A new version of gitlab (13.9.1) is available
current diff:
--- current-deployment.yaml
+++ future-deployment.yaml
@@ -7,9 +7,10 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-4.8.4
+ chart: gitaly-4.9.1
release: gitlab-test
heritage: Helm
+
storage: default
spec:
maxUnavailable: 1
@@ -27,7 +28,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.1
release: gitlab-test
heritage: Helm
@@ -46,9 +47,10 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.1
release: gitlab-test
heritage: Helm
+
spec:
maxUnavailable: 1
selector:
@@ -64,7 +66,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.1
release: gitlab-test
heritage: Helm
@@ -84,9 +86,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.1
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
spec:
maxUnavailable: 1
@@ -152,6 +155,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
spec:
maxUnavailable: 1
selector:
@@ -313,17 +317,18 @@
ingress:
class: nginx
---
-# Source: gitlab/charts/gitlab/charts/gitaly/templates/configmap.yml
+# Source: gitlab/charts/gitlab/charts/gitaly/templates/configmap-with-praefect.yml
apiVersion: v1
kind: ConfigMap
metadata:
- name: gitlab-test-gitaly
+ name: gitlab-test-gitaly-praefect
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-4.8.4
+ chart: gitaly-4.9.1
release: gitlab-test
heritage: Helm
+
data:
configure: |
set -e
@@ -342,7 +347,7 @@
# If metrics collection is enabled, inform gitaly about that
prometheus_listen_addr = "localhost:9236"
-
+
<% @storages = [ "gitlab-test-gitaly-default-0", "gitlab-test-gitaly-default-1", "gitlab-test-gitaly-default-2", ] %>
<% @hostname=ENV['HOSTNAME'].strip %>
@@ -389,7 +394,6 @@
[hooks]
# directory containing custom hooks
custom_hooks_dir = "/home/git/custom_hooks"
-# Leave this here - This line denotes end of block to the parser.
---
# Source: gitlab/charts/gitlab/charts/gitlab-exporter/templates/configmap.yaml
apiVersion: v1
@@ -399,7 +403,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-4.8.4
+ chart: gitlab-exporter-4.9.1
release: gitlab-test
heritage: Helm
@@ -441,8 +445,16 @@
redis_url: redis://:<%= ERB::Util::url_encode(File.read("/etc/gitlab/redis/redis-password").strip) %>@gitlab-test-redis-master.gitlab.svc:6379
redis_enable_client: false
+ ruby: &ruby
+ methods:
+ - probe_gc
+ opts:
+ quantiles: false
+
metrics:
multiple: true
+ ruby:
+ <<: *ruby
sidekiq:
<<: *sidekiq
ci_builds:
@@ -481,7 +493,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.1
release: gitlab-test
heritage: Helm
@@ -514,7 +526,7 @@
# Logging
#SyslogFacility AUTH
- #LogLevel INFO
+ LogLevel ERROR
# Authentication:
@@ -641,7 +653,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.1
release: gitlab-test
heritage: Helm
@@ -655,7 +667,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -683,9 +695,6 @@
# Default is gitlab-shell.log in the root directory.
log_file: "/var/log/gitlab-shell/gitlab-shell.log"
- # Log level. INFO by default
- log_level: INFO
-
log_format: text
# Audit usernames.
@@ -704,7 +713,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.1
release: gitlab-test
heritage: Helm
@@ -719,10 +728,12 @@
namespace: gitlab
labels:
app: migrations
- chart: migrations-4.8.4
+ chart: migrations-4.9.1
release: gitlab-test
heritage: Helm
+
data:
+ pages_redirect_uri: https://projects.pages.test.freedesktop.org/auth
installation_type: |
gitlab-helm-chart
database.yml.erb: |
@@ -766,6 +777,7 @@
default:
path: /var/opt/gitlab/repo
gitaly_address: tcp://gitlab-test-praefect.gitlab.svc:8075
+ gitaly_token: "<%= File.read('/etc/gitlab/gitaly/gitaly_token_praefect').strip.dump[1..-2] %>"
configure: |
set -e
@@ -776,7 +788,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -795,9 +807,10 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.1
release: gitlab-test
heritage: Helm
+
data:
configure: |
set -e
@@ -856,9 +869,10 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.1
release: gitlab-test
heritage: Helm
+
data:
praefect-start: |
set -e
@@ -876,7 +890,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.1
release: gitlab-test
heritage: Helm
@@ -902,7 +916,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.1
release: gitlab-test
heritage: Helm
@@ -946,6 +960,7 @@
https: true
max_request_duration_seconds: 57
impersonation_enabled:
+ application_settings_cache_seconds: 60
usage_ping_enabled: true
seat_link_enabled: true
default_can_create_group: false
@@ -1121,6 +1136,7 @@
default:
path: /var/opt/gitlab/repo
gitaly_address: tcp://gitlab-test-praefect.gitlab.svc:8075
+ gitaly_token: "<%= File.read('/etc/gitlab/gitaly/gitaly_token_praefect').strip.dump[1..-2] %>"
backup:
path: "tmp/backups" # Relative paths are relative to Rails.root (default: tmp/backups/)
@@ -1151,7 +1167,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1170,9 +1186,10 @@
namespace: gitlab
labels:
app: task-runner
- chart: task-runner-4.8.4
+ chart: task-runner-4.9.1
release: gitlab-test
heritage: Helm
+
data:
database.yml.erb: |
production:
@@ -1211,6 +1228,7 @@
https: true
max_request_duration_seconds: 57
impersonation_enabled:
+ application_settings_cache_seconds: 60
usage_ping_enabled: true
seat_link_enabled: true
default_can_create_group: false
@@ -1374,6 +1392,7 @@
default:
path: /var/opt/gitlab/repo
gitaly_address: tcp://gitlab-test-praefect.gitlab.svc:8075
+ gitaly_token: "<%= File.read('/etc/gitlab/gitaly/gitaly_token_praefect').strip.dump[1..-2] %>"
backup:
path: "tmp/backups" # Relative paths are relative to Rails.root (default: tmp/backups/)
@@ -1401,7 +1420,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1427,9 +1446,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.1
release: gitlab-test
heritage: Helm
+
data:
installation_type: |
gitlab-helm-chart
@@ -1470,6 +1490,7 @@
https: true
max_request_duration_seconds: 57
impersonation_enabled:
+ application_settings_cache_seconds: 60
usage_ping_enabled: true
seat_link_enabled: true
default_can_create_group: false
@@ -1626,6 +1647,7 @@
default:
path: /var/opt/gitlab/repo
gitaly_address: tcp://gitlab-test-praefect.gitlab.svc:8075
+ gitaly_token: "<%= File.read('/etc/gitlab/gitaly/gitaly_token_praefect').strip.dump[1..-2] %>"
backup:
path: "tmp/backups" # Relative paths are relative to Rails.root (default: tmp/backups/)
@@ -1676,7 +1698,7 @@
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
done
- for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages ; do
+ for secret in redis minio objectstorage postgres ldap omniauth smtp kas pages oauth-secrets ; do
if [ -e "${config_dir}/${secret}" ]; then
mkdir -p "${secret_dir}/${secret}"
cp -v -r -L "${config_dir}/${secret}/." "${secret_dir}/${secret}/"
@@ -1691,7 +1713,7 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.1
release: gitlab-test
heritage: Helm
data:
@@ -2237,14 +2259,48 @@
rules: |
{}
---
+# Source: gitlab/charts/redis/templates/configmap-scripts.yaml
+apiVersion: v1
+kind: ConfigMap
+metadata:
+ name: gitlab-test-redis-scripts
+ namespace: "gitlab"
+ labels:
+ app: redis
+ chart: redis-11.3.4
+ heritage: Helm
+ release: gitlab-test
+data:
+ start-master.sh: |
+ #!/bin/bash
+ useradd redis
+ chown -R redis /data
+ if [[ -n $REDIS_PASSWORD_FILE ]]; then
+ password_aux=`cat ${REDIS_PASSWORD_FILE}`
+ export REDIS_PASSWORD=$password_aux
+ fi
+ if [[ ! -f /opt/bitnami/redis/etc/master.conf ]];then
+ cp /opt/bitnami/redis/mounted-etc/master.conf /opt/bitnami/redis/etc/master.conf
+ fi
+ if [[ ! -f /opt/bitnami/redis/etc/redis.conf ]];then
+ cp /opt/bitnami/redis/mounted-etc/redis.conf /opt/bitnami/redis/etc/redis.conf
+ fi
+ ARGS=("--port" "${REDIS_PORT}")
+ ARGS+=("--requirepass" "${REDIS_PASSWORD}")
+ ARGS+=("--masterauth" "${REDIS_PASSWORD}")
+ ARGS+=("--include" "/opt/bitnami/redis/etc/redis.conf")
+ ARGS+=("--include" "/opt/bitnami/redis/etc/master.conf")
+ exec /run.sh "${ARGS[@]}"
+---
# Source: gitlab/charts/redis/templates/configmap.yaml
apiVersion: v1
kind: ConfigMap
metadata:
name: gitlab-test-redis
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
heritage: Helm
release: gitlab-test
data:
@@ -2269,19 +2325,22 @@
kind: ConfigMap
metadata:
name: gitlab-test-redis-health
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
heritage: Helm
release: gitlab-test
data:
ping_readiness_local.sh: |-
+ #!/bin/bash
password_aux=`cat ${REDIS_PASSWORD_FILE}`
export REDIS_PASSWORD=$password_aux
+ no_auth_warning=$([[ "$(redis-cli --version)" =~ (redis-cli 5.*) ]] && echo --no-auth-warning)
response=$(
- timeout -s 9 $1 \
+ timeout -s 3 $1 \
redis-cli \
- -a $REDIS_PASSWORD --no-auth-warning \
+ -a $REDIS_PASSWORD $no_auth_warning \
-h localhost \
-p $REDIS_PORT \
ping
@@ -2291,12 +2350,14 @@
exit 1
fi
ping_liveness_local.sh: |-
+ #!/bin/bash
password_aux=`cat ${REDIS_PASSWORD_FILE}`
export REDIS_PASSWORD=$password_aux
+ no_auth_warning=$([[ "$(redis-cli --version)" =~ (redis-cli 5.*) ]] && echo --no-auth-warning)
response=$(
- timeout -s 9 $1 \
+ timeout -s 3 $1 \
redis-cli \
- -a $REDIS_PASSWORD --no-auth-warning \
+ -a $REDIS_PASSWORD $no_auth_warning \
-h localhost \
-p $REDIS_PORT \
ping
@@ -2306,12 +2367,14 @@
exit 1
fi
ping_readiness_master.sh: |-
+ #!/bin/bash
password_aux=`cat ${REDIS_MASTER_PASSWORD_FILE}`
export REDIS_MASTER_PASSWORD=$password_aux
- response=$(
- timeout -s 9 $1 \
+ no_auth_warning=$([[ "$(redis-cli --version)" =~ (redis-cli 5.*) ]] && echo --no-auth-warning)
+ response=$(
+ timeout -s 3 $1 \
redis-cli \
- -a $REDIS_MASTER_PASSWORD --no-auth-warning \
+ -a $REDIS_MASTER_PASSWORD $no_auth_warning \
-h $REDIS_MASTER_HOST \
-p $REDIS_MASTER_PORT_NUMBER \
ping
@@ -2321,12 +2384,14 @@
exit 1
fi
ping_liveness_master.sh: |-
+ #!/bin/bash
password_aux=`cat ${REDIS_MASTER_PASSWORD_FILE}`
export REDIS_MASTER_PASSWORD=$password_aux
+ no_auth_warning=$([[ "$(redis-cli --version)" =~ (redis-cli 5.*) ]] && echo --no-auth-warning)
response=$(
- timeout -s 9 $1 \
+ timeout -s 3 $1 \
redis-cli \
- -a $REDIS_MASTER_PASSWORD --no-auth-warning \
+ -a $REDIS_MASTER_PASSWORD $no_auth_warning \
-h $REDIS_MASTER_HOST \
-p $REDIS_MASTER_PORT_NUMBER \
ping
@@ -2359,6 +2424,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
data:
configure: |-
if [ -e /config/accesskey ] ; then
@@ -2468,12 +2534,12 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-4.8.4
+ chart: gitlab-4.9.1
release: gitlab-test
heritage: Helm
data:
- gitlabVersion: "13.8.4"
- gitlabChartVersion: "4.8.4"
+ gitlabVersion: "13.9.1"
+ gitlabChartVersion: "4.9.1"
---
# Source: gitlab/templates/initdb-configmap.yaml
apiVersion: v1
@@ -2483,7 +2549,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-4.8.4
+ chart: gitlab-4.9.1
release: gitlab-test
heritage: Helm
data:
@@ -10729,10 +10795,11 @@
namespace: gitlab
labels:
app: gitaly
- chart: gitaly-4.8.4
+ chart: gitaly-4.9.1
release: gitlab-test
heritage: Helm
+
storage: default
annotations:
gitlab.com/prometheus_scrape: "true"
@@ -10762,7 +10829,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-4.8.4
+ chart: gitlab-exporter-4.9.1
release: gitlab-test
heritage: Helm
@@ -10788,7 +10855,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.1
release: gitlab-test
heritage: Helm
@@ -10814,10 +10881,11 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.1
release: gitlab-test
heritage: Helm
+
annotations:
gitlab.com/prometheus_scrape: "true"
gitlab.com/prometheus_port: ""
@@ -10848,10 +10916,11 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.1
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
annotations:
@@ -11120,18 +11189,19 @@
kind: Service
metadata:
name: gitlab-test-redis-headless
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
heritage: Helm
spec:
type: ClusterIP
clusterIP: None
ports:
- - name: redis
- port: 6379
- targetPort: redis
+ - name: redis
+ port: 6379
+ targetPort: redis
selector:
app: redis
release: gitlab-test
@@ -11141,17 +11211,20 @@
kind: Service
metadata:
name: gitlab-test-redis-metrics
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
heritage: Helm
+ app.kubernetes.io/component: "metrics"
spec:
type: ClusterIP
+
ports:
- - name: metrics
- port: 9121
- targetPort: metrics
+ - name: metrics
+ port: 9121
+ targetPort: metrics
selector:
app: redis
release: gitlab-test
@@ -11161,17 +11234,18 @@
kind: Service
metadata:
name: gitlab-test-redis-master
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
heritage: Helm
spec:
type: ClusterIP
ports:
- - name: redis
- port: 6379
- targetPort: redis
+ - name: redis
+ port: 6379
+ targetPort: redis
selector:
app: redis
release: gitlab-test
@@ -11188,6 +11262,8 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
+
annotations:
spec:
@@ -11370,7 +11446,7 @@
namespace: gitlab
labels:
app: gitlab-exporter
- chart: gitlab-exporter-4.8.4
+ chart: gitlab-exporter-4.9.1
release: gitlab-test
heritage: Helm
@@ -11388,13 +11464,13 @@
app: gitlab-exporter
release: gitlab-test
app: gitlab-exporter
- chart: gitlab-exporter-4.8.4
+ chart: gitlab-exporter-4.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 7071a90a2c7703be9eefe3ceca344771e5317ce0d9f55201d4edc7c2073232b5
+ checksum/config: 72700bb9c5b0548f74ab7f21366e193d26cdf4d88d471ca53ee916ec1e45aace
gitlab.com/prometheus_path: /metrics
gitlab.com/prometheus_port: "9168"
gitlab.com/prometheus_scrape: "true"
@@ -11423,6 +11499,14 @@
env:
+ - name: MALLOC_CONF
+ value: "dirty_decay_ms:0,muzzy_decay_ms:0"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MAX_RATIO
+ value: "0.111"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MIN_RATIO
+ value: "0.055"
+ - name: RUBY_GC_HEAP_INIT_SLOTS
+ value: "80000"
volumeMounts:
- name: etc-ssl-certs
mountPath: /etc/ssl/certs
@@ -11435,6 +11519,14 @@
image: "busybox:latest"
env:
+ - name: MALLOC_CONF
+ value: "dirty_decay_ms:0,muzzy_decay_ms:0"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MAX_RATIO
+ value: "0.111"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MIN_RATIO
+ value: "0.055"
+ - name: RUBY_GC_HEAP_INIT_SLOTS
+ value: "80000"
volumeMounts:
@@ -11454,7 +11546,7 @@
containers:
- name: gitlab-exporter
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:8.0.0"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-exporter:10.0.0"
env:
- name: CONFIG_TEMPLATE_DIRECTORY
@@ -11462,6 +11554,14 @@
- name: CONFIG_DIRECTORY
value: '/etc/gitlab-exporter'
+ - name: MALLOC_CONF
+ value: "dirty_decay_ms:0,muzzy_decay_ms:0"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MAX_RATIO
+ value: "0.111"
+ - name: RUBY_GC_HEAP_FREE_SLOTS_MIN_RATIO
+ value: "0.055"
+ - name: RUBY_GC_HEAP_INIT_SLOTS
+ value: "80000"
ports:
- containerPort: 9168
name: gitlab-exporter
@@ -11533,11 +11633,10 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.1
release: gitlab-test
heritage: Helm
-
annotations:
spec:
@@ -11549,14 +11648,14 @@
metadata:
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/config: 47f143c9337b07e159b2342737b95fab14851328bfd56eb08b4421654dbac4c9
- checksum/config-sshd: aa42a5bacbed3dcc2fcd027128447ee473e212fa09301bd91c0d85af54f397ca
+ checksum/config: 032294e3db5e65d596c3b1f123efecc1eb46807dbd56f8ccd2b8bc9af0117cce
+ checksum/config-sshd: 727157904ef389c2a5aa5b1afd891503ab08e08685d51e035f30c7839c8fa6b3
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
initContainers:
@@ -11609,7 +11708,7 @@
containers:
- name: gitlab-shell
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v13.15.1"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-shell:v13.16.1"
ports:
- containerPort: 2222
@@ -11695,7 +11794,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.1
release: gitlab-test
heritage: Helm
@@ -11715,15 +11814,15 @@
release: gitlab-test
queue-pod-name: native-chart
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.1
release: gitlab-test
heritage: Helm
annotations:
- checksum/configmap: 7c8b50e4150864fb3021c4dccad25d57a5a639f62165da71c3cc20e93f528f84
+ checksum/configmap: 69fcd653cabc91d4aea12684469562197248850eb95b7af273f9e11e53c4e625
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
- checksum/configmap-pod: ce2a219572948c68759126b77d130dfb790050458402ef2e586cbcf4f6a6abe3
+ checksum/configmap-pod: 4fbda2ad3bde2dedda6930808b180f5d1570da066f1131a760247a67b65aacd9
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
gitlab.com/prometheus_port: "3807"
@@ -11782,7 +11881,7 @@
requests:
cpu: 50m
- name: dependencies
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v13.9.1"
args:
- /scripts/wait-for-deps
@@ -11819,7 +11918,7 @@
containers:
- name: sidekiq
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-sidekiq-ce:v13.9.1"
env:
- name: prometheus_multiproc_dir
@@ -11936,10 +12035,15 @@
- key: secrets.yml
path: rails-secrets/secrets.yml
- secret:
- name: "gitlab-test-praefect-secret"
+ name: "gitlab-test-gitaly-secret"
items:
- key: "token"
path: gitaly/gitaly_token
+ - secret:
+ name: "gitlab-test-praefect-secret"
+ items:
+ - key: "token"
+ path: gitaly/gitaly_token_praefect
- secret:
@@ -12000,9 +12104,10 @@
namespace: gitlab
labels:
app: task-runner
- chart: task-runner-4.8.4
+ chart: task-runner-4.9.1
release: gitlab-test
heritage: Helm
+
annotations:
spec:
@@ -12018,10 +12123,13 @@
metadata:
labels:
app: task-runner
+ chart: task-runner-4.9.1
release: gitlab-test
+ heritage: Helm
+
annotations:
- checksum/config: 5a3a8ee882d011d6bdaf440f438b0d00d2b43cf0476ccf2cd1914d3363f57ab8
+ checksum/config: 5bd5cd716e8ab8988d60e8ddd4ed50d4d7f171c122de66f0d1002e350a31e253
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
securityContext:
@@ -12080,7 +12188,7 @@
- /bin/bash
- -c
- sh /var/opt/gitlab/templates/configure-gsutil && while sleep 3600; do :; done
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-task-runner-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-task-runner-ce:v13.9.1"
env:
- name: ARTIFACTS_BUCKET_NAME
@@ -12163,11 +12271,15 @@
- key: "secret"
path: shell/.gitlab_shell_secret
- secret:
-
- name: "gitlab-test-praefect-secret"
+ name: "gitlab-test-gitaly-secret"
items:
- key: "token"
path: gitaly/gitaly_token
+ - secret:
+ name: "gitlab-test-praefect-secret"
+ items:
+ - key: "token"
+ path: gitaly/gitaly_token_praefect
- secret:
@@ -12238,9 +12350,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.1
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
annotations:
@@ -12257,10 +12370,15 @@
labels:
app: webservice
release: gitlab-test
+ app: webservice
+ chart: webservice-4.9.1
+ release: gitlab-test
+ heritage: Helm
+
gitlab.com/webservice-name: default
annotations:
- checksum/config: a90e2f31909ceb9df1cd9da24baaac3f91791f63b186e6fc5cf55e6e8055a9d1
+ checksum/config: 7953f23b116d7a2fa873da9bbdf42865da74c942d353379a0ad9b287d51eed92
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
@@ -12332,7 +12450,7 @@
requests:
cpu: 50m
- name: dependencies
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.8.4
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.9.1
args:
- /scripts/wait-for-deps
@@ -12365,7 +12483,7 @@
containers:
- name: webservice
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.8.4
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.9.1
ports:
- containerPort: 8080
@@ -12459,7 +12577,7 @@
cpu: 300m
memory: 2.5G
- name: gitlab-workhorse
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-workhorse-ce:v13.9.1"
ports:
- containerPort: 8181
@@ -12547,11 +12665,15 @@
- key: "secret"
path: shell/.gitlab_shell_secret
- secret:
-
- name: "gitlab-test-praefect-secret"
+ name: "gitlab-test-gitaly-secret"
items:
- key: "token"
path: gitaly/gitaly_token
+ - secret:
+ name: "gitlab-test-praefect-secret"
+ items:
+ - key: "token"
+ path: gitaly/gitaly_token_praefect
- secret:
@@ -13009,6 +13131,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
annotations:
spec:
@@ -13021,10 +13144,13 @@
metadata:
labels:
app: registry
+ chart: registry-0.5.0
release: gitlab-test
+ heritage: Helm
+
annotations:
- checksum/configmap: afa1ee2027e9e2debb162b15851f2822ae2c28beeeae5184556544d684e68ef6
+ checksum/configmap: 6431837f258b75089566b197b4aba630c2a5a3974754c590ac6788f80ace317b
cluster-autoscaler.kubernetes.io/safe-to-evict: "true"
spec:
securityContext:
@@ -13068,7 +13194,7 @@
cpu: 50m
containers:
- name: registry
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v2.13.1-gitlab"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-container-registry:v3.0.0-gitlab"
imagePullPolicy: "IfNotPresent"
volumeMounts:
- name: registry-server-config
@@ -13137,7 +13263,7 @@
namespace: gitlab
labels:
app: gitlab-shell
- chart: gitlab-shell-4.8.4
+ chart: gitlab-shell-4.9.1
release: gitlab-test
heritage: Helm
@@ -13162,7 +13288,7 @@
namespace: gitlab
labels:
app: sidekiq
- chart: sidekiq-4.8.4
+ chart: sidekiq-4.9.1
release: gitlab-test
heritage: Helm
@@ -13187,9 +13313,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.1
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
spec:
scaleTargetRef:
@@ -13215,6 +13342,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
spec:
scaleTargetRef:
apiVersion: apps/v1
@@ -13236,6 +13364,11 @@
namespace: gitlab
labels:
app: gitaly
+ chart: gitaly-4.9.1
+ release: gitlab-test
+ heritage: Helm
+
+ app: gitaly
chart: gitaly
release: gitlab-test
heritage: Helm
@@ -13253,12 +13386,15 @@
template:
metadata:
labels:
+ storage: default
app: gitaly
+ chart: gitaly-4.9.1
release: gitlab-test
- storage: default
+ heritage: Helm
+
annotations:
- checksum/config: ce0d44399f6448adae934ac6216b38730d1bd66b011ab1bbb28c9c75faa40932
+ checksum/config: 45ea476d513d7202189a689e168f106847687995cd4fcd0226697a61d2442a16
co.elastic.logs/json.add_error_key: "true"
co.elastic.logs/json.keys_under_root: "false"
spec:
@@ -13314,7 +13450,7 @@
containers:
- name: gitaly
- image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v13.9.1"
ports:
- containerPort: 8075
@@ -13366,7 +13502,7 @@
- name: gitaly-config
configMap:
- name: gitlab-test-gitaly
+ name: gitlab-test-gitaly-praefect
- name: gitaly-secrets
emptyDir:
medium: "Memory"
@@ -13415,9 +13551,10 @@
namespace: gitlab
labels:
app: praefect
- chart: praefect-4.8.4
+ chart: praefect-4.9.1
release: gitlab-test
heritage: Helm
+
spec:
selector:
matchLabels:
@@ -13430,10 +13567,13 @@
metadata:
labels:
app: praefect
+ chart: praefect-4.9.1
release: gitlab-test
+ heritage: Helm
+
annotations:
- checksum/config: ce52c1127ea47e750485a18d845896410475128c74b219314f91d13fd89fd46f
+ checksum/config: fe3f286c2027d6a6622fbf57215737eea74cecdf8a78f72a7f5dcb34a9c5dcce
spec:
affinity:
podAntiAffinity:
@@ -13483,7 +13623,7 @@
containers:
- name: praefect
- image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitaly:v13.9.1"
ports:
- containerPort: 8075
@@ -13731,9 +13871,10 @@
kind: StatefulSet
metadata:
name: gitlab-test-redis-master
+ namespace: "gitlab"
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
heritage: Helm
spec:
@@ -13747,135 +13888,129 @@
metadata:
labels:
app: redis
- chart: redis-10.3.4
+ chart: redis-11.3.4
release: gitlab-test
role: master
annotations:
- checksum/health: 358f0184ff0b65182c27b3bca5d6265460c730f961d24f748421e343c3a7caf0
- checksum/configmap: b2aa2cc9e60abcd7bd7f98940b7a191cd7d1f71f53c8790f632a89522da1e9fe
+ checksum/health: 7410463162a06af4ffd48e4087e1d3909e7e11d2216f0471b41d493368f1c221
+ checksum/configmap: 03bc347fc4b0d4014d2b71c54277982d8120e77b4ac61e4a303440376e39394f
checksum/secret: e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
co.elastic.logs/module: redis
prometheus.io/port: "9121"
prometheus.io/scrape: "true"
- spec:
+ spec:
+
securityContext:
fsGroup: 1001
- serviceAccountName: "default"
+ serviceAccountName: default
containers:
- - name: gitlab-test-redis
- image: "docker.io/bitnami/redis:5.0.7-debian-9-r50"
- imagePullPolicy: "IfNotPresent"
- securityContext:
- runAsUser: 1001
- command:
- - /bin/bash
- - -c
- - |
- if [[ -n $REDIS_PASSWORD_FILE ]]; then
- password_aux=`cat ${REDIS_PASSWORD_FILE}`
- export REDIS_PASSWORD=$password_aux
- fi
- if [[ ! -f /opt/bitnami/redis/etc/master.conf ]];then
- cp /opt/bitnami/redis/mounted-etc/master.conf /opt/bitnami/redis/etc/master.conf
- fi
- if [[ ! -f /opt/bitnami/redis/etc/redis.conf ]];then
- cp /opt/bitnami/redis/mounted-etc/redis.conf /opt/bitnami/redis/etc/redis.conf
- fi
- ARGS=("--port" "${REDIS_PORT}")
- ARGS+=("--requirepass" "${REDIS_PASSWORD}")
- ARGS+=("--masterauth" "${REDIS_PASSWORD}")
- ARGS+=("--include" "/opt/bitnami/redis/etc/redis.conf")
- ARGS+=("--include" "/opt/bitnami/redis/etc/master.conf")
- /run.sh ${ARGS[@]}
- env:
- - name: REDIS_REPLICATION_MODE
- value: master
- - name: REDIS_PASSWORD_FILE
- value: "/opt/bitnami/redis/secrets/redis-password"
- - name: REDIS_PORT
- value: "6379"
- ports:
- name: redis
- containerPort: 6379
- livenessProbe:
- initialDelaySeconds: 5
- periodSeconds: 5
- timeoutSeconds: 5
- successThreshold: 1
- failureThreshold: 5
- exec:
- command:
- - sh
+ image: docker.io/bitnami/redis:6.0.9-debian-10-r0
+ imagePullPolicy: "IfNotPresent"
+ securityContext:
+ runAsUser: 1001
+ command:
+ - /bin/bash
- -c
- - /health/ping_liveness_local.sh 5
- readinessProbe:
- initialDelaySeconds: 5
- periodSeconds: 5
- timeoutSeconds: 1
- successThreshold: 1
- failureThreshold: 5
- exec:
- command:
- - sh
+ - /opt/bitnami/scripts/start-scripts/start-master.sh
+ env:
+ - name: REDIS_REPLICATION_MODE
+ value: master
+ - name: REDIS_PASSWORD_FILE
+ value: "/opt/bitnami/redis/secrets/redis-password"
+ - name: REDIS_TLS_ENABLED
+ value: "no"
+ - name: REDIS_PORT
+ value: "6379"
+ ports:
+ - name: redis
+ containerPort: 6379
+ livenessProbe:
+ initialDelaySeconds: 5
+ periodSeconds: 5
+ # One second longer than command timeout should prevent generation of zombie processes.
+ timeoutSeconds: 6
+ successThreshold: 1
+ failureThreshold: 5
+ exec:
+ command:
+ - sh
+ - -c
+ - /health/ping_liveness_local.sh 5
+ readinessProbe:
+ initialDelaySeconds: 5
+ periodSeconds: 5
+ timeoutSeconds: 2
+ successThreshold: 1
+ failureThreshold: 5
+ exec:
+ command:
+ - sh
+ - -c
+ - /health/ping_readiness_local.sh 1
+ resources:
+ requests:
+ cpu: "2"
+ memory: 8Gi
+ volumeMounts:
+ - name: start-scripts
+ mountPath: /opt/bitnami/scripts/start-scripts
+ - name: health
+ mountPath: /health
+ - name: redis-password
+ mountPath: /opt/bitnami/redis/secrets/
+ - name: redis-data
+ mountPath: /data
+ subPath:
+ - name: config
+ mountPath: /opt/bitnami/redis/mounted-etc
+ - name: redis-tmp-conf
+ mountPath: /opt/bitnami/redis/etc/
+ - name: metrics
+ image: docker.io/bitnami/redis-exporter:1.12.1-debian-10-r11
+ imagePullPolicy: "IfNotPresent"
+ command:
+ - /bin/bash
- -c
- - /health/ping_readiness_local.sh 5
- resources:
- requests:
- cpu: "2"
- memory: 8Gi
- volumeMounts:
+ - |
+ if [[ -f '/secrets/redis-password' ]]; then
+ export REDIS_PASSWORD=$(cat /secrets/redis-password)
+ fi
+ redis_exporter
+ env:
+ - name: REDIS_ALIAS
+ value: gitlab-test-redis
+ volumeMounts:
+ - name: redis-password
+ mountPath: /secrets/
+ ports:
+ - name: metrics
+ containerPort: 9121
+ resources:
+ null
+ volumes:
+ - name: start-scripts
+ configMap:
+ name: gitlab-test-redis-scripts
+ defaultMode: 0755
- name: health
- mountPath: /health
+ configMap:
+ name: gitlab-test-redis-health
+ defaultMode: 0755
- name: redis-password
- mountPath: /opt/bitnami/redis/secrets/
- - name: redis-data
- mountPath: /data
- subPath:
+ secret:
+ secretName: "gitlab-test-redis-secret"
+ items:
+ - key: "secret"
+ path: redis-password
- name: config
- mountPath: /opt/bitnami/redis/mounted-etc
+ configMap:
+ name: gitlab-test-redis
+ - name: "redis-data"
+ persistentVolumeClaim:
+ claimName: gitlab-test-gitlab-redis-storage
- name: redis-tmp-conf
- mountPath: /opt/bitnami/redis/etc/
- - name: metrics
- image: docker.io/bitnami/redis-exporter:1.3.5-debian-9-r23
- imagePullPolicy: "IfNotPresent"
- command:
- - /bin/bash
- - -c
- - |
- if [[ -f '/secrets/redis-password' ]]; then
- export REDIS_PASSWORD=$(cat /secrets/redis-password)
- fi
- redis_exporter
- env:
- - name: REDIS_ALIAS
- value: gitlab-test-redis
- volumeMounts:
- - name: redis-password
- mountPath: /secrets/
- ports:
- - name: metrics
- containerPort: 9121
- resources:
- null
- volumes:
- - name: health
- configMap:
- name: gitlab-test-redis-health
- defaultMode: 0755
- - name: redis-password
- secret:
- secretName: "gitlab-test-redis-secret"
- items:
- - key: "secret"
- path: redis-password
- - name: config
- configMap:
- name: gitlab-test-redis
- - name: "redis-data"
- persistentVolumeClaim:
- claimName: gitlab-test-gitlab-redis-storage
- - name: redis-tmp-conf
- emptyDir: {}
+ emptyDir: {}
updateStrategy:
type: RollingUpdate
---
@@ -13927,9 +14062,10 @@
namespace: gitlab
labels:
app: migrations
- chart: migrations-4.8.4
+ chart: migrations-4.9.1
release: gitlab-test
heritage: Helm
+
spec:
activeDeadlineSeconds: 3600
backoffLimit: 6
@@ -13937,8 +14073,11 @@
metadata:
labels:
app: migrations
+ chart: migrations-4.9.1
release: gitlab-test
+ heritage: Helm
+
spec:
securityContext:
runAsUser: 1000
@@ -13983,7 +14122,7 @@
containers:
- name: migrations
- image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-task-runner-ce:v13.8.4"
+ image: "registry.gitlab.com/gitlab-org/build/cng/gitlab-task-runner-ce:v13.9.1"
args:
- /scripts/wait-for-deps
- /scripts/db-migrate
@@ -14040,11 +14179,15 @@
- key: secrets.yml
path: rails-secrets/secrets.yml
- secret:
-
- name: "gitlab-test-praefect-secret"
+ name: "gitlab-test-gitaly-secret"
items:
- key: "token"
path: gitaly/gitaly_token
+ - secret:
+ name: "gitlab-test-praefect-secret"
+ items:
+ - key: "token"
+ path: gitaly/gitaly_token_praefect
- secret:
@@ -14123,9 +14266,10 @@
namespace: gitlab
labels:
app: webservice
- chart: webservice-4.8.4
+ chart: webservice-4.9.1
release: gitlab-test
heritage: Helm
+
gitlab.com/webservice-name: default
annotations:
kubernetes.io/ingress.class: "nginx"
@@ -14147,7 +14291,7 @@
backend:
serviceName: gitlab-test-webservice-default
servicePort: 8181
- - path: /admin/sidekiq
+ - path: /admin/sidekiq/
backend:
serviceName: gitlab-test-webservice-default
servicePort: 8080
@@ -14200,6 +14344,7 @@
chart: registry-0.5.0
release: gitlab-test
heritage: Helm
+
annotations:
kubernetes.io/ingress.class: "nginx"
kubernetes.io/ingress.provider: nginx
@@ -14321,13 +14466,19 @@
# Gitlab runner secret
generate_secret_if_needed "gitlab-test-gitlab-runner-secret" --from-literal=runner-registration-token=$(gen_random 'a-zA-Z0-9' 64) --from-literal=runner-token=""
- # GitLab pages secret
+ # GitLab Pages API secret
generate_secret_if_needed "gitlab-test-gitlab-pages-secret" --from-literal="shared_secret"=$(gen_random 'a-zA-Z0-9' 32 | base64)
+ # GitLab Pages auth secret for hashing cookie store when using access control
+ # GitLab Pages OAuth secret
+
+
+
+
# Registry certificates
mkdir -p certs
openssl req -new -newkey rsa:4096 -subj "/CN=gitlab-issuer" -nodes -x509 -keyout certs/registry-example-com.key -out certs/registry-example-com.crt -days 3650
@@ -14408,7 +14559,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-4.8.4
+ chart: gitlab-4.9.1
release: gitlab-test
heritage: Helm
annotations:
@@ -14542,7 +14693,7 @@
apiVersion: v1
kind: Pod
metadata:
- name: gitlab-test-webservice-test-runner-zcq2q
+ name: gitlab-test-webservice-test-runner-v1igw
namespace: gitlab
annotations:
"helm.sh/hook": test
@@ -14550,7 +14701,7 @@
spec:
containers:
- name: test-runner
- image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.8.4
+ image: registry.gitlab.com/gitlab-org/build/cng/gitlab-webservice-ce:v13.9.1
command: ['sh', '/tests/test_login']
volumeMounts:
- name: tests
@@ -14575,7 +14726,7 @@
apiVersion: batch/v1
kind: Job
metadata:
- name: gitlab-test-shared-secrets-1-8bc
+ name: gitlab-test-shared-secrets-1-8ig
namespace: gitlab
labels:
app: shared-secrets
@@ -14592,6 +14743,7 @@
app: shared-secrets
release: gitlab-test
+ annotations:
spec:
securityContext:
runAsUser: 65534
@@ -14627,7 +14779,7 @@
namespace: gitlab
labels:
app: gitlab
- chart: gitlab-4.8.4
+ chart: gitlab-4.9.1
release: gitlab-test
heritage: Helm
annotations:
@@ -14654,9 +14806,9 @@
env:
- name: GITLAB_VERSION
- value: '13.8.4'
+ value: '13.9.1'
- name: CHART_VERSION
- value: '4.8.4'
+ value: '4.9.1'
volumeMounts:
- name: chart-info
mountPath: /chart-info
@@ -15145,7 +15297,7 @@
requests:
memory: "1Gi"
cpu: "1"
- image: gitlab/gitlab-ce:13.8.4-ce.0
+ image: gitlab/gitlab-ce:13.9.1-ce.0
imagePullPolicy: IfNotPresent
command: ["/bin/bash", "-c",
"sed -i \"s/environment ({'GITLAB_ROOT_PASSWORD' => initial_root_password }) if initial_root_password/environment ({'GITLAB_ROOT_PASSWORD' => initial_root_password, 'GITLAB_SHARED_RUNNERS_REGISTRATION_TOKEN' => node['gitlab']['gitlab-rails']['initial_shared_runners_registration_token'] })/g\" /opt/gitlab/embedded/cookbooks/gitlab/recipes/database_migrations.rb && exec /assets/wrapper"]
@@ -16100,8 +16252,8 @@
heritage: Helm
type: Opaque
data:
- accesskey: "eFd1TlJOZW1FQTU3eG1laTlTbFc="
- secretkey: "a1ZaWTdTT0plbG1vU2VYYUVTcUc4bldXNEM0NXhiYUtvOEZNZTJUQQ=="
+ accesskey: "YU5uVG9UNklib3QxVHg5dzRLNk0="
+ secretkey: "M01NNTBOZlcwZVhKcUJROE5BYjBsRHJwaXB6QW5MdDJtZWV0Q29aRQ=="
---
# Source: minio/templates/configmap.yaml
apiVersion: v1
@@ -16329,7 +16481,7 @@
app: minio
release: minio-test
annotations:
- checksum/secrets: ca9b3a4738f83e1d7039468daebc124b12d6522feb413b0289970579c9f6a22d
+ checksum/secrets: 91c164c230b8475894d696ae8aaba9e9daf7363233e3f181992c72b721b74f7e
checksum/config: 43756797396cd63bc1cd504b723a4833317439960019986f7bcfef5e150689dc
spec:
serviceAccountName: "minio-test"
@@ -16488,8 +16640,8 @@
heritage: Helm
type: Opaque
data:
- accesskey: "cmE2UXhlVDFXMGxIcFd1NE5MYng="
- secretkey: "c2V3SzJQU2k2NU5PckFkd0JPM1RWME9hc2Z3ZkxTVDFPWkRDeTV3bg=="
+ accesskey: "QlJmS29ZbkR4Nm9wNUxTZHc5cXY="
+ secretkey: "d3dDWTRkR2UyUGpsNHY3dXp1d0Vja1hMY2NjV21JZFkxTDJyenBGeA=="
---
# Source: minio/templates/configmap.yaml
apiVersion: v1
@@ -16721,7 +16873,7 @@
app: minio
release: minio-artifacts-test
annotations:
- checksum/secrets: 83a8596e3bc910456547cc7d2c1562f4b2a0c3daebe7d6369626947c30c5d009
+ checksum/secrets: edab162bfb19ff2b69cb37a6f7b813dcc0861e94e6b3009f9c6616e203c29e35
checksum/config: 47dd6a9ce3fced1f792866068373d24fd54dfb863bfcbb08c7a8b08fcaa38aaf
spec:
serviceAccountName: "minio-artifacts-test"
@@ -16883,8 +17035,8 @@
heritage: Helm
type: Opaque
data:
- accesskey: "N0VXZkdGbjh0OTJzeHE1YXoyc3Y="
- secretkey: "WnpER0F4MVJrT25UaVpFdUcyZGNIY3NzZ0lvMzFLRGNlOHFHampSbw=="
+ accesskey: "U0g1dFdyUXBoQlIzbVlZeE02U20="
+ secretkey: "U2IwaXlLWk5tMTN5YjNITjI3NTVRdVJRUUJSVTJ2czRORVVkQjNnWg=="
---
# Source: minio/templates/configmap.yaml
# Source: minio/templates/configmap.yaml
@@ -17115,7 +17267,7 @@
app: minio
release: minio-registry-test
annotations:
- checksum/secrets: 2a9fdecfc19b770f90396f15c39eb6fdf0ccb135f1e6fcfd50fd5ef82b76a8b2
+ checksum/secrets: 9400e33f4394c0eaba10af9b3a5b0bbd66fc290aad15421b1568726f94f76a63
checksum/config: acf8f8e79af3d7cbbf171c79cc7237904e34cede6a940e210256be1cfb3b5555
spec:
serviceAccountName: "minio-registry-test"
Edited by Daniel Stone