Subversion Repositories enhancedezbinaryfile

[/] [settings/] [module.ini.append.php] - Blame information for rev 3

Details | Compare with Previous | View Log

Line No. Rev Author Line
1 1 steven.bailey
<?php /* #?ini charset="iso-8859-1"?
2
 
3
# These are the allowed file type extensions.  Beware of allowing any
4
# extensions that can be executed.  Beware of a server setup that lets any
5
# unexpected filetypes be executed.
6
 
7
[AllowedFileTypes]
8
AllowedFileTypeList[]
9
AllowedFileTypeList[]=gif
10
AllowedFileTypeList[]=jpg
11
AllowedFileTypeList[]=jpeg
12
AllowedFileTypeList[]=jpe
13
AllowedFileTypeList[]=png
14
AllowedFileTypeList[]=txt
15
AllowedFileTypeList[]=doc
16
AllowedFileTypeList[]=pdf
17
AllowedFileTypeList[]=sxw
18
 
19
# MaxFiles is the Maximum number of files allowed in the original/collected
20
# folder.  0 means there is no limit to the number of files.  This is to keep
21
# a malicious user from continuosly uploading files until /var fills up
22
# potentially crashing the machine (depending on the server setup).
23
# Of course, this functionality could have undesirable consequences since
24
# it is removing files.
25
 
26
#If the intention is to have the ability for anonymous users to upload a file
27
#which will be sent as an attachment to the InformationCollection email - then
28
#this can be a relatively low number depending on traffic.  If the intention
29
#is to have files, uploaded by trusted users, which are accessible to other
30
#users - then use the binaryfile type and an edit form instead of the
31
#collected info functionality.
32
 
33
#Since the file is not ever written to the database, there is also no way to
34
#check if the file has already been uploaded but some other part of the form
35
#will fail in the future.  Meaning that there will potentially be duplicate
36
#junk files.
37
 
38
[RemoveFiles]
39
MaxFiles=25
40
 
41
# The path to the download directory can be changed.
42
# This will be in the StorageDir.  Default is original/collected
43
 
44
DownloadPath=original/attachments
45
 
46
[Security]
47
#This defines whether the uploading user can see the full path of the file
48
#on the collected info feedback page after uploading a file.
49
#It is a (huge, gaping) security hole if anonymous users can upload files and
50
#then can access them - especially if, say, php is in the AllowedFileTypeList.
51
#If ShowFullPath is enabled, then, members of any of the FullPathGroups
52
#will get a line showing the url of the link on the content/collectedinfo
53
#webpage.
54
 
55
ShowFullPath=enabled
56
FullPathGroups[]
57
#Administrators
58
FullPathGroups[]=12
59
#Editors
60
FullPathGroups[]=13
61
#All Users
62 3 steven.bailey
FullPathGroups[]=4
63 1 steven.bailey
 
64
# However, It is perhaps desirable for the person who gets the collected info
65
# mail to always get the link.  Assuming the collect.ini SendEmail is enabled.
66
# But, only the group of the uploading user is known, so you can't define
67
# permissions by the receiver.  The FullPathMail switch allows the
68
# link to be sent to whomever the Information Collector is.
69
 
70
# This depends on content/collectedinfomail/form.tpl passing a mail=true()
71
# to the result/info/enhancedbinaryfile.tpl - which of course
72
# will have to be added to any custom override templates for this
73
# to work.
74
 
75
FullPathMail=enabled
76
 
77
*/ ?>