1 // Copyright (C) The Arvados Authors. All rights reserved.
3 // SPDX-License-Identifier: AGPL-3.0
7 var DefaultYAML = []byte(`# Copyright (C) The Arvados Authors. All rights reserved.
9 # SPDX-License-Identifier: AGPL-3.0
11 # Do not use this file for site configuration. Create
12 # /etc/arvados/config.yml instead.
14 # The order of precedence (highest to lowest):
15 # 1. Legacy component-specific config files (deprecated)
16 # 2. /etc/arvados/config.yml
17 # 3. config.default.yml
23 # Token to be included in all healthcheck requests. Disabled by default.
24 # Server expects request header of the format "Authorization: Bearer xxx"
29 # In each of the service sections below, the keys under
30 # InternalURLs are the endpoints where the service should be
31 # listening, and reachable from other hosts in the cluster.
34 "http://host1.example:12345": {}
35 "http://host2.example:12345":
36 # Rendezvous is normally empty/omitted. When changing the
37 # URL of a Keepstore service, Rendezvous should be set to
38 # the old URL (with trailing slash omitted) to preserve
39 # rendezvous ordering.
74 # Base URL for Workbench inline preview. If blank, use
75 # WebDAVDownload instead, and disable inline preview.
76 # If both are empty, downloading collections from workbench
79 # It is important to properly configure the download service
80 # to migitate cross-site-scripting (XSS) attacks. A HTML page
81 # can be stored in collection. If an attacker causes a victim
82 # to visit that page through Workbench, it will be rendered by
83 # the browser. If all collections are served at the same
84 # domain, the browser will consider collections as coming from
85 # the same origin and having access to the same browsing data,
86 # enabling malicious Javascript on that page to access Arvados
87 # on behalf of the victim.
89 # This is mitigating by having separate domains for each
90 # collection, or limiting preview to circumstances where the
91 # collection is not accessed with the user's regular
94 # Serve preview links using uuid or pdh in subdomain
95 # (requires wildcard DNS and TLS certificate)
96 # https://*.collections.uuid_prefix.arvadosapi.com
98 # Serve preview links using uuid or pdh in main domain
99 # (requires wildcard DNS and TLS certificate)
100 # https://*--collections.uuid_prefix.arvadosapi.com
102 # Serve preview links by setting uuid or pdh in the path.
103 # This configuration only allows previews of public data or
104 # collection-sharing links, because these use the anonymous
105 # user token or the token is already embedded in the URL.
106 # Other data must be handled as downloads via WebDAVDownload:
107 # https://collections.uuid_prefix.arvadosapi.com
113 # Base URL for download links. If blank, serve links to WebDAV
114 # with disposition=attachment query param. Unlike preview links,
115 # browsers do not render attachments, so there is no risk of XSS.
117 # If WebDAVDownload is blank, and WebDAV uses a
118 # single-origin form, then Workbench will show an error page
120 # Serve download links by setting uuid or pdh in the path:
121 # https://download.uuid_prefix.arvadosapi.com
133 # ShellInABox service endpoint URL for a given VM. If empty, do not
134 # offer web shell logins.
136 # E.g., using a path-based proxy server to forward connections to shell hosts:
137 # https://webshell.uuid_prefix.arvadosapi.com
139 # E.g., using a name-based proxy server to forward connections to shell hosts:
140 # https://*.webshell.uuid_prefix.arvadosapi.com
156 # max concurrent connections per arvados server daemon
159 # All parameters here are passed to the PG client library in a connection string;
160 # see https://www.postgresql.org/docs/current/static/libpq-connect.html#LIBPQ-PARAMKEYWORDS
168 # Maximum size (in bytes) allowed for a single API request. This
169 # limit is published in the discovery document for use by clients.
170 # Note: You must separately configure the upstream web server or
171 # proxy to actually enforce the desired maximum request size on the
173 MaxRequestSize: 134217728
175 # Limit the number of bytes read from the database during an index
176 # request (by retrieving and returning fewer rows than would
177 # normally be returned in a single response).
178 # Note 1: This setting never reduces the number of returned rows to
179 # zero, no matter how big the first data row is.
180 # Note 2: Currently, this is only checked against a specific set of
181 # columns that tend to get large (collections.manifest_text,
182 # containers.mounts, workflows.definition). Other fields (e.g.,
183 # "properties" hashes) are not counted against this limit.
184 MaxIndexDatabaseRead: 134217728
186 # Maximum number of items to return when responding to a APIs that
187 # can return partial result sets using limit and offset parameters
188 # (e.g., *.index, groups.contents). If a request specifies a "limit"
189 # parameter higher than this value, this value is used instead.
190 MaxItemsPerResponse: 1000
192 # Maximum number of concurrent requests to accept in a single
193 # service process, or 0 for no limit. Currently supported only
195 MaxConcurrentRequests: 0
197 # Maximum number of 64MiB memory buffers per keepstore server
198 # process, or 0 for no limit.
199 MaxKeepBlobBuffers: 128
201 # API methods to disable. Disabled methods are not listed in the
202 # discovery document, and respond 404 to all requests.
203 # Example: {"jobs.create":{}, "pipeline_instances.create": {}}
206 # Interval (seconds) between asynchronous permission view updates. Any
207 # permission-updating API called with the 'async' parameter schedules a an
208 # update on the permission view in the future, if not already scheduled.
209 AsyncPermissionsUpdateInterval: 20s
211 # Maximum number of concurrent outgoing requests to make while
212 # serving a single incoming multi-cluster (federated) request.
213 MaxRequestAmplification: 4
215 # RailsSessionSecretToken is a string of alphanumeric characters
216 # used by Rails to sign session tokens. IMPORTANT: This is a
217 # site secret. It should be at least 50 characters.
218 RailsSessionSecretToken: ""
220 # Maximum wall clock time to spend handling an incoming request.
223 # Websocket will send a periodic empty event after 'SendTimeout'
224 # if there is no other activity to maintain the connection /
225 # detect dropped connections.
228 WebsocketClientEventQueue: 64
229 WebsocketServerEventQueue: 4
231 # Timeout on requests to internal Keep services.
232 KeepServiceRequestTimeout: 15s
235 # Config parameters to automatically setup new users. If enabled,
236 # this users will be able to self-activate. Enable this if you want
237 # to run an open instance where anyone can create an account and use
238 # the system without requiring manual approval.
240 # The params AutoSetupNewUsersWith* are meaningful only when AutoSetupNewUsers is turned on.
241 # AutoSetupUsernameBlacklist is a list of usernames to be blacklisted for auto setup.
242 AutoSetupNewUsers: false
243 AutoSetupNewUsersWithVmUUID: ""
244 AutoSetupNewUsersWithRepository: false
245 AutoSetupUsernameBlacklist:
254 # When NewUsersAreActive is set to true, new users will be active
255 # immediately. This skips the "self-activate" step which enforces
256 # user agreements. Should only be enabled for development.
257 NewUsersAreActive: false
259 # The e-mail address of the user you would like to become marked as an admin
260 # user on their first login.
261 # In the default configuration, authentication happens through the Arvados SSO
262 # server, which uses OAuth2 against Google's servers, so in that case this
263 # should be an address associated with a Google account.
264 AutoAdminUserWithEmail: ""
266 # If AutoAdminFirstUser is set to true, the first user to log in when no
267 # other admin users exist will automatically become an admin user.
268 AutoAdminFirstUser: false
270 # Email address to notify whenever a user creates a profile for the
272 UserProfileNotificationAddress: ""
273 AdminNotifierEmailFrom: arvados@example.com
274 EmailSubjectPrefix: "[ARVADOS] "
275 UserNotifierEmailFrom: arvados@example.com
276 NewUserNotificationRecipients: {}
277 NewInactiveUserNotificationRecipients: {}
279 # Set AnonymousUserToken to enable anonymous user access. You can get
280 # the token by running "bundle exec ./script/get_anonymous_user_token.rb"
281 # in the directory where your API server is running.
282 AnonymousUserToken: ""
285 # Time to keep audit logs, in seconds. (An audit log is a row added
286 # to the "logs" table in the PostgreSQL database each time an
287 # Arvados object is created, modified, or deleted.)
289 # Currently, websocket event notifications rely on audit logs, so
290 # this should not be set lower than 300 (5 minutes).
293 # Maximum number of log rows to delete in a single SQL transaction.
295 # If MaxDeleteBatch is 0, log entries will never be
296 # deleted by Arvados. Cleanup can be done by an external process
297 # without affecting any Arvados system processes, as long as very
298 # recent (<5 minutes old) logs are not deleted.
300 # 100000 is a reasonable batch size for most sites.
303 # Attributes to suppress in events and audit logs. Notably,
304 # specifying {"manifest_text": {}} here typically makes the database
305 # smaller and faster.
307 # Warning: Using any non-empty value here can have undesirable side
308 # effects for any client or component that relies on event logs.
309 # Use at your own risk.
310 UnloggedAttributes: {}
314 # Logging threshold: panic, fatal, error, warn, info, debug, or
318 # Logging format: json or text
321 # Maximum characters of (JSON-encoded) query parameters to include
322 # in each request log entry. When params exceed this size, they will
323 # be JSON-encoded, truncated to this size, and logged as
325 MaxRequestLogParamsSize: 2000
329 # Enable access controls for data stored in Keep. This should
330 # always be set to true on a production cluster.
333 # BlobSigningKey is a string of alphanumeric characters used to
334 # generate permission signatures for Keep locators. It must be
335 # identical to the permission key given to Keep. IMPORTANT: This
336 # is a site secret. It should be at least 50 characters.
338 # Modifying BlobSigningKey will invalidate all existing
339 # signatures, which can cause programs to fail (e.g., arv-put,
340 # arv-get, and Crunch jobs). To avoid errors, rotate keys only
341 # when no such processes are running.
344 # Enable garbage collection of unreferenced blobs in Keep.
347 # Time to leave unreferenced blobs in "trashed" state before
348 # deleting them, or 0 to skip the "trashed" state entirely and
349 # delete unreferenced blobs.
351 # If you use any Amazon S3 buckets as storage volumes, this
352 # must be at least 24h to avoid occasional data loss.
353 BlobTrashLifetime: 336h
355 # How often to check for (and delete) trashed blocks whose
356 # BlobTrashLifetime has expired.
357 BlobTrashCheckInterval: 24h
359 # Maximum number of concurrent "trash blob" and "delete trashed
360 # blob" operations conducted by a single keepstore process. Each
361 # of these can be set to 0 to disable the respective operation.
363 # If BlobTrashLifetime is zero, "trash" and "delete trash"
364 # happen at once, so only the lower of these two values is used.
365 BlobTrashConcurrency: 4
366 BlobDeleteConcurrency: 4
368 # Maximum number of concurrent "create additional replica of
369 # existing blob" operations conducted by a single keepstore
371 BlobReplicateConcurrency: 4
373 # Default replication level for collections. This is used when a
374 # collection's replication_desired attribute is nil.
375 DefaultReplication: 2
377 # Lifetime (in seconds) of blob permission signatures generated by
378 # the API server. This determines how long a client can take (after
379 # retrieving a collection record) to retrieve the collection data
380 # from Keep. If the client needs more time than that (assuming the
381 # collection still has the same content and the relevant user/token
382 # still has permission) the client can retrieve the collection again
383 # to get fresh signatures.
385 # Modifying BlobSigningTTL invalidates existing signatures; see
386 # BlobSigningKey note above.
388 # The default is 2 weeks.
391 # Default lifetime for ephemeral collections: 2 weeks. This must not
392 # be less than BlobSigningTTL.
393 DefaultTrashLifetime: 336h
395 # Interval (seconds) between trash sweeps. During a trash sweep,
396 # collections are marked as trash if their trash_at time has
397 # arrived, and deleted if their delete_at time has arrived.
398 TrashSweepInterval: 60s
400 # If true, enable collection versioning.
401 # When a collection's preserve_version field is true or the current version
402 # is older than the amount of seconds defined on PreserveVersionIfIdle,
403 # a snapshot of the collection's previous state is created and linked to
404 # the current collection.
405 CollectionVersioning: false
407 # 0s = auto-create a new version on every update.
408 # -1s = never auto-create new versions.
409 # > 0s = auto-create a new version when older than the specified number of seconds.
410 PreserveVersionIfIdle: -1s
412 # Managed collection properties. At creation time, if the client didn't
413 # provide the listed keys, they will be automatically populated following
414 # one of the following behaviors:
416 # * UUID of the user who owns the containing project.
417 # responsible_person_uuid: {Function: original_owner, Protected: true}
419 # * Default concrete value.
420 # foo_bar: {Value: baz, Protected: false}
422 # If Protected is true, only an admin user can modify its value.
424 SAMPLE: {Function: original_owner, Protected: true}
426 # In "trust all content" mode, Workbench will redirect download
427 # requests to WebDAV preview link, even in the cases when
428 # WebDAV would have to expose XSS vulnerabilities in order to
429 # handle the redirect (see discussion on Services.WebDAV).
431 # This setting has no effect in the recommended configuration,
432 # where the WebDAV is configured to have a separate domain for
433 # every collection; in this case XSS protection is provided by
434 # browsers' same-origin policy.
436 # The default setting (false) is appropriate for a multi-user site.
437 TrustAllContent: false
439 # Cache parameters for WebDAV content serving:
440 # * TTL: Maximum time to cache manifests and permission checks.
441 # * UUIDTTL: Maximum time to cache collection state.
442 # * MaxBlockEntries: Maximum number of block cache entries.
443 # * MaxCollectionEntries: Maximum number of collection cache entries.
444 # * MaxCollectionBytes: Approximate memory limit for collection cache.
445 # * MaxPermissionEntries: Maximum number of permission cache entries.
446 # * MaxUUIDEntries: Maximum number of UUID cache entries.
451 MaxCollectionEntries: 1000
452 MaxCollectionBytes: 100000000
453 MaxPermissionEntries: 1000
457 # These settings are provided by your OAuth2 provider (eg
458 # Google) used to perform upstream authentication.
459 ProviderAppSecret: ""
462 # The cluster ID to delegate the user database. When set,
463 # logins on this cluster will be redirected to the login cluster
464 # (login cluster must appear in RemoteHosts with Proxy: true)
467 # How long a cached token belonging to a remote cluster will
468 # remain valid before it needs to be revalidated.
469 RemoteTokenRefresh: 5m
472 # Path to git or gitolite-shell executable. Each authenticated
473 # request will execute this program with the single argument "http-backend"
474 GitCommand: /usr/bin/git
476 # Path to Gitolite's home directory. If a non-empty path is given,
477 # the CGI environment will be set up to support the use of
478 # gitolite-shell as a GitCommand: for example, if GitoliteHome is
479 # "/gh", then the CGI environment will have GITOLITE_HTTP_HOME=/gh,
480 # PATH=$PATH:/gh/bin, and GL_BYPASS_ACCESS_CHECKS=1.
483 # Git repositories must be readable by api server, or you won't be
484 # able to submit crunch jobs. To pass the test suites, put a clone
485 # of the arvados tree in {git_repositories_dir}/arvados.git or
486 # {git_repositories_dir}/arvados/.git
487 Repositories: /var/lib/arvados/git/repositories
495 # List of supported Docker Registry image formats that compute nodes
496 # are able to use. ` + "`" + `arv keep docker` + "`" + ` will error out if a user tries
497 # to store an image with an unsupported format. Use an empty array
498 # to skip the compatibility check (and display a warning message to
501 # Example for sites running docker < 1.10: {"v1": {}}
502 # Example for sites running docker >= 1.10: {"v2": {}}
503 # Example for disabling check: {}
504 SupportedDockerImageFormats:
508 # Include details about job reuse decisions in the server log. This
509 # causes additional database queries to run, so it should not be
510 # enabled unless you expect to examine the resulting logs for
511 # troubleshooting purposes.
512 LogReuseDecisions: false
514 # Default value for keep_cache_ram of a container's runtime_constraints.
515 DefaultKeepCacheRAM: 268435456
517 # Number of times a container can be unlocked before being
518 # automatically cancelled.
519 MaxDispatchAttempts: 5
521 # Default value for container_count_max for container requests. This is the
522 # number of times Arvados will create a new container to satisfy a container
523 # request. If a container is cancelled it will retry a new container if
524 # container_count < container_count_max on any container requests associated
525 # with the cancelled container.
528 # The maximum number of compute nodes that can be in use simultaneously
529 # If this limit is reduced, any existing nodes with slot number >= new limit
530 # will not be counted against the new limit. In other words, the new limit
531 # won't be strictly enforced until those nodes with higher slot numbers
535 # Preemptible instance support (e.g. AWS Spot Instances)
536 # When true, child containers will get created with the preemptible
537 # scheduling parameter parameter set.
538 UsePreemptibleInstances: false
540 # PEM encoded SSH key (RSA, DSA, or ECDSA) used by the
541 # (experimental) cloud dispatcher for executing containers on
542 # worker VMs. Begins with "-----BEGIN RSA PRIVATE KEY-----\n"
543 # and ends with "\n-----END RSA PRIVATE KEY-----\n".
544 DispatchPrivateKey: none
546 # Maximum time to wait for workers to come up before abandoning
547 # stale locks from a previous dispatch process.
550 # The crunch-run command to manage the container on a node
551 CrunchRunCommand: "crunch-run"
553 # Extra arguments to add to crunch-run invocation
554 # Example: ["--cgroup-parent-subsystem=memory"]
555 CrunchRunArgumentsList: []
557 # Extra RAM to reserve on the node, in addition to
558 # the amount specified in the container's RuntimeConstraints
559 ReserveExtraRAM: 256MiB
561 # Minimum time between two attempts to run the same container
565 # When you run the db:delete_old_container_logs task, it will find
566 # containers that have been finished for at least this many seconds,
567 # and delete their stdout, stderr, arv-mount, crunch-run, and
568 # crunchstat logs from the logs table.
571 # These two settings control how frequently log events are flushed to the
572 # database. Log lines are buffered until either crunch_log_bytes_per_event
573 # has been reached or crunch_log_seconds_between_events has elapsed since
575 LogBytesPerEvent: 4096
576 LogSecondsBetweenEvents: 1
578 # The sample period for throttling logs.
579 LogThrottlePeriod: 60s
581 # Maximum number of bytes that job can log over crunch_log_throttle_period
582 # before being silenced until the end of the period.
583 LogThrottleBytes: 65536
585 # Maximum number of lines that job can log over crunch_log_throttle_period
586 # before being silenced until the end of the period.
587 LogThrottleLines: 1024
589 # Maximum bytes that may be logged by a single job. Log bytes that are
590 # silenced by throttling are not counted against this total.
591 LimitLogBytesPerJob: 67108864
593 LogPartialLineThrottlePeriod: 5s
595 # Container logs are written to Keep and saved in a
596 # collection, which is updated periodically while the
597 # container runs. This value sets the interval between
598 # collection updates.
601 # The log collection is also updated when the specified amount of
602 # log data (given in bytes) is produced in less than one update
608 SbatchArgumentsList: []
609 SbatchEnvironmentVariables:
612 # Path to dns server configuration directory
613 # (e.g. /etc/unbound.d/conf.d). If false, do not write any config
614 # files or touch restart.txt (see below).
617 # Template file for the dns server host snippets. See
618 # unbound.template in this directory for an example. If false, do
619 # not write any config files.
620 DNSServerConfTemplate: ""
622 # String to write to {dns_server_conf_dir}/restart.txt (with a
623 # trailing newline) after updating local data. If false, do not
624 # open or write the restart.txt file.
625 DNSServerReloadCommand: ""
627 # Command to run after each DNS update. Template variables will be
628 # substituted; see the "unbound" example below. If false, do not run
630 DNSServerUpdateCommand: ""
632 ComputeNodeDomain: ""
633 ComputeNodeNameservers:
637 # Hostname to assign to a compute node when it sends a "ping" and the
638 # hostname in its Node record is nil.
639 # During bootstrapping, the "ping" script is expected to notice the
640 # hostname given in the ping response, and update its unix hostname
642 # If false, leave the hostname alone (this is appropriate if your compute
643 # nodes' hostnames are already assigned by some other mechanism).
645 # One way or another, the hostnames of your node records should agree
646 # with your DNS records and your /etc/slurm-llnl/slurm.conf files.
648 # Example for compute0000, compute0001, ....:
649 # assign_node_hostname: compute%<slot_number>04d
650 # (See http://ruby-doc.org/core-2.2.2/Kernel.html#method-i-format for more.)
651 AssignNodeHostname: "compute%<slot_number>d"
654 # Enable the legacy 'jobs' API (crunch v1). This value must be a string.
656 # Note: this only enables read-only access, creating new
657 # legacy jobs and pipelines is not supported.
659 # 'auto' -- (default) enable the Jobs API only if it has been used before
660 # (i.e., there are job records in the database)
661 # 'true' -- enable the Jobs API despite lack of existing records.
662 # 'false' -- disable the Jobs API despite presence of existing records.
665 # Git repositories must be readable by api server, or you won't be
666 # able to submit crunch jobs. To pass the test suites, put a clone
667 # of the arvados tree in {git_repositories_dir}/arvados.git or
668 # {git_repositories_dir}/arvados/.git
669 GitInternalDir: /var/lib/arvados/internal.git
672 # Enable the cloud scheduler (experimental).
675 # Name/number of port where workers' SSH services listen.
678 # Interval between queue polls.
681 # Shell command to execute on each worker to determine whether
682 # the worker is booted and ready to run containers. It should
683 # exit zero if the worker is ready.
684 BootProbeCommand: "docker ps -q"
686 # Minimum interval between consecutive probes to a single
690 # Maximum probes per second, across all workers in a pool.
691 MaxProbesPerSecond: 10
693 # Time before repeating SIGTERM when killing a container.
696 # Time to give up on SIGTERM and write off the worker.
699 # Maximum create/destroy-instance operations per second (0 =
701 MaxCloudOpsPerSecond: 0
703 # Interval between cloud provider syncs/updates ("list all
707 # Time to leave an idle worker running (in case new containers
708 # appear in the queue that it can run) before shutting it
712 # Time to wait for a new worker to boot (i.e., pass
713 # BootProbeCommand) before giving up and shutting it down.
716 # Maximum time a worker can stay alive with no successful
717 # probes before being automatically shut down.
720 # Time after shutting down a worker to retry the
721 # shutdown/destroy operation.
724 # Worker VM image ID.
727 # Tags to add on all resources (VMs, NICs, disks) created by
728 # the container dispatcher. (Arvados's own tags --
729 # InstanceType, IdleBehavior, and InstanceSecret -- will also
734 # Prefix for predefined tags used by Arvados (InstanceSetID,
735 # InstanceType, InstanceSecret, IdleBehavior). With the
736 # default value "Arvados", tags are "ArvadosInstanceSetID",
737 # "ArvadosInstanceSecret", etc.
739 # This should only be changed while no cloud resources are in
740 # use and the cloud dispatcher is not running. Otherwise,
741 # VMs/resources that were added using the old tag prefix will
742 # need to be detected and cleaned up manually.
743 TagKeyPrefix: Arvados
745 # Cloud driver: "azure" (Microsoft Azure) or "ec2" (Amazon AWS).
748 # Cloud-specific driver parameters.
755 # (ec2) Instance configuration.
761 AdminUsername: debian
763 # (azure) Credentials.
769 # (azure) Instance configuration.
770 CloudEnvironment: AzurePublicCloud
777 DeleteDanglingResourcesAfter: 20s
778 AdminUsername: arvados
782 # Use the instance type name as the key (in place of "SAMPLE" in
783 # this sample entry).
785 # Cloud provider's instance type. Defaults to the configured type name.
789 IncludedScratch: 16GB
796 # AccessViaHosts specifies which keepstore processes can read
797 # and write data on the volume.
799 # For a local filesystem, AccessViaHosts has one entry,
800 # indicating which server the filesystem is located on.
802 # For a network-attached backend accessible by all keepstore
803 # servers, like a cloud storage bucket or an NFS mount,
804 # AccessViaHosts can be empty/omitted.
806 # Further info/examples:
807 # https://doc.arvados.org/install/configure-fs-storage.html
808 # https://doc.arvados.org/install/configure-s3-object-storage.html
809 # https://doc.arvados.org/install/configure-azure-blob-storage.html
813 "http://host1.example:25107": {}
822 # for s3 driver -- see
823 # https://doc.arvados.org/install/configure-s3-object-storage.html
829 LocationConstraint: false
836 # for azure driver -- see
837 # https://doc.arvados.org/install/configure-azure-blob-storage.html
838 StorageAccountName: aaaaa
839 StorageAccountKey: aaaaa
840 StorageBaseURL: core.windows.net
843 ListBlobsRetryDelay: 10s
844 ListBlobsMaxAttempts: 10
846 WriteRaceInterval: 15s
847 WriteRacePollTime: 1s
849 # for local directory driver -- see
850 # https://doc.arvados.org/install/configure-fs-storage.html
851 Root: /var/lib/arvados/keep-data
857 SendUserSetupNotificationEmail: true
859 # Bug/issue report notification to and from addresses
860 IssueReporterEmailFrom: "arvados@example.com"
861 IssueReporterEmailTo: "arvados@example.com"
862 SupportEmailAddress: "arvados@example.com"
864 # Generic issue email from
865 EmailFrom: "arvados@example.com"
874 # API endpoint host or host:port; default is {id}.arvadosapi.com
875 Host: sample.arvadosapi.com
877 # Perform a proxy request when a local client requests an
878 # object belonging to this remote.
881 # Default "https". Can be set to "http" for testing.
884 # Disable TLS verify. Can be set to true for testing.
887 # When users present tokens issued by this remote cluster, and
888 # their accounts are active on the remote cluster, activate
889 # them on this cluster too.
895 ActivationContactLink: mailto:info@arvados.org
896 ArvadosDocsite: https://doc.arvados.org
897 ArvadosPublicDataDocURL: https://playground.arvados.org/projects/public
898 ShowUserAgreementInline: false
901 # Scratch directory used by the remote repository browsing
902 # feature. If it doesn't exist, it (and any missing parents) will be
903 # created using mkdir_p.
904 RepositoryCache: /var/www/arvados-workbench/current/tmp/git
906 # Below is a sample setting of user_profile_form_fields config parameter.
907 # This configuration parameter should be set to either false (to disable) or
908 # to a map as shown below.
909 # Configure the map of input fields to be displayed in the profile page
910 # using the attribute "key" for each of the input fields.
911 # This sample shows configuration with one required and one optional form fields.
912 # For each of these input fields:
913 # You can specify "Type" as "text" or "select".
914 # List the "Options" to be displayed for each of the "select" menu.
915 # Set "Required" as "true" for any of these fields to make them required.
916 # If any of the required fields are missing in the user's profile, the user will be
917 # redirected to the profile page before they can access any Workbench features.
918 UserProfileFormFields:
921 FormFieldTitle: Best color
922 FormFieldDescription: your favorite color
931 # exampleTextValue: # key that will be set in properties
934 # FormFieldDescription: ""
937 # exampleOptionsValue:
940 # FormFieldDescription: ""
948 # Use "UserProfileFormMessage to configure the message you want
949 # to display on the profile page.
950 UserProfileFormMessage: 'Welcome to Arvados. All <span style="color:red">required fields</span> must be completed before you can proceed.'
952 # Mimetypes of applications for which the view icon
953 # would be enabled in a collection's show page.
954 # It is sufficient to list only applications here.
955 # No need to list text and image types.
956 ApplicationMimetypesWithViewIcon:
974 # The maximum number of bytes to load in the log viewer
975 LogViewerMaxBytes: 1M
977 # When anonymous_user_token is configured, show public projects page
978 EnablePublicProjectsPage: true
980 # By default, disable the "Getting Started" popup which is specific to Arvados playground
981 EnableGettingStartedPopup: false
983 # Ask Arvados API server to compress its response payloads.
984 APIResponseCompression: true
986 # Timeouts for API requests.
987 APIClientConnectTimeout: 2m
988 APIClientReceiveTimeout: 5m
990 # Maximum number of historic log records of a running job to fetch
991 # and display in the Log tab, while subscribing to web sockets.
992 RunningJobLogRecordsToFetch: 2000
994 # In systems with many shared projects, loading of dashboard and topnav
995 # cab be slow due to collections indexing; use the following parameters
996 # to suppress these properties
997 ShowRecentCollectionsOnDashboard: true
998 ShowUserNotifications: true
1000 # Enable/disable "multi-site search" in top nav ("true"/"false"), or
1001 # a link to the multi-site search page on a "home" Workbench site.
1004 # https://workbench.qr1hi.arvadosapi.com/collections/multisite
1007 # Should workbench allow management of local git repositories? Set to false if
1008 # the jobs api is disabled and there are no local git repositories.
1011 SiteName: Arvados Workbench
1012 ProfilingEnabled: false
1014 # This is related to obsolete Google OpenID 1.0 login
1015 # but some workbench stuff still expects it to be set.
1016 DefaultOpenIdPrefix: "https://www.google.com/accounts/o8/id"
1018 # Workbench2 configs
1020 FileViewersConfigURL: ""
1022 # Use experimental controller code (see https://dev.arvados.org/issues/14287)
1023 EnableBetaController14287: false