Revert "Merge branch '48098-mutual-auth-cluster-applications' into 'master'"
This reverts merge request !20801
This commit is contained in:
		
							parent
							
								
									5a3948a573
								
							
						
					
					
						commit
						b21730116e
					
				|  | @ -1,26 +1,13 @@ | ||||||
| require 'openssl' |  | ||||||
| 
 |  | ||||||
| module Clusters | module Clusters | ||||||
|   module Applications |   module Applications | ||||||
|     class Helm < ActiveRecord::Base |     class Helm < ActiveRecord::Base | ||||||
|       self.table_name = 'clusters_applications_helm' |       self.table_name = 'clusters_applications_helm' | ||||||
| 
 | 
 | ||||||
|       attr_encrypted :ca_key, |  | ||||||
|         mode: :per_attribute_iv, |  | ||||||
|         key: Settings.attr_encrypted_db_key_base_truncated, |  | ||||||
|         algorithm: 'aes-256-cbc' |  | ||||||
| 
 |  | ||||||
|       include ::Clusters::Concerns::ApplicationCore |       include ::Clusters::Concerns::ApplicationCore | ||||||
|       include ::Clusters::Concerns::ApplicationStatus |       include ::Clusters::Concerns::ApplicationStatus | ||||||
| 
 | 
 | ||||||
|       default_value_for :version, Gitlab::Kubernetes::Helm::HELM_VERSION |       default_value_for :version, Gitlab::Kubernetes::Helm::HELM_VERSION | ||||||
| 
 | 
 | ||||||
|       before_create :create_keys_and_certs |  | ||||||
| 
 |  | ||||||
|       def issue_client_cert |  | ||||||
|         ca_cert_obj.issue |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       def set_initial_status |       def set_initial_status | ||||||
|         return unless not_installable? |         return unless not_installable? | ||||||
| 
 | 
 | ||||||
|  | @ -28,41 +15,7 @@ module Clusters | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|       def install_command |       def install_command | ||||||
|         Gitlab::Kubernetes::Helm::InitCommand.new( |         Gitlab::Kubernetes::Helm::InitCommand.new(name) | ||||||
|           name: name, |  | ||||||
|           files: files |  | ||||||
|         ) |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       def has_ssl? |  | ||||||
|         ca_key.present? && ca_cert.present? |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       private |  | ||||||
| 
 |  | ||||||
|       def files |  | ||||||
|         { |  | ||||||
|           'ca.pem': ca_cert, |  | ||||||
|           'cert.pem': tiller_cert.cert_string, |  | ||||||
|           'key.pem': tiller_cert.key_string |  | ||||||
|         } |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       def create_keys_and_certs |  | ||||||
|         ca_cert = Gitlab::Kubernetes::Helm::Certificate.generate_root |  | ||||||
|         self.ca_key = ca_cert.key_string |  | ||||||
|         self.ca_cert = ca_cert.cert_string |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       def tiller_cert |  | ||||||
|         @tiller_cert ||= ca_cert_obj.issue(expires_in: Gitlab::Kubernetes::Helm::Certificate::INFINITE_EXPIRY) |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       def ca_cert_obj |  | ||||||
|         return unless has_ssl? |  | ||||||
| 
 |  | ||||||
|         Gitlab::Kubernetes::Helm::Certificate |  | ||||||
|           .from_strings(ca_key, ca_cert) |  | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
|  |  | ||||||
|  | @ -32,9 +32,9 @@ module Clusters | ||||||
| 
 | 
 | ||||||
|       def install_command |       def install_command | ||||||
|         Gitlab::Kubernetes::Helm::InstallCommand.new( |         Gitlab::Kubernetes::Helm::InstallCommand.new( | ||||||
|           name: name, |           name, | ||||||
|           chart: chart, |           chart: chart, | ||||||
|           files: files |           values: values | ||||||
|         ) |         ) | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -35,9 +35,9 @@ module Clusters | ||||||
| 
 | 
 | ||||||
|       def install_command |       def install_command | ||||||
|         Gitlab::Kubernetes::Helm::InstallCommand.new( |         Gitlab::Kubernetes::Helm::InstallCommand.new( | ||||||
|           name: name, |           name, | ||||||
|           chart: chart, |           chart: chart, | ||||||
|           files: files, |           values: values, | ||||||
|           repository: repository |           repository: repository | ||||||
|         ) |         ) | ||||||
|       end |       end | ||||||
|  |  | ||||||
|  | @ -43,10 +43,10 @@ module Clusters | ||||||
| 
 | 
 | ||||||
|       def install_command |       def install_command | ||||||
|         Gitlab::Kubernetes::Helm::InstallCommand.new( |         Gitlab::Kubernetes::Helm::InstallCommand.new( | ||||||
|           name: name, |           name, | ||||||
|           chart: chart, |           chart: chart, | ||||||
|           version: version, |           version: version, | ||||||
|           files: files |           values: values | ||||||
|         ) |         ) | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -28,9 +28,9 @@ module Clusters | ||||||
| 
 | 
 | ||||||
|       def install_command |       def install_command | ||||||
|         Gitlab::Kubernetes::Helm::InstallCommand.new( |         Gitlab::Kubernetes::Helm::InstallCommand.new( | ||||||
|           name: name, |           name, | ||||||
|           chart: chart, |           chart: chart, | ||||||
|           files: files, |           values: values, | ||||||
|           repository: repository |           repository: repository | ||||||
|         ) |         ) | ||||||
|       end |       end | ||||||
|  |  | ||||||
|  | @ -12,34 +12,8 @@ module Clusters | ||||||
|           File.read(chart_values_file) |           File.read(chart_values_file) | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|         def files |  | ||||||
|           @files ||= begin |  | ||||||
|             files = { 'values.yaml': values } |  | ||||||
| 
 |  | ||||||
|             files.merge!(certificate_files) if cluster.application_helm.has_ssl? |  | ||||||
| 
 |  | ||||||
|             files |  | ||||||
|           end |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         private |         private | ||||||
| 
 | 
 | ||||||
|         def certificate_files |  | ||||||
|           { |  | ||||||
|             'ca.pem': ca_cert, |  | ||||||
|             'cert.pem': helm_cert.cert_string, |  | ||||||
|             'key.pem': helm_cert.key_string |  | ||||||
|           } |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def ca_cert |  | ||||||
|           cluster.application_helm.ca_cert |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def helm_cert |  | ||||||
|           @helm_cert ||= cluster.application_helm.issue_client_cert |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def chart_values_file |         def chart_values_file | ||||||
|           "#{Rails.root}/vendor/#{name}/values.yaml" |           "#{Rails.root}/vendor/#{name}/values.yaml" | ||||||
|         end |         end | ||||||
|  |  | ||||||
|  | @ -1,6 +0,0 @@ | ||||||
| --- |  | ||||||
| title: Ensure installed Helm Tiller For GitLab Managed Apps Is protected by mutual |  | ||||||
|   auth |  | ||||||
| merge_request: 20801 |  | ||||||
| author: |  | ||||||
| type: changed |  | ||||||
|  | @ -1,11 +0,0 @@ | ||||||
| class AddColumnsForHelmTillerCertificates < ActiveRecord::Migration |  | ||||||
|   include Gitlab::Database::MigrationHelpers |  | ||||||
| 
 |  | ||||||
|   DOWNTIME = false |  | ||||||
| 
 |  | ||||||
|   def change |  | ||||||
|     add_column :clusters_applications_helm, :encrypted_ca_key, :text |  | ||||||
|     add_column :clusters_applications_helm, :encrypted_ca_key_iv, :text |  | ||||||
|     add_column :clusters_applications_helm, :ca_cert, :text |  | ||||||
|   end |  | ||||||
| end |  | ||||||
|  | @ -636,9 +636,6 @@ ActiveRecord::Schema.define(version: 20180722103201) do | ||||||
|     t.integer "status", null: false |     t.integer "status", null: false | ||||||
|     t.string "version", null: false |     t.string "version", null: false | ||||||
|     t.text "status_reason" |     t.text "status_reason" | ||||||
|     t.text "encrypted_ca_key" |  | ||||||
|     t.text "encrypted_ca_key_iv" |  | ||||||
|     t.text "ca_cert" |  | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   create_table "clusters_applications_ingress", force: :cascade do |t| |   create_table "clusters_applications_ingress", force: :cascade do |t| | ||||||
|  |  | ||||||
|  | @ -1,15 +1,15 @@ | ||||||
| module Gitlab | module Gitlab | ||||||
|   module Kubernetes |   module Kubernetes | ||||||
|     class ConfigMap |     class ConfigMap | ||||||
|       def initialize(name, files) |       def initialize(name, values = "") | ||||||
|         @name = name |         @name = name | ||||||
|         @files = files |         @values = values | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|       def generate |       def generate | ||||||
|         resource = ::Kubeclient::Resource.new |         resource = ::Kubeclient::Resource.new | ||||||
|         resource.metadata = metadata |         resource.metadata = metadata | ||||||
|         resource.data = files |         resource.data = { values: values } | ||||||
|         resource |         resource | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|  | @ -19,7 +19,7 @@ module Gitlab | ||||||
| 
 | 
 | ||||||
|       private |       private | ||||||
| 
 | 
 | ||||||
|       attr_reader :name, :files |       attr_reader :name, :values | ||||||
| 
 | 
 | ||||||
|       def metadata |       def metadata | ||||||
|         { |         { | ||||||
|  |  | ||||||
|  | @ -9,7 +9,7 @@ module Gitlab | ||||||
| 
 | 
 | ||||||
|         def install(command) |         def install(command) | ||||||
|           namespace.ensure_exists! |           namespace.ensure_exists! | ||||||
|           create_config_map(command) |           create_config_map(command) if command.config_map? | ||||||
|           kubeclient.create_pod(command.pod_resource) |           kubeclient.create_pod(command.pod_resource) | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -1,7 +1,13 @@ | ||||||
| module Gitlab | module Gitlab | ||||||
|   module Kubernetes |   module Kubernetes | ||||||
|     module Helm |     module Helm | ||||||
|       module BaseCommand |       class BaseCommand | ||||||
|  |         attr_reader :name | ||||||
|  | 
 | ||||||
|  |         def initialize(name) | ||||||
|  |           @name = name | ||||||
|  |         end | ||||||
|  | 
 | ||||||
|         def pod_resource |         def pod_resource | ||||||
|           Gitlab::Kubernetes::Helm::Pod.new(self, namespace).generate |           Gitlab::Kubernetes::Helm::Pod.new(self, namespace).generate | ||||||
|         end |         end | ||||||
|  | @ -18,32 +24,16 @@ module Gitlab | ||||||
|           HEREDOC |           HEREDOC | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|  |         def config_map? | ||||||
|  |           false | ||||||
|  |         end | ||||||
|  | 
 | ||||||
|         def pod_name |         def pod_name | ||||||
|           "install-#{name}" |           "install-#{name}" | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|         def config_map_resource |  | ||||||
|           Gitlab::Kubernetes::ConfigMap.new(name, files).generate |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def file_names |  | ||||||
|           files.keys |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def name |  | ||||||
|           raise "Not implemented" |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def files |  | ||||||
|           raise "Not implemented" |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         private |         private | ||||||
| 
 | 
 | ||||||
|         def files_dir |  | ||||||
|           "/data/helm/#{name}/config" |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def namespace |         def namespace | ||||||
|           Gitlab::Kubernetes::Helm::NAMESPACE |           Gitlab::Kubernetes::Helm::NAMESPACE | ||||||
|         end |         end | ||||||
|  |  | ||||||
|  | @ -1,72 +0,0 @@ | ||||||
| module Gitlab |  | ||||||
|   module Kubernetes |  | ||||||
|     module Helm |  | ||||||
|       class Certificate |  | ||||||
|         INFINITE_EXPIRY = 1000.years |  | ||||||
|         SHORT_EXPIRY = 30.minutes |  | ||||||
| 
 |  | ||||||
|         attr_reader :key, :cert |  | ||||||
| 
 |  | ||||||
|         def key_string |  | ||||||
|           @key.to_s |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def cert_string |  | ||||||
|           @cert.to_pem |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def self.from_strings(key_string, cert_string) |  | ||||||
|           key = OpenSSL::PKey::RSA.new(key_string) |  | ||||||
|           cert = OpenSSL::X509::Certificate.new(cert_string) |  | ||||||
|           new(key, cert) |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def self.generate_root |  | ||||||
|           _issue(signed_by: nil, expires_in: INFINITE_EXPIRY, certificate_authority: true) |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def issue(expires_in: SHORT_EXPIRY) |  | ||||||
|           self.class._issue(signed_by: self, expires_in: expires_in, certificate_authority: false) |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         private |  | ||||||
| 
 |  | ||||||
|         def self._issue(signed_by:, expires_in:, certificate_authority:) |  | ||||||
|           key = OpenSSL::PKey::RSA.new(4096) |  | ||||||
|           public_key = key.public_key |  | ||||||
| 
 |  | ||||||
|           subject = OpenSSL::X509::Name.parse("/C=US") |  | ||||||
| 
 |  | ||||||
|           cert = OpenSSL::X509::Certificate.new |  | ||||||
|           cert.subject = subject |  | ||||||
| 
 |  | ||||||
|           cert.issuer = signed_by&.cert&.subject || subject |  | ||||||
| 
 |  | ||||||
|           cert.not_before = Time.now |  | ||||||
|           cert.not_after = expires_in.from_now |  | ||||||
|           cert.public_key = public_key |  | ||||||
|           cert.serial = 0x0 |  | ||||||
|           cert.version = 2 |  | ||||||
| 
 |  | ||||||
|           if certificate_authority |  | ||||||
|             extension_factory = OpenSSL::X509::ExtensionFactory.new |  | ||||||
|             extension_factory.subject_certificate = cert |  | ||||||
|             extension_factory.issuer_certificate = cert |  | ||||||
|             cert.add_extension(extension_factory.create_extension('subjectKeyIdentifier', 'hash')) |  | ||||||
|             cert.add_extension(extension_factory.create_extension('basicConstraints', 'CA:TRUE', true)) |  | ||||||
|             cert.add_extension(extension_factory.create_extension('keyUsage', 'cRLSign,keyCertSign', true)) |  | ||||||
|           end |  | ||||||
| 
 |  | ||||||
|           cert.sign(signed_by&.key || key, OpenSSL::Digest::SHA256.new) |  | ||||||
| 
 |  | ||||||
|           new(key, cert) |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def initialize(key, cert) |  | ||||||
|           @key = key |  | ||||||
|           @cert = cert |  | ||||||
|         end |  | ||||||
|       end |  | ||||||
|     end |  | ||||||
|   end |  | ||||||
| end |  | ||||||
|  | @ -1,16 +1,7 @@ | ||||||
| module Gitlab | module Gitlab | ||||||
|   module Kubernetes |   module Kubernetes | ||||||
|     module Helm |     module Helm | ||||||
|       class InitCommand |       class InitCommand < BaseCommand | ||||||
|         include BaseCommand |  | ||||||
| 
 |  | ||||||
|         attr_reader :name, :files |  | ||||||
| 
 |  | ||||||
|         def initialize(name:, files:) |  | ||||||
|           @name = name |  | ||||||
|           @files = files |  | ||||||
|         end |  | ||||||
| 
 |  | ||||||
|         def generate_script |         def generate_script | ||||||
|           super + [ |           super + [ | ||||||
|             init_helm_command |             init_helm_command | ||||||
|  | @ -20,12 +11,7 @@ module Gitlab | ||||||
|         private |         private | ||||||
| 
 | 
 | ||||||
|         def init_helm_command |         def init_helm_command | ||||||
|           tls_flags = "--tiller-tls" \ |           "helm init >/dev/null" | ||||||
|             " --tiller-tls-verify --tls-ca-cert #{files_dir}/ca.pem" \ |  | ||||||
|             " --tiller-tls-cert #{files_dir}/cert.pem" \ |  | ||||||
|             " --tiller-tls-key #{files_dir}/key.pem" |  | ||||||
| 
 |  | ||||||
|           "helm init #{tls_flags} >/dev/null" |  | ||||||
|         end |         end | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|  |  | ||||||
|  | @ -1,16 +1,14 @@ | ||||||
| module Gitlab | module Gitlab | ||||||
|   module Kubernetes |   module Kubernetes | ||||||
|     module Helm |     module Helm | ||||||
|       class InstallCommand |       class InstallCommand < BaseCommand | ||||||
|         include BaseCommand |         attr_reader :name, :chart, :version, :repository, :values | ||||||
| 
 | 
 | ||||||
|         attr_reader :name, :files, :chart, :version, :repository |         def initialize(name, chart:, values:, version: nil, repository: nil) | ||||||
| 
 |  | ||||||
|         def initialize(name:, chart:, files:, version: nil, repository: nil) |  | ||||||
|           @name = name |           @name = name | ||||||
|           @chart = chart |           @chart = chart | ||||||
|           @version = version |           @version = version | ||||||
|           @files = files |           @values = values | ||||||
|           @repository = repository |           @repository = repository | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|  | @ -22,6 +20,14 @@ module Gitlab | ||||||
|           ].compact.join("\n") |           ].compact.join("\n") | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|  |         def config_map? | ||||||
|  |           true | ||||||
|  |         end | ||||||
|  | 
 | ||||||
|  |         def config_map_resource | ||||||
|  |           Gitlab::Kubernetes::ConfigMap.new(name, values).generate | ||||||
|  |         end | ||||||
|  | 
 | ||||||
|         private |         private | ||||||
| 
 | 
 | ||||||
|         def init_command |         def init_command | ||||||
|  | @ -33,27 +39,14 @@ module Gitlab | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|         def script_command |         def script_command | ||||||
|           "helm install" \ |           <<~HEREDOC | ||||||
|           "#{optional_tls_flags} " \ |           helm install #{chart} --name #{name}#{optional_version_flag} --namespace #{Gitlab::Kubernetes::Helm::NAMESPACE} -f /data/helm/#{name}/config/values.yaml >/dev/null | ||||||
|           "#{chart} " \ |           HEREDOC | ||||||
|           "--name #{name}" \ |  | ||||||
|           "#{optional_version_flag} " \ |  | ||||||
|           "--namespace #{Gitlab::Kubernetes::Helm::NAMESPACE} " \ |  | ||||||
|           "-f /data/helm/#{name}/config/values.yaml >/dev/null\n" |  | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|         def optional_version_flag |         def optional_version_flag | ||||||
|           " --version #{version}" if version |           " --version #{version}" if version | ||||||
|         end |         end | ||||||
| 
 |  | ||||||
|         def optional_tls_flags |  | ||||||
|           return unless files.key?(:'ca.pem') |  | ||||||
| 
 |  | ||||||
|           " --tls" \ |  | ||||||
|             " --tls-ca-cert #{files_dir}/ca.pem" \ |  | ||||||
|             " --tls-cert #{files_dir}/cert.pem" \ |  | ||||||
|             " --tls-key #{files_dir}/key.pem" |  | ||||||
|         end |  | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
|  |  | ||||||
|  | @ -10,8 +10,10 @@ module Gitlab | ||||||
|         def generate |         def generate | ||||||
|           spec = { containers: [container_specification], restartPolicy: 'Never' } |           spec = { containers: [container_specification], restartPolicy: 'Never' } | ||||||
| 
 | 
 | ||||||
|  |           if command.config_map? | ||||||
|             spec[:volumes] = volumes_specification |             spec[:volumes] = volumes_specification | ||||||
|             spec[:containers][0][:volumeMounts] = volume_mounts_specification |             spec[:containers][0][:volumeMounts] = volume_mounts_specification | ||||||
|  |           end | ||||||
| 
 | 
 | ||||||
|           ::Kubeclient::Resource.new(metadata: metadata, spec: spec) |           ::Kubeclient::Resource.new(metadata: metadata, spec: spec) | ||||||
|         end |         end | ||||||
|  | @ -59,7 +61,7 @@ module Gitlab | ||||||
|               name: 'configuration-volume', |               name: 'configuration-volume', | ||||||
|               configMap: { |               configMap: { | ||||||
|                 name: "values-content-configuration-#{command.name}", |                 name: "values-content-configuration-#{command.name}", | ||||||
|                 items: command.file_names.map { |name| { key: name, path: name } } |                 items: [{ key: 'values', path: 'values.yaml' }] | ||||||
|               } |               } | ||||||
|             } |             } | ||||||
|           ] |           ] | ||||||
|  |  | ||||||
|  | @ -44,11 +44,10 @@ module QA | ||||||
|               page.await_installed(:helm) |               page.await_installed(:helm) | ||||||
| 
 | 
 | ||||||
|               page.install!(:ingress) if @install_ingress |               page.install!(:ingress) if @install_ingress | ||||||
|               page.install!(:prometheus) if @install_prometheus |  | ||||||
|               page.install!(:runner) if @install_runner |  | ||||||
| 
 |  | ||||||
|               page.await_installed(:ingress) if @install_ingress |               page.await_installed(:ingress) if @install_ingress | ||||||
|  |               page.install!(:prometheus) if @install_prometheus | ||||||
|               page.await_installed(:prometheus) if @install_prometheus |               page.await_installed(:prometheus) if @install_prometheus | ||||||
|  |               page.install!(:runner) if @install_runner | ||||||
|               page.await_installed(:runner) if @install_runner |               page.await_installed(:runner) if @install_runner | ||||||
|             end |             end | ||||||
|           end |           end | ||||||
|  |  | ||||||
|  | @ -16,7 +16,6 @@ module QA | ||||||
| 
 | 
 | ||||||
|             def install!(application_name) |             def install!(application_name) | ||||||
|               within(".js-cluster-application-row-#{application_name}") do |               within(".js-cluster-application-row-#{application_name}") do | ||||||
|                 page.has_button?('Install', wait: 30) |  | ||||||
|                 click_on 'Install' |                 click_on 'Install' | ||||||
|               end |               end | ||||||
|             end |             end | ||||||
|  |  | ||||||
|  | @ -32,21 +32,11 @@ FactoryBot.define do | ||||||
|       updated_at ClusterWaitForAppInstallationWorker::TIMEOUT.ago |       updated_at ClusterWaitForAppInstallationWorker::TIMEOUT.ago | ||||||
|     end |     end | ||||||
| 
 | 
 | ||||||
|     factory :clusters_applications_ingress, class: Clusters::Applications::Ingress do |     factory :clusters_applications_ingress, class: Clusters::Applications::Ingress | ||||||
|       cluster factory: %i(cluster with_installed_helm provided_by_gcp) |     factory :clusters_applications_prometheus, class: Clusters::Applications::Prometheus | ||||||
|     end |     factory :clusters_applications_runner, class: Clusters::Applications::Runner | ||||||
| 
 |  | ||||||
|     factory :clusters_applications_prometheus, class: Clusters::Applications::Prometheus do |  | ||||||
|       cluster factory: %i(cluster with_installed_helm provided_by_gcp) |  | ||||||
|     end |  | ||||||
| 
 |  | ||||||
|     factory :clusters_applications_runner, class: Clusters::Applications::Runner do |  | ||||||
|       cluster factory: %i(cluster with_installed_helm provided_by_gcp) |  | ||||||
|     end |  | ||||||
| 
 |  | ||||||
|     factory :clusters_applications_jupyter, class: Clusters::Applications::Jupyter do |     factory :clusters_applications_jupyter, class: Clusters::Applications::Jupyter do | ||||||
|       oauth_application factory: :oauth_application |       oauth_application factory: :oauth_application | ||||||
|       cluster factory: %i(cluster with_installed_helm provided_by_gcp) |  | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -36,9 +36,5 @@ FactoryBot.define do | ||||||
|     trait :production_environment do |     trait :production_environment do | ||||||
|       sequence(:environment_scope) { |n| "production#{n}/*" } |       sequence(:environment_scope) { |n| "production#{n}/*" } | ||||||
|     end |     end | ||||||
| 
 |  | ||||||
|     trait :with_installed_helm do |  | ||||||
|       application_helm factory: %i(clusters_applications_helm installed) |  | ||||||
|     end |  | ||||||
|   end |   end | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -46,14 +46,12 @@ describe 'Clusters Applications', :js do | ||||||
|           end |           end | ||||||
|         end |         end | ||||||
| 
 | 
 | ||||||
|         it 'they see status transition' do |         it 'he sees status transition' do | ||||||
|           page.within('.js-cluster-application-row-helm') do |           page.within('.js-cluster-application-row-helm') do | ||||||
|             # FE sends request and gets the response, then the buttons is "Install" |             # FE sends request and gets the response, then the buttons is "Install" | ||||||
|             expect(page.find(:css, '.js-cluster-application-install-button')['disabled']).to eq('true') |             expect(page.find(:css, '.js-cluster-application-install-button')['disabled']).to eq('true') | ||||||
|             expect(page).to have_css('.js-cluster-application-install-button', exact_text: 'Install') |             expect(page).to have_css('.js-cluster-application-install-button', exact_text: 'Install') | ||||||
| 
 | 
 | ||||||
|             wait_until_helm_created! |  | ||||||
| 
 |  | ||||||
|             Clusters::Cluster.last.application_helm.make_installing! |             Clusters::Cluster.last.application_helm.make_installing! | ||||||
| 
 | 
 | ||||||
|             # FE starts polling and update the buttons to "Installing" |             # FE starts polling and update the buttons to "Installing" | ||||||
|  | @ -85,7 +83,7 @@ describe 'Clusters Applications', :js do | ||||||
|             end |             end | ||||||
|           end |           end | ||||||
| 
 | 
 | ||||||
|           it 'they see status transition' do |           it 'he sees status transition' do | ||||||
|             page.within('.js-cluster-application-row-ingress') do |             page.within('.js-cluster-application-row-ingress') do | ||||||
|               # FE sends request and gets the response, then the buttons is "Install" |               # FE sends request and gets the response, then the buttons is "Install" | ||||||
|               expect(page).to have_css('.js-cluster-application-install-button[disabled]') |               expect(page).to have_css('.js-cluster-application-install-button[disabled]') | ||||||
|  | @ -118,14 +116,4 @@ describe 'Clusters Applications', :js do | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 |  | ||||||
|   def wait_until_helm_created! |  | ||||||
|     retries = 0 |  | ||||||
| 
 |  | ||||||
|     while Clusters::Cluster.last.application_helm.nil? |  | ||||||
|       raise "Timed out waiting for helm application to be created in DB" if (retries += 1) > 3 |  | ||||||
| 
 |  | ||||||
|       sleep(1) |  | ||||||
|     end |  | ||||||
|   end |  | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -3,7 +3,7 @@ require 'spec_helper' | ||||||
| describe Gitlab::Kubernetes::ConfigMap do | describe Gitlab::Kubernetes::ConfigMap do | ||||||
|   let(:kubeclient) { double('kubernetes client') } |   let(:kubeclient) { double('kubernetes client') } | ||||||
|   let(:application) { create(:clusters_applications_prometheus) } |   let(:application) { create(:clusters_applications_prometheus) } | ||||||
|   let(:config_map) { described_class.new(application.name, application.files) } |   let(:config_map) { described_class.new(application.name, application.values) } | ||||||
|   let(:namespace) { Gitlab::Kubernetes::Helm::NAMESPACE } |   let(:namespace) { Gitlab::Kubernetes::Helm::NAMESPACE } | ||||||
| 
 | 
 | ||||||
|   let(:metadata) do |   let(:metadata) do | ||||||
|  | @ -15,7 +15,7 @@ describe Gitlab::Kubernetes::ConfigMap do | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   describe '#generate' do |   describe '#generate' do | ||||||
|     let(:resource) { ::Kubeclient::Resource.new(metadata: metadata, data: application.files) } |     let(:resource) { ::Kubeclient::Resource.new(metadata: metadata, data: { values: application.values }) } | ||||||
|     subject { config_map.generate } |     subject { config_map.generate } | ||||||
| 
 | 
 | ||||||
|     it 'should build a Kubeclient Resource' do |     it 'should build a Kubeclient Resource' do | ||||||
|  |  | ||||||
|  | @ -39,7 +39,7 @@ describe Gitlab::Kubernetes::Helm::Api do | ||||||
|     end |     end | ||||||
| 
 | 
 | ||||||
|     context 'with a ConfigMap' do |     context 'with a ConfigMap' do | ||||||
|       let(:resource) { Gitlab::Kubernetes::ConfigMap.new(application.name, application.files).generate } |       let(:resource) { Gitlab::Kubernetes::ConfigMap.new(application.name, application.values).generate } | ||||||
| 
 | 
 | ||||||
|       it 'creates a ConfigMap on kubeclient' do |       it 'creates a ConfigMap on kubeclient' do | ||||||
|         expect(client).to receive(:create_config_map).with(resource).once |         expect(client).to receive(:create_config_map).with(resource).once | ||||||
|  |  | ||||||
|  | @ -2,25 +2,7 @@ require 'spec_helper' | ||||||
| 
 | 
 | ||||||
| describe Gitlab::Kubernetes::Helm::BaseCommand do | describe Gitlab::Kubernetes::Helm::BaseCommand do | ||||||
|   let(:application) { create(:clusters_applications_helm) } |   let(:application) { create(:clusters_applications_helm) } | ||||||
|   let(:test_class) do |   let(:base_command) { described_class.new(application.name) } | ||||||
|     Class.new do |  | ||||||
|       include Gitlab::Kubernetes::Helm::BaseCommand |  | ||||||
| 
 |  | ||||||
|       def name |  | ||||||
|         "test-class-name" |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       def files |  | ||||||
|         { |  | ||||||
|           some: 'value' |  | ||||||
|         } |  | ||||||
|       end |  | ||||||
|     end |  | ||||||
|   end |  | ||||||
| 
 |  | ||||||
|   let(:base_command) do |  | ||||||
|     test_class.new |  | ||||||
|   end |  | ||||||
| 
 | 
 | ||||||
|   subject { base_command } |   subject { base_command } | ||||||
| 
 | 
 | ||||||
|  | @ -36,9 +18,15 @@ describe Gitlab::Kubernetes::Helm::BaseCommand do | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|  |   describe '#config_map?' do | ||||||
|  |     subject { base_command.config_map? } | ||||||
|  | 
 | ||||||
|  |     it { is_expected.to be_falsy } | ||||||
|  |   end | ||||||
|  | 
 | ||||||
|   describe '#pod_name' do |   describe '#pod_name' do | ||||||
|     subject { base_command.pod_name } |     subject { base_command.pod_name } | ||||||
| 
 | 
 | ||||||
|     it { is_expected.to eq('install-test-class-name') } |     it { is_expected.to eq('install-helm') } | ||||||
|   end |   end | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -1,27 +0,0 @@ | ||||||
| require 'spec_helper' |  | ||||||
| 
 |  | ||||||
| describe Gitlab::Kubernetes::Helm::Certificate do |  | ||||||
|   describe '.generate_root' do |  | ||||||
|     subject { described_class.generate_root } |  | ||||||
| 
 |  | ||||||
|     it 'should generate a root CA that expires a long way in the future' do |  | ||||||
|       expect(subject.cert.not_after).to be > 999.years.from_now |  | ||||||
|     end |  | ||||||
|   end |  | ||||||
| 
 |  | ||||||
|   describe '#issue' do |  | ||||||
|     subject { described_class.generate_root.issue } |  | ||||||
| 
 |  | ||||||
|     it 'should generate a cert that expires soon' do |  | ||||||
|       expect(subject.cert.not_after).to be < 60.minutes.from_now |  | ||||||
|     end |  | ||||||
| 
 |  | ||||||
|     context 'passing in INFINITE_EXPIRY' do |  | ||||||
|       subject { described_class.generate_root.issue(expires_in: described_class::INFINITE_EXPIRY) } |  | ||||||
| 
 |  | ||||||
|       it 'should generate a cert that expires a long way in the future' do |  | ||||||
|         expect(subject.cert.not_after).to be > 999.years.from_now |  | ||||||
|       end |  | ||||||
|     end |  | ||||||
|   end |  | ||||||
| end |  | ||||||
|  | @ -2,9 +2,9 @@ require 'spec_helper' | ||||||
| 
 | 
 | ||||||
| describe Gitlab::Kubernetes::Helm::InitCommand do | describe Gitlab::Kubernetes::Helm::InitCommand do | ||||||
|   let(:application) { create(:clusters_applications_helm) } |   let(:application) { create(:clusters_applications_helm) } | ||||||
|   let(:commands) { 'helm init --tiller-tls --tiller-tls-verify --tls-ca-cert /data/helm/helm/config/ca.pem --tiller-tls-cert /data/helm/helm/config/cert.pem --tiller-tls-key /data/helm/helm/config/key.pem >/dev/null' } |   let(:commands) { 'helm init >/dev/null' } | ||||||
| 
 | 
 | ||||||
|   subject { described_class.new(name: application.name, files: {}) } |   subject { described_class.new(application.name) } | ||||||
| 
 | 
 | ||||||
|   it_behaves_like 'helm commands' |   it_behaves_like 'helm commands' | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -1,82 +1,83 @@ | ||||||
| require 'rails_helper' | require 'rails_helper' | ||||||
| 
 | 
 | ||||||
| describe Gitlab::Kubernetes::Helm::InstallCommand do | describe Gitlab::Kubernetes::Helm::InstallCommand do | ||||||
|   let(:files) { { 'ca.pem': 'some file content' } } |   let(:application) { create(:clusters_applications_prometheus) } | ||||||
|   let(:repository) { 'https://repository.example.com' } |   let(:namespace) { Gitlab::Kubernetes::Helm::NAMESPACE } | ||||||
|   let(:version) { '1.2.3' } |   let(:install_command) { application.install_command } | ||||||
| 
 |  | ||||||
|   let(:install_command) do |  | ||||||
|     described_class.new( |  | ||||||
|       name: 'app-name', |  | ||||||
|       chart: 'chart-name', |  | ||||||
|       files: files, |  | ||||||
|       version: version, repository: repository |  | ||||||
|     ) |  | ||||||
|   end |  | ||||||
| 
 | 
 | ||||||
|   subject { install_command } |   subject { install_command } | ||||||
| 
 | 
 | ||||||
|   it_behaves_like 'helm commands' do |   context 'for ingress' do | ||||||
|     let(:commands) do |     let(:application) { create(:clusters_applications_ingress) } | ||||||
|       <<~EOS |  | ||||||
|       helm init --client-only >/dev/null |  | ||||||
|       helm repo add app-name https://repository.example.com |  | ||||||
|       helm install --tls --tls-ca-cert /data/helm/app-name/config/ca.pem --tls-cert /data/helm/app-name/config/cert.pem --tls-key /data/helm/app-name/config/key.pem chart-name --name app-name --version 1.2.3 --namespace gitlab-managed-apps -f /data/helm/app-name/config/values.yaml >/dev/null |  | ||||||
|       EOS |  | ||||||
|     end |  | ||||||
|   end |  | ||||||
| 
 |  | ||||||
|   context 'when there is no repository' do |  | ||||||
|     let(:repository) { nil } |  | ||||||
| 
 | 
 | ||||||
|     it_behaves_like 'helm commands' do |     it_behaves_like 'helm commands' do | ||||||
|       let(:commands) do |       let(:commands) do | ||||||
|         <<~EOS |         <<~EOS | ||||||
|          helm init --client-only >/dev/null |          helm init --client-only >/dev/null | ||||||
|          helm install --tls --tls-ca-cert /data/helm/app-name/config/ca.pem --tls-cert /data/helm/app-name/config/cert.pem --tls-key /data/helm/app-name/config/key.pem chart-name --name app-name --version 1.2.3 --namespace gitlab-managed-apps -f /data/helm/app-name/config/values.yaml >/dev/null |          helm install #{application.chart} --name #{application.name} --namespace #{namespace} -f /data/helm/#{application.name}/config/values.yaml >/dev/null | ||||||
|         EOS |         EOS | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   context 'when there is no ca.pem file' do |   context 'for prometheus' do | ||||||
|     let(:files) { { 'file.txt': 'some content' } } |     let(:application) { create(:clusters_applications_prometheus) } | ||||||
| 
 | 
 | ||||||
|     it_behaves_like 'helm commands' do |     it_behaves_like 'helm commands' do | ||||||
|       let(:commands) do |       let(:commands) do | ||||||
|         <<~EOS |         <<~EOS | ||||||
|          helm init --client-only >/dev/null |          helm init --client-only >/dev/null | ||||||
|          helm repo add app-name https://repository.example.com |          helm install #{application.chart} --name #{application.name} --version #{application.version} --namespace #{namespace} -f /data/helm/#{application.name}/config/values.yaml >/dev/null | ||||||
|          helm install chart-name --name app-name --version 1.2.3 --namespace gitlab-managed-apps -f /data/helm/app-name/config/values.yaml >/dev/null |  | ||||||
|         EOS |         EOS | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   context 'when there is no version' do |   context 'for runner' do | ||||||
|     let(:version) { nil } |     let(:ci_runner) { create(:ci_runner) } | ||||||
|  |     let(:application) { create(:clusters_applications_runner, runner: ci_runner) } | ||||||
| 
 | 
 | ||||||
|     it_behaves_like 'helm commands' do |     it_behaves_like 'helm commands' do | ||||||
|       let(:commands) do |       let(:commands) do | ||||||
|         <<~EOS |         <<~EOS | ||||||
|          helm init --client-only >/dev/null |          helm init --client-only >/dev/null | ||||||
|          helm repo add app-name https://repository.example.com |          helm repo add #{application.name} #{application.repository} | ||||||
|          helm install --tls --tls-ca-cert /data/helm/app-name/config/ca.pem --tls-cert /data/helm/app-name/config/cert.pem --tls-key /data/helm/app-name/config/key.pem chart-name --name app-name --namespace gitlab-managed-apps -f /data/helm/app-name/config/values.yaml >/dev/null |          helm install #{application.chart} --name #{application.name} --namespace #{namespace} -f /data/helm/#{application.name}/config/values.yaml >/dev/null | ||||||
|         EOS |         EOS | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|  |   context 'for jupyter' do | ||||||
|  |     let(:application) { create(:clusters_applications_jupyter) } | ||||||
|  | 
 | ||||||
|  |     it_behaves_like 'helm commands' do | ||||||
|  |       let(:commands) do | ||||||
|  |         <<~EOS | ||||||
|  |          helm init --client-only >/dev/null | ||||||
|  |          helm repo add #{application.name} #{application.repository} | ||||||
|  |          helm install #{application.chart} --name #{application.name} --namespace #{namespace} -f /data/helm/#{application.name}/config/values.yaml >/dev/null | ||||||
|  |         EOS | ||||||
|  |       end | ||||||
|  |     end | ||||||
|  |   end | ||||||
|  | 
 | ||||||
|  |   describe '#config_map?' do | ||||||
|  |     subject { install_command.config_map? } | ||||||
|  | 
 | ||||||
|  |     it { is_expected.to be_truthy } | ||||||
|  |   end | ||||||
|  | 
 | ||||||
|   describe '#config_map_resource' do |   describe '#config_map_resource' do | ||||||
|     let(:metadata) do |     let(:metadata) do | ||||||
|       { |       { | ||||||
|         name: "values-content-configuration-app-name", |         name: "values-content-configuration-#{application.name}", | ||||||
|         namespace: 'gitlab-managed-apps', |         namespace: namespace, | ||||||
|         labels: { name: "values-content-configuration-app-name" } |         labels: { name: "values-content-configuration-#{application.name}" } | ||||||
|       } |       } | ||||||
|     end |     end | ||||||
| 
 | 
 | ||||||
|     let(:resource) { ::Kubeclient::Resource.new(metadata: metadata, data: files) } |     let(:resource) { ::Kubeclient::Resource.new(metadata: metadata, data: { values: application.values }) } | ||||||
| 
 | 
 | ||||||
|     subject { install_command.config_map_resource } |     subject { install_command.config_map_resource } | ||||||
| 
 | 
 | ||||||
|  |  | ||||||
|  | @ -2,13 +2,14 @@ require 'rails_helper' | ||||||
| 
 | 
 | ||||||
| describe Gitlab::Kubernetes::Helm::Pod do | describe Gitlab::Kubernetes::Helm::Pod do | ||||||
|   describe '#generate' do |   describe '#generate' do | ||||||
|     let(:app) {  create(:clusters_applications_prometheus) } |     let(:cluster) { create(:cluster) } | ||||||
|  |     let(:app) {  create(:clusters_applications_prometheus, cluster: cluster) } | ||||||
|     let(:command) {  app.install_command } |     let(:command) {  app.install_command } | ||||||
|     let(:namespace) { Gitlab::Kubernetes::Helm::NAMESPACE } |     let(:namespace) { Gitlab::Kubernetes::Helm::NAMESPACE } | ||||||
| 
 | 
 | ||||||
|     subject { described_class.new(command, namespace) } |     subject { described_class.new(command, namespace) } | ||||||
| 
 | 
 | ||||||
|     context 'with a command' do |     shared_examples 'helm pod' do | ||||||
|       it 'should generate a Kubeclient::Resource' do |       it 'should generate a Kubeclient::Resource' do | ||||||
|         expect(subject.generate).to be_a_kind_of(Kubeclient::Resource) |         expect(subject.generate).to be_a_kind_of(Kubeclient::Resource) | ||||||
|       end |       end | ||||||
|  | @ -40,6 +41,10 @@ describe Gitlab::Kubernetes::Helm::Pod do | ||||||
|         spec = subject.generate.spec |         spec = subject.generate.spec | ||||||
|         expect(spec.restartPolicy).to eq('Never') |         expect(spec.restartPolicy).to eq('Never') | ||||||
|       end |       end | ||||||
|  |     end | ||||||
|  | 
 | ||||||
|  |     context 'with a install command' do | ||||||
|  |       it_behaves_like 'helm pod' | ||||||
| 
 | 
 | ||||||
|       it 'should include volumes for the container' do |       it 'should include volumes for the container' do | ||||||
|         container = subject.generate.spec.containers.first |         container = subject.generate.spec.containers.first | ||||||
|  | @ -55,8 +60,24 @@ describe Gitlab::Kubernetes::Helm::Pod do | ||||||
|       it 'should mount configMap specification in the volume' do |       it 'should mount configMap specification in the volume' do | ||||||
|         volume = subject.generate.spec.volumes.first |         volume = subject.generate.spec.volumes.first | ||||||
|         expect(volume.configMap['name']).to eq("values-content-configuration-#{app.name}") |         expect(volume.configMap['name']).to eq("values-content-configuration-#{app.name}") | ||||||
|         expect(volume.configMap['items'].first['key']).to eq(:'values.yaml') |         expect(volume.configMap['items'].first['key']).to eq('values') | ||||||
|         expect(volume.configMap['items'].first['path']).to eq(:'values.yaml') |         expect(volume.configMap['items'].first['path']).to eq('values.yaml') | ||||||
|  |       end | ||||||
|  |     end | ||||||
|  | 
 | ||||||
|  |     context 'with a init command' do | ||||||
|  |       let(:app) { create(:clusters_applications_helm, cluster: cluster) } | ||||||
|  | 
 | ||||||
|  |       it_behaves_like 'helm pod' | ||||||
|  | 
 | ||||||
|  |       it 'should not include volumeMounts inside the container' do | ||||||
|  |         container = subject.generate.spec.containers.first | ||||||
|  |         expect(container.volumeMounts).to be_nil | ||||||
|  |       end | ||||||
|  | 
 | ||||||
|  |       it 'should not a volume inside the specification' do | ||||||
|  |         spec = subject.generate.spec | ||||||
|  |         expect(spec.volumes).to be_nil | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
|  |  | ||||||
|  | @ -6,24 +6,13 @@ describe Clusters::Applications::Helm do | ||||||
|   describe '.installed' do |   describe '.installed' do | ||||||
|     subject { described_class.installed } |     subject { described_class.installed } | ||||||
| 
 | 
 | ||||||
|     let!(:installed_cluster) { create(:clusters_applications_helm, :installed) } |     let!(:cluster) { create(:clusters_applications_helm, :installed) } | ||||||
| 
 | 
 | ||||||
|     before do |     before do | ||||||
|       create(:clusters_applications_helm, :errored) |       create(:clusters_applications_helm, :errored) | ||||||
|     end |     end | ||||||
| 
 | 
 | ||||||
|     it { is_expected.to contain_exactly(installed_cluster) } |     it { is_expected.to contain_exactly(cluster) } | ||||||
|   end |  | ||||||
| 
 |  | ||||||
|   describe '#issue_client_cert' do |  | ||||||
|     let(:application) { create(:clusters_applications_helm) } |  | ||||||
|     subject { application.issue_client_cert } |  | ||||||
| 
 |  | ||||||
|     it 'returns a new cert' do |  | ||||||
|       is_expected.to be_kind_of(Gitlab::Kubernetes::Helm::Certificate) |  | ||||||
|       expect(subject.cert_string).not_to eq(application.ca_cert) |  | ||||||
|       expect(subject.key_string).not_to eq(application.ca_key) |  | ||||||
|     end |  | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   describe '#install_command' do |   describe '#install_command' do | ||||||
|  | @ -36,16 +25,5 @@ describe Clusters::Applications::Helm do | ||||||
|     it 'should be initialized with 1 arguments' do |     it 'should be initialized with 1 arguments' do | ||||||
|       expect(subject.name).to eq('helm') |       expect(subject.name).to eq('helm') | ||||||
|     end |     end | ||||||
| 
 |  | ||||||
|     it 'should have cert files' do |  | ||||||
|       expect(subject.files[:'ca.pem']).to be_present |  | ||||||
|       expect(subject.files[:'ca.pem']).to eq(helm.ca_cert) |  | ||||||
| 
 |  | ||||||
|       expect(subject.files[:'cert.pem']).to be_present |  | ||||||
|       expect(subject.files[:'key.pem']).to be_present |  | ||||||
| 
 |  | ||||||
|       cert = OpenSSL::X509::Certificate.new(subject.files[:'cert.pem']) |  | ||||||
|       expect(cert.not_after).to be > 999.years.from_now |  | ||||||
|     end |  | ||||||
|   end |   end | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -74,43 +74,18 @@ describe Clusters::Applications::Ingress do | ||||||
|       expect(subject.name).to eq('ingress') |       expect(subject.name).to eq('ingress') | ||||||
|       expect(subject.chart).to eq('stable/nginx-ingress') |       expect(subject.chart).to eq('stable/nginx-ingress') | ||||||
|       expect(subject.version).to be_nil |       expect(subject.version).to be_nil | ||||||
|       expect(subject.files).to eq(ingress.files) |       expect(subject.values).to eq(ingress.values) | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   describe '#files' do |   describe '#values' do | ||||||
|     let(:application) { ingress } |     subject { ingress.values } | ||||||
|     subject { application.files } |  | ||||||
|     let(:values) { subject[:'values.yaml'] } |  | ||||||
| 
 | 
 | ||||||
|     it 'should include ingress valid keys in values' do |     it 'should include ingress valid keys' do | ||||||
|       expect(values).to include('image') |       is_expected.to include('image') | ||||||
|       expect(values).to include('repository') |       is_expected.to include('repository') | ||||||
|       expect(values).to include('stats') |       is_expected.to include('stats') | ||||||
|       expect(values).to include('podAnnotations') |       is_expected.to include('podAnnotations') | ||||||
|     end |  | ||||||
| 
 |  | ||||||
|     context 'when the helm application does not have a ca_cert' do |  | ||||||
|       before do |  | ||||||
|         application.cluster.application_helm.ca_cert = nil |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       it 'should not include cert files' do |  | ||||||
|         expect(subject[:'ca.pem']).not_to be_present |  | ||||||
|         expect(subject[:'cert.pem']).not_to be_present |  | ||||||
|         expect(subject[:'key.pem']).not_to be_present |  | ||||||
|       end |  | ||||||
|     end |  | ||||||
| 
 |  | ||||||
|     it 'should include cert files' do |  | ||||||
|       expect(subject[:'ca.pem']).to be_present |  | ||||||
|       expect(subject[:'ca.pem']).to eq(application.cluster.application_helm.ca_cert) |  | ||||||
| 
 |  | ||||||
|       expect(subject[:'cert.pem']).to be_present |  | ||||||
|       expect(subject[:'key.pem']).to be_present |  | ||||||
| 
 |  | ||||||
|       cert = OpenSSL::X509::Certificate.new(subject[:'cert.pem']) |  | ||||||
|       expect(cert.not_after).to be < 60.minutes.from_now |  | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -38,46 +38,23 @@ describe Clusters::Applications::Jupyter do | ||||||
|       expect(subject.chart).to eq('jupyter/jupyterhub') |       expect(subject.chart).to eq('jupyter/jupyterhub') | ||||||
|       expect(subject.version).to be_nil |       expect(subject.version).to be_nil | ||||||
|       expect(subject.repository).to eq('https://jupyterhub.github.io/helm-chart/') |       expect(subject.repository).to eq('https://jupyterhub.github.io/helm-chart/') | ||||||
|       expect(subject.files).to eq(jupyter.files) |       expect(subject.values).to eq(jupyter.values) | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   describe '#files' do |   describe '#values' do | ||||||
|     let(:application) { create(:clusters_applications_jupyter) } |     let(:jupyter) { create(:clusters_applications_jupyter) } | ||||||
|     subject { application.files } |  | ||||||
|     let(:values) { subject[:'values.yaml'] } |  | ||||||
| 
 | 
 | ||||||
|     it 'should include cert files' do |     subject { jupyter.values } | ||||||
|       expect(subject[:'ca.pem']).to be_present |  | ||||||
|       expect(subject[:'ca.pem']).to eq(application.cluster.application_helm.ca_cert) |  | ||||||
| 
 |  | ||||||
|       expect(subject[:'cert.pem']).to be_present |  | ||||||
|       expect(subject[:'key.pem']).to be_present |  | ||||||
| 
 |  | ||||||
|       cert = OpenSSL::X509::Certificate.new(subject[:'cert.pem']) |  | ||||||
|       expect(cert.not_after).to be < 60.minutes.from_now |  | ||||||
|     end |  | ||||||
| 
 |  | ||||||
|     context 'when the helm application does not have a ca_cert' do |  | ||||||
|       before do |  | ||||||
|         application.cluster.application_helm.ca_cert = nil |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       it 'should not include cert files' do |  | ||||||
|         expect(subject[:'ca.pem']).not_to be_present |  | ||||||
|         expect(subject[:'cert.pem']).not_to be_present |  | ||||||
|         expect(subject[:'key.pem']).not_to be_present |  | ||||||
|       end |  | ||||||
|     end |  | ||||||
| 
 | 
 | ||||||
|     it 'should include valid values' do |     it 'should include valid values' do | ||||||
|       expect(values).to include('ingress') |       is_expected.to include('ingress') | ||||||
|       expect(values).to include('hub') |       is_expected.to include('hub') | ||||||
|       expect(values).to include('rbac') |       is_expected.to include('rbac') | ||||||
|       expect(values).to include('proxy') |       is_expected.to include('proxy') | ||||||
|       expect(values).to include('auth') |       is_expected.to include('auth') | ||||||
|       expect(values).to match(/clientId: '?#{application.oauth_application.uid}/) |       is_expected.to include("clientId: #{jupyter.oauth_application.uid}") | ||||||
|       expect(values).to match(/callbackUrl: '?#{application.callback_url}/) |       is_expected.to include("callbackUrl: #{jupyter.callback_url}") | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -153,44 +153,21 @@ describe Clusters::Applications::Prometheus do | ||||||
|       expect(command.name).to eq('prometheus') |       expect(command.name).to eq('prometheus') | ||||||
|       expect(command.chart).to eq('stable/prometheus') |       expect(command.chart).to eq('stable/prometheus') | ||||||
|       expect(command.version).to eq('6.7.3') |       expect(command.version).to eq('6.7.3') | ||||||
|       expect(command.files).to eq(prometheus.files) |       expect(command.values).to eq(prometheus.values) | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   describe '#files' do |   describe '#values' do | ||||||
|     let(:application) { create(:clusters_applications_prometheus) } |     let(:prometheus) { create(:clusters_applications_prometheus) } | ||||||
|     subject { application.files } |  | ||||||
|     let(:values) { subject[:'values.yaml'] } |  | ||||||
| 
 | 
 | ||||||
|     it 'should include cert files' do |     subject { prometheus.values } | ||||||
|       expect(subject[:'ca.pem']).to be_present |  | ||||||
|       expect(subject[:'ca.pem']).to eq(application.cluster.application_helm.ca_cert) |  | ||||||
| 
 |  | ||||||
|       expect(subject[:'cert.pem']).to be_present |  | ||||||
|       expect(subject[:'key.pem']).to be_present |  | ||||||
| 
 |  | ||||||
|       cert = OpenSSL::X509::Certificate.new(subject[:'cert.pem']) |  | ||||||
|       expect(cert.not_after).to be < 60.minutes.from_now |  | ||||||
|     end |  | ||||||
| 
 |  | ||||||
|     context 'when the helm application does not have a ca_cert' do |  | ||||||
|       before do |  | ||||||
|         application.cluster.application_helm.ca_cert = nil |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       it 'should not include cert files' do |  | ||||||
|         expect(subject[:'ca.pem']).not_to be_present |  | ||||||
|         expect(subject[:'cert.pem']).not_to be_present |  | ||||||
|         expect(subject[:'key.pem']).not_to be_present |  | ||||||
|       end |  | ||||||
|     end |  | ||||||
| 
 | 
 | ||||||
|     it 'should include prometheus valid values' do |     it 'should include prometheus valid values' do | ||||||
|       expect(values).to include('alertmanager') |       is_expected.to include('alertmanager') | ||||||
|       expect(values).to include('kubeStateMetrics') |       is_expected.to include('kubeStateMetrics') | ||||||
|       expect(values).to include('nodeExporter') |       is_expected.to include('nodeExporter') | ||||||
|       expect(values).to include('pushgateway') |       is_expected.to include('pushgateway') | ||||||
|       expect(values).to include('serverFiles') |       is_expected.to include('serverFiles') | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| end | end | ||||||
|  |  | ||||||
|  | @ -33,55 +33,31 @@ describe Clusters::Applications::Runner do | ||||||
|       expect(subject.chart).to eq('runner/gitlab-runner') |       expect(subject.chart).to eq('runner/gitlab-runner') | ||||||
|       expect(subject.version).to be_nil |       expect(subject.version).to be_nil | ||||||
|       expect(subject.repository).to eq('https://charts.gitlab.io') |       expect(subject.repository).to eq('https://charts.gitlab.io') | ||||||
|       expect(subject.files).to eq(gitlab_runner.files) |       expect(subject.values).to eq(gitlab_runner.values) | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
| 
 | 
 | ||||||
|   describe '#files' do |   describe '#values' do | ||||||
|     let(:application) { create(:clusters_applications_runner, runner: ci_runner) } |     let(:gitlab_runner) { create(:clusters_applications_runner, runner: ci_runner) } | ||||||
| 
 | 
 | ||||||
|     subject { application.files } |     subject { gitlab_runner.values } | ||||||
|     let(:values) { subject[:'values.yaml'] } |  | ||||||
| 
 |  | ||||||
|     it 'should include cert files' do |  | ||||||
|       expect(subject[:'ca.pem']).to be_present |  | ||||||
|       expect(subject[:'ca.pem']).to eq(application.cluster.application_helm.ca_cert) |  | ||||||
| 
 |  | ||||||
|       expect(subject[:'cert.pem']).to be_present |  | ||||||
|       expect(subject[:'key.pem']).to be_present |  | ||||||
| 
 |  | ||||||
|       cert = OpenSSL::X509::Certificate.new(subject[:'cert.pem']) |  | ||||||
|       expect(cert.not_after).to be < 60.minutes.from_now |  | ||||||
|     end |  | ||||||
| 
 |  | ||||||
|     context 'when the helm application does not have a ca_cert' do |  | ||||||
|       before do |  | ||||||
|         application.cluster.application_helm.ca_cert = nil |  | ||||||
|       end |  | ||||||
| 
 |  | ||||||
|       it 'should not include cert files' do |  | ||||||
|         expect(subject[:'ca.pem']).not_to be_present |  | ||||||
|         expect(subject[:'cert.pem']).not_to be_present |  | ||||||
|         expect(subject[:'key.pem']).not_to be_present |  | ||||||
|       end |  | ||||||
|     end |  | ||||||
| 
 | 
 | ||||||
|     it 'should include runner valid values' do |     it 'should include runner valid values' do | ||||||
|       expect(values).to include('concurrent') |       is_expected.to include('concurrent') | ||||||
|       expect(values).to include('checkInterval') |       is_expected.to include('checkInterval') | ||||||
|       expect(values).to include('rbac') |       is_expected.to include('rbac') | ||||||
|       expect(values).to include('runners') |       is_expected.to include('runners') | ||||||
|       expect(values).to include('privileged: true') |       is_expected.to include('privileged: true') | ||||||
|       expect(values).to include('image: ubuntu:16.04') |       is_expected.to include('image: ubuntu:16.04') | ||||||
|       expect(values).to include('resources') |       is_expected.to include('resources') | ||||||
|       expect(values).to match(/runnerToken: '?#{ci_runner.token}/) |       is_expected.to include("runnerToken: #{ci_runner.token}") | ||||||
|       expect(values).to match(/gitlabUrl: '?#{Gitlab::Routing.url_helpers.root_url}/) |       is_expected.to include("gitlabUrl: #{Gitlab::Routing.url_helpers.root_url}") | ||||||
|     end |     end | ||||||
| 
 | 
 | ||||||
|     context 'without a runner' do |     context 'without a runner' do | ||||||
|       let(:project) { create(:project) } |       let(:project) { create(:project) } | ||||||
|       let(:cluster) { create(:cluster, :with_installed_helm, projects: [project]) } |       let(:cluster) { create(:cluster, projects: [project]) } | ||||||
|       let(:application) { create(:clusters_applications_runner, cluster: cluster) } |       let(:gitlab_runner) { create(:clusters_applications_runner, cluster: cluster) } | ||||||
| 
 | 
 | ||||||
|       it 'creates a runner' do |       it 'creates a runner' do | ||||||
|         expect do |         expect do | ||||||
|  | @ -90,18 +66,18 @@ describe Clusters::Applications::Runner do | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|       it 'uses the new runner token' do |       it 'uses the new runner token' do | ||||||
|         expect(values).to match(/runnerToken: '?#{application.reload.runner.token}/) |         expect(subject).to include("runnerToken: #{gitlab_runner.reload.runner.token}") | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|       it 'assigns the new runner to runner' do |       it 'assigns the new runner to runner' do | ||||||
|         subject |         subject | ||||||
| 
 | 
 | ||||||
|         expect(application.reload.runner).to be_project_type |         expect(gitlab_runner.reload.runner).to be_project_type | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
| 
 | 
 | ||||||
|     context 'with duplicated values on vendor/runner/values.yaml' do |     context 'with duplicated values on vendor/runner/values.yaml' do | ||||||
|       let(:stub_values) do |       let(:values) do | ||||||
|         { |         { | ||||||
|           "concurrent" => 4, |           "concurrent" => 4, | ||||||
|           "checkInterval" => 3, |           "checkInterval" => 3, | ||||||
|  | @ -120,11 +96,11 @@ describe Clusters::Applications::Runner do | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|       before do |       before do | ||||||
|         allow(application).to receive(:chart_values).and_return(stub_values) |         allow(gitlab_runner).to receive(:chart_values).and_return(values) | ||||||
|       end |       end | ||||||
| 
 | 
 | ||||||
|       it 'should overwrite values.yaml' do |       it 'should overwrite values.yaml' do | ||||||
|         expect(values).to match(/privileged: '?#{application.privileged}/) |         is_expected.to include("privileged: #{gitlab_runner.privileged}") | ||||||
|       end |       end | ||||||
|     end |     end | ||||||
|   end |   end | ||||||
|  |  | ||||||
|  | @ -47,7 +47,7 @@ describe Clusters::Applications::InstallService do | ||||||
|     end |     end | ||||||
| 
 | 
 | ||||||
|     context 'when application cannot be persisted' do |     context 'when application cannot be persisted' do | ||||||
|       let(:application) { create(:clusters_applications_helm, :scheduled) } |       let(:application) { build(:clusters_applications_helm, :scheduled) } | ||||||
| 
 | 
 | ||||||
|       it 'make the application errored' do |       it 'make the application errored' do | ||||||
|         expect(application).to receive(:make_installing!).once.and_raise(ActiveRecord::RecordInvalid) |         expect(application).to receive(:make_installing!).once.and_raise(ActiveRecord::RecordInvalid) | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue