-
Notifications
You must be signed in to change notification settings - Fork 0
/
configuration.properties
57 lines (47 loc) · 2.56 KB
/
configuration.properties
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
# (optional) Run without modification. False is absent.
# Allows to verify the changes before execution.
# See the Definitions section in the README file.
dry-run=false
# Gina (Etat de Geneve's LDAP server)
# These parameters are relevant only to the Gina LDAP server. For any other LDAP server, not only
# these parameters, but also the whole loader of the LDAP tree, must be changed. See class LdapTreeBuilder.
gina-ldap-client.ldap-server-url=ldaps://<my-server>:6006
gina-ldap-client.ldap-user=cn=<my-user>,ou=<my-unit>,o=<my-org>
gina-ldap-client.ldap-password=<my-password>
gina-ldap-client.ldap-connection-timeout=60000
gina-ldap-client.ldap-read-timeout=5000
# GitLab server
gitlab.hostname=SOME-URL
# To generate a token, log on to your GitLab server and generate a "personal access token" (you must have Admin
# access level). The token must have scopes "api", "sudo" and "admin_mode".
# Supplying a token is a better practice that supplying a user name and a password.
# Hint : note somewhere (for instance, here) the GitLab user for which the token has been generated.
gitlab.account.token=SOME-TOKEN
# (optional) Administrator LDAP group. Can be empty.
# See the Definitions section in the README file.
admin-group=GROUP1
# (optional) Owner LDAP group. Can be empty.
# See the Definitions section in the README file.
owner-group=GROUP6
# (optional) Comma-separated list of GitLab users that will be untouched by the group cleaning process. Can be empty.
# See the business rules in the README file.
not-to-clean-users=USER3,USER4
# (optional) Comma-separated list of black-listed groups. Can be empty.
# These groups originate from LDAP and will be created on GitLab, like any other groups.
# However, certain operations, such as granting the wide-access users read-only access to all groups, will
# not be applied to the black-listed groups.
black-listed-groups=GROUP2,GROUP3
# (optional) Minimum user count. If there are less users in the LDAP server than that count, we consider that there
# is a problem in the LDAP retrieval process, so the whole operation mapping is aborted.
# Rule of thumb: use half the number of expected users.
# The value below applies for the particular case of Etat de Geneve.
minimum-user-count=100
# (optional) Regex of accepted groups.
# If empty, the default value will be set to [A-Za-z0-9_-].
standard.groups=SOME-GROUP-PATTERN
# (optional) Regex of accepted users in the standard groups.
# If empty, the default value will be set to [A-Za-z0-9_-].
standard-group-users=SOME-USER-PATTERN
# Retry parameters
retry-nb-max-attempts=3
retry-time-between-attemps=5000