Git Product home page Git Product logo

gitlab's Introduction

gitlab

Version: 7.6.1-bb.1 AppVersion: 16.6.1

GitLab is the most comprehensive AI-powered DevSecOps Platform.

Upstream References

Learn More

Pre-Requisites

  • Kubernetes Cluster deployed
  • Kubernetes config installed in ~/.kube/config
  • Helm installed

Install Helm

https://helm.sh/docs/intro/install/

Deployment

  • Clone down the repository
  • cd into directory
helm install gitlab chart/

Values

Key Type Default Description
global.istio.enabled bool false
global.istio.injection string "disabled"
global.common.labels object {}
global.image object {}
global.pod.labels object {}
global.edition string "ee"
global.gitlabVersion string "16.6.1"
global.application.create bool false
global.application.links list []
global.application.allowClusterRoles bool true
global.hosts.domain string "bigbang.dev"
global.hosts.hostSuffix string nil
global.hosts.https bool true
global.hosts.externalIP string nil
global.hosts.ssh string nil
global.hosts.gitlab.name string "gitlab.bigbang.dev"
global.hosts.minio object {}
global.hosts.registry.name string "registry.bigbang.dev"
global.hosts.tls object {}
global.hosts.smartcard object {}
global.hosts.kas object {}
global.hosts.pages object {}
global.ingress.apiVersion string ""
global.ingress.configureCertmanager bool false
global.ingress.provider string "nginx"
global.ingress.annotations object {}
global.ingress.enabled bool false
global.ingress.tls object {}
global.ingress.path string "/"
global.ingress.pathType string "Prefix"
global.hpa.apiVersion string "autoscaling/v2"
global.keda.enabled bool false
global.pdb.apiVersion string "policy/v1"
global.batch.cronJob.apiVersion string "batch/v1"
global.monitoring.enabled bool false
global.gitlab.license object {}
global.initialRootPassword object {}
global.psql.connectTimeout string nil
global.psql.keepalives string nil
global.psql.keepalivesIdle string nil
global.psql.keepalivesInterval string nil
global.psql.keepalivesCount string nil
global.psql.tcpUserTimeout string nil
global.psql.password object {}
global.redis.auth.enabled bool true
global.redis.securityContext.runAsUser int 1001
global.redis.securityContext.fsGroup int 1001
global.redis.securityContext.runAsNonRoot bool true
global.redis.containerSecurityContext.enabled bool true
global.redis.containerSecurityContext.runAsUser int 1001
global.redis.containerSecurityContext.runAsNonRoot bool true
global.redis.containerSecurityContext.capabilities.drop[0] string "ALL"
global.gitaly.enabled bool true
global.gitaly.authToken object {}
global.gitaly.internal.names[0] string "default"
global.gitaly.external list []
global.gitaly.service.name string "gitaly"
global.gitaly.service.type string "ClusterIP"
global.gitaly.service.externalPort int 8075
global.gitaly.service.internalPort int 8075
global.gitaly.service.tls.externalPort int 8076
global.gitaly.service.tls.internalPort int 8076
global.gitaly.tls.enabled bool false
global.praefect.enabled bool false
global.praefect.ntpHost string "pool.ntp.org"
global.praefect.replaceInternalGitaly bool true
global.praefect.authToken object {}
global.praefect.autoMigrate bool true
global.praefect.dbSecret object {}
global.praefect.virtualStorages[0].name string "default"
global.praefect.virtualStorages[0].gitalyReplicas int 3
global.praefect.virtualStorages[0].maxUnavailable int 1
global.praefect.psql.sslMode string "disable"
global.praefect.service.name string "praefect"
global.praefect.service.type string "ClusterIP"
global.praefect.service.externalPort int 8075
global.praefect.service.internalPort int 8075
global.praefect.service.tls.externalPort int 8076
global.praefect.service.tls.internalPort int 8076
global.praefect.tls.enabled bool false
global.minio.enabled bool true
global.minio.credentials object {}
global.appConfig.enableUsagePing bool true
global.appConfig.enableSeatLink bool true
global.appConfig.enableImpersonation string nil
global.appConfig.applicationSettingsCacheSeconds int 60
global.appConfig.defaultCanCreateGroup bool false
global.appConfig.usernameChangingEnabled bool true
global.appConfig.issueClosingPattern string nil
global.appConfig.defaultTheme string nil
global.appConfig.defaultProjectsFeatures.issues bool true
global.appConfig.defaultProjectsFeatures.mergeRequests bool true
global.appConfig.defaultProjectsFeatures.wiki bool true
global.appConfig.defaultProjectsFeatures.snippets bool true
global.appConfig.defaultProjectsFeatures.builds bool true
global.appConfig.graphQlTimeout string nil
global.appConfig.webhookTimeout string nil
global.appConfig.maxRequestDurationSeconds string nil
global.appConfig.cron_jobs object {}
global.appConfig.contentSecurityPolicy.enabled bool false
global.appConfig.contentSecurityPolicy.report_only bool true
global.appConfig.gravatar.plainUrl string nil
global.appConfig.gravatar.sslUrl string nil
global.appConfig.extra.googleAnalyticsId string nil
global.appConfig.extra.matomoUrl string nil
global.appConfig.extra.matomoSiteId string nil
global.appConfig.extra.matomoDisableCookies string nil
global.appConfig.extra.oneTrustId string nil
global.appConfig.extra.googleTagManagerNonceId string nil
global.appConfig.extra.bizible string nil
global.appConfig.object_store.enabled bool false
global.appConfig.object_store.proxy_download bool true
global.appConfig.object_store.storage_options object {}
global.appConfig.object_store.connection object {}
global.appConfig.lfs.enabled bool true
global.appConfig.lfs.proxy_download bool true
global.appConfig.lfs.bucket string "git-lfs"
global.appConfig.lfs.connection object {}
global.appConfig.artifacts.enabled bool true
global.appConfig.artifacts.proxy_download bool true
global.appConfig.artifacts.bucket string "gitlab-artifacts"
global.appConfig.artifacts.connection object {}
global.appConfig.uploads.enabled bool true
global.appConfig.uploads.proxy_download bool true
global.appConfig.uploads.bucket string "gitlab-uploads"
global.appConfig.uploads.connection object {}
global.appConfig.packages.enabled bool true
global.appConfig.packages.proxy_download bool true
global.appConfig.packages.bucket string "gitlab-packages"
global.appConfig.packages.connection object {}
global.appConfig.externalDiffs.enabled bool false
global.appConfig.externalDiffs.when string nil
global.appConfig.externalDiffs.proxy_download bool true
global.appConfig.externalDiffs.bucket string "gitlab-mr-diffs"
global.appConfig.externalDiffs.connection object {}
global.appConfig.terraformState.enabled bool false
global.appConfig.terraformState.bucket string "gitlab-terraform-state"
global.appConfig.terraformState.connection object {}
global.appConfig.ciSecureFiles.enabled bool false
global.appConfig.ciSecureFiles.bucket string "gitlab-ci-secure-files"
global.appConfig.ciSecureFiles.connection object {}
global.appConfig.dependencyProxy.enabled bool false
global.appConfig.dependencyProxy.proxy_download bool true
global.appConfig.dependencyProxy.bucket string "gitlab-dependency-proxy"
global.appConfig.dependencyProxy.connection object {}
global.appConfig.backups.bucket string "gitlab-backups"
global.appConfig.backups.tmpBucket string "tmp"
global.appConfig.microsoft_graph_mailer.enabled bool false
global.appConfig.microsoft_graph_mailer.user_id string ""
global.appConfig.microsoft_graph_mailer.tenant string ""
global.appConfig.microsoft_graph_mailer.client_id string ""
global.appConfig.microsoft_graph_mailer.client_secret.secret string ""
global.appConfig.microsoft_graph_mailer.client_secret.key string "secret"
global.appConfig.microsoft_graph_mailer.azure_ad_endpoint string "https://login.microsoftonline.com"
global.appConfig.microsoft_graph_mailer.graph_endpoint string "https://graph.microsoft.com"
global.appConfig.incomingEmail.enabled bool false
global.appConfig.incomingEmail.address string ""
global.appConfig.incomingEmail.host string "imap.gmail.com"
global.appConfig.incomingEmail.port int 993
global.appConfig.incomingEmail.ssl bool true
global.appConfig.incomingEmail.startTls bool false
global.appConfig.incomingEmail.user string ""
global.appConfig.incomingEmail.password.secret string ""
global.appConfig.incomingEmail.password.key string "password"
global.appConfig.incomingEmail.deleteAfterDelivery bool true
global.appConfig.incomingEmail.expungeDeleted bool false
global.appConfig.incomingEmail.logger.logPath string "/dev/stdout"
global.appConfig.incomingEmail.mailbox string "inbox"
global.appConfig.incomingEmail.idleTimeout int 60
global.appConfig.incomingEmail.inboxMethod string "imap"
global.appConfig.incomingEmail.clientSecret.key string "secret"
global.appConfig.incomingEmail.pollInterval int 60
global.appConfig.incomingEmail.deliveryMethod string "webhook"
global.appConfig.incomingEmail.authToken object {}
global.appConfig.serviceDeskEmail.enabled bool false
global.appConfig.serviceDeskEmail.address string ""
global.appConfig.serviceDeskEmail.host string "imap.gmail.com"
global.appConfig.serviceDeskEmail.port int 993
global.appConfig.serviceDeskEmail.ssl bool true
global.appConfig.serviceDeskEmail.startTls bool false
global.appConfig.serviceDeskEmail.user string ""
global.appConfig.serviceDeskEmail.password.secret string ""
global.appConfig.serviceDeskEmail.password.key string "password"
global.appConfig.serviceDeskEmail.deleteAfterDelivery bool true
global.appConfig.serviceDeskEmail.expungeDeleted bool false
global.appConfig.serviceDeskEmail.logger.logPath string "/dev/stdout"
global.appConfig.serviceDeskEmail.mailbox string "inbox"
global.appConfig.serviceDeskEmail.idleTimeout int 60
global.appConfig.serviceDeskEmail.inboxMethod string "imap"
global.appConfig.serviceDeskEmail.clientSecret.key string "secret"
global.appConfig.serviceDeskEmail.pollInterval int 60
global.appConfig.serviceDeskEmail.deliveryMethod string "webhook"
global.appConfig.serviceDeskEmail.authToken object {}
global.appConfig.ldap.preventSignin bool false
global.appConfig.ldap.servers object {}
global.appConfig.duoAuth.enabled bool false
global.appConfig.gitlab_kas object {}
global.appConfig.suggested_reviewers object {}
global.appConfig.omniauth.enabled bool false
global.appConfig.omniauth.autoSignInWithProvider string nil
global.appConfig.omniauth.syncProfileFromProvider list []
global.appConfig.omniauth.syncProfileAttributes[0] string "email"
global.appConfig.omniauth.allowSingleSignOn[0] string "saml"
global.appConfig.omniauth.blockAutoCreatedUsers bool true
global.appConfig.omniauth.autoLinkLdapUser bool false
global.appConfig.omniauth.autoLinkSamlUser bool false
global.appConfig.omniauth.autoLinkUser list []
global.appConfig.omniauth.externalProviders list []
global.appConfig.omniauth.allowBypassTwoFactor list []
global.appConfig.omniauth.providers list []
global.appConfig.kerberos.enabled bool false
global.appConfig.kerberos.keytab.key string "keytab"
global.appConfig.kerberos.servicePrincipalName string ""
global.appConfig.kerberos.krb5Config string ""
global.appConfig.kerberos.dedicatedPort.enabled bool false
global.appConfig.kerberos.dedicatedPort.port int 8443
global.appConfig.kerberos.dedicatedPort.https bool true
global.appConfig.kerberos.simpleLdapLinkingAllowedRealms list []
global.appConfig.sentry.enabled bool false
global.appConfig.sentry.dsn string nil
global.appConfig.sentry.clientside_dsn string nil
global.appConfig.sentry.environment string nil
global.appConfig.gitlab_docs.enabled bool false
global.appConfig.gitlab_docs.host string ""
global.appConfig.smartcard.enabled bool false
global.appConfig.smartcard.CASecret string nil
global.appConfig.smartcard.clientCertificateRequiredHost string nil
global.appConfig.smartcard.sanExtensions bool false
global.appConfig.smartcard.requiredForGitAccess bool false
global.appConfig.sidekiq.routingRules list []
global.appConfig.initialDefaults object {}
global.oauth.gitlab-pages object {}
global.geo.enabled bool false
global.geo.role string "primary"
global.geo.nodeName string nil
global.geo.psql.password object {}
global.geo.registry.replication.enabled bool false
global.geo.registry.replication.primaryApiUrl string nil
global.kas.enabled bool false
global.kas.service.apiExternalPort int 8153
global.kas.tls.enabled bool false
global.kas.tls.verify bool true
global.spamcheck.enabled bool false
global.shell.authToken object {}
global.shell.hostKeys object {}
global.shell.tcp.proxyProtocol bool false
global.railsSecrets object {}
global.rails.bootsnap.enabled bool true
global.registry.bucket string "registry"
global.registry.certificate object {}
global.registry.httpSecret object {}
global.registry.notificationSecret object {}
global.registry.tls.enabled bool false
global.registry.redis.cache.password object {}
global.registry.notifications object {}
global.registry.enabled bool true
global.registry.host string nil
global.registry.api.protocol string "http"
global.registry.api.serviceName string "registry"
global.registry.api.port int 5000
global.registry.tokenIssuer string "gitlab-issuer"
global.pages.enabled bool false
global.pages.accessControl bool false
global.pages.path string nil
global.pages.host string nil
global.pages.port string nil
global.pages.https string nil
global.pages.externalHttp list []
global.pages.externalHttps list []
global.pages.artifactsServer bool true
global.pages.localStore.enabled bool false
global.pages.objectStore.enabled bool true
global.pages.objectStore.bucket string "gitlab-pages"
global.pages.objectStore.connection object {}
global.pages.apiSecret object {}
global.pages.authSecret object {}
global.runner.registrationToken object {}
global.smtp.enabled bool false
global.smtp.address string "smtp.mailgun.org"
global.smtp.port int 2525
global.smtp.user_name string ""
global.smtp.password.secret string ""
global.smtp.password.key string "password"
global.smtp.authentication string "plain"
global.smtp.starttls_auto bool false
global.smtp.openssl_verify_mode string "peer"
global.smtp.open_timeout int 30
global.smtp.read_timeout int 60
global.smtp.pool bool false
global.email.from string ""
global.email.display_name string "GitLab"
global.email.reply_to string ""
global.email.subject_suffix string ""
global.email.smime.enabled bool false
global.email.smime.secretName string ""
global.email.smime.keyName string "tls.key"
global.email.smime.certName string "tls.crt"
global.time_zone string "UTC"
global.service.labels object {}
global.service.annotations object {}
global.deployment.annotations object {}
global.antiAffinity string "soft"
global.affinity.podAntiAffinity.topologyKey string "kubernetes.io/hostname"
global.priorityClassName string ""
global.workhorse.serviceName string "webservice-default"
global.workhorse.tls.enabled bool false
global.webservice.workerTimeout int 60
global.certificates.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/certificates"
global.certificates.image.tag string "16.6.1"
global.certificates.image.pullSecrets[0].name string "private-registry"
global.certificates.init.securityContext.capabilities.drop[0] string "ALL"
global.certificates.init.securityContext.runAsUser int 65534
global.certificates.init.securityContext.runAsNonRoot bool true
global.certificates.customCAs[0].secret string "ca-certs-australian-defence-organisation-cross-cert-chain"
global.certificates.customCAs[1].secret string "ca-certs-australian-defence-organisation-direct-trust-chain"
global.certificates.customCAs[2].secret string "ca-certs-boeing"
global.certificates.customCAs[3].secret string "ca-certs-carillon-federal-services-trust-chain-1"
global.certificates.customCAs[4].secret string "ca-certs-carillon-federal-services-trust-chain-2"
global.certificates.customCAs[5].secret string "ca-certs-department-of-state-trust-chain-1"
global.certificates.customCAs[6].secret string "ca-certs-department-of-state-trust-chain-2"
global.certificates.customCAs[7].secret string "ca-certs-digicert-federal-ssp-trust-chain-1"
global.certificates.customCAs[8].secret string "ca-certs-digicert-federal-ssp-trust-chain-2"
global.certificates.customCAs[9].secret string "ca-certs-digicert-nfi-trust-chain-1"
global.certificates.customCAs[10].secret string "ca-certs-digicert-nfi-trust-chain-2"
global.certificates.customCAs[11].secret string "ca-certs-entrust-federal-ssp-trust-chain-1"
global.certificates.customCAs[12].secret string "ca-certs-entrust-federal-ssp-trust-chain-2"
global.certificates.customCAs[13].secret string "ca-certs-entrust-managed-service-nfi"
global.certificates.customCAs[14].secret string "ca-certs-exostar-llc"
global.certificates.customCAs[15].secret string "ca-certs-identrust-nfi"
global.certificates.customCAs[16].secret string "ca-certs-lockheed-martin"
global.certificates.customCAs[17].secret string "ca-certs-netherlands-ministry-of-defence"
global.certificates.customCAs[18].secret string "ca-certs-northrop-grumman"
global.certificates.customCAs[19].secret string "ca-certs-raytheon-trust-chain-1"
global.certificates.customCAs[20].secret string "ca-certs-raytheon-trust-chain-2"
global.certificates.customCAs[21].secret string "ca-certs-us-treasury-ssp-trust-chain-1"
global.certificates.customCAs[22].secret string "ca-certs-us-treasury-ssp-trust-chain-2"
global.certificates.customCAs[23].secret string "ca-certs-verizon-cybertrust-federal-ssp"
global.certificates.customCAs[24].secret string "ca-certs-widepoint-federal-ssp-trust-chain-1"
global.certificates.customCAs[25].secret string "ca-certs-widepoint-federal-ssp-trust-chain-2"
global.certificates.customCAs[26].secret string "ca-certs-widepoint-nfi"
global.certificates.customCAs[27].secret string "ca-certs-dod-intermediate-and-issuing-ca-certs"
global.certificates.customCAs[28].secret string "ca-certs-dod-trust-anchors-self-signed"
global.certificates.customCAs[29].secret string "ca-certs-eca"
global.kubectl.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/kubectl"
global.kubectl.image.tag string "16.6.1"
global.kubectl.image.pullSecrets[0].name string "private-registry"
global.kubectl.securityContext.runAsUser int 65534
global.kubectl.securityContext.fsGroup int 65534
global.gitlabBase.image.repository string "registry1.dso.mil/ironbank/redhat/ubi/ubi9"
global.gitlabBase.image.tag string "9.3"
global.gitlabBase.image.pullSecrets[0].name string "private-registry"
global.serviceAccount.enabled bool true
global.serviceAccount.create bool true
global.serviceAccount.annotations object {}
global.serviceAccount.automountServiceAccountToken bool false
global.tracing.connection.string string ""
global.tracing.urlTemplate string ""
global.zoekt.gateway.basicAuth object {}
global.zoekt.indexer.internalApi object {}
global.extraEnv object {}
global.extraEnvFrom object {}
containerSecurityContext.runAsUser int 65534
containerSecurityContext.runAsGroup int 65534
containerSecurityContext.capabilities.drop[0] string "ALL"
upgradeCheck.enabled bool true
upgradeCheck.image.repository string "registry1.dso.mil/ironbank/redhat/ubi/ubi9"
upgradeCheck.image.tag string "9.3"
upgradeCheck.image.pullSecrets[0].name string "private-registry"
upgradeCheck.securityContext.runAsUser int 65534
upgradeCheck.securityContext.runAsGroup int 65534
upgradeCheck.securityContext.fsGroup int 65534
upgradeCheck.tolerations list []
upgradeCheck.annotations."sidecar.istio.io/inject" string "false"
upgradeCheck.configMapAnnotations object {}
upgradeCheck.resources.requests.cpu string "500m"
upgradeCheck.resources.requests.memory string "500Mi"
upgradeCheck.resources.limits.cpu string "500m"
upgradeCheck.resources.limits.memory string "500Mi"
certmanager.installCRDs bool false
certmanager.nameOverride string "certmanager"
certmanager.install bool false
certmanager.rbac.create bool true
nginx-ingress.enabled bool false
nginx-ingress.tcpExternalConfig string "true"
nginx-ingress.controller.addHeaders.Referrer-Policy string "strict-origin-when-cross-origin"
nginx-ingress.controller.config.annotation-value-word-blocklist string "load_module,lua_package,_by_lua,location,root,proxy_pass,serviceaccount,{,},',\""
nginx-ingress.controller.config.hsts string "true"
nginx-ingress.controller.config.hsts-include-subdomains string "false"
nginx-ingress.controller.config.hsts-max-age string "63072000"
nginx-ingress.controller.config.server-name-hash-bucket-size string "256"
nginx-ingress.controller.config.use-http2 string "true"
nginx-ingress.controller.config.ssl-ciphers string "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"
nginx-ingress.controller.config.ssl-protocols string "TLSv1.3 TLSv1.2"
nginx-ingress.controller.config.server-tokens string "false"
nginx-ingress.controller.config.upstream-keepalive-connections int 100
nginx-ingress.controller.config.upstream-keepalive-time string "30s"
nginx-ingress.controller.config.upstream-keepalive-timeout int 5
nginx-ingress.controller.config.upstream-keepalive-requests int 1000
nginx-ingress.controller.service.externalTrafficPolicy string "Local"
nginx-ingress.controller.ingressClassByName bool false
nginx-ingress.controller.ingressClassResource.name string "{{ include \"ingress.class.name\" $ }}"
nginx-ingress.controller.resources.requests.cpu string "100m"
nginx-ingress.controller.resources.requests.memory string "100Mi"
nginx-ingress.controller.publishService.enabled bool true
nginx-ingress.controller.replicaCount int 2
nginx-ingress.controller.minAvailable int 1
nginx-ingress.controller.scope.enabled bool true
nginx-ingress.controller.metrics.enabled bool true
nginx-ingress.controller.metrics.service.annotations."gitlab.com/prometheus_scrape" string "true"
nginx-ingress.controller.metrics.service.annotations."gitlab.com/prometheus_port" string "10254"
nginx-ingress.controller.metrics.service.annotations."prometheus.io/scrape" string "true"
nginx-ingress.controller.metrics.service.annotations."prometheus.io/port" string "10254"
nginx-ingress.controller.admissionWebhooks.enabled bool false
nginx-ingress.defaultBackend.resources.requests.cpu string "5m"
nginx-ingress.defaultBackend.resources.requests.memory string "5Mi"
nginx-ingress.rbac.create bool true
nginx-ingress.rbac.scope bool false
nginx-ingress.serviceAccount.create bool true
nginx-ingress-geo.<<.enabled bool false
nginx-ingress-geo.<<.tcpExternalConfig string "true"
nginx-ingress-geo.<<.controller.addHeaders.Referrer-Policy string "strict-origin-when-cross-origin"
nginx-ingress-geo.<<.controller.config.annotation-value-word-blocklist string "load_module,lua_package,_by_lua,location,root,proxy_pass,serviceaccount,{,},',\""
nginx-ingress-geo.<<.controller.config.hsts string "true"
nginx-ingress-geo.<<.controller.config.hsts-include-subdomains string "false"
nginx-ingress-geo.<<.controller.config.hsts-max-age string "63072000"
nginx-ingress-geo.<<.controller.config.server-name-hash-bucket-size string "256"
nginx-ingress-geo.<<.controller.config.use-http2 string "true"
nginx-ingress-geo.<<.controller.config.ssl-ciphers string "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"
nginx-ingress-geo.<<.controller.config.ssl-protocols string "TLSv1.3 TLSv1.2"
nginx-ingress-geo.<<.controller.config.server-tokens string "false"
nginx-ingress-geo.<<.controller.config.upstream-keepalive-connections int 100
nginx-ingress-geo.<<.controller.config.upstream-keepalive-time string "30s"
nginx-ingress-geo.<<.controller.config.upstream-keepalive-timeout int 5
nginx-ingress-geo.<<.controller.config.upstream-keepalive-requests int 1000
nginx-ingress-geo.<<.controller.service.externalTrafficPolicy string "Local"
nginx-ingress-geo.<<.controller.ingressClassByName bool false
nginx-ingress-geo.<<.controller.ingressClassResource.name string "{{ include \"ingress.class.name\" $ }}"
nginx-ingress-geo.<<.controller.resources.requests.cpu string "100m"
nginx-ingress-geo.<<.controller.resources.requests.memory string "100Mi"
nginx-ingress-geo.<<.controller.publishService.enabled bool true
nginx-ingress-geo.<<.controller.replicaCount int 2
nginx-ingress-geo.<<.controller.minAvailable int 1
nginx-ingress-geo.<<.controller.scope.enabled bool true
nginx-ingress-geo.<<.controller.metrics.enabled bool true
nginx-ingress-geo.<<.controller.metrics.service.annotations."gitlab.com/prometheus_scrape" string "true"
nginx-ingress-geo.<<.controller.metrics.service.annotations."gitlab.com/prometheus_port" string "10254"
nginx-ingress-geo.<<.controller.metrics.service.annotations."prometheus.io/scrape" string "true"
nginx-ingress-geo.<<.controller.metrics.service.annotations."prometheus.io/port" string "10254"
nginx-ingress-geo.<<.controller.admissionWebhooks.enabled bool false
nginx-ingress-geo.<<.defaultBackend.resources.requests.cpu string "5m"
nginx-ingress-geo.<<.defaultBackend.resources.requests.memory string "5Mi"
nginx-ingress-geo.<<.rbac.create bool true
nginx-ingress-geo.<<.rbac.scope bool false
nginx-ingress-geo.<<.serviceAccount.create bool true
nginx-ingress-geo.enabled bool false
nginx-ingress-geo.controller.<<.addHeaders.Referrer-Policy string "strict-origin-when-cross-origin"
nginx-ingress-geo.controller.<<.config.annotation-value-word-blocklist string "load_module,lua_package,_by_lua,location,root,proxy_pass,serviceaccount,{,},',\""
nginx-ingress-geo.controller.<<.config.hsts string "true"
nginx-ingress-geo.controller.<<.config.hsts-include-subdomains string "false"
nginx-ingress-geo.controller.<<.config.hsts-max-age string "63072000"
nginx-ingress-geo.controller.<<.config.server-name-hash-bucket-size string "256"
nginx-ingress-geo.controller.<<.config.use-http2 string "true"
nginx-ingress-geo.controller.<<.config.ssl-ciphers string "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"
nginx-ingress-geo.controller.<<.config.ssl-protocols string "TLSv1.3 TLSv1.2"
nginx-ingress-geo.controller.<<.config.server-tokens string "false"
nginx-ingress-geo.controller.<<.config.upstream-keepalive-connections int 100
nginx-ingress-geo.controller.<<.config.upstream-keepalive-time string "30s"
nginx-ingress-geo.controller.<<.config.upstream-keepalive-timeout int 5
nginx-ingress-geo.controller.<<.config.upstream-keepalive-requests int 1000
nginx-ingress-geo.controller.<<.service.externalTrafficPolicy string "Local"
nginx-ingress-geo.controller.<<.ingressClassByName bool false
nginx-ingress-geo.controller.<<.ingressClassResource.name string "{{ include \"ingress.class.name\" $ }}"
nginx-ingress-geo.controller.<<.resources.requests.cpu string "100m"
nginx-ingress-geo.controller.<<.resources.requests.memory string "100Mi"
nginx-ingress-geo.controller.<<.publishService.enabled bool true
nginx-ingress-geo.controller.<<.replicaCount int 2
nginx-ingress-geo.controller.<<.minAvailable int 1
nginx-ingress-geo.controller.<<.scope.enabled bool true
nginx-ingress-geo.controller.<<.metrics.enabled bool true
nginx-ingress-geo.controller.<<.metrics.service.annotations."gitlab.com/prometheus_scrape" string "true"
nginx-ingress-geo.controller.<<.metrics.service.annotations."gitlab.com/prometheus_port" string "10254"
nginx-ingress-geo.controller.<<.metrics.service.annotations."prometheus.io/scrape" string "true"
nginx-ingress-geo.controller.<<.metrics.service.annotations."prometheus.io/port" string "10254"
nginx-ingress-geo.controller.<<.admissionWebhooks.enabled bool false
nginx-ingress-geo.controller.config.<<.annotation-value-word-blocklist string "load_module,lua_package,_by_lua,location,root,proxy_pass,serviceaccount,{,},',\""
nginx-ingress-geo.controller.config.<<.hsts string "true"
nginx-ingress-geo.controller.config.<<.hsts-include-subdomains string "false"
nginx-ingress-geo.controller.config.<<.hsts-max-age string "63072000"
nginx-ingress-geo.controller.config.<<.server-name-hash-bucket-size string "256"
nginx-ingress-geo.controller.config.<<.use-http2 string "true"
nginx-ingress-geo.controller.config.<<.ssl-ciphers string "ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4"
nginx-ingress-geo.controller.config.<<.ssl-protocols string "TLSv1.3 TLSv1.2"
nginx-ingress-geo.controller.config.<<.server-tokens string "false"
nginx-ingress-geo.controller.config.<<.upstream-keepalive-connections int 100
nginx-ingress-geo.controller.config.<<.upstream-keepalive-time string "30s"
nginx-ingress-geo.controller.config.<<.upstream-keepalive-timeout int 5
nginx-ingress-geo.controller.config.<<.upstream-keepalive-requests int 1000
nginx-ingress-geo.controller.config.use-forwarded-headers bool true
nginx-ingress-geo.controller.electionID string "ingress-controller-leader-geo"
nginx-ingress-geo.controller.ingressClassResource.name string "{{ include \"gitlab.geo.ingress.class.name\" $ | quote }}"
nginx-ingress-geo.controller.ingressClassResource.controllerValue string "k8s.io/nginx-ingress-geo"
nginx-ingress-geo.externalIpTpl string "{{ .Values.global.hosts.externalGeoIP }}"
haproxy.install bool false
haproxy.controller.service.type string "LoadBalancer"
haproxy.controller.service.tcpPorts[0].name string "ssh"
haproxy.controller.service.tcpPorts[0].port int 22
haproxy.controller.service.tcpPorts[0].targetPort int 22
haproxy.controller.extraArgs[0] string "--configmap-tcp-services=$(POD_NAMESPACE)/$(POD_NAMESPACE)-haproxy-tcp"
prometheus.install bool false
prometheus.rbac.create bool true
prometheus.alertmanager.enabled bool false
prometheus.alertmanagerFiles."alertmanager.yml" object {}
prometheus.kubeStateMetrics.enabled bool false
prometheus.nodeExporter.enabled bool false
prometheus.pushgateway.enabled bool false
prometheus.server.enabled bool false
prometheus.server.retention string "15d"
prometheus.server.strategy.type string "Recreate"
prometheus.server.image.tag string "v2.38.0"
prometheus.serverFiles."prometheus.yml".scrape_configs[0].job_name string "prometheus"
prometheus.serverFiles."prometheus.yml".scrape_configs[0].static_configs[0].targets[0] string "localhost:9090"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].job_name string "kubernetes-apiservers"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].kubernetes_sd_configs[0].role string "endpoints"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].scheme string "https"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].tls_config.ca_file string "/var/run/secrets/kubernetes.io/serviceaccount/ca.crt"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].tls_config.insecure_skip_verify bool true
prometheus.serverFiles."prometheus.yml".scrape_configs[1].bearer_token_file string "/var/run/secrets/kubernetes.io/serviceaccount/token"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].source_labels[0] string "__meta_kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].source_labels[1] string "__meta_kubernetes_service_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].source_labels[2] string "__meta_kubernetes_endpoint_port_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].action string "keep"
prometheus.serverFiles."prometheus.yml".scrape_configs[1].relabel_configs[0].regex string "default;kubernetes;https"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].job_name string "kubernetes-pods"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].kubernetes_sd_configs[0].role string "pod"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[0].source_labels[0] string "__meta_kubernetes_pod_annotation_gitlab_com_prometheus_scrape"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[0].action string "keep"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[0].regex bool true
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[1].source_labels[0] string "__meta_kubernetes_pod_annotation_gitlab_com_prometheus_scheme"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[1].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[1].regex string "(https?)"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[1].target_label string "__scheme__"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[2].source_labels[0] string "__meta_kubernetes_pod_annotation_gitlab_com_prometheus_path"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[2].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[2].target_label string "__metrics_path__"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[2].regex string "(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].source_labels[0] string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].source_labels[1] string "__meta_kubernetes_pod_annotation_gitlab_com_prometheus_port"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].regex string "([^:]+)(?::\\d+)?;(\\d+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].replacement string "$1:$2"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[3].target_label string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[4].action string "labelmap"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[4].regex string "__meta_kubernetes_pod_label_(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[5].source_labels[0] string "__meta_kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[5].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[5].target_label string "kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[6].source_labels[0] string "__meta_kubernetes_pod_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[6].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[2].relabel_configs[6].target_label string "kubernetes_pod_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].job_name string "kubernetes-service-endpoints"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].kubernetes_sd_configs[0].role string "endpoints"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[0].action string "keep"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[0].regex bool true
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[0].source_labels[0] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_scrape"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[1].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[1].regex string "(https?)"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[1].source_labels[0] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_scheme"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[1].target_label string "__scheme__"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[2].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[2].regex string "(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[2].source_labels[0] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_path"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[2].target_label string "__metrics_path__"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].regex string "([^:]+)(?::\\d+)?;(\\d+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].replacement string "$1:$2"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].source_labels[0] string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].source_labels[1] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_port"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[3].target_label string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[4].action string "labelmap"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[4].regex string "__meta_kubernetes_service_label_(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[5].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[5].source_labels[0] string "__meta_kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[5].target_label string "kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[6].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[6].source_labels[0] string "__meta_kubernetes_service_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[6].target_label string "kubernetes_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[7].action string "replace"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[7].source_labels[0] string "__meta_kubernetes_pod_node_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[3].relabel_configs[7].target_label string "kubernetes_node"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].job_name string "kubernetes-services"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].metrics_path string "/probe"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].params.module[0] string "http_2xx"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].kubernetes_sd_configs[0].role string "service"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[0].source_labels[0] string "__meta_kubernetes_service_annotation_gitlab_com_prometheus_probe"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[0].action string "keep"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[0].regex bool true
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[1].source_labels[0] string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[1].target_label string "__param_target"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[2].target_label string "__address__"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[2].replacement string "blackbox"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[3].source_labels[0] string "__param_target"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[3].target_label string "instance"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[4].action string "labelmap"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[4].regex string "__meta_kubernetes_service_label_(.+)"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[5].source_labels[0] string "__meta_kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[5].target_label string "kubernetes_namespace"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[6].source_labels[0] string "__meta_kubernetes_service_name"
prometheus.serverFiles."prometheus.yml".scrape_configs[4].relabel_configs[6].target_label string "kubernetes_name"
redis.global.imagePullSecrets[0] string "private-registry"
redis.install bool true
redis.auth.existingSecret string "gitlab-redis-secret"
redis.auth.existingSecretKey string "secret"
redis.auth.usePasswordFiles bool true
redis.architecture string "standalone"
redis.cluster.enabled bool false
redis.metrics.enabled bool true
redis.metrics.image.registry string "registry1.dso.mil/ironbank/bitnami"
redis.metrics.image.repository string "analytics/redis-exporter"
redis.metrics.image.tag string "v1.55.0"
redis.metrics.image.pullSecrets list []
redis.metrics.resources.limits.cpu string "250m"
redis.metrics.resources.limits.memory string "256Mi"
redis.metrics.resources.requests.cpu string "250m"
redis.metrics.resources.requests.memory string "256Mi"
redis.metrics.containerSecurityContext.enabled bool true
redis.metrics.containerSecurityContext.runAsUser int 1001
redis.metrics.containerSecurityContext.runAsGroup int 1001
redis.metrics.containerSecurityContext.runAsNonRoot bool true
redis.metrics.containerSecurityContext.capabilities.drop[0] string "ALL"
redis.serviceAccount.automountServiceAccountToken bool false
redis.securityContext.runAsUser int 1001
redis.securityContext.fsGroup int 1001
redis.securityContext.runAsNonRoot bool true
redis.image.registry string "registry1.dso.mil/ironbank/bitnami"
redis.image.repository string "redis"
redis.image.tag string "7.0.0-debian-10-r3"
redis.image.pullSecrets list []
redis.master.resources.limits.cpu string "250m"
redis.master.resources.limits.memory string "256Mi"
redis.master.resources.requests.cpu string "250m"
redis.master.resources.requests.memory string "256Mi"
redis.master.containerSecurityContext.enabled bool true
redis.master.containerSecurityContext.runAsUser int 1001
redis.master.containerSecurityContext.runAsGroup int 1001
redis.master.containerSecurityContext.runAsNonRoot bool true
redis.master.containerSecurityContext.capabilities.drop[0] string "ALL"
redis.slave.resources.limits.cpu string "250m"
redis.slave.resources.limits.memory string "256Mi"
redis.slave.resources.requests.cpu string "250m"
redis.slave.resources.requests.memory string "256Mi"
redis.slave.containerSecurityContext.enabled bool true
redis.slave.containerSecurityContext.runAsUser int 1001
redis.slave.containerSecurityContext.runAsGroup int 1001
redis.slave.containerSecurityContext.runAsNonRoot bool true
redis.slave.containerSecurityContext.capabilities.drop[0] string "ALL"
redis.sentinel.resources.limits.cpu string "250m"
redis.sentinel.resources.limits.memory string "256Mi"
redis.sentinel.resources.requests.cpu string "250m"
redis.sentinel.resources.requests.memory string "256Mi"
redis.volumePermissions.resources.limits.cpu string "250m"
redis.volumePermissions.resources.limits.memory string "256Mi"
redis.volumePermissions.resources.requests.cpu string "250m"
redis.volumePermissions.resources.requests.memory string "256Mi"
redis.sysctlImage.resources.limits.cpu string "250m"
redis.sysctlImage.resources.limits.memory string "256Mi"
redis.sysctlImage.resources.requests.cpu string "250m"
redis.sysctlImage.resources.requests.memory string "256Mi"
postgresql.install bool true
postgresql.postgresqlDatabase string "gitlabhq_production"
postgresql.resources.limits.cpu string "500m"
postgresql.resources.limits.memory string "500Mi"
postgresql.resources.requests.cpu string "500m"
postgresql.resources.requests.memory string "500Mi"
postgresql.image.registry string "registry1.dso.mil"
postgresql.image.repository string "ironbank/opensource/postgres/postgresql"
postgresql.image.tag string "14.9"
postgresql.image.pullSecrets[0] string "private-registry"
postgresql.auth.username string "gitlab"
postgresql.auth.password string "bogus-satisfy-upgrade"
postgresql.auth.postgresPassword string "bogus-satisfy-upgrade"
postgresql.auth.usePasswordFiles bool false
postgresql.auth.existingSecret string "{{ include \"gitlab.psql.password.secret\" . }}"
postgresql.auth.secretKeys.adminPasswordKey string "postgresql-postgres-password"
postgresql.auth.secretKeys.userPasswordKey string "{{ include \"gitlab.psql.password.key\" $ }}"
postgresql.primary.persistence.mountPath string "/var/lib/postgresql"
postgresql.primary.initdb.scriptsConfigMap string "{{ include \"gitlab.psql.initdbscripts\" $}}"
postgresql.primary.initdb.user string "gitlab"
postgresql.primary.containerSecurityContext.enabled bool true
postgresql.primary.containerSecurityContext.runAsUser int 1001
postgresql.primary.containerSecurityContext.runAsGroup int 1001
postgresql.primary.containerSecurityContext.capabilities.drop[0] string "ALL"
postgresql.master.extraVolumeMounts[0].name string "custom-init-scripts"
postgresql.master.extraVolumeMounts[0].mountPath string "/docker-entrypoint-preinitdb.d/init_revision.sh"
postgresql.master.extraVolumeMounts[0].subPath string "init_revision.sh"
postgresql.master.podAnnotations."postgresql.gitlab/init-revision" string "1"
postgresql.metrics.enabled bool false
postgresql.metrics.service.annotations."prometheus.io/scrape" string "true"
postgresql.metrics.service.annotations."prometheus.io/port" string "9187"
postgresql.metrics.service.annotations."gitlab.com/prometheus_scrape" string "true"
postgresql.metrics.service.annotations."gitlab.com/prometheus_port" string "9187"
postgresql.postgresqlInitdbArgs string "-A scram-sha-256"
postgresql.securityContext.enabled bool true
postgresql.securityContext.fsGroup int 26
postgresql.securityContext.runAsUser int 26
postgresql.securityContext.runAsGroup int 26
postgresql.postgresqlDataDir string "/var/lib/postgresql/pgdata/data"
postgresql.volumePermissions.enabled bool false
registry.enabled bool true
registry.init.resources.limits.cpu string "200m"
registry.init.resources.limits.memory string "200Mi"
registry.init.resources.requests.cpu string "200m"
registry.init.resources.requests.memory string "200Mi"
registry.init.containerSecurityContext.capabilities.drop[0] string "ALL"
registry.resources.limits.cpu string "200m"
registry.resources.limits.memory string "1024Mi"
registry.resources.requests.cpu string "200m"
registry.resources.requests.memory string "1024Mi"
registry.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-container-registry"
registry.image.tag string "16.6.1"
registry.image.pullSecrets[0].name string "private-registry"
registry.ingress.enabled bool false
registry.metrics.enabled bool true
registry.metrics.path string "/metrics"
registry.metrics.serviceMonitor.enabled bool true
registry.securityContext.runAsUser int 1000
registry.securityContext.runAsGroup int 1000
registry.securityContext.fsGroup int 1000
registry.containerSecurityContext.runAsUser int 1000
registry.containerSecurityContext.runAsGroup int 1000
registry.containerSecurityContext.capabilities.drop[0] string "ALL"
shared-secrets.enabled bool true
shared-secrets.rbac.create bool true
shared-secrets.selfsign.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/cfssl-self-sign"
shared-secrets.selfsign.image.tag string "1.6.1"
shared-secrets.selfsign.keyAlgorithm string "rsa"
shared-secrets.selfsign.keySize string "4096"
shared-secrets.selfsign.expiry string "3650d"
shared-secrets.selfsign.caSubject string "GitLab Helm Chart"
shared-secrets.env string "production"
shared-secrets.serviceAccount.enabled bool true
shared-secrets.serviceAccount.create bool true
shared-secrets.serviceAccount.name string nil
shared-secrets.serviceAccount.automountServiceAccountToken bool false
shared-secrets.resources.requests.cpu string "300m"
shared-secrets.resources.requests.memory string "200Mi"
shared-secrets.resources.limits.cpu string "300m"
shared-secrets.resources.limits.memory string "200Mi"
shared-secrets.securityContext.runAsUser int 65534
shared-secrets.securityContext.runAsGroup int 65534
shared-secrets.securityContext.fsGroup int 65534
shared-secrets.containerSecurityContext.capabilities.drop[0] string "ALL"
shared-secrets.tolerations list []
shared-secrets.podLabels object {}
shared-secrets.annotations."sidecar.istio.io/inject" string "false"
gitlab-runner.install bool false
gitlab-runner.rbac.create bool true
gitlab-runner.runners.locked bool false
gitlab-runner.runners.secret string "nonempty"
gitlab-runner.runners.config string "[[runners]]\n [runners.kubernetes]\n image = \"ubuntu:22.04\"\n {{- if .Values.global.minio.enabled }}\n [runners.cache]\n Type = \"s3\"\n Path = \"gitlab-runner\"\n Shared = true\n [runners.cache.s3]\n ServerAddress = {{ include \"gitlab-runner.cache-tpl.s3ServerAddress\" . }}\n BucketName = \"runner-cache\"\n BucketLocation = \"us-east-1\"\n Insecure = false\n {{ end }}\n"
gitlab-runner.podAnnotations."gitlab.com/prometheus_scrape" string "true"
gitlab-runner.podAnnotations."gitlab.com/prometheus_port" int 9252
gitlab-runner.securityContext.capabilities.drop[0] string "ALL"
traefik.install bool false
traefik.ports.gitlab-shell.expose bool true
traefik.ports.gitlab-shell.port int 2222
traefik.ports.gitlab-shell.exposedPort int 22
gitlab.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.certificates.init.securityContext.capabilities.drop[0] string "ALL"
gitlab.certificates.init.securityContext.runAsUser int 65534
gitlab.certificates.init.securityContext.runAsNonRoot bool true
gitlab.toolbox.replicas int 1
gitlab.toolbox.antiAffinityLabels.matchLabels.app string "gitaly"
gitlab.toolbox.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-toolbox"
gitlab.toolbox.image.tag string "16.6.1"
gitlab.toolbox.image.pullSecrets[0].name string "private-registry"
gitlab.toolbox.init.resources.requests.cpu string "200m"
gitlab.toolbox.init.resources.requests.memory string "200Mi"
gitlab.toolbox.init.resources.limits.cpu string "200m"
gitlab.toolbox.init.resources.limits.memory string "200Mi"
gitlab.toolbox.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.toolbox.resources.requests.cpu int 2
gitlab.toolbox.resources.requests.memory string "3.5Gi"
gitlab.toolbox.resources.limits.cpu int 2
gitlab.toolbox.resources.limits.memory string "3.5Gi"
gitlab.toolbox.annotations."sidecar.istio.io/proxyMemory" string "512Mi"
gitlab.toolbox.annotations."sidecar.istio.io/proxyMemoryLimit" string "512Mi"
gitlab.toolbox.backups.cron.resources.requests.cpu string "500m"
gitlab.toolbox.backups.cron.resources.requests.memory string "768Mi"
gitlab.toolbox.backups.cron.resources.limits.cpu string "500m"
gitlab.toolbox.backups.cron.resources.limits.memory string "768Mi"
gitlab.toolbox.backups.cron.istioShutdown string "&& echo \"Backup Complete\" && until curl -fsI http://localhost:15021/healthz/ready; do echo \"Waiting for Istio sidecar proxy...\"; sleep 3; done && sleep 5 && echo \"Stopping the istio proxy...\" && curl -X POST http://localhost:15020/quitquitquit"
gitlab.toolbox.securityContext.runAsUser int 1000
gitlab.toolbox.securityContext.runAsGroup int 1000
gitlab.toolbox.securityContext.fsGroup int 1000
gitlab.toolbox.containerSecurityContext.runAsUser int 1000
gitlab.toolbox.containerSecurityContext.runAsGroup int 1000
gitlab.toolbox.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-exporter.enabled bool false
gitlab.gitlab-exporter.init.resources.limits.cpu string "200m"
gitlab.gitlab-exporter.init.resources.limits.memory string "200Mi"
gitlab.gitlab-exporter.init.resources.requests.cpu string "200m"
gitlab.gitlab-exporter.init.resources.requests.memory string "200Mi"
gitlab.gitlab-exporter.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-exporter.resources.limits.cpu string "150m"
gitlab.gitlab-exporter.resources.limits.memory string "200Mi"
gitlab.gitlab-exporter.resources.requests.cpu string "150m"
gitlab.gitlab-exporter.resources.requests.memory string "200Mi"
gitlab.gitlab-exporter.capabilities.drop[0] string "ALL"
gitlab.gitlab-exporter.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-exporter"
gitlab.gitlab-exporter.image.tag string "16.6.1"
gitlab.gitlab-exporter.image.pullSecrets[0].name string "private-registry"
gitlab.gitlab-exporter.metrics.enabled bool true
gitlab.gitlab-exporter.metrics.port int 9168
gitlab.gitlab-exporter.metrics.serviceMonitor.enabled bool true
gitlab.gitlab-exporter.securityContext.runAsUser int 1000
gitlab.gitlab-exporter.securityContext.runAsGroup int 1000
gitlab.gitlab-exporter.securityContext.fsGroup int 1000
gitlab.gitlab-exporter.containerSecurityContext.runAsUser int 1000
gitlab.gitlab-exporter.containerSecurityContext.runAsGroup int 1000
gitlab.gitlab-exporter.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.migrations.annotations."sidecar.istio.io/inject" string "false"
gitlab.migrations.init.resources.limits.cpu string "200m"
gitlab.migrations.init.resources.limits.memory string "200Mi"
gitlab.migrations.init.resources.requests.cpu string "200m"
gitlab.migrations.init.resources.requests.memory string "200Mi"
gitlab.migrations.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.migrations.resources.limits.cpu string "500m"
gitlab.migrations.resources.limits.memory string "1G"
gitlab.migrations.resources.requests.cpu string "500m"
gitlab.migrations.resources.requests.memory string "1G"
gitlab.migrations.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-toolbox"
gitlab.migrations.image.tag string "16.6.1"
gitlab.migrations.image.pullSecrets[0].name string "private-registry"
gitlab.migrations.securityContext.runAsUser int 1000
gitlab.migrations.securityContext.runAsGroup int 1000
gitlab.migrations.securityContext.fsGroup int 1000
gitlab.migrations.containerSecurityContext.runAsUser int 1000
gitlab.migrations.containerSecurityContext.runAsGroup int 1000
gitlab.migrations.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.webservice.init.resources.limits.cpu string "200m"
gitlab.webservice.init.resources.limits.memory string "200Mi"
gitlab.webservice.init.resources.requests.cpu string "200m"
gitlab.webservice.init.resources.requests.memory string "200Mi"
gitlab.webservice.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.webservice.securityContext.runAsUser int 1000
gitlab.webservice.securityContext.runAsGroup int 1000
gitlab.webservice.securityContext.fsGroup int 1000
gitlab.webservice.containerSecurityContext.runAsUser int 1000
gitlab.webservice.containerSecurityContext.runAsGroup int 1000
gitlab.webservice.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.webservice.resources.limits.cpu string "600m"
gitlab.webservice.resources.limits.memory string "2.5G"
gitlab.webservice.resources.requests.cpu string "600m"
gitlab.webservice.resources.requests.memory string "2.5G"
gitlab.webservice.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-webservice"
gitlab.webservice.image.tag string "16.6.1"
gitlab.webservice.image.pullSecrets[0].name string "private-registry"
gitlab.webservice.workhorse.resources.limits.cpu string "600m"
gitlab.webservice.workhorse.resources.limits.memory string "2.5G"
gitlab.webservice.workhorse.resources.requests.cpu string "600m"
gitlab.webservice.workhorse.resources.requests.memory string "2.5G"
gitlab.webservice.workhorse.image string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-workhorse"
gitlab.webservice.workhorse.tag string "16.6.1"
gitlab.webservice.workhorse.pullSecrets[0].name string "private-registry"
gitlab.webservice.workhorse.metrics.enabled bool true
gitlab.webservice.workhorse.metrics.serviceMonitor.enabled bool true
gitlab.webservice.workhorse.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.webservice.ingress.enabled bool false
gitlab.webservice.metrics.enabled bool true
gitlab.webservice.metrics.port int 8083
gitlab.webservice.metrics.serviceMonitor.enabled bool true
gitlab.sidekiq.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-sidekiq"
gitlab.sidekiq.image.tag string "16.6.1"
gitlab.sidekiq.image.pullSecrets[0].name string "private-registry"
gitlab.sidekiq.init.resources.limits.cpu string "200m"
gitlab.sidekiq.init.resources.limits.memory string "200Mi"
gitlab.sidekiq.init.resources.requests.cpu string "200m"
gitlab.sidekiq.init.resources.requests.memory string "200Mi"
gitlab.sidekiq.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.sidekiq.resources.requests.memory string "3G"
gitlab.sidekiq.resources.requests.cpu string "1500m"
gitlab.sidekiq.resources.limits.memory string "3G"
gitlab.sidekiq.resources.limits.cpu string "1500m"
gitlab.sidekiq.securityContext.runAsUser int 1000
gitlab.sidekiq.securityContext.runAsGroup int 1000
gitlab.sidekiq.securityContext.fsGroup int 1000
gitlab.sidekiq.containerSecurityContext.runAsUser int 1000
gitlab.sidekiq.containerSecurityContext.runAsGroup int 1000
gitlab.sidekiq.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitaly.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitaly"
gitlab.gitaly.image.tag string "16.6.1"
gitlab.gitaly.image.pullSecrets[0].name string "private-registry"
gitlab.gitaly.init.resources.limits.cpu string "200m"
gitlab.gitaly.init.resources.limits.memory string "200Mi"
gitlab.gitaly.init.resources.requests.cpu string "200m"
gitlab.gitaly.init.resources.requests.memory string "200Mi"
gitlab.gitaly.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitaly.resources.requests.cpu string "400m"
gitlab.gitaly.resources.requests.memory string "600Mi"
gitlab.gitaly.resources.limits.cpu string "400m"
gitlab.gitaly.resources.limits.memory string "600Mi"
gitlab.gitaly.metrics.enabled bool true
gitlab.gitaly.metrics.serviceMonitor.enabled bool true
gitlab.gitaly.securityContext.runAsUser int 1000
gitlab.gitaly.securityContext.runAsGroup int 1000
gitlab.gitaly.securityContext.fsGroup int 1000
gitlab.gitaly.containerSecurityContext.runAsUser int 1000
gitlab.gitaly.containerSecurityContext.runAsGroup int 1000
gitlab.gitaly.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-shell.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-shell"
gitlab.gitlab-shell.image.tag string "16.6.1"
gitlab.gitlab-shell.image.pullSecrets[0].name string "private-registry"
gitlab.gitlab-shell.init.resources.limits.cpu string "200m"
gitlab.gitlab-shell.init.resources.limits.memory string "200Mi"
gitlab.gitlab-shell.init.resources.requests.cpu string "200m"
gitlab.gitlab-shell.init.resources.requests.memory string "200Mi"
gitlab.gitlab-shell.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-shell.resources.limits.cpu string "300m"
gitlab.gitlab-shell.resources.limits.memory string "300Mi"
gitlab.gitlab-shell.resources.requests.cpu string "300m"
gitlab.gitlab-shell.resources.requests.memory string "300Mi"
gitlab.gitlab-shell.securityContext.runAsUser int 1000
gitlab.gitlab-shell.securityContext.runAsGroup int 1000
gitlab.gitlab-shell.securityContext.fsGroup int 1000
gitlab.gitlab-shell.containerSecurityContext.runAsUser int 1000
gitlab.gitlab-shell.containerSecurityContext.runAsGroup int 1000
gitlab.gitlab-shell.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.mailroom.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-mailroom"
gitlab.mailroom.image.tag string "16.6.1"
gitlab.mailroom.image.pullSecrets[0].name string "private-registry"
gitlab.mailroom.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.gitlab-pages.service.customDomains.type string "ClusterIP"
gitlab.gitlab-pages.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitlab-pages"
gitlab.gitlab-pages.image.tag string "16.6.1"
gitlab.gitlab-pages.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.praefect.image.repository string "registry1.dso.mil/ironbank/gitlab/gitlab/gitaly"
gitlab.praefect.image.tag string "16.6.1"
gitlab.praefect.init.resources.limits.cpu string "200m"
gitlab.praefect.init.resources.limits.memory string "200Mi"
gitlab.praefect.init.resources.requests.cpu string "200m"
gitlab.praefect.init.resources.requests.memory string "200Mi"
gitlab.praefect.init.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab.praefect.resources.requests.cpu int 1
gitlab.praefect.resources.requests.memory string "1Gi"
gitlab.praefect.resources.limits.cpu int 1
gitlab.praefect.resources.limits.memory string "1Gi"
gitlab.praefect.containerSecurityContext.capabilities.drop[0] string "ALL"
gitlab-zoekt.install bool false
gitlab-zoekt.gateway.basicAuth.enabled bool false
gitlab-zoekt.gateway.basicAuth.secretName string "{{ include \"gitlab.zoekt.gateway.basicAuth.secretName\" $ }}"
gitlab-zoekt.indexer.internalApi.enabled bool false
gitlab-zoekt.indexer.internalApi.secretName string "{{ include \"gitlab.zoekt.indexer.internalApi.secretName\" $ }}"
gitlab-zoekt.indexer.internalApi.secretKey string "{{ include \"gitlab.zoekt.indexer.internalApi.secretKey\" $ }}"
gitlab-zoekt.indexer.internalApi.gitlabUrl string "{{ include \"gitlab.zoekt.indexer.internalApi.gitlabUrl\" $ }}"
minio.init.resources.limits.cpu string "200m"
minio.init.resources.limits.memory string "200Mi"
minio.init.resources.requests.cpu string "200m"
minio.init.resources.requests.memory string "200Mi"
minio.init.containerSecurityContext.capabilities.drop[0] string "ALL"
minio.resources.limits.cpu string "200m"
minio.resources.limits.memory string "300Mi"
minio.resources.requests.cpu string "200m"
minio.resources.requests.memory string "300Mi"
minio.securityContext.runAsUser int 1000
minio.securityContext.runAsGroup int 1000
minio.securityContext.fsGroup int 1000
minio.containerSecurityContext.runAsUser int 1000
minio.containerSecurityContext.runAsGroup int 1000
minio.containerSecurityContext.runAsNonRoot bool true
minio.containerSecurityContext.capabilities.drop[0] string "ALL"
minio.jobAnnotations."sidecar.istio.io/inject" string "false"
minio.image string "registry1.dso.mil/ironbank/opensource/minio/minio"
minio.imageTag string "RELEASE.2022-12-12T19-27-27Z"
minio.pullSecrets[0].name string "private-registry"
minio.minioMc.image string "registry1.dso.mil/ironbank/opensource/minio/mc"
minio.minioMc.tag string "RELEASE.2022-12-24T15-21-38Z"
minio.minioMc.pullSecrets[0].name string "private-registry"
domain string "bigbang.dev"
istio.enabled bool false
istio.injection string "disabled"
istio.gitlab.enabled bool true
istio.gitlab.annotations object {}
istio.gitlab.labels object {}
istio.gitlab.gateways[0] string "istio-system/main"
istio.gitlab.hosts string nil
istio.registry.enabled bool true
istio.registry.annotations object {}
istio.registry.labels object {}
istio.registry.gateways[0] string "istio-system/main"
istio.registry.hosts string nil
istio.pages.enabled bool false
istio.pages.annotations object {}
istio.pages.ingressLabels.app string "pages-ingressgateway"
istio.pages.ingressLabels.istio string "ingressgateway"
istio.pages.labels object {}
istio.pages.gateways[0] string "istio-system/pages"
istio.pages.customDomains.enabled bool true
istio.pages.hosts[0] string "*.pages.bigbang.dev"
istio.mtls object {"mode":"STRICT"} Default peer authentication
istio.mtls.mode string "STRICT" STRICT = Allow only mutual TLS traffic, PERMISSIVE = Allow both plain text and mutual TLS traffic
monitoring.enabled bool false
networkPolicies.enabled bool false
networkPolicies.ingressLabels.app string "istio-ingressgateway"
networkPolicies.ingressLabels.istio string "ingressgateway"
networkPolicies.controlPlaneCidr string "0.0.0.0/0"
networkPolicies.gitalyEgress.enabled bool false
openshift bool false
use_iam_profile bool false
bbtests.enabled bool false
bbtests.cypress.artifacts bool true
bbtests.cypress.envs.cypress_baseUrl string "http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"
bbtests.cypress.envs.cypress_gitlab_first_name string "test"
bbtests.cypress.envs.cypress_gitlab_last_name string "user"
bbtests.cypress.envs.cypress_gitlab_username string "testuser"
bbtests.cypress.envs.cypress_gitlab_password string "Password123h56a78"
bbtests.cypress.envs.cypress_gitlab_email string "[email protected]"
bbtests.cypress.envs.cypress_gitlab_project string "my-awesome-project"
bbtests.cypress.envs.cypress_keycloak_username string "cypress"
bbtests.cypress.envs.cypress_keycloak_password string "tnr_w!G33ZyAt@C8"
bbtests.cypress.secretEnvs[0].name string "cypress_adminpassword"
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.name string "gitlab-gitlab-initial-root-password"
bbtests.cypress.secretEnvs[0].valueFrom.secretKeyRef.key string "password"
bbtests.scripts.image string "registry1.dso.mil/bigbang-ci/gitlab-tester:0.0.4"
bbtests.scripts.envs.GITLAB_USER string "testuser"
bbtests.scripts.envs.GITLAB_PASS string "Password123h56a78"
bbtests.scripts.envs.GITLAB_EMAIL string "[email protected]"
bbtests.scripts.envs.GITLAB_PROJECT string "my-awesome-project"
bbtests.scripts.envs.GITLAB_REPOSITORY string "http://gitlab-webservice-default.gitlab.svc.cluster.local:8181"
bbtests.scripts.envs.GITLAB_ORIGIN string "http://testuser:Password123h56a78@gitlab-webservice-default.gitlab.svc.cluster.local:8181"
bbtests.scripts.envs.GITLAB_REGISTRY string "gitlab-registry-test-svc.gitlab.svc.cluster.local:80"

Contributing

Please see the contributing guide if you are interested in contributing.

gitlab's People

Contributors

rgarcia6520 avatar boojapho avatar mrlunchbox777 avatar joshrwolf avatar balan-karpagam avatar matthewdkaiser avatar mjnagel avatar runyontr avatar christopheroconnell avatar cfbrianmiller avatar brandtkeller avatar jrolachea3 avatar jfoster2022 avatar brandencobb avatar chaospuppy avatar rushyrush avatar montgomery-marcus avatar rushevan avatar renovate-bot avatar echuang-rc avatar ericgoode avatar daniel-palmer-gu avatar filmo003 avatar christianbakerm avatar blanestask avatar alvin-zzz avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.