X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/ea7c6effed14cd80a444c6e4d5b89c8b99c17d59..171cb08d6143cd567a53664d17bba55482adbd5d:/services/api/config/application.default.yml diff --git a/services/api/config/application.default.yml b/services/api/config/application.default.yml index 37bb1c380f..f2b44b6d84 100644 --- a/services/api/config/application.default.yml +++ b/services/api/config/application.default.yml @@ -40,9 +40,13 @@ test: active_support.deprecation: :stderr active_record.mass_assignment_sanitizer: :strict uuid_prefix: zzzzz + secret_token: <%= rand(2**512).to_s(36) %> + blob_signing_key: zfhgfenhffzltr9dixws36j1yhksjoll2grmku38mi7yxd66h5j4q9w4jzanezacp8s6q0ro3hxakfye02152hncy6zml2ed0uc + + # email address to which mail should be sent when the user creates profile for the first time + user_profile_notification_address: arvados@example.com common: - secret_token: ~ uuid_prefix: <%= Digest::MD5.hexdigest(`hostname`).to_i(16).to_s(36)[0..4] %> # Git repositories must be readable by api server, or you won't be @@ -67,6 +71,19 @@ common: # crunch-job must be able to stat() it. crunch_refresh_trigger: /tmp/crunch_refresh_trigger + # Maximum number of log events that may be generated by a single job. + crunch_limit_log_events_per_job: 65536 + + # Maximum number of total bytes that may be logged by a single job. + crunch_limit_log_event_bytes_per_job: 67108864 + + # These two settings control how frequently log events are flushed + # to the database. If a job generates two or more events within + # crunch_log_seconds_between_events, the log data is not flushed + # until crunch_log_bytes_per_event has been reached. + crunch_log_bytes_per_event: 4096 + crunch_log_seconds_between_events: 1 + # Path to /etc/dnsmasq.d, or false = do not update dnsmasq data. dnsmasq_conf_dir: false @@ -80,12 +97,25 @@ common: - 192.168.1.1 compute_node_ec2_tag_enable: false + # The version below is suitable for AWS. + # To use it, copy it to your application.yml, uncomment, and change <%# to <%= + # compute_node_nameservers: <%# + # require 'net/http' + # ['local', 'public'].collect do |iface| + # Net::HTTP.get(URI("http://169.254.169.254/latest/meta-data/#{iface}-ipv4")).match(/^[\d\.]+$/)[0] + # end << '172.16.0.23' + # %> + accept_api_token: {} + # When new_users_are_active is set to true, the user agreement check is skipped. new_users_are_active: false + admin_notifier_email_from: arvados@example.com email_subject_prefix: "[ARVADOS] " user_notifier_email_from: arvados@example.com + new_user_notification_recipients: [ ] + new_inactive_user_notification_recipients: [ ] # Visitors to the API server will be redirected to the workbench workbench_address: https://workbench.local:3001/ @@ -112,3 +142,52 @@ common: assets.version: "1.0" arvados_theme: default + + # Default: do not advertise a websocket server. + websocket_address: false + + # You can run the websocket server separately from the regular HTTP service + # by setting "ARVADOS_WEBSOCKETS=ws-only" in the environment before running + # the websocket server. When you do this, you need to set the following + # configuration variable so that the primary server can give out the correct + # address of the dedicated websocket server: + #websocket_address: wss://127.0.0.1:3333/websocket + + # blob_signing_key is a string of alphanumeric characters used to + # generate permission signatures for Keep locators. It must be + # identical to the permission key given to Keep. IMPORTANT: This is + # a site secret. It should be at least 50 characters. + blob_signing_key: ~ + + # Amount of time (in seconds) for which a blob permission signature + # remains valid. Default: 2 weeks (1209600 seconds) + blob_signing_ttl: 1209600 + + # Allow clients to create collections by providing a manifest with + # unsigned data blob locators. IMPORTANT: This effectively disables + # access controls for data stored in Keep: a client who knows a hash + # can write a manifest that references the hash, pass it to + # collections.create (which will create a permission link), use + # collections.get to obtain a signature for that data locator, and + # use that signed locator to retrieve the data from Keep. Therefore, + # do not turn this on if your users expect to keep data private from + # one another! + permit_create_collection_with_unsigned_manifest: false + + # secret_token is a string of alphanumeric characters used by Rails + # to sign session tokens. IMPORTANT: This is a site secret. It + # should be at least 50 characters. + secret_token: ~ + + # email address to which mail should be sent when the user creates profile for the first time + user_profile_notification_address: false + + default_openid_prefix: https://www.google.com/accounts/o8/id + + # Config parameters to automatically setup new users. + # The params auto_setup_new_users_with_* are meaningful only when auto_setup_new_users is turned on. + # auto_setup_name_blacklist is a comma separated list of usernames to be blacklisted for auto setup. + auto_setup_new_users: false + auto_setup_new_users_with_vm_uuid: false + auto_setup_new_users_with_repository: false + auto_setup_name_blacklist: arvados, git, gitolite, gitolite-admin, root, syslog