diff --git a/GITALY_SERVER_VERSION b/GITALY_SERVER_VERSION index a547581f813..787b0d3e5a0 100644 --- a/GITALY_SERVER_VERSION +++ b/GITALY_SERVER_VERSION @@ -1 +1 @@ -28dfd63da1afe2128fd1dcfc5f6953302eab88f2 +676cff8cddb9bf142cf00a712db75dbb69563b7e diff --git a/app/assets/javascripts/packages_and_registries/settings/project/components/container_protection_rules.vue b/app/assets/javascripts/packages_and_registries/settings/project/components/container_protection_rules.vue index 7e95207e9ff..7388130832a 100644 --- a/app/assets/javascripts/packages_and_registries/settings/project/components/container_protection_rules.vue +++ b/app/assets/javascripts/packages_and_registries/settings/project/components/container_protection_rules.vue @@ -48,7 +48,7 @@ export default { i18n: { settingBlockTitle: s__('ContainerRegistry|Protected containers'), settingBlockDescription: s__( - 'ContainerRegistry|When a container is protected then only certain user roles are able to push and delete the protected container image. This helps to avoid tampering with the container image.', + 'ContainerRegistry|When a container is protected, only certain user roles can push and delete the protected container image, which helps to avoid tampering with the container image.', ), protectionRuleDeletionConfirmModal: { title: s__('ContainerRegistry|Delete container protection rule?'), diff --git a/app/assets/javascripts/packages_and_registries/settings/project/components/packages_protection_rules.vue b/app/assets/javascripts/packages_and_registries/settings/project/components/packages_protection_rules.vue index be1a5e8d6db..5f3ffe49de6 100644 --- a/app/assets/javascripts/packages_and_registries/settings/project/components/packages_protection_rules.vue +++ b/app/assets/javascripts/packages_and_registries/settings/project/components/packages_protection_rules.vue @@ -46,7 +46,7 @@ export default { i18n: { settingBlockTitle: s__('PackageRegistry|Protected packages'), settingBlockDescription: s__( - 'PackageRegistry|When a package is protected then only certain user roles are able to update and delete the protected package. This helps to avoid tampering with the package.', + 'PackageRegistry|When a package is protected, only certain user roles can push, update, and delete the protected package, which helps to avoid tampering with the package.', ), protectionRuleDeletionConfirmModal: { title: s__('PackageRegistry|Delete package protection rule?'), diff --git a/app/assets/javascripts/token_access/components/inbound_token_access.vue b/app/assets/javascripts/token_access/components/inbound_token_access.vue index ae7158d73a0..6a28d2706a9 100644 --- a/app/assets/javascripts/token_access/components/inbound_token_access.vue +++ b/app/assets/javascripts/token_access/components/inbound_token_access.vue @@ -24,14 +24,11 @@ import TokenAccessTable from './token_access_table.vue'; export default { i18n: { - toggleLabelTitle: s__('CICD|Allow CI/CD job token access'), + toggleLabelTitle: s__('CICD|Limit access %{italicStart}to%{italicEnd} this project'), toggleDescription: s__( - `CICD|When enabled, groups and projects listed in the allowlist are authorized to use a CI/CD job token to authenticate requests to this project. %{linkStart}Learn more%{linkEnd}.`, - ), - cardHeaderTitle: s__('CICD|Authorized groups and projects'), - cardHeaderDescription: s__( - `CICD|Ensure only groups and projects with members authorized to access sensitive project data are added to the allowlist.`, + `CICD|Allow access to this project from authorized groups or projects by adding them to the allowlist. It is a security risk to disable this feature, because unauthorized projects might attempt to retrieve an active token and access the API. %{linkStart}Learn more%{linkEnd}.`, ), + cardHeaderTitle: s__('CICD|Groups and projects with access'), settingDisabledMessage: s__( 'CICD|No access is currently allowed to this project. Enable feature to authorize access from groups or projects in the allowlist below.', ), @@ -261,25 +258,22 @@ export default {