Welcome to Lumache’s documentation!

Lumache (/lu’make/) is a Python library for cooks and food lovers that creates recipes mixing random ingredients. It pulls data from the Open Food Facts database and offers a simple and intuitive API. Lumache has its documentation hosted on Read the Docs.

Check out the Usage section for further information, including how to Installation the project.

Note

This project is under active development.

Property name

Type

Default value / mandatory

Description

container.security. truststore.allowProxy

[ALLOW, DENY]

ALLOW

Controls whether proxy certificates are supported.

container.security. truststore.type

[keystore, openssl, directory]

mandatory to be set

The truststore type.

container.security. truststore. updateInterval

integer number

600

How often the truststore should be reloaded, in seconds. Set to negative value to disable refreshing at runtime. (runtime updateable)

container.security. truststore. directoryConnectionTimeout

integer number

15

Connection timeout for fetching the remote CA certificates in seconds.

container.security. truststore. directoryDiskCachePath

filesystem path

-

Directory where CA certificates should be cached, after downloading them from a remote source. Can be left undefined if no disk cache should be used. Note that directory should be secured, i.e. normal users should not be allowed to write to it.

container.security. truststore. directoryEncoding

[PEM, DER]

PEM

For directory truststore controls whether certificates are encoded in PEM or DER. Note that the PEM file can contain arbitrary number of concatenated, PEM-encoded certificates.

container.security. truststore. directoryLocations.*

list of properties with a common prefix

-

List of CA certificates locations. Can contain URLs, local files and wildcard expressions. (runtime updateable)

container.security. truststore. keystoreFormat

string

-

The keystore type (jks, pkcs12) in case of truststore of keystore type.

container.security. truststore. keystorePassword

string

-

The password of the keystore type truststore.

container.security. truststore.keystorePath

string

-

The keystore path in case of truststore of keystore type.

container.security. truststore. opensslNewStoreFormat

[true, false]

false

In case of openssl truststore, specifies whether the trust store is in openssl 1.0.0+ format (true) or older openssl 0.x format (false)

container.security. truststore.opensslNsMode

[GLOBUS_EUGRIDPMA, EUGRIDPMA_GLOBUS, GLOBUS, EUGRIDPMA, GLOBUS_EUGRIDPMA_ REQUIRE, EUGRIDPMA_ GLOBUS_REQUIRE, GLOBUS_REQUIRE, EUGRIDPMA_REQUIRE, EUGRIDPMA_AND_ GLOBUS, EUGRIDPMA_ AND_GLOBUS_REQUIRE, IGNORE]

EUGRIDPMA_GLOBUS

In case of openssl truststore, controls which (and in which order) namespace checking rules should be applied. The REQUIRE settings will cause that all configured namespace definitions files must be present for each trusted CA certificate (otherwise checking will fail). The AND settings will cause to check both existing namespace files. Otherwise the first found is checked (in the order defined by the property).

container.security. truststore.opensslPath

filesystem path

/etc/grid- security/certificates

Directory to be used for opeenssl truststore.

container.security. truststore. crlConnectionTimeout

integer number

15

Connection timeout for fetching the remote CRLs in seconds (not used for Openssl truststores).

container.security. truststore. crlDiskCachePath

filesystem path

-

Directory where CRLs should be cached, after downloading them from remote source. Can be left undefined if no disk cache should be used. Note that directory should be secured, i.e. normal users should not be allowed to write to it. Not used for Openssl truststores.

container.security. truststore.crlLocations. *

list of properties with a common prefix

-

List of CRLs locations. Can contain URLs, local files and wildcard expressions. Not used for Openssl truststores. (runtime updateable)

container.security. truststore.crlMode

[REQUIRE, IF_VALID, IGNORE]

IF_VALID

General CRL handling mode. The IF_ VALID setting turns on CRL checking only in case the CRL is present.

container.security. truststore. crlUpdateInterval

integer number

600

How often CRLs should be updated, in seconds. Set to negative value to disable refreshing at runtime. (runtime updateable)

container.security. truststore.ocspCacheTtl

integer number

3600

For how long the OCSP responses should be locally cached in seconds (this is a maximum value, responses won’t be cached after expiration)

container.security. truststore.ocspDiskCache

filesystem path

-

If this property is defined then OCSP responses will be cached on disk in the defined folder.

container.security. truststore. ocspLocalResponders. <NUMBER>

list of properties with a common prefix

-

Optional list of local OCSP responders

container.security. truststore.ocspMode

[REQUIRE, IF_ AVAILABLE, IGNORE]

IF_AVAILABLE

General OCSP ckecking mode. REQUIRE should not be used unless it is guaranteed that for all certificates an OCSP responder is defined.

container.security. truststore.ocspTimeout

integer number

10000

Timeout for OCSP connections in miliseconds.

container.security. truststore. revocationOrder

[CRL_OCSP, OCSP_ CRL]

OCSP_CRL

Controls overal revocation sources order

container.security. truststore. revocationUseAll

[true, false]

false

Controls whether all defined revocation sources should be always checked, even if the first one already confirmed that a checked certificate is not revoked.

Hallo

Contents