Special upgrade procedure for release 3.177.2
Starting from the version 3.177.2 we are using Redis, so before you start new release of Allure TestOps you need to update your configuration.
This article describes changes for all available deployment methods.
- Deployment via docker-compose.
- Deployment via Kubernetes.
- Deployment via packages.
Deployment via docker-compose
- Go to a folder where you store your Allure TestOps's configuration files for docker-compose installation, i.e. where your
.env
anddocker-compose.yml
files reside. - Stop the Allure TestOps using
docker-compose down
command. - Edit
.env
file – add the following information
VERSION=3.177.2
JWT_SECRET=... # was added earlier
# gateway - this could be added at the end of the .env file
GATEWAY_REDIS_HOST=redis
GATEWAY_REDIS_PORT=6379
- Edit
docker-compose.yml
file and add the redis service and gateway environment
consul:
...
redis:
image: redis:6
networks:
- allure
gateway:
...
environment:
...
ALLURE_JWT_SECRET: ${JWT_SECRET} # moved from uaa service
# redis
SPRING_REDIS_HOST: ${GATEWAY_REDIS_HOST}
SPRING_REDIS_PORT: ${GATEWAY_REDIS_PORT}
# session
SPRING_SESSION_STORE_TYPE: REDIS
- Start Allure TestOps instance using
docker-compose up -d
command as usual.
Deployment via Kubernetes
Just make sure you've updated helm chart to the latest version and follow regular instructions for update to 3.177.2 version.
Deployment via packages
Starting from the version 3.177.2 Allure TestOps requires a redis instance.
For example, redis should be available at redist-host
: 6379
Edit
/opt/allure-ee/uaa/conf/allure-uaa.properties
file and cut the following informationallure.jwt.secret=xxx #you need to move this property to gateway sevice settings
Edit
/opt/allure-ee/gateway/conf/allure-gateway.properties
file and add following informationallure.jwt.secret=xxx # paste from spring.redis.host=redis-host spring.redis.port=6379 spring.session.store.type=REDIS
Update version packages version and restart Allure TetsOps.
LDAP settings for 3.177.2 and the following ones
Starting from the 3.177.X release you need to update your settings for LDAP.
Before 3.177.X release the settings related to LDAP all had the prefix LDAP, now in your LDAP settings you need to replace the prefix to ALLURE_LOGIN_LDAP.
LDAP => ALLURE_LOGIN_LDAP
LDAP as primary authentication
To set LDAP as primary way to authenticate your users, you need to ad the following configuration parameter to uaa service:
ALLURE_LOGIN_PRIMARY: "ldap"
This parameter will set your `URL/login' address to LDAP by default.
If you still need to log-in to Allure TestOps internal user, you need to use the following URL - URL/login/system
.