Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
46f76747
Commit
46f76747
authored
Aug 28, 2019
by
Evan Read
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Edit limit text
parent
fb276565
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
10 additions
and
8 deletions
+10
-8
doc/security/rack_attack.md
doc/security/rack_attack.md
+5
-4
doc/user/gitlab_com/index.md
doc/user/gitlab_com/index.md
+5
-4
No files found.
doc/security/rack_attack.md
View file @
46f76747
...
...
@@ -77,11 +77,12 @@ authentication requests were received in a 3-minute period from a single IP addr
This applies only to Git requests and container registry (
`/jwt/auth`
) requests
(combined).
This limit is reset by requests that authenticate successfully. For example, 29
failed authentication requests followed by 1 successful request, followed by 29
more failed authentication requests would not trigger a ban.
This limit:
JWT requests authenticated by gitlab-ci-token are excluded from this limit.
-
Is reset by requests that authenticate successfully. For example, 29
failed authentication requests followed by 1 successful request, followed by 29
more failed authentication requests would not trigger a ban.
-
Does not apply to JWT requests authenticated by
`gitlab-ci-token`
.
No response headers are provided.
...
...
doc/user/gitlab_com/index.md
View file @
46f76747
...
...
@@ -320,11 +320,12 @@ authentication requests were received in a 3-minute period from a single IP addr
This applies only to Git requests and container registry (
`/jwt/auth`
) requests
(combined).
This limit is reset by requests that authenticate successfully. For example, 29
failed authentication requests followed by 1 successful request, followed by 29
more failed authentication requests would not trigger a ban.
This limit:
JWT requests authenticated by gitlab-ci-token are excluded from this limit.
-
Is reset by requests that authenticate successfully. For example, 29
failed authentication requests followed by 1 successful request, followed by 29
more failed authentication requests would not trigger a ban.
-
Does not apply to JWT requests authenticated by
`gitlab-ci-token`
.
No response headers are provided.
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment