CacheFlush

CacheFlush provides a fine granularity of control over cache tables, functions and permissions.

It ships with a predefined set of actions, but can be configured to build any number of custom presets suitable for both both development and production environments. Access to each preset can be limited by role-based permissions.

Version 3 of the project consists of the following modules:

EXPERIMENTAL: Datetime range module

Placeholder for documentation on about the new Datetime range module.

EXPERIMENTAL: Outside-In module

The Outside-In module is included in Drupal 8 core since Drupal 8.2. It provides the ability to change the most common configuration from the Drupal front-end.

Snippet within another snippet

Basically there are two ways to deal with this task.
The first one is using native Twig directive include, as follows:

<header>
  {% include '@snippet/header' %}
</header>

The second method may be carried out by creating a snippet variable of type “entity”.

Resetting the administrator password with a PHP file (Drupal 8)

Some hosting environments do not allow SSH access to the web server where a Drupal site is installed which makes it impossible to recover the Drupal 8 administrator account password via the command-line. The following method should be employed as a "last resort" when the command-line based password recovery techniques do not work.

The password reset method described below uses a PHP script that must be uploaded to the web server to reset the administrator password. The ability to upload a PHP file to the server where the site is hosted is required for successful execution of this method.

Under the hood, the PHP script executes a full Drupal bootstrap in order to obtain access to the necessary functions that generate the administrative password and then update the database with the new password that you specify via the URL when you execute the script through the web browser.

Note: leaving this password reset script on your server after resetting the password constitutes a highly critical security hole that enables anyone to reset your administrator password. Use this script carefully, and always delete the script after you're finished using it.

  1. First, create a file with a random name (gh34tu9.php for example).
  2. Copy and paste the following contents into the file, and save the file.
    <?php

EXPERIMENTAL: Content moderation module

Placeholder for documentation on about the new Content Moderation module.

Pages

Subscribe with RSS Subscribe to RSS - Site administrators