Skip to content
Snippets Groups Projects
Commit f51c6525 authored by Kamil Trzcinski's avatar Kamil Trzcinski
Browse files

Update documentation

parent 48419771
No related branches found
No related tags found
No related merge requests found
Loading
Loading
@@ -118,7 +118,10 @@ We recommend PostgreSQL but you can also use MySQL
sudo -u gitlab_ci -H editor config/application.yml
# Development
#sudo -u gitlab_ci -H cp config/application.yml.example.development config/application.yml
# Copy reference secrets
sudo -u gitlab_ci -H cp config/secrets.yml.example config/secrets.yml
# Edit web server settings
sudo -u gitlab_ci -H cp config/unicorn.rb.example config/unicorn.rb
sudo -u gitlab_ci -H editor config/unicorn.rb
Loading
Loading
@@ -128,6 +131,9 @@ We recommend PostgreSQL but you can also use MySQL
sudo chmod -R u+rwX tmp/sockets/
sudo -u gitlab_ci -H mkdir -p tmp/pids/
sudo chmod -R u+rwX tmp/pids/
# Change permission of directory where build traces are stored
sudo chmod -R u+rwX builds/
 
# Make sure GitLab CI can write to the builds/ directory
sudo chmod -R u+rwX builds
Loading
Loading
@@ -157,8 +163,13 @@ We recommend PostgreSQL but you can also use MySQL
# Setup schedules
sudo -u gitlab_ci -H bundle exec whenever -w RAILS_ENV=production
 
### Secure secrets.yml
Secrets file stores encryption keys for sessions and secure variables.
Backup `secrets.yml` someplace safe, but don't store them in the same place as your database backups.
Otherwise your secrets are exposed in case one of your backups is compromised.
 
## 7. Install Init Script
## 8. Install Init Script
 
Copy the init script (will be /etc/init.d/gitlab_ci):
 
Loading
Loading
Loading
Loading
@@ -129,7 +129,7 @@ If you have a cookbook installation there should be a copy of your configuration
If you have an installation from source:
1. please backup `config/secrets.yml` file that contains key to encrypt variables in database,
but don't store it in the same place as your database backups.
Otherwise your users secrets are exposed in case one of your backups is compromised.
Otherwise your secrets are exposed in case one of your backups is compromised.
1. please consider backing up your `application.yml` file,
1. any SSL keys and certificates,
1. and your [SSH host keys](https://superuser.com/questions/532040/copy-ssh-keys-from-one-server-to-another-server/532079#532079).
Loading
Loading
Loading
Loading
@@ -2,7 +2,7 @@
 
## Notice
 
__GitLab CI 7.13 requires GitLab 7.12 or higher and GitLab Multi Runner 0.4.0 or higher
__GitLab CI 7.13 requires GitLab 7.12 or higher and GitLab Multi Runner 0.5.0 or higher
 
### 1. Stop CI server
 
Loading
Loading
@@ -25,7 +25,18 @@ git checkout 7-13-stable
### 4. Make sure GitLab CI can write to the builds/ directory
 
```
sudo chmod -R u+rwX builds
sudo chmod -R u+rwX builds
```
### 4. Copy secrets
Secrets file is used to store keys to encrypt sessions and encrypt secure variables.
When you run migrations store it someplace safe,
but don't store them in the same place as your database backups.
Otherwise your secrets are exposed in case one of your backups is compromised.
```
sudo -u gitlab_ci -H cp config/secrets.yml.example config/secrets.yml
```
 
### 5. Install libs, migrations etc
Loading
Loading
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment