Commit 907ce91e authored by Craig Norris's avatar Craig Norris

Update Release Admin Area references

Update references to the Admin Area for Release-related docs
parent bf78aec2
...@@ -373,9 +373,13 @@ When adding a custom domain, users are required to prove they own it by ...@@ -373,9 +373,13 @@ When adding a custom domain, users are required to prove they own it by
adding a GitLab-controlled verification code to the DNS records for that domain. adding a GitLab-controlled verification code to the DNS records for that domain.
If your user base is private or otherwise trusted, you can disable the If your user base is private or otherwise trusted, you can disable the
verification requirement. Go to **Admin Area > Settings > Preferences** and verification requirement:
uncheck **Require users to prove ownership of custom domains** in the **Pages** section.
This setting is enabled by default. 1. On the top bar, select **Menu >** **{admin}** **Admin**.
1. On the left sidebar, select **Settings > Preferences**.
1. Expand **Pages**.
1. Clear the **Require users to prove ownership of custom domains** checkbox.
This setting is enabled by default.
### Let's Encrypt integration ### Let's Encrypt integration
...@@ -388,9 +392,11 @@ sites served under a custom domain. ...@@ -388,9 +392,11 @@ sites served under a custom domain.
To enable it, you must: To enable it, you must:
1. Choose an email address on which you want to receive notifications about expiring domains. 1. Choose an email address on which you want to receive notifications about expiring domains.
1. Go to your instance's **Admin Area > Settings > Preferences** and expand **Pages** settings. 1. On the top bar, select **Menu >** **{admin}** **Admin**.
1. On the left sidebar, select **Settings > Preferences**.
1. Expand **Pages**.
1. Enter the email address for receiving notifications and accept Let's Encrypt's Terms of Service as shown below. 1. Enter the email address for receiving notifications and accept Let's Encrypt's Terms of Service as shown below.
1. Click **Save changes**. 1. Select **Save changes**.
![Let's Encrypt settings](img/lets_encrypt_integration_v12_1.png) ![Let's Encrypt settings](img/lets_encrypt_integration_v12_1.png)
...@@ -442,11 +448,12 @@ The scope to use for authentication must match the GitLab Pages OAuth applicatio ...@@ -442,11 +448,12 @@ The scope to use for authentication must match the GitLab Pages OAuth applicatio
pre-existing applications must modify the GitLab Pages OAuth application. Follow these steps to do pre-existing applications must modify the GitLab Pages OAuth application. Follow these steps to do
this: this:
1. Go to your instance's **Admin Area > Settings > Applications** and expand **GitLab Pages** 1. On the top bar, select **Menu >** **{admin}** **Admin**.
settings. 1. On the left sidebar, select **Settings > Applications**.
1. Expand **GitLab Pages**.
1. Clear the `api` scope's checkbox and select the desired scope's checkbox (for example, 1. Clear the `api` scope's checkbox and select the desired scope's checkbox (for example,
`read_api`). `read_api`).
1. Click **Save changes**. 1. Select **Save changes**.
#### Disabling public access to all Pages websites #### Disabling public access to all Pages websites
...@@ -460,9 +467,11 @@ This can be useful to preserve information published with Pages websites to the ...@@ -460,9 +467,11 @@ This can be useful to preserve information published with Pages websites to the
of your instance only. of your instance only.
To do that: To do that:
1. Go to your instance's **Admin Area > Settings > Preferences** and expand **Pages** settings. 1. On the top bar, select **Menu >** **{admin}** **Admin**.
1. Check the **Disable public access to Pages sites** checkbox. 1. On the left sidebar, select **Settings > Preferences**.
1. Click **Save changes**. 1. Expand **Pages**.
1. Select the **Disable public access to Pages sites** checkbox.
1. Select **Save changes**.
WARNING: WARNING:
For self-managed installations, all public websites remain private until they are For self-managed installations, all public websites remain private until they are
...@@ -635,12 +644,6 @@ Follow the steps below to configure the proxy listener of GitLab Pages. ...@@ -635,12 +644,6 @@ Follow the steps below to configure the proxy listener of GitLab Pages.
1. [Reconfigure GitLab](../restart_gitlab.md#omnibus-gitlab-reconfigure). 1. [Reconfigure GitLab](../restart_gitlab.md#omnibus-gitlab-reconfigure).
## Set maximum pages size
You can configure the maximum size of the unpacked archive per project in
**Admin Area > Settings > Preferences > Pages**, in **Maximum size of pages (MB)**.
The default is 100MB.
### Override maximum pages size per project or group **(PREMIUM SELF)** ### Override maximum pages size per project or group **(PREMIUM SELF)**
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/16610) in GitLab 12.7. > [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/16610) in GitLab 12.7.
...@@ -1256,9 +1259,14 @@ Upgrading to an [officially supported operating system](https://about.gitlab.com ...@@ -1256,9 +1259,14 @@ Upgrading to an [officially supported operating system](https://about.gitlab.com
### The requested scope is invalid, malformed, or unknown ### The requested scope is invalid, malformed, or unknown
This problem comes from the permissions of the GitLab Pages OAuth application. To fix it, go to This problem comes from the permissions of the GitLab Pages OAuth application. To fix it:
**Admin > Applications > GitLab Pages** and edit the application. Under **Scopes**, ensure that the
`api` scope is selected and save your changes. 1. On the top bar, select **Menu >** **{admin}** **Admin**.
1. On the left sidebar, select **Applications > GitLab Pages**.
1. Edit the application.
1. Under **Scopes**, ensure that the `api` scope is selected.
1. Save your changes.
When running a [separate Pages server](#running-gitlab-pages-on-a-separate-server), When running a [separate Pages server](#running-gitlab-pages-on-a-separate-server),
this setting needs to be configured on the main GitLab server. this setting needs to be configured on the main GitLab server.
......
...@@ -443,9 +443,14 @@ are stored. ...@@ -443,9 +443,14 @@ are stored.
## Set maximum Pages size ## Set maximum Pages size
The maximum size of the unpacked archive per project can be configured in The default for the maximum size of unpacked archives per project is 100 MB.
**Admin Area > Settings > Preferences > Pages**, in **Maximum size of pages (MB)**.
The default is 100MB. To change this value:
1. On the top bar, select **Menu >** **{admin}** **Admin**.
1. On the left sidebar, select **Settings > Preferences**.
1. Expand **Pages**.
1. Update the value for **Maximum size of pages (MB)**.
## Backup ## Backup
......
...@@ -121,8 +121,9 @@ repositories to secure, shared services, such as CI/CD. ...@@ -121,8 +121,9 @@ repositories to secure, shared services, such as CI/CD.
Instance administrators can add public deploy keys: Instance administrators can add public deploy keys:
1. Go to **Admin Area > Deploy Keys**. 1. On the top bar, select **Menu >** **{admin}** **Admin**.
1. Click on **New deploy key**. 1. On the left sidebar, select **Deploy Keys**.
1. Select **New deploy key**.
Make sure your new key has a meaningful title, as it is the primary way for project Make sure your new key has a meaningful title, as it is the primary way for project
maintainers and owners to identify the correct public deploy key to add. For example, maintainers and owners to identify the correct public deploy key to add. For example,
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment