gitlab-qa 8.13.1 → 8.14.1
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/.gitlab/ci/jobs/airgapped.gitlab-ci.yml +23 -0
- data/Gemfile.lock +1 -1
- data/docs/what_tests_can_be_run.md +2 -1
- data/lib/gitlab/qa/component/base.rb +11 -4
- data/lib/gitlab/qa/component/gitaly.rb +82 -0
- data/lib/gitlab/qa/component/gitaly_cluster.rb +150 -0
- data/lib/gitlab/qa/component/gitlab.rb +1 -23
- data/lib/gitlab/qa/component/praefect.rb +92 -0
- data/lib/gitlab/qa/release.rb +5 -5
- data/lib/gitlab/qa/runtime/env.rb +14 -1
- data/lib/gitlab/qa/scenario/test/instance/airgapped.rb +97 -26
- data/lib/gitlab/qa/scenario/test/integration/gitaly_cluster.rb +13 -179
- data/lib/gitlab/qa/scenario/test/integration/praefect.rb +8 -8
- data/lib/gitlab/qa/support/config_scripts.rb +33 -0
- data/lib/gitlab/qa/version.rb +1 -1
- data/scripts/generate-qa-jobs.rb +1 -0
- data/support/data/license_usage_seed.rb +1 -1
- metadata +7 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: b7fcc8c586127f3c1883786b303610fd2360293a4e2ee2727225a0f50a865947
|
4
|
+
data.tar.gz: 7928dcd357359e99bc3e8c921bf3cda138d1cf5dee9746760a097c34c92be323
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 65877f46a7c942ada94490ffcbdcdc74f757cc51000879e4f5030030fcbd0fb59e5be9f8ebd1550d0effe332cad61ff043eb7f8434aaddc72b6094d269048850
|
7
|
+
data.tar.gz: 837d053e553827cd507ba10e12056ae8bb8dbe32b22903f89c5eb67e59f57230a561897e34eb97f6ba67b5b67b8d66562a773c5fc487525ca1a0c83a006656d9
|
@@ -0,0 +1,23 @@
|
|
1
|
+
ce:airgapped:
|
2
|
+
extends:
|
3
|
+
- .rules:ce-never-when-triggered-by-feature-flag-definition-change
|
4
|
+
- .test
|
5
|
+
- .high-capacity
|
6
|
+
- .ce-variables
|
7
|
+
- .rspec-report-opts
|
8
|
+
parallel: 10
|
9
|
+
variables:
|
10
|
+
QA_SCENARIO: "Test::Instance::Airgapped"
|
11
|
+
QA_RSPEC_TAGS: "--tag '~github' --tag '~skip_live_env'"
|
12
|
+
|
13
|
+
ee:airgapped:
|
14
|
+
extends:
|
15
|
+
- .rules:ee-never-when-triggered-by-feature-flag-definition-change
|
16
|
+
- .test
|
17
|
+
- .high-capacity
|
18
|
+
- .ee-variables
|
19
|
+
- .rspec-report-opts
|
20
|
+
parallel: 10
|
21
|
+
variables:
|
22
|
+
QA_SCENARIO: "Test::Instance::Airgapped"
|
23
|
+
QA_RSPEC_TAGS: "--tag '~github' --tag '~skip_live_env'"
|
data/Gemfile.lock
CHANGED
@@ -95,12 +95,13 @@ All environment variables used by GitLab QA should be defined in [`lib/gitlab/qa
|
|
95
95
|
| `JIRA_ADMIN_PASSWORD` |- | Password for authenticating with Jira server as admin. | No|
|
96
96
|
| `CACHE_NAMESPACE_NAME` | `true` | Cache namespace name for groups. | No|
|
97
97
|
| `DEPLOY_VERSION` |- | The version of GitLab being tested against. | No|
|
98
|
-
| `GITLAB_QA_USER_AGENT` |- | The browser user-agent to use instead of the default Chrome user-agent. | No|
|
98
|
+
| `GITLAB_QA_USER_AGENT` |- | The browser user-agent to use instead of the default Chrome user-agent. When set to the appropriate value (stored in 1Password), this allows tests to bypass certain login challenges (e.g., reCAPTCHA and ArkoseLabs). | No|
|
99
99
|
| `GEO_FAILOVER` | `false` | Set to `true` when a Geo secondary site has been promoted to a Geo primary site. | No|
|
100
100
|
| `GITLAB_INITIAL_ROOT_PASSWORD` | `5iveL!fe` | Initial root password for Omnibus installations | No|
|
101
101
|
| `COLORIZED_LOGS` | `false` | Colors GitLab QA and test logs to improve readability | No|
|
102
102
|
| `QA_DOCKER_ADD_HOSTS` |- | Comma separated list of hosts to add to /etc/hosts in docker container | No|
|
103
103
|
| `FIPS` |- | Set to `1` or `true` to indicate that the test is running under FIPS mode | No|
|
104
|
+
| `JH_ENV` | `false` | Set to `true` to indicate tests or scenarios are running under JH env | No|
|
104
105
|
|
105
106
|
## [Supported Remote Grid environment variables](./running_against_remote_grid.md)
|
106
107
|
|
@@ -7,7 +7,7 @@ module Gitlab
|
|
7
7
|
include Scenario::Actable
|
8
8
|
|
9
9
|
attr_reader :docker
|
10
|
-
attr_accessor :volumes, :ports, :network, :environment, :runner_network
|
10
|
+
attr_accessor :volumes, :ports, :network, :environment, :runner_network, :airgapped_network
|
11
11
|
attr_writer :name, :exec_commands
|
12
12
|
|
13
13
|
def initialize
|
@@ -72,15 +72,22 @@ module Gitlab
|
|
72
72
|
end
|
73
73
|
|
74
74
|
def prepare_network
|
75
|
-
|
76
|
-
|
77
|
-
end
|
75
|
+
prepare_airgapped_network
|
76
|
+
prepare_runner_network
|
78
77
|
|
79
78
|
return if docker.network_exists?(network)
|
80
79
|
|
81
80
|
docker.network_create(network)
|
82
81
|
end
|
83
82
|
|
83
|
+
def prepare_airgapped_network
|
84
|
+
docker.network_create("--driver=bridge --internal #{network}") if airgapped_network && !docker.network_exists?(network)
|
85
|
+
end
|
86
|
+
|
87
|
+
def prepare_runner_network
|
88
|
+
docker.network_create("--driver=bridge --internal #{runner_network}") if runner_network && !docker.network_exists?(runner_network)
|
89
|
+
end
|
90
|
+
|
84
91
|
def prepare_docker_container
|
85
92
|
return unless docker.container_exists?(name)
|
86
93
|
|
@@ -0,0 +1,82 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Gitlab
|
4
|
+
module QA
|
5
|
+
module Component
|
6
|
+
class Gitaly < Base
|
7
|
+
extend Forwardable
|
8
|
+
using Rainbow
|
9
|
+
attr_reader :release
|
10
|
+
attr_accessor :gitaly_port, :gitlab_name, :cluster_config
|
11
|
+
attr_writer :name
|
12
|
+
|
13
|
+
def_delegators :release, :tag, :image, :edition
|
14
|
+
|
15
|
+
def initialize
|
16
|
+
super
|
17
|
+
self.release = 'EE'
|
18
|
+
@cluster_config = Component::GitalyCluster::GitalyClusterConfig.new
|
19
|
+
@gitaly_port = 8075
|
20
|
+
@ports = [gitaly_port]
|
21
|
+
end
|
22
|
+
|
23
|
+
def name
|
24
|
+
@name || "gitaly-#{SecureRandom.hex(4)}"
|
25
|
+
end
|
26
|
+
|
27
|
+
def release=(release)
|
28
|
+
@release = QA::Release.new(release)
|
29
|
+
end
|
30
|
+
|
31
|
+
def reconfigure
|
32
|
+
setup_omnibus
|
33
|
+
@docker.attach(name) do |line, wait|
|
34
|
+
# TODO, workaround which allows to detach from the container
|
35
|
+
break if /gitlab Reconfigured!/.match?(line)
|
36
|
+
end
|
37
|
+
end
|
38
|
+
|
39
|
+
def setup_omnibus
|
40
|
+
@docker.write_files(name) do |f|
|
41
|
+
f.write('/etc/gitlab/gitlab.rb', gitaly_omnibus_configuration)
|
42
|
+
end
|
43
|
+
end
|
44
|
+
|
45
|
+
def process_exec_commands
|
46
|
+
exec_commands << Support::ConfigScripts.add_git_server_hooks(docker, name)
|
47
|
+
|
48
|
+
commands = exec_commands.flatten.uniq
|
49
|
+
return if commands.empty?
|
50
|
+
|
51
|
+
Runtime::Logger.info("Running exec_commands...")
|
52
|
+
commands.each { |command| docker.exec(name, command) }
|
53
|
+
end
|
54
|
+
|
55
|
+
def gitaly_omnibus_configuration
|
56
|
+
<<~OMNIBUS
|
57
|
+
#{GitalyCluster.disable_other_omnibus_services}
|
58
|
+
praefect['enable'] = false;
|
59
|
+
prometheus['enable'] = true;
|
60
|
+
gitaly['enable'] = true;
|
61
|
+
gitaly['listen_addr'] = '0.0.0.0:#{gitaly_port}';
|
62
|
+
gitaly['prometheus_listen_addr'] = '0.0.0.0:9236';
|
63
|
+
gitaly['auth_token'] = 'PRAEFECT_INTERNAL_TOKEN';
|
64
|
+
gitlab_shell['secret_token'] = 'GITLAB_SHELL_SECRET_TOKEN';
|
65
|
+
gitlab_rails['internal_api_url'] = 'http://#{cluster_config.gitlab_name}.#{cluster_config.network}';
|
66
|
+
git_data_dirs({
|
67
|
+
'#{cluster_config.primary_node_name}' => {
|
68
|
+
'path' => '/var/opt/gitlab/git-data'
|
69
|
+
},
|
70
|
+
'#{cluster_config.secondary_node_name}' => {
|
71
|
+
'path' => '/var/opt/gitlab/git-data'
|
72
|
+
},
|
73
|
+
'#{cluster_config.tertiary_node_name}' => {
|
74
|
+
'path' => '/var/opt/gitlab/git-data'
|
75
|
+
}
|
76
|
+
});
|
77
|
+
OMNIBUS
|
78
|
+
end
|
79
|
+
end
|
80
|
+
end
|
81
|
+
end
|
82
|
+
end
|
@@ -0,0 +1,150 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Gitlab
|
4
|
+
module QA
|
5
|
+
module Component
|
6
|
+
class GitalyCluster
|
7
|
+
class GitalyClusterConfig
|
8
|
+
attr_accessor :gitlab_name, :network, :airgapped_network,
|
9
|
+
:praefect_node_name, :praefect_port, :praefect_ip,
|
10
|
+
:primary_node_name, :primary_node_port,
|
11
|
+
:secondary_node_name, :secondary_node_port,
|
12
|
+
:tertiary_node_name, :tertiary_node_port,
|
13
|
+
:database_node_name, :database_port
|
14
|
+
|
15
|
+
attr_reader :praefect_addr, :primary_node_addr, :secondary_node_addr, :tertiary_node_addr, :database_node_addr
|
16
|
+
|
17
|
+
def initialize(params = {}) # rubocop:disable Metrics/AbcSize, Metrics/CyclomaticComplexity
|
18
|
+
@gitlab_name = params[:gitlab_name] || 'gitlab-gitaly-cluster'
|
19
|
+
@network = params[:network] || 'test'
|
20
|
+
@airgapped_network = params[:airgapped_network] || false
|
21
|
+
|
22
|
+
@praefect_node_name = params[:praefect_node_name] || 'praefect'
|
23
|
+
@praefect_port = params[:praefect_port] || 2305
|
24
|
+
|
25
|
+
@primary_node_name = params[:primary_node_name] || 'gitaly1'
|
26
|
+
@primary_node_port = params[:primary_node_port] || 8075
|
27
|
+
|
28
|
+
@secondary_node_name = params[:secondary_node_name] || 'gitaly2'
|
29
|
+
@secondary_node_port = params[:secondary_node_port] || 8075
|
30
|
+
|
31
|
+
@tertiary_node_name = params[:tertiary_node_name] || 'gitaly3'
|
32
|
+
@tertiary_node_port = params[:tertiary_node_port] || 8075
|
33
|
+
|
34
|
+
@database_node_name = params[:database_node_name] || 'postgres'
|
35
|
+
@database_port = params[:database_port] || 5432
|
36
|
+
|
37
|
+
@praefect_addr = "#{praefect_node_name}.#{network}"
|
38
|
+
@primary_node_addr = "#{primary_node_name}.#{network}"
|
39
|
+
@secondary_node_addr = "#{secondary_node_name}.#{network}"
|
40
|
+
@tertiary_node_addr = "#{tertiary_node_name}.#{network}"
|
41
|
+
@database_node_addr = "#{database_node_name}.#{network}"
|
42
|
+
end
|
43
|
+
end
|
44
|
+
|
45
|
+
include Scenario::Actable
|
46
|
+
using Rainbow
|
47
|
+
|
48
|
+
attr_accessor :release, :exec_commands, :gitlab_name, :config
|
49
|
+
attr_reader :gitaly_primary_node, :gitaly_secondary_node, :gitaly_tertiary_node, :praefect_node, :database_node
|
50
|
+
|
51
|
+
def initialize(config = GitalyClusterConfig.new)
|
52
|
+
@spec_suite = 'Test::Instance::All'
|
53
|
+
@env = {}
|
54
|
+
@tag = 'gitaly_cluster'
|
55
|
+
@release = 'EE'
|
56
|
+
@config = config
|
57
|
+
end
|
58
|
+
|
59
|
+
# @param [Boolean] parallel_gitaly controls whether we start gitaly nodes in parallel to improve startup time
|
60
|
+
def instance(parallel_gitaly = false)
|
61
|
+
run_gitaly_cluster(QA::Release.new(release), parallel_gitaly)
|
62
|
+
end
|
63
|
+
|
64
|
+
# @param [Boolean] parallel_gitaly controls whether we start gitaly nodes in parallel to improve startup time
|
65
|
+
def run_gitaly_cluster(release, parallel_gitaly = false)
|
66
|
+
# This also ensure that the docker network is created here, avoiding any potential race conditions later
|
67
|
+
# if the gitaly-cluster and GitLab containers attempt to create a network in parallel
|
68
|
+
@database_node = postgres
|
69
|
+
|
70
|
+
Thread.new do
|
71
|
+
Thread.current.abort_on_exception = true
|
72
|
+
start_gitaly_cluster(release, parallel_gitaly)
|
73
|
+
end
|
74
|
+
end
|
75
|
+
|
76
|
+
# @param [Boolean] parallel_gitaly controls whether we start gitaly nodes in parallel to improve startup time
|
77
|
+
def start_gitaly_cluster(release, parallel_gitaly = false) # rubocop:disable Metrics/AbcSize
|
78
|
+
Runtime::Logger.info("Starting Gitaly Cluster")
|
79
|
+
|
80
|
+
if parallel_gitaly
|
81
|
+
threads = []
|
82
|
+
threads << Thread.new { @gitaly_primary_node = gitaly(config.primary_node_name, config.primary_node_port, release) }
|
83
|
+
threads << Thread.new { @gitaly_secondary_node = gitaly(config.secondary_node_name, config.secondary_node_port, release) }
|
84
|
+
threads << Thread.new { @gitaly_tertiary_node = gitaly(config.tertiary_node_name, config.tertiary_node_port, release) }
|
85
|
+
threads.each(&:join)
|
86
|
+
else
|
87
|
+
@gitaly_primary_node = gitaly(config.primary_node_name, config.primary_node_port, release)
|
88
|
+
@gitaly_secondary_node = gitaly(config.secondary_node_name, config.secondary_node_port, release)
|
89
|
+
@gitaly_tertiary_node = gitaly(config.tertiary_node_name, config.tertiary_node_port, release)
|
90
|
+
end
|
91
|
+
|
92
|
+
@praefect_node = praefect(release)
|
93
|
+
config.praefect_ip = praefect_node.ip_address
|
94
|
+
Runtime::Logger.info("Gitaly Cluster Ready")
|
95
|
+
end
|
96
|
+
|
97
|
+
def postgres
|
98
|
+
Component::PostgreSQL.new.tap do |sql|
|
99
|
+
sql.name = config.database_node_name
|
100
|
+
sql.airgapped_network = config.airgapped_network
|
101
|
+
sql.network = config.network
|
102
|
+
sql.instance(skip_teardown: true) do
|
103
|
+
sql.run_psql '-d template1 -c "CREATE DATABASE praefect_production OWNER postgres"'
|
104
|
+
end
|
105
|
+
end
|
106
|
+
end
|
107
|
+
|
108
|
+
def gitaly(gitaly_name, port, release) # rubocop:disable Metrics/AbcSize
|
109
|
+
Component::Gitaly.new.tap do |gitaly|
|
110
|
+
gitaly.cluster_config = config
|
111
|
+
gitaly.release = release
|
112
|
+
gitaly.name = gitaly_name
|
113
|
+
gitaly.gitaly_port = port
|
114
|
+
gitaly.airgapped_network = config.airgapped_network
|
115
|
+
gitaly.network = config.network
|
116
|
+
gitaly.gitlab_name = config.gitlab_name
|
117
|
+
gitaly.instance(skip_teardown: true)
|
118
|
+
end
|
119
|
+
end
|
120
|
+
|
121
|
+
def praefect(release)
|
122
|
+
Component::Praefect.new.tap do |praefect|
|
123
|
+
praefect.cluster_config = config
|
124
|
+
praefect.name = config.praefect_node_name
|
125
|
+
praefect.airgapped_network = config.airgapped_network
|
126
|
+
praefect.network = config.network
|
127
|
+
praefect.release = release
|
128
|
+
praefect.instance(skip_teardown: true)
|
129
|
+
end
|
130
|
+
end
|
131
|
+
|
132
|
+
# Helper configuration for omnibus config to disable all non GitalyCluster related omnibus services
|
133
|
+
def self.disable_other_omnibus_services
|
134
|
+
<<~OMNIBUS
|
135
|
+
postgresql['enable'] = false;
|
136
|
+
redis['enable'] = false;
|
137
|
+
nginx['enable'] = false;
|
138
|
+
grafana['enable'] = false;
|
139
|
+
puma['enable'] = false;
|
140
|
+
sidekiq['enable'] = false;
|
141
|
+
gitlab_workhorse['enable'] = false;
|
142
|
+
gitlab_rails['rake_cache_clear'] = false;
|
143
|
+
gitlab_rails['auto_migrate'] = false;
|
144
|
+
gitlab_exporter['enable'] = false;
|
145
|
+
OMNIBUS
|
146
|
+
end
|
147
|
+
end
|
148
|
+
end
|
149
|
+
end
|
150
|
+
end
|
@@ -202,7 +202,7 @@ module Gitlab
|
|
202
202
|
exec_commands << seed_admin_token_command if seed_admin_token
|
203
203
|
exec_commands << seed_test_data_command if seed_db
|
204
204
|
exec_commands << Runtime::Scenario.omnibus_exec_commands
|
205
|
-
exec_commands << add_git_server_hooks unless skip_server_hooks
|
205
|
+
exec_commands << Support::ConfigScripts.add_git_server_hooks(docker, name) unless skip_server_hooks
|
206
206
|
|
207
207
|
commands = exec_commands.flatten.uniq
|
208
208
|
return if commands.empty?
|
@@ -280,28 +280,6 @@ module Gitlab
|
|
280
280
|
["gitlab-rails runner #{DATA_PATH}/admin_access_token_seed.rb"]
|
281
281
|
end
|
282
282
|
|
283
|
-
def add_git_server_hooks
|
284
|
-
global_server_prereceive_hook = <<~SCRIPT
|
285
|
-
#!/usr/bin/env bash
|
286
|
-
|
287
|
-
if [[ \\\$GL_PROJECT_PATH =~ 'reject-prereceive' ]]; then
|
288
|
-
echo 'GL-HOOK-ERR: Custom error message rejecting prereceive hook for projects with GL_PROJECT_PATH matching pattern reject-prereceive'
|
289
|
-
exit 1
|
290
|
-
fi
|
291
|
-
SCRIPT
|
292
|
-
|
293
|
-
[
|
294
|
-
@docker.exec(name, 'mkdir -p /opt/gitlab/embedded/service/gitlab-shell/hooks/pre-receive.d'),
|
295
|
-
@docker.write_files(name) do |f|
|
296
|
-
f.write(
|
297
|
-
'/opt/gitlab/embedded/service/gitlab-shell/hooks/pre-receive.d/pre-receive.d',
|
298
|
-
global_server_prereceive_hook, false
|
299
|
-
)
|
300
|
-
end,
|
301
|
-
@docker.exec(name, 'chmod +x /opt/gitlab/embedded/service/gitlab-shell/hooks/pre-receive.d/*')
|
302
|
-
]
|
303
|
-
end
|
304
|
-
|
305
283
|
class Availability
|
306
284
|
def initialize(name, relative_path: '', scheme: 'http', protocol_port: 80)
|
307
285
|
@docker = Docker::Engine.new
|
@@ -0,0 +1,92 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Gitlab
|
4
|
+
module QA
|
5
|
+
module Component
|
6
|
+
class Praefect < Base
|
7
|
+
extend Forwardable
|
8
|
+
using Rainbow
|
9
|
+
attr_reader :release
|
10
|
+
attr_accessor :cluster_config
|
11
|
+
attr_writer :name
|
12
|
+
|
13
|
+
def_delegators :release, :tag, :image, :edition
|
14
|
+
|
15
|
+
def initialize
|
16
|
+
super
|
17
|
+
self.release = 'EE'
|
18
|
+
@cluster_config = Component::GitalyCluster::GitalyClusterConfig.new
|
19
|
+
@ports = [cluster_config.praefect_port]
|
20
|
+
end
|
21
|
+
|
22
|
+
def name
|
23
|
+
@name || "praefect-#{SecureRandom.hex(4)}"
|
24
|
+
end
|
25
|
+
|
26
|
+
def release=(release)
|
27
|
+
@release = QA::Release.new(release)
|
28
|
+
end
|
29
|
+
|
30
|
+
def reconfigure
|
31
|
+
setup_omnibus
|
32
|
+
@docker.attach(name) do |line|
|
33
|
+
# TODO, workaround which allows to detach from the container
|
34
|
+
break if /gitlab Reconfigured!/.match?(line)
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
def setup_omnibus
|
39
|
+
@docker.write_files(name) do |f|
|
40
|
+
f.write('/etc/gitlab/gitlab.rb', praefect_omnibus_configuration)
|
41
|
+
end
|
42
|
+
end
|
43
|
+
|
44
|
+
def wait_until_ready
|
45
|
+
@docker.exec(name, 'praefect -config /var/opt/gitlab/praefect/cluster_config.toml check || true') do |resp|
|
46
|
+
Runtime::Logger.info(resp)
|
47
|
+
break if /All checks passed/.match?(line)
|
48
|
+
end
|
49
|
+
end
|
50
|
+
|
51
|
+
def praefect_omnibus_configuration # rubocop:disable Metrics/AbcSize
|
52
|
+
<<~OMNIBUS
|
53
|
+
#{GitalyCluster.disable_other_omnibus_services}
|
54
|
+
gitaly['enable'] = false;
|
55
|
+
prometheus['enable'] = true;
|
56
|
+
praefect['enable'] = true;
|
57
|
+
praefect['listen_addr'] = '0.0.0.0:#{cluster_config.praefect_port}';
|
58
|
+
praefect['prometheus_listen_addr'] = '0.0.0.0:9652';
|
59
|
+
praefect['auth_token'] = 'PRAEFECT_EXTERNAL_TOKEN';
|
60
|
+
praefect['reconciliation_scheduling_interval'] = '10s';
|
61
|
+
praefect['database_host'] = '#{cluster_config.database_node_addr}';
|
62
|
+
praefect['database_user'] = 'postgres';
|
63
|
+
praefect['database_port'] = #{cluster_config.database_port};
|
64
|
+
praefect['database_password'] = 'SQL_PASSWORD';
|
65
|
+
praefect['database_dbname'] = 'praefect_production';
|
66
|
+
praefect['database_sslmode'] = 'disable';
|
67
|
+
praefect['database_direct_host'] = '#{cluster_config.database_node_addr}';
|
68
|
+
praefect['database_direct_port'] = #{cluster_config.database_port};
|
69
|
+
praefect['virtual_storages'] = {
|
70
|
+
'default' => {
|
71
|
+
'nodes' => {
|
72
|
+
'#{cluster_config.primary_node_name}' => {
|
73
|
+
'address' => 'tcp://#{cluster_config.primary_node_addr}:#{cluster_config.primary_node_port}',
|
74
|
+
'token' => 'PRAEFECT_INTERNAL_TOKEN'
|
75
|
+
},
|
76
|
+
'#{cluster_config.secondary_node_name}' => {
|
77
|
+
'address' => 'tcp://#{cluster_config.secondary_node_addr}:#{cluster_config.secondary_node_port}',
|
78
|
+
'token' => 'PRAEFECT_INTERNAL_TOKEN'
|
79
|
+
},
|
80
|
+
'#{cluster_config.tertiary_node_name}' => {
|
81
|
+
'address' => 'tcp://#{cluster_config.tertiary_node_addr}:#{cluster_config.tertiary_node_port}',
|
82
|
+
'token' => 'PRAEFECT_INTERNAL_TOKEN'
|
83
|
+
}
|
84
|
+
}
|
85
|
+
}
|
86
|
+
};
|
87
|
+
OMNIBUS
|
88
|
+
end
|
89
|
+
end
|
90
|
+
end
|
91
|
+
end
|
92
|
+
end
|
data/lib/gitlab/qa/release.rb
CHANGED
@@ -7,7 +7,7 @@ module Gitlab
|
|
7
7
|
class Release
|
8
8
|
CANONICAL_REGEX = /
|
9
9
|
\A
|
10
|
-
(?<edition>ce|ee)
|
10
|
+
(?<edition>ce|ee|jh)
|
11
11
|
(-qa)?
|
12
12
|
(:(?<tag>.+))?
|
13
13
|
\z
|
@@ -18,7 +18,7 @@ module Gitlab
|
|
18
18
|
(?<registry>[^/:]+(:(?<port>\d+))?)
|
19
19
|
(?<project>.+)
|
20
20
|
gitlab-
|
21
|
-
(?<edition>ce|ee)
|
21
|
+
(?<edition>ce|ee|jh)
|
22
22
|
)
|
23
23
|
(-qa)?
|
24
24
|
(:(?<tag>.+))?
|
@@ -37,7 +37,7 @@ module Gitlab
|
|
37
37
|
# version
|
38
38
|
DEV_OFFICIAL_TAG_REGEX = /
|
39
39
|
\A
|
40
|
-
(?<version>\d+\.\d+.\d+(?:-rc\d+)?)-(?<edition>ce|ee)
|
40
|
+
(?<version>\d+\.\d+.\d+(?:-rc\d+)?)-(?<edition>ce|ee|jh)
|
41
41
|
\z
|
42
42
|
/xi.freeze
|
43
43
|
|
@@ -57,8 +57,8 @@ module Gitlab
|
|
57
57
|
|
58
58
|
DEFAULT_TAG = 'latest'
|
59
59
|
DEFAULT_CANONICAL_TAG = 'nightly'
|
60
|
-
DEV_REGISTRY =
|
61
|
-
COM_REGISTRY =
|
60
|
+
DEV_REGISTRY = Gitlab::QA::Runtime::Env.qa_dev_registry
|
61
|
+
COM_REGISTRY = Gitlab::QA::Runtime::Env.qa_com_registry
|
62
62
|
|
63
63
|
InvalidImageNameError = Class.new(RuntimeError)
|
64
64
|
|
@@ -138,7 +138,8 @@ module Gitlab
|
|
138
138
|
'NO_ADMIN' => :no_admin,
|
139
139
|
'CHROME_DISABLE_DEV_SHM' => :chrome_disable_dev_shm,
|
140
140
|
'COLORIZED_LOGS' => :colorized_logs,
|
141
|
-
'FIPS' => :fips
|
141
|
+
'FIPS' => :fips,
|
142
|
+
'JH_ENV' => :jh_env
|
142
143
|
}.freeze
|
143
144
|
|
144
145
|
ENV_VARIABLES.each do |env_name, method_name|
|
@@ -357,6 +358,18 @@ module Gitlab
|
|
357
358
|
(env_var_value_if_defined('QA_DOCKER_ADD_HOSTS') || '').split(',')
|
358
359
|
end
|
359
360
|
|
361
|
+
def jh_env?
|
362
|
+
enabled?(env_var_value_if_defined('JH_ENV'), default: false)
|
363
|
+
end
|
364
|
+
|
365
|
+
def qa_dev_registry
|
366
|
+
env_var_value_if_defined('QA_DEV_REGISTRY') || 'dev.gitlab.org:5005'
|
367
|
+
end
|
368
|
+
|
369
|
+
def qa_com_registry
|
370
|
+
env_var_value_if_defined('QA_COM_REGISTRY') || 'registry.gitlab.com'
|
371
|
+
end
|
372
|
+
|
360
373
|
private
|
361
374
|
|
362
375
|
def enabled?(value, default: true)
|
@@ -7,15 +7,61 @@ module Gitlab
|
|
7
7
|
module Instance
|
8
8
|
class Airgapped < Scenario::Template
|
9
9
|
require 'resolv'
|
10
|
-
|
10
|
+
attr_reader :config, :gitlab_air_gap_commands, :iptables_restricted_network, :airgapped_network_name
|
11
11
|
|
12
12
|
def initialize
|
13
|
-
|
13
|
+
# Uses https://docs.docker.com/engine/reference/commandline/network_create/#network-internal-mode
|
14
|
+
@airgapped_network_name = 'airgapped'
|
15
|
+
# Uses iptables to deny all network traffic, with a number of exceptions for required ports and IPs
|
16
|
+
@iptables_restricted_network = 'test'
|
17
|
+
@config = Component::GitalyCluster::GitalyClusterConfig.new(
|
18
|
+
gitlab_name: "gitlab-airgapped-#{SecureRandom.hex(4)}",
|
19
|
+
airgapped_network: true,
|
20
|
+
network: airgapped_network_name
|
21
|
+
)
|
22
|
+
end
|
23
|
+
|
24
|
+
def perform(release, *rspec_args)
|
25
|
+
Component::Gitlab.perform do |gitlab|
|
26
|
+
Component::GitalyCluster.perform do |cluster|
|
27
|
+
cluster.config = @config
|
28
|
+
# we need to get an IP for praefect before proceeding so it cannot be run in parallel with gitlab
|
29
|
+
cluster.instance(true).join
|
30
|
+
end
|
31
|
+
gitlab.name = config.gitlab_name
|
32
|
+
gitlab.release = release
|
33
|
+
gitlab.network = iptables_restricted_network # we use iptables to restrict access on the gitlab instance
|
34
|
+
gitlab.runner_network = config.network
|
35
|
+
gitlab.exec_commands = airgap_gitlab_commands
|
36
|
+
gitlab.skip_availability_check = true
|
37
|
+
gitlab.omnibus_configuration << gitlab_omnibus_configuration
|
38
|
+
rspec_args << "--" unless rspec_args.include?('--')
|
39
|
+
rspec_args << %w[--tag ~orchestrated]
|
40
|
+
gitlab.instance do
|
41
|
+
Component::Specs.perform do |specs|
|
42
|
+
specs.suite = 'Test::Instance::Airgapped'
|
43
|
+
specs.release = gitlab.release
|
44
|
+
specs.network = gitlab.network
|
45
|
+
specs.runner_network = gitlab.runner_network
|
46
|
+
specs.args = [gitlab.address, *rspec_args]
|
47
|
+
end
|
48
|
+
end
|
49
|
+
end
|
50
|
+
end
|
51
|
+
|
52
|
+
private
|
53
|
+
|
54
|
+
def airgap_gitlab_commands
|
55
|
+
gitlab_ip = Resolv.getaddress('gitlab.com')
|
56
|
+
gitlab_registry_ip = Resolv.getaddress(QA::Release::COM_REGISTRY)
|
57
|
+
dev_gitlab_registry_ip = Resolv.getaddress(QA::Release::DEV_REGISTRY.split(':')[0])
|
58
|
+
praefect_ip = config.praefect_ip
|
14
59
|
@commands = <<~AIRGAP_AND_VERIFY_COMMAND.split(/\n+/)
|
15
60
|
# Should not fail before airgapping due to eg. DNS failure
|
16
61
|
# Ping and wget check
|
17
|
-
apt-get update && apt-get install -y iptables
|
18
|
-
|
62
|
+
apt-get update && apt-get install -y iptables ncat
|
63
|
+
if ncat -zv -w 10 #{gitlab_ip} 80; then echo 'Airgapped connectivity check passed.'; else echo 'Airgapped connectivity check failed - should be able to access gitlab_ip'; exit 1; fi;
|
64
|
+
|
19
65
|
echo "Checking regular connectivity..." \
|
20
66
|
&& wget --retry-connrefused --waitretry=1 --read-timeout=15 --timeout=10 -t 2 http://registry.gitlab.com > /dev/null 2>&1 \
|
21
67
|
&& (echo "Regular connectivity wget check passed." && exit 0) || (echo "Regular connectivity wget check failed." && exit 1)
|
@@ -33,34 +79,59 @@ module Gitlab
|
|
33
79
|
iptables -A OUTPUT -p tcp -m tcp --sport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
|
34
80
|
iptables -A INPUT -p tcp -m tcp --dport 80 -m state --state NEW,ESTABLISHED -j ACCEPT
|
35
81
|
|
36
|
-
#
|
37
|
-
|
38
|
-
|
39
|
-
|
82
|
+
# some exceptions to allow runners access network https://gitlab.com/gitlab-org/gitlab-qa/-/issues/700
|
83
|
+
iptables -A OUTPUT -p tcp -d #{gitlab_registry_ip} -j ACCEPT
|
84
|
+
iptables -A OUTPUT -p tcp -d #{dev_gitlab_registry_ip} -j ACCEPT
|
85
|
+
# allow access to praefect node
|
86
|
+
iptables -A OUTPUT -p tcp -d #{praefect_ip} -j ACCEPT
|
87
|
+
|
88
|
+
# Should now fail to ping gitlab_ip, port 22/80 should be open
|
89
|
+
if ncat -zv -w 10 #{gitlab_ip} 80; then echo 'Airgapped connectivity check failed - should not be able to access gitlab_ip'; exit 1; else echo 'Airgapped connectivity check passed.'; fi;
|
90
|
+
if ncat -zv -w 10 127.0.0.1 22; then echo 'Airgapped connectivity port 22 check passed.'; else echo 'Airgapped connectivity port 22 check failed.'; exit 1; fi;
|
91
|
+
if ncat -zv -w 10 127.0.0.1 80; then echo 'Airgapped connectivity port 80 check passed.'; else echo 'Airgapped connectivity port 80 check failed.'; exit 1 ; fi;
|
92
|
+
if ncat -zv -w 10 #{gitlab_registry_ip} 80; then echo 'Airgapped connectivity port gitlab_registry_ip check passed.'; else echo 'Airgapped connectivity port 80 check failed.'; exit 1; fi;
|
93
|
+
|
40
94
|
echo "Checking airgapped connectivity..." \
|
41
95
|
&& wget --retry-connrefused --waitretry=1 --read-timeout=15 --timeout=10 -t 2 http://registry.gitlab.com > /dev/null 2>&1 \
|
42
96
|
&& (echo "Airgapped network faulty. Connectivity wget check failed." && exit 1) || (echo "Airgapped network confirmed. Connectivity wget check passed." && exit 0)
|
43
97
|
AIRGAP_AND_VERIFY_COMMAND
|
44
98
|
end
|
45
99
|
|
46
|
-
def
|
47
|
-
|
48
|
-
|
49
|
-
|
50
|
-
|
51
|
-
|
52
|
-
|
53
|
-
|
54
|
-
|
55
|
-
|
56
|
-
|
57
|
-
|
58
|
-
|
59
|
-
|
60
|
-
|
61
|
-
|
62
|
-
|
63
|
-
|
100
|
+
def gitlab_omnibus_configuration
|
101
|
+
<<~OMNIBUS
|
102
|
+
external_url 'http://#{config.gitlab_name}.#{iptables_restricted_network}';
|
103
|
+
|
104
|
+
git_data_dirs({
|
105
|
+
'default' => {
|
106
|
+
'gitaly_address' => 'tcp://#{config.praefect_addr}:#{config.praefect_port}',
|
107
|
+
'gitaly_token' => 'PRAEFECT_EXTERNAL_TOKEN'
|
108
|
+
}
|
109
|
+
});
|
110
|
+
gitaly['enable'] = false;
|
111
|
+
gitlab_shell['secret_token'] = 'GITLAB_SHELL_SECRET_TOKEN';
|
112
|
+
prometheus['scrape_configs'] = [
|
113
|
+
{
|
114
|
+
'job_name' => 'praefect',
|
115
|
+
'static_configs' => [
|
116
|
+
'targets' => [
|
117
|
+
'#{config.praefect_addr}:9652'
|
118
|
+
]
|
119
|
+
]
|
120
|
+
},
|
121
|
+
{
|
122
|
+
'job_name' => 'praefect-gitaly',
|
123
|
+
'static_configs' => [
|
124
|
+
'targets' => [
|
125
|
+
'#{config.primary_node_addr}:9236',
|
126
|
+
'#{config.secondary_node_addr}:9236',
|
127
|
+
'#{config.tertiary_node_addr}:9236'
|
128
|
+
]
|
129
|
+
]
|
130
|
+
}
|
131
|
+
];
|
132
|
+
grafana['disable_login_form'] = false;
|
133
|
+
grafana['admin_password'] = 'GRAFANA_ADMIN_PASSWORD';
|
134
|
+
OMNIBUS
|
64
135
|
end
|
65
136
|
end
|
66
137
|
end
|
@@ -6,67 +6,24 @@ module Gitlab
|
|
6
6
|
module Test
|
7
7
|
module Integration
|
8
8
|
class GitalyCluster < Scenario::Template
|
9
|
-
attr_reader :gitlab_name, :spec_suite
|
10
|
-
|
11
|
-
def initialize # rubocop:disable Metrics/AbcSize
|
12
|
-
@gitlab_name = 'gitlab-gitaly-cluster'
|
13
|
-
|
14
|
-
@primary_node_name = 'gitaly1'
|
15
|
-
@primary_node_addr = "#{@primary_node_name}.#{@network}"
|
16
|
-
@primary_node_port = 8075
|
17
|
-
|
18
|
-
@secondary_node_name = 'gitaly2'
|
19
|
-
@secondary_node_addr = "#{@secondary_node_name}.#{@network}"
|
20
|
-
@secondary_node_port = 8075
|
21
|
-
|
22
|
-
@tertiary_node_name = 'gitaly3'
|
23
|
-
@tertiary_node_addr = "#{@tertiary_node_name}.#{@network}"
|
24
|
-
@tertiary_node_port = 8075
|
25
|
-
|
26
|
-
@praefect_node_name = 'praefect'
|
27
|
-
@praefect_port = 2305
|
28
|
-
@praefect_addr = "#{@praefect_node_name}.#{@network}"
|
29
|
-
|
30
|
-
@database = 'postgres'
|
31
|
-
@database_port = 5432
|
32
|
-
@database_addr = "#{@database}.#{@network}"
|
9
|
+
attr_reader :gitlab_name, :spec_suite, :name, :config
|
33
10
|
|
11
|
+
def initialize
|
34
12
|
@spec_suite = 'Test::Instance::All'
|
35
|
-
@network = 'test'
|
36
13
|
@env = {}
|
37
14
|
@tag = 'gitaly_cluster'
|
15
|
+
@config = Component::GitalyCluster::GitalyClusterConfig.new
|
38
16
|
end
|
39
17
|
|
40
18
|
def perform(release, *rspec_args)
|
41
|
-
run_gitaly_cluster(release, rspec_args)
|
42
|
-
ensure
|
43
|
-
@praefect_node&.teardown
|
44
|
-
@sql_node&.teardown
|
45
|
-
@gitaly_primary_node&.teardown
|
46
|
-
@gitaly_secondary_node&.teardown
|
47
|
-
@gitaly_tertiary_node&.teardown
|
48
|
-
end
|
49
|
-
|
50
|
-
def run_gitaly_cluster(release, rspec_args) # rubocop:disable Metrics/AbcSize
|
51
|
-
# The postgres container starts in seconds so not essential to parallelize it
|
52
|
-
# This also ensure that the docker network is created here, avoiding any potential race conditions later
|
53
|
-
# if the gitaly-cluster and GitLab containers attempt to create a network in parallel
|
54
|
-
@sql_node = postgres
|
55
|
-
|
56
|
-
gitaly_cluster = Thread.new do
|
57
|
-
Thread.current.abort_on_exception = true
|
58
|
-
start_gitaly_cluster(release)
|
59
|
-
end
|
60
|
-
|
61
19
|
Component::Gitlab.perform do |gitlab|
|
62
20
|
gitlab.release = QA::Release.new(release)
|
63
|
-
gitlab.name = gitlab_name
|
64
|
-
gitlab.network =
|
65
|
-
|
21
|
+
gitlab.name = config.gitlab_name
|
22
|
+
gitlab.network = config.network
|
66
23
|
gitlab.omnibus_configuration << gitlab_omnibus_configuration
|
24
|
+
cluster = Component::GitalyCluster.perform(&:instance)
|
67
25
|
gitlab.instance do
|
68
|
-
|
69
|
-
gitaly_cluster.join
|
26
|
+
cluster.join
|
70
27
|
Runtime::Logger.info('Running Gitaly Cluster specs!')
|
71
28
|
|
72
29
|
if @tag
|
@@ -87,100 +44,13 @@ module Gitlab
|
|
87
44
|
|
88
45
|
private
|
89
46
|
|
90
|
-
def start_gitaly_cluster(release)
|
91
|
-
Runtime::Logger.info("Starting Gitaly Cluster")
|
92
|
-
@gitaly_primary_node = gitaly(@primary_node_name, @primary_node_port, release)
|
93
|
-
@gitaly_secondary_node = gitaly(@secondary_node_name, @secondary_node_port, release)
|
94
|
-
@gitaly_tertiary_node = gitaly(@tertiary_node_name, @tertiary_node_port, release)
|
95
|
-
|
96
|
-
@praefect_node = praefect(@praefect_node_name, release)
|
97
|
-
Runtime::Logger.info("Gitaly Cluster Ready")
|
98
|
-
end
|
99
|
-
|
100
|
-
def disable_other_services
|
101
|
-
<<~OMNIBUS
|
102
|
-
postgresql['enable'] = false;
|
103
|
-
redis['enable'] = false;
|
104
|
-
nginx['enable'] = false;
|
105
|
-
prometheus['enable'] = false;
|
106
|
-
grafana['enable'] = false;
|
107
|
-
puma['enable'] = false;
|
108
|
-
sidekiq['enable'] = false;
|
109
|
-
gitlab_workhorse['enable'] = false;
|
110
|
-
gitlab_rails['rake_cache_clear'] = false;
|
111
|
-
gitlab_rails['auto_migrate'] = false;
|
112
|
-
OMNIBUS
|
113
|
-
end
|
114
|
-
|
115
|
-
def praefect_omnibus_configuration
|
116
|
-
<<~OMNIBUS
|
117
|
-
#{disable_other_services}
|
118
|
-
gitaly['enable'] = false;
|
119
|
-
praefect['enable'] = true;
|
120
|
-
praefect['listen_addr'] = '0.0.0.0:#{@praefect_port}';
|
121
|
-
praefect['prometheus_listen_addr'] = '0.0.0.0:9652';
|
122
|
-
praefect['auth_token'] = 'PRAEFECT_EXTERNAL_TOKEN';
|
123
|
-
praefect['reconciliation_scheduling_interval'] = '10s';
|
124
|
-
praefect['database_host'] = '#{@database_addr}';
|
125
|
-
praefect['database_user'] = 'postgres';
|
126
|
-
praefect['database_port'] = #{@database_port};
|
127
|
-
praefect['database_password'] = 'SQL_PASSWORD';
|
128
|
-
praefect['database_dbname'] = 'praefect_production';
|
129
|
-
praefect['database_sslmode'] = 'disable';
|
130
|
-
praefect['database_direct_host'] = '#{@database_addr}';
|
131
|
-
praefect['database_direct_port'] = #{@database_port};
|
132
|
-
praefect['virtual_storages'] = {
|
133
|
-
'default' => {
|
134
|
-
'nodes' => {
|
135
|
-
'#{@primary_node_name}' => {
|
136
|
-
'address' => 'tcp://#{@primary_node_addr}:#{@primary_node_port}',
|
137
|
-
'token' => 'PRAEFECT_INTERNAL_TOKEN'
|
138
|
-
},
|
139
|
-
'#{@secondary_node_name}' => {
|
140
|
-
'address' => 'tcp://#{@secondary_node_addr}:#{@secondary_node_port}',
|
141
|
-
'token' => 'PRAEFECT_INTERNAL_TOKEN'
|
142
|
-
},
|
143
|
-
'#{@tertiary_node_name}' => {
|
144
|
-
'address' => 'tcp://#{@tertiary_node_addr}:#{@tertiary_node_port}',
|
145
|
-
'token' => 'PRAEFECT_INTERNAL_TOKEN'
|
146
|
-
}
|
147
|
-
}
|
148
|
-
}
|
149
|
-
};
|
150
|
-
OMNIBUS
|
151
|
-
end
|
152
|
-
|
153
|
-
def gitaly_omnibus_configuration(listen_port)
|
154
|
-
<<~OMNIBUS
|
155
|
-
#{disable_other_services.sub(/(prometheus\['enable'\]) = false/, '\1 = true')}
|
156
|
-
prometheus_monitoring['enable'] = false;
|
157
|
-
gitaly['enable'] = true;
|
158
|
-
gitaly['listen_addr'] = '0.0.0.0:#{listen_port}';
|
159
|
-
gitaly['prometheus_listen_addr'] = '0.0.0.0:9236';
|
160
|
-
gitaly['auth_token'] = 'PRAEFECT_INTERNAL_TOKEN';
|
161
|
-
gitlab_shell['secret_token'] = 'GITLAB_SHELL_SECRET_TOKEN';
|
162
|
-
gitlab_rails['internal_api_url'] = 'http://#{@gitlab_name}.#{@network}';
|
163
|
-
git_data_dirs({
|
164
|
-
'#{@primary_node_name}' => {
|
165
|
-
'path' => '/var/opt/gitlab/git-data'
|
166
|
-
},
|
167
|
-
'#{@secondary_node_name}' => {
|
168
|
-
'path' => '/var/opt/gitlab/git-data'
|
169
|
-
},
|
170
|
-
'#{@tertiary_node_name}' => {
|
171
|
-
'path' => '/var/opt/gitlab/git-data'
|
172
|
-
}
|
173
|
-
});
|
174
|
-
OMNIBUS
|
175
|
-
end
|
176
|
-
|
177
47
|
def gitlab_omnibus_configuration
|
178
48
|
<<~OMNIBUS
|
179
|
-
external_url 'http://#{
|
49
|
+
external_url 'http://#{config.gitlab_name}.#{config.network}';
|
180
50
|
|
181
51
|
git_data_dirs({
|
182
52
|
'default' => {
|
183
|
-
'gitaly_address' => 'tcp://#{
|
53
|
+
'gitaly_address' => 'tcp://#{config.praefect_addr}:#{config.praefect_port}',
|
184
54
|
'gitaly_token' => 'PRAEFECT_EXTERNAL_TOKEN'
|
185
55
|
}
|
186
56
|
});
|
@@ -191,7 +61,7 @@ module Gitlab
|
|
191
61
|
'job_name' => 'praefect',
|
192
62
|
'static_configs' => [
|
193
63
|
'targets' => [
|
194
|
-
'#{
|
64
|
+
'#{config.praefect_addr}:9652'
|
195
65
|
]
|
196
66
|
]
|
197
67
|
},
|
@@ -199,9 +69,9 @@ module Gitlab
|
|
199
69
|
'job_name' => 'praefect-gitaly',
|
200
70
|
'static_configs' => [
|
201
71
|
'targets' => [
|
202
|
-
'#{
|
203
|
-
'#{
|
204
|
-
'#{
|
72
|
+
'#{config.primary_node_addr}:9236',
|
73
|
+
'#{config.secondary_node_addr}:9236',
|
74
|
+
'#{config.tertiary_node_addr}:9236'
|
205
75
|
]
|
206
76
|
]
|
207
77
|
}
|
@@ -210,42 +80,6 @@ module Gitlab
|
|
210
80
|
grafana['admin_password'] = 'GRAFANA_ADMIN_PASSWORD';
|
211
81
|
OMNIBUS
|
212
82
|
end
|
213
|
-
|
214
|
-
def praefect(name, release)
|
215
|
-
Component::Gitlab.new.tap do |praefect|
|
216
|
-
praefect.release = QA::Release.new(release)
|
217
|
-
praefect.name = name
|
218
|
-
praefect.network = @network
|
219
|
-
praefect.skip_availability_check = true
|
220
|
-
praefect.seed_admin_token = false
|
221
|
-
|
222
|
-
praefect.omnibus_configuration << praefect_omnibus_configuration
|
223
|
-
|
224
|
-
praefect.instance(skip_teardown: true)
|
225
|
-
end
|
226
|
-
end
|
227
|
-
|
228
|
-
def postgres
|
229
|
-
Component::PostgreSQL.new.tap do |sql|
|
230
|
-
sql.name = @database
|
231
|
-
sql.network = @network
|
232
|
-
sql.instance(skip_teardown: true) do
|
233
|
-
sql.run_psql '-d template1 -c "CREATE DATABASE praefect_production OWNER postgres"'
|
234
|
-
end
|
235
|
-
end
|
236
|
-
end
|
237
|
-
|
238
|
-
def gitaly(name, port, release)
|
239
|
-
Component::Gitlab.new.tap do |gitaly|
|
240
|
-
gitaly.release = QA::Release.new(release)
|
241
|
-
gitaly.name = name
|
242
|
-
gitaly.network = @network
|
243
|
-
gitaly.skip_availability_check = true
|
244
|
-
gitaly.seed_admin_token = false
|
245
|
-
gitaly.omnibus_configuration << gitaly_omnibus_configuration(port)
|
246
|
-
gitaly.instance(skip_teardown: true)
|
247
|
-
end
|
248
|
-
end
|
249
83
|
end
|
250
84
|
end
|
251
85
|
end
|
@@ -15,17 +15,17 @@ module Gitlab
|
|
15
15
|
@env = { QA_PRAEFECT_REPOSITORY_STORAGE: 'default' }
|
16
16
|
end
|
17
17
|
|
18
|
-
def gitlab_omnibus_configuration
|
18
|
+
def gitlab_omnibus_configuration # rubocop:disable Metrics/AbcSize
|
19
19
|
<<~OMNIBUS
|
20
|
-
external_url 'http://#{
|
20
|
+
external_url 'http://#{config.gitlab_name}.#{config.network}';
|
21
21
|
|
22
22
|
git_data_dirs({
|
23
23
|
'default' => {
|
24
|
-
'gitaly_address' => 'tcp://#{
|
24
|
+
'gitaly_address' => 'tcp://#{config.praefect_addr}:#{config.praefect_port}',
|
25
25
|
'gitaly_token' => 'PRAEFECT_EXTERNAL_TOKEN'
|
26
26
|
},
|
27
27
|
'gitaly' => {
|
28
|
-
'gitaly_address' => 'tcp://#{
|
28
|
+
'gitaly_address' => 'tcp://#{config.gitlab_name}.#{config.network}:8075',
|
29
29
|
'path' => '/var/opt/gitlab/git-data'
|
30
30
|
}
|
31
31
|
});
|
@@ -45,7 +45,7 @@ module Gitlab
|
|
45
45
|
'job_name' => 'praefect',
|
46
46
|
'static_configs' => [
|
47
47
|
'targets' => [
|
48
|
-
'#{
|
48
|
+
'#{config.praefect_addr}:9652'
|
49
49
|
]
|
50
50
|
]
|
51
51
|
},
|
@@ -53,9 +53,9 @@ module Gitlab
|
|
53
53
|
'job_name' => 'praefect-gitaly',
|
54
54
|
'static_configs' => [
|
55
55
|
'targets' => [
|
56
|
-
'#{
|
57
|
-
'#{
|
58
|
-
'#{
|
56
|
+
'#{config.primary_node_addr}:9236',
|
57
|
+
'#{config.secondary_node_addr}:9236',
|
58
|
+
'#{config.tertiary_node_addr}:9236'
|
59
59
|
]
|
60
60
|
]
|
61
61
|
}
|
@@ -0,0 +1,33 @@
|
|
1
|
+
# frozen_string_literal: true
|
2
|
+
|
3
|
+
module Gitlab
|
4
|
+
module QA
|
5
|
+
module Support
|
6
|
+
module ConfigScripts
|
7
|
+
# Add a git server hooks with a custom error message
|
8
|
+
# See https://docs.gitlab.com/ee/administration/server_hooks.html for details
|
9
|
+
def self.add_git_server_hooks(docker, name)
|
10
|
+
global_server_prereceive_hook = <<~SCRIPT
|
11
|
+
#!/usr/bin/env bash
|
12
|
+
|
13
|
+
if [[ \\\$GL_PROJECT_PATH =~ 'reject-prereceive' ]]; then
|
14
|
+
echo 'GL-HOOK-ERR: Custom error message rejecting prereceive hook for projects with GL_PROJECT_PATH matching pattern reject-prereceive'
|
15
|
+
exit 1
|
16
|
+
fi
|
17
|
+
SCRIPT
|
18
|
+
|
19
|
+
[
|
20
|
+
docker.exec(name, 'mkdir -p /opt/gitlab/embedded/service/gitlab-shell/hooks/pre-receive.d'),
|
21
|
+
docker.write_files(name) do |f|
|
22
|
+
f.write(
|
23
|
+
'/opt/gitlab/embedded/service/gitlab-shell/hooks/pre-receive.d/pre-receive.d',
|
24
|
+
global_server_prereceive_hook, false
|
25
|
+
)
|
26
|
+
end,
|
27
|
+
docker.exec(name, 'chmod +x /opt/gitlab/embedded/service/gitlab-shell/hooks/pre-receive.d/*')
|
28
|
+
]
|
29
|
+
end
|
30
|
+
end
|
31
|
+
end
|
32
|
+
end
|
33
|
+
end
|
data/lib/gitlab/qa/version.rb
CHANGED
data/scripts/generate-qa-jobs.rb
CHANGED
@@ -23,6 +23,7 @@ class GenerateQAJobs
|
|
23
23
|
jobs.merge!(load_yml_contents('update', should_automatically_run?('test_instance_all')))
|
24
24
|
jobs.merge!(load_yml_contents('omnibus_upgrade'))
|
25
25
|
jobs.merge!(load_yml_contents('ee_previous_to_ce_update'))
|
26
|
+
jobs.merge!(load_yml_contents('airgapped', should_automatically_run?('test_instance_all')))
|
26
27
|
jobs.merge!(load_yml_contents('mattermost', should_automatically_run?('test_integration_mattermost')))
|
27
28
|
jobs.merge!(load_yml_contents('service_ping_disabled', should_automatically_run?('test_integration_servicepingdisabled')))
|
28
29
|
jobs.merge!(load_yml_contents('ldap_no_tls', should_automatically_run?('test_integration_ldapnotls')))
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: gitlab-qa
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 8.
|
4
|
+
version: 8.14.1
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- GitLab Quality
|
8
8
|
autorequire:
|
9
9
|
bindir: exe
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-12-16 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: climate_control
|
@@ -244,6 +244,7 @@ files:
|
|
244
244
|
- ".dockerignore"
|
245
245
|
- ".gitignore"
|
246
246
|
- ".gitlab-ci.yml"
|
247
|
+
- ".gitlab/ci/jobs/airgapped.gitlab-ci.yml"
|
247
248
|
- ".gitlab/ci/jobs/base.gitlab-ci.yml"
|
248
249
|
- ".gitlab/ci/jobs/chaos.gitlab-ci.yml"
|
249
250
|
- ".gitlab/ci/jobs/cloud_activation.gitlab-ci.yml"
|
@@ -328,6 +329,8 @@ files:
|
|
328
329
|
- lib/gitlab/qa/component/base.rb
|
329
330
|
- lib/gitlab/qa/component/chaos.rb
|
330
331
|
- lib/gitlab/qa/component/elasticsearch.rb
|
332
|
+
- lib/gitlab/qa/component/gitaly.rb
|
333
|
+
- lib/gitlab/qa/component/gitaly_cluster.rb
|
331
334
|
- lib/gitlab/qa/component/gitlab.rb
|
332
335
|
- lib/gitlab/qa/component/jira.rb
|
333
336
|
- lib/gitlab/qa/component/ldap.rb
|
@@ -336,6 +339,7 @@ files:
|
|
336
339
|
- lib/gitlab/qa/component/mock_server.rb
|
337
340
|
- lib/gitlab/qa/component/opensearch.rb
|
338
341
|
- lib/gitlab/qa/component/postgresql.rb
|
342
|
+
- lib/gitlab/qa/component/praefect.rb
|
339
343
|
- lib/gitlab/qa/component/preprod.rb
|
340
344
|
- lib/gitlab/qa/component/production.rb
|
341
345
|
- lib/gitlab/qa/component/release.rb
|
@@ -436,6 +440,7 @@ files:
|
|
436
440
|
- lib/gitlab/qa/service/cluster_provider/k3d.rb
|
437
441
|
- lib/gitlab/qa/service/kubernetes_cluster.rb
|
438
442
|
- lib/gitlab/qa/slack/post_to_slack.rb
|
443
|
+
- lib/gitlab/qa/support/config_scripts.rb
|
439
444
|
- lib/gitlab/qa/support/get_request.rb
|
440
445
|
- lib/gitlab/qa/support/gitlab_upgrade_path.rb
|
441
446
|
- lib/gitlab/qa/support/gitlab_version_info.rb
|