Commit d55e240b authored by GitLab Bot's avatar GitLab Bot

Automatic merge of gitlab-org/gitlab master

parents b9245625 47132616
...@@ -1309,12 +1309,7 @@ To minimize data loss in GitLab 13.0 to 14.0, Gitaly Cluster: ...@@ -1309,12 +1309,7 @@ To minimize data loss in GitLab 13.0 to 14.0, Gitaly Cluster:
new primary. If the failed primary contained unreplicated writes, [data loss can occur](#check-for-data-loss). new primary. If the failed primary contained unreplicated writes, [data loss can occur](#check-for-data-loss).
> - Removed in GitLab 14.1. Instead, repositories [become unavailable](#unavailable-repositories). > - Removed in GitLab 14.1. Instead, repositories [become unavailable](#unavailable-repositories).
In GitLab 13.0 to 14.0, when Gitaly Cluster switches to a new primary, repositories enter When Gitaly Cluster switches to a new primary in GitLab 13.0 to 14.0, repositories enter
read-only mode if they are out of date. This can happen after failing over to an outdated
secondary. Read-only mode eases data recovery efforts by preventing writes that may conflict
with the unreplicated writes on other nodes.
When Gitaly Cluster switches to a new primary In GitLab 13.0 to 14.0, repositories enter
read-only mode if they are out of date. This can happen after failing over to an outdated read-only mode if they are out of date. This can happen after failing over to an outdated
secondary. Read-only mode eases data recovery efforts by preventing writes that may conflict secondary. Read-only mode eases data recovery efforts by preventing writes that may conflict
with the unreplicated writes on other nodes. with the unreplicated writes on other nodes.
......
...@@ -34,14 +34,14 @@ Parameters: ...@@ -34,14 +34,14 @@ Parameters:
|:---------------|:--------|:---------|:---------------------------------| |:---------------|:--------|:---------|:---------------------------------|
| `name` | string | yes | Name of the application. | | `name` | string | yes | Name of the application. |
| `redirect_uri` | string | yes | Redirect URI of the application. | | `redirect_uri` | string | yes | Redirect URI of the application. |
| `scopes` | string | yes | Scopes of the application. | | `scopes` | string | yes | Scopes of the application. You can specify multiple scopes by separating each scope using a space. |
| `confidential` | boolean | no | The application is used where the client secret can be kept confidential. Native mobile apps and Single Page Apps are considered non-confidential. Defaults to `true` if not supplied | | `confidential` | boolean | no | The application is used where the client secret can be kept confidential. Native mobile apps and Single Page Apps are considered non-confidential. Defaults to `true` if not supplied |
Example request: Example request:
```shell ```shell
curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" \ curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" \
--data "name=MyApplication&redirect_uri=http://redirect.uri&scopes=" \ --data "name=MyApplication&redirect_uri=http://redirect.uri&scopes=api read_user email" \
"https://gitlab.example.com/api/v4/applications" "https://gitlab.example.com/api/v4/applications"
``` ```
......
...@@ -572,7 +572,7 @@ The configuration is picked up by the `dind` service. ...@@ -572,7 +572,7 @@ The configuration is picked up by the `dind` service.
## Authenticate with registry in Docker-in-Docker ## Authenticate with registry in Docker-in-Docker
When you use Docker-in-Docker, the When you use Docker-in-Docker, the
[standard authentication methods](using_docker_images.md#define-an-image-from-a-private-container-registry) [standard authentication methods](using_docker_images.md#access-an-image-from-a-private-container-registry)
don't work because a fresh Docker daemon is started with the service. don't work because a fresh Docker daemon is started with the service.
### Option 1: Run `docker login` ### Option 1: Run `docker login`
......
...@@ -214,7 +214,7 @@ Look for the `[runners.docker]` section: ...@@ -214,7 +214,7 @@ Look for the `[runners.docker]` section:
The image and services defined this way are added to all jobs run by The image and services defined this way are added to all jobs run by
that runner. that runner.
## Define an image from a private Container Registry ## Access an image from a private Container Registry
To access private container registries, the GitLab Runner process can use: To access private container registries, the GitLab Runner process can use:
...@@ -224,19 +224,12 @@ To access private container registries, the GitLab Runner process can use: ...@@ -224,19 +224,12 @@ To access private container registries, the GitLab Runner process can use:
To define which option should be used, the runner process reads the configuration in this order: To define which option should be used, the runner process reads the configuration in this order:
- A `DOCKER_AUTH_CONFIG` variable provided as either: - A `DOCKER_AUTH_CONFIG` [CI/CD variable](../variables/index.md).
- A [CI/CD variable](../variables/index.md) in the `.gitlab-ci.yml` file. - A `DOCKER_AUTH_CONFIG` environment variable set in the runner's `config.toml` file.
- A project's variables stored on the project's **Settings > CI/CD** page.
- A `DOCKER_AUTH_CONFIG` variable provided as environment variable in the runner's `config.toml` file.
- A `config.json` file in `$HOME/.docker` directory of the user running the process. - A `config.json` file in `$HOME/.docker` directory of the user running the process.
If the `--user` flag is provided to run the child processes as unprivileged user, If the `--user` flag is provided to run the child processes as unprivileged user,
the home directory of the main runner process user is used. the home directory of the main runner process user is used.
The runner reads this configuration **only** from the `config.toml` file and ignores it if
it's provided as a CI/CD variable. This is because the runner uses **only**
`config.toml` configuration and does not interpolate **any** CI/CD variables at
runtime.
### Requirements and limitations ### Requirements and limitations
- Available for [Kubernetes executor](https://docs.gitlab.com/runner/executors/kubernetes.html) - Available for [Kubernetes executor](https://docs.gitlab.com/runner/executors/kubernetes.html)
...@@ -253,9 +246,9 @@ private registry. Both require setting the CI/CD variable ...@@ -253,9 +246,9 @@ private registry. Both require setting the CI/CD variable
`DOCKER_AUTH_CONFIG` with appropriate authentication information. `DOCKER_AUTH_CONFIG` with appropriate authentication information.
1. Per-job: To configure one job to access a private registry, add 1. Per-job: To configure one job to access a private registry, add
`DOCKER_AUTH_CONFIG` as a job variable. `DOCKER_AUTH_CONFIG` as a [CI/CD variable](../variables/index.md).
1. Per-runner: To configure a runner so all its jobs can access a 1. Per-runner: To configure a runner so all its jobs can access a
private registry, add `DOCKER_AUTH_CONFIG` to the environment in the private registry, add `DOCKER_AUTH_CONFIG` as an environment variable in the
runner's configuration. runner's configuration.
See below for examples of each. See below for examples of each.
...@@ -274,7 +267,7 @@ Let's also assume that these are the sign-in credentials: ...@@ -274,7 +267,7 @@ Let's also assume that these are the sign-in credentials:
| username | `my_username` | | username | `my_username` |
| password | `my_password` | | password | `my_password` |
Use one of the following methods to determine the value of `DOCKER_AUTH_CONFIG`: Use one of the following methods to determine the value for `DOCKER_AUTH_CONFIG`:
- Do a `docker login` on your local machine: - Do a `docker login` on your local machine:
......
...@@ -66,7 +66,7 @@ has disrupted your existing Dependency Proxy usage. ...@@ -66,7 +66,7 @@ has disrupted your existing Dependency Proxy usage.
Because the Dependency Proxy is storing Docker images in a space associated with your group, Because the Dependency Proxy is storing Docker images in a space associated with your group,
you must authenticate against the Dependency Proxy. you must authenticate against the Dependency Proxy.
Follow the [instructions for using images from a private registry](../../../ci/docker/using_docker_images.md#define-an-image-from-a-private-container-registry), Follow the [instructions for using images from a private registry](../../../ci/docker/using_docker_images.md#access-an-image-from-a-private-container-registry),
but instead of using `registry.example.com:5000`, use your GitLab domain with no port `gitlab.example.com`. but instead of using `registry.example.com:5000`, use your GitLab domain with no port `gitlab.example.com`.
For example, to manually log in: For example, to manually log in:
......
...@@ -534,8 +534,8 @@ users: ...@@ -534,8 +534,8 @@ users:
| Push container images to other projects | | | | | | Push container images to other projects | | | | |
| Push source and LFS | | | | | | Push source and LFS | | | | |
1. Only if the user is not an external one 1. Only if the triggering user is not an external one
1. Only if the user is a member of the project 1. Only if the triggering user is a member of the project
## Running pipelines on protected branches ## Running pipelines on protected branches
......
...@@ -24,7 +24,7 @@ module SubscriptionsHelper ...@@ -24,7 +24,7 @@ module SubscriptionsHelper
def buy_storage_addon_data(group) def buy_storage_addon_data(group)
{ {
redirect_after_success: group_usage_quotas_path(group, anchor: 'pipelines-quota-tab', purchased_product: _('Storage')) redirect_after_success: group_usage_quotas_path(group, anchor: 'storage-quota-tab', purchased_product: _('Storage'))
}.merge(addon_data(group)) }.merge(addon_data(group))
end end
......
...@@ -183,6 +183,6 @@ RSpec.describe SubscriptionsHelper do ...@@ -183,6 +183,6 @@ RSpec.describe SubscriptionsHelper do
it { is_expected.to include(namespace_id: group.id.to_s) } it { is_expected.to include(namespace_id: group.id.to_s) }
it { is_expected.to include(source: 'some_source') } it { is_expected.to include(source: 'some_source') }
it { is_expected.to include(group_data: %Q{[{"id":#{group.id},"name":"My Namespace","users":1,"guests":0}]}) } it { is_expected.to include(group_data: %Q{[{"id":#{group.id},"name":"My Namespace","users":1,"guests":0}]}) }
it { is_expected.to include(redirect_after_success: group_usage_quotas_path(group, anchor: 'pipelines-quota-tab', purchased_product: 'Storage')) } it { is_expected.to include(redirect_after_success: group_usage_quotas_path(group, anchor: 'storage-quota-tab', purchased_product: 'Storage')) }
end end
end end
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment