From 4dc536750c94e8f207724c6b62a5d8fd0386b822 Mon Sep 17 00:00:00 2001 From: ericgaspar Date: Sun, 18 Oct 2020 17:57:06 +0200 Subject: [PATCH] Create settings.example.php --- conf/settings.example.php | 439 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 439 insertions(+) create mode 100644 conf/settings.example.php diff --git a/conf/settings.example.php b/conf/settings.example.php new file mode 100644 index 0000000..76d4910 --- /dev/null +++ b/conf/settings.example.php @@ -0,0 +1,439 @@ + 'Discussion board', + '@count min' => '@count minutes', +); +*/ + +/** + * Fast 404 pages: + * + * Backdrop can generate fully themed 404 pages. However, some of these + * responses are for images or other resource files that are not displayed to + * the user. This can waste bandwidth, and also generate server load. + * + * The options below return a simple, fast 404 page for URLs matching a + * specific pattern: + * - 404_fast_paths_exclude: A regular expression to match paths to exclude, + * such as images generated by image styles, or dynamically-resized images. + * The default pattern provided below also excludes the private file system. + * If you need to add more paths, you can add '|path' to the expression. + * - 404_fast_paths: A regular expression to match paths that should return a + * simple 404 page, rather than the fully themed 404 page. If you don't have + * any aliases ending in htm or html you can add '|s?html?' to the expression. + * - 404_fast_html: The html to return for simple 404 pages. + * + * Comment out this code if you would like to disable this functionality. + */ +$settings['404_fast_paths_exclude'] = '/\/(?:styles)|(?:system\/files)\//'; +$settings['404_fast_paths'] = '/\.(?:txt|png|gif|jpe?g|css|js|ico|swf|flv|cgi|bat|pl|dll|exe|asp)$/i'; +$settings['404_fast_html'] = '404 Not Found

Not Found

The requested URL "@path" was not found on this server.

'; + +/** + * By default, fast 404s are returned as part of the normal page request + * process, which will properly serve valid pages that happen to match and will + * also log actual 404s to the Backdrop log. Alternatively you can choose to + * return a 404 now by uncommenting the following line. This will reduce server + * load, but will cause even valid pages that happen to match the pattern to + * return 404s, rather than the actual page. It will also prevent the Backdrop + * system log entry. Ensure you understand the effects of this before enabling. + * + * To enable this functionality, uncomment the line below. + */ +// fast_404(); + +/** + * External access proxy settings: + * + * If your site must access the Internet via a web proxy then you can enter + * the proxy settings here. Currently only basic authentication is supported + * by using the username and password variables. The proxy_user_agent variable + * can be set to NULL for proxies that require no User-Agent header or to a + * non-empty string for proxies that limit requests to a specific agent. The + * proxy_exceptions variable is an array of host names to be accessed directly, + * not via proxy. + */ +// $settings['proxy_server'] = ''; +// $settings['proxy_port'] = 8080; +// $settings['proxy_username'] = ''; +// $settings['proxy_password'] = ''; +// $settings['proxy_user_agent'] = ''; +// $settings['proxy_exceptions'] = array('127.0.0.1', 'localhost'); + +/** + * Authorized file system operations: + * + * The Update Manager module included with Backdrop provides a mechanism for + * site administrators to securely install missing updates for the site + * directly through the web user interface. On securely-configured servers, + * the Update manager will require the administrator to provide SSH or FTP + * credentials before allowing the installation to proceed; this allows the + * site to update the new files as the user who owns all the Backdrop files, + * instead of as the user the webserver is running as. On servers where the + * webserver user is itself the owner of the Backdrop files, the administrator + * will not be prompted for SSH or FTP credentials (note that these server + * setups are common on shared hosting, but are inherently insecure). + * + * Some sites might wish to disable the above functionality, and only update + * the code directly via SSH or FTP themselves. This setting completely + * disables all functionality related to these authorized file operations. + * + * Uncomment the line below to disable authorize operations. + */ +// $settings['allow_authorize_operations'] = FALSE; + +/** + * Mixed-mode sessions: + * + * Set to TRUE to create both secure and insecure sessions when using HTTPS. + * Defaults to FALSE. + */ +// $settings['https'] = TRUE; + +/** + * Drupal backwards compatibility. + * + * By default, Backdrop 1.0 includes a compatibility layer to keep it compatible + * with Drupal 7 APIs. Backdrop core itself does not use this compatibility + * layer however. You may disable it if all the modules you're running were + * built for Backdrop. + */ +$settings['backdrop_drupal_compatibility'] = TRUE; + +/** + * Configuration overrides. + * + * These settings allow you to specify values for anything stored in config + * within the files stored in the $config_directories variable above. + * This can be useful to store per-environment values or sensitive data that + * is undesirable to store in the config storage. + * + * There are particular configuration values that are risky to override. For + * example overriding field storage will create errors because associated + * database changes are necessary. Modifying values within complicated objects + * such as views, content types, vocabularies, etc. may not work as expected. + * Use any available API functions for complex systems instead. + */ +//$config['system.core']['site_name'] = 'My Backdrop site'; +//$config['system.core']['file_temporary_path'] = '/tmp'; + +/** + * Include a local settings file, if available. + * + * To make local development easier, you can add a settings.local.php file that + * contains settings specific to your local installation, or to any secondary + * environment (staging, development, etc). + * + * Typically used to specify a different database connection information, to + * disable caching, JavaScript/CSS compression, re-routing of outgoing e-mails, + * Google Analytics, and other things that should not happen on development and + * testing sites. + * + * This local settings file can be ignored in your Git repository, so that any + * updates to settings.php can be pulled in without overwriting your local + * changes. + * + * Keep this code block at the end of this file to take full effect. + */ +if (file_exists(__DIR__ . '/settings.local.php')) { + include __DIR__ . '/settings.local.php'; +}