mirror of
https://we.phorge.it/source/phorge.git
synced 2024-12-23 22:10:55 +01:00
bd3a14f248
Summary: Implements an S3 storage engine option for Phabricator. Test Plan: - Uploaded files to S3. - Looked at them. - Verified they appeared in S3 using the S3 file browser. Reviewed By: jungejason Reviewers: jungejason, tuomaspelkonen, aran CC: aran, jungejason Differential Revision: 752
580 lines
26 KiB
PHP
580 lines
26 KiB
PHP
<?php
|
|
|
|
/*
|
|
* Copyright 2011 Facebook, Inc.
|
|
*
|
|
* Licensed under the Apache License, Version 2.0 (the "License");
|
|
* you may not use this file except in compliance with the License.
|
|
* You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS,
|
|
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
* See the License for the specific language governing permissions and
|
|
* limitations under the License.
|
|
*/
|
|
|
|
return array(
|
|
|
|
// The root URI which Phabricator is installed on.
|
|
// Example: "http://phabricator.example.com/"
|
|
'phabricator.base-uri' => null,
|
|
|
|
// If you have multiple environments, provide the production environment URI
|
|
// here so that emails, etc., generated in development/sandbox environments
|
|
// contain the right links.
|
|
'phabricator.production-uri' => null,
|
|
|
|
// Setting this to 'true' will invoke a special setup mode which helps guide
|
|
// you through setting up Phabricator.
|
|
'phabricator.setup' => false,
|
|
|
|
// The default PHID for users who haven't uploaded a profile image. It should
|
|
// be 50x50px.
|
|
'user.default-profile-image-phid' => 'PHID-FILE-4d61229816cfe6f2b2a3',
|
|
|
|
// -- DarkConsole ----------------------------------------------------------- //
|
|
|
|
// DarkConsole is a administrative debugging/profiling tool built into
|
|
// Phabricator. You can leave it disabled unless you're developing against
|
|
// Phabricator.
|
|
|
|
// Determines whether or not DarkConsole is available. DarkConsole exposes
|
|
// some data like queries and stack traces, so you should be careful about
|
|
// turning it on in production (although users can not normally see it, even
|
|
// if the deployment configuration enables it).
|
|
'darkconsole.enabled' => false,
|
|
|
|
// Always enable DarkConsole, even for logged out users. This potentially
|
|
// exposes sensitive information to users, so make sure untrusted users can
|
|
// not access an install running in this mode. You should definitely leave
|
|
// this off in production. It is only really useful for using DarkConsole
|
|
// utilties to debug or profile logged-out pages. You must set
|
|
// 'darkconsole.enabled' to use this option.
|
|
'darkconsole.always-on' => false,
|
|
|
|
|
|
// Allows you to mask certain configuration values from appearing in the
|
|
// "Config" tab of DarkConsole.
|
|
'darkconsole.config-mask' => array(
|
|
'mysql.pass',
|
|
'amazon-ses.secret-key',
|
|
'recaptcha.private-key',
|
|
'phabricator.csrf-key',
|
|
'facebook.application-secret',
|
|
'github.application-secret',
|
|
),
|
|
|
|
// -- MySQL --------------------------------------------------------------- //
|
|
|
|
// The username to use when connecting to MySQL.
|
|
'mysql.user' => 'root',
|
|
|
|
// The password to use when connecting to MySQL.
|
|
'mysql.pass' => '',
|
|
|
|
// The MySQL server to connect to. If you want to connect to a different
|
|
// port than the default (which is 3306), specify it in the hostname
|
|
// (e.g., db.example.com:1234).
|
|
'mysql.host' => 'localhost',
|
|
|
|
// -- Email ----------------------------------------------------------------- //
|
|
|
|
// Some Phabricator tools send email notifications, e.g. when Differential
|
|
// revisions are updated or Maniphest tasks are changed. These options allow
|
|
// you to configure how email is delivered.
|
|
|
|
// You can test your mail setup by going to "MetaMTA" in the web interface,
|
|
// clicking "Send New Message", and then composing a message.
|
|
|
|
// Default address to send mail "From".
|
|
'metamta.default-address' => 'noreply@example.com',
|
|
|
|
// Domain used to generate Message-IDs.
|
|
'metamta.domain' => 'example.com',
|
|
|
|
// When a user takes an action which generates an email notification (like
|
|
// commenting on a Differential revision), Phabricator can either send that
|
|
// mail "From" the user's email address (like "alincoln@logcabin.com") or
|
|
// "From" the 'metamta.default-address' address. The user experience is
|
|
// generally better if Phabricator uses the user's real address as the "From"
|
|
// since the messages are easier to organize when they appear in mail clients,
|
|
// but this will only work if the server is authorized to send email on behalf
|
|
// of the "From" domain. Practically, this means:
|
|
// - If you are doing an install for Example Corp and all the users will
|
|
// have corporate @corp.example.com addresses and any hosts Phabricator
|
|
// is running on are authorized to send email from corp.example.com,
|
|
// you can enable this to make the user experience a little better.
|
|
// - If you are doing an install for an open source project and your
|
|
// users will be registering via Facebook and using personal email
|
|
// addresses, you MUST NOT enable this or virtually all of your outgoing
|
|
// email will vanish into SFP blackholes.
|
|
// - If your install is anything else, you're much safer leaving this
|
|
// off since the risk in turning it on is that your outgoing mail will
|
|
// mostly never arrive.
|
|
'metamta.can-send-as-user' => false,
|
|
|
|
// Adapter class to use to transmit mail to the MTA. The default uses
|
|
// PHPMailerLite, which will invoke "sendmail". This is appropriate
|
|
// if sendmail actually works on your host, but if you haven't configured mail
|
|
// it may not be so great. You can also use Amazon SES, by changing this to
|
|
// 'PhabricatorMailImplementationAmazonSESAdapter', signing up for SES, and
|
|
// filling in your 'amazon-ses.access-key' and 'amazon-ses.secret-key' below.
|
|
'metamta.mail-adapter' =>
|
|
'PhabricatorMailImplementationPHPMailerLiteAdapter',
|
|
|
|
// When email is sent, try to hand it off to the MTA immediately. This may
|
|
// be worth disabling if your MTA infrastructure is slow or unreliable. If you
|
|
// disable this option, you must run the 'metamta_mta.php' daemon or mail
|
|
// won't be handed off to the MTA. If you're using Amazon SES it can be a
|
|
// little slugish sometimes so it may be worth disabling this and moving to
|
|
// the daemon after you've got your install up and running. If you have a
|
|
// properly configured local MTA it should not be necessary to disable this.
|
|
'metamta.send-immediately' => true,
|
|
|
|
// If you're using Amazon SES to send email, provide your AWS access key
|
|
// and AWS secret key here. To set up Amazon SES with Phabricator, you need
|
|
// to:
|
|
// - Make sure 'metamta.mail-adapter' is set to:
|
|
// "PhabricatorMailImplementationAmazonSESAdapter"
|
|
// - Make sure 'metamta.can-send-as-user' is false.
|
|
// - Make sure 'metamta.default-address' is configured to something sensible.
|
|
// - Make sure 'metamta.default-address' is a validated SES "From" address.
|
|
'amazon-ses.access-key' => null,
|
|
'amazon-ses.secret-key' => null,
|
|
|
|
// If you're using Sendgrid to send email, provide your access credentials
|
|
// here. This will use the REST API. You can also use Sendgrid as a normal
|
|
// SMTP service.
|
|
'sendgrid.api-user' => null,
|
|
'sendgrid.api-key' => null,
|
|
|
|
// You can configure a reply handler domain so that email sent from Maniphest
|
|
// will have a special "Reply To" address like "T123+82+af19f@example.com"
|
|
// that allows recipients to reply by email and interact with tasks. For
|
|
// instructions on configurating reply handlers, see the article
|
|
// "Configuring Inbound Email" in the Phabricator documentation. By default,
|
|
// this is set to 'null' and Phabricator will use a generic 'noreply@' address
|
|
// or the address of the acting user instead of a special reply handler
|
|
// address (see 'metamta.default-address'). If you set a domain here,
|
|
// Phabricator will begin generating private reply handler addresses. See
|
|
// also 'metamta.maniphest.reply-handler' to further configure behavior.
|
|
// This key should be set to the domain part after the @, like "example.com".
|
|
'metamta.maniphest.reply-handler-domain' => null,
|
|
|
|
// You can follow the instructions in "Configuring Inbound Email" in the
|
|
// Phabricator documentation and set 'metamta.maniphest.reply-handler-domain'
|
|
// to support updating Maniphest tasks by email. If you want more advanced
|
|
// customization than this provides, you can override the reply handler
|
|
// class with an implementation of your own. This will allow you to do things
|
|
// like have a single public reply handler or change how private reply
|
|
// handlers are generated and validated.
|
|
// This key should be set to a loadable subclass of
|
|
// PhabricatorMailReplyHandler (and possibly of ManiphestReplyHandler).
|
|
'metamta.maniphest.reply-handler' => 'ManiphestReplyHandler',
|
|
|
|
// Prefix prepended to mail sent by Maniphest. You can change this to
|
|
// distinguish between testing and development installs, for example.
|
|
'metamta.maniphest.subject-prefix' => '[Maniphest]',
|
|
|
|
// See 'metamta.maniphest.reply-handler-domain'. This does the same thing,
|
|
// but allows email replies via Differential.
|
|
'metamta.differential.reply-handler-domain' => null,
|
|
|
|
// See 'metamta.maniphest.reply-handler'. This does the same thing, but
|
|
// affects Differential.
|
|
'metamta.differential.reply-handler' => 'DifferentialReplyHandler',
|
|
|
|
// Prefix prepended to mail sent by Differential.
|
|
'metamta.differential.subject-prefix' => '[Differential]',
|
|
|
|
// By default, Phabricator generates unique reply-to addresses and sends a
|
|
// separate email to each recipient when you enable reply handling. This is
|
|
// more secure than using "From" to establish user identity, but can mean
|
|
// users may receive multiple emails when they are on mailing lists. Instead,
|
|
// you can use a single, non-unique reply to address and authenticate users
|
|
// based on the "From" address by setting this to 'true'. This trades away
|
|
// a little bit of security for convenience, but it's reasonable in many
|
|
// installs. Object interactions are still protected using hashes in the
|
|
// single public email address, so objects can not be replied to blindly.
|
|
'metamta.public-replies' => false,
|
|
|
|
// You can configure an email address like "bugs@phabricator.example.com"
|
|
// which will automatically create Maniphest tasks when users send email
|
|
// to it. This relies on the "From" address to authenticate users, so it is
|
|
// is not completely secure. To set this up, enter a complete email
|
|
// address like "bugs@phabricator.example.com" and then configure mail to
|
|
// that address so it routed to Phabricator (if you've already configured
|
|
// reply handlers, you're probably already done). See "Configuring Inbound
|
|
// Email" in the documentation for more information.
|
|
'metamta.maniphest.public-create-email' => null,
|
|
|
|
|
|
// -- Auth ------------------------------------------------------------------ //
|
|
|
|
// Can users login with a username/password, or by following the link from
|
|
// a password reset email? You can disable this and configure one or more
|
|
// OAuth providers instead.
|
|
'auth.password-auth-enabled' => true,
|
|
|
|
// Maximum number of simultaneous web sessions each user is permitted to have.
|
|
// Setting this to "1" will prevent a user from logging in on more than one
|
|
// browser at the same time.
|
|
'auth.sessions.web' => 5,
|
|
|
|
// Maximum number of simultaneous Conduit sessions each user is permitted
|
|
// to have.
|
|
'auth.sessions.conduit' => 3,
|
|
|
|
// Set this true to enable the Settings -> SSH Public Keys panel, which will
|
|
// allow users to associated SSH public keys with their accounts. This is only
|
|
// really useful if you're setting up services over SSH and want to use
|
|
// Phabricator for authentication; in most situations you can leave this
|
|
// disabled.
|
|
'auth.sshkeys.enabled' => false,
|
|
|
|
|
|
// -- Accounts -------------------------------------------------------------- //
|
|
|
|
// Is basic account information (email, real name, profile picture) editable?
|
|
// If you set up Phabricator to automatically synchronize account information
|
|
// from some other authoritative system, you can disable this to ensure
|
|
// information remains consistent across both systems.
|
|
'account.editable' => true,
|
|
|
|
|
|
// -- Facebook ------------------------------------------------------------ //
|
|
|
|
// Can users use Facebook credentials to login to Phabricator?
|
|
'facebook.auth-enabled' => false,
|
|
|
|
// Can users use Facebook credentials to create new Phabricator accounts?
|
|
'facebook.registration-enabled' => true,
|
|
|
|
// Are Facebook accounts permanently linked to Phabricator accounts, or can
|
|
// the user unlink them?
|
|
'facebook.auth-permanent' => false,
|
|
|
|
// The Facebook "Application ID" to use for Facebook API access.
|
|
'facebook.application-id' => null,
|
|
|
|
// The Facebook "Application Secret" to use for Facebook API access.
|
|
'facebook.application-secret' => null,
|
|
|
|
|
|
// -- Github ---------------------------------------------------------------- //
|
|
|
|
// Can users use Github credentials to login to Phabricator?
|
|
'github.auth-enabled' => false,
|
|
|
|
// Can users use Github credentials to create new Phabricator accounts?
|
|
'github.registration-enabled' => true,
|
|
|
|
// Are Github accounts permanently linked to Phabricator accounts, or can
|
|
// the user unlink them?
|
|
'github.auth-permanent' => false,
|
|
|
|
// The Github "Client ID" to use for Github API access.
|
|
'github.application-id' => null,
|
|
|
|
// The Github "Secret" to use for Github API access.
|
|
'github.application-secret' => null,
|
|
|
|
|
|
// -- Recaptcha ------------------------------------------------------------- //
|
|
|
|
// Is Recaptcha enabled? If disabled, captchas will not appear.
|
|
'recaptcha.enabled' => false,
|
|
|
|
// Your Recaptcha public key, obtained from Recaptcha.
|
|
'recaptcha.public-key' => null,
|
|
|
|
// Your Recaptcha private key, obtained from Recaptcha.
|
|
'recaptcha.private-key' => null,
|
|
|
|
|
|
// -- Misc ------------------------------------------------------------------ //
|
|
|
|
// This is hashed with other inputs to generate CSRF tokens. If you want, you
|
|
// can change it to some other string which is unique to your install. This
|
|
// will make your install more secure in a vague, mostly theoretical way. But
|
|
// it will take you like 3 seconds of mashing on your keyboard to set it up so
|
|
// you might as well.
|
|
'phabricator.csrf-key' => '0b7ec0592e0a2829d8b71df2fa269b2c6172eca3',
|
|
|
|
// This is hashed with other inputs to generate mail tokens. If you want, you
|
|
// can change it to some other string which is unique to your install. In
|
|
// particular, you will want to do this if you accidentally send a bunch of
|
|
// mail somewhere you shouldn't have, to invalidate all old reply-to
|
|
// addresses.
|
|
'phabricator.mail-key' => '5ce3e7e8787f6e40dfae861da315a5cdf1018f12',
|
|
|
|
// Version string displayed in the footer. You probably should leave this
|
|
// alone.
|
|
'phabricator.version' => 'UNSTABLE',
|
|
|
|
// PHP requires that you set a timezone in your php.ini before using date
|
|
// functions, or it will emit a warning. If this isn't possible (for instance,
|
|
// because you are using HPHP) you can set some valid constant for
|
|
// date_default_timezone_set() here and Phabricator will set it on your
|
|
// behalf, silencing the warning.
|
|
'phabricator.timezone' => null,
|
|
|
|
// -- Files ----------------------------------------------------------------- //
|
|
|
|
// Lists which uploaded file types may be viewed in the browser. If a file
|
|
// has a mime type which does not appear in this list, it will always be
|
|
// downloaded instead of displayed. This is a security consideration: if a
|
|
// user uploads a file of type "text/html" and it is displayed as
|
|
// "text/html", they can easily execute XSS attacks. This is also a usability
|
|
// consideration, since browsers tend to freak out when viewing enormous
|
|
// binary files.
|
|
//
|
|
// The keys in this array are viewable mime types; the values are the mime
|
|
// types they will be delivered as when they are viewed in the browser.
|
|
'files.viewable-mime-types' => array(
|
|
'image/jpeg' => 'image/jpeg',
|
|
'image/jpg' => 'image/jpg',
|
|
'image/png' => 'image/png',
|
|
'image/gif' => 'image/gif',
|
|
'text/plain' => 'text/plain; charset=utf-8',
|
|
),
|
|
|
|
// Phabricator can proxy images from other servers so you can paste the URI
|
|
// to a funny picture of a cat into the comment box and have it show up as an
|
|
// image. However, this means the webserver Phabricator is running on will
|
|
// make HTTP requests to arbitrary URIs. If the server has access to internal
|
|
// resources, this could be a security risk. You should only enable it if you
|
|
// are installed entirely a VPN and VPN access is required to access
|
|
// Phabricator, or if the webserver has no special access to anything. If
|
|
// unsure, it is safer to leave this disabled.
|
|
'files.enable-proxy' => false,
|
|
|
|
|
|
// -- Storage --------------------------------------------------------------- //
|
|
|
|
// Phabricator allows users to upload files, and can keep them in various
|
|
// storage engines. This section allows you to configure which engines
|
|
// Phabricator will use, and how it will use them.
|
|
|
|
// The largest filesize Phabricator will store in the MySQL BLOB storage
|
|
// engine, which just uses a database table to store files. While this isn't a
|
|
// best practice, it's really easy to set up. This is hard-limited by the
|
|
// value of 'max_allowed_packet' in MySQL (since this often defaults to 1MB,
|
|
// the default here is slightly smaller than 1MB). Set this to 0 to disable
|
|
// use of the MySQL blob engine.
|
|
'storage.mysql-engine.max-size' => 1000000,
|
|
|
|
// Phabricator provides a local disk storage engine, which just writes files
|
|
// to some directory on local disk. The webserver must have read/write
|
|
// permissions on this directory. This is straightforward and suitable for
|
|
// most installs, but will not scale past one web frontend unless the path
|
|
// is actually an NFS mount, since you'll end up with some of the files
|
|
// written to each web frontend and no way for them to share. To use the
|
|
// local disk storage engine, specify the path to a directory here. To
|
|
// disable it, specify null.
|
|
'storage.local-disk.path' => null,
|
|
|
|
// If you want to store files in Amazon S3, specify an AWS access and secret
|
|
// key here and a bucket name below.
|
|
'amazon-s3.access-key' => null,
|
|
'amazon-s3.secret-key' => null,
|
|
|
|
// Set this to a valid Amazon S3 bucket to store files there. You must also
|
|
// configure S3 access keys above.
|
|
'storage.s3.bucket' => null,
|
|
|
|
// Phabricator uses a storage engine selector to choose which storage engine
|
|
// to use when writing file data. If you add new storage engines or want to
|
|
// provide very custom rules (e.g., write images to one storage engine and
|
|
// other files to a different one), you can provide an alternate
|
|
// implementation here. The default engine will use choose MySQL, Local Disk,
|
|
// and S3, in that order, if they have valid configurations above and a file
|
|
// fits within configured limits.
|
|
'storage.engine-selector' => 'PhabricatorDefaultFileStorageEngineSelector',
|
|
|
|
// -- Differential ---------------------------------------------------------- //
|
|
|
|
'differential.revision-custom-detail-renderer' => null,
|
|
|
|
// Array for custom remarkup rules. The array should have a list of
|
|
// class names of classes that extend PhutilRemarkupRule
|
|
'differential.custom-remarkup-rules' => null,
|
|
|
|
// Array for custom remarkup block rules. The array should have a list of
|
|
// class names of classes that extend PhutilRemarkupEngineBlockRule
|
|
'differential.custom-remarkup-block-rules' => null,
|
|
|
|
// Set display word-wrap widths for Differential. Specify a dictionary of
|
|
// regular expressions mapping to column widths. The filename will be matched
|
|
// against each regexp in order until one matches. The default configuration
|
|
// uses a width of 100 for Java and 80 for other languages. Note that 80 is
|
|
// the greatest column width of all time. Changes here will not be immediately
|
|
// reflected in old revisions unless you purge the render cache.
|
|
'differential.wordwrap' => array(
|
|
'/\.java$/' => 100,
|
|
'/.*/' => 80,
|
|
),
|
|
|
|
// Class for appending custom fields to be included in the commit
|
|
// messages generated by "arc amend". Should inherit
|
|
// DifferentialCommitMessageModifier
|
|
'differential.modify-commit-message-class' => null,
|
|
|
|
// List of file regexps were whitespace is meaningful and should not
|
|
// use 'ignore-all' by default
|
|
'differential.whitespace-matters' => array(
|
|
'/\.py$/',
|
|
),
|
|
|
|
|
|
// -- Maniphest ------------------------------------------------------------- //
|
|
|
|
'maniphest.enabled' => true,
|
|
|
|
// Array of custom fields for Maniphest tasks. The array should contain
|
|
// arrays of field specifications keyed with 'type', 'label', 'caption',
|
|
// 'required' and whatever specific options exist for the given field
|
|
// type.
|
|
'maniphest.custom-fields' => array(),
|
|
|
|
// -- Remarkup -------------------------------------------------------------- //
|
|
|
|
// If you enable this, linked YouTube videos will be embeded inline. This has
|
|
// mild security implications (you'll leak referrers to YouTube) and is pretty
|
|
// silly (but sort of awesome).
|
|
'remarkup.enable-embedded-youtube' => false,
|
|
|
|
|
|
// -- Garbage Collection ---------------------------------------------------- //
|
|
|
|
// Phabricator generates various logs and caches in the database which can
|
|
// be garbage collected after a while to make the total data size more
|
|
// manageable. To run garbage collection, launch a
|
|
// PhabricatorGarbageCollector daemon.
|
|
|
|
// Since the GC daemon can issue large writes and table scans, you may want to
|
|
// run it only during off hours or make sure it is scheduled so it doesn't
|
|
// overlap with backups. This determines when the daemon can start running
|
|
// each day.
|
|
'gcdaemon.run-at' => '12 AM',
|
|
|
|
// How many seconds after 'gcdaemon.run-at' the daemon may collect garbage
|
|
// for. By default it runs continuously, but you can set it to run for a
|
|
// limited period of time. For instance, if you do backups at 3 AM, you might
|
|
// run garbage collection for an hour beforehand. This is not a high-precision
|
|
// limit so you may want to leave some room for the GC to actually stop, and
|
|
// if you set it to something like 3 seconds you're on your own.
|
|
'gcdaemon.run-for' => 24 * 60 * 60,
|
|
|
|
// These 'ttl' keys configure how much old data the GC daemon keeps around.
|
|
// Objects older than the ttl will be collected. Set any value to 0 to store
|
|
// data indefinitely.
|
|
|
|
'gcdaemon.ttl.herald-transcripts' => 30 * (24 * 60 * 60),
|
|
'gcdaemon.ttl.daemon-logs' => 7 * (24 * 60 * 60),
|
|
'gcdaemon.ttl.differential-parse-cache' => 14 * (24 * 60 * 60),
|
|
|
|
|
|
// -- Feed ------------------------------------------------------------------ //
|
|
|
|
// If you set this to true, you can embed Phabricator activity feeds in other
|
|
// pages using iframes. These feeds are completely public, and a login is not
|
|
// required to view them! This is intended for things like open source
|
|
// projects that want to expose an activity feed on the project homepage.
|
|
'feed.public' => false,
|
|
|
|
|
|
// -- Customization --------------------------------------------------------- //
|
|
|
|
// Paths to additional phutil libraries to load.
|
|
'load-libraries' => array(),
|
|
|
|
'aphront.default-application-configuration-class' =>
|
|
'AphrontDefaultApplicationConfiguration',
|
|
|
|
'controller.oauth-registration' =>
|
|
'PhabricatorOAuthDefaultRegistrationController',
|
|
|
|
|
|
// Directory that phd (the Phabricator daemon control script) should use to
|
|
// track running daemons.
|
|
'phd.pid-directory' => '/var/tmp/phd',
|
|
|
|
// This value is an input to the hash function when building resource hashes.
|
|
// It has no security value, but if you accidentally poison user caches (by
|
|
// pushing a bad patch or having something go wrong with a CDN, e.g.) you can
|
|
// change this to something else and rebuild the Celerity map to break user
|
|
// caches. Unless you are doing Celerity development, it is exceptionally
|
|
// unlikely that you need to modify this.
|
|
'celerity.resource-hash' => 'd9455ea150622ee044f7931dabfa52aa',
|
|
|
|
// In a development environment, it is desirable to force static resources
|
|
// (CSS and JS) to be read from disk on every request, so that edits to them
|
|
// appear when you reload the page even if you haven't updated the resource
|
|
// maps. This setting ensures requests will be verified against the state on
|
|
// disk. Generally, you should leave this off in production (caching behavior
|
|
// and performance improve with it off) but turn it on in development. (These
|
|
// settings are the defaults.)
|
|
'celerity.force-disk-reads' => false,
|
|
|
|
// -- Pygments ------------------------------------------------------------ //
|
|
// Phabricator can highlight PHP by default, but if you want syntax
|
|
// highlighting for other languages you should install the python package
|
|
// 'Pygments', make sure the 'pygmentize' script is available in the
|
|
// $PATH of the webserver, and then enable this.
|
|
'pygments.enabled' => false,
|
|
|
|
// In places that we display a dropdown to syntax-highlight code,
|
|
// this is where that list is defined.
|
|
// Syntax is 'lexer-name' => 'Display Name',
|
|
'pygments.dropdown-choices' => array(
|
|
'apacheconf' => 'Apache Configuration',
|
|
'bash' => 'Bash Scripting',
|
|
'brainfuck' => 'Brainf*ck',
|
|
'c' => 'C',
|
|
'cpp' => 'C++',
|
|
'css' => 'CSS',
|
|
'diff' => 'Diff',
|
|
'django' => 'Django Templating',
|
|
'erb' => 'Embedded Ruby/ERB',
|
|
'erlang' => 'Erlang',
|
|
'html' => 'HTML',
|
|
'infer' => 'Infer from title (extension)',
|
|
'java' => 'Java',
|
|
'js' => 'Javascript',
|
|
'mysql' => 'MySQL',
|
|
'perl' => 'Perl',
|
|
'php' => 'PHP',
|
|
'text' => 'Plain Text',
|
|
'python' => 'Python',
|
|
'rainbow' => 'Rainbow',
|
|
'remarkup' => 'Remarkup',
|
|
'ruby' => 'Ruby',
|
|
'xml' => 'XML',
|
|
),
|
|
|
|
'pygments.dropdown-default' => 'infer',
|
|
|
|
// This is an override list of regular expressions which allows you to choose
|
|
// what language files are highlighted as. If your projects have certain rules
|
|
// about filenames or use unusual or ambiguous language extensions, you can
|
|
// create a mapping here. This is an ordered dictionary of regular expressions
|
|
// which will be tested against the filename. They should map to either an
|
|
// explicit language as a string value, or a numeric index into the captured
|
|
// groups as an integer.
|
|
'syntax.filemap' => array(
|
|
// Example: Treat all '*.xyz' files as PHP.
|
|
// '@\\.xyz$@' => 'php',
|
|
|
|
// Example: Treat 'httpd.conf' as 'apacheconf'.
|
|
// '@/httpd\\.conf$@' => 'apacheconf',
|
|
|
|
// Example: Treat all '*.x.bak' file as '.x'. NOTE: we map to capturing
|
|
// group 1 by specifying the mapping as "1".
|
|
// '@\\.([^.]+)\\.bak$@' => 1,
|
|
),
|
|
|
|
);
|