From dc638d7d0346653e97c724816809932a4ac4f094 Mon Sep 17 00:00:00 2001
From: Release Bot <107104610+sourcegraph-release-bot@users.noreply.github.com>
Date: Wed, 25 Jun 2025 21:56:11 +0200
Subject: [PATCH 1/4] [Backport 6.5.x] Fix(release): promoteToPublic.finalize
github:pr update main target bug (#702)
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit
Closes REL-1068
## Problem
The release pipeline has been systematically failing in the
`promoteToPublic.finalize` workflow with this error:
```
Warning: 1 uncommitted change
must be on a branch named differently than 'promote/release-v6.4.3889-update-main'
```
## Root Cause
The final `github:pr` step in the `promoteToPublic.finalize` workflow
was incorrectly trying to create a PR from the current branch to itself:
- **Current branch**: `promote/release-{{version}}-update-main`
- **Target branch**: `promote/release-{{version}}-update-main` ❌ (same
branch!)
- **Should target**: `main` ✅
This happened because the variable `internal_branch` was set to the
current branch name instead of the intended target branch.
### Test plan
This will have to be tested on a release
Backport
1c06d26ddb1185a6de0508b7a0c5c53d38a94ad2 from #699
Co-authored-by: Warren Gifford
---
release.yaml | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
diff --git a/release.yaml b/release.yaml
index 6e139e53..451bcbad 100644
--- a/release.yaml
+++ b/release.yaml
@@ -618,11 +618,11 @@ promoteToPublic:
- name: "github:pr"
cmd: |
set -eu
- internal_branch="promote/release-{{version}}-update-main"
+ # Create PR to merge release updates into main branch
gh pr create \
--fill \
--draft \
- --base "$internal_branch" \
+ --base main \
--title "Update main: build {{version}}" \
--body "Test plan: automated release PR, CI will perform additional checks"
echo "🚢 Please check the associated CI build to ensure the process completed".
From 2f864d6d3a15fae179e10f72b8ba89edf36c5533 Mon Sep 17 00:00:00 2001
From: Release Bot <107104610+sourcegraph-release-bot@users.noreply.github.com>
Date: Thu, 3 Jul 2025 18:13:26 +0200
Subject: [PATCH 2/4] [Backport 6.5.x] Create Values.frontend.createRoleBinding
to allow it to be disabled (#718)
### Checklist
- [x] Follow the [manual testing
process](https://github.com/sourcegraph/deploy-sourcegraph-helm/blob/main/TEST.md)
- [ ] Update
[changelog](https://github.com/sourcegraph/deploy-sourcegraph-helm/blob/main/charts/sourcegraph/CHANGELOG.md)
- [ ] Update [Kubernetes update
doc](https://docs.sourcegraph.com/admin/updates/kubernetes)
### Test plan
Ran `helm template`, `helm lint`, and `helm unittest`, all passed
Backport 2e145ab96319bacb6e102a95e6ecca7f5e7732f2 from #704
Co-authored-by: Marc <7050295+marcleblanc2@users.noreply.github.com>
---
charts/sourcegraph/README.md | 1 +
.../templates/frontend/sourcegraph-frontend.RoleBinding.yaml | 2 ++
charts/sourcegraph/values.yaml | 2 ++
3 files changed, 5 insertions(+)
diff --git a/charts/sourcegraph/README.md b/charts/sourcegraph/README.md
index 08110c8e..103dc890 100644
--- a/charts/sourcegraph/README.md
+++ b/charts/sourcegraph/README.md
@@ -94,6 +94,7 @@ In addition to the documented values, all services also support the following va
| codeIntelDB.storageSize | string | `"200Gi"` | PVC Storage Request for `codeintel-db` data volume |
| extraResources | list | `[]` | Additional resources to include in the rendered manifest. Templates are supported. |
| frontend.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `frontend` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
+| frontend.createRoleBinding | bool | `true` | Disable the roleBinding resource for deployment environments blocking RBAC, ex. OpenShift's default "secure" SCC |
| frontend.env | object | the chart will add some default environment values | Environment variables for the `frontend` container |
| frontend.image.defaultTag | string | `"6.0.0@sha256:d4f21178096da5fdb3804099ae9de2e050b06e859a327aa79452b1ea2f3ede0a"` | Docker image tag for the `frontend` image |
| frontend.image.name | string | `"frontend"` | Docker image name for the `frontend` image |
diff --git a/charts/sourcegraph/templates/frontend/sourcegraph-frontend.RoleBinding.yaml b/charts/sourcegraph/templates/frontend/sourcegraph-frontend.RoleBinding.yaml
index e470cd91..02075fcc 100644
--- a/charts/sourcegraph/templates/frontend/sourcegraph-frontend.RoleBinding.yaml
+++ b/charts/sourcegraph/templates/frontend/sourcegraph-frontend.RoleBinding.yaml
@@ -1,3 +1,4 @@
+{{- if .Values.frontend.createRoleBinding }}
apiVersion: rbac.authorization.k8s.io/v1
kind: RoleBinding
metadata:
@@ -21,3 +22,4 @@ subjects:
- kind: ServiceAccount
name: {{ include "sourcegraph.serviceAccountName" (list . "frontend") }}
namespace: {{ .Release.Namespace }}
+{{- end }}
diff --git a/charts/sourcegraph/values.yaml b/charts/sourcegraph/values.yaml
index afab1c1f..320f488d 100644
--- a/charts/sourcegraph/values.yaml
+++ b/charts/sourcegraph/values.yaml
@@ -326,6 +326,8 @@ frontend:
runAsUser: 100
runAsGroup: 101
readOnlyRootFilesystem: true
+ # -- Disable the roleBinding resource for deployment environments blocking RBAC, ex. OpenShift's default "secure" SCC
+ createRoleBinding: true
# -- Security context for the `frontend` pod,
# learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod)
podSecurityContext: {}
From 874dbbe9f8356654dd2644a8875f03ea20288770 Mon Sep 17 00:00:00 2001
From: Release Bot <107104610+sourcegraph-release-bot@users.noreply.github.com>
Date: Thu, 3 Jul 2025 18:20:22 +0200
Subject: [PATCH 3/4] [Backport 6.5.x] Create config for sgTestConnection
enabled (#719)
Allow self-hosted customers to disable the sg-test-connection pod,
similar to how the Cloud instances do
(https://github.com/sourcegraph/cloud/pull/8)
### Checklist
- [x] Follow the [manual testing
process](https://github.com/sourcegraph/deploy-sourcegraph-helm/blob/main/TEST.md)
- [ ] Update
[changelog](https://github.com/sourcegraph/deploy-sourcegraph-helm/blob/main/charts/sourcegraph/CHANGELOG.md)
- [ ] Update [Kubernetes update
doc](https://docs.sourcegraph.com/admin/updates/kubernetes)
### Test plan
Ran `helm template`, `helm lint`, and `helm unittest`, all passed
Backport 3121258c6cc80921bb31f4d1f537c940bf5aa58f from #706
Co-authored-by: Marc <7050295+marcleblanc2@users.noreply.github.com>
---
charts/sourcegraph/README.md | 1 +
charts/sourcegraph/templates/tests/test-connection.yaml | 4 +++-
charts/sourcegraph/values.yaml | 4 ++++
3 files changed, 8 insertions(+), 1 deletion(-)
diff --git a/charts/sourcegraph/README.md b/charts/sourcegraph/README.md
index 103dc890..1e905141 100644
--- a/charts/sourcegraph/README.md
+++ b/charts/sourcegraph/README.md
@@ -300,6 +300,7 @@ In addition to the documented values, all services also support the following va
| searcher.serviceAccount.create | bool | `false` | Enable creation of ServiceAccount for `searcher` |
| searcher.serviceAccount.name | string | `""` | Name of the ServiceAccount to be created or an existing ServiceAccount |
| searcher.storageSize | string | `"26Gi"` | Size of the PVC for searcher pods to store cache data |
+| sgTestConnection | object | `{"enabled":true}` | Enable the busybox connection test after deployment |
| sourcegraph.affinity | object | `{}` | Global Affinity, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
| sourcegraph.image.defaultTag | string | `"{{ .Chart.AppVersion }}"` | Global docker image tag |
| sourcegraph.image.pullPolicy | string | `"IfNotPresent"` | Global docker image pull policy |
diff --git a/charts/sourcegraph/templates/tests/test-connection.yaml b/charts/sourcegraph/templates/tests/test-connection.yaml
index 8bf16f39..1fdec25a 100644
--- a/charts/sourcegraph/templates/tests/test-connection.yaml
+++ b/charts/sourcegraph/templates/tests/test-connection.yaml
@@ -1,3 +1,4 @@
+{{- if .Values.sgTestConnection.enabled }}
apiVersion: v1
kind: Pod
metadata:
@@ -12,4 +13,5 @@ spec:
image: busybox
command: ['wget']
args: ['sourcegraph-frontend:30080/']
- restartPolicy: Never
\ No newline at end of file
+ restartPolicy: Never
+{{- end }}
diff --git a/charts/sourcegraph/values.yaml b/charts/sourcegraph/values.yaml
index 320f488d..71d99506 100644
--- a/charts/sourcegraph/values.yaml
+++ b/charts/sourcegraph/values.yaml
@@ -1266,3 +1266,7 @@ extraResources: []
# preemptionPolicy: Never
# description: "gitserver priority class"
priorityClasses: []
+
+# -- Enable the busybox connection test after deployment
+sgTestConnection:
+ enabled: true
From 90d0f7dc717db0001ed2828735abaf859af73f95 Mon Sep 17 00:00:00 2001
From: Warren Gifford
Date: Wed, 9 Jul 2025 18:00:14 +0000
Subject: [PATCH 4/4] release_patch: v6.5.2654
{"version":"v6.5.2654","inputs":"server=v6.5.2654","type":"patch"}
---
charts/sourcegraph-executor/dind/Chart.yaml | 4 +-
charts/sourcegraph-executor/dind/README.md | 4 +-
charts/sourcegraph-executor/dind/values.yaml | 4 +-
charts/sourcegraph-executor/k8s/Chart.yaml | 4 +-
charts/sourcegraph-executor/k8s/README.md | 4 +-
charts/sourcegraph-executor/k8s/values.yaml | 4 +-
charts/sourcegraph-migrator/Chart.yaml | 4 +-
charts/sourcegraph-migrator/README.md | 8 +--
charts/sourcegraph-migrator/values.yaml | 4 +-
charts/sourcegraph/Chart.yaml | 4 +-
charts/sourcegraph/README.md | 52 +++++++++----------
.../sourcegraph/examples/subchart/Chart.yaml | 4 +-
charts/sourcegraph/values.yaml | 52 +++++++++----------
13 files changed, 76 insertions(+), 76 deletions(-)
diff --git a/charts/sourcegraph-executor/dind/Chart.yaml b/charts/sourcegraph-executor/dind/Chart.yaml
index 537f5b5d..74b7e829 100644
--- a/charts/sourcegraph-executor/dind/Chart.yaml
+++ b/charts/sourcegraph-executor/dind/Chart.yaml
@@ -5,7 +5,7 @@ icon: https://sourcegraph.com/favicon.ico
type: application
# Chart version, separate from Sourcegraph
-version: "5.11.0"
+version: "6.5.2654"
# Version of Sourcegraph release
-appVersion: "5.11.0"
+appVersion: "6.5.2654"
diff --git a/charts/sourcegraph-executor/dind/README.md b/charts/sourcegraph-executor/dind/README.md
index 71555791..60ee3c5c 100644
--- a/charts/sourcegraph-executor/dind/README.md
+++ b/charts/sourcegraph-executor/dind/README.md
@@ -60,7 +60,7 @@ In addition to the documented values, the `executor` and `private-docker-registr
| executor.env.EXECUTOR_FRONTEND_URL | object | `{"value":""}` | The external URL of the Sourcegraph instance. Required. |
| executor.env.EXECUTOR_QUEUE_NAME | object | `{"value":""}` | The name of the queue to pull jobs from to. Possible values: batches and codeintel. **Either this or EXECUTOR_QUEUE_NAMES is required.** |
| executor.env.EXECUTOR_QUEUE_NAMES | object | `{"value":""}` | The comma-separated list of names of multiple queues to pull jobs from to. Possible values: batches and codeintel. **Either this or EXECUTOR_QUEUE_NAME is required.** |
-| executor.image.defaultTag | string | `"6.0.0@sha256:0be94a7c91f8273db10fdf46718c6596340ab2acc570e7b85353806e67a27508"` | |
+| executor.image.defaultTag | string | `"6.5.2654@sha256:6e680270989d4bc57d01c23d1f34f4e3ebd493fa1c42aef140833eb86218d728"` | |
| executor.image.name | string | `"executor"` | |
| executor.replicaCount | int | `1` | |
| privateDockerRegistry.enabled | bool | `true` | Whether to deploy the private registry. Only one registry is needed when deploying multiple executors. More information: https://docs.sourcegraph.com/admin/executors/deploy_executors#using-private-registries |
@@ -71,7 +71,7 @@ In addition to the documented values, the `executor` and `private-docker-registr
| sourcegraph.affinity | object | `{}` | Affinity, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
| sourcegraph.image.defaultTag | string | `"{{ .Chart.AppVersion }}"` | Global docker image tag |
| sourcegraph.image.pullPolicy | string | `"IfNotPresent"` | Global docker image pull policy |
-| sourcegraph.image.repository | string | `"index.docker.io/sourcegraph"` | Global docker image registry or prefix |
+| sourcegraph.image.repository | string | `"us-central1-docker.pkg.dev/sourcegraph-ci/rfc795-internal"` | Global docker image registry or prefix |
| sourcegraph.image.useGlobalTagAsDefault | bool | `false` | When set to true, sourcegraph.image.defaultTag is used as the default defaultTag for all services, instead of service-specific default defaultTags |
| sourcegraph.imagePullSecrets | list | `[]` | Mount named secrets containing docker credentials |
| sourcegraph.labels | object | `{}` | Add a global label to all resources |
diff --git a/charts/sourcegraph-executor/dind/values.yaml b/charts/sourcegraph-executor/dind/values.yaml
index bd2c345d..70d179e5 100644
--- a/charts/sourcegraph-executor/dind/values.yaml
+++ b/charts/sourcegraph-executor/dind/values.yaml
@@ -8,7 +8,7 @@ sourcegraph:
# -- Global docker image pull policy
pullPolicy: IfNotPresent
# -- Global docker image registry or prefix
- repository: index.docker.io/sourcegraph
+ repository: us-central1-docker.pkg.dev/sourcegraph-ci/rfc795-internal
# -- When set to true, sourcegraph.image.defaultTag is used as the default defaultTag for all services, instead of service-specific default defaultTags
useGlobalTagAsDefault: false
# -- Mount named secrets containing docker credentials
@@ -55,7 +55,7 @@ storageClass:
executor:
enabled: true
image:
- defaultTag: 6.0.0@sha256:0be94a7c91f8273db10fdf46718c6596340ab2acc570e7b85353806e67a27508
+ defaultTag: 6.5.2654@sha256:6e680270989d4bc57d01c23d1f34f4e3ebd493fa1c42aef140833eb86218d728
name: "executor"
replicaCount: 1
env:
diff --git a/charts/sourcegraph-executor/k8s/Chart.yaml b/charts/sourcegraph-executor/k8s/Chart.yaml
index 9dae46f9..b830f0c8 100644
--- a/charts/sourcegraph-executor/k8s/Chart.yaml
+++ b/charts/sourcegraph-executor/k8s/Chart.yaml
@@ -5,7 +5,7 @@ icon: https://sourcegraph.com/favicon.ico
type: application
# Chart version, separate from Sourcegraph
-version: "5.11.0"
+version: "6.5.2654"
# Version of Sourcegraph release
-appVersion: "5.11.0"
+appVersion: "6.5.2654"
diff --git a/charts/sourcegraph-executor/k8s/README.md b/charts/sourcegraph-executor/k8s/README.md
index 4258c745..f0499d51 100644
--- a/charts/sourcegraph-executor/k8s/README.md
+++ b/charts/sourcegraph-executor/k8s/README.md
@@ -61,7 +61,7 @@ In addition to the documented values, the `executor` and `private-docker-registr
| executor.frontendExistingSecret | string | `""` | Name of existing k8s Secret to use for frontend password The name of the secret must match `executor.name`, i.e., the name of the helm release used to deploy the helm chart. The k8s Secret must contain the key `EXECUTOR_FRONTEND_PASSWORD` matching the site config `executors.accessToken` value. `executor.frontendPassword` is ignored if this is enabled. |
| executor.frontendPassword | string | `""` | The shared secret configured in the Sourcegraph instance site config under executors.accessToken. Required if `executor.frontendExistingSecret`` is not configured. |
| executor.frontendUrl | string | `""` | The external URL of the Sourcegraph instance. Required. **Recommended:** set to the internal service endpoint (e.g. `http://sourcegraph-frontend.sourcegraph.svc.cluster.local:30080` if Sourcegraph is deployed in the `sourcegraph` namespace). This will avoid unnecessary network charges as traffic will stay within the local network. |
-| executor.image.defaultTag | string | `"6.0.0@sha256:6dc771a0c281a41ef676213f2f84a63d99045cf2e58d43022554a8022070ed65"` | |
+| executor.image.defaultTag | string | `"6.5.2654@sha256:d3cea3b4d977e1e3363b0fb730c6da0127a1415508defc92cd7e80e81a5c2f61"` | |
| executor.image.name | string | `"executor-kubernetes"` | |
| executor.kubeconfigPath | string | `""` | The path to the kubeconfig file. If not specified, the in-cluster config is used. |
| executor.kubernetesJob.deadline | string | `"1200"` | The number of seconds after which a Kubernetes job will be terminated. |
@@ -99,7 +99,7 @@ In addition to the documented values, the `executor` and `private-docker-registr
| sourcegraph.affinity | object | `{}` | Affinity, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
| sourcegraph.image.defaultTag | string | `"{{ .Chart.AppVersion }}"` | Global docker image tag |
| sourcegraph.image.pullPolicy | string | `"IfNotPresent"` | Global docker image pull policy |
-| sourcegraph.image.repository | string | `"index.docker.io/sourcegraph"` | Global docker image registry or prefix |
+| sourcegraph.image.repository | string | `"us-central1-docker.pkg.dev/sourcegraph-ci/rfc795-internal"` | Global docker image registry or prefix |
| sourcegraph.image.useGlobalTagAsDefault | bool | `false` | When set to true, sourcegraph.image.defaultTag is used as the default defaultTag for all services, instead of service-specific default defaultTags |
| sourcegraph.imagePullSecrets | list | `[]` | Mount named secrets containing docker credentials |
| sourcegraph.labels | object | `{}` | Add a global label to all resources |
diff --git a/charts/sourcegraph-executor/k8s/values.yaml b/charts/sourcegraph-executor/k8s/values.yaml
index 11af2cb4..26891f2c 100644
--- a/charts/sourcegraph-executor/k8s/values.yaml
+++ b/charts/sourcegraph-executor/k8s/values.yaml
@@ -8,7 +8,7 @@ sourcegraph:
# -- Global docker image pull policy
pullPolicy: IfNotPresent
# -- Global docker image registry or prefix
- repository: index.docker.io/sourcegraph
+ repository: us-central1-docker.pkg.dev/sourcegraph-ci/rfc795-internal
# -- When set to true, sourcegraph.image.defaultTag is used as the default defaultTag for all services, instead of service-specific default defaultTags
useGlobalTagAsDefault: false
# -- Mount named secrets containing docker credentials
@@ -59,7 +59,7 @@ executor:
configureRbac: true
replicas: 1
image:
- defaultTag: 6.0.0@sha256:6dc771a0c281a41ef676213f2f84a63d99045cf2e58d43022554a8022070ed65
+ defaultTag: 6.5.2654@sha256:d3cea3b4d977e1e3363b0fb730c6da0127a1415508defc92cd7e80e81a5c2f61
name: "executor-kubernetes"
resources:
limits:
diff --git a/charts/sourcegraph-migrator/Chart.yaml b/charts/sourcegraph-migrator/Chart.yaml
index 9ad6613d..04076d17 100644
--- a/charts/sourcegraph-migrator/Chart.yaml
+++ b/charts/sourcegraph-migrator/Chart.yaml
@@ -5,7 +5,7 @@ icon: https://sourcegraph.com/favicon.ico
type: application
# Chart version, separate from Sourcegraph
-version: "5.11.0"
+version: "6.5.2654"
# Version of Sourcegraph release
-appVersion: "5.11.0"
+appVersion: "6.5.2654"
diff --git a/charts/sourcegraph-migrator/README.md b/charts/sourcegraph-migrator/README.md
index cad56823..a27dc424 100644
--- a/charts/sourcegraph-migrator/README.md
+++ b/charts/sourcegraph-migrator/README.md
@@ -42,7 +42,7 @@ You should consult the list of available [migrator commands]. Below is some exam
- Perform initial migrations against external PostgreSQL databases prior to the Sourcegraph deployment
```sh
-helm upgrade --install -f --version 5.11.0 sg-migrator sourcegraph/sourcegraph-migrator
+helm upgrade --install -f --version 6.5.2654 sg-migrator sourcegraph/sourcegraph-migrator
```
### Add a migration log entry
@@ -52,7 +52,7 @@ helm upgrade --install -f --version 5.11.0 sg-migrator
Add an entry to the migration log after a site administrator has explicitly applied the contents of a migration file, learn more about troubleshooting a [dirty database].
```sh
-helm upgrade --install -f --set "migrator.args={add-log,-db=frontend,-version=1528395834}" --version 5.11.0 sg-migrator sourcegraph/sourcegraph-migrator
+helm upgrade --install -f --set "migrator.args={add-log,-db=frontend,-version=1528395834}" --version 6.5.2654 sg-migrator sourcegraph/sourcegraph-migrator
```
## Rendering manifests for kubectl deployment
@@ -80,7 +80,7 @@ In addition to the documented values, the `migrator` service also supports the f
| migrator.args | list | `["up","-db=all"]` | Override default `migrator` container args Available commands can be found at https://docs.sourcegraph.com/admin/how-to/manual_database_migrations |
| migrator.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `migrator` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| migrator.env | object | `{}` | Environment variables for the `migrator` container |
-| migrator.image.defaultTag | string | `"6.0.0@sha256:ec295eb0b743da6bf56777ca6524972267a5c442b0288095e2fe12fce38ebacc"` | Docker image tag for the `migrator` image |
+| migrator.image.defaultTag | string | `"6.5.2654@sha256:5b43677cbe5a1411701b901494848576cd36e53be6fe47a3803e21e3c413dc12"` | Docker image tag for the `migrator` image |
| migrator.image.name | string | `"migrator"` | Docker image name for the `migrator` image |
| migrator.resources | object | `{"limits":{"cpu":"500m","memory":"100M"},"requests":{"cpu":"100m","memory":"50M"}}` | Resource requests & limits for the `migrator` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
| pgsql.auth.existingSecret | string | `""` | Name of existing secret to use for pgsql credentials This should match the setting in the sourcegraph chart values |
@@ -88,7 +88,7 @@ In addition to the documented values, the `migrator` service also supports the f
| sourcegraph.affinity | object | `{}` | Affinity, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
| sourcegraph.image.defaultTag | string | `"{{ .Chart.AppVersion }}"` | Global docker image tag |
| sourcegraph.image.pullPolicy | string | `"IfNotPresent"` | Global docker image pull policy |
-| sourcegraph.image.repository | string | `"index.docker.io/sourcegraph"` | Global docker image registry or prefix |
+| sourcegraph.image.repository | string | `"us-central1-docker.pkg.dev/sourcegraph-ci/rfc795-internal"` | Global docker image registry or prefix |
| sourcegraph.image.useGlobalTagAsDefault | bool | `false` | When set to true, sourcegraph.image.defaultTag is used as the default defaultTag for all services, instead of service-specific default defaultTags |
| sourcegraph.imagePullSecrets | list | `[]` | Mount named secrets containing docker credentials |
| sourcegraph.labels | object | `{}` | Add a global label to all resources |
diff --git a/charts/sourcegraph-migrator/values.yaml b/charts/sourcegraph-migrator/values.yaml
index 20f30df7..98e1cbda 100644
--- a/charts/sourcegraph-migrator/values.yaml
+++ b/charts/sourcegraph-migrator/values.yaml
@@ -8,7 +8,7 @@ sourcegraph:
# -- Global docker image pull policy
pullPolicy: IfNotPresent
# -- Global docker image registry or prefix
- repository: index.docker.io/sourcegraph
+ repository: us-central1-docker.pkg.dev/sourcegraph-ci/rfc795-internal
# -- When set to true, sourcegraph.image.defaultTag is used as the default defaultTag for all services, instead of service-specific default defaultTags
useGlobalTagAsDefault: false
# -- Mount named secrets containing docker credentials
@@ -102,7 +102,7 @@ pgsql:
migrator:
image:
# -- Docker image tag for the `migrator` image
- defaultTag: 6.0.0@sha256:ec295eb0b743da6bf56777ca6524972267a5c442b0288095e2fe12fce38ebacc
+ defaultTag: 6.5.2654@sha256:5b43677cbe5a1411701b901494848576cd36e53be6fe47a3803e21e3c413dc12
# -- Docker image name for the `migrator` image
name: "migrator"
# -- Environment variables for the `migrator` container
diff --git a/charts/sourcegraph/Chart.yaml b/charts/sourcegraph/Chart.yaml
index 898e9e67..f051cd86 100644
--- a/charts/sourcegraph/Chart.yaml
+++ b/charts/sourcegraph/Chart.yaml
@@ -5,7 +5,7 @@ icon: https://sourcegraph.com/favicon.ico
type: application
# Chart version, separate from Sourcegraph
-version: "5.11.0"
+version: "6.5.2654"
# Version of Sourcegraph release
-appVersion: "5.11.0"
+appVersion: "6.5.2654"
diff --git a/charts/sourcegraph/README.md b/charts/sourcegraph/README.md
index 1e905141..882013c9 100644
--- a/charts/sourcegraph/README.md
+++ b/charts/sourcegraph/README.md
@@ -28,12 +28,12 @@ In addition to the documented values, all services also support the following va
| Key | Type | Default | Description |
|-----|------|---------|-------------|
| alpine.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":999,"runAsUser":999}` | Security context for the `alpine` initContainer, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
-| alpine.image.defaultTag | string | `"6.0.0@sha256:c4705ccf969e262ee3916719ecc7c0fb5e606dd954278ac07ac1d052e4e490df"` | Docker image tag for the `alpine` image |
+| alpine.image.defaultTag | string | `"6.5.2654@sha256:1b79d7e7e4b93e77ba7adba92183f078b98c50e9681fc0c0cacbebf28900e47c"` | Docker image tag for the `alpine` image |
| alpine.image.name | string | `"alpine-3.14"` | Docker image name for the `alpine` image |
| alpine.resources | object | `{"limits":{"cpu":"10m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"50Mi"}}` | Resource requests & limits for the `alpine` initContainer, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
| blobstore.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"runAsGroup":101,"runAsUser":100}` | Security context for the `blobstore` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| blobstore.enabled | bool | `true` | Enable `blobstore` (S3 compatible storage) |
-| blobstore.image.defaultTag | string | `"6.0.0@sha256:82caab40f920282069c84e0e4ca503857926e934c67fb022f6d93823b4ea98b5"` | Docker image tag for the `blobstore` image |
+| blobstore.image.defaultTag | string | `"6.5.2654@sha256:c65384f4d4b5432165bda2774b057142295cf4c4cc4c9a4f819415fa42b35482"` | Docker image tag for the `blobstore` image |
| blobstore.image.name | string | `"blobstore"` | Docker image name for the `blobstore` image |
| blobstore.name | string | `"blobstore"` | Name used by resources. Does not affect service names or PVCs. |
| blobstore.podSecurityContext | object | `{"fsGroup":101,"fsGroupChangePolicy":"OnRootMismatch","runAsGroup":101,"runAsUser":100}` | Security context for the `blobstore` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -43,7 +43,7 @@ In addition to the documented values, all services also support the following va
| blobstore.storageSize | string | `"100Gi"` | PVC Storage Request for `blobstore` data volume |
| cadvisor.containerSecurityContext | object | `{"privileged":true}` | Security context for the `cadvisor` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| cadvisor.enabled | bool | `true` | Enable `cadvisor` |
-| cadvisor.image.defaultTag | string | `"6.0.0@sha256:48082a2822a727e22c556ae2c3bae5f5bf4528c7b462efc3c085271ee5145be8"` | Docker image tag for the `cadvisor` image |
+| cadvisor.image.defaultTag | string | `"6.5.2654@sha256:9630d344b013c7accef09e4b5aa4932a1350ccf9f5ae698f5694bdc900e93cfb"` | Docker image tag for the `cadvisor` image |
| cadvisor.image.name | string | `"cadvisor"` | Docker image name for the `cadvisor` image |
| cadvisor.name | string | `"cadvisor"` | Name used by resources. Does not affect service names or PVCs. |
| cadvisor.podSecurityPolicy.enabled | bool | `false` | Enable [PodSecurityPolicy](https://kubernetes.io/docs/concepts/policy/pod-security-policy/) for `cadvisor` pods |
@@ -62,7 +62,7 @@ In addition to the documented values, all services also support the following va
| codeInsightsDB.enabled | bool | `true` | Enable `codeinsights-db` PostgreSQL server |
| codeInsightsDB.env | object | `{}` | Environment variables for the `codeinsights-db` container |
| codeInsightsDB.existingConfig | string | `""` | Name of existing ConfigMap for `codeinsights-db`. It must contain a `postgresql.conf` key. |
-| codeInsightsDB.image.defaultTag | string | `"6.0.0@sha256:24263ff136f8cc328d63808982beb4a109461da30b522b63d2867a4e708713c9"` | Docker image tag for the `codeinsights-db` image |
+| codeInsightsDB.image.defaultTag | string | `"6.5.2654@sha256:ad7111fb8dab18763c3b0e05ec35eca304fb10f4930b38f5042d53bdf71282be"` | Docker image tag for the `codeinsights-db` image |
| codeInsightsDB.image.name | string | `"postgresql-16-codeinsights"` | Docker image name for the `codeinsights-db` image |
| codeInsightsDB.init.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":70,"runAsUser":70}` | Security context for the `alpine` initContainer, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| codeInsightsDB.name | string | `"codeinsights-db"` | Name used by resources. Does not affect service names or PVCs. |
@@ -83,7 +83,7 @@ In addition to the documented values, all services also support the following va
| codeIntelDB.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":999,"runAsUser":999}` | Security context for the `codeintel-db` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| codeIntelDB.enabled | bool | `true` | Enable `codeintel-db` PostgreSQL server |
| codeIntelDB.existingConfig | string | `""` | Name of existing ConfigMap for `codeintel-db`. It must contain a `postgresql.conf` key |
-| codeIntelDB.image.defaultTag | string | `"6.0.0@sha256:224a2604331cb73809f466394c5b4f3ca95bf6a5a140cb75820dfe67301074bb"` | Docker image tag for the `codeintel-db` image |
+| codeIntelDB.image.defaultTag | string | `"6.5.2654@sha256:aea688b4025063fbe443b42bc036a947d0602a4c39b2d54e026da42d35cd278c"` | Docker image tag for the `codeintel-db` image |
| codeIntelDB.image.name | string | `"postgresql-16"` | Docker image name for the `codeintel-db` image |
| codeIntelDB.name | string | `"codeintel-db"` | Name used by resources. Does not affect service names or PVCs. |
| codeIntelDB.podSecurityContext | object | `{"fsGroup":999,"fsGroupChangePolicy":"OnRootMismatch","runAsUser":999}` | Security context for the `codeintel-db` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -96,7 +96,7 @@ In addition to the documented values, all services also support the following va
| frontend.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `frontend` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| frontend.createRoleBinding | bool | `true` | Disable the roleBinding resource for deployment environments blocking RBAC, ex. OpenShift's default "secure" SCC |
| frontend.env | object | the chart will add some default environment values | Environment variables for the `frontend` container |
-| frontend.image.defaultTag | string | `"6.0.0@sha256:d4f21178096da5fdb3804099ae9de2e050b06e859a327aa79452b1ea2f3ede0a"` | Docker image tag for the `frontend` image |
+| frontend.image.defaultTag | string | `"6.5.2654@sha256:bf24447968bba4abe7b82c730dc449b790a1b0bebabea7a74b792089799776b5"` | Docker image tag for the `frontend` image |
| frontend.image.name | string | `"frontend"` | Docker image name for the `frontend` image |
| frontend.ingress.annotations | object | `{"kubernetes.io/ingress.class":"nginx","nginx.ingress.kubernetes.io/proxy-body-size":"150m"}` | Annotations for the Sourcegraph server ingress. For example, securing ingress with TLS provided by [cert-manager](https://cert-manager.io/docs/usage/ingress/) |
| frontend.ingress.annotations."kubernetes.io/ingress.class" | string | `"nginx"` | [Deprecated annotation](https://kubernetes.io/docs/concepts/services-networking/ingress/#deprecated-annotation) for specifing the IngressClass in Kubernetes 1.17 and earlier. If you are using Kubernetes 1.18+, use `ingressClassName` instead and set an override value of `null` for this annotation. |
@@ -112,7 +112,7 @@ In addition to the documented values, all services also support the following va
| frontend.serviceAccount.create | bool | `true` | Enable creation of ServiceAccount for `frontend` |
| frontend.serviceAccount.name | string | `"sourcegraph-frontend"` | Name of the ServiceAccount to be created or an existing ServiceAccount |
| gitserver.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `gitserver` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
-| gitserver.image.defaultTag | string | `"6.0.0@sha256:aec9bf6993c243a283109104cd7c44be3c85680b77e3e8be0c5fba8f01a3bd35"` | Docker image tag for the `gitserver` image |
+| gitserver.image.defaultTag | string | `"6.5.2654@sha256:0c94ea2534dc1814cbb8bf29eb3b16bc923c0f40342d73f8224610d0d7dc0e6b"` | Docker image tag for the `gitserver` image |
| gitserver.image.name | string | `"gitserver"` | Docker image name for the `gitserver` image |
| gitserver.name | string | `"gitserver"` | Name used by resources. Does not affect service names or PVCs. |
| gitserver.podSecurityContext | object | `{"fsGroup":101,"fsGroupChangePolicy":"OnRootMismatch","runAsGroup":101,"runAsUser":100}` | Security context for the `gitserver` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -133,7 +133,7 @@ In addition to the documented values, all services also support the following va
| grafana.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":472,"runAsUser":472}` | Security context for the `grafana` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| grafana.enabled | bool | `true` | Enable `grafana` dashboard (recommended) |
| grafana.existingConfig | string | `""` | Name of existing ConfigMap for `grafana`. It must contain a `datasources.yml` key. |
-| grafana.image.defaultTag | string | `"6.0.0@sha256:e40236d0143d0735ff87374afce95b878b8cde448ef65cfdc7008056a03097e8"` | Docker image tag for the `grafana` image |
+| grafana.image.defaultTag | string | `"6.5.2654@sha256:bea2bfce2e95a048c894cc0eb7cdeba4c7a8235eb9df16fd45d8a2cdc6216ab4"` | Docker image tag for the `grafana` image |
| grafana.image.name | string | `"grafana"` | Docker image name for the `grafana` image |
| grafana.name | string | `"grafana"` | Name used by resources. Does not affect service names or PVCs. |
| grafana.podSecurityContext | object | `{"fsGroup":472,"fsGroupChangePolicy":"OnRootMismatch","runAsGroup":472,"runAsUser":472}` | Security context for the `grafana` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -142,7 +142,7 @@ In addition to the documented values, all services also support the following va
| grafana.serviceAccount.name | string | `"grafana"` | Name of the ServiceAccount to be created or an existing ServiceAccount |
| grafana.storageSize | string | `"2Gi"` | PVC Storage Request for `grafana` data volume |
| indexedSearch.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `zoekt-webserver` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
-| indexedSearch.image.defaultTag | string | `"6.0.0@sha256:99038e0ec9bef930030c118d774fcdcd67d7fe57ad4c80d216703a4d29d64323"` | Docker image tag for the `zoekt-webserver` image |
+| indexedSearch.image.defaultTag | string | `"6.5.2654@sha256:a10507c42cdf78e199980d7897df2e7f40564e7b4d45d84c3de24a3d26d2a51f"` | Docker image tag for the `zoekt-webserver` image |
| indexedSearch.image.name | string | `"indexed-searcher"` | Docker image name for the `zoekt-webserver` image |
| indexedSearch.name | string | `"indexed-search"` | Name used by resources. Does not affect service names or PVCs. |
| indexedSearch.podSecurityContext | object | `{"fsGroup":101,"fsGroupChangePolicy":"OnRootMismatch"}` | Security context for the `indexed-search` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -152,7 +152,7 @@ In addition to the documented values, all services also support the following va
| indexedSearch.serviceAccount.name | string | `""` | Name of the ServiceAccount to be created or an existing ServiceAccount |
| indexedSearch.storageSize | string | `"200Gi"` | PVC Storage Request for `indexed-search` data volume The size of disk to used for search indexes. This should typically be gitserver disk size multipled by the number of gitserver shards. |
| indexedSearchIndexer.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `zoekt-indexserver` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
-| indexedSearchIndexer.image.defaultTag | string | `"6.0.0@sha256:11539e07040b85045a9aa07f970aa310066e240dc28e6c9627653ee2bc6e0b91"` | Docker image tag for the `zoekt-indexserver` image |
+| indexedSearchIndexer.image.defaultTag | string | `"6.5.2654@sha256:352dac7a3cbd309c81823d8c9b0ac4e5bb8a70b5165a6846a2fe6f70a2f7ff11"` | Docker image tag for the `zoekt-indexserver` image |
| indexedSearchIndexer.image.name | string | `"search-indexer"` | Docker image name for the `zoekt-indexserver` image |
| indexedSearchIndexer.resources | object | `{"limits":{"cpu":"8","memory":"8G"},"requests":{"cpu":"4","memory":"4G"}}` | Resource requests & limits for the `zoekt-indexserver` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) zoekt-indexserver is CPU bound. The more CPU you allocate to it, the lower lag between a new commit and it being indexed for search. |
| jaeger.args | list | `["--memory.max-traces=20000","--sampling.strategies-file=/etc/jaeger/sampling_strategies.json","--collector.otlp.enabled","--collector.otlp.grpc.host-port=:4320","--collector.otlp.http.host-port=:4321"]` | Default args passed to the `jaeger` binary |
@@ -162,7 +162,7 @@ In addition to the documented values, all services also support the following va
| jaeger.collector.serviceType | string | "ClusterIP" | Kubernetes service type of jaeger `collector` service, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/services-networking/service/#publishing-services-service-types) |
| jaeger.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `jaeger` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| jaeger.enabled | bool | `false` | Enable `jaeger` |
-| jaeger.image.defaultTag | string | `"6.0.0@sha256:79548aa11d7e2e6bf3e2012fb9e046df12ba5c5410bc24ec8f4d7cbb880336b9"` | Docker image tag for the `jaeger` image |
+| jaeger.image.defaultTag | string | `"6.5.2654@sha256:85dd8dbe69fe7cd38510c95711380c5a6c9fc014902f668f4fa557be694c940e"` | Docker image tag for the `jaeger` image |
| jaeger.image.name | string | `"jaeger-all-in-one"` | Docker image name for the `jaeger` image |
| jaeger.name | string | `"jaeger"` | Name used by resources. Does not affect service names or PVCs. |
| jaeger.podSecurityContext | object | `{}` | Security context for the `jaeger` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -177,14 +177,14 @@ In addition to the documented values, all services also support the following va
| migrator.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `migrator` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| migrator.enabled | bool | `true` | Enable [migrator](https://docs.sourcegraph.com/admin/how-to/manual_database_migrations) initContainer in `frontend` deployment to perform database migration |
| migrator.env | object | `{}` | Environment variables for the `migrator` container |
-| migrator.image.defaultTag | string | `"6.0.0@sha256:ec295eb0b743da6bf56777ca6524972267a5c442b0288095e2fe12fce38ebacc"` | Docker image tag for the `migrator` image |
+| migrator.image.defaultTag | string | `"6.5.2654@sha256:5b43677cbe5a1411701b901494848576cd36e53be6fe47a3803e21e3c413dc12"` | Docker image tag for the `migrator` image |
| migrator.image.name | string | `"migrator"` | Docker image name for the `migrator` image |
| migrator.resources | object | `{"limits":{"cpu":"500m","memory":"100M"},"requests":{"cpu":"100m","memory":"50M"}}` | Resource requests & limits for the `migrator` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
| nodeExporter.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":65534,"runAsUser":65534}` | Security context for the `node-exporter` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| nodeExporter.enabled | bool | `true` | Enable `node-exporter` |
| nodeExporter.extraArgs | list | `[]` | |
| nodeExporter.hostPID | bool | `true` | |
-| nodeExporter.image.defaultTag | string | `"6.0.0@sha256:099c2e4fb8eacdda82d2d4798591808ded7ad3dc5e6ed514535e0b8e7223ed06"` | Docker image tag for the `node-exporter` image |
+| nodeExporter.image.defaultTag | string | `"6.5.2654@sha256:abbb630602776e3786a8c3f015a6a881572ac777352c7d076bb639f20919a315"` | Docker image tag for the `node-exporter` image |
| nodeExporter.image.name | string | `"node-exporter"` | Docker image name for the `node-exporter` image |
| nodeExporter.name | string | `"node-exporter"` | Name used by resources. Does not affect service names or PVCs. |
| nodeExporter.podSecurityContext | object | `{"fsGroup":65534,"runAsGroup":65534,"runAsNonRoot":true,"runAsUser":65534}` | Security context for the `node-exporter` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -214,7 +214,7 @@ In addition to the documented values, all services also support the following va
| openTelemetry.gateway.resources | object | `{"limits":{"cpu":"3","memory":"3Gi"},"requests":{"cpu":"1","memory":"1Gi"}}` | Resource requests & limits for the `otel-collector` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
| openTelemetry.gateway.serviceAccount.create | bool | `false` | Enable creation of ServiceAccount for `otel-collector` |
| openTelemetry.gateway.serviceAccount.name | string | `""` | Name of the ServiceAccount to be created or an existing ServiceAccount |
-| openTelemetry.image.defaultTag | string | `"6.0.0@sha256:ef3e61a4f0a624523ecdee57d8b7757436c2389e0cf12401b4764d19c826ff8a"` | Docker image tag for the `otel-collector` image |
+| openTelemetry.image.defaultTag | string | `"6.5.2654@sha256:cf7c137df8419fd6f10025481a8dc9cffc59b18f6c1cf1891dde6073e0fef93b"` | Docker image tag for the `otel-collector` image |
| openTelemetry.image.name | string | `"opentelemetry-collector"` | Docker image name for the `otel-collector` image |
| pgsql.additionalConfig | string | `""` | Additional PostgreSQL configuration. This will override or extend our default configuration. Notes: This is expecting a multiline string. Learn more from our [recommended PostgreSQL configuration](https://docs.sourcegraph.com/admin/config/postgres-conf) and [PostgreSQL documentation](https://www.postgresql.org/docs/12/config-setting.html) |
| pgsql.auth.database | string | `"sg"` | Sets postgres database name |
@@ -227,7 +227,7 @@ In addition to the documented values, all services also support the following va
| pgsql.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":999,"runAsUser":999}` | Security context for the `pgsql` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| pgsql.enabled | bool | `true` | Enable `pgsql` PostgreSQL server |
| pgsql.existingConfig | string | `""` | Name of existing ConfigMap for `pgsql`. It must contain a `postgresql.conf` key |
-| pgsql.image.defaultTag | string | `"6.0.0@sha256:224a2604331cb73809f466394c5b4f3ca95bf6a5a140cb75820dfe67301074bb"` | Docker image tag for the `pgsql` image |
+| pgsql.image.defaultTag | string | `"6.5.2654@sha256:aea688b4025063fbe443b42bc036a947d0602a4c39b2d54e026da42d35cd278c"` | Docker image tag for the `pgsql` image |
| pgsql.image.name | string | `"postgresql-16"` | Docker image name for the `pgsql` image |
| pgsql.name | string | `"pgsql"` | Name used by resources. Does not affect service names or PVCs. |
| pgsql.podSecurityContext | object | `{"fsGroup":999,"fsGroupChangePolicy":"OnRootMismatch","runAsGroup":999,"runAsUser":999}` | Security context for the `pgsql` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -236,12 +236,12 @@ In addition to the documented values, all services also support the following va
| pgsql.serviceAccount.create | bool | `false` | Enable creation of ServiceAccount for `pgsql` |
| pgsql.serviceAccount.name | string | `""` | Name of the ServiceAccount to be created or an existing ServiceAccount |
| pgsql.storageSize | string | `"200Gi"` | PVC Storage Request for `pgsql` data volume |
-| postgresExporter.image.defaultTag | string | `"6.0.0@sha256:685a18f482e4a71a54e15814ffd6b8cd62844f6af056a81f7ec0ba5cf23fce27"` | Docker image tag for the `pgsql-exporter` image |
+| postgresExporter.image.defaultTag | string | `"6.5.2654@sha256:4d6069249354f24e0ab78140e2913262bd67d9319d3e777681c7539dfe71be48"` | Docker image tag for the `pgsql-exporter` image |
| postgresExporter.image.name | string | `"postgres_exporter"` | Docker image name for the `pgsql-exporter` image |
| postgresExporter.resources | object | `{"limits":{"cpu":"10m","memory":"50Mi"},"requests":{"cpu":"10m","memory":"50Mi"}}` | Resource requests & limits for the `pgsql-exporter` sidecar container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
| preciseCodeIntel.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `precise-code-intel-worker` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| preciseCodeIntel.env | object | `{"NUM_WORKERS":{"value":"4"}}` | Environment variables for the `precise-code-intel-worker` container |
-| preciseCodeIntel.image.defaultTag | string | `"6.0.0@sha256:3a72cf893cb25731d4636593c544c91781d925d867417416255e56debc27ed37"` | Docker image tag for the `precise-code-intel-worker` image |
+| preciseCodeIntel.image.defaultTag | string | `"6.5.2654@sha256:e5c0d653ce03f85b78667d062412f3fd14086761096f95b7bb7f849ea9c0f3c7"` | Docker image tag for the `precise-code-intel-worker` image |
| preciseCodeIntel.image.name | string | `"precise-code-intel-worker"` | Docker image name for the `precise-code-intel-worker` image |
| preciseCodeIntel.name | string | `"precise-code-intel-worker"` | Name used by resources. Does not affect service names or PVCs. |
| preciseCodeIntel.podSecurityContext | object | `{}` | Security context for the `precise-code-intel-worker` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -253,7 +253,7 @@ In addition to the documented values, all services also support the following va
| prometheus.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":false,"runAsGroup":100,"runAsUser":100}` | Security context for the `prometheus` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| prometheus.enabled | bool | `true` | Enable `prometheus` (recommended) |
| prometheus.existingConfig | string | `""` | Name of existing ConfigMap for `pgsql`. It must contain a `prometheus.yml` key |
-| prometheus.image.defaultTag | string | `"6.0.0@sha256:86a315720fd9813d9ef9746d92e637bc20cd9ebd90da78d8cc6906062252891f"` | Docker image tag for the `prometheus` image |
+| prometheus.image.defaultTag | string | `"6.5.2654@sha256:86c438027a03f9a9223dfad446594cb9e19913205f750c2058b9d240427b1361"` | Docker image tag for the `prometheus` image |
| prometheus.image.name | string | `"prometheus"` | Docker image name for the `prometheus` image |
| prometheus.name | string | `"prometheus"` | Name used by resources. Does not affect service names or PVCs. |
| prometheus.podSecurityContext | object | `{"fsGroup":100,"fsGroupChangePolicy":"OnRootMismatch"}` | Security context for the `prometheus` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -266,7 +266,7 @@ In addition to the documented values, all services also support the following va
| redisCache.connection.existingSecret | string | `""` | Name of existing secret to use for Redis endpoint The secret must contain the key `endpoint` and should follow IANA specification learn more from the [Helm docs](https://docs.sourcegraph.com/admin/install/kubernetes/helm#using-external-redis-instances) |
| redisCache.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":1000,"runAsUser":999}` | Security context for the `redis-cache` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| redisCache.enabled | bool | `true` | Enable `redis-cache` Redis server |
-| redisCache.image.defaultTag | string | `"6.0.0@sha256:40ea19e8944b93e05d7697c808969fe0c81a014a56245f3a97b645aa34a9ab78"` | Docker image tag for the `redis-cache` image |
+| redisCache.image.defaultTag | string | `"6.5.2654@sha256:f19ba802d645404713952c198751489fd7ee21526da499bb423d5a66bf4913d1"` | Docker image tag for the `redis-cache` image |
| redisCache.image.name | string | `"redis-cache"` | Docker image name for the `redis-cache` image |
| redisCache.name | string | `"redis-cache"` | Name used by resources. Does not affect service names or PVCs. |
| redisCache.podSecurityContext | object | `{"fsGroup":1000,"fsGroupChangePolicy":"OnRootMismatch"}` | Security context for the `redis-cache` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -275,14 +275,14 @@ In addition to the documented values, all services also support the following va
| redisCache.serviceAccount.name | string | `""` | Name of the ServiceAccount to be created or an existing ServiceAccount |
| redisCache.storageSize | string | `"100Gi"` | PVC Storage Request for `redis-cache` data volume |
| redisExporter.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":1000,"runAsUser":999}` | Security context for the `redis-exporter` sidecar container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
-| redisExporter.image.defaultTag | string | `"6.0.0@sha256:b2ec48fc6adef31f36d525170138dec303c1c0c20c530d659f1fb7c6c54698af"` | Docker image tag for the `redis-exporter` image |
+| redisExporter.image.defaultTag | string | `"6.5.2654@sha256:08651681fb87a130b155feb51550bb4114d7394e7a4057e61f3115f7b345c5a2"` | Docker image tag for the `redis-exporter` image |
| redisExporter.image.name | string | `"redis_exporter"` | Docker image name for the `redis-exporter` image |
| redisExporter.resources | object | `{"limits":{"cpu":"10m","memory":"100Mi"},"requests":{"cpu":"10m","memory":"100Mi"}}` | Resource requests & limits for the `redis-exporter` sidecar container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/configuration/manage-resources-containers/) |
| redisStore.connection.endpoint | string | `"redis-store:6379"` | Endpoint to use for redis-store. Supports either host:port or IANA specification |
| redisStore.connection.existingSecret | string | `""` | Name of existing secret to use for Redis endpoint The secret must contain the key `endpoint` and should follow IANA specification learn more from the [Helm docs](https://docs.sourcegraph.com/admin/install/kubernetes/helm#using-external-redis-instances) |
| redisStore.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":1000,"runAsUser":999}` | Security context for the `redis-store` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| redisStore.enabled | bool | `true` | Enable `redis-store` Redis server |
-| redisStore.image.defaultTag | string | `"6.0.0@sha256:39f3b27d993652c202c1f892df83e1a3e8e8ea5ae58291f79ad14b56672ab8be"` | Docker image tag for the `redis-store` image |
+| redisStore.image.defaultTag | string | `"6.5.2654@sha256:042682e050869387d4a81a301f0244b42d67ffa595c05857e5f995c4fbfa8636"` | Docker image tag for the `redis-store` image |
| redisStore.image.name | string | `"redis-store"` | Docker image name for the `redis-store` image |
| redisStore.name | string | `"redis-store"` | Name used by resources. Does not affect service names or PVCs. |
| redisStore.podSecurityContext | object | `{"fsGroup":1000,"fsGroupChangePolicy":"OnRootMismatch"}` | Security context for the `redis-store` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -291,7 +291,7 @@ In addition to the documented values, all services also support the following va
| redisStore.serviceAccount.name | string | `""` | Name of the ServiceAccount to be created or an existing ServiceAccount |
| redisStore.storageSize | string | `"100Gi"` | PVC Storage Request for `redis-store` data volume |
| searcher.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `searcher` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
-| searcher.image.defaultTag | string | `"6.0.0@sha256:c7508abda2202d4a33400ce23a95dd8d59fe6220d85d7fbee6fb186c55931336"` | Docker image tag for the `searcher` image |
+| searcher.image.defaultTag | string | `"6.5.2654@sha256:1ebcbc8b114a0d7327d32601119f9e916d97dcf6318a00d404803aefa5e15b32"` | Docker image tag for the `searcher` image |
| searcher.image.name | string | `"searcher"` | Docker image name for the `searcher` image |
| searcher.name | string | `"searcher"` | Name used by resources. Does not affect service names or PVCs. |
| searcher.podSecurityContext | object | `{"fsGroup":101,"fsGroupChangePolicy":"OnRootMismatch","runAsUser":100}` | Security context for the `searcher` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -304,7 +304,7 @@ In addition to the documented values, all services also support the following va
| sourcegraph.affinity | object | `{}` | Global Affinity, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/concepts/scheduling-eviction/assign-pod-node/#affinity-and-anti-affinity) |
| sourcegraph.image.defaultTag | string | `"{{ .Chart.AppVersion }}"` | Global docker image tag |
| sourcegraph.image.pullPolicy | string | `"IfNotPresent"` | Global docker image pull policy |
-| sourcegraph.image.repository | string | `"index.docker.io/sourcegraph"` | Global docker image registry or prefix |
+| sourcegraph.image.repository | string | `"us-central1-docker.pkg.dev/sourcegraph-ci/rfc795-internal"` | Global docker image registry or prefix |
| sourcegraph.image.useGlobalTagAsDefault | bool | `false` | When set to true, sourcegraph.image.defaultTag is used as the default defaultTag for all services, instead of service-specific default defaultTags |
| sourcegraph.imagePullSecrets | list | `[]` | Mount named secrets containing docker credentials |
| sourcegraph.labels | object | `{}` | Add extra labels to all resources |
@@ -324,7 +324,7 @@ In addition to the documented values, all services also support the following va
| storageClass.type | string | `"pd-ssd"` | Value of `type` key in storageClass `parameters`, consult your cloud provider persistent storage documentation |
| syntacticCodeIntel.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `syntactic-code-intel-worker` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| syntacticCodeIntel.enabled | bool | `false` | |
-| syntacticCodeIntel.image.defaultTag | string | `"6.0.0@sha256:50bdeb38b196f0fc21404969016bf8263f78144292e905867e93480f66c8251c"` | Docker image tag for the `syntactic-code-intel-worker` image |
+| syntacticCodeIntel.image.defaultTag | string | `"6.5.2654@sha256:96c35c73716147f0542406e67f3f8c0714cf70829f538e6d786f44765dc9e851"` | Docker image tag for the `syntactic-code-intel-worker` image |
| syntacticCodeIntel.image.name | string | `"syntactic-code-intel-worker"` | Docker image name for the `syntactic-code-intel-worker` image |
| syntacticCodeIntel.name | string | `"syntactic-code-intel-worker"` | Name used by resources. Does not affect service names or PVCs. |
| syntacticCodeIntel.podSecurityContext | object | `{}` | Security context for the `syntactic-code-intel-worker` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -334,7 +334,7 @@ In addition to the documented values, all services also support the following va
| syntacticCodeIntel.serviceAccount.create | bool | `false` | Enable creation of ServiceAccount for `syntactic-code-intel-worker` |
| syntacticCodeIntel.serviceAccount.name | string | `""` | Name of the ServiceAccount to be created or an existing ServiceAccount |
| syntectServer.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `syntect-server` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
-| syntectServer.image.defaultTag | string | `"6.0.0@sha256:1e35f77690222a76724b45f2305b838c40c35201e60b0f619b3fe8499504ff60"` | Docker image tag for the `syntect-server` image |
+| syntectServer.image.defaultTag | string | `"6.5.2654@sha256:ab96d7a3d32cece6a1f1a9668956058bf27c6c3dbce49d5d9f8d0060a3982ee6"` | Docker image tag for the `syntect-server` image |
| syntectServer.image.name | string | `"syntax-highlighter"` | Docker image name for the `syntect-server` image |
| syntectServer.name | string | `"syntect-server"` | Name used by resources. Does not affect service names or PVCs. |
| syntectServer.podSecurityContext | object | `{}` | Security context for the `syntect-server` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
@@ -345,7 +345,7 @@ In addition to the documented values, all services also support the following va
| worker.blocklist | list | `[]` | List of jobs to block globally If replicas are configured, use this values to block jobs instead of manually setting WORKER_JOB_BLOCKLIST |
| worker.containerSecurityContext | object | `{"allowPrivilegeEscalation":false,"readOnlyRootFilesystem":true,"runAsGroup":101,"runAsUser":100}` | Security context for the `worker` container, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-container) |
| worker.env | object | `{}` | Environment variables for the `worker` container |
-| worker.image.defaultTag | string | `"6.0.0@sha256:4892c5aa107d4384f811afcf1980e0fb2cb8beb5585a15adcb64353a2d8abf5a"` | Docker image tag for the `worker` image |
+| worker.image.defaultTag | string | `"6.5.2654@sha256:dfe1b7a18bd55aeaf21d001e697890fe06ef77cee0ee919df0700577518a0195"` | Docker image tag for the `worker` image |
| worker.image.name | string | `"worker"` | Docker image name for the `worker` image |
| worker.name | string | `"worker"` | Name used by resources. Does not affect service names or PVCs. |
| worker.podSecurityContext | object | `{}` | Security context for the `worker` pod, learn more from the [Kubernetes documentation](https://kubernetes.io/docs/tasks/configure-pod-container/security-context/#set-the-security-context-for-a-pod) |
diff --git a/charts/sourcegraph/examples/subchart/Chart.yaml b/charts/sourcegraph/examples/subchart/Chart.yaml
index 437f9b00..715fe7c4 100644
--- a/charts/sourcegraph/examples/subchart/Chart.yaml
+++ b/charts/sourcegraph/examples/subchart/Chart.yaml
@@ -2,10 +2,10 @@ apiVersion: v2
name: sourcegraph-subchart
description: Customer-owned chart that inherits from Sourcegraph
type: application
-version: "5.11.0"
+version: "6.5.2654"
dependencies:
- name: sourcegraph
alias: sg # Optional, allows a custom name to be used
- version: "5.11.0"
+ version: "6.5.2654"
repository: "https://sourcegraph.github.io/deploy-sourcegraph-helm"
diff --git a/charts/sourcegraph/values.yaml b/charts/sourcegraph/values.yaml
index 71d99506..c3e3d259 100644
--- a/charts/sourcegraph/values.yaml
+++ b/charts/sourcegraph/values.yaml
@@ -9,7 +9,7 @@ sourcegraph:
# -- Global docker image pull policy
pullPolicy: IfNotPresent
# -- Global docker image registry or prefix
- repository: index.docker.io/sourcegraph
+ repository: us-central1-docker.pkg.dev/sourcegraph-ci/rfc795-internal
# -- When set to true, sourcegraph.image.defaultTag is used as the default defaultTag for all services, instead of service-specific default defaultTags
useGlobalTagAsDefault: false
# -- Mount named secrets containing docker credentials
@@ -86,7 +86,7 @@ sourcegraph:
alpine: # Used in init containers
image:
# -- Docker image tag for the `alpine` image
- defaultTag: 6.0.0@sha256:c4705ccf969e262ee3916719ecc7c0fb5e606dd954278ac07ac1d052e4e490df
+ defaultTag: 6.5.2654@sha256:1b79d7e7e4b93e77ba7adba92183f078b98c50e9681fc0c0cacbebf28900e47c
# -- Docker image name for the `alpine` image
name: "alpine-3.14"
# -- Security context for the `alpine` initContainer,
@@ -111,7 +111,7 @@ cadvisor:
enabled: true
image:
# -- Docker image tag for the `cadvisor` image
- defaultTag: 6.0.0@sha256:48082a2822a727e22c556ae2c3bae5f5bf4528c7b462efc3c085271ee5145be8
+ defaultTag: 6.5.2654@sha256:9630d344b013c7accef09e4b5aa4932a1350ccf9f5ae698f5694bdc900e93cfb
# -- Docker image name for the `cadvisor` image
name: "cadvisor"
# -- Name used by resources. Does not affect service names or PVCs.
@@ -176,7 +176,7 @@ codeInsightsDB:
additionalConfig: ""
image:
# -- Docker image tag for the `codeinsights-db` image
- defaultTag: 6.0.0@sha256:24263ff136f8cc328d63808982beb4a109461da30b522b63d2867a4e708713c9
+ defaultTag: 6.5.2654@sha256:ad7111fb8dab18763c3b0e05ec35eca304fb10f4930b38f5042d53bdf71282be
# -- Docker image name for the `codeinsights-db` image
name: "postgresql-16-codeinsights"
# -- Security context for the `codeinsights-db` container,
@@ -249,7 +249,7 @@ codeIntelDB:
additionalConfig: ""
image:
# -- Docker image tag for the `codeintel-db` image
- defaultTag: 6.0.0@sha256:224a2604331cb73809f466394c5b4f3ca95bf6a5a140cb75820dfe67301074bb
+ defaultTag: 6.5.2654@sha256:aea688b4025063fbe443b42bc036a947d0602a4c39b2d54e026da42d35cd278c
# -- Docker image name for the `codeintel-db` image
name: "postgresql-16"
# -- Security context for the `codeintel-db` container,
@@ -300,7 +300,7 @@ frontend:
value: http://prometheus:30090
image:
# -- Docker image tag for the `frontend` image
- defaultTag: 6.0.0@sha256:d4f21178096da5fdb3804099ae9de2e050b06e859a327aa79452b1ea2f3ede0a
+ defaultTag: 6.5.2654@sha256:bf24447968bba4abe7b82c730dc449b790a1b0bebabea7a74b792089799776b5
# -- Docker image name for the `frontend` image
name: "frontend"
ingress:
@@ -360,7 +360,7 @@ migrator:
enabled: true
image:
# -- Docker image tag for the `migrator` image
- defaultTag: 6.0.0@sha256:ec295eb0b743da6bf56777ca6524972267a5c442b0288095e2fe12fce38ebacc
+ defaultTag: 6.5.2654@sha256:5b43677cbe5a1411701b901494848576cd36e53be6fe47a3803e21e3c413dc12
# -- Docker image name for the `migrator` image
name: "migrator"
# -- Environment variables for the `migrator` container
@@ -385,7 +385,7 @@ migrator:
gitserver:
image:
# -- Docker image tag for the `gitserver` image
- defaultTag: 6.0.0@sha256:aec9bf6993c243a283109104cd7c44be3c85680b77e3e8be0c5fba8f01a3bd35
+ defaultTag: 6.5.2654@sha256:0c94ea2534dc1814cbb8bf29eb3b16bc923c0f40342d73f8224610d0d7dc0e6b
# -- Docker image name for the `gitserver` image
name: "gitserver"
# -- Name of existing Secret that contains SSH credentials to clone repositories.
@@ -453,7 +453,7 @@ grafana:
existingConfig: "" # Name of an existing configmap
image:
# -- Docker image tag for the `grafana` image
- defaultTag: 6.0.0@sha256:e40236d0143d0735ff87374afce95b878b8cde448ef65cfdc7008056a03097e8
+ defaultTag: 6.5.2654@sha256:bea2bfce2e95a048c894cc0eb7cdeba4c7a8235eb9df16fd45d8a2cdc6216ab4
# -- Docker image name for the `grafana` image
name: "grafana"
# -- Security context for the `grafana` container,
@@ -492,7 +492,7 @@ grafana:
indexedSearch:
image:
# -- Docker image tag for the `zoekt-webserver` image
- defaultTag: 6.0.0@sha256:99038e0ec9bef930030c118d774fcdcd67d7fe57ad4c80d216703a4d29d64323
+ defaultTag: 6.5.2654@sha256:a10507c42cdf78e199980d7897df2e7f40564e7b4d45d84c3de24a3d26d2a51f
# -- Docker image name for the `zoekt-webserver` image
name: "indexed-searcher"
# -- Security context for the `zoekt-webserver` container,
@@ -533,7 +533,7 @@ indexedSearch:
indexedSearchIndexer:
image:
# -- Docker image tag for the `zoekt-indexserver` image
- defaultTag: 6.0.0@sha256:11539e07040b85045a9aa07f970aa310066e240dc28e6c9627653ee2bc6e0b91
+ defaultTag: 6.5.2654@sha256:352dac7a3cbd309c81823d8c9b0ac4e5bb8a70b5165a6846a2fe6f70a2f7ff11
# -- Docker image name for the `zoekt-indexserver` image
name: "search-indexer"
# -- Security context for the `zoekt-indexserver` container,
@@ -560,7 +560,7 @@ blobstore:
enabled: true
image:
# -- Docker image tag for the `blobstore` image
- defaultTag: 6.0.0@sha256:82caab40f920282069c84e0e4ca503857926e934c67fb022f6d93823b4ea98b5
+ defaultTag: 6.5.2654@sha256:c65384f4d4b5432165bda2774b057142295cf4c4cc4c9a4f819415fa42b35482
# -- Docker image name for the `blobstore` image
name: "blobstore"
# -- Security context for the `blobstore` container,
@@ -599,7 +599,7 @@ openTelemetry:
enabled: true
image:
# -- Docker image tag for the `otel-collector` image
- defaultTag: 6.0.0@sha256:ef3e61a4f0a624523ecdee57d8b7757436c2389e0cf12401b4764d19c826ff8a
+ defaultTag: 6.5.2654@sha256:cf7c137df8419fd6f10025481a8dc9cffc59b18f6c1cf1891dde6073e0fef93b
# -- Docker image name for the `otel-collector` image
name: "opentelemetry-collector"
gateway:
@@ -666,7 +666,7 @@ nodeExporter:
enabled: true
image:
# -- Docker image tag for the `node-exporter` image
- defaultTag: 6.0.0@sha256:099c2e4fb8eacdda82d2d4798591808ded7ad3dc5e6ed514535e0b8e7223ed06
+ defaultTag: 6.5.2654@sha256:abbb630602776e3786a8c3f015a6a881572ac777352c7d076bb639f20919a315
# -- Docker image name for the `node-exporter` image
name: "node-exporter"
# -- Name used by resources. Does not affect service names or PVCs.
@@ -737,7 +737,7 @@ pgsql:
additionalConfig: ""
image:
# -- Docker image tag for the `pgsql` image
- defaultTag: 6.0.0@sha256:224a2604331cb73809f466394c5b4f3ca95bf6a5a140cb75820dfe67301074bb
+ defaultTag: 6.5.2654@sha256:aea688b4025063fbe443b42bc036a947d0602a4c39b2d54e026da42d35cd278c
# -- Docker image name for the `pgsql` image
name: "postgresql-16"
# -- Security context for the `pgsql` container,
@@ -779,7 +779,7 @@ pgsql:
postgresExporter:
image:
# -- Docker image tag for the `pgsql-exporter` image
- defaultTag: 6.0.0@sha256:685a18f482e4a71a54e15814ffd6b8cd62844f6af056a81f7ec0ba5cf23fce27
+ defaultTag: 6.5.2654@sha256:4d6069249354f24e0ab78140e2913262bd67d9319d3e777681c7539dfe71be48
# -- Docker image name for the `pgsql-exporter` image
name: "postgres_exporter"
# -- Resource requests & limits for the `pgsql-exporter` sidecar container,
@@ -799,7 +799,7 @@ syntacticCodeIntel:
workerPort: 3188
image:
# -- Docker image tag for the `syntactic-code-intel-worker` image
- defaultTag: 6.0.0@sha256:50bdeb38b196f0fc21404969016bf8263f78144292e905867e93480f66c8251c
+ defaultTag: 6.5.2654@sha256:96c35c73716147f0542406e67f3f8c0714cf70829f538e6d786f44765dc9e851
# -- Docker image name for the `syntactic-code-intel-worker` image
name: "syntactic-code-intel-worker"
# -- Security context for the `syntactic-code-intel-worker` container,
@@ -838,7 +838,7 @@ preciseCodeIntel:
value: "4"
image:
# -- Docker image tag for the `precise-code-intel-worker` image
- defaultTag: 6.0.0@sha256:3a72cf893cb25731d4636593c544c91781d925d867417416255e56debc27ed37
+ defaultTag: 6.5.2654@sha256:e5c0d653ce03f85b78667d062412f3fd14086761096f95b7bb7f849ea9c0f3c7
# -- Docker image name for the `precise-code-intel-worker` image
name: "precise-code-intel-worker"
# -- Security context for the `precise-code-intel-worker` container,
@@ -877,7 +877,7 @@ prometheus:
existingConfig: "" # Name of an existing configmap
image:
# -- Docker image tag for the `prometheus` image
- defaultTag: 6.0.0@sha256:86a315720fd9813d9ef9746d92e637bc20cd9ebd90da78d8cc6906062252891f
+ defaultTag: 6.5.2654@sha256:86c438027a03f9a9223dfad446594cb9e19913205f750c2058b9d240427b1361
# -- Docker image name for the `prometheus` image
name: "prometheus"
# -- Security context for the `prometheus` container,
@@ -927,7 +927,7 @@ redisCache:
enabled: true
image:
# -- Docker image tag for the `redis-cache` image
- defaultTag: 6.0.0@sha256:40ea19e8944b93e05d7697c808969fe0c81a014a56245f3a97b645aa34a9ab78
+ defaultTag: 6.5.2654@sha256:f19ba802d645404713952c198751489fd7ee21526da499bb423d5a66bf4913d1
# -- Docker image name for the `redis-cache` image
name: "redis-cache"
connection:
@@ -971,7 +971,7 @@ redisCache:
redisExporter:
image:
# -- Docker image tag for the `redis-exporter` image
- defaultTag: 6.0.0@sha256:b2ec48fc6adef31f36d525170138dec303c1c0c20c530d659f1fb7c6c54698af
+ defaultTag: 6.5.2654@sha256:08651681fb87a130b155feb51550bb4114d7394e7a4057e61f3115f7b345c5a2
# -- Docker image name for the `redis-exporter` image
name: "redis_exporter"
# -- Security context for the `redis-exporter` sidecar container,
@@ -1003,7 +1003,7 @@ redisStore:
endpoint: "redis-store:6379"
image:
# -- Docker image tag for the `redis-store` image
- defaultTag: 6.0.0@sha256:39f3b27d993652c202c1f892df83e1a3e8e8ea5ae58291f79ad14b56672ab8be
+ defaultTag: 6.5.2654@sha256:042682e050869387d4a81a301f0244b42d67ffa595c05857e5f995c4fbfa8636
# -- Docker image name for the `redis-store` image
name: "redis-store"
# -- Security context for the `redis-store` container,
@@ -1040,7 +1040,7 @@ redisStore:
searcher:
image:
# -- Docker image tag for the `searcher` image
- defaultTag: 6.0.0@sha256:c7508abda2202d4a33400ce23a95dd8d59fe6220d85d7fbee6fb186c55931336
+ defaultTag: 6.5.2654@sha256:1ebcbc8b114a0d7327d32601119f9e916d97dcf6318a00d404803aefa5e15b32
# -- Docker image name for the `searcher` image
name: "searcher"
# -- Security context for the `searcher` container,
@@ -1101,7 +1101,7 @@ storageClass:
syntectServer:
image:
# -- Docker image tag for the `syntect-server` image
- defaultTag: 6.0.0@sha256:1e35f77690222a76724b45f2305b838c40c35201e60b0f619b3fe8499504ff60
+ defaultTag: 6.5.2654@sha256:ab96d7a3d32cece6a1f1a9668956058bf27c6c3dbce49d5d9f8d0060a3982ee6
# -- Docker image name for the `syntect-server` image
name: "syntax-highlighter"
# -- Security context for the `syntect-server` container,
@@ -1149,7 +1149,7 @@ jaeger:
enabled: false
image:
# -- Docker image tag for the `jaeger` image
- defaultTag: 6.0.0@sha256:79548aa11d7e2e6bf3e2012fb9e046df12ba5c5410bc24ec8f4d7cbb880336b9
+ defaultTag: 6.5.2654@sha256:85dd8dbe69fe7cd38510c95711380c5a6c9fc014902f668f4fa557be694c940e
# -- Docker image name for the `jaeger` image
name: "jaeger-all-in-one"
# -- Name used by resources. Does not affect service names or PVCs.
@@ -1204,7 +1204,7 @@ jaeger:
worker:
image:
# -- Docker image tag for the `worker` image
- defaultTag: 6.0.0@sha256:4892c5aa107d4384f811afcf1980e0fb2cb8beb5585a15adcb64353a2d8abf5a
+ defaultTag: 6.5.2654@sha256:dfe1b7a18bd55aeaf21d001e697890fe06ef77cee0ee919df0700577518a0195
# -- Docker image name for the `worker` image
name: "worker"
# -- Security context for the `worker` container,