Change comment:
There is no comment for this version
Summary
-
Page properties (2 modified, 0 added, 0 removed)
Details
- Page properties
-
- Author
-
... ... @@ -1,1 +1,1 @@ 1 -XWiki. VincentMassol1 +XWiki.surli - Content
-
... ... @@ -21,7 +21,7 @@ 21 21 22 22 = Versions = 23 23 24 -When a user uploads an attachment and then uploads another attachment with the exact same name, you can decide whether or not to keep a version history of the attachments like you do with documents. 24 +When a user uploads an attachment and then uploads another attachment with the exact same name, you can decide whether or not to keep a version history of the attachments like you do with documents. 25 25 XWiki stores all document attachment versions by default which costs more storage space. If you need only latest versions of attachments, you can disable attachment version control by editing your [[xwiki.cfg>>Documentation.AdminGuide.Configuration#HSamplexwiki.cfg]] and adding: 26 26 27 27 {{code language="none"}} ... ... @@ -105,10 +105,11 @@ 105 105 106 106 = Attachment display or download = 107 107 108 -When possible (see [[Security section>> ||anchor="HSecurity"]] below) attachments are displayed directly in the browser when accessed.108 +When possible (see [[Security section>>#HSecurity]] below) attachments are displayed directly in the browser when accessed. 109 109 It is possible for developers to force-downloading an attachment by adding the parameter ##?force-download=1## in the attachment URL. 110 110 111 -{{version since="12.10"}}it's possible to use a dedicated property in ##xwiki.properties## to always force some attachment mime-types to be downloaded: 111 +{{version since="12.10"}} 112 +it's possible to use a dedicated property in ##xwiki.properties## to always force some attachment mime-types to be downloaded: 112 112 113 113 {{code language="none"}} 114 114 #-# [Since 12.10] ... ... @@ -138,7 +138,7 @@ 138 138 #-# If you want to force downloading some attachments types please check the configuration below. 139 139 #-# 140 140 #-# By default we use the following whitelist (coma separated list of values). 141 -# attachment.download.whitelist=audio/basic,audio/L24,audio/mp4,audio/mpeg,audio/ogg,audio/vorbis,audio/vnd.rn-realaudio,audio/vnd.wave,audio/webm,image/gif,image/jpeg,image/pjpeg,image/png,image/ svg+xml,image/tiff,text/csv,text/plain,text/xml,text/rtf,video/mpeg,video/ogg,video/quicktime,video/webm,video/x-matroska,video/x-ms-wmv,video/x-flv142 +# attachment.download.whitelist=audio/basic,audio/L24,audio/mp4,audio/mpeg,audio/ogg,audio/vorbis,audio/vnd.rn-realaudio,audio/vnd.wave,audio/webm,image/gif,image/jpeg,image/pjpeg,image/png,image/tiff,text/csv,text/plain,text/xml,text/rtf,video/mpeg,video/ogg,video/quicktime,video/webm,video/x-matroska,video/x-ms-wmv,video/x-flv 142 142 #-# 143 143 #-# If you prefer to use a blacklist instead, you can define the forbidden types here, as a coma separated list of 144 144 #-# values. We advise you to forbid at least the following mimetypes : text/html, text/javascript