scripts/gitlab.rb (32 lines of code) (raw):
pages_external_url 'http://127.0.0.1:5051'
pages_nginx['redirect_http_to_https'] = false
pages_nginx['ssl_certificate'] = "/etc/gitlab/ssl/gitlab-registry.pem"
pages_nginx['ssl_certificate_key'] = "/etc/gitlab/ssl/gitlab-registry.key"
registry_external_url 'http://127.0.0.1:5050'
registry['enable'] = true
registry_nginx['ssl_certificate'] = "/etc/gitlab/ssl/gitlab-registry.pem"
registry_nginx['ssl_certificate_key'] = "/etc/gitlab/ssl/gitlab-registry.key"
gitlab_rails['initial_shared_runners_registration_token'] = "ACCTEST1234567890123_RUNNER_REG_TOKEN"
# The new licenses issued are for the new Customer Portal.
# see https://docs.gitlab.com/omnibus/development/setup/#use-customers-portal-staging-in-gitlab
gitlab_rails['env'] = {
"GITLAB_LICENSE_MODE" => "test",
"CUSTOMER_PORTAL_URL" => "https://customers.staging.gitlab.com"
}
# This setting is required to disable caching for application settings
# which is required to test different scenarios in the acceptance tests.
# see https://gitlab.com/gitlab-org/gitlab/-/issues/364812#note_986366898
# see https://gitlab.com/gitlab-org/terraform-provider-gitlab/pull/1128
gitlab_rails['application_settings_cache_seconds'] = 0
gitlab_rails['env'].merge!({
'IN_MEMORY_APPLICATION_SETTINGS' => 'false'
})
# Enable SAML authentication for GitLab (required for SAML group links).
# see https://docs.gitlab.com/integration/saml/
gitlab_rails['omniauth_allow_single_sign_on'] = ['saml']
gitlab_rails['omniauth_block_auto_created_users'] = false
gitlab_rails['omniauth_providers'] = [
{
name: "saml",
label: "Dummy Test Provider",
args: {
assertion_consumer_service_url: "https://gitlab.example.com/users/auth/saml/callback",
idp_cert_fingerprint: "aa:aa:aa:aa:aa:aa:aa:aa:aa:aa:aa:aa:aa:aa:aa:aa",
idp_sso_target_url: "https://saml.provider.example.com/sso/saml",
issuer: "https://gitlab.example.com",
name_identifier_format: "urn:oasis:names:tc:SAML:2.0:nameid-format:persistent"
}
}
]