# to generete adminuser password hash: # python3 -c 'from hashlib import sha256;print(sha256("????password???".encode("UTF-8")).hexdigest())' [ftpserver] firstPort = 40000 logFilename = ./ftppylog.log proxyAddr = 0.0.0.0 portRangeWidth = 500 virtpath = /home/alex/aseftp/ adminuser = admin|87b164c8d4c0af8fbab7e05db6277aea8809444fb28244406e489b66c92ba2bd|/home/alex/aseftp/|elradfmwMT servertype = FTPHandler certfile = /home/alex/aseftp/keycert.pem fileext = .CSV|.TXT defaultUserPerm = elmw #servertype = FTPHandler/TLS_FTPHandler [csvfs] path = /home/alex/aseftp/csvfs/ [csvelab] logFilename = csvElab.log max_threads = 10 [db] hostname = 10.211.114.173 port = 3306 user = root password = batt1l0 dbName = ase_lar userTableName = virtusers recTableName = received rawTableName = RAWDATACOR nodesTableName = nodes [unit] Types = G801|G201|G301|G802|D2W|GFLOW|CR1000X|TLP|GS1|HORTUS Names = ID[0-9]{4}|IX[0-9]{4} [tool] Types = MUX|MUMS|MODB|IPTM|MUSA|LOC|GD|D2W|CR1000X|G301|NESA|GS1|G201|TLP|DSAS|HORTUS Names = LOC[0-9]{4}|DT[0-9]{4}|GD[0-9]{4}|[0-9]{18}|measurement [csv] Infos = IP|Subnet|Gateway