gitlab-qa 2.7.1 → 2.7.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 4904d31a513567678eb38f85db9f8cad2724e833f8ced5205b0686604f51ac1d
4
- data.tar.gz: b702f0f1894ff3ada2d662ac10de61cc6848f22e2cdc5c1ab97bde4568cc2f00
3
+ metadata.gz: 0d7aaedea31a9632f594c691505554832867b171ecde5819c07129d5bf570295
4
+ data.tar.gz: 6b58cb3fc6cfcfebd0a710c1560dfa9ff2518864ea75d4cef1bd3c18594af6ca
5
5
  SHA512:
6
- metadata.gz: c950dfc7c05c7d788d36f074bf4c1e1cbc1d751a8204c298096864fa2b350ef7552df56ae82f10df88a412a2d325abbbf73faadcd8f59375dadb400618e1c94a
7
- data.tar.gz: a4182a1d875736230a2113aed7f51a322341c7ab99b849971ab31a014b230ec9c93b1856563380ed54c1e37ee9ddac372053341078de35971370d36d286e5922
6
+ metadata.gz: 66d39acd655809376983c4a6c873424465b7a2d8c86b716a0a19037fcdc7f485cf5421908a91d00f676038685c9d995143b209711873d63c5fc4ee1a929b0e02
7
+ data.tar.gz: 6f4e36562403dd497d758cd52399e6f6e05fb003b1358a09d55e1f73ded754dfc540b183b2b90feca594cf6c070a582339b8fd368d39ef0fa1de602a0f19bf71
data/.gitlab-ci.yml CHANGED
@@ -172,16 +172,30 @@ ee:geo:
172
172
  <<: *high-capacity
173
173
  <<: *ee-qa
174
174
 
175
- ce:ldap:
175
+ ce:ldap_no_tls:
176
176
  script:
177
- - bin/qa Test::Integration::LDAP ${RELEASE:=CE}
177
+ - bin/qa Test::Integration::LDAPNoTLS ${RELEASE:=CE}
178
178
  <<: *test
179
179
  <<: *high-capacity
180
180
  <<: *ce-qa
181
181
 
182
- ee:ldap:
182
+ ee:ldap_no_tls:
183
183
  script:
184
- - bin/qa Test::Integration::LDAP ${RELEASE:=EE}
184
+ - bin/qa Test::Integration::LDAPNoTLS ${RELEASE:=EE}
185
+ <<: *test
186
+ <<: *high-capacity
187
+ <<: *ee-qa
188
+
189
+ ce:ldap_tls:
190
+ script:
191
+ - bin/qa Test::Integration::LDAPTLS ${RELEASE:=CE}
192
+ <<: *test
193
+ <<: *high-capacity
194
+ <<: *ce-qa
195
+
196
+ ee:ldap_tls:
197
+ script:
198
+ - bin/qa Test::Integration::LDAPTLS ${RELEASE:=EE}
185
199
  <<: *test
186
200
  <<: *high-capacity
187
201
  <<: *ee-qa
@@ -198,7 +212,7 @@ ee:instance_saml:
198
212
  - bin/qa Test::Integration::InstanceSAML ${RELEASE:=EE}
199
213
  <<: *test
200
214
  <<: *high-capacity
201
- <<: *ee-qa
215
+ <<: *ee-qa
202
216
 
203
217
  ee:group_saml:
204
218
  script:
@@ -148,18 +148,18 @@ $ gitlab-qa Test::Integration::Geo EE
148
148
 
149
149
  [test-geo]: https://gitlab.com/gitlab-org/gitlab-ee/blob/master/qa/qa/ee/scenario/test/geo.rb
150
150
 
151
- ### `Test::Integration::LDAP CE|EE|<full image address>`
151
+ ### `Test::Integration::LDAPNoTLS CE|EE|<full image address>`
152
152
 
153
153
  This tests that a GitLab instance works as expected with an external
154
- LDAP server.
154
+ LDAP server with TLS not enabled.
155
155
 
156
156
  The scenario spins up an OpenLDAP server, seeds users, and verifies
157
157
  that LDAP-related features work as expected.
158
158
 
159
159
  To run tests against the GitLab containers, a GitLab QA (`gitlab/gitlab-qa`)
160
160
  container is spun up and tests are run from it by running the
161
- `Test::Integration::LDAP` scenario (located under
162
- [`gitlab-org/gitlab-ce@qa/qa/scenario/test/integration/ldap.rb`][test-integration-ldap]
161
+ `Test::Integration::LDAPNoTLS` scenario (located under
162
+ [`gitlab-org/gitlab-ce@qa/qa/scenario/test/integration/ldap_no_tls.rb`][test-integration-ldap-no-tls]
163
163
  in the GitLab CE project).
164
164
 
165
165
  In EE, both the GitLab standard and LDAP credentials are needed:
@@ -174,15 +174,57 @@ In EE, both the GitLab standard and LDAP credentials are needed:
174
174
  Example:
175
175
 
176
176
  ```
177
- $ gitlab-qa Test::Integration::LDAP CE
177
+ $ gitlab-qa Test::Integration::LDAPNoTLS CE
178
178
 
179
179
  # For EE
180
180
  $ export EE_LICENSE=$(cat /path/to/Geo.gitlab_license)
181
181
 
182
- $ gitlab-qa Test::Integration::LDAP EE
182
+ $ gitlab-qa Test::Integration::LDAPNoTLS EE
183
183
  ```
184
184
 
185
- [test-integration-ldap]: https://gitlab.com/gitlab-org/gitlab-ce/blob/master/qa/qa/scenario/test/integration/ldap.rb
185
+ [test-integration-ldap-no-tls]: https://gitlab.com/gitlab-org/gitlab-ce/blob/master/qa/qa/scenario/test/integration/ldap_no_tls.rb
186
+
187
+ ### `Test::Integration::LDAPTLS CE|EE|<full image address>`
188
+
189
+ This tests that a TLS enabled GitLab instance works as expected with an external TLS enabled LDAP server.
190
+ The self signed TLS certificate used for the Gitlab instance and the private key is located at: [`gitlab-org/gitlab-qa@tls_certificates/gitlab`][test-integration-ldap-tls-certs]
191
+
192
+ The certificate was generated with openssl using this command:
193
+ ```
194
+ openssl req -x509 -newkey rsa:4096 -keyout gitlab.test.key -out gitlab.test.crt -days 3650 -nodes -subj "/C=US/ST=CA/L=San Francisco/O=GitLab/OU=Org/CN=gitlab.test"
195
+ ```
196
+
197
+ The scenario spins up a TLS enabled OpenLDAP server, seeds users, and verifies
198
+ that LDAP-related features work as expected.
199
+
200
+ To run tests against the GitLab containers, a GitLab QA (`gitlab/gitlab-qa`)
201
+ container is spun up and tests are run from it by running the
202
+ `Test::Integration::LDAPTLS` scenario (located under
203
+ [`gitlab-org/gitlab-ce@qa/qa/scenario/test/integration/ldap_tls.rb`][test-integration-ldap-tls]
204
+ in the GitLab CE project).
205
+
206
+ In EE, both the GitLab standard and LDAP credentials are needed:
207
+
208
+ 1. The first is used to login as an Admin to enter in the EE license.
209
+ 2. The second is used to conduct LDAP-related tasks
210
+
211
+ **Required environment variables:**
212
+
213
+ - [For EE only] `EE_LICENSE`: A valid EE license.
214
+
215
+ Example:
216
+
217
+ ```
218
+ $ gitlab-qa Test::Integration::LDAPTLS CE
219
+
220
+ # For EE
221
+ $ export EE_LICENSE=$(cat /path/to/Geo.gitlab_license)
222
+
223
+ $ gitlab-qa Test::Integration::LDAPTLS EE
224
+ ```
225
+
226
+ [test-integration-ldap-tls]: https://gitlab.com/gitlab-org/gitlab-ce/blob/master/qa/qa/scenario/test/integration/ldap_tls.rb
227
+ [test-integration-ldap-tls-certs]: https://gitlab.com/gitlab-org/gitlab-ce/blob/master/tls_certificates/gitlab
186
228
 
187
229
  ### `Test::Integration::GroupSAML EE|<full image address>`
188
230
 
data/lib/gitlab/qa.rb CHANGED
@@ -30,6 +30,8 @@ module Gitlab
30
30
  module Integration
31
31
  autoload :Geo, 'qa/scenario/test/integration/geo'
32
32
  autoload :LDAP, 'qa/scenario/test/integration/ldap'
33
+ autoload :LDAPNoTLS, 'qa/scenario/test/integration/ldap_no_tls'
34
+ autoload :LDAPTLS, 'qa/scenario/test/integration/ldap_tls'
33
35
  autoload :SAML, 'qa/scenario/test/integration/saml'
34
36
  autoload :GroupSAML, 'qa/scenario/test/integration/group_saml'
35
37
  autoload :InstanceSAML, 'qa/scenario/test/integration/instance_saml'
@@ -11,17 +11,22 @@ module Gitlab
11
11
  include Scenario::Actable
12
12
 
13
13
  attr_reader :release, :docker
14
- attr_accessor :volumes, :network, :environment
14
+ attr_accessor :volumes, :network, :environment, :tls
15
15
  attr_writer :name, :relative_path, :exec_commands
16
16
 
17
17
  def_delegators :release, :tag, :image, :edition
18
18
 
19
+ CERTIFICATES_PATH = File.expand_path('../../../../tls_certificates/gitlab'.freeze, __dir__)
20
+ SSL_PATH = '/etc/gitlab/ssl'.freeze
21
+
19
22
  def initialize
20
23
  @docker = Docker::Engine.new
21
24
  @environment = {}
22
25
  @volumes = {}
23
26
  @network_aliases = []
24
27
 
28
+ @volumes[CERTIFICATES_PATH] = SSL_PATH
29
+
25
30
  self.release = 'CE'
26
31
  self.exec_commands = []
27
32
  end
@@ -43,7 +48,15 @@ module Gitlab
43
48
  end
44
49
 
45
50
  def address
46
- "http://#{hostname}#{relative_path}"
51
+ "#{scheme}://#{hostname}#{relative_path}"
52
+ end
53
+
54
+ def scheme
55
+ tls ? 'https' : 'http'
56
+ end
57
+
58
+ def port
59
+ tls ? '443' : '80'
47
60
  end
48
61
 
49
62
  def hostname
@@ -80,7 +93,7 @@ module Gitlab
80
93
  ensure_configured!
81
94
 
82
95
  docker.run(image, tag) do |command|
83
- command << '-d -p 80'
96
+ command << "-d -p #{port}"
84
97
  command << "--name #{name}"
85
98
  command << "--net #{network}"
86
99
  command << "--hostname #{hostname}"
@@ -122,7 +135,7 @@ module Gitlab
122
135
  end
123
136
 
124
137
  def wait
125
- if Availability.new(name, relative_path: relative_path).check(180)
138
+ if Availability.new(name, relative_path: relative_path, scheme: scheme, protocol_port: port.to_i).check(180)
126
139
  sleep 12 # TODO, handle that better
127
140
  puts ' -> GitLab is available.'
128
141
  else
@@ -157,13 +170,13 @@ module Gitlab
157
170
  end
158
171
 
159
172
  class Availability
160
- def initialize(name, relative_path: '')
173
+ def initialize(name, relative_path: '', scheme: 'http', protocol_port: 80)
161
174
  @docker = Docker::Engine.new
162
175
 
163
176
  host = @docker.hostname
164
- port = @docker.port(name, 80).split(':').last
177
+ port = @docker.port(name, protocol_port).split(':').last
165
178
 
166
- @uri = URI.join("http://#{host}:#{port}", "#{relative_path}/", 'help')
179
+ @uri = URI.join("#{scheme}://#{host}:#{port}", "#{relative_path}/", 'help')
167
180
  end
168
181
 
169
182
  def check(retries)
@@ -182,7 +195,7 @@ module Gitlab
182
195
  private
183
196
 
184
197
  def service_available?
185
- response = Net::HTTP.start(@uri.host, @uri.port) do |http|
198
+ response = Net::HTTP.start(@uri.host, @uri.port, opts) do |http|
186
199
  http.head2(@uri.request_uri)
187
200
  end
188
201
 
@@ -190,6 +203,10 @@ module Gitlab
190
203
  rescue Errno::ECONNREFUSED, Errno::ECONNRESET, EOFError
191
204
  false
192
205
  end
206
+
207
+ def opts
208
+ @uri.scheme == 'https' ? { use_ssl: true, verify_mode: OpenSSL::SSL::VERIFY_NONE } : {}
209
+ end
193
210
  end
194
211
  end
195
212
  end
@@ -26,6 +26,7 @@ module Gitlab
26
26
  LDAP_USER = 'tanuki'.freeze
27
27
  LDAP_PASSWORD = 'password'.freeze
28
28
  LDAP_PORT = 389
29
+ LDAP_TLS_PORT = 636
29
30
  BASE_DN = 'dc=example,dc=org'.freeze
30
31
  BIND_DN = 'cn=admin,dc=example,dc=org'.freeze
31
32
  BOOTSTRAP_LDIF = '/container/service/slapd/assets/config/bootstrap/ldif/custom'.freeze
@@ -46,8 +47,20 @@ module Gitlab
46
47
  @volumes[FIXTURE_PATH] = BOOTSTRAP_LDIF
47
48
  end
48
49
 
49
- def enable_tls(status)
50
- @environment['LDAP_TLS'] = 'false' unless status
50
+ # LDAP_TLS is true by default
51
+ def tls=(status)
52
+ if status
53
+ @environment['LDAP_TLS_CRT_FILENAME'] = "#{hostname}.crt"
54
+ @environment['LDAP_TLS_KEY_FILENAME'] = "#{hostname}.key"
55
+ @environment['LDAP_TLS_ENFORCE'] = 'true'
56
+ @environment['LDAP_TLS_VERIFY_CLIENT'] = 'never'
57
+ else
58
+ @environment['LDAP_TLS'] = 'false'
59
+ end
60
+ end
61
+
62
+ def tls?
63
+ @environment['LDAP_TLS'] != 'false'
51
64
  end
52
65
 
53
66
  def username
@@ -132,11 +145,12 @@ module Gitlab
132
145
  main:
133
146
  label: LDAP
134
147
  host: #{hostname}
135
- port: #{LDAP_PORT}
148
+ port: #{tls? ? LDAP_TLS_PORT : LDAP_PORT}
136
149
  uid: 'uid'
137
150
  bind_dn: #{BIND_DN}
138
151
  password: #{ADMIN_PASSWORD}
139
- method: 'plain'
152
+ method: #{tls? ? 'simple_tls' : 'plain'}
153
+ verify_certificates: false
140
154
  base: #{BASE_DN}
141
155
  user_filter: ''
142
156
  group_base: #{GROUP_BASE}
@@ -153,6 +167,10 @@ module Gitlab
153
167
  ::Gitlab::QA::Runtime::Env.ldap_username = username
154
168
  ::Gitlab::QA::Runtime::Env.ldap_password = password
155
169
  end
170
+
171
+ def set_accept_insecure_certs
172
+ ::Gitlab::QA::Runtime::Env.accept_insecure_certs = 'true'
173
+ end
156
174
  end
157
175
  end
158
176
  end
@@ -6,29 +6,34 @@ module Gitlab
6
6
  module Test
7
7
  module Integration
8
8
  class LDAP < Scenario::Template
9
+ attr_reader :gitlab_name, :spec_suite, :tls
10
+
11
+ def configure(gitlab, ldap)
12
+ raise NotImplementedError
13
+ end
14
+
9
15
  # rubocop:disable Metrics/AbcSize
10
16
  def perform(release)
11
17
  Component::Gitlab.perform do |gitlab|
12
18
  gitlab.release = release
13
- gitlab.name = 'gitlab-ldap'
19
+ gitlab.name = gitlab_name
14
20
  gitlab.network = 'test'
21
+ gitlab.tls = tls
15
22
 
16
23
  Component::LDAP.perform do |ldap|
17
- ldap.enable_tls(false)
24
+ ldap.name = 'ldap-server'
18
25
  ldap.network = 'test'
19
26
  ldap.set_gitlab_credentials
27
+ ldap.tls = tls
20
28
 
21
- gitlab.omnibus_config = <<~OMNIBUS
22
- gitlab_rails['ldap_enabled'] = true;
23
- gitlab_rails['ldap_servers'] = #{ldap.to_config};
24
- OMNIBUS
29
+ configure(gitlab, ldap)
25
30
 
26
31
  ldap.instance do
27
32
  gitlab.instance do
28
- puts 'Running LDAP specs!'
33
+ puts "Running #{spec_suite} specs!"
29
34
 
30
35
  Component::Specs.perform do |specs|
31
- specs.suite = 'Test::Integration::LDAP'
36
+ specs.suite = spec_suite
32
37
  specs.release = gitlab.release
33
38
  specs.network = gitlab.network
34
39
  specs.args = [gitlab.address]
@@ -0,0 +1,26 @@
1
+ require 'yaml'
2
+
3
+ module Gitlab
4
+ module QA
5
+ module Scenario
6
+ module Test
7
+ module Integration
8
+ class LDAPNoTLS < LDAP
9
+ def initialize
10
+ @gitlab_name = 'gitlab-ldap'
11
+ @spec_suite = 'Test::Integration::LDAPNoTLS'
12
+ @tls = false
13
+ end
14
+
15
+ def configure(gitlab, ldap)
16
+ gitlab.omnibus_config = <<~OMNIBUS
17
+ gitlab_rails['ldap_enabled'] = true;
18
+ gitlab_rails['ldap_servers'] = #{ldap.to_config};
19
+ OMNIBUS
20
+ end
21
+ end
22
+ end
23
+ end
24
+ end
25
+ end
26
+ end
@@ -0,0 +1,29 @@
1
+ require 'yaml'
2
+
3
+ module Gitlab
4
+ module QA
5
+ module Scenario
6
+ module Test
7
+ module Integration
8
+ class LDAPTLS < LDAP
9
+ def initialize
10
+ @gitlab_name = 'gitlab'
11
+ @spec_suite = 'Test::Integration::LDAPTLS'
12
+ @tls = true
13
+ end
14
+
15
+ def configure(gitlab, ldap)
16
+ ldap.set_accept_insecure_certs
17
+ gitlab.omnibus_config = <<~OMNIBUS
18
+ gitlab_rails['ldap_enabled'] = true;
19
+ gitlab_rails['ldap_servers'] = #{ldap.to_config};
20
+ letsencrypt['enable'] = false;
21
+ external_url '#{gitlab.address}';
22
+ OMNIBUS
23
+ end
24
+ end
25
+ end
26
+ end
27
+ end
28
+ end
29
+ end
@@ -1,5 +1,5 @@
1
1
  module Gitlab
2
2
  module QA
3
- VERSION = '2.7.1'.freeze
3
+ VERSION = '2.7.2'.freeze
4
4
  end
5
5
  end
@@ -0,0 +1,31 @@
1
+ -----BEGIN CERTIFICATE-----
2
+ MIIFSjCCAzICCQDft0SZAQGuIzANBgkqhkiG9w0BAQsFADBnMQswCQYDVQQGEwJV
3
+ UzELMAkGA1UECAwCQ0ExFjAUBgNVBAcMDVNhbiBGcmFuY2lzY28xDzANBgNVBAoM
4
+ BkdpdExhYjEMMAoGA1UECwwDT3JnMRQwEgYDVQQDDAtnaXRsYWIudGVzdDAeFw0x
5
+ ODEwMjUwOTU0MzRaFw0yODEwMjIwOTU0MzRaMGcxCzAJBgNVBAYTAlVTMQswCQYD
6
+ VQQIDAJDQTEWMBQGA1UEBwwNU2FuIEZyYW5jaXNjbzEPMA0GA1UECgwGR2l0TGFi
7
+ MQwwCgYDVQQLDANPcmcxFDASBgNVBAMMC2dpdGxhYi50ZXN0MIICIjANBgkqhkiG
8
+ 9w0BAQEFAAOCAg8AMIICCgKCAgEAykiE+PF8CBAP/k0NMHiMJ+TqMnupLl5Ypo0N
9
+ TH/Y8qFEqV4MaiGoqHwHiqY3tC0Zshe7uowS7NDnmTH/5DeNOmi/zI+FhTEHJKhP
10
+ DM5Q0MXJrUIi6eGmojB5l/3t3OBnvoFaC0zpkpg5uR8QL5RbB8Gyf5/5eCEbP3/h
11
+ R2q9JFUOEyTYEyv+1K/WegQyaLPtiPtvfTTmx1uEDfP1vuiMKuPOQ/3N8nFky1ny
12
+ 8c0P2wQv6E/qtRafKxaPbA/OmSpx0JGol43EjgOqy5FIJBT+yYP2navvAw+BvZ3k
13
+ 6qiQL6dx5pOGPAd8uxLmcj4In54IZWxs8fxUlNpcLWbo8noVxIQP2j7MAGXwGatM
14
+ eaUnyD5DmHlHS92gvHU3nKagDEuJjnBCCWtaVugeAWuW+8fJHgYbwuRQ8h/5hTWc
15
+ T80cEHDmKB/Uft4QLc65C7LQjKmfeX5qLgufk+dMmWj116csejiTFPCue0/RjSxK
16
+ C/562dbt/ZcScLXymkUiewc7FzHKExquY42I/yudoMYS9EBAyDcDE72WrUcIpECH
17
+ OMIt+EgXoDw1e/aTc5orlBIFjhknnPnP5RtrBj/OdXEgwMfD/N+ZYpY43ZIjBHWM
18
+ Zpj4YxLdBXkFJ/JG632Pp+bOgF5TgzCnV2Je6r1VMAAH8U0B105xAnyl5qtepUO5
19
+ +THpCdUCAwEAATANBgkqhkiG9w0BAQsFAAOCAgEADFyEMU0aLOrNO60PerQ25kE9
20
+ jqzVhySyg6Pwsus7LIKTQLeo9abGmdjcbuqmBRLdxCYHbjbgW07I28YS4x4m7/ay
21
+ YAePaMRb4Qt1yyaWcPIsw57sMnoC8iqRqXJPyr8i9F+RtzoC7Hki6zORxms8TF5C
22
+ FbNB2ZBO/mbe8Lro0G1j5rxrvndQ6/OnwLQFW/VCfDDOIM7TXm6yYyiUpj3MSBay
23
+ LDJaT9N5xMxF82OjcMB0/flWFxI7QmNXTe7M6HQbp05Jyw9VCEAVflI7zkaYY329
24
+ 7XvVJbpf1A3SegqxGlF2gD31cxViYBRV7t0pO6mcwt0/iAzAVicg/qtoPUg8zFwN
25
+ xU89jk+UV5oTQc06u6CbIuF1eYy3MJGmQlCsEd/OOC9zl7xRHBA4ro3CTCH238L6
26
+ lGEi8FRombuPcv3hD9PuW/RAQ5v03lF9D7UVtEHtb2VCZ0EXL8YFRuqQpPvdPqQ+
27
+ znaohk2jKRSttvZCXw5TaWdDctDue/b70cEVPoAzXACjaX/oOau+MJvMaI7i5BXF
28
+ JhBcoXh7FXIgyDszzgGq5DxjCcpy0X5o2TGC5id8zUNBY8ek6UV3mHk2FQzYf+7C
29
+ 8Qvv++R3+Ubk5DryuuWa/R2ybemQja830Fgiab9hgvhhgCOCbmxLIKVrePenMOXc
30
+ vvjQTrP9ZinR50bKUf8=
31
+ -----END CERTIFICATE-----
@@ -0,0 +1,52 @@
1
+ -----BEGIN PRIVATE KEY-----
2
+ MIIJQgIBADANBgkqhkiG9w0BAQEFAASCCSwwggkoAgEAAoICAQDKSIT48XwIEA/+
3
+ TQ0weIwn5Ooye6kuXlimjQ1Mf9jyoUSpXgxqIaiofAeKpje0LRmyF7u6jBLs0OeZ
4
+ Mf/kN406aL/Mj4WFMQckqE8MzlDQxcmtQiLp4aaiMHmX/e3c4Ge+gVoLTOmSmDm5
5
+ HxAvlFsHwbJ/n/l4IRs/f+FHar0kVQ4TJNgTK/7Ur9Z6BDJos+2I+299NObHW4QN
6
+ 8/W+6Iwq485D/c3ycWTLWfLxzQ/bBC/oT+q1Fp8rFo9sD86ZKnHQkaiXjcSOA6rL
7
+ kUgkFP7Jg/adq+8DD4G9neTqqJAvp3Hmk4Y8B3y7EuZyPgifnghlbGzx/FSU2lwt
8
+ ZujyehXEhA/aPswAZfAZq0x5pSfIPkOYeUdL3aC8dTecpqAMS4mOcEIJa1pW6B4B
9
+ a5b7x8keBhvC5FDyH/mFNZxPzRwQcOYoH9R+3hAtzrkLstCMqZ95fmouC5+T50yZ
10
+ aPXXpyx6OJMU8K57T9GNLEoL/nrZ1u39lxJwtfKaRSJ7BzsXMcoTGq5jjYj/K52g
11
+ xhL0QEDINwMTvZatRwikQIc4wi34SBegPDV79pNzmiuUEgWOGSec+c/lG2sGP851
12
+ cSDAx8P835liljjdkiMEdYxmmPhjEt0FeQUn8kbrfY+n5s6AXlODMKdXYl7qvVUw
13
+ AAfxTQHXTnECfKXmq16lQ7n5MekJ1QIDAQABAoICAQCjRoPmeO0XiPeP2VvTCwp+
14
+ TRzooL4/SjIeRW49mFhiB9/nIZ29sOt1C5/+vwnpahn6kYObIONJuZmnIx+cc2aQ
15
+ heqC0DoC9z7/zMb53DKJQYz3R5Hs3JHnCl+rWnC7v3qd38TxqCREipDVJwimjwYn
16
+ LabJszPnTjmzOKJ7ReHjyK+yriOm3fU0cbYaCPczYkBSODmWg7PfqLPfm1J5xTUW
17
+ jYh5gwzQK80jArjBijbJHwkYaCFYCClz2yLrI5ssMIFry5actfa4dqdO5zamwTej
18
+ KtxOCnDDNKoRhrg23NZ9UJf0eJF6NMTuL2RJRF8rj6DRVQJfFMCk4dhTYWSYDAky
19
+ hBMWxyjTFowrfYJi7us4kCXg/kdJn+MfRurw0zkWa070/HwycuLN8p9DgciPBH2F
20
+ QzAdHx6sNiVwqrsD9Z8B/UYweeW7R0r3FQudHe41ir43QL6M2hMuZwAamCQO5Vhz
21
+ zQRtQfB/OyWJnwd5d78Y5A8G2GetlWHaYc9mA5P2eIJFiAnZC/gEvo177sEZ+ZYK
22
+ GJVWQ9d0wXIGQLIyC+FgqZnDZ5a3v4c1ekQm5igLyxx51E6xsUKmn58svTiWgRKW
23
+ PZp0Xjjp9eLdlAGZ7OvBBY3t+I1TCA3ZqpbdVHkbIzzUGMVoYAHBRnvtbNgtFXv8
24
+ R9aCc6qRL4x6BtWZtZBFpQKCAQEA+u9jx0WZOUK2osLQ107YDx3BVDgJYcl5N1Qv
25
+ enDdMeV6HC7nCvC7zeyD63x8jb0X7jGyfB2lErcA+rLD51SKM88whIQliM3U+X0i
26
+ AIZmYgONZ83AycW/d4RiDx3GMqTN6TqdMl+VsfryS/sog6hIxjMd2FeZvPNJZ4fZ
27
+ zOUT1zPt5Hd9Fs6qrymMSzepjYfY/HmhW6fHfUUm2bsALDE/cEUSFsQ58S73KbNv
28
+ eTSxQYF6FPitkG8idhG9ZWojmModCVvmux0ck7ZliCSxYH4XUH3NSNwBuoyTEGnK
29
+ smE+GeItJ/ORTiYDtMGFH2qBz8cK0zJiqfYppm1NJkmjJqVTowKCAQEAzl29dvXy
30
+ BmzjEjoRe+GuQorCw+b42ezSSio39mUJ5wxEAk1lchM82kwsk1cAEO7+Tanwvdvl
31
+ EDugSIqm5zs7UrxMFn7HBKcbR8oJMYuTefbdTJ1vcksR2kzHgZKKSdq3d6Rqh6/b
32
+ yhiIjSvkdM3ta3+U/k/04UIGAaTo2K+8TKGCEuAPuvaWQEAD6JrHZs52M5/GziJT
33
+ 9m/y1Mpg41zL1n1VTQOA1d6ltl3g8MNDoDjN+48nPnYl/WdZl9KHb9Qdop6hWmwa
34
+ C3jhsoSuiOy/j16gZJC29m9mGHcfflAUP2tpOCeyP/rHEC22EnLFh9yNZ8gSZSum
35
+ 9fE0tpQ1QZZEJwKCAQBS+evtjecf1x6bbX4vZCPvw7AVED6R9lQ95nmYrE+IW1Bo
36
+ l13Q8U+4xTfOG6j4GYobOpXBku/t41PQkmJTUVIt1Zo+h4/9z8pYAXfH4qliSbht
37
+ lczlK52ngMAILZlHT9XDBJ3MdW0DoG6Uj2WTO4ds+qQo0LbGk1A3iuWLakiIReSp
38
+ QpW7f/VS3JNGoA5R/ZTTz8h6jV1a4A37u2lQM6y9jClyG8rpJNWYFXyMAM+IUK80
39
+ 1hJWi1lC35TYPyOsN1Eoshn2z6aOdabXQQLiXG+LLz49lHqB3FAZAlKDb8JgPrkd
40
+ 1925kLpy//bsL4TjVvcOZT/Y4cxd+xCi04C+m7avAoIBACM3fA3BCvxtuJJztmgd
41
+ q09Pvs0PrYgDEh/19Hbn5zi2ryR1cMp23fui5DiAsFIzdtJqHdtIm16ZzlCS2Mi9
42
+ IvKLj7CHEg+JNO6bW9ZIq3I03q8kbtBiXzmRwLor982CtayFMmjVafyjEyqEQwhr
43
+ 3AhsTVDY9EE8sym0qsfPtaKeLURrWEPfsORmCES5pS22LhXBPnwO/6UelaIap04l
44
+ l+OSn+v0nRfiVwU4IBr2N6QwDXbQhzHxl6oW6QMvuk0rNaN6zq5PpGIwztNYMTDM
45
+ tiQRUe3XhGGpwRKLwaQcplfsTJh4rcKdWTs5kci0LWFyEe+UBQ+e029FKmm+ARig
46
+ PCECggEAWEO8OYfRfYX/bjf3f3OJlJszaWzm4jKjWQRqvqVoRZZMoRJfx01M/grU
47
+ sCGterlMF27T55Hnh6oEC8EkjVN2etJ8ylY0QUePbgu9HPZWMNGc3JXV48zFdTyk
48
+ EGNIwGu5mUUX9y/6LoNfATzxVx12TOiFBgaJACsaLlpFKnKxm7n1Cxws6PyT7PHo
49
+ SKBuTl75FN9phjNBuRZIqa0O1tj3PMi7SU0XDUtT80fP3oGvGPaBKqkIdgqUW4RD
50
+ JHPZ1+ye/vq8J44naVxFLqYo0YQPKiIoi0c860CZm/1Mk2zuQvx/LXnXpm06GfXd
51
+ x++63Pu+UaiR5UttNHmAr7AnrGw+Iw==
52
+ -----END PRIVATE KEY-----
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: gitlab-qa
3
3
  version: !ruby/object:Gem::Version
4
- version: 2.7.1
4
+ version: 2.7.2
5
5
  platform: ruby
6
6
  authors:
7
7
  - Grzegorz Bizon
8
8
  autorequire:
9
9
  bindir: exe
10
10
  cert_chain: []
11
- date: 2018-10-23 00:00:00.000000000 Z
11
+ date: 2018-10-30 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: climate_control
@@ -168,6 +168,8 @@ files:
168
168
  - lib/gitlab/qa/scenario/test/integration/instance_saml.rb
169
169
  - lib/gitlab/qa/scenario/test/integration/kubernetes.rb
170
170
  - lib/gitlab/qa/scenario/test/integration/ldap.rb
171
+ - lib/gitlab/qa/scenario/test/integration/ldap_no_tls.rb
172
+ - lib/gitlab/qa/scenario/test/integration/ldap_tls.rb
171
173
  - lib/gitlab/qa/scenario/test/integration/mattermost.rb
172
174
  - lib/gitlab/qa/scenario/test/integration/object_storage.rb
173
175
  - lib/gitlab/qa/scenario/test/integration/saml.rb
@@ -176,6 +178,8 @@ files:
176
178
  - lib/gitlab/qa/scenario/test/omnibus/upgrade.rb
177
179
  - lib/gitlab/qa/scenario/test/sanity/version.rb
178
180
  - lib/gitlab/qa/version.rb
181
+ - tls_certificates/gitlab/gitlab.test.crt
182
+ - tls_certificates/gitlab/gitlab.test.key
179
183
  homepage: http://about.gitlab.com
180
184
  licenses:
181
185
  - MIT