Skip to content

Fix 'GitLab' brand name #540

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -77,7 +77,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of HCP Terraform and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but HCP Terraform only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and HCP Terraform now refreshes tokens more often.
-> **Note:** For previous versions of HCP Terraform and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but HCP Terraform only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and HCP Terraform now refreshes tokens more often.

1. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -150,7 +150,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-
openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443
```

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

```
bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and Terraform Cloud now refreshes tokens more often.
-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and Terraform Cloud now refreshes tokens more often.

4. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and Terraform Cloud now refreshes tokens more often.
-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and Terraform Cloud now refreshes tokens more often.

4. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and Terraform Cloud now refreshes tokens more often.
-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and Terraform Cloud now refreshes tokens more often.

4. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and Terraform Cloud now refreshes tokens more often.
-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and Terraform Cloud now refreshes tokens more often.

4. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and Terraform Cloud now refreshes tokens more often.
-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and Terraform Cloud now refreshes tokens more often.

4. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -114,7 +114,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and Terraform Cloud now refreshes tokens more often.
-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and Terraform Cloud now refreshes tokens more often.

4. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -124,7 +124,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and Terraform Cloud now refreshes tokens more often.
-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and Terraform Cloud now refreshes tokens more often.

4. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -124,7 +124,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -78,7 +78,7 @@ Leave the page open in a browser tab. In the next step you will copy values from
| Expire access tokens (checkbox) | (no longer required) |
| Scopes (all checkboxes) | api |

-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because Gitlab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on Gitlab v15+ and Terraform Cloud now refreshes tokens more often.
-> **Note:** For previous versions of Terraform Cloud and GitLab, we recommended disabling a setting called `Expire access tokens`. This action was required because GitLab marked OAuth tokens as expired after 2 hours, but Terraform Cloud only refreshed tokens after 6 hours. This setting does not exist on GitLab v15+ and Terraform Cloud now refreshes tokens more often.

4. Click the "Save application" button, which creates the application and takes you to its page.

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -126,7 +126,7 @@ Then run the `openssl s_client` command, using the certificate at `/tmp/cust-ca-

openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect git-server-hostname:443

For example, a Gitlab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:
For example, a GitLab server that uses a self-signed certificate might result in an error like `verify error:num=18:self signed certificate`, as shown in the output below:

bash-4.3# openssl s_client -showcerts -CAfile /tmp/cust-ca-certificates.crt -connect gitlab.local:443
CONNECTED(00000003)
Expand Down
Loading
Loading