gitlab-qa 7.5.0 → 7.7.2

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: b8251bd9d33c42893133237ccc67188677306e91a30d48cc50aabe5ddbc19daf
4
- data.tar.gz: ee371cbd941804d36c6fa9769241d25a1736829a1edce3970ac72175eafe3437
3
+ metadata.gz: b1e06262f75fd783ad520f9187ef99905ba0395b37c6c8b14c3f774568711f5f
4
+ data.tar.gz: 6af8e95ef6e1accb3c21d215c7431dba87277d0d20482a70e2218d2091d49ce8
5
5
  SHA512:
6
- metadata.gz: b94c4940266e586d1edc0782a878b950606fb6a851cfd383b2e6167287eedfb682e71758111bafd7b7920b1a0ffd403e53152407c39b1a12a7605da5bc0c6a22
7
- data.tar.gz: da50ac47ec455fba82cbf2e037761e8cf32ce274995d2a11c58f3d7199e3f6e3f71d24b92d2c8c8655cd6974eebada76d81c0b7d66be4433c579312ab01282fb
6
+ metadata.gz: 48a9b41ef7f2d877f3056858d143ec93ba38f40776e3acede90e1349585d6abb3f36f2fd28e1b88e5c9b7b67f64142efe9687ce86570f174ca69b96c0046f40c
7
+ data.tar.gz: 82107ef081d53ed4b7e3d3ae7716d21be8189c7d3339a7998b91b912a43e1622d00e8e1b8f4c8433e4a395805af36379c920480e54be1cdf94999286a88a61b7
data/.gitlab-ci.yml CHANGED
@@ -640,57 +640,16 @@ ee:group_saml-quarantine:
640
640
  variables:
641
641
  QA_SCENARIO: "Test::Integration::GroupSAML"
642
642
 
643
- ce:kubernetes:
644
- extends:
645
- - .test
646
- - .high-capacity
647
- - .ce-qa
648
- - .rspec-report-opts
649
- allow_failure: true
650
- variables:
651
- QA_SCENARIO: "Test::Integration::Kubernetes"
652
-
653
- ce:kubernetes-quarantine:
654
- extends:
655
- - .test
656
- - .high-capacity
657
- - .ce-qa
658
- - .quarantine
659
- - .rspec-report-opts
660
- variables:
661
- QA_SCENARIO: "Test::Integration::Kubernetes"
662
-
663
- ee:kubernetes:
664
- extends:
665
- - .test
666
- - .high-capacity
667
- - .ee-qa
668
- - .rspec-report-opts
669
- allow_failure: true
670
- variables:
671
- QA_SCENARIO: "Test::Integration::Kubernetes"
672
-
673
- ee:kubernetes-quarantine:
674
- extends:
675
- - .test
676
- - .high-capacity
677
- - .ee-qa
678
- - .quarantine
679
- - .rspec-report-opts
680
- variables:
681
- QA_SCENARIO: "Test::Integration::Kubernetes"
682
-
683
- ce:ssh_tunnel:
643
+ ce:object_storage:
684
644
  extends:
685
645
  - .test
686
646
  - .high-capacity
687
647
  - .ce-qa
688
648
  - .rspec-report-opts
689
- allow_failure: true
690
649
  variables:
691
- QA_SCENARIO: "Test::Integration::SSHTunnel"
650
+ GITLAB_QA_OPTS: "--omnibus-config object_storage"
692
651
 
693
- ce:ssh_tunnel-quarantine:
652
+ ce:object_storage-quarantine:
694
653
  extends:
695
654
  - .test
696
655
  - .high-capacity
@@ -698,19 +657,19 @@ ce:ssh_tunnel-quarantine:
698
657
  - .quarantine
699
658
  - .rspec-report-opts
700
659
  variables:
701
- QA_SCENARIO: "Test::Integration::SSHTunnel"
660
+ GITLAB_QA_OPTS: "--omnibus-config object_storage"
702
661
 
703
- ee:ssh_tunnel:
662
+ ee:object_storage_aws:
704
663
  extends:
705
664
  - .test
706
665
  - .high-capacity
707
666
  - .ee-qa
708
667
  - .rspec-report-opts
709
- allow_failure: true
710
668
  variables:
711
- QA_SCENARIO: "Test::Integration::SSHTunnel"
669
+ GITLAB_QA_OPTS: "--omnibus-config object_storage_aws"
670
+ QA_RSPEC_TAGS: "--tag object_storage"
712
671
 
713
- ee:ssh_tunnel-quarantine:
672
+ ee:object_storage_aws-quarantine:
714
673
  extends:
715
674
  - .test
716
675
  - .high-capacity
@@ -718,26 +677,8 @@ ee:ssh_tunnel-quarantine:
718
677
  - .quarantine
719
678
  - .rspec-report-opts
720
679
  variables:
721
- QA_SCENARIO: "Test::Integration::SSHTunnel"
722
-
723
- ce:object_storage:
724
- extends:
725
- - .test
726
- - .high-capacity
727
- - .ce-qa
728
- - .rspec-report-opts
729
- variables:
730
- GITLAB_QA_OPTS: "--omnibus-config object_storage"
731
-
732
- ce:object_storage-quarantine:
733
- extends:
734
- - .test
735
- - .high-capacity
736
- - .ce-qa
737
- - .quarantine
738
- - .rspec-report-opts
739
- variables:
740
- GITLAB_QA_OPTS: "--omnibus-config object_storage"
680
+ GITLAB_QA_OPTS: "--omnibus-config object_storage_aws"
681
+ QA_RSPEC_TAGS: "--tag quarantine --tag object_storage"
741
682
 
742
683
  ee:object_storage:
743
684
  extends:
@@ -1036,50 +977,23 @@ ee:jira-quarantine:
1036
977
  variables:
1037
978
  QA_SCENARIO: "Test::Integration::Jira"
1038
979
 
1039
- generate-allure-report:
1040
- image:
1041
- name: ${GITLAB_DEPENDENCY_PROXY}andrcuns/allure-report-publisher:0.3.3
1042
- entrypoint: [""]
1043
- stage: report
980
+ ce:large-setup:
981
+ extends:
982
+ - .test
983
+ - .high-capacity
984
+ - .ce-qa
985
+ - .rspec-report-opts
1044
986
  variables:
1045
- GIT_STRATEGY: none
1046
- STORAGE_CREDENTIALS: $QA_ALLURE_REPORT_GCS_CREDENTIALS
1047
- GITLAB_AUTH_TOKEN: $GITLAB_QA_MR_ALLURE_REPORT_TOKEN
1048
- # Override allure variables for upstream triggers
1049
- ALLURE_PROJECT_PATH: $TOP_UPSTREAM_SOURCE_PROJECT
1050
- ALLURE_MERGE_REQUEST_IID: $TOP_UPSTREAM_MERGE_REQUEST_IID
1051
- ALLURE_COMMIT_SHA: $TOP_UPSTREAM_SOURCE_SHA
1052
- # Override default before script and don't push cache
1053
- cache:
1054
- policy: pull
1055
- before_script:
1056
- - echo "Generating and publishing allure test report"
1057
- script:
1058
- - |
1059
- allure-report-publisher upload gcs \
1060
- --results-glob="gitlab-qa-run-*/**/allure-results/*" \
1061
- --bucket="gitlab-qa-allure-reports" \
1062
- --prefix="${ALLURE_JOB_NAME}/${TOP_UPSTREAM_SOURCE_REF:=$CI_COMMIT_REF_SLUG}" \
1063
- --update-pr="comment" \
1064
- --copy-latest \
1065
- --ignore-missing-results \
1066
- --color
1067
- allow_failure: true
1068
- rules:
1069
- # Don't run report generation on release pipelines
1070
- - if: '$CI_SERVER_HOST == "gitlab.com" && $CI_PROJECT_PATH == "gitlab-org/gitlab-qa" && $RELEASE == null'
1071
- changes: ["lib/**/version.rb"]
1072
- when: never
1073
- - if: '$CI_COMMIT_TAG'
1074
- when: never
1075
- - if: '$CI_PIPELINE_SOURCE == "merge_request_event" || ($CI_PIPELINE_SOURCE == "push" && $CI_COMMIT_REF_NAME == $CI_DEFAULT_BRANCH)'
1076
- variables:
1077
- ALLURE_JOB_NAME: gitlab-qa
1078
- when: always
1079
- - if: '$TOP_UPSTREAM_SOURCE_PROJECT && $TOP_UPSTREAM_SOURCE_SHA'
1080
- variables:
1081
- ALLURE_JOB_NAME: package-and-qa
1082
- when: always
987
+ QA_RSPEC_TAGS: "--tag can_use_large_setup"
988
+
989
+ ee:large-setup:
990
+ extends:
991
+ - .test
992
+ - .high-capacity
993
+ - .ee-qa
994
+ - .rspec-report-opts
995
+ variables:
996
+ QA_RSPEC_TAGS: "--tag can_use_large_setup"
1083
997
 
1084
998
  # This job requires the `GITLAB_QA_ACCESS_TOKEN` and `GITLAB_QA_DEV_ACCESS_TOKEN`
1085
999
  # variable to be passed when triggered.
@@ -1177,3 +1091,37 @@ notify_slack:
1177
1091
  include:
1178
1092
  - project: 'gitlab-org/quality/pipeline-common'
1179
1093
  file: '/ci/gem-release.yml'
1094
+ - project: 'gitlab-org/quality/pipeline-common'
1095
+ file: '/ci/allure-report.yml'
1096
+
1097
+ generate-allure-report:
1098
+ extends: .generate-allure-report-base
1099
+ stage: report
1100
+ variables:
1101
+ STORAGE_CREDENTIALS: $QA_ALLURE_REPORT_GCS_CREDENTIALS
1102
+ GITLAB_AUTH_TOKEN: $GITLAB_QA_MR_ALLURE_REPORT_TOKEN
1103
+ ALLURE_RESULTS_GLOB: gitlab-qa-run-*/**/allure-results/*
1104
+ # Override allure variables for upstream triggers
1105
+ ALLURE_PROJECT_PATH: $TOP_UPSTREAM_SOURCE_PROJECT
1106
+ ALLURE_MERGE_REQUEST_IID: $TOP_UPSTREAM_MERGE_REQUEST_IID
1107
+ ALLURE_COMMIT_SHA: $TOP_UPSTREAM_SOURCE_SHA
1108
+ # Override default before script and don't push cache
1109
+ cache:
1110
+ policy: pull
1111
+ before_script:
1112
+ - echo "Generating and publishing allure test report"
1113
+ rules:
1114
+ # Don't run report generation on release pipelines
1115
+ - if: '$CI_SERVER_HOST == "gitlab.com" && $CI_PROJECT_PATH == "gitlab-org/gitlab-qa" && $RELEASE == null'
1116
+ changes: ["lib/**/version.rb"]
1117
+ when: never
1118
+ - if: '$CI_COMMIT_TAG'
1119
+ when: never
1120
+ - if: '$CI_PIPELINE_SOURCE == "merge_request_event" || ($CI_PIPELINE_SOURCE == "push" && $CI_COMMIT_REF_NAME == $CI_DEFAULT_BRANCH)'
1121
+ variables:
1122
+ ALLURE_JOB_NAME: gitlab-qa
1123
+ when: always
1124
+ - if: '$TOP_UPSTREAM_SOURCE_PROJECT && $TOP_UPSTREAM_SOURCE_SHA'
1125
+ variables:
1126
+ ALLURE_JOB_NAME: package-and-qa
1127
+ when: always
@@ -3,10 +3,17 @@
3
3
 
4
4
  require 'gitlab'
5
5
 
6
+ # Default to "Multi-pipeline (from 'gitlab-org/gitlab-qa' 'notify_upstream_commit:*' jobs)" from current project
7
+ api_token = ENV.fetch('GITLAB_QA_PROJECT_ACCESS_TOKEN') do
8
+ puts "The $GITLAB_BOT_MULTI_PROJECT_PIPELINE_POLLING_TOKEN variable is deprecated in favor of a dedicated project access token: $GITLAB_QA_PROJECT_ACCESS_TOKEN."
9
+ puts "See https://gitlab.com/groups/gitlab-org/quality/-/epics/17 for more details."
10
+ ENV['GITLAB_BOT_MULTI_PROJECT_PIPELINE_POLLING_TOKEN']
11
+ end
12
+
6
13
  # Configure credentials to be used with gitlab gem
7
14
  Gitlab.configure do |config|
8
15
  config.endpoint = 'https://gitlab.com/api/v4'
9
- config.private_token = ENV['GITLAB_BOT_MULTI_PROJECT_PIPELINE_POLLING_TOKEN']
16
+ config.private_token = api_token
10
17
  end
11
18
 
12
19
  class CommitComment
@@ -813,6 +813,15 @@ $ export EE_LICENSE=$(cat /path/to/gitlab_license)
813
813
  $ gitlab-qa Test::Instance::Airgapped EE -- --tag smoke
814
814
  ```
815
815
 
816
+ ### `Test::Instance::Image CE|EE|<full image address> --omnibus-config object_storage`
817
+
818
+ This orchestrated scenario runs tests from the test suite against a GitLab instance which has object storage configured instead of using local storage. The omnibus configuration `object_storage` ([configurator](configuring_omnibus.md)), uses Minio and `object_storage_aws` uses an AWS S3 account with credentials configured in the pipeline as CI Variables (available on 1Password). Requires:
819
+
820
+ * `AWS_S3_REGION` - Region where the bucket is created. To optimize latency, minimize costs, or address regulatory requirements, choose any AWS Region that is geographically close to you.
821
+ * `AWS_S3_KEY_ID` - Key ID for the user accessing the bucket.
822
+ * `AWS_S3_ACCESS_KEY` - Access Key for the user accessing the bucket.
823
+ * `AWS_S3_BUCKET_NAME` - The name of the bucket where objects are stored. After a bucket is created, the name of that bucket cannot be used by another AWS account in any AWS Region until the bucket is deleted.
824
+
816
825
  ### `Test::Instance::Geo EE|<full image address>:nightly|latest|any_tag http://geo-primary.gitlab http://geo-secondary.gitlab`
817
826
 
818
827
  This scenario will run tests tagged `:geo` against a live Geo deployment, by spinning up a GitLab QA (`gitlab/gitlab-qa`)
@@ -1,5 +1,7 @@
1
1
  # frozen_string_literal: true
2
2
 
3
+ require 'erb'
4
+
3
5
  module Gitlab
4
6
  module QA
5
7
  module Report
@@ -189,11 +191,12 @@ module Gitlab
189
191
 
190
192
  def generate_test_text(testcase, tests_with_same_testcase, passed)
191
193
  text = tests_with_same_testcase.map(&:name).uniq.join(', ')
194
+ encoded_text = ERB::Util.url_encode(text)
192
195
 
193
196
  if testcase && !passed
194
197
  # Workaround for reducing system notes on testcase issues
195
198
  # The first regex extracts the link to the issues list page from a link to a single issue show page by removing the issue id.
196
- "[#{text}](#{testcase.match(%r{[\s\S]+\/[^\/\d]+})}?state=opened&search=#{text}) (testcase_id=#{testcase.match(/\d+/)})"
199
+ "[#{text}](#{testcase.match(%r{[\s\S]+\/[^\/\d]+})}?state=opened&search=#{encoded_text}) (testcase_id=#{testcase.match(/\d+/)})"
197
200
  else
198
201
  text
199
202
  end
@@ -92,7 +92,12 @@ module Gitlab
92
92
  'DEPLOY_VERSION' => :deploy_version,
93
93
  'GITLAB_QA_USER_AGENT' => :gitlab_qa_user_agent,
94
94
  'GEO_FAILOVER' => :geo_failover,
95
- 'GITLAB_INITIAL_ROOT_PASSWORD' => :initial_root_password
95
+ 'GITLAB_INITIAL_ROOT_PASSWORD' => :initial_root_password,
96
+ 'GITLAB_TLS_CERTIFICATE' => :gitlab_tls_certificate,
97
+ 'AWS_S3_REGION' => :aws_s3_region,
98
+ 'AWS_S3_KEY_ID' => :aws_s3_key_id,
99
+ 'AWS_S3_ACCESS_KEY' => :aws_s3_access_key,
100
+ 'AWS_S3_BUCKET_NAME' => :aws_s3_bucket_name
96
101
  }.freeze
97
102
 
98
103
  ENV_VARIABLES.each do |env_name, method_name|
@@ -126,10 +131,6 @@ module Gitlab
126
131
  ENV['GITLAB_API_BASE'] || 'https://gitlab.com/api/v4'
127
132
  end
128
133
 
129
- def gitlab_bot_multi_project_pipeline_polling_token
130
- ENV['GITLAB_BOT_MULTI_PROJECT_PIPELINE_POLLING_TOKEN']
131
- end
132
-
133
134
  def gitlab_ci_api_token
134
135
  ENV['GITLAB_CI_API_TOKEN']
135
136
  end
@@ -214,6 +215,22 @@ module Gitlab
214
215
  ENV['ELASTIC_VERSION'] || '6.4.2'.freeze
215
216
  end
216
217
 
218
+ def aws_s3_region
219
+ ENV['AWS_S3_REGION']
220
+ end
221
+
222
+ def aws_s3_key_id
223
+ ENV['AWS_S3_KEY_ID']
224
+ end
225
+
226
+ def aws_s3_access_key
227
+ ENV['AWS_S3_ACCESS_KEY']
228
+ end
229
+
230
+ def aws_s3_bucket_name
231
+ ENV['AWS_S3_BUCKET_NAME']
232
+ end
233
+
217
234
  def variables
218
235
  vars = {}
219
236
 
@@ -269,6 +286,12 @@ module Gitlab
269
286
  end
270
287
  end
271
288
 
289
+ def require_aws_s3_environment!
290
+ %w[AWS_S3_REGION AWS_S3_KEY_ID AWS_S3_ACCESS_KEY AWS_S3_BUCKET_NAME].each do |env_key|
291
+ raise ArgumentError, "Environment variable #{env_key} must be set to run AWS S3 object storage specs" unless ENV.key?(env_key)
292
+ end
293
+ end
294
+
272
295
  def require_initial_password!
273
296
  return unless ENV['GITLAB_INITIAL_ROOT_PASSWORD'].to_s.strip.empty?
274
297
 
@@ -0,0 +1,30 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Gitlab
4
+ module QA
5
+ module Runtime
6
+ module OmnibusConfigurations
7
+ class ObjectStorageAws < Default
8
+ def configuration
9
+ Runtime::Env.require_aws_s3_environment!
10
+
11
+ <<~OMNIBUS
12
+ gitlab_rails['object_store']['enabled'] = true
13
+ gitlab_rails['object_store']['proxy_download'] = true
14
+ gitlab_rails['object_store']['connection'] = { 'provider' => 'AWS', 'region' => '#{Runtime::Env.aws_s3_region}', 'aws_access_key_id' => '#{Runtime::Env.aws_s3_key_id}', 'aws_secret_access_key' => '#{Runtime::Env.aws_s3_access_key}' }
15
+
16
+ gitlab_rails['object_store']['objects']['artifacts']['bucket'] = '#{Runtime::Env.aws_s3_bucket_name}'
17
+ gitlab_rails['object_store']['objects']['external_diffs']['bucket'] = '#{Runtime::Env.aws_s3_bucket_name}'
18
+ gitlab_rails['object_store']['objects']['lfs']['bucket'] = '#{Runtime::Env.aws_s3_bucket_name}'
19
+ gitlab_rails['object_store']['objects']['uploads']['bucket'] = '#{Runtime::Env.aws_s3_bucket_name}'
20
+ gitlab_rails['object_store']['objects']['packages']['bucket'] = '#{Runtime::Env.aws_s3_bucket_name}'
21
+ gitlab_rails['object_store']['objects']['dependency_proxy']['bucket'] = '#{Runtime::Env.aws_s3_bucket_name}'
22
+ gitlab_rails['object_store']['objects']['pages']['bucket'] = '#{Runtime::Env.aws_s3_bucket_name}'
23
+ gitlab_rails['object_store']['objects']['terraform_state']['bucket'] = '#{Runtime::Env.aws_s3_bucket_name}'
24
+ OMNIBUS
25
+ end
26
+ end
27
+ end
28
+ end
29
+ end
30
+ end
@@ -107,23 +107,23 @@ module Gitlab
107
107
  praefect['database_password'] = 'SQL_PASSWORD';
108
108
  praefect['database_dbname'] = 'praefect_production';
109
109
  praefect['database_sslmode'] = 'disable';
110
- praefect['postgres_queue_enabled'] = true;
111
- praefect['failover_enabled'] = true;
112
- praefect['failover_election_strategy'] = 'per_repository';
110
+ praefect['database_direct_host'] = '#{@database}.#{@network}';
111
+ praefect['database_direct_port'] = 5432;
113
112
  praefect['virtual_storages'] = {
114
113
  'default' => {
115
- '#{@primary_node_name}' => {
116
- 'address' => 'tcp://#{@primary_node_name}.#{@network}:8075',
117
- 'token' => 'PRAEFECT_INTERNAL_TOKEN',
118
- 'primary' => true
119
- },
120
- '#{@secondary_node_name}' => {
121
- 'address' => 'tcp://#{@secondary_node_name}.#{@network}:8075',
122
- 'token' => 'PRAEFECT_INTERNAL_TOKEN'
123
- },
124
- '#{@tertiary_node_name}' => {
125
- 'address' => 'tcp://#{@tertiary_node_name}.#{@network}:8075',
126
- 'token' => 'PRAEFECT_INTERNAL_TOKEN'
114
+ 'nodes' => {
115
+ '#{@primary_node_name}' => {
116
+ 'address' => 'tcp://#{@primary_node_name}.#{@network}:8075',
117
+ 'token' => 'PRAEFECT_INTERNAL_TOKEN'
118
+ },
119
+ '#{@secondary_node_name}' => {
120
+ 'address' => 'tcp://#{@secondary_node_name}.#{@network}:8075',
121
+ 'token' => 'PRAEFECT_INTERNAL_TOKEN'
122
+ },
123
+ '#{@tertiary_node_name}' => {
124
+ 'address' => 'tcp://#{@tertiary_node_name}.#{@network}:8075',
125
+ 'token' => 'PRAEFECT_INTERNAL_TOKEN'
126
+ }
127
127
  }
128
128
  }
129
129
  };
@@ -164,7 +164,7 @@ module Gitlab
164
164
  'gitaly_token' => 'PRAEFECT_EXTERNAL_TOKEN'
165
165
  }
166
166
  });
167
- gitaly['listen_addr'] = '0.0.0.0:8075';
167
+ gitaly['enable'] = false;
168
168
  gitlab_shell['secret_token'] = 'GITLAB_SHELL_SECRET_TOKEN';
169
169
  prometheus['scrape_configs'] = [
170
170
  {
@@ -27,6 +27,7 @@ module Gitlab
27
27
  'path' => '/var/opt/gitlab/git-data'
28
28
  }
29
29
  });
30
+ gitaly['enable'] = true;
30
31
  gitaly['listen_addr'] = '0.0.0.0:8075';
31
32
  gitaly['auth_token'] = 'secret-token';
32
33
  gitaly['storage'] = [
@@ -0,0 +1,44 @@
1
+ # frozen_string_literal: true
2
+
3
+ module Gitlab
4
+ module QA
5
+ module Scenario
6
+ module Test
7
+ module Integration
8
+ class Registry < Scenario::Template
9
+ def perform(release, *rspec_args)
10
+ Component::Gitlab.perform do |gitlab|
11
+ gitlab.release = release
12
+ gitlab.network = 'test'
13
+ gitlab.name = 'gitlab'
14
+ gitlab.tls = true
15
+
16
+ gitlab.omnibus_configuration << <<~OMNIBUS
17
+ external_url 'https://#{gitlab.name}.#{gitlab.network}';
18
+ registry_external_url 'https://#{gitlab.name}.#{gitlab.network}:5050';
19
+
20
+ letsencrypt['enable'] = false;
21
+
22
+ nginx['redirect_http_to_https'] = true;
23
+ nginx['ssl_certificate'] = "/etc/gitlab/ssl/gitlab.test.crt";
24
+ nginx['ssl_certificate_key'] = "/etc/gitlab/ssl/gitlab.test.key";
25
+ registry_nginx['ssl_certificate'] = "/etc/gitlab/ssl/gitlab.test.crt";
26
+ registry_nginx['ssl_certificate_key'] = "/etc/gitlab/ssl/gitlab.test.key";
27
+ OMNIBUS
28
+
29
+ gitlab.instance do
30
+ Component::Specs.perform do |specs|
31
+ specs.suite = 'Test::Integration::Registry'
32
+ specs.release = gitlab.release
33
+ specs.network = gitlab.network
34
+ specs.args = [gitlab.address, *rspec_args]
35
+ end
36
+ end
37
+ end
38
+ end
39
+ end
40
+ end
41
+ end
42
+ end
43
+ end
44
+ end
@@ -1,5 +1,5 @@
1
1
  module Gitlab
2
2
  module QA
3
- VERSION = '7.5.0'.freeze
3
+ VERSION = '7.7.2'.freeze
4
4
  end
5
5
  end
data/lib/gitlab/qa.rb CHANGED
@@ -14,6 +14,7 @@ module Gitlab
14
14
  autoload :Default, 'gitlab/qa/runtime/omnibus_configurations/default'
15
15
  autoload :Packages, 'gitlab/qa/runtime/omnibus_configurations/packages'
16
16
  autoload :ObjectStorage, 'gitlab/qa/runtime/omnibus_configurations/object_storage'
17
+ autoload :ObjectStorageAws, 'gitlab/qa/runtime/omnibus_configurations/object_storage_aws'
17
18
  autoload :LicenseMode, 'gitlab/qa/runtime/omnibus_configurations/license_mode'
18
19
  end
19
20
  end
@@ -66,6 +67,7 @@ module Gitlab
66
67
  autoload :SSHTunnel, 'gitlab/qa/scenario/test/integration/ssh_tunnel'
67
68
  autoload :MTLS, 'gitlab/qa/scenario/test/integration/mtls'
68
69
  autoload :ClientSSL, 'gitlab/qa/scenario/test/integration/client_ssl'
70
+ autoload :Registry, 'gitlab/qa/scenario/test/integration/registry'
69
71
  end
70
72
 
71
73
  module Sanity
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: gitlab-qa
3
3
  version: !ruby/object:Gem::Version
4
- version: 7.5.0
4
+ version: 7.7.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - GitLab Quality
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2021-07-08 00:00:00.000000000 Z
11
+ date: 2021-08-24 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: climate_control
@@ -293,6 +293,7 @@ files:
293
293
  - lib/gitlab/qa/runtime/omnibus_configurations/default.rb
294
294
  - lib/gitlab/qa/runtime/omnibus_configurations/license_mode.rb
295
295
  - lib/gitlab/qa/runtime/omnibus_configurations/object_storage.rb
296
+ - lib/gitlab/qa/runtime/omnibus_configurations/object_storage_aws.rb
296
297
  - lib/gitlab/qa/runtime/omnibus_configurations/packages.rb
297
298
  - lib/gitlab/qa/runtime/scenario.rb
298
299
  - lib/gitlab/qa/runtime/token_finder.rb
@@ -328,6 +329,7 @@ files:
328
329
  - lib/gitlab/qa/scenario/test/integration/mattermost.rb
329
330
  - lib/gitlab/qa/scenario/test/integration/mtls.rb
330
331
  - lib/gitlab/qa/scenario/test/integration/praefect.rb
332
+ - lib/gitlab/qa/scenario/test/integration/registry.rb
331
333
  - lib/gitlab/qa/scenario/test/integration/saml.rb
332
334
  - lib/gitlab/qa/scenario/test/integration/smtp.rb
333
335
  - lib/gitlab/qa/scenario/test/integration/ssh_tunnel.rb