-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy path.env.example
More file actions
45 lines (36 loc) · 1.36 KB
/
.env.example
File metadata and controls
45 lines (36 loc) · 1.36 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
# Place to store data.
STORAGE_PATH=./var/files
# Data Retention (in days)
SESSION_TTL_DAYS=30
TOKEN_TTL_DAYS=30
REQUEST_TTL_DAYS=7
# Scheduled Cleanup
# Set to 'false' to disable automatic cleanup
CLEANUP_ENABLED=true
# Set to 'false' to skip cleanup on startup (only run on schedule)
CLEANUP_ON_STARTUP=true
# How often to run cleanup (in hours)
CLEANUP_INTERVAL_HOURS=1
# Trust proxy for client IP detection
TRUST_PROXY_CLIENT_IP=false
# Authentication (Optional - Leave empty to disable)
# If set, users must login to access the site
# payload endpoint remain public even when auth is enabled.
AUTH_USERNAME=my_username
AUTH_PASSWORD=my_super_secret_password
# Enable session restore feature (enabled by default).
# When enabled, users can use their friendly id to restore their session.
SESSION_RESTORE_ENABLED=false
# Enable raw full URL feature (disabled by default).
RAW_FULL_URL=false
# Base URL of the HTTP Inspector instance
# Default: http://localhost:3000
HTTP_INSPECTOR_URL=http://localhost:3000
# Default token ID to use for operations (optional)
# Can be either the full UUID or 8-character friendly ID
# Example: 550e8400-e29b-41d4-a716-446655440000 or abc12345
HTTP_INSPECTOR_TOKEN=
# Secret for accessing user tokens (optional)
# Required when accessing tokens created via the web UI
# Must be the session ID (UUID) that created the token
HTTP_INSPECTOR_SECRET=