Skip to content

DoD-Platform-One/gitlab

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

gitlab

Version: 8.8.1-bb.2 AppVersion: 17.8.1 Maintenance Track: bb_integrated

GitLab is the most comprehensive AI-powered DevSecOps Platform.

Upstream References

Upstream Release Notes

The upstream chart's release notes may help when reviewing this package.

Learn More

Pre-Requisites

  • Kubernetes Cluster deployed
  • Kubernetes config installed in ~/.kube/config
  • Helm installed

Install Helm

https://helm.sh/docs/intro/install/

Deployment

  • Clone down the repository
  • cd into directory
helm install gitlab chart/

Values

Key Type Default Description
global.istio.enabled bool false
global.istio.injection string "disabled"
global.common.labels object {}
global.image object {}
global.pod.labels object {}
global.edition string "ee"
global.gitlabVersion string "17.8.1"
global.application.create bool false
global.application.links list []
global.application.allowClusterRoles bool true
global.hosts.domain string "dev.bigbang.mil"
global.hosts.hostSuffix string nil
global.hosts.https bool true
global.hosts.externalIP string nil
global.hosts.ssh string nil
global.hosts.gitlab.name string "gitlab.dev.bigbang.mil"
global.hosts.minio object {}
global.hosts.registry.name string "registry.dev.bigbang.mil"
global.hosts.tls object {}
global.hosts.smartcard object {}
global.hosts.kas object {}
global.hosts.pages object {}
global.ingress.apiVersion string ""
global.ingress.configureCertmanager bool false
global.ingress.useNewIngressForCerts bool false
global.ingress.provider string "nginx"
global.ingress.annotations object {}
global.ingress.enabled bool false
global.ingress.tls object {}
global.ingress.path string "/"
global.ingress.pathType string "Prefix"
global.hpa.apiVersion string "autoscaling/v2"
global.keda.enabled bool false
global.pdb.apiVersion string "policy/v1"
global.batch.cronJob.apiVersion string "batch/v1"
global.monitoring.enabled bool false
global.gitlab.license object {}
global.initialRootPassword object {}
global.psql.connectTimeout string nil
global.psql.keepalives string nil
global.psql.keepalivesIdle string nil
global.psql.keepalivesInterval string nil
global.psql.keepalivesCount string nil
global.psql.tcpUserTimeout string nil
global.psql.password object {}
global.psql.main object {}
global.psql.ci object {}
global.redis.auth.enabled bool true
global.redis.securityContext.runAsUser int 1001
global.redis.securityContext.fsGroup int 1001
global.redis.securityContext.runAsNonRoot bool true
global.redis.containerSecurityContext.enabled bool true
global.redis.containerSecurityContext.runAsUser int 1001
global.redis.containerSecurityContext.runAsNonRoot bool true
global.redis.containerSecurityContext.capabilities.drop[0] string "ALL"
global.redis.sentinelAuth.enabled bool false
global.gitaly.enabled bool true
global.gitaly.authToken object {}
global.gitaly.internal.names[0] string "default"
global.gitaly.external list []
global.gitaly.service.name string "gitaly"
global.gitaly.service.type string "ClusterIP"
global.gitaly.service.externalPort int 8075
global.gitaly.service.internalPort int 8075
global.gitaly.service.tls.externalPort int 8076
global.gitaly.service.tls.internalPort int 8076
global.gitaly.tls.enabled bool false
global.praefect.enabled bool false
global.praefect.ntpHost string "pool.ntp.org"
global.praefect.replaceInternalGitaly bool true
global.praefect.authToken object {}
global.praefect.autoMigrate bool true
global.praefect.dbSecret object {}
global.praefect.virtualStorages[0].name string "default"
global.praefect.virtualStorages[0].gitalyReplicas int 3
global.praefect.virtualStorages[0].maxUnavailable int 1
global.praefect.psql.sslMode string "disable"
global.praefect.service.name string "praefect"
global.praefect.service.type string "ClusterIP"
global.praefect.service.externalPort int 8075
global.praefect.service.internalPort int 8075
global.praefect.service.tls.externalPort int 8076
global.praefect.service.tls.internalPort int 8076
global.praefect.tls.enabled bool false
global.minio.enabled bool true
global.minio.credentials object {}
global.appConfig.enableUsagePing bool true
global.appConfig.enableSeatLink bool true
global.appConfig.enableImpersonation string nil
global.appConfig.applicationSettingsCacheSeconds int 60
global.appConfig.defaultCanCreateGroup bool false
global.appConfig.usernameChangingEnabled bool true
global.appConfig.issueClosingPattern string nil
global.appConfig.defaultTheme string nil
global.appConfig.defaultColorMode string nil
global.appConfig.defaultSyntaxHighlightingTheme string nil
global.appConfig.defaultProjectsFeatures.issues bool true
global.appConfig.defaultProjectsFeatures.mergeRequests bool true
global.appConfig.defaultProjectsFeatures.wiki bool true
global.appConfig.defaultProjectsFeatures.snippets bool true
global.appConfig.defaultProjectsFeatures.builds bool true
global.appConfig.graphQlTimeout string nil
global.appConfig.webhookTimeout string nil
global.appConfig.maxRequestDurationSeconds string nil
global.appConfig.cron_jobs object {}
global.appConfig.contentSecurityPolicy.enabled bool false
global.appConfig.contentSecurityPolicy.report_only bool true
global.appConfig.gravatar.plainUrl string nil
global.appConfig.gravatar.sslUrl string nil
global.appConfig.extra.googleAnalyticsId string nil
global.appConfig.extra.matomoUrl string nil
global.appConfig.extra.matomoSiteId string nil
global.appConfig.extra.matomoDisableCookies string nil
global.appConfig.extra.oneTrustId string nil
global.appConfig.extra.googleTagManagerNonceId string nil
global.appConfig.extra.bizible string nil
global.appConfig.object_store.enabled bool false
global.appConfig.object_store.proxy_download bool true
global.appConfig.object_store.storage_options object {}
global.appConfig.object_store.connection object {}
global.appConfig.lfs.enabled bool true
global.appConfig.lfs.proxy_download bool true
global.appConfig.lfs.bucket string "git-lfs"
global.appConfig.lfs.connection object {}
global.appConfig.artifacts.enabled bool true
global.appConfig.artifacts.proxy_download bool true
global.appConfig.artifacts.bucket string "gitlab-artifacts"
global.appConfig.artifacts.connection object {}
global.appConfig.uploads.enabled bool true
global.appConfig.uploads.proxy_download bool true
global.appConfig.uploads.bucket string "gitlab-uploads"
global.appConfig.uploads.connection object {}
global.appConfig.packages.enabled bool true
global.appConfig.packages.proxy_download bool true
global.appConfig.packages.bucket string "gitlab-packages"
global.appConfig.packages.connection object {}
global.appConfig.externalDiffs.enabled bool false
global.appConfig.externalDiffs.when string nil
global.appConfig.externalDiffs.proxy_download bool true
global.appConfig.externalDiffs.bucket string "gitlab-mr-diffs"
global.appConfig.externalDiffs.connection object {}
global.appConfig.terraformState.enabled bool false
global.appConfig.terraformState.bucket string "gitlab-terraform-state"
global.appConfig.terraformState.connection object {}
global.appConfig.ciSecureFiles.enabled bool false
global.appConfig.ciSecureFiles.bucket string "gitlab-ci-secure-files"
global.appConfig.ciSecureFiles.connection object {}
global.appConfig.dependencyProxy.enabled bool false
global.appConfig.dependencyProxy.proxy_download bool true
global.appConfig.dependencyProxy.bucket string "gitlab-dependency-proxy"
global.appConfig.dependencyProxy.connection object {}
global.appConfig.backups.bucket string "gitlab-backups"
global.appConfig.backups.tmpBucket string "tmp"
global.appConfig.microsoft_graph_mailer.enabled bool false
global.appConfig.microsoft_graph_mailer.user_id string ""
global.appConfig.microsoft_graph_mailer.tenant string ""
global.appConfig.microsoft_graph_mailer.client_id string ""
global.appConfig.microsoft_graph_mailer.client_secret.secret string ""
global.appConfig.microsoft_graph_mailer.client_secret.key string "secret"
global.appConfig.microsoft_graph_mailer.azure_ad_endpoint string "https://login.microsoftonline.com"
global.appConfig.microsoft_graph_mailer.graph_endpoint string "https://graph.microsoft.com"
global.appConfig.incomingEmail.enabled bool false
global.appConfig.incomingEmail.address string ""
global.appConfig.incomingEmail.host string "imap.gmail.com"
global.appConfig.incomingEmail.port int 993
global.appConfig.incomingEmail.ssl bool true
global.appConfig.incomingEmail.startTls bool false
global.appConfig.incomingEmail.user string ""
global.appConfig.incomingEmail.password.secret string ""
global.appConfig.incomingEmail.password.key string "password"
global.appConfig.incomingEmail.deleteAfterDelivery bool true
global.appConfig.incomingEmail.expungeDeleted bool false
global.appConfig.incomingEmail.logger.logPath string "/dev/stdout"
global.appConfig.incomingEmail.mailbox string "inbox"
global.appConfig.incomingEmail.idleTimeout int 60
global.appConfig.incomingEmail.inboxMethod string "imap"
global.appConfig.incomingEmail.clientSecret.key string "secret"
global.appConfig.incomingEmail.pollInterval int 60
global.appConfig.incomingEmail.deliveryMethod string "webhook"
global.appConfig.incomingEmail.authToken object {}
global.appConfig.serviceDeskEmail.enabled bool false
global.appConfig.serviceDeskEmail.address string ""
global.appConfig.serviceDeskEmail.host string "imap.gmail.com"
global.appConfig.serviceDeskEmail.port int 993
global.appConfig.serviceDeskEmail.ssl bool true
global.appConfig.serviceDeskEmail.startTls bool false
global.appConfig.serviceDeskEmail.user string ""
global.appConfig.serviceDeskEmail.password.secret string ""
global.appConfig.serviceDeskEmail.password.key string "password"
global.appConfig.serviceDeskEmail.deleteAfterDelivery bool true
global.appConfig.serviceDeskEmail.expungeDeleted bool false
global.appConfig.serviceDeskEmail.logger.logPath string "/dev/stdout"
global.appConfig.serviceDeskEmail.mailbox string "inbox"
global.appConfig.serviceDeskEmail.idleTimeout int 60
global.appConfig.serviceDeskEmail.inboxMethod string "imap"
global.appConfig.serviceDeskEmail.clientSecret.key string "secret"
global.appConfig.serviceDeskEmail.pollInterval int 60
global.appConfig.serviceDeskEmail.deliveryMethod string "webhook"
global.appConfig.serviceDeskEmail.authToken object {}
global.appConfig.ldap.preventSignin bool false
global.appConfig.ldap.servers object {}
global.appConfig.duoAuth.enabled bool false
global.appConfig.gitlab_kas object {}
global.appConfig.suggested_reviewers object {}
global.appConfig.omniauth.enabled bool false
global.appConfig.omniauth.autoSignInWithProvider string nil
global.appConfig.omniauth.syncProfileFromProvider list []
global.appConfig.omniauth.syncProfileAttributes[0] string "email"
global.appConfig.omniauth.allowSingleSignOn[0] string "saml"
global.appConfig.omniauth.blockAutoCreatedUsers bool true
global.appConfig.omniauth.autoLinkLdapUser bool false
global.appConfig.omniauth.autoLinkSamlUser bool false
global.appConfig.omniauth.autoLinkUser list []
global.appConfig.omniauth.externalProviders list []
global.appConfig.omniauth.allowBypassTwoFactor list []
global.appConfig.omniauth.providers list []
global.appConfig.kerberos.enabled bool false
global.appConfig.kerberos.keytab.key string "keytab"
global.appConfig.kerberos.servicePrincipalName string ""
global.appConfig.kerberos.krb5Config string ""
global.appConfig.kerberos.dedicatedPort.enabled bool false
global.appConfig.kerberos.dedicatedPort.port int 8443
global.appConfig.kerberos.dedicatedPort.https bool true
global.appConfig.kerberos.simpleLdapLinkingAllowedRealms list []
global.appConfig.sentry.enabled bool false
global.appConfig.sentry.dsn string nil
global.appConfig.sentry.clientside_dsn string nil
global.appConfig.sentry.environment string nil
global.appConfig.gitlab_docs.enabled bool false
global.appConfig.gitlab_docs.host string ""
global.appConfig.smartcard.enabled bool false
global.appConfig.smartcard.CASecret string nil
global.appConfig.smartcard.clientCertificateRequiredHost string nil
global.appConfig.smartcard.sanExtensions bool false
global.appConfig.smartcard.requiredForGitAccess bool false
global.appConfig.sidekiq.routingRules list []
global.appConfig.initialDefaults object {}
global.oauth.gitlab-pages object {}
global.geo.enabled bool false
global.geo.role string "primary"
global.geo.nodeName string nil
global.geo.psql.password object {}
global.geo.registry.replication.enabled bool false
global.geo.registry.replication.primaryApiUrl string nil
global.kas.enabled bool false
global.kas.service.apiExternalPort int 8153
global.kas.tls.enabled bool false
global.kas.tls.verify bool true
global.spamcheck.enabled bool false
global.shell.authToken object {}
global.shell.hostKeys object {}
global.shell.tcp.proxyProtocol bool false
global.railsSecrets object {}
global.rails.bootsnap.enabled bool true
global.rails.sessionStore.sessionCookieTokenPrefix string ""
global.registry.bucket string "registry"
global.registry.certificate object {}
global.registry.httpSecret object {}
global.registry.notificationSecret object {}
global.registry.tls.enabled bool false
global.registry.redis.cache.password object {}
global.registry.redis.rateLimiting.password object {}
global.registry.notifications object {}
global.registry.enabled bool true
global.registry.host string nil
global.registry.api.protocol string "http"
global.registry.api.serviceName string "registry"
global.registry.api.port int 5000
global.registry.tokenIssuer string "gitlab-issuer"
global.pages.enabled bool false
global.pages.accessControl bool false
global.pages.path string nil
global.pages.host string nil
global.pages.port string nil
global.pages.https string nil
global.pages.externalHttp list []
global.pages.externalHttps list []
global.pages.artifactsServer bool true
global.pages.localStore.enabled bool false
global.pages.objectStore.enabled bool true
global.pages.objectStore.bucket string "gitlab-pages"
global.pages.objectStore.connection object {}
global.pages.apiSecret object {}
global.pages.authSecret object {}
global.pages.namespaceInPath bool false
global.runner.registrationToken object {}
global.smtp.enabled bool false
global.smtp.address string "smtp.mailgun.org"
global.smtp.port int 2525
global.smtp.user_name string ""
global.smtp.password.secret string ""
global.smtp.password.key string "password"
global.smtp.authentication string "plain"
global.smtp.starttls_auto bool false
global.smtp.openssl_verify_mode string "peer"
global.smtp.open_timeout int 30
global.smtp.read_timeout int 60
global.smtp.pool bool false
global.email.from string ""
global.email.display_name string "GitLab"
global.email.reply_to string ""
global.email.subject_suffix string ""
global.email.smime.enabled bool false
global.email.smime.secretName string ""
global.email.smime.keyName string "tls.key"
global.email.smime.certName string "tls.crt"
global.time_zone string "UTC"
global.service.labels object {}
global.service.annotations object {}
global.deployment.annotations object {}
global.nodeAffinity string nil
global.antiAffinity string "soft"
global.affinity.podAntiAffinity.topologyKey string "kubernetes.io/hostname"
global.affinity.nodeAffinity.key string "topology.kubernetes.io/zone"
global.affinity.nodeAffinity.values list []
global.priorityClassName string ""
global.workhorse.serviceName string "webservice-default"
global.workhorse.tls.enabled bool false
global.webservice.workerTimeout int 60
global.certificates.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/certificates"
global.certificates.image.tag string "17.8.1"
global.certificates.image.pullSecrets[0].name string "private-registry"
global.certificates.init.securityContext.capabilities.drop[0] string "ALL"
global.certificates.init.securityContext.runAsUser int 65534
global.certificates.init.securityContext.runAsNonRoot bool true
global.certificates.customCAs[0].secret string "ca-certs-australian-defence-organisation-cross-cert-chain"
global.certificates.customCAs[1].secret string "ca-certs-australian-defence-organisation-direct-trust-chain"
global.certificates.customCAs[2].secret string "ca-certs-boeing"
global.certificates.customCAs[3].secret string "ca-certs-carillon-federal-services-trust-chain-1"
global.certificates.customCAs[4].secret string "ca-certs-carillon-federal-services-trust-chain-2"
global.certificates.customCAs[5].secret string "ca-certs-department-of-state-trust-chain-1"
global.certificates.customCAs[6].secret string "ca-certs-department-of-state-trust-chain-2"
global.certificates.customCAs[7].secret string "ca-certs-digicert-federal-ssp-trust-chain-1"
global.certificates.customCAs[8].secret string "ca-certs-digicert-federal-ssp-trust-chain-2"
global.certificates.customCAs[9].secret string "ca-certs-digicert-nfi-trust-chain-1"
global.certificates.customCAs[10].secret string "ca-certs-digicert-nfi-trust-chain-2"
global.certificates.customCAs[11].secret string "ca-certs-entrust-federal-ssp-trust-chain-1"
global.certificates.customCAs[12].secret string "ca-certs-entrust-federal-ssp-trust-chain-2"
global.certificates.customCAs[13].secret string "ca-certs-entrust-federal-ssp-trust-chain-3"
global.certificates.customCAs[14].secret string "ca-certs-entrust-managed-service-nfi"
global.certificates.customCAs[15].secret string "ca-certs-exostar-llc"
global.certificates.customCAs[16].secret string "ca-certs-identrust-nfi"
global.certificates.customCAs[17].secret string "ca-certs-lockheed-martin"
global.certificates.customCAs[18].secret string "ca-certs-netherlands-ministry-of-defence"
global.certificates.customCAs[19].secret string "ca-certs-northrop-grumman"
global.certificates.customCAs[20].secret string "ca-certs-raytheon-trust-chain-1"
global.certificates.customCAs[21].secret string "ca-certs-raytheon-trust-chain-2"
global.certificates.customCAs[22].secret string "ca-certs-us-treasury-ssp-trust-chain-1"
global.certificates.customCAs[23].secret string "ca-certs-us-treasury-ssp-trust-chain-2"
global.certificates.customCAs[24].secret string "ca-certs-verizon-cybertrust-federal-ssp"
global.certificates.customCAs[25].secret string "ca-certs-widepoint-federal-ssp-trust-chain-1"
global.certificates.customCAs[26].secret string "ca-certs-widepoint-federal-ssp-trust-chain-2"
global.certificates.customCAs[27].secret string "ca-certs-widepoint-nfi"
global.certificates.customCAs[28].secret string "ca-certs-dod-intermediate-and-issuing-ca-certs"
global.certificates.customCAs[29].secret string "ca-certs-dod-trust-anchors-self-signed"
global.certificates.customCAs[30].secret string "ca-certs-eca"
global.kubectl.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/kubectl"
global.kubectl.image.tag string "17.8.1"
global.kubectl.image.pullSecrets[0].name string "private-registry"
global.kubectl.securityContext.runAsUser int 65534
global.kubectl.securityContext.fsGroup int 65534
global.kubectl.securityContext.seccompProfile.type string "RuntimeDefault"
global.gitlabBase.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-base"
global.gitlabBase.image.tag string "17.8.1"
global.gitlabBase.image.pullSecrets[0].name string "private-registry"
global.serviceAccount.enabled bool true
global.serviceAccount.create bool true
global.serviceAccount.annotations object {}
global.serviceAccount.automountServiceAccountToken bool false
global.tracing.connection.string string ""
global.tracing.urlTemplate string ""
global.zoekt.gateway.basicAuth object {}
global.zoekt.indexer.internalApi object {}
global.extraEnv object {}
global.extraEnvFrom object {}
global.job.nameSuffixOverride string nil
global.traefik.apiVersion string ""
upgradeCheck.enabled bool true
upgradeCheck.image.repository string "registry1.dso.mil/ironbank/redhat/ubi/ubi9"
upgradeCheck.image.tag string "9.5"
upgradeCheck.image.pullSecrets[0].name string "private-registry"
upgradeCheck.securityContext.runAsUser int 65534
upgradeCheck.securityContext.runAsGroup int 65534
upgradeCheck.securityContext.fsGroup int 65534
upgradeCheck.securityContext.seccompProfile.type string "RuntimeDefault"
upgradeCheck.containerSecurityContext.runAsUser int 65534
upgradeCheck.containerSecurityContext.runAsGroup int 65534
upgradeCheck.containerSecurityContext.allowPrivilegeEscalation bool false
upgradeCheck.containerSecurityContext.runAsNonRoot bool true
upgradeCheck.containerSecurityContext.capabilities.drop[0] string "ALL"
upgradeCheck.tolerations list []
upgradeCheck.annotations."sidecar.istio.io/inject" string "true"
upgradeCheck.configMapAnnotations object {}
upgradeCheck.resources.requests.cpu string "500m"
upgradeCheck.resources.requests.memory string "500Mi"
upgradeCheck.resources.limits.cpu string "500m"
upgradeCheck.resources.limits.memory string "500Mi"
certmanager.installCRDs bool false
certmanager.nameOverride string "certmanager"
certmanager.install bool false
certmanager.rbac.create bool true
nginx-ingress.enabled bool false
nginx-ingress-geo.<<.enabled bool false
nginx-ingress.tcpExternalConfig string "true"
nginx-ingress-geo.<<.tcpExternalConfig string "true"
nginx-ingress-geo.<<.controller.addHeaders.Referrer-Policy string "strict-origin-when-cross-origin"
nginx-ingress.controller.addHeaders.Referrer-Policy string "strict-origin-when-cross-origin"
nginx-ingress-geo.controller.<<.addHeaders.Referrer-Policy string "strict-origin-when-cross-origin"
nginx-ingress.controller.config.annotation-value-word-blocklist string "load_module,lua_package,_by_lua,location,root,proxy_pass,serviceaccount,{,},',\""
nginx-ingress-geo.<<.controller.config.annotation-value-word-blocklist string "load_module,lua_package,_by_lua,location,root,proxy_pass,serviceaccount,{,},',\""
nginx-ingress-geo.controller.config.<<.annotation-value-word-blocklist string "load_module,lua_package,_by_lua,location,root,proxy_pass,serviceaccount,{,},',\""
nginx-ingress-geo.controller.<<.config.annotation-value-word-blocklist string "load_module,lua_package,_by_lua,location,root,proxy_pass,serviceaccount,{,},',\""
nginx-ingress.controller.config.hsts string "true"
nginx-ingress-geo.<<.controller.config.hsts string "true"
nginx-ingress-geo.controller.config.<<.hsts string "true"
nginx-ingress-geo.controller.<<.config.hsts string "true"
nginx-ingress.controller.config.hsts-include-subdomains string "false"
nginx-ingress-geo.<<.controller.config.hsts-include-subdomains string "false"
nginx-ingress-geo.controller.config.<<.hsts-include-subdomains string "false"
nginx-ingress-geo.controller.<<.config.hsts-include-subdomains string "false"
nginx-ingress-geo.controller.<<.config.hsts-max-age string "63072000"
nginx-ingress.controller.config.hsts-max-age string "63072000"
nginx-ingress-geo.controller.config.<<.hsts-max-age string "63072000"
nginx-ingress-geo.<<.controller.config.hsts-max-age string "63072000"
nginx-ingress-geo.controller.config.<<.server-name-hash-bucket-size string "256"
nginx-ingress.controller.config.server-name-hash-bucket-size string "256"
nginx-ingress-geo.<<.controller.config.server-name-hash-bucket-size string "256"
nginx-ingress-geo.controller.<<.config.server-name-hash-bucket-size string "256"
nginx-ingress-geo.controller.config.<<.use-http2 string "true"
nginx-ingress.controller.config.use-http2 string "true"
nginx-ingress-geo.<<.controller.config.use-http2 string "true"
nginx-ingress-geo.controller.<<.config.use-http2 string "true"
nginx-ingress-geo.controller.config.<<.ssl-ciphers string "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"
nginx-ingress-geo.<<.controller.config.ssl-ciphers string "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"
nginx-ingress.controller.config.ssl-ciphers string "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"
nginx-ingress-geo.controller.<<.config.ssl-ciphers string "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"
nginx-ingress-geo.controller.config.<<.ssl-protocols string "TLSv1.3 TLSv1.2"
nginx-ingress-geo.controller.<<.config.ssl-protocols string "TLSv1.3 TLSv1.2"
nginx-ingress-geo.<<.controller.config.ssl-protocols string "TLSv1.3 TLSv1.2"
nginx-ingress.controller.config.ssl-protocols string "TLSv1.3 TLSv1.2"
nginx-ingress-geo.<<.controller.config.server-tokens string "false"
nginx-ingress-geo.controller.<<.config.server-tokens string "false"
nginx-ingress-geo.controller.config.<<.server-tokens string "false"
nginx-ingress.controller.config.server-tokens string "false"
nginx-ingress-geo.controller.<<.config.upstream-keepalive-connections int 100
nginx-ingress-geo.controller.config.<<.upstream-keepalive-connections int 100
nginx-ingress-geo.<<.controller.config.upstream-keepalive-connections int 100
nginx-ingress.controller.config.upstream-keepalive-connections int 100
nginx-ingress-geo.controller.config.<<.upstream-keepalive-time string "30s"
nginx-ingress-geo.controller.<<.config.upstream-keepalive-time string "30s"
nginx-ingress-geo.<<.controller.config.upstream-keepalive-time string "30s"
nginx-ingress.controller.config.upstream-keepalive-time string "30s"
nginx-ingress-geo.controller.<<.config.upstream-keepalive-timeout int 5
nginx-ingress.controller.config.upstream-keepalive-timeout int 5
nginx-ingress-geo.<<.controller.config.upstream-keepalive-timeout int 5
nginx-ingress-geo.controller.config.<<.upstream-keepalive-timeout int 5
nginx-ingress.controller.config.upstream-keepalive-requests int 1000
nginx-ingress-geo.<<.controller.config.upstream-keepalive-requests int 1000
nginx-ingress-geo.controller.config.<<.upstream-keepalive-requests int 1000
nginx-ingress-geo.controller.<<.config.upstream-keepalive-requests int 1000
nginx-ingress-geo.<<.controller.service.externalTrafficPolicy string "Local"
nginx-ingress.controller.service.externalTrafficPolicy string "Local"
nginx-ingress-geo.controller.<<.service.externalTrafficPolicy string "Local"
nginx-ingress.controller.ingressClassByName bool false
nginx-ingress-geo.<<.controller.ingressClassByName bool false
nginx-ingress-geo.controller.<<.ingressClassByName bool false
nginx-ingress.controller.ingressClassResource.name string "{{ include \"ingress.class.name\" $ }}"
nginx-ingress-geo.<<.controller.ingressClassResource.name string "{{ include \"ingress.class.name\" $ }}"
nginx-ingress-geo.controller.<<.ingressClassResource.name string "{{ include \"ingress.class.name\" $ }}"
nginx-ingress-geo.controller.<<.resources.requests.cpu string "100m"
nginx-ingress-geo.<<.controller.resources.requests.cpu string "100m"
nginx-ingress.controller.resources.requests.cpu string "100m"
nginx-ingress-geo.controller.<<.resources.requests.memory string "100Mi"
nginx-ingress.controller.resources.requests.memory string "100Mi"
nginx-ingress-geo.<<.controller.resources.requests.memory string "100Mi"
nginx-ingress-geo.controller.<<.publishService.enabled bool true
nginx-ingress-geo.<<.controller.publishService.enabled bool true
nginx-ingress.controller.publishService.enabled bool true
nginx-ingress-geo.controller.<<.replicaCount int 2
nginx-ingress-geo.<<.controller.replicaCount int 2
nginx-ingress.controller.replicaCount int 2
nginx-ingress-geo.<<.controller.minAvailable int 1
nginx-ingress-geo.controller.<<.minAvailable int 1
nginx-ingress.controller.minAvailable int 1
nginx-ingress-geo.controller.<<.scope.enabled bool true
nginx-ingress.controller.scope.enabled bool true
nginx-ingress-geo.<<.controller.scope.enabled bool true
nginx-ingress-geo.controller.<<.metrics.enabled bool true
nginx-ingress.controller.metrics.enabled bool true
nginx-ingress-geo.<<.controller.metrics.enabled bool true
nginx-ingress-geo.controller.<<.metrics.service.annotations."gitlab.com/prometheus_scrape" string "true"
nginx-ingress.controller.metrics.service.annotations."gitlab.com/prometheus_scrape" string "true"
nginx-ingress-geo.<<.controller.metrics.service.annotations."gitlab.com/prometheus_scrape" string "true"
nginx-ingress.controller.metrics.service.annotations."gitlab.com/prometheus_port" string "10254"
nginx-ingress-geo.<<.controller.metrics.service.annotations."gitlab.com/prometheus_port" string "10254"
nginx-ingress-geo.controller.<<.metrics.service.annotations."gitlab.com/prometheus_port" string "10254"
nginx-ingress.controller.metrics.service.annotations."prometheus.io/scrape" string "true"
nginx-ingress-geo.controller.<<.metrics.service.annotations."prometheus.io/scrape" string "true"
nginx-ingress-geo.<<.controller.metrics.service.annotations."prometheus.io/scrape" string "true"
nginx-ingress-geo.controller.<<.metrics.service.annotations."prometheus.io/port" string "10254"
nginx-ingress-geo.<<.controller.metrics.service.annotations."prometheus.io/port" string "10254"
nginx-ingress.controller.metrics.service.annotations."prometheus.io/port" string "10254"
nginx-ingress.controller.admissionWebhooks.enabled bool false
nginx-ingress-geo.controller.<<.admissionWebhooks.enabled bool false
nginx-ingress-geo.<<.controller.admissionWebhooks.enabled bool false
nginx-ingress-geo.<<.defaultBackend.resources.requests.cpu string "5m"
nginx-ingress.defaultBackend.resources.requests.cpu string "5m"
nginx-ingress-geo.<<.defaultBackend.resources.requests.memory string "5Mi"
nginx-ingress.defaultBackend.resources.requests.memory string "5Mi"
nginx-ingress.rbac.create bool true
nginx-ingress-geo.<<.rbac.create bool true
nginx-ingress-geo.<<.rbac.scope bool false
nginx-ingress.rbac.scope bool false
nginx-ingress-geo.<<.serviceAccount.create bool true
nginx-ingress.serviceAccount.create bool true
nginx-ingress-geo.enabled bool false
nginx-ingress-geo.controller.config.use-forwarded-headers bool true
nginx-ingress-geo.controller.electionID string "ingress-controller-leader-geo"
nginx-ingress-geo.controller.ingressClassResource.name string "{{ include \"gitlab.geo.ingress.class.name\" $ | quote }}"
nginx-ingress-geo.controller.ingressClassResource.controllerValue string "k8s.io/nginx-ingress-geo"
nginx-ingress-geo.externalIpTpl string "{{ .Values.global.hosts.externalGeoIP }}"
haproxy.install bool false
haproxy.controller.service.type string "LoadBalancer"
haproxy.controller.service.tcpPorts[0].name string "ssh"
haproxy.controller.service.tcpPorts[0].port int 22
haproxy.controller.service.tcpPorts[0].targetPort int 22
haproxy.controller.extraArgs[0] string "--configmap-tcp-services=$(POD_NAMESPACE)/$(POD_NAMESPACE)-haproxy-tcp"
prometheus.install bool false
prometheus.rbac.create bool true
prometheus.alertmanager.enabled bool false
prometheus.alertmanagerFiles."alertmanager.yml" object {}
prometheus.kubeStateMetrics.enabled bool false
prometheus.nodeExporter.enabled bool false
prometheus.pushgateway.enabled bool false
prometheus.server.enabled bool false
prometheus.server.retention string "15d"
prometheus.server.strategy.type string "Recreate"
prometheus.server.image.tag string "v2.38.0"
prometheus.server.containerSecurityContext.runAsUser int 1000
prometheus.server.containerSecurityContext.allowPrivilegeEscalation bool false
prometheus.server.containerSecurityContext.runAsNonRoot bool true
prometheus.server.containerSecurityContext.capabilities.drop[0] string "ALL"
prometheus.server.containerSecurityContext.seccompProfile.type string "RuntimeDefault"
prometheus.podSecurityPolicy.enabled bool false
prometheus.configmapReload.prometheus.containerSecurityContext.runAsUser int 1000
prometheus.configmapReload.prometheus.containerSecurityContext.allowPrivilegeEscalation bool false
prometheus.configmapReload.prometheus.containerSecurityContext.runAsNonRoot bool true
prometheus.configmapReload.prometheus.containerSecurityContext.capabilities.drop[0] string "ALL"
prometheus.configmapReload.prometheus.containerSecurityContext.seccompProfile.type string "RuntimeDefault"
prometheus.serverFiles."prometheus.yml".scrape_configs[0].job_name string "prometheus"
prometheus.serverFiles."prometheus.yml".scrape_configs[0].static_configs[0].targets[0] string "localhost:9090"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].job_name string "kubernetes-apiservers"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].kubernetes_sd_configs[0].role string "endpoints"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].scheme string "https"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].tls_config.ca_file string "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].tls_config.insecure_skip_verify bool true
prometheus.serverFiles."prometheus.yml".scrape_configs[1].bearer_token_file string "/var/run/secrets/kubernetes.io/serviceaccount/token"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].source_labels[0] string "__meta_kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].source_labels[1] string "__meta_kubernetes_service_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].source_labels[2] string "__meta_kubernetes_endpoint_port_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].action string "keep"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].regex string "default;kubernetes;https"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].job_name string "kubernetes-pods"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].kubernetes_sd_configs[0].role string "pod"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[0].source_labels[0] string "__meta_kubernetes_pod_annotation_gitlab_com_prometheus_scrape"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[0].action string "keep"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[0].regex bool true
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[1].source_labels[0] string "__meta_kubernetes_pod_annotation_gitlab_com_prometheus_scheme"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[1].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[1].regex string "(https?)"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[1].target_label string "__scheme__"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[2].source_labels[0] string "__meta_kubernetes_pod_annotation_gitlab_com_prometheus_path"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[2].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[2].target_label string "__metrics_path__"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[2].regex string "(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].source_labels[0] string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].source_labels[1] string "__meta_kubernetes_pod_annotation_gitlab_com_prometheus_port"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].regex string "([^:]+)(?::\\d+)?;(\\d+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].replacement string "$1:$2"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].target_label string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[4].action string "labelmap"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[4].regex string "__meta_kubernetes_pod_label_(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[5].source_labels[0] string "__meta_kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[5].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[5].target_label string "kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[6].source_labels[0] string "__meta_kubernetes_pod_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[6].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[6].target_label string "kubernetes_pod_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].job_name string "kubernetes-service-endpoints"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].kubernetes_sd_configs[0].role string "endpoints"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[0].action string "keep"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[0].regex bool true
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[0].source_labels[0] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_scrape"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[1].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[1].regex string "(https?)"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[1].source_labels[0] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_scheme"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[1].target_label string "__scheme__"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[2].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[2].regex string "(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[2].source_labels[0] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_path"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[2].target_label string "__metrics_path__"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].regex string "([^:]+)(?::\\d+)?;(\\d+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].replacement string "$1:$2"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].source_labels[0] string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].source_labels[1] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_port"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].target_label string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[4].action string "labelmap"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[4].regex string "__meta_kubernetes_service_label_(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[5].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[5].source_labels[0] string "__meta_kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[5].target_label string "kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[6].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[6].source_labels[0] string "__meta_kubernetes_service_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[6].target_label string "kubernetes_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[7].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[7].source_labels[0] string "__meta_kubernetes_pod_node_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[7].target_label string "kubernetes_node"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].job_name string "kubernetes-services"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].metrics_path string "/probe"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].params.module[0] string "http_2xx"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].kubernetes_sd_configs[0].role string "service"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[0].source_labels[0] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_probe"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[0].action string "keep"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[0].regex bool true
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[1].source_labels[0] string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[1].target_label string "__param_target"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[2].target_label string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[2].replacement string "blackbox"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[3].source_labels[0] string "__param_target"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[3].target_label string "instance"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[4].action string "labelmap"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[4].regex string "__meta_kubernetes_service_label_(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[5].source_labels[0] string "__meta_kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[5].target_label string "kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[6].source_labels[0] string "__meta_kubernetes_service_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[6].target_label string "kubernetes_name"
redis.global.imagePullSecrets[0] string "private-registry"
redis.install bool true
redis.auth.existingSecret string "gitlab-redis-secret"
redis.auth.existingSecretKey string "secret"
redis.auth.usePasswordFiles bool true
redis.architecture string "standalone"
redis.cluster.enabled bool false
redis.metrics.enabled bool true
redis.metrics.image.registry string "registry1.dso.mil/ironbank/bitnami"
redis.metrics.image.repository string "analytics/redis-exporter"
redis.metrics.image.tag string "v1.67.0"
redis.metrics.image.pullSecrets list []
redis.metrics.resources.limits.cpu string "250m"
redis.metrics.resources.limits.memory string "256Mi"
redis.metrics.resources.requests.cpu string "250m"
redis.metrics.resources.requests.memory string "256Mi"
redis.metrics.containerSecurityContext.enabled bool true
redis.metrics.containerSecurityContext.runAsUser int 1001
redis.metrics.containerSecurityContext.runAsGroup int 1001
redis.metrics.containerSecurityContext.runAsNonRoot bool true
redis.metrics.containerSecurityContext.capabilities.drop[0] string "ALL"
redis.serviceAccount.automountServiceAccountToken bool false
redis.securityContext.runAsUser int 1001
redis.securityContext.fsGroup int 1001
redis.securityContext.runAsNonRoot bool true
redis.image.registry string "registry1.dso.mil/ironbank/bitnami"
redis.image.repository string "redis"
redis.image.tag string "7.4.2"
redis.image.pullSecrets list []
redis.master.resources.limits.cpu string "250m"
redis.master.resources.limits.memory string "256Mi"
redis.master.resources.requests.cpu string "250m"
redis.master.resources.requests.memory string "256Mi"
redis.master.containerSecurityContext.enabled bool true
redis.master.containerSecurityContext.runAsUser int 1001
redis.master.containerSecurityContext.runAsGroup int 1001
redis.master.containerSecurityContext.runAsNonRoot bool true
redis.master.containerSecurityContext.capabilities.drop[0] string "ALL"
redis.slave.resources.limits.cpu string "250m"
redis.slave.resources.limits.memory string "256Mi"
redis.slave.resources.requests.cpu string "250m"
redis.slave.resources.requests.memory string "256Mi"
redis.slave.containerSecurityContext.enabled bool true
redis.slave.containerSecurityContext.runAsUser int 1001
redis.slave.containerSecurityContext.runAsGroup int 1001
redis.slave.containerSecurityContext.runAsNonRoot bool true
redis.slave.containerSecurityContext.capabilities.drop[0] string "ALL"
redis.sentinel.resources.limits.cpu string "250m"
redis.sentinel.resources.limits.memory string "256Mi"
redis.sentinel.resources.requests.cpu string "250m"
redis.sentinel.resources.requests.memory string "256Mi"
redis.volumePermissions.resources.limits.cpu string "250m"
redis.volumePermissions.resources.limits.memory string "256Mi"
redis.volumePermissions.resources.requests.cpu string "250m"
redis.volumePermissions.resources.requests.memory string "256Mi"
redis.sysctlImage.resources.limits.cpu string "250m"
redis.sysctlImage.resources.limits.memory string "256Mi"
redis.sysctlImage.resources.requests.cpu string "250m"
redis.sysctlImage.resources.requests.memory string "256Mi"
postgresql.install bool true
postgresql.postgresqlDatabase string "gitlabhq_production"
postgresql.resources.limits.cpu string "500m"
postgresql.resources.limits.memory string "500Mi"
postgresql.resources.requests.cpu string "500m"
postgresql.resources.requests.memory string "500Mi"
postgresql.image.registry string "registry1.dso.mil"
postgresql.image.repository string "ironbank/opensource/postgres/postgresql"
postgresql.image.tag string "14.15"
postgresql.image.pullSecrets[0] string "private-registry"
postgresql.auth.username string "gitlab"
postgresql.auth.password string "bogus-satisfy-upgrade"
postgresql.auth.postgresPassword string "bogus-satisfy-upgrade"
postgresql.auth.usePasswordFiles bool false
postgresql.auth.existingSecret string "{{ include \"gitlab.psql.password.secret\" . }}"
postgresql.auth.secretKeys.adminPasswordKey string "postgresql-postgres-password"
postgresql.auth.secretKeys.userPasswordKey string "{{ include \"gitlab.psql.password.key\" $ }}"
postgresql.primary.persistence.mountPath string "/var/lib/postgresql"
postgresql.primary.initdb.scriptsConfigMap string "{{ include \"gitlab.psql.initdbscripts\" $}}"
postgresql.primary.initdb.user string "gitlab"
postgresql.primary.containerSecurityContext.enabled bool true
postgresql.primary.containerSecurityContext.runAsUser int 1001
postgresql.primary.containerSecurityContext.runAsGroup int 1001
postgresql.primary.containerSecurityContext.capabilities.drop[0] string "ALL"
postgresql.master.extraVolumeMounts[0].name string "custom-init-scripts"
postgresql.master.extraVolumeMounts[0].mountPath string "/docker-entrypoint-preinitdb.d/init_revision.sh"
postgresql.master.extraVolumeMounts[0].subPath string "init_revision.sh"
postgresql.master.podAnnotations."postgresql.gitlab/init-revision" string "1"
postgresql.metrics.enabled bool false
postgresql.metrics.service.annotations."prometheus.io/scrape" string "true"
postgresql.metrics.service.annotations."prometheus.io/port" string "9187"
postgresql.metrics.service.annotations."gitlab.com/prometheus_scrape" string "true"
postgresql.metrics.service.annotations."gitlab.com/prometheus_port" string "9187"
postgresql.postgresqlInitdbArgs string "-A scram-sha-256"
postgresql.securityContext.enabled bool true
postgresql.securityContext.fsGroup int 26
postgresql.securityContext.runAsUser int 26
postgresql.securityContext.runAsGroup int 26
postgresql.postgresqlDataDir string "/var/lib/postgresql/pgdata/data"
postgresql.volumePermissions.enabled bool false
registry.enabled bool true
registry.init.resources.limits.cpu string "200m"
registry.init.resources.limits.memory string "200Mi"
registry.init.resources.requests.cpu string "200m"
registry.init.resources.requests.memory string "200Mi"
registry.init.containerSecurityContext.capabilities.drop[0] string "ALL"
registry.resources.limits.cpu string "200m"
registry.resources.limits.memory string "1024Mi"
registry.resources.requests.cpu string "200m"
registry.resources.requests.memory string "1024Mi"
registry.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-container-registry"
registry.image.tag string "17.8.1"
registry.image.pullSecrets[0].name string "private-registry"
registry.ingress.enabled bool false
registry.metrics.enabled bool true
registry.metrics.path string "/metrics"
registry.metrics.serviceMonitor.enabled bool true
registry.securityContext.runAsUser int 1000
registry.securityContext.runAsGroup int 1000
registry.securityContext.fsGroup int 1000
registry.containerSecurityContext.runAsUser int 1000
registry.containerSecurityContext.runAsGroup int 1000
registry.containerSecurityContext.capabilities.drop[0] string "ALL"
shared-secrets.enabled bool true
shared-secrets.rbac.create bool true
shared-secrets.selfsign.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/cfssl-self-sign"
shared-secrets.selfsign.image.tag string "1.6.1"
shared-secrets.selfsign.keyAlgorithm string "rsa"
shared-secrets.selfsign.keySize string "4096"
shared-secrets.selfsign.expiry string "3650d"
shared-secrets.selfsign.caSubject string "GitLab Helm Chart"
shared-secrets.env string "production"
shared-secrets.serviceAccount.enabled bool true
shared-secrets.serviceAccount.create bool true
shared-secrets.serviceAccount.name string nil
shared-secrets.serviceAccount.automountServiceAccountToken bool false
shared-secrets.resources.requests.cpu string "300m"
shared-secrets.resources.requests.memory string "200Mi"
shared-secrets.resources.limits.cpu string "300m"
shared-secrets.resources.limits.memory string "200Mi"
shared-secrets.securityContext.runAsUser int 65534
shared-secrets.securityContext.runAsGroup int 65534
shared-secrets.securityContext.fsGroup int 65534
shared-secrets.securityContext.seccompProfile.type string "RuntimeDefault"
shared-secrets.containerSecurityContext.allowPrivilegeEscalation bool false
shared-secrets.containerSecurityContext.runAsNonRoot bool true
shared-secrets.containerSecurityContext.capabilities.drop[0] string "ALL"
shared-secrets.tolerations list []
shared-secrets.podLabels object {}
shared-secrets.annotations."sidecar.istio.io/inject" string "true"
gitlab-runner.install bool false
gitlab-runner.rbac.create bool true
gitlab-runner.runners.locked bool false
gitlab-runner.runners.secret string "nonempty"
gitlab-runner.runners.config string "[[runners]]\n [runners.kubernetes]\n image = \"ubuntu:22.04\"\n {{- if .Values.global.minio.enabled }}\n [runners.cache]\n Type = \"s3\"\n Path = \"gitlab-runner\"\n Shared = true\n [runners.cache.s3]\n ServerAddress = {{ include \"gitlab-runner.cache-tpl.s3ServerAddress\" . }}\n BucketName = \"runner-cache\"\n BucketLocation = \"us-east-1\"\n Insecure = false\n {{ end }}\n"
gitlab-runner.podAnnotations."gitlab.com/prometheus_scrape" string "true"
gitlab-runner.podAnnotations."gitlab.com/prometheus_port" int 9252
gitlab-runner.podSecurityContext.seccompProfile.type string "RuntimeDefault"
gitlab-runner.securityContext.capabilities.drop[0] string "ALL"
traefik.install bool false
traefik.ports.gitlab-shell.expose bool true
traefik.ports.gitlab-shell.port int 2222
traefik.ports.gitlab-shell.exposedPort int 22
gitlab.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.certificates.init.securityContext.capabilities.drop[0] string "ALL"
gitlab.certificates.init.securityContext.runAsUser int 65534
gitlab.certificates.init.securityContext.runAsNonRoot bool true
gitlab.toolbox.replicas int 1
gitlab.toolbox.antiAffinityLabels.matchLabels.app string "gitaly"
gitlab.toolbox.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-toolbox"
gitlab.toolbox.image.tag string "17.8.1"
gitlab.toolbox.image.pullSecrets[0].name string "private-registry"
gitlab.toolbox.init.resources.requests.cpu string "200m"
gitlab.toolbox.init.resources.requests.memory string "200Mi"
gitlab.toolbox.init.resources.limits.cpu string "200m"
gitlab.toolbox.init.resources.limits.memory string "200Mi"
gitlab.toolbox.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.toolbox.resources.requests.cpu int 2
gitlab.toolbox.resources.requests.memory string "3.5Gi"
gitlab.toolbox.resources.limits.cpu int 2
gitlab.toolbox.resources.limits.memory string "3.5Gi"
gitlab.toolbox.annotations."sidecar.istio.io/proxyMemory" string "512Mi"
gitlab.toolbox.annotations."sidecar.istio.io/proxyMemoryLimit" string "512Mi"
gitlab.toolbox.backups.cron.resources.requests.cpu string "500m"
gitlab.toolbox.backups.cron.resources.requests.memory string "768Mi"
gitlab.toolbox.backups.cron.resources.limits.cpu string "500m"
gitlab.toolbox.backups.cron.resources.limits.memory string "768Mi"
gitlab.toolbox.backups.cron.istioShutdown string "&& echo \"Backup Complete\" && until curl -fsI http://localhost:15021/healthz/ready; do echo \"Waiting for Istio sidecar proxy...\"; sleep 3; done && sleep 5 && echo \"Stopping the istio proxy...\" && curl -X POST http://localhost:15020/quitquitquit"
gitlab.toolbox.securityContext.runAsUser int 1000
gitlab.toolbox.securityContext.runAsGroup int 1000
gitlab.toolbox.securityContext.fsGroup int 1000
gitlab.toolbox.containerSecurityContext.runAsUser int 1000
gitlab.toolbox.containerSecurityContext.runAsGroup int 1000
gitlab.toolbox.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.toolbox.customScripts string nil
gitlab.gitlab-exporter.enabled bool false
gitlab.gitlab-exporter.init.resources.limits.cpu string "200m"
gitlab.gitlab-exporter.init.resources.limits.memory string "200Mi"
gitlab.gitlab-exporter.init.resources.requests.cpu string "200m"
gitlab.gitlab-exporter.init.resources.requests.memory string "200Mi"
gitlab.gitlab-exporter.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-exporter.resources.limits.cpu string "150m"
gitlab.gitlab-exporter.resources.limits.memory string "200Mi"
gitlab.gitlab-exporter.resources.requests.cpu string "150m"
gitlab.gitlab-exporter.resources.requests.memory string "200Mi"
gitlab.gitlab-exporter.capabilities.drop[0] string "ALL"
gitlab.gitlab-exporter.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-exporter"
gitlab.gitlab-exporter.image.tag string "17.8.1"
gitlab.gitlab-exporter.image.pullSecrets[0].name string "private-registry"
gitlab.gitlab-exporter.metrics.enabled bool true
gitlab.gitlab-exporter.metrics.port int 9168
gitlab.gitlab-exporter.metrics.serviceMonitor.enabled bool true
gitlab.gitlab-exporter.securityContext.runAsUser int 1000
gitlab.gitlab-exporter.securityContext.runAsGroup int 1000
gitlab.gitlab-exporter.securityContext.fsGroup int 1000
gitlab.gitlab-exporter.containerSecurityContext.runAsUser int 1000
gitlab.gitlab-exporter.containerSecurityContext.runAsGroup int 1000
gitlab.gitlab-exporter.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.migrations.annotations."sidecar.istio.io/inject" string "true"
gitlab.migrations.init.resources.limits.cpu string "500m"
gitlab.migrations.init.resources.limits.memory string "768Mi"
gitlab.migrations.init.resources.requests.cpu string "500m"
gitlab.migrations.init.resources.requests.memory string "768Mi"
gitlab.migrations.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.migrations.resources.limits.cpu string "500m"
gitlab.migrations.resources.limits.memory string "1.5G"
gitlab.migrations.resources.requests.cpu string "500m"
gitlab.migrations.resources.requests.memory string "1.5G"
gitlab.migrations.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-toolbox"
gitlab.migrations.image.tag string "17.8.1"
gitlab.migrations.image.pullSecrets[0].name string "private-registry"
gitlab.migrations.securityContext.runAsUser int 1000
gitlab.migrations.securityContext.runAsGroup int 1000
gitlab.migrations.securityContext.fsGroup int 1000
gitlab.migrations.containerSecurityContext.runAsUser int 1000
gitlab.migrations.containerSecurityContext.runAsGroup int 1000
gitlab.migrations.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.webservice.init.resources.limits.cpu string "200m"
gitlab.webservice.init.resources.limits.memory string "200Mi"
gitlab.webservice.init.resources.requests.cpu string "200m"
gitlab.webservice.init.resources.requests.memory string "200Mi"
gitlab.webservice.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.webservice.securityContext.runAsUser int 1000
gitlab.webservice.securityContext.runAsGroup int 1000
gitlab.webservice.securityContext.fsGroup int 1000
gitlab.webservice.containerSecurityContext.runAsUser int 1000
gitlab.webservice.containerSecurityContext.runAsGroup int 1000
gitlab.webservice.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.webservice.resources.limits.cpu string "1000m"
gitlab.webservice.resources.limits.memory string "2.5G"
gitlab.webservice.resources.requests.cpu string "300m"
gitlab.webservice.resources.requests.memory string "2.5G"
gitlab.webservice.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-webservice"
gitlab.webservice.image.tag string "17.8.1"
gitlab.webservice.image.pullSecrets[0].name string "private-registry"
gitlab.webservice.workhorse.resources.limits.cpu string "600m"
gitlab.webservice.workhorse.resources.limits.memory string "2.5G"
gitlab.webservice.workhorse.resources.requests.cpu string "600m"
gitlab.webservice.workhorse.resources.requests.memory string "2.5G"
gitlab.webservice.workhorse.image string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-workhorse"
gitlab.webservice.workhorse.tag string "17.8.1"
gitlab.webservice.workhorse.pullSecrets[0].name string "private-registry"
gitlab.webservice.workhorse.metrics.enabled bool true
gitlab.webservice.workhorse.metrics.serviceMonitor.enabled bool true
gitlab.webservice.workhorse.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.webservice.ingress.enabled bool false
gitlab.webservice.metrics.enabled bool true
gitlab.webservice.metrics.port int 8083
gitlab.webservice.metrics.serviceMonitor.enabled bool true
gitlab.webservice.helmTests.enabled bool false
gitlab.sidekiq.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-sidekiq"
gitlab.sidekiq.image.tag string "17.8.1"
gitlab.sidekiq.image.pullSecrets[0].name string "private-registry"
gitlab.sidekiq.init.resources.limits.cpu string "200m"
gitlab.sidekiq.init.resources.limits.memory string "200Mi"
gitlab.sidekiq.init.resources.requests.cpu string "200m"
gitlab.sidekiq.init.resources.requests.memory string "200Mi"
gitlab.sidekiq.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.sidekiq.resources.requests.memory string "3G"
gitlab.sidekiq.resources.requests.cpu string "1500m"
gitlab.sidekiq.resources.limits.memory string "3G"
gitlab.sidekiq.resources.limits.cpu string "1500m"
gitlab.sidekiq.securityContext.runAsUser int 1000
gitlab.sidekiq.securityContext.runAsGroup int 1000
gitlab.sidekiq.securityContext.fsGroup int 1000
gitlab.sidekiq.containerSecurityContext.runAsUser int 1000
gitlab.sidekiq.containerSecurityContext.runAsGroup int 1000
gitlab.sidekiq.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitaly.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitaly"
gitlab.gitaly.image.tag string "17.8.1"
gitlab.gitaly.image.pullSecrets[0].name string "private-registry"
gitlab.gitaly.init.resources.limits.cpu string "200m"
gitlab.gitaly.init.resources.limits.memory string "200Mi"
gitlab.gitaly.init.resources.requests.cpu string "200m"
gitlab.gitaly.init.resources.requests.memory string "200Mi"
gitlab.gitaly.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitaly.resources.requests.cpu string "400m"
gitlab.gitaly.resources.requests.memory string "600Mi"
gitlab.gitaly.resources.limits.cpu string "400m"
gitlab.gitaly.resources.limits.memory string "600Mi"
gitlab.gitaly.metrics.enabled bool true
gitlab.gitaly.metrics.serviceMonitor.enabled bool true
gitlab.gitaly.securityContext.runAsUser int 1000
gitlab.gitaly.securityContext.runAsGroup int 1000
gitlab.gitaly.securityContext.fsGroup int 1000
gitlab.gitaly.containerSecurityContext.runAsUser int 1000
gitlab.gitaly.containerSecurityContext.runAsGroup int 1000
gitlab.gitaly.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-shell.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-shell"
gitlab.gitlab-shell.image.tag string "17.8.1"
gitlab.gitlab-shell.image.pullSecrets[0].name string "private-registry"
gitlab.gitlab-shell.init.resources.limits.cpu string "200m"
gitlab.gitlab-shell.init.resources.limits.memory string "200Mi"
gitlab.gitlab-shell.init.resources.requests.cpu string "200m"
gitlab.gitlab-shell.init.resources.requests.memory string "200Mi"
gitlab.gitlab-shell.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-shell.resources.limits.cpu string "300m"
gitlab.gitlab-shell.resources.limits.memory string "300Mi"
gitlab.gitlab-shell.resources.requests.cpu string "300m"
gitlab.gitlab-shell.resources.requests.memory string "300Mi"
gitlab.gitlab-shell.securityContext.runAsUser int 1000
gitlab.gitlab-shell.securityContext.runAsGroup int 1000
gitlab.gitlab-shell.securityContext.fsGroup int 1000
gitlab.gitlab-shell.containerSecurityContext.runAsUser int 1000
gitlab.gitlab-shell.containerSecurityContext.runAsGroup int 1000
gitlab.gitlab-shell.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.mailroom.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-mailroom"
gitlab.mailroom.image.tag string "17.8.1"
gitlab.mailroom.image.pullSecrets[0].name string "private-registry"
gitlab.mailroom.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-pages.service.customDomains.type string "ClusterIP"
gitlab.gitlab-pages.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-pages"
gitlab.gitlab-pages.image.tag string "17.8.1"
gitlab.gitlab-pages.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.praefect.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitaly"
gitlab.praefect.image.tag string "17.8.1"
gitlab.praefect.init.resources.limits.cpu string "200m"
gitlab.praefect.init.resources.limits.memory string "200Mi"
gitlab.praefect.init.resources.requests.cpu string "200m"
gitlab.praefect.init.resources.requests.memory string "200Mi"
gitlab.praefect.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.praefect.resources.requests.cpu int 1
gitlab.praefect.resources.requests.memory string "1Gi"
gitlab.praefect.resources.limits.cpu int 1
gitlab.praefect.resources.limits.memory string "1Gi"
gitlab.praefect.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab-zoekt.install bool false
gitlab-zoekt.gateway.basicAuth.enabled bool false
gitlab-zoekt.gateway.basicAuth.secretName string "{{ include \"gitlab.zoekt.gateway.basicAuth.secretName\" $ }}"
gitlab-zoekt.indexer.internalApi.enabled bool true
gitlab-zoekt.indexer.internalApi.secretName string "{{ include \"gitlab.zoekt.indexer.internalApi.secretName\" $ }}"
gitlab-zoekt.indexer.internalApi.secretKey string "{{ include \"gitlab.zoekt.indexer.internalApi.secretKey\" $ }}"
gitlab-zoekt.indexer.internalApi.gitlabUrl string "{{ include \"gitlab.zoekt.indexer.internalApi.gitlabUrl\" $ }}"
minio.init.resources.limits.cpu string "200m"
minio.init.resources.limits.memory string "200Mi"
minio.init.resources.requests.cpu string "200m"
minio.init.resources.requests.memory string "200Mi"
minio.init.containerSecurityContext.capabilities.drop[0] string "ALL"
minio.resources.limits.cpu string "200m"
minio.resources.limits.memory string "300Mi"
minio.resources.requests.cpu string "200m"
minio.resources.requests.memory string "300Mi"
minio.securityContext.runAsUser int 1000
minio.securityContext.runAsGroup int 1000
minio.securityContext.fsGroup int 1000
minio.containerSecurityContext.runAsUser int 1000
minio.containerSecurityContext.runAsGroup int 1000
minio.containerSecurityContext.runAsNonRoot bool true
minio.containerSecurityContext.capabilities.drop[0] string "ALL"
minio.jobAnnotations."sidecar.istio.io/inject" string "true"
minio.image string "registry1.dso.mil/ironbank/opensource/minio/minio"
minio.imageTag string "RELEASE.2024-06-04T19-20-08Z"
minio.pullSecrets[0].name string "private-registry"
minio.minioMc.image string "registry1.dso.mil/ironbank/opensource/minio/mc"
minio.minioMc.tag string "RELEASE.2024-10-02T08-27-28Z"
minio.minioMc.pullSecrets[0].name string "private-registry"
domain string "dev.bigbang.mil"
sso.enabled bool false
sso.host string "login.dso.mil"
istio.enabled bool false
istio.injection string "disabled"
istio.hardened.enabled bool false
istio.hardened.outboundTrafficPolicyMode string "REGISTRY_ONLY"
istio.hardened.customServiceEntries list []
istio.hardened.customAuthorizationPolicies list []
istio.hardened.gitlabRunner.enabled bool true
istio.hardened.gitlabRunner.namespaces[0] string "gitlab-runner"
istio.hardened.monitoring.enabled bool true
istio.hardened.monitoring.namespaces[0] string "monitoring"
istio.hardened.monitoring.principals[0] string "cluster.local/ns/monitoring/sa/monitoring-grafana"
istio.hardened.monitoring.principals[1] string "cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-alertmanager"
istio.hardened.monitoring.principals[2] string "cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-operator"
istio.hardened.monitoring.principals[3] string "cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-prometheus"
istio.hardened.monitoring.principals[4] string "cluster.local/ns/monitoring/sa/monitoring-monitoring-kube-state-metrics"
istio.hardened.monitoring.principals[5] string "cluster.local/ns/monitoring/sa/monitoring-monitoring-prometheus-node-exporter"
istio.gitlab.enabled bool true
istio.gitlab.annotations object {}
istio.gitlab.labels object {}
istio.gitlab.gateways[0] string "istio-system/main"
istio.gitlab.hosts string nil
istio.gitlab.selectorLabels.app string "webservice"
istio.registry.enabled bool true
istio.registry.annotations object {}
istio.registry.labels object {}
istio.registry.gateways[0] string "istio-system/main"
istio.registry.hosts string nil
istio.registry.selectorLabels.app string "registry"
istio.pages.enabled bool false
istio.pages.annotations object {}
istio.pages.ingressLabels.app string "pages-ingressgateway"
istio.pages.ingressLabels.istio string "ingressgateway"
istio.pages.labels object {}
istio.pages.gateways[0] string "istio-system/pages"
istio.pages.customDomains.enabled bool true
istio.pages.hosts[0] string "*.pages.dev.bigbang.mil"
istio.mtls object {"mode":"STRICT"} Default peer authentication
istio.mtls.mode string "STRICT" STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
monitoring.enabled bool false
networkPolicies.enabled bool false
networkPolicies.ingressLabels.app string "istio-ingressgateway"
networkPolicies.ingressLabels.istio string "ingressgateway"
networkPolicies.controlPlaneCidr string "0.0.0.0/0"
networkPolicies.egressPort string nil
networkPolicies.gitalyEgress.enabled bool false
networkPolicies.additionalPolicies list []
openshift bool false
use_iam_profile bool false
bbtests.enabled bool false
bbtests.cypress.resources.requests.cpu int 1
bbtests.cypress.resources.requests.memory string "2Gi"
bbtests.cypress.resources.limits.cpu int 1
bbtests.cypress.resources.limits.memory string "2Gi"
bbtests.cypress.artifacts bool true
bbtests.cypress.envs.cypress_url string "http://gitlab-webservice-default:8181"
bbtests.cypress.envs.cypress_gitlab_first_name string "test"
bbtests.cypress.envs.cypress_gitlab_last_name string "user"
bbtests.cypress.envs.cypress_gitlab_username string "testuser"
bbtests.cypress.envs.cypress_gitlab_password string "Password123h56a78"
bbtests.cypress.envs.cypress_gitlab_email string "[email protected]"
bbtests.cypress.envs.cypress_gitlab_project string "my-awesome-project"
bbtests.cypress.envs.cypress_keycloak_username string "cypress"
bbtests.cypress.envs.cypress_keycloak_password string "tnr_w!G33ZyAt@C8"
bbtests.cypress.secretEnvs[0].name string "cypress_adminpassword"
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.name string "gitlab-gitlab-initial-root-password"
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.key string "password"
bbtests.scripts.image string "registry1.dso.mil/bigbang-ci/devops-tester:1.1.2"
bbtests.scripts.additionalVolumes[0].name string "docker-config"
bbtests.scripts.additionalVolumes[0].secret.secretName string "private-registry"
bbtests.scripts.additionalVolumes[0].secret.items[0].key string ".dockerconfigjson"
bbtests.scripts.additionalVolumes[0].secret.items[0].path string "auth.json"
bbtests.scripts.additionalVolumeMounts[0].name string "docker-config"
bbtests.scripts.additionalVolumeMounts[0].mountPath string "/.docker/"
bbtests.scripts.envs.GITLAB_USER string "root"
bbtests.scripts.envs.GITLAB_EMAIL string "[email protected]"
bbtests.scripts.envs.GITLAB_HOST string "gitlab-webservice-default.gitlab.svc.cluster.local:8181"
bbtests.scripts.envs.GITLAB_PROJECT string "bigbang-test-project-2"
bbtests.scripts.envs.GITLAB_REGISTRY string "gitlab-registry-test-svc.gitlab.svc.cluster.local:80"
bbtests.scripts.envs.GITLAB_REPOSITORY string "http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"

Contributing

Please see the contributing guide if you are interested in contributing.


This file is programatically generated using helm-docs and some BigBang-specific templates. The gluon repository has instructions for regenerating package READMEs.