Skip to content

superseeded: A new version of gitlab (v17.1.1) is available

FDO helm bot requested to merge upgrade-to-v17.1.1 into main

current diff:

--- current-deployment.yaml
+++ future-deployment.yaml
@@ -7,7 +7,7 @@
   namespace: gitlab
   labels:
     app: gitaly
-    chart: gitaly-8.0.1
+    chart: gitaly-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -28,7 +28,7 @@
   namespace: gitlab
   labels:
     app: gitlab-shell
-    chart: gitlab-shell-8.0.1
+    chart: gitlab-shell-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -47,7 +47,7 @@
   namespace: gitlab
   labels:
     app: kas
-    chart: kas-8.0.1
+    chart: kas-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -66,7 +66,7 @@
   namespace: gitlab
   labels:
     app: praefect
-    chart: praefect-8.0.1
+    chart: praefect-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -85,7 +85,7 @@
   namespace: gitlab
   labels:
     app: sidekiq
-    chart: sidekiq-8.0.1
+    chart: sidekiq-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -106,7 +106,7 @@
   namespace: gitlab
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     gitlab.com/webservice-name: default
@@ -212,9 +212,9 @@
     app.kubernetes.io/name: cainjector
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cainjector"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 ---
 # Source: gitlab/charts/certmanager/templates/serviceaccount.yaml
 apiVersion: v1
@@ -228,9 +228,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 ---
 # Source: gitlab/charts/certmanager/templates/webhook-serviceaccount.yaml
 apiVersion: v1
@@ -244,9 +244,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 ---
 # Source: gitlab/charts/nginx-ingress/templates/controller-serviceaccount.yaml
 apiVersion: v1
@@ -377,9 +377,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 data:
 ---
 # Source: gitlab/charts/gitlab/charts/gitaly/templates/configmap-with-praefect.yml
@@ -390,7 +390,7 @@
   namespace: gitlab
   labels:
     app: gitaly
-    chart: gitaly-8.0.1
+    chart: gitaly-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -465,7 +465,7 @@
   namespace: gitlab
   labels:
     app: gitlab-exporter
-    chart: gitlab-exporter-8.0.1
+    chart: gitlab-exporter-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -537,7 +537,7 @@
     config_dir="/init-config"
     secret_dir="/init-secrets"
     # optional
-    for secret in redis postgres gitlab-exporter ; do
+    for secret in redis redis-sentinel postgres gitlab-exporter ; do
       if [ -e "${config_dir}/${secret}" ]; then
         mkdir -p "${secret_dir}/${secret}"
         cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -554,7 +554,7 @@
   namespace: gitlab
   labels:
     app: gitlab-shell
-    chart: gitlab-shell-8.0.1
+    chart: gitlab-shell-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -672,7 +672,7 @@
   namespace: gitlab
   labels:
     app: gitlab-shell
-    chart: gitlab-shell-8.0.1
+    chart: gitlab-shell-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -687,7 +687,7 @@
   namespace: gitlab
   labels:
     app: kas
-    chart: kas-8.0.1
+    chart: kas-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -734,7 +734,7 @@
   namespace: gitlab
   labels:
     app: migrations
-    chart: migrations-8.0.1
+    chart: migrations-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -838,7 +838,7 @@
       cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
     done
     # optional
-    for secret in redis minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
+    for secret in redis redis-sentinel minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
       if [ -e "${config_dir}/${secret}" ]; then
         mkdir -p "${secret_dir}/${secret}"
         cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -857,7 +857,7 @@
   namespace: gitlab
   labels:
     app: praefect
-    chart: praefect-8.0.1
+    chart: praefect-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -919,7 +919,7 @@
   namespace: gitlab
   labels:
     app: sidekiq
-    chart: sidekiq-8.0.1
+    chart: sidekiq-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -967,6 +967,9 @@
         database_tasks: false
         
         
+  session_store.yml.erb: |
+    production:
+        session_cookie_token_prefix: ""
   krb5.conf: |
     
   smtp_settings.rb: |
@@ -1234,7 +1237,7 @@
       cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
     done
     # optional
-    for secret in redis minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
+    for secret in redis redis-sentinel minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
       if [ -e "${config_dir}/${secret}" ]; then
         mkdir -p "${secret_dir}/${secret}"
         cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1253,7 +1256,7 @@
   namespace: gitlab
   labels:
     app: toolbox
-    chart: toolbox-8.0.1
+    chart: toolbox-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -1299,6 +1302,9 @@
         database_tasks: false
         
         
+  session_store.yml.erb: |
+    production:
+        session_cookie_token_prefix: ""
   krb5.conf: |
     
   smtp_settings.rb: |
@@ -1539,7 +1545,7 @@
       cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
     done
     # optional
-    for secret in redis minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
+    for secret in redis redis-sentinel minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
       if [ -e "${config_dir}/${secret}" ]; then
         mkdir -p "${secret_dir}/${secret}"
         cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1572,7 +1578,7 @@
   namespace: gitlab
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -1620,6 +1626,9 @@
         database_tasks: false
         
         
+  session_store.yml.erb: |
+    production:
+        session_cookie_token_prefix: ""
   krb5.conf: |
     
   smtp_settings.rb: |
@@ -1893,7 +1902,7 @@
       cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
     done
     # optional
-    for secret in redis minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
+    for secret in redis redis-sentinel minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
       if [ -e "${config_dir}/${secret}" ]; then
         mkdir -p "${secret_dir}/${secret}"
         cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1909,7 +1918,7 @@
   namespace: gitlab
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -1980,7 +1989,7 @@
   namespace: gitlab
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -2819,13 +2828,13 @@
   namespace: gitlab
   labels:
     app: gitlab
-    chart: gitlab-8.0.1
+    chart: gitlab-8.1.1
     release: gitlab-test
     heritage: Helm
     
 data:
-  gitlabVersion: "v17.0.1"
-  gitlabChartVersion: "8.0.1"
+  gitlabVersion: "v17.1.1"
+  gitlabChartVersion: "8.1.1"
 ---
 # Source: gitlab/templates/initdb-configmap.yaml
 apiVersion: v1
@@ -2835,7 +2844,7 @@
   namespace: gitlab
   labels:
     app: gitlab
-    chart: gitlab-8.0.1
+    chart: gitlab-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -2900,9 +2909,9 @@
     app.kubernetes.io/name: 'certmanager'
     app.kubernetes.io/instance: 'gitlab-test'
     # Generated labels
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   group: cert-manager.io
   names:
@@ -3102,9 +3111,9 @@
     app.kubernetes.io/name: 'certmanager'
     app.kubernetes.io/instance: 'gitlab-test'
     # Generated labels
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   group: cert-manager.io
   names:
@@ -3477,9 +3486,9 @@
     app.kubernetes.io/name: 'certmanager'
     app.kubernetes.io/instance: 'gitlab-test'
     # Generated labels
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   group: acme.cert-manager.io
   names:
@@ -4557,9 +4566,9 @@
     app.kubernetes.io/name: 'certmanager'
     app.kubernetes.io/instance: "gitlab-test"
     # Generated labels
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   group: cert-manager.io
   names:
@@ -5879,9 +5888,9 @@
     app.kubernetes.io/name: 'certmanager'
     app.kubernetes.io/instance: "gitlab-test"
     # Generated labels
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   group: cert-manager.io
   names:
@@ -7201,9 +7210,9 @@
     app.kubernetes.io/name: 'certmanager'
     app.kubernetes.io/instance: 'gitlab-test'
     # Generated labels
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   group: acme.cert-manager.io
   names:
@@ -7385,9 +7394,9 @@
     app.kubernetes.io/name: cainjector
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cainjector"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["cert-manager.io"]
     resources: ["certificates"]
@@ -7419,9 +7428,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["cert-manager.io"]
     resources: ["issuers", "issuers/status"]
@@ -7447,9 +7456,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["cert-manager.io"]
     resources: ["clusterissuers", "clusterissuers/status"]
@@ -7475,9 +7484,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["cert-manager.io"]
     resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
@@ -7512,9 +7521,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["acme.cert-manager.io"]
     resources: ["orders", "orders/status"]
@@ -7552,9 +7561,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   # Use to update challenge resource status
   - apiGroups: ["acme.cert-manager.io"]
@@ -7614,9 +7623,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["cert-manager.io"]
     resources: ["certificates", "certificaterequests"]
@@ -7653,9 +7662,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
     rbac.authorization.k8s.io/aggregate-to-view: "true"
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
@@ -7677,9 +7686,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
     rbac.authorization.k8s.io/aggregate-to-edit: "true"
     rbac.authorization.k8s.io/aggregate-to-admin: "true"
 rules:
@@ -7704,9 +7713,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cert-manager"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["cert-manager.io"]
     resources: ["signers"]
@@ -7726,9 +7735,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cert-manager"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["certificates.k8s.io"]
     resources: ["certificatesigningrequests"]
@@ -7754,9 +7763,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
 - apiGroups: ["authorization.k8s.io"]
   resources: ["subjectaccessreviews"]
@@ -7892,9 +7901,9 @@
     app.kubernetes.io/name: cainjector
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cainjector"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -7914,9 +7923,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -7936,9 +7945,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -7958,9 +7967,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -7980,9 +7989,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -8002,9 +8011,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -8024,9 +8033,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -8046,9 +8055,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cert-manager"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -8068,9 +8077,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cert-manager"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -8090,9 +8099,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: ClusterRole
@@ -8170,9 +8179,9 @@
     app.kubernetes.io/name: cainjector
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cainjector"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   # Used for leader election by the controller
   # cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
@@ -8198,9 +8207,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
   - apiGroups: ["coordination.k8s.io"]
     resources: ["leases"]
@@ -8221,9 +8230,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 rules:
 - apiGroups: [""]
   resources: ["secrets"]
@@ -8371,9 +8380,9 @@
     app.kubernetes.io/name: cainjector
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cainjector"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: Role
@@ -8396,9 +8405,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: Role
@@ -8420,9 +8429,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 roleRef:
   apiGroup: rbac.authorization.k8s.io
   kind: Role
@@ -8470,9 +8479,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   type: ClusterIP
   ports:
@@ -8496,9 +8505,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   type: ClusterIP
   ports:
@@ -8519,7 +8528,7 @@
   namespace: gitlab
   labels:
     app: gitaly
-    chart: gitaly-8.0.1
+    chart: gitaly-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -8552,7 +8561,7 @@
   namespace: gitlab
   labels:
     app: gitlab-exporter
-    chart: gitlab-exporter-8.0.1
+    chart: gitlab-exporter-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -8578,7 +8587,7 @@
   namespace: gitlab
   labels:
     app: gitlab-shell
-    chart: gitlab-shell-8.0.1
+    chart: gitlab-shell-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -8604,7 +8613,7 @@
   namespace: gitlab
   labels:
     app: kas
-    chart: kas-8.0.1
+    chart: kas-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -8642,7 +8651,7 @@
   namespace: gitlab
   labels:
     app: praefect
-    chart: praefect-8.0.1
+    chart: praefect-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -8677,7 +8686,7 @@
   namespace: gitlab
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -9133,9 +9142,9 @@
     app.kubernetes.io/name: cainjector
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "cainjector"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   replicas: 1
   selector:
@@ -9150,9 +9159,9 @@
         app.kubernetes.io/name: cainjector
         app.kubernetes.io/instance: gitlab-test
         app.kubernetes.io/component: "cainjector"
-        app.kubernetes.io/version: "v1.12.10"
+        app.kubernetes.io/version: "v1.12.11"
         app.kubernetes.io/managed-by: Helm
-        helm.sh/chart: certmanager-v1.12.10
+        helm.sh/chart: certmanager-v1.12.11
     spec:
       serviceAccountName: gitlab-test-certmanager-cainjector
       securityContext:
@@ -9161,7 +9170,7 @@
           type: RuntimeDefault
       containers:
         - name: certmanager-cainjector
-          image: "quay.io/jetstack/cert-manager-cainjector:v1.12.10"
+          image: "quay.io/jetstack/cert-manager-cainjector:v1.12.11"
           imagePullPolicy: IfNotPresent
           args:
           - --v=2
@@ -9190,9 +9199,9 @@
     app.kubernetes.io/name: certmanager
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "controller"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   replicas: 1
   selector:
@@ -9207,9 +9216,9 @@
         app.kubernetes.io/name: certmanager
         app.kubernetes.io/instance: gitlab-test
         app.kubernetes.io/component: "controller"
-        app.kubernetes.io/version: "v1.12.10"
+        app.kubernetes.io/version: "v1.12.11"
         app.kubernetes.io/managed-by: Helm
-        helm.sh/chart: certmanager-v1.12.10
+        helm.sh/chart: certmanager-v1.12.11
       annotations:
         prometheus.io/path: "/metrics"
         prometheus.io/scrape: 'true'
@@ -9222,13 +9231,13 @@
           type: RuntimeDefault
       containers:
         - name: certmanager-controller
-          image: "quay.io/jetstack/cert-manager-controller:v1.12.10"
+          image: "quay.io/jetstack/cert-manager-controller:v1.12.11"
           imagePullPolicy: IfNotPresent
           args:
           - --v=2
           - --cluster-resource-namespace=$(POD_NAMESPACE)
           - --leader-election-namespace=kube-system
-          - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.12.10
+          - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.12.11
           - --max-concurrent-challenges=60
           ports:
           - containerPort: 9402
@@ -9261,9 +9270,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 spec:
   replicas: 1
   selector:
@@ -9278,9 +9287,9 @@
         app.kubernetes.io/name: webhook
         app.kubernetes.io/instance: gitlab-test
         app.kubernetes.io/component: "webhook"
-        app.kubernetes.io/version: "v1.12.10"
+        app.kubernetes.io/version: "v1.12.11"
         app.kubernetes.io/managed-by: Helm
-        helm.sh/chart: certmanager-v1.12.10
+        helm.sh/chart: certmanager-v1.12.11
     spec:
       serviceAccountName: gitlab-test-certmanager-webhook
       securityContext:
@@ -9289,7 +9298,7 @@
           type: RuntimeDefault
       containers:
         - name: certmanager-webhook
-          image: "quay.io/jetstack/cert-manager-webhook:v1.12.10"
+          image: "quay.io/jetstack/cert-manager-webhook:v1.12.11"
           imagePullPolicy: IfNotPresent
           args:
           - --v=2
@@ -9348,7 +9357,7 @@
   namespace: gitlab
   labels:
     app: gitlab-exporter
-    chart: gitlab-exporter-8.0.1
+    chart: gitlab-exporter-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -9365,13 +9374,13 @@
     metadata:
       labels:
         app: gitlab-exporter
-        chart: gitlab-exporter-8.0.1
+        chart: gitlab-exporter-8.1.1
         release: gitlab-test
         heritage: Helm
         
         
       annotations:
-        checksum/config: 6b0e6da562757fea2b7407521da7612b22044458602845d8879a4eb92a7457a6
+        checksum/config: ff58da35ec29067306429b121b3e16d7aaa5a2eb430050d5ceb4524501afdd38
         gitlab.com/prometheus_scrape: "true"
         gitlab.com/prometheus_port: "9168"
         gitlab.com/prometheus_path: /metrics
@@ -9400,7 +9409,7 @@
       initContainers:
         
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           - name: MALLOC_CONF
@@ -9424,7 +9433,7 @@
               cpu: 50m
         - name: configure
           command: ['sh', '/config/configure']
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"                    
           env:
           
           - name: MALLOC_CONF
@@ -9454,7 +9463,7 @@
       containers:
         
         - name: gitlab-exporter
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:14.4.0"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:15.0.0"                    
           securityContext:
             runAsUser: 1000
           env:
@@ -9535,6 +9544,7 @@
                 - key: "secret"
                   path: redis/redis-password
           
+          
 
       - name: gitlab-exporter-secrets
         emptyDir:
@@ -9555,7 +9565,7 @@
   namespace: gitlab
   labels:
     app: gitlab-shell
-    chart: gitlab-shell-8.0.1
+    chart: gitlab-shell-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -9571,13 +9581,13 @@
     metadata:
       labels:
         app: gitlab-shell
-        chart: gitlab-shell-8.0.1
+        chart: gitlab-shell-8.1.1
         release: gitlab-test
         heritage: Helm
         
         
       annotations:
-        checksum/config: be96ab0b98f1ba8eed8a7aaad5bb549d828f2cf313708d8dc34697b240ac9066
+        checksum/config: 23eae512899d0519ab93836b942014061ba760f154118ed6434a1579adc37e87
         checksum/config-sshd: 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
         cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
     spec:
@@ -9585,7 +9595,7 @@
       initContainers:
         
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -9601,7 +9611,7 @@
               cpu: 50m
         - name: configure
           command: ['sh', '/config/configure']
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"                    
           env:
           
           
@@ -9638,7 +9648,7 @@
       containers:
         
         - name: gitlab-shell
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v14.35.0"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v14.36.0"                    
           securityContext:
             runAsUser: 1000
           ports:
@@ -9733,7 +9743,7 @@
   namespace: gitlab
   labels:
     app: kas
-    chart: kas-8.0.1
+    chart: kas-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -9749,13 +9759,13 @@
     metadata:
       labels:
         app: kas
-        chart: kas-8.0.1
+        chart: kas-8.1.1
         release: gitlab-test
         heritage: Helm
         
         
       annotations:
-        checksum/config: 8b8021399e0ee951d79754b82607bd65a4140133e7dd40f4d23c29dfe90ef7dc
+        checksum/config: 9219141504691c9d3c0e9d6c0d29f0b04a257c1f30f16508c93f28da9bb193c5
         cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
         gitlab.com/prometheus_scrape: "true"
         gitlab.com/prometheus_port: "8151"
@@ -9785,7 +9795,7 @@
       
       initContainers:
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -9802,7 +9812,7 @@
       containers:
         
         - name: kas
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-kas:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-kas:v17.1.1"                    
           securityContext:
             runAsUser: 65532
           args:
@@ -9898,7 +9908,7 @@
   namespace: gitlab
   labels:
     app: sidekiq
-    chart: sidekiq-8.0.1
+    chart: sidekiq-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -9916,14 +9926,14 @@
     metadata:
       labels:
         app: sidekiq
-        chart: sidekiq-8.0.1
+        chart: sidekiq-8.1.1
         release: gitlab-test
         heritage: Helm
         
         
         queue-pod-name: native-chart
       annotations:
-        checksum/configmap: a2c65808b36ccf91268d550bc6949fb92207f0410a9da8716249b8e2ada34fe2
+        checksum/configmap: a24783bb502f80f2ced7dceab1e73503eac56e16c20dfff278a33e83ce29d9b1
         cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
         co.elastic.logs/json.add_error_key: "true"
         co.elastic.logs/json.keys_under_root: "false"
@@ -9955,7 +9965,7 @@
       initContainers:
         
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -9971,7 +9981,7 @@
               cpu: 50m
         - name: configure
           command: ['sh', '/config/configure']
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"                    
           env:
           
           
@@ -9993,7 +10003,7 @@
             requests:
               cpu: 50m
         - name: dependencies
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v17.1.1"                    
           args:
             - /scripts/wait-for-deps
           env:
@@ -10036,7 +10046,7 @@
       containers:
         
         - name: sidekiq
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v17.1.1"                    
           securityContext:
             runAsUser: 1000
           env:
@@ -10170,6 +10180,7 @@
               items:
                 - key: "secret"
                   path: redis/redis-password
+          
           - secret:
               name: "gitlab-test-postgresql-password"
               items:
@@ -10259,7 +10270,7 @@
   namespace: gitlab
   labels:
     app: toolbox
-    chart: toolbox-8.0.1
+    chart: toolbox-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -10279,13 +10290,13 @@
     metadata:
       labels:
         app: toolbox
-        chart: toolbox-8.0.1
+        chart: toolbox-8.1.1
         release: gitlab-test
         heritage: Helm
         
         
       annotations:
-        checksum/config: d42c3cc44187615c0aa8d82b0fb764a30985d3a47728adc4308fea2f1fc6238f
+        checksum/config: 11c2ff759d317572b19a6837d089546621ac8b8116c3a343372836b90bdec21a
         cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
     spec:
       
@@ -10298,7 +10309,7 @@
       initContainers:
         
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -10314,7 +10325,7 @@
               cpu: 50m
         - name: configure
           command: ['sh', '/config/configure']
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"                    
           env:
           
           
@@ -10351,7 +10362,7 @@
             - /bin/bash
             - -c
             - sh /var/opt/gitlab/templates/configure-gsutil && while sleep 3600; do :; done
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v17.1.1"                    
           securityContext:
             runAsUser: 1000
           env:
@@ -10466,6 +10477,7 @@
               items:
                 - key: "secret"
                   path: redis/redis-password
+          
           - secret:
               name: "gitlab-test-postgresql-password"
               items:
@@ -10560,7 +10572,7 @@
   namespace: gitlab
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     gitlab.com/webservice-name: default
@@ -10581,7 +10593,7 @@
     metadata:
       labels:
         app: webservice
-        chart: webservice-8.0.1
+        chart: webservice-8.1.1
         release: gitlab-test
         heritage: Helm
         gitlab.com/webservice-name: default
@@ -10589,7 +10601,7 @@
         
         
       annotations:
-        checksum/config: be2b824a4c57bd4fc13eaa88ab1b01cf7afc48301f4875999df297afe4988446
+        checksum/config: b04ad92d909f66a55fa95bca50a83c50d858b98262ef59761987bc27484a7320
         cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
         co.elastic.logs/json.add_error_key: "true"
         co.elastic.logs/json.keys_under_root: "false"
@@ -10622,7 +10634,7 @@
       initContainers:
         
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -10639,7 +10651,7 @@
         - name: configure
           command: ['sh']
           args: [ '-c', 'sh -x /config-webservice/configure ; sh -x /config-workhorse/configure ; mkdir -p -m 3770 /tmp/gitlab']
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"                    
           env:
             
             
@@ -10669,7 +10681,7 @@
             requests:
               cpu: 50m
         - name: dependencies
-          image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.0.1                    
+          image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.1.1                    
           args:
             - /scripts/wait-for-deps
           env:
@@ -10708,7 +10720,7 @@
       containers:
         
         - name: webservice
-          image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.0.1                    
+          image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.1.1                    
           securityContext:
             runAsUser: 1000
           ports:
@@ -10813,7 +10825,7 @@
               cpu: 300m
               memory: 2.5G
         - name: gitlab-workhorse
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v17.0.1"          
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v17.1.1"          
           ports:
             - containerPort: 8181
               name: http-workhorse
@@ -10938,6 +10950,7 @@
               items:
                 - key: "secret"
                   path: redis/redis-password
+          
           - secret:
               name: "gitlab-test-postgresql-password"
               items:
@@ -11092,7 +11105,7 @@
             medium: "Memory"
       initContainers:
         - name: configure
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"          
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"          
           command: ["sh", "/config/configure"]
           volumeMounts:
             - name: minio-configuration
@@ -11385,21 +11398,22 @@
       securityContext:
         runAsUser: 1000
         fsGroup: 1000
+      
       affinity:
-        podAntiAffinity:
-          preferredDuringSchedulingIgnoredDuringExecution:
-          - weight: 1
-            podAffinityTerm:
-              topologyKey: "kubernetes.io/hostname"
-              labelSelector:
-                matchLabels:
-                  app: registry
-                  release: gitlab-test
+          podAntiAffinity:
+            preferredDuringSchedulingIgnoredDuringExecution:
+              - weight: 1
+                podAffinityTerm:
+                  topologyKey: "kubernetes.io/hostname"
+                  labelSelector:
+                    matchLabels:
+                      app: registry
+                      release: gitlab-test
       automountServiceAccountToken: false
       
       initContainers:
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -11414,7 +11428,7 @@
             requests:
               cpu: 50m
         - name: configure
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"                    
           command: ["sh", "/config/configure"]
           volumeMounts:
             - name: registry-secrets
@@ -11428,7 +11442,7 @@
           
           
         - name: dependencies
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.0.0-gitlab"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.5.0-gitlab"                    
           command: ["/scripts/wait-for-deps"]
           volumeMounts:
             - name: registry-server-config
@@ -11442,7 +11456,7 @@
                 
       containers:
         - name: registry
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.0.0-gitlab"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.5.0-gitlab"                    
           securityContext:
             runAsUser: 1000
           env:
@@ -11537,7 +11551,7 @@
   namespace: gitlab
   labels:
     app: gitlab-shell
-    chart: gitlab-shell-8.0.1
+    chart: gitlab-shell-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -11562,7 +11576,7 @@
   namespace: gitlab
   labels:
     app: kas
-    chart: kas-8.0.1
+    chart: kas-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -11587,7 +11601,7 @@
   namespace: gitlab
   labels:
     app: sidekiq
-    chart: sidekiq-8.0.1
+    chart: sidekiq-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -11612,7 +11626,7 @@
   namespace: gitlab
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     gitlab.com/webservice-name: default
@@ -11663,7 +11677,7 @@
   namespace: gitlab
   labels:
     app: gitaly
-    chart: gitaly-8.0.1
+    chart: gitaly-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -11683,13 +11697,13 @@
       labels:
         storage: default
         app: gitaly
-        chart: gitaly-8.0.1
+        chart: gitaly-8.1.1
         release: gitlab-test
         heritage: Helm
         
         
       annotations:
-        checksum/config: a8c289d1faac3674466da786e462e1fd89f589e603f65fcb2b0a5cfe02dba6f2
+        checksum/config: cbc9e5133072ecb153b2ace9190ef5bd60649b1e5747a7a575ca263346abe21f
         co.elastic.logs/json.add_error_key: "true"
         co.elastic.logs/json.keys_under_root: "false"
         gitlab.com/prometheus_scrape: "true"
@@ -11704,7 +11718,7 @@
       initContainers:
         
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -11720,7 +11734,7 @@
               cpu: 50m
         - name: configure
           command: ['sh', '/config/configure']
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"                    
           env:
           
           
@@ -11758,7 +11772,7 @@
       containers:
         
         - name: gitaly
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v17.1.1"                    
           securityContext:
             runAsUser: 1000
           ports:
@@ -11872,7 +11886,7 @@
   namespace: gitlab
   labels:
     app: praefect
-    chart: praefect-8.0.1
+    chart: praefect-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -11889,13 +11903,13 @@
     metadata:
       labels:
         app: praefect
-        chart: praefect-8.0.1
+        chart: praefect-8.1.1
         release: gitlab-test
         heritage: Helm
         
         
       annotations:
-        checksum/config: 2ebc4f8cce230917ae4838e5c12a2f70a34c116b483c588956b902508dce5c10
+        checksum/config: 1900ce9a1d377e830dd408bfa81d9bce411ba564362a78ddba26cd2c9596c59c
         gitlab.com/prometheus_scrape: "true"
         gitlab.com/prometheus_port: "9236"
         gitlab.com/prometheus_path: /metrics
@@ -11919,7 +11933,7 @@
       initContainers:
         
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -11934,7 +11948,7 @@
             {}
         - name: configure
           command: ['sh', '/config/configure']
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"          
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"          
           env:
           
           
@@ -11958,7 +11972,7 @@
       containers:
       
       - name: praefect
-        image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v17.0.1"        
+        image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v17.1.1"        
         ports:
           - containerPort: 8075
           - containerPort: 9236
@@ -12449,7 +12463,7 @@
 apiVersion: batch/v1
 kind: Job
 metadata:
-  name: gitlab-test-issuer-19227ba
+  name: gitlab-test-issuer-748f796
   namespace: gitlab
   labels:
     app: certmanager-issuer
@@ -12474,7 +12488,7 @@
       
       containers:
         - name: create-issuer
-          image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v17.0.1
+          image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v17.1.1
           command: ['/bin/bash', '/scripts/create-issuer', '/scripts/issuer.yml']          
           volumeMounts:
             - name: scripts
@@ -12491,11 +12505,11 @@
 apiVersion: batch/v1
 kind: Job
 metadata:
-  name: gitlab-test-migrations-a3618e2
+  name: gitlab-test-migrations-02e1a9f
   namespace: gitlab
   labels:
     app: migrations
-    chart: migrations-8.0.1
+    chart: migrations-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -12506,7 +12520,7 @@
     metadata:
       labels:
         app: migrations
-        chart: migrations-8.0.1
+        chart: migrations-8.1.1
         release: gitlab-test
         heritage: Helm
         
@@ -12521,7 +12535,7 @@
       initContainers:
         
         - name: certificates
-          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+          image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
           env:
           
           
@@ -12537,7 +12551,7 @@
               cpu: 50m
         - name: configure
           command: ['sh', '/config/configure']
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"                    
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"                    
           env:
           
           
@@ -12561,7 +12575,7 @@
       containers:
         
         - name: migrations
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v17.0.1"
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v17.1.1"
           args:
             - /scripts/wait-for-deps
             - /scripts/db-migrate                    
@@ -12640,6 +12654,7 @@
               items:
                 - key: "secret"
                   path: redis/redis-password
+          
           - secret:
               name: "gitlab-test-postgresql-password"
               items:
@@ -12675,7 +12690,7 @@
 apiVersion: batch/v1
 kind: Job
 metadata:
-  name: gitlab-test-minio-create-buckets-1dade5f
+  name: gitlab-test-minio-create-buckets-63df52f
   namespace: gitlab
   labels:
     app: minio
@@ -12729,7 +12744,7 @@
 apiVersion: batch/v1
 kind: Job
 metadata:
-  name: gitlab-test-registry-migrations-0ebc9d4
+  name: gitlab-test-registry-migrations-09c2818
   namespace: gitlab
   labels:
     app: registry
@@ -12758,7 +12773,7 @@
       initContainers:
       
       - name: certificates
-        image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1    
+        image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1    
         env:
         
         
@@ -12773,7 +12788,7 @@
           requests:
             cpu: 50m
       - name: configure
-        image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"        
+        image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"        
         command: ['sh', '/config/configure']
         volumeMounts:
           - name: registry-secrets
@@ -12790,7 +12805,7 @@
       containers:
       
       - name: migrations
-        image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.0.0-gitlab"        
+        image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.5.0-gitlab"        
         args:
         - /scripts/wait-for-deps
         - /scripts/db-migrate
@@ -12869,7 +12884,7 @@
   namespace: gitlab
   labels:
     app: kas
-    chart: kas-8.0.1
+    chart: kas-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -12907,7 +12922,7 @@
   namespace: gitlab
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     gitlab.com/webservice-name: default
@@ -13020,9 +13035,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
   annotations:
     cert-manager.io/inject-ca-from-secret: "gitlab/gitlab-test-certmanager-webhook-ca"
 webhooks:
@@ -13063,9 +13078,9 @@
     app.kubernetes.io/name: webhook
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "webhook"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
   annotations:
     cert-manager.io/inject-ca-from-secret: "gitlab/gitlab-test-certmanager-webhook-ca"
 webhooks:
@@ -13121,9 +13136,9 @@
     app.kubernetes.io/name: startupapicheck
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "startupapicheck"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
 ---
 # Source: gitlab/templates/shared-secrets/rbac-config.yaml
 apiVersion: v1
@@ -13133,7 +13148,7 @@
   namespace: gitlab
   labels:
     app: gitlab
-    chart: gitlab-8.0.1
+    chart: gitlab-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -13150,7 +13165,7 @@
   namespace: gitlab
   labels:
     app: gitlab
-    chart: gitlab-8.0.1
+    chart: gitlab-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -13190,7 +13205,7 @@
     
       kubectl --namespace=$namespace label \
         --overwrite \
-        secret $secret_name app=gitlab chart=gitlab-8.0.1 release=gitlab-test heritage=Helm 
+        secret $secret_name app=gitlab chart=gitlab-8.1.1 release=gitlab-test heritage=Helm 
     }
     
     # Args: secretname, args
@@ -13362,7 +13377,7 @@
   namespace: gitlab
   labels:
     app: gitlab
-    chart: gitlab-8.0.1
+    chart: gitlab-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -13470,9 +13485,9 @@
     app.kubernetes.io/name: startupapicheck
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "startupapicheck"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
   annotations:
     helm.sh/hook: post-install
     helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
@@ -13490,7 +13505,7 @@
   namespace: gitlab
   labels:
     app: shared-secrets
-    chart: shared-secrets-8.0.1
+    chart: shared-secrets-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -13514,9 +13529,9 @@
     app.kubernetes.io/name: startupapicheck
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "startupapicheck"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
   annotations:
     helm.sh/hook: post-install
     helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
@@ -13538,7 +13553,7 @@
   namespace: gitlab
   labels:
     app: shared-secrets
-    chart: shared-secrets-8.0.1
+    chart: shared-secrets-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -13559,21 +13574,21 @@
 apiVersion: v1
 kind: Pod
 metadata:
-  name: gitlab-test-webservice-test-runner-j5l16
+  name: gitlab-test-webservice-test-runner-soppz
   namespace: gitlab
   annotations:
     "helm.sh/hook": test
     "helm.sh/hook-delete-policy": hook-succeeded,hook-failed,before-hook-creation
   labels:
     app: webservice
-    chart: webservice-8.0.1
+    chart: webservice-8.1.1
     release: gitlab-test
     heritage: Helm
     
 spec:
   containers:
   - name: test-runner
-    image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.0.1
+    image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.1.1
     command: ['sh', '/tests/test_login']
     volumeMounts:
       - name: tests
@@ -13605,9 +13620,9 @@
     app.kubernetes.io/name: startupapicheck
     app.kubernetes.io/instance: gitlab-test
     app.kubernetes.io/component: "startupapicheck"
-    app.kubernetes.io/version: "v1.12.10"
+    app.kubernetes.io/version: "v1.12.11"
     app.kubernetes.io/managed-by: Helm
-    helm.sh/chart: certmanager-v1.12.10
+    helm.sh/chart: certmanager-v1.12.11
   annotations:
     helm.sh/hook: post-install
     helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
@@ -13621,9 +13636,9 @@
         app.kubernetes.io/name: startupapicheck
         app.kubernetes.io/instance: gitlab-test
         app.kubernetes.io/component: "startupapicheck"
-        app.kubernetes.io/version: "v1.12.10"
+        app.kubernetes.io/version: "v1.12.11"
         app.kubernetes.io/managed-by: Helm
-        helm.sh/chart: certmanager-v1.12.10
+        helm.sh/chart: certmanager-v1.12.11
     spec:
       restartPolicy: OnFailure
       serviceAccountName: gitlab-test-certmanager-startupapicheck
@@ -13633,7 +13648,7 @@
           type: RuntimeDefault
       containers:
         - name: certmanager-startupapicheck
-          image: "quay.io/jetstack/cert-manager-ctl:v1.12.10"
+          image: "quay.io/jetstack/cert-manager-ctl:v1.12.11"
           imagePullPolicy: IfNotPresent
           args:
           - check
@@ -13651,11 +13666,11 @@
 apiVersion: batch/v1
 kind: Job
 metadata:
-  name: gitlab-test-shared-secrets-f8942da
+  name: gitlab-test-shared-secrets-07a6632
   namespace: gitlab
   labels:
     app: gitlab
-    chart: gitlab-8.0.1
+    chart: gitlab-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -13667,7 +13682,7 @@
     metadata:
       labels:
         app: gitlab
-        chart: gitlab-8.0.1
+        chart: gitlab-8.1.1
         release: gitlab-test
         heritage: Helm
         
@@ -13683,7 +13698,7 @@
       
       containers:
         - name: gitlab
-          image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v17.0.1          
+          image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v17.1.1          
           command: ['/bin/bash', '/scripts/generate-secrets']
           volumeMounts:
             - name: scripts
@@ -13708,7 +13723,7 @@
   namespace: gitlab
   labels:
     app: gitlab
-    chart: gitlab-8.0.1
+    chart: gitlab-8.1.1
     release: gitlab-test
     heritage: Helm
     
@@ -13733,13 +13748,13 @@
       
       containers:
         - name: run-check
-          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+          image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
           command: ['/bin/sh', '/scripts/runcheck']          
           env:
             - name: GITLAB_VERSION
-              value: 'v17.0.1'
+              value: 'v17.1.1'
             - name: CHART_VERSION
-              value: '8.0.1'
+              value: '8.1.1'
           volumeMounts:
             - name: chart-info
               mountPath: /chart-info

Merge request reports

Loading