WIP: A new version of gitlab (13.9.0) is available
current diff:
--- current-deployment.yaml
+++ future-deployment.yaml
@@ -7,9 +7,10 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-4.8.4
+ chart: gitaly-4.9.0
release: gitlab-test
heritage: Helm
+
storage: default
spec:
maxUnavailable: 1
@@ -27,7 +28,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.0
release: gitlab-test
heritage: Helm
@@ -46,9 +47,10 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.0
release: gitlab-test
heritage: Helm
+
spec:
maxUnavailable: 1
selector:
@@ -64,7 +66,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.0
release: gitlab-test
heritage: Helm
@@ -84,9 +86,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.0
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
spec:
maxUnavailable: 1
@@ -152,6 +155,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
spec:
maxUnavailable: 1
selector:
@@ -313,17 +317,18 @@
ingress:
class: nginx
---
-# Source: gitlab/charts/gitlab/charts/gitaly/templates/configmap.yml
+# Source: gitlab/charts/gitlab/charts/gitaly/templates/configmap-with-praefect.yml
apiVersion: v1
kind: ConfigMap
metadata:
- name: gitlab-test-gitaly
+ name: gitlab-test-gitaly-praefect
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-4.8.4
+ chart: gitaly-4.9.0
release: gitlab-test
heritage: Helm
+
data:
configure: |
set -e
@@ -342,7 +347,7 @@
# If metrics collection is enabled, inform gitaly about that
prometheus_listen_addr = "localhost:9236"
-
+
<% @storages = [ "gitlab-test-gitaly-default-0", "gitlab-test-gitaly-default-1", "gitlab-test-gitaly-default-2", ] %>
<% @hostname=ENV['HOSTNAME'].strip %>
@@ -389,7 +394,6 @@
[hooks]
# directory containing custom hooks
custom_hooks_dir = "/home/git/custom_hooks"
-# Leave this here - This line denotes end of block to the parser.
---
# Source: gitlab/charts/gitlab/charts/gitlab-exporter/templates/configmap.yaml
apiVersion: v1
@@ -399,7 +403,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-4.8.4
+ chart: gitlab-exporter-4.9.0
release: gitlab-test
heritage: Helm
@@ -441,8 +445,16 @@
redis_url: redis://:<%= ERB::Util::url_encode(File.read("/etc/gitlab/redis/redis-password").strip) %>@gitlab-test-redis-master.gitlab.svc:6379
redis_enable_client: false
+ ruby: &ruby
+ methods:
+ - probe_gc
+ opts:
+ quantiles: false
+
metrics:
multiple: true
+ ruby:
+ <<: *ruby
sidekiq:
<<: *sidekiq
ci_builds:
@@ -481,7 +493,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.0
release: gitlab-test
heritage: Helm
@@ -514,7 +526,7 @@
# Logging
#SyslogFacility AUTH
- #LogLevel INFO
+ LogLevel ERROR
# Authentication:
@@ -641,7 +653,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.0
release: gitlab-test
heritage: Helm
@@ -655,7 +667,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -683,9 +695,6 @@
# Default is gitlab-shell.log in the root directory.
log_file: "/var/log/gitlab-shell/gitlab-shell.log"
- # Log level. INFO by default
- log_level: INFO
-
log_format: text
# Audit usernames.
@@ -704,7 +713,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.0
release: gitlab-test
heritage: Helm
@@ -719,10 +728,12 @@
namespace: gitlab
labels:
app: migrations
- chart: migrations-4.8.4
+ chart: migrations-4.9.0
release: gitlab-test
heritage: Helm
+
data:
+ pages_redirect_uri: https://projects.pages.test.freedesktop.org/auth
installation_type: |
gitlab-helm-chart
database.yml.erb: |
@@ -766,6 +777,7 @@
default:
path: /var/opt/gitlab/repo
gitaly_address: tcp://gitlab-test-praefect.gitlab.svc:8075
+ gitaly_token: "<%= File.read('/etc/gitlab/gitaly/gitaly_token_praefect').strip.dump[1..-2] %>"
configure: |
set -e
@@ -776,7 +788,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -795,9 +807,10 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.0
release: gitlab-test
heritage: Helm
+
data:
configure: |
set -e
@@ -856,9 +869,10 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.0
release: gitlab-test
heritage: Helm
+
data:
praefect-start: |
set -e
@@ -876,7 +890,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.0
release: gitlab-test
heritage: Helm
@@ -902,7 +916,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.0
release: gitlab-test
heritage: Helm
@@ -946,6 +960,7 @@
https: true
max_request_duration_seconds: 57
impersonation_enabled:
+ application_settings_cache_seconds: 60
usage_ping_enabled: true
seat_link_enabled: true
default_can_create_group: false
@@ -1121,6 +1136,7 @@
default:
path: /var/opt/gitlab/repo
gitaly_address: tcp://gitlab-test-praefect.gitlab.svc:8075
+ gitaly_token: "<%= File.read('/etc/gitlab/gitaly/gitaly_token_praefect').strip.dump[1..-2] %>"
backup:
path: "tmp/backups" # Relative paths are relative to Rails.root (default: tmp/backups/)
@@ -1151,7 +1167,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1170,9 +1186,10 @@
namespace: gitlab
labels:
app: task-runner
- chart: task-runner-4.8.4
+ chart: task-runner-4.9.0
release: gitlab-test
heritage: Helm
+
data:
database.yml.erb: |
production:
@@ -1211,6 +1228,7 @@
https: true
max_request_duration_seconds: 57
impersonation_enabled:
+ application_settings_cache_seconds: 60
usage_ping_enabled: true
seat_link_enabled: true
default_can_create_group: false
@@ -1374,6 +1392,7 @@
default:
path: /var/opt/gitlab/repo
gitaly_address: tcp://gitlab-test-praefect.gitlab.svc:8075
+ gitaly_token: "<%= File.read('/etc/gitlab/gitaly/gitaly_token_praefect').strip.dump[1..-2] %>"
backup:
path: "tmp/backups" # Relative paths are relative to Rails.root (default: tmp/backups/)
@@ -1401,7 +1420,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1427,9 +1446,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.0
release: gitlab-test
heritage: Helm
+
data:
installation_type: |
gitlab-helm-chart
@@ -1470,6 +1490,7 @@
https: true
max_request_duration_seconds: 57
impersonation_enabled:
+ application_settings_cache_seconds: 60
usage_ping_enabled: true
seat_link_enabled: true
default_can_create_group: false
@@ -1626,6 +1647,7 @@
default:
path: /var/opt/gitlab/repo
gitaly_address: tcp://gitlab-test-praefect.gitlab.svc:8075
+ gitaly_token: "<%= File.read('/etc/gitlab/gitaly/gitaly_token_praefect').strip.dump[1..-2] %>"
backup:
path: "tmp/backups" # Relative paths are relative to Rails.root (default: tmp/backups/)
@@ -1676,7 +1698,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1691,7 +1713,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.0
release: gitlab-test
heritage: Helm
data:
@@ -2237,14 +2259,48 @@
rules: |
{}
---
+# Source: gitlab/charts/redis/templates/configmap-scripts.yaml
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: gitlab-test-redis-scripts
+ namespace: "gitlab"
+ labels:
+ app: redis
+ chart: redis-11.3.4
+ heritage: Helm
+ release: gitlab-test
+data:
+ start-master.sh: |
+ #!/bin/bash
+ useradd redis
+ chown -R redis /data
+ if [[ -n $REDIS_PASSWORD_FILE ]]; then
+ password_aux=`cat ${REDIS_PASSWORD_FILE}`
+ export REDIS_PASSWORD=$password_aux
+ fi
+ if [[ ! -f /opt/bitnami/redis/etc/master.conf ]];then
+ cp /opt/bitnami/redis/mounted-etc/master.conf /opt/bitnami/redis/etc/master.conf
+ fi
+ if [[ ! -f /opt/bitnami/redis/etc/redis.conf ]];then
+ cp /opt/bitnami/redis/mounted-etc/redis.conf /opt/bitnami/redis/etc/redis.conf
+ fi
+ ARGS=("--port" "${REDIS_PORT}")
+ ARGS+=("--requirepass" "${REDIS_PASSWORD}")
+ ARGS+=("--masterauth" "${REDIS_PASSWORD}")
+ ARGS+=("--include" "/opt/bitnami/redis/etc/redis.conf")
+ ARGS+=("--include" "/opt/bitnami/redis/etc/master.conf")
+ exec /run.sh "${ARGS[@]}"
+---
# Source: gitlab/charts/redis/templates/configmap.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: gitlab-test-redis
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
heritage: Helm
release: gitlab-test
data:
@@ -2269,19 +2325,22 @@
kind: ConfigMap
metadata:
name: gitlab-test-redis-health
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
heritage: Helm
release: gitlab-test
data:
ping_readiness_local.sh: |-
+ #!/bin/bash
password_aux=`cat ${REDIS_PASSWORD_FILE}`
export REDIS_PASSWORD=$password_aux
+ no_auth_warning=$([[ "$(redis-cli --version)" =~ (redis-cli 5.*) ]] && echo --no-auth-warning)
response=$(
- timeout -s 9 $1 \
+ timeout -s 3 $1 \
redis-cli \
- -a $REDIS_PASSWORD --no-auth-warning \
+ -a $REDIS_PASSWORD $no_auth_warning \
-h localhost \
-p $REDIS_PORT \
ping
@@ -2291,12 +2350,14 @@
exit 1
fi
ping_liveness_local.sh: |-
+ #!/bin/bash
password_aux=`cat ${REDIS_PASSWORD_FILE}`
export REDIS_PASSWORD=$password_aux
+ no_auth_warning=$([[ "$(redis-cli --version)" =~ (redis-cli 5.*) ]] && echo --no-auth-warning)
response=$(
- timeout -s 9 $1 \
+ timeout -s 3 $1 \
redis-cli \
- -a $REDIS_PASSWORD --no-auth-warning \
+ -a $REDIS_PASSWORD $no_auth_warning \
-h localhost \
-p $REDIS_PORT \
ping
@@ -2306,12 +2367,14 @@
exit 1
fi
ping_readiness_master.sh: |-
+ #!/bin/bash
password_aux=`cat ${REDIS_MASTER_PASSWORD_FILE}`
export REDIS_MASTER_PASSWORD=$password_aux
- response=$(
- timeout -s 9 $1 \
+ no_auth_warning=$([[ "$(redis-cli --version)" =~ (redis-cli 5.*) ]] && echo --no-auth-warning)
+ response=$(
+ timeout -s 3 $1 \
redis-cli \
- -a $REDIS_MASTER_PASSWORD --no-auth-warning \
+ -a $REDIS_MASTER_PASSWORD $no_auth_warning \
-h $REDIS_MASTER_HOST \
-p $REDIS_MASTER_PORT_NUMBER \
ping
@@ -2321,12 +2384,14 @@
exit 1
fi
ping_liveness_master.sh: |-
+ #!/bin/bash
password_aux=`cat ${REDIS_MASTER_PASSWORD_FILE}`
export REDIS_MASTER_PASSWORD=$password_aux
+ no_auth_warning=$([[ "$(redis-cli --version)" =~ (redis-cli 5.*) ]] && echo --no-auth-warning)
response=$(
- timeout -s 9 $1 \
+ timeout -s 3 $1 \
redis-cli \
- -a $REDIS_MASTER_PASSWORD --no-auth-warning \
+ -a $REDIS_MASTER_PASSWORD $no_auth_warning \
-h $REDIS_MASTER_HOST \
-p $REDIS_MASTER_PORT_NUMBER \
ping
@@ -2359,6 +2424,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
data:
configure: |-
if [ -e /config/accesskey ] ; then
@@ -2468,12 +2534,12 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-4.8.4
+ chart: gitlab-4.9.0
release: gitlab-test
heritage: Helm
data:
- gitlabVersion: "13.8.4"
- gitlabChartVersion: "4.8.4"
+ gitlabVersion: "13.9.0"
+ gitlabChartVersion: "4.9.0"
---
# Source: gitlab/templates/initdb-configmap.yaml
apiVersion: v1
@@ -2483,7 +2549,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-4.8.4
+ chart: gitlab-4.9.0
release: gitlab-test
heritage: Helm
data:
@@ -10729,10 +10795,11 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-4.8.4
+ chart: gitaly-4.9.0
release: gitlab-test
heritage: Helm
+
storage: default
annotations:
gitlab.com/prometheus_scrape: "true"
@@ -10762,7 +10829,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-4.8.4
+ chart: gitlab-exporter-4.9.0
release: gitlab-test
heritage: Helm
@@ -10788,7 +10855,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.0
release: gitlab-test
heritage: Helm
@@ -10814,10 +10881,11 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.0
release: gitlab-test
heritage: Helm
+
annotations:
gitlab.com/prometheus_scrape: "true"
gitlab.com/prometheus_port: ""
@@ -10848,10 +10916,11 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.0
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
annotations:
@@ -11120,18 +11189,19 @@
kind: Service
metadata:
name: gitlab-test-redis-headless
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
heritage: Helm
spec:
type: ClusterIP
clusterIP: None
ports:
- - name: redis
- port: 6379
- targetPort: redis
+ - name: redis
+ port: 6379
+ targetPort: redis
selector:
app: redis
release: gitlab-test
@@ -11141,17 +11211,20 @@
kind: Service
metadata:
name: gitlab-test-redis-metrics
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
heritage: Helm
+ app.kubernetes.io/component: "metrics"
spec:
type: ClusterIP
+
ports:
- - name: metrics
- port: 9121
- targetPort: metrics
+ - name: metrics
+ port: 9121
+ targetPort: metrics
selector:
app: redis
release: gitlab-test
@@ -11161,17 +11234,18 @@
kind: Service
metadata:
name: gitlab-test-redis-master
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
heritage: Helm
spec:
type: ClusterIP
ports:
- - name: redis
- port: 6379
- targetPort: redis
+ - name: redis
+ port: 6379
+ targetPort: redis
selector:
app: redis
release: gitlab-test
@@ -11188,6 +11262,8 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
+
annotations:
spec:
@@ -11370,7 +11446,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-4.8.4
+ chart: gitlab-exporter-4.9.0
release: gitlab-test
heritage: Helm
@@ -11388,13 +11464,13 @@
app: gitlab-exporter
release: gitlab-test
app: gitlab-exporter
- chart: gitlab-exporter-4.8.4
+ chart: gitlab-exporter-4.9.0
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 7071a90a2c7703be9eefe3ceca344771e5317ce0d9f55201d4edc7c2073232b5
+ checksum/config: b93c78334302f2d138eddfe98ccb33bd2d79d0a3b88a053c5df6079be7bd94e4
gitlab.com/prometheus_path: /metrics
gitlab.com/prometheus_port: "9168"
gitlab.com/prometheus_scrape: "true"
@@ -11423,6 +11499,14 @@
env:
+ - name: MALLOC_CONF
+ value: "dirty_decay_ms:0,muzzy_decay_ms:0"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MAX_RATIO
+ value: "0.111"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MIN_RATIO
+ value: "0.055"
+ - name: RUBY_GC_HEAP_INIT_SLOTS
+ value: "80000"
volumeMounts:
- name: etc-ssl-certs
mountPath: /etc/ssl/certs
@@ -11435,6 +11519,14 @@
image: "busybox:latest"
env:
+ - name: MALLOC_CONF
+ value: "dirty_decay_ms:0,muzzy_decay_ms:0"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MAX_RATIO
+ value: "0.111"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MIN_RATIO
+ value: "0.055"
+ - name: RUBY_GC_HEAP_INIT_SLOTS
+ value: "80000"
volumeMounts:
@@ -11454,7 +11546,7 @@
containers:
- name: gitlab-exporter
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:8.0.0"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:10.0.0"
env:
- name: CONFIG_TEMPLATE_DIRECTORY
@@ -11462,6 +11554,14 @@
- name: CONFIG_DIRECTORY
value: '/etc/gitlab-exporter'
+ - name: MALLOC_CONF
+ value: "dirty_decay_ms:0,muzzy_decay_ms:0"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MAX_RATIO
+ value: "0.111"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MIN_RATIO
+ value: "0.055"
+ - name: RUBY_GC_HEAP_INIT_SLOTS
+ value: "80000"
ports:
- containerPort: 9168
name: gitlab-exporter
@@ -11533,11 +11633,10 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.0
release: gitlab-test
heritage: Helm
-
annotations:
spec:
@@ -11549,14 +11648,14 @@
metadata:
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.0
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 47f143c9337b07e159b2342737b95fab14851328bfd56eb08b4421654dbac4c9
- checksum/config-sshd: aa42a5bacbed3dcc2fcd027128447ee473e212fa09301bd91c0d85af54f397ca
+ checksum/config: b69698fc016612f0502372a64b5cd1c70cee6813ade92b0c6b17ee2058f142df
+ checksum/config-sshd: 72c92aaa34408aac9d5577368efa0c1d20d7915264570ac93c3400ed30c282f1
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
initContainers:
@@ -11609,7 +11708,7 @@
containers:
- name: gitlab-shell
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v13.15.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v13.16.1"
ports:
- containerPort: 2222
@@ -11695,7 +11794,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.0
release: gitlab-test
heritage: Helm
@@ -11715,15 +11814,15 @@
release: gitlab-test
queue-pod-name: native-chart
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.0
release: gitlab-test
heritage: Helm
annotations:
- checksum/configmap: 7c8b50e4150864fb3021c4dccad25d57a5a639f62165da71c3cc20e93f528f84
+ checksum/configmap: 0d096c15d23a68423b2d501828b1b485019e6814bb1b6c94324b8d406a26bd3a
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
- checksum/configmap-pod: ce2a219572948c68759126b77d130dfb790050458402ef2e586cbcf4f6a6abe3
+ checksum/configmap-pod: 9a7272e63cfccf02b116200d0646c780e9fd0a9819c6e0eb4d81711f7849114a
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
gitlab.com/prometheus_port: "3807"
@@ -11782,7 +11881,7 @@
requests:
cpu: 50m
- name: dependencies
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v13.9.0"
args:
- /scripts/wait-for-deps
@@ -11819,7 +11918,7 @@
containers:
- name: sidekiq
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v13.9.0"
env:
- name: prometheus_multiproc_dir
@@ -11936,10 +12035,15 @@
- key: secrets.yml
path: rails-secrets/secrets.yml
- secret:
- name: "gitlab-test-praefect-secret"
+ name: "gitlab-test-gitaly-secret"
items:
- key: "token"
path: gitaly/gitaly_token
+ - secret:
+ name: "gitlab-test-praefect-secret"
+ items:
+ - key: "token"
+ path: gitaly/gitaly_token_praefect
- secret:
@@ -12000,9 +12104,10 @@
namespace: gitlab
labels:
app: task-runner
- chart: task-runner-4.8.4
+ chart: task-runner-4.9.0
release: gitlab-test
heritage: Helm
+
annotations:
spec:
@@ -12018,10 +12123,13 @@
metadata:
labels:
app: task-runner
+ chart: task-runner-4.9.0
release: gitlab-test
+ heritage: Helm
+
annotations:
- checksum/config: 5a3a8ee882d011d6bdaf440f438b0d00d2b43cf0476ccf2cd1914d3363f57ab8
+ checksum/config: 9902c7622b70595a2653bfc424d4592d56128d8fee441c154ad1c4451cb244f4
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
securityContext:
@@ -12080,7 +12188,7 @@
- /bin/bash
- -c
- sh /var/opt/gitlab/templates/configure-gsutil && while sleep 3600; do :; done
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-task-runner-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-task-runner-ce:v13.9.0"
env:
- name: ARTIFACTS_BUCKET_NAME
@@ -12163,11 +12271,15 @@
- key: "secret"
path: shell/.gitlab_shell_secret
- secret:
-
- name: "gitlab-test-praefect-secret"
+ name: "gitlab-test-gitaly-secret"
items:
- key: "token"
path: gitaly/gitaly_token
+ - secret:
+ name: "gitlab-test-praefect-secret"
+ items:
+ - key: "token"
+ path: gitaly/gitaly_token_praefect
- secret:
@@ -12238,9 +12350,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.0
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
annotations:
@@ -12257,10 +12370,15 @@
labels:
app: webservice
release: gitlab-test
+ app: webservice
+ chart: webservice-4.9.0
+ release: gitlab-test
+ heritage: Helm
+
gitlab.com/webservice-name: default
annotations:
- checksum/config: a90e2f31909ceb9df1cd9da24baaac3f91791f63b186e6fc5cf55e6e8055a9d1
+ checksum/config: a18b596be15c0a4632309429ae2459181a9f3db4cf87a448d96ccf54f9095f44
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
@@ -12332,7 +12450,7 @@
requests:
cpu: 50m
- name: dependencies
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.8.4
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.9.0
args:
- /scripts/wait-for-deps
@@ -12365,7 +12483,7 @@
containers:
- name: webservice
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.8.4
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.9.0
ports:
- containerPort: 8080
@@ -12459,7 +12577,7 @@
cpu: 300m
memory: 2.5G
- name: gitlab-workhorse
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v13.9.0"
ports:
- containerPort: 8181
@@ -12547,11 +12665,15 @@
- key: "secret"
path: shell/.gitlab_shell_secret
- secret:
-
- name: "gitlab-test-praefect-secret"
+ name: "gitlab-test-gitaly-secret"
items:
- key: "token"
path: gitaly/gitaly_token
+ - secret:
+ name: "gitlab-test-praefect-secret"
+ items:
+ - key: "token"
+ path: gitaly/gitaly_token_praefect
- secret:
@@ -13009,6 +13131,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
annotations:
spec:
@@ -13021,10 +13144,13 @@
metadata:
labels:
app: registry
+ chart: registry-0.5.0
release: gitlab-test
+ heritage: Helm
+
annotations:
- checksum/configmap: afa1ee2027e9e2debb162b15851f2822ae2c28beeeae5184556544d684e68ef6
+ checksum/configmap: 6431837f258b75089566b197b4aba630c2a5a3974754c590ac6788f80ace317b
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
securityContext:
@@ -13068,7 +13194,7 @@
cpu: 50m
containers:
- name: registry
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v2.13.1-gitlab"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v3.0.0-gitlab"
imagePullPolicy: "IfNotPresent"
volumeMounts:
- name: registry-server-config
@@ -13137,7 +13263,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.0
release: gitlab-test
heritage: Helm
@@ -13162,7 +13288,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.0
release: gitlab-test
heritage: Helm
@@ -13187,9 +13313,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.0
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
spec:
scaleTargetRef:
@@ -13215,6 +13342,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
spec:
scaleTargetRef:
apiVersion: apps/v1
@@ -13236,6 +13364,11 @@
namespace: gitlab
labels:
app: gitaly
+ chart: gitaly-4.9.0
+ release: gitlab-test
+ heritage: Helm
+
+ app: gitaly
chart: gitaly
release: gitlab-test
heritage: Helm
@@ -13253,12 +13386,15 @@
template:
metadata:
labels:
+ storage: default
app: gitaly
+ chart: gitaly-4.9.0
release: gitlab-test
- storage: default
+ heritage: Helm
+
annotations:
- checksum/config: ce0d44399f6448adae934ac6216b38730d1bd66b011ab1bbb28c9c75faa40932
+ checksum/config: 95afbd3bd3ab41ed2f18d41b99c93a2ec1adcf232ad7d914c9a76a3a168e6b9d
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
spec:
@@ -13314,7 +13450,7 @@
containers:
- name: gitaly
- image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v13.9.0"
ports:
- containerPort: 8075
@@ -13366,7 +13502,7 @@
- name: gitaly-config
configMap:
- name: gitlab-test-gitaly
+ name: gitlab-test-gitaly-praefect
- name: gitaly-secrets
emptyDir:
medium: "Memory"
@@ -13415,9 +13551,10 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.0
release: gitlab-test
heritage: Helm
+
spec:
selector:
matchLabels:
@@ -13430,10 +13567,13 @@
metadata:
labels:
app: praefect
+ chart: praefect-4.9.0
release: gitlab-test
+ heritage: Helm
+
annotations:
- checksum/config: ce52c1127ea47e750485a18d845896410475128c74b219314f91d13fd89fd46f
+ checksum/config: 8c57ede837bfe74a04ba13946aecd21b555db4b552febf022dda9cb1a500079c
spec:
affinity:
podAntiAffinity:
@@ -13483,7 +13623,7 @@
containers:
- name: praefect
- image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v13.9.0"
ports:
- containerPort: 8075
@@ -13731,9 +13871,10 @@
kind: StatefulSet
metadata:
name: gitlab-test-redis-master
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
heritage: Helm
spec:
@@ -13747,135 +13888,129 @@
metadata:
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
role: master
annotations:
- checksum/health: 358f0184ff0b65182c27b3bca5d6265460c730f961d24f748421e343c3a7caf0
- checksum/configmap: b2aa2cc9e60abcd7bd7f98940b7a191cd7d1f71f53c8790f632a89522da1e9fe
+ checksum/health: 7410463162a06af4ffd48e4087e1d3909e7e11d2216f0471b41d493368f1c221
+ checksum/configmap: 03bc347fc4b0d4014d2b71c54277982d8120e77b4ac61e4a303440376e39394f
checksum/secret: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
co.elastic.logs/module: redis
prometheus.io/port: "9121"
prometheus.io/scrape: "true"
- spec:
+ spec:
+
securityContext:
fsGroup: 1001
- serviceAccountName: "default"
+ serviceAccountName: default
containers:
- - name: gitlab-test-redis
- image: "docker.io/bitnami/redis:5.0.7-debian-9-r50"
- imagePullPolicy: "IfNotPresent"
- securityContext:
- runAsUser: 1001
- command:
- - /bin/bash
- - -c
- - |
- if [[ -n $REDIS_PASSWORD_FILE ]]; then
- password_aux=`cat ${REDIS_PASSWORD_FILE}`
- export REDIS_PASSWORD=$password_aux
- fi
- if [[ ! -f /opt/bitnami/redis/etc/master.conf ]];then
- cp /opt/bitnami/redis/mounted-etc/master.conf /opt/bitnami/redis/etc/master.conf
- fi
- if [[ ! -f /opt/bitnami/redis/etc/redis.conf ]];then
- cp /opt/bitnami/redis/mounted-etc/redis.conf /opt/bitnami/redis/etc/redis.conf
- fi
- ARGS=("--port" "${REDIS_PORT}")
- ARGS+=("--requirepass" "${REDIS_PASSWORD}")
- ARGS+=("--masterauth" "${REDIS_PASSWORD}")
- ARGS+=("--include" "/opt/bitnami/redis/etc/redis.conf")
- ARGS+=("--include" "/opt/bitnami/redis/etc/master.conf")
- /run.sh ${ARGS[@]}
- env:
- - name: REDIS_REPLICATION_MODE
- value: master
- - name: REDIS_PASSWORD_FILE
- value: "/opt/bitnami/redis/secrets/redis-password"
- - name: REDIS_PORT
- value: "6379"
- ports:
- name: redis
- containerPort: 6379
- livenessProbe:
- initialDelaySeconds: 5
- periodSeconds: 5
- timeoutSeconds: 5
- successThreshold: 1
- failureThreshold: 5
- exec:
- command:
- - sh
+ image: docker.io/bitnami/redis:6.0.9-debian-10-r0
+ imagePullPolicy: "IfNotPresent"
+ securityContext:
+ runAsUser: 1001
+ command:
+ - /bin/bash
- -c
- - /health/ping_liveness_local.sh 5
- readinessProbe:
- initialDelaySeconds: 5
- periodSeconds: 5
- timeoutSeconds: 1
- successThreshold: 1
- failureThreshold: 5
- exec:
- command:
- - sh
+ - /opt/bitnami/scripts/start-scripts/start-master.sh
+ env:
+ - name: REDIS_REPLICATION_MODE
+ value: master
+ - name: REDIS_PASSWORD_FILE
+ value: "/opt/bitnami/redis/secrets/redis-password"
+ - name: REDIS_TLS_ENABLED
+ value: "no"
+ - name: REDIS_PORT
+ value: "6379"
+ ports:
+ - name: redis
+ containerPort: 6379
+ livenessProbe:
+ initialDelaySeconds: 5
+ periodSeconds: 5
+ # One second longer than command timeout should prevent generation of zombie processes.
+ timeoutSeconds: 6
+ successThreshold: 1
+ failureThreshold: 5
+ exec:
+ command:
+ - sh
+ - -c
+ - /health/ping_liveness_local.sh 5
+ readinessProbe:
+ initialDelaySeconds: 5
+ periodSeconds: 5
+ timeoutSeconds: 2
+ successThreshold: 1
+ failureThreshold: 5
+ exec:
+ command:
+ - sh
+ - -c
+ - /health/ping_readiness_local.sh 1
+ resources:
+ requests:
+ cpu: "2"
+ memory: 8Gi
+ volumeMounts:
+ - name: start-scripts
+ mountPath: /opt/bitnami/scripts/start-scripts
+ - name: health
+ mountPath: /health
+ - name: redis-password
+ mountPath: /opt/bitnami/redis/secrets/
+ - name: redis-data
+ mountPath: /data
+ subPath:
+ - name: config
+ mountPath: /opt/bitnami/redis/mounted-etc
+ - name: redis-tmp-conf
+ mountPath: /opt/bitnami/redis/etc/
+ - name: metrics
+ image: docker.io/bitnami/redis-exporter:1.12.1-debian-10-r11
+ imagePullPolicy: "IfNotPresent"
+ command:
+ - /bin/bash
- -c
- - /health/ping_readiness_local.sh 5
- resources:
- requests:
- cpu: "2"
- memory: 8Gi
- volumeMounts:
+ - |
+ if [[ -f '/secrets/redis-password' ]]; then
+ export REDIS_PASSWORD=$(cat /secrets/redis-password)
+ fi
+ redis_exporter
+ env:
+ - name: REDIS_ALIAS
+ value: gitlab-test-redis
+ volumeMounts:
+ - name: redis-password
+ mountPath: /secrets/
+ ports:
+ - name: metrics
+ containerPort: 9121
+ resources:
+ null
+ volumes:
+ - name: start-scripts
+ configMap:
+ name: gitlab-test-redis-scripts
+ defaultMode: 0755
- name: health
- mountPath: /health
+ configMap:
+ name: gitlab-test-redis-health
+ defaultMode: 0755
- name: redis-password
- mountPath: /opt/bitnami/redis/secrets/
- - name: redis-data
- mountPath: /data
- subPath:
+ secret:
+ secretName: "gitlab-test-redis-secret"
+ items:
+ - key: "secret"
+ path: redis-password
- name: config
- mountPath: /opt/bitnami/redis/mounted-etc
+ configMap:
+ name: gitlab-test-redis
+ - name: "redis-data"
+ persistentVolumeClaim:
+ claimName: gitlab-test-gitlab-redis-storage
- name: redis-tmp-conf
- mountPath: /opt/bitnami/redis/etc/
- - name: metrics
- image: docker.io/bitnami/redis-exporter:1.3.5-debian-9-r23
- imagePullPolicy: "IfNotPresent"
- command:
- - /bin/bash
- - -c
- - |
- if [[ -f '/secrets/redis-password' ]]; then
- export REDIS_PASSWORD=$(cat /secrets/redis-password)
- fi
- redis_exporter
- env:
- - name: REDIS_ALIAS
- value: gitlab-test-redis
- volumeMounts:
- - name: redis-password
- mountPath: /secrets/
- ports:
- - name: metrics
- containerPort: 9121
- resources:
- null
- volumes:
- - name: health
- configMap:
- name: gitlab-test-redis-health
- defaultMode: 0755
- - name: redis-password
- secret:
- secretName: "gitlab-test-redis-secret"
- items:
- - key: "secret"
- path: redis-password
- - name: config
- configMap:
- name: gitlab-test-redis
- - name: "redis-data"
- persistentVolumeClaim:
- claimName: gitlab-test-gitlab-redis-storage
- - name: redis-tmp-conf
- emptyDir: {}
+ emptyDir: {}
updateStrategy:
type: RollingUpdate
---
@@ -13927,9 +14062,10 @@
namespace: gitlab
labels:
app: migrations
- chart: migrations-4.8.4
+ chart: migrations-4.9.0
release: gitlab-test
heritage: Helm
+
spec:
activeDeadlineSeconds: 3600
backoffLimit: 6
@@ -13937,8 +14073,11 @@
metadata:
labels:
app: migrations
+ chart: migrations-4.9.0
release: gitlab-test
+ heritage: Helm
+
spec:
securityContext:
runAsUser: 1000
@@ -13983,7 +14122,7 @@
containers:
- name: migrations
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-task-runner-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-task-runner-ce:v13.9.0"
args:
- /scripts/wait-for-deps
- /scripts/db-migrate
@@ -14040,11 +14179,15 @@
- key: secrets.yml
path: rails-secrets/secrets.yml
- secret:
-
- name: "gitlab-test-praefect-secret"
+ name: "gitlab-test-gitaly-secret"
items:
- key: "token"
path: gitaly/gitaly_token
+ - secret:
+ name: "gitlab-test-praefect-secret"
+ items:
+ - key: "token"
+ path: gitaly/gitaly_token_praefect
- secret:
@@ -14123,9 +14266,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.0
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
annotations:
kubernetes.io/ingress.class: "nginx"
@@ -14147,7 +14291,7 @@
backend:
serviceName: gitlab-test-webservice-default
servicePort: 8181
- - path: /admin/sidekiq
+ - path: /admin/sidekiq/
backend:
serviceName: gitlab-test-webservice-default
servicePort: 8080
@@ -14200,6 +14344,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
annotations:
kubernetes.io/ingress.class: "nginx"
kubernetes.io/ingress.provider: nginx
@@ -14321,13 +14466,19 @@
# Gitlab runner secret
generate_secret_if_needed "gitlab-test-gitlab-runner-secret" --from-literal=runner-registration-token=$(gen_random 'a-zA-Z0-9' 64) --from-literal=runner-token=""
- # GitLab pages secret
+ # GitLab Pages API secret
generate_secret_if_needed "gitlab-test-gitlab-pages-secret" --from-literal="shared_secret"=$(gen_random 'a-zA-Z0-9' 32 | base64)
+ # GitLab Pages auth secret for hashing cookie store when using access control
+ # GitLab Pages OAuth secret
+
+
+
+
# Registry certificates
mkdir -p certs
openssl req -new -newkey rsa:4096 -subj "/CN=gitlab-issuer" -nodes -x509 -keyout certs/registry-example-com.key -out certs/registry-example-com.crt -days 3650
@@ -14408,7 +14559,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-4.8.4
+ chart: gitlab-4.9.0
release: gitlab-test
heritage: Helm
annotations:
@@ -14542,7 +14693,7 @@
apiVersion: v1
kind: Pod
metadata:
- name: gitlab-test-webservice-test-runner-jfi1q
+ name: gitlab-test-webservice-test-runner-l2mqw
namespace: gitlab
annotations:
"helm.sh/hook": test
@@ -14550,7 +14701,7 @@
spec:
containers:
- name: test-runner
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.8.4
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.9.0
command: ['sh', '/tests/test_login']
volumeMounts:
- name: tests
@@ -14575,7 +14726,7 @@
apiVersion: batch/v1
kind: Job
metadata:
- name: gitlab-test-shared-secrets-1-0bs
+ name: gitlab-test-shared-secrets-1-j4f
namespace: gitlab
labels:
app: shared-secrets
@@ -14592,6 +14743,7 @@
app: shared-secrets
release: gitlab-test
+ annotations:
spec:
securityContext:
runAsUser: 65534
@@ -14627,7 +14779,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-4.8.4
+ chart: gitlab-4.9.0
release: gitlab-test
heritage: Helm
annotations:
@@ -14654,9 +14806,9 @@
env:
- name: GITLAB_VERSION
- value: '13.8.4'
+ value: '13.9.0'
- name: CHART_VERSION
- value: '4.8.4'
+ value: '4.9.0'
volumeMounts:
- name: chart-info
mountPath: /chart-info
@@ -15145,7 +15297,7 @@
requests:
memory: "1Gi"
cpu: "1"
- image: gitlab/gitlab-ce:13.8.4-ce.0
+ image: gitlab/gitlab-ce:13.9.0-ce.0
imagePullPolicy: IfNotPresent
command: ["/bin/bash", "-c",
"sed -i \"s/environment ({'GITLAB_ROOT_PASSWORD' => initial_root_password }) if initial_root_password/environment ({'GITLAB_ROOT_PASSWORD' => initial_root_password, 'GITLAB_SHARED_RUNNERS_REGISTRATION_TOKEN' => node['gitlab']['gitlab-rails']['initial_shared_runners_registration_token'] })/g\" /opt/gitlab/embedded/cookbooks/gitlab/recipes/database_migrations.rb && exec /assets/wrapper"]
@@ -16100,8 +16252,8 @@
heritage: Helm
type: Opaque
data:
- accesskey: "ODh5WVhUT25KR2tIeFl4WEhQSXY="
- secretkey: "b2I2dTZTcUtnbzA5aG8xQ2xNNnM5d2ExazRLNUpXbzduOFhLdnlpbQ=="
+ accesskey: "ODNJREZzRExOZFNXaTQ5aWlmV2c="
+ secretkey: "UVB4djZXMUt6eU1OcXZGSlFBZFVGUG9aeUNRSm0xck5MbUFRYlU5UA=="
---
# Source: minio/templates/configmap.yaml
apiVersion: v1
@@ -16329,7 +16481,7 @@
app: minio
release: minio-test
annotations:
- checksum/secrets: 720b7329aefff66f496abc3e7d2148138da2133872ff0d310ed294c01f8c66cf
+ checksum/secrets: 115f9ded886b7977ad5fcf1ba06f7a3f4663f348ddd7341da19a0e8e0064d14e
checksum/config: 43756797396cd63bc1cd504b723a4833317439960019986f7bcfef5e150689dc
spec:
serviceAccountName: "minio-test"
@@ -16488,8 +16640,8 @@
heritage: Helm
type: Opaque
data:
- accesskey: "S2tmZzJTcUIxd1Zpa0FrQURWMjc="
- secretkey: "Y2MzT1lRMThZUnpldDRwYXNodzI2U2RBNTJxSGVqWHJlTlJhSElmUw=="
+ accesskey: "bFJRNFdjazNxUjdnZmMxZmx3aGs="
+ secretkey: "TmJmRXRLYlUzZnI4cGJGcFk5bklpWkh5eE1BbnJPY0JDZzVwTW5Nag=="
---
# Source: minio/templates/configmap.yaml
apiVersion: v1
@@ -16721,7 +16873,7 @@
app: minio
release: minio-artifacts-test
annotations:
- checksum/secrets: f57b7d5d211445a4c1350e168f5ef5147b5807a14cc6843e9e35644eb144bf37
+ checksum/secrets: 904c8101e7d59b3890f1e315442411b1b6dcaf5745e4e9583e3f203b3d47e1da
checksum/config: 47dd6a9ce3fced1f792866068373d24fd54dfb863bfcbb08c7a8b08fcaa38aaf
spec:
serviceAccountName: "minio-artifacts-test"
@@ -16883,8 +17035,8 @@
heritage: Helm
type: Opaque
data:
- accesskey: "OWpWSjJoYlRtUThNaTNXc2dDaFA="
- secretkey: "eExtTVBQeTRaNEtTMFdvUGttcmY2NThFNHZBTTdvaTNaWk9xeGlkRw=="
+ accesskey: "ZEQ0Y0dSR3pzYVVCYXp6SEpRSVc="
+ secretkey: "cG1LNzdadUI0c0w1Z25ZY0d6Ulo4MEJMM0pXTjN5RWk2WXRIWkNWdA=="
---
# Source: minio/templates/configmap.yaml
# Source: minio/templates/configmap.yaml
@@ -17115,7 +17267,7 @@
app: minio
release: minio-registry-test
annotations:
- checksum/secrets: 8e4c7478c33fdb7c7df42667a5e187def58751224a9d56795667766d3a18e2b1
+ checksum/secrets: 13421c4afc49c3757fa79bca4e1e85a9809c1fb8ad45f384198a34cf4e91a4bd
checksum/config: acf8f8e79af3d7cbbf171c79cc7237904e34cede6a940e210256be1cfb3b5555
spec:
serviceAccountName: "minio-registry-test"