cookbook 'omnibus-gitlab', '= 0.1.4'
omnibus-gitlab (11) Versions 0.1.4 Follow8
Installs/Configures GitLab using omnibus-gitlab
cookbook 'omnibus-gitlab', '= 0.1.4', :supermarket
knife supermarket install omnibus-gitlab
knife supermarket download omnibus-gitlab
cookbook-omnibus-gitlab-cookbook
TODO: Enter the cookbook description here.
Supported Platforms
TODO: List your supported platforms.
Attributes
<table>
<tr>
<th>Key</th>
<th>Type</th>
<th>Description</th>
<th>Default</th>
</tr>
<tr>
<td><tt>['cookbook-omnibus-gitlab']['bacon']</tt></td>
<td>Boolean</td>
<td>whether to include bacon</td>
<td><tt>true</tt></td>
</tr>
</table>
Usage
cookbook-omnibus-gitlab::default
Include cookbook-omnibus-gitlab
in your node's run_list
:
{ "run_list": [ "recipe[cookbook-omnibus-gitlab::default]" ] }
Contributing
- Fork the repository on Github
- Create a named feature branch (i.e.
add-new-recipe
) - Write you change
- Write tests for your change (if applicable)
- Run the tests, ensuring they all pass
- Submit a Pull Request
License and Authors
Author:: YOUR_NAME (<YOUR_EMAIL>)
Dependent cookbooks
This cookbook has no specified dependencies.
Contingent cookbooks
There are no cookbooks that are contingent upon this one.
0.1.3
Create the SSL key and certificate for GitLab CI
Also render ci_external_url and git_data_dir in gitlab.rb
0.1.2
Prevent storing secrets in the Chef node object
Cookbook-omnibus-gitlab allows you to keep secret Omnibus-gitLab settings
(passwords, keys) in an encrypted data bag. These secrets then get decrypted
during the Chef client run on your GitLab server. Due to a programming error,
the cookbook-omnibus-gitlab would then send the plaintext secrets back to the
Chef server to be stored in the node's database record. This defeats one of the
purposes of using encrypted data bags, namely to keep plaintext secrets off of
the Chef server.
In version 0.1.2 we make sure that the secrets stored in the encrypted data bag
do not get sent back to the server.
If you have been using cookbook-omnibus-gitlab with an encrypted data bag you
should upgrade to cookbook-omnibus-gitlab 0.1.2 or newer and inspect your
GitLab nodes to look for secrets:
knife node show gitlab.example.com --format json
If some of your cookbook-omnibus-gitlab secrets got uploaded to the Chef server
you can delete them from the node object using knife node edit
after you upgrade cookbook-omnibus-gitlab to 0.1.2 or
gitlab.example.com
newer.
As an additional measure you may want to consider changing the affected
passwords and keys.
0.1.1
0.1.0
Initial release of cookbook-omnibus-gitlab
Foodcritic Metric
0.1.4 failed this metric
FC003: Check whether you are running with chef server before using server-specific features: /tmp/cook/b11be63968a8d170d05f3b8b/omnibus-gitlab/recipes/default.rb:15
0.1.4 failed this metric