2019-07-07 11:18:12 +05:30
|
|
|
# frozen_string_literal: true
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
require 'rails_helper'
|
|
|
|
|
|
|
|
describe Clusters::Applications::Runner do
|
|
|
|
let(:ci_runner) { create(:ci_runner) }
|
|
|
|
|
|
|
|
include_examples 'cluster application core specs', :clusters_applications_runner
|
2018-12-13 13:39:08 +05:30
|
|
|
include_examples 'cluster application status specs', :clusters_applications_runner
|
2019-03-02 22:35:43 +05:30
|
|
|
include_examples 'cluster application version specs', :clusters_applications_runner
|
2019-02-15 15:39:39 +05:30
|
|
|
include_examples 'cluster application helm specs', :clusters_applications_runner
|
2019-03-02 22:35:43 +05:30
|
|
|
include_examples 'cluster application initial status specs'
|
2018-03-27 19:54:05 +05:30
|
|
|
|
|
|
|
it { is_expected.to belong_to(:runner) }
|
|
|
|
|
2019-07-31 22:56:46 +05:30
|
|
|
describe '#can_uninstall?' do
|
|
|
|
let(:gitlab_runner) { create(:clusters_applications_runner, runner: ci_runner) }
|
|
|
|
|
|
|
|
subject { gitlab_runner.can_uninstall? }
|
|
|
|
|
2019-09-30 21:07:59 +05:30
|
|
|
it { is_expected.to be_truthy }
|
2019-07-31 22:56:46 +05:30
|
|
|
end
|
|
|
|
|
2018-03-27 19:54:05 +05:30
|
|
|
describe '#install_command' do
|
|
|
|
let(:kubeclient) { double('kubernetes client') }
|
|
|
|
let(:gitlab_runner) { create(:clusters_applications_runner, runner: ci_runner) }
|
|
|
|
|
|
|
|
subject { gitlab_runner.install_command }
|
|
|
|
|
|
|
|
it { is_expected.to be_an_instance_of(Gitlab::Kubernetes::Helm::InstallCommand) }
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'is initialized with 4 arguments' do
|
2018-03-27 19:54:05 +05:30
|
|
|
expect(subject.name).to eq('runner')
|
|
|
|
expect(subject.chart).to eq('runner/gitlab-runner')
|
2019-07-31 22:56:46 +05:30
|
|
|
expect(subject.version).to eq(Clusters::Applications::Runner::VERSION)
|
2019-02-15 15:39:39 +05:30
|
|
|
expect(subject).to be_rbac
|
2018-03-27 19:54:05 +05:30
|
|
|
expect(subject.repository).to eq('https://charts.gitlab.io')
|
2018-11-18 11:00:15 +05:30
|
|
|
expect(subject.files).to eq(gitlab_runner.files)
|
|
|
|
end
|
|
|
|
|
2019-02-15 15:39:39 +05:30
|
|
|
context 'on a non rbac enabled cluster' do
|
2018-11-20 20:47:30 +05:30
|
|
|
before do
|
2019-02-15 15:39:39 +05:30
|
|
|
gitlab_runner.cluster.platform_kubernetes.abac!
|
2018-11-20 20:47:30 +05:30
|
|
|
end
|
|
|
|
|
2019-02-15 15:39:39 +05:30
|
|
|
it { is_expected.not_to be_rbac }
|
2018-11-20 20:47:30 +05:30
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
context 'application failed to install previously' do
|
|
|
|
let(:gitlab_runner) { create(:clusters_applications_runner, :errored, runner: ci_runner, version: '0.1.13') }
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'is initialized with the locked version' do
|
2019-07-31 22:56:46 +05:30
|
|
|
expect(subject.version).to eq(Clusters::Applications::Runner::VERSION)
|
2018-11-18 11:00:15 +05:30
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2018-11-18 11:00:15 +05:30
|
|
|
describe '#files' do
|
|
|
|
let(:application) { create(:clusters_applications_runner, runner: ci_runner) }
|
|
|
|
let(:values) { subject[:'values.yaml'] }
|
|
|
|
|
|
|
|
subject { application.files }
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'includes runner valid values' do
|
2018-11-18 11:00:15 +05:30
|
|
|
expect(values).to include('concurrent')
|
|
|
|
expect(values).to include('checkInterval')
|
|
|
|
expect(values).to include('rbac')
|
|
|
|
expect(values).to include('runners')
|
|
|
|
expect(values).to include('privileged: true')
|
|
|
|
expect(values).to include('image: ubuntu:16.04')
|
|
|
|
expect(values).to include('resources')
|
2019-07-31 22:56:46 +05:30
|
|
|
expect(values).to match(/runnerToken: '?#{Regexp.escape(ci_runner.token)}/)
|
|
|
|
expect(values).to match(/gitlabUrl: '?#{Regexp.escape(Gitlab::Routing.url_helpers.root_url)}/)
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'without a runner' do
|
2019-02-15 15:39:39 +05:30
|
|
|
let(:application) { create(:clusters_applications_runner, runner: nil, cluster: cluster) }
|
2019-07-07 11:18:12 +05:30
|
|
|
let(:runner) { application.runner }
|
2019-05-18 00:54:41 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
shared_examples 'runner creation' do
|
|
|
|
it 'creates a runner' do
|
|
|
|
expect { subject }.to change { Ci::Runner.count }.by(1)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'uses the new runner token' do
|
2019-07-31 22:56:46 +05:30
|
|
|
expect(values).to match(/runnerToken: '?#{Regexp.escape(runner.token)}/)
|
2019-07-07 11:18:12 +05:30
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'project cluster' do
|
|
|
|
let(:project) { create(:project) }
|
|
|
|
let(:cluster) { create(:cluster, :with_installed_helm, projects: [project]) }
|
|
|
|
|
|
|
|
include_examples 'runner creation'
|
|
|
|
|
|
|
|
it 'creates a project runner' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(runner).to be_project_type
|
|
|
|
expect(runner.projects).to eq [project]
|
|
|
|
end
|
2019-05-30 16:15:17 +05:30
|
|
|
end
|
2019-05-18 00:54:41 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
context 'group cluster' do
|
|
|
|
let(:group) { create(:group) }
|
|
|
|
let(:cluster) { create(:cluster, :with_installed_helm, cluster_type: :group_type, groups: [group]) }
|
|
|
|
|
|
|
|
include_examples 'runner creation'
|
|
|
|
|
|
|
|
it 'creates a group runner' do
|
|
|
|
subject
|
2018-03-27 19:54:05 +05:30
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
expect(runner).to be_group_type
|
|
|
|
expect(runner.groups).to eq [group]
|
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
2019-07-31 22:56:46 +05:30
|
|
|
|
|
|
|
context 'instance cluster' do
|
|
|
|
let(:cluster) { create(:cluster, :with_installed_helm, :instance) }
|
|
|
|
|
|
|
|
include_examples 'runner creation'
|
|
|
|
|
|
|
|
it 'creates an instance runner' do
|
|
|
|
subject
|
|
|
|
|
|
|
|
expect(runner).to be_instance_type
|
|
|
|
end
|
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
|
|
|
context 'with duplicated values on vendor/runner/values.yaml' do
|
2018-11-18 11:00:15 +05:30
|
|
|
let(:stub_values) do
|
2018-03-27 19:54:05 +05:30
|
|
|
{
|
|
|
|
"concurrent" => 4,
|
|
|
|
"checkInterval" => 3,
|
|
|
|
"rbac" => {
|
|
|
|
"create" => false
|
|
|
|
},
|
|
|
|
"clusterWideAccess" => false,
|
|
|
|
"runners" => {
|
|
|
|
"privileged" => false,
|
|
|
|
"image" => "ubuntu:16.04",
|
|
|
|
"builds" => {},
|
|
|
|
"services" => {},
|
|
|
|
"helpers" => {}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
end
|
|
|
|
|
|
|
|
before do
|
2018-11-18 11:00:15 +05:30
|
|
|
allow(application).to receive(:chart_values).and_return(stub_values)
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
|
2019-07-07 11:18:12 +05:30
|
|
|
it 'overwrites values.yaml' do
|
2018-11-18 11:00:15 +05:30
|
|
|
expect(values).to match(/privileged: '?#{application.privileged}/)
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
2019-09-30 21:07:59 +05:30
|
|
|
|
|
|
|
describe '#prepare_uninstall' do
|
|
|
|
it 'pauses associated runner' do
|
|
|
|
active_runner = create(:ci_runner, contacted_at: 1.second.ago)
|
|
|
|
|
|
|
|
expect(active_runner.status).to eq(:online)
|
|
|
|
|
|
|
|
application_runner = create(:clusters_applications_runner, :scheduled, runner: active_runner)
|
|
|
|
application_runner.prepare_uninstall
|
|
|
|
|
|
|
|
expect(active_runner.status).to eq(:paused)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#make_uninstalling!' do
|
|
|
|
subject { create(:clusters_applications_runner, :scheduled, runner: ci_runner) }
|
|
|
|
|
|
|
|
it 'calls prepare_uninstall' do
|
|
|
|
expect_any_instance_of(described_class).to receive(:prepare_uninstall).and_call_original
|
|
|
|
|
|
|
|
subject.make_uninstalling!
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
describe '#post_uninstall' do
|
|
|
|
it 'destroys its runner' do
|
|
|
|
application_runner = create(:clusters_applications_runner, :scheduled, runner: ci_runner)
|
|
|
|
|
|
|
|
expect { application_runner.post_uninstall }.to change { Ci::Runner.count }.by(-1)
|
|
|
|
end
|
|
|
|
end
|
2018-03-27 19:54:05 +05:30
|
|
|
end
|