Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
path: root/doc/api
diff options
context:
space:
mode:
authorGitLab Bot <gitlab-bot@gitlab.com>2023-10-16 21:10:30 +0300
committerGitLab Bot <gitlab-bot@gitlab.com>2023-10-16 21:10:30 +0300
commit5fcd4e5fbcad7d74d1c5efa09c6785303af2ebd7 (patch)
tree4a7245bc4c4f6fcc7be3c3c4965a60bed541e533 /doc/api
parent533ad4ac834baef990e3ebf613c2b1fe54f13127 (diff)
Add latest changes from gitlab-org/gitlab@master
Diffstat (limited to 'doc/api')
-rw-r--r--doc/api/graphql/reference/index.md1
-rw-r--r--doc/api/member_roles.md34
2 files changed, 20 insertions, 15 deletions
diff --git a/doc/api/graphql/reference/index.md b/doc/api/graphql/reference/index.md
index d1f3d260c1d..639ce943877 100644
--- a/doc/api/graphql/reference/index.md
+++ b/doc/api/graphql/reference/index.md
@@ -174,6 +174,7 @@ Returns [`CiConfig`](#ciconfig).
| <a id="queryciconfigdryrun"></a>`dryRun` | [`Boolean`](#boolean) | Run pipeline creation simulation, or only do static check. |
| <a id="queryciconfigprojectpath"></a>`projectPath` | [`ID!`](#id) | Project of the CI config. |
| <a id="queryciconfigsha"></a>`sha` | [`String`](#string) | Sha for the pipeline. |
+| <a id="queryciconfigskipverifyprojectsha"></a>`skipVerifyProjectSha` **{warning-solid}** | [`Boolean`](#boolean) | **Introduced** in 16.5. This feature is an Experiment. It can be changed or removed at any time. If the provided `sha` is found in the project's repository but is not associated with a Git reference (a detached commit), the verification fails and a validation error is returned. Otherwise, verification passes, even if the `sha` is invalid. Set to `true` to skip this verification process. |
### `Query.ciMinutesUsage`
diff --git a/doc/api/member_roles.md b/doc/api/member_roles.md
index 36f9b4694b9..dc31c99f9e8 100644
--- a/doc/api/member_roles.md
+++ b/doc/api/member_roles.md
@@ -14,6 +14,7 @@ info: To determine the technical writer assigned to the Stage/Group associated w
> - [Name and description fields added](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/126423) in GitLab 16.3.
> - [Admin merge request introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/128302) in GitLab 16.4 [with a flag](../administration/feature_flags.md) named `admin_merge_request`. Disabled by default.
> - [Admin group members introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/131914) in GitLab 16.5 [with a flag](../administration/feature_flags.md) named `admin_group_member`. Disabled by default.
+> - [Manage project access tokens introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/132342) in GitLab 16.5 in [with a flag](../administration/feature_flags.md) named `manage_project_access_tokens`. Disabled by default.
FLAG:
On self-managed GitLab, by default these two features are not available. To make them available, an administrator can [enable the feature flags](../administration/feature_flags.md) named `admin_merge_request` and `admin_member_custom_role`.
@@ -33,19 +34,20 @@ GET /groups/:id/member_roles
If successful, returns [`200`](rest/index.md#status-codes) and the following response attributes:
-| Attribute | Type | Description |
-|:-------------------------|:--------|:----------------------|
-| `[].id` | integer | The ID of the member role. |
-| `[].name` | string | The name of the member role. |
-| `[].description` | string | The description of the member role. |
-| `[].group_id` | integer | The ID of the group that the member role belongs to. |
-| `[].base_access_level` | integer | Base access level for member role. Valid values are 10 (Guest), 20 (Reporter), 30 (Developer), 40 (Maintainer), or 50 (Owner).|
-| `[].admin_merge_request` | boolean | Permission to admin project merge requests and enables the ability to `download_code`. |
-| `[].admin_vulnerability` | boolean | Permission to admin project vulnerabilities. |
-| `[].read_code` | boolean | Permission to read project code. |
-| `[].read_dependency` | boolean | Permission to read project dependencies. |
-| `[].read_vulnerability` | boolean | Permission to read project vulnerabilities. |
-| `[].admin_group_member` | boolean | Permission to admin members of a group. |
+| Attribute | Type | Description |
+|:-----------------------------------|:--------|:----------------------|
+| `[].id` | integer | The ID of the member role. |
+| `[].name` | string | The name of the member role. |
+| `[].description` | string | The description of the member role. |
+| `[].group_id` | integer | The ID of the group that the member role belongs to. |
+| `[].base_access_level` | integer | Base access level for member role. Valid values are 10 (Guest), 20 (Reporter), 30 (Developer), 40 (Maintainer), or 50 (Owner).|
+| `[].admin_merge_request` | boolean | Permission to admin project merge requests and enables the ability to `download_code`. |
+| `[].admin_vulnerability` | boolean | Permission to admin project vulnerabilities. |
+| `[].read_code` | boolean | Permission to read project code. |
+| `[].read_dependency` | boolean | Permission to read project dependencies. |
+| `[].read_vulnerability` | boolean | Permission to read project vulnerabilities. |
+| `[].admin_group_member` | boolean | Permission to admin members of a group. |
+| `[].manage_project_access_tokens` | boolean | Permission to manage project access tokens. |
Example request:
@@ -67,7 +69,8 @@ Example response:
"admin_vulnerability": false,
"read_code": true,
"read_dependency": false,
- "read_vulnerability": false
+ "read_vulnerability": false,
+ "manage_project_access_tokens": false
},
{
"id": 3,
@@ -79,7 +82,8 @@ Example response:
"admin_vulnerability": true,
"read_code": false,
"read_dependency": true,
- "read_vulnerability": true
+ "read_vulnerability": true,
+ "manage_project_access_tokens": false
}
]
```