debian-mirror-gitlab/spec/models/clusters/applications/jupyter_spec.rb

126 lines
5 KiB
Ruby
Raw Normal View History

2019-07-07 11:18:12 +05:30
# frozen_string_literal: true
2019-12-04 20:38:33 +05:30
require 'spec_helper'
2018-11-08 19:23:39 +05:30
describe Clusters::Applications::Jupyter do
include_examples 'cluster application core specs', :clusters_applications_jupyter
2019-03-02 22:35:43 +05:30
include_examples 'cluster application status specs', :clusters_applications_jupyter
include_examples 'cluster application version specs', :clusters_applications_jupyter
2019-02-15 15:39:39 +05:30
include_examples 'cluster application helm specs', :clusters_applications_jupyter
2018-11-08 19:23:39 +05:30
it { is_expected.to belong_to(:oauth_application) }
2019-07-31 22:56:46 +05:30
describe '#can_uninstall?' do
let(:ingress) { create(:clusters_applications_ingress, :installed, external_hostname: 'localhost.localdomain') }
let(:jupyter) { create(:clusters_applications_jupyter, cluster: ingress.cluster) }
subject { jupyter.can_uninstall? }
2019-09-30 21:07:59 +05:30
it { is_expected.to be_truthy }
2019-07-31 22:56:46 +05:30
end
2018-11-08 19:23:39 +05:30
describe '#set_initial_status' do
before do
jupyter.set_initial_status
end
context 'when ingress is not installed' do
let(:cluster) { create(:cluster, :provided_by_gcp) }
let(:jupyter) { create(:clusters_applications_jupyter, cluster: cluster) }
it { expect(jupyter).to be_not_installable }
end
context 'when ingress is installed and external_ip is assigned' do
let(:ingress) { create(:clusters_applications_ingress, :installed, external_ip: '127.0.0.1') }
let(:jupyter) { create(:clusters_applications_jupyter, cluster: ingress.cluster) }
it { expect(jupyter).to be_installable }
end
2019-07-07 11:18:12 +05:30
context 'when ingress is installed and external_hostname is assigned' do
let(:ingress) { create(:clusters_applications_ingress, :installed, external_hostname: 'localhost.localdomain') }
let(:jupyter) { create(:clusters_applications_jupyter, cluster: ingress.cluster) }
it { expect(jupyter).to be_installable }
end
2018-11-08 19:23:39 +05:30
end
describe '#install_command' do
let!(:ingress) { create(:clusters_applications_ingress, :installed, external_ip: '127.0.0.1') }
let!(:jupyter) { create(:clusters_applications_jupyter, cluster: ingress.cluster) }
subject { jupyter.install_command }
it { is_expected.to be_an_instance_of(Gitlab::Kubernetes::Helm::InstallCommand) }
2019-07-07 11:18:12 +05:30
it 'is initialized with 4 arguments' do
2018-11-08 19:23:39 +05:30
expect(subject.name).to eq('jupyter')
expect(subject.chart).to eq('jupyter/jupyterhub')
2019-07-07 11:18:12 +05:30
expect(subject.version).to eq('0.9-174bbd5')
2019-02-15 15:39:39 +05:30
expect(subject).to be_rbac
2018-11-08 19:23:39 +05:30
expect(subject.repository).to eq('https://jupyterhub.github.io/helm-chart/')
2018-11-18 11:00:15 +05:30
expect(subject.files).to eq(jupyter.files)
end
2019-02-15 15:39:39 +05:30
context 'on a non rbac enabled cluster' do
2018-11-20 20:47:30 +05:30
before do
2019-02-15 15:39:39 +05:30
jupyter.cluster.platform_kubernetes.abac!
2018-11-20 20:47:30 +05:30
end
2019-02-15 15:39:39 +05:30
it { is_expected.not_to be_rbac }
2018-11-20 20:47:30 +05:30
end
2018-11-18 11:00:15 +05:30
context 'application failed to install previously' do
let(:jupyter) { create(:clusters_applications_jupyter, :errored, version: '0.0.1') }
2019-07-07 11:18:12 +05:30
it 'is initialized with the locked version' do
expect(subject.version).to eq('0.9-174bbd5')
2018-11-18 11:00:15 +05:30
end
2018-11-08 19:23:39 +05:30
end
end
2018-11-18 11:00:15 +05:30
describe '#files' do
2019-12-04 20:38:33 +05:30
let(:cluster) { create(:cluster, :with_installed_helm, :provided_by_gcp, :project) }
let(:application) { create(:clusters_applications_jupyter, cluster: cluster) }
2018-11-18 11:00:15 +05:30
let(:values) { subject[:'values.yaml'] }
subject { application.files }
2019-12-04 20:38:33 +05:30
context 'when cluster belongs to a project' do
it 'includes valid values' do
expect(values).to include('ingress')
expect(values).to include('hub')
expect(values).to include('proxy')
expect(values).to include('auth')
expect(values).to include('singleuser')
expect(values).to match(/clientId: '?#{application.oauth_application.uid}/)
expect(values).to match(/callbackUrl: '?#{application.callback_url}/)
expect(values).to include("gitlabProjectIdWhitelist:\n - #{application.cluster.project.id}")
expect(values).to include("c.GitLabOAuthenticator.scope = ['api read_repository write_repository']")
expect(values).to match(/GITLAB_HOST: '?#{Gitlab.config.gitlab.host}/)
expect(values).to match(/GITLAB_CLUSTER_ID: '?#{application.cluster.id}/)
end
2018-11-08 19:23:39 +05:30
end
2018-12-05 23:21:45 +05:30
2019-12-04 20:38:33 +05:30
context 'when cluster belongs to a group' do
let(:group) { create(:group) }
let(:cluster) { create(:cluster, :with_installed_helm, :provided_by_gcp, :group, groups: [group]) }
it 'includes valid values' do
expect(values).to include('ingress')
expect(values).to include('hub')
expect(values).to include('proxy')
expect(values).to include('auth')
expect(values).to include('singleuser')
expect(values).to match(/clientId: '?#{application.oauth_application.uid}/)
expect(values).to match(/callbackUrl: '?#{application.callback_url}/)
expect(values).to include("gitlabGroupWhitelist:\n - #{group.to_param}")
expect(values).to include("c.GitLabOAuthenticator.scope = ['api read_repository write_repository']")
expect(values).to match(/GITLAB_HOST: '?#{Gitlab.config.gitlab.host}/)
2018-12-05 23:21:45 +05:30
expect(values).to match(/GITLAB_CLUSTER_ID: '?#{application.cluster.id}/)
end
end
2018-11-08 19:23:39 +05:30
end
end