This repository has been archived by the owner on Apr 16, 2019. It is now read-only.
forked from lca2013/zookeepr
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathtest.ini
114 lines (91 loc) · 2.67 KB
/
test.ini
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
#
# zookeepr - Pylons configuration
#
# The %(here)s variable will be replaced with the parent directory of this file
#
[DEFAULT]
debug = true
# Enable SSL checking in the code
enable_ssl_requirement = false
# Use this host instead of the current website
#ssl_host =
# Uncomment and replace with the address which should receive any error reports
#email_to = [email protected]
smtp_server = localhost
error_email_from = zookeepr@localhost
[server:main]
use = egg:Paste#http
host = 0.0.0.0
port = 5000
[server:fastcgi]
use = egg:Flup#fcgi_thread
socket = /tmp/fastcgi.socket
[app:main]
use = egg:zookeepr
full_stack = true
static_files = true
cache_dir = %(here)s/data
beaker.session.key = zookeepr
beaker.session.secret = vu/oBOJV8PTU+bQlh8gOz73nE
app_instance_uuid = {107fc51a-ab47-420a-88c7-2e19635e31f5}
#
# Specific to this app
#
# Hostname for URLs
host_name = localhost
# If you'd like to fine-tune the individual locations of the cache data dirs
# for the Cache data, or the Session saves, un-comment the desired settings
# here:
#beaker.cache.data_dir = %(here)s/data/cache
#beaker.session.data_dir = %(here)s/data/sessions
# SQLAlchemy database URL
#sqlalchemy.url = sqlite:///%(here)s/development.db
sqlalchemy.url = postgresql://zookeepr:IgpiHav9@localhost/zookeepr
sqlalchemy.convert_unicode = true
# WARNING: *THE LINE BELOW MUST BE UNCOMMENTED ON A PRODUCTION ENVIRONMENT*
# Debug mode will enable the interactive debugging tool, allowing ANYONE to
# execute malicious code after an exception is raised.
#set debug = false
# Configure authentication
authkit.setup.method = forward, cookie
authkit.cookie.secret = secret string
authkit.forward.signinpath = /person/signin
authkit.cookie.signoutpath = /person/signout
authkit.setup.intercept = 401, 403
authkit.cookie_enforce = True
# IIS proxies apparently send an incorrect IP in their headers, which means people
# forced to come through those servers cannot log in.
authkit.cookie.includeip = False
# Logging configuration
[loggers]
keys = root, routes, zookeepr, sqlalchemy
[handlers]
keys = console
[formatters]
keys = generic
[logger_root]
level = INFO
handlers = console
[logger_routes]
level = INFO
handlers =
qualname = routes.middleware
[logger_zookeepr]
level = DEBUG
handlers =
qualname = zookeepr
[logger_sqlalchemy]
level = INFO
handlers =
qualname = sqlalchemy.engine
# "level = INFO" logs SQL queries.
# "level = DEBUG" logs SQL queries and results.
# "level = WARN" logs neither. (Recommended for production systems.)
[handler_console]
class = StreamHandler
args = (sys.stderr,)
level = NOTSET
formatter = generic
[formatter_generic]
format = %(asctime)s,%(msecs)03d %(levelname)-5.5s [%(name)s] %(message)s
datefmt = %H:%M:%S