Commit eb0d9e20 authored by GitLab Bot's avatar GitLab Bot

Add latest changes from gitlab-org/gitlab@master

parent ee6b1854
---
title: Create a users_security_dashboard_projects table to store the projects a user has added to their personal security dashboard
merge_request: 18708
author:
type: added
# frozen_string_literal: true
class CreateUsersSecurityDashboardProjects < ActiveRecord::Migration[5.2]
DOWNTIME = false
INDEX_NAME = 'users_security_dashboard_projects_unique_index'
def change
create_table :users_security_dashboard_projects, id: false do |t|
t.references :user, null: false, foreign_key: { on_delete: :cascade }
t.references :project, null: false, index: false, foreign_key: { on_delete: :cascade }
end
add_index :users_security_dashboard_projects, [:project_id, :user_id], name: INDEX_NAME, unique: true
end
end
...@@ -3888,6 +3888,13 @@ ActiveRecord::Schema.define(version: 2019_11_05_094625) do ...@@ -3888,6 +3888,13 @@ ActiveRecord::Schema.define(version: 2019_11_05_094625) do
t.index ["user_id", "project_id"], name: "index_users_ops_dashboard_projects_on_user_id_and_project_id", unique: true t.index ["user_id", "project_id"], name: "index_users_ops_dashboard_projects_on_user_id_and_project_id", unique: true
end end
create_table "users_security_dashboard_projects", id: false, force: :cascade do |t|
t.bigint "user_id", null: false
t.bigint "project_id", null: false
t.index ["project_id", "user_id"], name: "users_security_dashboard_projects_unique_index", unique: true
t.index ["user_id"], name: "index_users_security_dashboard_projects_on_user_id"
end
create_table "users_star_projects", id: :serial, force: :cascade do |t| create_table "users_star_projects", id: :serial, force: :cascade do |t|
t.integer "project_id", null: false t.integer "project_id", null: false
t.integer "user_id", null: false t.integer "user_id", null: false
...@@ -4472,6 +4479,8 @@ ActiveRecord::Schema.define(version: 2019_11_05_094625) do ...@@ -4472,6 +4479,8 @@ ActiveRecord::Schema.define(version: 2019_11_05_094625) do
add_foreign_key "users", "namespaces", column: "managing_group_id", name: "fk_a4b8fefe3e", on_delete: :nullify add_foreign_key "users", "namespaces", column: "managing_group_id", name: "fk_a4b8fefe3e", on_delete: :nullify
add_foreign_key "users_ops_dashboard_projects", "projects", on_delete: :cascade add_foreign_key "users_ops_dashboard_projects", "projects", on_delete: :cascade
add_foreign_key "users_ops_dashboard_projects", "users", on_delete: :cascade add_foreign_key "users_ops_dashboard_projects", "users", on_delete: :cascade
add_foreign_key "users_security_dashboard_projects", "projects", on_delete: :cascade
add_foreign_key "users_security_dashboard_projects", "users", on_delete: :cascade
add_foreign_key "users_star_projects", "projects", name: "fk_22cd27ddfc", on_delete: :cascade add_foreign_key "users_star_projects", "projects", name: "fk_22cd27ddfc", on_delete: :cascade
add_foreign_key "vulnerabilities", "epics", name: "fk_1d37cddf91", on_delete: :nullify add_foreign_key "vulnerabilities", "epics", name: "fk_1d37cddf91", on_delete: :nullify
add_foreign_key "vulnerabilities", "milestones", column: "due_date_sourcing_milestone_id", name: "fk_7c5bb22a22", on_delete: :nullify add_foreign_key "vulnerabilities", "milestones", column: "due_date_sourcing_milestone_id", name: "fk_7c5bb22a22", on_delete: :nullify
......
...@@ -94,12 +94,12 @@ the provisioning actions. The following resources must be present: ...@@ -94,12 +94,12 @@ the provisioning actions. The following resources must be present:
- A service account with permissions to assume the provisioning - A service account with permissions to assume the provisioning
role in the `Customer` account above. role in the `Customer` account above.
- Credentials for this service account configured in GitLab via - Credentials for this service account configured in GitLab via
the `kubernetes` section of `gitlab.yml` the `kubernetes` section of `gitlab.yml`.
The process for creating a cluster is as follows: The process for creating a cluster is as follows:
1. Using the :provision_role_external_id, GitLab assumes the role provided 1. Using the `:provision_role_external_id`, GitLab assumes the role provided
by :provision_role_arn and stores a set of temporary credentials on the by `:provision_role_arn` and stores a set of temporary credentials on the
provider record. By default these credentials are valid for one hour. provider record. By default these credentials are valid for one hour.
1. A CloudFormation stack is created, based on the 1. A CloudFormation stack is created, based on the
[`AWS CloudFormation EKS template`](https://gitlab.com/gitlab-org/gitlab/blob/master/vendor/aws/cloudformation/eks_cluster.yaml). [`AWS CloudFormation EKS template`](https://gitlab.com/gitlab-org/gitlab/blob/master/vendor/aws/cloudformation/eks_cluster.yaml).
...@@ -114,9 +114,9 @@ The process for creating a cluster is as follows: ...@@ -114,9 +114,9 @@ The process for creating a cluster is as follows:
1. Credentials that are no longer required are removed. This deletes the following 1. Credentials that are no longer required are removed. This deletes the following
attributes: attributes:
- `access_key_id` - `access_key_id`
- `secret_access_key` - `secret_access_key`
- `session_token` - `session_token`
## Security ## Security
......
...@@ -88,7 +88,7 @@ gitlab-rake gitlab:cleanup:orphan_job_artifact_files DRY_RUN=false ...@@ -88,7 +88,7 @@ gitlab-rake gitlab:cleanup:orphan_job_artifact_files DRY_RUN=false
You can also limit the number of files to delete with `LIMIT`: You can also limit the number of files to delete with `LIMIT`:
```shell ```shell
gitlab-rake gitlab:cleanup:orphan_job_artifact_files LIMIT=100` gitlab-rake gitlab:cleanup:orphan_job_artifact_files LIMIT=100
``` ```
This will only delete up to 100 files from disk. You can use this to This will only delete up to 100 files from disk. You can use this to
......
...@@ -25,7 +25,7 @@ Google account (for example, one that you use to access Gmail, Drive, etc.) or c ...@@ -25,7 +25,7 @@ Google account (for example, one that you use to access Gmail, Drive, etc.) or c
TIP: **Tip:** TIP: **Tip:**
Every new Google Cloud Platform (GCP) account receives [$300 in credit](https://console.cloud.google.com/freetrial), Every new Google Cloud Platform (GCP) account receives [$300 in credit](https://console.cloud.google.com/freetrial),
and in partnership with Google, GitLab is able to offer an additional $200 for new GCP accounts to get started with GitLab's and in partnership with Google, GitLab is able to offer an additional $200 for new GCP accounts to get started with GitLab's
Google Kubernetes Engine Integration. All you have to do is [follow this link](https://cloud.google.com/partners/partnercredit/?PCN=a0n60000006Vpz4AAC) and apply for credit. Google Kubernetes Engine Integration. All you have to do is [follow this link](https://cloud.google.com/partners/partnercredit/?pcn_code=0014M00001h35gDQAQ#contact-form) and apply for credit.
## Creating a new project from a template ## Creating a new project from a template
......
...@@ -20300,6 +20300,9 @@ msgstr "" ...@@ -20300,6 +20300,9 @@ msgstr ""
msgid "leave %{group_name}" msgid "leave %{group_name}"
msgstr "" msgstr ""
msgid "limit of %{project_limit} reached"
msgstr ""
msgid "locked by %{path_lock_user_name} %{created_at}" msgid "locked by %{path_lock_user_name} %{created_at}"
msgstr "" msgstr ""
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment