52 lines
1.4 KiB
JSON
52 lines
1.4 KiB
JSON
{
|
|
"$schema": "http://json-schema.org/draft-07/schema#",
|
|
"$ref": "#/definitions/SettingConfig",
|
|
"definitions": {
|
|
"SettingConfig": {
|
|
"type": "object",
|
|
"properties": {
|
|
"localmode": {
|
|
"type": "boolean",
|
|
"description": "if true, server will bind on '127.0.0.1' rather than '0.0.0.0'"
|
|
},
|
|
"guest": {
|
|
"type": "array",
|
|
"items": {
|
|
"$ref": "#/definitions/Permission"
|
|
},
|
|
"description": "guest permission"
|
|
},
|
|
"jwt_secretkey": {
|
|
"type": "string",
|
|
"description": "JWT secret key. if you change its value, all access tokens are invalidated."
|
|
},
|
|
"port": {
|
|
"type": "number",
|
|
"description": "the port which running server is binding on."
|
|
},
|
|
"mode": {
|
|
"type": "string",
|
|
"enum": ["development", "production"]
|
|
},
|
|
"cli": {
|
|
"type": "boolean",
|
|
"description": "if true, do not show 'electron' window and show terminal only."
|
|
},
|
|
"forbid_remote_admin_login": {
|
|
"type": "boolean",
|
|
"description": "forbid to login admin from remote client. but, it do not invalidate access token. \r if you want to invalidate access token, change 'jwt_secretkey'."
|
|
},
|
|
"$schema": {
|
|
"type": "string"
|
|
}
|
|
},
|
|
"required": ["localmode", "guest", "jwt_secretkey", "port", "mode", "cli", "forbid_remote_admin_login"],
|
|
"additionalProperties": false
|
|
},
|
|
"Permission": {
|
|
"type": "string",
|
|
"enum": ["ModifyTag", "QueryContent", "ModifyTagDesc"]
|
|
}
|
|
}
|
|
}
|