X-Git-Url: https://git.p6c8.net/jirafeau_mojo42.git/blobdiff_plain/c7f776c8b948b033c200c8fd84ab5e8a8422d601..refs/heads/ldap:/lib/config.original.php?ds=inline diff --git a/lib/config.original.php b/lib/config.original.php index 59bad4e..7d221b7 100644 --- a/lib/config.original.php +++ b/lib/config.original.php @@ -25,7 +25,7 @@ * rename it to »config.local.php« and adapt the parameters. **/ -/* URL of installation, with traling slash (eg. »https://exmaple.com/jirafeau/«) +/* URL of installation, with trailing slash (eg. »https://example.com/jirafeau/«) */ $cfg['web_root'] = ''; @@ -33,16 +33,17 @@ $cfg['web_root'] = ''; */ $cfg['var_root'] = ''; -/* Language - choice between 'auto' or any language located in the /lib/locales/ folder. +/* Language - choose between 'auto' or any language located in the /lib/locales/ folder. * The mode »auto« will cause the script to detect the user's browser information - * and offer a matching language, and use »en« if it is not available. - * Forcing to a specific lang lightly reduce lang computation. + * and offer a matching language, or use »en« if it is not available. + * Forcing a specific lang will slightly reduce computation time. */ $cfg['lang'] = 'auto'; /* Select a theme - see media folder for available themes */ $cfg['style'] = 'courgette'; +$cfg['dark_style'] = 'dark-courgette'; /* Name the organisation running this installation, eg. 'ACME' */ @@ -70,7 +71,7 @@ $cfg['enable_crypt'] = false; $cfg['link_name_length'] = 8; /* Upload password(s). - * An empty array will disable the password authentification. + * An empty array will disable password authentication. * $cfg['upload_password'] = array(); // No password * $cfg['upload_password'] = array('psw1'); // One password * $cfg['upload_password'] = array('psw1', 'psw2'); // Two passwords @@ -93,8 +94,9 @@ $cfg['upload_ip'] = array(); $cfg['upload_ip_nopassword'] = array(); /* Password for the admin interface. - * An empty password will disable the password authentification. + * An empty password will disable password authentication. * The password is a sha256 hash of the original version. + * Example: echo -n "myVerySecretAdminPassword" | sha256sum */ $cfg['admin_password'] = ''; @@ -156,7 +158,7 @@ $cfg['proxy_ip'] = array(); /* File hash * In order to make file deduplication work, files can be hashed through different methods. - * By default, files are hashed through md5 but other methods are available. + * To enable file deduplication feature, set this option to `md5`. * * Possible values are 'md5', 'md5_outside' and 'random'. * @@ -166,9 +168,9 @@ $cfg['proxy_ip'] = array(); * - md5 of the last part of the file and * - file's size. * This method offer file deduplication at minimal cost but can be dangerous as files with the same partial hash can be mistaken. - * With 'random' option, file hash is set to a random value and file deduplication cannot work anymore but it is fast and safe. + * With 'random' option, file hash is set to a random value and file deduplication cannot work but it is fast and safe. */ -$cfg['file_hash'] = 'md5'; +$cfg['file_hash'] = 'random'; /* Work around that LiteSpeed truncates large files when downloading. * Only for use with the LiteSpeed web server! @@ -183,6 +185,16 @@ $cfg['file_hash'] = 'md5'; */ $cfg['litespeed_workaround'] = false; +/* Use the X-Sendfile header which should cause your webserver to handle + * the sending of the file. The webserver must be configured to do this + * using the mod_xsendfile module in Apache or the appropriate config in + * lighttpd. The offload will not happen in the case of server-side encrypted + * files, but all other cases should work. Benefits include being able + * to resume downloads and seek instantly in media players like VLC or + * the Firefox/Discord/Chrome embedded player. + */ +$cfg['use_xsendfile'] = false; + /* Store uploader's IP along with 'link' file. * Depending of your legislation, you may have to adjust this parameter. */ @@ -199,3 +211,25 @@ $cfg['installation_done'] = false; * var- folder should kept secret and accessing it may lead to data leak if unprotected. */ $cfg['debug'] = false; + +/** Set Jirafeau's maximal upload chunk + * When Jirafeau upload a large file, Jirafeau sends several data chunks to fit server's capabilities. + * Jirafeau tries to upload each data chunk with the maximal size allowed by PHP (post_max_size and upload_max_filesize). + * However, too large PHP configuration values are not needed and could induce unwanted side effects (see #303). + * This parameter set Jirafeau's own maximal chunk size with a reasonable value. + * Option is only used for async uploads and won't be used for browsers without html5 support. + * You should not touch this parameter unless you have good reason to do so. Feel free to open an issue to ask questions. + * Set to 0 to remove limitation. + */ +$cfg['max_upload_chunk_size_bytes'] = 100000000; // 100MB + +/** Enable LDAP authentication for uploaders + * Cannot be used with 'upload_password' or 'upload_ip_nopassword' options. + */ +$cfg['upload_ldap_auth'] = false; + +/** LDAP host to reach when 'upload_ldap_auth' is enabled */ +$cfg['upload_ldap_host'] = ""; + +/** LDAP Base DN to authenticate users with 'upload_ldap_auth' option enabled*/ +$cfg['upload_ldap_base_dn'] = "dc=jirafeau,dc=net";