Add latest changes from gitlab-org/gitlab@master
This commit is contained in:
parent
d0c0976efe
commit
c860067451
|
@ -615,7 +615,7 @@ curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" \
|
|||
curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" \
|
||||
--form "namespace=email" \
|
||||
--form "path=impapi" \
|
||||
--form "file=@/path/to/somefile.txt"
|
||||
--form "file=@/path/to/somefile.txt" \
|
||||
--form "override_params[visibility]=private" \
|
||||
--form "override_params[some_other_param]=some_value" \
|
||||
"https://gitlab.example.com/api/v4/projects/import"
|
||||
|
@ -628,7 +628,7 @@ curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" \
|
|||
|
||||
```shell
|
||||
curl --globoff --request POST --header "PRIVATE-TOKEN: <your_access_token>" \
|
||||
"https://gitlab.example.com/api/v4/projects/169/pipeline?ref=master&variables[][key]=VAR1&variables[][value]=hello&variables[][key]=VAR2&variables[][value]=world"
|
||||
"https://gitlab.example.com/api/v4/projects/169/pipeline?ref=master&variables[0][key]=VAR1&variables[0][value]=hello&variables[1][key]=VAR2&variables[1][value]=world"
|
||||
|
||||
curl --request POST --header "PRIVATE-TOKEN: <your_access_token>" \
|
||||
--header "Content-Type: application/json" \
|
||||
|
|
|
@ -88,6 +88,12 @@ Don't use a descriptor.
|
|||
- Avoid: Select the **Run pipelines** button.
|
||||
- Use instead: Select **Run pipelines**.
|
||||
|
||||
## cannot, can not
|
||||
|
||||
Use **cannot** instead of **can not**. You can also use **can't**.
|
||||
|
||||
See also [contractions](index.md#contractions).
|
||||
|
||||
## checkbox
|
||||
|
||||
One word, **checkbox**. Do not use **check box**.
|
||||
|
|
|
@ -65,8 +65,8 @@ Any custom change to the official analyzers can be achieved by using a
|
|||
|
||||
You can switch to a custom Docker registry that provides the official analyzer
|
||||
images under a different prefix. For instance, the following instructs
|
||||
SAST to pull `my-docker-registry/gl-images/bandit`
|
||||
instead of `registry.gitlab.com/gitlab-org/security-products/analyzers/bandit`.
|
||||
SAST to pull `my-docker-registry/gl-images/sast/bandit`
|
||||
instead of `registry.gitlab.com/security-products/sast/bandit`.
|
||||
In `.gitlab-ci.yml` define:
|
||||
|
||||
```yaml
|
||||
|
|
|
@ -669,19 +669,19 @@ import the following default SAST analyzer images from `registry.gitlab.com` int
|
|||
[local Docker container registry](../../packages/container_registry/index.md):
|
||||
|
||||
```plaintext
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/bandit:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/brakeman:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/eslint:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/flawfinder:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/gosec:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/kubesec:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/nodejs-scan:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/phpcs-security-audit:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/pmd-apex:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/security-code-scan:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/semgrep:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/sobelow:2
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/spotbugs:2
|
||||
registry.gitlab.com/security-products/sast/bandit:2
|
||||
registry.gitlab.com/security-products/sast/brakeman:2
|
||||
registry.gitlab.com/security-products/sast/eslint:2
|
||||
registry.gitlab.com/security-products/sast/flawfinder:2
|
||||
registry.gitlab.com/security-products/sast/gosec:3
|
||||
registry.gitlab.com/security-products/sast/kubesec:2
|
||||
registry.gitlab.com/security-products/sast/nodejs-scan:2
|
||||
registry.gitlab.com/security-products/sast/phpcs-security-audit:2
|
||||
registry.gitlab.com/security-products/sast/pmd-apex:2
|
||||
registry.gitlab.com/security-products/sast/security-code-scan:2
|
||||
registry.gitlab.com/security-products/sast/semgrep:2
|
||||
registry.gitlab.com/security-products/sast/sobelow:2
|
||||
registry.gitlab.com/security-products/sast/spotbugs:2
|
||||
```
|
||||
|
||||
The process for importing Docker images into a local offline Docker registry depends on
|
||||
|
|
|
@ -330,7 +330,7 @@ Import the following default Secret Detection analyzer images from `registry.git
|
|||
[local Docker container registry](../../packages/container_registry/index.md):
|
||||
|
||||
```plaintext
|
||||
registry.gitlab.com/gitlab-org/security-products/analyzers/secrets:3
|
||||
registry.gitlab.com/security-products/secret-detection:3
|
||||
```
|
||||
|
||||
The process for importing Docker images into a local offline Docker registry depends on
|
||||
|
|
|
@ -591,6 +591,7 @@ project:
|
|||
- error_tracking_errors
|
||||
- error_tracking_client_keys
|
||||
- pending_builds
|
||||
- security_scans
|
||||
award_emoji:
|
||||
- awardable
|
||||
- user
|
||||
|
|
Loading…
Reference in New Issue