
This fix provides to Synergy a security mechanism highly configurable. The security policies are pluggable so that it is possible to define any kind of authorization checks. This commit includes a very simple authorization plugin (i.e. synergy.auth.plugin.LocalHostAuthorization) which denies any command coming from clients having IP address different from the Synergy's one. Bug: #1691352 Change-Id: I2535b2a3edeea5e56cd8918d01070a6f8a534c3e Sem-Ver: bugfix
43 lines
784 B
Plaintext
43 lines
784 B
Plaintext
[DEFAULT]
|
|
|
|
|
|
[Logger]
|
|
# set the logging file name
|
|
filename = /var/log/synergy/synergy.log
|
|
|
|
# set the logging level. Valid values are: CRITICAL, ERROR, WARNING, INFO, DEBUG, NOTSET.
|
|
level = INFO
|
|
|
|
# set the format of the logged messages
|
|
formatter = "%(asctime)s - %(name)s - %(levelname)s - %(message)s"
|
|
|
|
# set the max file size
|
|
maxBytes = 1048576
|
|
|
|
# set the logging rotation threshold
|
|
backupCount = 100
|
|
|
|
|
|
[WSGI]
|
|
# set the Synergy hostname
|
|
host = SYNERGY_HOST
|
|
|
|
# set the WSGI port (default: 8051)
|
|
port = 8051
|
|
|
|
# set the number of threads
|
|
threads = 2
|
|
|
|
# set the SSL
|
|
use_ssl = False
|
|
#ssl_ca_file =
|
|
#ssl_cert_file =
|
|
#ssl_key_file =
|
|
max_header_line = 16384
|
|
retry_until_window = 30
|
|
tcp_keepidle = 600
|
|
backlog = 4096
|
|
|
|
[Authorization]
|
|
# plugin = synergy.auth.plugin.LocalHostAuthorization
|