# frozen_string_literal: true require 'rails_helper' describe Clusters::Applications::Runner do let(:ci_runner) { create(:ci_runner) } include_examples 'cluster application core specs', :clusters_applications_runner include_examples 'cluster application status specs', :clusters_applications_runner include_examples 'cluster application version specs', :clusters_applications_runner include_examples 'cluster application helm specs', :clusters_applications_runner include_examples 'cluster application initial status specs' it { is_expected.to belong_to(:runner) } describe '#can_uninstall?' do let(:gitlab_runner) { create(:clusters_applications_runner, runner: ci_runner) } subject { gitlab_runner.can_uninstall? } it { is_expected.to be_falsey } end describe '#install_command' do let(:kubeclient) { double('kubernetes client') } let(:gitlab_runner) { create(:clusters_applications_runner, runner: ci_runner) } subject { gitlab_runner.install_command } it { is_expected.to be_an_instance_of(Gitlab::Kubernetes::Helm::InstallCommand) } it 'is initialized with 4 arguments' do expect(subject.name).to eq('runner') expect(subject.chart).to eq('runner/gitlab-runner') expect(subject.version).to eq(Clusters::Applications::Runner::VERSION) expect(subject).to be_rbac expect(subject.repository).to eq('https://charts.gitlab.io') expect(subject.files).to eq(gitlab_runner.files) end context 'on a non rbac enabled cluster' do before do gitlab_runner.cluster.platform_kubernetes.abac! end it { is_expected.not_to be_rbac } end context 'application failed to install previously' do let(:gitlab_runner) { create(:clusters_applications_runner, :errored, runner: ci_runner, version: '0.1.13') } it 'is initialized with the locked version' do expect(subject.version).to eq(Clusters::Applications::Runner::VERSION) end end end describe '#files' do let(:application) { create(:clusters_applications_runner, runner: ci_runner) } let(:values) { subject[:'values.yaml'] } subject { application.files } it 'includes runner valid values' do expect(values).to include('concurrent') expect(values).to include('checkInterval') expect(values).to include('rbac') expect(values).to include('runners') expect(values).to include('privileged: true') expect(values).to include('image: ubuntu:16.04') expect(values).to include('resources') expect(values).to match(/runnerToken: '?#{Regexp.escape(ci_runner.token)}/) expect(values).to match(/gitlabUrl: '?#{Regexp.escape(Gitlab::Routing.url_helpers.root_url)}/) end context 'without a runner' do let(:application) { create(:clusters_applications_runner, runner: nil, cluster: cluster) } let(:runner) { application.runner } shared_examples 'runner creation' do it 'creates a runner' do expect { subject }.to change { Ci::Runner.count }.by(1) end it 'uses the new runner token' do expect(values).to match(/runnerToken: '?#{Regexp.escape(runner.token)}/) end end context 'project cluster' do let(:project) { create(:project) } let(:cluster) { create(:cluster, :with_installed_helm, projects: [project]) } include_examples 'runner creation' it 'creates a project runner' do subject expect(runner).to be_project_type expect(runner.projects).to eq [project] end end context 'group cluster' do let(:group) { create(:group) } let(:cluster) { create(:cluster, :with_installed_helm, cluster_type: :group_type, groups: [group]) } include_examples 'runner creation' it 'creates a group runner' do subject expect(runner).to be_group_type expect(runner.groups).to eq [group] end end context 'instance cluster' do let(:cluster) { create(:cluster, :with_installed_helm, :instance) } include_examples 'runner creation' it 'creates an instance runner' do subject expect(runner).to be_instance_type end end end context 'with duplicated values on vendor/runner/values.yaml' do let(:stub_values) do { "concurrent" => 4, "checkInterval" => 3, "rbac" => { "create" => false }, "clusterWideAccess" => false, "runners" => { "privileged" => false, "image" => "ubuntu:16.04", "builds" => {}, "services" => {}, "helpers" => {} } } end before do allow(application).to receive(:chart_values).and_return(stub_values) end it 'overwrites values.yaml' do expect(values).to match(/privileged: '?#{application.privileged}/) end end end end