|
@@ -342,11 +342,10 @@ $settings['update_free_access'] = FALSE;
|
|
|
* configuration requires the IP addresses of all remote proxies to be
|
|
|
* specified in $settings['reverse_proxy_addresses'] to work correctly.
|
|
|
*
|
|
|
- * Enable this setting to get Drupal to determine the client IP from
|
|
|
- * the X-Forwarded-For header (or $settings['reverse_proxy_header'] if set).
|
|
|
- * If you are unsure about this setting, do not have a reverse proxy,
|
|
|
- * or Drupal operates in a shared hosting environment, this setting
|
|
|
- * should remain commented out.
|
|
|
+ * Enable this setting to get Drupal to determine the client IP from the
|
|
|
+ * X-Forwarded-For header. If you are unsure about this setting, do not have a
|
|
|
+ * reverse proxy, or Drupal operates in a shared hosting environment, this
|
|
|
+ * setting should remain commented out.
|
|
|
*
|
|
|
* In order for this setting to be used you must specify every possible
|
|
|
* reverse proxy IP address in $settings['reverse_proxy_addresses'].
|
|
@@ -365,34 +364,35 @@ $settings['update_free_access'] = FALSE;
|
|
|
|
|
|
|
|
|
|
|
|
- * Set this value if your proxy server sends the client IP in a header
|
|
|
- * other than X-Forwarded-For.
|
|
|
- */
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
- * Set this value if your proxy server sends the client protocol in a header
|
|
|
- * other than X-Forwarded-Proto.
|
|
|
- */
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
- * Set this value if your proxy server sends the client protocol in a header
|
|
|
- * other than X-Forwarded-Host.
|
|
|
- */
|
|
|
-
|
|
|
-
|
|
|
-
|
|
|
- * Set this value if your proxy server sends the client protocol in a header
|
|
|
- * other than X-Forwarded-Port.
|
|
|
+ * Reverse proxy trusted headers.
|
|
|
+ *
|
|
|
+ * Sets which headers to trust from your reverse proxy.
|
|
|
+ *
|
|
|
+ * Common values are:
|
|
|
+ * - \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL
|
|
|
+ * - \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED
|
|
|
+ *
|
|
|
+ * Note the default value of
|
|
|
+ * @code
|
|
|
+ * \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL | \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED
|
|
|
+ * @endcode
|
|
|
+ * is not secure by default. The value should be set to only the specific
|
|
|
+ * headers the reverse proxy uses. For example:
|
|
|
+ * @code
|
|
|
+ * \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL
|
|
|
+ * @endcode
|
|
|
+ * This would trust the following headers:
|
|
|
+ * - X_FORWARDED_FOR
|
|
|
+ * - X_FORWARDED_HOST
|
|
|
+ * - X_FORWARDED_PROTO
|
|
|
+ * - X_FORWARDED_PORT
|
|
|
+ *
|
|
|
+ * @see \Symfony\Component\HttpFoundation\Request::HEADER_X_FORWARDED_ALL
|
|
|
+ * @see \Symfony\Component\HttpFoundation\Request::HEADER_FORWARDED
|
|
|
+ * @see \Symfony\Component\HttpFoundation\Request::setTrustedProxies
|
|
|
*/
|
|
|
-
|
|
|
+
|
|
|
|
|
|
-
|
|
|
- * Set this value if your proxy server sends the client protocol in a header
|
|
|
- * other than Forwarded.
|
|
|
- */
|
|
|
-
|
|
|
|
|
|
|
|
|
* Page caching:
|
|
@@ -754,6 +754,15 @@ $settings['file_scan_ignore_directories'] = [
|
|
|
*/
|
|
|
$settings['entity_update_batch_size'] = 50;
|
|
|
|
|
|
+
|
|
|
+ * Entity update backup.
|
|
|
+ *
|
|
|
+ * This is used to inform the entity storage handler that the backup tables as
|
|
|
+ * well as the original entity type and field storage definitions should be
|
|
|
+ * retained after a successful entity update process.
|
|
|
+ */
|
|
|
+$settings['entity_update_backup'] = TRUE;
|
|
|
+
|
|
|
|
|
|
* Load local development override configuration, if available.
|
|
|
*
|