Commit 9a4718081e76f09e6e57105daa76706ec3e31622

Authored by Eduardo Padilla
1 parent 8c7a9c335d
Exists in master

archivo settings.php

Showing 1 changed file with 567 additions and 0 deletions   Show diff stats
sites/default/settings.php
... ... @@ -0,0 +1,567 @@
  1 +<?php
  2 +
  3 +/**
  4 + * @file
  5 + * Drupal site-specific configuration file.
  6 + *
  7 + * IMPORTANT NOTE:
  8 + * This file may have been set to read-only by the Drupal installation program.
  9 + * If you make changes to this file, be sure to protect it again after making
  10 + * your modifications. Failure to remove write permissions to this file is a
  11 + * security risk.
  12 + *
  13 + * The configuration file to be loaded is based upon the rules below. However
  14 + * if the multisite aliasing file named sites/sites.php is present, it will be
  15 + * loaded, and the aliases in the array $sites will override the default
  16 + * directory rules below. See sites/example.sites.php for more information about
  17 + * aliases.
  18 + *
  19 + * The configuration directory will be discovered by stripping the website's
  20 + * hostname from left to right and pathname from right to left. The first
  21 + * configuration file found will be used and any others will be ignored. If no
  22 + * other configuration file is found then the default configuration file at
  23 + * 'sites/default' will be used.
  24 + *
  25 + * For example, for a fictitious site installed at
  26 + * http://www.drupal.org:8080/mysite/test/, the 'settings.php' file is searched
  27 + * for in the following directories:
  28 + *
  29 + * - sites/8080.www.drupal.org.mysite.test
  30 + * - sites/www.drupal.org.mysite.test
  31 + * - sites/drupal.org.mysite.test
  32 + * - sites/org.mysite.test
  33 + *
  34 + * - sites/8080.www.drupal.org.mysite
  35 + * - sites/www.drupal.org.mysite
  36 + * - sites/drupal.org.mysite
  37 + * - sites/org.mysite
  38 + *
  39 + * - sites/8080.www.drupal.org
  40 + * - sites/www.drupal.org
  41 + * - sites/drupal.org
  42 + * - sites/org
  43 + *
  44 + * - sites/default
  45 + *
  46 + * Note that if you are installing on a non-standard port number, prefix the
  47 + * hostname with that number. For example,
  48 + * http://www.drupal.org:8080/mysite/test/ could be loaded from
  49 + * sites/8080.www.drupal.org.mysite.test/.
  50 + *
  51 + * @see example.sites.php
  52 + * @see conf_path()
  53 + */
  54 +
  55 +/**
  56 + * Database settings:
  57 + *
  58 + * The $databases array specifies the database connection or
  59 + * connections that Drupal may use. Drupal is able to connect
  60 + * to multiple databases, including multiple types of databases,
  61 + * during the same request.
  62 + *
  63 + * Each database connection is specified as an array of settings,
  64 + * similar to the following:
  65 + * @code
  66 + * array(
  67 + * 'driver' => 'mysql',
  68 + * 'database' => 'databasename',
  69 + * 'username' => 'username',
  70 + * 'password' => 'password',
  71 + * 'host' => 'localhost',
  72 + * 'port' => 3306,
  73 + * 'prefix' => 'myprefix_',
  74 + * 'collation' => 'utf8_general_ci',
  75 + * );
  76 + * @endcode
  77 + *
  78 + * The "driver" property indicates what Drupal database driver the
  79 + * connection should use. This is usually the same as the name of the
  80 + * database type, such as mysql or sqlite, but not always. The other
  81 + * properties will vary depending on the driver. For SQLite, you must
  82 + * specify a database file name in a directory that is writable by the
  83 + * webserver. For most other drivers, you must specify a
  84 + * username, password, host, and database name.
  85 + *
  86 + * Transaction support is enabled by default for all drivers that support it,
  87 + * including MySQL. To explicitly disable it, set the 'transactions' key to
  88 + * FALSE.
  89 + * Note that some configurations of MySQL, such as the MyISAM engine, don't
  90 + * support it and will proceed silently even if enabled. If you experience
  91 + * transaction related crashes with such configuration, set the 'transactions'
  92 + * key to FALSE.
  93 + *
  94 + * For each database, you may optionally specify multiple "target" databases.
  95 + * A target database allows Drupal to try to send certain queries to a
  96 + * different database if it can but fall back to the default connection if not.
  97 + * That is useful for master/slave replication, as Drupal may try to connect
  98 + * to a slave server when appropriate and if one is not available will simply
  99 + * fall back to the single master server.
  100 + *
  101 + * The general format for the $databases array is as follows:
  102 + * @code
  103 + * $databases['default']['default'] = $info_array;
  104 + * $databases['default']['slave'][] = $info_array;
  105 + * $databases['default']['slave'][] = $info_array;
  106 + * $databases['extra']['default'] = $info_array;
  107 + * @endcode
  108 + *
  109 + * In the above example, $info_array is an array of settings described above.
  110 + * The first line sets a "default" database that has one master database
  111 + * (the second level default). The second and third lines create an array
  112 + * of potential slave databases. Drupal will select one at random for a given
  113 + * request as needed. The fourth line creates a new database with a name of
  114 + * "extra".
  115 + *
  116 + * For a single database configuration, the following is sufficient:
  117 + * @code
  118 + * $databases['default']['default'] = array(
  119 + * 'driver' => 'mysql',
  120 + * 'database' => 'databasename',
  121 + * 'username' => 'username',
  122 + * 'password' => 'password',
  123 + * 'host' => 'localhost',
  124 + * 'prefix' => 'main_',
  125 + * 'collation' => 'utf8_general_ci',
  126 + * );
  127 + * @endcode
  128 + *
  129 + * You can optionally set prefixes for some or all database table names
  130 + * by using the 'prefix' setting. If a prefix is specified, the table
  131 + * name will be prepended with its value. Be sure to use valid database
  132 + * characters only, usually alphanumeric and underscore. If no prefixes
  133 + * are desired, leave it as an empty string ''.
  134 + *
  135 + * To have all database names prefixed, set 'prefix' as a string:
  136 + * @code
  137 + * 'prefix' => 'main_',
  138 + * @endcode
  139 + * To provide prefixes for specific tables, set 'prefix' as an array.
  140 + * The array's keys are the table names and the values are the prefixes.
  141 + * The 'default' element is mandatory and holds the prefix for any tables
  142 + * not specified elsewhere in the array. Example:
  143 + * @code
  144 + * 'prefix' => array(
  145 + * 'default' => 'main_',
  146 + * 'users' => 'shared_',
  147 + * 'sessions' => 'shared_',
  148 + * 'role' => 'shared_',
  149 + * 'authmap' => 'shared_',
  150 + * ),
  151 + * @endcode
  152 + * You can also use a reference to a schema/database as a prefix. This may be
  153 + * useful if your Drupal installation exists in a schema that is not the default
  154 + * or you want to access several databases from the same code base at the same
  155 + * time.
  156 + * Example:
  157 + * @code
  158 + * 'prefix' => array(
  159 + * 'default' => 'main.',
  160 + * 'users' => 'shared.',
  161 + * 'sessions' => 'shared.',
  162 + * 'role' => 'shared.',
  163 + * 'authmap' => 'shared.',
  164 + * );
  165 + * @endcode
  166 + * NOTE: MySQL and SQLite's definition of a schema is a database.
  167 + *
  168 + * Advanced users can add or override initial commands to execute when
  169 + * connecting to the database server, as well as PDO connection settings. For
  170 + * example, to enable MySQL SELECT queries to exceed the max_join_size system
  171 + * variable, and to reduce the database connection timeout to 5 seconds:
  172 + *
  173 + * @code
  174 + * $databases['default']['default'] = array(
  175 + * 'init_commands' => array(
  176 + * 'big_selects' => 'SET SQL_BIG_SELECTS=1',
  177 + * ),
  178 + * 'pdo' => array(
  179 + * PDO::ATTR_TIMEOUT => 5,
  180 + * ),
  181 + * );
  182 + * @endcode
  183 + *
  184 + * WARNING: These defaults are designed for database portability. Changing them
  185 + * may cause unexpected behavior, including potential data loss.
  186 + *
  187 + * @see DatabaseConnection_mysql::__construct
  188 + * @see DatabaseConnection_pgsql::__construct
  189 + * @see DatabaseConnection_sqlite::__construct
  190 + *
  191 + * Database configuration format:
  192 + * @code
  193 + * $databases['default']['default'] = array(
  194 + * 'driver' => 'mysql',
  195 + * 'database' => 'databasename',
  196 + * 'username' => 'username',
  197 + * 'password' => 'password',
  198 + * 'host' => 'localhost',
  199 + * 'prefix' => '',
  200 + * );
  201 + * $databases['default']['default'] = array(
  202 + * 'driver' => 'pgsql',
  203 + * 'database' => 'databasename',
  204 + * 'username' => 'username',
  205 + * 'password' => 'password',
  206 + * 'host' => 'localhost',
  207 + * 'prefix' => '',
  208 + * );
  209 + * $databases['default']['default'] = array(
  210 + * 'driver' => 'sqlite',
  211 + * 'database' => '/path/to/databasefilename',
  212 + * );
  213 + * @endcode
  214 + */
  215 +$databases = array();
  216 +
  217 +/**
  218 + * Access control for update.php script.
  219 + *
  220 + * If you are updating your Drupal installation using the update.php script but
  221 + * are not logged in using either an account with the "Administer software
  222 + * updates" permission or the site maintenance account (the account that was
  223 + * created during installation), you will need to modify the access check
  224 + * statement below. Change the FALSE to a TRUE to disable the access check.
  225 + * After finishing the upgrade, be sure to open this file again and change the
  226 + * TRUE back to a FALSE!
  227 + */
  228 +$update_free_access = FALSE;
  229 +
  230 +/**
  231 + * Salt for one-time login links and cancel links, form tokens, etc.
  232 + *
  233 + * This variable will be set to a random value by the installer. All one-time
  234 + * login links will be invalidated if the value is changed. Note that if your
  235 + * site is deployed on a cluster of web servers, you must ensure that this
  236 + * variable has the same value on each server. If this variable is empty, a hash
  237 + * of the serialized database credentials will be used as a fallback salt.
  238 + *
  239 + * For enhanced security, you may set this variable to a value using the
  240 + * contents of a file outside your docroot that is never saved together
  241 + * with any backups of your Drupal files and database.
  242 + *
  243 + * Example:
  244 + * $drupal_hash_salt = file_get_contents('/home/example/salt.txt');
  245 + *
  246 + */
  247 +$drupal_hash_salt = '';
  248 +
  249 +/**
  250 + * Base URL (optional).
  251 + *
  252 + * If Drupal is generating incorrect URLs on your site, which could
  253 + * be in HTML headers (links to CSS and JS files) or visible links on pages
  254 + * (such as in menus), uncomment the Base URL statement below (remove the
  255 + * leading hash sign) and fill in the absolute URL to your Drupal installation.
  256 + *
  257 + * You might also want to force users to use a given domain.
  258 + * See the .htaccess file for more information.
  259 + *
  260 + * Examples:
  261 + * $base_url = 'http://www.example.com';
  262 + * $base_url = 'http://www.example.com:8888';
  263 + * $base_url = 'http://www.example.com/drupal';
  264 + * $base_url = 'https://www.example.com:8888/drupal';
  265 + *
  266 + * It is not allowed to have a trailing slash; Drupal will add it
  267 + * for you.
  268 + */
  269 +# $base_url = 'http://www.example.com'; // NO trailing slash!
  270 +
  271 +/**
  272 + * PHP settings:
  273 + *
  274 + * To see what PHP settings are possible, including whether they can be set at
  275 + * runtime (by using ini_set()), read the PHP documentation:
  276 + * http://www.php.net/manual/ini.list.php
  277 + * See drupal_environment_initialize() in includes/bootstrap.inc for required
  278 + * runtime settings and the .htaccess file for non-runtime settings. Settings
  279 + * defined there should not be duplicated here so as to avoid conflict issues.
  280 + */
  281 +
  282 +/**
  283 + * Some distributions of Linux (most notably Debian) ship their PHP
  284 + * installations with garbage collection (gc) disabled. Since Drupal depends on
  285 + * PHP's garbage collection for clearing sessions, ensure that garbage
  286 + * collection occurs by using the most common settings.
  287 + */
  288 +ini_set('session.gc_probability', 1);
  289 +ini_set('session.gc_divisor', 100);
  290 +
  291 +/**
  292 + * Set session lifetime (in seconds), i.e. the time from the user's last visit
  293 + * to the active session may be deleted by the session garbage collector. When
  294 + * a session is deleted, authenticated users are logged out, and the contents
  295 + * of the user's $_SESSION variable is discarded.
  296 + */
  297 +ini_set('session.gc_maxlifetime', 200000);
  298 +
  299 +/**
  300 + * Set session cookie lifetime (in seconds), i.e. the time from the session is
  301 + * created to the cookie expires, i.e. when the browser is expected to discard
  302 + * the cookie. The value 0 means "until the browser is closed".
  303 + */
  304 +ini_set('session.cookie_lifetime', 2000000);
  305 +
  306 +/**
  307 + * If you encounter a situation where users post a large amount of text, and
  308 + * the result is stripped out upon viewing but can still be edited, Drupal's
  309 + * output filter may not have sufficient memory to process it. If you
  310 + * experience this issue, you may wish to uncomment the following two lines
  311 + * and increase the limits of these variables. For more information, see
  312 + * http://php.net/manual/pcre.configuration.php.
  313 + */
  314 +# ini_set('pcre.backtrack_limit', 200000);
  315 +# ini_set('pcre.recursion_limit', 200000);
  316 +
  317 +/**
  318 + * Drupal automatically generates a unique session cookie name for each site
  319 + * based on its full domain name. If you have multiple domains pointing at the
  320 + * same Drupal site, you can either redirect them all to a single domain (see
  321 + * comment in .htaccess), or uncomment the line below and specify their shared
  322 + * base domain. Doing so assures that users remain logged in as they cross
  323 + * between your various domains. Make sure to always start the $cookie_domain
  324 + * with a leading dot, as per RFC 2109.
  325 + */
  326 +# $cookie_domain = '.example.com';
  327 +
  328 +/**
  329 + * Variable overrides:
  330 + *
  331 + * To override specific entries in the 'variable' table for this site,
  332 + * set them here. You usually don't need to use this feature. This is
  333 + * useful in a configuration file for a vhost or directory, rather than
  334 + * the default settings.php. Any configuration setting from the 'variable'
  335 + * table can be given a new value. Note that any values you provide in
  336 + * these variable overrides will not be modifiable from the Drupal
  337 + * administration interface.
  338 + *
  339 + * The following overrides are examples:
  340 + * - site_name: Defines the site's name.
  341 + * - theme_default: Defines the default theme for this site.
  342 + * - anonymous: Defines the human-readable name of anonymous users.
  343 + * Remove the leading hash signs to enable.
  344 + */
  345 +# $conf['site_name'] = 'My Drupal site';
  346 +# $conf['theme_default'] = 'garland';
  347 +# $conf['anonymous'] = 'Visitor';
  348 +
  349 +/**
  350 + * A custom theme can be set for the offline page. This applies when the site
  351 + * is explicitly set to maintenance mode through the administration page or when
  352 + * the database is inactive due to an error. It can be set through the
  353 + * 'maintenance_theme' key. The template file should also be copied into the
  354 + * theme. It is located inside 'modules/system/maintenance-page.tpl.php'.
  355 + * Note: This setting does not apply to installation and update pages.
  356 + */
  357 +# $conf['maintenance_theme'] = 'bartik';
  358 +
  359 +/**
  360 + * Reverse Proxy Configuration:
  361 + *
  362 + * Reverse proxy servers are often used to enhance the performance
  363 + * of heavily visited sites and may also provide other site caching,
  364 + * security, or encryption benefits. In an environment where Drupal
  365 + * is behind a reverse proxy, the real IP address of the client should
  366 + * be determined such that the correct client IP address is available
  367 + * to Drupal's logging, statistics, and access management systems. In
  368 + * the most simple scenario, the proxy server will add an
  369 + * X-Forwarded-For header to the request that contains the client IP
  370 + * address. However, HTTP headers are vulnerable to spoofing, where a
  371 + * malicious client could bypass restrictions by setting the
  372 + * X-Forwarded-For header directly. Therefore, Drupal's proxy
  373 + * configuration requires the IP addresses of all remote proxies to be
  374 + * specified in $conf['reverse_proxy_addresses'] to work correctly.
  375 + *
  376 + * Enable this setting to get Drupal to determine the client IP from
  377 + * the X-Forwarded-For header (or $conf['reverse_proxy_header'] if set).
  378 + * If you are unsure about this setting, do not have a reverse proxy,
  379 + * or Drupal operates in a shared hosting environment, this setting
  380 + * should remain commented out.
  381 + *
  382 + * In order for this setting to be used you must specify every possible
  383 + * reverse proxy IP address in $conf['reverse_proxy_addresses'].
  384 + * If a complete list of reverse proxies is not available in your
  385 + * environment (for example, if you use a CDN) you may set the
  386 + * $_SERVER['REMOTE_ADDR'] variable directly in settings.php.
  387 + * Be aware, however, that it is likely that this would allow IP
  388 + * address spoofing unless more advanced precautions are taken.
  389 + */
  390 +# $conf['reverse_proxy'] = TRUE;
  391 +
  392 +/**
  393 + * Specify every reverse proxy IP address in your environment.
  394 + * This setting is required if $conf['reverse_proxy'] is TRUE.
  395 + */
  396 +# $conf['reverse_proxy_addresses'] = array('a.b.c.d', ...);
  397 +
  398 +/**
  399 + * Set this value if your proxy server sends the client IP in a header
  400 + * other than X-Forwarded-For.
  401 + */
  402 +# $conf['reverse_proxy_header'] = 'HTTP_X_CLUSTER_CLIENT_IP';
  403 +
  404 +/**
  405 + * Page caching:
  406 + *
  407 + * By default, Drupal sends a "Vary: Cookie" HTTP header for anonymous page
  408 + * views. This tells a HTTP proxy that it may return a page from its local
  409 + * cache without contacting the web server, if the user sends the same Cookie
  410 + * header as the user who originally requested the cached page. Without "Vary:
  411 + * Cookie", authenticated users would also be served the anonymous page from
  412 + * the cache. If the site has mostly anonymous users except a few known
  413 + * editors/administrators, the Vary header can be omitted. This allows for
  414 + * better caching in HTTP proxies (including reverse proxies), i.e. even if
  415 + * clients send different cookies, they still get content served from the cache.
  416 + * However, authenticated users should access the site directly (i.e. not use an
  417 + * HTTP proxy, and bypass the reverse proxy if one is used) in order to avoid
  418 + * getting cached pages from the proxy.
  419 + */
  420 +# $conf['omit_vary_cookie'] = TRUE;
  421 +
  422 +/**
  423 + * CSS/JS aggregated file gzip compression:
  424 + *
  425 + * By default, when CSS or JS aggregation and clean URLs are enabled Drupal will
  426 + * store a gzip compressed (.gz) copy of the aggregated files. If this file is
  427 + * available then rewrite rules in the default .htaccess file will serve these
  428 + * files to browsers that accept gzip encoded content. This allows pages to load
  429 + * faster for these users and has minimal impact on server load. If you are
  430 + * using a webserver other than Apache httpd, or a caching reverse proxy that is
  431 + * configured to cache and compress these files itself you may want to uncomment
  432 + * one or both of the below lines, which will prevent gzip files being stored.
  433 + */
  434 +# $conf['css_gzip_compression'] = FALSE;
  435 +# $conf['js_gzip_compression'] = FALSE;
  436 +
  437 +/**
  438 + * Block caching:
  439 + *
  440 + * Block caching may not be compatible with node access modules depending on
  441 + * how the original block cache policy is defined by the module that provides
  442 + * the block. By default, Drupal therefore disables block caching when one or
  443 + * more modules implement hook_node_grants(). If you consider block caching to
  444 + * be safe on your site and want to bypass this restriction, uncomment the line
  445 + * below.
  446 + */
  447 +# $conf['block_cache_bypass_node_grants'] = TRUE;
  448 +
  449 +/**
  450 + * String overrides:
  451 + *
  452 + * To override specific strings on your site with or without enabling the Locale
  453 + * module, add an entry to this list. This functionality allows you to change
  454 + * a small number of your site's default English language interface strings.
  455 + *
  456 + * Remove the leading hash signs to enable.
  457 + */
  458 +# $conf['locale_custom_strings_en'][''] = array(
  459 +# 'forum' => 'Discussion board',
  460 +# '@count min' => '@count minutes',
  461 +# );
  462 +
  463 +/**
  464 + *
  465 + * IP blocking:
  466 + *
  467 + * To bypass database queries for denied IP addresses, use this setting.
  468 + * Drupal queries the {blocked_ips} table by default on every page request
  469 + * for both authenticated and anonymous users. This allows the system to
  470 + * block IP addresses from within the administrative interface and before any
  471 + * modules are loaded. However on high traffic websites you may want to avoid
  472 + * this query, allowing you to bypass database access altogether for anonymous
  473 + * users under certain caching configurations.
  474 + *
  475 + * If using this setting, you will need to add back any IP addresses which
  476 + * you may have blocked via the administrative interface. Each element of this
  477 + * array represents a blocked IP address. Uncommenting the array and leaving it
  478 + * empty will have the effect of disabling IP blocking on your site.
  479 + *
  480 + * Remove the leading hash signs to enable.
  481 + */
  482 +# $conf['blocked_ips'] = array(
  483 +# 'a.b.c.d',
  484 +# );
  485 +
  486 +/**
  487 + * Fast 404 pages:
  488 + *
  489 + * Drupal can generate fully themed 404 pages. However, some of these responses
  490 + * are for images or other resource files that are not displayed to the user.
  491 + * This can waste bandwidth, and also generate server load.
  492 + *
  493 + * The options below return a simple, fast 404 page for URLs matching a
  494 + * specific pattern:
  495 + * - 404_fast_paths_exclude: A regular expression to match paths to exclude,
  496 + * such as images generated by image styles, or dynamically-resized images.
  497 + * If you need to add more paths, you can add '|path' to the expression.
  498 + * - 404_fast_paths: A regular expression to match paths that should return a
  499 + * simple 404 page, rather than the fully themed 404 page. If you don't have
  500 + * any aliases ending in htm or html you can add '|s?html?' to the expression.
  501 + * - 404_fast_html: The html to return for simple 404 pages.
  502 + *
  503 + * Add leading hash signs if you would like to disable this functionality.
  504 + */
  505 +$conf['404_fast_paths_exclude'] = '/\/(?:styles)\//';
  506 +$conf['404_fast_paths'] = '/\.(?:txt|png|gif|jpe?g|css|js|ico|swf|flv|cgi|bat|pl|dll|exe|asp)$/i';
  507 +$conf['404_fast_html'] = '<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML+RDFa 1.0//EN" "http://www.w3.org/MarkUp/DTD/xhtml-rdfa-1.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL "@path" was not found on this server.</p></body></html>';
  508 +
  509 +/**
  510 + * By default the page request process will return a fast 404 page for missing
  511 + * files if they match the regular expression set in '404_fast_paths' and not
  512 + * '404_fast_paths_exclude' above. 404 errors will simultaneously be logged in
  513 + * the Drupal system log.
  514 + *
  515 + * You can choose to return a fast 404 page earlier for missing pages (as soon
  516 + * as settings.php is loaded) by uncommenting the line below. This speeds up
  517 + * server response time when loading 404 error pages and prevents the 404 error
  518 + * from being logged in the Drupal system log. In order to prevent valid pages
  519 + * such as image styles and other generated content that may match the
  520 + * '404_fast_paths' regular expression from returning 404 errors, it is
  521 + * necessary to add them to the '404_fast_paths_exclude' regular expression
  522 + * above. Make sure that you understand the effects of this feature before
  523 + * uncommenting the line below.
  524 + */
  525 +# drupal_fast_404();
  526 +
  527 +/**
  528 + * External access proxy settings:
  529 + *
  530 + * If your site must access the Internet via a web proxy then you can enter
  531 + * the proxy settings here. Currently only basic authentication is supported
  532 + * by using the username and password variables. The proxy_user_agent variable
  533 + * can be set to NULL for proxies that require no User-Agent header or to a
  534 + * non-empty string for proxies that limit requests to a specific agent. The
  535 + * proxy_exceptions variable is an array of host names to be accessed directly,
  536 + * not via proxy.
  537 + */
  538 +# $conf['proxy_server'] = '';
  539 +# $conf['proxy_port'] = 8080;
  540 +# $conf['proxy_username'] = '';
  541 +# $conf['proxy_password'] = '';
  542 +# $conf['proxy_user_agent'] = '';
  543 +# $conf['proxy_exceptions'] = array('127.0.0.1', 'localhost');
  544 +
  545 +/**
  546 + * Authorized file system operations:
  547 + *
  548 + * The Update manager module included with Drupal provides a mechanism for
  549 + * site administrators to securely install missing updates for the site
  550 + * directly through the web user interface. On securely-configured servers,
  551 + * the Update manager will require the administrator to provide SSH or FTP
  552 + * credentials before allowing the installation to proceed; this allows the
  553 + * site to update the new files as the user who owns all the Drupal files,
  554 + * instead of as the user the webserver is running as. On servers where the
  555 + * webserver user is itself the owner of the Drupal files, the administrator
  556 + * will not be prompted for SSH or FTP credentials (note that these server
  557 + * setups are common on shared hosting, but are inherently insecure).
  558 + *
  559 + * Some sites might wish to disable the above functionality, and only update
  560 + * the code directly via SSH or FTP themselves. This setting completely
  561 + * disables all functionality related to these authorized file operations.
  562 + *
  563 + * @see http://drupal.org/node/244924
  564 + *
  565 + * Remove the leading hash signs to disable.
  566 + */
  567 +# $conf['allow_authorize_operations'] = FALSE;
... ...