superseeded: A new version of gitlab (v17.1.1) is available
current diff:
--- current-deployment.yaml
+++ future-deployment.yaml
@@ -7,7 +7,7 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-8.0.1
+ chart: gitaly-8.1.1
release: gitlab-test
heritage: Helm
@@ -28,7 +28,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-8.0.1
+ chart: gitlab-shell-8.1.1
release: gitlab-test
heritage: Helm
@@ -47,7 +47,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-8.0.1
+ chart: kas-8.1.1
release: gitlab-test
heritage: Helm
@@ -66,7 +66,7 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-8.0.1
+ chart: praefect-8.1.1
release: gitlab-test
heritage: Helm
@@ -85,7 +85,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-8.0.1
+ chart: sidekiq-8.1.1
release: gitlab-test
heritage: Helm
@@ -106,7 +106,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -212,9 +212,9 @@
app.kubernetes.io/name: cainjector
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cainjector"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
---
# Source: gitlab/charts/certmanager/templates/serviceaccount.yaml
apiVersion: v1
@@ -228,9 +228,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
---
# Source: gitlab/charts/certmanager/templates/webhook-serviceaccount.yaml
apiVersion: v1
@@ -244,9 +244,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
---
# Source: gitlab/charts/nginx-ingress/templates/controller-serviceaccount.yaml
apiVersion: v1
@@ -377,9 +377,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
data:
---
# Source: gitlab/charts/gitlab/charts/gitaly/templates/configmap-with-praefect.yml
@@ -390,7 +390,7 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-8.0.1
+ chart: gitaly-8.1.1
release: gitlab-test
heritage: Helm
@@ -465,7 +465,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-8.0.1
+ chart: gitlab-exporter-8.1.1
release: gitlab-test
heritage: Helm
@@ -537,7 +537,7 @@
config_dir="/init-config"
secret_dir="/init-secrets"
# optional
- for secret in redis postgres gitlab-exporter ; do
+ for secret in redis redis-sentinel postgres gitlab-exporter ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -554,7 +554,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-8.0.1
+ chart: gitlab-shell-8.1.1
release: gitlab-test
heritage: Helm
@@ -672,7 +672,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-8.0.1
+ chart: gitlab-shell-8.1.1
release: gitlab-test
heritage: Helm
@@ -687,7 +687,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-8.0.1
+ chart: kas-8.1.1
release: gitlab-test
heritage: Helm
@@ -734,7 +734,7 @@
namespace: gitlab
labels:
app: migrations
- chart: migrations-8.0.1
+ chart: migrations-8.1.1
release: gitlab-test
heritage: Helm
@@ -838,7 +838,7 @@
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# optional
- for secret in redis minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
+ for secret in redis redis-sentinel minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -857,7 +857,7 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-8.0.1
+ chart: praefect-8.1.1
release: gitlab-test
heritage: Helm
@@ -919,7 +919,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-8.0.1
+ chart: sidekiq-8.1.1
release: gitlab-test
heritage: Helm
@@ -967,6 +967,9 @@
database_tasks: false
+ session_store.yml.erb: |
+ production:
+ session_cookie_token_prefix: ""
krb5.conf: |
smtp_settings.rb: |
@@ -1234,7 +1237,7 @@
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# optional
- for secret in redis minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
+ for secret in redis redis-sentinel minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1253,7 +1256,7 @@
namespace: gitlab
labels:
app: toolbox
- chart: toolbox-8.0.1
+ chart: toolbox-8.1.1
release: gitlab-test
heritage: Helm
@@ -1299,6 +1302,9 @@
database_tasks: false
+ session_store.yml.erb: |
+ production:
+ session_cookie_token_prefix: ""
krb5.conf: |
smtp_settings.rb: |
@@ -1539,7 +1545,7 @@
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# optional
- for secret in redis minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
+ for secret in redis redis-sentinel minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1572,7 +1578,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
@@ -1620,6 +1626,9 @@
database_tasks: false
+ session_store.yml.erb: |
+ production:
+ session_cookie_token_prefix: ""
krb5.conf: |
smtp_settings.rb: |
@@ -1893,7 +1902,7 @@
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
# optional
- for secret in redis minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
+ for secret in redis redis-sentinel minio objectstorage postgres ldap duo omniauth smtp kas pages oauth-secrets mailroom gitlab-exporter microsoft_graph_mailer suggested_reviewers zoekt clickhouse ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -f -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1909,7 +1918,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
@@ -1980,7 +1989,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
@@ -2819,13 +2828,13 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-8.0.1
+ chart: gitlab-8.1.1
release: gitlab-test
heritage: Helm
data:
- gitlabVersion: "v17.0.1"
- gitlabChartVersion: "8.0.1"
+ gitlabVersion: "v17.1.1"
+ gitlabChartVersion: "8.1.1"
---
# Source: gitlab/templates/initdb-configmap.yaml
apiVersion: v1
@@ -2835,7 +2844,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-8.0.1
+ chart: gitlab-8.1.1
release: gitlab-test
heritage: Helm
@@ -2900,9 +2909,9 @@
app.kubernetes.io/name: 'certmanager'
app.kubernetes.io/instance: 'gitlab-test'
# Generated labels
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
group: cert-manager.io
names:
@@ -3102,9 +3111,9 @@
app.kubernetes.io/name: 'certmanager'
app.kubernetes.io/instance: 'gitlab-test'
# Generated labels
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
group: cert-manager.io
names:
@@ -3477,9 +3486,9 @@
app.kubernetes.io/name: 'certmanager'
app.kubernetes.io/instance: 'gitlab-test'
# Generated labels
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
group: acme.cert-manager.io
names:
@@ -4557,9 +4566,9 @@
app.kubernetes.io/name: 'certmanager'
app.kubernetes.io/instance: "gitlab-test"
# Generated labels
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
group: cert-manager.io
names:
@@ -5879,9 +5888,9 @@
app.kubernetes.io/name: 'certmanager'
app.kubernetes.io/instance: "gitlab-test"
# Generated labels
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
group: cert-manager.io
names:
@@ -7201,9 +7210,9 @@
app.kubernetes.io/name: 'certmanager'
app.kubernetes.io/instance: 'gitlab-test'
# Generated labels
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
group: acme.cert-manager.io
names:
@@ -7385,9 +7394,9 @@
app.kubernetes.io/name: cainjector
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cainjector"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["cert-manager.io"]
resources: ["certificates"]
@@ -7419,9 +7428,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["cert-manager.io"]
resources: ["issuers", "issuers/status"]
@@ -7447,9 +7456,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["cert-manager.io"]
resources: ["clusterissuers", "clusterissuers/status"]
@@ -7475,9 +7484,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["cert-manager.io"]
resources: ["certificates", "certificates/status", "certificaterequests", "certificaterequests/status"]
@@ -7512,9 +7521,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["acme.cert-manager.io"]
resources: ["orders", "orders/status"]
@@ -7552,9 +7561,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
# Use to update challenge resource status
- apiGroups: ["acme.cert-manager.io"]
@@ -7614,9 +7623,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["cert-manager.io"]
resources: ["certificates", "certificaterequests"]
@@ -7653,9 +7662,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rbac.authorization.k8s.io/aggregate-to-view: "true"
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"
@@ -7677,9 +7686,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rbac.authorization.k8s.io/aggregate-to-edit: "true"
rbac.authorization.k8s.io/aggregate-to-admin: "true"
rules:
@@ -7704,9 +7713,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cert-manager"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["cert-manager.io"]
resources: ["signers"]
@@ -7726,9 +7735,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cert-manager"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["certificates.k8s.io"]
resources: ["certificatesigningrequests"]
@@ -7754,9 +7763,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["authorization.k8s.io"]
resources: ["subjectaccessreviews"]
@@ -7892,9 +7901,9 @@
app.kubernetes.io/name: cainjector
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cainjector"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -7914,9 +7923,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -7936,9 +7945,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -7958,9 +7967,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -7980,9 +7989,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -8002,9 +8011,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -8024,9 +8033,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -8046,9 +8055,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cert-manager"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -8068,9 +8077,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cert-manager"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -8090,9 +8099,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: ClusterRole
@@ -8170,9 +8179,9 @@
app.kubernetes.io/name: cainjector
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cainjector"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
# Used for leader election by the controller
# cert-manager-cainjector-leader-election is used by the CertificateBased injector controller
@@ -8198,9 +8207,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: ["coordination.k8s.io"]
resources: ["leases"]
@@ -8221,9 +8230,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
rules:
- apiGroups: [""]
resources: ["secrets"]
@@ -8371,9 +8380,9 @@
app.kubernetes.io/name: cainjector
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cainjector"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
@@ -8396,9 +8405,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
@@ -8420,9 +8429,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
roleRef:
apiGroup: rbac.authorization.k8s.io
kind: Role
@@ -8470,9 +8479,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
type: ClusterIP
ports:
@@ -8496,9 +8505,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
type: ClusterIP
ports:
@@ -8519,7 +8528,7 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-8.0.1
+ chart: gitaly-8.1.1
release: gitlab-test
heritage: Helm
@@ -8552,7 +8561,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-8.0.1
+ chart: gitlab-exporter-8.1.1
release: gitlab-test
heritage: Helm
@@ -8578,7 +8587,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-8.0.1
+ chart: gitlab-shell-8.1.1
release: gitlab-test
heritage: Helm
@@ -8604,7 +8613,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-8.0.1
+ chart: kas-8.1.1
release: gitlab-test
heritage: Helm
@@ -8642,7 +8651,7 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-8.0.1
+ chart: praefect-8.1.1
release: gitlab-test
heritage: Helm
@@ -8677,7 +8686,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
@@ -9133,9 +9142,9 @@
app.kubernetes.io/name: cainjector
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cainjector"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
replicas: 1
selector:
@@ -9150,9 +9159,9 @@
app.kubernetes.io/name: cainjector
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "cainjector"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
serviceAccountName: gitlab-test-certmanager-cainjector
securityContext:
@@ -9161,7 +9170,7 @@
type: RuntimeDefault
containers:
- name: certmanager-cainjector
- image: "quay.io/jetstack/cert-manager-cainjector:v1.12.10"
+ image: "quay.io/jetstack/cert-manager-cainjector:v1.12.11"
imagePullPolicy: IfNotPresent
args:
- --v=2
@@ -9190,9 +9199,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
replicas: 1
selector:
@@ -9207,9 +9216,9 @@
app.kubernetes.io/name: certmanager
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "controller"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
annotations:
prometheus.io/path: "/metrics"
prometheus.io/scrape: 'true'
@@ -9222,13 +9231,13 @@
type: RuntimeDefault
containers:
- name: certmanager-controller
- image: "quay.io/jetstack/cert-manager-controller:v1.12.10"
+ image: "quay.io/jetstack/cert-manager-controller:v1.12.11"
imagePullPolicy: IfNotPresent
args:
- --v=2
- --cluster-resource-namespace=$(POD_NAMESPACE)
- --leader-election-namespace=kube-system
- - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.12.10
+ - --acme-http01-solver-image=quay.io/jetstack/cert-manager-acmesolver:v1.12.11
- --max-concurrent-challenges=60
ports:
- containerPort: 9402
@@ -9261,9 +9270,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
replicas: 1
selector:
@@ -9278,9 +9287,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
serviceAccountName: gitlab-test-certmanager-webhook
securityContext:
@@ -9289,7 +9298,7 @@
type: RuntimeDefault
containers:
- name: certmanager-webhook
- image: "quay.io/jetstack/cert-manager-webhook:v1.12.10"
+ image: "quay.io/jetstack/cert-manager-webhook:v1.12.11"
imagePullPolicy: IfNotPresent
args:
- --v=2
@@ -9348,7 +9357,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-8.0.1
+ chart: gitlab-exporter-8.1.1
release: gitlab-test
heritage: Helm
@@ -9365,13 +9374,13 @@
metadata:
labels:
app: gitlab-exporter
- chart: gitlab-exporter-8.0.1
+ chart: gitlab-exporter-8.1.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 6b0e6da562757fea2b7407521da7612b22044458602845d8879a4eb92a7457a6
+ checksum/config: ff58da35ec29067306429b121b3e16d7aaa5a2eb430050d5ceb4524501afdd38
gitlab.com/prometheus_scrape: "true"
gitlab.com/prometheus_port: "9168"
gitlab.com/prometheus_path: /metrics
@@ -9400,7 +9409,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
- name: MALLOC_CONF
@@ -9424,7 +9433,7 @@
cpu: 50m
- name: configure
command: ['sh', '/config/configure']
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
env:
- name: MALLOC_CONF
@@ -9454,7 +9463,7 @@
containers:
- name: gitlab-exporter
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:14.4.0"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:15.0.0"
securityContext:
runAsUser: 1000
env:
@@ -9535,6 +9544,7 @@
- key: "secret"
path: redis/redis-password
+
- name: gitlab-exporter-secrets
emptyDir:
@@ -9555,7 +9565,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-8.0.1
+ chart: gitlab-shell-8.1.1
release: gitlab-test
heritage: Helm
@@ -9571,13 +9581,13 @@
metadata:
labels:
app: gitlab-shell
- chart: gitlab-shell-8.0.1
+ chart: gitlab-shell-8.1.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: be96ab0b98f1ba8eed8a7aaad5bb549d828f2cf313708d8dc34697b240ac9066
+ checksum/config: 23eae512899d0519ab93836b942014061ba760f154118ed6434a1579adc37e87
checksum/config-sshd: 01ba4719c80b6fe911b091a7c05124b64eeece964e09c058ef8f9805daca546b
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
@@ -9585,7 +9595,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -9601,7 +9611,7 @@
cpu: 50m
- name: configure
command: ['sh', '/config/configure']
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
env:
@@ -9638,7 +9648,7 @@
containers:
- name: gitlab-shell
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v14.35.0"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v14.36.0"
securityContext:
runAsUser: 1000
ports:
@@ -9733,7 +9743,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-8.0.1
+ chart: kas-8.1.1
release: gitlab-test
heritage: Helm
@@ -9749,13 +9759,13 @@
metadata:
labels:
app: kas
- chart: kas-8.0.1
+ chart: kas-8.1.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 8b8021399e0ee951d79754b82607bd65a4140133e7dd40f4d23c29dfe90ef7dc
+ checksum/config: 9219141504691c9d3c0e9d6c0d29f0b04a257c1f30f16508c93f28da9bb193c5
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
gitlab.com/prometheus_scrape: "true"
gitlab.com/prometheus_port: "8151"
@@ -9785,7 +9795,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -9802,7 +9812,7 @@
containers:
- name: kas
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-kas:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-kas:v17.1.1"
securityContext:
runAsUser: 65532
args:
@@ -9898,7 +9908,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-8.0.1
+ chart: sidekiq-8.1.1
release: gitlab-test
heritage: Helm
@@ -9916,14 +9926,14 @@
metadata:
labels:
app: sidekiq
- chart: sidekiq-8.0.1
+ chart: sidekiq-8.1.1
release: gitlab-test
heritage: Helm
queue-pod-name: native-chart
annotations:
- checksum/configmap: a2c65808b36ccf91268d550bc6949fb92207f0410a9da8716249b8e2ada34fe2
+ checksum/configmap: a24783bb502f80f2ced7dceab1e73503eac56e16c20dfff278a33e83ce29d9b1
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
@@ -9955,7 +9965,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -9971,7 +9981,7 @@
cpu: 50m
- name: configure
command: ['sh', '/config/configure']
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
env:
@@ -9993,7 +10003,7 @@
requests:
cpu: 50m
- name: dependencies
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v17.1.1"
args:
- /scripts/wait-for-deps
env:
@@ -10036,7 +10046,7 @@
containers:
- name: sidekiq
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v17.1.1"
securityContext:
runAsUser: 1000
env:
@@ -10170,6 +10180,7 @@
items:
- key: "secret"
path: redis/redis-password
+
- secret:
name: "gitlab-test-postgresql-password"
items:
@@ -10259,7 +10270,7 @@
namespace: gitlab
labels:
app: toolbox
- chart: toolbox-8.0.1
+ chart: toolbox-8.1.1
release: gitlab-test
heritage: Helm
@@ -10279,13 +10290,13 @@
metadata:
labels:
app: toolbox
- chart: toolbox-8.0.1
+ chart: toolbox-8.1.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: d42c3cc44187615c0aa8d82b0fb764a30985d3a47728adc4308fea2f1fc6238f
+ checksum/config: 11c2ff759d317572b19a6837d089546621ac8b8116c3a343372836b90bdec21a
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
@@ -10298,7 +10309,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -10314,7 +10325,7 @@
cpu: 50m
- name: configure
command: ['sh', '/config/configure']
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
env:
@@ -10351,7 +10362,7 @@
- /bin/bash
- -c
- sh /var/opt/gitlab/templates/configure-gsutil && while sleep 3600; do :; done
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v17.1.1"
securityContext:
runAsUser: 1000
env:
@@ -10466,6 +10477,7 @@
items:
- key: "secret"
path: redis/redis-password
+
- secret:
name: "gitlab-test-postgresql-password"
items:
@@ -10560,7 +10572,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -10581,7 +10593,7 @@
metadata:
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -10589,7 +10601,7 @@
annotations:
- checksum/config: be2b824a4c57bd4fc13eaa88ab1b01cf7afc48301f4875999df297afe4988446
+ checksum/config: b04ad92d909f66a55fa95bca50a83c50d858b98262ef59761987bc27484a7320
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
@@ -10622,7 +10634,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -10639,7 +10651,7 @@
- name: configure
command: ['sh']
args: [ '-c', 'sh -x /config-webservice/configure ; sh -x /config-workhorse/configure ; mkdir -p -m 3770 /tmp/gitlab']
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
env:
@@ -10669,7 +10681,7 @@
requests:
cpu: 50m
- name: dependencies
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.1.1
args:
- /scripts/wait-for-deps
env:
@@ -10708,7 +10720,7 @@
containers:
- name: webservice
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.1.1
securityContext:
runAsUser: 1000
ports:
@@ -10813,7 +10825,7 @@
cpu: 300m
memory: 2.5G
- name: gitlab-workhorse
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v17.1.1"
ports:
- containerPort: 8181
name: http-workhorse
@@ -10938,6 +10950,7 @@
items:
- key: "secret"
path: redis/redis-password
+
- secret:
name: "gitlab-test-postgresql-password"
items:
@@ -11092,7 +11105,7 @@
medium: "Memory"
initContainers:
- name: configure
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
command: ["sh", "/config/configure"]
volumeMounts:
- name: minio-configuration
@@ -11385,21 +11398,22 @@
securityContext:
runAsUser: 1000
fsGroup: 1000
+
affinity:
- podAntiAffinity:
- preferredDuringSchedulingIgnoredDuringExecution:
- - weight: 1
- podAffinityTerm:
- topologyKey: "kubernetes.io/hostname"
- labelSelector:
- matchLabels:
- app: registry
- release: gitlab-test
+ podAntiAffinity:
+ preferredDuringSchedulingIgnoredDuringExecution:
+ - weight: 1
+ podAffinityTerm:
+ topologyKey: "kubernetes.io/hostname"
+ labelSelector:
+ matchLabels:
+ app: registry
+ release: gitlab-test
automountServiceAccountToken: false
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -11414,7 +11428,7 @@
requests:
cpu: 50m
- name: configure
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
command: ["sh", "/config/configure"]
volumeMounts:
- name: registry-secrets
@@ -11428,7 +11442,7 @@
- name: dependencies
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.0.0-gitlab"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.5.0-gitlab"
command: ["/scripts/wait-for-deps"]
volumeMounts:
- name: registry-server-config
@@ -11442,7 +11456,7 @@
containers:
- name: registry
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.0.0-gitlab"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.5.0-gitlab"
securityContext:
runAsUser: 1000
env:
@@ -11537,7 +11551,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-8.0.1
+ chart: gitlab-shell-8.1.1
release: gitlab-test
heritage: Helm
@@ -11562,7 +11576,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-8.0.1
+ chart: kas-8.1.1
release: gitlab-test
heritage: Helm
@@ -11587,7 +11601,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-8.0.1
+ chart: sidekiq-8.1.1
release: gitlab-test
heritage: Helm
@@ -11612,7 +11626,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -11663,7 +11677,7 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-8.0.1
+ chart: gitaly-8.1.1
release: gitlab-test
heritage: Helm
@@ -11683,13 +11697,13 @@
labels:
storage: default
app: gitaly
- chart: gitaly-8.0.1
+ chart: gitaly-8.1.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: a8c289d1faac3674466da786e462e1fd89f589e603f65fcb2b0a5cfe02dba6f2
+ checksum/config: cbc9e5133072ecb153b2ace9190ef5bd60649b1e5747a7a575ca263346abe21f
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
gitlab.com/prometheus_scrape: "true"
@@ -11704,7 +11718,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -11720,7 +11734,7 @@
cpu: 50m
- name: configure
command: ['sh', '/config/configure']
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
env:
@@ -11758,7 +11772,7 @@
containers:
- name: gitaly
- image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v17.1.1"
securityContext:
runAsUser: 1000
ports:
@@ -11872,7 +11886,7 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-8.0.1
+ chart: praefect-8.1.1
release: gitlab-test
heritage: Helm
@@ -11889,13 +11903,13 @@
metadata:
labels:
app: praefect
- chart: praefect-8.0.1
+ chart: praefect-8.1.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 2ebc4f8cce230917ae4838e5c12a2f70a34c116b483c588956b902508dce5c10
+ checksum/config: 1900ce9a1d377e830dd408bfa81d9bce411ba564362a78ddba26cd2c9596c59c
gitlab.com/prometheus_scrape: "true"
gitlab.com/prometheus_port: "9236"
gitlab.com/prometheus_path: /metrics
@@ -11919,7 +11933,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -11934,7 +11948,7 @@
{}
- name: configure
command: ['sh', '/config/configure']
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
env:
@@ -11958,7 +11972,7 @@
containers:
- name: praefect
- image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v17.1.1"
ports:
- containerPort: 8075
- containerPort: 9236
@@ -12449,7 +12463,7 @@
apiVersion: batch/v1
kind: Job
metadata:
- name: gitlab-test-issuer-19227ba
+ name: gitlab-test-issuer-748f796
namespace: gitlab
labels:
app: certmanager-issuer
@@ -12474,7 +12488,7 @@
containers:
- name: create-issuer
- image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v17.1.1
command: ['/bin/bash', '/scripts/create-issuer', '/scripts/issuer.yml']
volumeMounts:
- name: scripts
@@ -12491,11 +12505,11 @@
apiVersion: batch/v1
kind: Job
metadata:
- name: gitlab-test-migrations-a3618e2
+ name: gitlab-test-migrations-02e1a9f
namespace: gitlab
labels:
app: migrations
- chart: migrations-8.0.1
+ chart: migrations-8.1.1
release: gitlab-test
heritage: Helm
@@ -12506,7 +12520,7 @@
metadata:
labels:
app: migrations
- chart: migrations-8.0.1
+ chart: migrations-8.1.1
release: gitlab-test
heritage: Helm
@@ -12521,7 +12535,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -12537,7 +12551,7 @@
cpu: 50m
- name: configure
command: ['sh', '/config/configure']
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
env:
@@ -12561,7 +12575,7 @@
containers:
- name: migrations
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-toolbox-ce:v17.1.1"
args:
- /scripts/wait-for-deps
- /scripts/db-migrate
@@ -12640,6 +12654,7 @@
items:
- key: "secret"
path: redis/redis-password
+
- secret:
name: "gitlab-test-postgresql-password"
items:
@@ -12675,7 +12690,7 @@
apiVersion: batch/v1
kind: Job
metadata:
- name: gitlab-test-minio-create-buckets-1dade5f
+ name: gitlab-test-minio-create-buckets-63df52f
namespace: gitlab
labels:
app: minio
@@ -12729,7 +12744,7 @@
apiVersion: batch/v1
kind: Job
metadata:
- name: gitlab-test-registry-migrations-0ebc9d4
+ name: gitlab-test-registry-migrations-09c2818
namespace: gitlab
labels:
app: registry
@@ -12758,7 +12773,7 @@
initContainers:
- name: certificates
- image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/certificates:v17.1.1
env:
@@ -12773,7 +12788,7 @@
requests:
cpu: 50m
- name: configure
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
command: ['sh', '/config/configure']
volumeMounts:
- name: registry-secrets
@@ -12790,7 +12805,7 @@
containers:
- name: migrations
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.0.0-gitlab"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v4.5.0-gitlab"
args:
- /scripts/wait-for-deps
- /scripts/db-migrate
@@ -12869,7 +12884,7 @@
namespace: gitlab
labels:
app: kas
- chart: kas-8.0.1
+ chart: kas-8.1.1
release: gitlab-test
heritage: Helm
@@ -12907,7 +12922,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
gitlab.com/webservice-name: default
@@ -13020,9 +13035,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
annotations:
cert-manager.io/inject-ca-from-secret: "gitlab/gitlab-test-certmanager-webhook-ca"
webhooks:
@@ -13063,9 +13078,9 @@
app.kubernetes.io/name: webhook
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "webhook"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
annotations:
cert-manager.io/inject-ca-from-secret: "gitlab/gitlab-test-certmanager-webhook-ca"
webhooks:
@@ -13121,9 +13136,9 @@
app.kubernetes.io/name: startupapicheck
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "startupapicheck"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
---
# Source: gitlab/templates/shared-secrets/rbac-config.yaml
apiVersion: v1
@@ -13133,7 +13148,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-8.0.1
+ chart: gitlab-8.1.1
release: gitlab-test
heritage: Helm
@@ -13150,7 +13165,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-8.0.1
+ chart: gitlab-8.1.1
release: gitlab-test
heritage: Helm
@@ -13190,7 +13205,7 @@
kubectl --namespace=$namespace label \
--overwrite \
- secret $secret_name app=gitlab chart=gitlab-8.0.1 release=gitlab-test heritage=Helm
+ secret $secret_name app=gitlab chart=gitlab-8.1.1 release=gitlab-test heritage=Helm
}
# Args: secretname, args
@@ -13362,7 +13377,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-8.0.1
+ chart: gitlab-8.1.1
release: gitlab-test
heritage: Helm
@@ -13470,9 +13485,9 @@
app.kubernetes.io/name: startupapicheck
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "startupapicheck"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
annotations:
helm.sh/hook: post-install
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
@@ -13490,7 +13505,7 @@
namespace: gitlab
labels:
app: shared-secrets
- chart: shared-secrets-8.0.1
+ chart: shared-secrets-8.1.1
release: gitlab-test
heritage: Helm
@@ -13514,9 +13529,9 @@
app.kubernetes.io/name: startupapicheck
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "startupapicheck"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
annotations:
helm.sh/hook: post-install
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
@@ -13538,7 +13553,7 @@
namespace: gitlab
labels:
app: shared-secrets
- chart: shared-secrets-8.0.1
+ chart: shared-secrets-8.1.1
release: gitlab-test
heritage: Helm
@@ -13559,21 +13574,21 @@
apiVersion: v1
kind: Pod
metadata:
- name: gitlab-test-webservice-test-runner-j5l16
+ name: gitlab-test-webservice-test-runner-soppz
namespace: gitlab
annotations:
"helm.sh/hook": test
"helm.sh/hook-delete-policy": hook-succeeded,hook-failed,before-hook-creation
labels:
app: webservice
- chart: webservice-8.0.1
+ chart: webservice-8.1.1
release: gitlab-test
heritage: Helm
spec:
containers:
- name: test-runner
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v17.1.1
command: ['sh', '/tests/test_login']
volumeMounts:
- name: tests
@@ -13605,9 +13620,9 @@
app.kubernetes.io/name: startupapicheck
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "startupapicheck"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
annotations:
helm.sh/hook: post-install
helm.sh/hook-delete-policy: before-hook-creation,hook-succeeded
@@ -13621,9 +13636,9 @@
app.kubernetes.io/name: startupapicheck
app.kubernetes.io/instance: gitlab-test
app.kubernetes.io/component: "startupapicheck"
- app.kubernetes.io/version: "v1.12.10"
+ app.kubernetes.io/version: "v1.12.11"
app.kubernetes.io/managed-by: Helm
- helm.sh/chart: certmanager-v1.12.10
+ helm.sh/chart: certmanager-v1.12.11
spec:
restartPolicy: OnFailure
serviceAccountName: gitlab-test-certmanager-startupapicheck
@@ -13633,7 +13648,7 @@
type: RuntimeDefault
containers:
- name: certmanager-startupapicheck
- image: "quay.io/jetstack/cert-manager-ctl:v1.12.10"
+ image: "quay.io/jetstack/cert-manager-ctl:v1.12.11"
imagePullPolicy: IfNotPresent
args:
- check
@@ -13651,11 +13666,11 @@
apiVersion: batch/v1
kind: Job
metadata:
- name: gitlab-test-shared-secrets-f8942da
+ name: gitlab-test-shared-secrets-07a6632
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-8.0.1
+ chart: gitlab-8.1.1
release: gitlab-test
heritage: Helm
@@ -13667,7 +13682,7 @@
metadata:
labels:
app: gitlab
- chart: gitlab-8.0.1
+ chart: gitlab-8.1.1
release: gitlab-test
heritage: Helm
@@ -13683,7 +13698,7 @@
containers:
- name: gitlab
- image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v17.0.1
+ image: registry.gitlab.com/gitlab-org/build/cng/kubectl:v17.1.1
command: ['/bin/bash', '/scripts/generate-secrets']
volumeMounts:
- name: scripts
@@ -13708,7 +13723,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-8.0.1
+ chart: gitlab-8.1.1
release: gitlab-test
heritage: Helm
@@ -13733,13 +13748,13 @@
containers:
- name: run-check
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.0.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-base:v17.1.1"
command: ['/bin/sh', '/scripts/runcheck']
env:
- name: GITLAB_VERSION
- value: 'v17.0.1'
+ value: 'v17.1.1'
- name: CHART_VERSION
- value: '8.0.1'
+ value: '8.1.1'
volumeMounts:
- name: chart-info
mountPath: /chart-info