From 85dc423f7090da0a52c73eb66faf22ddb20efff9 Mon Sep 17 00:00:00 2001 From: GitLab Bot Date: Sat, 19 Sep 2020 01:45:44 +0000 Subject: Add latest changes from gitlab-org/gitlab@13-4-stable-ee --- config/gitlab.yml.example | 26 +++++++++++++++++++++++++- 1 file changed, 25 insertions(+), 1 deletion(-) (limited to 'config/gitlab.yml.example') diff --git a/config/gitlab.yml.example b/config/gitlab.yml.example index 5d217332634..605729a1435 100644 --- a/config/gitlab.yml.example +++ b/config/gitlab.yml.example @@ -456,6 +456,10 @@ production: &base schedule_migrate_external_diffs_worker: cron: "15 * * * *" + # Update CI Platform Metrics daily + ci_platform_metrics_update_cron_worker: + cron: "47 9 * * *" + # GitLab EE only jobs. These jobs are automatically enabled for an EE # installation, and ignored for a CE installation. ee_cron_jobs: @@ -890,8 +894,10 @@ production: &base # Allow users with existing accounts to sign in and auto link their account via OmniAuth # login, without having to do a manual login first and manually add OmniAuth. Links on email. + # Define the allowed providers using an array, e.g. ["saml", "twitter"], or as true/false to + # allow all providers or none. # (default: false) - auto_link_user: false + auto_link_user: ["saml", "twitter"] # Set different Omniauth providers as external so that all users creating accounts # via these providers will not be able to have access to internal projects. You @@ -1093,6 +1099,11 @@ production: &base # Default is '.gitlab_workhorse_secret' relative to Rails.root (i.e. root of the GitLab app). # secret_file: /home/git/gitlab/.gitlab_workhorse_secret + gitlab_kas: + # File that contains the secret key for verifying access for gitlab-kas. + # Default is '.gitlab_kas_secret' relative to Rails.root (i.e. root of the GitLab app). + # secret_file: /home/git/gitlab/.gitlab_kas_secret + ## GitLab Elasticsearch settings elasticsearch: indexer_path: /home/git/gitlab-elasticsearch-indexer/ @@ -1125,6 +1136,7 @@ production: &base # Sidekiq exporter is webserver built in to Sidekiq to expose Prometheus metrics sidekiq_exporter: # enabled: true + # log_enabled: false # address: localhost # port: 8082 @@ -1142,8 +1154,15 @@ production: &base # yourself, and then update the values here. # https://docs.gitlab.com/ee/administration/monitoring/prometheus/ prometheus: + # Do not use `enable` and `listen_address` in any new code, as they are deprecated. Use `server_address` instead. + # https://gitlab.com/gitlab-org/gitlab/-/issues/227111 # enable: true # listen_address: 'localhost:9090' + # server_address: 'localhost:9090' + + ## Consul settings + consul: + # api_url: 'http://localhost:8500' shutdown: # # blackout_seconds: @@ -1397,6 +1416,11 @@ test: app_id: 'YOUR_CLIENT_ID', app_secret: 'YOUR_CLIENT_SECRET' } + - { name: 'atlassian_oauth2', + app_id: 'YOUR_CLIENT_ID', + app_secret: 'YOUR_CLIENT_SECRET', + args: { scope: 'offline_access read:jira-user read:jira-work', prompt: 'consent' } + } ldap: enabled: false servers: -- cgit v1.2.3