help:
@echo "make [ all | setup | clean | distclean ]"
@echo " [ check | check-js | phantomjs ]"
+ @echo "If 'make check' timeout is too short, extend with: make check PHANTOMJS_TIMEOUT=40"
<VirtualHost *:80>
ServerName x.example.indexdata.com
- DocumentRoot /usr/local/src/git/mkws/examples/htdocs/
- Alias /tools/htdocs/ /usr/local/src/git/mkws/tools/htdocs/
- Alias /src/ /usr/local/src/git/mkws/src/
- Alias /jasmine/ /usr/local/src/git/mkws/examples/jasmine/
- Alias /test/ /usr/local/src/git/mkws/test/
+ DocumentRoot /Users/mike/git/work/mkws/examples/htdocs/
+ Alias /tools/htdocs/ /Users/mike/git/work/mkws/tools/htdocs/
+ Alias /src/ /Users/mike/git/work/mkws/src/
+ Alias /jasmine/ /Users/mike/git/work/mkws/examples/jasmine/
+ Alias /test/ /Users/mike/git/work/mkws/test/
<Directory />
Allow from all
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<title>MKWS demo</title>
- <link rel="stylesheet" type="text/css" href="tools/htdocs/mkws.css" />
<script type="text/javascript">
var mkws_config = {
- // For now, we have to provide known-bad credentials to skip user/pw login: see bug MKSP-125
- // Was: //sp-mkws.indexdata.com/service-proxy/?command=auth&action=perconfig&username=XXX&password=XXX
-// pp2_hostname: "sp-mkws.indexdata.com",
-// sp_auth_path: "service-proxy/",
-// sp_auth_query: "command=auth&action=perconfig",
-// sp_auth_credentials: "XXX/XXX",
+// pp2_hostname: "x.sp-mkws.indexdata.com",
};
</script>
+ <link rel="stylesheet" type="text/css" href="tools/htdocs/mkws.css" />
<script type="text/javascript" src="tools/htdocs/jquery-1.10.0.min.js"></script>
<script type="text/javascript" src="tools/htdocs/jquery.json-2.4.js"></script>
<script type="text/javascript" src="tools/htdocs/handlebars-v1.1.2.js"></script>
-node_modules
+libexec
logs/error_log
logs/jasmine-dev
logs/mkws-jasmine-access.log
logs/mkws-jasmine-error.log
logs/mkws-jasmine-rewrite.log
logs/mkws-jasmine.pid
+node_modules
BSD::Resource::setrlimit("RLIMIT_CPU", $timeout, 2*$timeout) or die "Cannot set CPU limit: $!\n";
};
if ($@) {
- warn "Please install the package BSD::Resource!\n\n$@\n";
+ warn "WARNING: things would go more nicely with the BSD::Resource package\n";
}
Include ${APACHE_MODULES}
<IfModule log_config_module>
- LogFormat "%{X-Forwarded-For}i %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" combined
+ # %O only works if mod_logio is enabled, which it isn't on Mike's MacBook
+ # LogFormat "%{X-Forwarded-For}i %l %u %t \"%r\" %>s %O \"%{Referer}i\" \"%{User-Agent}i\"" combined
+ LogFormat "%{X-Forwarded-For}i %l %u %t \"%r\" %>s \"%{Referer}i\" \"%{User-Agent}i\"" combined
</IfModule>
# pazpar2 / service proxy config
Header set Access-Control-Allow-Credentials true
ProxyPreserveHost On
- # We could use any of the following:
- # sp-mkc.indexdata.com/service-proxy/ -- multiplexer
- # sp-mkc-sansa.indexdata.com:8080/service-proxy/ -- 1st back-end server
- # sp-mkc-arya.indexdata.com:8080/service-proxy/ -- 2nd back-end server
- ProxyPass /service-proxy/ http://sp-mkc-sansa.indexdata.com:8080/service-proxy/
- ProxyPassReverse /service-proxy/ http://sp-mkc-sansa.indexdata.com:8080/service-proxy/
+ ProxyPass /service-proxy/ http://sp-mkws-backend.indexdata.com:8080/service-proxy/
+ ProxyPassReverse /service-proxy/ http://sp-mkws-backend.indexdata.com:8080/service-proxy/
PerlOptions +Parent
PerlSwitches -I/home/indexdata/mkws/tools/mod_perl
plugins.authn = com.indexdata.serviceproxy.plugins.AuthNTorusPlugin
plugins.categories = com.indexdata.serviceproxy.plugins.TargetCategoriesPlugin
plugins.ils = com.indexdata.serviceproxy.plugins.ILSPlugin
+plugins.statistics = com.indexdata.serviceproxy.plugins.StatisticsPlugin
# Configuration properties for individual plug-ins
chains.categories = categories
chains.ils = ils
# Map all other commands to the Pazpar2 relayer
-chains.* = relay
+chains.* = relay,statistics
# Just so I can check that this particular SP config is in use