Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
7dd7e82f
Commit
7dd7e82f
authored
Apr 01, 2019
by
GitLab Bot
Browse files
Options
Browse Files
Download
Plain Diff
Automatic merge of gitlab-org/gitlab-ce master
parents
a3cd7259
da8eea6e
Changes
2
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
34 additions
and
20 deletions
+34
-20
doc/administration/pages/index.md
doc/administration/pages/index.md
+22
-7
doc/ci/yaml/README.md
doc/ci/yaml/README.md
+12
-13
No files found.
doc/administration/pages/index.md
View file @
7dd7e82f
...
...
@@ -125,7 +125,7 @@ The Pages daemon doesn't listen to the outside world.
pages_external_url 'http://example.io'
```
1.
[
Reconfigure GitLab
][
reconfigure
]
1.
[
Reconfigure GitLab
][
reconfigure
]
.
Watch the
[
video tutorial
][
video-admin
]
for this configuration.
...
...
@@ -157,7 +157,22 @@ outside world.
where `pages-nginx.crt` and `pages-nginx.key` are the SSL cert and key,
respectively.
1.
[
Reconfigure GitLab
][
reconfigure
]
1.
[
Reconfigure GitLab
][
reconfigure
]
.
### Additional configuration for Docker container
The GitLab Pages daemon will not have permissions to bind mounts when it runs
in a Docker container. To overcome this issue you'll need to change the chroot
behavior:
1.
Edit
`/etc/gitlab/gitlab.rb`
.
1.
Set the
`inplace_chroot`
to
`true`
for GitLab Pages:
```shell
gitlab_pages['inplace_chroot'] = true
```
1.
[
Reconfigure GitLab
][
reconfigure
]
.
## Advanced configuration
...
...
@@ -195,7 +210,7 @@ world. Custom domains are supported, but no TLS.
`192.0.2.2` and `2001::2` are the secondary IPs the GitLab Pages daemon
listens on. If you don't have IPv6, you can omit the IPv6 address.
1.
[
Reconfigure GitLab
][
reconfigure
]
1.
[
Reconfigure GitLab
][
reconfigure
]
.
### Custom domains with TLS support
...
...
@@ -229,7 +244,7 @@ world. Custom domains and TLS are supported.
`192.0.2.2` and `2001::2` are the secondary IPs where the GitLab Pages daemon
listens on. If you don't have IPv6, you can omit the IPv6 address.
1.
[
Reconfigure GitLab
][
reconfigure
]
1.
[
Reconfigure GitLab
][
reconfigure
]
.
### Custom domain verification
...
...
@@ -287,7 +302,7 @@ Follow the steps below to configure verbose logging of GitLab Pages daemon.
gitlab_pages['log_verbose'] = true
```
1.
[
Reconfigure GitLab
][
reconfigure
]
1.
[
Reconfigure GitLab
][
reconfigure
]
.
## Change storage path
...
...
@@ -302,7 +317,7 @@ are stored.
gitlab_rails['pages_path'] = "/mnt/storage/pages"
```
1.
[
Reconfigure GitLab
][
reconfigure
]
1.
[
Reconfigure GitLab
][
reconfigure
]
.
## Configure listener for reverse proxy requests
...
...
@@ -325,7 +340,7 @@ Omnibus GitLab 11.1.
gitlab_pages['listen_proxy'] = "localhost:10080"
```
1.
[
Reconfigure GitLab
][
reconfigure
]
1.
[
Reconfigure GitLab
][
reconfigure
]
.
## Set maximum pages size
...
...
doc/ci/yaml/README.md
View file @
7dd7e82f
...
...
@@ -499,9 +499,9 @@ docker build:
-
more_scripts/*.{rb,py,sh}
```
In the scenario above,
if you are pushing multiple commits to GitLab to an
existing branch, GitLab creates and triggers the
`docker build`
job, provided that
one of the
commits contains changes to either:
In the scenario above,
when pushing multiple commits to GitLab to an existing
branch, GitLab creates and triggers
`docker build`
job, provided that one of the
commits contains changes to either:
-
The
`Dockerfile`
file.
-
Any of the files inside
`docker/scripts/`
directory.
...
...
@@ -514,21 +514,20 @@ the section below.
##### Using `changes` with new branches and tags
If you are pushing a
**new**
branch or a
**new**
tag to GitLab, the policy
always evaluates to true and GitLab will create a job. This feature is not
connected with merge requests yet, and because GitLab is creating pipelines
before an user can create a merge request we don't know a target branch at
this point.
When pushing a
**new**
branch or a
**new**
tag to GitLab, the policy always
evaluates to true and GitLab will create a job. This feature is not connected
with merge requests yet and, because GitLab is creating pipelines before a user
can create a merge request, it is unknown what the target branch is at this point.
##### Using `changes` with `merge_requests`
With
[
pipelines for merge requests
](
../merge_request_pipelines/index.md
)
,
make it possible to define if a job should be created base
on files modified
it is possible to define a job to be created based
on files modified
in a merge request.
For example:
```
```
yaml
docker build service one
:
script
:
docker build -t my-service-one-image:$CI_COMMIT_REF_SLUG .
only
:
...
...
@@ -539,9 +538,9 @@ docker build service one:
-
service-one/**/*
```
In the scenario above, if
you create or update a merge request
that changes
either files in
`service-one`
folder or
`Dockerfile`
, GitLab creates and trigger
s
the
`docker build service one`
job.
In the scenario above, if
a merge request is created or updated
that changes
either files in
`service-one`
directory or the
`Dockerfile`
, GitLab create
s
and triggers
the
`docker build service one`
job.
### `tags`
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment