Showing preview only (569K chars total). Download the full file or copy to clipboard to get everything.
Repository: sameersbn/docker-gitlab
Branch: master
Commit: fe0116d1bb16
Files: 65
Total size: 544.6 KB
Directory structure:
gitextract_0o0z_sra/
├── .circleci/
│ └── config.yml
├── .dockerignore
├── .github/
│ └── stale.yml
├── .gitignore
├── .gitlab-ci.yml
├── CI_MIGRATION.md
├── CONTRIBUTING.md
├── Changelog.md
├── Dockerfile
├── LICENSE
├── Makefile
├── README.md
├── VERSION
├── assets/
│ ├── build/
│ │ ├── config/
│ │ │ └── database.yml.postgresql
│ │ ├── install.sh
│ │ └── patches/
│ │ ├── gitlabhq/
│ │ │ ├── 0001-fix-feature-checking-for-gitaly-on-a-fresh-install.patch.bak
│ │ │ ├── 0002-fix-condition-for-csr-policy-allow-lfs_v16.3.0.patch.bak
│ │ │ ├── 0003-fix_preinstall.mjs-to-avoid-removing-node_modules_dir.patch.bak
│ │ │ ├── 0004-fix-raketask-gitlab-assets-compile.patch.bak
│ │ │ └── 0005_fix-gitlab-setup-mr225503.patch
│ │ └── ruby/
│ │ └── 0001-avoid-seeding_until-ruby3.3.0.bak
│ └── runtime/
│ ├── config/
│ │ ├── gitaly/
│ │ │ └── config.toml
│ │ ├── gitlab-pages/
│ │ │ └── config
│ │ ├── gitlab-shell/
│ │ │ └── config.yml
│ │ ├── gitlabhq/
│ │ │ ├── cable.yml
│ │ │ ├── database.yml
│ │ │ ├── gitlab.yml
│ │ │ ├── puma.rb
│ │ │ ├── relative_url.rb
│ │ │ ├── resque.yml
│ │ │ ├── secrets.yml
│ │ │ └── smtp_settings.rb
│ │ └── nginx/
│ │ ├── gitlab
│ │ ├── gitlab-pages
│ │ ├── gitlab-pages-ssl
│ │ ├── gitlab-registry
│ │ ├── gitlab-ssl
│ │ └── gitlab_ci
│ ├── env-defaults
│ ├── functions
│ └── scripts/
│ └── configure_feature_flags.rb
├── contrib/
│ ├── docker-swarm/
│ │ ├── docker-compose.yml
│ │ ├── gitlab.configs
│ │ └── gitlab.secrets
│ └── expose-gitlab-ssh-port.sh
├── docker-compose.swarm.yml
├── docker-compose.yml
├── docs/
│ ├── container_registry.md
│ ├── docker-compose-keycloak.yml
│ ├── docker-compose-registry.yml
│ ├── docker-swarm-traefik-registry.md
│ ├── exposing-ssh-port.md
│ ├── keycloak-idp.md
│ └── s3_compatible_storage.md
├── entrypoint.sh
├── hooks/
│ └── build
├── kubernetes/
│ ├── deploy.sh
│ ├── gitlab-rc.yml
│ ├── gitlab-svc.yml
│ ├── postgresql-rc.yml
│ ├── postgresql-svc.yml
│ ├── redis-rc.yml
│ ├── redis-svc.yml
│ └── teardown.sh
└── scripts/
└── release-notes.sh
================================================
FILE CONTENTS
================================================
================================================
FILE: .circleci/config.yml
================================================
version: 2.1
orbs:
shellcheck: circleci/shellcheck@3.4.0
docker: circleci/docker@2.8.2
go: circleci/go@1.11.0
commands:
docker-build:
description: |
Build and optionally deploy a Docker images
parameters:
dockerfile:
default: Dockerfile
description: 'Name of dockerfile to use, defaults to Dockerfile'
type: string
extra_build_args:
default: ''
description: >
Extra flags to pass to docker build. For examples, see
https://docs.docker.com/engine/reference/commandline/build
type: string
registry:
default: docker.io
description: |
Comma separated list of registry to use, defaults to docker.io
type: string
image:
description: Name of image to build
type: string
tag:
default: $CIRCLE_SHA1
description: 'Image tag, defaults to the value of $CIRCLE_SHA1'
type: string
path:
default: .
description: >
Path to the directory containing your Dockerfile and build context,
defaults to . (working directory)
type: string
cache_from:
default: ''
description: >
Comma-separated list of images, images will first be pulled, then passed
as the --cache-from build argument
https://docs.docker.com/engine/reference/commandline/build/
type: string
no_output_timeout:
default: 10m
description: |
No output timeout for build step
type: string
use-buildkit:
default: false
description: |
Use buildkit to build the image. Available on Docker >= 18.09.0 https://docs.docker.com/develop/develop-images/build_enhancements/
type: boolean
steps:
- when:
condition: <<parameters.cache_from>>
steps:
- run:
name: Build image for <<parameters.registry>>
no_output_timeout: <<parameters.no_output_timeout>>
command: >
echo "<<parameters.cache_from>>" | sed -n 1'p' | tr ',' '\n' |
while read image; do
echo "Pulling ${image}";
docker pull ${image} || true
done
docker_tag_args=""
IFS="," read -ra DOCKER_REGISTRIES \<<< "<< parameters.registry >>"
for registry in "${DOCKER_REGISTRIES[@]}"; do
IFS="," read -ra DOCKER_TAGS \<<< "<< parameters.tag >>"
for tag in "${DOCKER_TAGS[@]}"; do
docker_tag_args="$docker_tag_args -t $registry/<<parameters.image>>:${tag}"
done
done
docker buildx build
<<#parameters.extra_build_args>><<parameters.extra_build_args>><</parameters.extra_build_args>>
\
--cache-from <<parameters.cache_from>> \
-f <<parameters.path>>/<<parameters.dockerfile>> \
$docker_tag_args \
<<parameters.path>>
- unless:
condition: <<parameters.cache_from>>
steps:
- run:
name: Building image for <<parameters.registry>>
no_output_timeout: <<parameters.no_output_timeout>>
command: >
docker_tag_args=""
IFS="," read -ra DOCKER_REGISTRIES \<<< "<< parameters.registry >>"
for registry in "${DOCKER_REGISTRIES[@]}"; do
IFS="," read -ra DOCKER_TAGS \<<< "<< parameters.tag >>"
for tag in "${DOCKER_TAGS[@]}"; do
docker_tag_args="$docker_tag_args -t $registry/<<parameters.image>>:${tag}"
done
done
docker buildx build
<<#parameters.extra_build_args>><<parameters.extra_build_args>><</parameters.extra_build_args>>
\
-f <<parameters.path>>/<<parameters.dockerfile>> \
$docker_tag_args \
<<parameters.path>>
docker-save:
description: |
Save one or more images to a tar archive
parameters:
registry:
default: docker.io
description: |
Comma separated list of registry to use, defaults to docker.io
type: string
image:
description: Name of image to build
type: string
tag:
default: $CIRCLE_SHA1
description: 'Image tag, defaults to the value of $CIRCLE_SHA1'
type: string
steps:
- run:
name: Save image to tar archive
command: >
docker_images=""
IFS="," read -ra DOCKER_REGISTRIES \<<< "<< parameters.registry >>"
for registry in "${DOCKER_REGISTRIES[@]}"; do
IFS="," read -ra DOCKER_TAGS \<<< "<< parameters.tag >>"
for tag in "${DOCKER_TAGS[@]}"; do
docker_images="$docker_images $registry/<<parameters.image>>:${tag}"
done
done
mkdir -p ~/docker/
docker save -o ~/docker/docker-images.tar $docker_images
- persist_to_workspace:
root: ~/
paths:
- docker
docker-load:
description: |
Load tar archive
steps:
- attach_workspace:
at: ~/
- run:
name: Load images from tar archive
command: >
docker load -i ~/docker/docker-images.tar
docker-publish:
description: |
Build and optionally deploy a Docker images
parameters:
pr:
default: ''
type: string
registry:
default: docker.io
description: |
Comma separated list of registry to use, defaults to docker.io
type: string
image:
description: Name of image to build
type: string
tag:
default: $CIRCLE_SHA1
description: 'Image tag, defaults to the value of $CIRCLE_SHA1'
type: string
steps:
- unless:
condition: <<parameters.pr>>
steps:
- run:
name: Publish image for <<parameters.registry>>
command: >
IFS="," read -ra DOCKER_REGISTRIES \<<< "<< parameters.registry >>"
for registry in "${DOCKER_REGISTRIES[@]}"; do
IFS="," read -ra DOCKER_TAGS \<<< "<< parameters.tag >>"
for tag in "${DOCKER_TAGS[@]}"; do
docker push $registry/<< parameters.image>>:${tag}
done
done
jobs:
build:
machine:
image: ubuntu-2404:edge
resource_class: large
steps:
- checkout
- docker-build:
registry: docker.io,quay.io
image: sameersbn/gitlab
tag: ${CIRCLE_TAG:-latest}
cache_from: docker.io/sameersbn/gitlab:latest
extra_build_args: '--build-arg VCS_REF=${CIRCLE_TAG:-${CIRCLE_SHA1}} --build-arg BUILD_DATE="$(date +"%Y-%m-%d %H:%M:%S%:z")"'
no_output_timeout: 45m
use-buildkit: true
- docker-save:
registry: docker.io,quay.io
image: sameersbn/gitlab
tag: ${CIRCLE_TAG:-latest}
test:
executor: docker/machine
steps:
- checkout
- docker-load
- run:
name: Update tag in docker-compose.yml
command: |
sed -i "s|image: sameersbn/gitlab:.*|image: sameersbn/gitlab:${CIRCLE_TAG:-latest}|" docker-compose.yml
- run:
name: Launch gitlab stack
command: docker-compose up -d --quiet-pull
- run:
name: Container info
command: docker ps
- run:
name: Wait for stack bootup
command: sleep 90
- run:
name: Show logs
command: docker-compose logs
- run:
name: Test image bootup
command: |
docker run --network container:$(docker-compose ps -q gitlab) \
curlimages/curl --ipv4 --retry 60 --retry-delay 5 --retry-connrefused -svf http://localhost/explore -o /dev/null
publish-dockerhub:
executor: docker/machine
steps:
- docker-load
- docker/check:
registry: docker.io
docker-username: DOCKER_LOGIN
docker-password: DOCKER_PASSWORD
- docker-publish:
registry: docker.io
image: sameersbn/gitlab
tag: ${CIRCLE_TAG:-latest}
publish-quay:
executor: docker/machine
steps:
- docker-load
- docker/check:
registry: quay.io
docker-username: DOCKER_LOGIN
docker-password: DOCKER_PASSWORD
- docker-publish:
registry: quay.io
image: sameersbn/gitlab
tag: ${CIRCLE_TAG:-latest}
release:
executor:
name: go/default
tag: '1.24'
steps:
- checkout
- run:
name: Installing github-release tool
command: go install github.com/meterup/github-release@latest
- run:
name: Creating github release
command: |
PRE_RELEASE=${CIRCLE_TAG/${CIRCLE_TAG%-rc[0-9]*}/}
github-release delete -u ${CIRCLE_PROJECT_USERNAME} -r ${CIRCLE_PROJECT_REPONAME} -t ${CIRCLE_TAG} 2>/dev/null ||:
./scripts/release-notes.sh ${CIRCLE_TAG} | github-release release ${PRE_RELEASE:+-p} -u ${CIRCLE_PROJECT_USERNAME} -r ${CIRCLE_PROJECT_REPONAME} -t ${CIRCLE_TAG} -d -
for f in $(find /tmp/dist -type f); do github-release upload -u ${CIRCLE_PROJECT_USERNAME} -r ${CIRCLE_PROJECT_REPONAME} -t ${CIRCLE_TAG} -n $(basename ${f}) -f ${f} ; done
workflows:
build-test-and-release:
jobs:
- shellcheck/check:
name: shellcheck
exclude: SC2086,SC2181
external_sources: true
filters:
tags:
only: /^([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9A-Za-z-]+(?:\.[0-9A-Za-z-]+)*))?(?:\+[0-9A-Za-z-]+)?$/
- build:
requires:
- shellcheck
filters:
tags:
only: /^([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9A-Za-z-]+(?:\.[0-9A-Za-z-]+)*))?(?:\+[0-9A-Za-z-]+)?$/
- test:
requires:
- build
filters:
tags:
only: /^([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9A-Za-z-]+(?:\.[0-9A-Za-z-]+)*))?(?:\+[0-9A-Za-z-]+)?$/
- publish-dockerhub:
context: dockerhub
requires:
- test
filters:
branches:
only: master
tags:
only: /^([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9A-Za-z-]+(?:\.[0-9A-Za-z-]+)*))?(?:\+[0-9A-Za-z-]+)?$/
- publish-quay:
context: quay
requires:
- test
filters:
tags:
only: /^([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9A-Za-z-]+(?:\.[0-9A-Za-z-]+)*))?(?:\+[0-9A-Za-z-]+)?$/
branches:
only: master
- release:
context: github
requires:
- publish-dockerhub
- publish-quay
filters:
tags:
only: /^([0-9]+)\.([0-9]+)\.([0-9]+)(?:-([0-9A-Za-z-]+(?:\.[0-9A-Za-z-]+)*))?(?:\+[0-9A-Za-z-]+)?$/
branches:
ignore: /.*/
================================================
FILE: .dockerignore
================================================
.git
.gitignore
LICENSE
VERSION
README.md
Changelog.md
Makefile
docker-compose.yml
docs
================================================
FILE: .github/stale.yml
================================================
# Number of days of inactivity before an issue becomes stale
daysUntilStale: 60
# Number of days of inactivity before a stale issue is closed
daysUntilClose: 7
# Issues with these labels will never be considered stale
exemptLabels:
- pinned
- security
- keep-alive
# Label to use when marking an issue as stale
staleLabel: wontfix
# Comment to post when marking an issue as stale. Set to `false` to disable
markComment: >
This issue has been automatically marked as stale because it has not had
any activity for the last 60 days. It will be closed if no further activity
occurs during the next 7 days. Thank you for your contributions.
# Comment to post when closing a stale issue. Set to `false` to disable
closeComment: false
================================================
FILE: .gitignore
================================================
*.gem
*.tar.gz
*.tar.bz2
================================================
FILE: .gitlab-ci.yml
================================================
image: docker:18-git
stages:
- build
before_script:
- export VERSION=$(cat VERSION)
- export CI_REGISTRY=${CI_REGISTRY:-hub.docker.com}
- export CI_REGISTRY_USER=${CI_REGISTRY_USER:-gitlab-ci-token}
- export CI_REGISTRY_PASSWORD=${CI_REGISTRY_PASSWORD:-${CI_JOB_TOKEN}}
- export DOCKER_IMAGE=${DOCKER_IMAGE:-${CI_REGISTRY}/${CI_PROJECT_PATH}}
- |
if [ "${DOCKER_IMAGE}" = "/" ]; then
export DOCKER_IMAGE=sameersbn/gitlab
fi
docker:build:
stage: build
only:
- master
script:
- docker login -u ${CI_REGISTRY_USER} -p ${CI_REGISTRY_PASSWORD} ${CI_REGISTRY}
- docker build
--pull
--cache-from=${DOCKER_IMAGE}
--build-arg=VCS_REF=$(git rev-parse --short HEAD)
--build-arg=BUILD_DATE="$(date +"%Y-%m-%d %H:%M:%S%:z")"
--tag ${DOCKER_IMAGE} .
- docker push ${DOCKER_IMAGE}
docker:build:branches:
stage: build
only:
- branches
except:
- master
script:
- docker login -u ${CI_REGISTRY_USER} -p ${CI_REGISTRY_PASSWORD} ${CI_REGISTRY}
- docker build
--pull
--cache-from=${DOCKER_IMAGE}:${CI_COMMIT_REF_SLUG}
--build-arg=VCS_REF=$(git rev-parse --short HEAD)
--build-arg=BUILD_DATE="$(date +"%Y-%m-%d %H:%M:%S%:z")"
--tag ${DOCKER_IMAGE}:${CI_COMMIT_REF_SLUG} .
- docker push ${DOCKER_IMAGE}:${CI_COMMIT_REF_SLUG}
docker:build:release:
stage: build
only:
- tags
script:
- docker login -u ${CI_REGISTRY_USER} -p ${CI_REGISTRY_PASSWORD} ${CI_REGISTRY}
- docker build
--pull
--cache-from=${DOCKER_IMAGE}:${VERSION}
--build-arg=VCS_REF=$(git rev-parse --short HEAD)
--build-arg=BUILD_DATE="$(date +"%Y-%m-%d %H:%M:%S%:z")"
--tag ${DOCKER_IMAGE}:${VERSION} .
- docker push ${DOCKER_IMAGE}:${VERSION}
================================================
FILE: CI_MIGRATION.md
================================================
# CI Migration Guide
Since version `8.0.0`, CI is now a part of GitLab. You no longer need to run a separate instance of the CI server. This guide walks you through the procedure of migrating your existing CI data into GitLab.
This guide assumes that you are currently using `sameersbn/gitlab` and `sameersbn/gitlab-ci` for setting up your GitLab and CI requirements.
> **Note:**
>
> If your CI server and your GitLab server use the same database adapter no special care is needed. If your CI server uses MySQL and your GitLab server uses PostgreSQL you need to pass a special option in **Step 4 - Upgrade CI > Create CI backup**. If your CI server uses PostgreSQL and your GitLab server uses MySQL you cannot migrate your CI data to GitLab `8.0`, Please refer to https://github.com/sameersbn/docker-gitlab/issues/429#issuecomment-152799995 for instructions to migrate from MySQL to PostgreSQL first.
## Step 1 - Get Ready
Stop your GitLab and CI servers
```bash
docker stop gitlab-ci gitlab
docker rm gitlab-ci gitlab
```
## Step 2 - Upgrade to the `7.14.3` releases
Migration to GitLab `8.0` can only be done from version `7.14.3`. As a result we need to first migrate to the most recent versions of these images.
### Upgrade to `sameersbn/gitlab:7.14.3`
```bash
docker run -it --rm [OPTIONS] \
sameersbn/gitlab:7.14.3 app:init
```
### Upgrade to `sameersbn/gitlab-ci:7.14.3-1`
```bash
docker run -it --rm [OPTIONS] \
sameersbn/gitlab-ci:7.14.3-1 app:init
```
## Step 3 - Generate Backups
Create backups to ensure that we can rollback in case you face issues during the migration
### Create GitLab backup
```bash
docker run -it --rm [OPTIONS] \
sameersbn/gitlab:7.14.3 app:rake gitlab:backup:create
```
Make a note of the backup archive `xxxxxxxxxx_gitlab_backup.tar` as it is the backup you will have to rollback to in case of errors.
### Create GitLab CI backup
```bash
docker run -it --rm [OPTIONS] \
sameersbn/gitlab-ci:7.14.3-1 app:rake backup:create
```
Make a note of the backup archive `xxxxxxxxxx_gitlab_ci_backup.tar.gz` as it is the backup you will have to rollback to in case of errors.
> **Note**: From this point only `8.0.x` version images are used.
## Step 4 - Upgrade CI
CI `8.x.x` is only meant for the purpose of migrating to GitLab `8.0`. Here we need to upgrade to version `8.x.x` and generate a backup that will be imported into GitLab.
### Upgrade to `sameersbn/gitlab-ci:8.0.5`
```bash
docker run -it --rm [OPTIONS] \
sameersbn/gitlab-ci:8.0.5 app:init
```
### Create CI backup
*If you are converting from MySQL to PostgreSQL, add `MYSQL_TO_POSTGRESQL=1` to the end of the below command.*
```bash
docker run -it --rm [OPTIONS] \
sameersbn/gitlab-ci:8.0.5 app:rake backup:create
```
Copy the generated backup archive `xxxxxxxxxx_gitlab_ci_backup.tar` into the `backups/` directory of the GitLab server.
```bash
cp <gitlab-ci-host-volume-path>/backups/xxxxxxxxxx_gitlab_ci_backup.tar <gitlab-ce-host-volume-path>/backups/
```
We are done with CI. If the rest of the migration goes was planned you will not need to start `sameersbn/gitlab-ci` ever again.
## Step 5 - Upgrade GitLab
Before we can upgrade to `sameersbn/gitlab:8.0.5-1`, we need to assign the value of `GITLAB_CI_SECRETS_DB_KEY_BASE` (from CI) to `GITLAB_SECRETS_DB_KEY_BASE` in GitLab's environment.
Next you also need to set the environment variable `GITLAB_CI_HOST` to the address of your CI server, eg. `ci.example.com`. This will make sure that your existing runners will be able to communicate to GitLab with the old url.
### Upgrade to `sameersbn/gitlab:8.0.5-1`
```bash
docker run -it --rm [OPTIONS] \
--env GITLAB_CI_HOST=ci.example.com --env GITLAB_SECRETS_DB_KEY_BASE=xxxxxx \
sameersbn/gitlab:8.0.5-1 app:init
```
### Migrate CI data
```bash
docker run -it --rm [OPTIONS] \
--env GITLAB_CI_HOST=ci.example.com --env GITLAB_SECRETS_DB_KEY_BASE=xxxxxx \
sameersbn/gitlab:8.0.5-1 app:rake ci:migrate
```
## Step 6 - Fix DNS and reverse proxy configurations
Since GitLab and CI are now one, update your DNS configuration to make sure `ci.example.com` points to your GitLab instance.
If you are using a reverse proxy, update the configuration such that `ci.example.com` interfaces with the GitLab server.
>**Note**: The above changes results in connections from your runners redirect multiple times before ending up at the right location. If you want to avoid this redirection you can update the url in your runners configuration file to point to `http://git.example.com/ci` when using plain http, or `https://git.example.com/ci` if you are using SSL.
>
> If you change the url on the runners you can also do away with the `ci.example.com` domain name altogether.
## Step 7 - Done!
You can now start the GitLab server normally. Make sure that `GITLAB_CI_HOST` and `GITLAB_SECRETS_DB_KEY_BASE` are defined in your containers environment.
================================================
FILE: CONTRIBUTING.md
================================================
# GitLab-CI Configuration
When using your own GitLab instance, the provided .gitlab-ci.yml will automatically be using the settings provided by the GitLab instance. If needed, several options can be overriden.
Overrides for these values can be set within the project, under `Settings` -> `CI/CD` -> `Variables`.
| Variable | Default Value | Description |
| ---------------------- | ------------------ | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| `CI_REGISTRY` | `hub.docker.com` | If available this will be automatically overriden by registry address which is configured within the GitLab instance |
| `CI_REGISTRY_USER` | `gitlab-ci-token` | Username for the registry |
| `CI_REGISTRY_PASSWORD` | `${CI_JOB_TOKEN}` | Password for the registry |
| `DOCKER_IMAGE` | `sameersbn/gitlab` | Docker image name, will automatically be overriden by the running GitLab instance with the `${CI_PROJECT_PATH}` variable. This will cause the image to be uploaded to the local registry of the project within GitLab. |
================================================
FILE: Changelog.md
================================================
# Changelog
This file only reflects the changes that are made in this image. Please refer to the upstream GitLab [CHANGELOG](https://
gitlab.com/gitlab-org/gitlab-foss/blob/master/CHANGELOG.md) for the list of changes in GitLab.
## 18.9.2
- gitlab: upgrade CE to v18.9.2
- gitaly: upgrade to v18.9.2
- gitlab-pages: upgrade to v18.9.2
- golang: upgrade to v1.25.8
- rubygems: upgrade to v4.0.8
## 18.9.1
- gitlab: upgrade CE to v18.9.1
- gitaly: upgrade to v18.9.1
- gitlab-pages: upgrade to v18.9.1
## 18.9.0
- gitlab: upgrade CE to v18.9.0
- gitaly: upgrade to v18.9.0
- gitlab-pages: upgrade to v18.9.0
- gitlab-shell: upgrade to v14.45.6
- ruby: upgrade to v3.3.10
- ubuntu: upgrade to noble-20260210.1
## 18.8.4
- gitlab: upgrade CE to v18.8.4
- gitaly: upgrade to v18.8.4
- gitlab-pages: upgrade to v18.8.4
- golang: upgrade to v1.25.7
- rubygems: upgrade to v4.0.6
## 18.8.3
- gitlab: upgrade CE to v18.8.3
- gitaly: upgrade to v18.8.3
- gitlab-pages: upgrade to v18.8.3
## 18.8.2
- gitlab: upgrade CE to v18.8.2
- gitaly: upgrade to v18.8.2
- gitlab-pages: upgrade to v18.8.2
## 18.8.1
- gitlab: upgrade CE to v18.8.1
- gitaly: upgrade to v18.8.1
- gitlab-pages: upgrade to v18.8.1
## 18.8.0
- gitlab: upgrade CE to v18.8.0
- gitaly: upgrade to v18.8.0
- gitlab-pages: upgrade to v18.8.0
- golang: upgrade to v1.24.12
- ruby: upgrade to v3.2.10
- ubuntu: upgrade to noble-20260113
## 18.7.1
- gitlab: upgrade CE to v18.7.1
- gitaly: upgrade to v18.7.1
- gitlab-pages: upgrade to v18.7.1
## 18.7.0
- gitlab: upgrade CE to v18.7.0
- gitaly: upgrade to v18.7.0
- gitlab-pages: upgrade to v18.7.0
- gitlab-shell: upgrade to v14.45.5
## 18.6.2
- gitlab: upgrade CE to v18.6.2
- gitaly: upgrade to v18.6.2
- gitlab-pages: upgrade to v18.6.2
- golang: upgrade to v1.24.11
## 18.6.1
- gitlab: upgrade CE to v18.6.1
- gitaly: upgrade to v18.6.1
- gitlab-pages: upgrade to v18.6.1
## 18.6.0
- gitlab: upgrade CE to v18.6.0
- gitaly: upgrade to v18.6.0
- gitlab-pages: upgrade to v18.6.0
- ubuntu: upgrade to noble-20251013
## 18.5.2
- gitlab: upgrade CE to v18.5.2
- gitaly: upgrade to v18.5.2
- gitlab-pages: upgrade to v18.5.2
- golang: upgrade to v1.24.10
## 18.5.1
- gitlab: upgrade CE to v18.5.1
- gitaly: upgrade to v18.5.1
- gitlab-pages: upgrade to v18.5.1
## 18.5.0
- gitlab: upgrade CE to v18.5.0
- gitaly: upgrade to v18.5.0
- gitlab-pages: upgrade to v18.5.0
- gitlab-shell: upgrade to v14.45.3
- golang: upgrade to v1.24.9
- ubuntu: upgrade to noble-20251001
## 18.4.2
- gitlab: upgrade CE to v18.4.2
- gitaly: upgrade to v18.4.2
- gitlab-pages: upgrade to v18.4.2
- golang: upgrade to v1.24.8
- ubuntu: upgrade to noble-20250925
## 18.4.1
- gitlab: upgrade CE to v18.4.1
- gitaly: upgrade to v18.4.1
- gitlab-pages: upgrade to v18.4.1
- ubuntu: upgrade to noble-20250910
## 18.4.0
- gitlab: upgrade CE to v18.4.0
- gitaly: upgrade to v18.4.0
- gitlab-pages: upgrade to v18.4.0
- ubuntu: upgrade to noble-20250910
## 18.3.2
- gitlab: upgrade CE to v18.3.2
- gitaly: upgrade to v18.3.2
- gitlab-pages: upgrade to v18.3.2
- gitlab-shell: upgrade to v14.45.2
- golang: upgrade to v1.24.7
- rubygems: upgrade to v3.7.2
- ubuntu: upgrade to noble-20250805
## 18.3.1
- gitlab: upgrade CE to v18.3.1
- gitaly: upgrade to v18.3.1
- gitlab-pages: upgrade to v18.3.1
## 18.3.0
- gitlab: upgrade CE to v18.3.0
- gitaly: upgrade to v18.3.0
- gitlab-pages: upgrade to v18.3.0
## 18.2.4
- gitlab: upgrade CE to v18.2.4
- gitaly: upgrade to v18.2.4
- gitlab-pages: upgrade to v18.2.4
- gitlab-shell: upgrade to v14.44.0
## 18.2.2
- gitlab: upgrade CE to v18.2.2
- gitaly: upgrade to v18.2.2
- gitlab-pages: upgrade to v18.2.2
- golang: upgrade to v1.24.6
- ubuntu: upgrade to noble-20250716
## 18.2.1
- gitlab: upgrade CE to v18.2.1
- gitaly: upgrade to v18.2.1
- gitlab-pages: upgrade to v18.2.1
- ruby: upgrade to v3.2.9
- rubygems: upgrade to v3.7.1
## 18.2.0
- gitlab: upgrade CE to v18.2.0
- gitaly: upgrade to v18.2.0
- gitlab-pages: upgrade to v18.2.0
- gitlab-shell: upgrade to v14.43.0
- rubygems: upgrade to v3.7.0
- ubuntu: upgrade to noble-20250714
## 18.1.2
- gitlab: upgrade CE to v18.1.2
- gitaly: upgrade to v18.1.2
- gitlab-pages: upgrade to v18.1.2
- golang: upgrade to v1.24.5
- ubuntu: upgrade to noble-20250619
## 18.1.1
- gitlab: upgrade CE to v18.1.1
- gitaly: upgrade to v18.1.1
- gitlab-pages: upgrade to v18.1.1
## 18.1.0
- gitlab: upgrade CE to v18.1.0
- gitaly: upgrade to v18.1.0
- gitlab-pages: upgrade to v18.1.0
## 18.0.2
- gitlab: upgrade CE to v18.0.2
- gitaly: upgrade to v18.0.2
- gitlab-pages: upgrade to v18.0.2
- golang: upgrade to v1.24.4
- ubuntu: upgrade to noble-20250529
## 18.0.1
- gitlab: upgrade CE to v18.0.1
- gitaly: upgrade to v18.0.1
- gitlab-pages: upgrade to v18.0.1
- gitlab-shell: upgrade to v14.42.0
## 18.0.0
- gitlab: upgrade CE to v18.0.0
- gitaly: upgrade to v18.0.0
- gitlab-pages: upgrade to v18.0.0
- redis: upgrade to v7
- rubygems: upgrade to v3.6.9
- ubuntu: upgrade to noble-20250415.1
## 17.11.2
- gitlab: upgrade CE to v17.11.2
- gitaly: upgrade to v17.11.2
- gitlab-pages: upgrade to v17.11.2
- golang: upgrade to v1.24.3
- ubuntu: upgrade to jammy-20250415.1
## 17.11.1
- gitlab: upgrade CE to v17.11.1
- gitaly: upgrade to v17.11.1
- gitlab-pages: upgrade to v17.11.1
- rubygems: upgrade to v3.6.8
## 17.11.0
- gitlab: upgrade CE to v17.11.0
- gitaly: upgrade to v17.11.0
- gitlab-pages: upgrade to v17.11.0
## 17.10.4
- gitlab: upgrade CE to v17.10.4
- gitaly: upgrade to v17.10.4
- gitlab-pages: upgrade to v17.10.4
- ubuntu: upgrade to jammy-20250404
## 17.10.3
- gitlab: upgrade CE to v17.10.3
- gitaly: upgrade to v17.10.3
- gitlab-pages: upgrade to v17.10.3
- golang: upgrade to v1.24.2
- ruby: upgrade to v3.2.8
## 17.10.1
- gitlab: upgrade CE to v17.10.1
- gitaly: upgrade to v17.10.1
- gitlab-pages: upgrade to v17.10.1
## 17.10.0
- gitlab: upgrade CE to v17.10.0
- gitaly: upgrade to v17.10.0
- gitlab-pages: upgrade to v17.10.0
- golang: upgrade to v1.24.1
- rubygems: upgrade to v3.6.6
## 17.9.2
- gitlab: upgrade CE to v17.9.2
- gitaly: upgrade to v17.9.2
- gitlab-pages: upgrade to v17.9.2
## 17.9.1
- gitlab: upgrade CE to v17.9.1
- gitaly: upgrade to v17.9.1
- gitlab-pages: upgrade to v17.9.1
## 17.9.0
- gitlab: upgrade CE to v17.9.0
- gitaly: upgrade to v17.9.0
- gitlab-pages: upgrade to v17.9.0
- gitlab-shell: upgrade to v14.40.0
- golang: upgrade to v1.24.0
- rubygems: upgrade to v3.5.23
- ubuntu: upgrade to jammy-20250126
## 17.8.2
- gitlab: upgrade CE to v17.8.2
- gitaly: upgrade to v17.8.2
- gitlab-pages: upgrade to v17.8.2
- golang: upgrade to v1.23.6
- ruby: upgrade to v3.2.7
## 17.8.1
- gitlab: upgrade CE to v17.8.1
- gitaly: upgrade to v17.8.1
- gitlab-pages: upgrade to v17.8.1
## 17.8.0
- gitlab: upgrade CE to v17.8.0
- gitaly: upgrade to v17.8.0
- gitlab-pages: upgrade to v17.8.0
## 17.7.1
- gitlab: upgrade CE to v17.7.1
- gitaly: upgrade to v17.7.1
- gitlab-pages: upgrade to v17.7.1
## 17.7.0
- gitlab: upgrade CE to v17.7.0
- gitaly: upgrade to v17.7.0
- gitlab-pages: upgrade to v17.7.0
- ubuntu: upgrade to jammy-20240911.1
- update healthcheck for postgresql
## 17.6.3
- gitlab: upgrade CE to v17.6.3
- gitaly: upgrade to v17.6.3
- gitlab-pages: upgrade to v17.6.3
## 17.6.2
- gitlab: upgrade CE to v17.6.2
- gitaly: upgrade to v17.6.2
- gitlab-pages: upgrade to v17.6.2
## 17.6.1
- gitlab: upgrade CE to v17.6.1
- gitlab-pages: upgrade to v17.6.1
- gitaly: upgrade to v17.6.1
- golang: upgrade to v1.23.5
## 17.6.0
- gitlab: upgrade CE to v17.6.0
- gitaly: upgrade to v17.6.0
- gitlab-pages: upgrade to v17.6.0
## 17.5.2
- gitlab: upgrade CE to v17.5.2
- gitaly: upgrade to v17.5.2
- gitlab-pages: upgrade to v17.5.2
- golang: upgrade to v1.23.2
- ruby: upgrade to v3.2.6
## 17.5.1
- gitlab: upgrade CE to v17.5.1
- gitaly: upgrade to v17.5.1
- gitlab-pages: upgrade to v17.5.1
## 17.5.0
- gitlab: upgrade CE to v17.5.0
- gitaly: upgrade to v17.5.0
- gitlab-pages: upgrade to v17.5.0
- ubuntu: upgrade to focal-20241011
## 17.4.2
- gitlab: upgrade CE to v17.4.2
- gitaly: upgrade to v17.4.2
- gitlab-pages: upgrade to v17.4.2
- golang: upgrade to v1.23.2
- ubuntu: upgrade to focal-20240918
## 17.4.1
- gitlab: upgrade CE to v17.4.1
- gitaly: upgrade to v17.4.1
- gitlab-pages: upgrade to v17.4.1
## 17.4.0
- gitlab: upgrade CE to v17.4.0
- gitaly: upgrade to v17.4.0
- gitlab-pages: upgrade to v17.4.0
- gitlab-shell: upgrade to v14.39.0
## 17.3.3
- gitlab: upgrade CE to v17.3.3
- gitaly: upgrade to v17.3.3
- gitlab-pages: upgrade to v17.3.3
## 17.3.2
- gitlab: upgrade CE to v17.3.2
- gitaly: upgrade to v17.3.2
- gitlab-pages: upgrade to v17.3.2
- golang: upgrade to v1.23.1
## 17.3.1
- gitlab: upgrade CE to v17.3.1
- gitaly: upgrade to v17.3.1
- gitlab-pages: upgrade to v17.3.1
## 17.3.0
- gitlab: upgrade CE to v17.3.0
- gitaly: upgrade to v17.3.0
- gitlab-pages: upgrade to v17.3.0
- gitlab-shell: upgrade to v14.38.0
- golang: upgrade to v1.23.0
## 17.2.2
- gitlab: upgrade CE to v17.2.2
- gitaly: upgrade to v17.2.2
- gitlab-pages: upgrade to v17.2.2
- golang: upgrade to v1.22.6
## 17.2.1
- gitlab: upgrade CE to v17.2.1
- gitaly: upgrade to v17.2.1
- gitlab-pages: upgrade to v17.2.1
- ruby: upgrade to v3.2.5
## 17.2.0
- gitlab: upgrade CE to v17.2.0
- gitaly: upgrade to v17.2.0
- gitlab-pages: upgrade to v17.2.0
- gitlab-shell: upgrade to v14.37.0
## 17.1.2
- gitlab: upgrade CE to v17.1.2
- gitaly: upgrade to v17.1.2
- gitlab-pages: upgrade to v17.1.2
- golang: upgrade to v1.22.5
## 17.1.1
- gitlab: upgrade CE to v17.1.1
- gitaly: upgrade to v17.1.1
- gitlab-pages: upgrade to v17.1.1
## 17.1.0
- gitlab: upgrade CE to v17.1.0
- gitaly: upgrade to v17.1.0
- gitlab-pages: upgrade to v17.1.0
- gitlab-shell: upgrade to v14.36.0
## 17.0.2
- gitlab: upgrade CE to v17.0.2
- gitaly: upgrade to v17.0.2
- gitlab-pages: upgrade to v17.0.2
- golang: upgrade to v1.22.4
- ubuntu: upgrade to focal-20240530
## 17.0.1
- gitlab: upgrade CE to v17.0.1
- gitaly: upgrade to v17.0.1
- gitlab-pages: upgrade to v17.0.1
## 17.0.0
- gitlab: upgrade CE to v17.0.0
- gitaly: upgrade to v17.0.0
- gitlab-pages: upgrade to v17.0.0
- gitlab-shell: upgrade to v14.35.0
## 16.11.2
- gitlab: upgrade CE to v16.11.2
- gitaly: upgrade to v16.11.2
- gitlab-pages: upgrade to v16.11.2
- golang: upgrade to v1.22.3
- ubuntu: upgrade to focal-20240427
## 16.11.1
- gitlab: upgrade CE to v16.11.1
- gitaly: upgrade to v16.11.1
- gitlab-pages: upgrade to v16.11.1
- ruby: upgrade to v3.2.4
- ubuntu: upgrade to focal-20240416
## 16.11.0
- gitlab: upgrade CE to v16.11.0
- gitaly: upgrade to v16.11.0
- gitlab-pages: upgrade to v16.11.0
- gitlab-shell: upgrade to v14.35.0
## 16.10.3
- gitlab: upgrade CE to v16.10.3
- gitaly: upgrade to v16.10.3
- gitlab-pages: upgrade to v16.10.3
- ubuntu: upgrade to focal-20240410
## 16.10.2
- gitlab: upgrade CE to v16.10.2
- gitaly: upgrade to v16.10.2
- gitlab-pages: upgrade to v16.10.2
- golang: upgrade to v1.22.2
## 16.10.1
- gitlab: upgrade CE to v16.10.1
- gitaly: upgrade to v16.10.1
- gitlab-pages: upgrade to v16.10.1
## 16.10.0
- gitlab: upgrade CE to v16.10.0
- gitaly: upgrade to v16.10.0
- gitlab-pages: upgrade to v16.10.0
- gitlab-shell: upgrade to v14.34.0
## 16.9.2
- gitlab: upgrade CE to v16.9.2
- gitaly: upgrade to v16.9.2
- gitlab-pages: upgrade to v16.9.2
- golang: upgrade to v1.22.1
- ubuntu: upgrade to focal-20240216
## 16.9.1
- gitlab: upgrade CE to v16.9.1
- gitaly: upgrade to v16.9.1
- gitlab-pages: upgrade to v16.9.1
## 16.9.0
- gitlab: upgrade CE to v16.9.0
- gitaly: upgrade to v16.9.0
- gitlab-pages: upgrade to v16.9.0
## 16.8.2
- gitlab: upgrade CE to v16.8.2
- gitaly: upgrade to v16.8.2
- gitlab-pages: upgrade to v16.8.2
- golang: upgrade to v1.22.0
- ubuntu: upgrade to focal-20240123
## 16.8.1
- gitlab: upgrade CE to v16.8.1
- gitaly: upgrade to v16.8.1
- gitlab-pages: upgrade to v16.8.1
- gitlab-shell: upgrade to v14.33.0
## 16.8.0
- gitlab: upgrade CE to v16.8.0
- gitaly: upgrade to v16.8.0
- gitlab-pages: upgrade to v16.8.0
## 16.7.3
- gitlab: upgrade CE to v16.7.3
- gitaly: upgrade to v16.7.3
- gitlab-pages: upgrade to v16.7.3
## 16.7.2
- gitlab: upgrade CE to v16.7.2
- gitaly: upgrade to v16.7.2
- gitlab-pages: upgrade to v16.7.2
- golang: upgrade to v1.21.6
## 16.7.0
- gitlab: upgrade CE to v16.7.0
- gitaly: upgrade to v16.7.0
- gitlab-pages: upgrade to v16.7.0
- gitlab-shell: upgrade to v14.32.0
- ruby: upgrade to v3.1.4
## 16.6.2
- gitlab: upgrade CE to v16.6.2
- gitaly: upgrade to v16.6.2
- gitlab-pages: upgrade to v16.6.2
- golang: upgrade to v1.21.5
- ubuntu: upgrade to focal-20231211
## 16.6.1
- gitlab: upgrade CE to v16.6.1
- gitaly: upgrade to v16.6.1
- gitlab-pages: upgrade to v16.6.1
- ubuntu: upgrade to focal-20231128
## 16.6.0
- gitlab: upgrade CE to v16.6.0
- gitaly: upgrade to v16.6.0
- gitlab-pages: upgrade to v16.6.0
- gitlab-shell: upgrade to v14.30.0
- golang: upgrade to v1.21.4
## 16.5.1
- gitlab: upgrade CE to v16.5.1
- gitaly: upgrade to v16.5.1
- gitlab-pages: upgrade to v16.5.1
## 16.5.0
- gitlab: upgrade CE to v16.5.0
- gitaly: upgrade to v16.5.0
- gitlab-pages: upgrade to v16.5.0
- gitlab-shell: upgrade to v14.29.0
- golang: upgrade to v1.21.3
- ubuntu: upgrade to focal-20231003
## 16.4.1
- gitlab: upgrade CE to v16.4.1
- gitaly: upgrade to v16.4.1
- gitlab-pages: upgrade to v16.4.1
## 16.4.0
- gitlab: upgrade CE to v16.4.0
- gitaly: upgrade to v16.4.0
- gitlab-pages: upgrade to v16.4.0
- gitlab-shell: upgrade to v14.28.0
## 16.3.4
- gitlab: upgrade CE to v16.3.4
- gitaly: upgrade to v16.3.4
- gitlab-pages: upgrade to v16.3.4
## 16.3.3
- gitlab: upgrade CE to v16.3.3
- gitaly: upgrade to v16.3.3
- gitlab-pages: upgrade to v16.3.3
## 16.3.2
- gitlab: upgrade CE to v16.3.2
- gitaly: upgrade to v16.3.2
- gitlab-pages: upgrade to v16.3.2
- golang: upgrade to v1.21.1
## 16.3.1
- gitlab: upgrade CE to v16.3.1
- gitaly: upgrade to v16.3.1
- gitlab-pages: upgrade to v16.3.1
## 16.3.0
- gitlab: upgrade CE to v16.3.0
- gitaly: upgrade to v16.3.0
- gitlab-pages: upgrade to v16.3.0
## 16.2.4
- gitlab: upgrade CE to v16.2.4
- gitaly: upgrade to v16.2.4
- gitlab-pages: upgrade to v16.2.4
- golang: upgrade to v1.21.0
## 16.2.3
- gitlab: upgrade CE to v16.2.3
- gitaly: upgrade to v16.2.3
- gitlab-pages: upgrade to v16.2.3
## 16.2.2
- gitlab: upgrade CE to v16.2.2
- gitaly: upgrade to v16.2.2
- gitlab-pages: upgrade to v16.2.2
- golang: upgrade to v1.20.7
- ubuntu: upgrade to focal-20230801
## 16.2.1
- gitlab: upgrade CE to v16.2.1
- gitaly: upgrade to v16.2.1
- gitlab-pages: upgrade to v16.2.1
## 16.2.0
- gitlab: upgrade CE to v16.2.0
- gitaly: upgrade to v16.2.0
- gitlab-pages: upgrade to v16.2.0
- golang: upgrade to v1.20.6
## 16.1.2
- gitlab: upgrade CE to v16.1.2
- gitaly: upgrade to v16.1.2
- gitlab-pages: upgrade to v16.1.2
- ubuntu: upgrade to focal-20230624
## 16.1.1
- gitlab: upgrade CE to v16.1.1
- gitaly: upgrade to v16.1.1
- gitlab-pages: upgrade to v16.1.1
## 16.1.0
- gitlab: upgrade CE to v16.1.0
- gitaly: upgrade to v16.1.0
- gitlab-pages: upgrade to v16.1.0
- gitlab-shell: upgrade to v14.23.0
## 16.0.5
- gitlab: upgrade CE to v16.0.5
- gitaly: upgrade to v16.0.5
- gitlab-pages: upgrade to v16.0.5
- ubuntu: upgrade to focal-20230605
## 16.0.4
- gitlab: upgrade CE to v16.0.4
- gitaly: upgrade to v16.0.4
- gitlab-pages: upgrade to v16.0.4
## 16.0.3
- gitlab: upgrade CE to v16.0.3
- gitaly: upgrade to v16.0.3
- gitlab-pages: upgrade to v16.0.3
## 16.0.2
- gitlab: upgrade CE to v16.0.2
- gitaly: upgrade to v16.0.2
- gitlab-pages: upgrade to v16.0.2
- golang: upgrade to v1.20.5
## 16.0.1
- gitlab: upgrade CE to v16.0.1
- gitaly: upgrade to v16.0.1
- gitlab-pages: upgrade to v16.0.1
## 16.0.0
- gitlab: upgrade CE to v16.0.0
- gitaly: upgrade to v16.0.0
- gitlab-pages: upgrade to v16.0.0
- gitlab-shell: upgrade to v14.20.0
## 15.11.5
- gitlab: upgrade CE to v15.11.5
- gitaly: upgrade to v15.11.5
- gitlab-pages: upgrade to v15.11.5
## 15.11.4
- gitlab: upgrade CE to v15.11.4
- gitaly: upgrade to v15.11.4
- gitlab-pages: upgrade to v15.11.4
## 15.11.3
- gitlab: upgrade CE to v15.11.3
- gitaly: upgrade to v15.11.3
- gitlab-pages: upgrade to v15.11.3
- ruby: upgrade to v3.0.6
## 15.11.2
- gitlab: upgrade CE to v15.11.2
- gitaly: upgrade to v15.11.2
- gitlab-pages: upgrade to v15.11.2
## 15.11.1
- gitlab: upgrade CE to v15.11.1
- gitaly: upgrade to v15.11.1
- gitlab-pages: upgrade to v15.11.1
- golang: upgrade to v1.20.4
## 15.11.0
- gitlab: upgrade CE to v15.11.0
- gitaly: upgrade to v15.11.0
- gitlab-pages: upgrade to v15.11.0
- ubuntu: upgrade to focal-20230412
## 15.10.3
- gitlab: upgrade CE to v15.10.3
- gitaly: upgrade to v15.10.3
- gitlab-pages: upgrade to v15.10.3
## 15.10.2
- gitlab: upgrade CE to v15.10.2
- gitaly: upgrade to v15.10.2
- gitlab-pages: upgrade to v15.10.2
- golang: upgrade to v1.20.3
## 15.10.1
- gitlab: upgrade CE to v15.10.1
- gitaly: upgrade to v15.10.1
- gitlab-pages: upgrade to v15.10.1
- ruby: upgrade to v2.7.8
- ubuntu: upgrade to focal-20230308
## 15.10.0
- gitlab: upgrade CE to v15.10.0
- gitaly: upgrade to v15.10.0
- gitlab-pages: upgrade to v15.10.0
- gitlab-shell: upgrade to v14.18.0
- ubuntu: upgrade to focal-20230308
## 15.9.3
- gitlab: upgrade CE to v15.9.3
- gitaly: upgrade to v15.9.3
- gitlab-pages: upgrade to v15.9.3
- golang: upgrade to v1.20.2
## 15.9.2
- gitlab: upgrade CE to v15.9.2
- gitaly: upgrade to v15.9.2
- gitlab-pages: upgrade to v15.9.2
- ubuntu: upgrade to focal-20230301
## 15.9.1
- gitlab: upgrade CE to v15.9.1
- gitaly: upgrade to v15.9.1
- gitlab-pages: upgrade to v15.9.1
## 15.9.0
- gitlab: upgrade CE to v15.9.0
- gitaly: upgrade to v15.9.0
- gitlab-pages: upgrade to v15.9.0
- gitlab-shell: upgrade to v14.17.0
## 15.8.2
- gitlab: upgrade CE to v15.8.2
- gitaly: upgrade to v15.8.2
- gitlab-pages: upgrade to v15.8.2
- golang: upgrade to v1.19.6
## 15.8.1
- gitlab: upgrade CE to v15.8.1
- gitaly: upgrade to v15.8.1
- gitlab-pages: upgrade to v15.8.1
- ubuntu: upgrade to focal-20230126
## 15.8.0-1
- ruby: rollback to v2.7.7
## 15.8.0
- gitlab: upgrade CE to v15.8.0
- gitaly: upgrade to v15.8.0
- gitlab-pages: upgrade to v15.8.0
- gitlab-shell: upgrade to v14.15.0
- golang: upgrade to v1.18.10
## 15.7.5
- gitlab: upgrade CE to v15.7.5
- gitaly: upgrade to v15.7.5
- gitlab-pages: upgrade to v15.7.5
## 15.7.3
- gitlab: upgrade CE to v15.7.3
- gitaly: upgrade to v15.7.3
- gitlab-pages: upgrade to v15.7.3
## 15.7.2
- gitlab: upgrade CE to v15.7.2
- gitaly: upgrade to v15.7.2
- gitlab-pages: upgrade to v15.7.2
## 15.7.1
- gitlab: upgrade CE to v15.7.1
- gitaly: upgrade to v15.7.1
- gitlab-pages: upgrade to v15.7.1
## 15.7.0
- gitlab: upgrade CE to v15.7.0
- gitaly: upgrade to v15.7.0
- gitlab-pages: upgrade to v15.7.0
- gitlab-shell: upgrade to v14.14.0
- ruby: upgrade to v3.0.5
## 15.6.3
- gitlab: upgrade CE to v15.6.3
- gitaly: upgrade to v15.6.3
- gitlab-pages: upgrade to v15.6.3
- ubuntu: upgrade to focal-20221130
- ruby: upgrade to v2.7.7
- ruby: upgrade to v3.0.4
## 15.6.2
- gitlab: upgrade CE to v15.6.2
- gitaly: upgrade to v15.6.2
## 15.6.1
- gitlab: upgrade CE to v15.6.1
- gitaly: upgrade to v15.6.1
## 15.6.0
- gitlab: upgrade CE to v15.6.0
- gitaly: upgrade to v15.6.0
- gitlab-shell: upgrade to v14.13.0
- gitlab-pages: upgrade to v1.63.0
- golang: upgrade to v1.18.8
## 15.5.4
- gitlab: upgrade CE to v15.5.4
- gitaly: upgrade to v15.5.4
## 15.5.3
- gitlab: upgrade CE to v15.5.3
- gitaly: upgrade to v15.5.3
## 15.5.2
- gitlab: upgrade CE to v15.5.2
- gitaly: upgrade to v15.5.2
- ubuntu: upgrade to focal-20221019
## 15.5.1
- gitlab: upgrade CE to v15.5.1
- gitaly: upgrade to v15.5.1
## 15.5.0
- gitlab: upgrade CE to v15.5.0
- gitaly: upgrade to v15.5.0
- gitlab-shell: upgrade to v14.12.0
## 15.4.3
- gitlab: upgrade CE to v15.4.3
- gitaly: upgrade to v15.4.3
- ubuntu: upgrade to focal-20220922
## 15.4.2
- gitlab: upgrade CE to v15.4.2
- gitaly: upgrade to v15.4.2
## 15.4.1
- gitlab: upgrade CE to v15.4.1
- gitaly: upgrade to v15.4.1
## 15.4.0
- gitlab: upgrade CE to v15.4.0
- gitaly: upgrade to v15.4.0
- ubuntu: upgrade tofocal-20220826
## 15.3.3
- gitlab: upgrade CE to v15.3.3
- gitaly: upgrade to v15.3.3
## 15.3.2
- gitlab: upgrade CE to v15.3.2
- gitaly: upgrade to v15.3.2
## 15.3.1
- gitlab: upgrade CE to v15.3.1
- gitaly: upgrade to v15.3.1
## 15.3.0
- gitlab: upgrade CE to v15.3.0
- gitaly: upgrade to v15.3.0
- gitlab-shell: upgrade to v14.10.0
- gitlab-pages: upgrade to v1.62.0
- ubuntu: upgrade to focal-20220801
## 15.2.2
- gitlab: upgrade CE to v15.2.2
- gitaly: upgrade to v15.2.2
- golang: upgrade to v1.17.13
## 15.2.1
- gitlab: upgrade CE to v15.2.1
- gitaly: upgrade to v15.2.1
- gitlab-pages: upgrade to v1.61.1
## 15.2.0
- gitlab: upgrade CE to v15.2.0
- gitaly: upgrade to v15.2.0
- gitlab-shell: upgrade to v14.9.0
- gitlab-pages: upgrade to v1.61.0
- golang: upgrade to v1.17.12
## 15.1.3
- gitlab: upgrade CE to v15.1.3
- gitaly: upgrade to v15.1.3
## 15.1.2
- gitlab: upgrade CE to v15.1.2
- gitaly: upgrade to v15.1.2
## 15.1.1
- gitlab: upgrade CE to v15.1.1
- gitaly: upgrade to v15.1.1
## 15.1.0
- gitlab: upgrade CE to v15.1.0
- gitaly: upgrade to v15.1.0
- gitlab-shell: upgrade to v14.7.4
- gitlab-pages: upgrade to v1.59.0
## 15.0.3
- gitlab: upgrade CE to v15.0.3
- gitaly: upgrade to v15.0.3
## 15.0.2
- gitlab: upgrade CE to v15.0.2
- gitaly: upgrade to v15.0.2
- ubuntu: upgrade to focal-20220531
## 15.0.1
- gitlab: upgrade CE to v15.0.1
- gitaly: upgrade to v15.0.1
- golang: upgrade to v1.17.11
## 15.0.0
- gitlab: upgrade CE to v15.0.0
- gitaly: upgrade to v15.0.0
- golang: upgrade to v1.17.10
- gitlab-shell: upgrade to v14.3.0
- gitlab-pages: upgrade to v1.58.0
## 14.10.3
- gitlab: upgrade CE to v14.10.3
- gitaly: upgrade to v14.10.3
## 14.10.2
- gitlab: upgrade CE to v14.10.2
- gitaly: upgrade to v14.10.2
- ubuntu: upgrade to focal-20220426
## 14.10.1
- gitlab: upgrade CE to v14.10.1
- gitaly: upgrade to v14.10.1
- ubuntu: upgrade to focal-20220426
## 14.10.0
- gitlab: upgrade CE to v14.10.0
- gitaly: upgrade to v14.10.0
- gitlab-shell: upgrade to v13.25.1
- ubuntu: upgrade to focal-20220415
## 14.9.3
- gitlab: upgrade CE to v14.9.3
- gitaly: upgrade to v14.9.3
- golang: upgrade to v1.17.9
- ruby: upgrade to v2.7.6
- ubuntu: upgrade to focal-20220404
## 14.9.2
- gitlab: upgrade CE to v14.9.2
- gitaly: upgrade to v14.9.2
- gitlab-pages: upgrade to v1.56.1
## 14.9.1
- gitlab: upgrade CE to v14.9.1
- gitaly: upgrade to v14.9.1
## 14.9.0
- gitlab: upgrade CE to v14.9.0
- gitaly: upgrade to v14.9.0
- gitlab-pages: upgrade to v1.56.0
- gitlab-shell: upgrade to v13.24.0
## 14.8.4
- gitlab: upgrade CE to v14.8.4
- gitaly: upgrade to v14.8.4
## 14.8.3
- gitlab: upgrade CE to v14.8.3
- gitaly: upgrade to v14.8.3
- golang: upgrade to v1.17.8
- ubuntu: upgrade to focal-20220316
## 14.8.2
- gitlab: upgrade CE to v14.8.2
- gitaly: upgrade to v14.8.2
## 14.8.1
- gitlab: upgrade CE to v14.8.1
- gitaly: upgrade to v14.8.1
## 14.8.0
- gitlab: upgrade CE to v14.8.0
- gitaly: upgrade to v14.8.0
- gitlab-pages: upgrade to v1.54.0
- gitlab-shell: v13.23.2
## 14.7.3
- gitlab: upgrade CE to v14.7.3
- gitaly: upgrade to v14.7.3
- golang: upgrade to v1.17.7
## 14.7.2
- gitlab: upgrade CE to v14.7.2
- gitaly: upgrade to v14.7.2
- ubuntu: upgrade to focal-20220113
## 14.7.1
- gitlab: upgrade CE to v14.7.1
- gitaly: upgrade to v14.7.1
## 14.7.0
- gitlab: upgrade CE to v14.7.0
- gitaly: upgrade to v14.7.0
- gitlab-shell: v13.22.2
- gitlab-pages: upgrade to v1.51.0
## 14.6.3
- gitlab: upgrade CE to v14.6.3
- gitaly: upgrade to v14.6.3
## 14.6.2
- gitlab: upgrade CE to v14.6.2
- gitaly: upgrade to v14.6.2
- golang: upgrade to v1.17.6
- ubuntu: upgrade to focal-20220105
## 14.6.1
- gitlab: upgrade CE to v14.6.1
- gitaly: upgrade to v14.6.1
## 14.6.0
- gitlab: upgrade CE to v14.6.0
- gitaly: upgrade to v14.6.0
- gitlab-pages: upgrade to v1.49.0
## 14.5.2
- gitlab: upgrade CE to v14.5.2
- gitaly: upgrade to v14.5.2
- golang: upgrade to v1.17.5
## 14.5.1
- gitlab: upgrade CE to v14.5.1
- gitaly: upgrade to v14.5.1
- gitlab-shell: v13.22.1
## 14.5.0
- gitlab: upgrade CE to v14.5.0
- gitaly: upgrade to v14.5.0
- gitlab-pages: upgrade to v1.48.0
- gitlab-shell: v13.22.0
## 14.4.4
- gitlab: upgrade CE to v14.4.4
- gitaly: upgrade to v14.4.4
- ruby: upgrade to v2.7.5
## 14.4.3
- gitlab: upgrade CE to v14.4.3
- gitaly: upgrade to v14.4.3
- golang: upgrade to v1.17.4
## 14.4.2
- gitlab: upgrade CE to v14.4.2
- gitaly: upgrade to v14.4.2
- redis: upgrade to v6.2.6
## 14.4.1
- gitlab: upgrade CE to v14.4.1
- gitaly: upgrade to v14.4.1
## 14.4.0
- gitlab: upgrade CE to v14.4.0
- gitaly: upgrade to v14.4.0
- gitlab-pages: upgrade to v1.46.0
## 14.3.3
- gitlab: upgrade CE to v14.3.3
- gitaly: upgrade to v14.3.3
## 14.3.2
- gitlab: upgrade CE to v14.3.2
- gitaly: upgrade to v14.3.2
- gitlab-shell: v13.21.1
## 14.3.1
- gitlab: upgrade CE to v14.3.1
- gitaly: upgrade to v14.3.1
## 14.3.0
- gitlab: upgrade CE to v14.3.0
- gitaly: upgrade to v14.3.0
- gitlab-shell: v13.21.0
- gitlab-pages: upgrade to v1.44.0
- ruby: compile ruby from source and use v2.7.4
- ubuntu: upgrade to focal-20211006
## 14.2.5
- gitlab: upgrade CE to v14.2.5
- gitaly: upgrade to v14.2.5
## 14.2.4
- gitlab: upgrade CE to v14.2.4
- gitaly: upgrade to v14.2.4
- golang: upgrade to v1.17.1
## 14.2.3
- gitlab: upgrade CE to v14.2.3
- gitaly: upgrade to v14.2.3
## 14.2.2
- gitlab: upgrade CE to v14.2.2
- gitaly: upgrade to v14.2.2
- ubuntu: upgrade to focal-20210827
## 14.2.1
- gitlab: upgrade CE to v14.2.1
- gitaly: upgrade to v14.2.1
## 14.2.0
- gitlab: upgrade CE to v14.2.0
- gitaly: upgrade to v14.2.0
- gitlab-pages: upgrade to v1.42.0
- golang: upgrade to v1.17
## 14.1.3
- gitlab: upgrade CE to v14.1.3
- gitaly: upgrade to v14.1.3
- golang: upgrade to v1.16.7
## 14.1.2
- gitlab: upgrade CE to v14.1.2
- gitaly: upgrade to v14.1.2
- gitlab-shell: upgrade to v13.19.1
## 14.1.1
- gitlab: upgrade CE to v14.1.1
- gitaly: upgrade to v14.1.1
- ubuntu: upgrade to focal-20210723
## 14.1.0
- gitlab: upgrade CE to v14.1.0
- gitaly: upgrade to v14.1.0
## 14.0.6
- gitlab: upgrade CE to v14.0.6
- gitaly: upgrade to v14.0.6
- golang: upgrade to v1.16.6
## 14.0.5
- gitlab: upgrade CE to v14.0.5
- gitaly: upgrade to v14.0.5
## 14.0.4
- gitlab: upgrade CE to v14.0.4
- gitaly: upgrade to v14.0.4
## 14.0.3
- gitlab: upgrade CE to v14.0.3
- gitaly: upgrade to v14.0.3
## 14.0.2
- gitlab: upgrade CE to v14.0.2
- gitaly: upgrade to v14.0.2
## 14.0.1
- gitlab: upgrade CE to v14.0.1
- gitaly: upgrade to v14.0.1
## 14.0.0
- gitlab: upgrade CE to v14.0.0
- gitaly: upgrade to v14.0.0
- gitlab-shell: upgrade to v13.19.0
- gitlab-pages: upgrade to v1.40.0
## 13.12.5
- gitlab: upgrade CE to v13.12.5
- gitaly: upgrade to v13.12.5
- ubuntu: upgrade to focal-20210609
## 13.12.4
- gitlab: upgrade CE to v13.12.4
- gitaly: upgrade to v13.12.4
## 13.12.3
- gitlab: upgrade CE to v13.12.3
- gitaly: upgrade to v13.12.3
- golang: upgrade to v1.16.5
## 13.12.2
- gitlab: upgrade CE to v13.12.2
- gitaly: upgrade to v13.12.2
## 13.12.1
- gitlab: upgrade CE to v13.12.1
- gitaly: upgrade to v13.12.1
## 13.12.0
- gitlab: upgrade CE to v13.12.0
- gitlab-shell: upgrade to v13.18.0
- gitlab-pages: upgrade to v1.39.0
- gitaly: upgrade to v13.12.0
## 13.11.4
- gitlab: upgrade CE to v13.11.4
- gitaly: upgrade to v13.11.4
- golang: upgrade to v1.16.4
- ubuntu: upgrade to focal-20210416
## 13.11.3
- gitlab: upgrade CE to v13.11.3
- gitaly: upgrade to v13.11.3
## 13.11.2
- gitlab: upgrade CE to v13.11.2
- gitaly: upgrade to v13.11.2
## 13.11.1
- gitlab: upgrade CE to v13.11.1
- gitaly: upgrade to v13.11.1
## 13.11.0
- gitlab: upgrade CE to v13.11.0
- gitaly: upgrade to v13.11.0
- gitlab-pages: upgrade to v1.38.0
- ubuntu: upgrade to focal-20210401
## 13.10.3
- gitlab: upgrade CE to v13.10.3
- gitaly: upgrade to v13.10.3
## 13.10.2
- gitlab: upgrade CE to v13.10.2
- gitaly: upgrade to v13.10.2
- golang: upgrade to v1.16.3
- ubuntu: upgrade to bionic-20210325
## 13.10.1
- gitlab: upgrade CE to v13.10.1
- gitaly: upgrade to v13.10.1
- added libmagic1 to fit requirements of ruby-magic-static-0.3.4 (necessary for puma)
## 13.10.0
- gitlab: upgrade CE to v13.10.0
- gitaly: upgrade to v13.10.0
- gitlab-pages: upgrade to v1.36.0
## 13.9.5
- gitlab: upgrade CE to v13.9.5
- gitaly: upgrade to v13.9.5
## 13.9.4
- gitlab: upgrade CE to v13.9.4
- gitaly: upgrade to v13.9.4
- golang: upgrade to v1.16.2
- ubuntu: upgrade to bionic-20210222
## 13.9.3
- gitlab: upgrade CE to v13.9.3
- gitaly: upgrade to v13.9.3
- gitlab-shell: upgrade to v13.17.0
## 13.9.2
- gitlab: upgrade CE to v13.9.2
- gitaly: upgrade to v13.9.2
- gitlab-workhorse: upgrade to v8.63.2
## 13.9.1
- gitlab: upgrade CE to v13.9.1
- gitaly: upgrade to v13.9.1
## 13.9.0
- gitlab: upgrade CE to v13.9.0
- gitaly: upgrade to v13.9.0
- gitlab-shell: upgrade to v13.16.1
- gitlab-pages: upgrade to v1.35.0
- gitlab-workhorse: upgrade to v8.63.0
- golang: upgrade to v1.16
## 13.8.4
- added `SSL_PROTOCOLS` option to change protocols of the nginx
- added `SSL_REGISTRY_CIPHERS`
- added `SSL_REGISTRY_PROTOCOLS`
- added `SSL_PAGES_CIPHERS`
- added `SSL_PAGES_PROTOCOLS`
- gitlab: upgrade CE to v13.8.4
- gitaly: upgrade to v13.8.4
- gitlab-shell: upgrade to v13.15.1
## 13.8.3
- gitlab: upgrade CE to v13.8.3
- gitaly: upgrade to v13.8.3
- golang: upgrade to v1.15.8
## 13.8.2
- gitlab: upgrade CE to v13.8.2
- gitaly: upgrade to v13.8.2
## 13.8.1
- gitlab: upgrade CE to v13.8.1
- gitaly: upgrade to v13.8.1
## 13.8.0
- gitlab: upgrade CE to v13.8.0
- gitaly: upgrade to v13.8.0
- gitlab-shell: upgrade to v13.15.0
- gitlab-workhorse: upgrade to v8.59.0
- gitlab-pages: upgrade to v1.34.0
- golang: upgrade to v1.15.7
- ubuntu: upgrade to bionic-20210118
## 13.7.4
- gitlab: upgrade CE to v13.7.4
## 13.7.3
- gitlab: upgrade CE to v13.7.3
- gitlab-pages: upgrade to v1.34.0
- gitlab-shell: upgrade to v13.7.3
- gitlab-workhorse: upgrade to v8.58.2
## 13.7.1
- gitlab: upgrade CE to v13.7.1
- gitaly: upgrade v13.7.1
## 13.7.0
- gitlab: upgrade CE to v13.7.0
- gitaly: upgrade v13.7.0
- gitlab-shell: upgrade to v13.14.0
- gitlab-pages: upgrade to v1.32.0
- gitlab-workhorse: upgrade to v8.58.0
- ubuntu: upgrade to ubuntu bionic-20201119
- postgresql: upgrade to postgresql 12
## 13.6.3
- gitlab: upgrade CE to v13.6.3
- gitaly: upgrade v13.6.3
## 13.6.2
- gitlab: upgrade CE to v13.6.2
- gitaly: upgrade v13.6.2
## 13.6.1
- gitlab: upgrade CE to v13.6.1
- gitaly: upgrade v13.6.1
## 13.6.0
- gitlab: upgrade CE to v13.6.0
- gitaly: upgrade v13.6.0
- gitlab-shell: upgrade to v13.13.0
- gitlab-pages: upgrade to v1.30.0
- gitlab-workhorse: upgrade to v8.54.0
- use bundler 2.1.4
- use ruby 2.7
## 13.5.4
- gitlab: upgrade CE to v13.5.4
- gitaly: upgrade v13.5.4
## 13.5.3
- gitlab: upgrade CE to v13.5.3
- gitaly: upgrade v13.5.3
## 13.5.2
- gitlab: upgrade CE to v13.5.2
- gitaly: upgrade v13.5.2
## 13.5.1
- gitlab: upgrade CE to v13.5.1
- gitaly: upgrade v13.5.1
- gitlab-shell: upgrade to v13.11.0
- gitlab-pages: upgrade to v1.28.0
- gitlab-workhorse: upgrade to v8.51.0
## 13.4.4
- gitlab: upgrade CE to v13.4.4
- gitaly: upgrade to v13.4.4
## 13.4.3
- gitlab: upgrade CE to v13.4.3
- gitaly: upgrade to v13.4.3
## 13.4.2
- gitlab: upgrade CE to v13.4.2
- gitaly: upgrade to v13.4.2
- gitlab-pages: upgrade to 1.25.0
- gitlab-workhorse: upgrade to 8.46.0
- gitlab-shell: uprade to 13.7.0
- ubuntu: upgrade to bionic-20200921
## 13.3.4
- gitlab: upgrade CE to v13.3.4
- gitaly: upgrade to v13.3.4
## 13.3.1
- gitlab: upgrade CE to v13.3.1
- gitaly: upgrade to v13.3.1
## 13.3.0
- gitlab: upgrade CE to v13.3.0
- gitaly: upgrade to v13.3.0
- gitlab-pages: upgrade to v1.22.0
- gitlab-shell: upgrade to v13.6.0
- gitlab-workhorse: upgrade to v8.39.0
## 13.2.6
- gitlab: upgrade CE to v13.2.6
## 13.2.4
- gitlab: upgrade CE to v13.2.4
- ubuntu: upgrade to bionic-20200713
## 13.2.3
- gitlab: upgrade CE to v13.2.3
- golang: upgrade to 1.14.7
- gitaly: upgrade to 13.2.3
- postgresql: add btree_gist extension
## 13.2.2
- gitlab: upgrade CE to v13.2.2
## 13.2.1
- gitlab: upgrade CE to v13.2.1
## 13.0.7
- gitlab: upgrade CE to v13.0.7
## 13.0.6
- gitlab: upgrade CE to v13.0.6
## 13.0.5
- gitlab: upgrade CE to v13.0.5
## 13.0.3
- gitlab: upgrade CE to v13.0.3
## 13.0.2
- gitlab: upgrade CE to v13.0.2
## 13.0.1
- gitlab: upgrade CE to v13.0.1
## 13.0.0
- gitlab: upgrade CE to v13.0.0
## 12.10.6
- gitlab: upgrade CE to v12.10.6
## 12.10.4
- updated to ubuntu:bionic-20200403
- gitlab-workhorse: update to 8.30.1
- sync: upstream configs
- gitlab: upgrade to 12.10.4
## 12.9.5
- gitlab: updated to 12.9.5
- gitlab-shell: updated to 12.2.0
- gitaly: updated to 12.10.0
## 12.9.4
- gitlab: upgrade CE to v12.9.4
- Update gitlab-workhorse to 8.25.2
- Update golang to 1.13.10
## 12.9.2
- gitlab: upgrade CE to v12.9.2
## 12.9.1
- gitlab: upgrade CE to v12.9.1
## 12.9.0
- gitlab: upgrade CE to v12.9.0
- replaced unicorn with puma
- Removed `UNICORN_WORKERS`
- Removed `UNICORN_TIMEOUT`
- Added `PUMA_THREADS_MIN`
- Added `PUMA_THREADS_MAX`
- Added `PUMA_WORKERS`
- Added `PUMA_TIMEOUT`
## 12.8.8
- gitlab: upgrade CE to v12.8.8
## 12.8.7
- gitlab: upgrade CE to v12.8.7
## 12.8.6
- gitlab: upgrade CE to v12.8.6
## 12.8.5
- gitlab: upgrade CE to v12.8.5
## 12.8.4
- gitlab: upgrade CE to v12.8.4
## 12.8.3
- gitlab: upgrade CE to v12.8.3
## 12.8.2
- gitlab: upgrade CE to v12.8.2
## 12.8.1
- gitlab: upgrade CE to v12.8.1
## 12.8.0
- gitlab: upgrade CE to v12.8.0
- fix: ArgumentError: 'import/{{oauth2_generic_name}}' is not supported [#2101](https://github.com/sameersbn/docker-gitlab/issues/2101)
## 12.7.8
- Upgrade GitLab CE to 12.7.8
## 12.7.7
- Upgrade GitLab CE to 12.7.7
- Add Generic OAuth Provider PR#2070
## 12.7.6
- gitlab: upgrade CE to v12.7.6
## 12.7.5
- gitlab: upgrade CE to v12.7.5
## 12.7.4
- Upgrade GitLab CE to 12.7.4
- Update golang to 1.13.7
- Update gitlab-pages to 1.15.0
- Update gitlab-workhorse to 8.20.0
- Update gitaly to 1.85.0
## 12.7.2
- Upgrade GitLab CE to 12.7.2
## 12.7.0
- Update gitlab-shell to 11.0.0
- Upgrade GitLab CE to 12.7.0
- Update golang to 1.13.6
- Update gitaly to 1.83.0
- Update gitlab-pages to 1.14.0
- Update gitlab-workhorse to 8.19.0
## 12.6.4
- gitlab: upgrade CE to v12.6.4
## 12.6.3
- gitlab: upgrade CE to v12.6.3
## 12.6.2
- gitlab: upgrade CE to v12.6.2
## 12.6.1
- gitlab: upgrade CE to v12.6.1
## 12.6.0
- gitlab: upgrade CE to v12.6.0
## 12.5.7
- gitlab: upgrade CE to v12.5.7
## 12.5.6
- gitlab: upgrade CE to v12.5.6
## 12.5.5
- gitlab: upgrade CE to v12.5.5
## 12.5.4
- gitlab: upgrade CE to v12.5.4
- Update golang to 1.12.14
## 12.5.3
- gitlab: upgrade CE to v12.5.3
## 12.5.2
- gitlab: upgrade CE to v12.5.2
## 12.5.1
- gitlab: upgrade CE to v12.5.1
## 12.5.0
- gitlab: upgrade CE to v12.5.0
## 12.4.3
- gitlab: upgrade CE to v12.4.3
## 12.4.2
- gitlab: upgrade CE to v12.4.2
## 12.4.1
- gitlab: upgrade CE to v12.4.1
## 12.4.0
- gitlab: upgrade CE to v12.4.0
## 12.3.5
- gitlab: upgrade CE to v12.3.5
## 12.3.4
- gitlab: upgrade CE to v12.3.4
## 12.3.3
- gitlab: upgrade CE to v12.3.3
## 12.3.2
- gitlab: upgrade CE to v12.3.2
## 12.3.1
- gitlab: upgrade CE to v12.3.1
## 12.3.0
- gitlab: upgrade CE to v12.3.0
## 12.2.5
- gitlab: upgrade CE to v12.2.5
## 12.2.4
- gitlab: upgrade CE to v12.2.4
## 12.2.3
- gitlab: upgrade CE to v12.2.3
## 12.2.1
- gitlab: upgrade CE to v12.2.1
## 12.2.0
- gitlab: upgrade CE to v12.2.0
- upgrade base image to ubuntu:bionic
## 12.1.6
- gitlab: upgrade CE to v12.1.6
## 12.1.4
- gitlab: upgrade CE to v12.1.4
## 12.1.3
- gitlab: upgrade CE to v12.1.3
## 12.1.2
- gitlab: upgrade CE to v12.1.2
## 12.1.1
- gitlab: upgrade CE to v12.1.1
## 12.1.0
- gitlab: upgrade CE to v12.1.0
- Removed MySQL related information and packages. GitLab v12.1.X or greater requires only PostgreSQL. Do an Migration before upgrading to v12.1.X. For more Information have a look at the [Migration Guide](https://docs.gitlab.com/ce/update/mysql_to_postgresql.html)
## 12.0.4
- gitlab: upgrade CE to v12.0.4
## 12.0.3
- gitlab: upgrade CE to v12.0.3
## 12.0.2
- gitlab: upgrade CE to v12.0.2
## 12.0.1
- gitlab: upgrade CE to v12.0.1
## 12.0.0
- gitlab: upgrade CE to v12.0.0
- Update gitaly to 1.47.0
- Update gitlab-shell to 9.3.0
- Update gitlab-pages to 1.6.1
- ruby: update to 2.6
- python: update to 3
## 11.11.3
- gitlab: upgrade CE to v11.11.3
- Update gitaly to 1.42.4
- Update golang to 1.12.6
## 11.11.2
- gitlab: upgrade CE to v11.11.2
- Update gitaly to 1.42.3
## 11.11.1
- gitlab: upgrade CE to v11.11.1
- Update gitaly to 1.42.2
## 11.11.0
- gitlab: upgrade CE to v11.11.0
- Update gitaly to 1.42.0
- Update gitlab-shell to 9.1.0
- Update gitlab-workhorse to 8.7.0
## 11.10.4
- gitlab: upgrade CE to v11.10.4
## 11.10.3
- gitlab: upgrade CE to v11.10.3
## 11.10.2
- gitlab: upgrade CE to v11.10.2
## 11.10.1
- gitlab: upgrade CE to v11.10.1
## 11.10.0
- gitlab: upgrade CE to v11.10.0
## 11.9.8
- gitlab: upgrade CE to v11.9.8
## 11.9.7
- gitlab: upgrade CE to v11.9.7
## 11.9.6
- gitlab: upgrade CE to v11.9.6
## 11.9.5
- gitlab: upgrade CE to v11.9.5
## 11.9.4
- gitlab: upgrade CE to v11.9.4
- Update gitlab-workhorse to 8.3.3
## 11.9.1
- gitlab: upgrade CE to v11.9.1
- Update gitaly to 1.27.1
## 11.9.0
- gitlab: upgrade CE to v11.9.0
## 11.8.3
- gitlab: upgrade CE to v11.8.3
## 11.8.2
- gitlab: upgrade CE to v11.8.2
## 11.8.1
- gitlab: upgrade CE to v11.8.1
## 11.8.0
- gitlab: upgrade CE to v11.8.0
- Update gitlab-workhorse to 8.3.1
- Update gitaly to 1.20.0
- Update gitlab-pages to 1.5.0
## 11.7.5
- gitlab: upgrade CE to v11.7.5
## 11.7.4
- gitlab: upgrade CE to v11.7.4
## 11.7.3
- gitlab: upgrade CE to v11.7.3
- Update gitlab-workhorse to 8.1.1
- Update gitaly to 1.13.0
- Update gitlab-pages to 1.4.0
## 11.7.0
- gitlab: upgrade CE to v11.7.0
## 11.6.5
- gitlab: upgrade CE to v11.6.5
## 11.6.4
- gitlab: upgrade CE to v11.6.4
## 11.6.3
- gitlab: upgrade CE to v11.6.3
## 11.6.2
- gitlab: upgrade CE to v11.6.2
## 11.6.1
- gitlab: upgrade CE to v11.6.1
- Added `GITLAB_IMPERSONATION_ENABLED`
- Added `OAUTH_SAML_ATTRIBUTE_STATEMENTS_USERNAME`
- Added `GITLAB_PAGES_ACCESS_CONTROL_SERVER`
- Added `GITLAB_PAGES_ACCESS_CLIENT_ID`
- Added `GITLAB_PAGES_ACCESS_CLIENT_SECRET`
- Added `GITLAB_PAGES_ACCESS_SECRET`
- Added `GITLAB_PAGES_ACCESS_REDIRECT_URI`
## 11.6.0
- gitlab: upgrade CE to v11.6.0
- Update gitaly to 1.7.1
- Update gitlab-shell to 8.4.3
- Update gitlab-workhorse to 7.6.0
- Update golang to 1.11.4
- Added `LDAP_USER_ATTRIBUTE_USERNAME`
- Added `LDAP_USER_ATTRIBUTE_MAIL`
- Added `LDAP_USER_ATTRIBUTE_NAME`
- Added `LDAP_USER_ATTRIBUTE_FIRSTNAME`
- Added `LDAP_USER_ATTRIBUTE_LASTNAME`
- Added `GITLAB_BACKUP_DIR_CHOWN`
- Added `GITLAB_BACKUP_DIR_GROUP`
- Added `GITLAB_PAGES_NGINX_PROXY`
## 11.5.5
- gitlab: upgrade CE to v11.5.5
## 11.5.4
- gitlab: upgrade CE to v11.5.4
## 11.5.3
- gitlab: upgrade CE to v11.5.3
## 11.5.2
- gitlab: upgrade CE to v11.5.2
## 11.5.1-1
- Fixed GitLab Dependencies
## 11.5.1
- gitlab: upgrade CE to v11.5.1
## 11.5.0
- gitlab: upgrade CE to v11.5.0
## 11.4.7
- gitlab: upgrade CE to v11.4.7
## 11.4.6
- gitlab: upgrade CE to v11.4.6
## 11.4.5
- gitlab: upgrade CE to v11.4.5
## 11.4.4
- gitlab: upgrade CE to v11.4.4
- golang: update to 1.10.4
## 11.4.3
- gitlab: upgrade CE to v11.4.3
## 11.4.2
- gitlab: upgrade CE to v11.4.2
## 11.4.1
- gitlab: upgrade CE to v11.4.1
- Add docs how to reuse ssh port [#1731](https://github.com/sameersbn/docker-gitlab/pull/1731)
## 11.4.0
- gitlab: upgrade CE to v11.4.0
- baseimage: upgrade to xenial-20181005
## 11.3.6
- gitlab: upgrade CE to v11.3.6
## 11.3.5
- gitlab: upgrade CE to v11.3.5
## 11.3.4
- gitlab: upgrade CE to v11.3.4
## 11.3.3
- gitlab: upgrade CE to v11.3.3
## 11.3.2
- gitlab: upgrade CE to v11.3.2
## 11.3.1
- gitlab: upgrade CE to v11.3.1
## 11.3.0
- gitlab: upgrade CE to v11.3.0
- Fix backup config stripping for when AWS & GCS backups are disabled [#1725](https://github.com/sameersbn/docker-gitlab/pull/1725)
- Correct Backup Date format for selective backups [#1699](https://github.com/sameersbn/docker-gitlab/pull/1699)
- Fix gitlay-ssh symlink to enable rebase/squash in forks
## 11.2.3
- gitlab: upgrade CE to v11.2.3
## 11.2.2
- gitlab: upgrade CE to v11.2.2
## 11.2.1
- gitlab: upgrade CE to v11.2.1
## 11.2.0
- gitlab: upgrade CE to v11.2.0
- ADD `GITLAB_DEFAULT_THEME`
## 11.1.4
- gitlab: upgrade CE to v11.1.4
## 11.1.3
- gitlab: upgrade CE to v11.1.3
- Upgrade redis to 4.0.9-1
## 11.1.2
- gitlab: upgrade CE to v11.1.2
## 11.1.1
- gitlab: upgrade CE to v11.1.1
## 11.1.0
- gitlab: upgrade CE to v11.1.0
## 11.0.4
- gitlab: upgrade CE to v11.0.4
## 11.0.3
- gitlab: upgrade CE to v11.0.3
- ruby: update to 2.4
## 11.0.2
- gitlab: upgrade CE to v11.0.2
## 11.0.1
- gitlab: upgrade CE to v11.0.1
## 11.0.0
- gitlab: upgrade CE to v11.0.0
## 10.8.4
- gitlab: upgrade CE to v10.8.4
## 10.8.3-1
- Fix boot loops that were introduced during [#1621](https://github.com/sameersbn/docker-gitlab/pull/1621) and will be fixed with [#1628](https://github.com/sameersbn/docker-gitlab/pull/1628)
## 10.8.3
- gitlab: upgrade CE to v10.8.3
- Fix potential boot problems on clean setups [#1621](https://github.com/sameersbn/docker-gitlab/pull/1621)
## 10.8.2
- gitlab: upgrade CE to v10.8.2
## 10.8.1
- gitlab: upgrade CE to v10.8.1
## 10.8.0
- gitlab: upgrade CE to v10.8.0
- Add support for swarm mode with docker-configs and docker secrets ([#1540](https://github.com/sameersbn/docker-gitlab/pull/1540))
## 10.7.4
- gitlab: upgrade CE to v10.7.4
- FIX `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
## 10.7.3
- gitlab: upgrade CE to v10.7.3
## 10.7.2
- gitlab: upgrade CE to v10.7.2
## 10.7.1
- gitlab: upgrade CE to v10.7.1
## 10.7.0
- gitlab: upgrade CE to v10.7.0
- ADD `GITLAB_SIDEKIQ_LOG_FORMAT`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_ENABLED`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_REMOTE_DIRECTORY`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_BACKGROUND_UPLOAD`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_PROXY_DOWNLOAD`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_PROVIDER`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_ACCESS_KEY_ID`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_SECRET_ACCESS_KEY`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_REGION`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_HOST`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
- ADD `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_PATH_STYLE`
- ADD `GITLAB_LFS_OBJECT_STORE_ENABLED`
- ADD `GITLAB_LFS_OBJECT_STORE_REMOTE_DIRECTORY`
- ADD `GITLAB_LFS_OBJECT_STORE_DIRECT_UPLOAD`
- ADD `GITLAB_LFS_OBJECT_STORE_BACKGROUND_UPLOAD`
- ADD `GITLAB_LFS_OBJECT_STORE_PROXY_DOWNLOAD`
- ADD `GITLAB_LFS_OBJECT_STORE_CONNECTION_PROVIDER`
- ADD `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_ACCESS_KEY_ID`
- ADD `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_SECRET_ACCESS_KEY`
- ADD `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_REGION`
- ADD `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_HOST`
- ADD `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
- ADD `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_PATH_STYLE`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_ENABLED`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_REMOTE_DIRECTORY`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_DIRECT_UPLOAD`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_BACKGROUND_UPLOAD`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_PROXY_DOWNLOAD`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_PROVIDER`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_ACCESS_KEY_ID`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_SECRET_ACCESS_KEY`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_REGION`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_HOST`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
- ADD `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_PATH_STYLE`
## 10.6.4
- gitlab: upgrade CE to v10.6.4
## 10.6.3
- gitlab: upgrade CE to v10.6.3
## 10.6.2
- gitlab: upgrade CE to v10.6.2
- golang: update to 1.9.5
## 10.6.1
- gitlab: upgrade CE to v10.6.1
## 10.6.0
- gitlab: upgrade CE to v10.6.0
## 10.5.6
- gitlab: security upgrade CE to v10.5.6
## 10.5.5
- gitlab: upgrade CE to v10.5.5
## 10.5.4
- gitlab: upgrade CE to v10.5.4
## 10.5.3
- gitlab: upgrade CE to v10.5.3
## 10.5.2
- gitlab: upgrade CE to v10.5.2
- Fix `GITLAB_UPLOADS_STORAGE_PATH`
## 10.5.1
- gitlab: upgrade CE to v10.5.1
## 10.5.0
- gitlab: upgrade CE to v10.5.0
- Add `GITLAB_UPLOADS_STORAGE_PATH`
- Add `GITLAB_UPLOADS_BASE_DIR`
- Add `LDAP_LOWERCASE_USERNAMES`
## 10.4.4
- gitlab: upgrade CE to v10.4.4
## 10.4.3
- gitlab: upgrade CE to v10.4.3
## 10.4.2-1
- FIXED SSH Host Key generation through dropping the support for rsa1
## 10.4.2
- gitlab: upgrade CE to v10.4.2
## 10.4.1
- gitlab: upgrade CE to v10.4.1
## 10.4.0
- gitlab: upgrade CE to v10.4.0
- docker: upgrade to ubuntu xenial as baseimage
- golang: update to 1.9.3
## 10.3.6
- gitlab: upgrade CE to v10.3.6
## 10.3.5
- gitlab: upgrade CE to v10.3.5
## 10.3.4
- gitlab: upgrade CE to v10.3.4
## 10.3.3
- gitlab: upgrade CE to v10.3.3
- ADDED `AWS_BACKUP_ENCRYPTION` [1449](https://github.com/sameersbn/docker-gitlab/pull/1449/)
- ADDED `AWS_BACKUP_STORAGE_CLASS` [1449](https://github.com/sameersbn/docker-gitlab/pull/1449/)
- FIXED `AWS_BACKUP_MULTIPART_CHUNK_SIZE` [1449](https://github.com/sameersbn/docker-gitlab/pull/1449/)
- Apply PaX mark to ruby [1458](https://github.com/sameersbn/docker-gitlab/pull/1458)
## 10.3.2
- gitlab: upgrade CE to v10.3.2
## 10.3.1
- gitlab: upgrade CE to v10.3.1
## 10.3.0
- gitlab: upgrade CE to v10.3.0
- REMOVED `GITLAB_REPOSITORIES_STORAGES_DEFAULT_FAILURE_COUNT_THRESHOLD`
- REMOVED `GITLAB_REPOSITORIES_STORAGES_DEFAULT_FAILURE_WAIT_TIME`
- REMOVED `GITLAB_REPOSITORIES_STORAGES_DEFAULT_FAILURE_RESET_TIME`
- REMOVED `GITLAB_REPOSITORIES_STORAGES_DEFAULT_STORAGE_TIMEOUT`
- REMOVED `GITLAB_MAX_OBJECT_SIZE`
- REMOVED `GITLAB_TIMEOUT`
## 10.2.5
- gitlab: upgrade CE to v10.2.5
## 10.2.4
- gitlab: upgrade to CE v10.2.4
## 10.2.3
- gitlab: upgrade to CE v10.2.3
## 10.2.2
- gitlab: upgrade to CE v10.2.2
## 10.2.1
- gitlab: upgrade to CE v10.2.1
## 10.2.0
- gitlab: upgrade to CE v10.2.0
## 10.1.4
- gitlab: upgrade to CE v10.1.4
## 10.1.3
- gitlab: upgrade to CE v10.1.3
## 10.1.2
- gitlab: upgrade to CE v10.1.2
## 10.1.1
- gitlab: upgrade to CE v10.1.1
## 10.1.0
- gitlab: upgrade to CE v10.1.0
- REMOVED `GITALY_ENABLED``
- ADDED `GITALY_ARTIFACTS_SERVER`
- ADDED `GITALY_CLIENT_PATH`
## 10.0.4
- gitlab: upgrade to CE v10.0.4
## 10.0.3
- gitlab: upgrade to CE v10.0.3
## 10.0.2
- gitlab: upgrade to CE v10.0.2
## 10.0.1
- gitlab: upgrade to CE v10.0.1
## 10.0.0
- gitlab: upgrade to CE v10.0.0
## 9.5.5
- gitlab: upgrade to CE v9.5.5
## 9.5.4
- gitlab: upgrade to CE v9.5.4
## 9.5.3
- gitlab: upgrade to CE v9.5.3
## 9.5.2
- gitlab: upgrade to CE v9.5.2
## 9.5.1
- gitlab: upgrade to CE v9.5.1
## 9.5.0
- gitlab: upgrade to CE v9.5.0
## 9.4.5
- gitlab: upgrade to CE v9.4.5
## 9.4.4
- gitlab: upgrade to CE v9.4.4
## 9.4.3
- gitlab: upgrade to CE v9.4.3
## 9.4.2
- gitlab: upgrade to CE v9.4.2
## 9.4.1
- gitlab: upgrade to CE v9.4.1
## 9.4.0-1
- Fix asset compiling for missing translations
## 9.4.0
- gitlab: upgrade to CE v9.4.0
- Added support for nginx_real_ip module ([#1137](https://github.com/sameersbn/docker-gitlab/pull/1137))
- Added more security for regenerating certs ([#1288](https://github.com/sameersbn/docker-gitlab/pull/1288))
## 9.3.9
- gitlab: upgrade to CE v9.3.9
## 9.3.8
- gitlab: upgrade to CE v9.3.8
- Added RE2 library to build dependencies ([issue 35342](https://gitlab.com/gitlab-org/gitlab-foss/issues/35342))
## 9.3.7
- gitlab: upgrade to CE v9.3.7
## 9.3.6
- gitlab: upgrade to CE v9.3.6
## 9.3.5
- gitlab: upgrade to CE v9.3.5
## 9.3.4
- gitlab: upgrade to CE v9.3.4
## 9.3.3
- gitlab: upgrade to CE v9.3.3
## 9.3.2
- gitlab: upgrade to CE v9.3.2
## 9.3.1
- gitlab: upgrade to CE v9.3.1
## 9.3.0-1
- Add the missing Gitaly config to let git commands over http/https working
## 9.3.0
- gitlab: upgrade to CE v9.3.0
- update baseimage to `14.04.20170608`
- Add `DB_COLLATION` (For MySQL related doesn't recognize by postgres)
- Add `GITLAB_PIPELINE_SCHEDULE_WORKER_CRON`
- Add `GITALY_ENABLED`
- Add `GITALY_SOCKET_PATH`
- Add `GITALY_ADDRESS`
## 9.2.7
- gitlab: upgrade to CE v9.2.7
## 9.2.6
- gitlab: upgrade to CE v9.2.6
## 9.2.5
- gitlab: upgrade to CE v9.2.5
## 9.2.2
- gitlab: upgrade to CE v9.2.2
## 9.2.1
- gitlab: upgrade to CE v9.2.1
## 9.2.0
- gitlab: upgrade to CE v9.2.0
- Add flexibility to use versions committed into gitlab-ce
## 9.1.4
- gitlab: upgrade to CE v9.1.4
## 9.1.3
- gitlab: upgrade to CE v9.1.3
## 9.1.2
- gitlab: upgrade to CE v9.1.2
- update baseimage to `14.04.20170503`
## 9.1.1
- gitlab: upgrade to CE v9.1.1
## 9.1.0-1
- Fix gitlab-workhorse version display
## 9.1.0
- gitlab: upgrade to CE v9.1.0
- gitlab-shell: upgrade to 5.0.2
- gitlab-workhorse: upgrade to 1.4.3
## 9.0.6
- gitlab: upgrade to CE v9.0.6
## 9.0.5
- gitlab: upgrade to CE v9.0.5
## 9.0.4
- gitlab: upgrade to CE v9.0.4
## 9.0.3
- gitlab: upgrade to CE v9.0.3
## 9.0.2
- gitlab: upgrade to CE v9.0.2
## 9.0.1
- gitlab: upgrade to CE v9.0.1
- gitlab-workhorse 1.4.2
## 9.0.0
- gitlab: upgrade to CE v9.0.0
- gitlab-shell 5.0.0
- gitlab-workhorse 1.4.1
- gitlab-pages 0.4.0
## 8.17.4
- gitlab: upgrade to CE v8.17.4
## 8.17.3
- gitlab: upgrade to CE v8.17.3
## 8.17.2
- gitlab: upgrade to CE v8.17.2
## 8.17.1
- gitlab: upgrade to CE v8.17.1
- fixes first problems with gitlab-pages
## 8.17.0
- gitlab: upgrade to CE v8.17.0
- added `GITLAB_PAGES_ENABLED`
- added `GITLAB_PAGES_DOMAIN`
- added `GITLAB_PAGES_DIR`
- added `GITLAB_PAGES_PORT`
- added `GITLAB_PAGES_HTTPS`
- added `GITLAB_PAGES_EXTERNAL_HTTP`
- added `GITLAB_PAGES_EXTERNAL_HTTPS`
- added `SSL_PAGES_KEY_PATH`
- added `SSL_PAGES_CERT_PATH`
- added nodejs 7.x as core dependencies
- added gitlab-pages daemon
## 8.16.6
- gitlab: upgrade to CE v8.16.6
- Fix logical bug of Remote Backup
## 8.16.5
- gitlab: upgrade to CE v8.16.5
## 8.16.4
- gitlab: upgrade to CE v8.16.4
## 8.16.3
- gitlab: upgrade to CE v8.16.3
## 8.16.2
- gitlab: upgrade to CE v8.16.2
## 8.16.1
- gitlab: upgrade to CE v8.16.1
## 8.16.0
- gitlab: upgrade to CE v8.16.0
## 8.15.4
- gitlab: upgrade to CE v8.15.4
## 8.15.3
- gitlab: upgrade to CE v8.15.3
## 8.15.2
- gitlab: upgrade to CE v8.15.2
## 8.15.1
- gitlab: upgrade to CE v8.15.1
## 8.15.0
- gitlab: upgrade to CE v8.15.0
- added `GITLAB_MATTERMOST_ENABLED`
- added `GITLAB_MATTERMOST_URL`
- added `OAUTH_AUTHENTIQ_CLIENT_ID`
- added `OAUTH_AUTHENTIQ_CLIENT_SECRET`
- added `OAUTH_AUTHENTIQ_SCOPE`
- added `OAUTH_AUTHENTIQ_REDIRECT_URI`
## 8.14.5
- gitlab: upgrade to CE v8.14.5
## 8.14.4
- gitlab: upgrade to CE v8.14.4
## 8.14.3
- gitlab: upgrade to CE v8.14.3
## 8.14.2
- gitlab: upgrade to CE v8.14.2
## 8.14.1
- gitlab: upgrade to CE v8.14.1
## 8.14.0
- gitlab: upgrade to CE v8.14.0
- added `IMAP_TIMEOUT`
- update golang to 1.6.3
## 8.13.6
- gitlab: upgrade to CE v8.13.6
## 8.13.5
- gitlab: upgrade to CE v8.13.5
## 8.13.4
**Important:** We skipped `8.13.4` because it doesn't contain any changes. For more information [8.13.4 release](https://about.gitlab.com/2016/11/09/gitlab-8-dot-13-dot-5-released/).
## 8.13.3
- gitlab: upgrade to CE v8.13.3
## 8.13.2
- gitlab: upgrade to CE v8.13.2
## 8.13.1
- gitlab: upgrade to CE v8.13.1
## 8.13.0
- gitlab: upgrade to CE v8.13.0
- added `GITLAB_EMAIL_SUBJECT_SUFFIX`
## 8.12.7
- gitlab: upgrade to CE v8.12.7
## 8.12.6
- gitlab: upgrade to CE v8.12.6
## 8.12.5
- gitlab: upgrade to CE v8.12.5
## 8.12.4
- gitlab: upgrade to CE v8.12.4
## 8.12.3
- gitlab: upgrade to CE v8.12.3
## 8.12.2
**Important:** We skipped `8.12.2` because it doesn't contain any changes. For more information [8.12.3 release](https://about.gitlab.com/2016/09/29/gitlab-8-12-3-released/).
## 8.12.1
- gitlab: upgrade to CE v8.12.1
## 8.12.0
- gitlab: upgrade to CE v8.12.0
## 8.11.7
- gitlab: upgrade to CE v8.11.7
## 8.11.6
- gitlab: upgrade to CE v8.11.6
## 8.11.5
- gitlab: upgrade to CE v8.11.5
## 8.11.4
- gitlab: upgrade to CE v8.11.4
## 8.11.3
- gitlab: upgrade to CE v8.11.3
## 8.11.2
- gitlab: upgrade to CE v8.11.2
## 8.11.0
- gitlab: upgrade to CE v8.11.0
- added `GITLAB_SECRETS_SECRET_KEY_BASE`
- added `GITLAB_SECRETS_OTP_KEY_BASE`
## Important
When you start to upgrade from `8.10-7` or below use the key of `/home/git/data/.secret` for `GITLAB_SECRETS_OTP_KEY_BASE` otherwise it will break your 2FA .
## 8.10.7
- gitlab: upgrade to CE v8.10.7
## 8.10.6
- gitlab: upgrade to CE v8.10.6
## 8.10.5
- gitlab: upgrade to CE v8.10.5
## 8.10.4
- gitlab: upgrade to CE v8.10.4
## 8.10.3
- gitlab: upgrade to CE v8.10.3
## 8.10.2-1
- Fix `OAUTH_GOOGLE_RESTRICT_DOMAIN`
## 8.10.2
- gitlab: upgrade to CE v8.10.2
- Improve `OAUTH_GOOGLE_RESTRICT_DOMAIN` for multiple restricted domains
## 8.10.1
- gitlab: upgrade to CE v8.10.1
## 8.10.0
- gitlab: upgrade to CE v8.10.0
## 8.9.6
- gitlab: upgrade to CE v8.9.6
## 8.9.5
- gitlab: upgrade to CE v8.9.5
## 8.9.4
- gitlab: upgrade to CE v8.9.4
## 8.9.3
- gitlab: upgrade to CE v8.9.3
## 8.9.2
- gitlab: upgrade to CE v8.9.2
## 8.9.1
- gitlab: upgrade to CE v8.9.1
## 8.9.0
- gitlab: upgrade to CE v8.9.0
## 8.8.5-1
- added GitLab Container Registry support
- added `SSL_CIPHERS` option to change ciphers of the nginx
## 8.8.5
- gitlab: upgrade to CE v8.8.5
## 8.8.4
- gitlab: upgrade to CE v8.8.4
- added `GITLAB_PROJECTS_LIMIT` configuration option
## 8.8.3
- gitlab: upgrade to CE v8.8.3
## 8.8.2
- gitlab: upgrade to CE v8.8.2
## 8.8.1
- gitlab: upgrade to CE v8.8.1
## 8.8.0
- gitlab: upgrade to CE v8.8.0
- oauth: exposed `OAUTH_GITHUB_URL` and `OAUTH_GITHUB_VERIFY_SSL` options for users for GitHub Enterprise.
## 8.7.6
- gitlab: upgrade to CE v8.7.6
## 8.7.5
- gitlab: upgrade to CE v8.7.5
## 8.7.3
- gitlab: upgrade to CE v8.7.3
## 8.7.2
- gitlab: upgrade to CE v8.7.2
## 8.7.1
- gitlab: upgrade to CE v8.7.1
## 8.7.0
- gitlab-shell: upgrade to v.2.7.2
- gitlab: upgrade to CE v8.7.0
- SSO: `OAUTH_ALLOW_SSO` now specifies a comma separated list of providers.
- OAuth: Added `OAUTH_EXTERNAL_PROVIDERS` to specify external oauth providers.
- Exposed `GITLAB_TRUSTED_PROXIES` configuration parameter
## 8.6.7
- added `GITLAB_SIGNUP_ENABLED` option to enable/disable signups
- gitlab: upgrade to CE v8.6.7
## 8.6.6
- gitlab: upgrade to CE v8.6.6
## 8.6.5
- gitlab: upgrade to CE v8.6.5
## 8.6.4
- gitlab: upgrade to CE v8.6.4
## 8.6.3
- gitlab-shell: upgrade to v.2.6.12
- gitlab: upgrade to CE v8.6.3
## 8.6.2
- gitlab: upgrade to CE v8.6.2
## 8.6.1
- gitlab: upgrade to CE v8.6.1
## 8.6.0
- gitlab-shell: upgrade to v.2.6.11
- gitlab-workhorse: upgrade to v0.7.1
- gitlab: upgrade to CE v8.6.0
- exposed configuration parameters for auth0 OAUTH support
- fixed relative_url support
## 8.5.8
- gitlab: upgrade to CE v8.5.8
## 8.5.7
- gitlab: upgrade to CE v8.5.7
## 8.5.5
- gitlab: upgrade to CE v8.5.5
## 8.5.4
- gitlab: upgrade to CE v8.5.4
## 8.5.3
- gitlab: upgrade to CE v8.5.3
## 8.5.1
- gitlab: upgrade to CE v8.5.1
## 8.5.0
- gitlab-workhorse: upgrade to v0.6.4
- gitlab: upgrade to CE v8.5.0
- firstrun: expose `GITLAB_ROOT_EMAIL` configuration option
- expose `OAUTH_AUTO_LINK_SAML_USER` configuration parameter
## 8.4.4
- gitlab: upgrade to CE v8.4.4
## 8.4.3
- gitlab: upgrade to CE v8.4.3
## 8.4.2
- gitlab-workhorse: upgrade to v0.6.2
- gitlab: upgrade to CE v8.4.2
## 8.4.1
- gitlab: upgrade to CE v8.4.1
## 8.4.0-1
- `assets:precompile` moved back to build time
## 8.4.0
- gitlab-shell: upgrade to v.2.6.10
- gitlab-workhorse: upgrade to v0.6.1
- gitlab: upgrade to CE v8.4.0
- oauth: expose cas3 oauth configuration options
- oauth: expose azure oauth configuration options
- `assets:precompile` executed at runtime
## 8.3.4
- gitlab-workhorse: upgrade to v0.5.4
- gitlab: upgrade to CE v8.3.4
- expose `LDAP_TIMEOUT` configuration parameter
## 8.3.2
- gitlab: upgrade to CE v8.3.2
## 8.3.1
- gitlab: upgrade to CE v8.3.1
## 8.3.0-1
- fixed static asset routing when `GITLAB_RELATIVE_URL_ROOT` is used.
## 8.3.0
- `envsubst` is now used for updating the configurations
- renamed config `CA_CERTIFICATES_PATH` to `SSL_CA_CERTIFICATES_PATH`
- renamed config `GITLAB_HTTPS_HSTS_ENABLED` to `NGINX_HSTS_ENABLED`
- renamed config `GITLAB_HTTPS_HSTS_MAXAGE` to `NGINX_HSTS_MAXAGE`
- renamed config `GITLAB_BACKUPS` to `GITLAB_BACKUP_SCHEDULE`
- gitlab-workhorse: upgrade to v0.5.1
- gitlab: upgrade to CE v8.3.0
- expose `GITLAB_MAX_OBJECT_SIZE` configuration parameter
- removed `NGINX_MAX_UPLOAD_SIZE` configuration parameter
- gitlab-shell: upgrade to v.2.6.9
## 8.2.3
- fixed static asset routing when `GITLAB_RELATIVE_URL_ROOT` is used.
- added `GITLAB_BACKUP_PG_SCHEMA` configuration parameter
- gitlab: upgrade to CE v8.2.3
## 8.2.2
- added `GITLAB_DOWNLOADS_DIR` configuration parameter
- `DB_TYPE` parameter renamed to `DB_ADAPTER` with `mysql2` and `postgresql` as accepted values
- exposed `DB_ENCODING` parameter
- gitlab: upgrade to CE v8.2.2
## 8.2.1-1
- fixed typo while setting the value of `GITLAB_ARTIFACTS_DIR`
## 8.2.1
- expose rack_attack configuration options
- gitlab-shell: upgrade to v.2.6.8
- gitlab: upgrade to CE v8.2.1
- added `GITLAB_ARTIFACTS_ENABLED` configuration parameter
- added `GITLAB_ARTIFACTS_DIR` configuration parameter
## 8.2.0
- gitlab-shell: upgrade to v.2.6.7
- gitlab-workhorse: upgrade to v.0.4.2
- gitlab: upgrade to CE v8.2.0
- added `GITLAB_SHARED_DIR` configuration parameter
- added `GITLAB_LFS_OBJECTS_DIR` configuration parameter
- added `GITLAB_PROJECTS_BUILDS` configuration parameter
- added `GITLAB_LFS_ENABLED` configuration parameter
## 8.1.4
- gitlab: upgrade to CE v8.1.4
## 8.1.3
- proper long-term fix for http/https cloning when `GITLAB_RELATIVE_URL_ROOT` is used
- gitlab: upgrade to CE v8.1.3
- Expose Facebook OAUTH configuration parameters
## 8.1.2
- gitlab: upgrade to CE v8.1.2
- removed `GITLAB_SATELLITES_TIMEOUT` configuration parameter
## 8.1.0-2
- Recompile assets when `GITLAB_RELATIVE_URL_ROOT` is used Fixes #481
## 8.1.0-1
- temporary fix for http/https cloning when `GITLAB_RELATIVE_URL_ROOT` is used
## 8.1.0
- gitlab: upgrade to CE v8.1.0
- gitlab-git-http-server: upgrade to v0.3.0
## 8.0.5-1
- speed up container startup by compiling assets at image build time
- test connection to redis-server
## 8.0.5
- gitlab: upgrade to CE v.8.0.5
## 8.0.4-2
- fix http/https cloning when `GITLAB_RELATIVE_URL_ROOT` is used
- allow user to override `OAUTH_ENABLED` setting
## 8.0.4-1
- update baseimage to `sameersbn/ubuntu:14.04.20151011`
## 8.0.4
- gitlab: upgrade to CE v.8.0.4
## 8.0.3
- gitlab: upgrade to CE v.8.0.3
## 8.0.2
- gitlab: upgrade to CE v.8.0.2
- added `IMAP_STARTTLS` parameter, defaults to `false`
- expose oauth parameters for crowd server
## 8.0.0
- set default value of `DB_TYPE` to `postgres`
- added sample Kubernetes rc and service description files
- expose `GITLAB_BACKUP_ARCHIVE_PERMISSIONS` parameter
- gitlab: upgrade to CE v.8.0.0
- added `GITLAB_SECRETS_DB_KEY_BASE` parameter
- added `GITLAB_NOTIFY_ON_BROKEN_BUILDS` and `GITLAB_NOTIFY_PUSHER` parameters
- added options to email IMAP and reply by email feature
- set value of `GITLAB_EMAIL` to `SMTP_USER` if defined, else default to `example@example.com`
- removed `GITLAB_ROBOTS_OVERRIDE` parameter. Override default `robots.txt` if `GITLAB_ROBOTS_PATH` exists.
- added CI redirection using `GITLAB_CI_HOST` parameter
## 7.14.3
- gitlab: upgrade to CE v.7.14.3
## 7.14.2
- Apply grsecurity policies to nodejs binary #394
- Fix broken emojis post migration #196
- gitlab-shell: upgrade to v.2.6.5
- gitlab: upgrade to CE v.7.14.2
## 7.14.1
- gitlab: upgrade to CE v.7.14.1
## 7.14.0
- gitlab-shell: upgrade to v.2.6.4
- gitlab: upgrade to CE v.7.14.0
## 7.13.5
- gitlab: upgrade to CE v.7.13.5
## 7.13.4
- gitlab: upgrade to CE v.7.13.4
## 7.13.3
- gitlab: upgrade to CE v.7.13.3
## 7.13.2
- gitlab: upgrade to CE v.7.13.2
## 7.13.1
- gitlab: upgrade to CE v.7.13.1
## 7.13.0
- expose SAML OAuth provider configuration
- expose `OAUTH_AUTO_SIGN_IN_WITH_PROVIDER` configuration
- gitlab: upgrade to CE v.7.13.0
## 7.12.2-2
- enable persistence `.secret` file used in 2FA
## 7.12.2-1
- fixed gitlab:backup:restore raketask
## 7.12.2
- gitlab: upgrade to CE v.7.12.2
## 7.12.1
- gitlab: upgrade to CE v.7.12.1
## 7.12.0
- added `SMTP_TLS` configuration parameter
- gitlab: upgrade to CE v.7.12.0
- added `OAUTH_AUTO_LINK_LDAP_USER` configuration parameter
## 7.11.4-1
- base image update to fix SSL vulnerability
## 7.11.4
- gitlab: upgrade to CE v.7.11.4
## 7.11.3
- gitlab: upgrade to CE v.7.11.3
## 7.11.2
- gitlab: upgrade to CE v.7.11.2
## 7.11.0
- init: added `SIDEKIQ_MEMORY_KILLER_MAX_RSS` configuration option
- init: added `SIDEKIQ_SHUTDOWN_TIMEOUT` configuration option
- gitlab-shell: upgrade to v.2.6.3
- gitlab: upgrade to CE v.7.11.0
- init: removed `GITLAB_PROJECTS_VISIBILITY` ENV parameter
## 7.10.4
- gitlab: upgrade to CE v.7.10.4
## 7.10.3
- gitlab: upgrade to CE v.7.10.3
## 7.10.2
- init: added support for remote AWS backups
- gitlab: upgrade to CE v.7.10.2
## 7.10.1
- gitlab: upgrade to CE v.7.10.1
## 7.10.0
- gitlab-shell: upgrade to v.2.6.2
- gitlab: upgrade to CE v.7.10.0
- init: removed ENV variables to configure *External Issue Tracker* integration
- init: added `GITLAB_EMAIL_REPLY_TO` configuration option
- init: added `LDAP_BLOCK_AUTO_CREATED_USERS` configuration option
## 7.9.4
- gitlab: upgrade to CE v.7.9.4
## 7.9.3
- added `NGINX_PROXY_BUFFERING` option
- added `NGINX_ACCEL_BUFFERING` option
- added `GITLAB_GRAVATAR_ENABLED` option
- added `GITLAB_GRAVATAR_HTTP_URL` option
- added `GITLAB_GRAVATAR_HTTPS_URL` option
- fixes: "transfer closed with xxx bytes remaining to read" error
- gitlab: upgrade to CE v.7.9.3
## 7.9.2
- gitlab: upgrade to CE v.7.9.2
## 7.9.1
- init: set default value of `SMTP_OPENSSL_VERIFY_MODE` to `none`
- gitlab: upgrade to CE v.7.9.1
## 7.9.0
- gitlab-shell: upgrade to v.2.6.0
- gitlab: upgrade to CE v.7.9.0
- init: set default value of `UNICORN_WORKERS` to `3`
- init: set default value of `SMTP_OPENSSL_VERIFY_MODE` to `peer`
- init: removed `GITLAB_RESTRICTED_VISIBILITY` configuration option, can be set from the UI
- init: added BitBucket OAuth configuration support
- init: added `GITLAB_EMAIL_DISPLAY_NAME` configuration option
## 7.8.4
- gitlab: upgrade to CE v.7.8.4
## 7.8.2
- gitlab: upgrade to CE v.7.8.2
## 7.8.1
- gitlab-shell: upgrade to v.2.5.4
- gitlab: upgrade to CE v.7.8.1
## 7.8.0
- update postgresql client to the latest version, Closes #249
- removed `GITLAB_SIGNUP` configuration option, can be set from gitlab ui
- removed `GITLAB_SIGNIN` configuration option, can be set from gitlab ui
- removed `GITLAB_PROJECTS_LIMIT` configuration option, can be set from gitlab ui
- removed `GITLAB_GRAVATAR_ENABLED` configuration option, can be set from gitlab ui
- gitlab-shell: upgrade to v.2.5.3
- gitlab: upgrade to CE v.7.8.0
- init: set `LDAP_PORT` default value to `389`
- init: set `LDAP_METHOD` default value to `plain`
- init: added gitlab oauth configuration support
## 7.7.2
- gitlab-shell: upgrade to v.2.4.2
- gitlab: upgrade to CE v.7.7.2
## 7.7.1
- gitlab: upgrade to CE v.7.7.1
## 7.7.0
- init: added GOOGLE_ANALYTICS_ID configuration option
- added support for mantis issue tracker
- fixed log rotation configuration
- gitlab-shell: upgrade to v.2.4.1
- gitlab: upgrade to CE v.7.7.0
## 7.6.2
- gitlab: upgrade to CE v.7.6.2
## 7.6.1
- disable nginx ipv6 if host does not support it.
- init: added GITLAB_BACKUP_TIME configuration option
- gitlab: upgrade to CE v.7.6.1
## 7.6.0
- add support for configuring piwik
- gitlab-shell: upgrade to v.2.4.0
- gitlab: upgrade to CE v.7.6.0
## 7.5.3
- accept `BACKUP` parameter while running the restore rake task, closes #220
- init: do not run `gitlab:satellites:create` rake task at startup
- gitlab: upgrade to CE v.7.5.3
## 7.5.2
- gitlab: upgrade to CE v.7.5.2
## 7.5.1
- gitlab: upgrade to CE v.7.5.1
- gitlab-shell to v2.2.0
- added `GITLAB_TIMEZONE` configuration option
- added `GITLAB_EMAIL_ENABLED` configuration option
## 7.4.4
- gitlab: upgrade to CE v.7.4.4
- added `SSL_VERIFY_CLIENT` configuration option
- added `NGINX_WORKERS` configuration option
- added `USERMAP_UID` and `USERMAP_GID` configuration option
## 7.4.3
- gitlab: upgrade to CE v.7.4.3
## 7.4.2
- gitlab: upgrade to CE v.7.4.2
## 7.4.0
- gitlab: upgrade to CE v.7.4.0
- config: added `LDAP_ACTIVE_DIRECTORY` configuration option
- added SMTP_OPENSSL_VERIFY_MODE configuration option
- feature: gitlab logs volume
- automatically compile assets if relative_url is changed
- launch all daemons via supervisord
## 7.3.2-1
- fix mysql status check
## 7.3.2
- upgrade to gitlab-ce 7.3.2
- removed internal mysql server
- added support for fetching `DB_NAME`, `DB_USER` and `DB_PASS` from the postgresql linkage
- added support for fetching `DB_NAME`, `DB_USER` and `DB_PASS` from the mysql linkage
- gitlab-shell: upgrade to v.2.0.1
- added GITLAB_GRAVATAR_ENABLED configuration option
- added fig.yml
## 7.3.1-3
- fix mysql command again!
## 7.3.1-2
- fix mysql server status check
## 7.3.1-1
- plug bash vulnerability by switching to dash shell
- automatically run the `gitlab:setup` rake task for new installs
## 7.3.1
- upgrade to gitlab-ce 7.3.1
## 7.3.0
- upgrade to gitlab-ce 7.3.0
- added GITLAB_WEBHOOK_TIMEOUT configuration option
- upgrade to gitlab-shell 2.0.0
- removed internal redis server
- shutdown the container gracefully
## 7.2.2
- upgrade to gitlab-ce 7.2.2
- added GITLAB_HTTPS_HSTS_ENABLED configuration option (advanced config)
- added GITLAB_HTTPS_HSTS_MAXAGE configuration option (advanced config)
- upgrade to gitlab-shell 1.9.8
- purge development packages after install. shaves off ~300MB from the image.
- rebase image on sameersbn/debian:jessie.20140918 base image
- added GITLAB_SSH_HOST configuration option
- added GITLAB_USERNAME_CHANGE configuration option
## 7.2.1-1
- removed the GITLAB_HTTPS_ONLY configuration option
- added NGINX_X_FORWARDED_PROTO configuration option
- optimization: talk directly to the unicorn worker from gitlab-shell
## 7.2.1
- upgrade to gitlab-ce 7.2.1
- added new SMTP_ENABLED configuration option.
## 7.2.0-1
- fix nginx static route handling when GITLAB_RELATIVE_URL_ROOT is used.
- fix relative root access without the trailing '/' character
- added separate server block for http config in gitlab.https.permissive. Fixes #127
- added OAUTH_GOOGLE_RESTRICT_DOMAIN config option.
## 7.2.0
- upgrade to gitlab-ce 7.2.0
- update to the sameersbn/ubuntu:14.04.20140818 baseimage
- remove /var/lib/apt/lists to optimize image size.
- disable UsePrivilegeSeparation in sshd configuration, fixes #122
- added OAUTH_BLOCK_AUTO_CREATED_USERS configuration option
- added OAUTH_ALLOW_SSO configuration option
- added github oauth configuration support
- added twitter oauth configuration support
- added google oauth configuration support
- added support for jira issue tracker
- added support for redmine issue tracker
- update to gitlab-shell 1.9.7
- update to the sameersbn/ubuntu:14.04.20140812 baseimage
## 7.1.1
- removed "add_header X-Frame-Options DENY" setting from the nginx config. fixes #110
- upgrade to gitlab-ce 7.1.1
- run /etc/init.d/gitlab as git user, plays nicely with selinux
## 7.1.0
- removed GITLAB_SUPPORT configuration option
- upgrade to gitlab-ce 7.1.0
- clone gitlab-ce and gitlab-shell sources from the git repo.
- disable pam authentication module in sshd
- update to the sameersbn/ubuntu:14.04.20140628 baseimage
- no more root access over ssh, use nsenter instead
- upgrade to nginx-1.6.x series from the nginx/stable ppa
## 7.0.0
- upgrade to gitlab-7.0.0
- fix repository and gitlab-satellites directory permissions.
- added GITLAB_RESTRICTED_VISIBILITY configuration option
- fix backup restore operation
- upgrade to gitlab-shell 1.9.6
- added app:sanitize command
- automatically migrate database when gitlab version is updated
- upgrade to gitlab-shell 1.9.5
## 6.9.2
- upgrade to gitlab-ce 6.9.2
## 6.9.1
- upgrade to gitlab-ce 6.9.1
## 6.9.0
- upgrade to gitlab-ce 6.9.0
- added GITLAB_RELATIVE_URL_ROOT configuration option
- added NGINX_MAX_UPLOAD_SIZE configuration to specify the maximum acceptable size of attachments.
## 6.8.2
- upgrade to gitlab-ce 6.8.2
- renamed configuration option GITLAB_SHELL_SSH_PORT to GITLAB_SSH_PORT
- added GITLAB_PROJECTS_VISIBILITY configuration option to specify the default project visibility level.
- generate and store ssh host keys at the data store.
- default GITLAB_PROJECTS_LIMIT is now set to 100
- use sameersbn/ubuntu:14.04.20140508 base image, the trusted build of sameersbn/ubuntu:14.04.20140505 seems to be broken
- use sameersbn/ubuntu:14.04.20140505 base image
- added CA_CERTIFICATES_PATH configuration option to specify trusted root certificates.
- added SSL support
- added SSL_DHPARAM_PATH configuration option to specify path of dhparam.pem file.
- added SSL_KEY_PATH configuration option to specify path of ssl key.
- added SSL_CERTIFICATE_PATH configuration option to specify path of ssl certificate
- added GITLAB_HTTPS_ONLY configuration option to configure strict https only access
- added SSL_SELF_SIGNED configuration option to specify use of self signed ssl certificates.
- fix git over ssh when the default http/https ports are not used.
- compile the assets only if it does not exist or if the gitlab version has changed.
- upgrade gitlab-shell to version 1.9.4
- cache compiled assets to boost application startup.
- fix symlink to uploads directory
## 6.8.1
- upgrade to gitlab-ce 6.8.1
## 6.8.0
- upgrade to gitlab-shell 1.9.3
- added GITLAB_SIGNIN setting to enable or disable standard login form
- upgraded to gitlab-ce version 6.8.0
- added support for linking with redis container.
- use sameersbn/ubuntu as the base docker image
- install postgresql-client to fix restoring backups when used with a postgresql database backend.
## 6.7.5
- upgrade gitlab to 6.7.5
- support linking to mysql and postgresql containers
- added DEFAULT_PROJECTS_LIMIT configuration option
## 6.7.4
- upgrade gitlab to 6.7.4
- added SMTP_AUTHENTICATION configuration option, defaults to :login.
- added LDAP configuration options.
## 6.7.3
- upgrade gitlab to 6.7.3
- install ruby2.0 from ppa
## 6.7.2
- upgrade gitlab to 6.7.2
- upgrade gitlab-shell to 1.9.1
- reorganize repo
- do not perform system upgrades (<http://crosbymichael.com/dockerfile-best-practices-take-2.html>)
## 6.6.5
- upgraded to gitlab-6.6.5
## v6.6.4
- upgraded to gitlab-6.6.4
- added changelog
- removed postfix mail delivery
- added SMTP_DOMAIN configuration option
- added SMTP_STARTTLS configuration option
- added SMTP_DOMAIN configuration option
- added DB_PORT configuration option
- changed backup time to 4am (UTC)
## v6.6.2
- upgraded to gitlab-6.6.2
- added automated daily/monthly backups feature
- documented ssh login details for maintenance tasks.
- perform upgrade of git, nginx and other system packages
- added GITLAB_SHELL_SSH_PORT configuration option
- added app:rake command for executing gitlab rake tasks
- documented hardware requirements
## v6.6.1
- upgraded to gitlabhq-6.6.1
- reformatted README
================================================
FILE: Dockerfile
================================================
FROM ubuntu:noble-20260210.1
ARG VERSION=18.9.2
ENV GITLAB_VERSION=${VERSION} \
RUBY_VERSION=3.3.10 \
RUBY_SOURCE_SHA256SUM="b555baa467a306cfc8e6c6ed24d0d27b27e9a1bed1d91d95509859eac6b0e928" \
RUBYGEMS_VERSION=4.0.8 \
GOLANG_VERSION=1.25.8 \
GITLAB_SHELL_VERSION=14.45.6 \
GITLAB_PAGES_VERSION=18.9.2 \
GITALY_SERVER_VERSION=18.9.2 \
GITLAB_USER="git" \
GITLAB_HOME="/home/git" \
GITLAB_LOG_DIR="/var/log/gitlab" \
GITLAB_CACHE_DIR="/etc/docker-gitlab" \
RAILS_ENV=production \
NODE_ENV=production \
NO_SOURCEMAPS=true
ENV GITLAB_INSTALL_DIR="${GITLAB_HOME}/gitlab" \
GITLAB_SHELL_INSTALL_DIR="${GITLAB_HOME}/gitlab-shell" \
GITLAB_GITALY_INSTALL_DIR="${GITLAB_HOME}/gitaly" \
GITLAB_DATA_DIR="${GITLAB_HOME}/data" \
GITLAB_BUILD_DIR="${GITLAB_CACHE_DIR}/build" \
GITLAB_RUNTIME_DIR="${GITLAB_CACHE_DIR}/runtime"
RUN apt-get update \
&& DEBIAN_FRONTEND=noninteractive apt-get install --no-install-recommends -y \
wget ca-certificates apt-transport-https gnupg2 \
&& apt-get upgrade -y \
&& rm -rf /var/lib/apt/lists/*
RUN set -ex && \
mkdir -p /etc/apt/keyrings \
&& wget --quiet -O - https://keyserver.ubuntu.com/pks/lookup?op=get\&search=0xe1dd270288b4e6030699e45fa1715d88e1df1f24 | gpg --dearmor -o /etc/apt/keyrings/git-core.gpg \
&& echo "deb [signed-by=/etc/apt/keyrings/git-core.gpg] http://ppa.launchpad.net/git-core/ppa/ubuntu noble main" >> /etc/apt/sources.list \
&& wget --quiet -O - https://www.postgresql.org/media/keys/ACCC4CF8.asc | gpg --dearmor -o /etc/apt/keyrings/postgres.gpg \
&& echo 'deb [signed-by=/etc/apt/keyrings/postgres.gpg] http://apt.postgresql.org/pub/repos/apt/ noble-pgdg main' > /etc/apt/sources.list.d/pgdg.list \
&& wget --quiet -O - https://deb.nodesource.com/gpgkey/nodesource-repo.gpg.key | gpg --dearmor -o /etc/apt/keyrings/nodesource.gpg \
&& echo 'deb [signed-by=/etc/apt/keyrings/nodesource.gpg] https://deb.nodesource.com/node_20.x nodistro main' > /etc/apt/sources.list.d/nodesource.list \
&& wget --quiet -O - https://dl.yarnpkg.com/debian/pubkey.gpg | gpg --dearmor -o /etc/apt/keyrings/yarn.gpg \
&& echo 'deb [signed-by=/etc/apt/keyrings/yarn.gpg] https://dl.yarnpkg.com/debian/ stable main' > /etc/apt/sources.list.d/yarn.list \
&& wget --quiet -O - https://nginx.org/keys/nginx_signing.key | gpg --dearmor -o /etc/apt/keyrings/nginx-archive-keyring.gpg \
&& echo "deb [signed-by=/etc/apt/keyrings/nginx-archive-keyring.gpg] http://nginx.org/packages/ubuntu noble nginx" >> /etc/apt/sources.list.d/nginx.list \
&& printf "Package: *\nPin: origin nginx.org\nPin: release o=nginx\nPin-Priority: 900\n" >> /etc/apt/preferences.d/99nginx \
&& set -ex \
&& apt-get update \
&& DEBIAN_FRONTEND=noninteractive apt-get install --no-install-recommends -y \
sudo supervisor logrotate locales curl \
meson \
nginx openssh-server redis-tools \
postgresql-client-13 postgresql-client-14 postgresql-client-15 postgresql-client-16 postgresql-client-17 \
python3 python3-docutils nodejs yarn gettext-base graphicsmagick \
libpq5 zlib1g libyaml-dev libssl-dev libgdbm-dev libre2-dev \
libreadline-dev libncurses5-dev libffi-dev curl openssh-server libxml2-dev libxslt-dev \
libcurl4-openssl-dev libicu-dev libkrb5-dev rsync python3-docutils pkg-config cmake \
tzdata unzip libimage-exiftool-perl libmagic1 \
&& update-locale LANG=C.UTF-8 LC_MESSAGES=POSIX \
&& locale-gen en_US.UTF-8 \
&& DEBIAN_FRONTEND=noninteractive dpkg-reconfigure locales \
&& rm -rf /var/lib/apt/lists/* /etc/nginx/conf.d/default.conf
COPY assets/build/ ${GITLAB_BUILD_DIR}/
RUN bash ${GITLAB_BUILD_DIR}/install.sh
COPY assets/runtime/ ${GITLAB_RUNTIME_DIR}/
COPY entrypoint.sh /sbin/entrypoint.sh
RUN chmod 755 /sbin/entrypoint.sh
ENV prometheus_multiproc_dir="/dev/shm"
ARG BUILD_DATE
ARG VCS_REF
LABEL \
maintainer="sameer@damagehead.com" \
org.label-schema.schema-version="1.0" \
org.label-schema.build-date=${BUILD_DATE} \
org.label-schema.name=gitlab \
org.label-schema.vendor=damagehead \
org.label-schema.url="https://github.com/sameersbn/docker-gitlab" \
org.label-schema.vcs-url="https://github.com/sameersbn/docker-gitlab.git" \
org.label-schema.vcs-ref=${VCS_REF} \
com.damagehead.gitlab.license=MIT
EXPOSE 22/tcp 80/tcp 443/tcp
VOLUME ["${GITLAB_DATA_DIR}", "${GITLAB_LOG_DIR}"]
WORKDIR ${GITLAB_INSTALL_DIR}
ENTRYPOINT ["/sbin/entrypoint.sh"]
CMD ["app:start"]
================================================
FILE: LICENSE
================================================
The MIT License (MIT)
Copyright (c) 2014 Sameer Naik
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.
================================================
FILE: Makefile
================================================
all: build
help:
@echo ""
@echo "-- Help Menu"
@echo ""
@echo " 1. make build - build the gitlab image"
@echo " 2. make quickstart - start gitlab"
@echo " 3. make stop - stop gitlab"
@echo " 4. make logs - view logs"
@echo " 5. make purge - stop and remove the container"
build:
@docker build --tag=sameersbn/gitlab . \
--build-arg BUILD_DATE="$(shell date +"%Y-%m-%d %H:%M:%S%:z")" \
--build-arg VCS_REF=$(shell git rev-parse --short HEAD)
release: build
@docker build --tag=sameersbn/gitlab:$(shell cat VERSION) . \
--build-arg BUILD_DATE="$(shell date +"%Y-%m-%d %H:%M:%S%:z")" \
--build-arg VCS_REF=$(git describe --tags --always)
quickstart:
@echo "Starting postgresql container..."
@docker run --name=gitlab-postgresql -d \
--env='DB_NAME=gitlabhq_production' \
--env='DB_USER=gitlab' --env='DB_PASS=password' \
sameersbn/postgresql:latest
@echo "Starting redis container..."
@docker run --name=gitlab-redis -d \
sameersbn/redis:latest
@echo "Starting gitlab container..."
@docker run --name='gitlab-demo' -d \
--link=gitlab-postgresql:postgresql --link=gitlab-redis:redisio \
--publish=10022:22 --publish=10080:80 \
--env='GITLAB_PORT=10080' --env='GITLAB_SSH_PORT=10022' \
sameersbn/gitlab:latest
@echo "Please be patient. This could take a while..."
@echo "GitLab will be available at http://localhost:10080"
@echo "Type 'make logs' for the logs"
stop:
@echo "Stopping gitlab..."
@docker stop gitlab-demo >/dev/null
@echo "Stopping redis..."
@docker stop gitlab-redis >/dev/null
@echo "Stopping postgresql..."
@docker stop gitlab-postgresql >/dev/null
purge: stop
@echo "Removing stopped containers..."
@docker rm -v gitlab-demo >/dev/null
@docker rm -v gitlab-redis >/dev/null
@docker rm -v gitlab-postgresql >/dev/null
logs:
@docker logs -f gitlab-demo
================================================
FILE: README.md
================================================
# sameersbn/gitlab:18.9.2
[](https://circleci.com/gh/sameersbn/docker-gitlab/tree/master)
- [Introduction](#introduction)
- [Changelog](Changelog.md)
- [Contributing](#contributing)
- [Team](#team)
- [Issues](#issues)
- [Announcements](https://github.com/sameersbn/docker-gitlab/issues/39)
- [Prerequisites](#prerequisites)
- [Installation](#installation)
- [Quick Start](#quick-start)
- [Configuration](#configuration)
- [Data Store](#data-store)
- [Database](#database)
- [PostgreSQL (Recommended)](#postgresql)
- [External PostgreSQL Server](#external-postgresql-server)
- [Linking to PostgreSQL Container](#linking-to-postgresql-container)
- [Upgrading PostgreSQL](#upgrading-postgresql)
- [Redis](#redis)
- [Internal Redis Server](#internal-redis-server)
- [External Redis Server](#external-redis-server)
- [Linking to Redis Container](#linking-to-redis-container)
- [Mail](#mail)
- [Reply by email](#reply-by-email)
- [SSL](#ssl)
- [Generation of a Self Signed Certificate](#generation-of-a-self-signed-certificate)
- [Strengthening the server security](#strengthening-the-server-security)
- [Installation of the SSL Certificates](#installation-of-the-ssl-certificates)
- [Enabling HTTPS support](#enabling-https-support)
- [Configuring HSTS](#configuring-hsts)
- [Using HTTPS with a load balancer](#using-https-with-a-load-balancer)
- [Establishing trust with your server](#establishing-trust-with-your-server)
- [Installing Trusted SSL Server Certificates](#installing-trusted-ssl-server-certificates)
- [Deploy to a subdirectory (relative url root)](#deploy-to-a-subdirectory-relative-url-root)
- [OmniAuth Integration](#omniauth-integration)
- [CAS3](#cas3)
- [Authentiq](#authentiq)
- [Google](#google)
- [Twitter](#twitter)
- [GitHub](#github)
- [GitLab](#gitlab)
- [BitBucket](#bitbucket)
- [SAML](#saml)
- [Crowd](#crowd)
- [Microsoft Azure](#microsoft-azure)
- [Generic OAuth2](#generic-oauth2)
- [OpenID Connect](#openid-connect)
- [JWT](#jwt)
- [Gitlab Pages](#gitlab-pages)
- [External Issue Trackers](#external-issue-trackers)
- [Host UID / GID Mapping](#host-uid--gid-mapping)
- [Piwik](#piwik)
- [Feature flags](#feature-flags)
- [Exposing ssh port in dockerized gitlab-ce](docs/exposing-ssh-port.md)
- [Available Configuration Parameters](#available-configuration-parameters)
- [Maintenance](#maintenance)
- [Creating Backups](#creating-backups)
- [Restoring Backups](#restoring-backups)
- [Automated Backups](#automated-backups)
- [Amazon Web Services (AWS) Remote Backups](#amazon-web-services-aws-remote-backups)
- [Google Cloud Storage (GCS) Remote Backups](#google-cloud-storage-gcs-remote-backups)
- [Rake Tasks](#rake-tasks)
- [Import Repositories](#import-repositories)
- [Upgrading](#upgrading)
- [Shell Access](#shell-access)
- [Monitoring](#monitoring)
- [Health Check](#health-check)
- [Container Registry](docs/container_registry.md)
- [Deploy in Docker Swarm mode, with HTTPS handled by Traefik proxy and Docker Registry](docs/docker-swarm-traefik-registry.md)
- [References](#references)
## Introduction
Dockerfile to build a [GitLab](https://about.gitlab.com/) image for the [Docker](https://www.docker.com/products/docker-engine) open source container platform.
GitLab CE is set up in the Docker image using the [install from source](https://docs.gitlab.com/ce/install/installation.html) method as documented in the official GitLab documentation.
For other methods to install GitLab please refer to the [Official GitLab Installation Guide](https://about.gitlab.com/install/) which includes a [GitLab image for Docker](https://docs.gitlab.com/omnibus/docker/).
## Contributing
If you find this image useful here's how you can help:
- Send a Pull Request with your awesome new features and bug fixes
- Be a part of the community and help resolve [Issues](https://github.com/sameersbn/docker-gitlab/issues)
- Support the development of this image with a [donation](http://www.damagehead.com/donate/)
## Team
- Niclas Mietz ([solidnerd](https://github.com/solidnerd))
- Sameer Naik ([sameersbn](https://github.com/sameersbn))
See [Contributors](../../graphs/contributors) for the complete list developers that have contributed to this project.
## Issues
Docker is actively being developed and tested by a thriving community of developers and testers and every release of Docker features many enhancements and bugfixes.
Given the nature of the development and release cycle it is very important that you have the latest version of Docker installed because any issue that you encounter might have already been fixed with a newer Docker release.
Install the most recent version of the Docker Engine for your platform using the [official Docker releases](http://docs.docker.com/engine/installation/), which can also be installed using:
```bash
wget -qO- https://get.docker.com/ | sh
```
Fedora and RHEL/CentOS users should try disabling selinux with `setenforce 0` and check if resolves the issue. If it does than there is not much that I can help you with. You can either stick with selinux disabled (not recommended by redhat) or switch to using ubuntu.
You may also set `DEBUG=true` to enable debugging of the entrypoint script, which could help you pinpoint any configuration issues.
If using the latest docker version and/or disabling selinux does not fix the issue then please file an issue request on the [issues](https://github.com/sameersbn/docker-gitlab/issues) page.
In your issue report please make sure you provide the following information:
- The host distribution and release version.
- Output of the `docker version` command
- Output of the `docker info` command
- The `docker run` command you used to run the image (mask out the sensitive bits).
## Prerequisites
Your docker host needs to have 1GB or more of available RAM to run GitLab. Please refer to the GitLab [hardware requirements](https://github.com/gitlabhq/gitlabhq/blob/master/doc/install/requirements.md#hardware-requirements) documentation for additional information.
## Installation
Automated builds of the image are available on [Dockerhub](https://hub.docker.com/r/sameersbn/gitlab) and is the recommended method of installation.
```bash
docker pull sameersbn/gitlab:18.9.2
```
You can also pull the `latest` tag which is built from the repository *HEAD*
```bash
docker pull sameersbn/gitlab:latest
```
Alternatively you can build the image locally.
```bash
docker build -t sameersbn/gitlab github.com/sameersbn/docker-gitlab
```
## Quick Start
The quickest way to get started is using [docker-compose](https://docs.docker.com/compose/).
```bash
wget https://raw.githubusercontent.com/sameersbn/docker-gitlab/master/docker-compose.yml
```
Generate random strings that are at least `64` characters long for each of `GITLAB_SECRETS_OTP_KEY_BASE`, `GITLAB_SECRETS_DB_KEY_BASE`, `GITLAB_SECRETS_SECRET_KEY_BASE`, `GITLAB_SECRETS_ENCRYPTED_SETTINGS_KEY_BASE`. These values are used for the following:
- `GITLAB_SECRETS_OTP_KEY_BASE` is used to encrypt 2FA secrets in the database. If you lose or rotate this secret, none of your users will be able to log in using 2FA.
- `GITLAB_SECRETS_DB_KEY_BASE` is used to encrypt CI secret variables, as well as import credentials, in the database. If you lose or rotate this secret, you will not be able to use existing CI secrets.
- `GITLAB_SECRETS_SECRET_KEY_BASE` is used for password reset links, and other 'standard' auth features. If you lose or rotate this secret, password reset tokens in emails will reset.
- `GITLAB_SECRETS_ENCRYPTED_SETTINGS_KEY_BASE` is used for reading settings from encrypted files such as SMTP or LDAP credentials.
> **Tip**: You can generate a random string using `pwgen -Bsv1 64` and assign it as the value of `GITLAB_SECRETS_DB_KEY_BASE`.
Also generate random strings that are typically `32` characters long for each of:
- `GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_PRIMARY_KEY`
- `GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_DETERMINISTIC_KEY`
- `GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_KEY_DERIVATION_SALT`
These values are used for `ActiveRecord::Encryption` encrypted columns. Details can be found under [Active Record Encryption](https://guides.rubyonrails.org/active_record_encryption.html).
Start GitLab using:
```bash
docker-compose up
```
Alternatively, you can manually launch the `gitlab` container and the supporting `postgresql` and `redis` containers by following this three step guide.
Step 1. Launch a postgresql container
```bash
docker run --name gitlab-postgresql -d \
--env 'DB_NAME=gitlabhq_production' \
--env 'DB_USER=gitlab' --env 'DB_PASS=password' \
--env 'DB_EXTENSION=pg_trgm,btree_gist' \
--volume /srv/docker/gitlab/postgresql:/var/lib/postgresql \
kkimurak/sameersbn-postgresql:16
```
Step 2. Launch a redis container
```bash
docker run --name gitlab-redis -d \
--volume /srv/docker/gitlab/redis:/data \
redis:7
```
Step 3. Launch the gitlab container
```bash
docker run --name gitlab -d \
--link gitlab-postgresql:postgresql --link gitlab-redis:redisio \
--publish 10022:22 --publish 10080:80 \
--env 'GITLAB_PORT=10080' --env 'GITLAB_SSH_PORT=10022' \
--env 'GITLAB_SECRETS_DB_KEY_BASE=long-and-random-alpha-numeric-string' \
--env 'GITLAB_SECRETS_SECRET_KEY_BASE=long-and-random-alpha-numeric-string' \
--env 'GITLAB_SECRETS_OTP_KEY_BASE=long-and-random-alpha-numeric-string' \
--env 'GITLAB_SECRETS_ENCRYPTED_SETTINGS_KEY_BASE=long-and-random-alpha-numeric-string' \
--env 'GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_PRIMARY_KEY=["long-and-random-alpha-numeric-string"]' \
--env 'GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_DETERMINISTIC_KEY=["long-and-random-alpha-numeric-string"]' \
--env 'GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_KEY_DERIVATION_SALT=long-and-random-alpha-numeric-string' \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
*Please refer to [Available Configuration Parameters](#available-configuration-parameters) to understand `GITLAB_PORT` and other configuration options*
**NOTE**: Please allow a couple of minutes for the GitLab application to start.
Point your browser to `http://localhost:10080` and set a password for the `root` user account.
You should now have the GitLab application up and ready for testing. If you want to use this image in production then please read on.
*The rest of the document will use the docker command line. You can quite simply adapt your configuration into a `docker-compose.yml` file if you wish to do so.*
## Configuration
### Data Store
GitLab is a code hosting software and as such you don't want to lose your code when the docker container is stopped/deleted. To avoid losing any data, you should mount a volume at,
- `/home/git/data`
*Note: that if you are using the `docker-compose` approach, you must "inspect" the volumes (```docker volume inspect```) to check the mounted path.*
SELinux users are also required to change the security context of the mount point so that it plays nicely with selinux.
```bash
mkdir -p /srv/docker/gitlab/gitlab
sudo chcon -Rt svirt_sandbox_file_t /srv/docker/gitlab/gitlab
```
Volumes can be mounted in docker by specifying the `-v` option in the docker run command.
```bash
docker run --name gitlab -d \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
### Database
GitLab uses a database backend to store its data. You can configure this image to use PostgreSQL.
*Note:* GitLab requires PostgreSQL now. So use an older image < 12.1 or migrate to PostgresSQL
#### PostgreSQL
**Important note:** This image is shipped with different versions of the `postgresql-client`.
During the startup of the container, the major version of the database system is checked based on the specified connection destination. Only the version of the `postgresql-client`, that matches the major version of the Postgres database is used. If the major version of any version of the included clients does not match, the latest client is used (but may cause issues). All other versions of the `postgresql-client` are deleted at runtime.
This behavior can be checked using the command `docker logs` and an output like the following should be available:
````sh
…
Configuring gitlab::database
- Installing postgresql client to avoid version mismatch on dumping
-- Detected server version: 160009
- Generating /home/git/.postgresqlrc
16 postgresql:5432 gitlabhq_production
- Uninstalling unused client(s): postgresql-client-13 postgresql-client-14 postgresql-client-15 postgresql-client-17
…
````
Please note furthermore, that only compatible versions of the `postgresql-client` to GitLab are shipped with this image. Currently, these belong to
- `postgresql-client-13`,
- `postgresql-client-14`,
- `postgresql-client-15`,
- `postgresql-client-16`,
- and `postgresql-client-17`.
***Notes:***
- GitLab CE version 13.7.0 and later requires PostgreSQL version 12.x.
- GitLab CE version 16.0.0 and later requires PostgreSQL version 13.x.
- GitLab CE version 17.0.0 and later requires PostgreSQL version 14.x.
- GitLab CE version 18.0.0 and later requires PostgreSQL version 16.x.
##### External PostgreSQL Server
The image also supports using an external PostgreSQL Server. This is also controlled via environment variables.
```sql
CREATE ROLE gitlab with LOGIN CREATEDB PASSWORD 'password';
CREATE DATABASE gitlabhq_production;
GRANT ALL PRIVILEGES ON DATABASE gitlabhq_production to gitlab;
```
Additionally, since GitLab `8.6.0` the `pg_trgm` extension should also be loaded for the `gitlabhq_production` database.
We are now ready to start the GitLab application.
*Note:* The following applies assuming that the PostgreSQL server host is `192.168.1.100`.
```bash
docker run --name gitlab -d \
--env 'DB_HOST=192.168.1.100' \
--env 'DB_NAME=gitlabhq_production' \
--env 'DB_USER=gitlab' --env 'DB_PASS=password' \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
##### Linking to PostgreSQL Container
You can link this image with a postgresql container for the database requirements. The alias of the postgresql server container should be set to **postgresql** while linking with the gitlab image.
If a postgresql container is linked, only the `DB_HOST` and `DB_PORT` settings are automatically retrieved using the linkage. You may still need to set other database connection parameters such as the `DB_NAME`, `DB_USER`, `DB_PASS` and so on.
To illustrate linking with a postgresql container, we will use the [sameersbn/postgresql](https://github.com/sameersbn/docker-postgresql) image. When using postgresql image in production you should mount a volume for the postgresql data store. Please refer the [README](https://github.com/sameersbn/docker-postgresql/blob/master/README.md) of docker-postgresql for details.
First, let's pull the postgresql image from the docker index.
```bash
docker pull kkimurak/sameersbn-postgresql:16
```
For data persistence lets create a store for the postgresql and start the container.
SELinux users are also required to change the security context of the mount point so that it plays nicely with selinux.
```bash
mkdir -p /srv/docker/gitlab/postgresql
sudo chcon -Rt svirt_sandbox_file_t /srv/docker/gitlab/postgresql
```
The run command looks like this.
```bash
docker run --name gitlab-postgresql -d \
--env 'DB_NAME=gitlabhq_production' \
--env 'DB_USER=gitlab' --env 'DB_PASS=password' \
--env 'DB_EXTENSION=pg_trgm' \
--volume /srv/docker/gitlab/postgresql:/var/lib/postgresql \
kkimurak/sameersbn-postgresql:16
```
The above command will create a database named `gitlabhq_production` and also create a user named `gitlab` with the password `password` with access to the `gitlabhq_production` database.
We are now ready to start the GitLab application.
```bash
docker run --name gitlab -d --link gitlab-postgresql:postgresql \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
Here the image will also automatically fetch the `DB_NAME`, `DB_USER` and `DB_PASS` variables from the postgresql container as they are specified in the `docker run` command for the postgresql container. This is made possible using the magic of docker links and works with the following images:
- [postgres](https://hub.docker.com/_/postgres/),
- [kkimurak/sameersbn-postgresql](https://hub.docker.com/r/kkimurak/sameersbn-postgresql), or
- [sameersbn/postgresql](https://quay.io/repository/sameersbn/postgresql/) .
##### Upgrading PostgreSQL
When this Gitlab image upgrades its dependency on specific version of PostgreSQL you will need to make sure to use corresponding version of PostgreSQL.
If you are setting a brand new install, there is no data migration involved. However, if you already have an existing setup, the PostgreSQL data will need to be migrated as you are upgrading the version of PostgreSQL.
If you are using PostgreSQL image other than [sameersbn/postgresql](https://quay.io/repository/sameersbn/postgresql/) you will need make sure that the image you are using can handle migration itself, **or**, you will need to migrate the data yourself before starting newer version of PostgreSQL.
Following project provides Docker image that handles migration of PostgreSQL data: [tianon/postgres-upgrade](https://hub.docker.com/r/tianon/postgres-upgrade/)
After migration of the data, verify that other PostgreSQL configuration files in its data folder are copied over as well. One such file is `pg_hba.conf`, it will need to be copied from old version data folder into new version data folder.
### Redis
GitLab uses the redis server for its key-value data store. The redis server connection details can be specified using environment variables.
#### Internal Redis Server
The internal redis server has been removed from the image. Please use a [linked redis](#linking-to-redis-container) container or specify a [external redis](#external-redis-server) connection.
#### External Redis Server
The image can be configured to use an external redis server. The configuration should be specified using environment variables while starting the GitLab image.
*Note:* The following applies assuming that the redis server host is `192.168.1.100`.
```bash
docker run --name gitlab -it --rm \
--env 'REDIS_HOST=192.168.1.100' --env 'REDIS_PORT=6379' \
sameersbn/gitlab:18.9.2
```
#### Linking to Redis Container
You can link this image with a redis container to satisfy gitlab's redis requirement. The alias of the redis server container should be set to **redisio** while linking with the gitlab image.
To illustrate linking with a redis container, we will use the [redis](https://github.com/docker-library/redis) image. Please refer the [README](https://github.com/docker-library/docs/blob/master/redis/README.md) for details.
First, let's pull the redis image from the docker index.
```bash
docker pull redis:7
```
Lets start the redis container
```bash
docker run --name gitlab-redis -d \
--volume /srv/docker/gitlab/redis:/data \
redis:7
```
We are now ready to start the GitLab application.
```bash
docker run --name gitlab -d --link gitlab-redis:redisio \
sameersbn/gitlab:18.9.2
```
#### Mail
The mail configuration should be specified using environment variables while starting the GitLab image. The configuration defaults to using gmail to send emails and requires the specification of a valid username and password to login to the gmail servers.
If you are using Gmail then all you need to do is:
```bash
docker run --name gitlab -d \
--env 'SMTP_USER=USER@gmail.com' --env 'SMTP_PASS=PASSWORD' \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
Please refer the [Available Configuration Parameters](#available-configuration-parameters) section for the list of SMTP parameters that can be specified.
##### Reply by email
Since version `8.0.0` GitLab adds support for commenting on issues by replying to emails.
To enable this feature you need to provide IMAP configuration parameters that will allow GitLab to connect to your mail server and read mails. Additionally, you may need to specify `GITLAB_INCOMING_EMAIL_ADDRESS` if your incoming email address is not the same as the `IMAP_USER`.
If your email provider supports email [sub-addressing](https://en.wikipedia.org/wiki/Email_address#Sub-addressing) then you should add the `+%{key}` placeholder after the user part of the email address, eg. `GITLAB_INCOMING_EMAIL_ADDRESS=reply+%{key}@example.com`. Please read the [documentation on reply by email](http://doc.gitlab.com/ce/incoming_email/README.html) to understand the requirements for this feature.
If you are using Gmail then all you need to do is:
```bash
docker run --name gitlab -d \
--env 'IMAP_USER=USER@gmail.com' --env 'IMAP_PASS=PASSWORD' \
--env 'GITLAB_INCOMING_EMAIL_ADDRESS=USER+%{key}@gmail.com' \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
Please refer the [Available Configuration Parameters](#available-configuration-parameters) section for the list of IMAP parameters that can be specified.
#### SSL
Access to the gitlab application can be secured using SSL so as to prevent unauthorized access to the data in your repositories. While a CA certified SSL certificate allows for verification of trust via the CA, a self-signed certificate can also provide an equal level of trust verification as long as each client takes some additional steps to verify the identity of your website. I will provide instructions on achieving this towards the end of this section.
Jump to the [Using HTTPS with a load balancer](#using-https-with-a-load-balancer) section if you are using a load balancer such as hipache, haproxy or nginx.
To secure your application via SSL you basically need two things:
- **Private key (.key)**
- **SSL certificate (.crt)**
When using CA certified certificates, these files are provided to you by the CA. When using self-signed certificates you need to generate these files yourself. Skip to [Strengthening the server security](#strengthening-the-server-security) section if you are armed with CA certified SSL certificates.
##### Generation of a Self Signed Certificate
Generation of a self-signed SSL certificate involves a simple 3-step procedure:
**STEP 1**: Create the server private key
```bash
openssl genrsa -out gitlab.key 2048
```
**STEP 2**: Create the certificate signing request (CSR)
```bash
openssl req -new -key gitlab.key -out gitlab.csr
```
**STEP 3**: Sign the certificate using the private key and CSR
```bash
openssl x509 -req -days 3650 -in gitlab.csr -signkey gitlab.key -out gitlab.crt
```
Congratulations! You now have a self-signed SSL certificate valid for 10 years.
##### Strengthening the server security
This section provides you with instructions to [strengthen your server security](https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html). To achieve this we need to generate stronger DHE parameters.
```bash
openssl dhparam -out dhparam.pem 2048
```
##### Installation of the SSL Certificates
Out of the four files generated above, we need to install the `gitlab.key`, `gitlab.crt` and `dhparam.pem` files at the gitlab server. The CSR file is not needed, but do make sure you safely backup the file (in case you ever need it again).
The default path that the gitlab application is configured to look for the SSL certificates is at `/home/git/data/certs`, this can however be changed using the `SSL_KEY_PATH`, `SSL_CERTIFICATE_PATH` and `SSL_DHPARAM_PATH` configuration options.
If you remember from above, the `/home/git/data` path is the path of the [data store](#data-store), which means that we have to create a folder named `certs/` inside the volume to where `/home/git/data` point and copy the files into it and as a measure of security we'll update the permission on the `gitlab.key` file to only be readable by the owner.
In case use of docker-compose ...
```$>docker volume inspect```
Look for "< user >_gitlab-data" and copy the "certs" directory into the "Mountpoint"
```bash
mkdir -p /srv/docker/gitlab/gitlab/certs
cp gitlab.key /srv/docker/gitlab/gitlab/certs/
cp gitlab.crt /srv/docker/gitlab/gitlab/certs/
cp dhparam.pem /srv/docker/gitlab/gitlab/certs/
chmod 400 /srv/docker/gitlab/gitlab/certs/gitlab.key
```
Great! We are now just one step away from having our application secured.
##### Enabling HTTPS support
HTTPS support can be enabled by setting the `GITLAB_HTTPS` option to `true`. Additionally, when using self-signed SSL certificates you need to the set `SSL_SELF_SIGNED` option to `true` as well. Assuming we are using self-signed certificates
```bash
docker run --name gitlab -d \
--publish 10022:22 --publish 10080:80 --publish 10443:443 \
--env 'GITLAB_SSH_PORT=10022' --env 'GITLAB_PORT=10443' \
--env 'GITLAB_HTTPS=true' --env 'SSL_SELF_SIGNED=true' \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
In this configuration, any requests made over the plain http protocol will automatically be redirected to use the https protocol. However, this is not optimal when using a load balancer.
##### Configuring HSTS
HSTS if supported by the browsers makes sure that your users will only reach your sever via HTTPS. When the user comes for the first time it sees a header from the server which states for how long from now this site should only be reachable via HTTPS - that's the HSTS max-age value.
With `NGINX_HSTS_MAXAGE` you can configure that value. The default value is `31536000` seconds. If you want to disable an already sent HSTS MAXAGE value, set it to `0`.
```bash
docker run --name gitlab -d \
--env 'GITLAB_HTTPS=true' --env 'SSL_SELF_SIGNED=true' \
--env 'NGINX_HSTS_MAXAGE=2592000' \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
If you want to completely disable HSTS set `NGINX_HSTS_ENABLED` to `false`.
##### Using HTTPS with a load balancer
Load balancers like nginx/haproxy/hipache talk to backend applications over plain http and as such the installation of ssl keys and certificates are not required and should **NOT** be installed in the container. The SSL configuration has to instead be done at the load balancer.
However, when using a load balancer you **MUST** set `GITLAB_HTTPS` to `true`. Additionally, you will need to set the `SSL_SELF_SIGNED` option to `true` if self-signed SSL certificates are in use.
With this in place, you should configure the load balancer to support handling of https requests. But that is out of the scope of this document. Please refer to [Using SSL/HTTPS with HAProxy](http://seanmcgary.com/posts/using-sslhttps-with-haproxy) for information on the subject.
When using a load balancer, you probably want to make sure the load balancer performs the automatic http to https redirection. Information on this can also be found in the link above.
In summation, when using a load balancer, the docker command would look for the most part something like this:
```bash
docker run --name gitlab -d \
--publish 10022:22 --publish 10080:80 \
--env 'GITLAB_SSH_PORT=10022' --env 'GITLAB_PORT=443' \
--env 'GITLAB_HTTPS=true' --env 'SSL_SELF_SIGNED=true' \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
Again, drop the `--env 'SSL_SELF_SIGNED=true'` option if you are using CA certified SSL certificates.
In case GitLab responds to any kind of POST request (login, OAUTH, changing settings etc.) with a 422 HTTP Error, consider adding this to your reverse proxy configuration:
`proxy_set_header X-Forwarded-Ssl on;` (nginx format)
##### Establishing trust with your server
This section deals will self-signed ssl certificates. If you are using CA certified certificates, you're done.
This section is more of a client side configuration so as to add a level of confidence at the client to be 100 percent sure they are communicating with whom they think they.
This is simply done by adding the servers certificate into their list of trusted certificates. On ubuntu, this is done by copying the `gitlab.crt` file to `/usr/local/share/ca-certificates/` and executing `update-ca-certificates`.
Again, this is a client side configuration which means that everyone who is going to communicate with the server should perform this configuration on their machine. In short, distribute the `gitlab.crt` file among your developers and ask them to add it to their list of trusted ssl certificates. Failure to do so will result in errors that look like this:
```bash
git clone https://git.local.host/gitlab-foss.git
fatal: unable to access 'https://git.local.host/gitlab-foss.git': server certificate verification failed. CAfile: /etc/ssl/certs/ca-certificates.crt CRLfile: none
```
You can do the same at the web browser. Instructions for installing the root certificate for firefox can be found [here](http://portal.threatpulse.com/docs/sol/Content/03Solutions/ManagePolicy/SSL/ssl_firefox_cert_ta.htm). You will find similar options chrome, just make sure you install the certificate under the authorities tab of the certificate manager dialog.
There you have it, that's all there is to it.
##### Installing Trusted SSL Server Certificates
If your GitLab CI server is using self-signed SSL certificates then you should make sure the GitLab CI server certificate is trusted on the GitLab server for them to be able to talk to each other.
The default path image is configured to look for the trusted SSL certificates is at `/home/git/data/certs/ca.crt`, this can however be changed using the `SSL_CA_CERTIFICATES_PATH` configuration option.
Copy the `ca.crt` file into the certs directory on the [datastore](#data-store). The `ca.crt` file should contain the root certificates of all the servers you want to trust. With respect to GitLab CI, this will be the contents of the gitlab_ci.crt file as described in the [README](https://github.com/sameersbn/docker-gitlab-ci/blob/master/README.md#ssl) of the [docker-gitlab-ci](https://github.com/sameersbn/docker-gitlab-ci) container.
By default, our own server certificate [gitlab.crt](#generation-of-a-self-signed-certificate) is added to the trusted certificates list.
#### Deploy to a subdirectory (relative url root)
By default, GitLab expects that your application is running at the root (e.g.. /). This section explains how to run your application inside a directory.
Let's assume we want to deploy our application to '/git'. GitLab needs to know this directory to generate the appropriate routes. This can be specified using the `GITLAB_RELATIVE_URL_ROOT` configuration option like so:
```bash
docker run --name gitlab -it --rm \
--env 'GITLAB_RELATIVE_URL_ROOT=/git' \
--volume /srv/docker/gitlab/gitlab:/home/git/data \
sameersbn/gitlab:18.9.2
```
GitLab will now be accessible at the `/git` path, e.g. `http://www.example.com/git`.
**Note**: *The `GITLAB_RELATIVE_URL_ROOT` parameter should always begin with a slash and* **SHOULD NOT** *have any trailing slashes.*
#### OmniAuth Integration
GitLab leverages OmniAuth to allow users to sign in using Twitter, GitHub, and other popular services. Configuring OmniAuth does not prevent standard GitLab authentication or LDAP (if configured) from continuing to work. Users can choose to sign in using any of the configured mechanisms.
Refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/omniauth.html) for additional information.
##### CAS3
To enable the CAS OmniAuth provider you must register your application with your CAS instance. This requires the service URL GitLab will supply to CAS. It should be something like: `https://git.example.com:443/users/auth/cas3/callback?url`. By default handling for SLO is enabled, you only need to configure CAS for backchannel logout.
For example, if your cas server url is `https://sso.example.com`, then adding `--env 'OAUTH_CAS3_SERVER=https://sso.example.com'` to the docker run command enables support for CAS3 OAuth. Please refer to [Available Configuration Parameters](#available-configuration-parameters) for additional CAS3 configuration parameters.
##### Authentiq
To enable the Authentiq OmniAuth provider for passwordless authentication you must register an application with [Authentiq](https://www.authentiq.com/). Please refer to the GitLab [documentation](https://docs.gitlab.com/ce/administration/auth/authentiq.html) for the procedure to generate the client ID and secret key with Authentiq.
Once you have the API client id and client secret generated, configure them using the `OAUTH_AUTHENTIQ_CLIENT_ID` and `OAUTH_AUTHENTIQ_CLIENT_SECRET` environment variables respectively.
For example, if your API key is `xxx` and the API secret key is `yyy`, then adding `--env 'OAUTH_AUTHENTIQ_CLIENT_ID=xxx' --env 'OAUTH_AUTHENTIQ_CLIENT_SECRET=yyy'` to the docker run command enables support for Authentiq OAuth.
You may want to specify `OAUTH_AUTHENTIQ_REDIRECT_URI` as well. The OAuth scope can be altered as well with `OAUTH_AUTHENTIQ_SCOPE` (defaults to `'aq:name email~rs address aq:push'`).
##### Google
To enable the Google OAuth2 OmniAuth provider you must register your application with Google. Google will generate a client ID and secret key for you to use. Please refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/google.html) for the procedure to generate the client ID and secret key with google.
Once you have the client ID and secret keys generated, configure them using the `OAUTH_GOOGLE_API_KEY` and `OAUTH_GOOGLE_APP_SECRET` environment variables respectively.
For example, if your client ID is `xxx.apps.googleusercontent.com` and client secret key is `yyy`, then adding `--env 'OAUTH_GOOGLE_API_KEY=xxx.apps.googleusercontent.com' --env 'OAUTH_GOOGLE_APP_SECRET=yyy'` to the docker run command enables support for Google OAuth.
You can also restrict logins to a single domain by adding `--env "OAUTH_GOOGLE_RESTRICT_DOMAIN='example.com'"`.
##### Facebook
To enable the Facebook OAuth2 OmniAuth provider you must register your application with Facebook. Facebook will generate an API key and secret for you to use. Please refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/facebook.html) for the procedure to generate the API key and secret.
Once you have the API key and secret generated, configure them using the `OAUTH_FACEBOOK_API_KEY` and `OAUTH_FACEBOOK_APP_SECRET` environment variables respectively.
For example, if your API key is `xxx` and the API secret key is `yyy`, then adding `--env 'OAUTH_FACEBOOK_API_KEY=xxx' --env 'OAUTH_FACEBOOK_APP_SECRET=yyy'` to the docker run command enables support for Facebook OAuth.
##### Twitter
To enable the Twitter OAuth2 OmniAuth provider you must register your application with Twitter. Twitter will generate an API key and secret for you to use. Please refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/twitter.html) for the procedure to generate the API key and secret with twitter.
Once you have the API key and secret generated, configure them using the `OAUTH_TWITTER_API_KEY` and `OAUTH_TWITTER_APP_SECRET` environment variables respectively.
For example, if your API key is `xxx` and the API secret key is `yyy`, then adding `--env 'OAUTH_TWITTER_API_KEY=xxx' --env 'OAUTH_TWITTER_APP_SECRET=yyy'` to the docker run command enables support for Twitter OAuth.
##### GitHub
To enable the GitHub OAuth2 OmniAuth provider you must register your application with GitHub. GitHub will generate a Client ID and secret for you to use. Please refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/github.html) for the procedure to generate the Client ID and secret with github.
Once you have the Client ID and secret generated, configure them using the `OAUTH_GITHUB_API_KEY` and `OAUTH_GITHUB_APP_SECRET` environment variables respectively.
For example, if your Client ID is `xxx` and the Client secret is `yyy`, then adding `--env 'OAUTH_GITHUB_API_KEY=xxx' --env 'OAUTH_GITHUB_APP_SECRET=yyy'` to the docker run command enables support for GitHub OAuth.
Users of GitHub Enterprise may want to specify `OAUTH_GITHUB_URL` and `OAUTH_GITHUB_VERIFY_SSL` as well.
##### GitLab
To enable the GitLab OAuth2 OmniAuth provider you must register your application with GitLab. GitLab will generate a Client ID and secret for you to use. Please refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/gitlab.html) for the procedure to generate the Client ID and secret with GitLab.
Once you have the Client ID and secret generated, configure them using the `OAUTH_GITLAB_API_KEY` and `OAUTH_GITLAB_APP_SECRET` environment variables respectively.
For example, if your Client ID is `xxx` and the Client secret is `yyy`, then adding `--env 'OAUTH_GITLAB_API_KEY=xxx' --env 'OAUTH_GITLAB_APP_SECRET=yyy'` to the docker run command enables support for GitLab OAuth.
##### BitBucket
To enable the BitBucket OAuth2 OmniAuth provider you must register your application with BitBucket. BitBucket will generate a Client ID and secret for you to use. Please refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/bitbucket.html) for the procedure to generate the Client ID and secret with BitBucket.
Once you have the Client ID and secret generated, configure them using the `OAUTH_BITBUCKET_API_KEY` and `OAUTH_BITBUCKET_APP_SECRET` environment variables respectively.
For example, if your Client ID is `xxx` and the Client secret is `yyy`, then adding `--env 'OAUTH_BITBUCKET_API_KEY=xxx' --env 'OAUTH_BITBUCKET_APP_SECRET=yyy'` to the docker run command enables support for BitBucket OAuth.
##### SAML
GitLab can be configured to act as a SAML 2.0 Service Provider (SP). This allows GitLab to consume assertions from a SAML 2.0 Identity Provider (IdP) such as Microsoft ADFS to authenticate users. Please refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/saml.html).
The following parameters have to be configured to enable SAML OAuth support in this image: `OAUTH_SAML_ASSERTION_CONSUMER_SERVICE_URL`, `OAUTH_SAML_IDP_CERT_FINGERPRINT`, `OAUTH_SAML_IDP_SSO_TARGET_URL`, `OAUTH_SAML_ISSUER` and `OAUTH_SAML_NAME_IDENTIFIER_FORMAT`.
You can also override the default "Sign in with" button label with `OAUTH_SAML_LABEL`.
Please refer to [Available Configuration Parameters](#available-configuration-parameters) for the default configurations of these parameters.
##### Crowd
To enable the Crowd server OAuth2 OmniAuth provider you must register your application with Crowd server.
Configure GitLab to enable access the Crowd server by specifying the `OAUTH_CROWD_SERVER_URL`, `OAUTH_CROWD_APP_NAME` and `OAUTH_CROWD_APP_PASSWORD` environment variables.
##### Auth0
To enable the Auth0 OmniAuth provider you must register your application with [auth0](https://auth0.com/).
Configure the following environment variables `OAUTH_AUTH0_CLIENT_ID`, `OAUTH_AUTH0_CLIENT_SECRET` and `OAUTH_AUTH0_DOMAIN` to complete the integration.
##### Microsoft Azure
To enable the Microsoft Azure OAuth2 OmniAuth provider you must register your application with Azure. Azure will generate a Client ID, Client secret and Tenant ID for you to use. Please refer to the GitLab [documentation](http://doc.gitlab.com/ce/integration/azure.html) for the procedure.
Once you have the Client ID, Client secret and Tenant ID generated, configure them using the `OAUTH_AZURE_API_KEY`, `OAUTH_AZURE_API_SECRET` and `OAUTH_AZURE_TENANT_ID` environment variables respectively.
For example, if your Client ID is `xxx`, the Client secret is `yyy` and the Tenant ID is `zzz`, then adding `--env 'OAUTH_AZURE_API_KEY=xxx' --env 'OAUTH_AZURE_API_SECRET=yyy' --env 'OAUTH_AZURE_TENANT_ID=zzz'` to the docker run command enables support for Microsoft Azure OAuth.
Also you can configure v2 endpoint (`azure_activedirectory_v2`) by using `OAUTH_AZURE_ACTIVEDIRECTORY_V2_CLIENT_ID`, `OAUTH_AZURE_ACTIVEDIRECTORY_V2_CLIENT_SECRET` and `OAUTH_AZURE_ACTIVEDIRECTORY_V2_TENANT_ID` environment variables. Optionally you can change label of login button using the `OAUTH_AZURE_ACTIVEDIRECTORY_V2_LABEL`.
##### Generic OAuth2
To enable the Generic OAuth2 provider, you must register your application with your provider. You also need to confirm OAuth2 provider app's ID and secret, the client options and the user's response structure.
As an example this code has been tested with Keycloak, with the following variables: `OAUTH2_GENERIC_APP_ID`, `OAUTH2_GENERIC_APP_SECRET`, `OAUTH2_GENERIC_CLIENT_SITE`, `OAUTH2_GENERIC_CLIENT_USER_INFO_URL`, `OAUTH2_GENERIC_CLIENT_AUTHORIZE_URL`, `OAUTH2_GENERIC_CLIENT_TOKEN_URL`, `OAUTH2_GENERIC_CLIENT_END_SESSION_ENDPOINT`, `OAUTH2_GENERIC_ID_PATH`, `OAUTH2_GENERIC_USER_UID`, `OAUTH2_GENERIC_USER_NAME`, `OAUTH2_GENERIC_USER_EMAIL`, `OAUTH2_GENERIC_AUTHORIZE_PARAMS_SCOPE`, `OAUTH2_GENERIC_LABEL` and `OAUTH2_GENERIC_NAME`.
See [GitLab documentation](https://docs.gitlab.com/ee/integration/oauth2_generic.html#sign-into-gitlab-with-almost-any-oauth2-provider) and [Omniauth-oauth2-generic documentation](https://gitlab.com/satorix/omniauth-oauth2-generic) for more details.
##### OpenID Connect
To enable OpenID Connect provider, you must register your application with your provider. You also need to confirm OpenID Connect provider app's ID and secret, the client options and the user's response structure.
To use OIDC set at least `OAUTH_OIDC_ISSUER` and `OAUTH_OIDC_CLIENT_ID`.
| GitLab setting | environment variable | default value |
|--------------------------------|-------------------------------------|--------------------------------|
| `label` | `OAUTH_OIDC_LABEL` | `OpenID Connect` |
| `icon` | `OAUTH_OIDC_ICON` | |
| `scope` | `OAUTH_OIDC_SCOPE` | `['openid','profile','email']` |
| `response_type` | `OAUTH_OIDC_RESPONSE_TYPE` | `code` |
| `issuer` | `OAUTH_OIDC_ISSUER` | |
| `discovery` | `OAUTH_OIDC_DISCOVERY` | `true` |
| `client_auth_method` | `OAUTH_OIDC_CLIENT_AUTH_METHOD` | `basic` |
| `uid_field` | `OAUTH_OIDC_UID_FIELD` | `sub` |
| `send_scope_to_token_endpoint` | `OAUTH_OIDC_SEND_SCOPE_TO_TOKEN_EP` | `false` |
| `pkce` | `OAUTH_OIDC_PKCE` | `true` |
| `client_options.identifier` | `OAUTH_OIDC_CLIENT_ID` | |
| `client_options.secret` | `OAUTH_OIDC_CLIENT_SECRET` | `secret` |
| `client_options.redirect_uri` | `OAUTH_OIDC_REDIRECT_URI` | `http://${GITLAB_HOST}/users/auth/openid_connect/callback` or `https://${GITLAB_HOST}/users/auth/openid_connect/callback` depending on the value of `GITLAB_HTTPS` |
See [GitLab OIDC documentation](https://docs.gitlab.com/ee/administration/auth/oidc.html) and [OmniAuth OpenID Connect documentation](https://github.com/omniauth/omniauth_openid_connect/).
##### JWT
To enable the JWT OmniAuth provider, you must register your application with JWT. JWT provides you with a secret key for you to use.
To use JWT set at least `OAUTH_JWT_SECRET` and `OAUTH_JWT_AUTH_URL`.
| GitLab setting | environment variable | default value |
| ------------------------------ | ----------------------------------- | -------------------------------|
| `label` | `OAUTH_JWT_LABEL` | `Jwt` |
| `secret` | `OAUTH_JWT_SECRET` | |
| `algorithm` | `OAUTH_JWT_ALGORITHM` | `HS256` |
| `uid_claim` | `OAUTH_JWT_UID_CLAIM` | `email` |
| `required_claims` | `OAUTH_JWT_REQUIRED_CLAIMS` | `["name", "email"]` |
| `info_map.name` | `OAUTH_JWT_INFO_MAP_NAME` | `name` |
| `info_map.email` | `OAUTH_JWT_INFO_MAP_EMAIL` | `email` |
| `auth_url` | `OAUTH_JWT_AUTH_URL` | |
| `valid_within` | `OAUTH_JWT_VALID_WITHIN` | `3600` |
See [OmniAuth JWT documentation](https://docs.gitlab.com/administration/auth/jwt/).
#### Gitlab Pages
Gitlab Pages allows a user to host static websites from a project. Gitlab pages can be enabled with setting the environment variable `GITLAB_PAGES_ENABLED` to `true`.
#### Gitlab Pages Access Control
Since version `11.5.0` Gitlab pages supports access control. This allows only access to a published website if you are a project member, or have access to a certain project.
Gitlab pages access control requires additional configuration before activating it through the variable `GITLAB_PAGES_ACCESS_CONTROL`.
GitLab pages access control makes use of the Gitlab OAuth Module.
- Goto the Gitlab Admin area
- Select `Applications` in the menu
- Create `New Application`
- Name: `Gitlab Pages`
- Scopes:
- api
- Trusted: NO (Do not select)
- Redirect URI: `https://projects.<GITLAB_PAGES_DOMAIN>/auth`
Note about the `Redirect URI`; this can be tricky to configure or figure out, What needs to be achieved is the following, the redirect URI needs to end up at the `gitlab-pages` daemon with the `/auth` endpoint.
This means that if you run your gitlab pages at domain `pages.example.io` this will be a wildcard domain where your projects are created based on their namespace. The best trick is to enter a NON-Existing gitlab project pages URI as the redirect URI.
In the example above; the pages domain `projects` has been chosen. This will cause the nginx, either the built in or your own load balancer to redirect `*.<GITLAB_PAGES_DOMAIN>` to the `gitlab-pages` daemon. Which will trigger the pages endpoint.
Make sure to choose own which does not exist and make sure that the request is routed to the `gitlab-pages` daemon if you are using your own HTTP load balancer in front of Gitlab.
After creating the OAuth application endpoint for the Gitlab Pages Daemon. Gitlab pages access control can now be enabled.
Add to following environment variables to your Gitlab Container.
| Variable | R/O | Description |
|----------|-----|-------------|
| GITLAB_PAGES_ACCESS_CONTROL | Required | Set to `true` to enable access control. |
| GITLAB_PAGES_ACCESS_SECRET | Optional | Secret Hash, minimal 32 characters, if omitted, it will be auto generated. |
| GITLAB_PAGES_ACCESS_CONTROL_SERVER | Required | Gitlab instance URI, example: `https://gitlab.example.io` |
| GITLAB_PAGES_ACCESS_CLIENT_ID | Required | Client ID from earlier generated OAuth application |
| GITLAB_PAGES_ACCESS_CLIENT_SECRET | Required | Client Secret from earlier generated OAuth application |
| GITLAB_PAGES_ACCESS_REDIRECT_URI | Required | Redirect URI, non existing pages domain to redirect to pages daemon, `https://projects.example.io` |
After you have enabled the gitlab pages access control. When you go to a project `General Settings` -> `Permissions` you can choose the pages permission level for the project.
#### External Issue Trackers
Since version `7.10.0` support for external issue trackers can be enabled in the "Service Templates" section of the settings panel.
If you are using the [docker-redmine](https://github.com/sameersbn/docker-redmine) image, you can *one up* the gitlab integration with redmine by adding `--volumes-from=gitlab` flag to the docker run command while starting the redmine container.
By using the above option the `/home/git/data/repositories` directory will be accessible by the redmine container and now you can add your git repository path to your redmine project. If, for example, in your gitlab server you have a project named `opensource/gitlab`, the bare repository will be accessible at `/home/git/data/repositories/opensource/gitlab.git` in the redmine container.
#### Host UID / GID Mapping
Per default the container is configured to run gitlab as user and group `git` with `uid` and `gid` `1000`. The host possibly uses this ids for different purposes leading to unfavorable effects. From the host it appears as if the mounted data volumes are owned by the host's user/group `1000`.
Also the container processes seem to be executed as the host's user/group `1000`. The container can be configured to map the `uid` and `gid` of `git` to different ids on host by passing the environment variables `USERMAP_UID` and `USERMAP_GID`. The following command maps the ids to user and group `git` on the host.
```bash
docker run --name gitlab -it --rm [options] \
--env "USERMAP_UID=$(id -u git)" --env "USERMAP_GID=$(id -g git)" \
sameersbn/gitlab:18.9.2
```
When changing this mapping, all files and directories in the mounted data volume `/home/git/data` have to be re-owned by the new ids. This can be achieved automatically using the following command:
```bash
docker run --name gitlab -d [OPTIONS] \
sameersbn/gitlab:18.9.2 app:sanitize
```
#### Piwik
If you want to monitor your gitlab instance with [Piwik](http://piwik.org/), there are two options to setup: `PIWIK_URL` and `PIWIK_SITE_ID`.
These options should contain something like:
- `PIWIK_URL=piwik.example.org`
- `PIWIK_SITE_ID=42`
#### Feature flags
In this section, we talk about feature flags that administrators can change the state (See <https://docs.gitlab.com/ee/administration/feature_flags.html>). If you are looking for documentation for "Feature flags" that configured on project deploy settings, see <https://docs.gitlab.com/ee/operations/feature_flags.html>
GitLab adopted feature flags strategies to deploy features in an early stage of development so that they can be incrementally rolled out. GitLab administrators with access to the [Rails console](https://docs.gitlab.com/ee/administration/feature_flags.html#how-to-enable-and-disable-features-behind-flags) or the [Feature flags API](https://docs.gitlab.com/ee/api/features.html) can control them (note that `sameersbn/gitlab` is a container image that provides GitLab installations from the source).
You can see all feature flags in GitLab at corresponding version of documentation: <https://docs.gitlab.com/ee/user/feature_flags.html>
For `sameersbn/gitlab`, you can control them via environment parameter [`GITLAB_FEATURE_FLAGS_DISABLE_TARGETS`](#gitlab_feature_flags_disable_targets) and [`GITLAB_FEATURE_FLAGS_ENABLE_TARGETS`](#gitlab_feature_flags_enable_targets) in addition to the above methods.
This image searches yml files in [`${GITLAB_INSTALL_DIR}/config/feature_flags`](https://gitlab.com/gitlab-org/gitlab-foss/-/tree/master/config/feature_flags) (typically `/home/git/gitlab/config/feature_flags/`) recursively and use the file list as a source of active feature flags.
Here is a part of example `docker-compose.yml`:
````yml
services:
gitlab:
image: sameersbn/gitlab:latest
environment:
- GITLAB_FEATURE_FLAGS_DISABLE_TARGETS=auto_devops_banner_disabled,ci_enable_live_trace
- GITLAB_FEATURE_FLAGS_ENABLE_TARGETS=git_push_create_all_pipelines,build_service_proxy
````
Once the container up, you can see following messages in container log like below.
````sh
...
Configuring gitlab::feature_flags...
- specified feature flags: {:to_be_disabled=>["auto_devops_banner_disabled", "ci_enable_live_trace"], :to_be_enabled=>["git_push_create_all_pipelines", "build_service_proxy"]}
- auto_devops_banner_disabled : off
- ci_enable_live_trace : off
- git_push_create_all_pipelines : on
- build_service_proxy : on
...
````
If specified flag names are not included in the list, they will be ignored and appears to container log like below:
````sh
...
Configuring gitlab::feature_flags...
- specified feature flags: {:to_be_disabled=>["auto_devops_banner_disabled", "invalid_flag_name"], :to_be_enabled=>["git_push_create_all_pipelines", "another_invalid_flag_name"]}
- Following flags are probably invalid and have been ignored: invalid_flag_name,another_invalid_flag_name
- auto_devops_banner_disabled : off
- git_push_create_all_pipelines : on
...
````
#### Available Configuration Parameters
*Please refer the docker run command options for the `--env-file` flag where you can specify all required environment variables in a single file. This will save you from writing a potentially long docker run command. Alternatively you can use docker-compose. docker-compose users and Docker Swarm mode users can also use the [secrets and config file options](#docker-secrets-and-configs)*
Below is the complete list of available options that can be used to customize your gitlab installation.
##### `DEBUG`
Set this to `true` to enable entrypoint debugging.
##### `TZ`
Set the container timezone. Defaults to `UTC`. Values are expected to be in Canonical format. Example: `Europe/Amsterdam` See the list of [acceptable values](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones). For configuring the timezone of gitlab see variable `GITLAB_TIMEZONE`.
##### `GITLAB_HOST`
The hostname of the GitLab server. Defaults to `localhost`
##### `GITLAB_CI_HOST`
If you are migrating from GitLab CI use this parameter to configure the redirection to the GitLab service so that your existing runners continue to work without any changes. No defaults.
##### `GITLAB_PORT`
The port of the GitLab server. This value indicates the public port on which the GitLab application will be accessible on the network and appropriately configures GitLab to generate the correct urls. It does not affect the port on which the internal nginx server will be listening on. Defaults to `443` if `GITLAB_HTTPS=true`, else defaults to `80`.
##### `GITLAB_SECRETS_DB_KEY_BASE`
Encryption key for GitLab CI secret variables, as well as import credentials, in the database. Ensure that your key is at least 32 characters long and that you don't lose it. You can generate one using `pwgen -Bsv1 64`. If you are migrating from GitLab CI, you need to set this value to the value of `GITLAB_CI_SECRETS_DB_KEY_BASE`. No defaults.
##### `GITLAB_SECRETS_SECRET_KEY_BASE`
Encryption key for session secrets. Ensure that your key is at least 64 characters long and that you don't lose it. This secret can be rotated with minimal impact - the main effect is that previously-sent password reset emails will no longer work. You can generate one using `pwgen -Bsv1 64`. No defaults.
##### `GITLAB_SECRETS_OTP_KEY_BASE`
Encryption key for OTP related stuff with GitLab. Ensure that your key is at least 64 characters long and that you don't lose it. **If you lose or change this secret, 2FA will stop working for all users.** You can generate one using `pwgen -Bsv1 64`. No defaults.
##### `GITLAB_SECRETS_ENCRYPTED_SETTINGS_KEY_BASE`
Encryption key for encrypted settings related stuff with GitLab. Ensure that your key is at least 64 characters long and that you don't lose it. **If you lose or change this secret, encrypted settings will not work and might cause errors in merge requests and so on** You can generate one using `pwgen -Bsv1 64`. No defaults.
##### `GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_PRIMARY_KEY`
The base key used to encrypt data for non-deterministic `ActiveRecord::Encryption` encrypted columns. This value is used to set `active_record_encryption_primary_key` in `config/secrets.yml`. Ensure that your key is an alphanumeric string. Preferred to be 32 characters long. If you need to set multiple keys, set this parameter in the format `["first_primary_key","second_primary_key"]`. In `docker-compose.yml`, the value must NOT have additional quotes! **If you lose or change this secret, encrypted settings will not work and might cause errors in the API and the web interface.** No defaults.
##### `GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_DETERMINISTIC_KEY`
The base key used to encrypt data for deterministic `ActiveRecord::Encryption` encrypted columns. This value is used to set `active_record_encryption_deterministic_key` in `config/secrets.yml`. Ensure that your key is an alphanumeric string. Preferred to be 32 characters long. If you need to set multiple keys, set this parameter in the format `["first_deterministic_key","second_deterministic_key"]`. In `docker-compose.yml`, the value must NOT have additional quotes! **If you lose or change this secret, encrypted settings will not work and might cause errors in the API and the web interface.** No defaults.
##### `GITLAB_SECRETS_ACTIVE_RECORD_ENCRYPTION_KEY_DERIVATION_SALT`
The salt used to encrypt data for `ActiveRecord::Encryption` encrypted columns. This value is used to set `active_record_encryption_key_derivation_salt` in `config/secrets.yml`. Ensure that your salt is an alphanumeric string. Preferred to be 32 characters long. **If you lose or change this secret, encrypted settings will not work and might cause errors in the API and the web interface.** No defaults.
##### `GITLAB_TIMEZONE`
Configure the timezone for the gitlab application. This configuration does not effect cron jobs. Defaults to `UTC`. See the list of [acceptable values](http://api.rubyonrails.org/classes/ActiveSupport/TimeZone.html). For settings the container timezone which will affect cron, see variable `TZ`
##### `GITLAB_ROOT_PASSWORD`
The password for the root user on firstrun. Defaults to `5iveL!fe`. GitLab requires this to be at least **8 characters long**.
##### `GITLAB_ROOT_EMAIL`
The email for the root user on firstrun. Defaults to `admin@example.com`
##### `GITLAB_EMAIL`
The email address for the GitLab server. Defaults to value of `SMTP_USER`, else defaults to `example@example.com`.
##### `GITLAB_EMAIL_DISPLAY_NAME`
The name displayed in emails sent out by the GitLab mailer. Defaults to `GitLab`.
##### `GITLAB_EMAIL_REPLY_TO`
The reply-to address of emails sent out by GitLab. Defaults to value of `GITLAB_EMAIL`, else defaults to `noreply@example.com`.
##### `GITLAB_EMAIL_SUBJECT_SUFFIX`
The e-mail subject suffix used in e-mails sent by GitLab. No defaults.
##### `GITLAB_EMAIL_ENABLED`
Enable or disable gitlab mailer. Defaults to the `SMTP_ENABLED` configuration.
##### `GITLAB_EMAIL_SMIME_ENABLE`
Enable or disable email S/MIME signing. Defaults is `false`.
##### `GITLAB_EMAIL_SMIME_KEY_FILE`
Specifies the path to a S/MIME private key file in PEM format, unencrypted. Defaults to ``.
##### `GITLAB_EMAIL_SMIME_CERT_FILE`
Specifies the path to a S/MIME public certificate key in PEM format. Defaults to ``.
##### `GITLAB_DEFAULT_THEME`
Default theme ID, by default 2. (1 - Indigo, 2 - Dark, 3 - Light, 4 - Blue, 5 - Green, 6 - Light Indigo, 7 - Light Blue, 8 - Light Green, 9 - Red, 10 - Light Red)
##### `GITLAB_ISSUE_CLOSING_PATTERN`
Issue closing pattern regex. See [GitLab's documentation](https://docs.gitlab.com/ee/administration/issue_closing_pattern.html) for more detail. Defaults to ` \b((?:[Cc]los(?:e[sd]?|ing)|\b[Ff]ix(?:e[sd]|ing)?|\b[Rr]esolv(?:e[sd]?|ing)|\b[Ii]mplement(?:s|ed|ing)?)(:?) +(?:(?:issues? +)?%{issue_ref}(?:(?:, *| +and +)?)|([A-Z][A-Z0-9_]+-\d+))+) ` .
##### `GITLAB_INCOMING_EMAIL_ADDRESS`
The incoming email address for reply by email. Defaults to the value of `IMAP_USER`, else defaults to `reply@example.com`. Please read the [reply by email](http://doc.gitlab.com/ce/incoming_email/README.html) documentation to currently set this parameter.
##### `GITLAB_INCOMING_EMAIL_ENABLED`
Enable or disable gitlab reply by email feature. Defaults to the value of `IMAP_ENABLED`.
##### `GITLAB_SIGNUP_ENABLED`
Enable or disable user signups (first run only). Default is `true`.
##### `GITLAB_IMPERSONATION_ENABLED`
Enable or disable impersonation. Defaults to `true`.
##### `GITLAB_PROJECTS_LIMIT`
Set default projects limit. Defaults to `100`.
##### `GITLAB_USERNAME_CHANGE`
Enable or disable ability for users to change their username. Defaults to `true`.
##### `GITLAB_CREATE_GROUP`
Enable or disable ability for users to create groups. Defaults to `true`.
##### `GITLAB_PROJECTS_ISSUES`
Set if *issues* feature should be enabled by default for new projects. Defaults to `true`.
##### `GITLAB_PROJECTS_MERGE_REQUESTS`
Set if *merge requests* feature should be enabled by default for new projects. Defaults to `true`.
##### `GITLAB_PROJECTS_WIKI`
Set if *wiki* feature should be enabled by default for new projects. Defaults to `true`.
##### `GITLAB_PROJECTS_SNIPPETS`
Set if *snippets* feature should be enabled by default for new projects. Defaults to `false`.
##### `GITLAB_PROJECTS_BUILDS`
Set if *builds* feature should be enabled by default for new projects. Defaults to `true`.
##### `GITLAB_PROJECTS_CONTAINER_REGISTRY`
Set if *container_registry* feature should be enabled by default for new projects. Defaults to `true`.
##### `GITLAB_SHELL_CUSTOM_HOOKS_DIR`
Global custom hooks directory. Defaults to `/home/git/gitlab-shell/hooks`.
##### `GITLAB_WEBHOOK_TIMEOUT`
Sets the timeout for webhooks. Defaults to `10` seconds.
##### `GITLAB_NOTIFY_ON_BROKEN_BUILDS`
Enable or disable broken build notification emails. Defaults to `true`
##### `GITLAB_NOTIFY_PUSHER`
Add pusher to recipients list of broken build notification emails. Defaults to `false`
##### `GITLAB_REPOS_DIR`
The git repositories folder in the container. Defaults to `/home/git/data/repositories`
##### `GITLAB_BACKUP_DIR`
The backup folder in the container. Defaults to `/home/git/data/backups`
##### `GITLAB_BACKUP_DIR_CHOWN`
Optionally change ownership of backup files on start-up. Defaults to `true`
##### `GITLAB_BACKUP_DIR_GROUP`
Optionally group backups into a subfolder. Can also be used to place backups in to a subfolder on remote storage. Not used by default.
##### `GITLAB_BUILDS_DIR`
The build traces directory. Defaults to `/home/git/data/builds`
##### `GITLAB_DOWNLOADS_DIR`
The repository downloads directory. A temporary zip is created in this directory when users click **Download Zip** on a project. Defaults to `/home/git/data/tmp/downloads`.
##### `GITLAB_SHARED_DIR`
The directory to store the build artifacts. Defaults to `/home/git/data/shared`
##### `GITLAB_ARTIFACTS_ENABLED`
Enable/Disable GitLab artifacts support. Defaults to `true`.
##### `GITLAB_ARTIFACTS_DIR`
Directory to store the artifacts. Defaults to `$GITLAB_SHARED_DIR/artifacts`
##### `AWS_ACCESS_KEY_ID`
Default AWS access key to be used for object store. Defaults to `AWS_ACCESS_KEY_ID`
##### `AWS_SECRET_ACCESS_KEY`
Default AWS access key to be used for object store. Defaults to `AWS_SECRET_ACCESS_KEY`
##### `AWS_REGION`
AWS Region. Defaults to `us-east-1`
##### `AWS_HOST`
Configure this for an compatible AWS host like minio. Defaults to `$AWS_HOST`. Defaults to `s3.amazon.com`
##### `AWS_ENDPOINT`
AWS Endpoint like `http://127.0.0.1:9000`. Defaults to `nil`
##### `AWS_PATH_STYLE`
Changes AWS Path Style to 'host/bucket_name/object' instead of 'bucket_name.host/object'. Defaults to `true`
##### `AWS_SIGNATURE_VERSION`
AWS signature version to use. 2 or 4 are valid options. Digital Ocean Spaces and other providers may need 2. Defaults to `4`
##### `GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
Default Google project to use for Object Store.
##### `GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
Default Google service account email to use for Object Store.
##### `GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION`
Default Google key file Defaults to `/gcs/key.json`
##### `GITLAB_OBJECT_STORE_CONNECTION_PROVIDER`
Default object store connection provider. Defaults to `AWS`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_ENABLED`
Enables Object Store for Artifacts that will be remote stored. Defaults to `false`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_REMOTE_DIRECTORY`
Bucket name to store the artifacts. Defaults to `artifacts`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_DIRECT_UPLOAD`
Set to true to enable direct upload of Artifacts without the need of local shared storage. Defaults to `false`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_BACKGROUND_UPLOAD`
Temporary option to limit automatic upload. Defaults to `false`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_PROXY_DOWNLOAD`
Passthrough all downloads via GitLab instead of using Redirects to Object Storage. Defaults to `false`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_PROVIDER`
Connection Provider for the Object Store. (`AWS` or `Google`) Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_PROVIDER` (`AWS`)
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_ACCESS_KEY_ID`
AWS Access Key ID for the Bucket. Defaults to `$AWS_ACCESS_KEY_ID`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_SECRET_ACCESS_KEY`
AWS Secret Access Key. Defaults to `$AWS_SECRET_ACCESS_KEY`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_REGION`
AWS Region. Defaults to `$AWS_REGION`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_HOST`
Configure this for an compatible AWS host like minio. Defaults to `$AWS_HOST`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
AWS Endpoint like `http://127.0.0.1:9000`. Defaults to `$AWS_ENDPOINT`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_PATH_STYLE`
Changes AWS Path Style to 'host/bucket_name/object' instead of 'bucket_name.host/object'. Defaults to `$AWS_PATH_STYLE`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_AWS_SIGNATURE_VERSION`
AWS signature version to use. 2 or 4 are valid options. Digital Ocean Spaces and other providers may need 2. Defaults to `$AWS_SIGNATURE_VERSION`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
Google project. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
Google service account. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
##### `GITLAB_ARTIFACTS_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION`
Default Google key file. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION` (`/gcs/key.json`)
##### `GITLAB_PIPELINE_SCHEDULE_WORKER_CRON`
Cron notation for the GitLab pipeline schedule worker. Defaults to `'19 * * * *'`
##### `GITLAB_LFS_ENABLED`
Enable/Disable Git LFS support. Defaults to `true`.
##### `GITLAB_LFS_OBJECTS_DIR`
Directory to store the lfs-objects. Defaults to `$GITLAB_SHARED_DIR/lfs-objects`
##### `GITLAB_LFS_OBJECT_STORE_ENABLED`
Enables Object Store for LFS that will be remote stored. Defaults to `false`
##### `GITLAB_LFS_OBJECT_STORE_REMOTE_DIRECTORY`
Bucket name to store the LFS. Defaults to `lfs-object`
##### `GITLAB_LFS_OBJECT_STORE_BACKGROUND_UPLOAD`
Temporary option to limit automatic upload. Defaults to `false`
##### `GITLAB_LFS_OBJECT_STORE_PROXY_DOWNLOAD`
Passthrough all downloads via GitLab instead of using Redirects to Object Storage. Defaults to `false`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_PROVIDER`
Connection Provider for the Object Store. (`AWS` or `Google`) Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_PROVIDER` (`AWS`)
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_ACCESS_KEY_ID`
AWS Access Key ID for the Bucket. Defaults to `AWS_ACCESS_KEY_ID`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_SECRET_ACCESS_KEY`
AWS Secret Access Key. Defaults to `AWS_SECRET_ACCESS_KEY`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_REGION`
AWS Region. Defaults to `$AWS_REGION`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_HOST`
Configure this for an compatible AWS host like minio. Defaults to `$AWS_HOST`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
AWS Endpoint like `http://127.0.0.1:9000`. Defaults to `$AWS_ENDPOINT`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_PATH_STYLE`
Changes AWS Path Style to 'host/bucket_name/object' instead of 'bucket_name.host/object'. Defaults to `$AWS_PATH_STYLE`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_AWS_SIGNATURE_VERSION`
AWS signature version to use. 2 or 4 are valid options. Digital Ocean Spaces and other providers may need 2. Defaults to `$AWS_SIGNATURE_VERSION`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
Google project. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
Google service account. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
##### `GITLAB_LFS_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION`
Default Google key file. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION` (`/gcs/key.json`)
##### `GITLAB_PACKAGES_ENABLED`
Enable/Disable Packages support. Defaults to `true`.
##### `GITLAB_PACKAGES_DIR`
Directory to store the packages data. Defaults to `$GITLAB_SHARED_DIR/packages`
##### `GITLAB_PACKAGES_OBJECT_STORE_ENABLED`
Enables Object Store for Packages that will be remote stored. Defaults to `false`
##### `GITLAB_PACKAGES_OBJECT_STORE_REMOTE_DIRECTORY`
Bucket name to store the packages. Defaults to `packages`
##### `GITLAB_PACKAGES_OBJECT_STORE_DIRECT_UPLOAD`
Set to true to enable direct upload of Packages without the need of local shared storage. Defaults to `false`
##### `GITLAB_PACKAGES_OBJECT_STORE_BACKGROUND_UPLOAD`
Temporary option to limit automatic upload. Defaults to `false`
##### `GITLAB_PACKAGES_OBJECT_STORE_PROXY_DOWNLOAD`
Passthrough all downloads via GitLab instead of using Redirects to Object Storage. Defaults to `false`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_PROVIDER`
Connection Provider for the Object Store. (`AWS` or `Google`) Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_PROVIDER` (`AWS`)
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_AWS_ACCESS_KEY_ID`
AWS Access Key ID for the Bucket. Defaults to `$AWS_ACCESS_KEY_ID`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_AWS_SECRET_ACCESS_KEY`
AWS Secret Access Key. Defaults to `$AWS_SECRET_ACCESS_KEY`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_AWS_REGION`
AWS Region. Defaults to `$AWS_REGION`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_AWS_HOST`
Configure this for an compatible AWS host like minio. Defaults to `$AWS_HOST`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
AWS Endpoint like `http://127.0.0.1:9000`. Defaults to `$AWS_ENDPOINT`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_AWS_PATH_STYLE`
Changes AWS Path Style to 'host/bucket_name/object' instead of 'bucket_name.host/object'. Defaults to `AWS_PATH_STYLE`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
Google project. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
Google service account. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
##### `GITLAB_PACKAGES_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION`
Default Google key file. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION` (`/gcs/key.json`)
##### `GITLAB_TERRAFORM_STATE_ENABLED`
Enable/Disable Terraform State support. Defaults to `true`.
##### `GITLAB_TERRAFORM_STATE_STORAGE_PATH`
Directory to store the terraform state data. Defaults to `$GITLAB_SHARED_DIR/terraform_state`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_ENABLED`
Enables Object Store for Terraform state that will be remote stored. Defaults to `false`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_REMOTE_DIRECTORY`
Bucket name to store the Terraform state. Defaults to `terraform_state`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_PROVIDER`
Connection Provider for the Object Store (AWS or Google). Defaults to $GITLAB_OBJECT_STORE_CONNECTION_PROVIDER (i.e. AWS).
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_AWS_ACCESS_KEY_ID`
AWS Access Key ID for the Bucket. Defaults to `$AWS_ACCESS_KEY_ID`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_AWS_SECRET_ACCESS_KEY`
AWS Secret Access Key. Defaults to `$AWS_SECRET_ACCESS_KEY`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_AWS_REGION`
AWS Region. Defaults to `$AWS_REGION`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_AWS_HOST`
Configure this for an compatible AWS host like minio. Defaults to `$AWS_HOST`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
AWS Endpoint like `http://127.0.0.1:9000`. Defaults to `$AWS_ENDPOINT`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_AWS_PATH_STYLE`
Changes AWS Path Style to 'host/bucket_name/object' instead of 'bucket_name.host/object'. Defaults to `AWS_PATH_STYLE`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
Google project. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
Google service account. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
##### `GITLAB_TERRAFORM_STATE_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION`
Default Google key file. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION` (`/gcs/key.json`)
##### `GITLAB_UPLOADS_STORAGE_PATH`
The location where uploads objects are stored. Defaults to `$GITLAB_SHARED_DIR/public`.
##### `GITLAB_UPLOADS_BASE_DIR`
Mapping for the `GITLAB_UPLOADS_STORAGE_PATH`. Defaults to `uploads/-/system`
##### `GITLAB_UPLOADS_OBJECT_STORE_ENABLED`
Enables Object Store for UPLOADS that will be remote stored. Defaults to `false`
##### `GITLAB_UPLOADS_OBJECT_STORE_REMOTE_DIRECTORY`
Bucket name to store the UPLOADS. Defaults to `uploads`
##### `GITLAB_UPLOADS_OBJECT_STORE_BACKGROUND_UPLOAD`
Temporary option to limit automatic upload. Defaults to `false`
##### `GITLAB_UPLOADS_OBJECT_STORE_PROXY_DOWNLOAD`
Passthrough all downloads via GitLab instead of using Redirects to Object Storage. Defaults to `false`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_PROVIDER`
Connection Provider for the Object Store. (`AWS` or `Google`) Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_PROVIDER` (`AWS`)
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_ACCESS_KEY_ID`
AWS Access Key ID for the Bucket. Defaults to `AWS_ACCESS_KEY_ID`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_SECRET_ACCESS_KEY`
AWS Secret Access Key. Defaults to `AWS_SECRET_ACCESS_KEY`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_REGION`
AWS Region. Defaults to `$AWS_REGION`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_HOST`
Configure this for an compatible AWS host like minio. Defaults to `$AWS_HOST`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_ENDPOINT`
AWS Endpoint like `http://127.0.0.1:9000`. Defaults to `$AWS_ENDPOINT`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_AWS_PATH_STYLE`
Changes AWS Path Style to 'host/bucket_name/object' instead of 'bucket_name.host/object'. Defaults to `AWS_PATH_STYLE`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
Google project. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_PROJECT`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
Google service account. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_CLIENT_EMAIL`
##### `GITLAB_UPLOADS_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION`
Default Google key file. Defaults to `$GITLAB_OBJECT_STORE_CONNECTION_GOOGLE_JSON_KEY_LOCATION` (`/gcs/key.json`)
##### `GITLAB_MATTERMOST_ENABLED`
Enable/Disable GitLab Mattermost for *Add Mattermost button*. Defaults to `false`.
##### `GITLAB_MATTERMOST_URL`
Sets Mattermost URL. Defaults to `https://mattermost.example.com`.
##### `GITLAB_BACKUP_SCHEDULE`
Setup cron job to automatic backups. Possible values `disable`, `daily`, `weekly` or `monthly`. Disabled by default
##### `GITLAB_BACKUP_EXPIRY`
Configure how long (in seconds) to keep backups before they are deleted. By default when automated backups are disabled backups are kept forever (0 seconds), else the backups expire in 7 days (604800 seconds).
##### `GITLAB_BACKUP_PG_SCHEMA`
Specify the PostgreSQL schema for the backups. No defaults, which means that all schemas will be backed up. see #524
##### `GITLAB_BACKUP_ARCHIVE_PERMISSIONS`
Sets the permissions of the backup archives. Defaults to `0600`. [See](http://doc.gitlab.com/ce/raketasks/backup_restore.html#backup-archive-permissions)
##### `GITLAB_BACKUP_TIME`
Set a time for the automatic backups in `HH:MM` format. Defaults to `04:00`.
##### `GITLAB_BACKUP_SKIP`
Specified sections are skipped by the backups. Defaults to empty, i.e. `lfs,uploads`. [See](http://doc.gitlab.com/ce/raketasks/backup_restore.html#create-a-backup-of-the-gitlab-system)
##### `GITLAB_SSH_HOST`
The ssh host. Defaults to **GITLAB_HOST**.
##### `GITLAB_SSH_LISTEN_PORT`
The ssh port for SSHD to listen on. Defaults to `22`
##### `GITLAB_SSH_MAXSTARTUPS`
The ssh "MaxStartups" parameter, defaults to `10:30:60`.
##### `GITLAB_SSH_PORT`
The ssh port number. Defaults to `$GITLAB_SSH_LISTEN_PORT`.
##### `GITLAB_RELATIVE_URL_ROOT`
The relative url of the GitLab server, e.g. `/git`. No default.
##### `GITLAB_TRUSTED_PROXIES`
Add IP address reverse proxy to trusted proxy list, otherwise users will appear signed in from that address. Currently only a single entry is permitted. No defaults.
##### `GITLAB_REGISTRY_ENABLED`
Enables the GitLab Container Registry. Defaults to `false`.
##### `GITLAB_REGISTRY_HOST`
Sets the GitLab Registry Host. Defaults to `registry.example.com`
##### `GITLAB_REGISTRY_PORT`
Sets the GitLab Registry Port. Defaults to `443`.
##### `GITLAB_REGISTRY_API_URL`
Sets the GitLab Registry API URL. Defaults to `http://localhost:5000`
##### `GITLAB_REGISTRY_KEY_PATH`
Sets the GitLab Registry Key Path. Defaults to `config/registry.key`
##### `GITLAB_REGISTRY_DIR`
Directory to store the container images will be shared with registry. Defaults to `$GITLAB_SHARED_DIR/registry`
##### `GITLAB_REGISTRY_ISSUER`
Sets the GitLab Registry Issuer. Defaults to `gitlab-issuer`.
##### `GITLAB_REGISTRY_GENERATE_INTERNAL_CERTIFICATES`
Set to `true` to generate SSL internal Registry keys. Used to communicate between a Docker Registry and GitLab. It will generate a self-signed certificate key at the location given by `$GITLAB_REGISTRY_KEY_PATH`, e.g. `/certs/registry.key`. And will generate the certificate file at the same location, with the same name, but changing the extension from `key` to `crt`, e.g. `/certs/registry.crt`
##### `GITLAB_PAGES_ENABLED`
Enables the GitLab Pages. Defaults to `false`.
##### `GITLAB_PAGES_DOMAIN`
Sets the GitLab Pages Domain. Defaults to `example.com`
##### `GITLAB_PAGES_DIR`
Sets GitLab Pages directory where all pages will be stored. Defaults to `$GITLAB_SHARED_DIR/pages`
##### `GITLAB_PAGES_PORT`
Sets GitLab Pages Port that will be used in NGINX. Defaults to `80`
##### `GITLAB_PAGES_HTTPS`
Sets GitLab Pages to HTTPS and the gitlab-pages-ssl config will be used. Defaults to `false`
##### `GITLAB_PAGES_ARTIFACTS_SERVER`
Set to `true` to enable pages artifacts server, enabled by default.
##### `GITLAB_PAGES_ARTIFACTS_SERVER_URL`
If `GITLAB_PAGES_ARTIFACTS_SERVER` is enabled, set to API endpoint for GitLab Pages (e.g. `https://example.com/api/v4`). No default.
##### `GITLAB_PAGES_EXTERNAL_HTTP`
Sets GitLab Pages external http to receive request on an independent port. Disabled by default
##### `GITLAB_PAGES_EXTERNAL_HTTPS`
Sets GitLab Pages external https to receive request on an independent port. Disabled by default
##### `GITLAB_PAGES_ACCESS_CONTROL`
Set to `true` to enable access control for pages. Allows access to a Pages site to be controlled based on a user’s membership to that project. Disabled by default.
##### `GITLAB_PAGES_NGINX_PROXY`
Disable the nginx proxy for gitlab pages, defaults to `true`. When set to `false` this will turn off the nginx proxy to the gitlab pages daemon, used when the user provides their own http load balancer in combination with a gitlab pages custom domain setup.
##### `GITLAB_PAGES_ACCESS_SECRET`
Secret Hash, minimal 32 characters, if omitted, it will be auto generated.
##### `GITLAB_PAGES_ACCESS_CONTROL_SERVER`
Gitlab instance URI, example: `https://gitlab.example.io`
##### `GITLAB_PAGES_ACCESS_CLIENT_ID`
Client ID from earlier generated OAuth application
##### `GITLAB_PAGES_ACCESS_CLIENT_SECRET`
Client Secret from earlier generated OAuth application
##### `GITLAB_PAGES_ACCESS_REDIRECT_URI`
Redirect URI, non existing pages domain to redirect to pages daemon, `https://projects.example.io/auth`
##### `GITLAB_PAGES_NAMESPACE_IN_PATH`
Enable namespace-in-path option for gitlab pages, defaults to `false`.
##### `GITLAB_PAGES_LOG_VERBOSE`
Enable verbose logging for gitlab pages, defaults to `false`.
##### `GITLAB_HTTPS`
Set to `true` to enable https support, disabled by default.
##### `GITALY_CLIENT_PATH`
Set default path for gitaly. defaults to `/home/git/gitaly`
##### `GITALY_TOKEN`
Set a gitaly token, blank by default.
##### `GITLAB_MONITORING_UNICORN_SAMPLER_INTERVAL`
Time between sampling of unicorn socket metrics, in seconds, defaults to `10`
##### `GITLAB_MONITORING_IP_WHITELIST`
IP whitelist to access monitoring endpoints. No defaults.
##### `GITLAB_MONITORING_SIDEKIQ_EXPORTER_ENABLED`
Set to `true` to enable the sidekiq exporter, enabled by default.
##### `GITLAB_MONITORING_SIDEKIQ_EXPORTER_ADDRESS`
Sidekiq exporter address, defaults to `0.0.0.0`
##### `GITLAB_MONITORING_SIDEKIQ_EXPORTER_PORT`
Sidekiq exporter port, defaults to `3807`
##### `GITLAB_CONTENT_SECURITY_POLICY_ENABLED`
Set to `true` to enable [Content Security Policy](https://guides.rubyonrails.org/security.html#content-security-policy), enabled by default.
##### `GITLAB_CONTENT_SECURITY_POLICY_REPORT_ONLY`
Set to `true` to set `Content-Security-Policy-Report-Only` header, disabled by default
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_BASE_URI`
The value of the `base-uri` directive in the `Content-Security-Policy` header
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_CHILD_SRC`
The value of the `child-src` directive in the `Content-Security-Policy` header
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_CONNECT_SRC`
The value of the `connect-src` directive in the `Content-Security-Policy` header. Default to `'self' http://localhost:* ws://localhost:* wss://localhost:*`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_DEFAULT_SRC`
The value of the `default-src` directive in the `Content-Security-Policy` header. Default to `'self'`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_FONT_SRC`
The value of the `font-src` directive in the `Content-Security-Policy` header
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_FORM_ACTION`
The value of the `form-action` directive in the `Content-Security-Policy` header
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_FRAME_ANCESTORS`
The value of the `frame-ancestors` directive in the `Content-Security-Policy` header. Default to `'self'`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_FRAME_SRC`
The value of the `frame-src` directive in the `Content-Security-Policy` header. Default to `'self' https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://content.googleapis.com https://content-compute.googleapis.com https://content-cloudbilling.googleapis.com https://content-cloudresourcemanager.googleapis.com`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_IMG_SRC`
The value of the `img-src` directive in the `Content-Security-Policy` header. Default to `* data: blob:`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_MANIFEST_SRC`
The value of the `manifest-src` directive in the `Content-Security-Policy` header
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_MEDIA_SRC`
The value of the `media-src` directive in the `Content-Security-Policy` header
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_OBJECT_SRC`
The value of the `object-src` directive in the `Content-Security-Policy` header. Default to `'none'`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_SCRIPT_SRC`
The value of the `script-src` directive in the `Content-Security-Policy` header. Default to `'self' 'unsafe-eval' http://localhost:* https://www.google.com/recaptcha/ https://www.recaptcha.net/ https://www.gstatic.com/recaptcha/ https://apis.google.com`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_STYLE_SRC`
The value of the `style-src` directive in the `Content-Security-Policy` header. Default to `'self' 'unsafe-inline'`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_WORKER_SRC`
The value of the `worker-src` directive in the `Content-Security-Policy` header. Default to `'self' blob:`
##### `GITLAB_CONTENT_SECURITY_POLICY_DIRECTIVES_REPORT_URI`
The value of the `report-uri` directive in the `Content-Security-Policy` header
##### `GITLAB_FEATURE_FLAGS_DISABLE_TARGETS`
Comma separated list of feature flag names to be disabled. No whitespace is allowed.
You can see all feature flags in GitLab at corresponding version of documentation: <https://docs.gitlab.com/ee/user/feature_flags.html>
Feature flags name and its statement will be appear to container log. Note that some of the feature flags are implicitly enabled or disabled by GitLab itself, and are not appear to container log.
No defaults.
##### `GITLAB_FEATURE_FLAGS_ENABLE_TARGETS`
This parameter is the same as [`GITLAB_FEATURE_FLAGS_DISABLE_TARGETS`](#gitlab_feature_flags_enable_targets), except its purpose is to enable the feature flag. No defaults.
##### `SSL_SELF_SIGNED`
Set to `true` when using self-signed ssl certificates. `false` by default.
##### `SSL_CERTIFICATE_PATH`
Location of the ssl certificate. Defaults to `/home/git/data/certs/gitlab.crt`
##### `SSL_KEY_PATH`
Location of the ssl private key. Defaults to `/home/git/data/certs/gitlab.key`
##### `SSL_DHPARAM_PATH`
Location of the dhparam file. Defaults to `/home/git/data/certs/dhparam.pem`
##### `SSL_VERIFY_CLIENT`
Enable verification of client certificates using the `SSL_CA_CERTIFICATES_PATH` file or setting this variable to `on`. Defaults to `off`
##### `SSL_CA_CERTIFICATES_PATH`
List of SSL certificates to trust. Defaults to `/home/git/data/certs/ca.crt`.
##### `SSL_REGISTRY_KEY_PATH`
Location of the ssl private key for gitlab container registry. Defaults to `/home/git/data/certs/registry.key`
##### `SSL_REGISTRY_CERT_PATH`
Location of the ssl certificate for the gitlab container registry. Defaults to `/home/git/data/certs/registry.crt`
##### `SSL_PAGES_KEY_PATH`
Location of the ssl private key for gitlab pages. Defaults to `/home/git/data/certs/pages.key`
##### `SSL_PAGES_CERT_PATH`
Location of the ssl certificate for the gitlab pages. Defaults to `/home/git/data/certs/pages.crt`
##### `SSL_CIPHERS`
List of supported SSL ciphers: Defaults to `ECDHE-RSA-AES256-GCM-SHA384:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-SHA384:ECDHE-RSA-AES128-SHA256:ECDHE-RSA-AES256-SHA:ECDHE-RSA-AES128-SHA:ECDHE-RSA-DES-CBC3-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!MD5:!PSK:!RC4`
##### `SSL_PROTOCOLS`
List of supported SSL protocols: Defaults to `TLSv1 TLSv1.1 TLSv1.2 TLSv1.3`
##### `SSL_PAGES_CIPHERS`
List of supported SSL ciphers for the gitlab pages: Defaults to `SSL_CIPHERS`
##### `SSL_PAGES_PROTOCOLS`
List of supported SSL protocols for the gitlab pages: Defaults to `SSL_PROTOCOLS`
##### `SSL_REGISTRY_CIPHERS`
List of supported SSL ciphers for gitlab container registry: Defaults to `SSL_CIPHERS`
##### `SSL_REGISTRY_PROTOCOLS`
List of supported SSL protocols for gitlab container registry: Defaults to `SSL_PROTOCOLS`
##### `NGINX_WORKERS`
The number of nginx workers to start. Defaults to `1`.
##### `NGINX_SERVER_NAMES_HASH_BUCKET_SIZE`
Sets the bucket size for the server names hash tables. This is needed when you have long server_names or your an error message from nginx like *nginx: [emerg] could not build server_names_hash, you should increase server_names_hash_bucket_size:..*. It should be only increment by a power of 2. Defaults to `32`.
##### `NGINX_HSTS_ENABLED`
Advanced configuration option for turning off the HSTS configuration. Applicable only when SSL is in use. Defaults to `true`. See [#138](https://github.com/sameersbn/docker-gitlab/issues/138) for use case scenario.
##### `NGINX_HSTS_MAXAGE`
Advanced configuration option for setting the HSTS max-age in the gitlab nginx vHost configuration. Applicable only when SSL is in use. Defaults to `31536000`.
##### `NGINX_PROXY_BUFFERING`
Enable `proxy_buffering`. Defaults to `off`.
##### `NGINX_ACCEL_BUFFERING`
Enable `X-Accel-Buffering` header. Default to `no`
##### `NGINX_X_FORWARDED_PROTO`
Advanced configuration option for the `proxy_set_header X-Forwarded-Proto` setting in the gitlab nginx vHost configuration. Defaults to `https` when `GITLAB_HTTPS` is `true`, else defaults to `$scheme`.
##### `NGINX_REAL_IP_RECURSIVE`
set to `on` if docker container runs behind a reverse proxy,you may not want the IP address of the proxy to show up as the client address. `off` by default.
##### `NGINX_REAL_IP_TRUSTED_ADDRESSES`
You can have NGINX look for a different address to use by adding your reverse proxy to the `NGINX_REAL_IP_TRUSTED_ADDRESSES`. Currently only a single entry is permitted. No defaults.
##### `NGINX_CUSTOM_GITLAB_SERVER_CONFIG`
Advanced configuration option. You can add custom configuration for nginx as you like (e.g. custom location proxy). This is similar to setting `nginx['custom_gitlab_server_config']` to `gitlab.rb` for gitlab-omnibus. No defaults.
##### `REDIS_HOST`
The hostname of the redis server. Defaults to `localhost`
##### `REDIS_PORT`
The connection port of the redis server. Defaults to `6379`.
##### `REDIS_DB_NUMBER`
The redis database number. Defaults to '0'.
##### `PUMA_WORKERS`
The number of puma workers to start. Defaults to `3`.
##### `PUMA_TIMEOUT`
Sets the timeout of puma worker processes. Defaults to `60` seconds.
##### `PUMA_THREADS_MIN`
The number of puma minimum threads. Defaults to `1`.
##### `PUMA_THREADS_MAX`
The number of puma maximum threads. Defaults to `16`.
##### `PUMA_PER_WORKER_MAX_MEMORY_MB`
Maximum memory size of per puma worker process. Defaults to `1024`.
##### `PUMA_MASTER_MAX_MEMORY_MB`
Maximum memory size of puma master process. Defaults to `800`.
##### `SIDEKIQ_CONCURRENCY`
The number of concurrent sidekiq jobs to run. Defaults to `25`
##### `SIDEKIQ_SHUTDOWN_TIMEOUT`
Timeout for sidekiq shutdown. Defaults to `4`
##### `SIDEKIQ_MEMORY_KILLER_MAX_RSS`
Non-zero value enables the SidekiqMemoryKiller. Defaults to `2000000`. For additional options refer [Configuring the MemoryKiller](http://doc.gitlab.com/ce/operations/sidekiq_memory_killer.html)
##### `GITLAB_SIDEKIQ_LOG_FORMAT`
Sidekiq log format that will be used. Defaults to `json`
##### `DB_ADAPTER`
The database type. Currently only postgresql is supported. Possible values: `postgresql`. Defaults to `postgresql`.
##### `DB_ENCODING`
The database encoding. For `DB_ADAPTER` values `postgresql` this parameter defaults and `utf8` respectively.
##### `DB_HOST`
The database server hostname. Defaults to `localhost`.
##### `DB_PORT`
The database server port. Defaults to `5432` for postgresql.
##### `DB_NAME`
The database database name. Defaults to `gitlabhq_production`
##### `DB_USER`
The database database user. Defaults to `root`
##### `DB_PASS`
The database database password. Defaults to no password
##### `DB_POOL`
The database database connection pool count. Defaults to `10`.
##### `DB_PREPARED_STATEMENTS`
Whether to use database prepared statements. No defaults. But set to `false` if you want to use with [PgBouncer](https://pgbouncer.github.io/)
##### `SMTP_ENABLED`
Enable mail delivery via SMTP. Defaults to `true` if `SMTP_USER` is defined, else defaults to `false`.
##### `SMTP_DOMAIN`
SMTP domain. Defaults to `www.gmail.com`
##### `SMTP_HOST`
SMTP server host. Defaults to `smtp.gmail.com`.
##### `SMTP_PORT`
SMTP server port. Defaults to `587`.
##### `SMTP_USER`
SMTP username.
##### `SMTP_PASS`
SMTP password.
##### `SMTP_STARTTLS`
Enable STARTTLS. Defaults to `true`.
##### `SMTP_TLS`
Enable SSL/TLS. Defaults to `false`.
##### `SMTP_OPENSSL_VERIFY_MODE`
SMTP openssl verification mode. Accepted values are `none`, `peer`, `client_once` and `fail_if_no_peer_cert`. Defaults to `none`.
##### `SMTP_AUTHENTICATION`
Specify the SMTP authentication method. Defaults to `login` if `SMTP_USER` is set.
##### `SMTP_CA_ENABLED`
Enable custom CA certificates for SMTP email configuration. Defaults to `false`.
##### `SMTP_CA_PATH`
Specify the `ca_path` parameter for SMTP email configuration. Defaults to `/home/git/data/certs`.
##### `SMTP_CA_FILE`
Specify the `ca_file` parameter for SMTP email configuration. Defaults to `/home/git/data/certs/ca.crt`.
##### `IMAP_ENABLED`
Enable mail delivery via IMAP. Defaults to `true` if `IMAP_USER` is defined, else defaults to `false`.
##### `IMAP_HOST`
IMAP server host. Defaults to `imap.gmail.com`.
##### `IMAP_PORT`
IMAP server port. Defaults to `993`.
##### `IMAP_USER`
IMAP username.
##### `IMAP_PASS`
IMAP password.
##### `IMAP_SSL`
Enable SSL. Defaults to `true`.
##### `IMAP_STARTTLS`
Enable STARTTLS. Defaults to `false`.
##### `IMAP_MAILBOX`
The name of the mailbox where incoming mail will end up. Defaults to `inbox`.
##### `LDAP_ENABLED`
Enable LDAP. Defaults to `false`
##### `LDAP_LABEL`
Label to show on login tab for LDAP server. Defaults to 'LDAP'
##### `LDAP_HOST`
LDAP Host
##### `LDAP_PORT`
LDAP Port. Defaults to `389`
##### `LDAP_UID`
LDAP UID. Defaults to `sAMAccountName`
##### `LDAP_METHOD`
LDAP method, Possible values are `simple_tls`, `start_tls` and `plain`. Defaults to `plain`
##### `LDAP_VERIFY_SSL`
LDAP verify ssl certificate for installations that are using `LDAP_METHOD: 'simple_tls'` or `LDAP_METHOD: 'start_tls'`. Defaults to `true`
##### `LDAP_CA_FILE`
Specifies the path to a file containing a PEM-format CA certificate. Defaults to ``
##### `LDAP_SSL_VERSION`
Specifies the SSL version for OpenSSL to use, if the OpenSSL default is not appropriate. Example: 'TLSv1_1'. Defaults to ``
##### `LDAP_BIND_DN`
No default.
##### `LDAP_PASS`
LDAP password
##### `LDAP_TIMEOUT`
Timeout, in seconds, for LDAP queries. Defaults to `10`.
##### `LDAP_ACTIVE_DIRECTORY`
Specifies if LDAP server is Active Directory LDAP server. If your LDAP server is not AD, set this to `false`. Defaults to `true`,
##### `LDAP_ALLOW_USERNAME_OR_EMAIL_LOGIN`
If enabled, GitLab will ignore everything after the first '@' in the LDAP username submitted by the user on login. Defaults to `false` if `LDAP_UID` is `userPrincipalName`, else `true`.
##### `LDAP_BLOCK_AUTO_CREATED_USERS`
Locks down those users until they have been cleared by the admin. Defaults to `false`.
##### `LDAP_BASE`
Base where we can search for users. No default.
##### `LDAP_USER_FILTER`
Filter LDAP users. No default.
##### `LDAP_USER_ATTRIBUTE_USERNAME`
Attribute fields for the identification of a user. Default to `['uid', 'userid', 'sAMAccountName']`
##### `LDAP_USER_ATTRIBUTE_MAIL`
Attribute fields for the shown mail address. Default to `['mail', 'email', 'userPrincipalName']`
##### `LDAP_USER_ATTRIBUTE_NAME`
Attribute field for the used username of a user. Defaults to `cn`.
##### `LDAP_USER_ATTRIBUTE_FIRSTNAME`
Attribute field for the forename of a user. Default to `givenName`
##### `LDAP_USER_ATTRIBUTE_LASTNAME`
Attribute field for the surname of a user. Default to `sn`
##### `LDAP_LOWERCASE_USERNAMES`
GitLab will lower case the username for the LDAP Server. Defaults to `false`
##### `LDAP_PREVENT_LDAP_SIGN_IN`
Set to `true` to [Disable LDAP web sign in](https://docs.gitlab.com/ce/administration/auth/ldap/#disable-ldap-web-sign-in), defaults to `false`
##### `OAUTH_ENABLED`
Enable OAuth support. Defaults to `true` if any of the support OAuth providers is configured, else defaults to `false`.
##### `OAUTH_AUTO_SIGN_IN_WITH_PROVIDER`
Automatically sign in with a specific OAuth provider without showing GitLab sign-in page. Accepted values are `cas3`, `github`, `bitbucket`, `gitlab`, `google_oauth2`, `facebook`, `twitter`, `saml`, `crowd`, `auth0` and `azure_oauth2`. No default.
##### `OAUTH_ALLOW_SSO`
Comma separated list of oauth providers for single sign-on. This allows users to login without having a user account. The account is created automatically when authentication is successful. Accepted values are `cas3`, `github`, `bitbucket`, `gitlab`, `google_oauth2`, `facebook`, `twitter`, `saml`, `crowd`, `auth0` and `azure_oauth2`. No default.
##### `OAUTH_BLOCK_AUTO_CREATED_USERS`
Locks down those users until they have been cleared by the admin. Defaults to `true`.
##### `OAUTH_AUTO_LINK_LDAP_USER`
Look up new users in LDAP servers. If a match is found (same uid), automatically link the omniauth identity with the LDAP account. Defaults to `false`.
##### `OAUTH_AUTO_LINK_SAML_USER`
Allow users with existing accounts to login
gitextract_0o0z_sra/
├── .circleci/
│ └── config.yml
├── .dockerignore
├── .github/
│ └── stale.yml
├── .gitignore
├── .gitlab-ci.yml
├── CI_MIGRATION.md
├── CONTRIBUTING.md
├── Changelog.md
├── Dockerfile
├── LICENSE
├── Makefile
├── README.md
├── VERSION
├── assets/
│ ├── build/
│ │ ├── config/
│ │ │ └── database.yml.postgresql
│ │ ├── install.sh
│ │ └── patches/
│ │ ├── gitlabhq/
│ │ │ ├── 0001-fix-feature-checking-for-gitaly-on-a-fresh-install.patch.bak
│ │ │ ├── 0002-fix-condition-for-csr-policy-allow-lfs_v16.3.0.patch.bak
│ │ │ ├── 0003-fix_preinstall.mjs-to-avoid-removing-node_modules_dir.patch.bak
│ │ │ ├── 0004-fix-raketask-gitlab-assets-compile.patch.bak
│ │ │ └── 0005_fix-gitlab-setup-mr225503.patch
│ │ └── ruby/
│ │ └── 0001-avoid-seeding_until-ruby3.3.0.bak
│ └── runtime/
│ ├── config/
│ │ ├── gitaly/
│ │ │ └── config.toml
│ │ ├── gitlab-pages/
│ │ │ └── config
│ │ ├── gitlab-shell/
│ │ │ └── config.yml
│ │ ├── gitlabhq/
│ │ │ ├── cable.yml
│ │ │ ├── database.yml
│ │ │ ├── gitlab.yml
│ │ │ ├── puma.rb
│ │ │ ├── relative_url.rb
│ │ │ ├── resque.yml
│ │ │ ├── secrets.yml
│ │ │ └── smtp_settings.rb
│ │ └── nginx/
│ │ ├── gitlab
│ │ ├── gitlab-pages
│ │ ├── gitlab-pages-ssl
│ │ ├── gitlab-registry
│ │ ├── gitlab-ssl
│ │ └── gitlab_ci
│ ├── env-defaults
│ ├── functions
│ └── scripts/
│ └── configure_feature_flags.rb
├── contrib/
│ ├── docker-swarm/
│ │ ├── docker-compose.yml
│ │ ├── gitlab.configs
│ │ └── gitlab.secrets
│ └── expose-gitlab-ssh-port.sh
├── docker-compose.swarm.yml
├── docker-compose.yml
├── docs/
│ ├── container_registry.md
│ ├── docker-compose-keycloak.yml
│ ├── docker-compose-registry.yml
│ ├── docker-swarm-traefik-registry.md
│ ├── exposing-ssh-port.md
│ ├── keycloak-idp.md
│ └── s3_compatible_storage.md
├── entrypoint.sh
├── hooks/
│ └── build
├── kubernetes/
│ ├── deploy.sh
│ ├── gitlab-rc.yml
│ ├── gitlab-svc.yml
│ ├── postgresql-rc.yml
│ ├── postgresql-svc.yml
│ ├── redis-rc.yml
│ ├── redis-svc.yml
│ └── teardown.sh
└── scripts/
└── release-notes.sh
SYMBOL INDEX (4 symbols across 1 files)
FILE: assets/runtime/scripts/configure_feature_flags.rb
class FeatureFlagCLI (line 13) | class FeatureFlagCLI
method available_feature_flags (line 14) | def available_feature_flags()
method parse_options (line 28) | def parse_options(argv = ARGV)
method run (line 62) | def run
Condensed preview — 65 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (581K chars).
[
{
"path": ".circleci/config.yml",
"chars": 11416,
"preview": "version: 2.1\n\norbs:\n shellcheck: circleci/shellcheck@3.4.0\n docker: circleci/docker@2.8.2\n go: circleci/go@1.11.0\n\nco"
},
{
"path": ".dockerignore",
"chars": 88,
"preview": ".git\n.gitignore\nLICENSE\nVERSION\nREADME.md\nChangelog.md\nMakefile\ndocker-compose.yml\ndocs\n"
},
{
"path": ".github/stale.yml",
"chars": 740,
"preview": "# Number of days of inactivity before an issue becomes stale\ndaysUntilStale: 60\n# Number of days of inactivity before a "
},
{
"path": ".gitignore",
"chars": 25,
"preview": "*.gem\n*.tar.gz\n*.tar.bz2\n"
},
{
"path": ".gitlab-ci.yml",
"chars": 1778,
"preview": "image: docker:18-git\n\nstages:\n - build\n\nbefore_script:\n - export VERSION=$(cat VERSION)\n - export CI_REGISTRY=${CI_RE"
},
{
"path": "CI_MIGRATION.md",
"chars": 4896,
"preview": "# CI Migration Guide\n\nSince version `8.0.0`, CI is now a part of GitLab. You no longer need to run a separate instance o"
},
{
"path": "CONTRIBUTING.md",
"chars": 1915,
"preview": "# GitLab-CI Configuration\n\nWhen using your own GitLab instance, the provided .gitlab-ci.yml will automatically be using "
},
{
"path": "Changelog.md",
"chars": 72159,
"preview": "# Changelog\n\nThis file only reflects the changes that are made in this image. Please refer to the upstream GitLab [CHANG"
},
{
"path": "Dockerfile",
"chars": 4492,
"preview": "FROM ubuntu:noble-20260210.1\n\nARG VERSION=18.9.2\n\nENV GITLAB_VERSION=${VERSION} \\\n RUBY_VERSION=3.3.10 \\\n RUBY_SOU"
},
{
"path": "LICENSE",
"chars": 1078,
"preview": "The MIT License (MIT)\n\nCopyright (c) 2014 Sameer Naik\n\nPermission is hereby granted, free of charge, to any person obtai"
},
{
"path": "Makefile",
"chars": 1867,
"preview": "all: build\n\nhelp:\n\t@echo \"\"\n\t@echo \"-- Help Menu\"\n\t@echo \"\"\n\t@echo \" 1. make build - build the gitlab image\"\n\t@"
},
{
"path": "README.md",
"chars": 125002,
"preview": "# sameersbn/gitlab:18.9.2\n\n[](http"
},
{
"path": "VERSION",
"chars": 7,
"preview": "18.9.2\n"
},
{
"path": "assets/build/config/database.yml.postgresql",
"chars": 3494,
"preview": "# HINT: This file is identical to the corresponding configuration file from the\n# upstream repository, where the additio"
},
{
"path": "assets/build/install.sh",
"chars": 17062,
"preview": "#!/bin/bash\nset -e\n\nGITLAB_CLONE_URL=https://gitlab.com/gitlab-org/gitlab-foss.git\nGITLAB_SHELL_URL=https://gitlab.com/g"
},
{
"path": "assets/build/patches/gitlabhq/0001-fix-feature-checking-for-gitaly-on-a-fresh-install.patch.bak",
"chars": 815,
"preview": "diff --git a/lib/feature.rb b/lib/feature.rb\nindex f8d34e9c386..549c7fc063e 100644\n--- a/lib/feature.rb\n+++ b/lib/featur"
},
{
"path": "assets/build/patches/gitlabhq/0002-fix-condition-for-csr-policy-allow-lfs_v16.3.0.patch.bak",
"chars": 693,
"preview": "diff --git a/lib/gitlab/content_security_policy/config_loader.rb b/lib/gitlab/content_security_policy/config_loader.rb\ni"
},
{
"path": "assets/build/patches/gitlabhq/0003-fix_preinstall.mjs-to-avoid-removing-node_modules_dir.patch.bak",
"chars": 1351,
"preview": "diff --git a/scripts/frontend/preinstall.mjs b/scripts/frontend/preinstall.mjs\nindex e86525cd20d2..f849c423f1b6 100644\n-"
},
{
"path": "assets/build/patches/gitlabhq/0004-fix-raketask-gitlab-assets-compile.patch.bak",
"chars": 1373,
"preview": "diff --git a/lib/tasks/gitlab/assets.rake b/lib/tasks/gitlab/assets.rake\nindex b8a6e7018767..5096d81ea63f 100644\n--- a/l"
},
{
"path": "assets/build/patches/gitlabhq/0005_fix-gitlab-setup-mr225503.patch",
"chars": 1652,
"preview": "From a39aef6cf81149d940061d56f358d220dbf90159 Mon Sep 17 00:00:00 2001\nFrom: Vasilii Iakliushin <viakliushin@gitlab.com>"
},
{
"path": "assets/build/patches/ruby/0001-avoid-seeding_until-ruby3.3.0.bak",
"chars": 1489,
"preview": "From 64e503eb62aff0952b655e9a86217e355f786146 Mon Sep 17 00:00:00 2001\nFrom: =?UTF-8?q?=E5=8D=9C=E9=83=A8=E6=98=8C=E5=B9"
},
{
"path": "assets/runtime/config/gitaly/config.toml",
"chars": 3371,
"preview": "# Example Gitaly configuration file\n# Documentation lives at https://docs.gitlab.com/ee/administration/gitaly/ and\n# htt"
},
{
"path": "assets/runtime/config/gitlab-pages/config",
"chars": 538,
"preview": "auth-client-id={{GITLAB_PAGES_ACCESS_CLIENT_ID}}\nauth-client-secret={{GITLAB_PAGES_ACCESS_CLIENT_SECRET}}\nauth-redirect-"
},
{
"path": "assets/runtime/config/gitlab-shell/config.yml",
"chars": 2093,
"preview": "#\n# If you change this file in a Merge Request, please also create\n# a Merge Request on https://gitlab.com/gitlab-org/om"
},
{
"path": "assets/runtime/config/gitlabhq/cable.yml",
"chars": 426,
"preview": "# This is a template taken from here:\n# https://gitlab.com/gitlab-org/gitlab/-/blob/master/config/cable.yml.example\ndeve"
},
{
"path": "assets/runtime/config/gitlabhq/database.yml",
"chars": 553,
"preview": "#\n# PRODUCTION (here: non-decomposed database)\n#\nproduction:\n main:\n adapter: postgresql\n encoding: {{DB_ENCODING"
},
{
"path": "assets/runtime/config/gitlabhq/gitlab.yml",
"chars": 67863,
"preview": "# # # # # # # # # # # # # # # # # #\n# GitLab application config file #\n# # # # # # # # # # # # # # # # # #\n#\n##########"
},
{
"path": "assets/runtime/config/gitlabhq/puma.rb",
"chars": 3574,
"preview": "ENV['RAILS_RELATIVE_URL_ROOT'] = \"{{GITLAB_RELATIVE_URL_ROOT}}\"\n\n# frozen_string_literal: true\n\n# Load \"path\" as a racku"
},
{
"path": "assets/runtime/config/gitlabhq/relative_url.rb",
"chars": 371,
"preview": "# Relative URL support\n# WARNING: We recommend using an FQDN to host GitLab in a root path instead\n# of using a relative"
},
{
"path": "assets/runtime/config/gitlabhq/resque.yml",
"chars": 1103,
"preview": "# If you change this file in a Merge Request, please also create\n# a Merge Request on https://gitlab.com/gitlab-org/omni"
},
{
"path": "assets/runtime/config/gitlabhq/secrets.yml",
"chars": 929,
"preview": "production:\n # db_key_base is used to encrypt for Variables. Ensure that you don't lose it.\n # If you change or lose t"
},
{
"path": "assets/runtime/config/gitlabhq/smtp_settings.rb",
"chars": 1006,
"preview": "# To enable smtp email delivery for your GitLab instance do the following:\n# 1. Rename this file to smtp_settings.rb\n# 2"
},
{
"path": "assets/runtime/config/nginx/gitlab",
"chars": 3655,
"preview": "## GitLab\n##\n## Lines starting with two hashes (##) are comments with information.\n## Lines starting with one hash (#) a"
},
{
"path": "assets/runtime/config/nginx/gitlab-pages",
"chars": 812,
"preview": "## GitLab\n##\n## Pages serving host\nserver {\n listen 0.0.0.0:80;\n listen [::]:80;\n ## Replace this with something like"
},
{
"path": "assets/runtime/config/nginx/gitlab-pages-ssl",
"chars": 2879,
"preview": "## GitLab\n##\n\n## Redirects all HTTP traffic to the HTTPS host\nserver {\n ## Either remove \"default_server\" from the list"
},
{
"path": "assets/runtime/config/nginx/gitlab-registry",
"chars": 2024,
"preview": "## Lines starting with two hashes (##) are comments with information.\n## Lines starting with one hash (#) are configurat"
},
{
"path": "assets/runtime/config/nginx/gitlab-ssl",
"chars": 5733,
"preview": "## GitLab\n##\n## Modified from nginx http version\n## Modified from http://blog.phusion.nl/2012/04/21/tutorial-setting-up-"
},
{
"path": "assets/runtime/config/nginx/gitlab_ci",
"chars": 817,
"preview": "# GITLAB CI\nserver {\n listen 80; # e.g., listen 192.168.1.1:80;\n server_name {{GITLAB_CI_HOST}}"
},
{
"path": "assets/runtime/env-defaults",
"chars": 37931,
"preview": "#!/bin/bash\n\n# CONTAINER\nDEBUG=${DEBUG:-$DEBUG_ENTRYPOINT}\nTIMEZONE=${TZ:-UTC}\n\n## GITLAB CORE\nGITLAB_TEMP_DIR=\"${GITLAB"
},
{
"path": "assets/runtime/functions",
"chars": 84564,
"preview": "#!/bin/bash\nset -e\n\nfor file in /gitlab-configs /run/secrets/gitlab-secrets; do\n\tif [[ -e \"$file\" ]]; then\n\t\techo \"Loadi"
},
{
"path": "assets/runtime/scripts/configure_feature_flags.rb",
"chars": 3261,
"preview": "#!/usr/bin/env ruby\r\n\r\nrequire \"optparse\"\r\nrequire \"set\"\r\n\r\n# sameersbn/docker-gitlab\r\n# Ruby script to configure featur"
},
{
"path": "contrib/docker-swarm/docker-compose.yml",
"chars": 5279,
"preview": "services:\n redis:\n restart: always\n image: redis:7\n command:\n - --loglevel warning\n volumes:\n - /"
},
{
"path": "contrib/docker-swarm/gitlab.configs",
"chars": 105,
"preview": "# config file to be sourced on startup - will over-ride any env set in the docker-compose.yml\n\nTEST=none\n"
},
{
"path": "contrib/docker-swarm/gitlab.secrets",
"chars": 344,
"preview": "# config file to be sourced on startup - will over-ride any env set in the docker-compose.yml\n\nLDAP_ENABLED=true\nLDAP_LA"
},
{
"path": "contrib/expose-gitlab-ssh-port.sh",
"chars": 1314,
"preview": "#!/usr/bin/env bash\nset -ev\n\nGITLAB_USERGROUP=${GITLAB_USERGROUP:-1010}\nGITLAB_SSH_PORT=${GITLAB_SSH_PORT:-9922}\n\nif ! i"
},
{
"path": "docker-compose.swarm.yml",
"chars": 8147,
"preview": "services:\n redis:\n image: redis:7\n command:\n - --loglevel warning\n volumes:\n - redis-data:/var/lib/r"
},
{
"path": "docker-compose.yml",
"chars": 4605,
"preview": "\nservices:\n redis:\n restart: always\n image: redis:7\n command:\n - --loglevel warning\n volumes:\n - "
},
{
"path": "docs/container_registry.md",
"chars": 16056,
"preview": "# GitLab Container Registry\n\nSince `8.8.0` GitLab introduces a container registry. GitLab is helping to authenticate the"
},
{
"path": "docs/docker-compose-keycloak.yml",
"chars": 5345,
"preview": "services:\n redis:\n restart: always\n image: redis:7\n command:\n - --loglevel warning\n volumes:\n - r"
},
{
"path": "docs/docker-compose-registry.yml",
"chars": 2544,
"preview": "services:\n redis:\n restart: always\n image: redis:7\n command:\n - --loglevel warning\n volumes:\n - r"
},
{
"path": "docs/docker-swarm-traefik-registry.md",
"chars": 13872,
"preview": "# Docker Swarm mode deployment\n\nHere's a guide to deploy **GitLab** with:\n\n* [Docker Swarm mode](https://docs.docker.com"
},
{
"path": "docs/exposing-ssh-port.md",
"chars": 550,
"preview": "# Exposing ssh port in dockerized gitlab-ce\n\nThis is how to expose this internal ssh port without affecting the existing"
},
{
"path": "docs/keycloak-idp.md",
"chars": 3711,
"preview": "# Integrate Keycloak as an IDP with GitLab\n\nIn this document, we will explain how to set up Keycloak and integrate it in"
},
{
"path": "docs/s3_compatible_storage.md",
"chars": 7602,
"preview": "# GitLab Backup to s3 compatible storage\n\nEnables automatic backups to self-hosted s3 compatible storage like minio (<ht"
},
{
"path": "entrypoint.sh",
"chars": 1711,
"preview": "#!/bin/bash\nset -e\nset -o pipefail\n\n# shellcheck source=assets/runtime/functions\nsource \"${GITLAB_RUNTIME_DIR}/functions"
},
{
"path": "hooks/build",
"chars": 336,
"preview": "#!/bin/bash\n\n# Docker Daemon Build Hook\n# $IMAGE_NAME var is injected into the build so the tag is correct.\n\ndocker pull"
},
{
"path": "kubernetes/deploy.sh",
"chars": 462,
"preview": "#!/bin/bash\nset -e \nset -o pipefail\n\nif ! command -v kubectl > /dev/null; then\n echo \"kubectl command not installed\"\n "
},
{
"path": "kubernetes/gitlab-rc.yml",
"chars": 3516,
"preview": "apiVersion: v1\nkind: ReplicationController\nmetadata:\n name: gitlab\nspec:\n replicas: 1\n selector:\n name: gitlab\n t"
},
{
"path": "kubernetes/gitlab-svc.yml",
"chars": 254,
"preview": "apiVersion: v1\nkind: Service\nmetadata:\n name: gitlab\n labels:\n name: gitlab\nspec:\n type: LoadBalancer\n ports:\n "
},
{
"path": "kubernetes/postgresql-rc.yml",
"chars": 1203,
"preview": "apiVersion: v1\nkind: ReplicationController\nmetadata:\n name: postgresql\nspec:\n replicas: 1\n selector:\n name: postgr"
},
{
"path": "kubernetes/postgresql-svc.yml",
"chars": 202,
"preview": "apiVersion: v1\nkind: Service\nmetadata:\n name: postgresql\n labels:\n name: postgresql\nspec:\n ports:\n - name: post"
},
{
"path": "kubernetes/redis-rc.yml",
"chars": 795,
"preview": "apiVersion: v1\nkind: ReplicationController\nmetadata:\n name: redis\nspec:\n replicas: 1\n selector:\n name: redis\n tem"
},
{
"path": "kubernetes/redis-svc.yml",
"chars": 181,
"preview": "apiVersion: v1\nkind: Service\nmetadata:\n name: redis\n labels:\n name: redis\nspec:\n ports:\n - name: redis\n po"
},
{
"path": "kubernetes/teardown.sh",
"chars": 355,
"preview": "#!/bin/bash\nset -e \nset -o pipefail\n\nif ! command -v kubectl > /dev/null; then\n echo \"kubectl command not installed\"\n "
},
{
"path": "scripts/release-notes.sh",
"chars": 2271,
"preview": "#!/usr/bin/env sh\n\nRELEASE=${GIT_TAG:-$1}\n\nif [ -z \"${RELEASE}\" ]; then\n echo \"Usage:\"\n echo \"./scripts/release-notes."
}
]
About this extraction
This page contains the full source code of the sameersbn/docker-gitlab GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 65 files (544.6 KB), approximately 160.9k tokens, and a symbol index with 4 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.