github.com/ddev/ddev@v1.23.2-0.20240519125000-d824ffe36ff3/pkg/ddevapp/drupal/drupal11/settings.php (about) 1 <?php 2 3 // phpcs:ignoreFile 4 5 /** 6 * @file 7 * Drupal site-specific configuration file. 8 * 9 * IMPORTANT NOTE: 10 * This file may have been set to read-only by the Drupal installation program. 11 * If you make changes to this file, be sure to protect it again after making 12 * your modifications. Failure to remove write permissions to this file is a 13 * security risk. 14 * 15 * In order to use the selection rules below the multisite aliasing file named 16 * sites/sites.php must be present. Its optional settings will be loaded, and 17 * the aliases in the array $sites will override the default directory rules 18 * below. See sites/example.sites.php for more information about aliases. 19 * 20 * The configuration directory will be discovered by stripping the website's 21 * hostname from left to right and pathname from right to left. The first 22 * configuration file found will be used and any others will be ignored. If no 23 * other configuration file is found then the default configuration file at 24 * 'sites/default' will be used. 25 * 26 * For example, for a fictitious site installed at 27 * https://www.drupal.org:8080/my-site/test/, the 'settings.php' file is searched 28 * for in the following directories: 29 * 30 * - sites/8080.www.drupal.org.my-site.test 31 * - sites/www.drupal.org.my-site.test 32 * - sites/drupal.org.my-site.test 33 * - sites/org.my-site.test 34 * 35 * - sites/8080.www.drupal.org.my-site 36 * - sites/www.drupal.org.my-site 37 * - sites/drupal.org.my-site 38 * - sites/org.my-site 39 * 40 * - sites/8080.www.drupal.org 41 * - sites/www.drupal.org 42 * - sites/drupal.org 43 * - sites/org 44 * 45 * - sites/default 46 * 47 * Note that if you are installing on a non-standard port number, prefix the 48 * hostname with that number. For example, 49 * https://www.drupal.org:8080/my-site/test/ could be loaded from 50 * sites/8080.www.drupal.org.my-site.test/. 51 * 52 * @see example.sites.php 53 * @see \Drupal\Core\DrupalKernel::getSitePath() 54 * 55 * In addition to customizing application settings through variables in 56 * settings.php, you can create a services.yml file in the same directory to 57 * register custom, site-specific service definitions and/or swap out default 58 * implementations with custom ones. 59 */ 60 61 /** 62 * Database settings: 63 * 64 * The $databases array specifies the database connection or 65 * connections that Drupal may use. Drupal is able to connect 66 * to multiple databases, including multiple types of databases, 67 * during the same request. 68 * 69 * One example of the simplest connection array is shown below. To use the 70 * sample settings, copy and uncomment the code below between the @code and 71 * @endcode lines and paste it after the $databases declaration. You will need 72 * to replace the database username and password and possibly the host and port 73 * with the appropriate credentials for your database system. 74 * 75 * The next section describes how to customize the $databases array for more 76 * specific needs. 77 * 78 * @code 79 * $databases['default']['default'] = [ 80 * 'database' => 'database_name', 81 * 'username' => 'sql_username', 82 * 'password' => 'sql_password', 83 * 'host' => 'localhost', 84 * 'port' => '3306', 85 * 'driver' => 'mysql', 86 * 'prefix' => '', 87 * 'collation' => 'utf8mb4_general_ci', 88 * ]; 89 * @endcode 90 */ 91 $databases = []; 92 93 /** 94 * Customizing database settings. 95 * 96 * Many of the values of the $databases array can be customized for your 97 * particular database system. Refer to the sample in the section above as a 98 * starting point. 99 * 100 * The "driver" property indicates what Drupal database driver the 101 * connection should use. This is usually the same as the name of the 102 * database type, such as mysql or sqlite, but not always. The other 103 * properties will vary depending on the driver. For SQLite, you must 104 * specify a database file name in a directory that is writable by the 105 * webserver. For most other drivers, you must specify a 106 * username, password, host, and database name. 107 * 108 * Drupal core implements drivers for mysql, pgsql, and sqlite. Other drivers 109 * can be provided by contributed or custom modules. To use a contributed or 110 * custom driver, the "namespace" property must be set to the namespace of the 111 * driver. The code in this namespace must be autoloadable prior to connecting 112 * to the database, and therefore, prior to when module root namespaces are 113 * added to the autoloader. To add the driver's namespace to the autoloader, 114 * set the "autoload" property to the PSR-4 base directory of the driver's 115 * namespace. This is optional for projects managed with Composer if the 116 * driver's namespace is in Composer's autoloader. 117 * 118 * For each database, you may optionally specify multiple "target" databases. 119 * A target database allows Drupal to try to send certain queries to a 120 * different database if it can but fall back to the default connection if not. 121 * That is useful for primary/replica replication, as Drupal may try to connect 122 * to a replica server when appropriate and if one is not available will simply 123 * fall back to the single primary server (The terms primary/replica are 124 * traditionally referred to as master/slave in database server documentation). 125 * 126 * The general format for the $databases array is as follows: 127 * @code 128 * $databases['default']['default'] = $info_array; 129 * $databases['default']['replica'][] = $info_array; 130 * $databases['default']['replica'][] = $info_array; 131 * $databases['extra']['default'] = $info_array; 132 * @endcode 133 * 134 * In the above example, $info_array is an array of settings described above. 135 * The first line sets a "default" database that has one primary database 136 * (the second level default). The second and third lines create an array 137 * of potential replica databases. Drupal will select one at random for a given 138 * request as needed. The fourth line creates a new database with a name of 139 * "extra". 140 * 141 * For MySQL, MariaDB or equivalent databases the 'isolation_level' option can 142 * be set. The recommended transaction isolation level for Drupal sites is 143 * 'READ COMMITTED'. The 'REPEATABLE READ' option is supported but can result 144 * in deadlocks, the other two options are 'READ UNCOMMITTED' and 'SERIALIZABLE'. 145 * They are available but not supported; use them at your own risk. For more 146 * info: 147 * https://dev.mysql.com/doc/refman/5.7/en/innodb-transaction-isolation-levels.html 148 * 149 * On your settings.php, change the isolation level: 150 * @code 151 * $databases['default']['default']['init_commands'] = [ 152 * 'isolation_level' => 'SET SESSION TRANSACTION ISOLATION LEVEL READ COMMITTED', 153 * ]; 154 * @endcode 155 * 156 * You can optionally set a prefix for all database table names by using the 157 * 'prefix' setting. If a prefix is specified, the table name will be prepended 158 * with its value. Be sure to use valid database characters only, usually 159 * alphanumeric and underscore. If no prefix is desired, do not set the 'prefix' 160 * key or set its value to an empty string ''. 161 * 162 * For example, to have all database table prefixed with 'main_', set: 163 * @code 164 * 'prefix' => 'main_', 165 * @endcode 166 * 167 * Advanced users can add or override initial commands to execute when 168 * connecting to the database server, as well as PDO connection settings. For 169 * example, to enable MySQL SELECT queries to exceed the max_join_size system 170 * variable, and to reduce the database connection timeout to 5 seconds: 171 * @code 172 * $databases['default']['default'] = [ 173 * 'init_commands' => [ 174 * 'big_selects' => 'SET SQL_BIG_SELECTS=1', 175 * ], 176 * 'pdo' => [ 177 * PDO::ATTR_TIMEOUT => 5, 178 * ], 179 * ]; 180 * @endcode 181 * 182 * WARNING: The above defaults are designed for database portability. Changing 183 * them may cause unexpected behavior, including potential data loss. See 184 * https://www.drupal.org/developing/api/database/configuration for more 185 * information on these defaults and the potential issues. 186 * 187 * More details can be found in the constructor methods for each driver: 188 * - \Drupal\mysql\Driver\Database\mysql\Connection::__construct() 189 * - \Drupal\pgsql\Driver\Database\pgsql\Connection::__construct() 190 * - \Drupal\sqlite\Driver\Database\sqlite\Connection::__construct() 191 * 192 * Sample Database configuration format for PostgreSQL (pgsql): 193 * @code 194 * $databases['default']['default'] = [ 195 * 'driver' => 'pgsql', 196 * 'database' => 'database_name', 197 * 'username' => 'sql_username', 198 * 'password' => 'sql_password', 199 * 'host' => 'localhost', 200 * 'prefix' => '', 201 * ]; 202 * @endcode 203 * 204 * Sample Database configuration format for SQLite (sqlite): 205 * @code 206 * $databases['default']['default'] = [ 207 * 'driver' => 'sqlite', 208 * 'database' => '/path/to/database_filename', 209 * ]; 210 * @endcode 211 * 212 * Sample Database configuration format for a driver in a contributed module: 213 * @code 214 * $databases['default']['default'] = [ 215 * 'driver' => 'my_driver', 216 * 'namespace' => 'Drupal\my_module\Driver\Database\my_driver', 217 * 'autoload' => 'modules/my_module/src/Driver/Database/my_driver/', 218 * 'database' => 'database_name', 219 * 'username' => 'sql_username', 220 * 'password' => 'sql_password', 221 * 'host' => 'localhost', 222 * 'prefix' => '', 223 * ]; 224 * @endcode 225 * 226 * Sample Database configuration format for a driver that is extending another 227 * database driver. 228 * @code 229 * $databases['default']['default'] = [ 230 * 'driver' => 'my_driver', 231 * 'namespace' => 'Drupal\my_module\Driver\Database\my_driver', 232 * 'autoload' => 'modules/my_module/src/Driver/Database/my_driver/', 233 * 'database' => 'database_name', 234 * 'username' => 'sql_username', 235 * 'password' => 'sql_password', 236 * 'host' => 'localhost', 237 * 'prefix' => '', 238 * 'dependencies' => [ 239 * 'parent_module' => [ 240 * 'namespace' => 'Drupal\parent_module', 241 * 'autoload' => 'core/modules/parent_module/src/', 242 * ], 243 * ], 244 * ]; 245 * @endcode 246 */ 247 248 /** 249 * Location of the site configuration files. 250 * 251 * The $settings['config_sync_directory'] specifies the location of file system 252 * directory used for syncing configuration data. On install, the directory is 253 * created. This is used for configuration imports. 254 * 255 * The default location for this directory is inside a randomly-named 256 * directory in the public files path. The setting below allows you to set 257 * its location. 258 */ 259 # $settings['config_sync_directory'] = '/directory/outside/webroot'; 260 261 /** 262 * Settings: 263 * 264 * $settings contains environment-specific configuration, such as the files 265 * directory and reverse proxy address, and temporary configuration, such as 266 * security overrides. 267 * 268 * @see \Drupal\Core\Site\Settings::get() 269 */ 270 271 /** 272 * Salt for one-time login links, cancel links, form tokens, etc. 273 * 274 * This variable will be set to a random value by the installer. All one-time 275 * login links will be invalidated if the value is changed. Note that if your 276 * site is deployed on a cluster of web servers, you must ensure that this 277 * variable has the same value on each server. 278 * 279 * For enhanced security, you may set this variable to the contents of a file 280 * outside your document root, and vary the value across environments (like 281 * production and development); you should also ensure that this file is not 282 * stored with backups of your database. 283 * 284 * Example: 285 * @code 286 * $settings['hash_salt'] = file_get_contents('/home/example/salt.txt'); 287 * @endcode 288 */ 289 $settings['hash_salt'] = ''; 290 291 /** 292 * Deployment identifier. 293 * 294 * Drupal's dependency injection container will be automatically invalidated and 295 * rebuilt when the Drupal core version changes. When updating contributed or 296 * custom code that changes the container, changing this identifier will also 297 * allow the container to be invalidated as soon as code is deployed. 298 */ 299 # $settings['deployment_identifier'] = \Drupal::VERSION; 300 301 /** 302 * Access control for update.php script. 303 * 304 * If you are updating your Drupal installation using the update.php script but 305 * are not logged in using either an account with the "Administer software 306 * updates" permission or the site maintenance account (the account that was 307 * created during installation), you will need to modify the access check 308 * statement below. Change the FALSE to a TRUE to disable the access check. 309 * After finishing the upgrade, be sure to open this file again and change the 310 * TRUE back to a FALSE! 311 */ 312 $settings['update_free_access'] = FALSE; 313 314 /** 315 * Fallback to HTTP for Update Manager and for fetching security advisories. 316 * 317 * If your site fails to connect to updates.drupal.org over HTTPS (either when 318 * fetching data on available updates, or when fetching the feed of critical 319 * security announcements), you may uncomment this setting and set it to TRUE to 320 * allow an insecure fallback to HTTP. Note that doing so will open your site up 321 * to a potential man-in-the-middle attack. You should instead attempt to 322 * resolve the issues before enabling this option. 323 * @see https://www.drupal.org/docs/system-requirements/php-requirements#openssl 324 * @see https://en.wikipedia.org/wiki/Man-in-the-middle_attack 325 * @see \Drupal\update\UpdateFetcher 326 * @see \Drupal\system\SecurityAdvisories\SecurityAdvisoriesFetcher 327 */ 328 # $settings['update_fetch_with_http_fallback'] = TRUE; 329 330 /** 331 * External access proxy settings: 332 * 333 * If your site must access the Internet via a web proxy then you can enter the 334 * proxy settings here. Set the full URL of the proxy, including the port, in 335 * variables: 336 * - $settings['http_client_config']['proxy']['http']: The proxy URL for HTTP 337 * requests. 338 * - $settings['http_client_config']['proxy']['https']: The proxy URL for HTTPS 339 * requests. 340 * You can pass in the user name and password for basic authentication in the 341 * URLs in these settings. 342 * 343 * You can also define an array of host names that can be accessed directly, 344 * bypassing the proxy, in $settings['http_client_config']['proxy']['no']. 345 */ 346 # $settings['http_client_config']['proxy']['http'] = 'http://proxy_user:proxy_pass@example.com:8080'; 347 # $settings['http_client_config']['proxy']['https'] = 'http://proxy_user:proxy_pass@example.com:8080'; 348 # $settings['http_client_config']['proxy']['no'] = ['127.0.0.1', 'localhost']; 349 350 /** 351 * Reverse Proxy Configuration: 352 * 353 * Reverse proxy servers are often used to enhance the performance 354 * of heavily visited sites and may also provide other site caching, 355 * security, or encryption benefits. In an environment where Drupal 356 * is behind a reverse proxy, the real IP address of the client should 357 * be determined such that the correct client IP address is available 358 * to Drupal's logging and access management systems. In the most simple 359 * scenario, the proxy server will add an X-Forwarded-For header to the request 360 * that contains the client IP address. However, HTTP headers are vulnerable to 361 * spoofing, where a malicious client could bypass restrictions by setting the 362 * X-Forwarded-For header directly. Therefore, Drupal's proxy configuration 363 * requires the IP addresses of all remote proxies to be specified in 364 * $settings['reverse_proxy_addresses'] to work correctly. 365 * 366 * Enable this setting to get Drupal to determine the client IP from the 367 * X-Forwarded-For header. If you are unsure about this setting, do not have a 368 * reverse proxy, or Drupal operates in a shared hosting environment, this 369 * setting should remain commented out. 370 * 371 * In order for this setting to be used you must specify every possible 372 * reverse proxy IP address in $settings['reverse_proxy_addresses']. 373 * If a complete list of reverse proxies is not available in your 374 * environment (for example, if you use a CDN) you may set the 375 * $_SERVER['REMOTE_ADDR'] variable directly in settings.php. 376 * Be aware, however, that it is likely that this would allow IP 377 * address spoofing unless more advanced precautions are taken. 378 */ 379 # $settings['reverse_proxy'] = TRUE; 380 381 /** 382 * Reverse proxy addresses. 383 * 384 * Specify every reverse proxy IP address in your environment, as an array of 385 * IPv4/IPv6 addresses or subnets in CIDR notation. This setting is required if 386 * $settings['reverse_proxy'] is TRUE. 387 */ 388 # $settings['reverse_proxy_addresses'] = ['a.b.c.d', 'e.f.g.h/24', ...]; 389 390 /** 391 * Reverse proxy trusted headers. 392 * 393 * Sets which headers to trust from your reverse proxy. 394 * 395 * Common values are: 396 * - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR 397 * - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST 398 * - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT 399 * - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO 400 * - \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED 401 * 402 * Note the default value of 403 * @code 404 * \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO | \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED 405 * @endcode 406 * is not secure by default. The value should be set to only the specific 407 * headers the reverse proxy uses. For example: 408 * @code 409 * \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO 410 * @endcode 411 * This would trust the following headers: 412 * - X_FORWARDED_FOR 413 * - X_FORWARDED_HOST 414 * - X_FORWARDED_PROTO 415 * - X_FORWARDED_PORT 416 * 417 * @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR 418 * @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST 419 * @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT 420 * @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO 421 * @see \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED 422 * @see \Symfony\Component\HttpFoundation\Request::setTrustedProxies 423 */ 424 # $settings['reverse_proxy_trusted_headers'] = \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO | \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED; 425 426 427 /** 428 * Page caching: 429 * 430 * By default, Drupal sends a "Vary: Cookie" HTTP header for anonymous page 431 * views. This tells a HTTP proxy that it may return a page from its local 432 * cache without contacting the web server, if the user sends the same Cookie 433 * header as the user who originally requested the cached page. Without "Vary: 434 * Cookie", authenticated users would also be served the anonymous page from 435 * the cache. If the site has mostly anonymous users except a few known 436 * editors/administrators, the Vary header can be omitted. This allows for 437 * better caching in HTTP proxies (including reverse proxies), i.e. even if 438 * clients send different cookies, they still get content served from the cache. 439 * However, authenticated users should access the site directly (i.e. not use an 440 * HTTP proxy, and bypass the reverse proxy if one is used) in order to avoid 441 * getting cached pages from the proxy. 442 */ 443 # $settings['omit_vary_cookie'] = TRUE; 444 445 446 /** 447 * Cache TTL for client error (4xx) responses. 448 * 449 * Items cached per-URL tend to result in a large number of cache items, and 450 * this can be problematic on 404 pages which by their nature are unbounded. A 451 * fixed TTL can be set for these items, defaulting to one hour, so that cache 452 * backends which do not support LRU can purge older entries. To disable caching 453 * of client error responses set the value to 0. Currently applies only to 454 * page_cache module. 455 */ 456 # $settings['cache_ttl_4xx'] = 3600; 457 458 /** 459 * Expiration of cached forms. 460 * 461 * Drupal's Form API stores details of forms in a cache and these entries are 462 * kept for at least 6 hours by default. Expired entries are cleared by cron. 463 * 464 * @see \Drupal\Core\Form\FormCache::setCache() 465 */ 466 # $settings['form_cache_expiration'] = 21600; 467 468 /** 469 * Class Loader. 470 * 471 * If the APCu extension is detected, the classloader will be optimized to use 472 * it. Set to FALSE to disable this. 473 * 474 * @see https://getcomposer.org/doc/articles/autoloader-optimization.md 475 */ 476 # $settings['class_loader_auto_detect'] = FALSE; 477 478 /** 479 * Authorized file system operations: 480 * 481 * The Update Manager module included with Drupal provides a mechanism for 482 * site administrators to securely install missing updates for the site 483 * directly through the web user interface. On securely-configured servers, 484 * the Update manager will require the administrator to provide SSH or FTP 485 * credentials before allowing the installation to proceed; this allows the 486 * site to update the new files as the user who owns all the Drupal files, 487 * instead of as the user the webserver is running as. On servers where the 488 * webserver user is itself the owner of the Drupal files, the administrator 489 * will not be prompted for SSH or FTP credentials (note that these server 490 * setups are common on shared hosting, but are inherently insecure). 491 * 492 * Some sites might wish to disable the above functionality, and only update 493 * the code directly via SSH or FTP themselves. This setting completely 494 * disables all functionality related to these authorized file operations. 495 * 496 * @see https://www.drupal.org/node/244924 497 * 498 * Remove the leading hash signs to disable. 499 */ 500 # $settings['allow_authorize_operations'] = FALSE; 501 502 /** 503 * Default mode for directories and files written by Drupal. 504 * 505 * Value should be in PHP Octal Notation, with leading zero. 506 */ 507 # $settings['file_chmod_directory'] = 0775; 508 # $settings['file_chmod_file'] = 0664; 509 510 /** 511 * Optimized assets path: 512 * 513 * A local file system path where optimized assets will be stored. This directory 514 * must exist and be writable by Drupal. This directory must be relative to 515 * the Drupal installation directory and be accessible over the web. 516 */ 517 # $settings['file_assets_path'] = 'sites/default/files'; 518 519 /** 520 * Public file base URL: 521 * 522 * An alternative base URL to be used for serving public files. This must 523 * include any leading directory path. 524 * 525 * A different value from the domain used by Drupal to be used for accessing 526 * public files. This can be used for a simple CDN integration, or to improve 527 * security by serving user-uploaded files from a different domain or subdomain 528 * pointing to the same server. Do not include a trailing slash. 529 */ 530 # $settings['file_public_base_url'] = 'http://downloads.example.com/files'; 531 532 /** 533 * Public file path: 534 * 535 * A local file system path where public files will be stored. This directory 536 * must exist and be writable by Drupal. This directory must be relative to 537 * the Drupal installation directory and be accessible over the web. 538 */ 539 # $settings['file_public_path'] = 'sites/default/files'; 540 541 /** 542 * Additional public file schemes: 543 * 544 * Public schemes are URI schemes that allow download access to all users for 545 * all files within that scheme. 546 * 547 * The "public" scheme is always public, and the "private" scheme is always 548 * private, but other schemes, such as "https", "s3", "example", or others, 549 * can be either public or private depending on the site. By default, they're 550 * private, and access to individual files is controlled via 551 * hook_file_download(). 552 * 553 * Typically, if a scheme should be public, a module makes it public by 554 * implementing hook_file_download(), and granting access to all users for all 555 * files. This could be either the same module that provides the stream wrapper 556 * for the scheme, or a different module that decides to make the scheme 557 * public. However, in cases where a site needs to make a scheme public, but 558 * is unable to add code in a module to do so, the scheme may be added to this 559 * variable, the result of which is that system_file_download() grants public 560 * access to all files within that scheme. 561 */ 562 # $settings['file_additional_public_schemes'] = ['example']; 563 564 /** 565 * File schemes whose paths should not be normalized: 566 * 567 * Normally, Drupal normalizes '/./' and '/../' segments in file URIs in order 568 * to prevent unintended file access. For example, 'private://css/../image.png' 569 * is normalized to 'private://image.png' before checking access to the file. 570 * 571 * On Windows, Drupal also replaces '\' with '/' in URIs for the local 572 * filesystem. 573 * 574 * If file URIs with one or more scheme should not be normalized like this, then 575 * list the schemes here. For example, if 'porcelain://china/./plate.png' should 576 * not be normalized to 'porcelain://china/plate.png', then add 'porcelain' to 577 * this array. In this case, make sure that the module providing the 'porcelain' 578 * scheme does not allow unintended file access when using '/../' to move up the 579 * directory tree. 580 */ 581 # $settings['file_sa_core_2023_005_schemes'] = ['porcelain']; 582 583 /** 584 * Configuration for phpinfo() admin status report. 585 * 586 * Drupal's admin UI includes a report at admin/reports/status/php which shows 587 * the output of phpinfo(). The full output can contain sensitive information 588 * so by default Drupal removes some sections. 589 * 590 * This behavior can be configured by setting this variable to a different 591 * value corresponding to the flags parameter of phpinfo(). 592 * 593 * If you need to expose more information in the report - for example to debug a 594 * problem - consider doing so temporarily. 595 * 596 * @see https://www.php.net/manual/function.phpinfo.php 597 */ 598 # $settings['sa_core_2023_004_phpinfo_flags'] = ~ (INFO_VARIABLES | INFO_ENVIRONMENT); 599 600 /** 601 * Private file path: 602 * 603 * A local file system path where private files will be stored. This directory 604 * must be absolute, outside of the Drupal installation directory and not 605 * accessible over the web. 606 * 607 * Note: Caches need to be cleared when this value is changed to make the 608 * private:// stream wrapper available to the system. 609 * 610 * See https://www.drupal.org/documentation/modules/file for more information 611 * about securing private files. 612 */ 613 # $settings['file_private_path'] = ''; 614 615 /** 616 * Temporary file path: 617 * 618 * A local file system path where temporary files will be stored. This directory 619 * must be absolute, outside of the Drupal installation directory and not 620 * accessible over the web. 621 * 622 * If this is not set, the default for the operating system will be used. 623 * 624 * @see \Drupal\Component\FileSystem\FileSystem::getOsTemporaryDirectory() 625 */ 626 # $settings['file_temp_path'] = '/tmp'; 627 628 /** 629 * Session write interval: 630 * 631 * Set the minimum interval between each session write to database. 632 * For performance reasons it defaults to 180. 633 */ 634 # $settings['session_write_interval'] = 180; 635 636 /** 637 * String overrides: 638 * 639 * To override specific strings on your site with or without enabling the Locale 640 * module, add an entry to this list. This functionality allows you to change 641 * a small number of your site's default English language interface strings. 642 * 643 * Remove the leading hash signs to enable. 644 * 645 * The "en" part of the variable name, is dynamic and can be any langcode of 646 * any added language. (eg locale_custom_strings_de for german). 647 */ 648 # $settings['locale_custom_strings_en'][''] = [ 649 # 'Home' => 'Front page', 650 # '@count min' => '@count minutes', 651 # ]; 652 653 /** 654 * A custom theme for the offline page: 655 * 656 * This applies when the site is explicitly set to maintenance mode through the 657 * administration page or when the database is inactive due to an error. 658 * The template file should also be copied into the theme. It is located inside 659 * 'core/modules/system/templates/maintenance-page.html.twig'. 660 * 661 * Note: This setting does not apply to installation and update pages. 662 */ 663 # $settings['maintenance_theme'] = 'claro'; 664 665 /** 666 * PHP settings: 667 * 668 * To see what PHP settings are possible, including whether they can be set at 669 * runtime (by using ini_set()), read the PHP documentation: 670 * http://php.net/manual/ini.list.php 671 * See \Drupal\Core\DrupalKernel::bootEnvironment() for required runtime 672 * settings and the .htaccess file for non-runtime settings. 673 * Settings defined there should not be duplicated here so as to avoid conflict 674 * issues. 675 */ 676 677 /** 678 * If you encounter a situation where users post a large amount of text, and 679 * the result is stripped out upon viewing but can still be edited, Drupal's 680 * output filter may not have sufficient memory to process it. If you 681 * experience this issue, you may wish to uncomment the following two lines 682 * and increase the limits of these variables. For more information, see 683 * http://php.net/manual/pcre.configuration.php. 684 */ 685 # ini_set('pcre.backtrack_limit', 200000); 686 # ini_set('pcre.recursion_limit', 200000); 687 688 /** 689 * Configuration overrides. 690 * 691 * To globally override specific configuration values for this site, 692 * set them here. You usually don't need to use this feature. This is 693 * useful in a configuration file for a vhost or directory, rather than 694 * the default settings.php. 695 * 696 * Note that any values you provide in these variable overrides will not be 697 * viewable from the Drupal administration interface. The administration 698 * interface displays the values stored in configuration so that you can stage 699 * changes to other environments that don't have the overrides. 700 * 701 * There are particular configuration values that are risky to override. For 702 * example, overriding the list of installed modules in 'core.extension' is not 703 * supported as module install or uninstall has not occurred. Other examples 704 * include field storage configuration, because it has effects on database 705 * structure, and 'core.menu.static_menu_link_overrides' since this is cached in 706 * a way that is not config override aware. Also, note that changing 707 * configuration values in settings.php will not fire any of the configuration 708 * change events. 709 */ 710 # $config['system.site']['name'] = 'My Drupal site'; 711 # $config['user.settings']['anonymous'] = 'Visitor'; 712 713 /** 714 * Load services definition file. 715 */ 716 $settings['container_yamls'][] = $app_root . '/' . $site_path . '/services.yml'; 717 718 /** 719 * Override the default service container class. 720 * 721 * This is useful for example to trace the service container for performance 722 * tracking purposes, for testing a service container with an error condition or 723 * to test a service container that throws an exception. 724 */ 725 # $settings['container_base_class'] = '\Drupal\Core\DependencyInjection\Container'; 726 727 /** 728 * Override the default yaml parser class. 729 * 730 * Provide a fully qualified class name here if you would like to provide an 731 * alternate implementation YAML parser. The class must implement the 732 * \Drupal\Component\Serialization\SerializationInterface interface. 733 */ 734 # $settings['yaml_parser_class'] = NULL; 735 736 /** 737 * Trusted host configuration. 738 * 739 * Drupal core can use the Symfony trusted host mechanism to prevent HTTP Host 740 * header spoofing. 741 * 742 * To enable the trusted host mechanism, you enable your allowable hosts 743 * in $settings['trusted_host_patterns']. This should be an array of regular 744 * expression patterns, without delimiters, representing the hosts you would 745 * like to allow. 746 * 747 * For example: 748 * @code 749 * $settings['trusted_host_patterns'] = [ 750 * '^www\.example\.com$', 751 * ]; 752 * @endcode 753 * will allow the site to only run from www.example.com. 754 * 755 * If you are running multisite, or if you are running your site from 756 * different domain names (eg, you don't redirect http://www.example.com to 757 * http://example.com), you should specify all of the host patterns that are 758 * allowed by your site. 759 * 760 * For example: 761 * @code 762 * $settings['trusted_host_patterns'] = [ 763 * '^example\.com$', 764 * '^.+\.example\.com$', 765 * '^example\.org$', 766 * '^.+\.example\.org$', 767 * ]; 768 * @endcode 769 * will allow the site to run off of all variants of example.com and 770 * example.org, with all subdomains included. 771 * 772 * @see https://www.drupal.org/docs/installing-drupal/trusted-host-settings 773 */ 774 # $settings['trusted_host_patterns'] = []; 775 776 /** 777 * The default list of directories that will be ignored by Drupal's file API. 778 * 779 * By default ignore node_modules and bower_components folders to avoid issues 780 * with common frontend tools and recursive scanning of directories looking for 781 * extensions. 782 * 783 * @see \Drupal\Core\File\FileSystemInterface::scanDirectory() 784 * @see \Drupal\Core\Extension\ExtensionDiscovery::scanDirectory() 785 */ 786 $settings['file_scan_ignore_directories'] = [ 787 'node_modules', 788 'bower_components', 789 ]; 790 791 /** 792 * The default number of entities to update in a batch process. 793 * 794 * This is used by update and post-update functions that need to go through and 795 * change all the entities on a site, so it is useful to increase this number 796 * if your hosting configuration (i.e. RAM allocation, CPU speed) allows for a 797 * larger number of entities to be processed in a single batch run. 798 */ 799 $settings['entity_update_batch_size'] = 50; 800 801 /** 802 * Entity update backup. 803 * 804 * This is used to inform the entity storage handler that the backup tables as 805 * well as the original entity type and field storage definitions should be 806 * retained after a successful entity update process. 807 */ 808 $settings['entity_update_backup'] = TRUE; 809 810 /** 811 * Node migration type. 812 * 813 * This is used to force the migration system to use the classic node migrations 814 * instead of the default complete node migrations. The migration system will 815 * use the classic node migration only if there are existing migrate_map tables 816 * for the classic node migrations and they contain data. These tables may not 817 * exist if you are developing custom migrations and do not want to use the 818 * complete node migrations. Set this to TRUE to force the use of the classic 819 * node migrations. 820 */ 821 $settings['migrate_node_migrate_type_classic'] = FALSE; 822 823 /** 824 * The default settings for migration sources. 825 * 826 * These settings are used as the default settings on the Credential form at 827 * /upgrade/credentials. 828 * 829 * - migrate_source_version - The version of the source database. This can be 830 * '6' or '7'. Defaults to '7'. 831 * - migrate_source_connection - The key in the $databases array for the source 832 * site. 833 * - migrate_file_public_path - The location of the source Drupal 6 or Drupal 7 834 * public files. This can be a local file directory containing the source 835 * Drupal 6 or Drupal 7 site (e.g /var/www/docroot), or the site address 836 * (e.g http://example.com). 837 * - migrate_file_private_path - The location of the source Drupal 7 private 838 * files. This can be a local file directory containing the source Drupal 7 839 * site (e.g /var/www/docroot), or empty to use the same value as Public 840 * files directory. 841 * 842 * Sample configuration for a drupal 6 source site with the source files in a 843 * local directory. 844 * 845 * @code 846 * $settings['migrate_source_version'] = '6'; 847 * $settings['migrate_source_connection'] = 'migrate'; 848 * $settings['migrate_file_public_path'] = '/var/www/drupal6'; 849 * @endcode 850 * 851 * Sample configuration for a drupal 7 source site with public source files on 852 * the source site and the private files in a local directory. 853 * 854 * @code 855 * $settings['migrate_source_version'] = '7'; 856 * $settings['migrate_source_connection'] = 'migrate'; 857 * $settings['migrate_file_public_path'] = 'https://drupal7.com'; 858 * $settings['migrate_file_private_path'] = '/var/www/drupal7'; 859 * @endcode 860 */ 861 # $settings['migrate_source_connection'] = ''; 862 # $settings['migrate_source_version'] = ''; 863 # $settings['migrate_file_public_path'] = ''; 864 # $settings['migrate_file_private_path'] = ''; 865 866 // Automatically generated include for settings managed by ddev. 867 if (getenv('IS_DDEV_PROJECT') == 'true' && file_exists(__DIR__ . '/settings.ddev.php')) { 868 include __DIR__ . '/settings.ddev.php'; 869 } 870 871 /** 872 * Load local development override configuration, if available. 873 * 874 * Create a settings.local.php file to override variables on secondary (staging, 875 * development, etc.) installations of this site. 876 * 877 * Typical uses of settings.local.php include: 878 * - Disabling caching. 879 * - Disabling JavaScript/CSS compression. 880 * - Rerouting outgoing emails. 881 * 882 * Keep this code block at the end of this file to take full effect. 883 */ 884 # 885 # if (file_exists($app_root . '/' . $site_path . '/settings.local.php')) { 886 # include $app_root . '/' . $site_path . '/settings.local.php'; 887 # }