Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Keyboard shortcuts
?
Submit feedback
Contribute to GitLab
Sign in / Register
Toggle navigation
G
gitlab-ce
Project overview
Project overview
Details
Activity
Releases
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
1
Merge Requests
1
Analytics
Analytics
Repository
Value Stream
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Create a new issue
Commits
Issue Boards
Open sidebar
nexedi
gitlab-ce
Commits
a3d95bd3
Commit
a3d95bd3
authored
Jun 05, 2020
by
Amy Qualls
Committed by
Clement Ho
Jun 05, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Remove term 'whitelist'
Update page and image name to remove the term 'whitelist' in favor of 'allowlist.'
parent
40b85ac2
Changes
3
Show whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
8 additions
and
8 deletions
+8
-8
doc/security/img/allowlist_v13_0.png
doc/security/img/allowlist_v13_0.png
+0
-0
doc/security/img/whitelist.png
doc/security/img/whitelist.png
+0
-0
doc/security/webhooks.md
doc/security/webhooks.md
+8
-8
No files found.
doc/security/img/allowlist_v13_0.png
0 → 100644
View file @
a3d95bd3
15.7 KB
doc/security/img/whitelist.png
deleted
100644 → 0
View file @
40b85ac2
10.4 KB
doc/security/webhooks.md
View file @
a3d95bd3
...
...
@@ -52,29 +52,29 @@ NOTE: **Note:**
set up by administrators. However, you can turn this off by disabling the
**Allow requests to the local network from system hooks**
option.
##
White
list for local requests
##
Allow
list for local requests
> [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/issues/44496) in GitLab 12.2
You can allow certain domains and IP addresses to be accessible to both
*system hooks*
and
*webhooks*
even when local requests are not allowed by adding them to the
white
list. Navigate to
**Admin Area > Settings > Network**
(
`/admin/application_settings/network`
)
allow
list. Navigate to
**Admin Area > Settings > Network**
(
`/admin/application_settings/network`
)
and expand
**Outbound requests**
:
![
Outbound local requests
whitelist
](
img/whitelist
.png
)
![
Outbound local requests
allowlist
](
img/allowlist_v13_0
.png
)
The
whitelist
entries can be separated by semicolons, commas or whitespaces
The
allowed
entries can be separated by semicolons, commas or whitespaces
(including newlines) and be in different formats like hostnames, IP addresses and/or
IP ranges. IPv6 is supported. Hostnames that contain unicode characters should
use IDNA encoding.
The
white
list can hold a maximum of 1000 entries. Each entry can be a maximum of
The
allow
list can hold a maximum of 1000 entries. Each entry can be a maximum of
255 characters.
You can
whitelist a particular port by specifying it in the white
list entry.
You can
allow a particular port by specifying it in the allow
list entry.
For example
`127.0.0.1:8080`
will only allow connections to port 8080 on
`127.0.0.1`
.
If no port is mentioned, all ports on that IP/domain are
whitelist
ed. An IP range
will
whitelist
all ports on all IPs in that range.
If no port is mentioned, all ports on that IP/domain are
allow
ed. An IP range
will
allow
all ports on all IPs in that range.
Example:
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment