Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
1d9e4a38
Commit
1d9e4a38
authored
Jun 02, 2021
by
Abhijeet Chatterjee
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Fix Vale issues for (/administration/object_storage.md)
parent
0c17e1c5
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
6 additions
and
6 deletions
+6
-6
doc/administration/object_storage.md
doc/administration/object_storage.md
+6
-6
No files found.
doc/administration/object_storage.md
View file @
1d9e4a38
...
...
@@ -618,20 +618,20 @@ This can result in some of the following problems:
-
If GitLab is using non-secure HTTP to access the object storage, clients may generate
`https->http`
downgrade errors and refuse to process the redirect. The solution to this
is for GitLab to use HTTPS. LFS, for example,
will generate
this error:
is for GitLab to use HTTPS. LFS, for example,
it generates
this error:
```
plaintext
LFS: lfsapi/client: refusing insecure redirect, https->http
```
-
Clients
will
need to trust the certificate authority that issued the object storage
-
Clients need to trust the certificate authority that issued the object storage
certificate, or may return common TLS errors such as:
```
plaintext
x509: certificate signed by unknown authority
```
-
Clients
will
need network access to the object storage.
-
Clients need network access to the object storage.
Network firewalls could block access.
Errors that might result
if this access is not in place include:
...
...
@@ -667,7 +667,7 @@ The first option is recommended for MinIO. Otherwise, the
is to use the
`--compat`
parameter on the server.
Without consolidated object store configuration or instance profiles enabled,
GitLab Workhorse
will upload
files to S3 using pre-signed URLs that do
GitLab Workhorse
uploads
files to S3 using pre-signed URLs that do
not have a
`Content-MD5`
HTTP header computed for them. To ensure data
is not corrupted, Workhorse checks that the MD5 hash of the data sent
equals the ETag header returned from the S3 server. When encryption is
...
...
@@ -683,7 +683,7 @@ eliminates the need to compare ETag headers returned from the S3 server.
Instead of supplying AWS access and secret keys in object storage
configuration, GitLab can be configured to use IAM roles to set up an
[
Amazon instance profile
](
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_use_switch-role-ec2.html
)
.
When this is used, GitLab
will fetch
temporary credentials each time an
When this is used, GitLab
fetches
temporary credentials each time an
S3 bucket is accessed, so no hard-coded values are needed in the
configuration.
...
...
@@ -721,7 +721,7 @@ must be fulfilled:
-
`use_iam_profile`
is
`true`
in the connection settings.
-
Consolidated object storage settings are in use.
[
ETag mismatch errors
](
#etag-mismatch
)
will occur
if server side
[
ETag mismatch errors
](
#etag-mismatch
)
occurs
if server side
encryption headers are used without enabling the Workhorse S3 client.
##### Disabling the feature
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment