dor-services 5.22.0 → 5.22.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/config/certs/dlss-dev-petucket-dor-dev.crt +29 -0
- data/config/certs/dlss-dev-petucket-dor-dev.csr +18 -0
- data/config/certs/dlss-dev-petucket-dor-dev.key +27 -0
- data/config/certs/dlss-dev-petucket-dor-prod.crt +29 -0
- data/config/certs/dlss-dev-petucket-dor-prod.key +27 -0
- data/config/dev_console_env.rb +66 -0
- data/lib/dor/models/concerns/identifiable.rb +36 -1
- data/lib/dor/version.rb +1 -1
- metadata +10 -3
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA1:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: c6dab8f7f2a56e8bfde680d4785508bad8ce7142
|
4
|
+
data.tar.gz: 565fe3f2bab1843247d24565b6a5e4109cc33f5d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 59ad5521ef58aa0ceaa66e5a75f55273f45041aec06f48587b2218bc4b9d2680fbb5e62844c11271025ba84d12f922515049c999eef2a11dc667a13593c956c4
|
7
|
+
data.tar.gz: 31198cf58c69a2c3ff6dd434ef5ba04485b28df11f82f317ddbf9470fa8b8399671e8143bb6aac64e0b661ab04b6daf657502b2872856c1817db6d48a71f5f54
|
@@ -0,0 +1,29 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIE3zCCAscCCQCcUJVDTu7rPzANBgkqhkiG9w0BAQUFADCBvzELMAkGA1UEBhMC
|
3
|
+
VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExETAPBgNVBAcTCFN0YW5mb3JkMRwwGgYD
|
4
|
+
VQQKExNTdGFuZm9yZCBVbml2ZXJzaXR5MRIwEAYDVQQLEwlMaWJyYXJpZXMxJTAj
|
5
|
+
BgNVBAMTHFNVTCBET1IgKGRldi90ZXN0KSBhY2Nlc3MgQ0ExLzAtBgkqhkiG9w0B
|
6
|
+
CQEWIHN1bC13ZWJtYXN0ZXJAbGlzdHMuc3RhbmZvcmQuZWR1MB4XDTEyMDkyNjAw
|
7
|
+
Mzg1OFoXDTIyMDkyNDAwMzg1OFowgaIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpD
|
8
|
+
YWxpZm9ybmlhMREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQg
|
9
|
+
VW5pdmVyc2l0eTEnMCUGA1UEAxMeZGxzcy1kZXYtcGV0dWNrZXQuc3RhbmZvcmQu
|
10
|
+
ZWR1MSQwIgYJKoZIhvcNAQkBFhVwZXR1Y2tldEBzdGFuZm9yZC5lZHUwggEiMA0G
|
11
|
+
CSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQC3cqsXN6QQIMD/yqKNI+BFtPBrhV1F
|
12
|
+
hRqenXUrqDRhIE6o0WVolJC4pBVXMXZksk/cnsDkb/PrD2JZH4YTS6+B51qRvScg
|
13
|
+
cyqioPOJnPNRowogNUwkDiR4OGdKIbdRyYG+SgDuMWN/it7TqtG92KJm78imQS6S
|
14
|
+
wOtP8AnqOveMHEdmAzcANGTHCLF8SNxNqGgedXLWfpi4MSYI1io0PCA/gtrotrsL
|
15
|
+
xcwOfdkUrImaa0Og/Jyp/GAq6uveYangt3Ox3GLyyToSK4/FJXwxba9+OqR0U2MZ
|
16
|
+
qiFbXkTzGzLbx+xhfkG5Qe1eR3u1JigSjS4z3rUmvPz+MIQVQX9ZdAThAgMBAAEw
|
17
|
+
DQYJKoZIhvcNAQEFBQADggIBAH0u9ZVNGCXO6a77hTIO6vjJ0MoWzJNY4j+47Dl9
|
18
|
+
2hhDoVtw7VtV5/mKVKAiQB+Gbz/NIfkqfPgJEwyC5vr4330wIC2dMuGNFnSxGTKz
|
19
|
+
PlkZAWGUqpkfucPISwPXRgbQIMghRy+EZ05ayv1w+HlV9QGj+hbOt92jL/e1yCpH
|
20
|
+
Fd3I/7Ui26vrHqx+5Hg2d4gT2YGHTKBy8LakuoN59fw8sb+Gk0Xp/0pZMD+Sgl6T
|
21
|
+
db0HOH4lcC3qG0ZfrNJ2BwDUnzbt8cruc98iu5obnmSK39ezKsSWx6leHzWIQLLT
|
22
|
+
guNGOpbWJrNfF/VXpH9t0Q/xd0vZsOWSUkfHpd02PCBFRIWUv6UCldsDByP4IKHE
|
23
|
+
bwNa3STPwIWKq2SGE+qGkY5P6t7zqPZ+SFl4kOXUWNuspSY8v5dKFyfFexaX6p6S
|
24
|
+
bRRK5CoZq3jvxvHk88VQPTli0EP12r4SSG19UU43Twqqqd2CEW7woL3Z/OPws047
|
25
|
+
jV/e8cHA7goo5d9RKwyz/7zivUWqidnp7SeL5/YQRY2bwWOcS/y49Dmi0+FQOJCw
|
26
|
+
wjDDUv6Z+SR3NmbGtc0dIroTIWxvS7otIa+dXnH+ubrGAlbUvT1NAeO9mdX9m/qh
|
27
|
+
YHm8oRVyJD12Hylc5pmFEBbV02Lzc/D4mB3oNtSVvhNfoTZfyKqwA+kAPol6HDIb
|
28
|
+
vJi3
|
29
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,18 @@
|
|
1
|
+
-----BEGIN CERTIFICATE REQUEST-----
|
2
|
+
MIIC6DCCAdACAQAwgaIxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9ybmlh
|
3
|
+
MREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQgVW5pdmVyc2l0
|
4
|
+
eTEnMCUGA1UEAxMeZGxzcy1kZXYtcGV0dWNrZXQuc3RhbmZvcmQuZWR1MSQwIgYJ
|
5
|
+
KoZIhvcNAQkBFhVwZXR1Y2tldEBzdGFuZm9yZC5lZHUwggEiMA0GCSqGSIb3DQEB
|
6
|
+
AQUAA4IBDwAwggEKAoIBAQC3cqsXN6QQIMD/yqKNI+BFtPBrhV1FhRqenXUrqDRh
|
7
|
+
IE6o0WVolJC4pBVXMXZksk/cnsDkb/PrD2JZH4YTS6+B51qRvScgcyqioPOJnPNR
|
8
|
+
owogNUwkDiR4OGdKIbdRyYG+SgDuMWN/it7TqtG92KJm78imQS6SwOtP8AnqOveM
|
9
|
+
HEdmAzcANGTHCLF8SNxNqGgedXLWfpi4MSYI1io0PCA/gtrotrsLxcwOfdkUrIma
|
10
|
+
a0Og/Jyp/GAq6uveYangt3Ox3GLyyToSK4/FJXwxba9+OqR0U2MZqiFbXkTzGzLb
|
11
|
+
x+xhfkG5Qe1eR3u1JigSjS4z3rUmvPz+MIQVQX9ZdAThAgMBAAGgADANBgkqhkiG
|
12
|
+
9w0BAQUFAAOCAQEAdAVri6K2jyMcAJDWohxGVld7HU2ejhN1tx9+HSroK1+7f2LX
|
13
|
+
R4i06NLZI0qJA92cd5sC7T5KFG3v1Ad5gPcZfkhmH8uL0v/qNkx/vvZgF9vlUf+L
|
14
|
+
5JEyqzsMIxcRCC9gujsk9ha7oigFWbf1AxNt1KSDcIIID7nm+Tl7b/kSoOTK5z8j
|
15
|
+
/Pg8CL54paNtRQ8TDtlvdbziPn4J/Zopx0s5lpgV/pLaSkq+GPih+eV2ST1fpFzu
|
16
|
+
RQNQVZ3fa2W3Jz9m6vAtWZP1Ht7ZnLYTdSIJOo0Z2mBjcDE86JqF8bbWYt4THAgv
|
17
|
+
DIEKxWpGWz7rmTJJ5DStxFmUK6135FKatnAT4w==
|
18
|
+
-----END CERTIFICATE REQUEST-----
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEogIBAAKCAQEAt3KrFzekECDA/8qijSPgRbTwa4VdRYUanp11K6g0YSBOqNFl
|
3
|
+
aJSQuKQVVzF2ZLJP3J7A5G/z6w9iWR+GE0uvgedakb0nIHMqoqDziZzzUaMKIDVM
|
4
|
+
JA4keDhnSiG3UcmBvkoA7jFjf4re06rRvdiiZu/IpkEuksDrT/AJ6jr3jBxHZgM3
|
5
|
+
ADRkxwixfEjcTahoHnVy1n6YuDEmCNYqNDwgP4La6La7C8XMDn3ZFKyJmmtDoPyc
|
6
|
+
qfxgKurr3mGp4Ldzsdxi8sk6EiuPxSV8MW2vfjqkdFNjGaohW15E8xsy28fsYX5B
|
7
|
+
uUHtXkd7tSYoEo0uM961Jrz8/jCEFUF/WXQE4QIDAQABAoIBAGZR9Q/sHvxH6J5D
|
8
|
+
ncrvecYnl/nA1zdReHmEBbimByEtbfJHaTKduuLh0m1hz1F3C4hYm+pOb1RqrkZb
|
9
|
+
iOL2Uhw4uJGVWV+GHP+8mlnlSun78Efqsl9h7AGKJEJ6788Uf+NtT3uL3J1lDcgt
|
10
|
+
/PLRBDQ6BkaFEL8WD6n0jvMwlKZ2pLOsYaMx29vPVpcf/zL2B4CWr+jsm38OMRNk
|
11
|
+
WsQ0aA1XPZuJC/iS8Ky/ccvOLt3BlVVh62/L776XrKpXzAi9O/u3clak3Sel1rxt
|
12
|
+
NnTrN+hacsQp4gS1qPiKF656b6WG1tQ29r5rUMPqNltPjmVTe4m5S16NoRv/IEFQ
|
13
|
+
9thtEAECgYEA7WSSNiwbDgXRygEIRAP4M26Bvv8EQ29i7mnv5RnHObiD1y5eu/qQ
|
14
|
+
E5/VULqYcHR9C3qpDqdfFf9IVg0CjeuFatG85Jd15vDWtk5RErxLq005qzUsC0o8
|
15
|
+
AsCurdb0r6zOo5iWyjk8JwT/LAJ8Tg4JDGARcZnHk9LBbDI8i/FAvqECgYEAxdOo
|
16
|
+
9viFFblcwu9Oua/i67VNGocBgjTHNof15nhnu4Am3vR3g8wRBzjUcJLjxT+kxlMf
|
17
|
+
/YwfUSDIs9yviGv2kj8M3UPtCQ8vkzRwPnhbT9gvWxtnc0XxYNq7IVZ8x1cZeBsf
|
18
|
+
8vH6/tCnjgfsN6HP3DSqiJ5cqAjECsJq0fo03kECgYBAIs3FyQC+NyBIvSKojZH/
|
19
|
+
AzoWifty5KML2p8vfFlw5MLp3eNGUhme063kE6WfrDkkYs1N4jY0UTYP2Y/5G8p9
|
20
|
+
45BvCeSWsjawJlSNBUZET6bm9ISjwDiaXchTuyF8XOmvFUiX9gKkYBs4nqtKw0v6
|
21
|
+
hfHwiSV8cJJFUwU8ob9mQQKBgAh8MqQdNsAeyj7GOu81/xqzFRKNNeBa2Syamk5/
|
22
|
+
XZuqPICVpcauaxCPPHVzp3dfanbjO90JNJKrQFCOp6zHTLUrJScccb9Qum6q8iGL
|
23
|
+
0gbTs/xJaZ+FIXxRBXPBnOqD7uC68Rzfii+BzZ4G8vfT5fGBBMuFV14Rui7n9eL5
|
24
|
+
w2jBAoGAbh77B0kzLngbs+NmTfwjnYw5qYqwFPAYPYcu0w1wF8oTD38U8FqJ/6LG
|
25
|
+
oKaszyYODurPox81kJplNukEmSCDto1i6DJ71i8HcCfitEFXua28WD1+5Wn4o9CS
|
26
|
+
AOxLn8jHa7K6lmXZm2hgjWcSI9VGp5En79pGzrtO/d+OswVIJEc=
|
27
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1,29 @@
|
|
1
|
+
-----BEGIN CERTIFICATE-----
|
2
|
+
MIIE+jCCAuICCQDiT+2CJW52sTANBgkqhkiG9w0BAQUFADCBuTELMAkGA1UEBhMC
|
3
|
+
VVMxEzARBgNVBAgTCkNhbGlmb3JuaWExETAPBgNVBAcTCFN0YW5mb3JkMRwwGgYD
|
4
|
+
VQQKExNTdGFuZm9yZCBVbml2ZXJzaXR5MRIwEAYDVQQLEwlMaWJyYXJpZXMxHzAd
|
5
|
+
BgNVBAMTFlNVTCBET1IgcHJvZCBhY2Nlc3MgQ0ExLzAtBgkqhkiG9w0BCQEWIHN1
|
6
|
+
bC13ZWJtYXN0ZXJAbGlzdHMuc3RhbmZvcmQuZWR1MB4XDTEyMTAwODE3MDk1NVoX
|
7
|
+
DTIyMTAwNjE3MDk1NVowgcMxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxpZm9y
|
8
|
+
bmlhMREwDwYDVQQHEwhTdGFuZm9yZDEcMBoGA1UEChMTU3RhbmZvcmQgVW5pdmVy
|
9
|
+
c2l0eTESMBAGA1UECxMJTGlicmFyaWVzMScwJQYDVQQDEx5kbHNzLWRldi1wZXR1
|
10
|
+
Y2tldC5zdGFuZm9yZC5lZHUxMTAvBgkqhkiG9w0BCQEWImRsc3MtZGV2ZWxvcGVy
|
11
|
+
c0BsaXN0cy5zdGFuZm9yZC5lZHUwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEK
|
12
|
+
AoIBAQDO3bOG2i4DZNnPTt2C6fFM3znmqHIW/n771ntWTzS8k01REksYPlxBNZ3t
|
13
|
+
M+aZFy/2lEv7PMMNg2VDDn1TRJd0hy87VW7QOTYTo1SCo2AYgn+qOnujSGqU+RRn
|
14
|
+
pM4xTGBnF5BGSXfAi++iMJyyQngF3nev5jAcy9SrwtpXrV4JyNl6LtmodtjBi/3k
|
15
|
+
LO6KY9Uc9T8zRcuiC/5zidM1+aymfoymG295aVDc+JsghjWm/UoE+Nvs20zfi+5a
|
16
|
+
JB3iL+3RyUr2Hh3N4zdxR6dar/Ivy5WfPTEmtkqiSnnhdDX6fE4f+4P3ewn7bbZN
|
17
|
+
LrH2T5Bm4W64bPsnUPP1evgidZ0LAgMBAAEwDQYJKoZIhvcNAQEFBQADggIBAJIZ
|
18
|
+
bdwEJQEOKAruCvCwxFNXQUUPzJiuYqlJ61+4Vhs7JugORo+DgNTYL/JkZ6dCR/uj
|
19
|
+
4W0TQyBtA1GtfUYvcXCrvQl51YTMAODkoWNlkP/xaHx02twIoZDsGSVAVZryP0ae
|
20
|
+
OzToLSvj+a1OvRS3YX/CO+Gq5t2//kCYrI1h6d/41PjWBRD2A2NWJrBiIj62W1qJ
|
21
|
+
muY1YvSiNZ27Pwjp0fA6QwpFY+AxUAei6jKQcUCp6q3wlFaVgMS4SKtIC/rNAAc3
|
22
|
+
2aN2dlk6u81wjKQqMKXzWhwxTqEPQAmxoP8oJVxRwh1gxoBEAbLxse76Cc9+eISn
|
23
|
+
CG0RF+bku3ceGrNYWQHGu8xOXAexM77WFSIVrtYJ2Tf/P+un8J+fvb3U8I5hOkGK
|
24
|
+
/yMIxRfpYyOx8Qg3IJ6ci6Frg2Jn1Csv7RR8vXgRqWDRrYpeRdm8VjO/MkozGp3X
|
25
|
+
r7y8hmoacnaOAcPV+KCMQ4zCobFEfxpIlajNgb4ZJhA4/ZcHlnXCr51n/A3FTLdG
|
26
|
+
MR4D2JWw9oKDrf9317IomWQd6B8/+MzBX+vFteq0xQPHVJcCh48NuRkJomfy+m2q
|
27
|
+
nMgxRTeRIN0VNFrhOxarv+Xiw9BoBAdKd1JbZX4uPVFs+DdkAcZC8aJRnmsowwfG
|
28
|
+
C5+Fxxdx+ucfga5QSZui4uyIXlx1nAy+eeTPwmDc
|
29
|
+
-----END CERTIFICATE-----
|
@@ -0,0 +1,27 @@
|
|
1
|
+
-----BEGIN RSA PRIVATE KEY-----
|
2
|
+
MIIEpQIBAAKCAQEAzt2zhtouA2TZz07dgunxTN855qhyFv5++9Z7Vk80vJNNURJL
|
3
|
+
GD5cQTWd7TPmmRcv9pRL+zzDDYNlQw59U0SXdIcvO1Vu0Dk2E6NUgqNgGIJ/qjp7
|
4
|
+
o0hqlPkUZ6TOMUxgZxeQRkl3wIvvojCcskJ4Bd53r+YwHMvUq8LaV61eCcjZei7Z
|
5
|
+
qHbYwYv95CzuimPVHPU/M0XLogv+c4nTNfmspn6MphtveWlQ3PibIIY1pv1KBPjb
|
6
|
+
7NtM34vuWiQd4i/t0clK9h4dzeM3cUenWq/yL8uVnz0xJrZKokp54XQ1+nxOH/uD
|
7
|
+
93sJ+222TS6x9k+QZuFuuGz7J1Dz9Xr4InWdCwIDAQABAoIBAQCSt1jJrtptm8yD
|
8
|
+
JKskW2nBnJzDQ/rO5icH1EHboAeGK27trezGwAvMUAu3HVVShMiGuPz+rkSkw+lA
|
9
|
+
2vj14rMMeYh9K4WRdtIssW2Rze+s0nlbMWlZEFZPXC0lqRR4kHPbCjJQN3EQhe8q
|
10
|
+
eBHauBvKBdObVMYQ1lv6ihMzlgkZJCtRdwn6DqiN2kkFkHx4mhWoMadYA6xBwN4S
|
11
|
+
+YM5O1KwC9nUgRpLFSM8D8fBANzI6takkVDQ6QaJJ11dsur5RE9BsFzl+Op7Evzu
|
12
|
+
+zCisC17ZUn07YVvGeTUkIwTk0aeu3HCX83WM8jmg02ijtwqf6pdlLMJ8G8MQURe
|
13
|
+
siKh1ZP5AoGBAP5ZJrZ/UcGFR1XLeL6WmgljlF26LQzy/DHMBbWMYpTrwfaxk/sK
|
14
|
+
o8wTuVebJGhuffTgYU2VWJ5at7AMasOP6IAT2nP2KvcoCmvG8u3BCTkck57Vde5H
|
15
|
+
86bJ88z6TEzhrElDMjmKx7gEb2P6RIKnDcNdduaR6DE6qJOBJ5F5W3KlAoGBANA1
|
16
|
+
nKBEFEXJ4Cuw6OrJeyrgu/aCLFKus/orlfLPHFQAvFJzpqmCONz5H/Wcf+m6uMeR
|
17
|
+
MQ6V705h2y+FUmwufpFyqCVunC1zJu6mZG9TNEjXzyFBnb4jcEjsMm6DCrVA6zOx
|
18
|
+
3iWd+rLNxIpN3fhskzclNnhn+WhGo7xktuIrVDHvAoGBAPLWVVLKTllQkWIFaRu2
|
19
|
+
GA08yMuP1DFX0JcOrqi+BuUeDkslEh8N8oMGld9hnSojzBg/Hkd/fmN6Q4RO5qQe
|
20
|
+
QqH90oUCk9Tzordx9EAxHEgt03dDYFwG0Eb+68lZc/23PNGZ2Vr8+F/lxCAVMtH3
|
21
|
+
Avnyw3Gx/pj54zcpiYin8DqNAoGBAKSqcdfSX9Id6ZvES0E83Zs4p486vkEaCB8H
|
22
|
+
j4y7veS1vDrdWmbfJYelw1/lSMiaMv8qVgj6DYwJGmdH4rrKPrFbY55PD1dmpdjC
|
23
|
+
YdYlkMk3XIopsc6pimkx3GTIYJSe5iU5O762ZYo58IGNOcr6W6eWV7D8UiTlESOy
|
24
|
+
52yR5gGjAoGALfzgCSIAVlOli3a7m3aMWUtGhp+sVi7jGLE9NHTwFXnkYEoXmR+v
|
25
|
+
5CIvK8IzwtATEomoAa2GKGek8MSE+H1/o+SrGL9PIATnzuEZeJOIMnGa5mO26a9/
|
26
|
+
eV2Qud4v/7qD2P2VnCVYaAMYqS6l0SxB11/UhuQiWdpITxy44CK1Jk8=
|
27
|
+
-----END RSA PRIVATE KEY-----
|
@@ -0,0 +1,66 @@
|
|
1
|
+
cert_dir = File.join(File.dirname(__FILE__), "certs")
|
2
|
+
|
3
|
+
Dor::Config.configure do
|
4
|
+
|
5
|
+
fedora do
|
6
|
+
url 'https://sul-dor-test.stanford.edu/fedora'
|
7
|
+
end
|
8
|
+
|
9
|
+
ssl do
|
10
|
+
cert_file File.join(cert_dir,"dlss-dev-petucket-dor-dev.crt")
|
11
|
+
key_file File.join(cert_dir,"dlss-dev-petucket-dor-dev.key")
|
12
|
+
key_pass ''
|
13
|
+
end
|
14
|
+
|
15
|
+
sdr do
|
16
|
+
url 'http://localhost'
|
17
|
+
local_workspace_root '/dor/workspace'
|
18
|
+
local_export_home '/dor/export'
|
19
|
+
end
|
20
|
+
|
21
|
+
suri do
|
22
|
+
mint_ids true
|
23
|
+
id_namespace 'druid'
|
24
|
+
url 'http://sul-lyberservices-test.stanford.edu'
|
25
|
+
user 'labware'
|
26
|
+
pass 'lyberteam'
|
27
|
+
end
|
28
|
+
|
29
|
+
solr.url 'https://sul-solr-tester.stanford.edu/argo_stage'
|
30
|
+
workflow.url 'https://sul-lyberservices-test.stanford.edu/workflow/'
|
31
|
+
|
32
|
+
purl do
|
33
|
+
base_url 'https://purl-test.stanford.edu/'
|
34
|
+
end
|
35
|
+
|
36
|
+
remediation do
|
37
|
+
check_for_versioning_required false # this MUST be true in production; can be false in development and test if you want to ignore workflow checks
|
38
|
+
check_for_in_accessioning false # this MUST be true in production; can be false in development and test if you want to ignore workflow checks
|
39
|
+
end
|
40
|
+
|
41
|
+
dor do
|
42
|
+
service_root 'https://dorAdmin:dorAdmin@sul-lyberservices-test.stanford.edu/dor/v1'
|
43
|
+
num_attempts 3 # the number of attempts to contact the dor web service before throwing an exception
|
44
|
+
sleep_time 2 # sleep time in seconds between attempts to contact the dor service
|
45
|
+
default_label 'Untitled' # the default label for an object that is registered when no label is provided in the manifest
|
46
|
+
end
|
47
|
+
|
48
|
+
content do
|
49
|
+
content_user 'lyberadmin'
|
50
|
+
content_base_dir '/dor/workspace/'
|
51
|
+
content_server 'lyberservices-test'
|
52
|
+
end
|
53
|
+
status do
|
54
|
+
indexer_url 'http://sulstats-raw.stanford.edu//render/?format=json&from=-1minute&until=now&target=stats.gauges.dor-prod.argo.reindexqueue.queue-size.count'
|
55
|
+
end
|
56
|
+
stacks do
|
57
|
+
document_cache_storage_root '/home/lyberadmin/document_cache'
|
58
|
+
document_cache_host 'purl-test.stanford.edu'
|
59
|
+
document_cache_user 'lyberadmin'
|
60
|
+
local_workspace_root '/dor/workspace'
|
61
|
+
storage_root '/stacks'
|
62
|
+
host 'stacks-test.stanford.edu'
|
63
|
+
user 'lyberadmin'
|
64
|
+
end
|
65
|
+
|
66
|
+
end
|
@@ -3,6 +3,10 @@ module Dor
|
|
3
3
|
extend ActiveSupport::Concern
|
4
4
|
include SolrDocHelper
|
5
5
|
|
6
|
+
# ids for previous and current catkeys
|
7
|
+
CATKEY_TYPE_ID = 'catkey'.freeze
|
8
|
+
PREVIOUS_CATKEY_TYPE_ID = 'previous_catkey'.freeze
|
9
|
+
|
6
10
|
included do
|
7
11
|
has_metadata :name => 'DC', :type => SimpleDublinCoreDs, :label => 'Dublin Core Record for self object'
|
8
12
|
has_metadata :name => 'identityMetadata', :type => Dor::IdentityMetadataDS, :label => 'Identity Metadata'
|
@@ -87,6 +91,37 @@ module Dor
|
|
87
91
|
alias_method :set_source_id, :source_id=
|
88
92
|
deprecate set_source_id: 'Use source_id= instead'
|
89
93
|
|
94
|
+
# Convenience method to get the current catkey
|
95
|
+
# @return [String] current catkey value (or nil if none found)
|
96
|
+
def catkey
|
97
|
+
identityMetadata.otherId(CATKEY_TYPE_ID).first
|
98
|
+
end
|
99
|
+
|
100
|
+
# Convenience method to set the catkey
|
101
|
+
# @param [String] catkey the new source identifier
|
102
|
+
# @return [String] same value, as per Ruby assignment convention
|
103
|
+
def catkey=(val)
|
104
|
+
|
105
|
+
# try and grab the current and previous catkeys
|
106
|
+
current_catkey = catkey
|
107
|
+
|
108
|
+
# if there is no current catkey, then add it and we are done
|
109
|
+
if current_catkey.blank?
|
110
|
+
add_other_Id(CATKEY_TYPE_ID,val)
|
111
|
+
elsif val != current_catkey # if there is a current catkey, store that in the "previous" spot assuming there is no change
|
112
|
+
identityMetadata.add_otherId("#{PREVIOUS_CATKEY_TYPE_ID}:#{current_catkey}")
|
113
|
+
# and then update the current catkey to the new value
|
114
|
+
update_other_Id(CATKEY_TYPE_ID,val)
|
115
|
+
end
|
116
|
+
val
|
117
|
+
end
|
118
|
+
|
119
|
+
# Convenience method to get the previous catkeys (will be an array)
|
120
|
+
# @return [Array] previous catkey values (empty array if none found)
|
121
|
+
def previous_catkeys
|
122
|
+
identityMetadata.otherId(PREVIOUS_CATKEY_TYPE_ID)
|
123
|
+
end
|
124
|
+
|
90
125
|
def add_other_Id(type, val)
|
91
126
|
if identityMetadata.otherId(type).length > 0
|
92
127
|
raise 'There is an existing entry for ' + type + ', consider using update_other_Id().'
|
@@ -204,7 +239,7 @@ module Dor
|
|
204
239
|
# @return [String] the druid sans the druid: or if there was no druid: prefix, the entire string you passed
|
205
240
|
def remove_druid_prefix(druid=id)
|
206
241
|
result=druid.match(/#{pid_regex}/)
|
207
|
-
result.nil? ? druid : result[0] # if no matches, return the string passed in, otherwise return the match
|
242
|
+
result.nil? ? druid : result[0] # if no matches, return the string passed in, otherwise return the match
|
208
243
|
end
|
209
244
|
|
210
245
|
# Override ActiveFedora::Core#adapt_to_cmodel (used with associations, among other places) to
|
data/lib/dor/version.rb
CHANGED
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: dor-services
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 5.22.
|
4
|
+
version: 5.22.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Michael Klein
|
@@ -14,7 +14,7 @@ authors:
|
|
14
14
|
autorequire:
|
15
15
|
bindir: bin
|
16
16
|
cert_chain: []
|
17
|
-
date: 2017-02-
|
17
|
+
date: 2017-02-28 00:00:00.000000000 Z
|
18
18
|
dependencies:
|
19
19
|
- !ruby/object:Gem::Dependency
|
20
20
|
name: active-fedora
|
@@ -588,7 +588,13 @@ extensions: []
|
|
588
588
|
extra_rdoc_files: []
|
589
589
|
files:
|
590
590
|
- config/certs/README
|
591
|
+
- config/certs/dlss-dev-petucket-dor-dev.crt
|
592
|
+
- config/certs/dlss-dev-petucket-dor-dev.csr
|
593
|
+
- config/certs/dlss-dev-petucket-dor-dev.key
|
594
|
+
- config/certs/dlss-dev-petucket-dor-prod.crt
|
595
|
+
- config/certs/dlss-dev-petucket-dor-prod.key
|
591
596
|
- config/config_defaults.yml
|
597
|
+
- config/dev_console_env.rb
|
592
598
|
- config/dev_console_env.rb.example
|
593
599
|
- config/predicate_mappings.yml
|
594
600
|
- lib/dor-services.rb
|
@@ -682,8 +688,9 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
682
688
|
version: 1.3.6
|
683
689
|
requirements: []
|
684
690
|
rubyforge_project:
|
685
|
-
rubygems_version: 2.6.
|
691
|
+
rubygems_version: 2.6.10
|
686
692
|
signing_key:
|
687
693
|
specification_version: 4
|
688
694
|
summary: Ruby implmentation of DOR services used by the SULAIR Digital Library
|
689
695
|
test_files: []
|
696
|
+
has_rdoc:
|