-
Notifications
You must be signed in to change notification settings - Fork 365
/
wt_config.xml.in
841 lines (653 loc) · 36.3 KB
/
wt_config.xml.in
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
<!--
Wt Configuration File.
The Wt configuration file manages, for every Wt application, settings
for session management, debugging, directory for runtime information
such as session sockets, and some security settings.
Settings may be specified globally, or for a single application path.
The path should be as configured in the Wt build process, where it
defaults to /etc/wt/wt_config.xml. It can be overridden in the environment
variable WT_CONFIG_XML, or with the -c startup option of wthttp.
The values listed here are the default values, which are used when the
declaration is missing or no configuration file is used.
-->
<server>
<!-- Default application settings
The special location "*" always matches. See below for an example
of settings specific to a single application.
-->
<application-settings location="*">
<!-- Session management. -->
<session-management>
<!-- Every session runs within a dedicated process.
This mode guarantees kernel-level session privacy, but as every
session requires a separate process, it is also an easy target
for DoS attacks if not shielded by access control.
Note: currently only supported by the wtfcgi and wthttp
connectors.
max-num-sessions determines the maximum number of sessions
num-session-threads determines the number of threads for every
session process. If not specified, the number of threads for every
session process is the same as the number of threads for the parent
process.
-->
<!--
<dedicated-process>
<max-num-sessions>100</max-num-sessions>
<num-session-threads>10</num-session-threads>
</dedicated-process>
-->
<!-- Multiple sessions within one process.
This mode spawns a number of processes, and sessions are
allocated randomly to one of these processes (you should not
use this for dynamic FCGI servers, but only in conjunction
with a fixed number of static FCGI servers.
This requires careful programming, as memory corruption in one
session will kill all of the sessions in the same process. You
should debug extensively using valgrind. Also, it is your
responsibility to keep session state not interfering and
separated.
On the other hand, sessions are inexpensive, and this mode
suffers far less from DoS attacks than dedicated-process mode.
Use it for non-critical and well-debugged web applications.
Note: the wthttp connector will ignore the num-processes
setting and use only process.
-->
<shared-process>
<num-processes>1</num-processes>
</shared-process>
<!-- Session tracking strategy.
Possible values:
Auto: cookies if available, otherwise URL rewriting
URL: only URL rewriting
Combined: uses URL rewriting, with a multi-session cookie to
prevent stealing of sessions through the URL. Will
not fall back to URL rewriting if cookies are not
available. This is the most secure strategy.
It is recommended to stick to URL rewriting or Combined for session
tracking as this is more secure (it avoids the risk of attacks
like CSRF or BREACH), and also provides proper support for
concurrent sessions in a single browser.
-->
<tracking>URL</tracking>
<!-- How reload should be handled.
When reload should (or rather, may) spawn a new session, then
even in the case cookies are not used for session management,
the URL will not be cluttered with a sessionid.
However, WApplication::refresh() will never be called.
-->
<reload-is-new-session>true</reload-is-new-session>
<!-- Session timeout (seconds).
When a session remains inactive for this amount of time, it is
cleaned up.
-->
<timeout>600</timeout>
<!-- Idle timeout (seconds).
When the user does not interact with the application for the set number of seconds,
WApplication::idleTimeout() is called. By default, this
method quits the application immediately, but it can be overridden
if different behaviour is desired.
This feature can be used to prevent others from taking over a session
when the device that the Wt application is being used from is left behind,
and is most effective in combination with a fairly short session timeout (<timeout>)
When omitted, or left empty, this feature is disabled.
-->
<!--<idle-timeout>900</idle-timeout>-->
<!-- Server push timeout (seconds).
When using server-initiated updates, the client uses
long-polling requests. Proxies (including reverse
proxies) are notorious for silently closing idle
requests; the client therefore cancels the request
periodically and issues a new one. This timeout sets
the frequency.
-->
<server-push-timeout>50</server-push-timeout>
</session-management>
<!-- Settings that apply only to the FastCGI connector.
To configure the wthttp connector, use command line options, or
configure default options in /etc/wt/wthttpd
-->
<connector-fcgi>
<!-- Valgrind path
If debugging is enabled and this path is not empty, then valgrind
will be started for every shared process, or for every session
which has ?debug appended to the command line.
The variable is slighly misnamed. Not only a path can be set,
but also options, like for example:
/usr/bin/valgrind - -leak-check=full
-->
<valgrind-path></valgrind-path>
<!-- Run directory
Path used by Wt to do session management.
-->
<run-directory>${RUNDIR}</run-directory>
</connector-fcgi>
<!-- Settings that apply only to the MS IIS ISAPI connector.
To configure the wthttp connector, use command line options, or
configure default options in /etc/wt/wthttpd
-->
<connector-isapi>
<!-- Maximum Request Size spooled in memory (KiB)
Normally, Wt keeps incoming requests (POST data) in memory.
However, malicious users could send a big POST and as such
use up all memory of your HTTP server. With this parameter,
you tune how big a request can be before Wt spools it in a
file before processing it. Legitimate big POST messages may
occur when users are expected to upload files.
See also max-request-size.
The default value is 128K, which is more than enough for
any interactive Wt event.
-->
<max-memory-request-size>128</max-memory-request-size>
</connector-isapi>
<!-- Javascript debug options
Values:
- naked: JavaScript errors are not caught at all
- false: JavaScript errors are caught and a simple error message
is printed to indicate that something is terribly wrong
- stack: equivalent to 'false'
- true: JavaScript errors are rethrown after server-side logging
Unless the value is 'naked',
WApplication::handleJavaScriptError() is called which by
default logs the error and terminates the session.
-->
<debug>false</debug>
<!-- Log file
When the log file is empty, or omitted, logging is done to
stderr. This may end up in the web server error log file
(e.g. for apache + fastcgi module), or on stderr (e.g. for
the built-in httpd).
-->
<log-file></log-file>
<!-- Logger configuration
This configures the logger. With the default configuration,
everything except for debugging messages are logged.
The configuration is a string that defines rules for
enabling or disabling certain logging. It is a white-space
delimited list of rules, and each rule is of the form:
[-]level : enables (or disables) logging of messages of
the given level; '*' is a wild-card that matches all
levels
[-]level:scope : enables (or disables) logging of
messages of the given level and scope; '*' is a wild-card
that matches all levels or scopes. The default
configuration is "* -debug", i.e. by default everything
is logged, except for "debug" messages.
Some other examples:
"* -debug debug:wthttp": logs everything, including
debugging messages of scope "wthttp", but no other
debugging messages.
"* -info -debug": disables logging of info messages
in addition to debugging messages.
Note debugging messages are only emitted when debugging
has been enabled while building Wt.
-->
<log-config>* -debug</log-config>
<!-- Maximum HTTP request size (KiB)
Maximum size of an incoming POST request. This value must be
increased when the user is allowed to upload files.
-->
<max-request-size>128</max-request-size>
<!-- Maximum form data (KiB)
Maximum size of the data in a POST request of type
'application/x-www-form-urlencoded' (used for Wt form-field values)
Note that the maximum size is also limited by the value of
'max-request-size'.
-->
<max-formdata-size>5120</max-formdata-size>
<!--- Maximum number of pending events
Client-side events (user-interaction, WTimer, custom js signals) are
queued if the server did not yet respond to a previous update.
This allows you to configure the maximum number of events in the queue.
When the maximum is exceeded, the session stops and an error is logged
in the server.
Setting it to zero will disable the limit.
-->
<max-pending-events>1000</max-pending-events>
<!-- Number of threads per process
You may want to change this value if you would like to
support more reentrant event loops, where you block one
event loop using WDialog::exec() or related static
methods. Everytime you enter such an event loop, one
thread is blocked, and therefore the total number of
sessions that reliably can do this is limited to the
number of thread you have (minus one to unblock).
You may also want to increase this number if your Wt
application is regularly waiting for IO (databases, network,
files, ...). If this number is too low, all threads could
be waiting for IO operations to complete while your CPU
is idle. Increasing the number of threads may help.
Computing intensive applications may also increase this number,
even though it is better to offload computations to a helper
thread and user server push or a WTimer to check for
completion of the task in order to keep your GUI responsive
during the computations.
When using the MS IIS ISAPI connector, this configures the
number of threads that will be used to handle Wt requests.
The IIS internal threads are never used to do any
processing; all requests are forwarded to be handled in
this threadpool. Rather than to configure a so-called
'web-garden' in IIS, increase this number. The ISAPI
connector will not work correctly when a web-garden is
configured.
The default value is 10.
-->
<num-threads>10</num-threads>
<!-- Session id length (number of characters) -->
<session-id-length>16</session-id-length>
<!-- DoS prevention: limit plain HTML sessions
This is a simple measure which avoids Denial-of-Service
attacks on plain HTML sessions, which are easy to mount in
particular in the case of progressive bootstrap mode.
This setting may be used to keep the ratio of plain HTML
versus Ajax sessions under a certain ratio. Typically, most
of your sessions will be Ajax sessions, and only a tiny
fraction (e.g. less than 5%) will be plain HTML
sessions. This ratio is only enforced when more than 20 sessions
have been created.
The default is 1 (= 100%), which means that 100% of all sessions
may be plain HTML sessions, effectively disabling this feature. If
you set it to 0.5 for example, that means that 50% of all sessions
may be plain HTML sessions.
-->
<plain-ajax-sessions-ratio-limit>1</plain-ajax-sessions-ratio-limit>
<!-- DoS prevention: adds a puzzle to validate Ajax sessions
This is a simple measure which avoids Denial-of-Service
attacks on Ajax sessions.
When enabled, a puzzle needs to be solved in the first Ajax
request which eliminates agents that do not build a proper
DOM tree.
-->
<ajax-puzzle>false</ajax-puzzle>
<!-- Do strict serialization of events.
By default events are queued at the client-side, and
transmitted to the server so that at any time only one
request/response is pending. This scheme has a quality that
resembles TCP: on a low-latency link you allow the
transmission of many smaller requests, while on a high
latency link, events will be propagated less often, but in
batches.
In any case, this scheme does not drop events, no matter
how quickly they are generated.
In rare cases, the scheme may result in unwanted behaviour,
because the client-side is allowed to be slighly out of
sync at the time an event is recorded with the server-side
(and more so on high-latency links). The drastic
alternative is to discard events while a response is
pending, and can be configured by setting this option to
true.
-->
<strict-event-serialization>false</strict-event-serialization>
<!-- Enables web socket.
By default Ajax and long polling are used to communicate
between server and browser.
By enabling web socket support, if the browser supports
WebSockets, then WebSocket is the protocol used for
communication between client and server. WebSockets are
currently only supported by the built-in httpd Connector,
which acts as both an HTTP and WebSocket server. The WebSocket
protocol is intentionally not compatible with HTTP, through
a special hand-shake mechanism, and requires
that all (reverse) proxy servers also have explicit support
for this protocol.
-->
<web-sockets>false</web-sockets>
<!-- Enables the detection of webgl-capabilites.
When this is enabled, the browser will try to create a
webgl-context when loading to verify that it is possible. This
is necessary when using WGLWidget.
This can take up some load time. When your application does not
use WGLWidget, this option can be set to false. It will improve
the initial loading time of the web application.
-->
<webgl-detection>true</webgl-detection>
<!-- Redirect message shown for browsers without JavaScript support
By default, Wt will use an automatic redirect to start the
application when the browser does not support
JavaScript. However, browsers are not required to follow
the redirection, and in some situations (when using XHTML),
such automatic redirection is not supported.
This configures the text that is shown in the anchor which
the user may click to be redirected to a basic HTML version
of your application.
-->
<redirect-message>Load basic HTML</redirect-message>
<!-- Whether we are sitting behind a reverse proxy
When deployed behind a reverse proxy (such as Apache or Squid),
the server location is not read from the "Host" header,
but from the X-Forwarded-For header, if present.
This option is required to make e.g. clientAddress() return the
correct address.
Deprecated: use trusted-proxy-config instead. If this option is
set to true, Wt will take the first non-local IP address from the
Client-IP and X-Forwarded-For headers to determine the clientAddress().
-->
<!--<behind-reverse-proxy>false</behind-reverse-proxy>-->
<!-- The following configuration options can be used when Wt is behind a reverse proxy.
-->
<trusted-proxy-config>
<!-- Which header to use to get the real client IP address when behind a reverse proxy.
This could be X-Forwarded-For (default), CF-Connecting-IP for Cloudflare,
True-Client-IP, Fastly-Client-IP,...
This will influence the IP address returned by WEnvironment::clientAddress() and
Http::Request::clientAddress().
-->
<original-ip-header>X-Forwarded-For</original-ip-header>
<!-- Which proxy servers are trusted
You can use single IP addresses or subnets in CIDR notation.
By default, no proxy servers are trusted and any proxy headers are ignored, e.g.
X-Forwarded-For, X-Forwarded-Proto, etc.
-->
<trusted-proxies>
<!-- loopback -->
<!--
<proxy>127.0.0.1/8</proxy>
<proxy>::1/128</proxy>
-->
<!-- link local -->
<!--
<proxy>169.254.0.0/16</proxy>
<proxy>fe80::/10</proxy>
-->
<!-- local -->
<!--
<proxy>10.0.0.0/8</proxy>
<proxy>172.16.0.0/12</proxy>
<proxy>192.168.0.0/16</proxy>
<proxy>fc00::/7</proxy>
-->
</trusted-proxies>
</trusted-proxy-config>
<!-- Whether inline CSS is allowed.
Some Wt widgets will insert CSS rules in the the inline
stylesheet when first used. This can be disabled using this
configuration option.
Note: some widgets, such as WTreeView and WTableView,
dynamically manipulate rules in this stylesheet, and will
no longer work properly when inline-css is disabled.
-->
<inline-css>true</inline-css>
<!-- The timeout before showing the loading indicator.
The value is specified in ms.
-->
<indicator-timeout>500</indicator-timeout>
<!-- The timeout for processing a double click event.
The value is specified in ms.
-->
<double-click-timeout>200</double-click-timeout>
<!-- Ajax user agent list
Wt considers three types of sessions:
- Ajax sessions: use Ajax and JavaScript
- plain HTML sessions: use plain old server GETs and POSTs
- bots: have clean internal paths and no persistent sessions
By default, Wt does a browser detection to distinguish between
the first two: if a browser supports JavaScript (and has it
enabled), and has an Ajax DOM API, then Ajax sessions are chosen,
otherwise plain HTML sessions.
Here, you may indicate which user agents should or should
not receive an Ajax session regardless of what they report as
capabilities.
Possible values for 'mode' are "white-list" or "black-list". A
white-list will only treat the listed agents as supporting Ajax,
all other agents will be served plain HTML sessions. A black-list
will always server plain HTML sessions to listed agents and
otherwise rely on browser capability detection.
Each <user-agent> is a regular expression.
-->
<user-agents type="ajax" mode="black-list">
<!-- <user-agent>.*Crappy browser.*</user-agent> -->
</user-agents>
<!-- Bot user agent list
Here, you can specify user agents that should be should be
treated as bots.
Each <user-agent> is a regular expression.
-->
<user-agents type="bot">
<user-agent>.*Googlebot.*</user-agent>
<user-agent>.*msnbot.*</user-agent>
<user-agent>.*Slurp.*</user-agent>
<user-agent>.*Crawler.*</user-agent>
<user-agent>.*Bot.*</user-agent>
<user-agent>.*ia_archiver.*</user-agent>
<user-agent>.*Twiceler.*</user-agent>
<user-agent>.*Yandex.*</user-agent>
<user-agent>.*Nutch.*</user-agent>
<user-agent>.*MJ12bot.*</user-agent>
<user-agent>.*Baiduspider.*</user-agent>
<user-agent>.*Ezooms.*</user-agent>
<user-agent>.*Sogou web spider.*</user-agent>
<user-agent>.*AhrefsBot.*</user-agent>
</user-agents>
<!-- Configures different rendering engines for certain browsers.
Currently this is only used to select IE7 compatible rendering
engine for IE8, which solves problems of unreliable and slow
rendering performance for VML which Microsoft broke in IE8.
Before 3.3.0, the default value was IE8=IE7, but since 3.3.0
this has been changed to an empty string (i.e. let IE8 use the
standard IE8 rendering engine) to take advantage of IE8's
improved CSS support. If you make heavy use of VML, you may need
to revert to IE8=IE7.
-->
<UA-Compatible></UA-Compatible>
<!-- Configures whether the progressive bootstrap method is used.
The default bootstrap method first senses whether there is Ajax
support, and only then creates the application.
The progressive bootstrap method first renders a plain HTML
version and later upgrades to an Ajax version.
(Not to be confused with the Twitter Bootstrap theme)
-->
<progressive-bootstrap>false</progressive-bootstrap>
<!-- Set session-ID cookie
In its default (and recommended) configuration, Wt does not
rely on cookies for session tracking.
Wt has several mechanisms in place to prevent session ID stealing:
- for an Ajax session, the session ID is not shown in the URL,
avoiding session ID stealing through a referer attack.
- in case the session ID is present in the URL (e.g. for a plain
HTML session), Wt will redirect links to images or external
anchors through an intermediate page that censors the session ID
In case of the loss of a session ID, the impact is minimized:
- a full page refresh is not supported if the client IP address
changes or the user-agent changes
- an Ajax update is protected by other state which is not exposed
in the URL
To still enable a full page refresh when the client IP address
changes, an additional cookie may be set which is used only
for this purpose, and can be enabled using this setting.
-->
<session-id-cookie>false</session-id-cookie>
<!-- Configure cookie checks
By default, Wt will test for cookie support using JavaScript.
Because cookie manipulation from JavaScript is a common security
risk vector, some prefer to disable these checks.
-->
<cookie-checks>true</cookie-checks>
<!-- Configure meta headers
The user-agent allows optional filtering based on the
user-agent, using a regular expression. You can have multiple
set-meta-headers definitions.
Deprecated: use <head-matter> instead.
<meta-headers user-agent=".*MSIE.*">
<meta name="robots" content="noindex" />
</meta-headers>
-->
<!-- Configure <head> matter
The user-agent allows optional filtering based on the
user-agent, using a regular expression. You can have multiple
head-matter definitions.
All contents will be inserted into the <head> tag
verbatim. This could be useful for setting <meta> tags or
<link> tags that are global for the entire application.
-->
<head-matter user-agent=".*MSIE.*">
<meta name="robots" content="noindex" />
</head-matter>
<!-- Configure allowed origins for CORS (only for WidgetSet entry points)
Since Wt 3.3.8, cross-origin requests are disallowed by default.
<allowed-origins> allows to selectively allow cross-origin requests
for WidgetSet entry points (cross-origin requests are always disallowed
for normal applications).
Use <allowed-origins> to determine which origins should be allowed.
Wt will only allow requests with an Origin header if it is an exact
match for one of the origins in the list.
"null" can be included in the list of allowed origins. In that case,
Wt responds with "Access-Control-Allow-Origin: *".
If <allowed-origins> is omitted or empty, no origins are allowed.
If <allowed-origins> contains * (the asterisk character),
all origins are allowed.
-->
<allowed-origins>
<!-- Leave empty to disallow all origins. -->
<!-- To allow any origin: -->
<!-- * -->
<!-- To allow only http://example.com and http://example.org: -->
<!-- http://example.com,http://example.org -->
</allowed-origins>
<!-- Runtime Properties
These properties may be used to adapt applications to their
deployment environment. Typical use is for paths to resources
that may or may not be shared between several applications.
-->
<properties>
<!-- baseURL property
The absolute URL at which the application is deployed
(known to the user). This is needed only in two scenarios.
a) use of relative URLs in included XHTML
When you use relative URLs for images, etc... in
literal XHTML fragments (e.g. in WTemplate), which need
to resolve against the deployment path of the
application. This will not work as expected in the
presence of an internal application path. This URL is
set as base URL in the HTML, against which relative
URLs are resolved so that these work correctly
regardless of the internal path. It is also used
explicitly in any URL generated by the library.
b) widgetset mode deployments
Another situation in which you need to define the baseURL is
when deploying a widgetset mode application behind a reverse
proxy. A widgetset mode application uses only absolute URLs
because it may be hosted in a web page from an entirely
different domain.
By default, no baseURL is specified, in which case Wt will
avoid using absolute URLs. Relative URLs passed in API calls
will be "fixed" so that they resolve against the location of the
application deploy path, even in the presence of an
internal path.
-->
<!-- <property name="baseURL">"http://mysite.com/app</property> -->
<!-- resourcesURL property
The URL at which the resources/ folder is deployed that
comes distributed with Wt and contains auxiliary files
used to primarily for styles and themes.
The default value is 'resources/'
-->
<property name="resourcesURL">resources/</property>
<!-- favicon property
By default, a browser will try to fetch a /favicon.ico icon
from the root of your web server which is used as an icon
for your application. You can specify an alternative location
by setting this property, or for an individual application
entry point by passing a location to WServer::addEntryPoint().
-->
<!-- <property name="favicon">images/favicon.ico</property> -->
<!-- leafletJSURL and leafletCSSURL properties
This is required if you want to use WLeafletMap, since leaflet itself is not bundled with Wt.
leafletJSURL should be a valid URL leading to the leaflet JavaScript, and leafletCSSURL to the leaflet CSS.
-->
<!-- <property name="leafletJSURL">https://unpkg.com/[email protected]/dist/leaflet.js</property> -->
<!-- <property name="leafletCSSURL">https://unpkg.com/[email protected]/dist/leaflet.css</property> -->
<!-- google_api_key property
The Google API key to be used with WGoogleMap.
-->
<!-- <property name="google_api_key"></property> -->
<!-- Mail properties
These properties can be used to change the default settings used by Wt::Mail::Client.
- smtp-host: the hostname (or IP address) of the SMTP server to connect to (defaults to "localhost")
- smtp-port: the port of the SMTP server to connect to (defaults to 25)
- smtp-self-host: the hostname that the mail client uses to identify itself (defaults to "localhost")
- smtp-transport-encryption: the encryption method to use in the mail client. This can be "none", "starttls", or "tls".
The default is "none" for no encryption.
- smtp-auth-method: the method to use for authentication. This can be "none", "plain", or "login".
The default is "none" for no authentication.
- smtp-auth-username: the username to use for authentication (defaults to empty)
- smtp-auth-password: the password to use for authentication (defaults to empty)
-->
<!-- <property name="smtp-host">localhost</property> -->
<!-- <property name="smtp-port">25</property> -->
<!-- <property name="smtp-self-host">localhost</property> -->
<!-- <property name="smtp-transport-encryption>none</property> -->
<!-- <property name="smtp-auth-method">none</property> -->
<!-- <property name="smtp-auth-username"></property> -->
<!-- <property name="smtp-auth-password"></property> -->
<!-- AuthService properties
These properties are used to configure AuthService.
- auth-mail-sender-name: the sender name when AuthService sends emails, defaults to "Wt Auth module"
- auth-mail-sender-address: the sender address when AuthService sends emails, defaults to "[email protected]"
-->
<!-- <property name="auth-mail-sender-name">Wt Auth module</property> -->
<!-- <property name="auth-mail-sender-address">[email protected]</property> -->
<!-- OAuthService properties
These properties are used to configure OAuthService.
- oauth2-secret: the secret used to create the OAuth2 'state' hash. By default,
this is randomly generated, which is sufficient for single-process
deployments, but for multi-process deployments the same value must
be used in all processes and thus needs to be pre-configured.
- oauth2-redirect-timeout: a timeout (in seconds) for when single-sign-on is used
without popup. If a user takes longer than this to login,
the application will be destroyed. The default is 10 minutes.
-->
<!-- <property name="oauth2-secret"></property> -->
<!-- <property name="oauth2-redirect-timeout">600</property> -->
<!-- SAML properties
These properties are used to configure Saml::Service.
- saml-secret: the secret used to create the SAML 'RelayState'. By default,
this is randomly generated, which is sufficient for single-process
deployments, but for multi-process deployments the same value must
be used in all processes and thus needs to be pre-configured.
- saml-redirect-timeout: a timeout (in seconds) for when single-sign-on is used
without popup. If a user takes longer than this to login,
the application will be destroyed. The default is 10 minutes.
-->
<!-- <property name="saml-secret"></property> -->
<!-- <property name="saml-redirect-timeout">600</property> -->
<!-- PayPal properties
These properties can be used to configure Wt::Payment::PayPalService,
by calling configureFromProperties().
- paypal-user: the PayPal API username
- paypal-password: the PayPal API password
- paypal-signature: the PayPal API signature
- paypal-api-server-url: the URL of the PayPal API server
- paypal-pay-server-url: the URL of the server where the user is redirected for the payment
- paypal-version: the PayPal API version
-->
<!-- <property name="paypal-user"></property>
<property name="paypal-password"></property>
<property name="paypal-signature"></property>
<property name="paypal-api-server-url"></property>
<property name="paypal-pay-server-url"></property>
<property name="paypal-version"></property> -->
<!-- TinyMCE properties
These properties are used to configure TinyMCE for WTextEdit.
- tinyMCEVersion: the version of TinyMCE to use, currently version 3.x and 4.x are supported
- tinyMCEURL: the URL to the main TinyMCE script file
- tinyMCEBaseURL: the base URL where TinyMCE is deployed.
The default is resourcesURL/tiny_mce for TinyMCE 3,
and resourcesURL/tinymce for TinyMCE 4 or later.
Note: resourcesURL refers to the resourcesURL property, which itself defaults to "resources/"
-->
<!-- <property name="tinyMCEVersion">3</property> -->
<!-- <property name="tinyMCEURL"></property> -->
<!-- <property name="tinyMCEBaseURL">resources/tiny_mce</property> -->
</properties>
</application-settings>
<!-- Override settings for specific applications.
Location refers to physical filesystem location of the
application. The application prints this location (which
corresponds to argv[0]) to the log file on startup, and this
should match exactly.
-->
<!--
<application-settings
location="/var/www/localhost/wt-examples/hello.wt">
</application-settings>
-->
</server>