https://github.com/owncloud/core
Tip revision: 83978f39ec9425d854aac51d891f7d77185729f7 authored by Michael Barz on 09 March 2021, 17:16:29 UTC
bump version
bump version
Tip revision: 83978f3
config.apps.sample.php
<?php
/**
* This configuration file is only provided to document the different
* configuration options and their usage for apps maintained by ownCloud.
*
* DO NOT COMPLETELY BASE YOUR CONFIGURATION FILE ON THESE SAMPLES. THIS MAY BREAK
* YOUR INSTANCE. Instead, manually copy configuration switches that you
* consider important for your instance to your working `config.php`, and
* apply configuration options that are pertinent for your instance.
*
* All keys are only valid if the corresponding app is installed and enabled.
* You MUST copy the keys needed to the active config.php file.
*
* This file is used to generate the configuration documentation.
* Please consider following requirements of the current parser:
* * all comments need to start with `/**` and end with ` *\/` - each on their
* own line
* * add a `@see CONFIG_INDEX` to copy a previously described config option
* also to this line
* * everything between the `*\/` and the next `/**` will be treated as the
* config option
* * use RST syntax
* If you have multiple possible values in the comment section, separate them with a
* blank line, which is necessary for the documentation generation process.
* See examples below.
*/
$CONFIG = [
/**
* App: Activity
*
* Possible values: `activity_expire_days` days.
*/
/**
* Define the retention for activities of the activity app
*/
'activity_expire_days' => 365,
/**
* App: Admin Audit
*
* Possible values: `log.conditions` ARRAY.
*
* Possible values: `admin_audit.groups` ARRAY.
*/
/**
* Configure the path to the log file
*/
'log.conditions' => [
[
'apps' => ['admin_audit'],
// Adjust the path below, to match your setup
'logfile' => '/var/www/owncloud/data/admin_audit.log'
]
],
/**
* Filter the groups that messages are logged for.
*/
'admin_audit.groups' => [
'group1',
'group2'
],
/**
* App: LDAP
*
* Possible values: `ldapIgnoreNamingRules` `doSet` or `false`.
*
* Possible values: `user_ldap.enable_medial_search` `true` or `false`.
*/
/**
* Define parameters for the LDAP app
*/
'ldapIgnoreNamingRules' => false,
'user_ldap.enable_medial_search' => false,
/**
* App: Market
*
* Possible values: `appstoreurl` URL.
*/
/**
* Define the download URL for apps
*/
'appstoreurl' => 'https://marketplace.owncloud.com',
/**
* App: Firstrunwizard
*
* Possible values: `customclient_desktop` URL.
*
* Possible values: `customclient_android` URL.
*
* Possible values: `customclient_ios` URL.
*/
/**
* Define the download links for ownCloud clients
* Configuring the download links for ownCloud clients,
* as seen in the first-run wizard and on Personal pages
*/
'customclient_desktop' =>
'https://owncloud.org/install/#install-clients',
'customclient_android' =>
'https://play.google.com/store/apps/details?id=com.owncloud.android',
'customclient_ios' =>
'https://itunes.apple.com/us/app/owncloud/id543672169?mt=8',
/**
* App: Richdocuments
*
* Possible values: `collabora_group` string.
*/
/**
* Define the group name for users allowed to use Collabora
*/
'collabora_group' => '',
/**
* OpenID Connect(OIDC) Configuration
*
* App: openidconnect
*/
/**
* Configure OpenID Connect
*
* The `provider-url`, `client-id` and `client-secret` variables are to be
* taken from the OpenID Connect Provider's setup. The `loginButtonName`
* variable can be freely chosen, depending on the installation.
*
* NOTE: The provider-params configuration array only needs to be used if the
* OpenID Connect Provider does NOT support service discovery.
*
* autoRedirectOnLoginPage::
* If true, the login page will automatically be redirected to the OpenID
* Connect Provider, as when the button is pressed. The default is `false`.
*
* mode::
* This is the attribute in the owncloud accounts table to search for users.
* The default value is `email`. An alternative value: `userid`.
*
* search-attribute::
* This is the claim from the OpenID Connect user information which shall be
* used for searching in the accounts table. The default value is `email`. For
* more information about the claim, see
* https://openid.net/specs/openid-connect-core-1_0.html#Claims.
*
* use-token-introspection-endpoint::
* There are tokens which are not JSON WebToken(JWT) and information like the
* expiry cannot be read from the token itself. In these cases, the OpenID
* Connect Provider needs to call on the token introspection endpoint to get
* this information. The default value is `false`. See
* https://tools.ietf.org/html/rfc7662 for more information on token
* introspection.
*/
'openid-connect' => [
'autoRedirectOnLoginPage' => false,
'client-id' => '',
'client-secret' => '',
'loginButtonName' => 'OpenId Connect',
'mode' => 'userid',
// Only required if the OpenID Connect Provider does not support service discovery
'provider-params' => [
'authorization_endpoint' => '',
'end_session_endpoint' => '',
'jwks_uri' => '',
'registration_endpoint' => '',
'token_endpoint' => '',
'token_endpoint_auth_methods_supported' => '',
'userinfo_endpoint' => ''
],
'provider-url' => '',
'search-attribute' => 'sub',
'use-token-introspection-endpoint' => true,
],
];