2019-07-07 11:18:12 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2019-12-04 20:38:33 +05:30
|
|
|
require 'spec_helper'
|
2018-12-13 13:39:08 +05:30
|
|
|
|
|
|
|
describe Clusters::Applications::Knative do
|
|
|
|
let(:knative) { create(:clusters_applications_knative) }
|
|
|
|
|
|
|
|
include_examples 'cluster application core specs', :clusters_applications_knative
|
|
|
|
include_examples 'cluster application status specs', :clusters_applications_knative
|
|
|
|
include_examples 'cluster application helm specs', :clusters_applications_knative
|
2019-03-02 22:35:43 +05:30
|
|
|
include_examples 'cluster application version specs', :clusters_applications_knative
|
|
|
|
include_examples 'cluster application initial status specs'
|
2018-12-13 13:39:08 +05:30
|
|
|
|
2019-02-15 15:39:39 +05:30
|
|
|
before do
|
|
|
|
allow(ClusterWaitForIngressIpAddressWorker).to receive(:perform_in)
|
|
|
|
allow(ClusterWaitForIngressIpAddressWorker).to receive(:perform_async)
|
|
|
|
end
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
describe 'associations' do
|
2020-03-09 13:42:32 +05:30
|
|
|
it { is_expected.to have_one(:serverless_domain_cluster).class_name('::Serverless::DomainCluster').with_foreign_key('clusters_applications_knative_id').inverse_of(:knative) }
|
2020-01-01 13:55:28 +05:30
|
|
|
end
|
|
|
|
|
2019-12-21 20:55:43 +05:30
|
|
|
describe 'when cloud run is enabled' do
|
|
|
|
let(:cluster) { create(:cluster, :provided_by_gcp, :cloud_run_enabled) }
|
|
|
|
let(:knative_cloud_run) { create(:clusters_applications_knative, cluster: cluster) }
|
|
|
|
|
|
|
|
it { expect(knative_cloud_run).to be_not_installable }
|
|
|
|
end
|
|
|
|
|
2019-02-15 15:39:39 +05:30
|
|
|
describe 'when rbac is not enabled' do
|
|
|
|
let(:cluster) { create(:cluster, :provided_by_gcp, :rbac_disabled) }
|
|
|
|
let(:knative_no_rbac) { create(:clusters_applications_knative, cluster: cluster) }
|
|
|
|
|
|
|
|
it { expect(knative_no_rbac).to be_not_installable }
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'make_installed with external_ip' do
|
|
|
|
before do
|
|
|
|
application.make_installed!
|
|
|
|
end
|
|
|
|
|
|
|
|
let(:application) { create(:clusters_applications_knative, :installing) }
|
|
|
|
|
|
|
|
it 'schedules a ClusterWaitForIngressIpAddressWorker' do
|
|
|
|
expect(ClusterWaitForIngressIpAddressWorker).to have_received(:perform_in)
|
|
|
|
.with(Clusters::Applications::Knative::FETCH_IP_ADDRESS_DELAY, 'knative', application.id)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
describe '#can_uninstall?' do
|
|
|
|
subject { knative.can_uninstall? }
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
it { is_expected.to be_truthy }
|
2019-07-31 22:56:46 +05:30
|
|
|
end
|
|
|
|
|
2019-02-15 15:39:39 +05:30
|
|
|
describe '#schedule_status_update with external_ip' do
|
|
|
|
let(:application) { create(:clusters_applications_knative, :installed) }
|
|
|
|
|
|
|
|
before do
|
|
|
|
application.schedule_status_update
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'schedules a ClusterWaitForIngressIpAddressWorker' do
|
|
|
|
expect(ClusterWaitForIngressIpAddressWorker).to have_received(:perform_async)
|
|
|
|
.with('knative', application.id)
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when the application is not installed' do
|
|
|
|
let(:application) { create(:clusters_applications_knative, :installing) }
|
|
|
|
|
|
|
|
it 'does not schedule a ClusterWaitForIngressIpAddressWorker' do
|
|
|
|
expect(ClusterWaitForIngressIpAddressWorker).not_to have_received(:perform_async)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when there is already an external_ip' do
|
|
|
|
let(:application) { create(:clusters_applications_knative, :installed, external_ip: '111.222.222.111') }
|
|
|
|
|
|
|
|
it 'does not schedule a ClusterWaitForIngressIpAddressWorker' do
|
|
|
|
expect(ClusterWaitForIngressIpAddressWorker).not_to have_received(:perform_in)
|
|
|
|
end
|
|
|
|
end
|
2019-05-18 00:54:41 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'when there is already an external_hostname' do
|
|
|
|
let(:application) { create(:clusters_applications_knative, :installed, external_hostname: 'localhost.localdomain') }
|
|
|
|
|
|
|
|
it 'does not schedule a ClusterWaitForIngressIpAddressWorker' do
|
|
|
|
expect(ClusterWaitForIngressIpAddressWorker).not_to have_received(:perform_in)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-05-30 16:15:17 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
shared_examples 'a command' do
|
|
|
|
it 'is an instance of Helm::InstallCommand' do
|
2018-12-13 13:39:08 +05:30
|
|
|
expect(subject).to be_an_instance_of(Gitlab::Kubernetes::Helm::InstallCommand)
|
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'is initialized with knative arguments' do
|
2018-12-13 13:39:08 +05:30
|
|
|
expect(subject.name).to eq('knative')
|
|
|
|
expect(subject.chart).to eq('knative/knative')
|
|
|
|
expect(subject.files).to eq(knative.files)
|
|
|
|
end
|
2019-02-15 15:39:39 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'does not install metrics for prometheus' do
|
2019-10-12 21:52:04 +05:30
|
|
|
expect(subject.postinstall).to be_empty
|
2019-02-15 15:39:39 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'with prometheus installed' do
|
|
|
|
let(:prometheus) { create(:clusters_applications_prometheus, :installed) }
|
|
|
|
let(:knative) { create(:clusters_applications_knative, cluster: prometheus.cluster) }
|
|
|
|
|
|
|
|
subject { knative.install_command }
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'installs metrics' do
|
2019-10-12 21:52:04 +05:30
|
|
|
expect(subject.postinstall).not_to be_empty
|
2019-02-15 15:39:39 +05:30
|
|
|
expect(subject.postinstall.length).to be(1)
|
|
|
|
expect(subject.postinstall[0]).to eql("kubectl apply -f #{Clusters::Applications::Knative::METRICS_CONFIG}")
|
|
|
|
end
|
|
|
|
end
|
2018-12-13 13:39:08 +05:30
|
|
|
end
|
|
|
|
|
2019-06-05 12:25:43 +05:30
|
|
|
describe '#install_command' do
|
|
|
|
subject { knative.install_command }
|
|
|
|
|
|
|
|
it 'is initialized with latest version' do
|
2020-01-01 13:55:28 +05:30
|
|
|
expect(subject.version).to eq('0.9.0')
|
2019-06-05 12:25:43 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'a command'
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#update_command' do
|
|
|
|
let!(:current_installed_version) { knative.version = '0.1.0' }
|
2020-03-09 13:42:32 +05:30
|
|
|
|
2019-06-05 12:25:43 +05:30
|
|
|
subject { knative.update_command }
|
|
|
|
|
|
|
|
it 'is initialized with current version' do
|
|
|
|
expect(subject.version).to eq(current_installed_version)
|
|
|
|
end
|
|
|
|
|
|
|
|
it_behaves_like 'a command'
|
|
|
|
end
|
|
|
|
|
2019-10-12 21:52:04 +05:30
|
|
|
describe '#uninstall_command' do
|
|
|
|
subject { knative.uninstall_command }
|
|
|
|
|
|
|
|
it { is_expected.to be_an_instance_of(Gitlab::Kubernetes::Helm::DeleteCommand) }
|
|
|
|
|
|
|
|
it "removes knative deployed services before uninstallation" do
|
|
|
|
2.times do |i|
|
|
|
|
cluster_project = create(:cluster_project, cluster: knative.cluster)
|
|
|
|
|
|
|
|
create(:cluster_kubernetes_namespace,
|
|
|
|
cluster: cluster_project.cluster,
|
|
|
|
cluster_project: cluster_project,
|
|
|
|
project: cluster_project.project,
|
|
|
|
namespace: "namespace_#{i}")
|
|
|
|
end
|
|
|
|
|
|
|
|
remove_namespaced_services_script = [
|
|
|
|
"kubectl delete ksvc --all -n #{knative.cluster.kubernetes_namespaces.first.namespace}",
|
|
|
|
"kubectl delete ksvc --all -n #{knative.cluster.kubernetes_namespaces.second.namespace}"
|
|
|
|
]
|
|
|
|
|
|
|
|
expect(subject.predelete).to match_array(remove_namespaced_services_script)
|
|
|
|
end
|
|
|
|
|
|
|
|
it "initializes command with all necessary postdelete script" do
|
2020-01-01 13:55:28 +05:30
|
|
|
api_groups = YAML.safe_load(File.read(Rails.root.join(Clusters::Applications::Knative::API_GROUPS_PATH)))
|
2019-10-12 21:52:04 +05:30
|
|
|
|
|
|
|
remove_knative_istio_leftovers_script = [
|
|
|
|
"kubectl delete --ignore-not-found ns knative-serving",
|
|
|
|
"kubectl delete --ignore-not-found ns knative-build"
|
|
|
|
]
|
|
|
|
|
2020-01-01 13:55:28 +05:30
|
|
|
full_delete_commands_size = api_groups.size + remove_knative_istio_leftovers_script.size
|
2019-10-12 21:52:04 +05:30
|
|
|
|
|
|
|
expect(subject.postdelete).to include(*remove_knative_istio_leftovers_script)
|
|
|
|
expect(subject.postdelete.size).to eq(full_delete_commands_size)
|
2020-01-01 13:55:28 +05:30
|
|
|
expect(subject.postdelete[2]).to eq("kubectl api-resources -o name --api-group #{api_groups[0]} | xargs kubectl delete --ignore-not-found crd")
|
|
|
|
expect(subject.postdelete[3]).to eq("kubectl api-resources -o name --api-group #{api_groups[1]} | xargs kubectl delete --ignore-not-found crd")
|
2019-10-12 21:52:04 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-12-13 13:39:08 +05:30
|
|
|
describe '#files' do
|
|
|
|
let(:application) { knative }
|
|
|
|
let(:values) { subject[:'values.yaml'] }
|
|
|
|
|
|
|
|
subject { application.files }
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'includes knative specific keys in the values.yaml file' do
|
2018-12-13 13:39:08 +05:30
|
|
|
expect(values).to include('domain')
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe 'validations' do
|
|
|
|
it { is_expected.to validate_presence_of(:hostname) }
|
|
|
|
end
|
|
|
|
end
|