Welcome to Lumache’s documentation!
Lumache (/lu’make/) is a Python library for cooks and food lovers that creates recipes mixing random ingredients. It pulls data from the Open Food Facts database and offers a simple and intuitive API. Lumache has its documentation hosted on Read the Docs.
Check out the Usage section for further information, including how to Installation the project.
Note
This project is under active development.
Property name |
Type |
Default value / mandatory |
Description |
---|---|---|---|
container.security. truststore.allowProxy |
[ALLOW, DENY] |
ALLOW |
Controls whether proxy certificates are supported. |
container.security. truststore.type |
[keystore, openssl, directory] |
mandatory to be set |
The truststore type. |
container.security. truststore. updateInterval |
integer number |
600 |
How often the truststore should be reloaded, in seconds. Set to negative value to disable refreshing at runtime. (runtime updateable) |
container.security. truststore. directoryConnectionTimeout |
integer number |
15 |
Connection timeout for fetching the remote CA certificates in seconds. |
container.security. truststore. directoryDiskCachePath |
filesystem path |
- |
Directory where CA certificates should be cached, after downloading them from a remote source. Can be left undefined if no disk cache should be used. Note that directory should be secured, i.e. normal users should not be allowed to write to it. |
container.security. truststore. directoryEncoding |
[PEM, DER] |
PEM |
For directory truststore controls whether certificates are encoded in PEM or DER. Note that the PEM file can contain arbitrary number of concatenated, PEM-encoded certificates. |
container.security. truststore. directoryLocations.* |
list of properties with a common prefix |
- |
List of CA certificates locations. Can contain URLs, local files and wildcard expressions. (runtime updateable) |
container.security. truststore. keystoreFormat |
string |
- |
The keystore type (jks, pkcs12) in case of truststore of keystore type. |
container.security. truststore. keystorePassword |
string |
- |
The password of the keystore type truststore. |
container.security. truststore.keystorePath |
string |
- |
The keystore path in case of truststore of keystore type. |
container.security. truststore. opensslNewStoreFormat |
[true, false] |
false |
In case of openssl truststore, specifies whether the trust store is in openssl 1.0.0+ format (true) or older openssl 0.x format (false) |
container.security. truststore.opensslNsMode |
[GLOBUS_EUGRIDPMA, EUGRIDPMA_GLOBUS, GLOBUS, EUGRIDPMA, GLOBUS_EUGRIDPMA_ REQUIRE, EUGRIDPMA_ GLOBUS_REQUIRE, GLOBUS_REQUIRE, EUGRIDPMA_REQUIRE, EUGRIDPMA_AND_ GLOBUS, EUGRIDPMA_ AND_GLOBUS_REQUIRE, IGNORE] |
EUGRIDPMA_GLOBUS |
In case of openssl truststore, controls which (and in which order) namespace checking rules should be applied. The REQUIRE settings will cause that all configured namespace definitions files must be present for each trusted CA certificate (otherwise checking will fail). The AND settings will cause to check both existing namespace files. Otherwise the first found is checked (in the order defined by the property). |
container.security. truststore.opensslPath |
filesystem path |
/etc/grid- security/certificates |
Directory to be used for opeenssl truststore. |
container.security. truststore. crlConnectionTimeout |
integer number |
15 |
Connection timeout for fetching the remote CRLs in seconds (not used for Openssl truststores). |
container.security. truststore. crlDiskCachePath |
filesystem path |
- |
Directory where CRLs should be cached, after downloading them from remote source. Can be left undefined if no disk cache should be used. Note that directory should be secured, i.e. normal users should not be allowed to write to it. Not used for Openssl truststores. |
container.security. truststore.crlLocations. * |
list of properties with a common prefix |
- |
List of CRLs locations. Can contain URLs, local files and wildcard expressions. Not used for Openssl truststores. (runtime updateable) |
container.security. truststore.crlMode |
[REQUIRE, IF_VALID, IGNORE] |
IF_VALID |
General CRL handling mode. The IF_ VALID setting turns on CRL checking only in case the CRL is present. |
container.security. truststore. crlUpdateInterval |
integer number |
600 |
How often CRLs should be updated, in seconds. Set to negative value to disable refreshing at runtime. (runtime updateable) |
container.security. truststore.ocspCacheTtl |
integer number |
3600 |
For how long the OCSP responses should be locally cached in seconds (this is a maximum value, responses won’t be cached after expiration) |
container.security. truststore.ocspDiskCache |
filesystem path |
- |
If this property is defined then OCSP responses will be cached on disk in the defined folder. |
container.security. truststore. ocspLocalResponders. <NUMBER> |
list of properties with a common prefix |
- |
Optional list of local OCSP responders |
container.security. truststore.ocspMode |
[REQUIRE, IF_ AVAILABLE, IGNORE] |
IF_AVAILABLE |
General OCSP ckecking mode. REQUIRE should not be used unless it is guaranteed that for all certificates an OCSP responder is defined. |
container.security. truststore.ocspTimeout |
integer number |
10000 |
Timeout for OCSP connections in miliseconds. |
container.security. truststore. revocationOrder |
[CRL_OCSP, OCSP_ CRL] |
OCSP_CRL |
Controls overal revocation sources order |
container.security. truststore. revocationUseAll |
[true, false] |
false |
Controls whether all defined revocation sources should be always checked, even if the first one already confirmed that a checked certificate is not revoked. |
Hallo