@@ -567,6 +567,21 @@ tickets.acceptNewPatchsets = true
567
567
# SINCE 1.4.0
568
568
tickets.requireApproval = false
569
569
570
+ # Default setting to control how patchsets are merged to the integration branch.
571
+ # Valid values:
572
+ # MERGE_ALWAYS - Always merge with a merge commit. Every ticket will show up as a branch,
573
+ # even if it could have been fast-forward merged. This is the default.
574
+ # MERGE_IF_NECESSARY - If possible, fast-forward the integration branch,
575
+ # if not, merge with a merge commit.
576
+ # FAST_FORWARD_ONLY - Only merge when a fast-forward is possible. This produces a strictly
577
+ # linear history of the integration branch.
578
+ #
579
+ # This setting can be overriden per-repository.
580
+ #
581
+ # RESTART REQUIRED
582
+ # SINCE 1.9.0
583
+ tickets.mergeType = MERGE_ALWAYS
584
+
570
585
# The case-insensitive regular expression used to identify and close tickets on
571
586
# push to the integration branch for commits that are NOT already referenced as
572
587
# a patchset tip.
@@ -1797,6 +1812,10 @@ realm.salesforce.orgId = 0
1797
1812
realm.ldap.server = ldap://localhost
1798
1813
1799
1814
# Login username for LDAP searches.
1815
+ # This is usually a user with permissions to search LDAP users and groups.
1816
+ # It must have at least have the permission to search users. If it does not
1817
+ # have permission to search groups, the normal user logging in must have
1818
+ # the permission in LDAP to search groups.
1800
1819
# If this value is unspecified, anonymous LDAP login will be used.
1801
1820
#
1802
1821
# e.g. mydomain\\username
@@ -1809,8 +1828,14 @@ realm.ldap.username = cn=Directory Manager
1809
1828
# SINCE 1.0.0
1810
1829
realm.ldap.password = password
1811
1830
1812
- # Bind pattern for Authentication.
1813
- # Allow to directly authenticate an user without LDAP Searches.
1831
+ # Bind pattern for user authentication.
1832
+ # Allow to directly authenticate an user without searching for it in LDAP.
1833
+ # Use this if the LDAP server does not allow anonymous access and you don't
1834
+ # want to use a specific account to run searches. When set, it will override
1835
+ # the settings realm.ldap.username and realm.ldap.password.
1836
+ # This requires that all relevant user entries are children to the same DN,
1837
+ # and that logging users have permission to search for their groups in LDAP.
1838
+ # This will disable synchronization as a specific LDAP account is needed for that.
1814
1839
#
1815
1840
# e.g. CN=${username},OU=Users,OU=UserControl,OU=MyOrganization,DC=MyDomain
1816
1841
#
@@ -1926,6 +1951,9 @@ realm.ldap.email = email
1926
1951
realm.ldap.uid = uid
1927
1952
1928
1953
# Defines whether to synchronize all LDAP users and teams into the user service
1954
+ # This requires either anonymous LDAP access or that a specific account is set
1955
+ # in realm.ldap.username and realm.ldap.password, that has permission to read
1956
+ # users and groups in LDAP.
1929
1957
#
1930
1958
# Valid values: true, false
1931
1959
# If left blank, false is assumed
0 commit comments