source: TI05-delivery/ows_framework/trunk/ows_server/ndgDiscovery.config @ 4420

Subversion URL: http://proj.badc.rl.ac.uk/svn/ndg/TI05-delivery/ows_framework/trunk/ows_server/ndgDiscovery.config@4420
Revision 4420, 10.8 KB checked in by cbyrom, 11 years ago (diff)

Add new run mode - debug for atom editor - to display stack trace with
any errors experienced - add necessary code + templates for this +
add new templates for the granulator web page + add template function
to allow generic uploading of data files and start connecting this into
the code - to allow ingest of granulite and CSML/CDML data.

Line 
1#
2# NDG Configuration File
3# At deployment time the only pieces that a user ought to need to customise
4# will be
5#    - the server address
6#    - it might be necessary to customise the location of the layout directory
7#    - the localLink, localImage and localAlt in the [layout] section
8#
9[DEFAULT]
10#
11# the following is the server on which this browse/discovery instance runs!
12server:         http://localhost
13#server:       http://superglue.badc.rl.ac.uk:8083
14## This is the proxied server root
15#server: http://superglue.badc.rl.ac.uk/ndg-test
16
17#
18# the following is the server on which the NDG discovery service is running! (Not to be confused with
19# the server on which the NDG discovery web service is running). This can and probably should be the local
20# server (i.e. don't change it!)
21#
22ndgServer:      %(server)s
23#
24##!NOTE: These are changed to  reflect the proxy prefix
25#layout:         /ndg-test/layout/
26#icondir:        /ndg-test/layout/icons/
27layout:          /layout/
28icondir:         /layout/icons/
29
30#
31mailserver:       xxxoutbox.rl.ac.uk
32metadataMaintainer: b.n.lawrence@rl.ac.uk
33repository:        %(server)s
34tbrecipient:      b.n.lawrence@rl.ac.uk
35
36# The following should only be needed for debugging some parts of the code when running on sandboxes behind a firewall
37proxyServer:      http://wwwcache3.rl.ac.uk:8080/
38disclaimer:       
39
40[SEARCH]
41advancedURL:        %(ndgServer)s/discovery
42discoveryURL:       %(ndgServer)s/discovery
43helpURL:            %(ndgServer)s/discovery?help=1
44
45[logging]
46debuglog:        discovery.log
47
48[layout]
49###### user customisable:
50localLink:      %(ndgServer)s/layout/
51localImage:     %(layout)sndg_logo_circle.gif
52localAlt:       visit badc
53###### ought to be the end of the customisations
54ndgLink:        http://ndg.nerc.ac.uk/
55ndgImage:       %(layout)sndg_logo_circle.gif
56ndgAlt:         visit ndg
57stfcLink:       http://ceda.stfc.ac.uk/
58stfcImage:      %(layout)sstfc-circle-sm.gif
59key:            %(icondir)spadlock.png
60keyGrey:        %(layout)skeyG.gif
61selectI:        %(layout)stick.png
62Xicon:          %(icondir)sxml.png
63plot:           %(icondir)splot.png
64printer:        %(icondir)sprinter.png
65helpIcon:       %(icondir)shelp.png
66HdrLeftAlt:     %(layout)s Natural Environment Research Council
67HdrLeftLogo:    %(layout)sNERC_Logo.gif
68
69pageLogo:       %(layout)s20050502_albert-park_silhouetted-trees-and-clouds_02_cropped.jpg
70
71ndgJavascript:  %(layout)sndgJavascript.js
72
73[HELP]
74helpFile:       %(layout)shelp.html
75
76[ATOM_EDITOR]
77# if set to True, errors output with stacktrace to templates
78debug: True             
79
80[NDG_A_SERVICE]
81badc.nerc.ac.uk: http://glue.badc.rl.ac.uk/cgi-bin/dxui
82icon: %(icondir)splot.png
83#%(icondir)sdata_aservice.png
84icon_alt: A Service
85service_name: A
86icon_title: LINKS to a DATA BROWSE view of this dataset
87instance: datasetURI_%s
88
89[NDG_B_SERVICE]
90#
91#These are the hosts which are publicly available on which the browse
92#service is running. The list should be of the form repository: hostname
93#where repository is the NDG identifier ....
94#
95neodc.nerc.ac.uk: %(server)s
96badc.nerc.ac.uk: %(server)s
97www.npm.ac.uk: http://wwwdev.neodaas.ac.uk/projects/ndg
98grid.bodc.nerc.ac.uk: http://grid.bodc.nerc.ac.uk
99ndg.noc.soton.ac.uk: http://ndg.noc.soton.ac.uk:8001
100icon: %(icondir)sbrowse_bservice.png
101icon_alt: B Service
102icon_title: Links to a METADATA BROWSE view of this dataset
103service_name: B
104instance: SERVICEHOST/view/URI
105
106[NDG_EXIST]
107#
108# following is a list of repository servers, actually only one is needed,
109# at any one location running browse, and that is the local one. The
110# entire purpose of the rest of the list is to simplify updates. These
111# hosts do not need to be visible outside of corporate firewalls.
112# The list should be of the form repository: hostname where repository
113# is the NDG identifier.
114#
115local: chinook.badc.rl.ac.uk
116badc.nerc.ac.uk: chinook.badc.rl.ac.uk
117neodc.nerc.ac.uk: chinook.badc.rl.ac.uk
118grid.bodc.nerc.ac.uk: grid.bodc.nerc.ac.uk
119ndg.noc.soton.ac.uk: ndg.noc.soton.ac.uk
120www.npm.ac.uk: pgsql.npm.ac.uk
121#passwordFile: /home/bnl/sandboxes/ndg/TI05-delivery/ows_framework/trunk/ows_server/passwords.txt
122passwordFile: ./passwords.txt
123
124#
125# NDG Security
126#
127
128# Security settings for configuration as a client to a Single Sign On Service
129# i.e. Where Are You From, login and logout operations are handled by a
130# separate standalone paster instance
131#[NDG_SECURITY.ssoClient]
132## THIS service's address for secure connections - the Single Sign On service
133## returns security parameters to this service along this channel
134#sslServer: https://localhost
135##sslServer: https://ndgbeta.badc.rl.ac.uk
136#
137## THIS service's address for unencrypted connections - when login is complete,
138## the BaseController redirects to an equivalent address under this host name.
139## sslServer and server settings must match for the sharing of cookies.
140#server: http://localhost
141#
142## WAYF running on Single Sign On Service - omit to default to WAYF running on
143## THIS paster instance
144#wayfURI:               https://localhost/sso/wayf
145#
146## Logout URI running on Single Sign On Service - omit to default to logout
147## running on THIS paster instance
148#logoutURI:             https://localhost/sso/logout
149
150# Security settings for running a Single Sign On Service from this paster
151# instance.  Either NDG_SECURITY.ssoClient or NDG_SECURITY.ssoService sections
152# should be set but NOT both
153
154# Single Sign On Service Settings
155[NDG_SECURITY.ssoService]
156
157# THIS service's address for secure connections - the Single Sign On service
158# returns security parameters to this service along this channel
159sslServer: https://localhost
160#sslServer: https://ndgbeta.badc.rl.ac.uk
161
162# THIS service's address for unencrypted connections - when login is complete,
163# the BaseController redirects to an equivalent address under this host name.
164# sslServer and server settings must match for the sharing of cookies.
165server: http://localhost
166
167enableOpenID: True
168
169# Redirect SOAP output to a file e.g. open(<somefile>, 'w')
170tracefile: None
171#tracefile: sys.stderr
172
173# Service addresses
174sessionMgrURI: https://localhost/SessionManager
175#sessionMgrURI: https://ndgbeta.badc.rl.ac.uk/SessionManager
176attAuthorityURI: http://localhost:5000/AttributeAuthority
177#attAuthorityURI: http://aa.ceda.rl.ac.uk
178
179# SSL Connections
180#
181# Space separated list of CA cert. files.  The peer cert.
182# must verify against at least one of these otherwise the connection is
183# dropped.  Include CA certs for all the sites trusted
184sslCACertFilePathList: certs/ndg-test-ca.crt
185
186# Web Services HTTP Proxy fine tuning
187#
188# For most situations, these settings can be ignored and instead make use of
189# the http_proxy environment variable.  They allow for the case where specific
190# settings are needed just for the security web services calls
191
192# Overrides the http_proxy environment variable setting - may be omitted
193#httpProxyHost: wwwcache.rl.ac.uk:8080
194
195# Web service clients pick up the no_proxy environment variable setting by
196# default.  Set this parameter to override no_proxy for web service
197# connections. 
198#noHttpProxyList: localhost, 127.0.0.1
199
200# WS-Security signature handler - set a config file with 'wssCfgFilePath'
201# or omit and put the relevant content directly in here under
202# 'NDG_SECURITY.wssecurity' section
203#wssCfgFilePath: wssecurity.cfg
204
205[NDG_SECURITY.wssecurity]
206
207# Settings for signature of an outbound message ...
208
209# Certificate associated with private key used to sign a message.  The sign
210# method will add this to the BinarySecurityToken element of the WSSE header. 
211# binSecTokValType attribute must be set to 'X509' or 'X509v3' ValueType. 
212# As an alternative, use 'signingCertChain' parameter
213
214# file path PEM encoded cert
215signingCertFilePath=certs/clnt.crt
216
217# file path to PEM encoded private key file
218signingPriKeyFilePath=certs/clnt.key
219
220# Password protecting private key.  Leave blank if there is no password.
221signingPriKeyPwd=
222
223# Provide a space separated list of file paths.  CA Certs should be included
224# for all the sites this installation trusts
225caCertFilePathList=certs/ndg-test-ca.crt
226
227# Set the ValueType for the BinarySecurityToken added to the WSSE header for a
228# signed message. 
229reqBinSecTokValType=X509v3
230
231# Add a timestamp element to an outbound message
232addTimestamp=True
233
234# For WSSE 1.1 - service returns signature confirmation containing signature
235# value sent by client
236applySignatureConfirmation=False
237
238#
239# Gatekeeper settings
240#
241[NDG_SECURITY.gatekeeper]
242#
243# Policy Enforcement Point calls a Policy Decision Point interface:
244
245# File path to Python module containing the PDP class - leave blank if the
246# module is in PYTHONPATH env var
247pdpModFilePath:
248
249# Name of PDP Python module
250pdpModName: ndg.security.common.authz.pdp.browse
251
252# Name of PDP class used
253pdpClassName: BrowsePDP
254
255# File Path to configuration file used by PDP class (environment variables
256# can be used in this path e.g. $PDP_CONFIG_DIR/pdp.cfg.  Omit this parameter
257# to make the PEP read the PDP settings from THIS config file
258#pdpCfgFilePath:
259
260# Read PDP params from THIS section
261pdpCfgSection: NDG_SECURITY.gatekeeper
262
263#
264# Settings for Policy Decision Point called by the PEP
265
266# Address of Attribute Authority for Data Provider
267#aaURI: http://aa.ceda.rl.ac.uk
268aaURI: http://localhost:5000/AttributeAuthority
269
270# Verify peer cert for SSL connections to Session Manager
271sslCACertFilePathList: certs/ndg-test-ca.crt
272
273# Set to file object to dump SOAP message output for debugging
274tracefile:
275
276# CA certificates used to verify the signature of user Attribute Certificates
277# - space delimited list but note that currently only the CA of this site
278# is needed because only mapped Attribute Certificates may be accepted.
279acCACertFilePathList: certs/ndg-test-ca.crt
280
281# X.509 Distinguished Name for Attribute Certificate issuer - should match with
282# the issuer element of the users Attribute Certificate submitted in order to
283# gain access
284acIssuer: /CN=AttributeAuthority/O=NDG Security Test/OU=Site A
285#acIssuer: /CN=AttributeAuthority/O=NDG/OU=BADC
286
287# WS-Security signature handler - set a config file with 'wssCfgFilePath'
288# or omit and put the relevant content directly in here under the section name
289# specified by 'wssCfgSection' below
290#wssCfgFilePath: wssecurity.cfg
291
292# Config file section for WS-Security settings - Nb. the gatekeeper shares the
293# same settings as the Single Sign On Service.
294wssCfgSection: NDG_SECURITY.wssecurity
295
296[RELATED]
297icon: %(icondir)srelated_link.png
298icon_alt: Related
299service_name: Related
300icon_title: Links to a RELATED URL
301instance: uri
302
303[DISCOVERY]
304icon: %(icondir)scatalogue_dservice.png
305icon_alt: Catalogue
306service_name: Catalogue
307default: %(server)s
308formatDefault=DIF
309icon_title: Links to the DISCOVERY RECORD for this dataset
310#standalone: True
311standalone: False
312#NB, if unset, this will default to the discovery service at ndg.badc.rl.ac.uk
313#discoveryServiceURL:http://localhost:8080/axis2/services/DiscoveryService
314
315[OWS_SERVER]
316#
317# Configure the OWS_SERVER framework here
318#
319
320# exception_type: whether OGC servers should send a valid ExceptionReport on errors
321#     or use pylon's debugger.  Very useful for debugging OWS controllers.  Default is ogc
322#exception_type: ogc
323#exception_type: pylons
324
Note: See TracBrowser for help on using the repository browser.