2011-01-31 20:55:26 +01:00
|
|
|
<?php
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright 2011 Facebook, Inc.
|
|
|
|
*
|
|
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
* you may not use this file except in compliance with the License.
|
|
|
|
* You may obtain a copy of the License at
|
|
|
|
*
|
|
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
*
|
|
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
* See the License for the specific language governing permissions and
|
|
|
|
* limitations under the License.
|
|
|
|
*/
|
|
|
|
|
|
|
|
return array(
|
|
|
|
|
|
|
|
// The root URI which Phabricator is installed on.
|
|
|
|
// Example: "http://phabricator.example.com/"
|
|
|
|
'phabricator.base-uri' => null,
|
|
|
|
|
2011-02-06 07:36:21 +01:00
|
|
|
// The Conduit URI for API access to this install. Normally this is just
|
|
|
|
// the 'base-uri' plus "/api/" (e.g. "http://phabricator.example.com/api/"),
|
|
|
|
// but make sure you specify 'https' if you have HTTPS configured.
|
|
|
|
'phabricator.conduit-uri' => null,
|
2011-01-31 20:55:26 +01:00
|
|
|
|
|
|
|
'phabricator.csrf-key' => '0b7ec0592e0a2829d8b71df2fa269b2c6172eca3',
|
2011-02-05 21:20:18 +01:00
|
|
|
|
2011-02-05 20:45:13 +01:00
|
|
|
'phabricator.version' => 'UNSTABLE',
|
2011-01-31 20:55:26 +01:00
|
|
|
|
2011-02-06 20:53:46 +01:00
|
|
|
// The default PHID for users who haven't uploaded a profile image. It should
|
|
|
|
// be 50x50px.
|
2011-02-05 20:45:13 +01:00
|
|
|
'user.default-profile-image-phid' => 'PHID-FILE-f57aaefce707fc4060ef',
|
|
|
|
|
|
|
|
// When email is sent, try to hand it off to the MTA immediately. The only
|
|
|
|
// reason to disable this is if your MTA infrastructure is completely
|
|
|
|
// terrible. If you disable this option, you must run the 'metamta_mta.php'
|
|
|
|
// daemon or mail won't be handed off to the MTA.
|
|
|
|
'metamta.send-immediately' => true,
|
2011-02-08 06:08:32 +01:00
|
|
|
|
2011-02-06 23:22:09 +01:00
|
|
|
// "Reply-To" email address to use for no-reply emails.
|
|
|
|
'metamta.noreply' => 'noreply@example.com',
|
2011-02-05 20:45:13 +01:00
|
|
|
|
2011-02-08 06:08:32 +01:00
|
|
|
'metamta.mail-adapter' =>
|
|
|
|
'PhabricatorMailImplementationPHPMailerLiteAdapter',
|
|
|
|
|
|
|
|
'amazon-ses.access-key' => null,
|
|
|
|
'amazon-ses.secret-key' => null,
|
|
|
|
|
2011-02-05 20:45:13 +01:00
|
|
|
|
2011-02-06 20:53:46 +01:00
|
|
|
// -- Access Control -------------------------------------------------------- //
|
|
|
|
|
|
|
|
// Phabricator users have one of three access levels: "anyone", "verified",
|
|
|
|
// or "admin". "anyone" means every user, including users who do not have
|
|
|
|
// accounts or are not logged into the system. "verified" is users who have
|
|
|
|
// accounts, are logged in, and have satisfied whatever verification steps
|
|
|
|
// the configuration requires (e.g., email verification and/or manual
|
|
|
|
// approval). "admin" is verified users with the "administrator" flag set.
|
|
|
|
|
|
|
|
// These configuration options control which access level is required to read
|
|
|
|
// data from Phabricator (e.g., view revisions and comments in Differential)
|
|
|
|
// and write data to Phabricator (e.g., upload files and create diffs). By
|
|
|
|
// default they are both set to "verified", meaning only verified user
|
|
|
|
// accounts can interact with the system in any meaningful way.
|
|
|
|
|
|
|
|
// If you are configuring an install for an open source project, you may
|
|
|
|
// want to reduce the "phabricator.read-access" requirement to "anyone". This
|
|
|
|
// will allow anyone to browse Phabricator content, even without logging in.
|
|
|
|
|
|
|
|
// Alternatively, you could raise the "phabricator.write-access" requirement
|
|
|
|
// to "admin", effectively creating a read-only install.
|
|
|
|
|
|
|
|
|
|
|
|
// Controls the minimum access level required to read data from Phabricator
|
|
|
|
// (e.g., view revisions in Differential). Allowed values are "anyone",
|
|
|
|
// "verified", or "admin". Note that "anyone" includes users who are not
|
|
|
|
// logged in! You should leave this at 'verified' unless you want your data
|
|
|
|
// to be publicly readable (e.g., you are developing open source software).
|
|
|
|
'phabricator.read-access' => 'verified',
|
|
|
|
|
|
|
|
// Controls the minimum access level required to write data to Phabricator
|
|
|
|
// (e.g., create new revisions in Differential). Allowed values are
|
|
|
|
// "verified" or "admin". Setting this to "admin" will effectively create a
|
|
|
|
// read-only install.
|
|
|
|
'phabricator.write-access' => 'verified',
|
|
|
|
|
|
|
|
|
2011-02-05 20:45:13 +01:00
|
|
|
// -- DarkConsole ----------------------------------------------------------- //
|
|
|
|
|
|
|
|
// DarkConsole is a administrative debugging/profiling tool built into
|
|
|
|
// Phabricator. You can leave it disabled unless you're developing against
|
|
|
|
// Phabricator.
|
2011-02-05 21:20:18 +01:00
|
|
|
|
2011-02-05 20:45:13 +01:00
|
|
|
// Determines whether or not DarkConsole is available. DarkConsole exposes
|
|
|
|
// some data like queries and stack traces, so you should be careful about
|
|
|
|
// turning it on in production (although users can not normally see it, even
|
|
|
|
// if the deployment configuration enables it).
|
|
|
|
'darkconsole.enabled' => true,
|
2011-02-05 21:20:18 +01:00
|
|
|
|
2011-02-05 20:45:13 +01:00
|
|
|
// Always enable DarkConsole, even for logged out users. This potentially
|
|
|
|
// exposes sensitive information to users, so make sure untrusted users can
|
|
|
|
// not access an install running in this mode. You should definitely leave
|
|
|
|
// this off in production. It is only really useful for using DarkConsole
|
|
|
|
// utilties to debug or profile logged-out pages. You must set
|
|
|
|
// 'darkconsole.enabled' to use this option.
|
|
|
|
'darkconsole.always-on' => false,
|
|
|
|
|
2011-02-01 01:50:08 +01:00
|
|
|
|
|
|
|
// -- MySQL --------------------------------------------------------------- //
|
|
|
|
|
|
|
|
// The username to use when connecting to MySQL.
|
|
|
|
'mysql.user' => 'root',
|
2011-02-02 00:52:04 +01:00
|
|
|
|
2011-02-01 01:50:08 +01:00
|
|
|
// The password to use when connecting to MySQL.
|
|
|
|
'mysql.pass' => '',
|
2011-02-02 00:52:04 +01:00
|
|
|
|
2011-02-01 01:50:08 +01:00
|
|
|
// The MySQL server to connect to.
|
|
|
|
'mysql.host' => 'localhost',
|
|
|
|
|
|
|
|
|
|
|
|
// -- Facebook ------------------------------------------------------------ //
|
2011-01-31 20:55:26 +01:00
|
|
|
|
|
|
|
// Can users use Facebook credentials to login to Phabricator?
|
|
|
|
'facebook.auth-enabled' => false,
|
|
|
|
|
|
|
|
// The Facebook "Application ID" to use for Facebook API access.
|
|
|
|
'facebook.application-id' => null,
|
|
|
|
|
|
|
|
// The Facebook "Application Secret" to use for Facebook API access.
|
|
|
|
'facebook.application-secret' => null,
|
|
|
|
|
2011-02-01 01:50:08 +01:00
|
|
|
|
|
|
|
// -- Recaptcha ------------------------------------------------------------- //
|
|
|
|
|
|
|
|
// Is Recaptcha enabled? If disabled, captchas will not appear.
|
|
|
|
'recaptcha.enabled' => false,
|
2011-02-02 00:52:04 +01:00
|
|
|
|
2011-02-01 01:50:08 +01:00
|
|
|
// Your Recaptcha public key, obtained from Recaptcha.
|
2011-01-31 20:55:26 +01:00
|
|
|
'recaptcha.public-key' => null,
|
2011-02-02 00:52:04 +01:00
|
|
|
|
2011-02-01 01:50:08 +01:00
|
|
|
// Your Recaptcha private key, obtained from Recaptcha.
|
2011-01-31 20:55:26 +01:00
|
|
|
'recaptcha.private-key' => null,
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
);
|