| <?php |
| return array( |
| /** |
| * ***************************************************************** |
| * WSO2 Identity Server Related Configurations |
| * ***************************************************************** |
| */ |
| |
| 'wsis' => [ |
| |
| /** |
| * Admin Role Name |
| */ |
| 'admin-role-name' => 'Internal/everyone', |
| |
| /** |
| * Read only Admin Role Name |
| */ |
| 'read-only-admin-role-name' => 'Internal/everyone', |
| |
| /** |
| * Gateway user role |
| */ |
| 'user-role-name' => 'Internal/everyone', |
| |
| /** |
| * Initial user role. This is the initial user role assigned to a new |
| * user. Set this to one of the three roles above to automatically |
| * grant new users that role, or set to some other role ('user-pending') |
| * to require admin approval before users have access. |
| */ |
| 'initial-role-name' => 'user-pending', |
| |
| /** |
| * Tenant Domain |
| */ |
| 'tenant-domain' => 'master.airavata', |
| |
| /** |
| * Tenant admin's username |
| */ |
| 'admin-username' => 'master', |
| |
| /** |
| * Tenant admin's password |
| */ |
| 'admin-password' => 'master', |
| |
| /** |
| * OAuth client key |
| */ |
| 'oauth-client-key' => '5_GFR88Nzd4XvGthSMF1fnOJPuMa', |
| |
| /** |
| * OAuth client secret |
| */ |
| 'oauth-client-secret' => 'KNTf_LPLuGBDbRVZwkrP_fF5z2Ea', |
| |
| /** |
| * Authentication options |
| */ |
| 'auth-options' => [ |
| // Example of password based login |
| [ |
| 'oauth-grant-type' => 'password', |
| 'name' => 'Airavata PHP Gateway', |
| ], |
| // Example of external identity provider login |
| [ |
| 'oauth-grant-type' => 'authorization_code', |
| 'name' => 'CILogon', |
| // Optional |
| // Note: kc_idp_hint is used to skip Keycloak login screen and redirect immediately to this identity provider |
| // http://www.keycloak.org/docs/2.5/server_admin/topics/identity-broker/suggested.html |
| 'oauth-authorize-url-extra-params' => 'kc_idp_hint=oidc', |
| // Optional |
| 'logo' => '/assets/path_to_image.png' |
| ], |
| ], |
| |
| /** |
| * OAuth Grant Type (password or authorization_code) |
| */ |
| 'oauth-grant-type' => 'password', |
| |
| /** |
| * OAuth call back url (only if the grant type is authorization_code) |
| */ |
| 'oauth-callback-url' => 'https://dev.seagrid.org/callback-url', |
| |
| /** |
| * For OIDC servers that support the discovery protocol. |
| */ |
| 'openid-connect-discovery-url' => 'https://iam.scigap.org/auth/realms/_MY_REALM_/.well-known/openid-configuration', |
| |
| /** |
| * Identity server url |
| */ |
| 'service-url' => 'https://iam.scigap.org/auth', |
| |
| /** |
| * Enable HTTPS server verification |
| */ |
| 'verify-peer' => true, |
| |
| /** |
| * Path to the server certificate file |
| */ |
| 'cafile-path' => app_path() . '/resources/security/incommon_rsa_server_ca.pem', |
| ], |
| |
| |
| /** |
| * ***************************************************************** |
| * Airavata Client Configurations |
| * ***************************************************************** |
| */ |
| 'airavata' => [ |
| |
| /** |
| * Airavata API server location. Use tls:// as the protocol to |
| * connect TLS enabled Airavata |
| */ |
| 'airavata-server' => 'gw56.iu.xsede.org', |
| |
| /** |
| * Airavata API server port |
| */ |
| 'airavata-port' => '8930', |
| |
| /** |
| * Airavata Profile Service server location. Use tls:// as the protocol to |
| * connect over TLS |
| */ |
| 'airavata-profile-service-server' => 'gw56.iu.xsede.org', |
| |
| /** |
| * Airavata Profile Service port |
| */ |
| 'airavata-profile-service-port' => '8962', |
| |
| /** |
| * Airavata API server thrift communication timeout |
| */ |
| 'airavata-timeout' => '1000000', |
| |
| /** |
| * PGA Gateway ID |
| */ |
| 'gateway-id' => 'default', |
| |
| /** |
| * absolute path of the data dir |
| */ |
| 'experiment-data-absolute-path' => '/var/www/experimentData', |
| |
| /** |
| * Advanced experiments options |
| */ |
| 'advanced-experiment-options' => '', |
| |
| /** |
| * Default queue name |
| */ |
| 'queue-name' => 'long', |
| |
| /** |
| * Default node count |
| */ |
| 'node-count' => '1', |
| |
| /** |
| * Default total core count |
| */ |
| 'total-cpu-count' => '16', |
| |
| /** |
| * Default wall time limit |
| */ |
| 'wall-time-limit' => '30', |
| |
| /** |
| * Enable app-catalog cache |
| */ |
| 'enable-app-catalog-cache' => true, |
| |
| /** |
| * Life time of app catalog data cache in minutes |
| */ |
| 'app-catalog-cache-duration' => 5, |
| |
| /** |
| * Gateway data store resource id |
| */ |
| 'gateway-data-store-resource-id' => '', |
| |
| /** |
| * Data Sharing enabled |
| */ |
| 'data-sharing-enabled' => false |
| ], |
| |
| /** |
| * ***************************************************************** |
| * Portal Related Configurations |
| * ***************************************************************** |
| */ |
| 'portal' => [ |
| /** |
| * Whether this portal is the SciGaP admin portal |
| */ |
| 'super-admin-portal' => false, |
| |
| /** |
| * Set the name of theme in use here |
| */ |
| 'theme' => 'base', |
| |
| /** |
| * Portal title |
| */ |
| 'portal-title' => 'Airavata PHP Gateway', |
| |
| /** |
| * Email address of the portal admin. Portal admin well get email notifications for events |
| * such as new user creation |
| */ |
| 'admin-emails' => ['xxx@xxx.com','yyy@yyy.com'], |
| |
| /** |
| * Email account that the portal should login to send emails |
| */ |
| 'portal-email-username' => 'xyz@abc.com', |
| |
| /** |
| * Password for the portal's email account |
| */ |
| 'portal-email-password' => 'xxxxxxxxxxx', |
| |
| /** |
| * SMTP server on which the portal should connect |
| */ |
| 'portal-smtp-server-host' => 'smtp.gmail.com', |
| |
| /** |
| * SMTP server port on which the portal should connect |
| */ |
| 'portal-smtp-server-port' => '587', |
| |
| /** |
| * Email verification code valid time interval in minutes |
| */ |
| 'email-verify-code-valid-time' => 360, |
| |
| /** |
| * Set this to true if theme has set links to login |
| */ |
| 'theme-based-login-links-configured' => false, |
| |
| /** |
| * Set JIRA Issue Collector scripts here. |
| */ |
| 'jira-help' => |
| [ |
| /** |
| * Report Issue Script issued for your app by Atlassian JIRA |
| */ |
| 'report-issue-script' => '', |
| /** |
| * Collector id at the end of the above script |
| */ |
| 'report-issue-collector-id' => '', |
| /** |
| * Create Report Script issued for your app by Atlassian JIRA |
| */ |
| 'request-feature-script' => '', |
| /** |
| * Collector id at the end of the above script |
| */ |
| 'request-feature-collector-id' => '' |
| ], |
| |
| /** |
| * Set Google Analytics Id here. ID format that generates from |
| * creating tracker object should be |
| * |
| * UA-XXXXX-Y |
| * |
| * for it to be working correctly. Currently it is only set for |
| * sending pageviews. |
| */ |
| 'google-analytics-id' => '' |
| ] |
| ); |