WIP: A new version of gitlab (15.9.1) is available
current diff:
--- current-deployment.yaml
+++ future-deployment.yaml
@@ -7,7 +7,7 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-6.8.2
+ chart: gitaly-6.9.1
release: gitlab-test
heritage: Helm
@@ -28,7 +28,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-6.8.2
+ chart: gitlab-shell-6.9.1
release: gitlab-test
heritage: Helm
@@ -47,7 +47,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-6.8.2
+ chart: kas-6.9.1
release: gitlab-test
heritage: Helm
@@ -66,7 +66,7 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-6.8.2
+ chart: praefect-6.9.1
release: gitlab-test
heritage: Helm
@@ -85,7 +85,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-6.8.2
+ chart: sidekiq-6.9.1
release: gitlab-test
heritage: Helm
@@ -106,7 +106,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -350,7 +350,7 @@
- selector: {}
http01:
ingress:
- class: "nginx"
+ class: nginx
---
# Source: gitlab/charts/gitlab/charts/gitaly/templates/configmap-with-praefect.yml
apiVersion: v1
@@ -360,7 +360,7 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-6.8.2
+ chart: gitaly-6.9.1
release: gitlab-test
heritage: Helm
@@ -439,7 +439,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-6.8.2
+ chart: gitlab-exporter-6.9.1
release: gitlab-test
heritage: Helm
@@ -513,7 +513,7 @@
for secret in redis postgres gitlab-exporter ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
fi
done
# END gitlab.scripts.configure.secrets
@@ -527,7 +527,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-6.8.2
+ chart: gitlab-shell-6.9.1
release: gitlab-test
heritage: Helm
@@ -687,7 +687,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-6.8.2
+ chart: gitlab-shell-6.9.1
release: gitlab-test
heritage: Helm
@@ -700,7 +700,7 @@
# required
for secret in shell ; do
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# END gitlab.scripts.configure.secrets
mkdir -p /${secret_dir}/ssh
@@ -730,6 +730,8 @@
audit_usernames: false
+ krb5.conf: |
+
# Leave this here - This line denotes end of block to the parser.
---
# Source: gitlab/charts/gitlab/charts/gitlab-shell/templates/nginx-tcp-configmap.yml
@@ -740,7 +742,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-6.8.2
+ chart: gitlab-shell-6.9.1
release: gitlab-test
heritage: Helm
@@ -755,7 +757,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-6.8.2
+ chart: kas-6.9.1
release: gitlab-test
heritage: Helm
@@ -801,7 +803,7 @@
namespace: gitlab
labels:
app: migrations
- chart: migrations-6.8.2
+ chart: migrations-6.9.1
release: gitlab-test
heritage: Helm
@@ -839,6 +841,7 @@
+
cable.yml.erb: |
production:
url: redis://:<%= ERB::Util::url_encode(File.read("/etc/gitlab/redis/redis-password").strip) %>@gitlab-test-redis-master.gitlab.svc:6379
@@ -850,6 +853,7 @@
+
gitlab.yml.erb: |
production: &base
gitlab:
@@ -879,13 +883,13 @@
# required
for secret in rails-secrets migrations gitaly ; do
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# optional
for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
fi
done
# END gitlab.scripts.configure.secrets
@@ -901,7 +905,7 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-6.8.2
+ chart: praefect-6.9.1
release: gitlab-test
heritage: Helm
@@ -924,7 +928,6 @@
[failover]
enabled = true
- election_strategy = 'sql'
read_only_after_failover = true
[auth]
@@ -965,7 +968,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-6.8.2
+ chart: sidekiq-6.9.1
release: gitlab-test
heritage: Helm
@@ -1006,6 +1009,7 @@
+
cable.yml.erb: |
production:
url: redis://:<%= ERB::Util::url_encode(File.read("/etc/gitlab/redis/redis-password").strip) %>@gitlab-test-redis-master.gitlab.svc:6379
@@ -1017,6 +1021,7 @@
+
gitlab.yml.erb: |
production: &base
gitlab:
@@ -1239,13 +1244,13 @@
# required
for secret in gitaly registry rails-secrets ; do
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# optional
for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
fi
done
# END gitlab.scripts.configure.secrets
@@ -1261,7 +1266,7 @@
namespace: gitlab
labels:
app: toolbox
- chart: toolbox-6.8.2
+ chart: toolbox-6.9.1
release: gitlab-test
heritage: Helm
@@ -1300,6 +1305,7 @@
+
cable.yml.erb: |
production:
url: redis://:<%= ERB::Util::url_encode(File.read("/etc/gitlab/redis/redis-password").strip) %>@gitlab-test-redis-master.gitlab.svc:6379
@@ -1311,6 +1317,7 @@
+
gitlab.yml.erb: |
production: &base
gitlab:
@@ -1511,13 +1518,13 @@
# required
for secret in shell gitaly registry rails-secrets ; do
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# optional
for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
fi
done
# END gitlab.scripts.configure.secrets
@@ -1540,7 +1547,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
@@ -1581,6 +1588,7 @@
+
cable.yml.erb: |
production:
url: redis://:<%= ERB::Util::url_encode(File.read("/etc/gitlab/redis/redis-password").strip) %>@gitlab-test-redis-master.gitlab.svc:6379
@@ -1592,6 +1600,7 @@
+
gitlab.yml.erb: |
production: &base
gitlab:
@@ -1825,13 +1834,13 @@
# required
for secret in shell gitaly registry rails-secrets gitlab-workhorse ; do
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# optional
for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
- cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
+ cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
fi
done
# END gitlab.scripts.configure.secrets
@@ -1844,7 +1853,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
@@ -1921,7 +1930,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
@@ -2765,13 +2774,13 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-6.8.2
+ chart: gitlab-6.9.1
release: gitlab-test
heritage: Helm
data:
- gitlabVersion: "15.8.2"
- gitlabChartVersion: "6.8.2"
+ gitlabVersion: "15.9.1"
+ gitlabChartVersion: "6.9.1"
---
# Source: gitlab/templates/initdb-configmap.yaml
apiVersion: v1
@@ -2781,7 +2790,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-6.8.2
+ chart: gitlab-6.9.1
release: gitlab-test
heritage: Helm
@@ -20038,7 +20047,7 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-6.8.2
+ chart: gitaly-6.9.1
release: gitlab-test
heritage: Helm
@@ -20071,7 +20080,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-6.8.2
+ chart: gitlab-exporter-6.9.1
release: gitlab-test
heritage: Helm
@@ -20097,7 +20106,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-6.8.2
+ chart: gitlab-shell-6.9.1
release: gitlab-test
heritage: Helm
@@ -20123,7 +20132,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-6.8.2
+ chart: kas-6.9.1
release: gitlab-test
heritage: Helm
@@ -20161,7 +20170,7 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-6.8.2
+ chart: praefect-6.9.1
release: gitlab-test
heritage: Helm
@@ -20196,7 +20205,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
@@ -20806,7 +20815,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-6.8.2
+ chart: gitlab-exporter-6.9.1
release: gitlab-test
heritage: Helm
@@ -20823,13 +20832,13 @@
metadata:
labels:
app: gitlab-exporter
- chart: gitlab-exporter-6.8.2
+ chart: gitlab-exporter-6.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: e3d83328ce009cd412b668d015ebbcdacf12190f7118731337b2b49245dea68a
+ checksum/config: db748b6266ad07fde7aa2110bcd5c042502df32c04683ff4e452012c18e2a36b
gitlab.com/prometheus_scrape: "true"
gitlab.com/prometheus_port: "9168"
gitlab.com/prometheus_path: /metrics
@@ -20857,7 +20866,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
- name: MALLOC_CONF
@@ -20911,7 +20920,7 @@
containers:
- name: gitlab-exporter
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:12.1.0"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:12.1.1"
env:
- name: CONFIG_TEMPLATE_DIRECTORY
value: '/var/opt/gitlab-exporter/templates'
@@ -21006,7 +21015,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-6.8.2
+ chart: gitlab-shell-6.9.1
release: gitlab-test
heritage: Helm
@@ -21022,21 +21031,21 @@
metadata:
labels:
app: gitlab-shell
- chart: gitlab-shell-6.8.2
+ chart: gitlab-shell-6.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 862faf00baef2f3b8f0a3af5b47bbcde57ec5aad6270d6df750f057ec357dc42
- checksum/config-sshd: eb9c7a8f23f9aff839d872ad3b472e7f17405a4f7f54ab34a739a0cf8679b36c
+ checksum/config: b76571b313f5761b321d233c33e7bbc995da5881695983a6297bafe4605b83c0
+ checksum/config-sshd: 5a501f78f4a6751f1c9998e4a1f0cfbfc9784afde952dde5b11a83d807b64647
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -21088,7 +21097,7 @@
containers:
- name: gitlab-shell
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v14.15.0"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v14.17.0"
ports:
- containerPort: 2222
name: ssh
@@ -21111,6 +21120,10 @@
- name: shell-secrets
mountPath: '/etc/gitlab-secrets'
readOnly: true
+ - name: shell-config
+ mountPath: '/etc/krb5.conf'
+ subPath: krb5.conf
+ readOnly: true
- name: sshd-config
mountPath: /etc/ssh/sshd_config
subPath: sshd_config
@@ -21183,7 +21196,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-6.8.2
+ chart: kas-6.9.1
release: gitlab-test
heritage: Helm
@@ -21199,13 +21212,13 @@
metadata:
labels:
app: kas
- chart: kas-6.8.2
+ chart: kas-6.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 032852700c7aacec54d9ec37dd7a128e4fa8ef68dfd8a0c74c25c6a5db89de94
+ checksum/config: 24fbc70473ff200f9d2ed6a746871694c3b796a8246450da96025d6e962dbff1
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
gitlab.com/prometheus_scrape: "true"
gitlab.com/prometheus_port: "8151"
@@ -21234,7 +21247,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -21251,7 +21264,7 @@
containers:
- name: kas
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-kas:v15.8.0"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-kas:v15.9.0"
args:
- "--configuration-file=/etc/kas/config.yaml"
env:
@@ -21341,7 +21354,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-6.8.2
+ chart: sidekiq-6.9.1
release: gitlab-test
heritage: Helm
@@ -21359,14 +21372,14 @@
metadata:
labels:
app: sidekiq
- chart: sidekiq-6.8.2
+ chart: sidekiq-6.9.1
release: gitlab-test
heritage: Helm
queue-pod-name: native-chart
annotations:
- checksum/configmap: 651244fd88bfaab6bbf3f327c7823a1057ffe62df2ebc5de6e4f0f3b0a1c577c
+ checksum/configmap: ea13d3d34a9fe20acdc66b450058c739bcdd58da07b67a3cb2ccf21ecd9c98be
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
@@ -21397,7 +21410,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -21435,7 +21448,7 @@
requests:
cpu: 50m
- name: dependencies
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v15.8.2"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v15.9.1"
args:
- /scripts/wait-for-deps
env:
@@ -21478,7 +21491,7 @@
containers:
- name: sidekiq
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v15.8.2"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v15.9.1"
env:
- name: prometheus_multiproc_dir
value: /metrics
@@ -21684,7 +21697,7 @@
namespace: gitlab
labels:
app: toolbox
- chart: toolbox-6.8.2
+ chart: toolbox-6.9.1
release: gitlab-test
heritage: Helm
@@ -21703,13 +21716,13 @@
metadata:
labels:
app: toolbox
- chart: toolbox-6.8.2
+ chart: toolbox-6.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 629cfa142033615d9b13d8d5ac8a57b811d71bcdc8368aab4bec8a29ceb03cd2
+ checksum/config: 70ba73e22692521143b9a876f8a5a907870b91d4e02f4af74e3fe83a75ced58d
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
securityContext:
@@ -21720,7 +21733,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -21773,7 +21786,7 @@
- /bin/bash
- -c
- sh /var/opt/gitlab/templates/configure-gsutil && while sleep 3600; do :; done
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v15.8.2"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v15.9.1"
env:
- name: ARTIFACTS_BUCKET_NAME
value: gitlab-artifacts
@@ -21966,7 +21979,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -21987,7 +22000,7 @@
metadata:
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -21995,7 +22008,7 @@
annotations:
- checksum/config: e0b26f922f8b554f8e9221c1809df8bc2262b3a6732bf58894b4d07ba2242a95
+ checksum/config: 5c68869bed81929fdf12d82dd800cdf745dd2b31e592ba1eae46f2140a33588c
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
@@ -22027,7 +22040,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -22074,7 +22087,7 @@
requests:
cpu: 50m
- name: dependencies
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v15.8.2
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v15.9.1
args:
- /scripts/wait-for-deps
env:
@@ -22113,7 +22126,7 @@
containers:
- name: webservice
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v15.8.2
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v15.9.1
ports:
- containerPort: 8080
name: http-webservice
@@ -22216,7 +22229,7 @@
cpu: 300m
memory: 2.5G
- name: gitlab-workhorse
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v15.8.2"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v15.9.1"
ports:
- containerPort: 8181
name: http-workhorse
@@ -22774,7 +22787,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -22803,7 +22816,7 @@
- name: dependencies
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v3.65.0-gitlab"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v3.67.0-gitlab"
command: ["/scripts/wait-for-deps"]
volumeMounts:
- name: registry-server-config
@@ -22817,7 +22830,7 @@
containers:
- name: registry
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v3.65.0-gitlab"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v3.67.0-gitlab"
env:
@@ -22915,7 +22928,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-6.8.2
+ chart: gitlab-shell-6.9.1
release: gitlab-test
heritage: Helm
@@ -22940,7 +22953,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-6.8.2
+ chart: kas-6.9.1
release: gitlab-test
heritage: Helm
@@ -22965,7 +22978,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-6.8.2
+ chart: sidekiq-6.9.1
release: gitlab-test
heritage: Helm
@@ -22990,7 +23003,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -23041,7 +23054,7 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-6.8.2
+ chart: gitaly-6.9.1
release: gitlab-test
heritage: Helm
@@ -23061,13 +23074,13 @@
labels:
storage: default
app: gitaly
- chart: gitaly-6.8.2
+ chart: gitaly-6.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: f6a586ccc5264433beac1d0758bc32b2064b069826aa8f3ce91b13297a188f5b
+ checksum/config: d2dc34bcc01ed878b966b3041e205f71c608c7317b4a1b0a98d2cda9698bb85e
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
gitlab.com/prometheus_scrape: "true"
@@ -23082,7 +23095,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -23135,7 +23148,7 @@
containers:
- name: gitaly
- image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v15.8.2"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v15.9.1"
ports:
- containerPort: 8075
name: grpc-gitaly
@@ -23247,7 +23260,7 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-6.8.2
+ chart: praefect-6.9.1
release: gitlab-test
heritage: Helm
@@ -23264,13 +23277,13 @@
metadata:
labels:
app: praefect
- chart: praefect-6.8.2
+ chart: praefect-6.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 5f225cc73cb556ba4030781019961ded3ebf6efe897ac8b9e4a53da837b60224
+ checksum/config: 0e7c6524836a54674ce9b6488498605e134af001a7b9960f051827d75082cdaa
gitlab.com/prometheus_scrape: "true"
gitlab.com/prometheus_port: "9236"
gitlab.com/prometheus_path: /metrics
@@ -23294,7 +23307,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -23332,7 +23345,7 @@
containers:
- name: praefect
- image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v15.8.2"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v15.9.1"
ports:
- containerPort: 8075
- containerPort: 9236
@@ -23758,7 +23771,7 @@
containers:
- name: create-issuer
- image: "registry.gitlab.com/gitlab-org/build/cng/kubectl:1.24.7@sha256:4be8ed0fb89c29c5bacf0dcedee803e1ac1298da9a45186eb5a391c2353c6bf6"
+ image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v15.9.1
command: ['/bin/bash', '/scripts/create-issuer', '/scripts/issuer.yml']
volumeMounts:
- name: scripts
@@ -23779,7 +23792,7 @@
namespace: gitlab
labels:
app: migrations
- chart: migrations-6.8.2
+ chart: migrations-6.9.1
release: gitlab-test
heritage: Helm
@@ -23790,7 +23803,7 @@
metadata:
labels:
app: migrations
- chart: migrations-6.8.2
+ chart: migrations-6.9.1
release: gitlab-test
heritage: Helm
@@ -23804,7 +23817,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -23844,7 +23857,7 @@
containers:
- name: migrations
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v15.8.2"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v15.9.1"
args:
- /scripts/wait-for-deps
- /scripts/db-migrate
@@ -24031,7 +24044,7 @@
initContainers:
- name: certificates
- image: "registry.gitlab.com/gitlab-org/build/cng/alpine-certificates:20191127-r2@sha256:367d437d024d7647432d67fb2442e3e5723af5930bad77d3535f4f8f4f8630d9"
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v15.9.1
env:
@@ -24064,7 +24077,7 @@
containers:
- name: migrations
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v3.65.0-gitlab"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v3.67.0-gitlab"
imagePullPolicy: ""
args:
- /scripts/wait-for-deps
@@ -24123,7 +24136,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-6.8.2
+ chart: kas-6.9.1
release: gitlab-test
heritage: Helm
@@ -24160,7 +24173,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -24421,7 +24434,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-6.8.2
+ chart: gitlab-6.9.1
release: gitlab-test
heritage: Helm
@@ -24438,7 +24451,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-6.8.2
+ chart: gitlab-6.9.1
release: gitlab-test
heritage: Helm
@@ -24478,7 +24491,7 @@
kubectl --namespace=$namespace label \
--overwrite \
- secret $secret_name app=gitlab chart=gitlab-6.8.2 release=gitlab-test heritage=Helm
+ secret $secret_name app=gitlab chart=gitlab-6.9.1 release=gitlab-test heritage=Helm
}
# Args: secretname, args
@@ -24647,7 +24660,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-6.8.2
+ chart: gitlab-6.9.1
release: gitlab-test
heritage: Helm
@@ -24766,7 +24779,7 @@
namespace: gitlab
labels:
app: shared-secrets
- chart: shared-secrets-6.8.2
+ chart: shared-secrets-6.9.1
release: gitlab-test
heritage: Helm
@@ -24814,7 +24827,7 @@
namespace: gitlab
labels:
app: shared-secrets
- chart: shared-secrets-6.8.2
+ chart: shared-secrets-6.9.1
release: gitlab-test
heritage: Helm
@@ -24835,21 +24848,21 @@
apiVersion: v1
kind: Pod
metadata:
- name: gitlab-test-webservice-test-runner-0dojz
+ name: gitlab-test-webservice-test-runner-lr4jl
namespace: gitlab
annotations:
"helm.sh/hook": test
"helm.sh/hook-delete-policy": hook-succeeded,hook-failed,before-hook-creation
labels:
app: webservice
- chart: webservice-6.8.2
+ chart: webservice-6.9.1
release: gitlab-test
heritage: Helm
spec:
containers:
- name: test-runner
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v15.8.2
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v15.9.1
command: ['sh', '/tests/test_login']
volumeMounts:
- name: tests
@@ -24920,11 +24933,11 @@
apiVersion: batch/v1
kind: Job
metadata:
- name: gitlab-test-shared-secrets-1-qwj
+ name: gitlab-test-shared-secrets-1-5mt
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-6.8.2
+ chart: gitlab-6.9.1
release: gitlab-test
heritage: Helm
@@ -24936,7 +24949,7 @@
metadata:
labels:
app: gitlab
- chart: gitlab-6.8.2
+ chart: gitlab-6.9.1
release: gitlab-test
heritage: Helm
@@ -24952,7 +24965,7 @@
containers:
- name: gitlab
- image: "registry.gitlab.com/gitlab-org/build/cng/kubectl:1.24.7@sha256:4be8ed0fb89c29c5bacf0dcedee803e1ac1298da9a45186eb5a391c2353c6bf6"
+ image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v15.9.1
command: ['/bin/bash', '/scripts/generate-secrets']
volumeMounts:
- name: scripts
@@ -24977,7 +24990,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-6.8.2
+ chart: gitlab-6.9.1
release: gitlab-test
heritage: Helm
@@ -25006,9 +25019,9 @@
command: ['/bin/sh', '/scripts/runcheck']
env:
- name: GITLAB_VERSION
- value: '15.8.2'
+ value: '15.9.1'
- name: CHART_VERSION
- value: '6.8.2'
+ value: '6.9.1'
volumeMounts:
- name: chart-info
mountPath: /chart-info
@@ -25737,13 +25750,13 @@
type: Opaque
data:
secretKey: "bm90LWEtc2VjdXJlLWtleQ=="
- secret: "UVlFUUxZWlhUc0pGTlJKUw=="
+ secret: "S004UnlKVWxNUXA3QWVqVw=="
tls.crt: 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
tls.key: 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
HARBOR_ADMIN_PASSWORD: "SGFyYm9yMTIzNDU="
POSTGRESQL_PASSWORD: "Y2hhbmdlaXQ="
REGISTRY_CREDENTIAL_PASSWORD: "aGFyYm9yX3JlZ2lzdHJ5X3Bhc3N3b3Jk"
- CSRF_KEY: "YmZEY1prV2VpUHExbVBUcnM3b3BHM1hiZTcyTDRFQmc="
+ CSRF_KEY: "SUh0T1lxMHNBVDVRNTc2TmlzaXhEdnBsbm5nSmxaU3Q="
---
# Source: harbor/templates/database/database-secret.yaml
apiVersion: v1
@@ -25771,9 +25784,9 @@
app: "harbor"
type: kubernetes.io/tls
data:
- tls.crt: "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"
- tls.key: "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"
- ca.crt: "LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSURFekNDQWZ1Z0F3SUJBZ0lRV0l1TDZhU01ZdTZvTUFYa0djTWh5ekFOQmdrcWhraUc5dzBCQVFzRkFEQVUKTVJJd0VBWURWUVFERXdsb1lYSmliM0l0WTJFd0hoY05Nak13TWpJME1USXdNekl6V2hjTk1qUXdNakkwTVRJdwpNekl6V2pBVU1SSXdFQVlEVlFRREV3bG9ZWEppYjNJdFkyRXdnZ0VpTUEwR0NTcUdTSWIzRFFFQkFRVUFBNElCCkR3QXdnZ0VLQW9JQkFRRGFUamhMUjdmeE96RmYwOWNBZFVNaXRYZjJUbVRDbDFVK0VmWTRZU3c1R1BMNnJ2c3EKamZ4OTVreHBFZVVYU2hscFBtSXlkN3RmaUVocFhQN1FobTNmYWZEVVQxa3VYdTBET2dmVHRIVm51eFB2Ry9sTgpaZmdnUkpjOW9oWHpDTzFyZk5YMUhOWmNhVEIwY09rMnhZaDQ3SW0zclMwNXJIOWxab0VPOTlvTTlxM1ZVNmFCClQ3YWhoZ25CVEZvWFl2dnd1T0lsWU1VNWtFMVBqSTNlMmVmWWpHNVUrVUd2Nko1SWlteU40bW5MQVVrMi9tdGQKbGtNMjIyWVlFbXRmcmsxSk1QbXNxMmt3VW9yZG1CWWozTmQxWThVRE81K1kyNVVxNUFGaVRHTHhGM3paU3lrVgowSUVBb1pTbUlHc3V4UEZCbmxxVEhpanRodm9sOGpMV2NsWlZBZ01CQUFHallUQmZNQTRHQTFVZER3RUIvd1FFCkF3SUNwREFkQmdOVkhTVUVGakFVQmdnckJnRUZCUWNEQVFZSUt3WUJCUVVIQXdJd0R3WURWUjBUQVFIL0JBVXcKQXdFQi96QWRCZ05WSFE0RUZnUVUzMFMrOCtPdGFabG9rZFdQUUcwZ2lDNWRYQ1F3RFFZSktvWklodmNOQVFFTApCUUFEZ2dFQkFKV2pDRlZrQko4QW15VzdDUkJMTU5jcmErU0VZTnBmNVpOcUFjejlVQ2dyL1Z0dnFkTTZXVnBFClArT2prVmttcG15elg1SXU4TzNoaEpIbERJZVFpVzBoWXdKZFJqTkdsbm43ekhybmNnK1VSandvU2I1KzdrNk8KbXB4SjN6UFJreHdaU1BxSFlrYXpDdkFRZndZdmpKUjg0bEI4Z0M5Wk8xY0lQSG9JcjVZTG4xVVBtME5BOHJ6dApBRTg4NnkvSUxTZ29yMngvL1VTQkoySGk4M05xSmhlQVp1dGgxK1RBa2VNZGN2SGo1S0ZmbktjUTN6cGg2TW15CndwK2dYTWZremFWU1lBSktaVXQzbW5xZ1dKeEZhd29RUGhtKzRjUEU1d2d3S1Z4cTA2Wisyd2ZVQ0x3eDArbFMKZFA1aDRCaU96dnN4aU1pZ1BFRDBHNTFMV3ZUYUZTST0KLS0tLS1FTkQgQ0VSVElGSUNBVEUtLS0tLQo="
+ tls.crt: "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"
+ tls.key: "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"
+ ca.crt: "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"
---
# Source: harbor/templates/jobservice/jobservice-secrets.yaml
apiVersion: v1
@@ -25787,7 +25800,7 @@
app: "harbor"
type: Opaque
data:
- JOBSERVICE_SECRET: "Q3djeDRNdFZKU0dzaUpMTA=="
+ JOBSERVICE_SECRET: "WXJYNk1rUFNQNEVvcDdqYQ=="
REGISTRY_CREDENTIAL_PASSWORD: "aGFyYm9yX3JlZ2lzdHJ5X3Bhc3N3b3Jk"
---
# Source: harbor/templates/registry/registry-secret.yaml
@@ -25802,7 +25815,7 @@
app: "harbor"
type: Opaque
data:
- REGISTRY_HTTP_SECRET: "Y3FjcW9KSVczZE9HRHRxYw=="
+ REGISTRY_HTTP_SECRET: "ZDhaTno3N0hGWUoyeUlQQg=="
REGISTRY_REDIS_PASSWORD: ""
---
# Source: harbor/templates/registry/registry-secret.yaml
@@ -25817,7 +25830,7 @@
app: "harbor"
type: Opaque
data:
- REGISTRY_HTPASSWD: "aGFyYm9yX3JlZ2lzdHJ5X3VzZXI6JDJhJDEwJGpkdHhZOExNY3ZXbDhYZEZiU292OXVlMlVSaThMVWxqTzVVNklXRnUvLlA5WnBkeGhmMDlx"
+ REGISTRY_HTPASSWD: "aGFyYm9yX3JlZ2lzdHJ5X3VzZXI6JDJhJDEwJDZhMTBNOXIueFdtM0R4VEhMeGhmdC50YzhhVkpkdkk1SnU2SmR2RzRCd05WdEp6QU1taDBX"
---
# Source: harbor/templates/registry/registryctl-secret.yaml
apiVersion: v1
@@ -26307,8 +26320,8 @@
component: core
annotations:
checksum/configmap: 21005672f9f224c186fb8dbbad244e9d513fde4852b7e689a6eeaca943f911b3
- checksum/secret: 21f5da5a3d011f9f01cf50c5dd3dd0d96f83bb846ee5b0ff01c6732ac91ba9c1
- checksum/secret-jobservice: 7c3ded5a82c8ba5f70036d9f2d9d3d701a5f2e7ac89858da3ecbe60469127005
+ checksum/secret: 8f6d17e447d0917c994e29611e683b1b58a063ba3a400d806ee9a4e37f6966ee
+ checksum/secret-jobservice: c2ea700ae401a89d16aea984e3a03027fdf6757d739b32ef8ba370597a68b75e
spec:
securityContext:
runAsUser: 10000
@@ -26427,8 +26440,8 @@
annotations:
checksum/configmap: facb2cdb1c740b899a09412b3fb4a0b2938a3032e643ba775a3d2c3d3ad96bf7
checksum/configmap-env: cba2ae43ac7531289f25f4d019492420189f9bf471d865dcd32f19ad70dfaf34
- checksum/secret: d96b5a0845bde40355d2f271909a67eeaac0c9997c13fac3d7c988d5332e5229
- checksum/secret-core: 7838098329f83f9f67449829955c9508876e42a64315f5d6d45b4ca9cbbb106e
+ checksum/secret: 9791a03e1b7fa79ccc43b8ca8ba93de783c1cb8b6d1f2375be7b352a3870177b
+ checksum/secret-core: d3ae545e9640dabe0af2a6c37c679b2b4e7ae6f99e3c507d53d7a36fa0650ce2
spec:
securityContext:
runAsUser: 10000
@@ -26578,9 +26591,9 @@
component: registry
annotations:
checksum/configmap: ef3189aa2e8af6519bdd4b797a3b41a6fbcc957b7b0b0796c2754bca420b3729
- checksum/secret: 24caa1824c336f9107019efe8d39bf06a7f79ec8ae7c0d4c1b2e2b6118d127c9
- checksum/secret-jobservice: a8f08962f0d5c9ad7f1cc23b97f5327a6a6ffa44c461e9465240a521e39c30d4
- checksum/secret-core: 760c69cf67af64a331d4381735647cebf53d843f3a29b0f644eb3e24ae9ccef7
+ checksum/secret: f8160d715ff4a8550925eecd55f0fe987e4f6b40d8198b40111b8a8fdb85f20d
+ checksum/secret-jobservice: 5cb9f2437aa7ad8e42224ea109cd589ebfe2718ef2f3590df227a1e5f6b510aa
+ checksum/secret-core: ddbebd0bcacd08c3d5f67a0dd81de206ece14e8b67ba3e6cc92ce40b04a05b41
spec:
securityContext:
runAsUser: 10000