dor-services 5.13.0 → 5.14.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/dor/datastreams/rights_metadata_ds.rb +56 -16
- data/lib/dor/models/editable.rb +42 -35
- data/lib/dor/services/registration_service.rb +1 -1
- data/lib/dor/version.rb +1 -1
- metadata +2 -8
- data/config/certs/dlss-dev-petucket-dor-dev.crt +0 -29
- data/config/certs/dlss-dev-petucket-dor-dev.csr +0 -18
- data/config/certs/dlss-dev-petucket-dor-dev.key +0 -27
- data/config/certs/dlss-dev-petucket-dor-prod.crt +0 -29
- data/config/certs/dlss-dev-petucket-dor-prod.key +0 -27
- data/config/dev_console_env.rb +0 -66
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: e8cb605ae9ed74300c5e0d6748d8f0c274fb3896
|
4
|
+
data.tar.gz: ec4c6ac406b9da2a3253c346b2df694e83c224f4
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: f8e4bd986251c5be9211888e9c25f917affee01c787386ba48f2180a136701cc0b1be87445a9d9cbcc579d00aa2e132014db53e6a0c562962e9af5ea2bf069f0
|
7
|
+
data.tar.gz: d9ba452a5a57f1cc64069ce15ed71aa50dd0211d753d7a85885a0c8ba1d855efc59e5d71926dd2450abcce81da54b5d68dd0d627c0110370cc25fa8ddd7106b3
|
@@ -51,6 +51,18 @@ module Dor
|
|
51
51
|
end.doc
|
52
52
|
end
|
53
53
|
|
54
|
+
RIGHTS_TYPE_CODES = {
|
55
|
+
'world' => 'World',
|
56
|
+
'world-nd' => 'World (no-download)',
|
57
|
+
'stanford' => 'Stanford',
|
58
|
+
'stanford-nd' => 'Stanford (no-download)',
|
59
|
+
'loc:spec' => 'Location spec',
|
60
|
+
'loc:music' => 'Location music',
|
61
|
+
'dark' => 'Dark (Preserve Only)',
|
62
|
+
'none' => 'Citation Only'
|
63
|
+
}.freeze
|
64
|
+
|
65
|
+
|
54
66
|
# just a wrapper to invalidate @dra_object
|
55
67
|
def content=(xml)
|
56
68
|
@dra_object = nil
|
@@ -61,36 +73,64 @@ module Dor
|
|
61
73
|
@dra_object ||= Dor::RightsAuth.parse(ng_xml, true)
|
62
74
|
end
|
63
75
|
|
64
|
-
#
|
65
|
-
#
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
|
74
|
-
|
75
|
-
|
76
|
+
# key is the rights type code, used by e.g. RightsMetadataDS#set_read_rights and Editable#default_rights=
|
77
|
+
# value is the human-readable string, used for indexing, and for things like building select lists in the argo UI.
|
78
|
+
def self.valid_rights_types
|
79
|
+
RIGHTS_TYPE_CODES.keys
|
80
|
+
end
|
81
|
+
|
82
|
+
def self.valid_rights_type?(rights)
|
83
|
+
RightsMetadataDS.valid_rights_types.include? rights
|
84
|
+
end
|
85
|
+
|
86
|
+
# a helper method for setting up well-structured rights_xml based on a rights type code
|
87
|
+
# @param rights_xml [ng_xml] a nokogiri xml (ruby) object that represents the rights xml for a DOR object
|
88
|
+
# @param rights_type [string] a recognized rights type code ('world', 'dark', 'loc:spec', etc)
|
89
|
+
def self.upd_rights_xml_for_rights_type(rights_xml, rights_type)
|
90
|
+
label = rights_type == 'dark' ? 'none' : 'world'
|
76
91
|
rights_xml.search('//rightsMetadata/access[@type=\'discover\']/machine').each do |node|
|
77
92
|
node.children.remove
|
78
93
|
node.add_child Nokogiri::XML::Node.new(label, rights_xml)
|
79
94
|
end
|
95
|
+
|
80
96
|
rights_xml.search('//rightsMetadata/access[@type=\'read\']').each do |node|
|
81
97
|
node.children.remove
|
82
98
|
machine_node = Nokogiri::XML::Node.new('machine', rights_xml)
|
83
99
|
node.add_child(machine_node)
|
84
|
-
if
|
85
|
-
|
86
|
-
|
100
|
+
if rights_type.start_with?('world')
|
101
|
+
world_node = Nokogiri::XML::Node.new('world', rights_xml)
|
102
|
+
world_node.set_attribute('rule', 'no-download') if rights_type.end_with?('-nd')
|
103
|
+
machine_node.add_child(world_node)
|
104
|
+
elsif rights_type.start_with?('stanford')
|
87
105
|
group_node = Nokogiri::XML::Node.new('group', rights_xml)
|
88
|
-
group_node.content = '
|
106
|
+
group_node.content = 'stanford'
|
107
|
+
group_node.set_attribute('rule', 'no-download') if rights_type.end_with?('-nd')
|
89
108
|
machine_node.add_child(group_node)
|
109
|
+
elsif rights_type.start_with?('loc:')
|
110
|
+
loc_node = Nokogiri::XML::Node.new('location', rights_xml)
|
111
|
+
loc_node.content = rights_type.split(':').last
|
112
|
+
machine_node.add_child(loc_node)
|
90
113
|
else # we know it is none or dark by the argument filter (first line)
|
91
114
|
machine_node.add_child Nokogiri::XML::Node.new('none', rights_xml)
|
92
115
|
end
|
93
116
|
end
|
117
|
+
end
|
118
|
+
|
119
|
+
# @param rights [string] archetypical rights to assign: 'world', 'stanford', 'none', 'dark', etc
|
120
|
+
# Moved from Governable
|
121
|
+
# slight misnomer: also sets discover rights!
|
122
|
+
# TODO: convert xpath reads to dra_object calls
|
123
|
+
def set_read_rights(rights)
|
124
|
+
raise(ArgumentError, "Argument '#{rights}' is not a recognized value") unless RightsMetadataDS.valid_rights_type? rights
|
125
|
+
|
126
|
+
rights_xml = ng_xml
|
127
|
+
if rights_xml.search('//rightsMetadata/access[@type=\'read\']').length == 0
|
128
|
+
raise('The rights metadata stream doesnt contain an entry for machine read permissions. Consider populating it from the APO before trying to change it.')
|
129
|
+
end
|
130
|
+
|
131
|
+
RightsMetadataDS.upd_rights_xml_for_rights_type(rights_xml, rights)
|
132
|
+
|
133
|
+
self.dra_object = nil # until TODO complete, we'll expect to have to reparse after modification
|
94
134
|
self.content = rights_xml.to_xml
|
95
135
|
content_will_change!
|
96
136
|
end
|
data/lib/dor/models/editable.rb
CHANGED
@@ -47,7 +47,7 @@ module Dor
|
|
47
47
|
|
48
48
|
def to_solr(solr_doc = {}, *args)
|
49
49
|
solr_doc = super(solr_doc, *args)
|
50
|
-
add_solr_value(solr_doc, 'default_rights',
|
50
|
+
add_solr_value(solr_doc, 'default_rights', default_rights_for_indexing, :string, [:symbol])
|
51
51
|
add_solr_value(solr_doc, 'agreement', agreement, :string, [:symbol]) if agreement_object
|
52
52
|
add_solr_value(solr_doc, 'default_use_license_machine', use_license, :string, [:stored_sortable])
|
53
53
|
solr_doc
|
@@ -229,50 +229,57 @@ module Dor
|
|
229
229
|
end
|
230
230
|
end
|
231
231
|
|
232
|
-
# @return [String] A description of the rights defined in the default object rights datastream. Can be
|
232
|
+
# @return [String] A description of the rights defined in the default object rights datastream. Can be one of
|
233
|
+
# RightsMetadataDS::RIGHTS_TYPE_CODES.keys (so this is essentially the inverse of RightsMetadataDS.upd_rights_xml_for_rights_type).
|
233
234
|
def default_rights
|
234
235
|
xml = defaultObjectRights.ng_xml
|
235
|
-
|
236
|
-
|
237
|
-
|
238
|
-
|
239
|
-
|
240
|
-
|
236
|
+
machine_read_access = xml.search('//rightsMetadata/access[@type="read"]/machine')
|
237
|
+
machine_discover_access = xml.search('//rightsMetadata/access[@type="discover"]/machine')
|
238
|
+
|
239
|
+
machine_read_access_node = machine_read_access.length == 1 ? machine_read_access.first : nil
|
240
|
+
machine_discover_access_node = machine_discover_access.length == 1 ? machine_discover_access.first : nil
|
241
|
+
|
242
|
+
if machine_read_access_node && machine_read_access_node.search('./group[text()="Stanford" or text()="stanford"]').length == 1
|
243
|
+
if machine_read_access_node.search('./group[@rule="no-download"]').length == 1
|
244
|
+
'stanford-nd'
|
245
|
+
else
|
246
|
+
'stanford'
|
247
|
+
end
|
248
|
+
elsif machine_read_access_node && machine_read_access_node.search('./world').length == 1
|
249
|
+
if machine_read_access_node.search('./world[@rule="no-download"]').length == 1
|
250
|
+
'world-nd'
|
251
|
+
else
|
252
|
+
'world'
|
253
|
+
end
|
254
|
+
elsif machine_read_access_node && machine_read_access_node.search('./location[text()="spec"]').length == 1
|
255
|
+
'loc:spec'
|
256
|
+
elsif machine_read_access_node && machine_read_access_node.search('./location[text()="music"]').length == 1
|
257
|
+
'loc:music'
|
258
|
+
elsif machine_discover_access_node && machine_discover_access_node.search('./world').length == 1
|
259
|
+
# if it's not stanford restricted, world readable, or location restricted, but it is world discoverable, it's "citation only"
|
260
|
+
'none'
|
261
|
+
elsif machine_discover_access_node && machine_discover_access_node.search('./none').length == 1
|
262
|
+
# if it's not even discoverable, it's "dark"
|
263
|
+
'dark'
|
241
264
|
else
|
242
|
-
|
265
|
+
# if none of the above, the rights xml structure is unsupported/unintelligible
|
266
|
+
nil
|
243
267
|
end
|
244
268
|
end
|
269
|
+
|
270
|
+
# @return [String] A description of the rights defined in the default object rights datastream. Can be 'Stanford', 'World', 'Dark' or 'None'
|
271
|
+
def default_rights_for_indexing
|
272
|
+
RightsMetadataDS::RIGHTS_TYPE_CODES.fetch(default_rights, 'Unrecognized default rights value')
|
273
|
+
end
|
274
|
+
|
245
275
|
# Set the rights in default object rights
|
246
276
|
# @param rights [String] Stanford, World, Dark, or None
|
247
277
|
def default_rights=(rights)
|
248
278
|
rights = rights.downcase
|
279
|
+
raise(ArgumentError, "Unrecognized rights value '#{rights}'") unless RightsMetadataDS.valid_rights_type? rights
|
280
|
+
|
249
281
|
rights_xml = defaultObjectRights.ng_xml
|
250
|
-
|
251
|
-
node.children.remove
|
252
|
-
world_node = Nokogiri::XML::Node.new((rights == 'dark' ? 'none' : 'world'), rights_xml)
|
253
|
-
node.add_child(world_node)
|
254
|
-
end
|
255
|
-
rights_xml.search('//rightsMetadata/access[@type=\'read\']').each do |node|
|
256
|
-
node.children.remove
|
257
|
-
machine_node = Nokogiri::XML::Node.new('machine', rights_xml)
|
258
|
-
if rights == 'world'
|
259
|
-
world_node = Nokogiri::XML::Node.new(rights, rights_xml)
|
260
|
-
node.add_child(machine_node)
|
261
|
-
machine_node.add_child(world_node)
|
262
|
-
elsif rights == 'stanford'
|
263
|
-
node.add_child(machine_node)
|
264
|
-
group_node = Nokogiri::XML::Node.new('group', rights_xml)
|
265
|
-
group_node.content = 'Stanford'
|
266
|
-
node.add_child(machine_node)
|
267
|
-
machine_node.add_child(group_node)
|
268
|
-
elsif rights == 'none' || rights == 'dark'
|
269
|
-
none_node = Nokogiri::XML::Node.new('none', rights_xml)
|
270
|
-
node.add_child(machine_node)
|
271
|
-
machine_node.add_child(none_node)
|
272
|
-
else
|
273
|
-
raise ArgumentError, "Unrecognized rights value '#{rights}'"
|
274
|
-
end
|
275
|
-
end
|
282
|
+
RightsMetadataDS.upd_rights_xml_for_rights_type(rights_xml, rights)
|
276
283
|
end
|
277
284
|
|
278
285
|
def desc_metadata_format
|
@@ -75,7 +75,7 @@ module Dor
|
|
75
75
|
rights = nil
|
76
76
|
if params[:rights]
|
77
77
|
rights = params[:rights]
|
78
|
-
unless
|
78
|
+
unless rights == 'default' || RightsMetadataDS.valid_rights_type?(rights)
|
79
79
|
raise Dor::ParameterError, "Unknown rights setting '#{rights}' when calling #{name}.register_object"
|
80
80
|
end
|
81
81
|
end
|
data/lib/dor/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: dor-services
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 5.
|
4
|
+
version: 5.14.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Michael Klein
|
@@ -14,7 +14,7 @@ authors:
|
|
14
14
|
autorequire:
|
15
15
|
bindir: bin
|
16
16
|
cert_chain: []
|
17
|
-
date: 2016-10-
|
17
|
+
date: 2016-10-27 00:00:00.000000000 Z
|
18
18
|
dependencies:
|
19
19
|
- !ruby/object:Gem::Dependency
|
20
20
|
name: active-fedora
|
@@ -582,13 +582,7 @@ extensions: []
|
|
582
582
|
extra_rdoc_files: []
|
583
583
|
files:
|
584
584
|
- config/certs/README
|
585
|
-
- config/certs/dlss-dev-petucket-dor-dev.crt
|
586
|
-
- config/certs/dlss-dev-petucket-dor-dev.csr
|
587
|
-
- config/certs/dlss-dev-petucket-dor-dev.key
|
588
|
-
- config/certs/dlss-dev-petucket-dor-prod.crt
|
589
|
-
- config/certs/dlss-dev-petucket-dor-prod.key
|
590
585
|
- config/config_defaults.yml
|
591
|
-
- config/dev_console_env.rb
|
592
586
|
- config/dev_console_env.rb.example
|
593
587
|
- config/predicate_mappings.yml
|
594
588
|
- lib/dor-services.rb
|
@@ -1,29 +0,0 @@
|
|
1
|
-
-----BEGIN CERTIFICATE-----
|
2
|
-
MIIE3zCCAscCCQCcUJVDTu7rPzANBgkqhkiG9w0BAQUFADCBvzELMAkGA1UEBhMC
|
3
|
-
VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExETAPBgNVBAcTCFN0YW5mb3JkMRwwGgYD
|
4
|
-
VQQKExNTdGFuZm9yZCBVbml2ZXJzaXR5MRIwEAYDVQQLEwlMaWJyYXJpZXMxJTAj
|
5
|
-
BgNVBAMTHFNVTCBET1IgKGRldi90ZXN0KSBhY2Nlc3MgQ0ExLzAtBgkqhkiG9w0B
|
6
|
-
CQEWIHN1bC13ZWJtYXN0ZXJAbGlzdHMuc3RhbmZvcmQuZWR1MB4XDTEyMDkyNjAw
|
7
|
-
Mzg1OFoXDTIyMDkyNDAwMzg1OFowgaIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpD
|
8
|
-
YWxpZm9ybmlhMREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQg
|
9
|
-
VW5pdmVyc2l0eTEnMCUGA1UEAxMeZGxzcy1kZXYtcGV0dWNrZXQuc3RhbmZvcmQu
|
10
|
-
ZWR1MSQwIgYJKoZIhvcNAQkBFhVwZXR1Y2tldEBzdGFuZm9yZC5lZHUwggEiMA0G
|
11
|
-
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3cqsXN6QQIMD/yqKNI+BFtPBrhV1F
|
12
|
-
hRqenXUrqDRhIE6o0WVolJC4pBVXMXZksk/cnsDkb/PrD2JZH4YTS6+B51qRvScg
|
13
|
-
cyqioPOJnPNRowogNUwkDiR4OGdKIbdRyYG+SgDuMWN/it7TqtG92KJm78imQS6S
|
14
|
-
wOtP8AnqOveMHEdmAzcANGTHCLF8SNxNqGgedXLWfpi4MSYI1io0PCA/gtrotrsL
|
15
|
-
xcwOfdkUrImaa0Og/Jyp/GAq6uveYangt3Ox3GLyyToSK4/FJXwxba9+OqR0U2MZ
|
16
|
-
qiFbXkTzGzLbx+xhfkG5Qe1eR3u1JigSjS4z3rUmvPz+MIQVQX9ZdAThAgMBAAEw
|
17
|
-
DQYJKoZIhvcNAQEFBQADggIBAH0u9ZVNGCXO6a77hTIO6vjJ0MoWzJNY4j+47Dl9
|
18
|
-
2hhDoVtw7VtV5/mKVKAiQB+Gbz/NIfkqfPgJEwyC5vr4330wIC2dMuGNFnSxGTKz
|
19
|
-
PlkZAWGUqpkfucPISwPXRgbQIMghRy+EZ05ayv1w+HlV9QGj+hbOt92jL/e1yCpH
|
20
|
-
Fd3I/7Ui26vrHqx+5Hg2d4gT2YGHTKBy8LakuoN59fw8sb+Gk0Xp/0pZMD+Sgl6T
|
21
|
-
db0HOH4lcC3qG0ZfrNJ2BwDUnzbt8cruc98iu5obnmSK39ezKsSWx6leHzWIQLLT
|
22
|
-
guNGOpbWJrNfF/VXpH9t0Q/xd0vZsOWSUkfHpd02PCBFRIWUv6UCldsDByP4IKHE
|
23
|
-
bwNa3STPwIWKq2SGE+qGkY5P6t7zqPZ+SFl4kOXUWNuspSY8v5dKFyfFexaX6p6S
|
24
|
-
bRRK5CoZq3jvxvHk88VQPTli0EP12r4SSG19UU43Twqqqd2CEW7woL3Z/OPws047
|
25
|
-
jV/e8cHA7goo5d9RKwyz/7zivUWqidnp7SeL5/YQRY2bwWOcS/y49Dmi0+FQOJCw
|
26
|
-
wjDDUv6Z+SR3NmbGtc0dIroTIWxvS7otIa+dXnH+ubrGAlbUvT1NAeO9mdX9m/qh
|
27
|
-
YHm8oRVyJD12Hylc5pmFEBbV02Lzc/D4mB3oNtSVvhNfoTZfyKqwA+kAPol6HDIb
|
28
|
-
vJi3
|
29
|
-
-----END CERTIFICATE-----
|
@@ -1,18 +0,0 @@
|
|
1
|
-
-----BEGIN CERTIFICATE REQUEST-----
|
2
|
-
MIIC6DCCAdACAQAwgaIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlh
|
3
|
-
MREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQgVW5pdmVyc2l0
|
4
|
-
eTEnMCUGA1UEAxMeZGxzcy1kZXYtcGV0dWNrZXQuc3RhbmZvcmQuZWR1MSQwIgYJ
|
5
|
-
KoZIhvcNAQkBFhVwZXR1Y2tldEBzdGFuZm9yZC5lZHUwggEiMA0GCSqGSIb3DQEB
|
6
|
-
AQUAA4IBDwAwggEKAoIBAQC3cqsXN6QQIMD/yqKNI+BFtPBrhV1FhRqenXUrqDRh
|
7
|
-
IE6o0WVolJC4pBVXMXZksk/cnsDkb/PrD2JZH4YTS6+B51qRvScgcyqioPOJnPNR
|
8
|
-
owogNUwkDiR4OGdKIbdRyYG+SgDuMWN/it7TqtG92KJm78imQS6SwOtP8AnqOveM
|
9
|
-
HEdmAzcANGTHCLF8SNxNqGgedXLWfpi4MSYI1io0PCA/gtrotrsLxcwOfdkUrIma
|
10
|
-
a0Og/Jyp/GAq6uveYangt3Ox3GLyyToSK4/FJXwxba9+OqR0U2MZqiFbXkTzGzLb
|
11
|
-
x+xhfkG5Qe1eR3u1JigSjS4z3rUmvPz+MIQVQX9ZdAThAgMBAAGgADANBgkqhkiG
|
12
|
-
9w0BAQUFAAOCAQEAdAVri6K2jyMcAJDWohxGVld7HU2ejhN1tx9+HSroK1+7f2LX
|
13
|
-
R4i06NLZI0qJA92cd5sC7T5KFG3v1Ad5gPcZfkhmH8uL0v/qNkx/vvZgF9vlUf+L
|
14
|
-
5JEyqzsMIxcRCC9gujsk9ha7oigFWbf1AxNt1KSDcIIID7nm+Tl7b/kSoOTK5z8j
|
15
|
-
/Pg8CL54paNtRQ8TDtlvdbziPn4J/Zopx0s5lpgV/pLaSkq+GPih+eV2ST1fpFzu
|
16
|
-
RQNQVZ3fa2W3Jz9m6vAtWZP1Ht7ZnLYTdSIJOo0Z2mBjcDE86JqF8bbWYt4THAgv
|
17
|
-
DIEKxWpGWz7rmTJJ5DStxFmUK6135FKatnAT4w==
|
18
|
-
-----END CERTIFICATE REQUEST-----
|
@@ -1,27 +0,0 @@
|
|
1
|
-
-----BEGIN RSA PRIVATE KEY-----
|
2
|
-
MIIEogIBAAKCAQEAt3KrFzekECDA/8qijSPgRbTwa4VdRYUanp11K6g0YSBOqNFl
|
3
|
-
aJSQuKQVVzF2ZLJP3J7A5G/z6w9iWR+GE0uvgedakb0nIHMqoqDziZzzUaMKIDVM
|
4
|
-
JA4keDhnSiG3UcmBvkoA7jFjf4re06rRvdiiZu/IpkEuksDrT/AJ6jr3jBxHZgM3
|
5
|
-
ADRkxwixfEjcTahoHnVy1n6YuDEmCNYqNDwgP4La6La7C8XMDn3ZFKyJmmtDoPyc
|
6
|
-
qfxgKurr3mGp4Ldzsdxi8sk6EiuPxSV8MW2vfjqkdFNjGaohW15E8xsy28fsYX5B
|
7
|
-
uUHtXkd7tSYoEo0uM961Jrz8/jCEFUF/WXQE4QIDAQABAoIBAGZR9Q/sHvxH6J5D
|
8
|
-
ncrvecYnl/nA1zdReHmEBbimByEtbfJHaTKduuLh0m1hz1F3C4hYm+pOb1RqrkZb
|
9
|
-
iOL2Uhw4uJGVWV+GHP+8mlnlSun78Efqsl9h7AGKJEJ6788Uf+NtT3uL3J1lDcgt
|
10
|
-
/PLRBDQ6BkaFEL8WD6n0jvMwlKZ2pLOsYaMx29vPVpcf/zL2B4CWr+jsm38OMRNk
|
11
|
-
WsQ0aA1XPZuJC/iS8Ky/ccvOLt3BlVVh62/L776XrKpXzAi9O/u3clak3Sel1rxt
|
12
|
-
NnTrN+hacsQp4gS1qPiKF656b6WG1tQ29r5rUMPqNltPjmVTe4m5S16NoRv/IEFQ
|
13
|
-
9thtEAECgYEA7WSSNiwbDgXRygEIRAP4M26Bvv8EQ29i7mnv5RnHObiD1y5eu/qQ
|
14
|
-
E5/VULqYcHR9C3qpDqdfFf9IVg0CjeuFatG85Jd15vDWtk5RErxLq005qzUsC0o8
|
15
|
-
AsCurdb0r6zOo5iWyjk8JwT/LAJ8Tg4JDGARcZnHk9LBbDI8i/FAvqECgYEAxdOo
|
16
|
-
9viFFblcwu9Oua/i67VNGocBgjTHNof15nhnu4Am3vR3g8wRBzjUcJLjxT+kxlMf
|
17
|
-
/YwfUSDIs9yviGv2kj8M3UPtCQ8vkzRwPnhbT9gvWxtnc0XxYNq7IVZ8x1cZeBsf
|
18
|
-
8vH6/tCnjgfsN6HP3DSqiJ5cqAjECsJq0fo03kECgYBAIs3FyQC+NyBIvSKojZH/
|
19
|
-
AzoWifty5KML2p8vfFlw5MLp3eNGUhme063kE6WfrDkkYs1N4jY0UTYP2Y/5G8p9
|
20
|
-
45BvCeSWsjawJlSNBUZET6bm9ISjwDiaXchTuyF8XOmvFUiX9gKkYBs4nqtKw0v6
|
21
|
-
hfHwiSV8cJJFUwU8ob9mQQKBgAh8MqQdNsAeyj7GOu81/xqzFRKNNeBa2Syamk5/
|
22
|
-
XZuqPICVpcauaxCPPHVzp3dfanbjO90JNJKrQFCOp6zHTLUrJScccb9Qum6q8iGL
|
23
|
-
0gbTs/xJaZ+FIXxRBXPBnOqD7uC68Rzfii+BzZ4G8vfT5fGBBMuFV14Rui7n9eL5
|
24
|
-
w2jBAoGAbh77B0kzLngbs+NmTfwjnYw5qYqwFPAYPYcu0w1wF8oTD38U8FqJ/6LG
|
25
|
-
oKaszyYODurPox81kJplNukEmSCDto1i6DJ71i8HcCfitEFXua28WD1+5Wn4o9CS
|
26
|
-
AOxLn8jHa7K6lmXZm2hgjWcSI9VGp5En79pGzrtO/d+OswVIJEc=
|
27
|
-
-----END RSA PRIVATE KEY-----
|
@@ -1,29 +0,0 @@
|
|
1
|
-
-----BEGIN CERTIFICATE-----
|
2
|
-
MIIE+jCCAuICCQDiT+2CJW52sTANBgkqhkiG9w0BAQUFADCBuTELMAkGA1UEBhMC
|
3
|
-
VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExETAPBgNVBAcTCFN0YW5mb3JkMRwwGgYD
|
4
|
-
VQQKExNTdGFuZm9yZCBVbml2ZXJzaXR5MRIwEAYDVQQLEwlMaWJyYXJpZXMxHzAd
|
5
|
-
BgNVBAMTFlNVTCBET1IgcHJvZCBhY2Nlc3MgQ0ExLzAtBgkqhkiG9w0BCQEWIHN1
|
6
|
-
bC13ZWJtYXN0ZXJAbGlzdHMuc3RhbmZvcmQuZWR1MB4XDTEyMTAwODE3MDk1NVoX
|
7
|
-
DTIyMTAwNjE3MDk1NVowgcMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9y
|
8
|
-
bmlhMREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQgVW5pdmVy
|
9
|
-
c2l0eTESMBAGA1UECxMJTGlicmFyaWVzMScwJQYDVQQDEx5kbHNzLWRldi1wZXR1
|
10
|
-
Y2tldC5zdGFuZm9yZC5lZHUxMTAvBgkqhkiG9w0BCQEWImRsc3MtZGV2ZWxvcGVy
|
11
|
-
c0BsaXN0cy5zdGFuZm9yZC5lZHUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
|
12
|
-
AoIBAQDO3bOG2i4DZNnPTt2C6fFM3znmqHIW/n771ntWTzS8k01REksYPlxBNZ3t
|
13
|
-
M+aZFy/2lEv7PMMNg2VDDn1TRJd0hy87VW7QOTYTo1SCo2AYgn+qOnujSGqU+RRn
|
14
|
-
pM4xTGBnF5BGSXfAi++iMJyyQngF3nev5jAcy9SrwtpXrV4JyNl6LtmodtjBi/3k
|
15
|
-
LO6KY9Uc9T8zRcuiC/5zidM1+aymfoymG295aVDc+JsghjWm/UoE+Nvs20zfi+5a
|
16
|
-
JB3iL+3RyUr2Hh3N4zdxR6dar/Ivy5WfPTEmtkqiSnnhdDX6fE4f+4P3ewn7bbZN
|
17
|
-
LrH2T5Bm4W64bPsnUPP1evgidZ0LAgMBAAEwDQYJKoZIhvcNAQEFBQADggIBAJIZ
|
18
|
-
bdwEJQEOKAruCvCwxFNXQUUPzJiuYqlJ61+4Vhs7JugORo+DgNTYL/JkZ6dCR/uj
|
19
|
-
4W0TQyBtA1GtfUYvcXCrvQl51YTMAODkoWNlkP/xaHx02twIoZDsGSVAVZryP0ae
|
20
|
-
OzToLSvj+a1OvRS3YX/CO+Gq5t2//kCYrI1h6d/41PjWBRD2A2NWJrBiIj62W1qJ
|
21
|
-
muY1YvSiNZ27Pwjp0fA6QwpFY+AxUAei6jKQcUCp6q3wlFaVgMS4SKtIC/rNAAc3
|
22
|
-
2aN2dlk6u81wjKQqMKXzWhwxTqEPQAmxoP8oJVxRwh1gxoBEAbLxse76Cc9+eISn
|
23
|
-
CG0RF+bku3ceGrNYWQHGu8xOXAexM77WFSIVrtYJ2Tf/P+un8J+fvb3U8I5hOkGK
|
24
|
-
/yMIxRfpYyOx8Qg3IJ6ci6Frg2Jn1Csv7RR8vXgRqWDRrYpeRdm8VjO/MkozGp3X
|
25
|
-
r7y8hmoacnaOAcPV+KCMQ4zCobFEfxpIlajNgb4ZJhA4/ZcHlnXCr51n/A3FTLdG
|
26
|
-
MR4D2JWw9oKDrf9317IomWQd6B8/+MzBX+vFteq0xQPHVJcCh48NuRkJomfy+m2q
|
27
|
-
nMgxRTeRIN0VNFrhOxarv+Xiw9BoBAdKd1JbZX4uPVFs+DdkAcZC8aJRnmsowwfG
|
28
|
-
C5+Fxxdx+ucfga5QSZui4uyIXlx1nAy+eeTPwmDc
|
29
|
-
-----END CERTIFICATE-----
|
@@ -1,27 +0,0 @@
|
|
1
|
-
-----BEGIN RSA PRIVATE KEY-----
|
2
|
-
MIIEpQIBAAKCAQEAzt2zhtouA2TZz07dgunxTN855qhyFv5++9Z7Vk80vJNNURJL
|
3
|
-
GD5cQTWd7TPmmRcv9pRL+zzDDYNlQw59U0SXdIcvO1Vu0Dk2E6NUgqNgGIJ/qjp7
|
4
|
-
o0hqlPkUZ6TOMUxgZxeQRkl3wIvvojCcskJ4Bd53r+YwHMvUq8LaV61eCcjZei7Z
|
5
|
-
qHbYwYv95CzuimPVHPU/M0XLogv+c4nTNfmspn6MphtveWlQ3PibIIY1pv1KBPjb
|
6
|
-
7NtM34vuWiQd4i/t0clK9h4dzeM3cUenWq/yL8uVnz0xJrZKokp54XQ1+nxOH/uD
|
7
|
-
93sJ+222TS6x9k+QZuFuuGz7J1Dz9Xr4InWdCwIDAQABAoIBAQCSt1jJrtptm8yD
|
8
|
-
JKskW2nBnJzDQ/rO5icH1EHboAeGK27trezGwAvMUAu3HVVShMiGuPz+rkSkw+lA
|
9
|
-
2vj14rMMeYh9K4WRdtIssW2Rze+s0nlbMWlZEFZPXC0lqRR4kHPbCjJQN3EQhe8q
|
10
|
-
eBHauBvKBdObVMYQ1lv6ihMzlgkZJCtRdwn6DqiN2kkFkHx4mhWoMadYA6xBwN4S
|
11
|
-
+YM5O1KwC9nUgRpLFSM8D8fBANzI6takkVDQ6QaJJ11dsur5RE9BsFzl+Op7Evzu
|
12
|
-
+zCisC17ZUn07YVvGeTUkIwTk0aeu3HCX83WM8jmg02ijtwqf6pdlLMJ8G8MQURe
|
13
|
-
siKh1ZP5AoGBAP5ZJrZ/UcGFR1XLeL6WmgljlF26LQzy/DHMBbWMYpTrwfaxk/sK
|
14
|
-
o8wTuVebJGhuffTgYU2VWJ5at7AMasOP6IAT2nP2KvcoCmvG8u3BCTkck57Vde5H
|
15
|
-
86bJ88z6TEzhrElDMjmKx7gEb2P6RIKnDcNdduaR6DE6qJOBJ5F5W3KlAoGBANA1
|
16
|
-
nKBEFEXJ4Cuw6OrJeyrgu/aCLFKus/orlfLPHFQAvFJzpqmCONz5H/Wcf+m6uMeR
|
17
|
-
MQ6V705h2y+FUmwufpFyqCVunC1zJu6mZG9TNEjXzyFBnb4jcEjsMm6DCrVA6zOx
|
18
|
-
3iWd+rLNxIpN3fhskzclNnhn+WhGo7xktuIrVDHvAoGBAPLWVVLKTllQkWIFaRu2
|
19
|
-
GA08yMuP1DFX0JcOrqi+BuUeDkslEh8N8oMGld9hnSojzBg/Hkd/fmN6Q4RO5qQe
|
20
|
-
QqH90oUCk9Tzordx9EAxHEgt03dDYFwG0Eb+68lZc/23PNGZ2Vr8+F/lxCAVMtH3
|
21
|
-
Avnyw3Gx/pj54zcpiYin8DqNAoGBAKSqcdfSX9Id6ZvES0E83Zs4p486vkEaCB8H
|
22
|
-
j4y7veS1vDrdWmbfJYelw1/lSMiaMv8qVgj6DYwJGmdH4rrKPrFbY55PD1dmpdjC
|
23
|
-
YdYlkMk3XIopsc6pimkx3GTIYJSe5iU5O762ZYo58IGNOcr6W6eWV7D8UiTlESOy
|
24
|
-
52yR5gGjAoGALfzgCSIAVlOli3a7m3aMWUtGhp+sVi7jGLE9NHTwFXnkYEoXmR+v
|
25
|
-
5CIvK8IzwtATEomoAa2GKGek8MSE+H1/o+SrGL9PIATnzuEZeJOIMnGa5mO26a9/
|
26
|
-
eV2Qud4v/7qD2P2VnCVYaAMYqS6l0SxB11/UhuQiWdpITxy44CK1Jk8=
|
27
|
-
-----END RSA PRIVATE KEY-----
|
data/config/dev_console_env.rb
DELETED
@@ -1,66 +0,0 @@
|
|
1
|
-
cert_dir = File.join(File.dirname(__FILE__), "certs")
|
2
|
-
|
3
|
-
Dor::Config.configure do
|
4
|
-
|
5
|
-
fedora do
|
6
|
-
url 'https://sul-dor-test.stanford.edu/fedora'
|
7
|
-
end
|
8
|
-
|
9
|
-
ssl do
|
10
|
-
cert_file File.join(cert_dir,"dlss-dev-petucket-dor-dev.crt")
|
11
|
-
key_file File.join(cert_dir,"dlss-dev-petucket-dor-dev.key")
|
12
|
-
key_pass ''
|
13
|
-
end
|
14
|
-
|
15
|
-
sdr do
|
16
|
-
url 'http://localhost'
|
17
|
-
local_workspace_root '/dor/workspace'
|
18
|
-
local_export_home '/dor/export'
|
19
|
-
end
|
20
|
-
|
21
|
-
suri do
|
22
|
-
mint_ids true
|
23
|
-
id_namespace 'druid'
|
24
|
-
url 'http://sul-lyberservices-test.stanford.edu'
|
25
|
-
user 'labware'
|
26
|
-
pass 'lyberteam'
|
27
|
-
end
|
28
|
-
|
29
|
-
solr.url 'https://sul-solr-tester.stanford.edu/argo_stage'
|
30
|
-
workflow.url 'https://sul-lyberservices-test.stanford.edu/workflow/'
|
31
|
-
|
32
|
-
purl do
|
33
|
-
base_url 'https://purl-test.stanford.edu/'
|
34
|
-
end
|
35
|
-
|
36
|
-
remediation do
|
37
|
-
check_for_versioning_required false # this MUST be true in production; can be false in development and test if you want to ignore workflow checks
|
38
|
-
check_for_in_accessioning false # this MUST be true in production; can be false in development and test if you want to ignore workflow checks
|
39
|
-
end
|
40
|
-
|
41
|
-
dor do
|
42
|
-
service_root 'https://dorAdmin:dorAdmin@sul-lyberservices-test.stanford.edu/dor/v1'
|
43
|
-
num_attempts 3 # the number of attempts to contact the dor web service before throwing an exception
|
44
|
-
sleep_time 2 # sleep time in seconds between attempts to contact the dor service
|
45
|
-
default_label 'Untitled' # the default label for an object that is registered when no label is provided in the manifest
|
46
|
-
end
|
47
|
-
|
48
|
-
content do
|
49
|
-
content_user 'lyberadmin'
|
50
|
-
content_base_dir '/dor/workspace/'
|
51
|
-
content_server 'lyberservices-test'
|
52
|
-
end
|
53
|
-
status do
|
54
|
-
indexer_url 'http://sulstats-raw.stanford.edu//render/?format=json&from=-1minute&until=now&target=stats.gauges.dor-prod.argo.reindexqueue.queue-size.count'
|
55
|
-
end
|
56
|
-
stacks do
|
57
|
-
document_cache_storage_root '/home/lyberadmin/document_cache'
|
58
|
-
document_cache_host 'purl-test.stanford.edu'
|
59
|
-
document_cache_user 'lyberadmin'
|
60
|
-
local_workspace_root '/dor/workspace'
|
61
|
-
storage_root '/stacks'
|
62
|
-
host 'stacks-test.stanford.edu'
|
63
|
-
user 'lyberadmin'
|
64
|
-
end
|
65
|
-
|
66
|
-
end
|