You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6-10Lines changed: 6 additions & 10 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -483,13 +483,14 @@ Great! we are now just one step away from having our application secured.
483
483
484
484
##### Enabling HTTPS support
485
485
486
-
HTTPS support can be enabled by setting the `GITLAB_HTTPS` option to `true`. Additionally, when using self-signed SSL certificates you need to the set `SSL_SELF_SIGNED` option to `true` as well. Assuming we are using self-signed certificates
486
+
HTTPS support can be enabled by setting the `GITLAB_HTTPS` option to `true`.
487
+
Since corresponding setting `self_signed_cert` was removed in the gitlab-shell 13.26.0 release, the option `SSL_SELF_SIGNED`, that was used to indicate to use a self-signed certificate, is not used anymore. You don't need to set this option even if you're using a self-signed certificate.
@@ -516,7 +517,7 @@ If you want to completely disable HSTS set `NGINX_HSTS_ENABLED` to `false`.
516
517
517
518
Load balancers like nginx/haproxy/hipache talk to backend applications over plain http and as such the installation of ssl keys and certificates are not required and should **NOT** be installed in the container. The SSL configuration has to instead be done at the load balancer.
518
519
519
-
However, when using a load balancer you **MUST** set `GITLAB_HTTPS` to `true`. Additionally you will need to set the `SSL_SELF_SIGNED` option to `true` if self signed SSL certificates are in use.
520
+
However, when using a load balancer you **MUST** set `GITLAB_HTTPS` to `true`.
520
521
521
522
With this in place, you should configure the load balancer to support handling of https requests. But that is out of the scope of this document. Please refer to [Using SSL/HTTPS with HAProxy](http://seanmcgary.com/posts/using-sslhttps-with-haproxy) for information on the subject.
522
523
@@ -528,12 +529,11 @@ In summation, when using a load balancer, the docker command would look for the
Again, drop the `--env 'SSL_SELF_SIGNED=true'` option if you are using CA certified SSL certificates.
537
537
538
538
In case GitLab responds to any kind of POST request (login, OAUTH, changing settings etc.) with a 422 HTTP Error, consider adding this to your reverse proxy configuration:
539
539
@@ -1594,10 +1594,6 @@ The value of the `worker-src` directive in the `Content-Security-Policy` header.
1594
1594
1595
1595
The value of the `report-uri` directive in the `Content-Security-Policy` header
1596
1596
1597
-
##### `SSL_SELF_SIGNED`
1598
-
1599
-
Set to `true` when using self signed ssl certificates. `false` by default.
1600
-
1601
1597
##### `SSL_CERTIFICATE_PATH`
1602
1598
1603
1599
Location of the ssl certificate. Defaults to `/home/git/data/certs/gitlab.crt`
Copy file name to clipboardExpand all lines: docs/s3_compatible_storage.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,11 +7,12 @@ This is an extend of AWS Remote Backups.
7
7
As explained in [doc.gitlab.com](https://docs.gitlab.com/ce/raketasks/backup_restore.html#upload-backups-to-remote-cloud-storage), it uses [Fog library](http://fog.io) and the module fog-aws. More details on [s3 supported parameters](https://github.com/fog/fog-aws/blob/master/lib/fog/aws/storage.rb)
8
8
9
9
10
+
-[GitLab Backup to s3 compatible storage](#gitlab-backup-to-s3-compatible-storage)
0 commit comments