require 'securerandom'
module Gitlab
module QA
module Runtime
module Env
extend self
# Variables that are used in tests and are passed through to the docker container that executes the tests.
# These variables should be listed in /docs/what_tests_can_be_run.md#supported-gitlab-environment-variables
# unless they're defined elsewhere (e.g.: https://docs.gitlab.com/ee/ci/variables/predefined_variables.html)
ENV_VARIABLES = {
'QA_REMOTE_GRID' => :remote_grid,
'QA_REMOTE_GRID_USERNAME' => :remote_grid_username,
'QA_REMOTE_GRID_ACCESS_KEY' => :remote_grid_access_key,
'QA_REMOTE_GRID_PROTOCOL' => :remote_grid_protocol,
'QA_BROWSER' => :browser,
'GITLAB_API_BASE' => :api_base,
'GITLAB_ADMIN_USERNAME' => :admin_username,
'GITLAB_ADMIN_PASSWORD' => :admin_password,
'GITLAB_USERNAME' => :user_username,
'GITLAB_PASSWORD' => :user_password,
'GITLAB_LDAP_USERNAME' => :ldap_username,
'GITLAB_LDAP_PASSWORD' => :ldap_password,
'GITLAB_FORKER_USERNAME' => :forker_username,
'GITLAB_FORKER_PASSWORD' => :forker_password,
'GITLAB_USER_TYPE' => :user_type,
'GITLAB_SANDBOX_NAME' => :gitlab_sandbox_name,
'GITLAB_QA_ACCESS_TOKEN' => :qa_access_token,
'GITLAB_QA_ADMIN_ACCESS_TOKEN' => :qa_admin_access_token,
'GITHUB_ACCESS_TOKEN' => :github_access_token,
'GITLAB_URL' => :gitlab_url,
'SIMPLE_SAML_HOSTNAME' => :simple_saml_hostname,
'SIMPLE_SAML_FINGERPRINT' => :simple_saml_fingerprint,
'ACCEPT_INSECURE_CERTS' => :accept_insecure_certs,
'EE_LICENSE' => :ee_license,
'GCLOUD_ACCOUNT_EMAIL' => :gcloud_account_email,
'GCLOUD_ACCOUNT_KEY' => :gcloud_account_key,
'CLOUDSDK_CORE_PROJECT' => :cloudsdk_core_project,
'GCLOUD_REGION' => :gcloud_region,
'SIGNUP_DISABLED' => :signup_disabled,
'QA_ADDITIONAL_REPOSITORY_STORAGE' => :qa_additional_repository_storage,
'QA_PRAEFECT_REPOSITORY_STORAGE' => :qa_praefect_repository_storage,
'QA_GITALY_NON_CLUSTER_STORAGE' => :qa_gitaly_non_cluster_storage,
'QA_COOKIES' => :qa_cookie,
'QA_DEBUG' => :qa_debug,
'QA_DEFAULT_BRANCH' => :qa_default_branch,
'QA_LOG_PATH' => :qa_log_path,
'QA_CAN_TEST_ADMIN_FEATURES' => :qa_can_test_admin_features,
'QA_CAN_TEST_GIT_PROTOCOL_V2' => :qa_can_test_git_protocol_v2,
'QA_CAN_TEST_PRAEFECT' => :qa_can_test_praefect,
'QA_DISABLE_RSPEC_RETRY' => :qa_disable_rspec_retry,
'QA_SIMULATE_SLOW_CONNECTION' => :qa_simulate_slow_connection,
'QA_SLOW_CONNECTION_LATENCY_MS' => :qa_slow_connection_latency_ms,
'QA_SLOW_CONNECTION_THROUGHPUT_KBPS' => :qa_slow_connection_throughput_kbps,
'GITLAB_QA_USERNAME_1' => :gitlab_qa_username_1,
'GITLAB_QA_PASSWORD_1' => :gitlab_qa_password_1,
'GITLAB_QA_USERNAME_2' => :gitlab_qa_username_2,
'GITLAB_QA_PASSWORD_2' => :gitlab_qa_password_2,
'GITHUB_USERNAME' => :github_username,
'GITHUB_PASSWORD' => :github_password,
'KNAPSACK_GENERATE_REPORT' => :knapsack_generate_report,
'KNAPSACK_REPORT_PATH' => :knapsack_report_path,
'KNAPSACK_TEST_FILE_PATTERN' => :knapsack_test_file_pattern,
'KNAPSACK_TEST_DIR' => :knapsack_test_dir,
'CI' => :ci,
'CI_JOB_URL' => :ci_job_url,
'CI_RUNNER_ID' => :ci_runner_id,
'CI_SERVER_HOST' => :ci_server_host,
'CI_SERVER_PERSONAL_ACCESS_TOKEN' => :ci_server_personal_access_token,
'CI_NODE_INDEX' => :ci_node_index,
'CI_NODE_TOTAL' => :ci_node_total,
'CI_PROJECT_NAME' => :ci_project_name,
'GITLAB_CI' => :gitlab_ci,
'QA_SKIP_PULL' => :qa_skip_pull,
'ELASTIC_URL' => :elastic_url,
'GITLAB_QA_LOOP_RUNNER_MINUTES' => :gitlab_qa_loop_runner_minutes,
'MAILHOG_HOSTNAME' => :mailhog_hostname,
'SLACK_QA_CHANNEL' => :slack_qa_channel,
'CI_SLACK_WEBHOOK_URL' => :ci_slack_webhook_url,
'SLACK_ICON_EMOJI' => :slack_icon_emoji,
'GITLAB_QA_FORMLESS_LOGIN_TOKEN' => :gitlab_qa_formless_login_token,
'GEO_MAX_FILE_REPLICATION_TIME' => :geo_max_file_replication_time,
'GEO_MAX_DB_REPLICATION_TIME' => :geo_max_db_replication_time,
'JIRA_HOSTNAME' => :jira_hostname,
'JIRA_ADMIN_USERNAME' => :jira_admin_username,
'JIRA_ADMIN_PASSWORD' => :jira_admin_password,
'CACHE_NAMESPACE_NAME' => :cache_namespace_name,
'DEPLOY_VERSION' => :deploy_version,
'GITLAB_QA_USER_AGENT' => :gitlab_qa_user_agent,
'GEO_FAILOVER' => :geo_failover
}.freeze
ENV_VARIABLES.each do |env_name, method_name|
attr_writer(method_name)
define_method(method_name) do
ENV[env_name] ||
if instance_variable_defined?("@#{method_name}")
instance_variable_get("@#{method_name}")
end
end
end
def default_branch
ENV['QA_DEFAULT_BRANCH'] || 'master'
end
def gitlab_username
ENV['GITLAB_USERNAME'] || 'gitlab-qa'
end
def gitlab_dev_username
ENV['GITLAB_DEV_USERNAME'] || 'gitlab-qa-bot'
end
def gitlab_api_base
ENV['GITLAB_API_BASE'] || 'https://gitlab.com/api/v4'
end
def gitlab_bot_multi_project_pipeline_polling_token
ENV['GITLAB_BOT_MULTI_PROJECT_PIPELINE_POLLING_TOKEN']
end
def gitlab_ci_api_token
ENV['GITLAB_CI_API_TOKEN']
end
def ci_api_v4_url
ENV['CI_API_V4_URL']
end
def ci_job_name
ENV['CI_JOB_NAME']
end
def ci_job_token
ENV['CI_JOB_TOKEN']
end
def ci_pipeline_source
ENV['CI_PIPELINE_SOURCE']
end
def ci_pipeline_url
ENV['CI_PIPELINE_URL']
end
def ci_pipeline_id
ENV['CI_PIPELINE_ID']
end
def ci_project_id
ENV['CI_PROJECT_ID']
end
def ci_commit_ref_name
ENV['CI_COMMIT_REF_NAME']
end
def pipeline_from_project_name
if ci_project_name.to_s.start_with?('gitlab-qa')
if ENV['TOP_UPSTREAM_SOURCE_JOB'].to_s.start_with?('https://ops.gitlab.net')
'staging-orchestrated'
else
QA::Runtime::Env.default_branch
end
else
ci_project_name
end
end
def run_id
@run_id ||= "gitlab-qa-run-#{Time.now.strftime('%Y-%m-%d-%H-%M-%S')}-#{SecureRandom.hex(4)}"
end
def dev_access_token_variable
env_value_if_defined('GITLAB_QA_DEV_ACCESS_TOKEN')
end
def qa_dev_access_token
ENV['GITLAB_QA_DEV_ACCESS_TOKEN']
end
def initial_root_password
ENV['GITLAB_INITIAL_ROOT_PASSWORD']
end
def qa_container_registry_access_token
ENV['GITLAB_QA_CONTAINER_REGISTRY_ACCESS_TOKEN']
end
def qa_issue_url
ENV['GITLAB_QA_ISSUE_URL']
end
def deploy_environment
ENV['DEPLOY_ENVIRONMENT'] || pipeline_from_project_name
end
def host_artifacts_dir
@host_artifacts_dir ||= File.join(ENV['QA_ARTIFACTS_DIR'] || '/tmp/gitlab-qa', Runtime::Env.run_id)
end
def elastic_version
ENV['ELASTIC_VERSION'] || '6.4.2'.freeze
end
def variables
vars = {}
ENV_VARIABLES.each do |name, attribute|
# Variables that are overridden in the environment take precedence
# over the defaults specified by the QA runtime.
value = env_value_if_defined(name) || send(attribute) # rubocop:disable GitlabSecurity/PublicSend
vars[name] = value if value
end
vars
end
def require_license!
return if ENV.include?('EE_LICENSE')
raise ArgumentError, 'GitLab License is not available. Please load a license into EE_LICENSE env variable.'
end
def require_no_license!
return unless ENV.include?('EE_LICENSE')
raise ArgumentError, "Unexpected EE_LICENSE provided. Please unset it to continue."
end
def require_qa_access_token!
return unless ENV['GITLAB_QA_ACCESS_TOKEN'].to_s.strip.empty?
raise ArgumentError, "Please provide GITLAB_QA_ACCESS_TOKEN"
end
def require_qa_dev_access_token!
return unless ENV['GITLAB_QA_DEV_ACCESS_TOKEN'].to_s.strip.empty?
raise ArgumentError, "Please provide GITLAB_QA_DEV_ACCESS_TOKEN"
end
def require_slack_qa_channel!
return unless ENV['SLACK_QA_CHANNEL'].to_s.strip.empty?
raise ArgumentError, "Please provide SLACK_QA_CHANNEL"
end
def require_ci_slack_webhook_url!
return unless ENV['CI_SLACK_WEBHOOK_URL'].to_s.strip.empty?
raise ArgumentError, "Please provide CI_SLACK_WEBHOOK_URL"
end
def require_kubernetes_environment!
%w[GCLOUD_ACCOUNT_EMAIL GCLOUD_ACCOUNT_KEY CLOUDSDK_CORE_PROJECT].each do |env_key|
raise ArgumentError, "Environment variable #{env_key} must be set to run kubernetes specs" unless ENV.key?(env_key)
end
end
def require_initial_password!
return unless ENV['GITLAB_INITIAL_ROOT_PASSWORD'].to_s.strip.empty?
raise ArgumentError, "Environment variable GITLAB_INITIAL_ROOT_PASSWORD must be provided to set an initial root password."
end
def require_ssh_tunnel!
%w[TUNNEL_SSH_PRIVATE_KEY TUNNEL_SERVER_HOSTNAME TUNNEL_SSH_USER].each do |env_key|
raise ArgumentError, "Environment variable #{env_key} must be set to run tunnel specs" unless ENV.key?(env_key)
end
end
def override_default_password!
require_initial_password!
ENV['GITLAB_PASSWORD'] = initial_root_password
ENV['GITLAB_ADMIN_PASSWORD'] = initial_root_password
end
def skip_pull?
enabled?(ENV['QA_SKIP_PULL'], default: false)
end
def geo_failover?
enabled?(ENV['GEO_FAILOVER'], default: false)
end
private
def enabled?(value, default: true)
return default if value.nil?
(value =~ /^(false|no|0)$/i) != 0
end
def env_value_if_defined(variable)
# Pass through the variables if they are defined in the environment
return "$#{variable}" if ENV[variable]
end
end
end
end
end