-
Notifications
You must be signed in to change notification settings - Fork 6
/
vcdm-defaults.conf
134 lines (110 loc) · 4.2 KB
/
vcdm-defaults.conf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
#############################################################
### GENERAL CONFIGURATION ###
#############################################################
[general]
# Comma separated list of blob backends. Each entry must correspond to a
# separate section with configuration
blob.backends = home_1,office_1
# Choose default blob backend to use if a user did not specify her desire.
blob.default.backend = home_1
# (Optional - only if support_mq is set to 'yes').
# Choose which backend to use for message queue operations. Available options are listed below.
# options: amqp, aws, azure
mq.backend = amqp
# Pick backend for datastore. Datastore is used for storing all kinds of metadata.
# It is also used for implementing support of CDMI containers.
# options: couchdb
ds.backend = couchdb
# Choose interface and port for production (TLS + AuthN) endpoint.
# Should be accesses through HTTPS
server.endpoint = 0.0.0.0:8080
server.credentials.key = server_credentials/key.pem
server.credentials.cert = server_credentials/cert.pem
# Debug endpoint is used to provide unencrypted and unauthenticated access to resources.
server.use_debug_port = yes
# Port where to run debug interface (listens on all interfaces).
server.debug_port = 2364
# debug port with authn
server.debug_port_authn = 2365
## User databases
## (currently either HTTP Digest or HTTP Basic are supported, but not simultaneously)
# a file with a list of username:password entries - use for HTTP Digest authN
# usersdb.plaintext = users.db
# a file with with a list of username:md5(password).hexdigest entries - use for HTTP Basic authN
# usersdb.md5 = users.db.md5
## Authorization mechanism
# options: dummy, strict
server.authz = strict
# logs
common_log = cdmiproxy.log
accounting_log = accounting.log
# Accounting
# frequency of gathering aggregated storage information in seconds
accounting.total_frequency = 600.0
use_delegated_user = no
# OGF UR server details.
send_accounting_to_ur = no
ur_server=http://server/usagetracker/rest/usagerecords/storage/
ur_username=ur_username
ur_password=ur_password
ur_creator=reporter of the record
ur_resource_owner=resource owner
# Consistency checks
check_for_existing_parents = yes
# Traffic Redundancy Elimination (TRE) support (EXPERIMENTAL)
tre_enabled = no
tre_server = http://localhost:5000
tre_data_folder = /path/to/tredata
#############################################################
### BACKEND CONFIGURATION ###
#############################################################
# blob backend 1
[home_1]
# options: aws, local, azure, cdmi
type = local
blob.datadir = data
[office_1]
# options: aws, local, azure, cdmi
type = local
blob.datadir = data
[amqp]
# If MQ with AMQP backend is turned on, provide credentials for accessing AMQP-compatible engine.
mq.endpoint = localhost:5672
mq.username = guest
mq.password = guest
[couchdb]
# Datastore implementation on top of CouchDB.
datastore.endpoint = http://localhost:5984/
#############################################################
### BACKEND TEMPLATES ###
#############################################################
[local]
type = local
# If local backend for blob was chosen, specify path to
# the folder where blob's content shall be stored.
blob.datadir = data
# Symmetrical encryption key. If present, data will be stored in the backend in the encrypted form.
# key size must be a multiple of 16
encryption_key = 123412341234
[aws]
type = aws
# For blob and mq backends also Amazon Web Services could be used.
# Provide your access key and secret access key to be able to use the service.
credentials.username = ACCESSKEYID
credentials.password = SECRETACCESSKEY
aws.bucket_name = cdmi-proxy
[azure]
type = azure
# To be able to use MS Azure cloud for MQ and blob backends, provide your Azure data credentials.
credentials.account = ACCOUNTNAME
credentials.password = SECRETACCESSKEY
credentials.blob_url = blob.core.windows.net
credentials.table_url = table.core.windows.net
credentials.queue_url = queue.core.windows.net
azure.bucket_name = cdmi-proxy
[cdmi]
type = cdmi
# CDMI-backends
credentials.username = aaa
credentials.password = aaa
cdmi.endpoint = http://localhost:8082/