X-Git-Url: https://git.arvados.org/arvados.git/blobdiff_plain/eb7227693e8847a65798afa7f7e8a4ffe8a199a4..0bd1c28bed9a0756c61037947d5a9dccd5066f00:/services/api/config/application.default.yml diff --git a/services/api/config/application.default.yml b/services/api/config/application.default.yml index 37bb1c380f..ddcaa57302 100644 --- a/services/api/config/application.default.yml +++ b/services/api/config/application.default.yml @@ -40,9 +40,13 @@ test: active_support.deprecation: :stderr active_record.mass_assignment_sanitizer: :strict uuid_prefix: zzzzz + secret_token: <%= rand(2**512).to_s(36) %> + blob_signing_key: zfhgfenhffzltr9dixws36j1yhksjoll2grmku38mi7yxd66h5j4q9w4jzanezacp8s6q0ro3hxakfye02152hncy6zml2ed0uc + + # email address to which mail should be sent when the user creates profile for the first time + user_profile_notification_address: arvados@example.com common: - secret_token: ~ uuid_prefix: <%= Digest::MD5.hexdigest(`hostname`).to_i(16).to_s(36)[0..4] %> # Git repositories must be readable by api server, or you won't be @@ -67,6 +71,19 @@ common: # crunch-job must be able to stat() it. crunch_refresh_trigger: /tmp/crunch_refresh_trigger + # Maximum number of log events that may be generated by a single job. + crunch_limit_log_events_per_job: 65536 + + # Maximum number of total bytes that may be logged by a single job. + crunch_limit_log_event_bytes_per_job: 67108864 + + # These two settings control how frequently log events are flushed + # to the database. If a job generates two or more events within + # crunch_log_seconds_between_events, the log data is not flushed + # until crunch_log_bytes_per_event has been reached. + crunch_log_bytes_per_event: 4096 + crunch_log_seconds_between_events: 1 + # Path to /etc/dnsmasq.d, or false = do not update dnsmasq data. dnsmasq_conf_dir: false @@ -80,12 +97,23 @@ common: - 192.168.1.1 compute_node_ec2_tag_enable: false + # The version below is suitable for AWS. + # To use it, copy it to your application.yml, uncomment, and change <%# to <%= + # compute_node_nameservers: <%# + # require 'net/http' + # ['local', 'public'].collect do |iface| + # Net::HTTP.get(URI("http://169.254.169.254/latest/meta-data/#{iface}-ipv4")).match(/^[\d\.]+$/)[0] + # end << '172.16.0.23' + # %> + accept_api_token: {} new_users_are_active: false admin_notifier_email_from: arvados@example.com email_subject_prefix: "[ARVADOS] " user_notifier_email_from: arvados@example.com + new_user_notification_recipients: [ ] + new_inactive_user_notification_recipients: [ ] # Visitors to the API server will be redirected to the workbench workbench_address: https://workbench.local:3001/ @@ -112,3 +140,42 @@ common: assets.version: "1.0" arvados_theme: default + + # Default: do not advertise a websocket server. + websocket_address: false + + # You can run the websocket server separately from the regular HTTP service + # by setting "ARVADOS_WEBSOCKETS=ws-only" in the environment before running + # the websocket server. When you do this, you need to set the following + # configuration variable so that the primary server can give out the correct + # address of the dedicated websocket server: + #websocket_address: wss://127.0.0.1:3333/websocket + + # blob_signing_key is a string of alphanumeric characters used to + # generate permission signatures for Keep locators. It must be + # identical to the permission key given to Keep. IMPORTANT: This is + # a site secret. It should be at least 50 characters. + blob_signing_key: ~ + + # Amount of time (in seconds) for which a blob permission signature + # remains valid. Default: 2 weeks (1209600 seconds) + blob_signing_ttl: 1209600 + + # Allow clients to create collections by providing a manifest with + # unsigned data blob locators. IMPORTANT: This effectively disables + # access controls for data stored in Keep: a client who knows a hash + # can write a manifest that references the hash, pass it to + # collections.create (which will create a permission link), use + # collections.get to obtain a signature for that data locator, and + # use that signed locator to retrieve the data from Keep. Therefore, + # do not turn this on if your users expect to keep data private from + # one another! + permit_create_collection_with_unsigned_manifest: false + + # secret_token is a string of alphanumeric characters used by Rails + # to sign session tokens. IMPORTANT: This is a site secret. It + # should be at least 50 characters. + secret_token: ~ + + # email address to which mail should be sent when the user creates profile for the first time + user_profile_notification_address: false