a72ed82000-07-21Andreas Lange <?xml version="1.0" encoding="iso-8859-1"?> <locale version="1.0"/> <project>roxen_config</project>
799fba2000-08-11Andreas Lange <language>eng</language>
c28ec32000-09-19Andreas Lange <file>../base_server/config_userdb.pike</file>
35b67f2000-11-20Per Hedbor <file>../base_server/configuration.pike</file>
9ff27a2000-09-09Andreas Lange <file>../base_server/global_variables.pike</file>
3093302000-11-21Per Hedbor <file>../base_server/module_support.pike</file>
35b67f2000-11-20Per Hedbor <file>../base_server/roxen.pike</file>
9ff27a2000-09-09Andreas Lange <file>../config_interface/standard/actions/index.html</file>
8615c42000-11-27Martin Nilsson <file>../config_interface/standard/cv_startpage_tabs.pike</file>
c28ec32000-09-19Andreas Lange <file>../config_interface/standard/event_log/clear_log.pike</file>
9ff27a2000-09-09Andreas Lange <file>../config_interface/standard/event_log/log.pike</file>
8615c42000-11-27Martin Nilsson <file>../config_interface/standard/logutil.pike</file>
c28ec32000-09-19Andreas Lange <file>../config_interface/standard/sites/add_module.pike</file> <file>../config_interface/standard/sites/config_left_item.pike</file> <file>../config_interface/standard/sites/create_site.pike</file> <file>../config_interface/standard/sites/drop_module.pike</file> <file>../config_interface/standard/sites/drop_site.pike</file>
9ff27a2000-09-09Andreas Lange <file>../config_interface/standard/sites/log.pike</file> <file>../config_interface/standard/sites/site_content.pike</file> <file>../config_interface/standard/sites/site_header.pike</file> <file>../config_interface/standard/sites/site_templates/common.pike</file>
8615c42000-11-27Martin Nilsson <file>../config_interface/standard/statusinfo.pike</file> <file>../config_interface/standard/template</file> <file>../config_interface/standard/topmenu.pike</file> <file>../config_interface/standard/user_delete.pike</file> <file>../config_interface/standard/user_form.pike</file>
35b67f2000-11-20Per Hedbor <file>../etc/modules/Variable.pmod/Date.pike</file> <file>../etc/modules/Variable.pmod/Email.pike</file>
8615c42000-11-27Martin Nilsson <file>../etc/modules/Variable.pmod/Image.pike</file> <file>../etc/modules/Variable.pmod/Upload.pike</file>
35b67f2000-11-20Per Hedbor <file>../etc/modules/Variable.pmod/VerifiedString.pike</file> <file>../etc/modules/Variable.pmod/module.pmod</file> <file>../modules/configuration/config_filesystem.pike</file> <file>../modules/configuration/config_tags.pike</file> <file>../modules/configuration/config_userdb.pike</file> <file>../modules/configuration/update.pike</file>
9ff27a2000-09-09Andreas Lange 
987aef2000-08-03Andreas Lange <str id="2">
9ff27a2000-09-09Andreas Lange <o>Sent data:</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="3"> <o>sec</o> <t></t> </str> <str id="4">
9ff27a2000-09-09Andreas Lange <o>Sent headers:</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="6"> <o>min</o> <t></t> </str> <str id="7">
9ff27a2000-09-09Andreas Lange <o>Received data:</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="8">
9ff27a2000-09-09Andreas Lange <o>FTP users (total):</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="9">
9ff27a2000-09-09Andreas Lange <o>FTP users (now):</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="10">
9ff27a2000-09-09Andreas Lange <o>FTP statistics:</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="11">
c28ec32000-09-19Andreas Lange <o>Reloaded %s.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="12"> <o>Priority</o> <t></t> </str> <str id="13"> <o>The priority of the module. 9 is highest and 0 is lowest. Modules with the same priority can be assumed to be called in random order</o> <t></t> </str> <str id="14"> <o>Security: Realm</o> <t></t> </str> <str id="15"> <o>The realm to use when requesting password from the client. Usually used as an informative message to the user.</o> <t></t> </str> <str id="16"> <o>Security: Patterns</o> <t></t> </str> <str id="17"> <o>This is the 'security level=value' list.&lt;br /&gt;Each security level can be any or more from this list:&lt;hr noshade="noshade" /&gt;allow ip=&lt;i&gt;IP&lt;/i&gt;/&lt;i&gt;bits&lt;/i&gt;&lt;br /&gt;allow ip=&lt;i&gt;IP&lt;/i&gt;:&lt;i&gt;mask&lt;/i&gt;&lt;br /&gt;allow ip=&lt;i&gt;pattern&lt;/i&gt;&lt;br /&gt;allow user=&lt;i&gt;username&lt;/i&gt;,...&lt;br /&gt;deny ip=&lt;i&gt;IP&lt;/i&gt;/&lt;i&gt;bits&lt;/i&gt;&lt;br /&gt;deny ip=&lt;i&gt;IP&lt;/i&gt;:&lt;i&gt;mask&lt;/i&gt;&lt;br /&gt;deny ip=&lt;i&gt;pattern&lt;/i&gt;&lt;br /&gt;&lt;hr noshade="noshade" /&gt;In patterns: * matches one or more characters, and ? matches one character.&lt;p&gt;In username: 'any' stands for any valid account (from .htaccess or an auth module. The default (used when _no_ entries are present) is 'allow ip=*', allowing everyone to access the module.&lt;/p&gt;</o> <t></t> </str> <str id="18"> <o>Security: Security level</o> <t></t> </str> <str id="20"> <o>Default site</o> <t></t> </str> <str id="21"> <o>If true, this site will be selected in preference of other sites when virtual hosting is used and no host header is supplied, or the supplied host header does not match the address of any of the other servers.</o> <t></t> </str> <str id="22">
c28ec32000-09-19Andreas Lange <o>Site comment</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="23"> <o>This text will be visible in the administration interface, it can be quite useful to use as a memory helper.</o> <t></t> </str> <str id="24">
c28ec32000-09-19Andreas Lange <o>Site name</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="25">
c28ec32000-09-19Andreas Lange <o>This is the name that will be used in the administration interface. If this is left empty, the actual name of the site will be used.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="26"> <o>Logging: Format</o> <t></t> </str> <str id="27"> <o>What format to use for logging. The syntax is:
a72ed82000-07-21Andreas Lange &lt;pre&gt;response-code or *: Log format for that response code Log format is normal characters, or one or more of the variables below: \n \t \r -- As in C, newline, tab and linefeed $char(int) -- Insert the (1 byte) character specified by the integer. $wchar(int) -- Insert the (2 byte) word specified by the integer. $int(int) -- Insert the (4 byte) word specified by the integer. $^ -- Supress newline at the end of the logentry $host -- The remote host name, or ip number. $ip_number -- The remote ip number. $bin-ip_number -- The remote host id as a binary integer number. $cern_date -- Cern Common Log file format date. $bin-date -- Time, but as an 32 bit integer in network byteorder $method -- Request method $resource -- Resource identifier $full_resource -- Full requested resource, including any query fields $protocol -- The protocol used (normally HTTP/1.0) $response -- The response code sent $bin-response -- The response code sent as a binary short number $length -- The length of the data section of the reply $bin-length -- Same, but as an 32 bit integer in network byteorder $request-time -- The time the request took (seconds) $referer -- the header 'referer' from the request, or '-'. $user_agent -- the header 'User-Agent' from the request, or '-'. $user -- the name of the auth user used, if any $user_id -- A unique user ID, if cookies are supported, by the client, otherwise '0'
987aef2000-08-03Andreas Lange &lt;/pre&gt;</o> <t></t> </str> <str id="28"> <o>Logging: Enabled</o> <t></t> </str> <str id="29"> <o>Log requests</o> <t></t> </str> <str id="30"> <o>Logging: Log file</o> <t></t> </str> <str id="31"> <o>The log file. &lt;pre&gt;%y Year (e.g. '1997')
a72ed82000-07-21Andreas Lange %m Month (e.g. '08') %d Date (e.g. '10' for the tenth) %h Hour (e.g. '00') %H Hostname
987aef2000-08-03Andreas Lange &lt;/pre&gt;</o> <t></t> </str> <str id="32"> <o>Logging: No Logging for</o> <t></t> </str> <str id="33"> <o>Don't log requests from hosts with an IP number which matches any of the patterns in this list. This also affects the access counter log.</o> <t></t> </str> <str id="34"> <o>Domain</o> <t></t> </str> <str id="35">
c28ec32000-09-19Andreas Lange <o>The domain name of the server. The domain name is used to generate default URLs, and to generate email addresses.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="36"> <o>Primary Server URL</o> <t></t> </str> <str id="37"> <o>This is the main server URL, where your start page is located. Please note that you also have to configure the 'URLs' variable.</o> <t></t> </str> <str id="38"> <o>URLs</o> <t></t> </str> <str id="39"> <o>Bind to these URLs. You can use '*' and '?' to perform globbing (using any of these will default to binding to all IP-numbers on your machine). The possible protocols are http, fhttp (a faster version of the normal HTTP protocol, but not 100% compatible with all modules) https, ftp, ftps, gopher and tetris.</o> <t></t> </str> <str id="40"> <o>Internal module resource mountpoint</o> <t></t> </str> <str id="41"> <o>Some modules may want to create links to internal resources. This setting configures an internally handled location that can be used for such purposes. Simply select a location that you are not likely to use for regular resources.</o> <t></t> </str> <str id="42">
35b67f2000-11-20Per Hedbor <o>Throttling: Server; Enabled</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="43">
c28ec32000-09-19Andreas Lange <o>If set, per-server bandwidth throttling will be enabled. It will allow you to limit the total available bandwidth for this site.&lt;br /&gt;Bandwidth is assigned using a Token Bucket. The principle under which it works is: for each byte we send we use a token. Tokens are added to a repository at a constant rate. When there's not enough, we can't transmit. When there's too many, they "spill" and are lost.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="44">
35b67f2000-11-20Per Hedbor <o>Throttling: Server; Average available bandwidth</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="45">
c28ec32000-09-19Andreas Lange <o>This is the average bandwidth available to this site in bytes/sec (the bucket "fill rate").</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="46">
35b67f2000-11-20Per Hedbor <o>Throttling: Server; Bucket Depth</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="47"> <o>This is the maximum depth of the bucket. After a long enough period of inactivity, a request will get this many unthrottled bytes of data, before throttling kicks back in.&lt;br&gt;Set equal to the Fill Rate in order not to allow any data bursts. This value determines the length of the time over which the bandwidth is averaged.</o> <t></t> </str> <str id="48">
35b67f2000-11-20Per Hedbor <o>Throttling: Server; Minimum Grant</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="49"> <o>When the bandwidth availability is below this value, connections will be delayed rather than granted minimal amounts of bandwidth. The purpose is to avoid sending too small packets (which would increase the IP overhead).</o> <t></t> </str> <str id="50">
35b67f2000-11-20Per Hedbor <o>Throttling: Server; Maximum Grant</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="51"> <o>This is the maximum number of bytes assigned in a single request to a connection. Keeping this number low will share bandwidth more evenly among the pending connections, but keeping it too low will increase IP overhead and (marginally) CPU usage. You'll want to set it just a tiny bit lower than any integer multiple of your network's MTU (typically 1500 for ethernet).</o> <t></t> </str> <str id="52">
35b67f2000-11-20Per Hedbor <o>Throttling: Request; Enabled</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="53"> <o>If set, per-request bandwidth throttling will be enabled.</o> <t></t> </str> <str id="54">
35b67f2000-11-20Per Hedbor <o>Throttling: Request; Minimum guarranteed bandwidth</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="55"> <o>The maximum bandwidth each connection (in bytes/sec) can use is determined combining a number of modules. But doing so can lead to too small or even negative bandwidths for particularly unlucky requests. This variable guarantees a minimum bandwidth for each request.</o> <t></t> </str> <str id="56">
35b67f2000-11-20Per Hedbor <o>Throttling: Request; Bucket Depth Multiplier</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="57"> <o>The average bandwidth available for each request will be determined by the modules combination. The bucket depth will be determined multiplying the rate by this factor.</o> <t></t> </str> <str id="58">
35b67f2000-11-20Per Hedbor <o>No such file message</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="59"> <o>What to return when there is no resource or file available at a certain location.</o> <t></t> </str> <str id="60"> <o>Welcome text</o> <t></t> </str> <str id="61"> <o>The text shown to the user on connect</o> <t></t> </str> <str id="62"> <o>User session limit</o> <t></t> </str> <str id="63"> <o>The maximum number of times a user can connect at once. 0 means unlimited.</o> <t></t> </str> <str id="64"> <o>Allow named ftp</o> <t></t> </str> <str id="65"> <o>If yes, non-anonymous users can connect</o> <t></t> </str> <str id="66"> <o>Allow login with incorrect password/user</o> <t></t> </str> <str id="67"> <o>If yes, users can connect with the wrong password and/or username. This is useful since things like .htaccess files can later on authenticate the user.</o> <t></t> </str> <str id="68"> <o>Allow anonymous ftp</o> <t></t> </str> <str id="69"> <o>If yes, anonymous users is allowed to connect.</o> <t></t> </str> <str id="70"> <o>Shell database</o> <t></t> </str> <str id="71"> <o>If this string is set to anything but the empty string, it should point to a file containing a list of valid shells. Users with shells that does not figure in this list will not be allowed to log in.</o> <t></t> </str> <str id="72"> <o>Show internal errors</o> <t></t> </str> <str id="73"> <o>Show 'Internal server error' messages to the user. This is very useful if you are debugging your own modules or writing Pike scripts.</o> <t></t> </str> <str id="74"> <o>Logging: Set unique user id cookies</o> <t></t> </str> <str id="75"> <o>If set to Yes, all users of your server whose clients support cookies will get a unique 'user-id-cookie', this can then be used in the log and in scripts to track individual users.</o> <t></t> </str> <str id="76"> <o>Logging: Set ID cookies only once</o> <t></t> </str> <str id="77"> <o>If set to Yes, Roxen will attempt to set unique user ID cookies only upon receiving the first request (and again after some minutes). Thus, if the user doesn't allow the cookie to be set, she won't be bothered with multiple requests.</o> <t></t> </str> <str id="78"> <o>Logging method</o> <t></t> </str> <str id="79"> <o>None - No log&lt;br /&gt;CommonLog - A common log in a file&lt;br /&gt;Compat - Log through Roxen's normal logging format.&lt;br /&gt;&lt;p&gt;Please note that compat limits Roxen to less than 1k requests/second.&lt;/p&gt;</o> <t></t> </str> <str id="80"> <o>Log file</o> <t></t> </str> <str id="81"> <o>This file is used if logging is done using the CommonLog method.</o> <t></t> </str> <str id="82"> <o>Ram cache</o> <t></t> </str> <str id="83"> <o>The size of the ram cache, in MegaBytes</o> <t></t> </str> <str id="84"> <o>Client timeout</o> <t></t> </str> <str id="85"> <o>The maximum time Roxen will wait for a client before giving up, and close the connection, in seconds</o> <t></t> </str> <str id="86"> <o>SSL certificate file</o> <t></t> </str> <str id="87"> <o>The SSL certificate file to use. The path is relative to %s</o> <t></t> </str> <str id="88"> <o>SSL key file</o> <t></t> </str> <str id="89"> <o>The SSL key file to use. The path is relative to %s, you do not have to specify a key file, leave this field empty to use the certificate file only</o> <t></t> </str> <str id="90"> <o>Logging: Log entire file length in restored connections</o> <t></t> </str> <str id="91">
c28ec32000-09-19Andreas Lange <o>If this toggle is enabled log entries for restored connections will log the amount of sent data plus the restoration location. Ie if a user has downloaded 100 bytes of a file already, and makes a Range request fetching the remaining 900 bytes, the log entry will log it as if the entire 1000 bytes were downloaded. &lt;p&gt;This is useful if you want to know if downloads were successful (the user has the complete file downloaded). The drawback is that bandwidth statistics on the log file will be incorrect. The statistics in Roxen will still be correct.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="92"> <o>Default font</o> <t></t> </str> <str id="93"> <o>The default font to use when modules request a font.</o> <t></t> </str> <str id="94"> <o>Font directories</o> <t></t> </str> <str id="95"> <o>This is where the fonts are located.</o> <t></t> </str> <str id="96"> <o>Logging: Log directory prefix</o> <t></t> </str> <str id="97">
c28ec32000-09-19Andreas Lange <o>This is the default file path that will be prepended to the log file path in all the default modules and the site.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="98"> <o>Cache: Proxy Disk Cache Enabled</o> <t></t> </str> <str id="99"> <o>If set to Yes, caching will be enabled.</o> <t></t> </str> <str id="100"> <o>Cache: Proxy Disk Cache Clean size</o> <t></t> </str> <str id="101"> <o>Minimum number of Megabytes removed when a garbage collect is done.</o> <t></t> </str> <str id="102"> <o>Cache: Proxy Disk Cache Minimum available free space and inodes (in %)</o> <t></t> </str> <str id="103"> <o>If less than this amount of disk space or inodes (in %) is left, the cache will remove a few files. This check may work half-hearted if the diskcache is spread over several filesystems.</o> <t></t> </str> <str id="104"> <o>Cache: Proxy Disk Cache Size</o> <t></t> </str> <str id="105"> <o>How many MB may the cache grow to before a garbage collect is done?</o> <t></t> </str> <str id="106"> <o>Cache: Proxy Disk Cache Maximum number of files</o> <t></t> </str> <str id="107"> <o>How many cache files (inodes) may be on disk before a garbage collect is done ? May be left zero to disable this check.</o> <t></t> </str> <str id="108"> <o>Cache: Proxy Disk Cache bytes per second</o> <t></t> </str> <str id="109"> <o>How file size should be treated during garbage collect. Each X bytes counts as a second, so that larger files will be removed first.</o> <t></t> </str> <str id="110"> <o>Cache: Proxy Disk Cache Base Cache Dir</o> <t></t> </str> <str id="111"> <o>This is the base directory where cached files will reside. To avoid mishaps, 'roxen_cache/' is always prepended to this variable.</o> <t></t> </str> <str id="112"> <o>Cache: Proxy Disk Cache Number of hash directories</o> <t></t> </str> <str id="113"> <o>This is the number of directories to hash the contents of the disk cache into. Changing this value currently invalidates the whole cache, since the cache cannot find the old files. In the future, the cache will be recalculated when this value is changed.</o> <t></t> </str> <str id="114"> <o>Cache: Proxy Disk Cache Keep without Content-Length</o> <t></t> </str> <str id="115"> <o>Keep files without Content-Length header information in the cache?</o> <t></t> </str> <str id="116"> <o>Cache: Proxy Disk Cache Refreshes on Last-Modified</o> <t></t> </str> <str id="117"> <o>If set, refreshes files without Expire header information when they have reached double the age they had when they got cached. This may be useful for some regularly updated docs as online newspapers.</o> <t></t> </str> <str id="118"> <o>Cache: Proxy Disk Cache Last resort (in days)</o> <t></t> </str> <str id="119"> <o>How many days shall files without Expires and without Last-Modified header information be kept?</o> <t></t> </str> <str id="120"> <o>Cache: Proxy Disk Cache Garbage collector logfile</o> <t></t> </str> <str id="121"> <o>Information about garbage collector runs, removed and refreshed files, cache and disk status goes here.</o> <t></t> </str> <str id="122"> <o>PID file</o> <t></t> </str> <str id="123"> <o>In this file, the server will write out it's PID, and the PID of the start script. $pid will be replaced with the pid, and $uid with the uid of the user running the process. &lt;br /&gt;Note: It can be overridden by the command line option.</o> <t></t> </str> <str id="124"> <o>Identify, Use default identification string</o> <t></t> </str> <str id="125">
c28ec32000-09-19Andreas Lange <o>Setting this variable to No will display the "Identify as" node where you can state what Roxen should call itself when talking to clients.&lt;br /&gt;It is possible to disable this so that you can enter an identification-string that does not include the actual version of Roxen, as recommended by the HTTP/1.0 and HTTP/1.1 RFCs:&lt;p&gt;&lt;blockquote&gt;&lt;i&gt;Note: Revealing the specific software version of the server may allow the server machine to become more vulnerable to attacks against software that is known to contain security holes. Server implementors are encouraged to make this field a configurable option.&lt;/i&gt;&lt;/blockquote&gt;&lt;/p&gt;</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="126"> <o>Identify, Identify as</o> <t></t> </str> <str id="127"> <o>Enter the name that Roxen should use when talking to clients. </o> <t></t> </str> <str id="128"> <o>Change uid and gid to</o> <t></t> </str> <str id="129">
c28ec32000-09-19Andreas Lange <o>When Roxen is run as root, to be able to open port 80 for listening, change to this user-id and group-id when the port has been opened. If you specify a symbolic username, the default group of that user will be used. The syntax is user[:group].</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="130"> <o>Change uid and gid permanently</o> <t></t> </str> <str id="131">
c28ec32000-09-19Andreas Lange <o>If this variable is set, Roxen will set it's uid and gid permanently. This disables the 'exec script as user' features for CGI, and also 'access files as user' in the filesystems, but it gives better security.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="132"> <o>Module directories</o> <t></t> </str> <str id="133"> <o>This is a list of directories where Roxen should look for modules. Can be relative paths, from the directory you started Roxen. The directories are searched in order for modules.</o> <t></t> </str> <str id="134"> <o>Client supports regexps</o> <t></t> </str> <str id="135"> <o>What do the different clients support? &lt;br /&gt;The default information is normally fetched from the file server/etc/supports in your Roxen directory.</o> <t></t> </str> <str id="136"> <o>Logging: Audit trail</o> <t></t> </str> <str id="137"> <o>If Audit trail is set to Yes, all changes of uid will be logged in the Event log.</o> <t></t> </str> <str id="138">
c28ec32000-09-19Andreas Lange <o>Logging: Debug log method</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="139">
c28ec32000-09-19Andreas Lange <o>What method to use for the debug log, default is file, but syslog is also available. When using file, the output is really sent to stdout and stderr, but this is handled by the start script.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="140"> <o>Logging: Log PID</o> <t></t> </str> <str id="141"> <o>If set, the PID will be included in the syslog.</o> <t></t> </str> <str id="142"> <o>Logging: Log to system console</o> <t></t> </str> <str id="143"> <o>If set and syslog is used, the error/debug message will be printed to the system console as well as to the system log.</o> <t></t> </str> <str id="144"> <o>Logging: Syslog type</o> <t></t> </str> <str id="145"> <o>When using SYSLOG, which log type should be used.</o> <t></t> </str> <str id="146"> <o>Logging: Log what to syslog</o> <t></t> </str> <str id="147"> <o>When syslog is used, how much should be sent to it?&lt;br /&gt;&lt;hr /&gt;Fatal: Only messages about fatal errors&lt;br /&gt;Errors: Only error or fatal messages&lt;br /&gt;Warning: Warning messages as well&lt;br /&gt;Debug: Debug messager as well&lt;br /&gt;All: Everything&lt;br /&gt;</o> <t></t> </str> <str id="148"> <o>Logging: Log as</o> <t></t> </str> <str id="149"> <o>When syslog is used, this will be the identification of the Roxen daemon. The entered value will be appended to all logs.</o> <t></t> </str> <str id="150"> <o>Number of threads to run</o> <t></t> </str> <str id="151"> <o>The number of simultaneous threads Roxen will use.
a72ed82000-07-21Andreas Lange &lt;p&gt;Please note that even if this is one, Roxen will still be able to serve multiple requests, using a select loop based system.
987aef2000-08-03Andreas Lange &lt;i&gt;This is quite useful if you have more than one CPU in your machine, or if you have a lot of slow NFS accesses.&lt;/i&gt;&lt;/p&gt;</o> <t></t> </str> <str id="154"> <o>ABS: Enable Anti-Block-System</o> <t></t> </str> <str id="155"> <o>If set, the anti-block-system will be enabled. This will restart the server after a configurable number of minutes if it locks up. If you are running in a single threaded environment heavy calculations will also halt the server. In multi-threaded mode bugs such as eternal loops will not cause the server to reboot, since only one thread is blocked. In general there is no harm in having this option enabled. </o> <t></t> </str> <str id="156"> <o>ABS: Timeout</o> <t></t> </str> <str id="157"> <o>If the server is unable to accept connection for this many minutes, it will be restarted. You need to find a balance: if set too low, the server will be restarted even if it's doing legal things (like generating many images), if set too high you might get a long downtime if the server for some reason locks up.</o> <t></t> </str> <str id="158"> <o>Default language</o> <t></t> </str> <str id="159">
c28ec32000-09-19Andreas Lange <o>Locale, used to localize all messages in Roxen. Standard means using the default locale, which varies according to the value of the 'LANG' environment variable.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="160"> <o>Auto Restart: Enable Automatic Restart</o> <t></t> </str> <str id="161"> <o>If set, Roxen will automatically restart after a configurable number of days. Since Roxen uses a monolith, non-forking server model the process tends to grow in size over time. This is mainly due to heap fragmentation but also because of memory leaks.</o> <t></t> </str> <str id="162"> <o>Auto Restart: Timeout</o> <t></t> </str> <str id="163"> <o>Automatically restart the server after this many days.</o> <t></t> </str> <str id="164"> <o>Cache: Store the argument cache in a mysql database</o> <t></t> </str> <str id="165"> <o>If set, store the argument cache in a mysql database. This is very useful for load balancing using multiple Roxen servers, since the mysql database will handle synchronization.</o> <t></t> </str> <str id="166"> <o>Cache: Argument Cache Database URL to use</o> <t></t> </str> <str id="167"> <o>The database to use to store the argument cache.</o> <t></t> </str> <str id="168"> <o>Cache: Argument Cache Directory</o> <t></t> </str> <str id="169"> <o>The cache directory to use to store the argument cache. Please note that load balancing is not available for most modules (such as gtext, diagram etc) unless you use a mysql database to store the argument cache meta data.</o> <t></t> </str> <str id="170"> <o>Cache: Memory Cache Garbage Collect Interval</o> <t></t> </str> <str id="171"> <o>The number of seconds between every garbage collect (removal of old content) from the memory cache. The memory cache is used for various tasks like remebering what supports flags matches what client.</o> <t></t> </str> <str id="172"> <o>Commented config files</o> <t></t> </str> <str id="173"> <o>Save the variable documentation strings as comments in the configuration files. Only useful if you read or edit the config files directly.</o> <t></t> </str> <str id="174"> <o>Show documentation</o> <t></t> </str> <str id="175"> <o>Show the variable documentation.</o> <t></t> </str> <str id="176"> <o>Show advanced configuration options</o> <t></t> </str> <str id="177"> <o>Show all possible configuration options, not only the ones that are most often changed.</o> <t></t> </str> <str id="178">
9ff27a2000-09-09Andreas Lange <o>Show all translations</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="179">
9ff27a2000-09-09Andreas Lange <o>Show the language selection flags. All translations will be listed, more or less completed.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="180"> <o>Show developer options and actions</o> <t></t> </str> <str id="181">
9ff27a2000-09-09Andreas Lange <o>Show settings and actions that are not normaly useful for non-developer users. If you develop your own Roxen modules, this option is for you.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="182"> <o>Background color</o> <t></t> </str> <str id="183"> <o>Administration interface background color.</o> <t></t> </str> <str id="184"> <o>Text color</o> <t></t> </str> <str id="185"> <o>Administration interface text color.</o> <t></t> </str> <str id="186"> <o>Link color</o> <t></t> </str> <str id="187"> <o>Font</o> <t></t> </str> <str id="188"> <o>Administration interface font.</o> <t></t> </str> <str id="189"> <o>Add/Delete module page type</o> <t></t> </str> <str id="191"> <o>All Permissions</o> <t></t> </str> <str id="192"> <o>View Settings</o> <t></t> </str> <str id="193"> <o>Edit Users</o> <t></t> </str> <str id="194"> <o>Edit Global Variables</o> <t></t> </str> <str id="196"> <o>Tasks</o> <t></t> </str> <str id="197"> <o>Restart</o> <t></t> </str> <str id="198"> <o>Shutdown</o> <t></t> </str> <str id="199"> <o>Create Sites</o> <t></t> </str> <str id="200"> <o>Add Modules</o> <t></t> </str> <str id="bA"> <o>Save</o> <t></t> </str> <str id="201"> <o>Ok</o> <t></t> </str> <str id="202"> <o>Cancel</o> <t></t> </str> <str id="203"> <o>Next</o> <t></t> </str> <str id="204"> <o>Administration Interface</o> <t></t> </str> <str id="205"> <o>Language</o> <t></t> </str> <str id="206"> <o>User</o> <t></t> </str> <str id="cw"> <o>and</o> <t></t> </str> <str id="207"> <o>every</o> <t></t> </str> <str id="208"> <o>since</o> <t></t> </str> <str id="209"> <o>Notice</o> <t></t> </str> <str id="210"> <o>Warning</o> <t></t> </str> <str id="211"> <o>Error</o> <t></t> </str> <str id="212"> <o>Admin</o> <t></t> </str> <str id="213"> <o>Sites</o> <t></t> </str> <str id="214"> <o>Globals</o> <t></t> </str> <str id="215"> <o>Ports</o> <t></t> </str> <str id="216"> <o>Events</o> <t></t> </str> <str id="217"> <o>Docs</o> <t></t> </str> <str id="218"> <o>Startpage</o> <t></t> </str> <str id="219"> <o>Update</o> <t></t> </str> <str id="220"> <o>Your Settings</o> <t></t> </str> <str id="221"> <o>Users</o> <t></t> </str> <str id="226"> <o>Permission denied</o> <t></t> </str> <str id="227"> <o>Delete</o> <t></t> </str> <str id="228"> <o>Status</o> <t></t> </str> <str id="247"> <o>Clear Log</o> <t></t> </str> <str id="249"> <o>Drop old site</o> <t></t> </str> <str id="250"> <o>Empty</o> <t></t> </str> <str id="255">
c28ec32000-09-19Andreas Lange <o>Disabling old configuration %s</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="256"> <o>Settings</o> <t></t> </str> <str id="257"> <o>Modules</o> <t></t> </str> <str id="258"> <o>Add module</o> <t></t> </str> <str id="259"> <o>Drop module</o> <t></t> </str>
a72ed82000-07-21Andreas Lange 
987aef2000-08-03Andreas Lange <str id="251"> <o>Add Module</o> <t></t> </str> <str id="252"> <o>Drop Module</o> <t></t> </str> <str id="253"> <o>Reload</o> <t></t> </str> <str id="254"> <o>Module homepage</o> <t></t> </str> <str id="260"> <o>Request status</o> <t></t> </str> <str id="261"> <o>Inherit tree</o> <t></t> </str> <str id="dt">
c28ec32000-09-19Andreas Lange <o>Administrator logged on as %s from %s.</o>
987aef2000-08-03Andreas Lange <t></t> </str> <str id="264"> <o>Mountpoint</o> <t></t> </str> <str id="265"> <o>Usually / is a good idea</o> <t></t> </str> <str id="266"> <o>Will be loaded from: </o> <t></t> </str> <str id="267"> <o>View</o> <t></t> </str> <str id="272"> <o>Reload module list</o> <t></t> </str> <str id="273"> <o>Select one or several modules to add.</o> <t></t> </str>
9ff27a2000-09-09Andreas Lange  <str id="274">
35b67f2000-11-20Per Hedbor <o>Cache:Cache size</o>
9ff27a2000-09-09Andreas Lange <t></t> </str> <str id="275"> <o>The size of the data cache used to speed up requests for commonly requested files, in KBytes</o> <t></t> </str> <str id="276">
35b67f2000-11-20Per Hedbor <o>Cache:Max file size</o>
9ff27a2000-09-09Andreas Lange <t></t> </str> <str id="277"> <o>The maximum size of a file that is to be considered for the cache</o> <t></t> </str> <str id="278"> <o>Compact site list</o> <t></t> </str> <str id="279"> <o>If true, the list list will be presented in a compact format suitable for servers with many sites.</o> <t></t> </str> <str id="280"> <o>normal</o> <t></t> </str> <str id="281"> <o>Show module name and documentation with images.</o> <t></t> </str> <str id="282"> <o>fast</o> <t></t> </str> <str id="283"> <o>Like normal, but no type images.</o> <t></t> </str> <str id="284"> <o>faster</o> <t></t> </str> <str id="285"> <o>Like normal, but allows selecting multiple modules at once.</o> <t></t> </str> <str id="286"> <o>compact</o> <t></t> </str> <str id="287"> <o>Only show the names of modules, and allow addition/deletion of multiple modules at once.</o> <t></t> </str> <str id="288"> <o>really compact</o> <t></t> </str> <str id="289"> <o>Like compact, but no module classes.</o> <t></t> </str> <str id="290"> <o>Module event log for '%s' cleared by %s (%s) from %s</o> <t></t> </str> <str id="291"> <o>handled by</o> <t></t> </str> <str id="292"> <o>Cache status</o> <t></t> </str> <str id="293"> <o>Hits</o> <t></t> </str> <str id="294"> <o>Misses</o> <t></t> </str> <str id="295"> <o>Entries</o> <t></t> </str> <str id="297"> <o>New row</o> <t></t> </str> <str id="yes"> <o>Yes</o> <t></t> </str> <str id="no"> <o>No</o> <t></t> </str> <str id="298"> <o>Event log cleared by %s from %s</o> <t></t> </str> <str id="299"> <o>Information</o> <t></t> </str> <str id="300"> <o>This port was requested, but binding it failed.</o> <t></t> </str> <str id="301"> <o>Not open</o> <t></t> </str> <str id="1"> <o>Initial variables for </o> <t></t> </str> <str id="190"> <o>Initial variables for the site</o> <t></t> </str>
c28ec32000-09-19Andreas Lange  <str id="229"> <o>Page charset</o> <t></t> </str> <str id="230"> <o>The charset to use when rendering configuration interface pages.</o> <t></t> </str> <str id="233"> <o>Failed login attempt %s from %s</o> <t></t> </str> <str id="234"> <o>Requests:</o> <t></t> </str> <str id="235"> <o>Are you sure you want to disable the site %s?</o> <t></t> </str>
35b67f2000-11-20Per Hedbor  <str id="236"> <o>Default variable sort order</o> <t></t> </str> <str id="237"> <o>The default order variables are sorted in</o> <t></t> </str> <str id="238"> <o>alphabetical</o> <t></t> </str> <str id="239"> <o>as defined</o> <t></t> </str> <str id="240"> <o>alphabetical, changed first</o> <t></t> </str> <str id="241"> <o>as defined, changed first</o> <t></t> </str> <str id="242"> <o>Changed variables are highlighted</o> <t></t> </str> <str id="243"> <o>How to highlight variables that does not have their default value</o> <t></t> </str> <str id="244"> <o>Not at all</o> <t></t> </str> <str id="268"> <o>Different background color</o> <t></t> </str> <str id="302"> <o>Add a header</o> <t></t> </str> <str id="303"> <o>Group Tasks</o> <t></t> </str> <str id="304"> <o>If true, tasks are grouped acording to type, otherwise all tasks will be listed on one page</o> <t></t> </str> <str id="305"> <o>The modules security level is used to determine if a request should be handled by the module. &lt;p&gt;&lt;h2&gt;Security level vs Trust level&lt;/h2&gt; Each module has a configurable &lt;i&gt;security level&lt;/i&gt;. Each request has an assigned trust level. Higher &lt;i&gt;trust levels&lt;/i&gt; grants access to modules with higher &lt;i&gt;security levels&lt;/i&gt;. &lt;p&gt;&lt;h2&gt;Definitions&lt;/h2&gt;&lt;ul&gt; &lt;li&gt;A requests initial Trust level is infinitely high.&lt;/li&gt; &lt;li&gt; A request will only be handled by a module if its &lt;i&gt;trust level&lt;/i&gt; is higher or equal to the &lt;i&gt;security level&lt;/i&gt; of the module.&lt;/li&gt; &lt;li&gt; Each time the request is handled by a module the &lt;i&gt;trust level&lt;/i&gt; of the module will be set to the lower of its &lt;i&gt;trust level&lt;/i&gt; and the modules &lt;i&gt;security level&lt;/i&gt;, &lt;i&gt;unless&lt;/i&gt; the security level of the module is 0, which is a special case and means that no change should be made.&lt;/li&gt; &lt;/ul&gt;&lt;/p&gt; &lt;p&gt;&lt;h2&gt;Example&lt;/h2&gt; Modules:&lt;ul&gt; &lt;li&gt; User filesystem, &lt;i&gt;security level&lt;/i&gt; 1&lt;/li&gt; &lt;li&gt; Filesystem module, &lt;i&gt;security level&lt;/i&gt; 3&lt;/li&gt; &lt;li&gt; CGI module, &lt;i&gt;security level&lt;/i&gt; 2&lt;/li&gt; &lt;/ul&gt;&lt;/p&gt; &lt;p&gt;A request handled by "User filesystem" is assigned a &lt;i&gt;trust level&lt;/i&gt; of one after the &lt;i&gt;security level&lt;/i&gt; of that module. That request can then not be handled by the "CGI module" since that module has a higher &lt;i&gt;security level&lt;/i&gt; than the requests trust level.&lt;/p&gt; &lt;p&gt;On the other hand, a request handled by the the "Filsystem module" could later be handled by the "CGI module".&lt;/p&gt;</o> <t></t> </str> <str id="306"> <o>Site</o> <t></t> </str> <str id="307"> <o>No such file message override files</o> <t></t> </str> <str id="308"> <o>If no file match a given resource all directories above the wanted file is searched for one of the files in this list.&lt;p&gt; As an example, if the file /foo/bar/not_there.html is wanted, and this list contains the default value of 404.inc, these files will be searched for, in this order:&lt;/p&gt;&lt;br /&gt; /foo/bar/404.inc, /foo/404.inc and /404.inc.</o> <t></t> </str> <str id="309"> <o>Require user with the 'hilfe' permission</o> <t></t> </str> <str id="310"> <o>If yes, require a user with the hilfe permission set, otherwise, any configuration interface user will work, even one with only the view settings permission</o> <t></t> </str> <str id="311"> <o>Site event log for '%s' cleared by %s (%s) from %s</o> <t></t> </str> <str id="312"> <o>Could not interpret the date</o> <t></t> </str> <str id="313"> <o>An email address must contain "@".</o> <t></t> </str> <str id="314"> <o>The email address domain contains forbidden characters.</o> <t></t> </str> <str id="315"> <o>The email address user contains forbidden characters.</o> <t></t> </str> <str id="316"> <o>The email address does not contain a user.</o> <t></t> </str> <str id="317"> <o>The email address does not contain a domain.</o> <t></t> </str> <str id="318"> <o>The email address begins with an character that is not legal in that position.</o> <t></t> </str> <str id="319"> <o>The domain %s could not be found.</o> <t></t> </str> <str id="320"> <o>Value %s does not match the regexp %s.</o> <t></t> </str> <str id="321"> <o>Value %s does not match the glob %s.</o> <t></t> </str> <str id="322"> <o>Value %s must be at least %d characters long. (%d character short)</o> <t></t> </str> <str id="323"> <o>Value %s must not be more than %d characters long. (%d character too long)</o> <t></t> </str> <str id="324"> <o>Value %s is not uppercased.</o> <t></t> </str> <str id="325"> <o>Value %s is not lowercased.</o> <t></t> </str> <str id="326"> <o>unnamed</o> <t></t> </str> <str id="327"> <o>Internal error: Illegal sized array from verify_set_from_form </o> <t></t> </str> <str id="328"> <o>Value is bigger than %s, adjusted</o> <t></t> </str> <str id="329"> <o>Value is less than %s, adjusted</o> <t></t> </str> <str id="330"> <o>You most likely want an ending '/' on this variable</o> <t></t> </str> <str id="331"> <o>%s is not a directory</o> <t></t> </str> <str id="332"> <o>(keep stale value %s)</o> <t></t> </str> <str id="333"> <o>Assuming http://*:%[0]d/ for %[0]d</o> <t></t> </str> <str id="334"> <o>Empty URL field</o> <t></t> </str> <str id="335"> <o>%s does not conform to URL syntax</o> <t></t> </str> <str id="336"> <o>Added / to the end of %s</o> <t></t> </str> <str id="337"> <o>Changed %s to http</o> <t></t> </str> <str id="338"> <o>Changed %s to %s</o> <t></t> </str> <str id="339"> <o>SSL support not available in this Pike version.</o> <t></t> </str> <str id="340"> <o>Please use %s instead.</o> <t></t> </str> <str id="341"> <o>Removed the default port number (%d) from %s</o> <t></t> </str> <str id="342"> <o>Warning: The protocol %s is not known by roxen</o> <t></t> </str> <str id="343"> <o>Internal error: Illegal sized array from verify_set_from_form</o> <t></t> </str> <str id="344"> <o>Uploaded file: %s</o> <t></t> </str> <str id="345"> <o>Cannot decode this file as an image</o> <t></t> </str> <str id="346"> <o>Error while decoding image</o> <t></t> </str> <str id="347"> <o>Valid image set (no cimg module available, cannot show it)</o> <t></t> </str> <str id="348"> <o>No image set</o> <t></t> </str> <str id="349"> <o>Update Client</o> <t></t> </str>
3093302000-11-21Per Hedbor  <str id="350"> <o>Load of %s (%s) failed</o> <t></t> </str> <str id="351"> <o>The module %s (%s) could not be loaded.</o> <t></t> </str>
c64dcb2000-11-23Martin Nilsson  <str id="352"> <o>Found trailing data after the date. </o> <t></t> </str> <str id="353"> <o>Month must be at least 1. </o> <t></t> </str> <str id="354"> <o>Month must be 12 or less. </o> <t></t> </str> <str id="355"> <o>Day must be at least 1.</o> <t></t> </str> <str id="356"> <o>%s does not appear to be a valid date.</o> <t></t> </str> <str id="357"> <o>Day must be %d or less.</o> <t></t> </str>
e49d5c2000-11-24Martin Nilsson  <str id="5"> <o>Interface language</o> <t></t> </str> <str id="19"> <o>Select the Administration interface language.</o> <t></t> </str>
e05d532000-11-27Martin Nilsson  <str id="152"> <o>%O is not an integer</o> <t></t> </str>