From e4f689ff8d10764d807f334fc59e54c244d88e54 Mon Sep 17 00:00:00 2001 From: clsr Date: Sun, 24 Nov 2019 03:14:32 +0100 Subject: Initial commit --- gomf.conf | 131 ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 131 insertions(+) create mode 100644 gomf.conf (limited to 'gomf.conf') diff --git a/gomf.conf b/gomf.conf new file mode 100644 index 0000000..9a0dc47 --- /dev/null +++ b/gomf.conf @@ -0,0 +1,131 @@ +# vim: set ft=sh: + +#shellcheck disable=SC2034 + +# Simple startup/configuration script for Gomf +# Leave options blank ("OPTION=", "OPTION=''") or comment them out to use Gomf +# defaults (see `gomf --help`) + + +# The website name, appearing on web pages +#NAME='Gomf' + +# The hostname to serve uploaded files on +# +# By default, any connection can serve files on path /u/$file, but, if enabled, +# this host will serve them directly on /$file. +#UPLOAD_HOST=u.example.com + +# The URL to serve uploaded files on +# +# Generated URLs will be $UPLOAD_URL/$file.$ext. +# If not specified, it is generated depending on which variables are set: +# - $UPLOAD_HOST and $LISTEN_HTTPS: https://$UPLOAD_HOST/ +# - $UPLOAD_HOST and $LISTEN_HTTP: http://$UPLOAD_HOST/ +# - $LISTEN_HTTPS: https://$LISTEN_HTTPS/u/ +# - $LISTEN_HTTP: http://$LISTEN_HTTP/u/ +#UPLOAD_URL=https://u.example.com/ + +# The contact email address, appearing on web pages +#CONTACT_EMAIL=contact@example.com + +# The abuse contact email address, appearing on web pages +#ABUSE_EMAIL=abuse@example.com + +# Adds the HSTS header to responses +#HSTS=0 + +# Sets the Content-Security-Policy header +# +# Useful for disallowing script execution in XML-based formats (e.g. SVG). +# Gomf default is "default-src 'none'; media-src 'self'", which blocks all +# scripts but allows inline video playback. +# Set to "0" to disable the CSP header. +#CSP="default-src 'none'; media-src 'self'" + +# Allows serving HTML/XHTML files with their actual MIME types +# +# If disabled, text/html and application/xhtml+xml will be served as types +# text/plain to prevent rendering thme in browser and to keep services such as +# CloudFlare from modifying them to insert its tracking JavaScript. +#ALLOW_HTML=0 + +# Sets Access-Control-Allow-Origin header to "*" +# +# This enables CORS and allows other sites' JavaScript applications to upload +# files using XMLHttpRequest. +#CORS=1 + +# Enables grills +# +# With this enabled, the path /grill.php will serve a redirect to a random file +# from the static/grill/ directory. This is used as a background-image in the +# bottom right corner in the default gomf-web style. +#GRILL=1 + +# The charset used to generate file IDs +# +# Should only contain URL-safe characters. Must not contain / and _. +#ID_CHARSET='abcdefghijklmnopqrstuvwxyz' + +# The length of generated file IDs +#ID_LENGTH=6 + +# Maximum allowed size in MiB +# +# When blank/commented, no maximum upload size is enforced. +#MAX_SIZE_MIB=50 + +# Enable whitelist mode instead of blacklist for filters +# +# When enabled, only the file extensions/types specified in filters are allowed +# and all others are blocked. When disabled, the extensions/types in filters +# are blocked and all others are allowed. +#WHITELIST=0 + +# The file extensions (without leading dot) to filter +# +# Set to an empty array to disable. +#FILTER_EXT=(exe dll msi scr com pif) + +# The file MIME types to filter +# +# Set to an empty array to disable. +#FILTER_MIME=( +# application/x-dosexec +# application/x-msdos-program +#) + +# Enable logging +# +# When set to 1, all uploads are logged to $GOMF_ROOT/log/. +LOG=1 + +# Enable logging of IP addresses +#LOG_IP=0 + +# Enable logging of hashed IP addresses +#LOG_IP_HASH=0 + +# Enable logging of User-Agent headers +#LOG_UA=0 + +# Enable logging of hashed User-Agent headers +#LOG_UA_HASH=0 + +# Enable logging of Referer headers +#LOG_REFERER=0 + +# Enable logging of hashed Referer headers +#LOG_REFERER_HASH=0 + +# Salt for hashed log entries +# +# Used to obfuscate entries when LOG_*_HASH option is enabled for privacy. +#LOG_HASH_SALT='put some unique string here' + +# Count of trusted reverse proxies +# +# Used to determine which, if any, X-Forwarded-For or X-Real-IP to trust when +# logging or hashing the uploaders' IP addresses +PROXY_COUNT=1 -- cgit