Add latest changes from gitlab-org/gitlab@master
This commit is contained in:
parent
326394d7c4
commit
3f5f07675c
|
@ -15,7 +15,7 @@
|
|||
#{ dropzone_text.html_safe }
|
||||
|
||||
%br
|
||||
.dropzone-alerts.alert.alert-danger.data{ style: "display:none" }
|
||||
.dropzone-alerts.gl-alert.gl-alert-danger.gl-mb-5.data{ style: "display:none" }
|
||||
|
||||
= render 'shared/new_commit_form', placeholder: placeholder
|
||||
|
||||
|
|
|
@ -280,3 +280,11 @@ Any pipelines that complete successfully for new tags in the subscribed project
|
|||
will now trigger a pipeline on the current project's default branch. The maximum
|
||||
number of upstream pipeline subscriptions is 2 by default, for both the upstream and
|
||||
downstream projects. This [application limit](../administration/instance_limits.md#number-of-cicd-subscriptions-to-a-project) can be changed on self-managed instances by a GitLab administrator.
|
||||
|
||||
## Downstream private projects confidentiality concern
|
||||
|
||||
If you trigger a pipeline in a downstream private project, the name of the project
|
||||
and the status of the pipeline is visible in the upstream project's pipelines page.
|
||||
|
||||
If you have a public project that can trigger downstream pipelines in a private
|
||||
project, make sure to check that there are no confidentiality problems.
|
||||
|
|
|
@ -14,6 +14,7 @@ Each security vulnerability in a project's [Security Dashboard](../security_dash
|
|||
- Details of the vulnerability.
|
||||
- The status of the vulnerability within the project.
|
||||
- Available actions for the vulnerability.
|
||||
- Issues related to the vulnerability.
|
||||
|
||||
On the vulnerability page, you can interact with the vulnerability in
|
||||
several different ways:
|
||||
|
@ -23,6 +24,7 @@ several different ways:
|
|||
- [Create issue](#creating-an-issue-for-a-vulnerability) - Create a new issue with the
|
||||
title and description pre-populated with information from the vulnerability report.
|
||||
By default, such issues are [confidential](../../project/issues/confidential_issues.md).
|
||||
- [Link issues](#link-issues-to-the-vulnerability) - Link existing issues to vulnerability.
|
||||
- [Solution](#automatic-remediation-for-vulnerabilities) - For some vulnerabilities,
|
||||
a solution is provided for how to fix the vulnerability.
|
||||
|
||||
|
@ -50,6 +52,12 @@ project the vulnerability came from, and pre-populates it with useful informatio
|
|||
the vulnerability report. After the issue is created, GitLab redirects you to the
|
||||
issue page so you can edit, assign, or comment on the issue.
|
||||
|
||||
## Link issues to the vulnerability
|
||||
|
||||
You can link one or more existing issues to the vulnerability. This allows you to
|
||||
indicate that this vulnerability affects multiple issues. It also allows you to indicate
|
||||
that the resolution of one issue would resolve multiple vulnerabilities.
|
||||
|
||||
## Automatic remediation for vulnerabilities
|
||||
|
||||
You can fix some vulnerabilities by applying the solution that GitLab automatically
|
||||
|
|
|
@ -61,21 +61,10 @@ To create and add a new Kubernetes cluster to your project, group, or instance:
|
|||
- **Admin Area > Kubernetes**, for an instance-level cluster.
|
||||
1. Click **Add Kubernetes cluster**.
|
||||
1. Under the **Create new cluster** tab, click **Amazon EKS**. You will be provided with an
|
||||
`Account ID` and `External ID` to use in the next step.
|
||||
1. In the [IAM Management Console](https://console.aws.amazon.com/iam/home), create an EKS management IAM role.
|
||||
To do so, follow the [Amazon EKS cluster IAM role](https://docs.aws.amazon.com/eks/latest/userguide/service_IAM_role.html) instructions
|
||||
to create a IAM role suitable for managing the AWS EKS cluster's resources on your behalf.
|
||||
In addition to the policies that guide suggests, you must also include the `AmazonEKSClusterPolicy`
|
||||
policy for this role in order for GitLab to manage the EKS cluster correctly.
|
||||
1. In the [IAM Management Console](https://console.aws.amazon.com/iam/home), create an IAM role:
|
||||
1. From the left panel, select **Roles**.
|
||||
1. Click **Create role**.
|
||||
1. Under `Select type of trusted entity`, select **Another AWS account**.
|
||||
1. Enter the Account ID from GitLab into the `Account ID` field.
|
||||
1. Check **Require external ID**.
|
||||
1. Enter the External ID from GitLab into the `External ID` field.
|
||||
1. Click **Next: Permissions**.
|
||||
1. Click **Create Policy**, which will open a new window.
|
||||
`Account ID` and `External ID` needed for later steps.
|
||||
1. In the [IAM Management Console](https://console.aws.amazon.com/iam/home), create an IAM policy:
|
||||
1. From the left panel, select **Policies**.
|
||||
1. Click **Create Policy**, which opens a new window.
|
||||
1. Select the **JSON** tab, and paste in the following snippet in place of the existing content:
|
||||
|
||||
```json
|
||||
|
@ -131,7 +120,20 @@ To create and add a new Kubernetes cluster to your project, group, or instance:
|
|||
|
||||
1. Click **Review policy**.
|
||||
1. Enter a suitable name for this policy, and click **Create Policy**. You can now close this window.
|
||||
1. Switch back to the "Create role" window, and select the policy you just created.
|
||||
|
||||
1. In the [IAM Management Console](https://console.aws.amazon.com/iam/home), create an EKS management IAM role.
|
||||
To do so, follow the [Amazon EKS cluster IAM role](https://docs.aws.amazon.com/eks/latest/userguide/service_IAM_role.html) instructions
|
||||
to create a IAM role suitable for managing the AWS EKS cluster's resources on your behalf.
|
||||
In addition to the policies that guide suggests, you must also include the `AmazonEKSClusterPolicy`
|
||||
policy for this role in order for GitLab to manage the EKS cluster correctly.
|
||||
1. In the [IAM Management Console](https://console.aws.amazon.com/iam/home), create an IAM role:
|
||||
1. From the left panel, select **Roles**.
|
||||
1. Click **Create role**.
|
||||
1. Under `Select type of trusted entity`, select **Another AWS account**.
|
||||
1. Enter the Account ID from GitLab into the `Account ID` field.
|
||||
1. Check **Require external ID**.
|
||||
1. Enter the External ID from GitLab into the `External ID` field.
|
||||
1. Click **Next: Permissions**, and select the policy you just created.
|
||||
1. Click **Next: Tags**, and optionally enter any tags you wish to associate with this role.
|
||||
1. Click **Next: Review**.
|
||||
1. Enter a role name and optional description into the fields provided.
|
||||
|
|
Loading…
Reference in New Issue