page actualités vignettes
This commit is contained in:
@@ -36,6 +36,22 @@ parameters:
|
||||
# @default none
|
||||
# cookie_domain: '.example.com'
|
||||
#
|
||||
# Set the session ID string length. The length can be between 22 to 256. The
|
||||
# PHP recommended value is 48. See
|
||||
# https://www.php.net/manual/session.security.ini.php for more information.
|
||||
# This value should be kept in sync with
|
||||
# \Drupal\Core\Session\SessionConfiguration::__construct()
|
||||
# @default 48
|
||||
sid_length: 48
|
||||
#
|
||||
# Set the number of bits in encoded session ID character. The possible
|
||||
# values are '4' (0-9, a-f), '5' (0-9, a-v), and '6' (0-9, a-z, A-Z, "-",
|
||||
# ","). The PHP recommended value is 6. See
|
||||
# https://www.php.net/manual/session.security.ini.php for more information.
|
||||
# This value should be kept in sync with
|
||||
# \Drupal\Core\Session\SessionConfiguration::__construct()
|
||||
# @default 6
|
||||
sid_bits_per_character: 6
|
||||
twig.config:
|
||||
# Twig debugging:
|
||||
#
|
||||
|
@@ -1,6 +1,6 @@
|
||||
<?php
|
||||
|
||||
// @codingStandardsIgnoreFile
|
||||
// phpcs:ignoreFile
|
||||
|
||||
/**
|
||||
* @file
|
||||
@@ -308,16 +308,18 @@ $settings['hash_salt'] = '';
|
||||
$settings['update_free_access'] = FALSE;
|
||||
|
||||
/**
|
||||
* Fallback to HTTP for Update Manager.
|
||||
* Fallback to HTTP for Update Manager and for fetching security advisories.
|
||||
*
|
||||
* If your Drupal site fails to connect to updates.drupal.org using HTTPS to
|
||||
* fetch Drupal core, module and theme update status, you may uncomment this
|
||||
* setting and set it to TRUE to allow an insecure fallback to HTTP. Note that
|
||||
* doing so will open your site up to a potential man-in-the-middle attack. You
|
||||
* should instead attempt to resolve the issues before enabling this option.
|
||||
* If your site fails to connect to updates.drupal.org over HTTPS (either when
|
||||
* fetching data on available updates, or when fetching the feed of critical
|
||||
* security announcements), you may uncomment this setting and set it to TRUE to
|
||||
* allow an insecure fallback to HTTP. Note that doing so will open your site up
|
||||
* to a potential man-in-the-middle attack. You should instead attempt to
|
||||
* resolve the issues before enabling this option.
|
||||
* @see https://www.drupal.org/docs/system-requirements/php-requirements#openssl
|
||||
* @see https://en.wikipedia.org/wiki/Man-in-the-middle_attack
|
||||
* @see \Drupal\update\UpdateFetcher
|
||||
* @see \Drupal\system\SecurityAdvisories\SecurityAdvisoriesFetcher
|
||||
*/
|
||||
# $settings['update_fetch_with_http_fallback'] = TRUE;
|
||||
|
||||
@@ -385,17 +387,20 @@ $settings['update_free_access'] = FALSE;
|
||||
* Sets which headers to trust from your reverse proxy.
|
||||
*
|
||||
* Common values are:
|
||||
* - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL
|
||||
* - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR
|
||||
* - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST
|
||||
* - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT
|
||||
* - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO
|
||||
* - \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED
|
||||
*
|
||||
* Note the default value of
|
||||
* @code
|
||||
* \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL | \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED
|
||||
* \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO | \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED
|
||||
* @endcode
|
||||
* is not secure by default. The value should be set to only the specific
|
||||
* headers the reverse proxy uses. For example:
|
||||
* @code
|
||||
* \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL
|
||||
* \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO
|
||||
* @endcode
|
||||
* This would trust the following headers:
|
||||
* - X_FORWARDED_FOR
|
||||
@@ -403,11 +408,14 @@ $settings['update_free_access'] = FALSE;
|
||||
* - X_FORWARDED_PROTO
|
||||
* - X_FORWARDED_PORT
|
||||
*
|
||||
* @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL
|
||||
* @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR
|
||||
* @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST
|
||||
* @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT
|
||||
* @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO
|
||||
* @see \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED
|
||||
* @see \Symfony\Component\HttpFoundation\Request::setTrustedProxies
|
||||
*/
|
||||
# $settings['reverse_proxy_trusted_headers'] = \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL | \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED;
|
||||
# $settings['reverse_proxy_trusted_headers'] = \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_FOR | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_HOST | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PORT | \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_PROTO | \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED;
|
||||
|
||||
|
||||
/**
|
||||
@@ -603,6 +611,21 @@ $settings['update_free_access'] = FALSE;
|
||||
# ini_set('pcre.backtrack_limit', 200000);
|
||||
# ini_set('pcre.recursion_limit', 200000);
|
||||
|
||||
/**
|
||||
* Add Permissions-Policy header to disable Google FLoC.
|
||||
*
|
||||
* By default, Drupal sends the 'Permissions-Policy: interest-cohort=()' header
|
||||
* to disable Google's Federated Learning of Cohorts feature, introduced in
|
||||
* Chrome 89.
|
||||
*
|
||||
* See https://en.wikipedia.org/wiki/Federated_Learning_of_Cohorts for more
|
||||
* information about FLoC.
|
||||
*
|
||||
* If you don't wish to disable FLoC in Chrome, you can set this value
|
||||
* to FALSE.
|
||||
*/
|
||||
# $settings['block_interest_cohort'] = TRUE;
|
||||
|
||||
/**
|
||||
* Configuration overrides.
|
||||
*
|
||||
|
Reference in New Issue
Block a user