| | |
| | | #
|
| | | # SINCE 1.3.0
|
| | | # RESTART REQUIRED
|
| | | git.daemonBindInterface = localhost
|
| | | git.daemonBindInterface = |
| | |
|
| | | # port for serving the Git Daemon service. <= 0 disables this service.
|
| | | # On Unix/Linux systems, ports < 1024 require root permissions.
|
| | |
| | | # SINCE 1.3.0
|
| | | # RESTART REQUIRED
|
| | | git.daemonPort = 9418
|
| | |
|
| | | # The port for serving the SSH service. <= 0 disables this service.
|
| | | # On Unix/Linux systems, ports < 1024 require root permissions.
|
| | | # Recommended value: 29418
|
| | | #
|
| | | # SINCE 1.5.0
|
| | | # RESTART REQUIRED
|
| | | git.sshPort = 29418
|
| | |
|
| | | # Specify the interface for the SSH daemon to bind its service.
|
| | | # You may specify an ip or an empty value to bind to all interfaces.
|
| | | # Specifying localhost will result in Gitblit ONLY listening to requests to
|
| | | # localhost.
|
| | | #
|
| | | # SINCE 1.5.0
|
| | | # RESTART REQUIRED
|
| | | git.sshBindInterface = localhost
|
| | |
|
| | | # Allow push/pull over http/https with JGit servlet.
|
| | | # If you do NOT want to allow Git clients to clone/push to Gitblit set this
|
| | |
| | | # Common unit suffixes of k, m, or g are supported.
|
| | | # Documentation courtesy of the Gerrit project.
|
| | | #
|
| | | #
|
| | | # NOTE: The importance of JGit's streamFileTreshold AND Git's bigFileThreshold
|
| | | # ISSUE: https://bugs.eclipse.org/bugs/show_bug.cgi?id=394078
|
| | | #
|
| | | # "core.bigFileThreshold |
| | | #
|
| | | # Files larger than this size are stored deflated, without
|
| | | # attempting delta compression. Storing large files without
|
| | | # delta compression avoids excessive memory usage, at the
|
| | | # slight expense of increased disk usage.
|
| | | #
|
| | | # Default is 512 MiB on all platforms.
|
| | | # This should be reasonable for most projects as source code and other |
| | | # text files can still be delta compressed, |
| | | # but larger binary media files won't be."
|
| | | # -- Git documentation
|
| | | #
|
| | | # If streamFileTreshold < bigFileTreshold you _may_ spend alot of time waiting
|
| | | # for push and/or fetch to complete. It may even look hung.
|
| | | #
|
| | | # Until the issue is resolved gracefully, a workaround is to configure
|
| | | # bigFileThreshold < streamFileTreshold AND then repack the repository.
|
| | | #
|
| | | # e.g. from the repository folder with Gitblit NOT running:
|
| | | # git config core.bigFileTreshold 40m
|
| | | # git gc --aggressive
|
| | | #
|
| | | # SINCE 1.0.0
|
| | | # RESTART REQUIRED
|
| | | git.streamFileThreshold = 50m
|
| | |
| | | # SINCE 1.0.0
|
| | | # RESTART REQUIRED
|
| | | git.packedGitMmap = false
|
| | |
|
| | | # Use the Gitblit patch receive pack for processing contributions and tickets.
|
| | | # This allows the user to push a patch using the familiar Gerrit syntax:
|
| | | #
|
| | | # git push <remote> HEAD:refs/for/<targetBranch>
|
| | | #
|
| | | # NOTE:
|
| | | # This requires git.enableGitServlet = true AND it requires an authenticated
|
| | | # git transport connection (http/https) when pushing from a client.
|
| | | #
|
| | | # Valid services include:
|
| | | # com.gitblit.tickets.FileTicketService
|
| | | # com.gitblit.tickets.BranchTicketService
|
| | | # com.gitblit.tickets.RedisTicketService
|
| | | #
|
| | | # SINCE 1.4.0
|
| | | # RESTART REQUIRED
|
| | | tickets.service = |
| | |
|
| | | # Globally enable or disable creation of new bug, enhancement, task, etc tickets
|
| | | # for all repositories.
|
| | | #
|
| | | # If false, no tickets can be created through the ui for any repositories.
|
| | | # If true, each repository can control if they allow new tickets to be created.
|
| | | #
|
| | | # NOTE:
|
| | | # If a repository is accepting patchsets, new proposal tickets can be created
|
| | | # regardless of this setting.
|
| | | #
|
| | | # SINCE 1.4.0
|
| | | tickets.acceptNewTickets = true
|
| | |
|
| | | # Globally enable or disable pushing patchsets to all repositories.
|
| | | #
|
| | | # If false, no patchsets will be accepted for any repositories.
|
| | | # If true, each repository can control if they accept new patchsets.
|
| | | #
|
| | | # NOTE:
|
| | | # If a repository is accepting patchsets, new proposal tickets can be created
|
| | | # regardless of the acceptNewTickets setting.
|
| | | #
|
| | | # SINCE 1.4.0
|
| | | tickets.acceptNewPatchsets = true
|
| | |
|
| | | # Default setting to control patchset merge through the web ui. If true, patchsets
|
| | | # must have an approval score to enable the merge button. This setting can be
|
| | | # overriden per-repository.
|
| | | #
|
| | | # SINCE 1.4.0
|
| | | tickets.requireApproval = false
|
| | |
|
| | | # The case-insensitive regular expression used to identify and close tickets on
|
| | | # push to the integration branch for commits that are NOT already referenced as
|
| | | # a patchset tip.
|
| | | #
|
| | | # SINCE 1.5.0
|
| | | tickets.closeOnPushCommitMessageRegex = (?:fixes|closes)[\\s-]+#?(\\d+)
|
| | |
|
| | | # Specify the location of the Lucene Ticket index
|
| | | #
|
| | | # SINCE 1.4.0
|
| | | # RESTART REQUIRED
|
| | | tickets.indexFolder = ${baseFolder}/tickets/lucene
|
| | |
|
| | | # Define the url for the Redis server.
|
| | | #
|
| | | # e.g. redis://localhost:6379
|
| | | # redis://:foobared@localhost:6379/2
|
| | | #
|
| | | # SINCE 1.4.0
|
| | | # RESTART REQUIRED
|
| | | tickets.redis.url =
|
| | |
|
| | | # The number of tickets to display on a page.
|
| | | #
|
| | | # SINCE 1.4.0
|
| | | tickets.perPage = 25
|
| | |
|
| | | #
|
| | | # Groovy Integration
|
| | |
| | | #
|
| | | # SINCE 1.2.1
|
| | | # RESTART REQUIRED
|
| | | fanout.bindInterface = localhost
|
| | | fanout.bindInterface = |
| | |
|
| | | # port for serving the Fanout PubSub service. <= 0 disables this service.
|
| | | # On Unix/Linux systems, ports < 1024 require root permissions.
|
| | |
| | | #
|
| | | # SINCE 0.5.0
|
| | | web.allowAdministration = true
|
| | |
|
| | | # Setting to disable rendering the top-level navigation header which includes
|
| | | # the login form, top-level links like dashboard, repositories, search, etc.
|
| | | # This setting is only useful if you plan to embed Gitblit within another page
|
| | | # or system.
|
| | | #
|
| | | # SINCE 1.4.0
|
| | | web.hideHeader = false
|
| | |
|
| | | # Allows rpc clients to list repositories and possibly manage or administer the
|
| | | # Gitblit server, if the authenticated account has administrator permissions.
|
| | |
| | | # Enable/disable global regex substitutions (i.e. shared across repositories)
|
| | | #
|
| | | # SINCE 0.5.0
|
| | | # DEPRECATED 1.4.0 (migrate to bugtraq instead)
|
| | | regex.global = true
|
| | |
|
| | | # Example global regex substitutions
|
| | |
| | | # SINCE 1.0.0
|
| | | realm.ldap.password = password
|
| | |
|
| | | # Bind pattern for Authentication.
|
| | | # Allow to directly authenticate an user without LDAP Searches.
|
| | | # |
| | | # e.g. CN=${username},OU=Users,OU=UserControl,OU=MyOrganization,DC=MyDomain
|
| | | #
|
| | | # SINCE 1.5.0
|
| | | realm.ldap.bindpattern = |
| | |
|
| | |
|
| | | # Delegate team membership control to LDAP.
|
| | | #
|
| | | # If true, team user memberships will be specified by LDAP groups. This will
|
| | |
| | | # LDAP users or groups that should be given administrator privileges.
|
| | | #
|
| | | # Teams are specified with a leading '@' character. Groups with spaces in the
|
| | | # name can be entered as "@team name".
|
| | | # name can be entered as "@team name". This setting only applies when using
|
| | | # LDAP to maintain team memberships.
|
| | | #
|
| | | # e.g. realm.ldap.admins = john @git_admins "@git admins"
|
| | | #
|