-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathsettings.toml
More file actions
138 lines (105 loc) · 4.99 KB
/
settings.toml
File metadata and controls
138 lines (105 loc) · 4.99 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
[default]
# If needed to ensure that all redirects use a certain hostname, set this appropriately:
# DOMAIN_NAME = "my-example.com"
# Affects response headers
ADD_CACHE_HEADERS = true
# If false, disables the Flask before_request trailing slash redirection handling
TRAILING_SLASH_REDIRECTION = true
# Sets the special endpoint to return the browser's location via CloudFront's geoip headers
# This requires that the API Gateway is behind a _real_ CloudFront distro. If not set,
# no localization endpoint is available
# GEOGRAPHY_ROUTE = '/localizer'
# Enable the use of country_code, when finding points closest to the user. Default is true.
# GEOGRAPHY_USE_COUNTRY_CODE_COMPARISON = true
# Sets the allowed origins for CORS. Should be a list of allowed origins or '*' for any
ALLOWED_ORIGINS = ['*']
# OPTIONS requests bypass all checks other than against ALLOWED_ORIGINS when this is true
SHORTCIRCUIT_OPTIONS = true
# Status code to use for redirects generated from FlaskJSONRedirects
REDIRECTS_DEFAULT_STATUS_CODE = 302
# True if FlaskJSONRedirects should add redirects for both `<path>` and `<path>/`
# False to only handle explicitly defined redirects
REDIRECTS_HANDLE_TRAILING_SLASH = true
# True if FlaskJSONRedirects should include the query string in any redirects returned,
# including those that are FQDN. The query string is always included for relative
# redirects. Default: False
REDIRECTS_INCLUDE_QUERY_ARGS_IN_ALL = true
# The location of various control files within the S3 bucket
S3_REDIRECTS_FILE = 'redirects.json'
S3_AUTHORIZER_FILE = 'authorizations.json'
S3_ELEVENTY_FILE = '11ty-serverless.json'
S3_LOCALES_FILE = 'locales.json'
S3_FORM2EMAIL_FILE = 'form-to-email.json'
# Status code to use for redirects generated from FlaskS3Proxy
S3PROXY_REDIRECT_CODE = 302
# True if FlaskS3Proxy should not serve index.html paths without a trailing slash
S3PROXY_TRAILING_SLASH_ONLY = false
# True if FlaskS3Proxy should redirect `<path>/` to `<path>` before attempting to check S3
S3PROXY_TRAILING_SLASH_REDIRECTION = true
# The bucket that FlaskS3Proxy should check for files. This should probably be set in the env
# S3PROXY_BUCKET = "some-bucket-name"
# The prefix, if any, that FlaskS3Proxy should add to all proxied requests to S3
# S3PROXY_PREFIX = ""
# Routes that you want handled by FlaskS3Proxy.
# S3PROXY_ROUTES = ["/", "/<path:url>"]
# Locales that are handled by S3Proxy localization. These correspond to path prefixes in
# the S3 bucket.
# S3PROXY_LOCALES = ["de", "fr", "it", "es"]
# A dictionary of routes and buckets that can be used in department-upload-permission
# specific circumstances (among other uses). Any path prior to the `<path:url>` will be
# used as a prefix to the file in it's S3 bucket.
# S3PROXY_SUBROUTES = {"/wp-content/uploads/<path:url>" = "my-wp-backup-bucket"}
# When invoking the preview function, often the first run of the function will return
# incorrect results, thus this allows for an immediate second load, that resolves it
ELEVENTY_BAD_LOAD_WRAPPER_HACK = false
# The first path segment of the URL to the serverless function log review functionality
ELEVENTY_LOGVIEW_PATH = "__logviewer"
# The first path segment to the preview function, required to be able to perform a reload
# as part of the BAD_LOAD_WRAPPER_HACK functionality
ELEVENTY_PREVIEW_PATH_BASE = "__preview"
# To set a generic authentication, do so here, using a base64 encoded username:password
#AUTHORIZER_ROUTES = {"/" = "<base64-user-pass>"}
AUTHORIZER_PATHS_WITHOUT_AUTH = ["/static"]
# If the preview function is returning a bad load on first attempt, set this to true
# which forces a secondary request to fire immediately after the first to circumvent
# the problem
# BAD_LOAD_WRAPPER_HACK = true
# Default CSP policy that we want in place
CSP_DEFAULT_SRC = [
"data:",
"https:",
"self",
"unsafe-inline"
]
CSP_UPGRADE_INSECURE_REQUESTS = true
# Remeber to include the path used as ELEVENTY_PREVIEW_PATH_BASE above
PATHS_TO_LEAVE_TRAILING_SLASH = [
"^/preview/",
"^/__preview/",
]
PATTERNS_TO_404 = [
".map$",
]
# The SMTP configuration
# MAIL_SERVER = "smtp.example.com"
MAIL_PORT = 587
MAIL_USE_TLS = true
# MAIL_USERNAME = "user@example.com"
# MAIL_PASSWORD = "password"
# The default sending address to use as the from email address
# MAIL_DEFAULT_SENDER = "noreply@example.com"
# The default mail recipient when no other is specified in the routes below
# MAIL_RECIPIENT = "someone@example.com"
# A list of dictionaries that creates routes that send an email to the provided recipient
# (or the default one set above) using the provided template (path to file, or template
# string) that FlaskForm2Email will use to create processors for form submission handling
# FORM2EMAIL_ROUTES = [
# {"route": "/form2email", "template": "email/simple.html", "recipient": "me@example.com"},
# ]
# The encryption key to use, should you wish the email payloads be encrypted
# FORM2EMAIL_ENCRYPTION_KEY = """
# -----BEGIN PGP PUBLIC KEY BLOCK-----
# asdfasdfsdfasdf
# ....
# -----END PGP PUBLIC KEY BLOCK-----
# """