[security] view was giving web access to every fs file accessible by the web server process. Fix this security hole by storing file in session data, not direct form parameters
[BASE]
APPLICATION_SCHEMA = /home/adim/cvs_work/soft_prive/ginco/applications/crm/schema
APPLICATION_HOME = /home/adim/etc/erudi.d/crmadim # ???
FAKEDB_NAME = crmtest
ENCODING = UTF-8
HOST = crater
USER = adim
PASSWORD = adim
[ENTITIES]
default = 20 #means default is 20 entities
Person = 10 # means 10 Persons
Company = 5# means 5 companies
[RELATIONS]
Person works_for Company = 4
Division subsidiary_of Company = 3
[DEFAULT_VALUES]
Person.firstname = data/firstnames.txt