88 lines
2.6 KiB
Ruby
88 lines
2.6 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe Gitlab::Kubernetes do
|
|
include KubernetesHelpers
|
|
include described_class
|
|
|
|
describe '#container_exec_url' do
|
|
let(:api_url) { 'https://example.com' }
|
|
let(:namespace) { 'default' }
|
|
let(:pod_name) { 'pod1' }
|
|
let(:container_name) { 'container1' }
|
|
|
|
subject(:result) { URI.parse(container_exec_url(api_url, namespace, pod_name, container_name)) }
|
|
|
|
it { expect(result.scheme).to eq('wss') }
|
|
it { expect(result.host).to eq('example.com') }
|
|
it { expect(result.path).to eq('/api/v1/namespaces/default/pods/pod1/exec') }
|
|
it { expect(result.query).to eq('container=container1&stderr=true&stdin=true&stdout=true&tty=true&command=sh&command=-c&command=bash+%7C%7C+sh') }
|
|
|
|
context 'with a HTTP API URL' do
|
|
let(:api_url) { 'http://example.com' }
|
|
|
|
it { expect(result.scheme).to eq('ws') }
|
|
end
|
|
|
|
context 'with a path prefix in the API URL' do
|
|
let(:api_url) { 'https://example.com/prefix/' }
|
|
it { expect(result.path).to eq('/prefix/api/v1/namespaces/default/pods/pod1/exec') }
|
|
end
|
|
|
|
context 'with arguments that need urlencoding' do
|
|
let(:namespace) { 'default namespace' }
|
|
let(:pod_name) { 'pod 1' }
|
|
let(:container_name) { 'container 1' }
|
|
|
|
it { expect(result.path).to eq('/api/v1/namespaces/default%20namespace/pods/pod%201/exec') }
|
|
it { expect(result.query).to match(/\Acontainer=container\+1&/) }
|
|
end
|
|
end
|
|
|
|
describe '#filter_by_label' do
|
|
it 'returns matching labels' do
|
|
matching_items = [kube_pod(app: 'foo')]
|
|
items = matching_items + [kube_pod]
|
|
|
|
expect(filter_by_label(items, app: 'foo')).to eq(matching_items)
|
|
end
|
|
end
|
|
|
|
describe '#to_kubeconfig' do
|
|
subject do
|
|
to_kubeconfig(
|
|
url: 'https://kube.domain.com',
|
|
namespace: 'NAMESPACE',
|
|
token: 'TOKEN',
|
|
ca_pem: ca_pem)
|
|
end
|
|
|
|
context 'when CA PEM is provided' do
|
|
let(:ca_pem) { 'PEM' }
|
|
let(:path) { expand_fixture_path('config/kubeconfig.yml') }
|
|
|
|
it { is_expected.to eq(YAML.load_file(path)) }
|
|
end
|
|
|
|
context 'when CA PEM is not provided' do
|
|
let(:ca_pem) { nil }
|
|
let(:path) { expand_fixture_path('config/kubeconfig-without-ca.yml') }
|
|
|
|
it { is_expected.to eq(YAML.load_file(path)) }
|
|
end
|
|
end
|
|
|
|
describe '#add_terminal_auth' do
|
|
it 'adds authentication parameters to a hash' do
|
|
terminal = { original: 'value' }
|
|
|
|
add_terminal_auth(terminal, token: 'foo', max_session_time: 0, ca_pem: 'bar')
|
|
|
|
expect(terminal).to eq(
|
|
original: 'value',
|
|
headers: { 'Authorization' => ['Bearer foo'] },
|
|
max_session_time: 0,
|
|
ca_pem: 'bar'
|
|
)
|
|
end
|
|
end
|
|
end
|