forked from NTIA/scos-sensor
-
Notifications
You must be signed in to change notification settings - Fork 0
/
env.template
104 lines (80 loc) · 3.39 KB
/
env.template
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
# -*- sh -*-
# Copy env.template to env and modify
# Mark all the following variables for export
set -o allexport
#Any names here will be added as additional users with the
#specified additional user password
ADDITIONAL_USER_NAMES="" # comma separated
ADDITIONAL_USER_PASSWORD=""
# If admin user email and password set, admin user will be generated.
ADMIN_EMAIL="admin@example.com"
ADMIN_NAME=admin
ADMIN_PASSWORD=password
# set to CERT to enable scos-sensor certificate authentication
AUTHENTICATION=TOKEN
CALIBRATION_EXPIRATION_LIMIT=360
# Default callback api/results
# Set to CERT for certificate authentication
CALLBACK_AUTHENTICATION=TOKEN
# Set to false to disable SSL cert verification in the callback POST request
CALLBACK_SSL_VERIFICATION=false
#Set the number of seconds before timeout in postback when a scheduled
#action completes
CALLBACK_TIMEOUT=2
# SECURITY WARNING: don't run with debug turned on in production!
# Use either true or false
DEBUG=true
# Use latest as default for local development
DOCKER_TAG=latest
# A space-separated list of domain names and IPs
DOMAINS="localhost $(hostname -d) $(hostname -s).local"
ENCRYPT_DATA_FILES=true
ENCRYPTION_KEY="$(python3 -c 'import secrets; import base64; print(base64.b64encode(secrets.token_bytes(32)).decode("utf-8"))')"
FQDN="$(hostname -f)"
GIT_BRANCH="git:$(git rev-parse --abbrev-ref HEAD)@$(git rev-parse --short HEAD)"
GPS_MODULE=""
GPS_CLASS=""
IPS="$(hostname -I) 127.0.0.1"
# Session password for Postgres. Username is "postgres".
# SECURITY WARNING: generate unique key with something like
# `openssl rand -base64 12`
POSTGRES_PASSWORD="$(python3 -c 'import secrets; import base64; print(base64.b64encode(secrets.token_bytes(32)).decode("utf-8"))')"
# set default manager FQDN and IP to this machine
MANAGER_FQDN="$(hostname -f)"
MANAGER_IP="$(hostname -I | cut -d' ' -f1)"
# Sensor certificate with private key used as client cert for callback URL
# Paths relative to configs/certs
PATH_TO_CLIENT_CERT=sensor01.pem
# Trusted Certificate Authority certificate to verify callback URL server certificate
PATH_TO_VERIFY_CERT=scos_test_ca.crt
REPO_ROOT=$(git rev-parse --show-toplevel)
# Get scos-sensor branch name
SCOS_SENSOR_GIT_TAG="$(git describe --tags)"
# https://docs.djangoproject.com/en/1.11/ref/settings/#std:setting-SECRET_KEY
# SECURITY WARNING: generate unique key with `manage.py generate_secret_key`
SECRET_KEY="$(python3 -c 'import secrets; print(secrets.token_urlsafe(64))')"
# Signal analyzer selection/setup
SIGAN_CLASS=TekRSASigan
SIGAN_MODULE=scos_tekrsa.hardware.tekrsa_sigan
USB_DEVICE=Tektronix
DEVICE_MODEL=RSA507A
BASE_IMAGE=ghcr.io/ntia/scos-tekrsa/tekrsa_usb:latest
# SECURITY WARNING: You should be using certs from a trusted authority.
# If you don't have any, try letsencrypt or a similar service.
# Provide the absolute path to your ssl certificate and key
# Paths relative to configs/certs
SSL_CA_PATH=scos_test_ca.crt
SSL_CERT_PATH=sensor01.pem
SSL_KEY_PATH=sensor01.pem
# Calibration action selection
# The action specified here will be used to attempt an onboard
# sensor calibration on startup, if no onboard calibration data
# is available on startup. The specified action must be available.
STARTUP_CALIBRATION_ACTION=SEA_CBRS_Calibrate_Baseline
# Debug dependant settings
if $DEBUG; then
GUNICORN_LOG_LEVEL=debug
RAY_record_ref_creation_sites=1
else
GUNICORN_LOG_LEVEL=info
fi