# to generete adminuser password hash: # python3 -c 'from hashlib import md5;print(md5("????password???".encode("UTF-8")).hexdigest())' [ftpserver] firstPort = 40000 logFilename = ./ftppylog.log proxyAddr = 0.0.0.0 portRangeWidth = 500 virtpath = /home/alex/aseftp/ adminuser = admin|83e61ecb0e9871aff37a12491aa848f884f5657ddbfd46454878e28afbecfc20|/home/alex/aseftp/|elradfmwMT servertype = FTPHandler certfile = /home/alex/aseftp/keycert.pem fileext = .CSV|.TXT defaultUserPerm = elmw #servertype = FTPHandler/TLS_FTPHandler [csvfs] path = /home/alex/aseftp/csvfs/ [csvelab] logFilename = csvElab.log [db] hostname = 10.211.114.101 port = 5432 user = asepg password = batt1l0 dbName = asedb dbSchema = public userTableName = virtusers recTableName = received rawTableName = dataraw [unit] Types = G801|G201|G301|G802|D2W|GFLOW|CR1000X|TLP|GS1 Names = ID[0-9]{4}|IX[0-9]{4} [tool] Types = MUX|MUMS|MODB|IPTM|MUSA|LOC|GD|D2W|CR1000X|G301|NESA Names = LOC[0-9]{4}|DT[0-9]{4}|GD[0-9]{4}|[0-9]{18}|measurement [csv] Infos = IP|Subnet|Gateway