From 2a74ac8bcdae921a61c9bad6be29e2033c397293 Mon Sep 17 00:00:00 2001 From: "justdave%syndicomm.com" <> Date: Sun, 2 Nov 2003 10:00:00 +0000 Subject: Recompiled docs for release --- docs/html/extraconfig.html | 63 +++++++++++++--------------------------------- 1 file changed, 17 insertions(+), 46 deletions(-) (limited to 'docs/html/extraconfig.html') diff --git a/docs/html/extraconfig.html b/docs/html/extraconfig.html index 038b8d282..00886ec59 100644 --- a/docs/html/extraconfig.html +++ b/docs/html/extraconfig.html @@ -4,7 +4,8 @@ >Optional Additional Configuration

4.2. Optional Additional Configuration

4.2. Optional Additional Configuration

4.2.1. Dependency Charts

4.2.1. Dependency Charts

As well as the text-based dependency graphs, Bugzilla also supports dependency graphing, using a package called 'dot'. @@ -144,9 +141,7 @@ CLASS="section" >

4.2.2. Bug Graphs

4.2.2. Bug Graphs

As long as you installed the GD and Graph::Base Perl modules you might as well turn on the nifty Bugzilla bug reporting graphs.

4.2.3. The Whining Cron

4.2.3. The Whining Cron

By now you have a fully functional Bugzilla, but what good are bugs if they're not annoying? To help make those bugs more annoying you @@ -292,9 +285,7 @@ CLASS="section" >

4.2.4. LDAP Authentication

4.2.4. LDAP Authentication

loginmethod
loginmethod

This parameter should be set to

LDAPserver
LDAPserver

This parameter should be set to the name (and optionally the @@ -466,9 +453,7 @@ CLASS="QUOTE" >

LDAPbinddn [Optional]
LDAPbinddn [Optional]

Some LDAP servers will not allow an anonymous bind to search @@ -484,9 +469,7 @@ CLASS="QUOTE" >

LDAPBaseDN
LDAPBaseDN

The LDAPBaseDN parameter should be set to the location in @@ -501,9 +484,7 @@ CLASS="QUOTE" >

LDAPuidattribute
LDAPuidattribute

The LDAPuidattribute parameter should be set to the attribute @@ -519,9 +500,7 @@ CLASS="QUOTE" >

LDAPmailattribute
LDAPmailattribute

The LDAPmailattribute parameter should be the name of the @@ -542,9 +521,7 @@ CLASS="section" >

4.2.5. Preventing untrusted Bugzilla content from executing malicious +NAME="content-type">4.2.5. Preventing untrusted Bugzilla content from executing malicious Javascript code

It is possible for a Bugzilla to execute malicious Javascript @@ -648,9 +625,7 @@ CLASS="section" >

4.2.6. 4.2.6. directoryindex for the Bugzilla default page.

4.2.7. Bugzilla and 4.2.7. Bugzilla and mod_perl

4.2.8. 4.2.8. mod_throttle -- cgit v1.2.1