dor-services 4.21.1 → 4.21.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +8 -8
- data/config/certs/dor-services-dor-dev.crt +30 -0
- data/config/certs/dor-services-dor-dev.key +27 -0
- data/config/certs/robots-dor-test.crt +29 -0
- data/config/certs/robots-dor-test.key +27 -0
- data/config/dev_console_env.rb +48 -40
- data/config/test.rb +86 -0
- data/lib/dor-services.rb +5 -3
- data/lib/dor/models/identifiable.rb +13 -1
- data/lib/dor/models/item.rb +0 -1
- data/lib/dor/models/publishable.rb +4 -3
- data/lib/dor/models/releaseable.rb +12 -3
- data/lib/dor/version.rb +1 -1
- metadata +16 -13
- data/config/certs/robots-dor-dev.crt +0 -29
- data/config/certs/robots-dor-dev.key +0 -27
checksums.yaml
CHANGED
@@ -1,15 +1,15 @@
|
|
1
1
|
---
|
2
2
|
!binary "U0hBMQ==":
|
3
3
|
metadata.gz: !binary |-
|
4
|
-
|
4
|
+
ZTgyM2FiMDFhZDU3Yzc0YTY5OWMyMmM4NDQ1NmM2ZWY5NjIzZTBhMQ==
|
5
5
|
data.tar.gz: !binary |-
|
6
|
-
|
6
|
+
ZTkwMGM0YmEyN2Y3MGRlN2NmYzU4ZWY3ODQ1NmZjYWZkMzVjMGZhZQ==
|
7
7
|
SHA512:
|
8
8
|
metadata.gz: !binary |-
|
9
|
-
|
10
|
-
|
11
|
-
|
9
|
+
NDA0NGVkZmI3ZTBlZDlhMTgxMTQwNTUyNzY0OWQ5OGJjNDdlY2M1OTEyNDky
|
10
|
+
ZjQ5ODU3ZmJiMjhkNzk4ZGQ4YTBlNjMyZjVkN2U4Y2UxYWM4ZDE4M2RhODhk
|
11
|
+
ZTNlZGRkNjVhODI3NzAwZWZiZWZmOTI1NTVjOGUzMGE5OTUzYTY=
|
12
12
|
data.tar.gz: !binary |-
|
13
|
-
|
14
|
-
|
15
|
-
|
13
|
+
MjZkNTAzZDljMzI0OTEzODI2MzQyOGY1NDVlNzA3OTQ1ZjAzNTBlZDc1OWE1
|
14
|
+
NjUxNGZkNGQ0MDQ5Y2Y3NGMxNmIxOGQyYjlmMjhiZmJkNDM4ZGNkOGZmNDlm
|
15
|
+
NTUwZDRjZThhYWRkY2Q5N2VhNjI4ZWI4NzRhMmJlNmY2Mzk2ZDc=
|
@@ -0,0 +1,30 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIFETCCAvkCCQCcUJVDTu7rZjANBgkqhkiG9w0BAQUFADCBvzELMAkGA1UEBhMC
|
3
|
+
VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExETAPBgNVBAcTCFN0YW5mb3JkMRwwGgYD
|
4
|
+
VQQKExNTdGFuZm9yZCBVbml2ZXJzaXR5MRIwEAYDVQQLEwlMaWJyYXJpZXMxJTAj
|
5
|
+
BgNVBAMTHFNVTCBET1IgKGRldi90ZXN0KSBhY2Nlc3MgQ0ExLzAtBgkqhkiG9w0B
|
6
|
+
CQEWIHN1bC13ZWJtYXN0ZXJAbGlzdHMuc3RhbmZvcmQuZWR1MB4XDTEyMDkyODIz
|
7
|
+
Mjk0MFoXDTIyMDkyNjIzMjk0MFowgdQxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpD
|
8
|
+
YWxpZm9ybmlhMREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQg
|
9
|
+
VW5pdmVyc2l0eTESMBAGA1UECxMJTGlicmFyaWVzMTgwNgYDVQQDFC9kb3Itc2Vy
|
10
|
+
dmljZXNAc3VsLWx5YmVyc2VydmljZXMtZGV2LnN0YW5mb3JkLmVkdTExMC8GCSqG
|
11
|
+
SIb3DQEJARYiZGxzcy1kZXZlbG9wZXJzQGxpc3RzLnN0YW5mb3JkLmVkdTCCASIw
|
12
|
+
DQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALqVUU6Nf9+OW5l67D4knz/t4JCB
|
13
|
+
TeLGHRnABfafvtT1NcHwKZG0prKNvQfo6/kCdXbQ4ShxnMjrmZVr9UEBQV2znwzU
|
14
|
+
CH/nc3kx1PwaCPAl79r6jFOovTE3t7hU1HuEQLUoAJ09Bo7AoAx5X7kLpaoxgyt2
|
15
|
+
Sk0v9/LY8iwE21ulvXv9RC9PtJOzalKLSTVImjqa9YUjKFW5SFqnGhqz7qB1Li90
|
16
|
+
LovLzWr8yCuKrDqKhW6vK9S3preDgRrERv09kdJp75ClBc368rA4iXwJVvXZgqaY
|
17
|
+
Vbj6Iuhs4IgtkSmpekwXC8SXpcqX/Rb55+w5hxKkBjQ6a7wXSxanr1IjW08CAwEA
|
18
|
+
ATANBgkqhkiG9w0BAQUFAAOCAgEAbzIPR6ohKc+zA6Efxe7QovQ7KIkqlSC/CLz8
|
19
|
+
9VBcwiVk+SNw35A0QtbpVWlj1Ml4/8n3HdFawh0Yj20D8nigRvOFWJGu++PAEhMl
|
20
|
+
g6jR7htl+oXvbaDsb6iuhNxhRBsPY76nZEzFSyI2m1hnz+81TJLUdEywIFgdTZ8o
|
21
|
+
SeCttyueF+qDiAWjl7Lm7Wt+Mn1QrgfoO1nvqSHZL3yvx0U2U/klGE1lcGQYD+r7
|
22
|
+
oTXuNQL5Y5s7r5kvjfjNCXIdXOlcuIM1jHrALhiH+PKplXyrniVMfvcZ+qvcG9rf
|
23
|
+
FUbL5O82i2PMajiT0Jr+lEMZeTZcNsD3fwiYGbbwy4LBaTJR1Kvg2p0lgbM5HBOu
|
24
|
+
3XHO7bQNZ1zYVevLsM85+3KIqFI/Z91eq9M0E+HbroK5L4XuKwXhvVc6J7zYwh8M
|
25
|
+
9mswk0K+NFHOgmL2NxqMiYKtxZlqFts/9BIjkCzf3ZW78l5kb9xg3A3YaTYrCxC2
|
26
|
+
41xSmd2OCcSyipWVDIT6agBmGH+9Yn6ZS5xRT2Cb7iKVeDnQzWw4JF4zzrsUQEdE
|
27
|
+
BIyLgmKJcYFnoKxkG6zT1q4AOSsFQDcWCo1DrQ9FjrEdi3hwsFzWg5eLXAbzv+aC
|
28
|
+
JIHVWIIwpI1FIA3Z3c8M1aLn2vjsjwlIWescvLr1oIVz0fPEjCRZ+6H6WQLG/x2t
|
29
|
+
nq/sIwE=
|
30
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEpAIBAAKCAQEAupVRTo1/345bmXrsPiSfP+3gkIFN4sYdGcAF9p++1PU1wfAp
|
3
|
+
kbSmso29B+jr+QJ1dtDhKHGcyOuZlWv1QQFBXbOfDNQIf+dzeTHU/BoI8CXv2vqM
|
4
|
+
U6i9MTe3uFTUe4RAtSgAnT0GjsCgDHlfuQulqjGDK3ZKTS/38tjyLATbW6W9e/1E
|
5
|
+
L0+0k7NqUotJNUiaOpr1hSMoVblIWqcaGrPuoHUuL3Qui8vNavzIK4qsOoqFbq8r
|
6
|
+
1Lemt4OBGsRG/T2R0mnvkKUFzfrysDiJfAlW9dmCpphVuPoi6GzgiC2RKal6TBcL
|
7
|
+
xJelypf9Fvnn7DmHEqQGNDprvBdLFqevUiNbTwIDAQABAoIBAFGwUCG5N9QTyqze
|
8
|
+
sZHfjM17g0chJY10uYbtmG7Kr80i8n9Pe5OsaRNhlPJimvWxiuYTO5DudPtOkzZl
|
9
|
+
RsJIH2s72hXOu03scpUMKTia2XDy2xmfelKiXPqwb0JH+aN+Wqo1slclQbq8QRZV
|
10
|
+
CYDFxalG9ivQJWW367GqJBT7p2Ju5X58R4yWv+RJzrcB3UOc4KcmULtn/7eHEU5C
|
11
|
+
rh1EMJ/N3qokUYfazBMub+UQZi6ALd0u7kDavSlHVUlUXApgVY46R9l6wrYrgvnj
|
12
|
+
nbRiakvDeFLGuAyx+zhngzaWxizS4oI6PF6msMOCWiIGrcGgBkZgdiL2NzqUXAAk
|
13
|
+
KVGMqrkCgYEA5J/QNg7IY9uemZXxi0imQtjIaDFvE2vf90iBOR/JoPtchl9yY/zs
|
14
|
+
AxetumME+mTALio/0XeImNQuEJDYsvOs+NS3IXbqtK943i+PGAyuLgZSsnss0Z4J
|
15
|
+
8wria0LFCDrzS5dDbb3YQmhj9rwKqwwd59SRon2IhSt138qJe2RNkB0CgYEA0OzK
|
16
|
+
dRs8MkbYcufCnH+GebbAaiQUe7MWXNzmwIf6lkU07ycs6hP/OSoBDoTz+k9Jl7eF
|
17
|
+
rAnKIw9S6yX81s/vHkf+ZFKuPl/lT0cC5il3/WdHwF3R+CaEzVX9oI0Ps0VoE3LS
|
18
|
+
3M2FaLwsCKvr6WzGUcBBcJNQ3y3pcQnlrXn91VsCgYEAljJDyG/XyHqs7DuszxNw
|
19
|
+
XvQqXQE09u5k2gEhHBU9Emxwcbrc3MF5j+KLeKq6x4FPHEUXXhaIf9bNWIbARnh9
|
20
|
+
x49/rBWCxieNYXKfMG6MM6Jly+nOHPwVjz00WMEpzmlkEuISI1OYcrBAFAWfgJXa
|
21
|
+
Q8bL0pNkEBDoRJi7z3uq1SUCgYEAuoYNIowULBbP+5YqSyoXVubv1lMr7lwu5O1b
|
22
|
+
HhzIfgx/e9wP31PHErQLiXjtkVXkMA1qy/NZgf+WWdXqa6Xsp65C0jJ22b0nrqWJ
|
23
|
+
Uw9Gzve8OWQJp3BMND5HV2VY1QZsKqDi3LqoFp+Y+Iz068tvK2FniygalYYZ2g+p
|
24
|
+
/Dzjf+0CgYAt34MEAW9Ps3bQN42oQLw4ORmOE3PRH17OsRXncAjfTa5vLLJmWvDr
|
25
|
+
L5WPyEb0v6qh1iEwIXD0W9lZwZAaK0dON2y+T2EPJO1g/n4JERlPZVwtKHoXRQUB
|
26
|
+
hblhDgHpMVXwJm3CYPczc9A0AkjYw+aZdqjzSYqq23WXFVXZ7SrfeA==
|
27
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1,29 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIFDDCCAvQCCQCcUJVDTu7rYDANBgkqhkiG9w0BAQUFADCBvzELMAkGA1UEBhMC
|
3
|
+
VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExETAPBgNVBAcTCFN0YW5mb3JkMRwwGgYD
|
4
|
+
VQQKExNTdGFuZm9yZCBVbml2ZXJzaXR5MRIwEAYDVQQLEwlMaWJyYXJpZXMxJTAj
|
5
|
+
BgNVBAMTHFNVTCBET1IgKGRldi90ZXN0KSBhY2Nlc3MgQ0ExLzAtBgkqhkiG9w0B
|
6
|
+
CQEWIHN1bC13ZWJtYXN0ZXJAbGlzdHMuc3RhbmZvcmQuZWR1MB4XDTEyMDkyODIz
|
7
|
+
MTYzMFoXDTIyMDkyNjIzMTYzMFowgc8xCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpD
|
8
|
+
YWxpZm9ybmlhMREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQg
|
9
|
+
VW5pdmVyc2l0eTESMBAGA1UECxMJTGlicmFyaWVzMTMwMQYDVQQDFCpyb2JvdHNA
|
10
|
+
c3VsLWx5YmVyc2VydmljZXMtdGVzdC5zdGFuZm9yZC5lZHUxMTAvBgkqhkiG9w0B
|
11
|
+
CQEWImRsc3MtZGV2ZWxvcGVyc0BsaXN0cy5zdGFuZm9yZC5lZHUwggEiMA0GCSqG
|
12
|
+
SIb3DQEBAQUAA4IBDwAwggEKAoIBAQDIIIO1QOrQOGuMD5PmgRpECVlclF1Thsj2
|
13
|
+
Z7nQ3LWeHoHBDWPUYZY96c2n2HSS+62Wk+fRC7URDb2Di9MhuZ0ciYst3rNninrE
|
14
|
+
2wJBggrF72lSPc+p3YCu3P9usj30hx0RD+m1lnLw35/OjW6Z89cbZ7guHfZ1VE65
|
15
|
+
ly9z2dVt/DJF6qZ4lQxyeweNGefUVYOVgWTZJvPXIgTEot8MzNAznIrn22i+HQXJ
|
16
|
+
heSCzTfVIakd7PzCyKI593fItsbkaD2XGuZUDZXE10NhMX/B+3BfUDe17CfJutpN
|
17
|
+
vxnyyiFMzs1FfyooZ90eCI4j/hgPEkygLlWTDnU2pCt6w4iWISOZAgMBAAEwDQYJ
|
18
|
+
KoZIhvcNAQEFBQADggIBAEzuW/6tGwYw6fmhN5xWaEQKbZkFGF7+3AmyjU1nL+xJ
|
19
|
+
AymhfEUGWpsBCeuMjkQG4C/WP54cF4SLQdSDh5/WGj+6bMbYhmVMqhiH7Fb0aJoR
|
20
|
+
Bkbe298t5JSBeqMJM0qAR1OELsEyoadIQWChnLECOgEV6c1a3o6KpaxNusJzdUu3
|
21
|
+
eYgC4CHdt7mJwemTjr8rTOTGAMCgK/bFXdKbaA7HFnH8t3oCfEQSWVA4QLI49SUL
|
22
|
+
9Hc484LcfOk25Su6RP88OfzwxF8P5N4+w9BeAq143Yge4/4xcVIJ5A1YVAVwMegd
|
23
|
+
tK7iJ/jdg94hpSPSZctmV9Jo8kekGF+RzWDvtCR4wEZj0NdNcRkSMTA73aygxRPa
|
24
|
+
UDcrwM+6sjQ+gzbJims5zae7oZjxq6J9QCodx9IEZluS6quYMZ2M4GYwq3NBD7BQ
|
25
|
+
NBzsWCBaTb7JW63btlFwi8hRissQoPxLUXtRJK2jzl9w2ONQGhf896g9iCM2NUZO
|
26
|
+
/b1UwGj+w/rXTAM+RwCM9DQ7knMeAlcLXWTSVfn3bYcgrDs0JLFh0kUwHm8c/uoC
|
27
|
+
1CoJ0lgLNjRICq0OLuegWQmQ1HMWUJ2tkMAYBS+4JVnB4qlw6sCxFOojnHUZcgDK
|
28
|
+
0pwjOO/1VIyep60lxPRPX9/Se1TJeAqjMby5AhNlVX96WldxOC6m/eZrGcgRHgc7
|
29
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEpAIBAAKCAQEAyCCDtUDq0DhrjA+T5oEaRAlZXJRdU4bI9me50Ny1nh6BwQ1j
|
3
|
+
1GGWPenNp9h0kvutlpPn0Qu1EQ29g4vTIbmdHImLLd6zZ4p6xNsCQYIKxe9pUj3P
|
4
|
+
qd2Artz/brI99IcdEQ/ptZZy8N+fzo1umfPXG2e4Lh32dVROuZcvc9nVbfwyReqm
|
5
|
+
eJUMcnsHjRnn1FWDlYFk2Sbz1yIExKLfDMzQM5yK59tovh0FyYXkgs031SGpHez8
|
6
|
+
wsiiOfd3yLbG5Gg9lxrmVA2VxNdDYTF/wftwX1A3tewnybraTb8Z8sohTM7NRX8q
|
7
|
+
KGfdHgiOI/4YDxJMoC5Vkw51NqQresOIliEjmQIDAQABAoIBAEmBH78IC/bUcjPs
|
8
|
+
WM9V5dbNdEP7vld6bv+J04byOcbMv62vhFYyTaOJ515Zs191Dyn6Qy/V0/hiipPx
|
9
|
+
XGfLq/gaUMNVQ6GpDDSXmDmFUP2oVI+/YjGqyKPxSeRXlUfmBHgK1zU6ABeWmzSb
|
10
|
+
X98t33kSXGSb3rTzdULXU7eCb9DIJBYSAPt848nXWgjOgBZ1LCb+6Dd7l7LoUWAi
|
11
|
+
Ev/gOGtYkLq74LJSFjvmuEG+Ze0bBq5QOCJP4P6mU6KIgFwXkS5OeueF8X7w8Gxj
|
12
|
+
o9cxvTSq86mUO2JJKDPLjZvhngUP+/dpPuDPqRAnVL51IIha1M2mqAqF7uggqdrz
|
13
|
+
dl2mmbECgYEA/25xjt1YXv3QgaA1OgOdA5HU/9CxFu3nesGwqF2YXCof+aMGL1kt
|
14
|
+
K/yo3gfUL2nwwKFMbNtYI+l9g1dcQZkEAur2OwdoB9ca2TYl4jLtdroJTByoeTDx
|
15
|
+
s4l/g/yiZDUbKTtaIKlarPyV9Gx/vDVAIHnyaokepEiGgkPahfAW8E0CgYEAyJKO
|
16
|
+
UcwIXuV2KtgCvDSHggBYDiOoGglxST+7cN7Ap25UazPJ8kDX5Pejf3Cz7chmAxI7
|
17
|
+
0hpBGYTXOPo/nWB+F1KGI3dvCcQl0Pxd5cjEA4LA5Fb/X1vqKyYYSM8klL77mSfV
|
18
|
+
/kEYgVUZQVRwTJWPdMWj5tt2EgRWXjrSERx8Bn0CgYEAzWIovQ8Nd5Pui8weAD/X
|
19
|
+
iH9CHU/YlO9GKVaEjVx0nebhPwDugDPcNno57g2td1Jf2wPXR9A21ulvmqQr8jLv
|
20
|
+
Hsl+o4gZBfTYCb+YRoFcnxKHV0PT016fehUdCyugB6ML6+NlXM3PsziF+rsjGlpW
|
21
|
+
7cYgPblzgfUu8p9MnlWmnCECgYBoYGQxywT8JVtWNm1N9eQi0f0A9qtPSWSr4r+v
|
22
|
+
oCwPtYm29A9+wyHW5Mwv0L3B20zDAmUhFEqWdhvuacRbKNDVYDuwD0I4idvIItzW
|
23
|
+
bKEc1pl8+o0Q2etFoyB2G14FDlIuRJ3HH6cZ/ugSqFd8c0RhV0zRIZoTDDDJ/sA8
|
24
|
+
6V7dnQKBgQCHhDhRSc1zFoOR7rcYjJxmpDIWCnqgqfpjoZ2ea35aQivOj7ShS+B2
|
25
|
+
+rERrqOPN3gQA1mR2qE5406MNI1bzOyvGiYhflACPXU1IZbcCIc4W/Djzr7pc7Al
|
26
|
+
/dqhdbE96D947nWCQLQ6LcMb1+oDxDNeFHPBzVzSsPmv5B9W+cwWbg==
|
27
|
+
-----END RSA PRIVATE KEY-----
|
data/config/dev_console_env.rb
CHANGED
@@ -1,78 +1,86 @@
|
|
1
1
|
cert_dir = File.join(File.dirname(__FILE__), "certs")
|
2
2
|
|
3
3
|
Dor::Config.configure do
|
4
|
+
fedora do
|
5
|
+
url 'https://sul-dor-test.stanford.edu/fedora'
|
6
|
+
end
|
4
7
|
|
5
8
|
ssl do
|
6
|
-
cert_file File.join(cert_dir,"robots-dor-
|
7
|
-
key_file
|
8
|
-
key_pass
|
9
|
+
cert_file File.join(cert_dir,"robots-dor-test.crt")
|
10
|
+
key_file File.join(cert_dir,"robots-dor-test.key")
|
11
|
+
key_pass ''
|
9
12
|
end
|
10
13
|
|
11
14
|
suri do
|
12
15
|
mint_ids true
|
13
16
|
id_namespace 'druid'
|
14
|
-
url 'https://lyberservices-
|
17
|
+
url 'https://lyberservices-test.stanford.edu'
|
15
18
|
user 'labware'
|
16
19
|
pass 'lyberteam'
|
17
20
|
end
|
18
21
|
|
19
22
|
metadata do
|
20
|
-
exist.url
|
23
|
+
exist.url 'http://viewer:l3l%40nd@lyberapps-dev.stanford.edu/exist/rest/'
|
21
24
|
catalog.url 'http://lyberservices-prod.stanford.edu/catalog/mods'
|
22
25
|
end
|
23
26
|
|
24
27
|
stacks do
|
25
|
-
|
26
|
-
|
28
|
+
local_workspace_root '/dor/workspace'
|
29
|
+
document_cache_host 'sul-purl-test.stanford.edu'
|
30
|
+
local_stacks_root '/stacks'
|
27
31
|
local_document_cache_root '/purl/document_cache'
|
28
|
-
local_workspace_root '/dor/workspace'
|
29
32
|
end
|
30
|
-
|
31
|
-
|
32
|
-
|
33
|
-
workflow.url
|
34
|
-
dor_services.url 'https://dorAdmin:dorAdmin@sul-lyberservices-
|
33
|
+
|
34
|
+
#gsearch.url 'https://dor-test.stanford.edu/solr'
|
35
|
+
solrizer.url 'http://127.0.0.1:8080/solr/argo_test'
|
36
|
+
workflow.url 'https://lyberservices-test.stanford.edu/workflow/'
|
37
|
+
dor_services.url 'https://dorAdmin:dorAdmin@sul-lyberservices-test.stanford.edu/dor'
|
38
|
+
|
39
|
+
content do
|
40
|
+
sdr_server 'https://sdr-services-test.stanford.edu'
|
41
|
+
sdr_user 'sdrAdmin'
|
42
|
+
sdr_pass 'sdrAdmin'
|
43
|
+
end
|
35
44
|
|
36
45
|
cleanup do
|
37
46
|
local_workspace_root '/dor/workspace'
|
38
|
-
|
47
|
+
local_assembly_root '/dor/assembly'
|
48
|
+
local_export_home '/dor/export'
|
39
49
|
end
|
40
50
|
|
41
51
|
sdr do
|
42
52
|
url 'https://sdrAdmin:sdrAdmin@sdr-services-test.stanford.edu/sdr/'
|
43
53
|
local_workspace_root '/dor/workspace'
|
44
|
-
local_export_home
|
54
|
+
local_export_home '/dor/export'
|
45
55
|
datastreams do
|
46
56
|
administrativeMetadata 'optional'
|
47
|
-
contentMetadata
|
48
|
-
descMetadata
|
49
|
-
defaultObjectRights
|
50
|
-
events
|
51
|
-
embargoMetadata
|
52
|
-
identityMetadata
|
53
|
-
provenanceMetadata
|
54
|
-
relationshipMetadata
|
55
|
-
rightsMetadata
|
56
|
-
roleMetadata
|
57
|
-
sourceMetadata
|
58
|
-
technicalMetadata
|
59
|
-
versionMetadata
|
60
|
-
workflows
|
57
|
+
contentMetadata 'optional'
|
58
|
+
descMetadata 'required'
|
59
|
+
defaultObjectRights 'optional'
|
60
|
+
events 'optional'
|
61
|
+
embargoMetadata 'optional'
|
62
|
+
identityMetadata 'required'
|
63
|
+
provenanceMetadata 'required'
|
64
|
+
relationshipMetadata 'required'
|
65
|
+
rightsMetadata 'optional'
|
66
|
+
roleMetadata 'optional'
|
67
|
+
sourceMetadata 'optional'
|
68
|
+
technicalMetadata 'optional'
|
69
|
+
versionMetadata 'required'
|
70
|
+
workflows 'optional'
|
61
71
|
end
|
62
72
|
end
|
63
|
-
|
64
|
-
accessioning_robot_sleep_time 30
|
65
|
-
|
66
73
|
end
|
67
74
|
|
68
75
|
|
69
|
-
|
76
|
+
WORKFLOW_URI = 'http://lyberservices-test.stanford.edu/workflow'
|
70
77
|
|
71
78
|
# Constants for Dor::WorkflowService
|
72
|
-
#module Dor
|
73
|
-
#
|
74
|
-
#
|
75
|
-
#end
|
76
|
-
|
77
|
-
# External application locations
|
78
|
-
JHOVE_HOME = File.join(ENV['HOME'], 'jhoveToolkit')
|
79
|
+
# module Dor
|
80
|
+
# CREATE_WORKFLOW = DOR_CREATE_WORKFLOW = true
|
81
|
+
# WF_URI = 'http://lyberservices-test.stanford.edu/workflow'
|
82
|
+
# end
|
83
|
+
#
|
84
|
+
# # External application locations
|
85
|
+
# JHOVE_HOME = File.join(ENV['HOME'], 'jhoveToolkit')
|
86
|
+
#
|
data/config/test.rb
ADDED
@@ -0,0 +1,86 @@
|
|
1
|
+
cert_dir = File.join(File.dirname(__FILE__), "certs")
|
2
|
+
|
3
|
+
Dor::Config.configure do
|
4
|
+
fedora do
|
5
|
+
url 'https://sul-dor-test.stanford.edu/fedora'
|
6
|
+
end
|
7
|
+
|
8
|
+
ssl do
|
9
|
+
cert_file File.join(cert_dir,"robots-dor-test.crt")
|
10
|
+
key_file File.join(cert_dir,"robots-dor-test.key")
|
11
|
+
key_pass ''
|
12
|
+
end
|
13
|
+
|
14
|
+
suri do
|
15
|
+
mint_ids true
|
16
|
+
id_namespace 'druid'
|
17
|
+
url 'https://lyberservices-test.stanford.edu'
|
18
|
+
user 'labware'
|
19
|
+
pass 'lyberteam'
|
20
|
+
end
|
21
|
+
|
22
|
+
metadata do
|
23
|
+
exist.url 'http://viewer:l3l%40nd@lyberapps-dev.stanford.edu/exist/rest/'
|
24
|
+
catalog.url 'http://lyberservices-prod.stanford.edu/catalog/mods'
|
25
|
+
end
|
26
|
+
|
27
|
+
stacks do
|
28
|
+
local_workspace_root '/dor/workspace'
|
29
|
+
document_cache_host 'sul-purl-test.stanford.edu'
|
30
|
+
local_stacks_root '/stacks'
|
31
|
+
local_document_cache_root '/purl/document_cache'
|
32
|
+
end
|
33
|
+
|
34
|
+
#gsearch.url 'https://dor-test.stanford.edu/solr'
|
35
|
+
solrizer.url 'http://127.0.0.1:8080/solr/argo_test'
|
36
|
+
workflow.url 'https://lyberservices-test.stanford.edu/workflow/'
|
37
|
+
dor_services.url 'https://dorAdmin:dorAdmin@sul-lyberservices-test.stanford.edu/dor'
|
38
|
+
|
39
|
+
content do
|
40
|
+
sdr_server 'https://sdr-services-test.stanford.edu'
|
41
|
+
sdr_user 'sdrAdmin'
|
42
|
+
sdr_pass 'sdrAdmin'
|
43
|
+
end
|
44
|
+
|
45
|
+
cleanup do
|
46
|
+
local_workspace_root '/dor/workspace'
|
47
|
+
local_assembly_root '/dor/assembly'
|
48
|
+
local_export_home '/dor/export'
|
49
|
+
end
|
50
|
+
|
51
|
+
sdr do
|
52
|
+
url 'https://sdrAdmin:sdrAdmin@sdr-services-test.stanford.edu/sdr/'
|
53
|
+
local_workspace_root '/dor/workspace'
|
54
|
+
local_export_home '/dor/export'
|
55
|
+
datastreams do
|
56
|
+
administrativeMetadata 'optional'
|
57
|
+
contentMetadata 'optional'
|
58
|
+
descMetadata 'required'
|
59
|
+
defaultObjectRights 'optional'
|
60
|
+
events 'optional'
|
61
|
+
embargoMetadata 'optional'
|
62
|
+
identityMetadata 'required'
|
63
|
+
provenanceMetadata 'required'
|
64
|
+
relationshipMetadata 'required'
|
65
|
+
rightsMetadata 'optional'
|
66
|
+
roleMetadata 'optional'
|
67
|
+
sourceMetadata 'optional'
|
68
|
+
technicalMetadata 'optional'
|
69
|
+
versionMetadata 'required'
|
70
|
+
workflows 'optional'
|
71
|
+
end
|
72
|
+
end
|
73
|
+
end
|
74
|
+
|
75
|
+
|
76
|
+
WORKFLOW_URI = 'http://lyberservices-test.stanford.edu/workflow'
|
77
|
+
|
78
|
+
# Constants for Dor::WorkflowService
|
79
|
+
# module Dor
|
80
|
+
# CREATE_WORKFLOW = DOR_CREATE_WORKFLOW = true
|
81
|
+
# WF_URI = 'http://lyberservices-test.stanford.edu/workflow'
|
82
|
+
# end
|
83
|
+
#
|
84
|
+
# # External application locations
|
85
|
+
# JHOVE_HOME = File.join(ENV['HOME'], 'jhoveToolkit')
|
86
|
+
#
|
data/lib/dor-services.rb
CHANGED
@@ -116,9 +116,11 @@ module Dor
|
|
116
116
|
autoload :Contentable, 'dor/models/contentable'
|
117
117
|
autoload :Editable, 'dor/models/editable'
|
118
118
|
autoload :Discoverable, 'dor/models/discoverable'
|
119
|
-
autoload :Geoable,
|
120
|
-
autoload :Presentable,
|
121
|
-
autoload :Releaseable,
|
119
|
+
autoload :Geoable, 'dor/models/geoable'
|
120
|
+
autoload :Presentable, 'dor/models/presentable'
|
121
|
+
autoload :Releaseable, 'dor/models/releaseable'
|
122
|
+
autoload :Rightsable, 'dor/models/rightsable'
|
123
|
+
|
122
124
|
|
123
125
|
|
124
126
|
# ActiveFedora Classes
|
@@ -226,7 +226,7 @@ module Dor
|
|
226
226
|
|
227
227
|
#Add an administrative tag to an item, you will need to seperately save the item to write it to fedora
|
228
228
|
#
|
229
|
-
|
229
|
+
#@param tag [string] The tag you wish to add
|
230
230
|
def add_tag(tag)
|
231
231
|
identity_metadata_ds = self.identityMetadata
|
232
232
|
normalized_tag = validate_and_normalize_tag(tag, identity_metadata_ds.tags)
|
@@ -245,6 +245,18 @@ module Dor
|
|
245
245
|
end
|
246
246
|
return removed
|
247
247
|
end
|
248
|
+
|
249
|
+
#Removes all displayTypes from an item in preparation of adding a new display type
|
250
|
+
#
|
251
|
+
#@return Boolean True if displayTypes were removed, False if no displayTypes were removed
|
252
|
+
def remove_displayTypes
|
253
|
+
removed = false
|
254
|
+
self.identityMetadata.ng_xml.search('//displayType').each do |node|
|
255
|
+
node.remove
|
256
|
+
removed = true
|
257
|
+
end
|
258
|
+
return removed
|
259
|
+
end
|
248
260
|
|
249
261
|
def update_tag(old_tag, new_tag)
|
250
262
|
identity_metadata_ds = self.identityMetadata
|
data/lib/dor/models/item.rb
CHANGED
@@ -43,7 +43,7 @@ module Dor
|
|
43
43
|
|
44
44
|
im=self.datastreams['identityMetadata'].ng_xml.clone
|
45
45
|
im.search('//release').each {|node| node.remove} # remove any <release> tags from public xml which have full history
|
46
|
-
im.root.add_child(release_xml)
|
46
|
+
im.root.add_child(release_xml)
|
47
47
|
|
48
48
|
pub.add_child(im.root) # add in modified identityMetadata datastream
|
49
49
|
pub.add_child(self.datastreams['contentMetadata'].public_xml.root.clone)
|
@@ -53,7 +53,8 @@ module Dor
|
|
53
53
|
pub.add_child(rels.clone) unless rels.nil? # TODO: Should never be nil in practice; working around an ActiveFedora quirk for testing
|
54
54
|
pub.add_child(self.generate_dublin_core.root.clone)
|
55
55
|
@public_xml_doc = pub # save this for possible IIIF Presentation manifest
|
56
|
-
pub.add_child(Nokogiri(self.generate_release_xml).root.clone)
|
56
|
+
pub.add_child(Nokogiri(self.generate_release_xml).root.clone) unless release_xml.children.size == 0 #If there are no release_tags, this prevents an empty <releaseData/> from being added
|
57
|
+
#Note we cannot base this on if an individual object has release tags or not, because the collection may cause one to be generated for an item, so we need to calculate it and then look at the final result
|
57
58
|
new_pub = Nokogiri::XML(pub.to_xml) { |x| x.noblanks }
|
58
59
|
new_pub.encoding = 'UTF-8'
|
59
60
|
new_pub.to_xml
|
@@ -89,4 +90,4 @@ module Dor
|
|
89
90
|
end
|
90
91
|
end
|
91
92
|
|
92
|
-
end
|
93
|
+
end
|
@@ -33,7 +33,7 @@ module Dor
|
|
33
33
|
#@return [String] The XML release node as a string, with ReleaseDigest as the root document
|
34
34
|
def generate_release_xml
|
35
35
|
builder = Nokogiri::XML::Builder.new do |xml|
|
36
|
-
xml.
|
36
|
+
xml.releaseData {
|
37
37
|
self.released_for.each do |project,released_value|
|
38
38
|
xml.release(released_value["release"],:to=>project)
|
39
39
|
end
|
@@ -282,13 +282,20 @@ module Dor
|
|
282
282
|
#
|
283
283
|
#@params tag [Boolean] True or false for the release node
|
284
284
|
#@params attrs [hash] A hash of any attributes to be placed onto the tag
|
285
|
+
#Timestamp will be calculated by the function, if no displayType is passed in, it will default to file
|
286
|
+
#
|
285
287
|
#@example
|
286
|
-
# item.add_tag(true,:release,{:tag=>'Fitch : Batch2',:what=>'self',:to=>'Searchworks',:who=>'petucket'})
|
288
|
+
# item.add_tag(true,:release,{:tag=>'Fitch : Batch2',:what=>'self',:to=>'Searchworks',:who=>'petucket', :displayType='filmstrip'})
|
287
289
|
def add_release_node(release, attrs={})
|
288
290
|
identity_metadata_ds = self.identityMetadata
|
289
|
-
attrs[:when] = Time.now.utc.iso8601 if attrs[:when]
|
291
|
+
attrs[:when] = Time.now.utc.iso8601 if attrs[:when].nil? #add the timestamp
|
292
|
+
attrs[:displayType] = 'file' if attrs[:displayType].nil? #default to file is no display type is passed
|
290
293
|
valid_release_attributes(release, attrs)
|
291
294
|
|
295
|
+
#Remove the old displayType and then add the one for this tag
|
296
|
+
remove_displayTypes
|
297
|
+
identity_metadata_ds.add_value(:displayType, attrs[:displayType], {})
|
298
|
+
|
292
299
|
return identity_metadata_ds.add_value(:release, release.to_s, attrs)
|
293
300
|
end
|
294
301
|
|
@@ -311,6 +318,8 @@ module Dor
|
|
311
318
|
end
|
312
319
|
raise ArgumentError, ":what must be self or collection" if ! what_correct
|
313
320
|
raise ArgumentError, "the value set for this tag is not a boolean" if !!tag != tag
|
321
|
+
raise ArgumentError, ":displayType must be passed in as a String" unless attrs[:displayType].class == String
|
322
|
+
|
314
323
|
validate_tag_format(attrs[:tag]) if attrs[:tag] != nil #Will Raise exception if invalid tag
|
315
324
|
return true
|
316
325
|
end
|
data/lib/dor/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: dor-services
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 4.21.
|
4
|
+
version: 4.21.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Michael Klein
|
@@ -12,7 +12,7 @@ authors:
|
|
12
12
|
autorequire:
|
13
13
|
bindir: bin
|
14
14
|
cert_chain: []
|
15
|
-
date: 2015-
|
15
|
+
date: 2015-07-09 00:00:00.000000000 Z
|
16
16
|
dependencies:
|
17
17
|
- !ruby/object:Gem::Dependency
|
18
18
|
name: active-fedora
|
@@ -531,16 +531,6 @@ executables:
|
|
531
531
|
extensions: []
|
532
532
|
extra_rdoc_files: []
|
533
533
|
files:
|
534
|
-
- bin/dor-indexer
|
535
|
-
- bin/dor-indexerd
|
536
|
-
- config/certs/README
|
537
|
-
- config/certs/robots-dor-dev.crt
|
538
|
-
- config/certs/robots-dor-dev.key
|
539
|
-
- config/config_defaults.yml
|
540
|
-
- config/dev_console_env.rb
|
541
|
-
- config/dev_console_env.rb.example
|
542
|
-
- config/predicate_mappings.yml
|
543
|
-
- lib/dor-services.rb
|
544
534
|
- lib/dor/config.rb
|
545
535
|
- lib/dor/datastreams/administrative_metadata_ds.rb
|
546
536
|
- lib/dor/datastreams/content_metadata_ds.rb
|
@@ -615,10 +605,23 @@ files:
|
|
615
605
|
- lib/dor/workflow/document.rb
|
616
606
|
- lib/dor/workflow/graph.rb
|
617
607
|
- lib/dor/workflow/process.rb
|
608
|
+
- lib/dor-services.rb
|
618
609
|
- lib/gsearch/demoFoxmlToSolr.xslt
|
619
610
|
- lib/gsearch/schema.xml
|
620
611
|
- lib/tasks/dor.rake
|
621
612
|
- lib/tasks/rdoc.rake
|
613
|
+
- config/certs/dor-services-dor-dev.crt
|
614
|
+
- config/certs/dor-services-dor-dev.key
|
615
|
+
- config/certs/README
|
616
|
+
- config/certs/robots-dor-test.crt
|
617
|
+
- config/certs/robots-dor-test.key
|
618
|
+
- config/config_defaults.yml
|
619
|
+
- config/dev_console_env.rb
|
620
|
+
- config/dev_console_env.rb.example
|
621
|
+
- config/predicate_mappings.yml
|
622
|
+
- config/test.rb
|
623
|
+
- bin/dor-indexer
|
624
|
+
- bin/dor-indexerd
|
622
625
|
homepage:
|
623
626
|
licenses:
|
624
627
|
- ALv2
|
@@ -640,7 +643,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
640
643
|
version: 1.3.6
|
641
644
|
requirements: []
|
642
645
|
rubyforge_project:
|
643
|
-
rubygems_version: 2.
|
646
|
+
rubygems_version: 2.1.11
|
644
647
|
signing_key:
|
645
648
|
specification_version: 4
|
646
649
|
summary: Ruby implmentation of DOR services used by the SULAIR Digital Library
|
@@ -1,29 +0,0 @@
|
|
1
|
-
-----BEGIN CERTIFICATE-----
|
2
|
-
MIIE9zCCAt8CCQCcUJVDTu7rTjANBgkqhkiG9w0BAQUFADCBvzELMAkGA1UEBhMC
|
3
|
-
VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExETAPBgNVBAcTCFN0YW5mb3JkMRwwGgYD
|
4
|
-
VQQKExNTdGFuZm9yZCBVbml2ZXJzaXR5MRIwEAYDVQQLEwlMaWJyYXJpZXMxJTAj
|
5
|
-
BgNVBAMTHFNVTCBET1IgKGRldi90ZXN0KSBhY2Nlc3MgQ0ExLzAtBgkqhkiG9w0B
|
6
|
-
CQEWIHN1bC13ZWJtYXN0ZXJAbGlzdHMuc3RhbmZvcmQuZWR1MB4XDTEyMDkyNjE1
|
7
|
-
NTQzNVoXDTIyMDkyNDE1NTQzNVowgboxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpD
|
8
|
-
YWxpZm9ybmlhMREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQg
|
9
|
-
VW5pdmVyc2l0eTEyMDAGA1UEAxQpcm9ib3RzQHN1bC1seWJlcnNlcnZpY2VzLWRl
|
10
|
-
di5zdGFuZm9yZC5lZHUxMTAvBgkqhkiG9w0BCQEWImRsc3MtZGV2ZWxvcGVyc0Bs
|
11
|
-
aXN0cy5zdGFuZm9yZC5lZHUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIB
|
12
|
-
AQC1t+PPhLTDFQBuAf4f1GOj7jHdXMN0tvSHL1OCaibe0d8iKbXCMMIE0z8lbBpZ
|
13
|
-
1pA+8terIvxoTlly92EEvGkywZb+DIxnjyG0b9ftDJ64pARJMcnvwJMW/w3WdHCd
|
14
|
-
5uJ5HVM8ZCbEItUfskFukS6tfNBpG8ri6cIQ2ulJzOWYxPV5R2eRneM6vtFD0xtu
|
15
|
-
RJb/uMwiOwB79qk4QazbEQtkeZsrvomDFkIuHO/nf9wmgYG99H7q1kXplIrzDDX+
|
16
|
-
fvD+JHvuMr5YXfmBQ9wmaZf6YIL7CXj79HUF4uG/a0SjrLZyLh262zWJQFVpjSW8
|
17
|
-
Brl/fAyjeZvWJMyCDXRqsedjAgMBAAEwDQYJKoZIhvcNAQEFBQADggIBAG0jIfTj
|
18
|
-
1FJsxTzcD938vtKuNo5XEIX8phqW1MA2eJ5Ojgu1hpW5Jf7fmUHKVnamm7eya5QR
|
19
|
-
356KCJzZzwdCS4xVFq/l43gCA2j8TYrwO6/0EfM/5psUZS3ecwahzcJXfHPHvd9u
|
20
|
-
qaXRqbjJYi+Ls70uStTC/JBIIu48atDF0DeXJ21hAbstZ1OKKNzAcYgZk14GKxCi
|
21
|
-
ArgAzdg8UDtC4KsdqgxP6vF8Vc/gcHSu9AkVHgPVXbITjV0/kaKNgFi0bVqP7bJD
|
22
|
-
hrUFYrS+S+hflQJCmVrDwW0JU2HnJ3EJOFX5F4FYHL4vt6ZjVsMzucraMqiLyUaO
|
23
|
-
s6DVaWO8WMlphmFUfb3ChQjrKxFZZ6vKJPD/ExnQHa0kWwOELyMJuXw2PLk7k+qD
|
24
|
-
rmjX+K3Ed+JiJuiDG5k8f1BDZE24lvxDwye5fQyDWPfib1yTClYYy4PRh4AI688f
|
25
|
-
qgMyv51Qx82o0IJ1On1rNg5/iB7OEVcYSol3U5xiY9gRUd3vq637agZzMuRQnKXs
|
26
|
-
Uj0+Vl4OrZ54F8MVsUKfi7Je1oVUEhuHqFt/tSOGlHg1XyR/ExwulCNBKIVdhhrF
|
27
|
-
rxZCYrGDSUCF6tteJXpOBTtFT9b7hbMmBohKyS4XjfPSPRh9QHx7wepqSp3aHpmR
|
28
|
-
4gY8Go40mS83xHCKBooqsy2/Z9vQlSb9Cr8u
|
29
|
-
-----END CERTIFICATE-----
|
@@ -1,27 +0,0 @@
|
|
1
|
-
-----BEGIN RSA PRIVATE KEY-----
|
2
|
-
MIIEpQIBAAKCAQEAtbfjz4S0wxUAbgH+H9Rjo+4x3VzDdLb0hy9Tgmom3tHfIim1
|
3
|
-
wjDCBNM/JWwaWdaQPvLXqyL8aE5ZcvdhBLxpMsGW/gyMZ48htG/X7QyeuKQESTHJ
|
4
|
-
78CTFv8N1nRwnebieR1TPGQmxCLVH7JBbpEurXzQaRvK4unCENrpSczlmMT1eUdn
|
5
|
-
kZ3jOr7RQ9MbbkSW/7jMIjsAe/apOEGs2xELZHmbK76JgxZCLhzv53/cJoGBvfR+
|
6
|
-
6tZF6ZSK8ww1/n7w/iR77jK+WF35gUPcJmmX+mCC+wl4+/R1BeLhv2tEo6y2ci4d
|
7
|
-
uts1iUBVaY0lvAa5f3wMo3mb1iTMgg10arHnYwIDAQABAoIBAQCmlDzsZZ2C24S6
|
8
|
-
U29OZFc21kq1vqyaGIEOT48BFSguyDsAyTWKH0IsRC41suRxCGTQn7KeegLh5zjO
|
9
|
-
UAGK4uCYm6g7mOs4n5fpHUHWVuRFJG2dX1vbQTBVO1fHCJSX2ygumHhN+w0ibT/r
|
10
|
-
v2+F2ObuOGWghM62tkylQNfsRD0QjalE8ST2xp9p4xwPrAwEuURlA04qnLYNi4+6
|
11
|
-
qexDtrLG8E6JV/dd3dY95WjKPscadR1fAKm9sebD0XO31Lu6BGCvpmBU0OmYVfrY
|
12
|
-
BN/ofhEmJh+Xgwfxx6PicRDvu9bPnffqbGhDO4ckGDlqXp1fDBgf1I7CclXdrVMH
|
13
|
-
Qsxunh5pAoGBAN7929V1aw0S7Rqvuf4N+o1XwBExa2DL7EYI1Oea/nuBMPqvfeNh
|
14
|
-
SrbM0gYejEzLmeRUUKRhMMoAgXQnxcg3Kz/5pUXT3b4YtzeskX8nkJ6/2gEU3M7E
|
15
|
-
lJj7c5wW1otqMH19+iDNR4N8vjPh98kDJW1HZUHSAcdyE+dZiFP2ofMfAoGBANCe
|
16
|
-
AJgA9EkdwZsom+I7Ty9LSrTWx6cKmNEbLVn1iSlyJx1kHoWyTMtuZszCWBjiXx70
|
17
|
-
84WpX2B4MuJBq6sSoEiUahNsphks82glOd6i+eoE/I+NtZehOFnkAMyGux+FbMyG
|
18
|
-
q/9ZlQgsbWpFHxS59vX/kvlNun2RpJkaF6QPBuc9AoGBAIGdscCb5cPNsoCGkGf6
|
19
|
-
HB84WG4l+bJkFkyHKaoOT8neSGgOxe/7R4CGAbaI3yhsWGF+GPnTfJaOQLERxUch
|
20
|
-
ukQPil/STNwIZcc4ycHNb6S3A7MJO2f8oBtkXcjnBYI4EUOAjHmwmNb3FV/3Ax6W
|
21
|
-
c5TXoSXnOh2CU8twIWwcufolAoGATqnFf4uckZVu05rUbNIAYcz6NoZmck5EoVSm
|
22
|
-
HS3Asqggp6yA9djtrCfNC5icr4VsaLfku5nKJQ4t4bLxkGhNmBCejwSA/S09+x9O
|
23
|
-
Wu0JX3zR3y+IMczQ+tRGmNiU5qXhCJ4fbQHSeGqIN3Io7h/RR6E/QlJU59RrRG/a
|
24
|
-
SjqAV+ECgYEA2mA5VFK3jECnLde+biEaXidIOuBMcqaP0VG6sBwz2wTGSTBE1WkG
|
25
|
-
6prCD0McWVAgDTm3MMKxeuMaoW5eEi83+G+CywLaTBpc8Hz7qgRhBpKhRirCfHMW
|
26
|
-
EfQV5k32vEGoSI+eG8zcGb9mwDeb/EWXAMGXrx2YuYFu7txtwC2mZXc=
|
27
|
-
-----END RSA PRIVATE KEY-----
|