For example, behind this URL http://xata_appABC.mydomain.com, there is :
/var/www (several web sites) | + xataface/ = __DATAFACE_PATH__ (xataface core, upgraded with "git pull")
+ xata_appABC/
+ conf.db.ini (with database login/pwd)
+ htdocs = __DATAFACE_SITE_PATH__ (app)
|
/ -----------------------------------------------
/* it is a copy to correct an access error on resource files because the Xataface core is on top of htdocs */
+ res/
|
+ css
+ images
+ jss
+ lang
+ modules
|
+ Datagrid
+ g2
+ Xatajax
+ iframecss
/ -----------------------------------------------
/* the Xataface appABC config files */
| + conf.ini (except database login/pwd) + .htaccess (the first) + index.php
+ modules/ (app modules)
|
+ ckeditor
+ datepicker
+ depselect
+ g2
+ htmlreports
+ switch_user
+ tables/...
+ template_c/
/ -----------------------------------------------
/* it is copy to correct an access error */
+ xataface
|
+ modules
|
+ Xatajax (symlink to __DATAFACE_PATH__/Xatajax)
1. Is there a better way to prevent direct web access on source?
What are best practices to be set up?
2. And what if the Xataface app is installed on a Nginx server?
3. Had you returns on similar configurations?
--
A.
--
You received this message because you are subscribed to the Google Groups "Xataface" group.
Visit this group at https://groups.google.com/group/xataface.
To view this discussion on the web visit https://groups.google.com/d/msgid/xataface/a1a5c737-3a67-49ff-a503-0a9ded4bccb1%40googlegroups.com.