X-Git-Url: https://git.p6c8.net/jirafeau.git/blobdiff_plain/3e84a5debe0984bea841016ba587b109031a7816..e98ed4a532ae131ed9f8638ed96b844aba3cab9a:/lib/config.original.php?ds=sidebyside diff --git a/lib/config.original.php b/lib/config.original.php index 365b5aa..3af9fc6 100644 --- a/lib/config.original.php +++ b/lib/config.original.php @@ -3,6 +3,7 @@ * Jirafeau, your web file repository * Copyright (C) 2008 Julien "axolotl" BERNARD * Copyright (C) 2015 Jerome Jutteau + * Copyright (C) 2024 Jirafeau project (see AUTHORS.md) * * This program is free software: you can redistribute it and/or modify * it under the terms of the GNU Affero General Public License as @@ -43,6 +44,7 @@ $cfg['lang'] = 'auto'; /* Select a theme - see media folder for available themes */ $cfg['style'] = 'courgette'; +$cfg['dark_style'] = 'dark-courgette'; /* Name the organisation running this installation, eg. 'ACME' */ @@ -95,16 +97,27 @@ $cfg['upload_ip_nopassword'] = array(); /* Password for the admin interface. * An empty password will disable password authentication. * The password is a sha256 hash of the original version. + * Example: echo -n "myVerySecretAdminPassword" | sha256sum */ $cfg['admin_password'] = ''; -/* If set, let the user be authenticated as administrator. - * The user provided here is the user authenticated by HTTP authentication. +/* If set, let the users be authenticated as administrator. + * The users provided here are authenticated by HTTP authentication. * Note that Jirafeau does not manage the HTTP login part, it just checks - * that the provided user is logged in. + * that one of the provided users is logged in. + * May be an array for multiple users or a string for a single user. + * The option to provide a string is for backward compatibility. * If »admin_password« parameter is set, then the »admin_password« is ignored. */ -$cfg['admin_http_auth_user'] = ''; +$cfg['admin_http_auth_user'] = array(); + +/* List of IP allowed to access the admin interface. + * If the list is empty, then there is no admin interface restriction based on IP. + * Elements of the list can be a single IP (e.g. "123.45.67.89") or + * an IP range (e.g. "123.45.0.0/16"). + * Note that CIDR notation is available for IPv4 only for the moment. + */ +$cfg['admin_ip'] = array(); /* Allow user to select different options for file expiration time. * Possible values in array: @@ -140,6 +153,11 @@ $cfg['availability_default'] = 'month'; */ $cfg['one_time_download'] = true; +/* When set to "true", the checkbox for deleting the file after the first download + * is preselected. + */ +$cfg['one_time_download_preselected'] = false; + /* Set maximal upload size expressed in MB. * »0« means unlimited upload size. */ @@ -156,7 +174,7 @@ $cfg['proxy_ip'] = array(); /* File hash * In order to make file deduplication work, files can be hashed through different methods. - * By default, files are hashed through md5 but other methods are available. + * To enable file deduplication feature, set this option to `md5`. * * Possible values are 'md5', 'md5_outside' and 'random'. * @@ -166,9 +184,9 @@ $cfg['proxy_ip'] = array(); * - md5 of the last part of the file and * - file's size. * This method offer file deduplication at minimal cost but can be dangerous as files with the same partial hash can be mistaken. - * With 'random' option, file hash is set to a random value and file deduplication cannot work anymore but it is fast and safe. + * With 'random' option, file hash is set to a random value and file deduplication cannot work but it is fast and safe. */ -$cfg['file_hash'] = 'md5'; +$cfg['file_hash'] = 'random'; /* Work around that LiteSpeed truncates large files when downloading. * Only for use with the LiteSpeed web server! @@ -183,6 +201,16 @@ $cfg['file_hash'] = 'md5'; */ $cfg['litespeed_workaround'] = false; +/* Use the X-Sendfile header which should cause your webserver to handle + * the sending of the file. The webserver must be configured to do this + * using the mod_xsendfile module in Apache or the appropriate config in + * lighttpd. The offload will not happen in the case of server-side encrypted + * files, but all other cases should work. Benefits include being able + * to resume downloads and seek instantly in media players like VLC or + * the Firefox/Discord/Chrome embedded player. + */ +$cfg['use_xsendfile'] = false; + /* Store uploader's IP along with 'link' file. * Depending of your legislation, you may have to adjust this parameter. */ @@ -199,3 +227,45 @@ $cfg['installation_done'] = false; * var- folder should kept secret and accessing it may lead to data leak if unprotected. */ $cfg['debug'] = false; + +/* Enable this flag to enforce the classic upload without the HTML5 File API + * Only set to "true", if you know what you're doing! + */ +$cfg['debug_enforce_classic_upload'] = false; + +/** Set Jirafeau's maximal upload chunk + * When Jirafeau upload a large file, Jirafeau sends several data chunks to fit server's capabilities. + * Jirafeau tries to upload each data chunk with the maximal size allowed by PHP (post_max_size and upload_max_filesize). + * However, too large PHP configuration values are not needed and could induce unwanted side effects (see #303). + * This parameter set Jirafeau's own maximal chunk size with a reasonable value. + * Option is only used for async uploads and won't be used for browsers without html5 support. + * You should not touch this parameter unless you have good reason to do so. Feel free to open an issue to ask questions. + * Set to 0 to remove limitation. + */ +$cfg['max_upload_chunk_size_bytes'] = 100000000; // 100MB + +/* Set password requirement policy for downloading files + * Possible values: + * optional (default): Password may be set by the uploader, but is not mandatory + * required: Setting a password is mandatory to upload a file. + * generated: Passwords are automatically generated and shown to the uploader, when uploading a file + */ +$cfg['download_password_requirement'] = 'optional'; + +/* Set length of generated passwords + */ +$cfg['download_password_gen_len'] = 10; + +/* Set allowed chars for password generation + */ +$cfg['download_password_gen_chars'] = 'abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789!@#$%&*()_-=+;:,.?'; +/* Set password complexity policy for downloading files + * possible values: + * none (default): Passwords for downloading files can be of arbitrary complexity + * regex: Passwords are checked with a regex for complexity constraints + */ +$cfg['download_password_policy'] = 'none'; +/* Set the regex for regex download password policy + * Delimiters are need, but modifiers should not be used + */ +$cfg['download_password_policy_regex'] = '/.*/';