1
0
Fork 0
mirror of https://github.com/YunoHost-Apps/gitlab_ynh.git synced 2024-09-03 18:36:35 +02:00

Merge pull request #163 from YunoHost-Apps/testing

14.2.3
This commit is contained in:
Kayou 2021-09-13 17:25:35 +02:00 committed by GitHub
commit f14c98ee91
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
5 changed files with 43 additions and 9 deletions

View file

@ -17,7 +17,7 @@ If you don't have YunoHost, please consult [the guide](https://yunohost.org/#/in
Git-repository manager providing wiki, issue-tracking and CI/CD pipeline features.
**Shipped version:** 14.1.2~ynh1
**Shipped version:** 14.2.3~ynh1
**Demo:** https://gitlab.com/explore

View file

@ -13,7 +13,7 @@ Si vous n'avez pas YunoHost, regardez [ici](https://yunohost.org/#/install) pour
Gestionnaire de dépôts Git proposant des fonctionnalités de wiki, suivi de bugs et de pipeline CI/CD.
**Version incluse :** 14.1.2~ynh1
**Version incluse :** 14.2.3~ynh1
**Démo :** https://gitlab.com/explore

View file

@ -931,6 +931,18 @@ gitlab_rails['gitlab_shell_ssh_port'] = __SSH_PORT__
##! Propagate X-Request-Id if available. Workhorse will generate a random value otherwise.
# gitlab_workhorse['propagate_correlation_id'] = false
##! A list of CIDR blocks to allow for propagation of correlation ID.
##! propagate_correlation_id should also be set to true.
##! For example: %w(127.0.0.1/32 192.168.0.1/32)
# gitlab_workhorse['trusted_cidrs_for_propagation'] = nil
##! A list of CIDR blocks that must match remote IP addresses to use
##! X-Forwarded-For HTTP header for the actual client IP. Used in
##! conjuction with propagate_correlation_id and
##! trusted_cidrs_for_propagation.
##! For example: %w(127.0.0.1/32 192.168.0.1/32)
# gitlab_workhorse['trusted_cidrs_for_x_forwarded_for'] = nil
##! Log format: default is json, can also be text or none.
# gitlab_workhorse['log_format'] = "json"
@ -1416,6 +1428,7 @@ nginx['listen_https'] = false
### Advanced settings
# nginx['dir'] = "/var/opt/gitlab/nginx"
# nginx['log_directory'] = "/var/log/gitlab/nginx"
# nginx['error_log_level'] = "error"
# nginx['worker_processes'] = 4
# nginx['worker_connections'] = 10240
# nginx['log_format'] = '$remote_addr - $remote_user [$time_local] "$request_method $filtered_request_uri $server_protocol" $status $body_bytes_sent "$filtered_http_referer" "$http_user_agent" $gzip_ratio'
@ -2647,6 +2660,9 @@ package['modify_kernel_parameters'] = __MODIFY_KERNEL_PARAMETERS__
# patroni['use_slots'] = true
# patroni['replication_password'] = nil
# patroni['replication_slots'] = {}
# patroni['callbacks'] = {}
# patroni['recovery_conf'] = {}
# patroni['tags'] = {}
## Standby cluster replication settings
# patroni['standby_cluster']['enable'] = false
@ -2705,11 +2721,29 @@ package['modify_kernel_parameters'] = __MODIFY_KERNEL_PARAMETERS__
## advertized and by default is the same as patroni['port'].
# patroni['connect_port'] = '8008'
## Specifies the set of hosts that are allowed to call unsafe REST API endpoints.
## Each item can be an hostname, IP address, or CIDR address.
## All hosts are allowed if this is unset.
# patroni['allowlist'] = []
# patroni['allowlist_include_members'] = false
## The username and password to use for basic auth on write commands to the
## Patroni API. If not specified then the API does not use basic auth.
# patroni['username'] = nil
# patroni['password'] = nil
## TLS configuration for Patroni API. Both certificate and key files are
## required to enable TLS. If not specified then the API uses plain HTTP.
# patroni['tls_certificate_file'] = nil
# patroni['tls_key_file'] = nil
# patroni['tls_key_password'] = nil
# patroni['tls_ca_file'] = nil
# patroni['tls_ciphers'] = nil
# patroni['tls_client_mode'] = nil
# patroni['tls_client_certificate_file'] = nil
# patroni['tls_client_key_file'] = nil
# patroni['tls_verify'] = true
################################################################################
# Consul (EEP only)
################################################################################

View file

@ -2,7 +2,7 @@
"name": "GitLab",
"id": "gitlab",
"packaging_format": 1,
"version": "14.1.2~ynh1",
"version": "14.2.3~ynh1",
"description": {
"en": "Git-repository manager providing wiki, issue-tracking and CI/CD pipeline features.",
"fr": "Gestionnaire de dépôts Git proposant des fonctionnalités de wiki, suivi de bugs et de pipeline CI/CD."

View file

@ -1,15 +1,15 @@
#!/bin/bash
gitlab_version="14.1.2"
gitlab_version="14.2.3"
# sha256sum found here: https://packages.gitlab.com/gitlab
gitlab_debian_version="buster"
gitlab_x86_64_buster_source_sha256="01e1776daa7ed6062117b7c2ae9425eed6ba200f07192bd52d4fa6febe45f46d"
gitlab_x86_64_buster_source_sha256="c83a3f9d73e4b2178b13a856aa41bd7eea5319c0bddec4cc50f29e294e02adda"
gitlab_arm64_buster_source_sha256="f2804db2d0286b6c22efe8671734f56e5f08fd91e2820173b833daa0efae247b"
gitlab_arm64_buster_source_sha256="b5980a570c62943b744ec71e5124e3efd88418331edc4f2dde4a14bcefa8b52e"
gitlab_arm_buster_source_sha256="33a33792cbdceed4e64a815997fc06df83aaaab2bac8209f6776da821d25d494"
gitlab_arm_buster_source_sha256="323e9c182a95c3f67335907426dc9e917f8a065b4da4014053a84c85b190ee8f"
architecture=$(ynh_app_setting_get --app="$app" --key=architecture)
@ -20,8 +20,8 @@ elif [ "$architecture" = "arm64" ]; then
elif [ "$architecture" = "arm" ]; then
# If the version for arm doesn't exist, then use an older one
if [ -z "$gitlab_arm_buster_source_sha256" ]; then
gitlab_version="14.1.2"
gitlab_arm_buster_source_sha256="33a33792cbdceed4e64a815997fc06df83aaaab2bac8209f6776da821d25d494"
gitlab_version="14.2.3"
gitlab_arm_buster_source_sha256="323e9c182a95c3f67335907426dc9e917f8a065b4da4014053a84c85b190ee8f"
fi
gitlab_source_sha256=$gitlab_arm_buster_source_sha256
fi