@@ -77,7 +77,7 @@ First, you need GitLab Runner configured:
...
@@ -77,7 +77,7 @@ First, you need GitLab Runner configured:
- For the [Docker-in-Docker workflow](../../../ci/docker/using_docker_build.md#use-docker-in-docker-workflow-with-docker-executor).
- For the [Docker-in-Docker workflow](../../../ci/docker/using_docker_build.md#use-docker-in-docker-workflow-with-docker-executor).
- With enough disk space to handle generated Code Quality files. For example on the [GitLab project](https://gitlab.com/gitlab-org/gitlab) the files are approximately 7 GB.
- With enough disk space to handle generated Code Quality files. For example on the [GitLab project](https://gitlab.com/gitlab-org/gitlab) the files are approximately 7 GB.
Once you set up the Runner, include the Code Quality template in your CI configuration:
Once you set up GitLab Runner, include the Code Quality template in your CI configuration:
```yaml
```yaml
include:
include:
...
@@ -136,7 +136,7 @@ This information will be automatically extracted and shown right in the merge re
...
@@ -136,7 +136,7 @@ This information will be automatically extracted and shown right in the merge re
CAUTION: **Caution:**
CAUTION: **Caution:**
On self-managed instances, if a malicious actor compromises the Code Quality job
On self-managed instances, if a malicious actor compromises the Code Quality job
definition they will be able to execute privileged Docker commands on the Runner
definition they will be able to execute privileged Docker commands on the runner
host. Having proper access control policies mitigates this attack vector by
host. Having proper access control policies mitigates this attack vector by