Welcome to mirror list, hosted at ThFree Co, Russian Federation.

gitlab.com/gitlab-org/gitlab-foss.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorThunk <li-shao-kang@163.com>2018-11-08 10:04:57 +0300
committerThunk <li-shao-kang@163.com>2018-11-08 10:04:57 +0300
commit744759e40444fcb83b2612dcf8d6ad1c8743a5f0 (patch)
treee7b66ef0404cff6fac3e74a432b5c484928b8ddd /doc/security
parentb5a79f15369678fd959e6db290e2f29eab3ca84c (diff)
GitLab 11.4.3 "Outbound requests" setting path
Diffstat (limited to 'doc/security')
-rw-r--r--doc/security/webhooks.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/doc/security/webhooks.md b/doc/security/webhooks.md
index b17b0a4bc4a..fb2b6768f0a 100644
--- a/doc/security/webhooks.md
+++ b/doc/security/webhooks.md
@@ -12,7 +12,7 @@ If a web service does not require authentication, Webhooks can be used to trigge
To prevent this type of exploitation from happening, starting with GitLab 10.6, all Webhook requests to the current GitLab instance server address and/or in a private network will be forbidden by default. That means that all requests made to 127.0.0.1, ::1 and 0.0.0.0, as well as IPv4 10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16 and IPv6 site-local (ffc0::/10) addresses won't be allowed.
-This behavior can be overridden by enabling the option *"Allow requests to the local network from hooks and services"* in the *"Outbound requests"* section inside the Admin area under **Settings** (`/admin/application_settings`):
+This behavior can be overridden by enabling the option *"Allow requests to the local network from hooks and services"* in the *"Outbound requests"* section inside the Admin area under **Settings** (`/admin/application_settings/network`):
![Outbound requests admin settings](img/outbound_requests_section.png)