the security web services calls
191
192# Overrides the http_proxy environment variable setting - may be omitted
193#httpProxyHost: wwwcache.rl.ac.uk:8080
194
195# Web service clients pick up the no_proxy environment variable setting by
196# default.  Set this parameter to override no_proxy for web service
197# connections. 
198#noHttpProxyList: localhost, 127.0.0.1
199
200# WS-Security signature handler - set a config file with 'wssCfgFilePath'
201# or omit and put the relevant content directly in here under
202# 'NDG_SECURITY.wssecurity' section
203#wssCfgFilePath: wssecurity.cfg
204
205[NDG_SECURITY.wssecurity]
206
207# Settings for signature of an outbound message ...
208
209# Certificate associated with private key used to sign a message.  The sign
210# method will add this to the BinarySecurityToken element of the WSSE header. 
211# binSecTokValType attribute must be set to 'X509' or 'X509v3' ValueType. 
212# As an alternative, use 'signingCertChain' parameter
213
214# file path PEM encoded cert
215signingCertFilePath=certs/clnt.crt
216
217# file path to PEM encoded private key file
218signingPriKeyFilePath=certs/clnt.key
219
220# Password protecting private key.  Leave blank if there is no password.
221signingPriKeyPwd=
222
223# Provide a space separated list of file paths.  CA Certs should be included
224# for all the sites this installation trusts
225caCertFilePathList=certs/ndg-test-ca.crt
226
227# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
228# signed message. 
229reqBinSecTokValType=X509v3
230
231# Add a timestamp element to an outbound message
232addTimestamp=True
233
234# For WSSE 1.1 - service returns signature confirmation containing signature
235# value sent by client
236applySignatureConfirmation=False
237
238#
239# Gatekeeper settings
240#
241[NDG_SECURITY.gatekeeper]
242#
243# Policy Enforcement Point calls a Policy Decision Point interface:
244
245# File path to Python module containing the PDP class - leave blank if the
246# module is in PYTHONPATH env var
247pdpModFilePath:
248
249# Name of PDP Python module
250pdpModName: ndg.security.common.authz.pdp.browse
251
252# Name of PDP class used
253pdpClassName: BrowsePDP
254
255# File Path to configuration file used by PDP class (environment variables
256# can be used in this path e.g. $PDP_CONFIG_DIR/pdp.cfg.  Omit this parameter
257# to make the PEP read the PDP settings from THIS config file
258#pdpCfgFilePath:
259
260# Read PDP params from THIS section
261pdpCfgSection: NDG_SECURITY.gatekeeper
262
263#
264# Settings for Policy Decision Point called by the PEP
265
266# Address of Attribute Authority for Data Provider
267#aaURI: http://aa.ceda.rl.ac.uk
268aaURI: http://localhost:5000/AttributeAuthority
269
270# Verify peer cert for SSL connections to Session Manager
271sslCACertFilePathList: certs/ndg-test-ca.crt
272
273# Set to file object to dump SOAP message output for debugging
274tracefile:
275
276# CA certificates used to verify the signature of user Attribute Certificates
277# - space delimited list but note that currently only the CA of this site
278# is needed because only mapped Attribute Certificates may be accepted.
279acCACertFilePathList: certs/ndg-test-ca.crt
280
281# X.509 Distinguished Name for Attribute Certificate issuer - should match with
282# the issuer element of the users Attribute Certificate submitted in order to
283# gain access
284acIssuer: /CN=AttributeAuthority/O=NDG Security Test/OU=Site A
285#acIssuer: /CN=AttributeAuthority/O=NDG/OU=BADC
286
287# WS-Security signature handler - set a config file with 'wssCfgFilePath'
288# or omit and put the relevant content directly in here under the section name
289# specified by 'wssCfgSection' below
290#wssCfgFilePath: wssecurity.cfg
291
292# Config file section for WS-Security settings - Nb. the gatekeeper shares the
293# same settings as the Single Sign On Service.
294wssCfgSection: NDG_SECURITY.wssecurity
295
296[RELATED]
297icon: %(icondir)srelated_link.png
298icon_alt: Related
299service_name: Related
300icon_title: Links to a RELATED URL
301instance: uri
302
303[DISCOVERY]
304icon: %(icondir)scatalogue_dservice.png
305icon_alt: Catalogue
306service_name: Catalogue
307default: %(server)s
308formatDefault=DIF
309icon_title: Links to the DISCOVERY RECORD for this dataset
310#standalone: True
311standalone: False
312#NB, if unset, this will default to the discovery service at ndg.badc.rl.ac.uk
313#discoveryServiceURL:http://localhost:8080/axis2/services/DiscoveryService
314
315[MILK_SERVER]
316#
317# Configure the MILK_SERVER framework here
318#
319editorOn=False
320browseOn=True
321discoveryOn=False
322
323# exception_type: whether OGC servers should send a valid ExceptionReport on errors
324#     or use pylon's debugger.  Very useful for debugging OWS controllers.  Default is ogc
325#exception_type: ogc
326#exception_type: pylons
327
Note: See TracBrowser for help on using the repository browser.