2018-10-16 16:03:59 -04:00
|
|
|
# frozen_string_literal: true
|
|
|
|
|
|
|
|
require 'spec_helper'
|
|
|
|
|
|
|
|
RSpec.describe Clusters::KubernetesNamespace, type: :model do
|
|
|
|
it { is_expected.to belong_to(:cluster_project) }
|
|
|
|
it { is_expected.to belong_to(:project) }
|
|
|
|
it { is_expected.to belong_to(:cluster) }
|
|
|
|
it { is_expected.to have_one(:platform_kubernetes) }
|
|
|
|
|
2018-11-13 05:27:21 -05:00
|
|
|
describe 'has_service_account_token' do
|
|
|
|
subject { described_class.has_service_account_token }
|
|
|
|
|
|
|
|
context 'namespace has service_account_token' do
|
|
|
|
let!(:namespace) { create(:cluster_kubernetes_namespace, :with_token) }
|
|
|
|
|
|
|
|
it { is_expected.to include(namespace) }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'namespace has no service_account_token' do
|
|
|
|
let!(:namespace) { create(:cluster_kubernetes_namespace) }
|
|
|
|
|
|
|
|
it { is_expected.not_to include(namespace) }
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2019-09-23 11:06:32 -04:00
|
|
|
describe '.with_environment_name' do
|
2019-08-07 00:40:29 -04:00
|
|
|
let(:cluster) { create(:cluster, :group) }
|
2019-09-23 11:06:32 -04:00
|
|
|
let(:environment) { create(:environment, name: name) }
|
2018-10-16 16:03:59 -04:00
|
|
|
|
2019-09-23 11:06:32 -04:00
|
|
|
let(:name) { 'production' }
|
2018-10-16 16:03:59 -04:00
|
|
|
|
2019-09-23 11:06:32 -04:00
|
|
|
subject { described_class.with_environment_name(name) }
|
2018-10-16 16:03:59 -04:00
|
|
|
|
2019-08-07 00:40:29 -04:00
|
|
|
context 'there is no associated environment' do
|
|
|
|
let!(:namespace) { create(:cluster_kubernetes_namespace, cluster: cluster, project: environment.project) }
|
2018-10-16 16:03:59 -04:00
|
|
|
|
2019-08-07 00:40:29 -04:00
|
|
|
it { is_expected.to be_empty }
|
2018-10-16 16:03:59 -04:00
|
|
|
end
|
|
|
|
|
2019-08-07 00:40:29 -04:00
|
|
|
context 'there is an assicated environment' do
|
|
|
|
let!(:namespace) do
|
|
|
|
create(
|
|
|
|
:cluster_kubernetes_namespace,
|
|
|
|
cluster: cluster,
|
|
|
|
project: environment.project,
|
|
|
|
environment: environment
|
|
|
|
)
|
2018-11-02 11:46:15 -04:00
|
|
|
end
|
2018-10-16 16:03:59 -04:00
|
|
|
|
2019-09-23 11:06:32 -04:00
|
|
|
context 'with a matching name' do
|
2019-08-07 00:40:29 -04:00
|
|
|
it { is_expected.to eq [namespace] }
|
2018-10-16 16:03:59 -04:00
|
|
|
end
|
|
|
|
|
2019-09-23 11:06:32 -04:00
|
|
|
context 'without a matching name' do
|
|
|
|
let(:environment) { create(:environment, name: 'staging') }
|
2018-10-16 16:03:59 -04:00
|
|
|
|
2019-08-07 00:40:29 -04:00
|
|
|
it { is_expected.to be_empty }
|
2018-10-16 16:03:59 -04:00
|
|
|
end
|
|
|
|
end
|
2019-08-07 00:40:29 -04:00
|
|
|
end
|
2018-10-16 16:03:59 -04:00
|
|
|
|
2019-08-07 00:40:29 -04:00
|
|
|
describe 'namespace uniqueness validation' do
|
2020-09-09 17:08:33 -04:00
|
|
|
let_it_be(:cluster) { create(:cluster, :project, :provided_by_gcp) }
|
2021-06-28 23:07:32 -04:00
|
|
|
|
2020-09-09 17:08:33 -04:00
|
|
|
let(:kubernetes_namespace) { build(:cluster_kubernetes_namespace, cluster: cluster, namespace: 'my-namespace') }
|
2018-10-16 16:03:59 -04:00
|
|
|
|
2019-08-07 00:40:29 -04:00
|
|
|
subject { kubernetes_namespace }
|
2018-11-02 11:46:15 -04:00
|
|
|
|
2019-08-07 00:40:29 -04:00
|
|
|
context 'when cluster is using the namespace' do
|
|
|
|
before do
|
|
|
|
create(:cluster_kubernetes_namespace,
|
|
|
|
cluster: kubernetes_namespace.cluster,
|
|
|
|
environment: kubernetes_namespace.environment,
|
|
|
|
namespace: 'my-namespace')
|
2018-10-16 16:03:59 -04:00
|
|
|
end
|
2019-08-07 00:40:29 -04:00
|
|
|
|
|
|
|
it { is_expected.not_to be_valid }
|
|
|
|
end
|
|
|
|
|
|
|
|
context 'when cluster is not using the namespace' do
|
|
|
|
it { is_expected.to be_valid }
|
2018-10-16 16:03:59 -04:00
|
|
|
end
|
|
|
|
end
|
2018-11-02 11:46:15 -04:00
|
|
|
|
|
|
|
describe '#predefined_variables' do
|
|
|
|
let(:kubernetes_namespace) { create(:cluster_kubernetes_namespace, cluster: cluster, service_account_token: token) }
|
|
|
|
let(:cluster) { create(:cluster, :project, platform_kubernetes: platform) }
|
|
|
|
let(:platform) { create(:cluster_platform_kubernetes, api_url: api_url, ca_cert: ca_pem, token: token) }
|
|
|
|
|
|
|
|
let(:api_url) { 'https://kube.domain.com' }
|
2019-02-06 23:56:08 -05:00
|
|
|
let(:ca_pem) { File.read(Rails.root.join('spec/fixtures/clusters/sample_cert.pem')) }
|
2018-11-02 11:46:15 -04:00
|
|
|
let(:token) { 'token' }
|
|
|
|
|
|
|
|
let(:kubeconfig) do
|
|
|
|
config_file = expand_fixture_path('config/kubeconfig.yml')
|
|
|
|
config = YAML.safe_load(File.read(config_file))
|
|
|
|
config.dig('users', 0, 'user')['token'] = token
|
|
|
|
config.dig('contexts', 0, 'context')['namespace'] = kubernetes_namespace.namespace
|
|
|
|
config.dig('clusters', 0, 'cluster')['certificate-authority-data'] =
|
|
|
|
Base64.strict_encode64(ca_pem)
|
|
|
|
|
|
|
|
YAML.dump(config)
|
|
|
|
end
|
|
|
|
|
|
|
|
it 'sets the variables' do
|
|
|
|
expect(kubernetes_namespace.predefined_variables).to include(
|
|
|
|
{ key: 'KUBE_SERVICE_ACCOUNT', value: kubernetes_namespace.service_account_name, public: true },
|
|
|
|
{ key: 'KUBE_NAMESPACE', value: kubernetes_namespace.namespace, public: true },
|
2019-03-07 12:08:17 -05:00
|
|
|
{ key: 'KUBE_TOKEN', value: kubernetes_namespace.service_account_token, public: false, masked: true },
|
2018-11-02 11:46:15 -04:00
|
|
|
{ key: 'KUBECONFIG', value: kubeconfig, public: false, file: true }
|
|
|
|
)
|
|
|
|
end
|
|
|
|
end
|
2018-10-16 16:03:59 -04:00
|
|
|
end
|