TeamForge site-options.conf Tokens
TeamForge Services and Domain Configuration Tokens
See TeamForge Services and Domain Configuration Tokens.
ACTIVITY_LINKS_CUSTOMIZATION
When this token is set to true
, the TeamForge Activity Chart and the Most Active Projects List do not appear on the main page before the user logs in.
Values: true or false
Default: false
ADHOC_QUERY_CONNECTION_TIMEOUT
Specifies the connection timeout for Adhoc query.
Values: Integer
Default: 15000
Also See: teamforge reload command.
ADHOC_QUERY_RESULTS_LIMT
Specifies the results limit for Adhoc query.
Values: Integer
Default: 1000
Also See: teamforge reload command.
ADMIN_EMAIL
The ADMIN_EMAIL
token specifies a valid email address for the site administrator. The mail account specified must be hosted on a separate server outside of the TeamForge Application Server. The SYSTEM_EMAIL
, ADMIN_EMAIL
, and JAMES_POSTMASTER_EMAIL
tokens can specify the same address.
In TeamForge 6.x (and later), the sender name and address for system-generated emails is taken from the value of the SYSTEM_EMAIL
token. Therefore, changing the admin user's full name or email address does not affect the sender details of system-generated emails. This is different from TeamForge 5.x, in which the sender name and address for system-generated emails is derived from the admin user's full name and email address.
Values: Email address specification
Default: root@{\__APPLICATION_HOST\__}
ALLOW_CASE_INSENSITIVE_LOGIN
In general, TeamForge usernames are validated case-sensitively. Set this token to true so that username validations are done case-insensitively.
Values: true or false
Default: false
ALLOWED_HOSTS
This token is used to specify the list of allowed hostnames. This token works only if the site-options.conf
token SECURE_REDIRECTS is set to true. When the HOST header is not equal to NODE_HOSTNAME
or ALLOWED_HOSTS
, then it redirects to the custom 400 error page.
Values: xxx.com yyy.com zzz.com (multiple hosts)
Default: none
ALLOW_NO_PASSWORD_ON_USER_CREATION
The ALLOW_NO_PASSWORD_ON_USER_CREATION
token, when set to true, allows the admin to create users with null password through SOAP when external authentication is enabled.
Values: true or false
Default: false
ALLOW_PASSWORD_DICTIONARY_WORD
You must set the REQUIRE_PASSWORD_SECURITY
token to true
in the site-options.conf
file, for ALLOW_PASSWORD_DICTIONARY_WORD security setting to take effect.
ALLOW_USERNAME_IN_PASSWORD
The ALLOW_USERNAME_IN_PASSWORD
token, when set to true, allows users to set a password that includes the string that they use for their user name on the site.
Values: true or false
Default: true
APPLICATION_LOG_DIR
The APPLICATION_LOG_DIR
token specifies the directory to which the application writes its log files.
Values: Path specification
Default: /opt/collabnet/teamforge/log/apps
APPROVE_NEW_USER_ACCOUNTS
The APPROVE_NEW_USER_ACCOUNTS
token specifies whether a site administrator must approve the requests to join the site.
Values: true or false
Default: true
ARTIFACT_DESC_EDITOR
The ARTIFACT_DESC_EDITOR
token allows you to choose the type of text that can be used for artifact description using the editor tool.
Values: Plain Text
Default: Plain Text
ARTIFACT_LIST_LIMIT
The ARTIFACT_LIST_LIMIT
token specifies the maximum number of artifacts displayed in and exported from the Planned Tracker Artifacts tab available in File Releases.
Values: Integer
Default: 5000
AUTO_DATA
TeamForge 7.1 and later support automatic password creation. Once you turn on automatic password creation, the AUTO_DATA
token is auto-generated by the installer during runtime recreation.
The AUTO_DATA
token is not a user-editable site options token. Do not modify this token manually.
The following password-related site-options.conf
tokens can have the passwords automatically created if set to $auto$. When set to $auto$, the passwords for the tokens are randomly generated, encrypted and stored in the AUTO_DATA
token that is added automatically to the site-options.conf
file during runtime recreation.
DATABASE_PASSWORD=$auto$
DATABASE_READ_ONLY_PASSWORD=$auto$
REPORTS_DATABASE_PASSWORD=$auto$
REPORTS_DATABASE_READ_ONLY_PASSWORD=$auto$
ETL_SOAP_SHARED_SECRET=$auto$
JAMES_ADMIN_PASSWORD=$auto$
BDCS_ADMIN_PASSWORD=$auto$
MIRROR_DATABASE_PASSWORD=$auto$
SCM_ADMIN_PASSWORD=$auto$
As this AUTO_DATA
token is auto-generated and managed by the TeamForge installer, do not modify this token manually during TeamForge upgrades. When you upgrade TeamForge, you must copy this token intact (along with its value) from the old site-options.conf
file to the upgraded site's site-options.conf
file, before recreating the runtime. This applies to all the servers in a distributed set up (copy the AUTO_DATA token and its value to all the servers).
This feature is enabled by default. You can, however, override any of the above password-related tokens with the password of your choice.
BASELINE_BULKDATA_BATCHSIZE
Number of database records a thread (asynchronous) can handle at a time.
Values: 500, 600, 700, ...
Default: 500
BASELINE_BULKDATA_WORKER
Number of threads (asynchronous) dedicated for baseline creation.
Values: 100, 200, 300, ...
Default: 100
BASELINE_COMPARE_ROOT_FOLDER
This token is used to configure the location where the Excel file is generated and stored when you export the diff of two Baselines.
Values: folder path
BASELINE_CTF_MAX_CONN
Maximum number of connections to TeamForge database.
Values: 1 - 20
Default: 20
BASELINE_FILE_STORAGE
Specifies the file location of baseline functions such as packaging and so on.
Values: File path
BASELINE_LIQUIBASE_LOGLEVEL
Use this token to add log entries related to baseline database migration. Set this token to debug
to troubleshoot, issues, if any, during baseline database migration.
Default: info
Values: info/debug/warning/severe/off
BASELINE_LOG_FILE
Specifies path of the baseline log file.
Values: file path
Default: /opt/collabnet/teamforge/log/baseline/baseline.log
BASELINE_LOG_LEVEL
Specifies the log level for baseline service. The default log level is INFO.
Values: INFO, WARN/WARNING, ERROR, PANIC, DEBUG, FATAL
Default: INFO
BASELINE_LOG_MAX_AGE
Specifies the maximum age of baseline log file. Maximum configurable value is 28 days.
Values: Integer (in days)
BASELINE_LOG_MAX_BACKUP
Specifies the maximum number of last written log files used for backup. Up to 3 log files can be used.
Values: Integer
BASELINE_LOG_MAX_COMPRESS
Specifies whether to compress the maximum number of last written log files or not.
Values: true, false
Default: true
BASELINE_LOG_MAX_SIZE
Specifies the maximum size of baseline log file. Maximum configurable size is 500MB.
Values: 100MB, 125MB, .... 500MB
BASELINE_POST_INSTALL_PORT
Specifies the port number of the server on which the baseline-post-install
service is hosted. The default port is 9192.
Values: Port number of server hosting baseline-post-install
service
Default: 9192
BASELINE_PSQL_MAX_CONN
Maximum number of connections to baseline database.
Values: 1 - 100
Default: 100
BCC_MAIL_BATCH_SIZE
Set the ENABLE_BCC_MONITORING
token to true and then depending on your site's requirements, you can set the value of this BCC_MAIL_BATCH_SIZE
token to configure the number of monitoring emails delivered in a single delivery.
When a work item such as an artifact or discussion is updated, instead of sending separate monitoring emails to all monitoring users, you can now choose to have just one monitoring email sent with all monitoring users added to the BCC. This reduces the load on the email server and results in faster email delivery. You must enable this feature by setting ENABLE_BCC_MONITORING
to true and then, depending on your site's requirements, you can optimize the value of this BCC_MAIL_BATCH_SIZE
token to increase or decrease the number of emails delivered in a single delivery.
Values: Integer
Default: 100
This token was added in TeamForge 7.2.
BINARY_SETUP_TYPE
Set this token appropriately to have the binary application installed the way you want (as part of the TeamForge installation or upgrade).
TeamForge 8.0 and later support integration with Nexus OSS, an open source repository manager for binary artifacts. By default, the TeamForge installer installs a binary application (referred to as the binary app
hereinafter), which is essentially a launching pad for all binary integrated applications such as Nexus OSS. Once this binary app is installed as part of TeamForge installation, you can integrate your Nexus servers and repositories with TeamForge.
Though the binary app is installed by default with TeamForge, you can change the value of this site option token, BINARY_SETUP_TYPE
, to skip binary app installation altogether. You can also have this token configured to have the binary app installed and rolled out for all projects (both existing and new projects to be created) or only for new projects to be created or for select projects on a need basis.
Values:
- all: Binary app is installed and available for all projects.
- new: Binary app is installed and available for new projects only.
- manual: Binary app is installed at a site level and project administrators can add it to select projects on a need basis.
- none: TeamForge installer skips the binary app installation altogether.
Default: new
This token was added in TeamForge 8.0.
BINARIES_ENDPOINT_URL
Specifies the URL of Nexus binaries server.
Values: Server URL
BROWSER_NO_CACHE
BROWSER_NO_CACHE
is a new token added to runtime-options.conf
file to enable or disable browser caching in TeamForge for better application performance. By default, the token is set to false
in runtime-options.conf
file. To disable browser caching, set the value to true in site-options.conf
file.
Values: true or false
Default: false
COMPARE_LIMIT
Maximum number of records allowed while comparing baselines. Only up to 10,000 records are allowed.
Values: 1 - 10000
Default: 10000
DATABASE_NAME
The DATABASE_NAME
token specifies the name of the site's database.
Values: Alphanumeric string
Default: teamforge
DATABASE_PASSWORD
The DATABASE_PASSWORD
token is the password for the Unix user that is authorized to read from and write to the site's database.
Values: Alphanumeric string
Default: $auto$
DATABASE_SSL
To prevent your data from being exposed in a readable format on the network, use the Secure Socket Layer (SSL) to encrypt the network traffic between the Application and the Database servers. The DATABASE_SSL
token turns SSL on
or off
on sites that use a dedicated operational database server.
You can have the TeamForge PostgreSQL database server run with SSL enabled by setting DATABASE_SSL=on
. Once SSL is turned on, the PostgreSQL server listens to both normal and SSL connections on the same TCP port and negotiates with any connecting client on whether to use SSL or not.
To start in SSL mode, the server certificate and private key files must exist. These files are, by default, supposed to be named server.crt
and server.key
, respectively, in the database server's data directory.
Use the POSTGRES_SSL_CERT_FILE
and POSTGRES_SSL_KEY_FILE
tokens to configure the location of the server.crt
and server.key
files of the TeamForge PostgreSQL database server respectively.
For example,
DATABASE_SSL=on
POSTGRES_SSL_CERT_FILE=/var/ops/ssl/dbserver.crt
POSTGRES_SSL_KEY_FILE=/var/ops/ssl/dbserver.key
Use the POSTGRES_BASELINE_SSL_CERT_FILE
and POSTGRES_BASELINE_SSL_KEY_FILE
tokens to configure the location of the server.crt
and server.key
files of the TeamForge Baselines PostgreSQL database server respectively.
For example,
DATABASE_SSL=on
POSTGRES_SSL_CERT_FILE=/var/ops/ssl/dbserver.crt
POSTGRES_SSL_KEY_FILE=/var/ops/ssl/dbserver.key
POSTGRES_BASELINE_SSL_CERT_FILE=/var/ops/ssl/baselinedb-server.crt
POSTGRES_BASELINE_SSL_KEY_FILE=/var/ops/ssl/baselinedb-server.key
Values: on
or off
Default: off
DATABASE_TYPE
The DATABASE_TYPE
token specifies the type of database in which the TeamForge site's data is stored.
Values: postgresql or oracle
Default: postgresql
DATABASE_USERNAME
The DATABASE_USERNAME
token specifies the Unix user that is authorized to read from and write to the site's database.
Values: Alphanumeric string
Default: teamforge
Comments: For some advanced operations, you may need to log into the database as the database user. However, under normal conditions only the TeamForge site process itself needs to access the database.
DEFAULT_LOCALE
The DEFAULT_LOCALE
token specifies the language in which automated email messages from the site are generated.
Values:
Default: en
DEFAULT_PROJECT_ACCESS
The DEFAULT_PROJECT_ACCESS
token specifies the type of access that is assigned to a project when it is created. A project can be private, public, or gated.
Values: private, gated, public
Default: private
DISABLE_CREATE_INTEGRATION_SERVERS
The DISABLE_CREATE_INTEGRATION_SERVERS
token specifies whether the creation of new SCM integrations is allowed.
Values: true or false
Default: false
Comments: When this token is set to its default value of false
, you can add SCM integration servers to your TeamForge site. Also, the Discover Subversion Edge Servers option, which enables you to find and connect to Subversion Edge servers on your LAN, is available.
DISABLE_REMOTE_PUBLISHING
Publishing repository, like the branding repository, is one of the default repositories that's created automatically when a TeamForge project is created and is intended to contain publicly-consumable files. However, site administrators can toggle access to Publishing Repositories and restrict access based on defined RBAC.
For more information on Publishing Repository, see What is a Publishing repository? How does it work?. This token is set to false by default, meaning the Publishing Repository is publicly accessible.
If set to true
:
- The Publishing Repository is stripped of its public access and behaves like any other Subversion repository with RBAC applied to it.
- Project Administrators can no longer view or modify the PROJECT HOME OPTIONS (see Create a custom project home page).
Values: true or false
Default: false
DISABLE_USER_SELF_CREATION {#DISABLE_USER_SELF_CREATION}
The DISABLE_USER_SELF_CREATION
token restricts users from creating their own accounts on the TeamForge home page.
Values: true or false
Default: true
DISCUSSION_ADD_HEADERS
The DISCUSSION_ADD_HEADERS
token allows you to add custom headers to the emails posted in the forum.
Values:
You can choose to add or remove headers by specifying the particular information you want to be added or dropped from the header. For example, if you add <#d#>
in the Add header field, the URL of that discussion will be added to the header of all the available messages in that discussion.
Default: None
Example:
DISCUSSION_ADD_HEADERS=headername1:value1, name2: value2 , post-id:<#n#>, forum-url:<#d#>, message-url:<#m#>, domain:<#h#>, list-name:<#l#>, list-address:<#l#>@<#h#>
Comments: Add one or more header names. The match of any of these headers in an outgoing message (via email) causes its addition with appropriate notification to the posting user.
DISCUSSION_DROP_MIME_TYPES
The DISCUSSION_DROP_MIME_TYPES
token allows you to delete the mime types submitted by email that contain arbitrary strings.
Values: image/jpeg,image/jpg,text/xml
Default: Regular expression
Example:
DISCUSSION_DROP_MIME_TYPES=image/jpeg,image/jpg,text/xml
Comments: Add one or more mime types to the Drop mime types filter. The presence of any of these mime types in an incoming message (via email) causes its deletion with appropriate notification to the posting user. If a mime type is specified in both the Reject and Drop mime filters, then the Reject mime type filter must take higher precedence than the Drop mime type filter.
DISCUSSION_EMAIL_MONITORING
The DISCUSSION_EMAIL_MONITORING
token determines which users can monitor a forum on the site.
Values:
Value | Description |
---|---|
0 | Allow only forum administrators |
1 | Users with role permissions |
4 | All logged in users |
5 | Allow all site users and guests |
Default: 1
Example:
DISCUSSION_EMAIL_MONITORING=4
Comments: This setting applies to the site as a whole. Project owners can choose to be more restrictive in their own project by selecting a lower value on the project administration page.
DISCUSSION_EMAIL_POSTING
The DISCUSSION_EMAIL_POSTING
token determines which users on your site can post to forums by e-mail.
Values:
Value | Description |
---|---|
0 | Allow only forum administrators |
1 | Users with role permissions |
4 | All logged in users |
5 | Allow known email addresses only |
6 | Allow all site users and guests |
Default: 1
Example:
DISCUSSION_EMAIL_POSTING=4
Comments: This setting applies to the site as a whole. Project owners can choose to be more restrictive in their own project by selecting a lower value on the project administration page.
DISCUSSION_FORUM_EDITOR
The DISCUSSION_FORUM_EDITOR
token allows you to choose the type of text that can be used in discussion forum description using the editor tool.
Values: Plain Text
Default: Plain Text
DISCUSSION_MAX_ATTACHMENT_SIZE
The DISCUSSION_MAX_ATTACHMENT_SIZE
token sets an upper limit to the size of files that users can attach to an email message sent to any discussion forum on the site.
Values: Integer (Megabytes)
Default: blank
Comments: A value of zero or less specifies that there is no limit, which is the same as the default behavior without the token.
DISCUSSION_POST_EDITOR
The DISCUSSION_POST_EDITOR
token allows you to choose the type of text that can be used for posting in discussion forums using the editor tool.
Values: Plain Text
Default: Plain Text
DISCUSSION_REJECT_CONTENT
The DISCUSSION_REJECT_CONTENT
token allows you to block the discussion messages submitted by email that contain arbitrary strings.
Values: Regular expression
Default: None
Example:
DISCUSSION_REJECT_CONTENT=(?s).*word.*,(?s).*spam.*
Comments: Add one or more entries. Each regular expression must match an entire entry. The match of any of these entries in the body or subject of an incoming message (via email) causes its rejection, with appropriate notification to the posting user.
The content entry is case sensitive.
DISCUSSION_REJECT_HEADERS
The DISCUSSION_REJECT_HEADERS
token allows you to block different headers submitted by email that contain arbitrary strings.
Values: Regular expression
Default: None
Example:
DISCUSSION_REJECT_HEADERS=(?s).*headername1:value2.*,(?s).*name2:value2.*
Comments: Add one or more header names. Each regular expression must match an entire header name. The match of any of these headers in an incoming message (via email)causes its rejection, with appropriate notification to the posting user.
DISCUSSION_REJECT_MIME_TYPES
The DISCUSSION_REJECT_MIME_TYPES
token allows you to delete the mime types submitted by email that contain arbitrary strings.
Values: Application/PDF,text/xml
Default: Regular expression
Example:
DISCUSSION_REJECT_MIME_TYPES=application/pdf,text/xml
Comments: Add one or more mime types to the Reject MIME types filter. The presence of any of these mime types in an incoming message (via email) will cause its deletion with appropriate notification to the posting user.
DISPLAY_TIMEZONE
The DISPLAY_TIMEZONE
token, if set with a preferred time zone, takes precedence over the physical TeamForge server location's time zone and will be the default time zone that's displayed throughout the application. In other words, use this token to set a preferred time zone to display across the TeamForge application in case the TeamForge physical server and users are not on the same time zone.
Values: The ID for a time zone can be either a full name such as America/Los_Angeles, or a custom ID in the form GMT[+|-]hh[[:]mm] such as GMT-08:00. It can also be in the form of a three letter abbreviation such as PST.
Default: If set, this token overrides the default time zone of the TeamForge server. TeamForge uses the default time zone of the JVM otherwise.
DOCUMENT_MAX_FILE_UPLOAD_SIZE
By default, you can upload documents of any size in TeamForge. The DOCUMENT_MAX_FILE_UPLOAD_SIZE
token sets an upper limit to the size of the documents that can be uploaded. Use this token only if you want to restrict the size of the documents.
Values: Integer (specify the number of Megabytes without the suffix MB
)
Default: blank
Comments: A value of zero specifies that there is no limit, which is the same as the default behavior without the token. In other words, disabling this token, setting a value of 0, or leaving it blank sets the maximum file upload size to unlimited.
DOCUMENT_TEXT_EDITOR
The DOCUMENT_TEXT_EDITOR
token allows you to choose the type of text that can be used for the document description using the editor tool.
Values: Plain Text
Default: Plain Text
ELASTICSEARCH_JAVA_OPTS
The ELASTICSEARCH_JAVA_OPTS
token specifies the memory settings for the Java virtual machine that supports Elasticsearch, used by TeamForge Code Search.
Values: Java specifications
Default:
ELASTICSEARCH_JAVA_OPTS=-Dlog4j2.formatMsgNoLookups=true
Comments:
As a result of changes to the logging framework in Java, the PrintGCDetails
and PrintGCTimeStamps
logging options are no longer supported. Remove these options from the following tokens while upgrading to TeamForge 18.1 or later.
- JBOSS_JAVA_OPTS
- PHOENIX_JAVA_OPTS
- INTEGRATION_JAVA_OPTS
- ETL_JAVA_OPTS
- ELASTICSEARCH_JAVA_OPTS
TeamForge provision fails on sites that use these options post upgrade to TeamForge 18.1 or later.
- New tokens,
ELASTICSEARCH_MIN_HEAP_SIZE
andELASTICSEARCH_MAX_HEAP_SIZE
, have been added in TeamForge 22.0, which are to be configured along with theELASTICSEARCH_JAVA_OPTS
token. - Do not specify the minimum and maximum heap size in
ELASTICSEARCH_JAVA_OPTS
. UseELASTICSEARCH_MIN_HEAP_SIZE
andELASTICSEARCH_MAX_HEAP_SIZE
tokens instead.
ELASTICSEARCH_MIN_HEAP_SIZE
The ELASTICSEARCH_MIN_HEAP_SIZE
token specifies the minimum memory settings for the Java virtual machine that supports Elasticsearch, used by TeamForge Code Search.
Values: Java specifications
Default: -Xms2g
By default, Elasticsearch JVM minimum heap size is set to 2GB in TeamForge. You can increase this, if required.
ELASTICSEARCH_MAX_HEAP_SIZE
The ELASTICSEARCH_MAX_HEAP_SIZE
token specifies the maximum memory settings for the Java virtual machine that supports Elasticsearch, used by TeamForge Code Search.
Values: Java specifications
Default: -Xmx2g
By default, Elasticsearch JVM maximum heap size is set to 2GB in TeamForge. You can increase this, if required.
ENABLE_BCC_MONITORING
When a work item such as an artifact or discussion is updated, instead of sending separate monitoring emails to all monitoring users, you can now choose to have just one monitoring email sent with all monitoring users added to the BCC. This reduces the load on the email server and results in faster email delivery. Set ENABLE_BCC_MONITORING
to true
to enable this feature.
Values: true or false
Default: false
Comments:
Depending on your site's requirements, you can also optimize the value of BCC_MAIL_BATCH_SIZE
to increase or decrease the number of emails delivered in a single delivery.
ENABLE_GO_PROFILING
Debugs the baseline service, if enabled. By default, this token is disabled.
Values: true or false
Default: false
ENABLE_SERVICE_MONITORING
If ENABLE_SERVICE_MONITORING
token is set to true
, then the services using monit will be enabled for service monitoring. By default, this token is set to false
.
Values: true or false
Default: false
Also See: teamforge reload command.
ENABLE_SITE_NEWS
Site news is disabled by default. Set this token to true
in site-options.conf
file, customize the home page of your site and recreate runtime if you want to publish site news on your site's home page.
To publish site news, set this token to true
in site-options.conf
file, customize the home page of your site (see "siteNews" html block) and recreate runtime if you want to publish site news on your site's home page.
Values: true or false
Default: false
Comments:
This token was added in TeamForge 16.7. Until TeamForge 16.3, regardless of whether you have site news enabled or not, site news were processed in the background. With this ENABLE_SITE_NEWS token, there is no site news processing in the background (by default ENABLE_SITE_NEWS=false
) thereby improving the site's home page performance a bit.
ENABLE_UI_FOR_CUSTOM_EVENT_HANDLERS
To support branding and customization changes, set the ENABLE_UI_FOR_CUSTOM_EVENT_HANDLERS
token to true
.
Values: true or false
Default: true
ENFORCE_MINIMUM_USERNAME_LENGTH
The ENFORCE_MINIMUM_USERNAME_LENGTH
variable determines the minimum length that can be set for usernames.
Values: 0-31
Default: 0
ETL_JAVA_OPTS
The ETL_JAVA_OPTS
token specifies the memory settings for the Java virtual machine that supports the ETL (Extract Transform and Load) job.
Values: Java specifications
Default:
-Xms160m -Xmx512m -server -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=/tmp -verbose:gc -XX:+ PrintGCTimeStamps -XX:+PrintGCDetails -Dsun.rmi.dgc.client.gcInterval=600000 -Dsun.rmi.dgc.server.gcInterval=600000 - Djava.security.egd=file:/dev/urandom
If you've enabled ETL_JAVA_OPTS token in site-options.conf
file and have added any parameter, you must provide the required JVM heap size as the default heap size is not taken into account.
Comments:
eamForge 18.1 (and later) supports Java 9. As a result of changes to the logging framework in Java 9, the PrintGCDetails
and PrintGCTimeStamps
logging options are no longer supported. Remove these options from the following tokens while upgrading to TeamForge 18.1 or later.
- JBOSS_JAVA_OPTS
- PHOENIX_JAVA_OPTS
- INTEGRATION_JAVA_OPTS
- ETL_JAVA_OPTS
- ELASTICSEARCH_JAVA_OPTS
Also See: teamforge reload command.
ETL_JOB_THREAD_COUNT
The ETL_JOB_THREAD_COUNT
token specifies the number of Extract, Transform and Load (ETL) jobs that can be run simultaneously.
Values: 1-100
Default: 2
Comments: If you only have a few jobs to be triggered few times a day, then one thread is sufficient. If you have tens of thousands of jobs, that needs to be triggered every minute, then you should consider increasing the thread count to 50 or 100 (this depends on the nature of the work that your jobs perform, and your resources).
ETL_JOB_TRIGGER_TIME
The ETL_JOB_TRIGGER_TIME
token specifies the time and date for recurrent Extract, Transform and Load (ETL)jobs.
Values: Cron expression.
Default: 0 30 2 * * ?
Comments: This token takes a cron expression for a value, and not an absolute time value. The default value evaluates to 2.30 a.m. local time. For help with cron expressions, see Cron Trigger Tutorial.
Also See: teamforge reload command.
ETL_SOAP_SHARED_SECRET
The ETL_SOAP_SHARED_SECRET
token enables users to access site-wide reporting data via a SOAP client.
Values: String (possibly encrypted).
Default: mightyetlsoapsecret
FILTER_DROPDOWN_MAX_SELECTION
By default, the drop-down lists with multi-select feature let you select up to 10 filter values. However, you can set any value that suits your requirement for this FILTER_DROPDOWN_MAX_SELECTION
token to increase or decrease the count.
Values: Any positive integer.
Default: 10
This token was added in TeamForge 7.1.
FORBIDDEN_PASSWORD
The FORBIDDEN_PASSWORD
token restricts specified words from being used as passwords.
Values: Comma-separated strings
Default: None
GERRIT_DATABASE_HOST
This is the Gerrit Postgres database host. The Gerrit configuration property, database.hostname, is derived from the value of GERRIT_DATABASE_HOST
token in the runtime-options.conf
. It can be overridden in site-options.conf
and requires runtime creation with execution of the post installation script.
Default: 127.0.0.1
GERRIT_DATABASE_NAME
This refers the Gerrit database schema. The Gerrit configuration property, database.database, is derived from the value of GERRIT_DATABASE_NAME
in runtime-options.conf
. It can be overridden in site-options.conf
and requires runtime creation with execution of post installation script.
Default: reviewdb
GERRIT_DATABASE_USER
This is the PostgresDB role name that has access to the Gerrit database GERRIT_DATABASE_NAME
. The Gerrit configuration property, database.username
, is derived from the value of GERRIT_DATABASE_USER
in the runtime-options.conf
. It can be overridden in site-options.conf
and requires runtime creation with execution of post installation script.
Default: gerrit
GERRIT_GIT_PUSH_THRESHOLD
The GERRIT_GIT_PUSH_THRESHOLD
token determines the maximum number of commits in a single Git push. If the limit exceeds, only a single commit object is created in the TeamForge.
Values: Any positive integer.
Default: 30
GERRIT_GIT_REFRESH_PERIOD
The GERRIT_GIT_REFRESH_PERIOD
token sets the interval in seconds after which Git Integration synchronizes all the repositories and all RBAC permission with TeamForge.
Values: Number of seconds
Default: 3600 seconds
GERRIT_REPLICATION_MODE
Use this site-options token to set the Git integration server as either master
or slave
server. In case you do not want replication (standalone mode) or you have only one primary source for repositories, set this token to master. On the other hand, if you have a master Git integration server and you want to replicate (mirror) its repositories on a secondary slave Git integration server, set this token to slave on the slave Git integration server.
Values: master or slave
Default: master
Comments:
By default, in TeamForge 8.1 (and later), this token is set to master in the runtime-options.conf
during runtime creation. As you cannot change the replication mode of a Git server after initial runtime creation, you have to set this to slave at the very beginning of your installation process in case you want to configure the server as a mirror of a master
Git server. It is not possible to have a Git master and slave configured on the same node, but you can have multiple masters and slaves in your TeamForge environment. Each slave belongs to exactly one master. Once a replica server is set up, it is not possible to reassign it to a different master Git integration server at a later point in time.
GERRIT_REPLICATION_MASTER_EXTERNAL_SYSTEM_ID
If GERRIT_REPLICATION_MODE
is set to slave
, this token specifies external system ID of the master
Git integration server.
Values: Alphanumeric string (exsy<number>) of a master Git integration server
Comments:
This token is mandatory if GERRIT_REPLICATION_MODE
is set to slave
, without which the runtime creation shall fail. On the contrary, the runtime recreation will also fail if GERRIT_REPLICATION_MODE
is set to master
and this token is present in the site-options.conf
file.
GERRIT_SMTP_SERVER
This is the hostname of the SMTP mail server for Gerrit. The Gerrit configuration property, sendmail.smtpServer
, is derived from the value of GERRIT_SMTP_SERVER
in the runtime-options.conf
. It can be overridden in site-options.conf
and requires runtime creation with execution of post installation script.
Default: localhost
GERRIT_SYNCH_PORT
The Port over which TeamForge communicates to Gerrit. The Gerrit configuration property, teamforge.apiPort
, is derived from the value of GERRIT_SYNCH_PORT
in the runtime-options.conf
. It can be overridden in site-options.conf
and requires runtime creation with execution of post installation script.
Default: 9081
GERRIT_USER_EMAIL
This token sets the user email account for sending emails from Gerrit. This refers to all Gerrit servers specified in site-options.conf
file or through cluster/server specific parameters. For example, the "clusterId/serverId" in [clusterId/serverId]:gerrit:user.email
refers to the cluster or server that is used.
Values:
Default:
HAPROXY_HTTP_REUSE_OPTION
This token is used to declare how idle HTTP connections can be shared between requests. The default value is safe
, which ensures that in case the backend server closes the connection when the request is being sent, the browser silently retries to keep the connection alive.
Values: never/safe/aggressive/always
Default: safe
HIGHCHARTS_EXPORT_REQUEST_MAX_WAIT
This token is used to set the number of milliseconds that the Highcharts web application has to wait for response from the phantomjs server before it times out.
TeamForge chart export feature requires a pool of phantomjs servers to be running in the application server that is managed by a Highcharts web application. The phantomjs server pool runs as a blocking queue.
This token is used to specify the number of milliseconds that the Highcharts web application has to wait before it times out. In other words, the phantomjs server is expected to respond to the Highcharts web application within the time limit (in milliseconds) set in HIGHCHARTS_EXPORT_REQUEST_MAX_WAIT
.
Default: 500 milliseconds
This token was added in TeamForge 7.2.
HIGHCHARTS_EXPORT_REQUEST_POOL_SIZE
TeamForge chart export feature requires a pool of phantomjs servers to be running in the application server that is managed by a Highcharts web application. This token is used to specify the number of phantomjs servers to be running in the pool.
Default: The default pool size is 10.
This token was added in TeamForge 7.2.
HTTPD_LOG_DIR
The HTTPD_LOG_DIR
token specifies the path where information about the activity of the TeamForge site's Apache service is written.
Values: Path specification
Default: {__LOG_DIR__}/httpd
HTTP_MAX_PARAMETERS
The HTTP_MAX_PARAMETERS
token determines the maximum number of parameters (fields) that could be submitted in one http request. This is relevant on pages such as the User-Role Matrix page. The HTTP_MAX_PARAMETERS
can range from 0-25000.
Values: 0-25000
Default: 5000
INCLUDE_ORGANIZATION_USER_FIELD
The INCLUDE_ORGANIZATION_USER_FIELD
token controls whether the organization entry is displayed while creating a user account.
Values: true or false
Default: true
INDEXING_TIMEOUT
The INDEXING_TIMEOUT
token allows you to configure the time limit for indexing a file.
Values: Integer (number of minutes)
Default: 5
INITIAL_PASSWORD_CHANGE_ACTIVATION_CODE_TIMEOUT
An administrator can optionally supply a password when creating a user. If the password is not specified while creating the user, the user is sent an email with a ticket to set the password. This INITIAL_PASSWORD_CHANGE_ACTIVATION_CODE_TIMEOUT
token sets the duration (in hours) for which the password ticket is valid.
Values: Integer (hours)
Default: 72
INTEGRATION_JAVA_OPTS
This token specifies the memory settings for the Java virtual machine that supports the site's integrated source control services.
Values: Java specifications
Default:
-Xms160m -Xmx160m -server -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=/tmp -verbose:gc -XX: +PrintGCTimeStamps -XX:+PrintGCDetails -Dsun.rmi.dgc.client.gcInterval=600000 -Dsun.rmi.dgc.server.gcInterval=600000 - Djava.security.egd=file:/dev/urandom
If you've enabled INTEGRATION_JAVA_OPTS token in site-options.conf
file and have added any parameter, you must provide the required JVM heap size as the default heap size is not taken into account.
Comments:
eamForge 18.1 (and later) supports Java 9. As a result of changes to the logging framework in Java 9, the PrintGCDetails
and PrintGCTimeStamps
logging options are no longer supported. Remove these options from the following tokens while upgrading to TeamForge 18.1 or later.
- JBOSS_JAVA_OPTS
- PHOENIX_JAVA_OPTS
- INTEGRATION_JAVA_OPTS
- ETL_JAVA_OPTS
- ELASTICSEARCH_JAVA_OPTS
TeamForge provision fails on sites that use these options post upgrade to TeamForge 18.1.
INTEGRATION_LOG_DIR
The INTEGRATION_LOG_DIR
token specifies the path where information about the activity of the TeamForge site's source code integrations is written.
Values: Path specification
Default: {__LOG_DIR__}/integration
JAMES_DKIM_VERIFICATION
This token is used to enable or disable DomainKeys Identified Mail (DKIM) for outbound mails in TeamForge.
Values: on, off
Default: off
JAMES_DKIM_SELECTOR
This token specifies the string used to identify the DKIM public key information. It is specified as an attribute for the DKIM signature and is included in the DKIM header.
Values: a valid string parameter
JAMES_DKIM_SIGNINGDOMAIN
This token specifies the public domain name to be associated with the email authenticated with DKIM.
Values: Domain name of the CTF instance
JAMES_DKIM_KEY_TYPE
This token specifies the key type to be used for the domain name verification.
Values: 1024 / 2048
Default: 2048
JAMES_GATEWAY_HOST
The JAMES_GATEWAY_HOST
token specifies a mail server with Internet access, separate from the TeamForge server.
Values: Email address specification
Default: None
Comments:
- Specifying a gateway host assures delivery of site email to users if your TeamForge server cannot connect to a DNS server or cannot get outside connections over port 25.
- The mail account specified must be hosted on a separate server from the TeamForge site server.
- The SYSTEM_EMAIL, ADMIN_EMAIL, and JAMES_POSTMASTER_EMAIL tokens can specify the same address.
Specify the gateway host by its fully qualified domain name, not a host name.
Also See: teamforge reload command.
JAMES_GATEWAY_*
You can set up TeamForge to relay emails through an SMTP gateway (such as Amazon AES) that uses authentication. By default, James sends emails directly. However, you may prefer relaying emails through an enterprise relay server. Configuring the JAMES_GATEWAY_*
tokens let you do that.
JAMES_GATEWAY_HOST
andJAMES_GATEWAY_PORT
tokens specify the relay server's FQDN and port to use respectively. TheJAMES_GATEWAY_HOST
token specifies a mail server with Internet access, separate from the TeamForge Application Server. Specify the gateway host by its fully qualified domain name (FQDN), not a host name.Also See: teamforge reload command.
JAMES_GATEWAY_USERNAME
andJAMES_GATEWAY_PASSWORD
tokens specify the relay server credentials. These tokens are optional that should only be used if the relay server requires SMTP authentication.
For more information, see Relay Emails Through SMTP Gateway with Authentication.
JAMES_LOG_DIR
The JAMES_LOG_DIR
token specifies the path where information about the activity of the TeamForge site's email component is written.
Values: Path specification
Default: {__LOG_DIR__}/james
JAMES_POSTMASTER_EMAIL
The JAMES_POSTMASTER_EMAIL
token specifies a valid email address for the person or machine that handles email for the domain, such as postmaster@supervillain.org.
Values: Email address specification
Default: root@{__APPLICATION_HOST__}
Comments:
- The mail account specified must be hosted on a separate server outsideof the TeamForge Application Server.
- The SYSTEM_EMAIL, ADMIN_EMAIL, and JAMES_POSTMASTER_EMAIL tokens can specify the same address.
JBOSS_ALARM_TIMEOUT
The JBOSS_ALARM_TIMEOUT
token specifies the time duration within which the JBoss service is expected to respond to requests sent by jboss_watchdog.
Values: Integer
Default: 20
JBOSS_JAVA_OPTS
The JBOSS_JAVA_OPTS
token specifies the memory settings for the JBoss Java virtual machine.
Values: Java specifications
Default: -Xms1536m -Xmx1536m
If you've enabled JBOSS_JAVA_OPTS token in site-options.conf
file and have added any parameter, you must provide the required JVM heap size as the default heap size is not taken into account.
Comments:
All JVM parameters but -Xms1536m
and -Xmx1536m
have been hard-coded in the TeamForge core application.
You cannot manually configure any of the following default JVM parameters in the site-options.conf
file.
-XX:+UseParallelGC
-XX:MaxMetaspaceSize=512m
-XX:ReservedCodeCacheSize=128M
-server
-XX:+HeapDumpOnOutOfMemoryError
-XX:HeapDumpPath=/tmp -verbose:gc
-XX:+PrintCodeCache
-Dsun.rmi.dgc.client.gcInterval=600000
-Dsun.rmi.dgc.server.gcInterval=600000
-Djava.security.egd=file:/dev/urandom
-Djava.awt.headless=true.
When you change the default value of a JVM parameter such as -XX:HeapDumpPath
, the JBoss runtime parameters include both the user defined and default values for the JVM parameter. However, JBoss runs with the default value and ignores any user defined value.
eamForge 18.1 (and later) supports Java 9. As a result of changes to the logging framework in Java 9, the PrintGCDetails
and PrintGCTimeStamps
logging options are no longer supported. Remove these options from the following tokens while upgrading to TeamForge 18.1 or later.
- JBOSS_JAVA_OPTS
- PHOENIX_JAVA_OPTS
- INTEGRATION_JAVA_OPTS
- ETL_JAVA_OPTS
- ELASTICSEARCH_JAVA_OPTS
TeamForge provision fails on sites that use these options post upgrade to TeamForge 18.1.
Also See: teamforge reload command.
LISTEN_BACKLOG
The LISTEN_BACKLOG
token is used to specify the maximum length of the queue for the pending connections in the Apache server.
Values: Integer
Default: The default value is obtained from the system Kernel configuration.
/sbin/sysctl -n -e net.ipv4.tcp_max_syn_backlog
LOGIN_ATTEMPT_LOCK
This option controls locking out the user account after "n" invalid login attempts.
- Set this to zero or a negative number to lock the user account when the user provides an incorrect password for the first time.
- Set this to a positive number, say "2", to allow the user two wrong password attempts. The user account would be locked at the "x+1" (here, third) attempt.
When a user's account is locked, either an administrator must unlock it or the user can use the "Forgot Your Password?" link to reset the password.
You must set the REQUIRE_PASSWORD_SECURITY
token to true
in the site-options.conf
file, for LOGIN_ATTEMPT_LOCK
setting to take effect.
LISTEN_IP
In a distributed setup, you can use this <host>:<service>:LISTEN_IP
token to control which IPs the services bind to so that you can make sure that services are not overexposed than necessary.
By default, services bind to the IP address corresponding to the <host>:PUBLIC_FQDN
token. However, you can override this using the <host>:<service>:LISTEN_IP
token.
A few use cases:
- In a distributed setup, you may want to bind a particular IP address of the TeamForge database server (PostgreSQL server) to the
ctfcore-database
service:server-01:ctfcore-database:LISTEN_IP = 1.2.3.4
- To bind the mail service to a particular IP:
localhost:mail:LISTEN_IP = 1.2.3.4
- To make TeamForge listen to a specific IP of a particular server, say the SCM server:
myscmserver:LISTEN_IP = 1.2.3.4
- To bind all your services to one IP address (typically in a single server setup):
localhost:LISTEN_IP = 1.2.3.4
You cannot use more than one IP address with the LISTEN_IP
token.
LOG_DIR
The LOG_DIR
token specifies the path where TeamForge log files are written.
Values: Path specification
Default: {__SITE_DIR__}/log
LOG_QUERY_TIME_THRESHOLD
The LOG_QUERY_TIME_THRESHOLD
token enables you to log database requests at INFO level if they run longer than a given period.
By default, database requests are logged at DEBUG level. Configuring a value for LOG_QUERY_TIME_THRESHOLD
causes requests that run for a period greater than that value to be logged at the INFO level in the /opt/collabnet/teamfoge/log/apps/query.log
file.
Set the value to zero to log all database queries at INFO.
Values: Integer (milliseconds)
Default: 1000
LOGIN_ATTEMPT_LOCK
Use the LOGIN_ATTEMPT_LOCK
token to set the permissible number of unsuccessful login attempts after which the user account is automatically locked.
Values: 1-3
Important: You can now selectively disable this feature even if you have set the REQUIRE_PASSWORD_SECURITY
site options token to true
. Set any negative value (such as '-1' or '-10000') in case you want to disable this feature altogether.
Note that with TeamForge 8.1 and earlier versions, setting LOGIN_ATTEMPT_LOCK=-1
means the user account would be locked at the very first unsuccessful login attempt. This behavior has been removed in TeamForge 8.2 (and later).
Default: 3
LOGIN_CONFIG_XML_FILE
The LOGIN_CONFIG_XML_FILE
token specifies the path to the LDAP configuration file.
Values: Path specification
Default: {__DATA_DIR__}/etc/login-config.xml
LOGROTATE_ARCHIVE_COUNT
Use the LOGROTATE_ARCHIVE_COUNT
token to set the number of most recent logs to be preserved at any give point in time.
Values: Any positive integer.
Default: The default value is "7". Meaning, logs for the last 7 days are preserved at any given point in time. Logs older than 7 days are removed from the log archive folder.
This token replaces the LOGROTATE_MAXAGE
token.
MAX_DOCUMENTS_DOWNLOAD_SIZE
Specifies the maximum file size (in MB) for the total number of documents being downloaded. The value of this token can be an integer or a float value.
Values: Integer or Float
Default: 500
MAX_DOCUMENTS_DOWNLOAD_LIMIT
Specifies the maximum number of documents that can be downloaded.
Values: Integer
Default: 1000
MAX_PASSWORD_LENGTH
The MAX_PASSWORD_LENGTH
token sets the longest password that the system allows when a user account is created.
Values: Integer (number of characters)
Default: 256
MAX_POSTS_PER_MINUTE
This token is used to control the number of posts per minute. By default, its value is 10
.
Values: Integer
Default: 10
Comments: Increase the value of this token if you don't want your users to get blacklisted accidentally.
MAX_WWW_CLIENTS
The MAX_WWW_CLIENTS
token specifies the maximum number of Tomcat request processing threads to be created by the HTTP connector.
Values: Integer
Default: 250
Also See: teamforge reload command.
MIGRATION_LOG_DIR
The MIGRATION_LOG_DIR
token specifies the path where information about the conversion of site data is written during an upgrade.
Values: Path specification
Default: {__LOG_DIR__}/runtime
MINIMUM_PASSWORD_LENGTH
The MINIMUM_PASSWORD_LENGTH
token sets the shortest password that the system allows when a user account is created.
Values: Integer (number of characters)
Default: 6
MINIMUM_USERNAME_LENGTH
The MINIMUM_USERNAME_LENGTH
token sets the shortest username that the system allows when a user account is created.
Values: Integer (number of characters)
Default: 3
MIRROR DATABASE HOST
The MIRROR_DATABASE_HOST
token is a TeamForge database token that specifies the host of the database. This token allows to extract the reporting data from the mirror TeamForge database through the Extract, Transform and Load (ETL) process.
Values: Alphanumeric string
Default:
The MIRROR_
token takes the value of DATABASE_
token.
Example:
Enter MIRROR_DATABASE_HOST=cu349.cloud.sp.collab.net
(server name)
Add this token to the site-options.conf
only if you setup a mirror database.
MIRROR_DATABASE_NAME
The MIRROR_DATABASE_NAME
token is a TeamForge database token that specifies the name of the TeamForge database. This token allows to extract the reporting data from the mirror TeamForge database through the Extract, Transform and Load (ETL) process.
Values: Alphanumeric string
Default:
The MIRROR_
token takes the value of DATABASE_
token.
Example:
Enter MIRROR_DATABASE_NAME=ctfdb
Add this token to the site-options.conf
only if you setup a mirror database.
MIRROR_DATABASE_PASSWORD
The MIRROR_DATABASE_PASSWORD
token is a TeamForge database token that specifies the password of the database. This token allows to extract the reporting data from the mirror TeamForge database through the Extract, Transform and Load (ETL) process.
Values: Alphanumeric string
Default:
The MIRROR_
token takes the value of DATABASE_
token.
Example:
Enter MIRROR_DATABASE_PASSWORD=ctfpwd
Add this token to the site-options.conf
only if you setup a mirror database.
MIRROR_DATABASE_PORT
The MIRROR_DATABASE_PORT
token is a TeamForge database token that specifies the port number of the database. This token allows to extract the reporting data from the mirror TeamForge database through the Extract, Transform and Load (ETL) process.
Values: Port specification
Default:
The MIRROR_
token takes the value of the DATABASE_
token.
Example:
Enter MIRROR_DATABASE_PORT=5432
.
Add this token to the site-options.conf
only if you setup a mirror database.
MIRROR_DATABASE_USERNAME
The MIRROR_DATABASE_USERNAME
token is a TeamForge database token that specifies the database user's name. This token allows to extract the reporting data from the mirror TeamForge database through the Extract, Transform and Load (ETL) process.
Values: Alphanumeric string
Default:
The MIRROR_
token takes the value of the DATABASE_
token.
Example:
Enter MIRROR_DATABASE_USERNAME=ctfuser
.
Add this token to the site-options.conf
only if you setup a mirror database.
NEXUS_TYPE
Enables baseline service to select either Nexus 2 or Nexus 3, if both are installed.
Values: nexus2 or nexus3
Default:
NEXUS2_DEFAULT_PATH
Specifies the default REST API path of Nexus 2 server.
Values: default path of nexus server
Default: /service/local/repositories
NEXUS3_SEARCH_PATH
Specifies the REST API path from which the details of Nexus 3 Assets are obtained.
Values: search path for next assets
Default: /service/rest/v1/search
NEXUS3_REPOSITORIES_PATH
Specifies the Nexus 3 server path from which the list of all available repositories is obtained.
Values: nexus repositories path
Default: /service/rest/v1/repositories
NEXUS3_SCRIPT_PATH
Specifies the path where the Nexus 3 scripts are created, executed, and deleted.
Values: nexus script path
Default: /service/rest/v1/script
NEXUS3_COMPONENTS_PATH
Specifies the path from which the details of a specific Nexus 3 repository are obtained.
Values: nexus components path
Default: /service/rest/v1/components
NOTIFY_SITE_ADMINS_FOR_SITE_ACTIVITIES
The NOTIFY_SITE_ADMINS_FOR_SITE_ACTIVITIES
token ensures that the activities at the site level are intimated to the site administrators through email notifications.
The site administrator can receive notifications on the following operations:
- User creation
- Project creation
- Blacklisted users
- SCM operations
Values: true or false
Default: true
This token was added in TeamForge 8.0.
OBFUSCATION_ENABLED
The OBFUSCATION_ENABLED
token is used to run the TeamForge application in the obfuscation mode for security purpose. Password obfuscation is enabled by default. As a result, all password-related tokens are encrypted in all the TeamForge configuration files.
Values: true or false
Default: true
Comments: When the TeamForge application is running in the obfuscation mode, the database login credentials, shared secrets etc., are encrypted and stored in the TeamForge configuration files for security reasons.
OBFUSCATION_KEY
The OBFUSCATION_KEY
token is used by the TeamForge obfuscation component as an input to the obfuscation algorithm for encryption and decryption purposes.
Values: AlphaNumeric (length greater than or equal to 8 bytes)
Default: XSJt43wN
ONLY_SITE_ADMIN_CAN_EDIT_SINGLE_SIGN_ON
This site-options token, if set to true
, ensures that only site administrators can turn on single sign on (SSO) for linked applications (including Build & Test). Set this token to false
to have both site and project administrators turn SSO on
and off
.
Values: Either true
or false
.
Default: true
This token was added in TeamForge 7.2.
ORGANIZATION_EDITABLE
The ORGANIZATION_EDITABLE
token allows or prevents editing the organization value of a user account.
Values: true or false
Default: true
PASSWORD_CONTROL_EFFECTIVE_DATE
The PASSWORD_CONTROL_EFFECTIVE_DATE
token is used to set the date from which the password security feature takes effect.
Values: Date (mm/dd/yyyy)
Comments: The REQUIRE_PASSWORD_SECURITY is the master token that enables the password security feature.
Setting the PASSWORD_CONTROL_EFFECTIVE_DATE
token with a date is mandatory if REQUIRE_PASSWORD_SECURITY
is set to true
.
Example 1:
Consider a site with 130 users on which the password control kit (PCK) was not active. Of the 130 users, assume that:
- 100 users did not change password in last 100 days.
- 20 users did not change password in last 85 days.
- 10 users did not change password in last 75 days.
Assume that the following tokens are set on 01/01/2014 (current date):
REQUIRE_PASSWORD_SECURITY=true
PASSWORD_WARNING_PERIOD=20
PASSWORD_EXPIRY_PERIOD=90
PASSWORD_DISABLE_PERIOD=30
PASSWORD_DELETE_PERIOD=60
PCK runs on 01/01/2014 and if you have PASSWORD_CONTROL_EFFECTIVE_DATE=01/10/2014
(set to a future date):
- 100 users with no password change for the past 100 days would get a warning message that their passwords will expire in 10 days.
- 20 users with no password change for the past 85 days would get a warning message that their passwords will expire in 10 days.
- 10 users with no password change for the past 75 days would get a warning message that their passwords will expire in 15 days.
Example 2: Consider the following scenario in which:
- Current date = 01/01/2014
- PASSWORD_CONTROL_EFFECTIVE_DATE=01/01/2013
In this scenario, the password control effective date is set to a date in the past. As a result, password control takes immediate effect and the PCK starts disabling, deleting or expiring user accounts right away.
Also See: teamforge reload command.
PASSWORD_DELETE_PERIOD
The PASSWORD_DELETE_PERIOD
token specifies the time frame within which a disabled user account is automatically deleted.
Values: Integer (number of days)
Default: 60
The PASSWORD_DELETE_PERIOD can be disabled by setting the value to zero.
Also See: teamforge reload command.
PASSWORD_DISABLE_PERIOD
The PASSWORD_DISABLE_PERIOD
token specifies the time frame within which a user (soft-expired) is turned into a disabled user.
Values: Integer (number of days)
Default: 30
Comments: A value of zero will disable this feature.
Also See: teamforge reload command.
PASSWORD_EXPIRY_PERIOD
The PASSWORD_EXPIRY_PERIOD
token specifies the number of days after which the users' password expires.
Values: Integer (number of days)
Default: 90
You cannot disable the password expiry feature by setting this token to 0
.
Also See: teamforge reload command.
PASSWORD_REQUIRES_MIXED_CASE
The PASSWORD_REQUIRES_MIXED_CASE
token specifies that the user password must contain mixed case letters.
Values: true or false
Default: true
PASSWORD_REQUIRES_NON_ALPHANUM
The PASSWORD_REQUIRES_NON_ALPHANUM
token specifies that the user password must contain a non-alphanumeric character.
Values: true or false
Default: true
PASSWORD_REQUIRES_NUMBER
The PASSWORD_REQUIRES_NUMBER
token specifies that the user password must atleast contain one number.
Values: true or false
Default: true
PASSWORD_WARNING_PERIOD
Set this token to alert users via emails about impending password expiration on a daily basis. Email alert starts "N" days before password expiration due date, where PASSWORD_WARNING_PERIOD=N
, and ends only when the password is changed by the user.
Values: Positive integer (number of days).
Default: 14
Also See: teamforge reload command.
PASSWORD_HISTORY_AGE
The maximum allowed value of PASSWORD_HISTORY_AGE
token is 10
. This option disallows the previous "n" passwords, while setting a password. However, if this option is set to zero, a negative number or it is left empty, the user can use any previous password. The password being set must satisfy the existing password policy each time.
You must set the REQUIRE_PASSWORD_SECURITY
token to true
in the site-options.conf
file, for PASSWORD_HISTORY_AGE
security setting to take effect.
PHOENIX_JAVA_OPTS
The PHOENIX_JAVA_OPTS
token specifies the memory settings for the Java virtual machine that supports the site's ability to send and receive email and to index data for search.
Values: Java specifications
Default:
-Xms256m -Xmx256m -server -XX:+HeapDumpOnOutOfMemoryError -XX:HeapDumpPath=/tmp -verbose:gc -XX:+ PrintGCTimeStamps -XX:+PrintGCDetails -Dsun.rmi.dgc.client.gcInterval=600000 -Dsun.rmi.dgc.server.gcInterval=600000 -Dsf .luceneOptimizeEvery=100000 -Djava.security.egd=file:/dev/urandom
If you've enabled PHOENIX_JAVA_OPTS token in site-options.conf
file and have added any parameter, you must provide the required JVM heap size as the default heap size is not taken into account.
Comments:
eamForge 18.1 (and later) supports Java 9. As a result of changes to the logging framework in Java 9, the PrintGCDetails
and PrintGCTimeStamps
logging options are no longer supported. Remove these options from the following tokens while upgrading to TeamForge 18.1 or later.
- JBOSS_JAVA_OPTS
- PHOENIX_JAVA_OPTS
- INTEGRATION_JAVA_OPTS
- ETL_JAVA_OPTS
- ELASTICSEARCH_JAVA_OPTS
TeamForge provision fails on sites that use these options post upgrade to TeamForge 18.1.
Also See: teamforge reload command.
PGSQL_COMMIT_DELAY
The PGSQL_COMMIT_DELAY
token specifies the time delay between writing a commit record to the write ahead log (WAL) buffer and flushing the buffer out to disk.
Values: Integer (in microseconds)
Default: 250
Comments:
Together with the PGSQL_COMMIT_SIBLINGS
token, this token allows a group of otherwise unrelated transactions to be flushed to disk at the same time, with possible significant performance gain.
Also See: teamforge reload command.
PGSQL_COMMIT_SIBLINGS
The PGSQL_COMMIT_SIBLINGS
token sets the minimum number of concurrent open transactions to require before performing the delay specified by the PGSQL_COMMIT_DELAY
option.
Values: Integer
Default: 10
Comments:
Together with the PGSQL_COMMIT_DELAY
token, this token allows a group of otherwise unrelated transactions to be flushed to disk at the same time, with possible significant performance gain.
Also See: teamforge reload command.
PGSQL_EFFECTIVE_CACHE_SIZE
The PGSQL_EFFECTIVE_CACHE_SIZE
token specifies the size of the OS data cache that is available to PostgreSQL. PostgreSQL can use that data to select the optimal way to execute requests.
Comments: The right value for this token depends in part on the available RAM on the server where your site is running. Set this value at the highest amount of RAM that you expect to be always available to PostgreSQL.
See What are the right PostgreSQL settings for my site? for values recommended by CollabNet.
Also See: teamforge reload command.
PGSQL_FSYNC
This token turns forced synchronization on
or off
. By default, the token is turned on
. Turn this off
at your own risk, as it can cause unrecoverable data corruption.
Values: on or off
Default: on
Also See: teamforge reload command.
PGSQL_LOG_DIR
The PGSQL_LOG_DIR
token specifies the path where information about the activity of the TeamForge site's PostgreSQL database is written.
Values: Path specification
Default: {__LOG_DIR__}/pgsql
PGSQL_LOG_MIN_DURATION
The PGSQL_LOG_MIN_DURATION
token specifies the maximum number of seconds after which queries are logged as long running queries to the log file.
By default, this token is set to 10s.
After setting up this token, which is by default disabled, you may either run the teamforge provision
command to do a complete TeamForge provision or simply run the teamforge reload
command to stop, deploy and restart the PostgreSQL database alone.
The default value, which was -1
earlier, has been changed to 10 seconds (10s) in TeamForge 20.1. Setting this token to 0
or a negative value can adversely impact the TeamForge application's performance.
Values: <integer>s
Default: 10s
PGSQL_MAINTENANCE_WORK_MEM
The PGSQL_MAINTENANCE_WORK_MEM
token specifies the maximum amount of memory to be used in maintenance operations such as VACUUM.
Comments: See What are the right PostgreSQL settings for my site? for values recommended by CollabNet.
Also See: teamforge reload command.
PGSQL_MAX_CONNECTIONS
The PGSQL_MAX_CONNECTIONS
token determines the number of concurrent connections available to the database server.
Values: Integer
Default: 135
PGSQL_MAX_FSM_PAGES
The PGSQL_MAX_FSM_PAGES
token tells the vacuum process how many pages to look for in the shared free-space map.
Values: Integer
Default: 500000
Comments: Each FSM page uses 6 bytes of RAM for administrative overhead, so increasing FSM substantially on systems low on RAM may be counter-productive.
PGSQL_MAX_FSM_RELATIONS
The PGSQL_MAX_FSM_RELATIONS
token specifies how many relations (tables) will be tracked in the free space map.
Default: 500
PGSQL_MAX_STACK_DEPTH
The PGSQL_MAX_STACK_DEPTH
token specifies the maximum safe depth of the server's execution stack.
Values: Integer
Default: 5120
PGSQL_SHARED_BUFFERS
The PGSQL_SHARED_BUFFERS
token defines a block of memory that PostgreSQL will use to hold requests that are awaiting attention from the kernel buffer and CPU.
Comments: The right value for this token depends in part on the available RAM on the server where your site is running.
See What are the right PostgreSQL settings for my site? for values recommended by CollabNet.
Also See: teamforge reload command.
PGSQL_STATEMENT_TIMEOUT
The PGSQL_STATEMENT_TIMEOUT
token is set to prevent the Postgres queries from running for a long period of time.
Values: Integer (Milliseconds)
Default: 600000 (Milliseconds)
Comments:
An error message is displayed for every timeout in the postgres.log
file and the log message with the exid id is logged in the vamessages.log
and server.log
files.
PGSQL_VACUUM_COST_DELAY
The PGSQL_VACUUM_COST_DELAY
token controls the length of time that an I/O process will sleep when the limit set by vacuum_cost_limit
has been exceeded.
Values: Integer (milliseconds)
Default: 50
PGSQL_WAL_BUFFERS
The PGSQL_WAL_BUFFERS
token specifies the number of buffers available for the Write Ahead Log.
Comments: If your database has many write transactions, setting this value bit higher than default may result better usage of disk space.
See What are the right PostgreSQL settings for my site? for values recommended by CollabNet.
PGSQL_WORK_MEM
The PGSQL_WORK_MEM
token specifies the amount of memory to be used by internal sort operations and hash tables before switching to temporary disk files. .
Comments: The right value for this token depends in part on the available RAM on the server where your site is running.
See What are the right PostgreSQL settings for my site? for values recommended by CollabNet.
Also See: teamforge reload command.
PLANNING_BOARD_SWIM_LANE_LIMIT
By default, not more than 250 cards are shown in a planning board swimlane. However, as a site administrator, you can increase or decrease the number of cards shown in the planning board swimlanes by configuring the site options token, PLANNING_BOARD_SWIM_LANE_LIMIT
.
Values: A positive number.
Default: 250
Comments:
When you select a planning folder in one of the swimlanes and if X is greater than N, (where X = number of artifacts in the selected planning folder and N = PLANNING_BOARD_SWIM_LANE_LIMIT
), the message, Swimlanes in the Board View is currently configured to show N artifacts only, appears at the bottom of the swimlane.
PLANNING_FOLDER_DESC_EDITOR
The PLANNING_FOLDER_DESC_EDITOR
token allows you to choose the type of text that can be used in the planning folder description using the editor tool.
Values: Plain Text
Default: Plain Text
POSTINSTALL_LOG_LEVEL
Specifies the log level for baseline-post-install
service. The default log level is INFO.
Values: INFO, WARN/WARNING, ERROR, PANIC, DEBUG, FATAL
Default: INFO
POSTINSTALL_LOG_FILE
Specifies the log file location of baseline post install service.
Values: File path
RELAXED_USERNAME_MODE_ENABLED
The RELAXED_USERNAME_MODE_ENABLED
token, if set to true, overrides the default TeamForge user naming convention that bars user names with anything but an alphabet as the first character.
Values: true or false
Default: false
Comments:
This token is commented out (disabled) by default and is available in the site-options.conf
file.
While TeamForge can allow user names with anything but an alphabet as the first character, the same may not be true with all or some of the integrated applications you may have on your site. As a word of caution, consider the job at hand and understand the consequences before overriding TeamForge's default user naming convention.
REPORTS_DATABASE_NAME
The REPORTS_DATABASE_NAME
token specifies the name of the site's reporting database, also known as the datamart.
Values: Alphanumeric string
Default: teamforge_datamart
Comments:
It is OK for this token to have the same value as DATABASE_NAME
, because they are running in separate pgsql processes.
REPORTS_DATABASE_PASSWORD
The REPORTS_DATABASE_PASSWORD
token is the password for the Linux user that is authorized to read from and write to the site's reporting database.
Values: Alphanumeric string
Default: $auto$
Comments:
It is OK for this token to have the same value as DATABASE_PASSWWORD
, because they are running in separate PostgreSQL processes.
REPORTS_DATABASE_USERNAME
The REPORTS_DATABASE_USERNAME
token specifies the Linux user that is authorized to read from and write to the site's reporting database.
Values: Alphanumeric string
Default: teamforge_datamart
Comments: For some advanced operations, you may need to log into the database as the database user. However, under normal conditions only the TeamForge site process itself needs to access the database.
It is OK for this token to have the same value as DATABASE_USERNAME
, because they are running in separate PostgreSQL processes.
REPORTS_ENABLE_REPORT_GENERATION
The REPORTS_ENABLE_REPORT_GENERATION
token is used to enable or disable the Reports tab in the UI.
Values: true or false
Default: true or false
Comments Datamart is enabled by adding the 'datamart' service to the HOST_<hostname>token. The service is disabled if datamart is not added. The default value of the REPORTS_ENABLE_REPORT_GENERATION token is based on this service.
REQUIRE_PASSWORD_SECURITY
The REQUIRE_PASSWORD_SECURITY
token, if set to true, enforces password security policy for the site.
Values: true or false
Default: false
Comments:
This token can be useful when an organization's security policy prohibits users from entering passwords without any restrictions. You can also set the PASSWORD_CONTROL_EFFECTIVE_DATE
token with a date from which the password policy would be enforced. For more information, see PASSWORD_CONTROL_EFFECTIVE_DATE.
REQUIRE_RANDOM_ADMIN_PASSWORD
The REQUIRE_RANDOM_ADMIN_PASSWORD
token restricts users from setting a random admin password.
Values: true or false.
Default: True (SaaS), false (BTF)
Comments:
This token, when set to true
, checks for a valid mail id in the ADMIN_EMAIL
token.
REQUIRE_USER_PASSWORD_CHANGE
The REQUIRE_USER_PASSWORD_CHANGE
token determines if the user password needs to be changed during the first login instance.
Values: true or false.
Default: false
Comments:
Setting this token to true
makes the new system force users to change password during first login and false otherwise.
RUNTIME_LOG_DIR
The RUNTIME_LOG_DIR
token specifies the path where information about the activity of the TeamForge site's runtime environment is written.
Values: Path specification
Default: {__LOG_DIR__}/runtime
SAFE_DOWNLOAD_MODE
Use this token to enforce downloading and saving of documents, attachments and files locally using the "Save" dialog box instead of inline views.
Values: none, all, html
You can set this token to "none" "all" or "html" that will force download of nothing, everything, or just html documents respectively.
Default: none
SCM_DEFAULT_SHARED_SECRET
The SCM_DEFAULT_SHARED_SECRET
token allows SCM Integrations to securely communicate with the TeamForge Application Server.
Values:
- Alpha-numeric
- Special characters like '~!@#$%^&*'
- 16-24 byte length
Default: The default value is automatically generated during runtime.
SCM_SOAP_TIMEOUT
The SCM_SOAP_TIMEOUT
token is used to specify the connection timeout of the SCM soap requests between the APP and SCM servers.
Values: Integer (Milliseconds)
Default: 300000
SCM_USER_ENCRYPTED_PASSWORD
The SCM_USER_ENCRYPTED_PASSWORD
token is used to store the encrypted scmviewer password.
Values:
- Alpha-numeric
- Special characters like '~!@#$%^&*'
Default: The default value will be in the encrypted format. See password_util.sh for more information.
SEARCH_LOG_DIR
The SEARCH_LOG_DIR
token specifies the path where information about the activity of the TeamForge site's Lucene search component is written.
Values: Path specification
Default: {__LOG_DIR__}/james
SEARCH_MAX_FILE_SIZE
The SEARCH_MAX_FILE_SIZE
token sets an upper limit to the size of files that are indexed for search.
Values: Integer (bytes)
Default: 10M
Comments: A value of zero or less specifies that there is no limit, which is the same as the default behavior without the token.
SEARCH_SUPPRESS_ARCHIVE_SUB_DOCS
The SEARCH_SUPPRESS_ARCHIVE_SUB_DOCS
token prevents archive files from being indexed for search.
Archive files include zip
, gzip
, tar
, and similar file types. They also include document files that are stored in archive format, such as docx
files from Microsoft Word 2007.
Values: true or false
Default: true
SECURE_REDIRECTS
This token which is false by default, if set to true, redirects your CTF instance to the allowed hostname(s) as specified in the site-options.conf
token ALLOWED_HOSTS.
Values: true or false
Default: false
SERVICE_MONITOR_RETRIES
Number of retries of monit before restarting the service. Default value of this token is 0
.
Values: Integer
Default: 0
Also See: teamforge reload command.
SESSION_COOKIES_ONLY
the SESSION_COOKIES_ONLY
token restricts the persistence of all cookies to the user's current session.
If SESSION_COOKIES_ONLY=true
, then all cookies created during the user session expire automatically when the user closes their browser. If it is false
, the cookie expires according to the system logic for that particular cookie.
Values: true or false
Default: false
Comments: This token can be useful when an organization's security policy prohibits cookies that persist across user sessions.
SESSION_TIMEOUT
Use this token to set the user session timeout duration for newly created Application Server/Integration Server sessions.
Values: A positive value in the range of 1-1440.
Default:
The default value of the SESSION_TIMEOUT
token is 30 minutes (for security reasons). You may change this to any value in the range of 1-1440 (minutes). However, you must create runtime for the changes to take effect.
Also See: teamforge reload command.
SOAP_ANONYMOUS_SHARED_SECRET
The SOAP_ANONYMOUS_SHARED_SECRET
token allows users to have an anonymous login to the TeamForge site through SOAP.
Values: String (possibly encrypted)
Default: None
Comments: The token must be configured to a non-empty value if users need to have an anonymous login to the site through SOAP. A value must be provided if site-wide reporting is enabled.
SOAP_ARTIFACT_LIST_LIMIT
The SOAP_ARTIFACT_LIST_LIMIT
token is used to limit the number of artifacts returned via SOAP calls.
Values: Integer
Default: -1
This means that the artifact list retrieved via SOAP is unlimited.
Comments: In TeamForge releases earlier than 6.1.1, SOAP calls returned everything that was asked for, and that is the default behavior in TeamForge 6.1.1 as well. However, sites with performance and stability issues (OutOfMemory errors) in returning a large number of artifacts can now limit the number using this token. Changing this value requires a recreate-runtime and thus a site restart.
Increasing the number of artifacts beyond the optimal 20,000 - 25,000 range might cause a heap dump.
SSL_CERT_FILE
The SSL_CERT_FILE
specifies the path where the TeamForge site's Secure Socket Layer certificate is stored.
Values: Path specification
Default: None
SSL_CHAIN_FILE
The SSL_CHAIN_FILE
token specifies the path where the TeamForge site's SSL certficate chain file is stored.
Values: Path specification
Default: None
SSL_CIPHER_SUITE
The SSL_CIPHER_SUITE
token disables some of the less secure methods.
Values: SSLCipherSuite method
Default:
ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA
SSL_PROTOCOL
The SSL_PROTOCOL
token disables some of the less secure methods.
Values: SSLProtocol method
Default: all -SSLv3 -SSLv2
SSL_KEY_FILE
The SSL_KEY_FILE
specifies the path where the TeamForge site's RSA private key is stored when Secure Socket Layer encryption is in effect.
Values: Path specification
Default: None
SUBVERSION_BRANDING_URI
The SUBVERSION_BRANDING_URI
token specifies the path component of the data repository URL.
Values: BDB or FSFS
Default: BDB
SVN_AUTHNZ_TIMEOUT
The SVN_AUTHNZ_TIMEOUT
token allows you to set the timeout value (in seconds) for the mod_authnz_ctf module.
Values: Timeout value in number of seconds.
Default: 60
SYSTEM_EMAIL
The SYSTEM_EMAIL
token specifies a valid email address for the system administrator responsible for this site.
- System administrators can use this email address to set up outage alerts and other notifications.
- The mail account specified must be hosted on a separate server from the TeamForge site server.
- The SYSTEM_EMAIL, ADMIN_EMAIL, and JAMES_POSTMASTER_EMAIL tokens can specify the same address.
Values: Email address specification
Default: root@{__APPLICATION_HOST__}
In TeamForge 6.x, the sender name and address for system-generated emails is taken from the value of the SYSTEM_EMAIL
token. Therefore, changing the admin user's full name or email address does not affect the sender details of system-generated emails. This is different from TeamForge 5.x, in which the sender name and address for system-generated emails is derived from the admin user's full name and email address.
USE_BROWSER_CACHE_PASSWORD
The USE_BROWSER_CACHE_PASSWORD
token restricts the storage of password in the browser when you login to the site.
Values: true/false
Default: true
USE_EXTERNAL_USER_AUTHENTICATION
The USE_EXTERNAL_USER_AUTHENTICATION
token specifies whether users can be authenticated through a separate system, such as OpenLDAP.
Values: true or false
Default: false
USE_STATIC_SENDER_EMAIL
The USE_STATIC_SENDER_EMAIL
token, if set to true
, assigns the Return-Path
parameter in the TeamForge notification email header with a noreply@<user's email domain>
email ID. This prevents Out of Office replies from being posted to artifacts and discussion forums.
On the other hand, the USE_STATIC_SENDER_EMAIL
token, if set to false
, assigns the Return-Path
parameter in the TeamForge notification email header with the email ID of the user (for example, tom@forge.collab.net) whose action triggers the notification email. In this case, Out of Office replies are posted to artifacts and discussion forums. If the user is a Site Administrator, the Return-Path
parameter in the TeamForge notification email header is assigned with the email ID root@<TeamForge domain name>
.
Values: true or false
Default: false
USER_ACCOUNT_RESTRICTED
The USER_ACCOUNT_RESTRICTED
token determines whether newly created users are "restricted" or "unrestricted" users by default.
- Restricted users can access only public projects and projects of which they are members.
- Unrestricted users can access all projects except private projects of which they are not members.
Values: true or false
Default: true
USER_MONITORING_REMOVE_ENABLED
Set the USER_MONITORING_REMOVE_ENABLED
token to true
, if you want to enable the feature that lets you remove one or more users from monitoring selected TeamForge objects.
Values: true or false
Default: false
USER_NEED_PERMISSION_TO_VIEW_FULL_USER_DETAILS
The USER_NEED_PERMISSION_TO_VIEW_FULL_USER_DETAILS
token restricts users from viewing other users' organization information.
Values: true or false
Default: false
USERS_WITH_NO_EXPIRY_PASSWORD
The USERS_WITH_NO_EXPIRY_PASSWORD
token specifies the users for whom there is no expiry of password. The token is enabled by default.
Values: Specify the usernames (for the user accounts) for which there is no expiry of password.
Default: USERS_WITH_NO_EXPIRY_PASSWORD=admin,nobody,system,scmviewer,scmadmin
USER_RESOURCE_CACHE_MAX_SIZE_LIMIT
Specifies the maximum size limit for user resource cache.
Values: Integer
Default: 16000
Also See: teamforge reload command.
USER_SYNC_CRON_EXP
Specifies the CRON expression to synchronize user information for every N minute(s) between baseline and TeamForge databases.
Values: 1, 2, .... N (minutes)
Default: 1 minute
Using Multi-line Blocks for Site Options
The multi-line block configuration is generally used by old SFEE sites. To define a site-options.conf
token with a multi-line block value, you need to follow a certain syntax.
- Declare the token name with the value
START_MULTILINE_BLOCK
. Syntax:<TOKEN_NAME>=START_MULTILINE_BLOCK
- Specify the multi-line values beneath the token.
- Complete the multi-line block with
END_MULTILINE_BLOCK
after all the multi-line values are specified. Syntax:END_MULTILINE_BLOCK
Example:
SOURCEFORGE_CONFIGURATION_PROPERTIES_APPEND=START_MULTILINE_BLOCK
email.suppress.project_member_added=true
email.suppress.scm_user_password_synchronized=true
END_MULTILINE_BLOCK
WEBR_ADMIN_USER
Specifies the user name of TeamForge Webhooks-based Event Broker Administrator.
Values: webradmin, webradministrator, ....
WEBR_ADMIN_PASSWORD
Specifies the password of TeamForge Webhooks-based Event Broker Administrator.
Value: abc, abc123, ....
WEBR_HTTP_BINDNAME
WEBR is, by default, bound to port 3000 and https. However, you can bind the WEBR service to http and to any other port of choice. Use the WEBR_HTTP_BINDNAME token to bind WEBR to any http port of choice.
Here's an example of how to bind WEBR to port 3009.
WEBR_HTTP_BINDNAME=:3009
WEBR_HTTP_BINDNAME=localhost:3009
WEBR_INIT_JSFILE
Use this token to load an initial Javascript (JS) file to the WEBR's native JS virtual machine. The initial JS file configured via this token is executed first before the subscription script.
The use case is to load a script to the JS VM that any script can have access to. For example, you can load a script that has a few variable definitions and make the variables commonly available to all other scripts.
Here's an example.
WEBR_INIT_JSFILE=./initialJSfile.js
An Illustration
-
Create an
init.js
file in current directory with the following content:var custname = "umakanthan";
var othername = $inmessage.Name; -
Add the WEBR_INIT_JSFILE token to the
site-options.conf
file as:WEBR_INIT_JSFILE=./init.js
-
Create a subscription with the following subscription script:
$outmessage = 'My name is Uma,'+ custname + ' ' + othername;
-
Send a message to the Sync event with following payload:
{
"Name": "uma111"
}Here's the response you get:
My name is Uma, umakanthan uma111
The init code is run just after creating the $inmessage and other internal variables. So these should be accessible inside the init script.