gitlab-qa 7.24.6 → 7.25.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -818,6 +818,21 @@ $ export GITLAB_PASSWORD="$GITLAB_QA_PASSWORD"
818
818
  $ gitlab-qa Test::Instance::StagingGeo
819
819
  ```
820
820
 
821
+ ### `Test::Instance::StagingRefGeo`
822
+
823
+ This scenario tests that the Geo staging deployment (with [`staging-ref.gitlab.com`](https://staging-ref.gitlab.com) as the primary site and [`geo.staging-ref.gitlab.com`](https://geo.staging-ref.gitlab.com) as the secondary site) works as expected by running tests tagged `:geo` against it. This is done by spinning up a GitLab QA (`gitlab/gitlab-qa`) container and running the `QA::EE::Scenario::Test::Geo` scenario. Note that the Geo setup steps in the `QA::EE::Scenario::Test::Geo` scenario are skipped when testing a live Geo deployment.
824
+
825
+ Scenario requirements are the same as [`Test::Instance::StagingGeo`](#testinstancestaginggeo) described above.
826
+
827
+ ```
828
+ $ export GITLAB_QA_ACCESS_TOKEN=your_api_access_token
829
+ $ export GITLAB_QA_DEV_ACCESS_TOKEN=your_dev_registry_access_token
830
+ $ export GITLAB_USERNAME="gitlab-qa"
831
+ $ export GITLAB_PASSWORD="$GITLAB_QA_PASSWORD"
832
+
833
+ $ gitlab-qa Test::Instance::StagingRefGeo
834
+ ```
835
+
821
836
  ### `Test::Instance::Production`
822
837
 
823
838
  This scenario functions the same as `Test::Instance::Staging`
@@ -5,6 +5,7 @@ require 'net/http'
5
5
  require 'uri'
6
6
  require 'forwardable'
7
7
  require 'openssl'
8
+ require 'tempfile'
8
9
 
9
10
  module Gitlab
10
11
  module QA
@@ -19,9 +20,11 @@ module Gitlab
19
20
  def_delegators :release, :tag, :image, :edition
20
21
 
21
22
  CERTIFICATES_PATH = File.expand_path('../../../../tls_certificates', __dir__)
23
+ DATA_SEED_PATH = File.expand_path('../../../../support/data', __dir__)
22
24
 
23
25
  SSL_PATH = '/etc/gitlab/ssl'
24
26
  TRUSTED_PATH = '/etc/gitlab/trusted-certs'
27
+ DATA_PATH = '/tmp/data-seeds'
25
28
 
26
29
  def initialize
27
30
  super
@@ -40,6 +43,7 @@ module Gitlab
40
43
  @volumes[@authority_cert_path] = TRUSTED_PATH
41
44
 
42
45
  self.release = 'CE'
46
+ self.exec_commands += seed_test_data_command if Runtime::Scenario.seed_db
43
47
  end
44
48
 
45
49
  def set_formless_login_token
@@ -166,6 +170,12 @@ module Gitlab
166
170
  end
167
171
  end
168
172
 
173
+ def process_exec_commands
174
+ @docker.copy(name, DATA_SEED_PATH, DATA_PATH) if Runtime::Scenario.seed_db
175
+
176
+ exec_commands.each { |command| @docker.exec(name, command) }
177
+ end
178
+
169
179
  def sha_version
170
180
  json = @docker.read_file(
171
181
  @release.image, @release.tag,
@@ -176,6 +186,19 @@ module Gitlab
176
186
  manifest['software']['gitlab-rails']['locked_version']
177
187
  end
178
188
 
189
+ def copy_key_file(env_key)
190
+ key_dir = ENV['CI_PROJECT_DIR'] || Dir.tmpdir
191
+ key_file = Tempfile.new(env_key.downcase, key_dir)
192
+ key_file.write(ENV.fetch(env_key))
193
+ key_file.close
194
+
195
+ File.chmod(0o744, key_file.path)
196
+
197
+ @volumes[key_file.path] = key_file.path
198
+
199
+ key_file.path
200
+ end
201
+
179
202
  private
180
203
 
181
204
  # Copy certs to a temporary directory in current working directory.
@@ -196,6 +219,18 @@ module Gitlab
196
219
  end
197
220
  end
198
221
 
222
+ def seed_test_data_command
223
+ cmd = []
224
+
225
+ Runtime::Scenario.seed_db.each do |file_patterns|
226
+ Dir["#{DATA_SEED_PATH}/#{file_patterns}"].map { |f| File.basename f }.each do |file|
227
+ cmd << "gitlab-rails runner #{DATA_PATH}/#{file}"
228
+ end
229
+ end
230
+
231
+ cmd.uniq
232
+ end
233
+
199
234
  class Availability
200
235
  def initialize(name, relative_path: '', scheme: 'http', protocol_port: 80)
201
236
  @docker = Docker::Engine.new
@@ -3,6 +3,7 @@ module Gitlab
3
3
  module Component
4
4
  class StagingRef < Staging
5
5
  ADDRESS = 'https://staging-ref.gitlab.com'.freeze
6
+ GEO_SECONDARY_ADDRESS = 'https://geo.staging-ref.gitlab.com'.freeze
6
7
  end
7
8
  end
8
9
  end
@@ -76,6 +76,10 @@ module Gitlab
76
76
  Docker::Command.execute("attach --sig-proxy=false #{name}", &block)
77
77
  end
78
78
 
79
+ def copy(name, src_path, dest_path)
80
+ Docker::Command.execute("cp #{src_path} #{name}:#{dest_path}")
81
+ end
82
+
79
83
  def restart(name)
80
84
  Docker::Command.execute("restart #{name}")
81
85
  end
@@ -147,7 +147,7 @@ module Gitlab
147
147
  registry: DEV_REGISTRY
148
148
  }
149
149
  elsif omnibus_mirror?
150
- username, password = if Runtime::Env.ci_job_token && Runtime::Env.ci_pipeline_source == 'pipeline'
150
+ username, password = if Runtime::Env.ci_job_token && Runtime::Env.ci_pipeline_source.include?('pipeline')
151
151
  ['gitlab-ci-token', Runtime::Env.ci_job_token]
152
152
  elsif Runtime::Env.qa_container_registry_access_token
153
153
  [Runtime::Env.gitlab_username, Runtime::Env.qa_container_registry_access_token]
@@ -12,9 +12,11 @@ module Gitlab
12
12
  Runtime::Scenario.define(:run_tests, true)
13
13
  Runtime::Scenario.define(:qa_image, Runtime::Env.qa_image) if Runtime::Env.qa_image
14
14
  Runtime::Scenario.define(:omnibus_configuration, Runtime::OmnibusConfiguration.new)
15
+ Runtime::Scenario.define(:seed_db, false)
15
16
 
16
17
  # Omnibus Configurators specified by flags
17
18
  @active_configurators = []
19
+ @seed_scripts = []
18
20
  @omnibus_configurations = %w[default] # always load default configuration
19
21
 
20
22
  @options = OptionParser.new do |opts|
@@ -45,6 +47,14 @@ module Gitlab
45
47
  end
46
48
  end
47
49
 
50
+ opts.on('--seed-db search_pattern1[,search_pattern2,...]', 'Seed application database with sample test data') do |file_pattern|
51
+ file_pattern.split(',').each do |pattern|
52
+ @seed_scripts << pattern
53
+ end
54
+
55
+ Runtime::Scenario.define(:seed_db, @seed_scripts)
56
+ end
57
+
48
58
  opts.on_tail('-h', '--help', 'Show the usage') do
49
59
  puts opts
50
60
  exit
@@ -127,6 +127,11 @@ module Gitlab
127
127
  'GOOGLE_PROJECT' => :google_project,
128
128
  'GOOGLE_CLIENT_EMAIL' => :google_client_email,
129
129
  'GOOGLE_JSON_KEY' => :google_json_key,
130
+ 'GOOGLE_CDN_JSON_KEY' => :google_cdn_json_key,
131
+ 'GOOGLE_CDN_LB' => :google_cdn_load_balancer,
132
+ 'GOOGLE_CDN_SIGNURL_KEY' => :google_cdn_signurl_key,
133
+ 'GOOGLE_CDN_SIGNURL_KEY_NAME' => :google_cdn_signurl_key_name,
134
+ 'GCS_CDN_BUCKET_NAME' => :gcs_cdn_bucket_name,
130
135
  'GCS_BUCKET_NAME' => :gcs_bucket_name,
131
136
  'SMOKE_ONLY' => :smoke_only,
132
137
  'NO_ADMIN' => :no_admin,
@@ -275,6 +280,14 @@ module Gitlab
275
280
  end
276
281
  end
277
282
 
283
+ def require_gcs_with_cdn_environment!
284
+ %w[GOOGLE_CDN_JSON_KEY GCS_CDN_BUCKET_NAME GOOGLE_CDN_LB GOOGLE_CDN_SIGNURL_KEY GOOGLE_CDN_SIGNURL_KEY_NAME].each do |env_key|
285
+ unless ENV.key?(env_key)
286
+ raise ArgumentError, "Environment variable #{env_key} must be set to run GCS with CDN enabled scenario"
287
+ end
288
+ end
289
+ end
290
+
278
291
  def require_initial_password!
279
292
  return unless env_var_value_if_defined('GITLAB_INITIAL_ROOT_PASSWORD').to_s.strip.empty?
280
293
 
@@ -0,0 +1,27 @@
1
+ module Gitlab
2
+ module QA
3
+ module Scenario
4
+ module Test
5
+ module Instance
6
+ class StagingRefGeo < DeploymentBase
7
+ def initialize
8
+ @suite = 'QA::EE::Scenario::Test::Geo'
9
+ end
10
+
11
+ def deployment_component
12
+ Component::StagingRef
13
+ end
14
+
15
+ def non_rspec_args
16
+ [
17
+ '--primary-address', deployment_component::ADDRESS,
18
+ '--secondary-address', deployment_component::GEO_SECONDARY_ADDRESS,
19
+ '--without-setup'
20
+ ]
21
+ end
22
+ end
23
+ end
24
+ end
25
+ end
26
+ end
27
+ end
@@ -0,0 +1,42 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Gitlab
4
+ module QA
5
+ module Scenario
6
+ module Test
7
+ module Integration
8
+ class RegistryWithCDN < Scenario::Template
9
+ def perform(release, *rspec_args)
10
+ Runtime::Env.require_gcs_with_cdn_environment!
11
+
12
+ Component::Gitlab.perform do |gitlab|
13
+ gitlab.release = release
14
+ gitlab.network = 'test'
15
+ gitlab.name = 'gitlab'
16
+ sign_url_key_path = gitlab.copy_key_file('GOOGLE_CDN_SIGNURL_KEY')
17
+ cdn_gcloud_path = gitlab.copy_key_file('GOOGLE_CDN_JSON_KEY')
18
+
19
+ gitlab.omnibus_configuration << <<~OMNIBUS
20
+ external_url 'http://#{gitlab.name}.#{gitlab.network}';
21
+ registry_external_url 'http://#{gitlab.name}.#{gitlab.network}:5050';
22
+
23
+ registry['middleware'] = { 'storage' => [{ 'name' => 'googlecdn', 'options' => { 'baseurl' => '#{Runtime::Env.google_cdn_load_balancer}', 'privatekey' => '#{sign_url_key_path}', 'keyname' => '#{Runtime::Env.google_cdn_signurl_key_name}' } }] }
24
+ registry['storage'] = { 'gcs' => { 'bucket' => '#{Runtime::Env.gcs_cdn_bucket_name}', 'keyfile' => '#{cdn_gcloud_path}' } }
25
+ OMNIBUS
26
+
27
+ gitlab.instance do
28
+ Component::Specs.perform do |specs|
29
+ specs.suite = 'Test::Integration::RegistryWithCDN'
30
+ specs.release = gitlab.release
31
+ specs.network = gitlab.network
32
+ specs.args = [gitlab.address, *rspec_args]
33
+ end
34
+ end
35
+ end
36
+ end
37
+ end
38
+ end
39
+ end
40
+ end
41
+ end
42
+ end
@@ -2,6 +2,6 @@
2
2
 
3
3
  module Gitlab
4
4
  module QA
5
- VERSION = '7.24.6'
5
+ VERSION = '7.25.0'
6
6
  end
7
7
  end
data/lib/gitlab/qa.rb CHANGED
@@ -43,6 +43,7 @@ module Gitlab
43
43
  autoload :Release, 'gitlab/qa/scenario/test/instance/release'
44
44
  autoload :Geo, 'gitlab/qa/scenario/test/instance/geo'
45
45
  autoload :StagingGeo, 'gitlab/qa/scenario/test/instance/staging_geo'
46
+ autoload :StagingRefGeo, 'gitlab/qa/scenario/test/instance/staging_ref_geo'
46
47
  autoload :Airgapped, 'gitlab/qa/scenario/test/instance/airgapped'
47
48
  end
48
49
 
@@ -76,6 +77,7 @@ module Gitlab
76
77
  autoload :RegistryTLS, 'gitlab/qa/scenario/test/integration/registry_tls'
77
78
  autoload :ServicePingDisabled, 'gitlab/qa/scenario/test/integration/service_ping_disabled'
78
79
  autoload :Integrations, 'gitlab/qa/scenario/test/integration/integrations'
80
+ autoload :RegistryWithCDN, 'gitlab/qa/scenario/test/integration/registry_with_cdn'
79
81
  end
80
82
 
81
83
  module Sanity