blob: d40c39f59571c67343683ea6a714abc79f5a057f [file] [log] [blame]
# Krill settings
#
krill.indexDir = sample-index
krill.index.commit.count = 134217000
krill.index.commit.log = log/krill.commit.log
krill.index.commit.auto = 500
krill.index.relations.max = 100
# Directory path of virtual corpora to cache
krill.namedVC = vc
krill.test = true
krill.match.max.token=50
krill.context.max.token=60
# LDAP configuration file
#
ldap.config = src/test/resources/test-ldap.conf
# Kustvakt versions
#
# multiple versions comma separated
current.api.version = v1.0
supported.api.versions = v0.1, v1.0
# Server
#
server.port=8089
server.host=localhost
## Cache
cache.total.results.enabled = true
# Default foundries for specific layers (optional)
#
default.foundry.partOfSpeech = tt
default.foundry.lemma = tt
default.foundry.orthography = opennlp
default.foundry.dependency = malt
default.foundry.constituent = corenlp
default.foundry.morphology = marmot
default.foundry.surface = base
# Delete configuration (default hard)
#
# delete.auto.group = hard
#delete.group = soft
delete.group.member = soft
# Virtual corpus and queries
max.user.persistent.queries = 5
max.token.context.size = 40
# Availability regex only support |
# It should be removed/commented when the data doesn't contain availability field.
#
availability.regex.free = CC.*
availability.regex.public = ACA.*|QAO-NC
# The regex should be specific and make the access distinguishable
# availability.regex.all = QAO.*
availability.regex.all = QAO-NC-LOC:ids.*
# options referring to the security module!
# OAuth
# (see de.ids_mannheim.korap.constant.AuthenticationMethod for possible
# oauth.password.authentication values)
#
oauth2.password.authentication = TEST
oauth2.native.client.host = korap.ids-mannheim.de
oauth2.max.attempts = 2
# expiry in seconds (S), minutes (M), hours (H), days (D)
oauth2.access.token.expiry = 3M
oauth2.refresh.token.expiry = 90D
oauth2.authorization.code.expiry = 10M
# -- scopes separated by space
oauth2.default.scopes = search match_info
oauth2.client.credentials.scopes = client_info
oauth2.initial.super.client=true
# see SecureRandom Number Generation Algorithms
# optional
security.secure.random.algorithm=SHA1PRNG
# see MessageDigest Algorithms
# default MD5
security.md.algoritm = SHA-256
# secure hash support: BCRYPT
security.secure.hash.algorithm=BCRYPT
security.encryption.loadFactor = 10
# DEPRECATED
# JWT
security.jwt.issuer=https://korap.ids-mannheim.de
security.sharedSecret=this-is-shared-secret-code-for-JWT-Signing.It-must-contains-minimum-256-bits
# token expiration time
security.longTokenTTL = 1D
security.tokenTTL = 2S
security.shortTokenTTL = 1S
# Session authentication
security.idleTimeoutDuration = 25M
security.multipleLogIn = true
security.loginAttemptNum = 3
security.authAttemptTTL = 45M